Point to point transmission(ppp), Computer Network Security

The Point-to-Point Protocol (PPP) is a data link protocol generally used in establishing a direct connection between two networking systems. It can give connection authentication, compression, and transmission encryption (having ECP, RFC 1968).

PPP is used over many kinds of physical networks adding serial cable, trunk line, phone line, cellular telephone, specialized radio fiber optic, and links such as SONET. PPP is also used over Internet access connections. Internet service providers (ISPs) have needed PPP for customer dial-up access to the Internet, since IP messages cannot be transmitted over a modem line on their own, without message data link protocol. Two encapsulated parts of PPP, Point-to-Point Protocol over ATM (PPPoA) and, Point-to-Point Protocol over Ethernet (PPPoE) are used most generally by Internet Service Providers (ISPs) to connect a Digital Subscriber Line (DSL) Internet service connection with users.


1013_Point to point transmission.png

Posted Date: 8/20/2012 12:59:21 AM | Location : United States

Related Discussions:- Point to point transmission(ppp), Assignment Help, Ask Question on Point to point transmission(ppp), Get Answer, Expert's Help, Point to point transmission(ppp) Discussions

Write discussion on Point to point transmission(ppp)
Your posts are moderated
Related Questions
Guided Media These are those that give a conduit from one machine to another that add twisted-pair, fiber-optic cable and coaxial cable. A signal traveling along any of these

a. PKI and PGP are two methods for generating and managing public keys for use in protocols such as secure email. Compare and contrast the trust models for public keys used in PKI

Wireless Networks The origin of wireless networks and their ubiquity in the technological environment poses a new type of exposure and vulnerability for network security. Cont

QUESTION (In this question, you will need to use the ISO 27001:2005 and ISO 27002:2005 standards) For each of the situations below, comment on the following: 1. Mention

Social Network development in Java: Project Title: SUGGESTLOCAL (Nov 2006-April 2007) Role             : Developer Domain        : Social Network Client          :

CARRIER  SENSE MULTIPLE ACCESS (CSMA) There is no central access management when computers transfer on Ethernet. For this solution the Ethernet employs CSMA to coordinate tran

Question: (a) A string of ciphertext was enciphered using an a±ne transformation of single letters in a 28-letter alphabet consisting of A to Z, a blank and a?, where A to Z ha

A  full-duplex (FDX) , accepts communication in both ways, and, unlike half-duplex, accept this to occur simultaneously. Land-line telephone networks are full-duplex, since they

QUESTION Testing of a Business Continuity Plan (BCP) does not need to be costly or to interrupt the daily operations of the business. The result of the test should also be look

In this work a network intrusion system (package) must implement based on high interaction honeypots. There are two honeypots with different platforms (ubuntu and windows server 20