25
1 Data Communications Point-to-Point Protocol (PPP)

1 Data Communications Point-to-Point Protocol (PPP)

  • View
    239

  • Download
    5

Embed Size (px)

Citation preview

Page 1: 1 Data Communications Point-to-Point Protocol (PPP)

1

Data Communications

Point-to-Point Protocol (PPP)

Page 2: 1 Data Communications Point-to-Point Protocol (PPP)

11.2

Basics of PPP

• Used on point-to-point links such as modem dialup, DSL, and cable modem

• SLIP (serial line Internet protocol) was first but could only support IP and only static IP address assignment

• PPP solves both above problems

Page 3: 1 Data Communications Point-to-Point Protocol (PPP)

11.3

PPP States

• Idle state – link is not being used• Establishing state – one endpoint starts a

dialog; options are exchanged between endpoints; several packets may be exchanged

• Authenticating state – optional, two sides agree to authenticate (described later)

Page 4: 1 Data Communications Point-to-Point Protocol (PPP)

11.4

PPP States

• Networking state – primary state, exchange of user control and data packets can now be performed

• Terminate state – one side wishes to tear down connection; several packets exchanged (housekeeping)

• (See figure next slide)

Page 5: 1 Data Communications Point-to-Point Protocol (PPP)

11.5

Figure 12-2Transition States

Page 6: 1 Data Communications Point-to-Point Protocol (PPP)

11.6

PPP Layers

• PPP has only two layers – physical and data link

• Physical layer is not defined – it is whatever the user uses

• Data link layer looks like HDLC, except address field = 11111111 (broadcast), control field = 11000000 (a HDLC U-frame)

Page 7: 1 Data Communications Point-to-Point Protocol (PPP)

11.7

Figure 12-1

PPP Frames

Page 8: 1 Data Communications Point-to-Point Protocol (PPP)

11.8

PPP Layers

• The Data field carries the packets from one of three other protocols - Link Control Protocol, authentication protocols, and Network Control Protocol, all described shortly

Page 9: 1 Data Communications Point-to-Point Protocol (PPP)

11.9

12.3 Protocol stack

Page 10: 1 Data Communications Point-to-Point Protocol (PPP)

11.10

Link Control Protocol (LCP)

• Responsible for establishing, maintaining, configuring, terminating link, and negotiation

• All LCP packets are carried in payload field of PPP frame – PPP field Protocol = hex C021

Page 11: 1 Data Communications Point-to-Point Protocol (PPP)

11.11

Figure 15-5

LCP Packet Encapsulated in a Frame

Page 12: 1 Data Communications Point-to-Point Protocol (PPP)

11.12

Table 12.1 LCP packets and their codes

Code Packet Type Description

0116Configure-request

Contains the list of proposed options and their values

0216 Configure-ack Accepts all options proposed

0316 Configure-nak Announces that some options are not acceptable

0416 Configure-reject Announces that some options are not recognized

0516Terminate-request Requests to shut down the line

0616 Terminate-ack Accepts the shut down request

0716 Code-reject Announces an unknown code

0816 Protocol-reject Announces an unknown protocol

0916 Echo-requestA type of hello message to check if the other end is alive

0A16 Echo-reply The response to the echo-request message

0B16 Discard-request A request to discard the packet

Page 13: 1 Data Communications Point-to-Point Protocol (PPP)

11.13

Table 12.2 Common options

Option Default

Maximum receive unit 1500

Authentication protocol None

Protocol field compression Off

Address and control field compression Off

Page 14: 1 Data Communications Point-to-Point Protocol (PPP)

11.14

Authentication

• Potentially important since this is dial-up communication

• Two possible protocols for authentication:– Password Authentication Protocol (PAP– Challenge Handshake Authentication Protocol

(CHAP)

Page 15: 1 Data Communications Point-to-Point Protocol (PPP)

11.15

Authentication – PAP

• Two-step process– User sends ID and password– System verifies

• PAP packets are encapsulate in a PPP frame• There are 3 types of PAP packets (see the

next two slides)

Page 16: 1 Data Communications Point-to-Point Protocol (PPP)

11.16

Figure 12-5

PAP

Page 17: 1 Data Communications Point-to-Point Protocol (PPP)

11.17

Figure 12-6

PAP Packets

Page 18: 1 Data Communications Point-to-Point Protocol (PPP)

11.18

Authentication – CHAP

• Three-way handshake– System sends a challenge packet– User applies a predefined function that takes

the challenge value and the user’s own password and creates a result

– System does the same; then compares its result to user’s result

Page 19: 1 Data Communications Point-to-Point Protocol (PPP)

11.19

Figure 12-7CHAP

Page 20: 1 Data Communications Point-to-Point Protocol (PPP)

11.20

Figure 12-8CHAP Packets

Page 21: 1 Data Communications Point-to-Point Protocol (PPP)

11.21

IPCP (An NCP Protocol)

• Now that a link has been established and optional security has been established, we need to establish a network layer connection

• IPCP, or Internetwork Protocol Control Protocol, is an NCP (Network Control Protocol)

Page 22: 1 Data Communications Point-to-Point Protocol (PPP)

11.22

IPCP• Seven packet types:– Configure-request (01)– Configure-ACK (02)– Configure-NAK (03)– Configure-reject (04)– Terminate-request (05)– Terminate-ACK (06)– Code-reject (07)

Page 23: 1 Data Communications Point-to-Point Protocol (PPP)

11.23

Figure 12-9

IPCP Packet Encapsulated in PPP Frame

Page 24: 1 Data Communications Point-to-Point Protocol (PPP)

11.24

12.10 An example

Page 25: 1 Data Communications Point-to-Point Protocol (PPP)

11.25

An Example