631 research paper

Topics: Virtual private network, Microsoft Windows, Operating system Pages: 12 (1926 words) Published: April 21, 2015

PPTP (POINT TO POINT TUNNELING PROTOCOL)

BY:
ALEKHYA AVALDHAR
PRASANNA PANYALA
RAJEEVI MOTHE
RAMYA THULASI MUTHYALA
ECT 631 – LOCAL AREA NETWORKS
04/23/2014
Table of contents:

1. ABSTRACT……………………………………………………………………………3

2. HISTORY………………………………………………………………………………4

3. PROTOCOL DEFINITION…………………………………………………………..5

4. STRUCTURE AND MESSAGE FORMAT OF PROTOCOL……………………..6

5. SERVICES IT PROVIDES…………………………………………………………..8

6. WORKING…………………………………………………………………………...9

7. CONCLUSION………………………………………………………………………11

8. REFERENCES……………………………………………………………………….12

Abstract:
New developments in the field of remote connections are enlarging day by day for easy and fast recovery from disaster plus the effective cost. Our Research paper provides details on point-to-point tunneling protocol (PPTP). PPTP is used in remote connections and VPN connections. Organizations can use internet securely with PPTP and this type of connection is VPN. PPTP is very simple for implementation from end users perspective. PPTP needs basic encryption and so it is faster. PPTP supports multiprotocol communication. PPTP is very simple for implementation from end users perspective. It satisfies users from cost perspective along with technical satisfaction. How does it comfort remote users to achieve their goal? Focuses on history of PPTP and how Microsoft implemented the protocol in Windows NT 4.0 Structure and message format of PPTP is detailed like PPTP as an extension of PPP is not similar to it. PPTP is the layer2 of OSI model. PPTP secures PPP through encryption and enclosing. PPTP server interfaces on internet and intranet. How PPTP is used as a protection device for data and is safe to transmit sensitive data in an encrypted format (Yates, 1997). Message format and types of messages. All the services which PPTP provides and its working style. Types of deployment in PPTP are discussed. PPTP supports client server model. Technical specification of PPTP is detailed in RFC 2637. The goal of this paper is to detail all the important aspects of PPTP including history, structure, working and services provided by PPTP.

History:
PPTP protocol came into existence through Microsoft organization (Coffee, 2003). PPTP protocol was inserted in Windows NT 4.0 and now it is available in Windows95. In the protocol stack of data link layer there is a window IT which encapsulated the IP packets which are previously encrypted IP packets. These encrypted packets are in Point-to-Point Protocol. The resultant IP packets which are encrypted and encapsulated are again encapsulated by ISP server and now output is routed to the destination. The last mentioned process in which encapsulating IP packets of other protocols and is sent for destination is called tunneling. In order for PPTP protocol to be implemented Microsoft uses the entire password which is clear, passwords which are hashed and CHAP for authentication. Data encryption length varies from 40 or 128 bit in Microsoft Point-to-Point Encryption. PPTP protocol is used in remote access due to increase in demand. PPTP protocol is widely used in large numbers. For machines with operating system windows, PPTP protocol is zero cost (Coffee, 2003). Mostly used for secure intranets. Initially after dialing a local ISP then build a PPP session to connect for remote access. Now the other dial-up session is originated with a destination specified by an IP address. IP address through which connection established is the address of PPTP server in your organization. Now the data which is moving in the connection will be encrypted.

Protocol Definition:
Point-to-Point Tunneling Protocol (PPTP) is a network protocol that enables the secure transfer of data from a remote client to a private enterprise server by creating a virtual private network (VPN) across TCP/IP-based data networks, usually using an ISP. The PPTP supports on-demand multi-protocol and virtual private...

References: 3. Comparison of VPN Protocols . (n.d.). Comparison of VPN Protocols . Retrieved April 22, 2014, from http://teal.gmu.edu/courses/ECE543/project/reports_2001/arveal.pdf
4
5. PPTP, Point to Point Tunneling Protocol. (n.d.). PPTP, Point to Point Tunneling Protocol. Retrieved April 22, 2014, fromhttp://www.networksorcery.com/enp/protocol/pptp.htm
6
7. Troubleshooting VPNs | Copyright | InformIT. (n.d.). Troubleshooting VPNs | Copyright | InformIT. Retrieved April 22, 2014, from https://www.informit.com/library/content.aspx?b=Troubleshooting_VPNs&seqNum=26
8
10. Yates, C. (1997). Microsoft 's PPTP creates VPNs for free. PC Week, 14(40), 121.
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Research paper
  • Research Paper
  • Research Paper
  • Research Paper
  • Research Paper
  • Research Paper
  • Research Paper
  • QOS Research Paper

Become a StudyMode Member

Sign Up - It's Free