We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byKeenan Watling
Modified about 1 year ago
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 12 Point-to-Point Access: PPP
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Two devices can be connected by a dedicated link or a shared link. Dedicated link between two devices point-to-point access. Connections to ISP via traditional modem or cable modem or DSL modem requires some protocol to manage and control the transfer the data. These modems provide physical connections only. PPP Services Format of the frame Negotiate the establishment of the link and the exchange of data How network layer data are encapsulated in the data link frame How two devices can authenticate each other.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 12.1 PPP Frame Frame Format Flag = 01111110; Identify the boundary of PPP frame. Address is always Broadcast because of point-to- point link. Control field  = No sequence numbers and so no flow or error control Protocol field = What is being carried in the data field: user data or other information. FCS [Frame Check Sequence] = 2-byte or 4-byte CRC
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Transition States Idle: No active carrier, line is quiet. Establishing: When one endpoint starts communication, connection goes to establishing state. Negotiation of options.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Protocol Stack Link Control Protocol Responsible for establishing, maintaining, configuring, and terminating links. Negotiation mechanisms. LCP occurs in Establishing or terminating state LCP packets are carried in the data field of PPP frames. Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Network Control Protocol
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 LCP LCP has code, ID [identify request and reply], Length [length of entire LCP packet], Information [extra information needed for LCP packets – authentication protocol, maximum receive unit, etc.]. Code Configuration packets: Configure-request, Configure- ack, Configure-nak [negative ack certain options], Configure-reject Link Termination packets: Terminate-request, Terminate-ack Link monitoring and debugging packets: Code-reject, Protocol-reject, Echo-request [monitor link], Echo- reply, Discard-request [loopback by sender].
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Password Authentication Protocol (PAP) Send user name and password Check validity and accept or deny. Access to the link can get the user name and password.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 12.6 PAP packets PAP has protocol field value of C023 in PPP frame. Three PAP-packets: authenticate-request, authenticate-ack and authenticate-nak.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Challenge Handshake Authentication Protocol (CHAP) Three-way handshake. Password is never sent online. System sends a challenge packet containing challenge value, usually a few bytes User applies predefined function with challenge value, user’s password. The result is sent as response. System does the same as user and compares the result.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 12.8 CHAP packets CHAP has protocol field value of C223 in PPP frame. Four CHAP-packets: challenge, response, success, failure.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 12.9 IPCP packet encapsulated in PPP frame Network Control Protocol is a set of control protocols to allow the encapsulation of data coming from network layer protocols into the PPP frame. The set of packets that establish and terminate a network layer connection for IP packets is called Internetwork Protocol Control Protocol (IPCP). Negotiation is done both at data link and network layers. Use configure-request to negotiate with the other party. Ex., to set the IP addresses and so on. If there is IP data, then protocol field is 0021. After data transfer is complete, IPCP can take control and use terminate-request and terminate-ack packets to end network connection.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Table 12.3 Code value for IPCP packets CodeIPCP Packet 01Configure-request 02Configure-ack 03Configure-nak 04Configure-reject 05Terminate-request 06Terminate-ack 07Code-reject
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 12.10 An example
K. Salah 1 Chapter 12 Point-to-Point Access: PPP.
Point-to-Point Access: PPP. In a network, two devices can be connected by a dedicated link or a shared link. In the first case, the link can be used by.
10/27/ Data Link Control and Protocols - Lin 1 CPET/ECET Point-to-Point Access: PPP Data Communications and Networking Fall 2004 Professor.
1 Data Communications Point-to-Point Protocol (PPP)
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 12 Point-to-Point Access: PPP.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 12 Point-to-Point Access: (PPP)
Point-to-Point Access: PPP PPP Between Routers Used for Point-to-Point Connections only Used as data link control (encapsulates network layer.
PPP Protocol PPP Stack -Establish a link (Link Control Protocol) -Authenticate Parties involved (Authentication Protocols) -Carry Network Layer (Network.
Gursharan Singh Tatla SLIP and PPP 27-Mar
It defines the format of the frame to be exchanged between devices. It defines how two devices can negotiate the establishment of the link and the.
Point to Point Protocol Operation. Point to Point Protocol Protocol Layers of PPP –Physical Layer –Data Link Layer – HDLC derivative –Other protocols.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 4 Point to Point Protocol (PPP)
Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access.
Presentation of Computer network Topic:SLIP&PPP Submitted to:- Submitted by:- Mr.Navdeep Bhandari Charu Harpreet Ankita Ankita Geetika Geetika.
Point-to-Point Protocol (PPP) ผศ. ดร. อนันต์ ผลเพิ่ม Asst.Prof.Anan Phonphoem, Ph.D. Computer Engineering.
Introduction to PPP. Using dial-up modems for packet-oriented- networking (i.e connecting to the internet) requires a data-link layer protocol widely-spread.
Copyright Kenneth M. Chipps Ph.D. PPP Last Update
S4C4 PPP. Protocols Point to Point Protocol Link Control Protocol Network Control Program Password Authentication Protocol Challenge Handshake Authentication.
Semester 4 - Chapter 4 – PPP WAN connections are controlled by protocols In a LAN environment, in order to move data between any two nodes or routers two.
Example Data Link Protocols Quick review Reference Models? Layers? Flow Control? Bit stuffing? Connection Oriented? Synchronous transmission?
Data Communications, Kwangwoon University11-1 Chapter 11 Data Link Control 1.Framing 2.Flow and Error Control 3.Protocols 4.Noiseless Channels 5.Noisy.
Computer Networks Module 3: Data Link Layer (Framing) Dr. Vikram Shete St. Francis Institute of Technology.
Robert E. Meyers CCNA, CCAI Youngstown State University Cisco Regional Academy Instructor Cisco Networking Academy Program Semester 4, v Chapter.
Introduction to PPP. Using dial-up modems for packet-oriented- networking (I.e connecting to the internet) requires a data-link layer protocol widely-spread.
11-6 HDLC High-level Data Link Control (HDLC) is a bit-oriented protocol for communication over point-to-point and multipoint links. It implements the.
Point-to-Point Protocol Semester 4, Chapter 4 Allan Johnson.
As first introduced in Chapter 2, “Wide Area Network (WAN) Technologies,” PPP is a stan- dard for using point-to-point network links that provides the.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 CCNA 5.0 Planning Guide Chapter 3: Point-to-Point Connections.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: Point-to- Point Connections Connecting Networks.
Data Link Layer: Data Link Control : Data Communication and Computer Networks Asst. Prof. Chaiporn Jaikaeo, Ph.D.
Introduction to PPP Sharon Katz. History Dial-up file transfer protocol Early 80`s: PC users begin to communicate through file transfer protocols: X-Modem.
1 Lecture 03 - Roadmap WAN Basics –Three Types of WAN Services Introduction to Point-to-Point protocol (PPP) Basic Components of PPP Frame Formats of PPP.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 15 Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv6.
Lesson 1: Local Area Network (LAN) Technologies LAN encapsulations Ethernet Token Ring FDDI IEEE
Point-Point Protocol (PPP) by William F. Widulski.
Chapter 11 Data Link Control (DLC) Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
4 Semester 4 CHAPTER 4 REVIEW JEOPARDY S2C04 Jeopardy Review.
11.1 Chapter 11 Data Link Control Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Point-to-Point Protocol (PPP) Accessing the WAN – Chapter 2.
Remote Networking Architectures What is Remote Networking? Remote Access Networking Virtual Private Networks (VPN) Remote Control Computing.
Labcourse “Routerlab” Customer Access. Datacenter Phone ExchangePoint of Presence Customer Datacenter The big picture Core Network Phone Network Home.
1 Link Layer 3 Mozafar Bag-Mohammadi University of Ilam.
Chapter 5 outline r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 LAN addresses and ARP r 5.5.
Point to Point protocol (PPP) Point to point, wired data link easier to manage than broadcast link: no Media Access Control Several Data Link Protocols:
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Transmission Control Protocol (TCP)
PPP Point to Point Protocol By Bill Reed. PPP Point to Point Protocol is an encapsulation standard. Point to Point Protocol is an encapsulation standard.
© 2017 SlidePlayer.com Inc. All rights reserved.