Preview

631 research paper

Powerful Essays
Open Document
Open Document
1926 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
631 research paper
PPTP (POINT TO POINT TUNNELING PROTOCOL)

BY:
ALEKHYA AVALDHAR
PRASANNA PANYALA
RAJEEVI MOTHE
RAMYA THULASI MUTHYALA
ECT 631 – LOCAL AREA NETWORKS
04/23/2014
Table of contents:

1. ABSTRACT……………………………………………………………………………3

2. HISTORY………………………………………………………………………………4

3. PROTOCOL DEFINITION…………………………………………………………..5

4. STRUCTURE AND MESSAGE FORMAT OF PROTOCOL……………………..6

5. SERVICES IT PROVIDES…………………………………………………………..8

6. WORKING…………………………………………………………………………...9

7. CONCLUSION………………………………………………………………………11

8. REFERENCES……………………………………………………………………….12

Abstract:
New developments in the field of remote connections are enlarging day by day for easy and fast recovery from disaster plus the effective cost. Our Research paper provides details on point-to-point tunneling protocol (PPTP). PPTP is used in remote connections and VPN connections. Organizations can use internet securely with PPTP and this type of connection is VPN. PPTP is very simple for implementation from end users perspective. PPTP needs basic encryption and so it is faster. PPTP supports multiprotocol communication. PPTP is very simple for implementation from end users perspective. It satisfies users from cost perspective along with technical satisfaction.
How does it comfort remote users to achieve their goal? Focuses on history of PPTP and how Microsoft implemented the protocol in Windows NT 4.0 Structure and message format of PPTP is detailed like PPTP as an extension of PPP is not similar to it. PPTP is the layer2 of OSI model. PPTP secures PPP through encryption and enclosing. PPTP server interfaces on internet and intranet. How PPTP is used as a protection device for data and is safe to transmit sensitive data in an encrypted format (Yates, 1997). Message format and types of messages. All the services which PPTP provides and its working style. Types of deployment in PPTP are discussed. PPTP supports client server model. Technical specification of PPTP is detailed in RFC 2637.
The goal



References: 3. Comparison of VPN Protocols . (n.d.). Comparison of VPN Protocols . Retrieved April 22, 2014, from http://teal.gmu.edu/courses/ECE543/project/reports_2001/arveal.pdf 4 5. PPTP, Point to Point Tunneling Protocol. (n.d.). PPTP, Point to Point Tunneling Protocol. Retrieved April 22, 2014, fromhttp://www.networksorcery.com/enp/protocol/pptp.htm 6 7. Troubleshooting VPNs | Copyright | InformIT. (n.d.). Troubleshooting VPNs | Copyright | InformIT. Retrieved April 22, 2014, from https://www.informit.com/library/content.aspx?b=Troubleshooting_VPNs&seqNum=26 8 10. Yates, C. (1997). Microsoft 's PPTP creates VPNs for free. PC Week, 14(40), 121.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    IT220 Lab 7

    • 303 Words
    • 2 Pages

    LAN to LAN tunnels, MPLS network and VPN site to site I would chose the MPLS network its more reliable.…

    • 303 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS3230 Lab 7 Multi-Factor Authentication Process Chris Wiginton ITT Technical Institute, Tampa FL Instructor: David Marquez 1 May 2014 Multi-Factor Authentication Process Area Authentication Process(es) Authentication Factors Authentication and Authorization LDAP /Kerberos Authentication, Token , Session Timeline Username , Password Token, Pin, Biometric Device Support Device should not be end of life and under support contract Vendor Supported Firewalls using Approved Product List (APL) Interoperability ISO and IEEE Standards for Encryption Multi-Vendor Interoperability based on AES, 3DES Standards, and SSL Encryption methods. Multiprotocol Support TCP, UDP, ESP, SSL ACL only allows trusted endpoints based on Port and Protocol Packet Encryption IKE - Internet Key Exchange VPN 2 Phase Negotiation based on Pre-Share Key, VPN Certificate Authentication.…

    • 155 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Save Question 10 (1 point) IPsec is used for ________ VPNs. Question 10 options: A) remote-access B) site-to-site C) Both remote-access and site-to-site D)…

    • 268 Words
    • 6 Pages
    Satisfactory Essays
  • Powerful Essays

    NT1210Unit3Lab3

    • 1288 Words
    • 4 Pages

    Exercise 3.3.3 The most common protocols used from this suite are IP, TCP, and UDP. Briefly describe the purpose and functions of each of these.…

    • 1288 Words
    • 4 Pages
    Powerful Essays
  • Best Essays

    Munasinghe, K. S. and Shahrestani, S.A.,“Analysis of Multiple Virtual Private Network Tunnels over Wireless LANs,” in Proceedings of the 3rdInternational Business Information Management Conference (IBIMA 2004), pp. 206-211, December 2004b.…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Powerful Essays

    It230 Unit 3 Assignment 1

    • 5629 Words
    • 23 Pages

    General assessment of the selected routing protocol identify its functionality and how an algorithm should be developed to the specific routing protocol.…

    • 5629 Words
    • 23 Pages
    Powerful Essays
  • Satisfactory Essays

    Lab 18

    • 490 Words
    • 3 Pages

    During the connection establishment process, the two computers involved in a VPN connection authenticate each other and select a VPN protocol.…

    • 490 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 8 Assignment 1

    • 166 Words
    • 1 Page

    Deploying Internet Protocol Security, or IPSec, with allow the VPN to establish a secure connection. It is regularly used in VPN configurations because it is flexible and can be modified to fit the company’s specific security needs.…

    • 166 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    A secure and efficient protocol is used, ECC elliptic curve cryptography a public key cryptography…

    • 470 Words
    • 2 Pages
    Good Essays
  • Good Essays

    ____ is an open-source protocol framework for security development within the TCP/IP family of protocol standards.…

    • 1195 Words
    • 17 Pages
    Good Essays
  • Satisfactory Essays

    Unit 6 Research Paper

    • 334 Words
    • 3 Pages

    2. Speculate on why a user would want to use a NAS. For example, what would be the…

    • 334 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Cis532 Assignment

    • 3352 Words
    • 14 Pages

    In 1970 the head of the Network Working Group, Steve Crocker and his team finished modifying original ARPANET host-to-host protocol and named it NCP (Network Control Protocol). This was possible because of IMP (Interface Message Processor) creation by Bob Kahn. IPM enabled computers to interact with other computers from other packet-switched networks (known today as a LAN – Local Area Network).…

    • 3352 Words
    • 14 Pages
    Satisfactory Essays
  • Powerful Essays

    5 Forces Model of Verizon

    • 1974 Words
    • 8 Pages

    “Verizon Communications Inc. (Verizon) is one of the world’s leading providers of communications services. Verizon’s wireline business, which includes the operations of the former MCI, provides telephone services, including voice, broadband data and video services, network access, nationwide long-distance and other communications products and services, and also owns and operates one of the most expansive end-to-end global Internet Protocol (IP) networks. Verizon’s domestic wireless business, operating as Verizon Wireless, provides wireless voice and data products and services across the United States using one of the most extensive and reliable wireless networks. Stressing diversity and commitment to the communities in which we operate, Verizon has a highly diverse workforce of approximately 242,000 employees.” (Verizon Communications 2006 Interactive Annual Report)…

    • 1974 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Network Final

    • 358 Words
    • 2 Pages

    All remote access clients will use L2TP Mobile VPN in order to access any resources at the company site. Any company owned laptops must access the internet through the VPN program in order to maintain integrity of data on external devices. This will allow any wireless device including smart…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    They are an attractive media because require no physical "wire" to be installed, can penetrate walls, provide connectivity to a mobile user, and can potentially carry a signal for long distances. The characteristics a radio channel depend significantly on the propagation environment and the distance over which a signal is to be carried. Environmental considerations determine path loss and shadow fading (which decrease in signal strength as it travels over a distance and around/through obstructing objects), multipath fading (due to signal reflection off of interfering objects), and interference (due to other radio channels or electromagnetic signals).…

    • 25392 Words
    • 102 Pages
    Good Essays