Can you please list the advantages and disadvantages of the layered approach to protocols? How can I define the...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
layered approach protocol?
A layered approach to protocols can be seen in models like OSI and TCP/IP. The OSI model defines networking into a seven-layer process. Within the OSI model, the data is passed down from layer-to-layer. It begins at the application layer and ends at the physical layer. While the OSI model was great in theory what has been implemented in its place is TCP/IP. The DoD TCP/IP is a four layer model what both have in common is the ability to layer security. As an example, at OSI Layer 2 tunneling and VPN protocols can be used to protect data. Security controls like L2TP, WEP, and WPA are available. OSI Layer 3 is the home of IPSec. Even at the application layer security can be added by means of protocols like SSH, DNSSEC, PGP, or Secure RPC.
Dig Deeper on The OSI Model
Related Q&A from Michael Gregg
Enterprise security expert, Michael Gregg answers a question regarding port 3389 issues when a user tries to open port 3389 RDP on their router to ...continue reading
Security expert Michael Gregg fields a question about unknown network cards gaining access to a user's network.continue reading
Security expert Michael Gregg discusses the disadvantages to a layered approach to enterprise security.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.