12. Point-to-Point Access: PPP

Slides:



Advertisements
Similar presentations
ADSL Systems - An Overview Praveen Reguraman InterOperability Lab University of New Hampshire 1999.
Advertisements

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 12 Point-to-Point Access: PPP.
Labcourse “Routerlab”
Point-to-Point Protocol (PPP) ผศ. ดร. อนันต์ ผลเพิ่ม Asst.Prof.Anan Phonphoem, Ph.D. Computer Engineering.
S4C4 PPP. Protocols Point to Point Protocol Link Control Protocol Network Control Program Password Authentication Protocol Challenge Handshake Authentication.
Point-to-Point Protocol
Gursharan Singh Tatla SLIP and PPP 27-Mar
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 4 Point to Point Protocol (PPP)
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: Point-to- Point Connections Connecting Networks.
1 Data Communications Point-to-Point Protocol (PPP)
11-6 HDLC High-level Data Link Control (HDLC) is a bit-oriented protocol for communication over point-to-point and multipoint links. It implements the.
Introduction to PPP Sharon Katz. History Dial-up file transfer protocol Early 80`s: PC users begin to communicate through file transfer protocols: X-Modem.
11-6 HDLC High-level Data Link Control (HDLC) is a bit-oriented protocol for communication over point-to-point and multipoint links. It implements the.
Semester 4 - Chapter 4 – PPP WAN connections are controlled by protocols In a LAN environment, in order to move data between any two nodes or routers two.
Point to Point Protocol Operation. Point to Point Protocol Protocol Layers of PPP –Physical Layer –Data Link Layer – HDLC derivative –Other protocols.
PPP (Point to Point protocol).  On WAN connection, the protocol depends on the WAN technology and communicating equipment:  Examples:  HDLC –  The.
K. Salah 1 Chapter 12 Point-to-Point Access: PPP.
1 CCNA 4 v3.1 Module 3. 2 CCNA 4 v3.0 Module 3 PPP.
PPP Protocol PPP Stack -Establish a link (Link Control Protocol) -Authenticate Parties involved (Authentication Protocols) -Carry Network Layer (Network.
CCNA 5.0 Planning Guide Chapter 3: Point-to-Point Connections.
Example Data Link Protocols Quick review Reference Models? Layers? Flow Control? Bit stuffing? Connection Oriented? Synchronous transmission?
Remote Networking Architectures
As first introduced in Chapter 2, “Wide Area Network (WAN) Technologies,” PPP is a stan- dard for using point-to-point network links that provides the.
Point-to-Point Access: PPP. In a network, two devices can be connected by a dedicated link or a shared link. In the first case, the link can be used by.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Point-to-Point Protocol (PPP) Accessing the WAN – Chapter 2.
Introduction to PPP. Using dial-up modems for packet-oriented- networking (I.e connecting to the internet) requires a data-link layer protocol widely-spread.
 It defines the format of the frame to be exchanged between devices.  It defines how two devices can negotiate the establishment of the link and the.
Chapter Objectives At the end of this chapter you will be able to: Describe standardisation in the data communications area Describe the following technologies:
Robert E. Meyers CCNA, CCAI Youngstown State University Cisco Regional Academy Instructor Cisco Networking Academy Program Semester 4, v Chapter.
Introduction to PPP. Using dial-up modems for packet-oriented- networking (i.e connecting to the internet) requires a data-link layer protocol widely-spread.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Point-to-Point Protocol (PPP) Accessing the WAN – Chapter 2.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 4 v3.0 Module 3 PPP.
CCNA Guide to Cisco Networking Fundamentals Fourth Edition
Copyright Kenneth M. Chipps Ph.D. PPP Last Update
Point to Point Protocol
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer Addressing.
Point-to-Point Access: PPP PPP Between Routers  Used for Point-to-Point Connections only  Used as data link control (encapsulates network layer.
Lesson 1: Local Area Network (LAN) Technologies LAN encapsulations Ethernet Token Ring FDDI IEEE
Computer Networks Module 3: Data Link Layer (Framing) Dr. Vikram Shete St. Francis Institute of Technology.
10/27/ Data Link Layer - Lin 1 CPET/ECET Data Link Layer Data Communications and Networking Fall 2004 Professor Paul I-Hai Lin Electrical.
Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access.
4 Semester 4 CHAPTER 4 REVIEW JEOPARDY S2C04 Jeopardy Review.
Chapter 11 Data Link Control
10/3/ Multiplexing - Lin 1 CPET/ECET Multiplexing Data Communications and Networking Fall 2004 Professor Paul I-Hai Lin Electrical and Computer.
Data Link Layer: Data Link Control : Data Communication and Computer Networks Asst. Prof. Chaiporn Jaikaeo, Ph.D.
8/28/ Network Models - Lin 1 CPET/ECET Network Models Data Communications and Networking Fall 2004 Professor Paul I-Hai Lin Electrical and.
Presentation of Computer network  Topic:SLIP&PPP Submitted to:- Submitted by:- Mr.Navdeep Bhandari Charu Harpreet Ankita Ankita Geetika Geetika.
1 Lecture 03 - Roadmap WAN Basics –Three Types of WAN Services Introduction to Point-to-Point protocol (PPP) Basic Components of PPP Frame Formats of PPP.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 12 Point-to-Point Access: PPP.
Point-to-Point Protocol (PPP) 點對點網路協定
Data Link Protocols Relates to Lab 2.
Giuseppe Bianchi Lecture 1.1: Point to Point Protocol (PPP) An introduction Recommended reading: PPP specification, RFC (STD 51), July 1994.
Exploration 4 Chapter 2 ppp. Serial and Parallel communication One way to get bits to move faster through a wire is to compress the data so that less.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 12 Point-to-Point Access: (PPP)
Point-to-Point Access:
Point-Point Protocol (PPP) by William F. Widulski.
Chapter 11 Data Link Control
Point-to-Point Protocol (PPP)
Chapter 11 Data Link Control (DLC)
Lesson 6 Point to Point Protocol
Chapter 11 - Part 2 Data Link Control.
PPP – Point to Point Protocol
ZyXEL Communications Corporation
Point-to-Point Protocol (PPP)
Point-to-Point Protocol (PPP)
Point-to-Point Access:
Point-to-Point Access:
Point-to-Point Protocol (PPP)
Point-to-Point Protocol (PPP)
Point-to-Point Access:
Presentation transcript:

12. Point-to-Point Access: PPP CPET/ECET 355 12. Point-to-Point Access: PPP Data Communications and Networking Fall 2004 Professor Paul I-Hai Lin Electrical and Computer Engineering Technology Indiana University-Purdue University Fort Wayne www.ecet.ipfw.edu/~lin 11. Data Link Control and Protocols - Lin 10/27/2004

Point-to-Point Access: PPP Data Link Protocol for Dial-up modems DSL modems Cable modems PPP Defines Frame format Negotiate and establish exchange of data Encapsulation of network layer data Authentication 11. Data Link Control and Protocols - Lin 10/27/2004

PPP – Frame Format Address Field Control Field Protocol Field Data Field Frame Check Sequence (FCS) From p. 296, Figure 12.1 of Data Communications and Networking, Forouzan, McGrawHill 11. Data Link Control and Protocols - Lin 10/27/2004

PPP – Transition States Idle, Establishing, Authenticating, Networking, Terminating From p. 296, Figure 12.2 of Data Communications and Networking, Forouzan, McGrawHill 11. Data Link Control and Protocols - Lin 10/27/2004

PPP – Stack Three Protocols Link Control protocol Authentication protocol, and Network Control protocol From p. 297, Figure 12.3 of Data Communications and Networking, Forouzan, McGrawHill 11. Data Link Control and Protocols - Lin 10/27/2004

PPP – Link Control Protocol LCP Responsibilities Establishing, Maintaining, Configuring, and Terminating Links Payload: Code, ID, Length, Information Fields From p. 298, Figure 12.4 of Data Communications and Networking, Forouzan, McGrawHill 11. Data Link Control and Protocols - Lin 10/27/2004

PPP – LCP Packets Code Packet Type Description 0116 Configure-request Contains the list of proposed options and their values 0216 Configure-ack Accepts all options proposed 0316 Configure-nak Announces that some options are not acceptable 0416 Configure-reject Announces that some options are not recognized 0516 Terminate-request Requests to shut down the line 0616 Terminate-ack Accepts the shut down request 0716 Code-reject Announces an unknown code 0816 Protocol-reject Announces an unknown protocol 0916 Echo-request A type of hello message to check if the other end is alive 0A16 Echo-reply The response to the echo-request message 0B16 Discard-request A request to discard the packet From p. 298, Table 12.1 of Data Communications and Networking, Forouzan, McGrawHill 11. Data Link Control and Protocols - Lin 10/27/2004

PPP – LCP Packets Configuration Packets Link Termination Packets Configuration-request Configuration-ack Configuration-nak Configuration-reject Link Termination Packets Termination-request Termination-ack 11. Data Link Control and Protocols - Lin 10/27/2004

PPP – LCP Packets Link Monitoring and Debugging Packets Code-reject Protocol-reject Echo-request Echo-reply Discard-request Options (in the info field) 11. Data Link Control and Protocols - Lin 10/27/2004

LCP Packet Option Maximum receive unit 1500 Authentication protocol Default Maximum receive unit 1500 Authentication protocol None Protocol field compression Off Address and control field compression From p. 298, Figure 12.4 of Data Communications and Networking, Forouzan, McGrawHill 11. Data Link Control and Protocols - Lin 10/27/2004

Authentication Protocols Password Authentication Protocols (PAP) User sends ID (user name), and Password System checks the validity: accept, or reject Challenge Handshake Authentication Protocols (CHAP) System send a challenge packet The user applies a predefined function, and reply the challenge packet The system does the same to see if the same result can be obtained: accept or reject 11. Data Link Control and Protocols - Lin 10/27/2004

PAP (Password Authentication) From p. 300, Figure 12.5 of Data Communications and Networking, Forouzan, McGrawHill 11. Data Link Control and Protocols - Lin 10/27/2004

PAP Packets From p. 301, Figure 12.6 of Data Communications and Networking, Forouzan, McGrawHill 11. Data Link Control and Protocols - Lin 10/27/2004

CHAP From p. 302, Figure 12.7 of Data Communications and Networking, Forouzan, McGrawHill 11. Data Link Control and Protocols - Lin 10/27/2004

CHAP Packets From p. 302, Figure 12.8 of Data Communications and Networking, Forouzan, McGrawHill 11. Data Link Control and Protocols - Lin 10/27/2004

Network Control Protocol (NCP) IPCP: Internetwork Protocol Control Protocol From p. 303, Figure 12.9 of Data Communications and Networking, Forouzan, McGrawHill 11. Data Link Control and Protocols - Lin 10/27/2004

Code Values for IPCP Packets 01 Configure-request 02 Configure-ack 03 Configure-nak 04 Configure-reject 05 Terminate-request 06 Terminate-ack 07 Code-reject From p. 303, Table 12.3 of Data Communications and Networking, Forouzan, McGrawHill 11. Data Link Control and Protocols - Lin 10/27/2004

PPP Connection Example From p. 303, Figure 12.9 of Data Communications and Networking, Forouzan, McGrawHill 11. Data Link Control and Protocols - Lin 10/27/2004

Summary Questions? 11. Data Link Control and Protocols - Lin 10/27/2004