SlideShare a Scribd company logo
1 of 19
POINT-TO-POINT PROTOCOL
(PPP)
Dr.T>Abirami,Associate Professor,IT,Kongu Engineering
College,Perundurai
Introduction to PPP
•It is a communication protocol of the data link layer
•It is used to transmit multiprotocol data between two
directly connected (point-to-point) computers.
•It is a byte - oriented protocol that is widely used in
broadband communications having heavy loads and
high speeds.
•it is a data link layer protocol, data is transmitted in
frames.
•It is also known as RFC 1661.
Dr.T>Abirami,Associate Professor,IT,Kongu Engineering
College,Perundurai
Services Provided by PPP
• Defining the frame format of the data to be transmitted.
• Defining the procedure of establishing link between two points and
exchange of data.
• Stating the method of encapsulation of network layer data in the
frame.
• Stating authentication rules of the communicating devices.
• Providing address for network communication.
• Providing connections over multiple links.
• Supporting a variety of network layer protocols by providing a range
of services.
feature of PPP is that it provides network address configuration.
Dr.T>Abirami,Associate Professor,IT,Kongu Engineering
College,Perundurai
Services Not Provided by PPP
• does not provide flow control
• Lack of error control and sequence numbering
• does not provide a sophisticated addressing mechanism
Dr.T>Abirami,Associate Professor,IT,Kongu Engineering
College,Perundurai
Framing
• Flag. A PPP frame starts and ends with a 1-byte flag with the bit pattern 01111110.
• Address. The address field in this protocol is a constant value and set to 11111111
(broadcast address).
• Control. This field is set to the constant value 00000011
• Protocol. defines what is being carried in the data field: either user data or other
information.
• Payload field . user data : maximum of 1500 bytes
• FCS. The frame check sequence (FCS) is simply a 2-byte or 4-byte standard CRC.
Dr.T>Abirami,Associate Professor,IT,Kongu Engineering
College,Perundurai
Byte Stuffing
• PPP is a byte-oriented protocol, the flag in PPP is a byte that needs to
be escaped whenever it appears in the data section of the frame.
• The escape byte is 01111101
Dr.T>Abirami,Associate Professor,IT,Kongu Engineering
College,Perundurai
Transition Phases
Dr.T>Abirami,Associate Professor,IT,Kongu Engineering
College,Perundurai
Multiplexing
• PPP is a link-layer protocol
• Three sets of protocols are defined to make PPP powerful:
1. the Link Control Protocol (LCP),
2. Two Authentication Protocols (APs), and
3. several Network Control Protocols (NCPs).
Multiplexing is the technology that is able to combine multiple
communication signals together in order for them to traverse
an otherwise single signal communication medium
simultaneously
Dr.T>Abirami,Associate Professor,IT,Kongu Engineering
College,Perundurai
Link Control Protocol
• is responsible for establishing, maintaining, configuring, and terminating
links.
• It provides negotiation mechanisms to set options between the two
endpoints. Both endpoints of the link must reach an agreement about the
options before the link can be established.
Dr.T>Abirami,Associate Professor,IT,Kongu Engineering
College,Perundurai
Dr.T>Abirami,Associate Professor,IT,Kongu Engineering
College,Perundurai
Authentication Protocols
• It means validating the identity of a user who needs to access a set of
resources.
• PPP has created two protocols for authentication:
1. Password Authentication Protocol and
2. Challenge Handshake Authentication Protocol.
Dr.T>Abirami,Associate Professor,IT,Kongu Engineering
College,Perundurai
Password Authentication Protocol (PAP)
• A. The user who wants to access a system sends an authentication
identification (usually the user name) and a password.
• b. The system checks the validity of the identification and password
and either accepts or denies connection.
Dr.T>Abirami,Associate Professor,IT,Kongu Engineering
College,Perundurai
Challenge Handshake Authentication Protocol
(CHAP)
• It is a three-way handshaking authentication protocol that provides greater
security than PAP.
In this method, the password is kept secret; it is never sent online.
a. The system sends the user a challenge packet containing a challenge value,
usually a few bytes.
b. The user applies a predefined function that takes the challenge value and the
user’s own password and creates a result. The user sends the result in the
response packet to the system.
c. The system does the same. It applies the same function to the password of the
user (known to the system) and the challenge value to create a result. If the
Dr.T>Abirami,Associate Professor,IT,Kongu Engineering
College,Perundurai
Dr.T>Abirami,Associate Professor,IT,Kongu Engineering
College,Perundurai
Dr.T>Abirami,Associate Professor,IT,Kongu Engineering
College,Perundurai
Network Control Protocols
• PPP is a multiple-network-layer protocol.
• It can carry a network-layer data packet from protocols defined by the
Internet, OSI, Xerox, DECnet, AppleTalk, Novel
For example,
• IPCP (Internet Protocol Control Protocol) - configures the link for
carrying IP data packets.
• Xerox CP does the same for the Xerox protocol data packets
Dr.T>Abirami,Associate Professor,IT,Kongu Engineering
College,Perundurai
Network Control Protocols :Internet Protocol
Control Protocol (IPCP)
Dr.T>Abirami,Associate Professor,IT,Kongu Engineering
College,Perundurai
Multilink PPP
• logical PPP frame is divided into several actual PPP frames.
• A segment of the logical frame is carried in the payload of an actual
PPP frame
In networking, one piece of a data packet that has been broken into smaller pieces in order
to accommodate the maximum transmission unit (MTU) size of a network.
Dr.T>Abirami,Associate Professor,IT,Kongu Engineering
College,Perundurai
network layer packet as it is
transmitted through a
PPP connection. Figure
11.29 shows the steps
Dr.T>Abirami,Associate Professor,IT,Kongu Engineering
College,Perundurai

More Related Content

What's hot

Packet switching
Packet switchingPacket switching
Packet switching
asimnawaz54
 
Introduction to Data-Link Layer
Introduction to Data-Link LayerIntroduction to Data-Link Layer
Introduction to Data-Link Layer
Abdullaziz Tagawy
 

What's hot (20)

Computer networks unit iii
Computer networks    unit iiiComputer networks    unit iii
Computer networks unit iii
 
Introduction to the Data Link Layer
Introduction to the Data Link LayerIntroduction to the Data Link Layer
Introduction to the Data Link Layer
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 
HDLC
HDLCHDLC
HDLC
 
Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing
 
Frame relay
Frame relayFrame relay
Frame relay
 
Packet switching
Packet switchingPacket switching
Packet switching
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
 
Introduction to Data-Link Layer
Introduction to Data-Link LayerIntroduction to Data-Link Layer
Introduction to Data-Link Layer
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
 
ASYNCHRONOUS TRANSFER MODE (ATM)
ASYNCHRONOUS TRANSFER MODE (ATM)ASYNCHRONOUS TRANSFER MODE (ATM)
ASYNCHRONOUS TRANSFER MODE (ATM)
 
Computer networks - Channelization
Computer networks - ChannelizationComputer networks - Channelization
Computer networks - Channelization
 
Wireless local loop
Wireless local loopWireless local loop
Wireless local loop
 
Wireless LAN technologies
Wireless LAN technologiesWireless LAN technologies
Wireless LAN technologies
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
Distance vector routing
Distance vector routingDistance vector routing
Distance vector routing
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
Data link control
Data link controlData link control
Data link control
 
Data link layer
Data link layerData link layer
Data link layer
 

Similar to Point to-point protocol (ppp)

Network fundamental
Network fundamentalNetwork fundamental
Network fundamental
ashrawi92
 
ETE405-lec7.pdf
ETE405-lec7.pdfETE405-lec7.pdf
ETE405-lec7.pdf
mashiur
 

Similar to Point to-point protocol (ppp) (20)

CN PPT
CN PPTCN PPT
CN PPT
 
Protocol.ppt
Protocol.pptProtocol.ppt
Protocol.ppt
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
 
Protocols
Protocols Protocols
Protocols
 
EC8551 COMMUNICATION NETWORKS
EC8551 COMMUNICATION NETWORKSEC8551 COMMUNICATION NETWORKS
EC8551 COMMUNICATION NETWORKS
 
Network fundamental
Network fundamentalNetwork fundamental
Network fundamental
 
CISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalCISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network Fundamental
 
ETE405-lec7.pdf
ETE405-lec7.pdfETE405-lec7.pdf
ETE405-lec7.pdf
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
1. computer networks u1 ver 1.0
1. computer networks u1 ver 1.01. computer networks u1 ver 1.0
1. computer networks u1 ver 1.0
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
Transport layer protocols : TCP and UDP
Transport layer protocols  : TCP and UDPTransport layer protocols  : TCP and UDP
Transport layer protocols : TCP and UDP
 
Open System interconnection OSI Model.pptx
Open System interconnection OSI Model.pptxOpen System interconnection OSI Model.pptx
Open System interconnection OSI Model.pptx
 
NOS Unit.pdf
NOS Unit.pdfNOS Unit.pdf
NOS Unit.pdf
 
Network Protocol and TCP/IP
Network Protocol and TCP/IPNetwork Protocol and TCP/IP
Network Protocol and TCP/IP
 
HDLC and Point to point protocol
HDLC and Point to point protocolHDLC and Point to point protocol
HDLC and Point to point protocol
 
Communication protocols
Communication protocolsCommunication protocols
Communication protocols
 
Computer network
Computer networkComputer network
Computer network
 
Unit 1 1 introduction
Unit 1   1 introductionUnit 1   1 introduction
Unit 1 1 introduction
 

More from Kongu Engineering College, Perundurai, Erode

More from Kongu Engineering College, Perundurai, Erode (20)

Introduction to Spring & Spring BootFramework
Introduction to Spring  & Spring BootFrameworkIntroduction to Spring  & Spring BootFramework
Introduction to Spring & Spring BootFramework
 
A REST API (also called a RESTful API or RESTful web API) is an application p...
A REST API (also called a RESTful API or RESTful web API) is an application p...A REST API (also called a RESTful API or RESTful web API) is an application p...
A REST API (also called a RESTful API or RESTful web API) is an application p...
 
SOA and Monolith Architecture - Micro Services.pptx
SOA and Monolith Architecture - Micro Services.pptxSOA and Monolith Architecture - Micro Services.pptx
SOA and Monolith Architecture - Micro Services.pptx
 
Application Layer.pptx
Application Layer.pptxApplication Layer.pptx
Application Layer.pptx
 
Connect to NoSQL Database using Node JS.pptx
Connect to NoSQL Database using Node JS.pptxConnect to NoSQL Database using Node JS.pptx
Connect to NoSQL Database using Node JS.pptx
 
Node_basics.pptx
Node_basics.pptxNode_basics.pptx
Node_basics.pptx
 
Navigation Bar.pptx
Navigation Bar.pptxNavigation Bar.pptx
Navigation Bar.pptx
 
Bootstarp installation.pptx
Bootstarp installation.pptxBootstarp installation.pptx
Bootstarp installation.pptx
 
nested_Object as Parameter & Recursion_Later_commamd.pptx
nested_Object as Parameter  & Recursion_Later_commamd.pptxnested_Object as Parameter  & Recursion_Later_commamd.pptx
nested_Object as Parameter & Recursion_Later_commamd.pptx
 
Chapter 3.pdf
Chapter 3.pdfChapter 3.pdf
Chapter 3.pdf
 
Introduction to Social Media and Social Networks.pdf
Introduction to Social Media and Social Networks.pdfIntroduction to Social Media and Social Networks.pdf
Introduction to Social Media and Social Networks.pdf
 
Dropdown Menu or Combo List.pdf
Dropdown Menu or Combo List.pdfDropdown Menu or Combo List.pdf
Dropdown Menu or Combo List.pdf
 
div tag.pdf
div tag.pdfdiv tag.pdf
div tag.pdf
 
Dimensions of elements.pdf
Dimensions of elements.pdfDimensions of elements.pdf
Dimensions of elements.pdf
 
CSS Positioning Elements.pdf
CSS Positioning Elements.pdfCSS Positioning Elements.pdf
CSS Positioning Elements.pdf
 
Random number generation_upload.pdf
Random number generation_upload.pdfRandom number generation_upload.pdf
Random number generation_upload.pdf
 
JavaScript_introduction_upload.pdf
JavaScript_introduction_upload.pdfJavaScript_introduction_upload.pdf
JavaScript_introduction_upload.pdf
 
Computer Networks: Quality of service
Computer Networks: Quality of serviceComputer Networks: Quality of service
Computer Networks: Quality of service
 
Transport layer protocols : Simple Protocol , Stop and Wait Protocol , Go-Bac...
Transport layer protocols : Simple Protocol , Stop and Wait Protocol , Go-Bac...Transport layer protocols : Simple Protocol , Stop and Wait Protocol , Go-Bac...
Transport layer protocols : Simple Protocol , Stop and Wait Protocol , Go-Bac...
 
Application layer : DNS
Application layer : DNSApplication layer : DNS
Application layer : DNS
 

Recently uploaded

Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 

Recently uploaded (20)

Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptx
 
Path loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelPath loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata Model
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 

Point to-point protocol (ppp)

  • 2. Introduction to PPP •It is a communication protocol of the data link layer •It is used to transmit multiprotocol data between two directly connected (point-to-point) computers. •It is a byte - oriented protocol that is widely used in broadband communications having heavy loads and high speeds. •it is a data link layer protocol, data is transmitted in frames. •It is also known as RFC 1661. Dr.T>Abirami,Associate Professor,IT,Kongu Engineering College,Perundurai
  • 3. Services Provided by PPP • Defining the frame format of the data to be transmitted. • Defining the procedure of establishing link between two points and exchange of data. • Stating the method of encapsulation of network layer data in the frame. • Stating authentication rules of the communicating devices. • Providing address for network communication. • Providing connections over multiple links. • Supporting a variety of network layer protocols by providing a range of services. feature of PPP is that it provides network address configuration. Dr.T>Abirami,Associate Professor,IT,Kongu Engineering College,Perundurai
  • 4. Services Not Provided by PPP • does not provide flow control • Lack of error control and sequence numbering • does not provide a sophisticated addressing mechanism Dr.T>Abirami,Associate Professor,IT,Kongu Engineering College,Perundurai
  • 5. Framing • Flag. A PPP frame starts and ends with a 1-byte flag with the bit pattern 01111110. • Address. The address field in this protocol is a constant value and set to 11111111 (broadcast address). • Control. This field is set to the constant value 00000011 • Protocol. defines what is being carried in the data field: either user data or other information. • Payload field . user data : maximum of 1500 bytes • FCS. The frame check sequence (FCS) is simply a 2-byte or 4-byte standard CRC. Dr.T>Abirami,Associate Professor,IT,Kongu Engineering College,Perundurai
  • 6. Byte Stuffing • PPP is a byte-oriented protocol, the flag in PPP is a byte that needs to be escaped whenever it appears in the data section of the frame. • The escape byte is 01111101 Dr.T>Abirami,Associate Professor,IT,Kongu Engineering College,Perundurai
  • 8. Multiplexing • PPP is a link-layer protocol • Three sets of protocols are defined to make PPP powerful: 1. the Link Control Protocol (LCP), 2. Two Authentication Protocols (APs), and 3. several Network Control Protocols (NCPs). Multiplexing is the technology that is able to combine multiple communication signals together in order for them to traverse an otherwise single signal communication medium simultaneously Dr.T>Abirami,Associate Professor,IT,Kongu Engineering College,Perundurai
  • 9. Link Control Protocol • is responsible for establishing, maintaining, configuring, and terminating links. • It provides negotiation mechanisms to set options between the two endpoints. Both endpoints of the link must reach an agreement about the options before the link can be established. Dr.T>Abirami,Associate Professor,IT,Kongu Engineering College,Perundurai
  • 11. Authentication Protocols • It means validating the identity of a user who needs to access a set of resources. • PPP has created two protocols for authentication: 1. Password Authentication Protocol and 2. Challenge Handshake Authentication Protocol. Dr.T>Abirami,Associate Professor,IT,Kongu Engineering College,Perundurai
  • 12. Password Authentication Protocol (PAP) • A. The user who wants to access a system sends an authentication identification (usually the user name) and a password. • b. The system checks the validity of the identification and password and either accepts or denies connection. Dr.T>Abirami,Associate Professor,IT,Kongu Engineering College,Perundurai
  • 13. Challenge Handshake Authentication Protocol (CHAP) • It is a three-way handshaking authentication protocol that provides greater security than PAP. In this method, the password is kept secret; it is never sent online. a. The system sends the user a challenge packet containing a challenge value, usually a few bytes. b. The user applies a predefined function that takes the challenge value and the user’s own password and creates a result. The user sends the result in the response packet to the system. c. The system does the same. It applies the same function to the password of the user (known to the system) and the challenge value to create a result. If the Dr.T>Abirami,Associate Professor,IT,Kongu Engineering College,Perundurai
  • 16. Network Control Protocols • PPP is a multiple-network-layer protocol. • It can carry a network-layer data packet from protocols defined by the Internet, OSI, Xerox, DECnet, AppleTalk, Novel For example, • IPCP (Internet Protocol Control Protocol) - configures the link for carrying IP data packets. • Xerox CP does the same for the Xerox protocol data packets Dr.T>Abirami,Associate Professor,IT,Kongu Engineering College,Perundurai
  • 17. Network Control Protocols :Internet Protocol Control Protocol (IPCP) Dr.T>Abirami,Associate Professor,IT,Kongu Engineering College,Perundurai
  • 18. Multilink PPP • logical PPP frame is divided into several actual PPP frames. • A segment of the logical frame is carried in the payload of an actual PPP frame In networking, one piece of a data packet that has been broken into smaller pieces in order to accommodate the maximum transmission unit (MTU) size of a network. Dr.T>Abirami,Associate Professor,IT,Kongu Engineering College,Perundurai
  • 19. network layer packet as it is transmitted through a PPP connection. Figure 11.29 shows the steps Dr.T>Abirami,Associate Professor,IT,Kongu Engineering College,Perundurai