Transition phases - point to point , Computer Networking

Assignment Help:

Transition Phases

A PPP connection goes through phases  which can be  shown in a transition phase .

Dead: In  the dead phase  the link is not  being used. There is  no active  carrier at the  physical  layer and the  line is quiet.

Establish : When  one of the  nodes  starts the  communication the  connections goes into this  phase in this  phase  options are  negotiated between  the two  parties. If  the negotiation is successful the system goes to the authentication phase( if authentication  is required) r directly to the networking  phase. The link control protocols packets discussed shortly are used  for this  purpose. Several  packets  may be  exchanged  here.

Authenticate: The authentication phase  is  optional the two nodes may decide during  the establishment phase not to skip  this phase. However  if they  decide to proceed with  authentication they send several authentication packets  it goes  to the  termination phase.

Network : In  the network phase negotiation for the network  layer protocols   takes  place  PPP specifies that two  can be exchanged. The reason is that PPP supports  multiple protocols at  the network  layer. If a node  is running multiple protocols  simultaneously at the network layer the receiving  node  to know  which  protocols  will receive at the data.

Open: In the  phase data transfer  takes  place. When a  connection reaches this  phase  the exchange of data  packets  can be  started. The connection  remains in this  phase until  one of the  end points wants  to terminate the connection.

Terminate : In  the termination phase  the connection is terminated. Several packets are exchanged  between  the two  ends for house  cleaning and  closing  the link.


Related Discussions:- Transition phases - point to point

Disk encryption and block cipher, Suppose AES (or any block cipher) is used...

Suppose AES (or any block cipher) is used to encrypt data. Which mode of encryption covered in class is best suited for each of the following two scenarios and why? If more than on

Types of Networking, How can I identify the difference types of networks

How can I identify the difference types of networks

Process of skype is a web-based service, Skype is a web-based service which...

Skype is a web-based service which offers cheap and free phone calls. Explain step by step (in terms of networking technology) what really happens from the point when you initiate

Networking, can we correct errors using crc?

can we correct errors using crc?

Data bandwidth requirements, Calculate data bandwidth requirements from and...

Calculate data bandwidth requirements from and to each site.

Ppp authentication chap pap secret, As the system administrator, you type "...

As the system administrator, you type "ppp authentication chap pap secret". Name the authentication method is used first in setting up a session? Ans)  the authentication method

Explain about the integrating intranet, Explain about the Integrating Intra...

Explain about the Integrating Intranet These Intranets are designed to replace the complexity of in-house communications and processing systems that large organisations ofte

Briefly describe nat and rip, Briefly describe NAT and RIP NAT is Netwo...

Briefly describe NAT and RIP NAT is Network Address Translation. This is a protocol that gives a way for multiple computers on a common network to share one connection to the I

Define ike modes, Normal 0 false false false EN-IN X-...

Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4

Describe the method of one way redistribution and mutual, Define  the conce...

Define  the concept of one way redistribution and mutual

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd