Sr.No.| Topics| Page no.|
1.| INTRODUCTION| |
2.| History| |
3.| Architecture| |
4.| Business oriented APPLICATION| |
5.| Comparision| |
6.| FEATURES| |
7.| CONCLUSION| |
8.| BIBLIOGRAPHY| |
A Network Control Protocol is a protocol that runs atop the Point-to-Point Protocol (PPP) and that is used to negotiate options for a network layer protocol running atop PPP. Network Control Protocols include the Internet Protocol Control Protocol for the Internet Protocol, the Internetwork Packet Exchange Control Protocol for the Internet Packet Exchange protocol, and the AppleTalk Control Protocol for AppleTalk This protocol operates on the Data Link layer.
Point to point protocol
In networking, the Point-to-Point Protocol (PPP) is a data link protocol commonly used in establishing a direct connection between two networking nodes. It can provide connection authentication, transmission encryption (using ECP, RFC 1968), and compression. PPP is used over many types of physical networks including serial cable, phone line, trunk line, cellular telephone, specialized radio links, and fiber optic links such as SONET. PPP is also used over Internet access connections (now marketed as "broadband"). Internet service providers (ISPs) have used PPP for customer dial-up access to the Internet, since IP packets cannot be transmitted over a modem line on their own, without some data link protocol. Two encapsulated forms of PPP, Point-to-Point Protocol over Ethernet (PPPoE) and Point-to-Point Protocol over ATM (PPPoA), are used most commonly by Internet Service Providers (ISPs) to establish a Digital Subscriber Line (DSL) Internet service connection with customers.
A PPP Network Control Protocol (NCP) for IP
The IP Control Protocol (IPCP) is responsible for configuring, enabling, and disabling the IP protocol modules on both ends of the point-to-point link. IPCP uses the same packet exchange machanism as the Link Control Protocol (LCP). IPCP packets may not be exchanged until PPP has reached the Network-Layer Protocol phase. IPCP packets received before this phase is reached should be silently discarded. The IP Control Protocol is exactly the same as the Link Control Protocol with the following exceptions: Data Link Layer Protocol Field
Exactly one IPCP packet is encapsulated in the Information field of PPP Data Link Layer frames where the Protocol field indicates type hex 8021 (IP Control Protocol). Code field
Only Codes 1 through 7 (Configure-Request, Configure-Ack, Configure-Nak, Configure-Reject, Terminate-Request, Terminate-Ack and Code-Reject) are used. Other Codes should be treated as unrecognized and should result in Code-Rejects. Timeouts
IPCP packets may not be exchanged until PPP has reached the Network-Layer Protocol phase. An implementation should be prepared to wait for Authentication and Link Quality Determination to finish before timing out waiting for a Configure-Ack or other response. It is suggested that an implementation give up only after user intervention or a configurable amount of time.
The Internet is made up of thousands of computer networks that are connected (networked) to each other. These connected computer networks are using the communication method called TCP/IP. 1957
During the Cold War, on October 4, 1957 the Soviet Union (now Russia) quietly launched its first spacecraft satellite called Sputnik into orbit. This launch challenged the United States Department of Defense to put a high priority on research and projects in science and technology and created an agency called ARPA (Advanced Research Projects Agency). 1961
The United States Air Force commissioned the Rand Corporation to proceed with a research project that consisted of protection and transfer of vital information in case of an attack in a nuclear war. 1962
Paul Baran of the Rand Corporation created the concept of dividing...