A supplicant on a first computing system authenticating the first
computing system to an authenticator on a second computing system in a
manner that is independent of the underlying data link and physical layer
protocols. The first computing system establishes a data link layer
connection with the second computing system using specific data link and
physical layer protocols. The supplicant on the first computing system
and the authenticator on the second computing system then receive an
indication that the data link layer connection has been established. The
supplicant determines that authentication is to occur with the
authenticator, and vice versa. The supplicant (and the authenticator)
then instructs that authentication is to occur in a manner that is
independent of the underlying data link and physical layer protocols used
to establish the connection.