Point to Point Protocol Over Ethernet

An acronym for Point-to-Point Protocol over Ethernet, PPPoE allows multiple users to connect to a network using the same server. This connection can happen on a modem, router, or computer operating system. A PPPoE connection typically happens with an internet service provider (ISP), though individual users can also configure their computers with a PPPoE connection.

Point-to-Point Protocol (PPP) originated with dial-up internet connections (through phone lines). PPP network connections only allowed one computer to use the internet through a server. When households began using multiple devices on one network, PPPoE became important. PPP offered message encryption features, which PPPoE also has.

PPPoE is a two-step process for confirming an internet session. The first step is commonly known as the discovery stage, in which the Point-to-Point Protocol authorizes the user so that the ISP knows that they can have a legitimate connection. The user’s media access control (MAC) address in their network is verified. After the user is authorized, the second step - known as the session stage - begins. The user and internet now have a session ID, along with a few other fields that need to be filled with information about the session. This includes which Internet Protocol version (probably IPv4 or IPv6) the session will use.

Aside from allowing more than one device to connect to the Internet, PPPoE also provides encryption and authentication features, such as requiring an Internet user’s password to access the network.

Vangie Beal
Vangie Beal
Vangie Beal is a freelance business and technology writer covering Internet technologies and online business since the late '90s.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.

Related Articles

Virtual Private Network (VPN)

A virtual private network (VPN) encrypts a device's Internet access through a secure server. It is most frequently used for remote employees accessing a...

Gantt Chart

A Gantt chart is a type of bar chart that illustrates a project schedule and shows the dependency between tasks and the current schedule...

Input Sanitization

Input sanitization is a cybersecurity measure of checking, cleaning, and filtering data inputs from users, APIs, and web services of any unwanted characters and...

IT Asset Management Software

IT asset management software (ITAM software) is an application for organizing, recording, and tracking all of an organization s hardware and software assets throughout...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...