Point to point transmission(ppp), Computer Network Security

The Point-to-Point Protocol (PPP) is a data link protocol generally used in establishing a direct connection between two networking systems. It can give connection authentication, compression, and transmission encryption (having ECP, RFC 1968).

PPP is used over many kinds of physical networks adding serial cable, trunk line, phone line, cellular telephone, specialized radio fiber optic, and links such as SONET. PPP is also used over Internet access connections. Internet service providers (ISPs) have needed PPP for customer dial-up access to the Internet, since IP messages cannot be transmitted over a modem line on their own, without message data link protocol. Two encapsulated parts of PPP, Point-to-Point Protocol over ATM (PPPoA) and, Point-to-Point Protocol over Ethernet (PPPoE) are used most generally by Internet Service Providers (ISPs) to connect a Digital Subscriber Line (DSL) Internet service connection with users.


 

1013_Point to point transmission.png

Posted Date: 8/20/2012 12:59:21 AM | Location : United States







Related Discussions:- Point to point transmission(ppp), Assignment Help, Ask Question on Point to point transmission(ppp), Get Answer, Expert's Help, Point to point transmission(ppp) Discussions

Write discussion on Point to point transmission(ppp)
Your posts are moderated
Related Questions
The Role of the Investigation The first phase, investigation is the most significant. What problem is the system being developed to solve? During investigation phase, objectives

In 10 or more pages, address the following topics (be sure to use diagrams as well as references). 1) Define broadband and baseband transmission technology. 2) Describe broadban

QUESTION: (a) Show the Negative Cycle Algorithm in Minimum Cost Flows. (b) List the steps added in finding a Negative Cycle. (c) Apply Dijkstra's algorithm on the subs

INTRODUCTION TO RISK MANAGEMENT Risk management is the procedure of identifying and controlling risks facing an organization. Risk management is the discipline which is employed

Suppose you are working for one of the leading credit reporting agencies that manages users' credit rating info with different financial institutions.  The company wishes to implem

INFORMATION CLASSIFICATION The classification of information is an important aspect of policy and a control for the information protection. A clean desk policy stipulates that a

Question : (a) "Pulse Code Modulation (PCM), as used in telephony, samples a signal at 8 kHz using 256 quantization levels". Outline how this scheme works with the help of ske

Elements of Cryptosystems Cryptosystems is characteristically made up of algorithms, data handling techniques, and procedures which are combined in multiple ways to ensure confi

You are free to design the format and structure of the routing table kept locally by each node and exchanged among neighboring nodes. 1. Upon the activation of the program, each

Question : a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a TCP segment. Give the source MAC address for the frame in hexadecimal; the source I