0% found this document useful (0 votes)
36 views11 pages

Communication Network

The document discusses the Point-to-Point Protocol (PPP) stack. It has three main components: (1) the Link Control Protocol establishes and maintains the link, (2) Authentication Protocols like PAP and CHAP authenticate users, (3) the Network Control Protocol encapsulates network layer data for transmission.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views11 pages

Communication Network

The document discusses the Point-to-Point Protocol (PPP) stack. It has three main components: (1) the Link Control Protocol establishes and maintains the link, (2) Authentication Protocols like PAP and CHAP authenticate users, (3) the Network Control Protocol encapsulates network layer data for transmission.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 11

COMMUNICATION NETWORK

 PPP STACK
[POINT-TO-POINT PROTOCAL STACK]
POINT-TO-POINT PROTOCOL STACK

• PPP uses several other protocols to establish link, authenticate users and to
carry the network layer data.
• The various protocols used are:
• 1. Link Control Protocol
• 2. Authentication Protocol
• 3. Network Control Protocol
1. LINK CONTROL PROTOCOL

• It is responsible for establishing, maintaining, configuring and terminating


the link.
• •It provides negotiation mechanism to set options between two endpoints
• All LCP packets are carried in the data field of the PPP frame.
• The presence of a value C02116 in the protocol field of PPP frame indicates
that LCP packet is present in the data field.
• The various fields present in LCP packet are:
1. Code: 1 byte-specifies the type of LCP packet.
2. ID: 1 byte-holds a value used to match a request with the reply.
3. Length: 2 byte-specifies the length of entire LCPpacket.
4. Information: Contains extra information required for some LCPpacket.

• There are eleven different type of LCP packets.


These are categorized in three groups:
1. Configuration packet:
These are used to negotiate options between the two ends.
For example: configure-request, configure-ack, configure-nak, configure-reject are
some configuration packets.
2. Link termination packets: These are used to disconnect the link between two end
points. For example: terminate-request, terminate-ack, are some link termination
packets.
3. Link monitoring and debugging packets: These are used to monitor and debug the
links. For example: code-reject, protocol-reject, echo-request, echo-reply and discard-
request are some link monitoring and debugging packets.
2. AUTHENTICATION PROTOCOL:

• Authentication protocols help to validate the identity of a user who needs to


access the resources.
• There are two authentication protocols:
• 1. Password Authentication Protocols (PAP)
• 2. Challenge Handshake Authentication Protocol(CHAP)
1. PAP (Password Authentication Protocol):
• This protocol provides two step authentication procedures:
• Step 1: User name and password is provided by the user who wants to access a system.
• Step 2: The system checks the validity of user name and password and either accepts or denies
the connection.
• PAP packets are also carried in the data field of PPP frames.
• The presence of PAP packet is identified by the value C02316 in the protocol field of PPP
frame
• There are three PAP packets.
1. Authenticate-request: used to send user name &password.
2. Authenticate-ack: used by system to allow the access.
3. Authenticate-nak: used by system to deny the access.
2. CHAP (Challenge Handshake Authentication Protocol)
• It provides more security than PAP.
• In this method, password is kept secret, it is never sent on-line.
• It is a three-way handshaking authentication protocol:
1. System sends. a challenge packet to the user.This packet contains a value, usually a
few bytes.
2.Using a predefined function, a user combines this challenge value with the user
password and sends the resultant packet back to the system.
3. System then applies the same function to the password of the user and challenge
value and creates a result.
• If result is same as the result sent in the response packet, access is granted, otherwise,
it is denied.
There are 4 types of CHAP packets:
• 1. Challenge-used by system to send challenge value.
• 2. Response-used by the user to return the result of the calculation.
• 3. Success-used by system to allow access to the system.
• 4. Failure-used by the system to deny access to the system.
3. NETWORK CONTROL PROTOCOL (NCP)

After establishing the link and authenticating the user, PPP connects to the
network layer. This connection is established by NCP.
• Therefore NCP is a set of control protocols that allow the encapsulation of the
data coming from network layer.
• After the network layer configuration is done by one of the NCP protocols, the
users can exchange data from the network layer.
• PPP can carry a network layer data packet from protocols defined by the
Internet, DECNET, Apple Talk, Novell, OSI, Xerox and so on.
• None of the NCP packets carry networks layer data. They just configure the
link at the network layer for the incoming data.

You might also like