1 Data Communications Point-to-Point Protocol (PPP)

Slides:



Advertisements
Similar presentations
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 12 Point-to-Point Access: PPP.
Advertisements

Labcourse “Routerlab”
Point-to-Point Protocol (PPP) ผศ. ดร. อนันต์ ผลเพิ่ม Asst.Prof.Anan Phonphoem, Ph.D. Computer Engineering.
S4C4 PPP. Protocols Point to Point Protocol Link Control Protocol Network Control Program Password Authentication Protocol Challenge Handshake Authentication.
1 Data Link Protocols Relates to Lab 2. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet,
Point-to-Point Protocol
Gursharan Singh Tatla SLIP and PPP 27-Mar
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 4 Point to Point Protocol (PPP)
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: Point-to- Point Connections Connecting Networks.
11-6 HDLC High-level Data Link Control (HDLC) is a bit-oriented protocol for communication over point-to-point and multipoint links. It implements the.
Introduction to PPP Sharon Katz. History Dial-up file transfer protocol Early 80`s: PC users begin to communicate through file transfer protocols: X-Modem.
11-6 HDLC High-level Data Link Control (HDLC) is a bit-oriented protocol for communication over point-to-point and multipoint links. It implements the.
Semester 4 - Chapter 4 – PPP WAN connections are controlled by protocols In a LAN environment, in order to move data between any two nodes or routers two.
Point to Point Protocol Operation. Point to Point Protocol Protocol Layers of PPP –Physical Layer –Data Link Layer – HDLC derivative –Other protocols.
PPP (Point to Point protocol).  On WAN connection, the protocol depends on the WAN technology and communicating equipment:  Examples:  HDLC –  The.
K. Salah 1 Chapter 12 Point-to-Point Access: PPP.
1 CCNA 4 v3.1 Module 3. 2 CCNA 4 v3.0 Module 3 PPP.
PPP Protocol PPP Stack -Establish a link (Link Control Protocol) -Authenticate Parties involved (Authentication Protocols) -Carry Network Layer (Network.
CCNA 5.0 Planning Guide Chapter 3: Point-to-Point Connections.
Example Data Link Protocols Quick review Reference Models? Layers? Flow Control? Bit stuffing? Connection Oriented? Synchronous transmission?
As first introduced in Chapter 2, “Wide Area Network (WAN) Technologies,” PPP is a stan- dard for using point-to-point network links that provides the.
Point-to-Point Access: PPP. In a network, two devices can be connected by a dedicated link or a shared link. In the first case, the link can be used by.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Point-to-Point Protocol (PPP) Accessing the WAN – Chapter 2.
Introduction to PPP. Using dial-up modems for packet-oriented- networking (I.e connecting to the internet) requires a data-link layer protocol widely-spread.
 It defines the format of the frame to be exchanged between devices.  It defines how two devices can negotiate the establishment of the link and the.
Robert E. Meyers CCNA, CCAI Youngstown State University Cisco Regional Academy Instructor Cisco Networking Academy Program Semester 4, v Chapter.
Introduction to PPP. Using dial-up modems for packet-oriented- networking (i.e connecting to the internet) requires a data-link layer protocol widely-spread.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Point-to-Point Protocol (PPP) Accessing the WAN – Chapter 2.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 4 v3.0 Module 3 PPP.
CCNA Guide to Cisco Networking Fundamentals Fourth Edition
Wide Area Networks(WANs) Lecture Week 2. Point-to-Point Protocol (PPP) Accessing the WAN.
Copyright Kenneth M. Chipps Ph.D. PPP Last Update
Point to Point Protocol
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer Addressing.
Chapter 7 Low-Level Protocols
Point-to-Point Access: PPP PPP Between Routers  Used for Point-to-Point Connections only  Used as data link control (encapsulates network layer.
1 Point-to-Point Protocol Cisco Networking Academy Semester 4.
Lesson 1: Local Area Network (LAN) Technologies LAN encapsulations Ethernet Token Ring FDDI IEEE
Computer Networks Module 3: Data Link Layer (Framing) Dr. Vikram Shete St. Francis Institute of Technology.
Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access.
4 Semester 4 CHAPTER 4 REVIEW JEOPARDY S2C04 Jeopardy Review.
12. Point-to-Point Access: PPP
Chapter 11 Data Link Control
Data Link Layer: Data Link Control : Data Communication and Computer Networks Asst. Prof. Chaiporn Jaikaeo, Ph.D.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Services in a Converged WAN Accessing the WAN – Chapter 1.
PPP Configuration.
Point to Point connections
Presentation of Computer network  Topic:SLIP&PPP Submitted to:- Submitted by:- Mr.Navdeep Bhandari Charu Harpreet Ankita Ankita Geetika Geetika.
1 Lecture 03 - Roadmap WAN Basics –Three Types of WAN Services Introduction to Point-to-Point protocol (PPP) Basic Components of PPP Frame Formats of PPP.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 12 Point-to-Point Access: PPP.
Point-to-Point Protocol (PPP) 點對點網路協定
Data Link Protocols Relates to Lab 2.
Exploration 4 Chapter 2 ppp. Serial and Parallel communication One way to get bits to move faster through a wire is to compress the data so that less.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 12 Point-to-Point Access: (PPP)
Point-to-Point Access:
Point-Point Protocol (PPP) by William F. Widulski.
Chapter 11 Data Link Control
Point-to-Point Protocol (PPP)
PPP Protocol.
Roadmap WAN Basics Introduction to Point-to-Point protocol (PPP)
Lesson 6 Point to Point Protocol
Chapter 11 - Part 2 Data Link Control.
Point to Point Data Link Control
Point-to-Point Protocol (PPP)
Point-to-Point Protocol (PPP)
Point-to-Point Access:
Point-to-Point Access:
Point-to-Point Protocol (PPP)
Point-to-Point Protocol (PPP)
Point-to-Point Access:
Presentation transcript:

1 Data Communications Point-to-Point Protocol (PPP)

11.2 Basics of PPP Used on point-to-point links such as modem dialup, DSL, and cable modem SLIP (serial line Internet protocol) was first but could only support IP and only static IP address assignment PPP solves both above problems

11.3 PPP States Idle state – link is not being used Establishing state – one endpoint starts a dialog; options are exchanged between endpoints; several packets may be exchanged Authenticating state – optional, two sides agree to authenticate (described later)

11.4 PPP States Networking state – primary state, exchange of user control and data packets can now be performed Terminate state – one side wishes to tear down connection; several packets exchanged (housekeeping) (See figure next slide)

11.5 Figure 12-2 Transition States

11.6 PPP Layers PPP has only two layers – physical and data link Physical layer is not defined – it is whatever the user uses Data link layer looks like HDLC, except address field = (broadcast), control field = (a HDLC U-frame)

11.7 Figure 12-1 PPP Frames

11.8 PPP Layers The Data field carries the packets from one of three other protocols - Link Control Protocol, authentication protocols, and Network Control Protocol, all described shortly

Protocol stack

11.10 Link Control Protocol (LCP) Responsible for establishing, maintaining, configuring, terminating link, and negotiation All LCP packets are carried in payload field of PPP frame – PPP field Protocol = hex C021

11.11 Figure 15-5 LCP Packet Encapsulated in a Frame

11.12 Table 12.1 LCP packets and their codes CodePacket TypeDescription Configure-request Contains the list of proposed options and their values Configure-ack Accepts all options proposed Configure-nak Announces that some options are not acceptable Configure-reject Announces that some options are not recognized Terminate-request Requests to shut down the line Terminate-ack Accepts the shut down request Code-reject Announces an unknown code Protocol-reject Announces an unknown protocol Echo-request A type of hello message to check if the other end is alive 0A 16 Echo-reply The response to the echo-request message 0B 16 Discard-request A request to discard the packet

11.13 Table 12.2 Common options OptionDefault Maximum receive unit1500 Authentication protocolNone Protocol field compressionOff Address and control field compression Off

11.14 Authentication Potentially important since this is dial-up communication Two possible protocols for authentication: – Password Authentication Protocol (PAP – Challenge Handshake Authentication Protocol (CHAP)

11.15 Authentication – PAP Two-step process – User sends ID and password – System verifies PAP packets are encapsulate in a PPP frame There are 3 types of PAP packets (see the next two slides)

11.16 Figure 12-5 PAP

11.17 Figure 12-6 PAP Packets

11.18 Authentication – CHAP Three-way handshake – System sends a challenge packet – User applies a predefined function that takes the challenge value and the user’s own password and creates a result – System does the same; then compares its result to user’s result

11.19 Figure 12-7 CHAP

11.20 Figure 12-8 CHAP Packets

11.21 IPCP (An NCP Protocol) Now that a link has been established and optional security has been established, we need to establish a network layer connection IPCP, or Internetwork Protocol Control Protocol, is an NCP (Network Control Protocol)

11.22 IPCP Seven packet types: – Configure-request (01) – Configure-ACK (02) – Configure-NAK (03) – Configure-reject (04) – Terminate-request (05) – Terminate-ACK (06) – Code-reject (07)

11.23 Figure 12-9 IPCP Packet Encapsulated in PPP Frame

An example

11.25 An Example