Task 4 - Protocol and scenario analysis a) Compare and contrast Authentication Header (AH) EncapsulatingSecurity Payload (ESP) protocols with their characteristics. The Authentication Header protocol only provides an authentication mechanism. Theprotocol provides data integrity, data source authentication, and additional replay protectionservices. The protocol ensures data integrity through message digests generated byalgorithms such as HMAC-MD5 or HMAC-SHA. The protocol protects data sourceauthentication by generating a message digest through a secret shared key. The protocolsecures replay protection through a sequence number field including an AH header. TheAuthentication Header protocol verifies the IP header and its payload. The Encapsulating Security Payload protocol provides data confidentiality along with theauthentication mechanism. The protocol, in overall, provides data encryption, data integrityauthentication, data source authentication, and replay protection services. The protocol caneither be used separately for encryption and authentication, or can be cooperatively usedfor both encryption and authentication. For the authentication mechanism, the ESP protocolimplements the same algorithm as AH, provides different coverage. The authentication withthe AH protocol includes verification of the entire IP data packet including the external IPheader, while the authentication with the ESP protocol includes verification for the IPdatagram of the IP data packet1.b) Discuss a scenario where you think VPN tunnel mode is suitable.Illustrate the frame format in your explanation.