 It defines the format of the frame to be exchanged between devices.  It defines how two devices can negotiate the establishment of the link and the.

Slides:



Advertisements
Similar presentations
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 12 Point-to-Point Access: PPP.
Advertisements

Point-to-Point Protocol (PPP) ผศ. ดร. อนันต์ ผลเพิ่ม Asst.Prof.Anan Phonphoem, Ph.D. Computer Engineering.
S4C4 PPP. Protocols Point to Point Protocol Link Control Protocol Network Control Program Password Authentication Protocol Challenge Handshake Authentication.
1 Data Link Protocols Relates to Lab 2. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet,
Point-to-Point Protocol
Gursharan Singh Tatla SLIP and PPP 27-Mar
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—5-1 Establishing Serial Point-To-Point Connections Configuring Serial Point-To-Point Encapsulation.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 4 Point to Point Protocol (PPP)
Chapter 11 Data Link Control (DLC) Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Data Communications Point-to-Point Protocol (PPP)
Semester 4 - Chapter 4 – PPP WAN connections are controlled by protocols In a LAN environment, in order to move data between any two nodes or routers two.
Point to Point Protocol Operation. Point to Point Protocol Protocol Layers of PPP –Physical Layer –Data Link Layer – HDLC derivative –Other protocols.
PPP (Point to Point protocol).  On WAN connection, the protocol depends on the WAN technology and communicating equipment:  Examples:  HDLC –  The.
K. Salah 1 Chapter 12 Point-to-Point Access: PPP.
PPP Protocol PPP Stack -Establish a link (Link Control Protocol) -Authenticate Parties involved (Authentication Protocols) -Carry Network Layer (Network.
Example Data Link Protocols Quick review Reference Models? Layers? Flow Control? Bit stuffing? Connection Oriented? Synchronous transmission?
Remote Networking Architectures
Point-to-Point Access: PPP. In a network, two devices can be connected by a dedicated link or a shared link. In the first case, the link can be used by.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Point-to-Point Protocol (PPP) Accessing the WAN – Chapter 2.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
PPP (Point to Point Protocol)
CCNA Cisco Certified Network Associate. Point-to-point Protocol (PPP)
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Point-to-Point Protocol (PPP) Accessing the WAN – Chapter 2.
Robert E. Meyers CCNA, CCAI Youngstown State University Cisco Regional Academy Instructor Cisco Networking Academy Program Semester 4, v Chapter.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Point-to-Point Protocol (PPP) Accessing the WAN – Chapter 2.
CCNA Guide to Cisco Networking Fundamentals Fourth Edition
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Implementing Enterprise WAN Links Introducing Routing and Switching in the Enterprise.
Wide Area Networks(WANs) Lecture Week 2. Point-to-Point Protocol (PPP) Accessing the WAN.
Copyright Kenneth M. Chipps Ph.D. PPP Last Update
Point to Point Protocol
Chapter 7 Low-Level Protocols
Access Protocols PPP vs. DHCP Chapter 5. Overview PPP DHCP User identities Assignment of IP addresses Assignment of other parameters.
Point-to-Point Access: PPP PPP Between Routers  Used for Point-to-Point Connections only  Used as data link control (encapsulates network layer.
1 Point-to-Point Protocol Cisco Networking Academy Semester 4.
Point-to-Point Tunneling Protocol [PPTP] Team: Invincibles Deepak Tripathi Habibeh Deyhim Karthikeyan Gopal Satish Madiraju Tusshar RakeshNLN.
Computer Networks Module 3: Data Link Layer (Framing) Dr. Vikram Shete St. Francis Institute of Technology.
2 Link Layer. 2  Ethernet and IEEE 802 Encapsulation MUST be able to send and receive Ethernet SHOULD be able to receive IEEE 802 MAY be able to send.
4 Semester 4 CHAPTER 4 REVIEW JEOPARDY S2C04 Jeopardy Review.
12. Point-to-Point Access: PPP
Chapter 11 Data Link Control
Wide Area Networks (WAN) Terms that are commonly used by service providers: Customer premises equipment (CPE) Equipment that’s owned by the subscriber.
PPP Configuration.
Point to Point connections
Presentation of Computer network  Topic:SLIP&PPP Submitted to:- Submitted by:- Mr.Navdeep Bhandari Charu Harpreet Ankita Ankita Geetika Geetika.
1 Lecture 03 - Roadmap WAN Basics –Three Types of WAN Services Introduction to Point-to-Point protocol (PPP) Basic Components of PPP Frame Formats of PPP.
Data Link Protocols Relates to Lab 2.
Point-Point Protocol (PPP) by William F. Widulski.
Point-to-Point Protocol (PPP)
Instructor Materials Chapter 2: Point-to-Point Connections
Chapter 11 Data Link Control (DLC)
PPP Protocol.
PPP Protocol.
Lesson 6 Point to Point Protocol
Instructor Materials Chapter 2: Point-to-Point Connections
Chapter 11 - Part 2 Data Link Control.
PPP – Point to Point Protocol
PPP PROTOCOL The First semester
ZyXEL Communications Corporation
Chapter 2: Point-to-Point Connections
Point-to-Point Protocol (PPP)
Point-to-Point Protocol (PPP)
Point-to-Point Access:
Point-to-Point Access:
Point-to-Point Protocol (PPP)
Point-to-Point Protocol (PPP)
PPP Protocol.
Point-to-Point Access:
Presentation transcript:

 It defines the format of the frame to be exchanged between devices.  It defines how two devices can negotiate the establishment of the link and the exchanged of data.  It defines how network layer data are encapsulated in the data link frame.  It defines how two devices can authenticate each other.

 PPP is not a single protocol but a protocol suite and consists of:  1. Framing method (frame/packet delineation): Serial lines provide bit transport, thus a means for finding the start of packets is required.  2. Link control protocol (LCP):  LCP is used for establishing a data link including options for the operation.  3. Network control protocol (NCP):  Each network protocol, e.g. IP, has its own NCP for establishing and configuring the network- layer operation.

 4. Authentication protocols (CHAP, PAP, EAP):  Client (and optional server) authentication make sure the right communication partners talk to each other.  5. Encryption protocols (ECP, DES, AES etc.) for privacy.  usually client) and the responder (R, usually server).

 6. Bandwidth control (BACP): „Bonding“ of multiple channels (Multilink PPP-MLPPP) to provide more bandwidth.  7. Compression control (CCP).  Serial lines are usually comparably slow. Compression provides more throughput.   PPP affords error detection (checksum).   PPP allows to dynamically assign an IP address (NCP).   PPP provides authentication (PAP / CHAP)   PPP is a symmetric protocol: the 2 parties in a PPP session are the initiator (I,

PPP FRAME

NCP (Network Control Protocol):  Dynamic assignment of IP address.  Dynamic assignment of DNS primary and secondary server.  The host must set a default route to the PPP interface since there is no default gateway IP address (the link is point-to-point with no IP address = unnumbered).

LCP (Link Control Protocol):  Used for establishing the link.  Allows to negotiate link options: Authentication protocol to be used. Header compression / address field compression. MRU (maximum receive unit).  Periodically test the link (LCP Echo request / reply).  Bring down the link gracefully when no longer in use.

Transition states A PPP connection goes through different phases called transition sates.

 Idle state. The idle state means that the link is not being used. There is no active carrier, and the line is quiet.  Establishing link. When one of the end point starts the communication, the connection goes into the establishing state. In this state, options are negotiated between the two parties. If the negotiation is successful, the system goes to the authenticating state (if authentication is required) or directly to the networking state.  Authenticating state. The authenticating state is optional. If the result is successful, the connection goes to the networking state; otherwise, it goes to the terminating state.

 Networking State. When a connection reaches this state, the exchange of user control and data packets can be started. The connection remains in this state until one of the endpoints wants to terminate the connection.  Terminating state. When the connection is in the terminating state, several packets are exchanged between the two ends for house cleaning and closing the link.

 PPP is a data-link layer protocol, PPP uses a stack of other protocols to establish the link, to authenticate the parties involved, and to carry the network layer data.  Three sets of protocols are used by PPP: Link control protocol, authentication protocols, and network control protocol.

Protocol stack

LCP packet encapsulated in a frame

 Authentication plays a very important role in PPP because PPP is designed for use over dial-up links where verification of user identity is necessary.  Authentication means validating the identity of a user who needs to access a set of resources.  PPP uses two protocols for authentication: Password Authentication Protocol (PAP) and Challenge Handshake Authentication Protocol (CHAP)

 The PAP is a simple authentication procedure with two steps: 1. The user who wants to access a system sends an ID (identification) and a password. 2. The system checks the validity of the identification and password and either accepts or denies a connection.  For those systems that require greater security, PAP is not enough. A third party with access to the link can easily pick up the password and access the system resources.

PAP

PAP packets

 The CHAP protocol is a three-way handshaking authentication protocol that provides greater security than PAP.  In this method, the password is kept secret; it is never sent on-line. Steps  The system sends to the user a challenge packet containing a challenge value, usually a few bytes.  The user applies a predefined function that takes the challenge value and the user’s own password and creates a result. The user sends the result in the response packet to the system.

 The system does the same. It applies the same function to the password of the user and the challenge value to create a result. If the result created is the same as the result sent in the response packet, access is granted; otherwise, it is denied.

CHAP

CHAP packets

An example