Point-to-Point Access:

Slides:



Advertisements
Similar presentations
1 ICS 156: Lecture 2 (part 2) Data link layer protocols Address resolution protocol Notes on lab 2.
Advertisements

1 Pertemuan 15 Layer Data Link Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
ADSL Systems - An Overview Praveen Reguraman InterOperability Lab University of New Hampshire 1999.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 12 Point-to-Point Access: PPP.
Labcourse “Routerlab”
Point-to-Point Protocol (PPP) ผศ. ดร. อนันต์ ผลเพิ่ม Asst.Prof.Anan Phonphoem, Ph.D. Computer Engineering.
S4C4 PPP. Protocols Point to Point Protocol Link Control Protocol Network Control Program Password Authentication Protocol Challenge Handshake Authentication.
Gursharan Singh Tatla SLIP and PPP 27-Mar
Data Link Layer - Ethernet Pertemuan 14 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 4 Point to Point Protocol (PPP)
11-5 NOISY CHANNELS Although the Stop-and-Wait Protocol gives us an idea of how to add flow control to its predecessor, noiseless channels are nonexistent.
1 Data Communications Point-to-Point Protocol (PPP)
11-6 HDLC High-level Data Link Control (HDLC) is a bit-oriented protocol for communication over point-to-point and multipoint links. It implements the.
11-6 HDLC High-level Data Link Control (HDLC) is a bit-oriented protocol for communication over point-to-point and multipoint links. It implements the.
Semester 4 - Chapter 4 – PPP WAN connections are controlled by protocols In a LAN environment, in order to move data between any two nodes or routers two.
Point to Point Protocol Operation. Point to Point Protocol Protocol Layers of PPP –Physical Layer –Data Link Layer – HDLC derivative –Other protocols.
PPP (Point to Point protocol).  On WAN connection, the protocol depends on the WAN technology and communicating equipment:  Examples:  HDLC –  The.
K. Salah 1 Chapter 12 Point-to-Point Access: PPP.
PPP Protocol PPP Stack -Establish a link (Link Control Protocol) -Authenticate Parties involved (Authentication Protocols) -Carry Network Layer (Network.
11.1 Chapter 11 Data Link Control Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Example Data Link Protocols Quick review Reference Models? Layers? Flow Control? Bit stuffing? Connection Oriented? Synchronous transmission?
Point-to-Point Access: PPP. In a network, two devices can be connected by a dedicated link or a shared link. In the first case, the link can be used by.
Point to Point protocol (PPP) Point to point, wired data link easier to manage than broadcast link: no Media Access Control Several Data Link Protocols:
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Point-to-Point Protocol (PPP) Accessing the WAN – Chapter 2.
 It defines the format of the frame to be exchanged between devices.  It defines how two devices can negotiate the establishment of the link and the.
Robert E. Meyers CCNA, CCAI Youngstown State University Cisco Regional Academy Instructor Cisco Networking Academy Program Semester 4, v Chapter.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Point-to-Point Protocol (PPP) Accessing the WAN – Chapter 2.
CCNA Guide to Cisco Networking Fundamentals Fourth Edition
Copyright Kenneth M. Chipps Ph.D. PPP Last Update
Point to Point Protocol
Point-to-Point Access: PPP PPP Between Routers  Used for Point-to-Point Connections only  Used as data link control (encapsulates network layer.
Computer Networks Module 3: Data Link Layer (Framing) Dr. Vikram Shete St. Francis Institute of Technology.
2 Link Layer. 2  Ethernet and IEEE 802 Encapsulation MUST be able to send and receive Ethernet SHOULD be able to receive IEEE 802 MAY be able to send.
4 Semester 4 CHAPTER 4 REVIEW JEOPARDY S2C04 Jeopardy Review.
12. Point-to-Point Access: PPP
Chapter 11 Data Link Control
Data Link Layer: Data Link Control : Data Communication and Computer Networks Asst. Prof. Chaiporn Jaikaeo, Ph.D.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Services in a Converged WAN Accessing the WAN – Chapter 1.
Point to Point connections
Presentation of Computer network  Topic:SLIP&PPP Submitted to:- Submitted by:- Mr.Navdeep Bhandari Charu Harpreet Ankita Ankita Geetika Geetika.
1 Lecture 03 - Roadmap WAN Basics –Three Types of WAN Services Introduction to Point-to-Point protocol (PPP) Basic Components of PPP Frame Formats of PPP.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 12 Point-to-Point Access: PPP.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 12 Point-to-Point Access: (PPP)
Point-to-Point Access:
Point-Point Protocol (PPP) by William F. Widulski.
Chapter 11 Data Link Control
Point-to-Point Protocol (PPP)
Instructor Materials Chapter 2: Point-to-Point Connections
PPP Protocol.
Chapter 11 Data Link Control (DLC)
PPP Protocol.
Roadmap WAN Basics Introduction to Point-to-Point protocol (PPP)
Lesson 6 Point to Point Protocol
Instructor Materials Chapter 2: Point-to-Point Connections
Chapter 11 - Part 2 Data Link Control.
PPP PROTOCOL The First semester
ZyXEL Communications Corporation
Chapter 3 Data Link Layer.
Point to Point Data Link Control
Chapter 2: Point-to-Point Connections
Chapter 2: Point-to-Point Connections
Chapter 11 Data Link Control (DLC)
Point-to-Point Protocol (PPP)
Point-to-Point Protocol (PPP)
Point-to-Point Access:
فصل اول: مفاهيم شبكه‌هاي كامپيوتري
Point-to-Point Protocol (PPP)
Point-to-Point Protocol (PPP)
Point-to-Point Access:
Data Link Control (DLC) Services
Presentation transcript:

Point-to-Point Access: Chapter 12 Point-to-Point Access: PPP

12.1 Point-To-Point Protocol Frame Format Transition States

12.1 PPP frame

12.2 Transition states

12.2 PPP Stack Link Control Protocol (LCP) Authentication Protocols Network Control Protocol (NCP) Bit Padding Digital Signals (DS) Services

12.3 Protocol stack

12.4 LCP packet encapsulated in a frame

Table 12.1 LCP packets and their codes Packet Type Description 0116 Configure-request Contains the list of proposed options and their values 0216 Configure-ack Accepts all options proposed 0316 Configure-nak Announces that some options are not acceptable 0416 Configure-reject Announces that some options are not recognized 0516 Terminate-request Requests to shut down the line 0616 Terminate-ack Accepts the shut down request 0716 Code-reject Announces an unknown code 0816 Protocol-reject Announces an unknown protocol 0916 Echo-request A type of hello message to check if the other end is alive 0A16 Echo-reply The response to the echo-request message 0B16 Discard-request A request to discard the packet

Table 12.2 Common options Maximum receive unit 1500 Default Maximum receive unit 1500 Authentication protocol None Protocol field compression Off Address and control field compression

12.5 PAP

12.6 PAP packets

12.7 CHAP

12.8 CHAP packets

12.9 IPCP packet encapsulated in PPP frame

Table 12.3 Code value for IPCP packets 01 Configure-request 02 Configure-ack 03 Configure-nak 04 Configure-reject 05 Terminate-request 06 Terminate-ack 07 Code-reject

12.10 An example