Introduction to PPP Sharon Katz. History Dial-up file transfer protocol Early 80`s: PC users begin to communicate through file transfer protocols: X-Modem.

Slides:



Advertisements
Similar presentations
ADSL Systems - An Overview Praveen Reguraman InterOperability Lab University of New Hampshire 1999.
Advertisements

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 12 Point-to-Point Access: PPP.
Point-to-Point Protocol (PPP) ผศ. ดร. อนันต์ ผลเพิ่ม Asst.Prof.Anan Phonphoem, Ph.D. Computer Engineering.
S4C4 PPP. Protocols Point to Point Protocol Link Control Protocol Network Control Program Password Authentication Protocol Challenge Handshake Authentication.
1 Data Link Protocols Relates to Lab 2. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet,
Point-to-Point Protocol
Gursharan Singh Tatla SLIP and PPP 27-Mar
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 4 Point to Point Protocol (PPP)
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: Point-to- Point Connections Connecting Networks.
1 Data Communications Point-to-Point Protocol (PPP)
11-6 HDLC High-level Data Link Control (HDLC) is a bit-oriented protocol for communication over point-to-point and multipoint links. It implements the.
11-6 HDLC High-level Data Link Control (HDLC) is a bit-oriented protocol for communication over point-to-point and multipoint links. It implements the.
Semester 4 - Chapter 4 – PPP WAN connections are controlled by protocols In a LAN environment, in order to move data between any two nodes or routers two.
VLANs Port-based VLAN: switch ports grouped (by switch management software) so that single physical switch …… Switch(es) supporting VLAN capabilities can.
Open System Interconnection (OSI) Model
Point to Point Protocol Operation. Point to Point Protocol Protocol Layers of PPP –Physical Layer –Data Link Layer – HDLC derivative –Other protocols.
K. Salah 1 Chapter 12 Point-to-Point Access: PPP.
CCNA 5.0 Planning Guide Chapter 3: Point-to-Point Connections.
Chapter 10 Data Link Control Protocols. Agenda Definition Functions Attributes Concepts Types Conversion.
Example Data Link Protocols Quick review Reference Models? Layers? Flow Control? Bit stuffing? Connection Oriented? Synchronous transmission?
Point-to-Point Access: PPP. In a network, two devices can be connected by a dedicated link or a shared link. In the first case, the link can be used by.
Point to Point protocol (PPP) Point to point, wired data link easier to manage than broadcast link: no Media Access Control Several Data Link Protocols:
HDLC and PPP. The Data Link Layer in the Internet A home personal computer acting as an internet host. Technology like Ethernet cannot provide “high-level”
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
Introduction to PPP. Using dial-up modems for packet-oriented- networking (I.e connecting to the internet) requires a data-link layer protocol widely-spread.
 It defines the format of the frame to be exchanged between devices.  It defines how two devices can negotiate the establishment of the link and the.
PPP (Point to Point Protocol)
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
WAN Technologies Dial-up modem connections
Chapter Objectives At the end of this chapter you will be able to: Describe standardisation in the data communications area Describe the following technologies:
Robert E. Meyers CCNA, CCAI Youngstown State University Cisco Regional Academy Instructor Cisco Networking Academy Program Semester 4, v Chapter.
Introduction to PPP. Using dial-up modems for packet-oriented- networking (i.e connecting to the internet) requires a data-link layer protocol widely-spread.
CCNA Guide to Cisco Networking Fundamentals Fourth Edition
Chapter Objectives At the end of this chapter you will be able to: Describe the following technologies: ISDN, PPP, Modem, XDSL and ATM.
Copyright Kenneth M. Chipps Ph.D. PPP Last Update
Chapter 7 Low-Level Protocols
Access Protocols PPP vs. DHCP Chapter 5. Overview PPP DHCP User identities Assignment of IP addresses Assignment of other parameters.
Point-to-Point Access: PPP PPP Between Routers  Used for Point-to-Point Connections only  Used as data link control (encapsulates network layer.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
© Agilent Technologies Copyright 2000 H7211A+212, Rev. 2.0 Review of WAN Protocol Basics.
Computer Networks Module 3: Data Link Layer (Framing) Dr. Vikram Shete St. Francis Institute of Technology.
1 Message Delineation Identify the start and end of messages by: Identify the start and end of messages by:
2 Link Layer. 2  Ethernet and IEEE 802 Encapsulation MUST be able to send and receive Ethernet SHOULD be able to receive IEEE 802 MAY be able to send.
12. Point-to-Point Access: PPP
1 Physical and Data Link Layer Computer Network System Sirak Kaewjamnong.
Chapter 11 Data Link Protocols A data link protocol is a set of specifications used to implement the data link layer [A protocol is the set of rules or.
Chapter 11 Data Link Control
Wide Area Networks (WAN) Terms that are commonly used by service providers: Customer premises equipment (CPE) Equipment that’s owned by the subscriber.
Data Link Layer: Data Link Control : Data Communication and Computer Networks Asst. Prof. Chaiporn Jaikaeo, Ph.D.
Point to Point connections
Protocol Layering Chapter 11.
Presentation of Computer network  Topic:SLIP&PPP Submitted to:- Submitted by:- Mr.Navdeep Bhandari Charu Harpreet Ankita Ankita Geetika Geetika.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 12 Point-to-Point Access: PPP.
5: DataLink Layer5-1 Hubs Hubs are essentially physical-layer repeaters: m bits coming from one link go out all other links m at the same rate m no frame.
Data Link Protocols Relates to Lab 2.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 12 Point-to-Point Access: (PPP)
Point-to-Point Access:
Point-Point Protocol (PPP) by William F. Widulski.
PPP Protocol.
PPP Protocol.
Lesson 6 Point to Point Protocol
PPP PROTOCOL The First semester
ZyXEL Communications Corporation
Hubs Hubs are essentially physical-layer repeaters:
Point to Point Data Link Control
Hubs Hubs are essentially physical-layer repeaters:
ECE453 – Introduction to Computer Networks
PPP Protocol.
Data Link Control (DLC) Services
Presentation transcript:

Introduction to PPP Sharon Katz

History Dial-up file transfer protocol Early 80`s: PC users begin to communicate through file transfer protocols: X-Modem Y-Modem Z-Modem Asymetric protocols In the unix world TCP/IP vs. file transfer protocols Telecommunication technologies:  Local networks: 3MB and 10MB ethernets.  Distance communication: Leased lines Primitive dial-up modems Dial-up networking

Using dial-up modems for packet-oriented- networking (I.e connecting to the internet) requires a data-link layer protocol widely-spread protocols: SLIP PPP History

SLIP - Serial Line Internet Protocol Defined in the early 80`s Purpose extending TCP/IP networking with dial-up serial connection Users unix users at the beginning and PC users later Advantages Very simple protocol Easy implementation

SLIP - Serial Line Internet Protocol Disadvantages Does not support error detction and correction Supports only IP (and not IPX/SPX etc`) Requires advance knowledge of the peer`s IP address Is not approved internet standard Does not provide any form of authentication

PPP – design principles Support multiple network protocols Link configuration Error detection Establishing network addresses Authentication Extensibility

PPP – a layered protocol PPP relies on another DLP – HDLC – to perform some basic operations After the initial handshake, PPP executes its own handshake PPP itself consists of two protocols: LCP – Link Control Protocol NCP – Network Control Protocol

HDLC Definition High-level Data Link Control, Bit-oriented link protocol published by ISO foundation for other protocols (examples ) Operations 1 st stage – frame formation 2 nd stage – medium-dependant frame transmission

3 variable-length fields Address – intended for multidrop links Control – specifies the type of message transmitted Information – content transferred by the top level application 1 fixed-length field Check HDLC – frame format addresscontrolinformationcheck HDLC frame

Establishing PPP communication requires transitioning a connection through several states Some of these operations are done by LCP and some by NCP PPP state machine

DeadEstablish Network terminateAuthenticate PPP state machine opened Success / None down closing fail up

PPP – frame format Protocol type of information in data/padding field (I.e: IP, IPCP, LCP, CHAP etc`) Data/Padding data for the upper layer protocols or PPP control packets dataprotocolflagaddrcontrol padding check PPP frame

LCP Purposes Link establishment Link maintenance Link termination Optional operations Link quality determination Authentication

LCP - packets There are 3 classes of LCP packets: Link configuration configure-request, configure-ack, configure-nak & configure-reject Link termination terminate-request & terminate-ack Link monitoring code-reject, protocol-reject, echo-request, echo-reply & discard-request

LCP – packet format Code – type of LCP packet (configure-ack etc`) ID – request-response matching ID Length – of the LCP packet Data – the LCP packet codelengthDataIDPPP frame

LCP Options MRU determination Magic number selection Authentication Protocol Escaped characters map

NCP Purpose Configuring the network layer protocol. There exists a separate NCP for each network layer protocol Negotiation process Same message formats, code numbers and state machines as LCP

IPCP – IP Control Protocol Purpose TCP/IP matching NCP Establishes, configures and terminates the TCP/IP network layer protocol Options IP-Compression protocol – I.e Van-Jacobson (VJ) compressed TCP/IP IP address – allows dynamic IP configuration DNS & NBNS address

IPCP – packet format data0x80210x7E0xFF0x03check PPP frame (protocol) IPCP datalengthCodeID

PPP – unsupported options Flow control Any PPP frame sent that overflows the receiver's buffer are lost Error correction PPP includes only Frame Check Sequence (CRC) Re-sequencing PPP assumes all frames, sent and received, retain their original intended order

Tunneling - definition The process of running one network protocol on top of another. Common use: VPN (Virtual Private Network) Tunneling method Extending the link between the HDLC driver and the rest of PPP over a separate network PPP tunneling protocols L2TP, L2F, PPTP & ethernet (PPPoE) Tunneling & PPP

THE MIDDLE Next: PPP security

Internet layered architechture Application Transport Network Data Link Physical Media, clocking and synchronization Data link operations (???) Forwarding and route discovery Port and traffic management End-user application

Data link protocol Defintion manages node-to-node transfer of data between two directly connected machines. Operations Error detection and correction (depends on the protocol) Addressing (in LANs) Frame-level synchronization between sender and receiver Flow control Maintaining awareness of link conditions

HDLC`s family HDLC LAPB (x. 25) LAPM (v. 42) LAPD (ISDN) LLC (LANs) SDLC (SNA) LAPX (teletex) ESF (T1) MTP-2 (SS7) LAPDm (GSM) LAPF (frame-relay) PPP (many)

PPP – a layered protocol Application Transport Network NCP LCP HDLC Physical Data Link PPP

PPP – design principles Support multiple network protocols Link configuration Error detection Establishing network addresses Authentication Extansibility Not limited to the internet and other TCP/IP networks, I.e: IPX/SPX and IPv6 Includes nagotiation mechanisms for establishing communication parameters betweens two PPP peers Detects datagrams corruption upon reception and discards such corrupted data Sets network addresses necessary for the datagrams routing Supports authentication between peers before useful communication begins Yet, maintains backward compatibility