Transition phases - point to point , Computer Networking

Assignment Help:

Transition Phases

A PPP connection goes through phases  which can be  shown in a transition phase .

Dead: In  the dead phase  the link is not  being used. There is  no active  carrier at the  physical  layer and the  line is quiet.

Establish : When  one of the  nodes  starts the  communication the  connections goes into this  phase in this  phase  options are  negotiated between  the two  parties. If  the negotiation is successful the system goes to the authentication phase( if authentication  is required) r directly to the networking  phase. The link control protocols packets discussed shortly are used  for this  purpose. Several  packets  may be  exchanged  here.

Authenticate: The authentication phase  is  optional the two nodes may decide during  the establishment phase not to skip  this phase. However  if they  decide to proceed with  authentication they send several authentication packets  it goes  to the  termination phase.

Network : In  the network phase negotiation for the network  layer protocols   takes  place  PPP specifies that two  can be exchanged. The reason is that PPP supports  multiple protocols at  the network  layer. If a node  is running multiple protocols  simultaneously at the network layer the receiving  node  to know  which  protocols  will receive at the data.

Open: In the  phase data transfer  takes  place. When a  connection reaches this  phase  the exchange of data  packets  can be  started. The connection  remains in this  phase until  one of the  end points wants  to terminate the connection.

Terminate : In  the termination phase  the connection is terminated. Several packets are exchanged  between  the two  ends for house  cleaning and  closing  the link.


Related Discussions:- Transition phases - point to point

What is a file server, What is a File server? File servers are helpful ...

What is a File server? File servers are helpful for sharing files across a network. With a file server, the client passes requests for file records over system to file server.

What is difference among rip and ripv2, RIP It is Broadcast There i...

RIP It is Broadcast There is no authentication It Support FLSM   RIPV2 It is Multicast There is Authentication It Support VLSM

Type of failures and bathtub curve, AILURES AND BATHTUB CURVE The life ...

AILURES AND BATHTUB CURVE The life of a component system can be grouped into three different phases typical curve depicting these three is called the bathtub curve due to its s

Explain the process of piggybacking, Q. Explain the process of piggybacking...

Q. Explain the process of piggybacking? When a data frame arrives in its place of immediately sending a separate control frame and the receiver restrains itself and waits until

Root, Originally Linux/UNIX systems had one all-powerful user called root t...

Originally Linux/UNIX systems had one all-powerful user called root that managed systems. Discuss the risks of having a single root user and how more limited management abilities c

Sap is used by the cisco ios for which encapsulation types, "SAP" is used b...

"SAP" is used by the Cisco IOS for which encapsulation types? Ans) Three types:- Ethernet_802.2 Token-Ring FDDI_802.2

elementary logic gate circuit, Question Which elementary logic gate is...

Question Which elementary logic gate is equivalent to this circuit? Show your working.

What is meant by asymmetrical protocols, There is a many-to-one relationshi...

There is a many-to-one relationship among clients and server. Clients always start the dialog by requesting a service. Servers are passively awaiting for requests from clients.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd