Point to Point Protocol Over Ethernet

An acronym for Point-to-Point Protocol over Ethernet, PPPoE allows multiple users to connect to a network using the same server. This connection can happen on a modem, router, or computer operating system. A PPPoE connection typically happens with an internet service provider (ISP), though individual users can also configure their computers with a PPPoE connection.

Point-to-Point Protocol (PPP) originated with dial-up internet connections (through phone lines). PPP network connections only allowed one computer to use the internet through a server. When households began using multiple devices on one network, PPPoE became important. PPP offered message encryption features, which PPPoE also has.

PPPoE is a two-step process for confirming an internet session. The first step is commonly known as the discovery stage, in which the Point-to-Point Protocol authorizes the user so that the ISP knows that they can have a legitimate connection. The user’s media access control (MAC) address in their network is verified. After the user is authorized, the second step - known as the session stage - begins. The user and internet now have a session ID, along with a few other fields that need to be filled with information about the session. This includes which Internet Protocol version (probably IPv4 or IPv6) the session will use.

Aside from allowing more than one device to connect to the Internet, PPPoE also provides encryption and authentication features, such as requiring an Internet user’s password to access the network.

Vangie Beal
Vangie Beal
Vangie Beal is a freelance business and technology writer covering Internet technologies and online business since the late '90s.

Related Articles

Human Resources Management System

A Human Resources Management System (HRMS) is a software application that supports many functions of a company's Human Resources department, including benefits administration, payroll,...

How To Defend Yourself Against Identity Theft

Almost every worldwide government agency responsible for identity theft issues will tell you the same thing: The first step to fighting identity theft is...

Infographic

An infographic is a visual representation of information or data. It combines the words information and graphic and includes a collection of imagery, charts,...

Phishing

What is phishing? Phishing is a type of cybercrime in which victims are contacted by email, telephone, or text message by an attacker posing as...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...