Transition phases - point to point , Computer Networking

Assignment Help:

Transition Phases

A PPP connection goes through phases  which can be  shown in a transition phase .

Dead: In  the dead phase  the link is not  being used. There is  no active  carrier at the  physical  layer and the  line is quiet.

Establish : When  one of the  nodes  starts the  communication the  connections goes into this  phase in this  phase  options are  negotiated between  the two  parties. If  the negotiation is successful the system goes to the authentication phase( if authentication  is required) r directly to the networking  phase. The link control protocols packets discussed shortly are used  for this  purpose. Several  packets  may be  exchanged  here.

Authenticate: The authentication phase  is  optional the two nodes may decide during  the establishment phase not to skip  this phase. However  if they  decide to proceed with  authentication they send several authentication packets  it goes  to the  termination phase.

Network : In  the network phase negotiation for the network  layer protocols   takes  place  PPP specifies that two  can be exchanged. The reason is that PPP supports  multiple protocols at  the network  layer. If a node  is running multiple protocols  simultaneously at the network layer the receiving  node  to know  which  protocols  will receive at the data.

Open: In the  phase data transfer  takes  place. When a  connection reaches this  phase  the exchange of data  packets  can be  started. The connection  remains in this  phase until  one of the  end points wants  to terminate the connection.

Terminate : In  the termination phase  the connection is terminated. Several packets are exchanged  between  the two  ends for house  cleaning and  closing  the link.


Related Discussions:- Transition phases - point to point

Single mode for transmitting optical signals, Q. Single Mode for transmitti...

Q. Single Mode for transmitting optical signals? - Merely one beam from a light source is transmitted using a smaller range of angles - Smaller diameter as well as lower de

Advantage of ip sec tunnelling mode, Advantage of IP sec  Tunnelling Mode ...

Advantage of IP sec  Tunnelling Mode IP Sec  tunnelling mode  has the  following  advantages: a.Security : Ts IP sec tunnelling mode  secure somewhat but  not the best. In a

Explain the working of ISDN, Explain the working of ISDN Stands for ...

Explain the working of ISDN Stands for Integrated Services Digital Network. It is a way to move more data over existing regular phone lines. ISDN is rapidly becoming availab

Configure vtp on the switches - ccna, Configure VTP on the Switches VTP...

Configure VTP on the Switches VTP permits the network administrator to control the instances of VLANs on the network by creating VTP domains. Within each VTP domain, one or mor

Disadvantages of ip sec tunnelling mode, Disadvantages of IP sec  Tunnelli...

Disadvantages of IP sec  Tunnelling mode IP sec  tunnelling  mode has the  following  disadvantage a.Encryption of  small  packets  generates a lot  networks  over head  thu

Explain about switching networks, Question 1: a. Differentiate between ...

Question 1: a. Differentiate between the several types of switching networks together with illustration. b. With the help of a diagram explain the two modes of operation un

Describe the count-to-infinity problem in distance vector, Describe the cou...

Describe the count-to-infinity problem in distance vector

Wait protocol in parallel programming , Wait protocol The wait protoco...

Wait protocol The wait protocol is used for resolving the conflicts, which arise due to number of multiprocessors demanding the same resource. There are two types of wait prot

Discuss an example of threats in computer software, Discuss an example of t...

Discuss an example of threats in computer software Assume only one attack out of the above list i.e., the virus attack. Though the present anti-virus software solutions can det

Calculate link utilisation - exchanging packets, a)  Assume that the time r...

a)  Assume that the time required to transmit one packet (i.e. the packet length divided by link data rate) is 10ms and the Round Trip Time (from Source to Destination and back) is

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd