Why ppp protocol




















Software Engineering. Web Technology. Cyber Security. C Programming. Control System. Data Mining. Data Warehouse. Javatpoint Services JavaTpoint offers too many high quality services. Services provided by PPP It defines the format of frames through which the transmission occurs.

It defines the link establishment process. If user establishes a link with a server, then "how this link establishes" is done by the PPP protocol. It defines data exchange process, i. The main feature of the PPP protocol is the encapsulation. It defines how network layer data and information in the payload are encapsulated in the data link frame.

It defines the authentication process between the two devices. The authentication between the two devices, handshaking and how the password will be exchanged between two devices are decided by the PPP protocol. It has a very simple error control mechanism. As PPP provides point-to-point communication, so it lacks addressing mechanism to handle frames in multipoint configuration. PPP has two main uses which are given below: It is widely used in broadband communications having heavy loads and high speed.

For example, an internet operates on heavy load and high speed. It is used to transmit the multiprotocol data between the two connected point-to-point computers. It is mainly used in point-to-point devices, for example, routers are point-to-point devices where PPP protocol is widely used as it is a WAN protocol not a simple LAN ethernet protocol. The flag field is a 1-byte field that appears at the beginning and the ending of the frame.

The pattern of the flag is similar to the bit pattern in HDLC, i. Address: It is a 1-byte field that contains the constant value which is These 8 ones represent a broadcast message. Control: It is a 1-byte field which is set through the constant value, i. It is not a required field as PPP does not support the flow control and a very limited error control mechanism.

The control field is a mandatory field where protocol supports flow and error control mechanism. Protocol: It is a 1 or 2 bytes field that defines what is to be carried in the data field. The data can be a user data or other information. Payload: The payload field carries either user data or other information. The maximum length of the payload field is bytes. Checksum: It is a bit field which is generally used for error detection. Transition phases of PPP protocol The following are the transition phases of a PPP protocol: Dead: Dead is a transition phase which means that the link is not used or there is no active carrier at the physical layer.

Establish: If one of the nodes starts working then the phase goes to the establish phase. Whenever a connection reaches this phase, then the exchange of data packets can be started. The Connection remains in this phase until one of the endpoints in the communication terminates the connection.

In this phase, the connection is terminated. There is an exchange of several packets between two ends for house cleaning and then closing the link. Basically, PPP is a layered protocol. There are three components of the PPP protocol and these are as follows:. This protocol is mainly responsible for establishing, maintaining, configuring, and terminating the links. The link control protocol provides the negotiation mechanism in order to set the options between the two endpoints.

Both endpoints of the link must need to reach an agreement about the options before the link can be established. This protocol plays a very important role in the PPP protocol because the PPP is designed for use over the dial-up links where the verification of user identity is necessary.

Thus this protocol is mainly used to authenticate the endpoints for the use of other services. The Network Control Protocol is mainly used for negotiating the parameters and facilities for the network layer.

For every higher-layer protocol supported by PPP protocol; there is one Network control protocol. Learn Core Java. Java Examples Java 8 Java 11 Java HTML 5 Interactive.

CSS Interactive. C Language. Advanced Data Structure. Operating System. Computer Network. Computer Architecture. Android Development. Game Development. The receiver on receiving the message removes the escape byte before passing it onto the network layer. Rishi Rathor. Previous Page Print Page. Next Page. Dashboard Logout.



0コメント

  • 1000 / 1000