Point-to-Point Protocol (PPP) 點對點網路協定

Slides:



Advertisements
Similar presentations
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 12 Point-to-Point Access: PPP.
Advertisements

S4C4 PPP. Protocols Point to Point Protocol Link Control Protocol Network Control Program Password Authentication Protocol Challenge Handshake Authentication.
1 Data Link Protocols Relates to Lab 2. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet,
Point-to-Point Protocol
Gursharan Singh Tatla SLIP and PPP 27-Mar
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: Point-to- Point Connections Connecting Networks.
1 Data Communications Point-to-Point Protocol (PPP)
11-6 HDLC High-level Data Link Control (HDLC) is a bit-oriented protocol for communication over point-to-point and multipoint links. It implements the.
Serial Connections Connections over a WAN rather than a LAN This chapter describes the Cisco proprietary HDLC protocol and the PPP protocol.
11-6 HDLC High-level Data Link Control (HDLC) is a bit-oriented protocol for communication over point-to-point and multipoint links. It implements the.
Semester 4 - Chapter 4 – PPP WAN connections are controlled by protocols In a LAN environment, in order to move data between any two nodes or routers two.
PPP (Point to Point protocol).  On WAN connection, the protocol depends on the WAN technology and communicating equipment:  Examples:  HDLC –  The.
K. Salah 1 Chapter 12 Point-to-Point Access: PPP.
1 CCNA 4 v3.1 Module 3. 2 CCNA 4 v3.0 Module 3 PPP.
CCNA 5.0 Planning Guide Chapter 3: Point-to-Point Connections.
Example Data Link Protocols Quick review Reference Models? Layers? Flow Control? Bit stuffing? Connection Oriented? Synchronous transmission?
Point-to-Point Access: PPP. In a network, two devices can be connected by a dedicated link or a shared link. In the first case, the link can be used by.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Point-to-Point Protocol (PPP) Accessing the WAN – Chapter 2.
WAN Networking Protocols 1 WAN Connection Types Share bandwidth Frame Relay and X.25 56Kbps to 2.048Mps Point-to-Point connection No setup before transmission.
 It defines the format of the frame to be exchanged between devices.  It defines how two devices can negotiate the establishment of the link and the.
PPP (Point to Point Protocol)
CCNA Cisco Certified Network Associate. Point-to-point Protocol (PPP)
MODULE I NETWORKING CONCEPTS.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Point-to-Point Protocol (PPP) Accessing the WAN – Chapter 2.
Robert E. Meyers CCNA, CCAI Youngstown State University Cisco Regional Academy Instructor Cisco Networking Academy Program Semester 4, v Chapter.
CCNA Guide to Cisco Networking
Introduction to PPP. Using dial-up modems for packet-oriented- networking (i.e connecting to the internet) requires a data-link layer protocol widely-spread.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Point-to-Point Protocol (PPP) Accessing the WAN – Chapter 2.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Point-to-Point Protocol (PPP) Accessing the WAN – Chapter 2.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 4 v3.0 Module 3 PPP.
CCNA Guide to Cisco Networking Fundamentals Fourth Edition
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Implementing Enterprise WAN Links Introducing Routing and Switching in the Enterprise – Chapter.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Implementing Enterprise WAN Links Introducing Routing and Switching in the Enterprise.
Wide Area Networks(WANs) Lecture Week 2. Point-to-Point Protocol (PPP) Accessing the WAN.
Copyright Kenneth M. Chipps Ph.D. PPP Last Update
Point to Point Protocol
Point-to-Point Access: PPP PPP Between Routers  Used for Point-to-Point Connections only  Used as data link control (encapsulates network layer.
1 Point-to-Point Protocol Cisco Networking Academy Semester 4.
Chap 1 – Point-to-Point Protocol (PPP) Learning Objectives
Computer Networks Module 3: Data Link Layer (Framing) Dr. Vikram Shete St. Francis Institute of Technology.
4 Semester 4 CHAPTER 4 REVIEW JEOPARDY S2C04 Jeopardy Review.
Chapter 11 Data Link Control
Wide Area Networks (WAN) Terms that are commonly used by service providers: Customer premises equipment (CPE) Equipment that’s owned by the subscriber.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Services in a Converged WAN Accessing the WAN – Chapter 1.
Point to Point connections
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 4 v3.1 Module 3 PPP.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 4 v3.0 Module 3 PPP.
Data Link Protocols Relates to Lab 2.
Exploration 4 Chapter 2 ppp. Serial and Parallel communication One way to get bits to move faster through a wire is to compress the data so that less.
+ PPP Protocol. + Outline WAN Data Link Layer protocols Point-to-point serial communications Transmission Synchronization HDLC.
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter 4 1 Chapter 3: Point-to- Point Connections Connecting Networks.
Data Communications Data Link Layer.
Point-Point Protocol (PPP) by William F. Widulski.
Point-to-Point Protocol (PPP)
Instructor Materials Chapter 2: Point-to-Point Connections
PPP Protocol.
PPP Protocol.
PPP Protocol.
Lesson 6 Point to Point Protocol
Instructor Materials Chapter 2: Point-to-Point Connections
PPP PROTOCOL The First semester
Chapter 2: Point-to-Point Connections
Chapter 2: Point-to-Point Connections
Point-to-Point Protocol (PPP)
CCNA 4 Chapter 2 PPP.
Point-to-Point Protocol (PPP)
Point-to-Point Protocol (PPP) Part I
Point-to-Point Protocol (PPP)
Point-to-Point Protocol (PPP)
PPP Protocol.
Presentation transcript:

Point-to-Point Protocol (PPP) 點對點網路協定 CCNA Exploration Accessing the WAN – Chapter 2

Introduction to Serial Communication With a serial connection (串列連線) , information is sent across one wire, one data bit at a time. In reality, it is often the case that serial links can be clocked considerably faster than parallel links, and they achieve a higher data rate.

Serial Communication Standards There are three key serial communication standards affecting LAN-to-WAN connections: RS-232 A serial port is a general-purpose interface that can be used for almost any type of device including modems. V.35 V.35 is the interface standard used by most routers and DSUs that connect to T1 carriers. HSSI It supports transmission rates up to 52 Mb/s. Engineers use HSSI to connect routers on LANs with WANs over high-speed lines such as T3 lines.

Time Division Multiplexing (分時多工) Bell Laboratories invented time-division multiplexing (TDM) to maximize the amount of voice traffic carried over a medium. TDM divides the bandwidth of a single link into separate channels or time slots. The channels take turns using the link.

Time Division Multiplexing At sending end: A multiplexer (MUX,多工器) at the transmitter accepts different signals. The MUX breaks each signal into segments. The MUX puts each segment into a single channel by inserting each segment into a timeslot. At receiving end: A MUX at the receiving end reassembles the TDM stream into the different data streams based only on the timing of the arrival of each bit.

Statistical Time Division Multiplexing Problem of TDM: TDM shares this inefficiency when traffic is intermittent, because the time slot is still allocated even when the channel has no data to transmit. Statistical time-division multiplexing (STDM) uses a variable time slot length allowing channels to compete for any free slot space. STDM requires each transmission to carry identification information (a channel identifier).

TDM Examples - ISDN and SONET An example of a technology that uses synchronous TDM is ISDN. ISDN basic rate (BRI) has three channels consisting of two 64 kb/s B-channels (B1 and B2), and a 16 kb/s D-channel. The TDM has nine timeslots, which are repeated in the sequence shown in the following figure.

TDM Examples - ISDN and SONET On a larger scale, the telecommunications industry uses the SONET or SDH standard for optical transport of TDM data. SONET/SDH takes n bit streams, multiplexes them, and optically modulates the signal, sending it out using a light emitting device over fiber with a bit rate equal to (incoming bit rate) x n.

TDM Examples - ISDN and SONET The original unit used in multiplexing telephone calls is 64 kb/s for one phone call. It is referred to as a DS-0 or DS0 (digital signal level zero). In North America, 24 DS0 units, outside North America, 32 DS0 units.

TDM Examples - ISDN and SONET T-carrier refers to the bundling of DS0s and E-carrier Hierarchy is similar to T-carrier.

Demarcation Point

DTE-DCE From the point of view of connecting to the WAN, a serial connection has a DTE device at one end of the connection and a DCE device at the other end.

DTE-DCE The router end of the shielded serial transition cable may be a DB-60 connector, which connects to the DB-60 port on a serial WAN interface card. The router interface end of the Smart Serial cable is a 26-pin connector.

DTE-DCE Router-to-router connection

DTE-DCE Parallel to Serial Conversion Your PC also has a Universal Asynchronous Receiver/Transmitter (UART) chip on the motherboard. The UART is the DTE agent of your PC and communicates with the modem or other serial device.

WAN Encapsulation Protocols To ensure that the correct protocol is used on the WAN link, you need to configure the appropriate Layer 2 encapsulation type.

HDLC Encapsulation HDLC is a synchronous Data Link layer bit-oriented protocol developed by ISO. HDLC provides both connection-oriented and connectionless service. HDLC defines a Layer 2 framing structure that allows for flow control and error control through the use of acknowledgments. Each frame has the same format, whether it is a data frame or a control frame. HDLC uses a frame delimiter, or flag, to mark the beginning and the end of each frame.

HDLC Encapsulation Cisco has developed an extension to the HDLC protocol to solve the inability to provide multiprotocol support. Cisco HDLC frames contain a field for identifying the network protocol being encapsulated.

HDLC Frame Field

HDLC Frame Field Flag Address Protocol (only used in Cisco HDLC) The flag field initiates and terminates error checking. The frame always starts and ends with an 8-bit flag field. The bit pattern is 01111110. Address The address field contains the HDLC address of the secondary station. Protocol (only used in Cisco HDLC) This field specifies the protocol type encapsulated within the frame (e.g. 0x0800 for IP).

HDLC Frame Field Control The control field uses three different formats, depending on the type of HDLC frame used: Information (I) frame: I-frames carry upper layer information and some control information. This frame sends and receives sequence numbers, and the poll final (P/F) bit performs flow and error control. Supervisory (S) frame: S-frames provide control information. An S-frame can request and suspend transmission, report on status, and acknowledge receipt of I-frames. Unnumbered (U) frame: U-frames support control purposes and are not sequenced. A U-frame can be used to initialize secondaries.

HDLC Frame Field Data Frame check sequence (FCS) The data field contains a path information unit (PIU) or exchange identification (XID) information. Variable length field (L3 packets). Frame check sequence (FCS) The FCS is usually a cyclic redundancy check (CRC) calculation remainder. The CRC calculation is redone in the receiver. If the result differs from the value in the original frame, an error is assumed.

Configuring HDLC Encapsulation Cisco HDLC is the default encapsulation method used by Cisco devices on synchronous serial lines. If the default encapsulation method has been changed, use the encapsulation hdlc command to re-enable HDLC. Two steps : Enter the interface configuration mode of the serial interface. Enter the encapsulation hdlc command to specify the encapsulation protocol on the interface.

Troubleshooting a Serial Interface The show interface serial command returns any of the following five possible problem states in the interface status line: Serial x is down, line protocol is down Serial x is up, line protocol is down Serial x is up, line protocol is up (looped) Serial x is up, line protocol is down (disabled) Serial x is administratively down, line protocol is down

Troubleshooting a Serial Interface The show controllers command is used to indicate the state of the interface channels and whether a cable is attached to the interface.

Point-to-Point Protocol (PPP) PPP establishes a direct connection using serial cables, phone lines, trunk lines, cellular telephones, specialized radio links, or fiber-optic links. When you need to connect to a non-Cisco router, you should use PPP encapsulation. Advantages of using PPP The link quality management feature monitors the quality of the link. If too many errors are detected, PPP takes the link down. PPP supports PAP and CHAP authentication.

Point-to-Point Protocol (PPP) PPP contains three main components: HDLC protocol for encapsulating datagrams over point-to-point links. Extensible Link Control Protocol (LCP) to establish, configure, and test the data link connection. Family of Network Control Protocols (NCPs) for establishing and configuring different Network layer protocols.

PPP Architecture PPP and OSI share the same Physical layer, but PPP distributes the functions of LCP and NCP differently.

PPP Architecture At the physical layer, you can configure PPP on a range of interfaces, including: Asynchronous serial Synchronous serial HSSI ISDN

PPP Architecture Link Control Protocol Layer LCP has a role in establishing, configuring, and testing the data-link connection. The LCP provides automatic configuration of the interfaces at each end, including: Handling varying limits on packet size Detecting common misconfiguration errors Terminating the link Determining when a link is functioning properly or when it is failing

PPP Architecture Network Control Protocol Layer PPP permits multiple network layer protocols to operate on the same communications link. For every network layer protocol used, a separate Network Control Protocol (NCP) is provided. For example, Internet Protocol (IP) uses the IP Control Protocol (IPCP), and Internetwork Packet Exchange (IPX) uses the Novell IPX Control Protocol (IPXCP).

PPP Frame Flag - Indicates the beginning or end of a frame (01111110). Address - Consists of the standard broadcast address, 11111111. Control - A connectionless link service is provided. Protocol - identify the protocol encapsulated in the data field of the frame. Data - 0 or more bytes that contain the datagram for the protocol specified in the protocol field. The default maximum length of the data field is 1500 bytes. FCS - for error control purposes.

Establishing a PPP Session

Establishing a PPP Session Phase 1: Link establishment and configuration negotiation Before PPP exchanges any Network layer datagrams (for example, IP), the LCP must first open the connection and negotiate configuration options. This phase is complete when the receiving router sends a configuration-acknowledgment frame back to the router initiating the connection. Phase 2: Link quality determination (optional) The LCP tests the link to determine whether the link quality is sufficient to bring up Network layer protocols.

Establishing a PPP Session Phase 3: Network layer protocol configuration negotiation After the LCP has finished the link quality determination phase, the appropriate NCP can separately configure the Network layer protocols, and bring them up and take them down at any time. If the LCP closes the link, it informs the Network layer protocols so that they can take appropriate action.

Establishing a PPP Session

LCP Operation LCP operation uses three classes of LCP frames to accomplish the work of each of the LCP phases: Link-establishment frames establish and configure a link (Configure-Request, Configure-Ack, Configure-Nak, and Configure-Reject) Link-maintenance frames manage and debug a link (Code-Reject, Protocol-Reject, Echo-Request, Echo-Reply, and Discard-Request) Link-termination frames terminate a link (Terminate-Request and Terminate-Ack)

PPP Configuration Options PPP can be configured to support various functions including: Authentication (認證) using either PAP or CHAP Compression using either Stacker or Predictor Multilink (多連結) which combines two or more channels to increase the WAN bandwidth

NCP Process After the LCP has configured and authenticated the basic link, the appropriate NCP is invoked to complete the specific configuration of the Network layer protocol being used. When the NCP has successfully configured the Network layer protocol, the network protocol is in the open state on the established LCP link. Reference http://www.netadmin.com.tw/article_content.asp?sn=0805270013

PPP Configuration Commands Enabling PPP on an Interface The following example enables PPP encapsulation on serial interface 0/0/0: R3#configure terminal R3(config)#interface serial 0/0/0 R3(config-if)#encapsulation ppp Configuring PPP compression To configure compression over PPP, enter the following commands: R3(config-if)#compress [predictor | stac]

Verifying and debugging

Verifying and debugging

Password Authentication Protocol (PAP) Characteristics of PAP Two-way process (2-way handsake,雙向握手) PAP is not a strong authentication protocol. Passwords are sent across the link in clear text and there is no protection from playback or repeated trial-and-error attacks. The remote node is in control of the frequency and timing of the login attempts. Authentication process performs once.

Password Authentication Protocol (PAP) When to use PAP PAP may be used in the following environments: A large installed base of client applications that do not support CHAP Incompatibilities between different vendor implementations of CHAP Situations where a plaintext password must be available to simulate a login at the remote host

Password Authentication Protocol (PAP) Initiating PAP Completing PAP

Challenge Handshake Authentication Protocol (CHAP) Characteristics of CHAP CHAP is used at the startup of a link and periodically verifies the identity of the remote node. The local router or a third-party authentication server is in control of the frequency and timing of the challenges. CHAP provides protection against playback attack through the use of a variable challenge value that is unique and unpredictable.

Challenge Handshake Authentication Protocol (CHAP) Initiating CHAP (By remote router) Responding CHAP (By local router) Hash value

Challenge Handshake Authentication Protocol (CHAP) Completing CHAP (By remote router) Reference: http://en.wikipedia.org/wiki/Challenge-handshake_authentication_protocol http://www.cisco.com/en/US/tech/tk713/tk507/technologies_tech_note09186a00800b4131.shtml

PPP Encapsulation and Authentication Process

Configuring PPP Authentication Configuring PAP authentication

Configuring PPP Authentication Configuring CHAP authentication

End