SlideShare a Scribd company logo
HDLC & PPP
Presented By: KINZA RAZZAQ
HDLC HDLC(High-Level Data Link Control) is a group of
protocols or rules for transmitting data between
network points(nodes).
Working In HDLC, the date is organized into a unit(frame) and
sent across a network to a destination that verifies
it’s successful arrival.The HDLC protocol also
manages the flow or pacing(stepping) at which the
data is being sent
Features
HDLC is one of the most commonly used protocol and support full duplex
approach. Broadly HDLC features are as follows:
■ Reliable protocol
– selective repeat or go-back-N
■ Full-duplex communication
– receive and transmit at the same time
■ Bit-oriented protocol
– use bits to stuff flags occurring in data.
■ Flow control
– adjust window size based on receiver capability
■ Uses physical layer clocking and synchronization to send and receive
frames
Stations
STATIONS
PRIMARY
STATION
SECONDARY
STATION
COMBINED
STATION
Balanced & Unbalanced Mode
.
Primary
Secondary Secondary
Commands
Responses
Combined Combined
commands/Responses
Unbalanced Mode
Balanced mode
Frames
HDLC
FRAMES
U-frame I-frame S-frame
Point-to-point
Protocol
In computer
networking, Point-to-Point
Protocol (PPP) is a data
link (layer 2) protocol used to
establish a direct connection
between two nodes.
Connection
■ It connects two routers directly
without any host or any other
networking device in between.
■ It can provide
connection authentication,
transmission encryption.
Origin
■ PPP was designed somewhat after the original HDLC(High-Level Data
Link Control) specifications. The designers of PPP included many
additional features that had been seen only in proprietary(branded)
data-link protocols up to that time.
■ PPP was designed to work with numerous network layer protocols,
including Internet Protocol (IP), Novell's Internetwork Packet
Exchange (IPX), etc.
■ PPP is specified in RFC 1661.
Usage
■ PPP is used over many types of physical networks including serial
cable, phone line, trunk line, cellular telephone, specialized radio links,
and fiber optic links.
■ PPP is also used over Internet access connections.
■ Internet service providers (ISPs) have used PPP for customer dial-up
access to the Internet, since IP packets cannot be transmitted over
a modem line on their own, without some data link protocol.
Usage
■ PPP is commonly used as a data link layer protocol for connection
over synchronous and asynchronous circuits, where it has largely
superseded (outdated) the older Serial Line Internet Protocol (SLIP) and
telephone company mandated standards (such as Link Access Protocol,
Balanced (LAPB). The only requirement for PPP is that the circuit
provided be duplex.
■ Like SLIP, this is a full Internet connection over telephone lines via
modem. It is more reliable than SLIP because it double checks to make
sure that Internet packets arrive intact(complete). It resends any
damaged packets.
Derivatives
1
Point-to-Point Protocol over
Ethernet (PPPoE) is a method for
transmitting PPP
over Ethernet that is sometimes
used with DSL.
2
Point-to-Point Protocol over
ATM (PPPoA) is a method for
transmitting PPP
over ATM Adaptation(version) Layer 5
(AAL5), which is also a common
alternative to PPPoE used with DSL.
Components
■ PPP is a layered protocol that has three components:
1. An encapsulation component that is used to transmit
datagrams (unit of transfer) over the specified physical layer.
2. A Link Control Protocol (LCP) to establish, configure, and test the link
as well as negotiate capabilities.
3. One or more Network Control Protocols (NCP) used to negotiate
optional configuration parameters and facilities for the network layer.
There is one NCP for each higher-layer protocol supported by PPP.
Looped Link Detection
PPP detects looped links using a feature
involving magic numbers. When the node
sends PPP LCP messages, these messages
may include a magic number. If a line is
looped, the node receives an LCP message
with its own magic number, instead of getting
a message with the peer's magic number.
Configuration Options
■ Authentication - Peer routers exchange authentication messages. Two authentication
choices are Password Authentication Protocol (PAP) and Challenge Handshake
Authentication Protocol (CHAP).
■ Compression - Increases the effective throughput on PPP connections by reducing the
amount of data in the frame that must travel across the link. The protocol
decompresses the frame at its destination.
■ Error detection - Identifies fault conditions. The Quality and Magic Number options
help ensure a reliable, loop-free data link. The Magic Number field helps in detecting
links that are in a looped-back condition. Until the Magic-Number Configuration
Option has been successfully negotiated, the Magic-Number must be transmitted as
zero. Magic numbers are generated randomly at each end of the connection.
Line Activation & Phase
HDLC and Point to point protocol
Ad

More Related Content

What's hot (20)

Forouzan-ch19-Network-Layer-Logical-Addressing.ppt
Forouzan-ch19-Network-Layer-Logical-Addressing.pptForouzan-ch19-Network-Layer-Logical-Addressing.ppt
Forouzan-ch19-Network-Layer-Logical-Addressing.ppt
Jayaprasanna4
 
Transmission control protocol ...............................
Transmission control protocol ...............................Transmission control protocol ...............................
Transmission control protocol ...............................
SwatiHans10
 
Application layer
Application layer Application layer
Application layer
anonymous
 
Instruction format
Instruction formatInstruction format
Instruction format
Sanjeev Patel
 
Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)
Meenakshi Paul
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
Manoj Kumar
 
Ethernet
EthernetEthernet
Ethernet
sijil chacko
 
Link state routing protocol
Link state routing protocolLink state routing protocol
Link state routing protocol
Aung Thu Rha Hein
 
Unit 3 Network Layer PPT
Unit 3 Network Layer PPTUnit 3 Network Layer PPT
Unit 3 Network Layer PPT
KalpanaC14
 
TCP- Transmission Control Protocol
TCP-  Transmission Control Protocol TCP-  Transmission Control Protocol
TCP- Transmission Control Protocol
Akhil .B
 
Domain name system
Domain name systemDomain name system
Domain name system
Siddique Ibrahim
 
Selective repeat protocol
Selective repeat protocolSelective repeat protocol
Selective repeat protocol
Manusha Dilan
 
Tcp/ip model
Tcp/ip  modelTcp/ip  model
Tcp/ip model
Kumar Alok
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
Ramesh Giri
 
Computer networks unit v
Computer networks    unit vComputer networks    unit v
Computer networks unit v
JAIGANESH SEKAR
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
Shivani Godha
 
Sliding window protocol
Sliding window protocolSliding window protocol
Sliding window protocol
Shehara Abeythunga
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols
BE Smârt
 
Icmp
IcmpIcmp
Icmp
swarna sudha
 
IPv4
IPv4IPv4
IPv4
Dhiraj Mishra
 
Forouzan-ch19-Network-Layer-Logical-Addressing.ppt
Forouzan-ch19-Network-Layer-Logical-Addressing.pptForouzan-ch19-Network-Layer-Logical-Addressing.ppt
Forouzan-ch19-Network-Layer-Logical-Addressing.ppt
Jayaprasanna4
 
Transmission control protocol ...............................
Transmission control protocol ...............................Transmission control protocol ...............................
Transmission control protocol ...............................
SwatiHans10
 
Application layer
Application layer Application layer
Application layer
anonymous
 
Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)
Meenakshi Paul
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
Manoj Kumar
 
Unit 3 Network Layer PPT
Unit 3 Network Layer PPTUnit 3 Network Layer PPT
Unit 3 Network Layer PPT
KalpanaC14
 
TCP- Transmission Control Protocol
TCP-  Transmission Control Protocol TCP-  Transmission Control Protocol
TCP- Transmission Control Protocol
Akhil .B
 
Selective repeat protocol
Selective repeat protocolSelective repeat protocol
Selective repeat protocol
Manusha Dilan
 
Computer networks unit v
Computer networks    unit vComputer networks    unit v
Computer networks unit v
JAIGANESH SEKAR
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
Shivani Godha
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols
BE Smârt
 

Similar to HDLC and Point to point protocol (20)

Computer network
Computer networkComputer network
Computer network
SangeethaSasi1
 
Point-to-Point Protocol(PPP) CCN ppt
Point-to-Point Protocol(PPP) CCN pptPoint-to-Point Protocol(PPP) CCN ppt
Point-to-Point Protocol(PPP) CCN ppt
Niaz Shaikh
 
Ppp
PppPpp
Ppp
babugouda123
 
Ppp
PppPpp
Ppp
babugouda123
 
Point to-point-protocol
Point to-point-protocolPoint to-point-protocol
Point to-point-protocol
amigurumi21
 
Protocol.ppt
Protocol.pptProtocol.ppt
Protocol.ppt
amuthadeepa
 
Point to-point protocol (ppp)
Point to-point protocol (ppp)Point to-point protocol (ppp)
Point to-point protocol (ppp)
Kongu Engineering College, Perundurai, Erode
 
lect18.ppt
lect18.pptlect18.ppt
lect18.ppt
MitKumar2
 
Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point Protocol
Phan Vuong
 
Ppp
PppPpp
Ppp
Shankar Yadav
 
High level data link control and point to point protocol
High level data link control and point to point protocolHigh level data link control and point to point protocol
High level data link control and point to point protocol
sandhyakiran10
 
PPP(Point-to-Point Protocol): Components & Characteristics
PPP(Point-to-Point Protocol): Components & CharacteristicsPPP(Point-to-Point Protocol): Components & Characteristics
PPP(Point-to-Point Protocol): Components & Characteristics
Anuj Parajuli
 
UNIT II.ppt Computer networks protocol explanation
UNIT II.ppt Computer networks protocol explanationUNIT II.ppt Computer networks protocol explanation
UNIT II.ppt Computer networks protocol explanation
ssuseree2f04
 
High level data link control and point to point protocol.pptx
High level data link control and point to point protocol.pptxHigh level data link control and point to point protocol.pptx
High level data link control and point to point protocol.pptx
MullaiVendan8
 
CCNA CHAPTER 9 BY jetarvind kumar madhukar
CCNA CHAPTER 9 BY jetarvind kumar madhukarCCNA CHAPTER 9 BY jetarvind kumar madhukar
CCNA CHAPTER 9 BY jetarvind kumar madhukar
ALLCAD Services Pvt Limited
 
DLL Protocol.pptx
DLL Protocol.pptxDLL Protocol.pptx
DLL Protocol.pptx
ubaidullah75790
 
PPP (Point to Point Protocol)
PPP (Point to Point Protocol)PPP (Point to Point Protocol)
PPP (Point to Point Protocol)
Ali Jafar
 
PPP
PPPPPP
PPP
guest6206a05
 
Framing Protocols
Framing ProtocolsFraming Protocols
Framing Protocols
selvakumar_b1985
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
Atharaw Deshmukh
 
Point-to-Point Protocol(PPP) CCN ppt
Point-to-Point Protocol(PPP) CCN pptPoint-to-Point Protocol(PPP) CCN ppt
Point-to-Point Protocol(PPP) CCN ppt
Niaz Shaikh
 
Point to-point-protocol
Point to-point-protocolPoint to-point-protocol
Point to-point-protocol
amigurumi21
 
Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point Protocol
Phan Vuong
 
High level data link control and point to point protocol
High level data link control and point to point protocolHigh level data link control and point to point protocol
High level data link control and point to point protocol
sandhyakiran10
 
PPP(Point-to-Point Protocol): Components & Characteristics
PPP(Point-to-Point Protocol): Components & CharacteristicsPPP(Point-to-Point Protocol): Components & Characteristics
PPP(Point-to-Point Protocol): Components & Characteristics
Anuj Parajuli
 
UNIT II.ppt Computer networks protocol explanation
UNIT II.ppt Computer networks protocol explanationUNIT II.ppt Computer networks protocol explanation
UNIT II.ppt Computer networks protocol explanation
ssuseree2f04
 
High level data link control and point to point protocol.pptx
High level data link control and point to point protocol.pptxHigh level data link control and point to point protocol.pptx
High level data link control and point to point protocol.pptx
MullaiVendan8
 
PPP (Point to Point Protocol)
PPP (Point to Point Protocol)PPP (Point to Point Protocol)
PPP (Point to Point Protocol)
Ali Jafar
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
Atharaw Deshmukh
 
Ad

More from Kinza Razzaq (10)

Leadership in technology
Leadership in technologyLeadership in technology
Leadership in technology
Kinza Razzaq
 
Governance Analysis using enterprise architecture
Governance Analysis using enterprise architectureGovernance Analysis using enterprise architecture
Governance Analysis using enterprise architecture
Kinza Razzaq
 
Risk Management
Risk ManagementRisk Management
Risk Management
Kinza Razzaq
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
Kinza Razzaq
 
Internet wan
Internet wanInternet wan
Internet wan
Kinza Razzaq
 
The internet protocols and OSI Model
The internet protocols and OSI ModelThe internet protocols and OSI Model
The internet protocols and OSI Model
Kinza Razzaq
 
Operating system
Operating systemOperating system
Operating system
Kinza Razzaq
 
Point to point interconnect
Point to point interconnectPoint to point interconnect
Point to point interconnect
Kinza Razzaq
 
Data mining
Data miningData mining
Data mining
Kinza Razzaq
 
Recruitment and selection
Recruitment and selectionRecruitment and selection
Recruitment and selection
Kinza Razzaq
 
Leadership in technology
Leadership in technologyLeadership in technology
Leadership in technology
Kinza Razzaq
 
Governance Analysis using enterprise architecture
Governance Analysis using enterprise architectureGovernance Analysis using enterprise architecture
Governance Analysis using enterprise architecture
Kinza Razzaq
 
The internet protocols and OSI Model
The internet protocols and OSI ModelThe internet protocols and OSI Model
The internet protocols and OSI Model
Kinza Razzaq
 
Point to point interconnect
Point to point interconnectPoint to point interconnect
Point to point interconnect
Kinza Razzaq
 
Recruitment and selection
Recruitment and selectionRecruitment and selection
Recruitment and selection
Kinza Razzaq
 
Ad

Recently uploaded (20)

GiacomoVacca - WebRTC - troubleshooting media negotiation.pdf
GiacomoVacca - WebRTC - troubleshooting media negotiation.pdfGiacomoVacca - WebRTC - troubleshooting media negotiation.pdf
GiacomoVacca - WebRTC - troubleshooting media negotiation.pdf
Giacomo Vacca
 
Big_fat_report_from Kaspersky_IR_Report_2024.pdf
Big_fat_report_from Kaspersky_IR_Report_2024.pdfBig_fat_report_from Kaspersky_IR_Report_2024.pdf
Big_fat_report_from Kaspersky_IR_Report_2024.pdf
avreyjeyson
 
DEF CON 25 - Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the...
DEF CON 25 - Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the...DEF CON 25 - Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the...
DEF CON 25 - Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the...
werhkr1
 
30 Best WooCommerce Plugins to Boost Your Online Store in 2025
30 Best WooCommerce Plugins to Boost Your Online Store in 202530 Best WooCommerce Plugins to Boost Your Online Store in 2025
30 Best WooCommerce Plugins to Boost Your Online Store in 2025
steve198109
 
Paper: World Game (s) Great Redesign.pdf
Paper: World Game (s) Great Redesign.pdfPaper: World Game (s) Great Redesign.pdf
Paper: World Game (s) Great Redesign.pdf
Steven McGee
 
introduction to html and cssIntroHTML.ppt
introduction to html and cssIntroHTML.pptintroduction to html and cssIntroHTML.ppt
introduction to html and cssIntroHTML.ppt
SherifElGohary7
 
The AI Research Showdown: Perplexity vs Gemini
The AI Research Showdown: Perplexity vs GeminiThe AI Research Showdown: Perplexity vs Gemini
The AI Research Showdown: Perplexity vs Gemini
Abel Akara Ticha
 
Prop-154: Resizing of IPv4 assignments for IXPs
Prop-154: Resizing of IPv4 assignments for IXPsProp-154: Resizing of IPv4 assignments for IXPs
Prop-154: Resizing of IPv4 assignments for IXPs
APNIC
 
plataforma virtual E learning y sus características.pdf
plataforma virtual E learning y sus características.pdfplataforma virtual E learning y sus características.pdf
plataforma virtual E learning y sus características.pdf
valdiviesovaleriamis
 
an overview of information systems .ppt
an overview of  information systems .pptan overview of  information systems .ppt
an overview of information systems .ppt
DominicWaweru
 
Enums In the Wild at PHP[tek] Conference 2025
Enums In the Wild at PHP[tek] Conference 2025Enums In the Wild at PHP[tek] Conference 2025
Enums In the Wild at PHP[tek] Conference 2025
Dana Luther
 
OS-deadlock detection and recovery with additional features.ppt
OS-deadlock detection and recovery with additional features.pptOS-deadlock detection and recovery with additional features.ppt
OS-deadlock detection and recovery with additional features.ppt
Mangala R
 
The Hidden Risks of Hiring Hackers to Change Grades: An Awareness Guide
The Hidden Risks of Hiring Hackers to Change Grades: An Awareness GuideThe Hidden Risks of Hiring Hackers to Change Grades: An Awareness Guide
The Hidden Risks of Hiring Hackers to Change Grades: An Awareness Guide
russellpeter1995
 
Save TikTok Video Without Watermark - Tikcd
Save TikTok Video Without Watermark - TikcdSave TikTok Video Without Watermark - Tikcd
Save TikTok Video Without Watermark - Tikcd
Tikcd
 
Web3_Metaverse_Foundations - DTW Coppenhagen - FINAL - 230919.pdf
Web3_Metaverse_Foundations - DTW Coppenhagen - FINAL - 230919.pdfWeb3_Metaverse_Foundations - DTW Coppenhagen - FINAL - 230919.pdf
Web3_Metaverse_Foundations - DTW Coppenhagen - FINAL - 230919.pdf
Michael Lesniak
 
hy 2wdduv.pptxdcsvdbjdvbjhdvbjhdbvjhvdsvs
hy  2wdduv.pptxdcsvdbjdvbjhdvbjhdbvjhvdsvshy  2wdduv.pptxdcsvdbjdvbjhdvbjhdbvjhvdsvs
hy 2wdduv.pptxdcsvdbjdvbjhdvbjhdbvjhvdsvs
saimahadeshdigikit
 
Java developer-friendly frontends: Build UIs without the JavaScript hassle- JCON
Java developer-friendly frontends: Build UIs without the JavaScript hassle- JCONJava developer-friendly frontends: Build UIs without the JavaScript hassle- JCON
Java developer-friendly frontends: Build UIs without the JavaScript hassle- JCON
Jago de Vreede
 
TAIPAN99 PUSAT GAME AMAN DAN TERGACOR SE ASIA
TAIPAN99 PUSAT GAME AMAN DAN TERGACOR SE ASIATAIPAN99 PUSAT GAME AMAN DAN TERGACOR SE ASIA
TAIPAN99 PUSAT GAME AMAN DAN TERGACOR SE ASIA
TAIPAN 99
 
35 Must-Have WordPress Plugins to Power Your Website in 2025
35 Must-Have WordPress Plugins to Power Your Website in 202535 Must-Have WordPress Plugins to Power Your Website in 2025
35 Must-Have WordPress Plugins to Power Your Website in 2025
steve198109
 
Regional Development for an Open, Stable, and Secure Internet
Regional Development for an Open, Stable, and Secure InternetRegional Development for an Open, Stable, and Secure Internet
Regional Development for an Open, Stable, and Secure Internet
APNIC
 
GiacomoVacca - WebRTC - troubleshooting media negotiation.pdf
GiacomoVacca - WebRTC - troubleshooting media negotiation.pdfGiacomoVacca - WebRTC - troubleshooting media negotiation.pdf
GiacomoVacca - WebRTC - troubleshooting media negotiation.pdf
Giacomo Vacca
 
Big_fat_report_from Kaspersky_IR_Report_2024.pdf
Big_fat_report_from Kaspersky_IR_Report_2024.pdfBig_fat_report_from Kaspersky_IR_Report_2024.pdf
Big_fat_report_from Kaspersky_IR_Report_2024.pdf
avreyjeyson
 
DEF CON 25 - Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the...
DEF CON 25 - Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the...DEF CON 25 - Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the...
DEF CON 25 - Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the...
werhkr1
 
30 Best WooCommerce Plugins to Boost Your Online Store in 2025
30 Best WooCommerce Plugins to Boost Your Online Store in 202530 Best WooCommerce Plugins to Boost Your Online Store in 2025
30 Best WooCommerce Plugins to Boost Your Online Store in 2025
steve198109
 
Paper: World Game (s) Great Redesign.pdf
Paper: World Game (s) Great Redesign.pdfPaper: World Game (s) Great Redesign.pdf
Paper: World Game (s) Great Redesign.pdf
Steven McGee
 
introduction to html and cssIntroHTML.ppt
introduction to html and cssIntroHTML.pptintroduction to html and cssIntroHTML.ppt
introduction to html and cssIntroHTML.ppt
SherifElGohary7
 
The AI Research Showdown: Perplexity vs Gemini
The AI Research Showdown: Perplexity vs GeminiThe AI Research Showdown: Perplexity vs Gemini
The AI Research Showdown: Perplexity vs Gemini
Abel Akara Ticha
 
Prop-154: Resizing of IPv4 assignments for IXPs
Prop-154: Resizing of IPv4 assignments for IXPsProp-154: Resizing of IPv4 assignments for IXPs
Prop-154: Resizing of IPv4 assignments for IXPs
APNIC
 
plataforma virtual E learning y sus características.pdf
plataforma virtual E learning y sus características.pdfplataforma virtual E learning y sus características.pdf
plataforma virtual E learning y sus características.pdf
valdiviesovaleriamis
 
an overview of information systems .ppt
an overview of  information systems .pptan overview of  information systems .ppt
an overview of information systems .ppt
DominicWaweru
 
Enums In the Wild at PHP[tek] Conference 2025
Enums In the Wild at PHP[tek] Conference 2025Enums In the Wild at PHP[tek] Conference 2025
Enums In the Wild at PHP[tek] Conference 2025
Dana Luther
 
OS-deadlock detection and recovery with additional features.ppt
OS-deadlock detection and recovery with additional features.pptOS-deadlock detection and recovery with additional features.ppt
OS-deadlock detection and recovery with additional features.ppt
Mangala R
 
The Hidden Risks of Hiring Hackers to Change Grades: An Awareness Guide
The Hidden Risks of Hiring Hackers to Change Grades: An Awareness GuideThe Hidden Risks of Hiring Hackers to Change Grades: An Awareness Guide
The Hidden Risks of Hiring Hackers to Change Grades: An Awareness Guide
russellpeter1995
 
Save TikTok Video Without Watermark - Tikcd
Save TikTok Video Without Watermark - TikcdSave TikTok Video Without Watermark - Tikcd
Save TikTok Video Without Watermark - Tikcd
Tikcd
 
Web3_Metaverse_Foundations - DTW Coppenhagen - FINAL - 230919.pdf
Web3_Metaverse_Foundations - DTW Coppenhagen - FINAL - 230919.pdfWeb3_Metaverse_Foundations - DTW Coppenhagen - FINAL - 230919.pdf
Web3_Metaverse_Foundations - DTW Coppenhagen - FINAL - 230919.pdf
Michael Lesniak
 
hy 2wdduv.pptxdcsvdbjdvbjhdvbjhdbvjhvdsvs
hy  2wdduv.pptxdcsvdbjdvbjhdvbjhdbvjhvdsvshy  2wdduv.pptxdcsvdbjdvbjhdvbjhdbvjhvdsvs
hy 2wdduv.pptxdcsvdbjdvbjhdvbjhdbvjhvdsvs
saimahadeshdigikit
 
Java developer-friendly frontends: Build UIs without the JavaScript hassle- JCON
Java developer-friendly frontends: Build UIs without the JavaScript hassle- JCONJava developer-friendly frontends: Build UIs without the JavaScript hassle- JCON
Java developer-friendly frontends: Build UIs without the JavaScript hassle- JCON
Jago de Vreede
 
TAIPAN99 PUSAT GAME AMAN DAN TERGACOR SE ASIA
TAIPAN99 PUSAT GAME AMAN DAN TERGACOR SE ASIATAIPAN99 PUSAT GAME AMAN DAN TERGACOR SE ASIA
TAIPAN99 PUSAT GAME AMAN DAN TERGACOR SE ASIA
TAIPAN 99
 
35 Must-Have WordPress Plugins to Power Your Website in 2025
35 Must-Have WordPress Plugins to Power Your Website in 202535 Must-Have WordPress Plugins to Power Your Website in 2025
35 Must-Have WordPress Plugins to Power Your Website in 2025
steve198109
 
Regional Development for an Open, Stable, and Secure Internet
Regional Development for an Open, Stable, and Secure InternetRegional Development for an Open, Stable, and Secure Internet
Regional Development for an Open, Stable, and Secure Internet
APNIC
 

HDLC and Point to point protocol

  • 1. HDLC & PPP Presented By: KINZA RAZZAQ
  • 2. HDLC HDLC(High-Level Data Link Control) is a group of protocols or rules for transmitting data between network points(nodes).
  • 3. Working In HDLC, the date is organized into a unit(frame) and sent across a network to a destination that verifies it’s successful arrival.The HDLC protocol also manages the flow or pacing(stepping) at which the data is being sent
  • 4. Features HDLC is one of the most commonly used protocol and support full duplex approach. Broadly HDLC features are as follows: ■ Reliable protocol – selective repeat or go-back-N ■ Full-duplex communication – receive and transmit at the same time ■ Bit-oriented protocol – use bits to stuff flags occurring in data. ■ Flow control – adjust window size based on receiver capability ■ Uses physical layer clocking and synchronization to send and receive frames
  • 6. Balanced & Unbalanced Mode . Primary Secondary Secondary Commands Responses Combined Combined commands/Responses Unbalanced Mode Balanced mode
  • 8. Point-to-point Protocol In computer networking, Point-to-Point Protocol (PPP) is a data link (layer 2) protocol used to establish a direct connection between two nodes.
  • 9. Connection ■ It connects two routers directly without any host or any other networking device in between. ■ It can provide connection authentication, transmission encryption.
  • 10. Origin ■ PPP was designed somewhat after the original HDLC(High-Level Data Link Control) specifications. The designers of PPP included many additional features that had been seen only in proprietary(branded) data-link protocols up to that time. ■ PPP was designed to work with numerous network layer protocols, including Internet Protocol (IP), Novell's Internetwork Packet Exchange (IPX), etc. ■ PPP is specified in RFC 1661.
  • 11. Usage ■ PPP is used over many types of physical networks including serial cable, phone line, trunk line, cellular telephone, specialized radio links, and fiber optic links. ■ PPP is also used over Internet access connections. ■ Internet service providers (ISPs) have used PPP for customer dial-up access to the Internet, since IP packets cannot be transmitted over a modem line on their own, without some data link protocol.
  • 12. Usage ■ PPP is commonly used as a data link layer protocol for connection over synchronous and asynchronous circuits, where it has largely superseded (outdated) the older Serial Line Internet Protocol (SLIP) and telephone company mandated standards (such as Link Access Protocol, Balanced (LAPB). The only requirement for PPP is that the circuit provided be duplex. ■ Like SLIP, this is a full Internet connection over telephone lines via modem. It is more reliable than SLIP because it double checks to make sure that Internet packets arrive intact(complete). It resends any damaged packets.
  • 13. Derivatives 1 Point-to-Point Protocol over Ethernet (PPPoE) is a method for transmitting PPP over Ethernet that is sometimes used with DSL. 2 Point-to-Point Protocol over ATM (PPPoA) is a method for transmitting PPP over ATM Adaptation(version) Layer 5 (AAL5), which is also a common alternative to PPPoE used with DSL.
  • 14. Components ■ PPP is a layered protocol that has three components: 1. An encapsulation component that is used to transmit datagrams (unit of transfer) over the specified physical layer. 2. A Link Control Protocol (LCP) to establish, configure, and test the link as well as negotiate capabilities. 3. One or more Network Control Protocols (NCP) used to negotiate optional configuration parameters and facilities for the network layer. There is one NCP for each higher-layer protocol supported by PPP.
  • 15. Looped Link Detection PPP detects looped links using a feature involving magic numbers. When the node sends PPP LCP messages, these messages may include a magic number. If a line is looped, the node receives an LCP message with its own magic number, instead of getting a message with the peer's magic number.
  • 16. Configuration Options ■ Authentication - Peer routers exchange authentication messages. Two authentication choices are Password Authentication Protocol (PAP) and Challenge Handshake Authentication Protocol (CHAP). ■ Compression - Increases the effective throughput on PPP connections by reducing the amount of data in the frame that must travel across the link. The protocol decompresses the frame at its destination. ■ Error detection - Identifies fault conditions. The Quality and Magic Number options help ensure a reliable, loop-free data link. The Magic Number field helps in detecting links that are in a looped-back condition. Until the Magic-Number Configuration Option has been successfully negotiated, the Magic-Number must be transmitted as zero. Magic numbers are generated randomly at each end of the connection.
  翻译: