Often termed as “PPP,” point to point protocol is a data link layer protocol which is used to set up a direct connection between two networking nodes. Below are some of the characteristics of PPP:

Characteristics of Point to Point Protocol

PPP basically redefines the format of the frame to be exchanged between two devices. Once the format is set, both of devices can exchange the packets easily.

Components of PPP

To make PPP a successful protocol, there are certain essential components which form the basic building blocks of this protocol.

1. Encapsulation in PPP

Point to point protocol encapsulates thenetwork layerpackets in its frames. The fact that PPP can encapsulate any network layer packet makes PPP layer three protocol independent and also capable of carrying multiple Layer three packets over a single link.

Link Control Protocol is the second component of PPP. The main purpose of LCP is to build and maintain data-link connections. Below are some of the functionalities of this sub-protocol:

2.1 PPP Authentication

PPP uses its Authentication method to identify the remote device.

Let’s say there are two routers R1 and R2. R1 has some data for R2 and wants to send the same to R2. But before sending the data, R1 just wants to make sure that the R2 is in Real “R2”. To authenticate its genuineness, R1 will initiate an authentication process in where R2 will have to prove its identity.

There are two authentication methods that PPP uses for authentication:

2.1.1 PAP (Password Authentication Protocol)

PAP authentication is a two steps process. It goes like this:

Scenario:Router two wants to authenticate itself to router one.

It should be noted that PAP authentication between two routers happens during the connection establishment only. Once the connection is already set up, no more sequential authentication is done for that particular session.

2.1.2 CHAP (Challenge Handshake Authentication Protocol)

Unlike PAP, CHAP is not only used for the initial connection set up but also, sequential authentication is performed to make sure that router is still communicating with the same host. If any sequential authentication is failed, the connection will be terminated immediately.

CHAP authentication is a three steps process. It goes like this (scenario remains the same as of PAP)

Point to Point Protocol

The advantage of using CHAP over PAP in PPP (point to point protocol) is that the actual password is never sent across the link. So anybody tapping the wire will never be able to reverse the hash to know the original password.

2.2 Compression

Link Control Protocol (LCP) uses compression to increase overall data transmission speed while saving bandwidth at the same time. LCP compresses data at the sending end and decompresses the same at the receiving end.

2.3 Error Detection

LCP utilizes a tool called LQM (Link Quality Monitoring) to monitor different interfaces for their error percentage. There is a threshold value that has been defined for each interface. If a faulty interface exceeds the threshold value, LCP disables that interface.

LCP can combine two physical links logically in such a way that they seem a single logical connection at layer three, i.e., the network layer. For example, if there are two connections of 128 Kbps then multilink will combine them in such a way that at layer three, they appear as one 256 Kbps connection.

you’re able to also think of multilink as link aggregation technology. However, with the multilink the chances of receiving the packets out of order, because of the multiple links, become high.

2.5 Loop Detection

Point to point protocol is also famous for detecting the looped connections. To detect a loop, a node, while sending the PPP LCP messages, might also tag along with a magic number. If the line is looped, the node will get back its sent magic number in return. Otherwise, the node gets the peer’s magic number.

3. Network Control Protocol (NCP)

We already know that PPP works indata link layerof the OSI model. The data which comes from the upper layers such asTransport Layeror Network Layer has to be fully compatible with the PPP. For the same purpose, NCP was discovered.

Don’t forget to read our complete coverage onComputer Networks.