Point to point transmission(ppp), Computer Network Security

The Point-to-Point Protocol (PPP) is a data link protocol generally used in establishing a direct connection between two networking systems. It can give connection authentication, compression, and transmission encryption (having ECP, RFC 1968).

PPP is used over many kinds of physical networks adding serial cable, trunk line, phone line, cellular telephone, specialized radio fiber optic, and links such as SONET. PPP is also used over Internet access connections. Internet service providers (ISPs) have needed PPP for customer dial-up access to the Internet, since IP messages cannot be transmitted over a modem line on their own, without message data link protocol. Two encapsulated parts of PPP, Point-to-Point Protocol over ATM (PPPoA) and, Point-to-Point Protocol over Ethernet (PPPoE) are used most generally by Internet Service Providers (ISPs) to connect a Digital Subscriber Line (DSL) Internet service connection with users.


1013_Point to point transmission.png

Posted Date: 8/20/2012 12:59:21 AM | Location : United States

Related Discussions:- Point to point transmission(ppp), Assignment Help, Ask Question on Point to point transmission(ppp), Get Answer, Expert's Help, Point to point transmission(ppp) Discussions

Write discussion on Point to point transmission(ppp)
Your posts are moderated
Related Questions
Designing and coding of Job search mechanism: Project Title: FREEHIVE (Sep 2005- Nov 2006) Role             : Developer Domain         : Social Network Client

Question An organization is planning to connect its networks to the Internet. The network is located within a four story building. A web server supporting online sales is also

Question: (a) What is the minimum length of a password that could be considered to be "strong" in the context of today's computing power? (b) The security of a PIN system,

Describe what the FTAM services are. FTAM  stand for the File Transfer Access and Management: FTAM is an ISO application protocol which performs the operations on files such as.

(a) Figure is a representation of a TCP header. For each of the fields lettered from A to G, state the name of the field and provide a brief explanation for the function of each fi

(a) Draw the waveform for an asynchronous transmission with the given specifications: 8 data bits with value 11010001 (LSB listed first here), one parity bit (even), one star

Question 1:  Describe the functioning of cloud computing. Question 2: Discuss on "Platform as a Service". Question 3: Discuss the steps involved in effective co

Question: (a) Consider that you enter the given URL in the address bar of a popular web client and that both the client and server accepts HTTP version 1.1. i. What can be t

Problem a) Consider a 1000 Mbps Ethernet with a single Store-N-Forward switch mid-way in the path between two nodes A and B. Assume that there are no other nodes on the network

Q. Secure routing Protocols for Wireless Sensor Networks? A secure routing information protocol enables effective implementation of authentication and integrity checking defens