Preview

Control Network Protocol

Powerful Essays
Open Document
Open Document
1935 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Control Network Protocol
Index Sr.No. | Topics | Page no. | 1. | INTRODUCTION | | 2. | History | | 3. | Architecture | | 4. | Business oriented APPLICATION | | 5. | Comparision | | 6. | FEATURES | | 7. | CONCLUSION | | 8. | BIBLIOGRAPHY | |

INtroduction

A Network Control Protocol is a protocol that runs atop the Point-to-Point Protocol (PPP) and that is used to negotiate options for a network layer protocol running atop PPP. Network Control Protocols include the Internet Protocol Control Protocol for the Internet Protocol, the Internetwork Packet Exchange Control Protocol for the Internet Packet Exchange protocol, and the AppleTalk Control Protocol for AppleTalk
This protocol operates on the Data Link layer.

Point to point protocol
In networking, the Point-to-Point Protocol (PPP) is a data link protocol commonly used in establishing a direct connection between two networking nodes. It can provide connection authentication, transmission encryption (using ECP, RFC 1968), and compression.
PPP is used over many types of physical networks including serial cable, phone line, trunk line, cellular telephone, specialized radio links, and fiber optic links such as SONET. PPP is also used over Internet access connections (now marketed as "broadband"). Internet service providers (ISPs) have used PPP for customer dial-up access to the Internet, since IP packets cannot be transmitted over a modem line on their own, without some data link protocol. Two encapsulated forms of PPP, Point-to-Point Protocol over Ethernet (PPPoE) and Point-to-Point Protocol over ATM (PPPoA), are used most commonly by Internet Service Providers (ISPs) to establish a Digital Subscriber Line (DSL) Internet service connection with customers.

A PPP Network Control Protocol (NCP) for IP
The IP Control Protocol (IPCP) is responsible for configuring, enabling, and disabling the IP protocol modules on both ends of the point-to-point link. IPCP uses the same packet



Bibliography: 1957 During the Cold War, on October 4, 1957 the Soviet Union (now Russia) quietly launched its first spacecraft satellite called Sputnik into orbit

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Being made up of various parts each layer has a unique function in the network. Additionally, each layer incorporates things to the data which is transmitted from one point to the other. The protocols which work on this layer are HDLC, PPP as well as the frame relay protocol. HDLC protocol means High-Level Data Link Control protocol. An additional protocol which works on layers of the OSI model is the Point-to-Point protocol (PPP) that is just like HDLS protocol. The frame relay protocol works at the data links layer of the OSI model (Cisco, 2008).…

    • 254 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    nt1210 lab 7.1-3

    • 420 Words
    • 3 Pages

    1. PPP is the directional movement of data between nodes, you use it to move data to specific places.…

    • 420 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    NT1210Unit3Lab3

    • 1288 Words
    • 4 Pages

    Exercise 3.3.3 The most common protocols used from this suite are IP, TCP, and UDP. Briefly describe the purpose and functions of each of these.…

    • 1288 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Gives system addressing and routing, and does so in such a manner as additionally to give a regular address space across numerous lower-level protocols. This makes conceivable the interconnection of systems that describes the Internet. The IP protocol works at this level.…

    • 1263 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 8 Assignment 1

    • 349 Words
    • 1 Page

    Dynamic Host Configuration Protocol: A TCP/IP protocol that uses a client-and-server model of communication, with messages that allow a client to ask the server to loan or lease to the client the use of an IP address for some period of time.…

    • 349 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Nt2460 Unit 1 Assignment

    • 762 Words
    • 4 Pages

    The most common use of private addresses is in residential networks, since most Internet service providers (ISPs) only allocate a single publicly routable IP address to each residential customer, but many homes have more than one computer or other Internet connected device, such as smartphones. In this situation, a network address translator (NAT/PAT) gateway is usually used to provide Internet connectivity to multiple hosts.…

    • 762 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    TCP / IP Model - provides end-to-end connectivity specifying how data should be formatted, addressed, transmitted, routed and received at the destination. This functionality has been organized into four abstraction layers which are used to sort all related protocols according to the scope of networking involved.[1][2] From lowest to highest, the layers are the link layer, containing communication technologies for a single network segment (link), the internet layer, connecting hosts across independent networks, thus establishing internetworking.…

    • 559 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    DHCP With an increase in TCP/IP nets the ability to assign IP client tactics regularly for a careful time period has relieved the sore procedure of IP address organization. Network managers can now mechanize and switch from a dominant location the job of IP address patterns using the Dynamic Host Control Protocol.…

    • 453 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    AIS Review Sheet

    • 2832 Words
    • 12 Pages

    6) TCP/IP: The Transmission Control Protocol specifies the procedures for dividing files and documents into packets to be sent over the Internet and the methods for reassembly of the original document or file at the destination. The Internet Protocol specifies the structure of those packets and how to route them to the proper destination.…

    • 2832 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    NT 1210

    • 401 Words
    • 2 Pages

    Dynamic Host Configuration Protocol– A TCP/IP protocol that uses a client and server model of communication, with messages that allow a client to ask the server to loan or lease to the client the use of an IP address for some period of time.…

    • 401 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    B. Some of these protocols are DOCSIS (Data over Cable Service Interface Specification), ISDN (Integrated Services Digital Network), PPP (Point to Point Protocol), PoS (Packet over SONET/SDH), and SDLC (Synchronous Data Link Control).…

    • 426 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It 240 Appendix F

    • 260 Words
    • 2 Pages

    Transmission Control Protocol / Internet Protocol (TCP/IP) TCP is the protocol used in networking that provides a connection-oriented, reliable way for applications to communicate large amount of data at one time over a network. IP is a connectionless protocol responsible for addressing network devices, and routing packets between…

    • 260 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The Network Layer, as with the previous layers, has its own protocols. In this case we’ll use the Internet Protocol, or IP. IP determines the next destination as the message is routed through the network, places the TCP packet inside an IP packet along with any additional required data and passes in on to the Data Link Layer.…

    • 686 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    - It is a network of networks that consists of millions of private, public, academic, business, and government networks, of local to global scope, that are linked by a broad array of electronic, wireless and optical networking technologies.…

    • 10013 Words
    • 41 Pages
    Powerful Essays
  • Powerful Essays

    * Network protocols are the rules and standards governing the design of hardware and software that permit users of networks manufactured by different vendors to communicate and share data. Without protocols, data transmission between two incompatible systems would be impossible. Protocols facilitate the physical connection between the network devices. Protocols also synchronize the transfer of data between physical devices. They provide a basis for error checking and measuring network performance. They promote compatibility among network devices. Lastly, they promote network designs that are flexible, expandable, and cost-effective.…

    • 4051 Words
    • 17 Pages
    Powerful Essays