Point to point transmission(ppp), Computer Network Security

The Point-to-Point Protocol (PPP) is a data link protocol generally used in establishing a direct connection between two networking systems. It can give connection authentication, compression, and transmission encryption (having ECP, RFC 1968).

PPP is used over many kinds of physical networks adding serial cable, trunk line, phone line, cellular telephone, specialized radio fiber optic, and links such as SONET. PPP is also used over Internet access connections. Internet service providers (ISPs) have needed PPP for customer dial-up access to the Internet, since IP messages cannot be transmitted over a modem line on their own, without message data link protocol. Two encapsulated parts of PPP, Point-to-Point Protocol over ATM (PPPoA) and, Point-to-Point Protocol over Ethernet (PPPoE) are used most generally by Internet Service Providers (ISPs) to connect a Digital Subscriber Line (DSL) Internet service connection with users.


 

1013_Point to point transmission.png

Posted Date: 8/20/2012 12:59:21 AM | Location : United States







Related Discussions:- Point to point transmission(ppp), Assignment Help, Ask Question on Point to point transmission(ppp), Get Answer, Expert's Help, Point to point transmission(ppp) Discussions

Write discussion on Point to point transmission(ppp)
Your posts are moderated
Related Questions
how to encryt the data in plaintext cipher

every time i connect to WIFI the UC goes directly to 100% then i doesn''t want to come down. what shall i do ?

INFORMATION SECURITY POLICY PRACTICES AND STANDARDS Management from all the communities of interest should consider policies as basis for all information security efforts. Polic

Da t a compre s sion and the trans p ort s e rvices,   The main purpose of the transport layer is to provide services which are efficient, reliable and cost-effecti

Security Clearances For a security clearance in organizations each data user should be assigned a single level of authorization indicating classification level. Before approachi

UDP DATAGRAM FORMAT: It is given in the figure below:

Categories of Controls Controlling risk through mitigation, avoidance or transference is accomplished by implementing controls. There are 4 effective approaches to select the co

Short term Scheduler function , also shown as a dispatcher runs most frequently, and creates the finest-grained decision of which program could run next. This scheduler is called

(a) Cost allocation mechanisms are important when it comes to establishing other aspects of inter-firm compensations and how these are transferred to the users. There are two pri

QUESTION a) "Two of the key attributes of an enterprise network is that it have to be multi-platform and multisite." Decribe what you understand by this statement. b) A