100% authentic writing

Follow us on:

social
 
cube
 
chat off
Toll Free:
get your paper now
Get a free quote
Order your paper
Customer login
most popular order
with one order you receive 5 in 1
categories
Buying an Essay
College Life
Custom Research Paper
Essays for Sale
Good Advice
Purchase Term Paper
Research Paper Ideas
Using Writing Service
Writing an Essay
Writing Papers Guide
Writing Research Paper
Writing Term Paper
categories
Scientists Going too Far
Writing a Personal Statement
How Private School Prepares You for College
Celebrity Interviews You’ll Definitely Laugh At
Cooking Tastily, Easily and Quickly

Paypal

 
 
← Censorship of Video Games is IllegalTexan →
Live Chat

Custom PPP Authentication Protocol and Slip essay paper sample

Buy custom PPP Authentication Protocol and Slip essay paper cheap

Understanding the functionality of a network is important in setting up a network that will serve the needs of an organization. When making the decision as to the network system to adopt, it is important that one has an in depth understanding on the network mesh as well as a preview of other available network systems. Knowing the pros and the cons of a given network system and the best application arena for these systems gives the network administrator an edge in network management. In this essay, the learner starts by looking at the SLIP and the PPP network systems and their viability in interconnecting this organization. The decision on which network protocol to follow will be determined by the strength and other factors of the network system to be applied between Pittsburg office and Cleveland offices. Decision will also be based on the network’s ability to handle high traffic effectively while reducing traffic congestion.

Introduction

In the case study presented, interconnection between Pittsburg and Cleveland offices will require good network platform. This means that the decision made on the network authentication system to be used is not just based on financial favorability but also on its scalability among other factors.

According to Anderson (2001; Ghanea-Hercock, 2003, p. 146), networking can no longer be addressed in terms of just the technical aspect of it, but rather from an economics part of it. This means that proper networking takes into account challenges that might emanate from insider threats and external threats (Ghanea-Hercock, 2003, p. 146). This means that there is need to have security protocols set up within the network such that access to the network by anyone will require authentication. Altman (2003; Ghanea-Hercock, 2003, p. 147) notes that networks are set to enable resource sharing by agents. These agents are designed in such a way that they are capable of accessing the database using Link Access Procedure for Frame Relay (LAPF) and Lightweight Directory Access Protocol (LDAP).

SLIP

Serial Line Internet Protocol (SLIP) is termed as the predecessor for PPP for which it laid the foundation for the formation of PPP (Krikorian & Gershenfeld, 2004, p. 279). Krikorian and Gershenfeld (2004) continue to explain that in SLIP data is sent through the network via the input and output nodes in a serial manner (p. 279). SLIP is much simpler than PPP and network connection using this system is done manually (Romkey, 1998). Recent improvements on SLIP have ensured that transmission passes through the Frame Relay Access Device where IP packets are relayed from in addition to the original dial-up connection (Romkey, 1998) and (Mark, 1994). The IP addresses must be preconfigured since SLIP does not support dynamism (Romkey, 1998).

PPP

The Peer-to-Peer Protocol is one of the most widely used network protocol worldwide (Ghanea-Hercock, 2003, p. 146). PPP is more of a messaging system that mostly works on the end-to-end network connectivity especially in heterogeneous networks (Ghanea-Hercock, 2003). The mains reason for this is because PPP offers high level of scalability, resilience as well as robustness (Ghanea-Hercock, 2003, p. 146). PPP provides a platform for setting up better network nodes and access management without necessarily concentrating on dedicated lines for data delivery (Ghanea-Hercock, 2003, p. 147).

PPP links the input and output devices automatically at their various locations (Romkey, 1998). This happens through a Link Control Protocol that utilizes the Data Link Connection Identifier (DLCI) in the initial authentication process (Romkey, 1998).

When data from various users in Pittsburg and/ or Cleveland send the data into the network system, the configuration of their system in a star topology manner allows for better network management using the Local Management Interface (LMI), which configures the hub on which data is to be sent/ received first into the network. Unlike SLIP, PPP allows for data and access authentication as a security measure that is much needed in the organization (Romkey, 1998). This ensures proactive virus and intrusion detection, users’ network access and firewall management (Ghanea-Hercock, 2003, p. 146, 147). This is made possible by various authentication options provided in the PPP networks and can either be the Challenge-Handshake Protocol or the Password Authentication (Romkey, 1998).

All this may seem to be tasking but the management of the network system is best left to various software instead of investing in expensive hardware (Ghanea-Hercock, 2003, p. 147). A good example is use of Phobos which uses real-time network intelligence to monitor and authenticate users on the PPP network system (Ghanea-Hercock, 2003, p. 147).

PPP also offers support for multiple protocols as well as multiple function supports like link management to ensure link quality and link efficacy (Romkey, 1998).

Buy custom PPP Authentication Protocol and Slip essay paper cheap

Order Now
Orderhesitating

Related essays

  1. Texan
  2. Country Report of Pakistan
  3. Censorship of Video Games is Illegal
  4. The Use of Echolocation in Bottle Nose Dolphins
 
3.8K
1.2K
Email:
Password:
why we are
10+ years experience on
custom writing market
Satisfied returning customers
A wide range of services
3-hour delivery available
100% privacy guaranteed
Professional team of experienced paper writers
Only custom-written papers
Free revision within 2 days
Constant access to your paper writer
Free cover and reference page
essays stat
7 chat / phone operators online at the moment
752 writers active
18454 writers in the database
2 new writers passed exam this week
6854 pages written
2142446 words written
8.5 out of 10 current average quality score
Satisfied customers: 97%
discountscustomer support via live chat, email, phone
Type of assignment:
Urgency:
Writer level:
Cost per page: ...
Number of pages:
Total without discount: $12.99

15% off your first custom essay order. Order now

PRICES
from $12.99/PAGE
X