CCNA Study Guide online cisco ccna training guide – collection of high quality CCNA tutorials.
These tutorials are prepared with single slogan; “provide best online CCNA training absolutely free”. This comprehensive collection of CCNA Study material is exactly; what you need to prepare for following exams CCNA Routing and Switching; Cisco Certified Entry Networking Technician (CCENT), Interconnecting Cisco Networking Devices – part 1 (ICND-1); Interconnecting Cisco Networking Devices – part 2 (ICND-2). CCNA certificate is a goal in your career journey. So to get this goal we arranged this exclusive CCNA training program in such a way that you get advantage from these CCNA tutorials in exam and after getting certificate in your job life.
Frame Relay is a multiplexing technique that transmits only one frame at a time. Multiple virtual circuits can be used on a single physical line. The Frame Relay Access Device (FRAD), or router connected to the Frame Relay network, may have multiple virtual circuits linking it to different endpoints.
Multiple VCs on a single physical line is distinguished because each Virtual Circuit has its own DLCI. I have mentioned in the previous article that the DLCI has local significance and may be different at each end of a VC.
Multiple Virtual Circuits reduces the number of equipment and network also reduces the network complexity. Using Multiple Virtual Circuits makes the network very cost-effective. With this configuration, each endpoint required a single access line and a single interface.
The figure-1 below illustrates the example of Multiple Virtual Circuits of the central office with its remote locations. Central Office is connected to the network using two VCs and each VC is assigned a DLCI.
As I mentioned earlier that Frame Relay decreases the network cost because customers only pay for the bandwidth they use and for the port they are using. When the customer needs more ports, they pay for more bandwidth, but they do not pay for equipment because all the ports in Frame Relay are virtual.
We have already discussed Frame Relay in the previous lessons What is Frame Relay? Exclusive Introduction that it provides connection-oriented data link layer communication using a Frame Relay virtual circuit. Frame Relay Virtual Circuits (VCs) is a logical connection between two data terminal equipment (DTE) devices across a Frame Relay packet-switched network (PSN). The circuits are virtual because there is no direct electrical connection from one side to another side.
The connection is logical, and data moves from end to end, without a direct electrical circuit. With Virtual Circuits (VCs), Frame Relay shares the bandwidth among multiple users and any single site can communicate with any other single site without using multiple dedicated physical lines.
Bidirectional communication is possible on the single physical line due to the data-link connection identifier (DLCI). Using DLCI a number of virtual circuits can be multiplexed into a single physical circuit for transmission across the network. There are two types of VCs:
Switched Virtual Circuits (SVC): A switched virtual circuit (SVC) provides a temporary connection between two different network nodes until completion of a data transfer session, after which the connection is terminated. Svc has different states e.g. CALL SETUP, DATA TRANSFER, IDLE, and CALL TERMINATION.
Permanent Virtual Circuits (PVCs): A permanent virtual circuit (PVC) provides a dedicated permanent virtual circuit to the user but actually, this permanent virtual circuit ( PVC) is a part of a shared pool of circuit resources used to support multiple users as they require the connections. PVCs are more commonly implemented than SVCs.
Frame Relay creates a Virtual Circuit by storing input-port to output-port mapping in the memory of each switch and thus links one switch to another until a continuous path from one end of the circuit to the other is identified. A Virtual Circuit can pass through any number of intermediate devices (switches) located within the Frame Relay network.
Virtual Circuits (VCs) provide a bidirectional communication path from one device to another. VCs are known by DLCIs, as shown in Figure 1. DLCIs value is not unique in the Frame relay network due to its local implication. A DLCI identifies a VC to the equipment at an endpoint. So, a DLCI has no significance further than the single link. Devices connected by a VC may use a different DLCI value to refer to the same connection.
As we know that DLCIs are locally significant, so the same address can be used in several different locations while still referring to different connections. Local addressing also prevents a customer from running out of DLCIs as the network grows.
In Frame Relay Network, the frames moves across the network, Frame Relay labels each VC with a DLCI number. The DLCI number is stored in the address field of every frame transmitted to tell the network how the frame should be routed. Usually, DLCIs 0 to 15 and 1,008 to 1,023 are reserved. So the Frame Relay service providers typically assign DLCIs in the range of 16 to 1,007.
Challenge Handshake Authentication Protocol (CHAP) periodically checks the character of the far off hub utilizing a three-way handshake. The hostname on one switch must match the username the other switch has designed. The passwords should likewise coordinate. The password value is variable and changes unpredictably while the link exists.
When the PPP link establishment phase is complete, the local router sends a challenge message to the remote node containing Challenge Handshake Authentication Protocol (CHAP) user name and a hash value that is based on the Challenge Handshake Authentication Protocol (CHAP)Password.
The remote router compares the local routers username and password in its local database and calculates hash value with the value sent from local router. The remote node then responds with a calculated value using a one way hash function, usually with Message Digest 5 (MD5) based on the password and challenge message. The figure1 illustrates the CHAP 3 way handshake.
The local router checks the reaction against its own calculation of the likely hash value. In case of value match, the initiating node acknowledges the authentication; otherwise, the initiating node immediately terminates the connection.
Challenge Handshake Authentication Protocol (CHAP) provides better protection then PAP because it protects devices from playback attacks using a variable challenge value that is unique and unpredictable. The challenge and resulted hash value are unique and random. The use of repetitive challenges limits the time of vulnerability to any single attack. The local router or a third-party authentication server is in control of the frequency and timing of the challenges.
We have learnt in the previous section that CHAP periodically identifies the remote node using a three-way handshake. The hostname on one router should match the username the other router has configured. The passwords also required to match. This occurs on initial link establishment and can be repeated any time after the link has been established. The commands for configuring CHAP on R1 are the following:
Router R-1 (Local)
Router>enable
Router#config terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname R1
R1(config)#username R2 password Cisco
R1(config)# interface serial0/0/0
R1(config-if)#no shut
R1(config-if)# ip address 192.168.10.1 255.255.255.252
R1(config-if)# ipv6 address 2001:AD01:BD00::1/64
R1(config-if)# clock rate 64000
R1(config-if)#encapsulation PPP
R1(config-if)#ppp authentication chap
R1(config-if)#exit
Router R-2 (Remote)
Router>enable
Router#config terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname R2
R2(config)#username R2 password ccna12345
R2(config)# interface serial0/0/0
R2(config-if)#no shut
R2(config-if)# ip address 192.168.10.2 255.255.255.252
PPP support different option that can be configured optionally. One of these options is authentication. The authentication option provides a method to negotiate the use of a particular protocol for Authentication. By default, authentication is not required. Password Authentication Protocol (PAP) and Challenge Handshake Authentication Protocol (CHAP) can be used for PPP links authentication which is defined in RFC 1334
Password Authentication Protocol is a basic two-way process used to authenticate a user’s password. The username and password are sent in plain text without any encryption. If it is accepted, the connection is allowed. As an authentication protocol, PAP is the least secure because the password is sent in plain text.
The figure below illustrates the process of PAP. R1 sends its PAP user name and password to R2. R2 evaluate R1’s user name and password against its local database. If it matches, it accepts the connection and accepts the message. If not, it rejects the connection and sends a reject message.
The command “ppp authentication pap” is used for PPP authentication. When the command is entered, the username and password are sent as one LCP data packet. After PPP completes the link establishment phase, the remote node constantly sends a username with password across the link until the receiving node acknowledges the connection or terminates the connection.
The receiving node checked the username-password using an authentication server that either allows or denies the connection. If the connection is accepted, it sends the connection acknowledgement message otherwise it returned the reject message. Password Authentication Protocol authenticates only during establishing a connection, it never re-authenticate after connection establishment. This is a network vulnerability to the attacker; they can attack using this area.
Password Authentication Protocol can be used where a large installed base of client applications that do not support CHAP. Password Authentication Protocol can also be important between different vendor equipment, where implementations of CHAP are not compatible. It is also used where a plaintext password is necessary to simulate a login at the remote host
Configuring PAP Authentication
Now we know the basic information about PAP. We know that PAP is a two-way authentication protocol. Both routers authenticate and are authenticated. The PAP username and password that each router sends must match those configured with the username name password password command of the other router.
PAP only did authentication during initial link establishment. The hostname on one router must match the username the other router has configured for PPP. The passwords must also match. Specify the username and password parameters, The PAP configuration for the above topology is the following:-
Router R-1 (Remote Site)
Router>enable
Router#config terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname R1
R1(config)#username R2 password ccna12345
R1(config)# interface serial0/0/0
R1(config-if)#no shut
R1(config-if)# ip address 192.168.10.1 255.255.255.252
R1(config-if)# ipv6 address 2001:AD01:BD00::1/64
R1(config-if)# clock rate 64000
R1(config-if)#encapsulation PPP
R1(config-if)#ppp authentication pap
R1(config-if)#exit
Router R-2 (Central Site)
Router>enable
Router#config terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname R2
R2(config)#username R2 password ccna12345
R2(config)# interface serial0/0/0
R2(config-if)#no shut
R2(config-if)# ip address 192.168.10.2 255.255.255.252
Remember that HDLC is the default encapsulation protocol for Cisco routers. If PPP configuration is not done on Cisco routers, the default encapsulation will be used. To set PPP as the encapsulation method used by a serial interface we need PPP configuration on the serial interfaces. The PPP configuration for the below topology is following.
Router1
Router1#configure terminal
Router1(config)# interface serial 0/0/0
Router1(config-if)# encapsulation ppp
Router2
Router2#configure terminal
Router2(config)# interface serial 0/0/0
Router2(config-if)# encapsulation ppp
The encapsulation ppp interface command has no arguments. The figure billow illustrates that Router1 and Router2 have been configured with both an IPv4 and an IPv6 address on the serial interfaces. PPP is a Layer 2 encapsulation that supports different Layer 3 protocols.
Compression Configuration
The command syntax for compression configuration is “compress”. Compression can be configured after enabling PPP encapsulation on the serial interface of a Cisco router. This option invokes a software compression process; therefore it can affect system performance. If the traffic already contains compressed files, such as .zip, .tar, etc, never use this option. The command for configuration is as under:
Two keywords are available for “compress” command. With predictor keyword, the predictor algorithms are used. While stac is used for LSZ algorithms.
Link Quality PPP Configuration (LQM)
Quality is also the option of the LCP phase. LCP tests the link to verify whether the link quality is sufficient to use Layer 3 protocols or not. After configuring this option, the percentages are calculated for both incoming and outgoing directions. If the link quality percentage is not maintained, the link is supposed to be of poor quality and is taken down. The “ppp quality percentage” command is used to ensure that the link meets the quality requirement set; otherwise, the link closes down. The percentage range is from 1 to 100. The LQM configuration for the above network is as under:
PPP support different option than can be configured optionally. Authentication using PAP or CHAP, Compression using either Stacker or Predictor and Multilink that combines two or more channels to increase the WAN bandwidth. To negotiate these PPP options, the LCP link-establishment frames contain option information in the data field of the LCP frame, as shown in Figure 1. If LCP frame has no configuration option, then the default value for that configuration option is assumed. This phase is complete when a configuration acknowledgement frame has been exchanged. The configurable LCP options for specific WAN connection may include the following LCP options:
Authentication
This 16 bits long field with a code value of 0x03. This Configuration Option provides a method to negotiate the use of a particular protocol for Authentication. By default, authentication is not required. Password Authentication Protocol (PAP) and Challenge Handshake Authentication Protocol (CHAP) can be used for authentication.
Compression
Compression option is used to Increases the effective throughput on PPP links. Increasing throughput is possible due to reducing the amount of data in the frame that must travel across the link. The protocol decompresses the frame at the receiving side. Stacker and predictor protocols are used for this purpose.
Magic Number (Error Detection)
The Magic Number field is used for detecting links that are in a looped-back condition. It is responsible to ensure a reliable, and loop-free data link. Until the Magic-Number Configuration Option has been successfully negotiated, the Magic-Number must be transmitted as zero. Magic numbers are randomly generated number used to identify one end of a point-to-point connection. Each side of the link negotiates its magic number. If both sides discover that the magic numbers they are negotiating are the same, both side attempts to change its magic number. If the magic number remains the same after changing, the session terminates because of the loopback that is found.
PPP Callback
PPP callback option is used to improve security the in PPP links. Cisco router can act as a callback client or a callback server in the LCP option. The call back occurs at the beginning of a new PPP session. LCP includes the callback option and its settings. The client makes the opening call, requests for server call back, and terminates its call. The callback router answers the call and makes the return call to the client based on its configuration statements. The command is PPP callback [accept | request]. RFC-1570 further describes PPP callback.
Multilink
The multilink option is used for load balancing over the router interfaces that PPP uses. It is also referred to as MP, MPPP, and MLP. It provides a method for spreading traffic across multiple physical WAN links. Multilink indicates to its peers that it is capable of combining multiple physical links into a single bundle. A system indicates to its peer that it is prepared to do multilink by sending the multilink option as part of the initial LCP option negotiation.
When a PPP link has been initiated, the LCP passes control to the appropriate Network Control Protocol (NCP). NCP is a set of protocols forming a part of PPP. PPP is a data link layer protocol that can transmit multiprotocol data between two point-to-point.
PPP’s modular model allows LCP to set up the link and then transfer the details of a network protocol to a particular NCP. Each network protocol has a corresponding NCP and each NCP has a corresponding RFC. For example, IPv4, IP6, IPX, and many others have corresponding NCPs. These NCPs uses the same packet as the LCPs.
After the LCP configuration and authentication in the basic link, the inappropriate Network Control Protocol is calling on to complete the particular configuration of the network layer protocol being used. After the successful Network Control Protocol configuration of the network layer protocol, the network protocol is in the open state on the established LCP link. From there, PPP can carry the corresponding network-layer protocol packets.
Internet Protocol Control Protocol (IPCP)
When LCP has established the link, the routers exchange IPCP messages for option negotiation. IPCP is responsible for configuring, enabling, and disabling the IPv4 modules on both ends of the PPP link. The same responsibilities are allocated to IPV6CP for IPv6 address. IPCP negotiates two options:
Compression – Compression protocol allows devices to negotiate an algorithm to compress TCP and IP headers and save bandwidth. For compression, the Van Jacobson TCP/IP header compression is used. The Van Jacobson TCP/IP header compression compresses the size of the TCP/IP headers to 3 bytes. Which is the important improvement on slow serial lines, particularly for interactive traffic?This compression method is similar in concept to the Protocol-Field-Compression and Address-and-Control-Field-Compression (ACFC) options in LCP.
IP-Address-IP address allows the initiating device to send the Configure-Request. To specify an IP address it needs to use for routing IP over the PPP link or to request that the other device supply it with one. This is most commonly used for dial-up networking links before the advent of broadband technologies such as DSL and cable modem services.
After the Network Control Protocol process completion, the link goes into the open state and LCP gets the link in the maintenance phase. Link traffic contains possible combinations of LCP, NCP, and network-layer protocol packets. After completion of data transfer, Network Control Protocol terminates the protocol link and LCP terminates the PPP connection. The different NCPs are;
When two devices are first turned on, there is no physical layer connection between them. Once the connection is made, the link can continue to establish a PPP session. There are three phases of establishing a PPP session:
Phase 1: Link establishment and configuration negotiation
Before PPP exchanges any network layer datagrams, such as IP, the LCP must first perform the basic setup of the link. The sending device sends an LCP configuration request to a receiving device. Suppose sending device is A and receiving device is B. The B receive the configuration request message over the physical link, containing the parameters wishes to use.
If device B agrees with the parameters, it replies with an acknowledgement (Ack) otherwise sends negative acknowledgement (NACK) message. In the case of NACK, sending device tries different parameters with a new request. This phase is complete when the negotiation between both is successful. After the successful completion of Phase 1, the status goes to LCP open and proceed to the authentication phase.
Phase 2: Link quality determination
Link Quality determination is the second phase of the PPP session establishment. It as an optional phase in the PPP session. The LCP check the link quality to decide that the link is sufficient to bring up network-layer protocols. The LCP can delay data sending of network layer protocol information until this phase is complete.
After the link quality determination, the specific configuration of the appropriate network layer protocol is performed by invoking the suitable NCP, such as IPCP, IPXCP etc. If the LCP terminate the link, it informs the network-layer protocols so that they can take appropriate action. More than one NCP can be run on a particular PPP link, and each NCP can be terminate independently when it is no longer needed. The PPP link remains configured for communications until explicit LCP or NCP frames terminate the link, or until some outside event occurs.
LCP Operation
Link Control Protocol (LCP) is the main part of the PPP session. It is responsible for controlling the links in Point-to-Point Protocol (PPP) suite. It is implemented at Data Link Layer in the OSI model. LCP is used to automatically agree upon the encapsulation format, sizes of packets, looped-back link, and common misconfiguration errors. It is also responsible for connection termination. LCP operation uses three classes of LCP frames to accomplish the work of each of the LCP phases:
Link-establishment frames
Link-maintenance frames
Link-termination frames
Link Establishment
Link establishment is the first phase of LCP operation that must complete successfully, before exchanging any network layer packets. During link establishment, the LCP opens the connection and negotiates the configuration parameters. The initiating device starts link establishment by sending a Configure-Request frame to the responder. The frame contains a variable number of configuration options needed to set up on the link. The initiator includes the options for how it wants the link created, including protocol or authentication parameters.
The responder processes the request. If the options are not suitable or not recognized the responder sends a Configure-NAK or Configure-Reject In case if the negotiation fails, the initiator must restart the process with new options. If the options are suitable and acceptable, the responder replies with a Configure-Ack message and the process moves on to the next stage. Next stage is NCP operation. When NCP has completed configurations, authentication if configured, the line is available for data transfer. During the data exchange, LCP transitions into the link maintenance phase. Figure 1 illustrates the Link Establishment phase of LCP.
Link Maintenance
When the link is in the maintenance phase, LCP can test the link using test and feedback messages as shown in Figure 2.
Test Messages Frame. Echo-Request, Echo-Reply, and Discard-Request can be used for testing the link.
Feedback Messages Frame. Code-Reject and Protocol-Rejectframe types provide link feedback when one device receives an invalid frame due to unrecognized LCP code or a bad protocol identifier. Code-Reject packet is sent in response. The sending device will resend the packet.
Link Termination
The link remains open until the LCP terminates the link. If the LCP terminates the link before NCP, the NCP session is also terminated. NCP only terminates the network layer and NCP links. PPP can terminate the link at any time. PPP link termination can occur because of the loss of the carrier including authentication failure, link quality failure, the expiration of an idle-period timer, or the administrative closing of the link. For closing the link, LCP exchanged the Terminate packets.
The device that starts the shutdown process sends a Terminate-Request message. The other device replies with a Terminate-Ack. When the link is closing, PPP informs the network-layer protocols so that they may take suitable action.
LCP Packet
Figure 1 shows the fields in an LCP packet:
Code – This field is 8 bits long and identifies the type of LCP packet.
Identifier – The identifier is also 8 bits (one octet) long field in length and is used to match packet requests and replies.
Length – The length field is 16 bits long field in length and indicates the total length (including all fields) of the LCP packet.
Data – The data field is 0 or more bits in size as indicated by the length field. The format of this field is determined by the code field. Data field contains the information associated with the frame, which may be configuration options, frame information, or data.
Each LCP packet is a complete LCP message containing an LCP code, an identifier field, a length field indicating the size of the LCP packet and LCP packet type-specific data. Each LCP packet has a specific function in the exchange of configuration information depending on its packet type. The code field of the LCP packet defines the type of the packet. Different LCP packet types are:
Configure-Request – When the LCP Code field value is 0x01, it shows that the packet is the configure-request frame. This frame is used for opening or resetting a PPP connection. It contains a list of LCP option with changes to default values.
Configure-Ack – When the code field value is 0x02, it means that the frame is Configure-Ack field. This frame is sent when all of the value of the last configure-request received is recognized and acceptable. When both PPP peers send and receive Configure-Acks, the LCP negotiation is complete.
Configure-Nak – If the code field value is 0x03, it’s mean that the frame is Configure-NAK frame. This frame is sent When some LCP option is not acceptable and some option is acceptable. The frame includes the mismatching option and their acceptable values.
Configure-Reject – If the code field value is 0x04, the frame type is a Configure-Reject frame. This type of frame is sent when any LCP option is not recognized or accepted. This frame also includes the unrecognized or non-negotiable option.
Terminate-Request – if the code field value is 0x05, the frame is Terminate-Request frame. This frame is sent optionally for closing the PPP session.
Terminate-Ack – if the code field value is 0x06, the frame type is Terminate-Ack. This frame is sent in response to the Terminate-Request frame in PPP session.
Code-Reject – If the code field value is 0x07, the frame type is a Code-Reject frame. This frame is sent when the LCP code is unknown. The Code-Reject message also includes the rejected LCP packet.
Protocol-Reject – When a code field value is set to 0x08, the frame type is Protocol-Reject frame. It is sent when the PPP frame includes an unknown protocol ID. The Protocol-Reject message also includes the rejected LCP packet.
Echo-Request – If the code field value is 0x09, the frame type is Echo-Request. Echo-Request frame is sent optionally to test the PPP connection.
Echo-Reply – When a code field value is 0x0a, the frame type is Echo-Reply. This frame is sent in response to the Echo-Request frame. PPP Echo-Request and Echo-Reply frame are not related to the ICMP Echo-Request and Echo-Reply messages.
Discard-Request – if the code field value is 0x0b, the frame type is Discard-Request. This frame is optionally sent to exercise the link in the outbound direction.
A layered architecture is a logical model that aids in communication between interconnecting layers. We can map the Point-to-Point Protocol (PPP) layer model with the Open System Interconnection (OSI) model. Both Point-to-Point Protocol (PPP) and OSI models share the same physical layer although the Point-to-Point Protocol (PPP) distributes the functions of Link Control Protocol (LCP) and Network Control Protocol (NCP) differently.
We can configure a range of interfaces at the physical layer including Asynchronous serial, Synchronous serial, HSSI and ISDN. Point-to-Point Protocol (PPP) operates across any DTE/DCE interface including RS-232, RS-422, RS423 or V.35. The figure below illustrates the layered model of the Point-to-Point Protocol (PPP). LCP and NCP mostly work in the data-link layer and network layer. The LCP sets up the Point-to-Point Protocol (PPP) connection including connection parameters. It is also responsible for connection termination. The NCPs handle higher layer protocol configurations.
Link Control Protocol (LCP)
The Link Control Protocol (LCP) establishes, configures, and tests data-link connections. PPP send and receive LCP packet before establishing communications over a point-to-point link. The LCP packet may be accepted or rejected based on a linked peer, packet size and other configuration. The LCP packet checks the identity of its linked peer, sets the packet size limits, and also check for common configuration errors. Once the LCP packet accepts the link, traffic can be forwarded on the network. If the LCP packet found the link is not working correctly, it terminates the link. The LCP packet has three different types.
Link configuration packets
Link termination packets
Link maintenance packets
The LCP provides automatic configuration of the interfaces at each end. The LCP also negotiates and sets up control options on the WAN data link, which are handled by the NCPs. When the link is established, PPP also uses the LCP to agree automatically on encapsulation formats such as authentication, compression, and error detection.
Network Control Protocol (NCP)
Network Control Protocol (NCP) was an early protocol implemented by ARPANET. The ARPANET is the world’s first operational packet-switching network that later evolved into what became the Internet. Network Control Protocol (NCP) is the part of Point − to − Point Protocol (PPP). It is a data link layer protocol used for transmitting multi-protocol data between two point-to-point devices. PPP uses a separate NCP for each network layer protocol. For example, IPv6 uses the IPv6 Control Protocol (IPv6CP) and IPv4 uses IPv4 Control Protocol (IPCP). Each NCP manages the particular needs required by its relevant network-layer protocols. Different components of NCP encapsulate and negotiate options for multiple network-layer protocols.
NCP allowed access and use to remote devices at remote locations and to transmit files between devices and computers. NCP is the part of the protocol stack, and enabled application services such as email and file transfer. TCP/IP was replaced NCP in the 1980s.
Point-to-Point Protocol (PPP) Frame
PPP is a byte-oriented protocol. A PPP frame contains six fields. Each PPP frame is composed of one or more bytes. The fields of a PPP frame are illustrated in the figure below:-
Flag – Flag field marks the beginning and the end of the Point-to-Point Protocol (PPP) frame. It flags field standard HDLC field containing 8 bits. The bits pattern of the flag field is 01111110.
Address – It is a bit field that contains the binary sequence. In case of broadcast, the sequence is set to 11111111, PPP does not assign individual station addresses.
Control – This is a one-byte long field with the binary sequence 00000011. The value 00000011 shows that the frame does not contain any sequence numbers. It provides a connectionless link service for a point-to-point link. So, for PPP, the Address field is set to 0xFF, the broadcast address. If both Point-to-Point Protocol (PPP) peers agree to do address and control field compression during the LCP negotiation, the Address field is not included.
Protocol – Protocol field is either one bit or two bits long that identify the protocol encapsulated in the information field of the frame. If the field is 2-byte, the field identifies the protocol of the PPP payload. If both PPP peers agree for the compression of the protocol field during LCP negotiation, the Protocol field is reduced to one byte for the protocol identification. The up-to-date values of the Protocol field are specified in the most recent Assigned Numbers Request For Comments (RFC).
Data/Payload – Data field is variable in length. It specifies the kind of packet in the data field i.e. what is being carried in the data field. The data field can contain user data or other information. If the length is not negotiated using LCP during line setup, a default length of 1500 bytes is used.
Frame Check Sequence (FCS) – FSC stands for Frame Check Sequence. It is a 2 byte or 4 bytes frame check sequence for error detection. The 2-byte frame is standard; however, LCPs can negotiate modifications to the standard PPP frame structure.
PPP is WAN encapsulation protocol that was built in the 1990s. It is an open standard protocol so the protocol can be used with all vendors. Point to Point Protocol can work with Synchronous serial connection, Asynchronous serial connection, High-Speed Serial Interfaces (HSSI), ISDN interfaces (BRI and PRI) telephone lines, trunk lines, cellular telephones, specialized radio links, or fibre-optic links. Point to Point Protocol is provided dynamic addressing, authentication, callback and compression services. The protocol encapsulates multiple network layer protocols to pass theme over the same link. It also performs error detection, correction and quality check of link. PPP is supported single logical connection over several physical connections. PPP is reach feature protocol as compared to HDLC.
Point to Point Protocol is working on the data-link layer and was originally developed to encapsulate higher network-layer protocols to pass over synchronous and asynchronous communication lines. Point to Point Protocol can also establish other network standards, including network protocol multiplexing, session negotiation, and data-compression negotiation. It also supports protocols other than TCP/IP, such as IPX/SPX and DECnet. The PPP uses three components to transmit data over a serial point-to-point link. Each of the three components has separate function but requires the use of the other two to complete their tasks. The components are Framing, LCP and NCP. The components will be discussed in the next lessons.
Benefits of PPP
We know that PPP was originally designed as an encapsulation protocol for transporting TCP/IP traffic over point-to-point links. It provides a standard method for transporting multi-protocol packets over point-to-point links. PPP has many features that are not available in HDLC. The link quality management feature monitors the quality of the link. If too many errors occur, PPP takes the link down. PPP supports PAP and CHAP methods for authentication that will be explained in a later section. Other advantages of link-state are the following:-
Cost – The PPP links separate networks via the internet, which has been shown to help reduce cost by reducing the need for specialized hardware and software.
Easy Troubleshooting- Troubleshooting of point-to-point network is easy due to layered architecture because all layers are relevant to each other. So, one layer will troubleshoot and free itself from problems and then further troubleshooting determines easily which layers are having problems.
Resiliency – Traditional WAN technologies only uses sharing links for data communication between remote networks, but now the network can provide a significant level of flexibility. For example, users of WAN technologies can experience interruptions, which lead to loss of data. But on the internet, Protocol is used to automatically change the broken route all before they are arrive at their intended destination.
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
Cookie
Duration
Description
cookielawinfo-checkbox-analytics
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional
11 months
The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy
11 months
The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.