QUICK DISCUSSION & RESPONSE ACTIVITY
QUICKDISCUSSION & RESPONSE ACTIVITY
Directions: (PART 1)(PROVIDE SOURCES AT END, ONLY 1-2 SOURCES IS NEEDED)
What are the differences betweenlayer 2, and layer 3 of VPNs? Please explain it in two-three paragraphs withvalid references.
Directions: (PART 2)(There are 2 responses to respond back to)
Respond to these separateresponses with 2-3 sentences each response.
1st Response: VPNssolutions works using protocols, in most cases, at layer 2 and layer 3 OS theOpen System Interconnection (OSI) model. There are differences in between eachLayer. First of we have Layer 2; This layer is known as the Data Link Layer.Data is transferred between adjacent network nodes, in this protocol layer.Since we are talking about VPNs in this specific example, data would betransfer from one VPNs endpoint to the other. In other words, data could betransported between two routers. It is important to mention that Layer 2 VPN isless secure, in some cases. On the other hand, we have Layer 3 of VPN. This Layeris known as the Network Layer. As mentioned in the book: “is responsiblefor end-to-end packet delivery and includes the ability to route packets tointermediate hosts (Stewart, et. all. pp 312)”. In other words, data isdelivered and sent on the core of VPN infrastructure. In contrast with Layer 2,Layer 3 is usually more secure, and scalable. One example provided to us usingLayer 3 is Internet Protocol Security (IPsec). As we know, IPsec encrypts the packets being sent, thus this iswhat makes Layer 3 more secure than Layer 2.
2nd Response: Animportant observation about VPN is that they use multiple protocols as a way toestablish connection. This is really important because it can keep VPNs safethrough different authentication and encryption mechanisms, as well as run indifferent layers of the OSI model. Most VPNs work at Layers 2 and 3 of the OSImodel. Layer 2 VPN ( Data Link Layer), is the protocol of the OSI model thatworks with MAC addresses and transfer data between adjacent network nodes. Themain protocol used by VPN in this layer is the Layer 2 Transport Protocol(L2TP). When using Layer 3 (Network Layer) of the OSI model, VPN becomes muchmore scalable because IP addresses are being used, allowing communication withdevices form anywhere.
NOTE: PLEASE RESPOND SEPARATELYTO THESE 2 DIFFERENT RESPONSES! THANK YOU!
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.
