The document outlines key concepts in Computer Networks, focusing on the Point-to-Point Protocol (PPP) and its components, including the Link Control Protocol (LCP) and Authentication Protocols. PPP is a data-link layer protocol that utilizes a stack of protocols for link establishment, authentication, and data transmission. It highlights the functions of LCP in link management and the importance of authentication in verifying user identities through PAP and CHAP protocols.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
21 views9 pages
PPP Stack
The document outlines key concepts in Computer Networks, focusing on the Point-to-Point Protocol (PPP) and its components, including the Link Control Protocol (LCP) and Authentication Protocols. PPP is a data-link layer protocol that utilizes a stack of protocols for link establishment, authentication, and data transmission. It highlights the functions of LCP in link management and the importance of authentication in verifying user identities through PAP and CHAP protocols.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 9
Course : BCA- Vth -Sem
Subject : Computer Network
Code : 503 Unit : 03 Objective: To be acquainted with: • PPP ( Point –to – Point ) • LCP ( Link Control Protocol ) • AP ( Authentication Protocols) • ISDN (Integrated Services Digital Network ) PPP Stack
PPP is a data-link layer protocol, PPP uses a stack of
other protocols to establish the link, to authenticate the parties involved, and to carry the network layer data.
Three sets of protocols are used by PPP: Link control
protocol, authentication protocols, and network control protocol. Protocol stack Link Control Protocol (LCP) It is responsible for establishing, maintaining, configuring, and terminating links. It also provides negotiation mechanisms to set options between endpoints. Both endpoints of the link must reach an agreement about the options before the link can be established. When PPP is carrying an LCP packet, it is either in the establishing state or in the terminating state. All LCP packets are carried in the data field of the PPP frame. LCP packet encapsulated in a frame Link Control Protocol (LCP) Code. This field defines the type of LCP packet. ID. This field holds a value used to match a request with reply. One endpoint inserts a value in this field, which will be copied in the reply packet. Length. This field defines the length of the entire LCP packet. Information. This field contains extra information needed for some LCP packets. Link Control Protocol (LCP) Configuration packets are used to negotiate the options between the two ends. There are four different types of packets for this purpose: configure-request, configure- ack, configure-nak, and configure-reject. Link termination packets. The link termination packets are used to disconnect the link between two endpoints. There are two types: terminate-request and terminate- ack. Link monitoring and debugging packets. These packets are used for monitoring and debugging the link. There are five types: code-reject, protocol-reject, echo- reply, discard-request. Authentication Protocols Authentication plays a very important role in PPP because PPP is designed for use over dial-up links where verification of user identity is necessary. Authentication means validating the identity of a user who needs to access a set of resources. PPP uses two protocols for authentication: Password Authentication Protocol (PAP) and Challenge Handshake Authentication Protocol (CHAP)