Point to point transmission(ppp), Computer Network Security

The Point-to-Point Protocol (PPP) is a data link protocol generally used in establishing a direct connection between two networking systems. It can give connection authentication, compression, and transmission encryption (having ECP, RFC 1968).

PPP is used over many kinds of physical networks adding serial cable, trunk line, phone line, cellular telephone, specialized radio fiber optic, and links such as SONET. PPP is also used over Internet access connections. Internet service providers (ISPs) have needed PPP for customer dial-up access to the Internet, since IP messages cannot be transmitted over a modem line on their own, without message data link protocol. Two encapsulated parts of PPP, Point-to-Point Protocol over ATM (PPPoA) and, Point-to-Point Protocol over Ethernet (PPPoE) are used most generally by Internet Service Providers (ISPs) to connect a Digital Subscriber Line (DSL) Internet service connection with users.


 

1013_Point to point transmission.png

Posted Date: 8/20/2012 12:59:21 AM | Location : United States







Related Discussions:- Point to point transmission(ppp), Assignment Help, Ask Question on Point to point transmission(ppp), Get Answer, Expert's Help, Point to point transmission(ppp) Discussions

Write discussion on Point to point transmission(ppp)
Your posts are moderated
Related Questions
Belady's Anomaly Also known FIFO anomaly. Generally, on raising the number of frames given to a process' virtual storage, the program execution is faster, because lesser page

The "Big Red Rocks" (BRR) mining company is based and operates in Western Australia. They are primarily an iron ore miner, but they also produce electricity through tidal power to

Spambot Detection: The  previous studies in this field  have focused on content and meta-content based features.  The main assumption in this area of spam detection of late is

Encode the following plaintext, using the Caesar cipher: LORD OF THE RINGS b) The following ciphertext jw njbh lxmn cx kanjt has been encoded using a

Problem: (a) What do you meant by Network Address Translation (NAT)? Why is it used? (b) Given the following information by your ISP about your newly acquired Frame Relay c

Short term Scheduler function , also shown as a dispatcher runs most frequently, and creates the finest-grained decision of which program could run next. This scheduler is called

Problem (a) Name the various layers of the OSI model. (b) Show, by means of a diagram, how  the TCP/IP  reference model  is different from the OSI-7 reference model? Why is

Question: a. State briefly three reasons why computer networks are used? b. Differentiate between simplex, half-duplex and full-duplex mode of transmission. c. State any

QUESTION (a) Illustrate the term file carving. (b) What are the basic three main techniques for image steganography? (c) Distinguish between vector graphics and raster

Title: Perimeter Network Security System Outline Requirements The University is based in Glasgow, and provides higher education services to its students and staff. It is loc