You are on page 1of 16

Point to Point Protocol

(PPP)
What is the difference between
point to point and peer to peer??

• Point to point is a protocol for communication between two


computers using a serial interface (phone).
• Peep to peer (P2P) is a communication model in which each
party has the same capabilities and either party can initiate a
communication session .
What is Point-to-Point
Protocol ?
• The Point-to-Point Protocol (PPP) provides a standard method
for transporting multi-protocol datagrams over point-to-point
links. PPP is comprised of three main components:
 A method for encapsulating multi-protocol datagrams.
 A Link Control Protocol (LCP) for establishing, configuring,
and testing the data-link connection.
 A family of Network Control Protocols (NCPs) for establishing
and configuring different network-layer protocols.
Cont’d
• It is most commonly used protocol used to connect home pc
to server of ISP by a model
• used to transmit multiprotocol data between two directly
connected (point-to-point) computers
• It is a byte - oriented protocol that is widely used in
broadband communications having heavy loads and high
speeds
Services Provided by PPP
The main services provided by Point - to - Point Protocol are
• Defining the frame format of the data to be transmitted.
• Defining the procedure of establishing link between two points and
exchange of data.
• Stating the method of encapsulation of network layer data in the
frame.
• Stating authentication rules of the communicating devices.
• Providing address for network communication.
• Providing connections over multiple links.
• Supporting a variety of network layer protocols by providing a range
of services.
PPP Frame
PPP is a byte - oriented protocol where each field of the frame is
composed of one or more bytes. The fields of a PPP frame are −
• Flag − 1 byte that marks the beginning and the end of the frame.
The bit pattern of the flag is 01111110.
• Address − 1 byte which is set to 11111111 in case of broadcast.
• Control − 1 byte set to a constant value of 11000000.
• Protocol − 1 or 2 bytes that define the type of data contained in the
payload field.
• Payload − This carries the data from the network layer. The
maximum length of the payload field is 1500 bytes. However, this
may be negotiated between the endpoints of communication.
• FCS − It is a 2 byte or 4 bytes frame check sequence for error
detection. The standard code used is CRC (cyclic redundancy code)
Code ID Length Message
PPP STACK
• PPP insists other protocol to establish link , authenticate users to
carry a network layer responsibility. The main functionalities of PPP
are—
• Packet encapsulation & framing on point to point link
• Link Setup.
• Authentication.
• Network control Assigning IP address & DNS services to client.
• It uses various protocol like Link control Protocol
(LCP),Authentication Protocol (AP),Network Control Protocol(NCP)
Encapsulation Component − It encapsulates the datagram so that it
can be transmitted over the specified physical layer.

Link Control Protocol (LCP) − It is responsible for establishing,


configuring, testing, maintaining and terminating links for
transmission. It also imparts negotiation for set up of options and use
of features by the two endpoints of the links.

Authentication Protocols (AP) − These protocols authenticate


endpoints for use of services. The two authentication protocols of PPP
are −
• Password Authentication Protocol (PAP)
• Challenge Handshake Authentication Protocol (CHAP)
Password Authentication Protocol (PAP)-
It sends username &
password to the remote computer for the authentication.

Authentication request :User name & Password

USER/CLIENT SERVER

ACK/NAK
Challenge Handshake Authentication Protocol (CHAP)-
It authenticates a user
or network host to an authenticating entity. That entity may be,
for example, an Internet service provider.

Challenge

Client/USER Response
Server

Success/Failure
• Network Control Protocols (NCPs) −
It is used for dynamic
assignment of an IP address to the client and assignment of the
primary and secondary DNS server . These protocols are used for
negotiating the parameters and facilities for the network layer. For
every higher-layer protocol supported by PPP, one NCP is there. Some
of the NCPs of PPP are −
 Internet Protocol Control Protocol (IPCP)
 OSI Network Layer Control Protocol (OSINLCP)
 Internetwork Packet Exchange Control Protocol (IPXCP)
 DECnet Phase IV Control Protocol (DNCP)
 NetBIOS Frames Control Protocol (NBFCP
 IPv6 Control Protocol (IPV6CP)
PPP Transition Phase
PPP connection generally goes through different phases that can be
seen in Transition Pase Diagram as shown below :
1 DEAD- In this phase, link basically starts and stops. Carrier
Detection is an event that is used to indicate that physical layer is
ready, and now the PPP will proceed towards establishment phase.

2 Establish- Link then proceeds towards this phase after the presence
of peer is being detected. When one of nodes starts communication,
then connection goes into this phase.

3 Authenticate- In PPP, authentication is optional. Peer


authentication can be requested by one or both of the end points. PPP
enters authentication phase if Password Authentication Protocol (PAP)
or Challenge-Handshake Authentication Protocol (CHAP) is configured.

4 Network- PP basically sends or transmits NCP packets to choose


and configure one or more network-layer protocols such as IP. In this
phase, Each of Network control protocols might be opened and
closed at any time and negotiation for these protocols also takes place.
At network layer, PPP also supports various protocols due to which PPP
specifies that two of nodes establish or develop a network layer
agreement before data is exchanged at network layer.

5 Open – Usually transferring of data takes place in this phase. Once


endpoints want to end the connection, connection is then transferred
to terminate phase, till then connection remains in this phase.

6 Terminate – Connection can be terminated at any point of time as


per the request of either of the endpoints. LCP is basically required to
close or terminate link through the exchange of terminate packets.

You might also like