Logo

Navigation
  • Home
  • Services
    • ERP Solutions
    • Implementation Solutions
    • Support and Maintenance Solutions
    • Custom Solutions
    • Upgrade Solutions
    • Training and Mentoring
    • Web Solutions
    • Production Support
    • Architecture Designing
    • Independent Validation and Testing Services
    • Infrastructure Management
  • Expertise
    • Microsoft Development Expertise
    • Mobile Development
    • SQL Server Database and BI
    • SAP BI, SAP Hana, SAP BO
    • Oracle and BI
    • Oracle RAC
  • Technical Training
    • Learn Data Management
      • Business Intelligence
      • Data Mining
      • Data Modeling
      • Data Warehousing
      • Disaster Recovery
    • Learn Concepts
      • Application Development
      • Client Server
      • Cloud Computing Tutorials
      • Cluster Computing
      • CRM Tutorial
      • EDI Tutorials
      • ERP Tutorials
      • NLP
      • OOPS
      • Concepts
      • SOA Tutorial
      • Supply Chain
      • Technology Trends
      • UML
      • Virtualization
      • Web 2.0
    • Learn Java
      • JavaScript Tutorial
      • JSP Tutorials
      • J2EE
    • Learn Microsoft
      • MSAS
      • ASP.NET
      • ASP.NET 2.0
      • C Sharp
      • MS Project Training
      • Silverlight
      • SQL Server 2005
      • VB.NET 2005
    • Learn Networking
      • Networking
      • Wireless
    • Learn Oracle
      • Oracle 10g
      • PL/SQL
      • Oracle 11g Tutorials
      • Oracle 9i
      • Oracle Apps
    • Learn Programming
      • Ajax Tutorial
      • C Language
      • C++ Tutorials
      • CSS Tutorial
      • CSS3 Tutorial
      • JavaScript Tutorial
      • jQuery Tutorial
      • MainFrame
      • PHP Tutorial
      • VBScript Tutorial
      • XML Tutorial
    • Learn Software Testing
      • Software Testing Types
      • SQA
      • Testing
  • Career Training
    • Career Improvement
      • Career Articles
      • Certification Articles
      • Conflict Management
      • Core Skills
      • Decision Making
      • Entrepreneurship
      • Goal Setting
      • Life Skills
      • Performance Development
      • Personal Excellence
      • Personality Development
      • Problem Solving
      • Relationship Management
      • Self Confidence
      • Self Supervision
      • Social Networking
      • Strategic Planning
      • Time Management
    • Education Help
      • Career Tracks
      • Essay Writing
      • Internship Tips
      • Online Education
      • Scholarships
      • Student Loans
    • Managerial Skills
      • Business Communication
      • Business Networking
      • Facilitator Skills
      • Managing Change
      • Marketing Management
      • Meeting Management
      • Process Management
      • Project Management
      • Project Management Life Cycle
      • Project Management Process
      • Project Risk Management
      • Relationship Management
      • Task Management
      • Team Building
      • Virtual Team Management
    • Essential Life Skills
      • Anger Management
      • Anxiety Management
      • Attitude Development
      • Coaching and Mentoring
      • Emotional Intelligence
      • Stress Management
      • Positive Thinking
    • Communication Skills
      • Conversation Skills
      • Cross Culture Competence
      • English Vocabulary
      • Listening Skills
      • Public Speaking Skills
      • Questioning Skills
    • Soft Skills
      • Assertive Skills
      • Influence Skills
      • Leadership Skills
      • Memory Skills
      • People Skills
      • Presentation Skills
    • Finding a Job
      • Etiquette Tips
      • Group Discussions
      • HR Interviews
      • Interview Notes
      • Job Search Tips
      • Resume Tips
      • Sample Resumes
 

Point to Point Protocol (PPP)

By Exforsys | on March 6, 2008 |
Networking

Point to Point Protocol (PPP)

The Point to Point Protocol is a platform that is used to connect any individual computer or a network to the internet service provider. The connection is established between two points only and that is why it is called Point to Point Protocol. The PPP is considered be the only best solution for connecting computers on the internet.

The basic architecture of the PP is layered and the bottommost layer is the LCP or the Link Control Protocol. The Link Control Protocol is responsible for establishing the connection. The Internet Packet control protocol or the IPCP send and receives the packets over the link established by the Link Control Protocol or the LCP.

PPP Features

• The PPP follows an address notification system and using this IP address the dial up client works and the IP address established for the particular link is also requested by there networks. All this takes place automatically in the PPP.

• The PPP provides two methods of authentication; one is the Password Authentication Protocol that uses a password to authenticate or the Challenge Handshake Authentication Protocol which uses the handshake of the server with the dial up as an authentication.

• The PPP allows different types of protocols to function on its platform and on the same link.

• The PPP also additionally checks the link established by the protocol and includes something called the link level echo facility which checks if the link is operating properly.

The main tasks of the Point to Point Protocol are to check if the condition of the line or the telephone line that it is operating on is OK. The Point to Point Protocol also checks the password and after going through all these initial checks it establishes the connection with the internet service provider servers and requests for an IP address.

This IP address is used by the PPP on the internet to communicate with all other network protocols and servers as long as the connection lasts. The PPP also transports the packets of information from one server to the other and uses the same IP address to address the computer which has requested for the information.

PPP Frames

There are many protocols that are included in the PPP frame that work in tandem to send and receive data on a network. The packages of data that are being sent and received on the network is called frame. The Point to Point Protocol usually follows a general and a standard format for all the frames that it sends or receives.

In order to understand the network and its functionalities and later trouble shoot a network administrator should be able to understand these frames to be able to diagnose issues related to the protocols.

The Point to Point Protocol follows specified set of formats for different purposes on the network. The formats that are commonly used by the Point to Point Protocol are Link Control Protocol, and other authentication protocols like PAP and CHAP. The Point to Point Protocol also has a varied version called the PPP multilink protocol. All these protocols are used to transport the small bits of data over the link.

Among these three protocols the Link Control Protocol can handle different sizes of packets and information. It also authenticates the peer on the link by recognizing the information that is being sent on the link. This is a helpful feature when there is no authentication procedure is being used and the authentication takes place whiles the handshake itself. The Link Control Protocol also multiplexes and encapsulates information.

« « Internet Protocols (IP)
Fiber Distributed Data Interface (FDDI) » »

Author Description

Avatar

Editorial Team at Exforsys is a team of IT Consulting and Training team led by Chandra Vennapoosa.

Free Training

RSSSubscribe 394 Followers
  • Popular
  • Recent
  • Asynchronous Transfer Mode (ATM) Switching

    February 13, 2008 - 0 Comment
  • Tree Topology

    March 4, 2008 - 0 Comment
  • Bus Topology

    February 21, 2008 - 0 Comment
  • Internet Protocols (IP)

    March 5, 2008 - 0 Comment
  • Network Designs

    February 24, 2008 - 0 Comment
  • Fiber Distributed Data Interface (FDDI)

    March 6, 2008 - 0 Comment
  • Network Management

    February 24, 2008 - 0 Comment
  • Synchronous Data Link Control (SDLC)

    March 13, 2008 - 0 Comment
  • Linux Thin Client Networks Design and Deployment

    October 2, 2009 - 0 Comment
  • Network Topology

    February 25, 2008 - 0 Comment
  • How to use Hashes to Ensure Integrity

    November 30, 2011 - 0 Comment
  • Data Protection Protocols

    November 30, 2011 - 0 Comment
  • How to Effectively Protect Your System

    November 28, 2011 - 0 Comment
  • Network Security Firewall and Architecture

    November 26, 2011 - 0 Comment
  • Preventing Network Intrusion

    November 24, 2011 - 0 Comment
  • Creating and Developing Security Policies

    November 23, 2011 - 0 Comment
  • Linux Thin Client Networks Design and Deployment

    October 2, 2009 - 0 Comment
  • High Level Data Link Control (HDLC)

    March 29, 2008 - 0 Comment
  • IPv6

    March 20, 2008 - 0 Comment
  • High-Speed Serial Interface (HSSI)

    March 20, 2008 - 0 Comment

Exforsys e-Newsletter

ebook
 

Related Articles

  • How to use Hashes to Ensure Integrity
  • Data Protection Protocols
  • How to Effectively Protect Your System
  • Network Security Firewall and Architecture
  • Preventing Network Intrusion

Latest Articles

  • Project Management Techniques
  • Product Development Best Practices
  • Importance of Quality Data Management
  • How to Maximize Quality Assurance
  • Utilizing Effective Quality Assurance Strategies
  • Sitemap
  • Privacy Policy
  • DMCA
  • Trademark Information
  • Contact Us
© 2023. All Rights Reserved.IT Training and Consulting
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.AcceptReject Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT