Control Network Protocol

Topics: Internet, Point-to-Point Protocol, Internet Protocol Pages: 7 (1935 words) Published: February 4, 2012

Sr.No.| Topics| Page no.|
2.| History| |
3.| Architecture| |
4.| Business oriented APPLICATION| |
5.| Comparision| |


A Network Control Protocol is a protocol that runs atop the Point-to-Point Protocol (PPP) and that is used to negotiate options for a network layer protocol running atop PPP. Network Control Protocols include the Internet Protocol Control Protocol for the Internet Protocol, the Internetwork Packet Exchange Control Protocol for the Internet Packet Exchange protocol, and the AppleTalk Control Protocol for AppleTalk This protocol operates on the Data Link layer.

Point to point protocol
In networking, the Point-to-Point Protocol (PPP) is a data link protocol commonly used in establishing a direct connection between two networking nodes. It can provide connection authentication, transmission encryption (using ECP, RFC 1968), and compression. PPP is used over many types of physical networks including serial cable, phone line, trunk line, cellular telephone, specialized radio links, and fiber optic links such as SONET. PPP is also used over Internet access connections (now marketed as "broadband"). Internet service providers (ISPs) have used PPP for customer dial-up access to the Internet, since IP packets cannot be transmitted over a modem line on their own, without some data link protocol. Two encapsulated forms of PPP, Point-to-Point Protocol over Ethernet (PPPoE) and Point-to-Point Protocol over ATM (PPPoA), are used most commonly by Internet Service Providers (ISPs) to establish a Digital Subscriber Line (DSL) Internet service connection with customers.

A PPP Network Control Protocol (NCP) for IP
The IP Control Protocol (IPCP) is responsible for configuring, enabling, and disabling the IP protocol modules on both ends of the point-to-point link. IPCP uses the same packet exchange machanism as the Link Control Protocol (LCP). IPCP packets may not be exchanged until PPP has reached the Network-Layer Protocol phase. IPCP packets received before this phase is reached should be silently discarded. The IP Control Protocol is exactly the same as the Link Control Protocol with the following exceptions: Data Link Layer Protocol Field

Exactly one IPCP packet is encapsulated in the Information field of PPP Data Link Layer frames where the Protocol field indicates type hex 8021 (IP Control Protocol). Code field
Only Codes 1 through 7 (Configure-Request, Configure-Ack, Configure-Nak, Configure-Reject, Terminate-Request, Terminate-Ack and Code-Reject) are used. Other Codes should be treated as unrecognized and should result in Code-Rejects. Timeouts

IPCP packets may not be exchanged until PPP has reached the Network-Layer Protocol phase. An implementation should be prepared to wait for Authentication and Link Quality Determination to finish before timing out waiting for a Configure-Ack or other response. It is suggested that an implementation give up only after user intervention or a configurable amount of time.


The Internet is made up of thousands of computer networks that are connected (networked) to each other. These connected computer networks are using the communication method called TCP/IP. 1957
During the Cold War, on October 4, 1957 the Soviet Union (now Russia) quietly launched its first spacecraft satellite called Sputnik into orbit. This launch challenged the United States Department of Defense to put a high priority on research and projects in science and technology and created an agency called ARPA (Advanced Research Projects Agency). 1961

The United States Air Force commissioned the Rand Corporation to proceed with a research project that consisted of protection and transfer of vital information in case of an attack in a nuclear war. 1962

Paul Baran of the Rand Corporation created the concept of dividing...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Session Initiation Protocol Essay
  • Internet Protocol Journal Essay
  • Computer Networks and the Internet Essay
  • Network Vulnerability and Security Essay
  • Network Management Essay
  • Essay on Homework Network and Concept
  • Essay about Lab Using Wireshark To View Network
  • Essay on Chapter08 review questions

Become a StudyMode Member

Sign Up - It's Free