In [14] the author presented a design
of a communication security system that depends on
securing computers communication based on layer
two security mechanism and in [15] a system to
securing computer networks communication using
(MAC) address based security mechanism was
discussed. In those researches, the presented security
mechanisms were built on layer two, Point-to-Point
Protocol (PPP).