0% found this document useful (0 votes)
21 views9 pages

PPP Stack

The document outlines key concepts in Computer Networks, focusing on the Point-to-Point Protocol (PPP) and its components, including the Link Control Protocol (LCP) and Authentication Protocols. PPP is a data-link layer protocol that utilizes a stack of protocols for link establishment, authentication, and data transmission. It highlights the functions of LCP in link management and the importance of authentication in verifying user identities through PAP and CHAP protocols.

Uploaded by

g.singghhh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views9 pages

PPP Stack

The document outlines key concepts in Computer Networks, focusing on the Point-to-Point Protocol (PPP) and its components, including the Link Control Protocol (LCP) and Authentication Protocols. PPP is a data-link layer protocol that utilizes a stack of protocols for link establishment, authentication, and data transmission. It highlights the functions of LCP in link management and the importance of authentication in verifying user identities through PAP and CHAP protocols.

Uploaded by

g.singghhh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 9

Course : BCA- Vth -Sem

Subject : Computer Network


Code : 503
Unit : 03
Objective:
To be acquainted with:
• PPP ( Point –to – Point )
• LCP ( Link Control Protocol )
• AP ( Authentication Protocols)
• ISDN (Integrated Services Digital Network )
PPP Stack

 PPP is a data-link layer protocol, PPP uses a stack of


other protocols to establish the link, to authenticate the
parties involved, and to carry the network layer data.

 Three sets of protocols are used by PPP: Link control


protocol, authentication protocols, and network control
protocol.
Protocol stack
Link Control Protocol (LCP)
 It is responsible for establishing, maintaining,
configuring, and terminating links.
 It also provides negotiation mechanisms to set options
between endpoints. Both endpoints of the link must
reach an agreement about the options before the link
can be established.
 When PPP is carrying an LCP packet, it is either in the
establishing state or in the terminating state.
 All LCP packets are carried in the data field of the PPP
frame.
LCP packet encapsulated in a frame
Link Control Protocol (LCP)
 Code. This field defines the type of LCP packet.
 ID. This field holds a value used to match a request
with reply. One endpoint inserts a value in this field,
which will be copied in the reply packet.
 Length. This field defines the length of the entire LCP
packet.
 Information. This field contains extra information needed
for some LCP packets.
Link Control Protocol (LCP)
 Configuration packets are used to negotiate the options
between the two ends. There are four different types of
packets for this purpose: configure-request, configure-
ack, configure-nak, and configure-reject.
 Link termination packets. The link termination packets
are used to disconnect the link between two endpoints.
There are two types: terminate-request and terminate-
ack.
 Link monitoring and debugging packets. These packets
are used for monitoring and debugging the link. There
are five types: code-reject, protocol-reject, echo-
reply, discard-request.
Authentication Protocols
 Authentication plays a very important role in PPP
because PPP is designed for use over dial-up links
where verification of user identity is necessary.
 Authentication means validating the identity of a user
who needs to access a set of resources.
 PPP uses two protocols for authentication: Password
Authentication Protocol (PAP) and Challenge
Handshake Authentication Protocol (CHAP)

You might also like