Transition phases - point to point , Computer Networking

Assignment Help:

Transition Phases

A PPP connection goes through phases  which can be  shown in a transition phase .

Dead: In  the dead phase  the link is not  being used. There is  no active  carrier at the  physical  layer and the  line is quiet.

Establish : When  one of the  nodes  starts the  communication the  connections goes into this  phase in this  phase  options are  negotiated between  the two  parties. If  the negotiation is successful the system goes to the authentication phase( if authentication  is required) r directly to the networking  phase. The link control protocols packets discussed shortly are used  for this  purpose. Several  packets  may be  exchanged  here.

Authenticate: The authentication phase  is  optional the two nodes may decide during  the establishment phase not to skip  this phase. However  if they  decide to proceed with  authentication they send several authentication packets  it goes  to the  termination phase.

Network : In  the network phase negotiation for the network  layer protocols   takes  place  PPP specifies that two  can be exchanged. The reason is that PPP supports  multiple protocols at  the network  layer. If a node  is running multiple protocols  simultaneously at the network layer the receiving  node  to know  which  protocols  will receive at the data.

Open: In the  phase data transfer  takes  place. When a  connection reaches this  phase  the exchange of data  packets  can be  started. The connection  remains in this  phase until  one of the  end points wants  to terminate the connection.

Terminate : In  the termination phase  the connection is terminated. Several packets are exchanged  between  the two  ends for house  cleaning and  closing  the link.


Related Discussions:- Transition phases - point to point

Data mining, The following DNA sequences are extracted from promoter region...

The following DNA sequences are extracted from promoter region of genes which are co-regulated by the same transcription factor (TF). The nucleotide segments capitalized in the giv

Dns spoofing - domain name server, DNS spoofing This process is genera...

DNS spoofing This process is generally refers to the process of responding a DNS request that was supposed to implement for another server. This can be in the case where the s

Financial services - fundamentals of networks , Financial Services Tod...

Financial Services Today   financial services are totally depended  on computer network. Application includes credit history searchers foreign exchange and  investment service

Define the tasks for which sns is used, Define the tasks for which SNS is u...

Define the tasks for which SNS is used SNA can be used for the following types of tasks: -  Terminal access to mainframe and midrange computer applications. -  File trans

How does a token-passing protocol works, How does a Token-Passing Protocol ...

How does a Token-Passing Protocol works? The token-passing protocol relies on a control signal known as the token. A token is a 24-bit packet that circulates throughout the net

Explain different network structures in use, Computer Networking 1. Exp...

Computer Networking 1. Explain different network structures in use. 2. Elaborate the architecture and usage of ISDN. 3. Discuss the concept of framing in Data Link Layer

Determine the connection to backbone lan, Connection to backbone LAN In...

Connection to backbone LAN In most cases, interconnection with stations on a wired backbone LAN is needed. For infrastructure wireless LANs, this is simply accomplished by the

What are super servers, These are fully-loaded machines which consists of m...

These are fully-loaded machines which consists of multiprocessors, high-speed disk arrays for interview I/O and fault tolerant features.

Show the application layer responsibilities, Q. Show the Application Layer ...

Q. Show the Application Layer Responsibilities? - Make possible user access to the network - User interfaces as well as support for services such as E-Mail File

Cycle of bridges, CYCLE OF BRIDGES:  A bridges network can join severa...

CYCLE OF BRIDGES:  A bridges network can join several segments. One bridge is useded to connect every segment to the rest of the bridge network. This is given in the figure be

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd