Time
15 hours 34 minutes
Difficulty
Intermediate
CEU/CPE
16

Video Description

MODULE 6: Additional Layers and Protocols Point-to-Point Protocol Now that we've covered the main OSI Model layers, we're going to examine some additional protocols, and we begin with Point to Point Protocol. You'll learn the definition of Point-to-Point Protocol and the lower level protocols, what HTCL is and how they allow communication between proprietary systems. You'll learn how PPP authenticates user, how it performs compression, and what components its compresses and how that impacts bandwidth. We'll also discuss now PPP can view multiple links as one entity and when that occurs. And we'll also explain the difference between Network Control Protocol (NCP) and Internet Protocol Control Protocol (IPCP) and which is in use today.

Video Transcription

00:04
the next protocol that we're going to cover is point to point protocol
00:09
now.
00:10
Pointed point for a call is just a layer to encapsulation type.
00:15
The default encapsulation type on a serial interface is high level data link Clear Control, or HD Elsie.
00:23
However,
00:24
each vendors HDL see is proprietary to that vendor. So Cisco's SCLC's proprietary to Sisko
00:32
routers and junipers S. T. L. C. Will be proprietary to juniper.
00:37
So if Juniper and Cisco routers are connected to each other, they won't be able to talk
00:42
P P p or point to point Protocol, on the other hand,
00:46
is an open standard,
00:48
which means using PPP, you could connect a Cisco router to a juniper robber.
00:55
Now PPP provides other benefits that are are on top
01:00
that make it better than H. T. L. C.
01:02
One of those benefits is with Indication
01:06
Now.
01:07
Authentication is done because if to routers are connected over their cereal links or ran links,
01:14
you cannot always be sure
01:17
that
01:18
the person at the other end of the link is who they say they are.
01:22
Somebody could have unplugged your router at the other end, because these routers don't always sit next to each other and plugged in a malicious device.
01:32
BBP uses authentication to make sure
01:37
that the person at the other end of the link is who he say's years
01:42
or the router. At the other end of the link
01:45
is what it's supposed to be.
01:47
Now.
01:48
P. P P uses a sub protocol called link Control Protocol that handles the authentication phase off the PPP link establishment.
01:57
PBP can also do compression
02:01
on your data
02:04
or your I P headers.
02:06
Compression is a process where you take a large chunk of data
02:09
and you take redundant values within that data
02:14
and you set numbers for those values and you turn a large chunk of data into a smaller chunk of data, which is which saves bandwith
02:23
PPP. Also as the PPP multilink feature where you can configure PPP
02:30
two.
02:31
Look at multiple side by side physical links as one logical pipe. So, for example, if you have
02:39
three links and two from our
02:43
a megabyte per second apiece, one megabyte per second megabit per second a piece, you can configure PPP to look at these three links as one logical three megabit per second pipe.
02:55
Now, after the link is established,
03:00
so L c p controls the link establishment phase of p P p.
03:04
After that link is established, PPP can negotiate multiple Lear three routed protocols.
03:09
So I p is a route did protocol, not a routing protocol. It is what is carried in routing packets.
03:19
PPP has ability
03:21
to carry more than just I P. Now, however, that is not needed anymore because other routed protocols like Apple Talk and I P X don't exist anymore. But people he still has the ability to carry different routed protocols.
03:37
That function is controlled by another separate call called Network Control Protocol.
03:43
Now there are several types of network control particle
03:46
on the board here. The only type I've written is Internet Protocol Control Protocol, which enables PPP to carry I p information.
03:54
Since I P is the standard. Nowadays
03:58
we only need Internet control, Internet Protocol Control Protocol or I P C P. But back in the day, they used to be an i p X or Internet packet exchange CP Control Protocol. So Internet Packet exchange control protocol or capital talk control protocol.
04:15
Those don't exist anymore. So the only network control protocol we deal with
04:18
are is I PCP or Internet Internet protocol Control Protocol.
04:26
Now let's go to our lab and see how this works.

Up Next

Cisco CCNA

Our free, online, self-paced CCNA training teaches students to install, configure, troubleshoot and operate LAN, WAN and dial access services for medium-sized networks. You'll also learn how to describe the operation of data networks.

Instructed By

Instructor Profile Image
Junaid Memon
Instructor