• Skip to main content
  • Skip to primary sidebar
  • Skip to secondary sidebar
  • Skip to footer

Computer Notes

Library
    • Computer Fundamental
    • Computer Memory
    • DBMS Tutorial
    • Operating System
    • Computer Networking
    • C Programming
    • C++ Programming
    • Java Programming
    • C# Programming
    • SQL Tutorial
    • Management Tutorial
    • Computer Graphics
    • Compiler Design
    • Style Sheet
    • JavaScript Tutorial
    • Html Tutorial
    • Wordpress Tutorial
    • Python Tutorial
    • PHP Tutorial
    • JSP Tutorial
    • AngularJS Tutorial
    • Data Structures
    • E Commerce Tutorial
    • Visual Basic
    • Structs2 Tutorial
    • Digital Electronics
    • Internet Terms
    • Servlet Tutorial
    • Software Engineering
    • Interviews Questions
    • Basic Terms
    • Troubleshooting
Menu

Header Right

Home » Networking » Services » What are the ADSL Protocols?
Next →
← Prev

What are the ADSL Protocols?

By Dinesh Thakur

The user generates IP packets, it is necessary to transport these IP packets to the ADSL modem. For this, we use an Ethernet frame, a PPP frame, a USB frame, or a superposition of these frames as a PPP frame encapsulated in an Ethernet frame or a PPP frame encapsulated in a USB frame.

Take the example of IP packets encapsulated in an Ethernet frame. This frame is sent either over an Ethernet network connecting the client PC to the modem or in a PPP frame to a USB type interface. In the ADSL modem is uncap the frame to retrieve the IP packet and encapsulate it again, but this time in an ATM frame. This fragmentation into pieces of 48 bytes is achieved through an AAL-5 layer (ATM Adaptation Layer type 5).

After arrival in the frame ATM DSLAM, several scenarios can Next introduce the architecture of the ISP network to which the client is connected. a first solution is to uncap the ATM cells and recover the IP packet is transmitted to the hub in an Ethernet frame. The hub sends to the ISP also in an Ethernet frame. A second solution is to let form ATM frames. This is the case when the operator of the local loop and ISPs use the same technology. In this case, the ATM cell is sent directly to the hub, which acts as the ATM switch. It sends the ATM frames through virtual circuits to BAS (Broadband Access Server), which are intermediate equipment to access networks of alternative ISP.
These topologies are illustrated in Figure.

Concentration equipment between the user and the server
Another solution, which is also widely used, is to place the starting IP packet in a PPP frame and retaining said frame along the path, even in the encapsulate other frames. This gave birth to the PPPoE (PPP over Ethernet) in the where the PPP frame is sent to Ethernet. PPP frame may be encapsulated in ATM several frames after being cut into pieces of 48 octets through the AAL-5 protocol.
The advantage of keeping the PPP frame along the way is to encapsulate it in an L2TP tunnel, as we shall see.

L2TP

To realize communication between BAS and servers, a tunneling protocol must be implemented since this path may be considered to be taken by all packets or frames from different DSLAMs and going to the same server. Tunneling is a common technique, which looks like a virtual circuit. The three protocols are used for this PPTP (point-to-point tunneling protocol), L2F (Layer 2 Forwarding) and L2TP (Layer 2 Tunneling Protocol). These protocols allow the user authentication, dynamic address assignment, encryption of data and possibly compression.
The most recent protocol, L2TP, hardly support scaling, or scalability, and fails to properly handle and fast enough a number of flows in excess of the average values. In this case, is added L2TP access concentrator LAC or (L2TP Access Concentrator), which recover all clients from a single DSLAM and going to the same DOWN and multiplex on the same virtual circuit.
The figure illustrates the protocol architecture of a communication from a PC to a server located in a different ISP network from that of the input operator. The PC works under TCP / IP and is connected to a DSL modem via an Ethernet network.

Architecture protocol ADSL communication

You’ll also like:

  1. What is ADSL (Asymmetric Digital Subscriber Line)? – Definition
  2. TCP/IP Services And Application Protocols
  3. Routing Protocols
  4. Ad-Hoc Networks Routing Protocols
  5. What are Network Protocols? – Definition
Next →
← Prev
Like/Subscribe us for latest updates     

About Dinesh Thakur
Dinesh ThakurDinesh Thakur holds an B.C.A, MCDBA, MCSD certifications. Dinesh authors the hugely popular Computer Notes blog. Where he writes how-to guides around Computer fundamental , computer software, Computer programming, and web apps.

Dinesh Thakur is a Freelance Writer who helps different clients from all over the globe. Dinesh has written over 500+ blogs, 30+ eBooks, and 10000+ Posts for all types of clients.


For any type of query or something that you think is missing, please feel free to Contact us.


Primary Sidebar

Internet

Internet Terminology

    • Internet - Home
    • Internet - Email
    • Internet - www
    • Internet - Telnet
    • Internet - Architecture
    • Internet - FTP
    • Internet - HTTP
    • Internet - MIME
    • Internet - SMTP
    • Internet - DNS
    • Internet - POP3
    • Internet - Intranet
    • Internet - SNMP
    • Internet - BOOTP
    • Internet - TFTP
    • Internet - URL
    • Internet - NAT
    • Internet - DHCP
    • Internet - Cellular Radio
    • Internet - VSAT
    • Internet - TCP/IP Services
    • Internet - IMAP4
    • Internet - GSM Architecture
    • Internet - VOIP
    • Internet - GSM Features
    • Internet - SSL
    • Internet - Web Server
    • Internet - File Server
    • Internet - NNTP
    • Internet - UUCP
    • Internet - ADSL
    • Internet - FTP
    • Internet - NFS
    • Internet - Videoconferencing
    • Internet - Audio Compression
    • Internet - xDSL
    • Internet - ADSL Protocols
    • Internet - HTTP Cookie
    • Internet - Wireless Principles
    • Internet - X.400
    • Internet - IP Standardization
    • Internet - 4G
    • Internet - CompuServe
    • Internet - Anonymous FTP
    • Internet - File Sharing
    • Internet - WRAN
    • Internet - FQDN
    • Internet - CNAME
    • Internet - Buffering
    • Internet - Cluster Computing
    • Internet - WiMAX
    • Internet - Client/Server
    • Internet - ATM
    • Internet - DSL
    • Internet - GPRS
    • Internet - Transfer rate
    • Network - Cable Modem

Network Server Technique

    • Server - Home
    • Server - Proxy
    • Server - BBS
    • Server - B Channel
    • Server - Process
    • Server - AAL
    • Server - ISDN Features
    • Server - Multicasting
    • Server - Client/Server Benefits
    • Server - Client process
    • Server - Ad-Hoc
    • Server - ISDN Interfaces
    • Server - Guided Transmission
    • Server - SONET
    • Server - ISDN Standards
    • Server - WAP
    • Server - Broadband ISDN

Networking Encryption System

    • Security - Firewall
    • Security - Cryptography
    • Security - Firewall Architectures
    • Security - Network Security Services
    • Security - VPN
    • Security - Security Threats
    • Security - Encryption
    • Security - SHA-1
    • Security - Requirements
    • Security - Digital Signatures
    • Security - Message Authentication
    • Security - MD5
    • Security - Tunneling (VPN)
    • Security - Remote Access Security

Some Other Tutorials

  • Tutorials - QOS
  • Tutorials - CTS
  • Tutorials - LTE
  • Tutorials - CDDI
  • Tutorials - AppleTalk
  • Tutorials - EtherTalk
  • Tutorials - Flooding
  • Tutorials - Tunneling
  • Ethernet - Frame
  • Ethernet - Expansion
  • Ethernet - 10 Mbit/s
  • Ethernet - Local Loop
  • Broadband vs Baseband
  • Wi-Fi vs. Mobile Broadband
  • Optical Source
  • Implementation Wireless Technology
  • Applications of Wifi
  • Wireless Router Installation
  • Networking Your Devices
  • Type of Wi-Fi equipment
  • Multi-point Architectures
  • Frame-level Architecture
  • Circuits, Channels and Multichanneling
  • Single Bit Error Vs Burst Error

Other Links

  • Internet Terminology - PDF Version

Footer

Basic Course

  • Computer Fundamental
  • Computer Networking
  • Operating System
  • Database System
  • Computer Graphics
  • Management System
  • Software Engineering
  • Digital Electronics
  • Electronic Commerce
  • Compiler Design
  • Troubleshooting

Programming

  • Java Programming
  • Structured Query (SQL)
  • C Programming
  • C++ Programming
  • Visual Basic
  • Data Structures
  • Struts 2
  • Java Servlet
  • C# Programming
  • Basic Terms
  • Interviews

World Wide Web

  • Internet
  • Java Script
  • HTML Language
  • Cascading Style Sheet
  • Java Server Pages
  • Wordpress
  • PHP
  • Python Tutorial
  • AngularJS
  • Troubleshooting

 About Us |  Contact Us |  FAQ

Dinesh Thakur is a Technology Columinist and founder of Computer Notes.

Copyright © 2025. All Rights Reserved.

APPLY FOR ONLINE JOB IN BIGGEST CRYPTO COMPANIES
APPLY NOW