SlideShare a Scribd company logo
S.PARANIPUSHPA
DEPARTMENT OF CS AND IT
NADAR SARASWATHI COLLEGE OF ART S
AND SCIENCE
AUTHENTICATION PROTOCOL
 . Authentication Protocol
 Authentication protocols help to validate the
identity of a user who needs to access the
resources.
 There are two authentication protocols:
 1. Password Authentication Protocols (PAP)
 2.challenge handshake authentication protocol
 Network control protocol
CHALLENGE HANDSHAKE
AUTHENTICATION PROTOCOL
 • It provides more security than PAP.
 • In this method, password is kept secret, it is never sent on-line.
 • It is a three-way handshaking authentication protocol:
 1. System sends. a challenge packet to the user. This packet
contains a value, usually a few bytes.
 2. Using a predefined function, a user combines this challenge
value with the user password and sends the resultant packet
back to the system.
 3. System then applies the same function to the password of the
user and challenge value and creates a result. If result is same as
the result sent in the response packet, access is granted,
otherwise, it is denied.
 1. Challenge-used by system to send challenge value.
 2. Response-used by the user to return the result of the
calculation.
 3. Success-used by system to allow access to the
system.
 4. Failure-used by the system to deny access to the
system.
TYPES
NETWORK CONTROL PROTOCOL
 3. Network Control Protocol (NCP)
 • After establishing the link and authenticating the user, PPP
connects to the network layer. This connection is established by
NCP.
 • Therefore NCP is a set of control protocols that allow the
encapsulation of the data coming from network layer.
 • After the network layer configuration is done by one of the NCP
protocols, the users can exchange data from the network layer.
 • PPP can carry a network layer data packet from protocols
defined by the Internet, DECNET, Apple Talk, Novell, OSI, Xerox
and so on.
 • None of the NCP packets carry networks layer data. They just
configure the link at the network layer for the incoming data.
POINT TO POINT PROTOCOL
 Point-to-Point Protocol (PPP)
 BY DINESH THAKUR Category: Switching
 • PPP was devised by IETF (Internet Engineering Task
Force) to create a data link protocol for point to point
lines that can solve all the problems present in SLIP.
 • PPP is most commonly used data link protocol. It is
used to connect the Home PC to the server of ISP via a
modem.
PPP FRAME FORMAT
 PPP Frame Format
 1. Flag field: Flag field marks the beginning and end of the PPP frame.
Flag byte is 01111110. (1 byte).
 2. Address field: This field is of 1 byte and is always 11111111. This
address is the broadcast address i.e. all the stations accept this frame.
 3. Control field: This field is also of 1 byte. This field uses the format
of the U-frame (unnumbered) in HDLC. The value is always 00000011
to show that the frame does not contain any sequence numbers and
there is no flow control or error control.
 4. Protocol field: This field specifies the kind of packet in the data
field i.e. what is being carried in data field.
 5. Data field: Its length is variable. If the length is not negotiated
using LCP during line set up, a default length of 1500 bytes is used. It
carries user data or other information
PPP FORMAT
LINK CONTROL PROTOCOL
 • It is responsible for establishing,
maintaining, configuring and terminating
the link.
 • It provides negotiation mechanism to set
options between two endpoints.
DIAGRAM
CONT..
 All LCP packets are carried in the data field of the PPP
frame.
 • The presence of a value C02116 in the protocol field of PPP
frame indicates that LCP packet is present in the data field.
 • The various fields present in LCP packet are:
 1. Code: 1 byte-specifies the type of LCP packet.
 2. ID: 1 byte-holds a value used to match a request with the
reply.
 3. Length: 2 byte-specifies the length of entire LCP packet.
 4. Information: Contains extra information required for
some LCP packet.
PASSWORD AUTHENTICATION
PROTOCOL
PAP is a password Authentication Protocol used
by PPP links to validate users.
 PAP authentication requires the calling
device to enter the username and password. If
the credentials match with the local database
of the called device or in the remote AAA
database then it is allowed to access otherwise
denied.
FEATURES
 The password is sent in clear text.
 All network operating system support PAP.
 It uses two-way Handshake Protocol.
 It is non-interactive.
 PAP supports both one-way authentication
(unidirectional) and two-way
authentication (bidirectional).
THANK
YOU

More Related Content

What's hot

Network protocol
Network protocolNetwork protocol
Network protocol
Online
 
Computer networks unit i
Computer networks    unit iComputer networks    unit i
Computer networks unit i
JAIGANESH SEKAR
 
Network layer
Network layerNetwork layer
Network layer
sbkbca
 
Network Layer
Network LayerNetwork Layer
Network Layer
Dr Shashikant Athawale
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
sanjoysanyal
 
Ch 19 Network-layer protocols Section 1
Ch 19  Network-layer protocols Section 1Ch 19  Network-layer protocols Section 1
Ch 19 Network-layer protocols Section 1
Hossam El-Deen Osama
 
Icmp
IcmpIcmp
Data link layer
Data link layerData link layer
Data link layer
Abdul MaTéèñ
 
Network Protocol and TCP/IP
Network Protocol and TCP/IPNetwork Protocol and TCP/IP
Network Protocol and TCP/IP
Bwsrang Basumatary
 
The Data Link Layer
The Data Link LayerThe Data Link Layer
The Data Link Layer
adil raja
 
Network layer u3
Network  layer u3Network  layer u3
Network layer u3
IndrajaMeghavathula
 
Tcp ip tutorial
Tcp ip tutorialTcp ip tutorial
Tcp ip tutorial
PRINCE KUMAR
 
Unit 4 - Network Layer
Unit 4 - Network LayerUnit 4 - Network Layer
Unit 4 - Network Layer
Chandan Gupta Bhagat
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
Shubham Khedekar
 
Computer networks unit iii
Computer networks    unit iiiComputer networks    unit iii
Computer networks unit iii
JAIGANESH SEKAR
 
Tcpip services and applications
Tcpip services and applicationsTcpip services and applications
Tcpip services and applications
Online
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
EILLEN IVY PORTUGUEZ
 
Internet protocol stack
Internet protocol stackInternet protocol stack
Internet protocol stack
Ami Prakash
 

What's hot (20)

Network protocol
Network protocolNetwork protocol
Network protocol
 
Computer networks unit i
Computer networks    unit iComputer networks    unit i
Computer networks unit i
 
Network layer
Network layerNetwork layer
Network layer
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
 
Ch 19 Network-layer protocols Section 1
Ch 19  Network-layer protocols Section 1Ch 19  Network-layer protocols Section 1
Ch 19 Network-layer protocols Section 1
 
Icmp
IcmpIcmp
Icmp
 
Data link layer
Data link layerData link layer
Data link layer
 
Network Protocol and TCP/IP
Network Protocol and TCP/IPNetwork Protocol and TCP/IP
Network Protocol and TCP/IP
 
The Data Link Layer
The Data Link LayerThe Data Link Layer
The Data Link Layer
 
Network layer u3
Network  layer u3Network  layer u3
Network layer u3
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Tcp ip tutorial
Tcp ip tutorialTcp ip tutorial
Tcp ip tutorial
 
Unit 4 - Network Layer
Unit 4 - Network LayerUnit 4 - Network Layer
Unit 4 - Network Layer
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
 
Computer networks unit iii
Computer networks    unit iiiComputer networks    unit iii
Computer networks unit iii
 
Tcpip services and applications
Tcpip services and applicationsTcpip services and applications
Tcpip services and applications
 
Mod2
Mod2Mod2
Mod2
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Internet protocol stack
Internet protocol stackInternet protocol stack
Internet protocol stack
 

Similar to Protocol.ppt

CISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalCISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network Fundamental
Karthikeyan Dhayalan
 
Point to point protocol | PPP - Nitish Jadia
Point to point protocol | PPP - Nitish JadiaPoint to point protocol | PPP - Nitish Jadia
Point to point protocol | PPP - Nitish Jadia
Nitish Jadia
 
Point-to-Point Protocol(PPP) CCN ppt
Point-to-Point Protocol(PPP) CCN pptPoint-to-Point Protocol(PPP) CCN ppt
Point-to-Point Protocol(PPP) CCN ppt
Niaz Shaikh
 
HDLC and Point to point protocol
HDLC and Point to point protocolHDLC and Point to point protocol
HDLC and Point to point protocol
Kinza Razzaq
 
Networking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol FunctionsNetworking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol FunctionsGayathri Kesavan
 
DLL Protocol.pptx
DLL Protocol.pptxDLL Protocol.pptx
DLL Protocol.pptx
ubaidullah75790
 
TCP /IP
TCP /IPTCP /IP
Point to-point protocol (ppp)
Point to-point protocol (ppp)Point to-point protocol (ppp)
Point to-point protocol (ppp)
Kongu Engineering College, Perundurai, Erode
 
presentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationspresentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunications
AnyapuPranav
 
unit2-210710110327.pptx
unit2-210710110327.pptxunit2-210710110327.pptx
unit2-210710110327.pptx
LAVANYAsrietacin
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
N.Jagadish Kumar
 
Transport layer.pptx
Transport layer.pptxTransport layer.pptx
Transport layer.pptx
MohammedAnas871930
 
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENTTCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
mayank's it solution pvt.ltd
 
PPP(Point-to-Point Protocol): Components & Characteristics
PPP(Point-to-Point Protocol): Components & CharacteristicsPPP(Point-to-Point Protocol): Components & Characteristics
PPP(Point-to-Point Protocol): Components & Characteristics
Anuj Parajuli
 
Unit 4-Transport Layer Protocols-3.pptx
Unit 4-Transport Layer Protocols-3.pptxUnit 4-Transport Layer Protocols-3.pptx
Unit 4-Transport Layer Protocols-3.pptx
DESTROYER39
 
Unit 4-Transport Layer Protocols.pptx
Unit 4-Transport Layer Protocols.pptxUnit 4-Transport Layer Protocols.pptx
Unit 4-Transport Layer Protocols.pptx
sarosh32
 
Lecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptxLecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptx
Ronoh Kennedy
 
CCNA ppt Day 2
CCNA ppt Day 2CCNA ppt Day 2
CCNA ppt Day 2
VISHNU N
 
ND0801_Assignment_3_Protocols for P3
ND0801_Assignment_3_Protocols for P3ND0801_Assignment_3_Protocols for P3
ND0801_Assignment_3_Protocols for P3John Mathias
 

Similar to Protocol.ppt (20)

CISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalCISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network Fundamental
 
Point to point protocol | PPP - Nitish Jadia
Point to point protocol | PPP - Nitish JadiaPoint to point protocol | PPP - Nitish Jadia
Point to point protocol | PPP - Nitish Jadia
 
Point-to-Point Protocol(PPP) CCN ppt
Point-to-Point Protocol(PPP) CCN pptPoint-to-Point Protocol(PPP) CCN ppt
Point-to-Point Protocol(PPP) CCN ppt
 
HDLC and Point to point protocol
HDLC and Point to point protocolHDLC and Point to point protocol
HDLC and Point to point protocol
 
Networking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol FunctionsNetworking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol Functions
 
DLL Protocol.pptx
DLL Protocol.pptxDLL Protocol.pptx
DLL Protocol.pptx
 
TCP /IP
TCP /IPTCP /IP
TCP /IP
 
Point to-point protocol (ppp)
Point to-point protocol (ppp)Point to-point protocol (ppp)
Point to-point protocol (ppp)
 
presentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationspresentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunications
 
unit2-210710110327.pptx
unit2-210710110327.pptxunit2-210710110327.pptx
unit2-210710110327.pptx
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 
Transport layer.pptx
Transport layer.pptxTransport layer.pptx
Transport layer.pptx
 
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENTTCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
 
PPP(Point-to-Point Protocol): Components & Characteristics
PPP(Point-to-Point Protocol): Components & CharacteristicsPPP(Point-to-Point Protocol): Components & Characteristics
PPP(Point-to-Point Protocol): Components & Characteristics
 
Unit 4-Transport Layer Protocols-3.pptx
Unit 4-Transport Layer Protocols-3.pptxUnit 4-Transport Layer Protocols-3.pptx
Unit 4-Transport Layer Protocols-3.pptx
 
Unit 4-Transport Layer Protocols.pptx
Unit 4-Transport Layer Protocols.pptxUnit 4-Transport Layer Protocols.pptx
Unit 4-Transport Layer Protocols.pptx
 
Lecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptxLecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptx
 
CCNA ppt Day 2
CCNA ppt Day 2CCNA ppt Day 2
CCNA ppt Day 2
 
3
33
3
 
ND0801_Assignment_3_Protocols for P3
ND0801_Assignment_3_Protocols for P3ND0801_Assignment_3_Protocols for P3
ND0801_Assignment_3_Protocols for P3
 

More from amuthadeepa

Edgelinking
EdgelinkingEdgelinking
Edgelinking
amuthadeepa
 
Handover
HandoverHandover
Handover
amuthadeepa
 
Handover
HandoverHandover
Handover
amuthadeepa
 
Cookies
CookiesCookies
Cookies
amuthadeepa
 
Critical system
Critical systemCritical system
Critical system
amuthadeepa
 
Excellencein visualization
Excellencein visualizationExcellencein visualization
Excellencein visualization
amuthadeepa
 
Datacleaning.ppt
Datacleaning.pptDatacleaning.ppt
Datacleaning.ppt
amuthadeepa
 
Datacleaning.ppt
Datacleaning.pptDatacleaning.ppt
Datacleaning.ppt
amuthadeepa
 
Database.ppt
Database.pptDatabase.ppt
Database.ppt
amuthadeepa
 
Network security.ppt
Network security.pptNetwork security.ppt
Network security.ppt
amuthadeepa
 
Smart.ppt
Smart.pptSmart.ppt
Smart.ppt
amuthadeepa
 
Perceptron.ppt
Perceptron.pptPerceptron.ppt
Perceptron.ppt
amuthadeepa
 

More from amuthadeepa (12)

Edgelinking
EdgelinkingEdgelinking
Edgelinking
 
Handover
HandoverHandover
Handover
 
Handover
HandoverHandover
Handover
 
Cookies
CookiesCookies
Cookies
 
Critical system
Critical systemCritical system
Critical system
 
Excellencein visualization
Excellencein visualizationExcellencein visualization
Excellencein visualization
 
Datacleaning.ppt
Datacleaning.pptDatacleaning.ppt
Datacleaning.ppt
 
Datacleaning.ppt
Datacleaning.pptDatacleaning.ppt
Datacleaning.ppt
 
Database.ppt
Database.pptDatabase.ppt
Database.ppt
 
Network security.ppt
Network security.pptNetwork security.ppt
Network security.ppt
 
Smart.ppt
Smart.pptSmart.ppt
Smart.ppt
 
Perceptron.ppt
Perceptron.pptPerceptron.ppt
Perceptron.ppt
 

Recently uploaded

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 

Recently uploaded (20)

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 

Protocol.ppt

  • 1. S.PARANIPUSHPA DEPARTMENT OF CS AND IT NADAR SARASWATHI COLLEGE OF ART S AND SCIENCE
  • 2. AUTHENTICATION PROTOCOL  . Authentication Protocol  Authentication protocols help to validate the identity of a user who needs to access the resources.  There are two authentication protocols:  1. Password Authentication Protocols (PAP)  2.challenge handshake authentication protocol  Network control protocol
  • 3. CHALLENGE HANDSHAKE AUTHENTICATION PROTOCOL  • It provides more security than PAP.  • In this method, password is kept secret, it is never sent on-line.  • It is a three-way handshaking authentication protocol:  1. System sends. a challenge packet to the user. This packet contains a value, usually a few bytes.  2. Using a predefined function, a user combines this challenge value with the user password and sends the resultant packet back to the system.  3. System then applies the same function to the password of the user and challenge value and creates a result. If result is same as the result sent in the response packet, access is granted, otherwise, it is denied.
  • 4.  1. Challenge-used by system to send challenge value.  2. Response-used by the user to return the result of the calculation.  3. Success-used by system to allow access to the system.  4. Failure-used by the system to deny access to the system. TYPES
  • 5. NETWORK CONTROL PROTOCOL  3. Network Control Protocol (NCP)  • After establishing the link and authenticating the user, PPP connects to the network layer. This connection is established by NCP.  • Therefore NCP is a set of control protocols that allow the encapsulation of the data coming from network layer.  • After the network layer configuration is done by one of the NCP protocols, the users can exchange data from the network layer.  • PPP can carry a network layer data packet from protocols defined by the Internet, DECNET, Apple Talk, Novell, OSI, Xerox and so on.  • None of the NCP packets carry networks layer data. They just configure the link at the network layer for the incoming data.
  • 6. POINT TO POINT PROTOCOL  Point-to-Point Protocol (PPP)  BY DINESH THAKUR Category: Switching  • PPP was devised by IETF (Internet Engineering Task Force) to create a data link protocol for point to point lines that can solve all the problems present in SLIP.  • PPP is most commonly used data link protocol. It is used to connect the Home PC to the server of ISP via a modem.
  • 7. PPP FRAME FORMAT  PPP Frame Format  1. Flag field: Flag field marks the beginning and end of the PPP frame. Flag byte is 01111110. (1 byte).  2. Address field: This field is of 1 byte and is always 11111111. This address is the broadcast address i.e. all the stations accept this frame.  3. Control field: This field is also of 1 byte. This field uses the format of the U-frame (unnumbered) in HDLC. The value is always 00000011 to show that the frame does not contain any sequence numbers and there is no flow control or error control.  4. Protocol field: This field specifies the kind of packet in the data field i.e. what is being carried in data field.  5. Data field: Its length is variable. If the length is not negotiated using LCP during line set up, a default length of 1500 bytes is used. It carries user data or other information
  • 9. LINK CONTROL PROTOCOL  • It is responsible for establishing, maintaining, configuring and terminating the link.  • It provides negotiation mechanism to set options between two endpoints.
  • 11. CONT..  All LCP packets are carried in the data field of the PPP frame.  • The presence of a value C02116 in the protocol field of PPP frame indicates that LCP packet is present in the data field.  • The various fields present in LCP packet are:  1. Code: 1 byte-specifies the type of LCP packet.  2. ID: 1 byte-holds a value used to match a request with the reply.  3. Length: 2 byte-specifies the length of entire LCP packet.  4. Information: Contains extra information required for some LCP packet.
  • 12. PASSWORD AUTHENTICATION PROTOCOL PAP is a password Authentication Protocol used by PPP links to validate users.  PAP authentication requires the calling device to enter the username and password. If the credentials match with the local database of the called device or in the remote AAA database then it is allowed to access otherwise denied.
  • 13. FEATURES  The password is sent in clear text.  All network operating system support PAP.  It uses two-way Handshake Protocol.  It is non-interactive.  PAP supports both one-way authentication (unidirectional) and two-way authentication (bidirectional).