Transition phases - point to point , Computer Networking

Assignment Help:

Transition Phases

A PPP connection goes through phases  which can be  shown in a transition phase .

Dead: In  the dead phase  the link is not  being used. There is  no active  carrier at the  physical  layer and the  line is quiet.

Establish : When  one of the  nodes  starts the  communication the  connections goes into this  phase in this  phase  options are  negotiated between  the two  parties. If  the negotiation is successful the system goes to the authentication phase( if authentication  is required) r directly to the networking  phase. The link control protocols packets discussed shortly are used  for this  purpose. Several  packets  may be  exchanged  here.

Authenticate: The authentication phase  is  optional the two nodes may decide during  the establishment phase not to skip  this phase. However  if they  decide to proceed with  authentication they send several authentication packets  it goes  to the  termination phase.

Network : In  the network phase negotiation for the network  layer protocols   takes  place  PPP specifies that two  can be exchanged. The reason is that PPP supports  multiple protocols at  the network  layer. If a node  is running multiple protocols  simultaneously at the network layer the receiving  node  to know  which  protocols  will receive at the data.

Open: In the  phase data transfer  takes  place. When a  connection reaches this  phase  the exchange of data  packets  can be  started. The connection  remains in this  phase until  one of the  end points wants  to terminate the connection.

Terminate : In  the termination phase  the connection is terminated. Several packets are exchanged  between  the two  ends for house  cleaning and  closing  the link.


Related Discussions:- Transition phases - point to point

Example programmes for parallel systems-adding element, Example Programmes ...

Example Programmes for Parallel Systems Now we shall complete this with the examples on shared memory programming. Example 13: Adding elements of an array using two proce

State the steps to provide more computing power, State the Steps to provide...

State the Steps to provide more computing power In order to provide more computing power, the following steps may be taken: Add more processing power by addition of more

Explain the term data routing functions, Data Routing Functions The dat...

Data Routing Functions The data routing functions are functions that when executed set the path between source and destination. In dynamic interconnection networks there may be

What is session layer in osi model, Q. What is Session Layer in osi model? ...

Q. What is Session Layer in osi model? Session Layer : Allows two applications to establish, utilize and disconnect a connection  between them known as a session. Gives for na

Designing an internet work, 1. Introduction This document describes t...

1. Introduction This document describes the research-based assignment for this module. This assignment consists of two parts: A formal report And a presentatio

Wait protocol in parallel programming , Wait protocol The wait protoco...

Wait protocol The wait protocol is used for resolving the conflicts, which arise due to number of multiprocessors demanding the same resource. There are two types of wait prot

Synchronous tdm and statistical tdm, Difference between synchronous tdm and...

Difference between synchronous tdm and statistical tdm

Example on multiplicative decrease, Q. Example on Multiplicative Decrease? ...

Q. Example on Multiplicative Decrease? w = 1 for (each new ACK received) w = w+1 until (loss detected or w >= ssthresh) Not so slow - Exponential increase

Show the error correction by hamming code, Q. Show the Error Correction by ...

Q. Show the Error Correction by Hamming Code? Hamming Code is able to be applied to data units of any length and uses the relationship between data and redundancy bits For i

Subnet/address mask, To use a subnet or classless address, table under rout...

To use a subnet or classless address, table under routers and hosts that have address must keep two pieces of information with every address: the 32-bit address itself and another

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd