Authentication in ppp - point to point , Computer Networking

Assignment Help:

Authentication in PPP

PPP can support  authentication operations at the  beginning of a connection. In some  cases reauthentication is also  possible  during  a session.  Endpoints negotiate authentication in the same manner as other options. Authentication is pee r to peer again without  distinction between calling and called parties. This allows either or both endpoints to request authentication credentials from each other. In fact the protocols  for passing  credentials may be differently  may be different for each endpoint. The default is no authentication required. However you can  configure you PPP  software to require it.

The authenticating state  of a PPP connection follows  the establishing  state if either  endpoint agrees tousle an authentication protocols. Otherwise  the connection  transitions immediately  to eh network  state skipping authentication steps altogether. The two common  authentication protocols authentication protocols are:

a.The password authentication protocols (PAP)

b.The challenge  handshake authentication protocols ( CHAP)

These  protocols  have  assigned  numbers and are arguments to the authentication protocols  options  PPP endpoints  include in LCP configure packets. As usual if one PPP endpoint requests  its peer to authenticate itself with a protocols  the peer doesn't understand the  peer  rejects it in an LCP  configure nak response. This endpoint may  propose another  protocols  its peer understand  or terminate the connection.

Each  authentication protocols  has well defined  procedures regarding the messages that endpoint must  send and receive during the authenticating state.  Besides PSP  and CHAP there are  other extensible authentication protocols  in development  and there exists several proprietary protocols  as well.


Related Discussions:- Authentication in ppp - point to point

What is ping utility, PING - Packet Internet Gopher A utility that shows...

PING - Packet Internet Gopher A utility that shows connections to one or more remote hosts. The ping command uses the ICMP echo request and echo reply packets to verify whether

List some most useful advantages of token ring, List some most useful advan...

List some most useful advantages of Token Ring. Here are Token ring's most useful advantages: a. It depends excellent throughput under high-load conditions. b. Token Ring

Explain about multiplicative decrease, Q. Explain about Multiplicative Decr...

Q. Explain about Multiplicative Decrease ? Multiplicative Decrease (MD) if a time-out take places the threshold is set to one maximum segment size (TCP Tahoe, TCP Reno).

What is network layer of osi model, Q. What is network layer of osi model? ...

Q. What is network layer of osi model? - Describe end-to-end delivery of packets. - Defines logical addressing thus that any endpoint can be identified. - Defines how ro

Explain the OSI Model Facts, OSI Model Facts The OSI model classifies a...

OSI Model Facts The OSI model classifies and organizes the methods that hosts perform to maintain data for transport across the network. You should be familiar with the OSI m

Urgent pointer - transport layer, Urgent Pointer This 16 bite whic...

Urgent Pointer This 16 bite which is valid  only f the urgent  flag is set is used  when the segment  contains  urgent data. If  defines  the number  that must be  added  t

What are general middleware, It consists of the communication stacks, distr...

It consists of the communication stacks, distributed directories, authentication services, network time, RPC, Queuing services along with the network OS extensions like the distrib

Explain concept of permutation network, Concept Of Permutation Network ...

Concept Of Permutation Network In permutation interconnection networks the information transfer necessitates data transfer from input set of nodes to output set of nodes and po

Local loop portion of the service starts, What is the juncture at which the...

What is the juncture at which the CPE ends and the local loop portion of the service starts?  Ans) The demarcation or demarc is the juncture at which the CPE ends and the local

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd