SlideShare a Scribd company logo
2
Most read
3
Most read
5
Most read
POINT-TO-POINT PROTOCOL
(PPP)
Dr.T>Abirami,Associate Professor,IT,Kongu Engineering
College,Perundurai
Introduction to PPP
•It is a communication protocol of the data link layer
•It is used to transmit multiprotocol data between two
directly connected (point-to-point) computers.
•It is a byte - oriented protocol that is widely used in
broadband communications having heavy loads and
high speeds.
•it is a data link layer protocol, data is transmitted in
frames.
•It is also known as RFC 1661.
Dr.T>Abirami,Associate Professor,IT,Kongu Engineering
College,Perundurai
Services Provided by PPP
• Defining the frame format of the data to be transmitted.
• Defining the procedure of establishing link between two points and
exchange of data.
• Stating the method of encapsulation of network layer data in the
frame.
• Stating authentication rules of the communicating devices.
• Providing address for network communication.
• Providing connections over multiple links.
• Supporting a variety of network layer protocols by providing a range
of services.
feature of PPP is that it provides network address configuration.
Dr.T>Abirami,Associate Professor,IT,Kongu Engineering
College,Perundurai
Services Not Provided by PPP
• does not provide flow control
• Lack of error control and sequence numbering
• does not provide a sophisticated addressing mechanism
Dr.T>Abirami,Associate Professor,IT,Kongu Engineering
College,Perundurai
Framing
• Flag. A PPP frame starts and ends with a 1-byte flag with the bit pattern 01111110.
• Address. The address field in this protocol is a constant value and set to 11111111
(broadcast address).
• Control. This field is set to the constant value 00000011
• Protocol. defines what is being carried in the data field: either user data or other
information.
• Payload field . user data : maximum of 1500 bytes
• FCS. The frame check sequence (FCS) is simply a 2-byte or 4-byte standard CRC.
Dr.T>Abirami,Associate Professor,IT,Kongu Engineering
College,Perundurai
Byte Stuffing
• PPP is a byte-oriented protocol, the flag in PPP is a byte that needs to
be escaped whenever it appears in the data section of the frame.
• The escape byte is 01111101
Dr.T>Abirami,Associate Professor,IT,Kongu Engineering
College,Perundurai
Transition Phases
Dr.T>Abirami,Associate Professor,IT,Kongu Engineering
College,Perundurai
Multiplexing
• PPP is a link-layer protocol
• Three sets of protocols are defined to make PPP powerful:
1. the Link Control Protocol (LCP),
2. Two Authentication Protocols (APs), and
3. several Network Control Protocols (NCPs).
Multiplexing is the technology that is able to combine multiple
communication signals together in order for them to traverse
an otherwise single signal communication medium
simultaneously
Dr.T>Abirami,Associate Professor,IT,Kongu Engineering
College,Perundurai
Link Control Protocol
• is responsible for establishing, maintaining, configuring, and terminating
links.
• It provides negotiation mechanisms to set options between the two
endpoints. Both endpoints of the link must reach an agreement about the
options before the link can be established.
Dr.T>Abirami,Associate Professor,IT,Kongu Engineering
College,Perundurai
Dr.T>Abirami,Associate Professor,IT,Kongu Engineering
College,Perundurai
Authentication Protocols
• It means validating the identity of a user who needs to access a set of
resources.
• PPP has created two protocols for authentication:
1. Password Authentication Protocol and
2. Challenge Handshake Authentication Protocol.
Dr.T>Abirami,Associate Professor,IT,Kongu Engineering
College,Perundurai
Password Authentication Protocol (PAP)
• A. The user who wants to access a system sends an authentication
identification (usually the user name) and a password.
• b. The system checks the validity of the identification and password
and either accepts or denies connection.
Dr.T>Abirami,Associate Professor,IT,Kongu Engineering
College,Perundurai
Challenge Handshake Authentication Protocol
(CHAP)
• It is a three-way handshaking authentication protocol that provides greater
security than PAP.
In this method, the password is kept secret; it is never sent online.
a. The system sends the user a challenge packet containing a challenge value,
usually a few bytes.
b. The user applies a predefined function that takes the challenge value and the
user’s own password and creates a result. The user sends the result in the
response packet to the system.
c. The system does the same. It applies the same function to the password of the
user (known to the system) and the challenge value to create a result. If the
Dr.T>Abirami,Associate Professor,IT,Kongu Engineering
College,Perundurai
Dr.T>Abirami,Associate Professor,IT,Kongu Engineering
College,Perundurai
Dr.T>Abirami,Associate Professor,IT,Kongu Engineering
College,Perundurai
Network Control Protocols
• PPP is a multiple-network-layer protocol.
• It can carry a network-layer data packet from protocols defined by the
Internet, OSI, Xerox, DECnet, AppleTalk, Novel
For example,
• IPCP (Internet Protocol Control Protocol) - configures the link for
carrying IP data packets.
• Xerox CP does the same for the Xerox protocol data packets
Dr.T>Abirami,Associate Professor,IT,Kongu Engineering
College,Perundurai
Network Control Protocols :Internet Protocol
Control Protocol (IPCP)
Dr.T>Abirami,Associate Professor,IT,Kongu Engineering
College,Perundurai
Multilink PPP
• logical PPP frame is divided into several actual PPP frames.
• A segment of the logical frame is carried in the payload of an actual
PPP frame
In networking, one piece of a data packet that has been broken into smaller pieces in order
to accommodate the maximum transmission unit (MTU) size of a network.
Dr.T>Abirami,Associate Professor,IT,Kongu Engineering
College,Perundurai
network layer packet as it is
transmitted through a
PPP connection. Figure
11.29 shows the steps
Dr.T>Abirami,Associate Professor,IT,Kongu Engineering
College,Perundurai

More Related Content

PPTX
Point To Point Protocol
PPTX
HDLC(High level Data Link Control)
PPT
Flow & Error Control
PPT
Forouzan _ Multiple access protocols.ppt
PPT
Framming data link layer
PPT
Data link control
PPTX
Internetworking
Point To Point Protocol
HDLC(High level Data Link Control)
Flow & Error Control
Forouzan _ Multiple access protocols.ppt
Framming data link layer
Data link control
Internetworking

What's hot (20)

PPTX
NETWORK LAYER - Logical Addressing
PPT
Network layer tanenbaum
PPTX
Routing algorithm
PPT
Chapter 4 data link layer
PPTX
Congestion control
PPTX
Distance Vector Routing Protocols
PPT
Unit 3 Network Layer PPT
PPTX
Computer Network - Network Layer
PPTX
IPV6 ADDRESS
PPTX
Ipv4 and Ipv6
PPTX
Media Access Control (MAC Layer)
PDF
Error detection & correction codes
PPTX
Unit 2 data link control
PPTX
Transport layer protocol
PPTX
Network layer - design Issues
PDF
Transport layer services
PPTX
The medium access sublayer
PPT
Unit 5 Application Layer
PPSX
Issues in Data Link Layer
PDF
Multiple Access in Computer Network
NETWORK LAYER - Logical Addressing
Network layer tanenbaum
Routing algorithm
Chapter 4 data link layer
Congestion control
Distance Vector Routing Protocols
Unit 3 Network Layer PPT
Computer Network - Network Layer
IPV6 ADDRESS
Ipv4 and Ipv6
Media Access Control (MAC Layer)
Error detection & correction codes
Unit 2 data link control
Transport layer protocol
Network layer - design Issues
Transport layer services
The medium access sublayer
Unit 5 Application Layer
Issues in Data Link Layer
Multiple Access in Computer Network
Ad

Similar to Point to-point protocol (ppp) (20)

PPTX
Computer network
PPTX
Protocol.ppt
PPTX
PPTX
PPT
Point-to-Point Protocol(PPP) CCN ppt
PPTX
HDLC and Point to point protocol
PPTX
Point to-point protocol (ppp), PAP & CHAP
PPTX
PPP(Point-to-Point Protocol): Components & Characteristics
PPT
lect18.ppt
PPT
Point to-point-protocol
PPT
UNIT II.ppt Computer networks protocol explanation
PPTX
PPP (Point to Point Protocol)
PPT
Introduction to PPP
PPTX
DLL Protocol.pptx
PPSX
Framing Protocols
PPT
Chapter 2 point-to-point protocol (ppp)
PPTX
CCNA4 Verson6 Chapter2
ODP
Networking- OSI Layer Protocol Functions
Computer network
Protocol.ppt
Point-to-Point Protocol(PPP) CCN ppt
HDLC and Point to point protocol
Point to-point protocol (ppp), PAP & CHAP
PPP(Point-to-Point Protocol): Components & Characteristics
lect18.ppt
Point to-point-protocol
UNIT II.ppt Computer networks protocol explanation
PPP (Point to Point Protocol)
Introduction to PPP
DLL Protocol.pptx
Framing Protocols
Chapter 2 point-to-point protocol (ppp)
CCNA4 Verson6 Chapter2
Networking- OSI Layer Protocol Functions
Ad

More from Kongu Engineering College, Perundurai, Erode (20)

PPTX
Event Handling -_GET _ POSTimplementation.pptx
PPTX
Introduction to Generative AI refers to a subset of artificial intelligence
PPTX
Introduction to Microsoft Power BI is a business analytics service
PPTX
Connect to NoSQL Database (MongoDB) using Node JS & Connect Node.js with NoSQ...
PPTX
concept of server-side JavaScript / JS Framework: NODEJS
PPTX
Node.js web-based Example :Run a local server in order to start using node.js...
PPT
Concepts of Satellite Communication and types and its applications
PPT
Concepts of Mobile Communication Wireless LANs, Bluetooth , HiperLAN
PPTX
Web Technology Introduction framework.pptx
PPTX
Computer Network - Unicast Routing Distance vector Link state vector
PPT
Android SQLite database oriented application development
PPT
Android Application Development Programming
PPTX
Introduction to Spring & Spring BootFramework
PPTX
A REST API (also called a RESTful API or RESTful web API) is an application p...
PPTX
SOA and Monolith Architecture - Micro Services.pptx
PPTX
Connect to NoSQL Database using Node JS.pptx
PPTX
Event Handling -_GET _ POSTimplementation.pptx
Introduction to Generative AI refers to a subset of artificial intelligence
Introduction to Microsoft Power BI is a business analytics service
Connect to NoSQL Database (MongoDB) using Node JS & Connect Node.js with NoSQ...
concept of server-side JavaScript / JS Framework: NODEJS
Node.js web-based Example :Run a local server in order to start using node.js...
Concepts of Satellite Communication and types and its applications
Concepts of Mobile Communication Wireless LANs, Bluetooth , HiperLAN
Web Technology Introduction framework.pptx
Computer Network - Unicast Routing Distance vector Link state vector
Android SQLite database oriented application development
Android Application Development Programming
Introduction to Spring & Spring BootFramework
A REST API (also called a RESTful API or RESTful web API) is an application p...
SOA and Monolith Architecture - Micro Services.pptx
Connect to NoSQL Database using Node JS.pptx

Recently uploaded (20)

PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PDF
composite construction of structures.pdf
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
additive manufacturing of ss316l using mig welding
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
DOCX
573137875-Attendance-Management-System-original
PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
Digital Logic Computer Design lecture notes
PPTX
web development for engineering and engineering
PDF
Well-logging-methods_new................
PDF
Structs to JSON How Go Powers REST APIs.pdf
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Model Code of Practice - Construction Work - 21102022 .pdf
composite construction of structures.pdf
Operating System & Kernel Study Guide-1 - converted.pdf
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
additive manufacturing of ss316l using mig welding
Strings in CPP - Strings in C++ are sequences of characters used to store and...
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
573137875-Attendance-Management-System-original
Arduino robotics embedded978-1-4302-3184-4.pdf
Lesson 3_Tessellation.pptx finite Mathematics
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Foundation to blockchain - A guide to Blockchain Tech
Digital Logic Computer Design lecture notes
web development for engineering and engineering
Well-logging-methods_new................
Structs to JSON How Go Powers REST APIs.pdf
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx

Point to-point protocol (ppp)

  • 2. Introduction to PPP •It is a communication protocol of the data link layer •It is used to transmit multiprotocol data between two directly connected (point-to-point) computers. •It is a byte - oriented protocol that is widely used in broadband communications having heavy loads and high speeds. •it is a data link layer protocol, data is transmitted in frames. •It is also known as RFC 1661. Dr.T>Abirami,Associate Professor,IT,Kongu Engineering College,Perundurai
  • 3. Services Provided by PPP • Defining the frame format of the data to be transmitted. • Defining the procedure of establishing link between two points and exchange of data. • Stating the method of encapsulation of network layer data in the frame. • Stating authentication rules of the communicating devices. • Providing address for network communication. • Providing connections over multiple links. • Supporting a variety of network layer protocols by providing a range of services. feature of PPP is that it provides network address configuration. Dr.T>Abirami,Associate Professor,IT,Kongu Engineering College,Perundurai
  • 4. Services Not Provided by PPP • does not provide flow control • Lack of error control and sequence numbering • does not provide a sophisticated addressing mechanism Dr.T>Abirami,Associate Professor,IT,Kongu Engineering College,Perundurai
  • 5. Framing • Flag. A PPP frame starts and ends with a 1-byte flag with the bit pattern 01111110. • Address. The address field in this protocol is a constant value and set to 11111111 (broadcast address). • Control. This field is set to the constant value 00000011 • Protocol. defines what is being carried in the data field: either user data or other information. • Payload field . user data : maximum of 1500 bytes • FCS. The frame check sequence (FCS) is simply a 2-byte or 4-byte standard CRC. Dr.T>Abirami,Associate Professor,IT,Kongu Engineering College,Perundurai
  • 6. Byte Stuffing • PPP is a byte-oriented protocol, the flag in PPP is a byte that needs to be escaped whenever it appears in the data section of the frame. • The escape byte is 01111101 Dr.T>Abirami,Associate Professor,IT,Kongu Engineering College,Perundurai
  • 8. Multiplexing • PPP is a link-layer protocol • Three sets of protocols are defined to make PPP powerful: 1. the Link Control Protocol (LCP), 2. Two Authentication Protocols (APs), and 3. several Network Control Protocols (NCPs). Multiplexing is the technology that is able to combine multiple communication signals together in order for them to traverse an otherwise single signal communication medium simultaneously Dr.T>Abirami,Associate Professor,IT,Kongu Engineering College,Perundurai
  • 9. Link Control Protocol • is responsible for establishing, maintaining, configuring, and terminating links. • It provides negotiation mechanisms to set options between the two endpoints. Both endpoints of the link must reach an agreement about the options before the link can be established. Dr.T>Abirami,Associate Professor,IT,Kongu Engineering College,Perundurai
  • 11. Authentication Protocols • It means validating the identity of a user who needs to access a set of resources. • PPP has created two protocols for authentication: 1. Password Authentication Protocol and 2. Challenge Handshake Authentication Protocol. Dr.T>Abirami,Associate Professor,IT,Kongu Engineering College,Perundurai
  • 12. Password Authentication Protocol (PAP) • A. The user who wants to access a system sends an authentication identification (usually the user name) and a password. • b. The system checks the validity of the identification and password and either accepts or denies connection. Dr.T>Abirami,Associate Professor,IT,Kongu Engineering College,Perundurai
  • 13. Challenge Handshake Authentication Protocol (CHAP) • It is a three-way handshaking authentication protocol that provides greater security than PAP. In this method, the password is kept secret; it is never sent online. a. The system sends the user a challenge packet containing a challenge value, usually a few bytes. b. The user applies a predefined function that takes the challenge value and the user’s own password and creates a result. The user sends the result in the response packet to the system. c. The system does the same. It applies the same function to the password of the user (known to the system) and the challenge value to create a result. If the Dr.T>Abirami,Associate Professor,IT,Kongu Engineering College,Perundurai
  • 16. Network Control Protocols • PPP is a multiple-network-layer protocol. • It can carry a network-layer data packet from protocols defined by the Internet, OSI, Xerox, DECnet, AppleTalk, Novel For example, • IPCP (Internet Protocol Control Protocol) - configures the link for carrying IP data packets. • Xerox CP does the same for the Xerox protocol data packets Dr.T>Abirami,Associate Professor,IT,Kongu Engineering College,Perundurai
  • 17. Network Control Protocols :Internet Protocol Control Protocol (IPCP) Dr.T>Abirami,Associate Professor,IT,Kongu Engineering College,Perundurai
  • 18. Multilink PPP • logical PPP frame is divided into several actual PPP frames. • A segment of the logical frame is carried in the payload of an actual PPP frame In networking, one piece of a data packet that has been broken into smaller pieces in order to accommodate the maximum transmission unit (MTU) size of a network. Dr.T>Abirami,Associate Professor,IT,Kongu Engineering College,Perundurai
  • 19. network layer packet as it is transmitted through a PPP connection. Figure 11.29 shows the steps Dr.T>Abirami,Associate Professor,IT,Kongu Engineering College,Perundurai