EDUCBA

EDUCBA

MENUMENU
  • Free Tutorials
  • Free Courses
  • Certification Courses
  • 600+ Courses All in One Bundle
  • Login

What is LLDP?

By A. SathyanarayananA. Sathyanarayanan

Home » Software Development » Software Development Tutorials » Cyber Security Tutorial » What is LLDP?

What is LLDP

Introduction to LLDP

Link Layer Discovery Protocol or LLDP is used in network devices to know the identity, capabilities, and other devices in the network based on IEEE technology. LLDP is a standard used in layer 2 of the OSI model. This is enabled in default mode and all supported interfaces send and receive LLDP packets from the networks. LLDP communicates with other devices and share information of other devices. LLDP is used mainly to identify neighbors in the network so that security risks can be exposed. Destination address and cyclic redundancy check is used in LLDP frames.

In this article let’s analyze the nitty-gritty of LLDP

Start Your Free Software Development Course

Web development, programming languages, Software testing & others

Where does it fit in Network Layer?

LLDP fits in the data link layer, which is in level 2 of the standard network architecture subscribed by the OSI (Open Systems Interconnection) model. This model prescribed by the International Organization for standardization deals with protocols for network communication between heterogeneous systems. In the OSI model, Information communication between 2 devices across the network is split into 7 layers and they are bundled over one another in a sequence and the layers are

Sl Description Level Function Responsibility
1 Application layer 7 Process request of End users and return results to them Host
2 Presentation layer 6 Manage Encryption and decryption of data Host
3 Session layer 5 Manage sessions Host
4 Transport layer 4 Manage Delivery, Splitting the data as segments and reassembling Host
5 Network layer 3 Create pockets from segments and vice versa. Manage pocket transfer across neighbor networks. Network
6 Datalink layer 2 Create Data frames from Pockets and move the frames to other nodes within the same network (LAN & WAN) Network
7 Physical layer 1 Provide a physical medium for data exchange Network

LLDP provides standard protocol in moving the data frames (as part of the data link layer) created from the data pockets (sent by the network layer) and controls the transfer as well.

Protocol

LLDP protocol stipulates a standard set of rules and regulations for interaction between network devices in a multiple vendor network environment.  It covers mainly the way a device identifies itself and publicize its’ capabilities in a network, by transmitting a pack of information about itself at a periodic interval, so that other devices could recognize it.

The pack of information is part of the message contained in network frames (Ethernet frames) transmitted across nodes of the network. IEEE 802.1AB protocol is used in LLDP and it is vendor-neutral standard protocol.

Structure of LLDP Frames

The pack of information called an LLDP data unit follows a type length and value structure (TLV) and the following table lists the details of the information and its type of TLV.

Type Description Mandatory or Optional TLVs
1 Identification of the device (Chassis ID) Mandatory
2 Port Identification (Port ID) Mandatory
3 Validity time of the received information Mandatory
4 Port details like Description etc., Optional and additional TLVs
5 Device name Optional and additional TLVs
6 Software version Optional and additional TLVs
7 Device function and its capabilities Optional and additional TLVs
8 IP & MAC address of the device Optional and additional TLVs
0 The signal indicating End of the details also the end of Frame Mandatory

Types and Operations of LLDPDU

The above LLDP data unit which publishes information on one device to another neighbor device is called normal LLDPDU. When a port is disabled or shutdown or rebooted a shutdown advisory LLDPU is published to receiving devices indicating the LLDP signals are invalid thereafter.

Popular Course in this category
Cyber Security Training (12 Courses, 3 Projects)12 Online Courses | 3 Hands-on Projects | 77+ Hours | Verifiable Certificate of Completion | Lifetime Access
4.5 (6,035 ratings)
Course Price

View Course

Related Courses
Ethical Hacking Training (9 Courses, 7+ Projects)Penetration Testing Training Program (2 Courses)

There are 3 ways it can operate and they are

  1. Transmit Only: It can transmit the package of information about the local device
  2. Receive only: It can only get the details of the remote device
  3. Transmit & Receive: It does both the above functions

Whenever the data units are received from a remote device, both mandatory and optional Time, length and values are validated for the correctness and dropped if there are errors.

Database of LLDP Information

The information about the LLDP data unit is stored in a management information database (MIB) both at the sending and receiving side and this information is used for network management purposes and the data can be retrieved at a later stage using standard queries.

Extension to VOIP devices

LLD protocol can be extended to manage smartphones, IP phones, and other mobile devices to receive and send information over the network. Initially, it will start with sending raw LLDP data pockets and once it senses the device on the other side is VOIP it will send data pockets in LLDP-MED protocol till the communicate is completed. There are separate time, length and values for LLDP-MED protocols

LLDP Management

The following time parameters are managed in LLDP and there are default values to it.

  • Time duration upto which a device will retain the information about the pairing device before purging it
  • Time gap to send the LLDP updates to the pairing device
  • Delay time to initialize

Other aspects of LLDP Management are

  • Configuration settings of network components
  • Activation and deactivation of network components
  • Maintenance of LLDP Characteristics
  • Monitoring LLDP functionalities

Benefits of LLDP

  • Management of a complex multiple vendor network made simple, structured and easier.
  • The accurate information captured on the exchange of data helps in controlling the network performance, monitoring the data exchange flow and troubleshoot issues whenever it occurs.
  • Provides Better traceability of network components within the network
  • Improves the system available to the users by effectively monitoring the network performance and preventing downtime in data center operations.
  • Ensures good front end response to users in the application by ensuring faster and quicker availability of data from other nodes in the same network and from other networks.

Conclusion

LLD protocol is a boon to the network administrators.  It aids them with useful information on intra network devices at the data layer (level 2) and on the internetwork devices at the network layer (level 3) for effectively managing data center operations.

Recommended Articles

This is a guide to What is LLDP? Here we discuss the Types, Operations, Protocol, Management and Benefits of LLDP. You may also have a look at the following articles to learn more –

  1. Challenges of IoT
  2. Internet Based Business Ideas
  3. IoT in Agriculture
  4. Internet Marketing Tools

Cyber Security Training (12 Courses, 3 Projects)

12 Online Courses

3 Hands-on Projects

77+ Hours

Verifiable Certificate of Completion

Lifetime Access

Learn More

0 Shares
Share
Tweet
Share
Primary Sidebar
Network Security Tutorial
  • Protocols
    • What is TCP Protocol
    • What is TCP/IP
    • How do IP Addresses Work?
    • Routing Protocols Types
    • What is Telnet
    • What is TFTP
    • What is DHCP
    • What is SFTP
    • Address Resolution Protocol
    • Internet Control Message Protocol
    • Simple Mail Transfer Protocol
    • Internet Security Protocols
    • SMTP Protocol
    • Types of Networking Protocols
    • User Datagram Protocol
    • Data Link Layer
    • Data Link Layer Services
    • Network Layer
    • Transport Layer Protocols
    • What Is Networking Protocols
    • TFTP
    • What is ARP
    • Basic Fundamental Of Networking
    • What is IPv4
    • What is IPv6
    • CIFS Protocol
    • What is SMB?
    • What is EIGRP
    • What is LLDP?
  • Basics
    • Security Consultant Definition
    • Security Policies
    • What is Network Security
    • What is Data Security?
    • What is Cryptography
    • Cryptography Techniques
    • Cryptography Tools
    • Data Security Techniques and Privacy
    • Digital Signature Cryptography
    • Java Cryptography
    • Basics of Cybersecurity
    • What is Network Topology
    • Algorithms and Cryptography
    • HTTP Methods
    • Security Technologies
    • Security Architecture
    • Network Topologies
    • What is a Physical Address?
    • Logical Address
    • What is Storage Area Network?
    • Mobile Ad Hoc Network
    • What is Computer Networks?
    • Security Principles
    • What is Remote Access?
  • Routing
    • What is Router
    • Types of Routers
    • Dynamic Routing
    • Routing Algorithms
    • Routing Protocol
    • What is Routing
    • What is Static Routing
    • Important Types of DNS Servers (Powerful)
  • Attacks
    • Types of Network Attacks
    • What is Trojan Horse Virus
    • What is DOS
    • Types of DOS Attacks
    • DDos Attack Mitigation
    • Ransomware Attack  
    • Types of Cyber Attack
    • What is a Brute Force Attack
    • What is a Phishing Attack
    • What is Cyber Attack
    • What is DDoS Attack
    • What is Man In The Middle Attack
    • What is Man In The Middle Attack
    • What is Ransomware
    • What is Pharming
    • What is Phishing
    • What is CSRF
    • DNS Amplification Attack
    • Denial of Service Attack
  • Algorithm
    • IDEA Algorithm
    • MD5 Algorithm
    • Symmetric Algorithms
    • Diffie Hellman Key Exchange Algorithm
    • Digital Signature Algorithm
    • Encryption Algorithm
    • Advanced Encryption Standard
    • Asymmetric Encryption
    • ElGamal Encryption
    • HMAC
    • DES Algorithm
    • Brute Force Algorithm
    • SHA Algorithm
    • RSA Algorithm
    • What is Digital Certificate?
    • Certificate Revocation
    • RC5
  • Encryption/ Decryption
    • Encryption process
    • Public Key Encryption
    • Symmetric Key Encryption
    • What is Encryption
    • What is Decryption
    • Types of Cipher
    • Transposition Techniques
    • What is Steganography
    • One Time Pad
    • Steganography Techniques
  • Hosting
    • Types of Web Hosting
    • Free Web Hosting Sites
    • What is Hosting
    • What is VPS Hosting
    • What is Web Hosting
    • Types of Domain
    • VPN Applications for PC
    • Why we use VPN?
    • What is Virtual Host?
  • Firewalls
    • What is a Firewall?
    • Types of Firewalls
    • Firewall Devices
    • Firewall Uses
  • Advanced
    • Cryptosystems
    • Configuring DHCP Server
    • Block Cipher modes of Operation
    • TCP/IP Model
    • Types of Network
    • Types of Network Devices
    • Types of Network Topology
    • Types of Intrusion Prevention System
    • Types of Proxy Servers
    • Types of Websites
    • Types of NAT 
    • Mobile IP
    • Career in Automobile Design
    • What is TFS
    • What is NAT
    • What is OSI Model
    • Data Link Layer OSI Model
    • What is Cross Site Scripting
    • Applications of Sensors
    • ARP Packet Format
    • Asymmetric Information
    • Autoencoders
    • What is FTP Server?
    • IPS Tools
    • IPv4 Header Format
    • IPv6 Header Format
    • Authentication Header
    • Kerberos
    • Network Mapper
    • Network Scanning Tools
    • Network Mapping Tools
    • Network Access Control
    • Vulnerability Assessment Tools
    • Network Sniffer
    • Networking Commands
    • Networking Devices
    • Networking Strategies
    • Digital Certificate
    • What is a Digital Signature?
    • Digital Signature Softwares
    • Digital Signature Types
    • Digital Signature vs Digital Certificate
    • PKCS
    • What is FTP
    • FTP Commands
    • What is MIME?
    • What is Smart Card?
    • Networking Ports
    • Mutual Authentication
    • Password Authentication
    • Data Masking 
    • Authentication Tokens
    • Biometric Authentication
    • What is IP?
    • IPSec
    • Secure Electronic Transaction
    • What is CIDR
    • Static Binding and Dynamic Binding
    • What is SSL
    • PKIX
    • Public Key Infrastructure
    • What is Wireshark
    • Daisy Chain Topology
    • Markov Logic Network
    • Security engineering
    • SNMP Monitoring Tools
    • Network Analysis Tools
    • Server Monitoring Tools
    • Network Discovery Tools
    • Network Management Tool
    • SIEM Tools
    • OSINT Tools
    • Multiple Ping Tool
  • Interview Questions
    • Network Security Interview Questions
    • Networking Interview Questions
    • EIGRP Interview Questions

Related Courses

CDN Training

OSPF Certification Training

Penetration Training Course

Footer
About Us
  • Blog
  • Who is EDUCBA?
  • Sign Up
  • Corporate Training
  • Certificate from Top Institutions
  • Contact Us
  • Verifiable Certificate
  • Reviews
  • Terms and Conditions
  • Privacy Policy
  •  
Apps
  • iPhone & iPad
  • Android
Resources
  • Free Courses
  • Java Tutorials
  • Python Tutorials
  • All Tutorials
Certification Courses
  • All Courses
  • Software Development Course - All in One Bundle
  • Become a Python Developer
  • Java Course
  • Become a Selenium Automation Tester
  • Become an IoT Developer
  • ASP.NET Course
  • VB.NET Course
  • PHP Course

© 2020 - EDUCBA. ALL RIGHTS RESERVED. THE CERTIFICATION NAMES ARE THE TRADEMARKS OF THEIR RESPECTIVE OWNERS.

EDUCBA Login

Forgot Password?

EDUCBA
Free Software Development Course

Web development, programming languages, Software testing & others

*Please provide your correct email id. Login details for this Free course will be emailed to you
Book Your One Instructor : One Learner Free Class

Let’s Get Started

This website or its third-party tools use cookies, which are necessary to its functioning and required to achieve the purposes illustrated in the cookie policy. By closing this banner, scrolling this page, clicking a link or continuing to browse otherwise, you agree to our Privacy Policy

EDUCBA

*Please provide your correct email id. Login details for this Free course will be emailed to you
EDUCBA
Free Software Development Course

Web development, programming languages, Software testing & others

*Please provide your correct email id. Login details for this Free course will be emailed to you

Special Offer - Cyber Security Training (12 Courses, 3 Projects) Learn More