Data Communications

25
1 Data Communications Point-to-Point Protocol (PPP)

description

Data Communications. Point-to-Point Protocol (PPP). Basics of PPP. Used on point-to-point links such as modem dialup, DSL, and cable modem SLIP (serial line Internet protocol) was first but could only support IP and only static IP address assignment PPP solves both above problems. PPP States. - PowerPoint PPT Presentation

Transcript of Data Communications

Page 1: Data Communications

1

Data Communications

Point-to-Point Protocol (PPP)

Page 2: Data Communications

11.2

Basics of PPP

• Used on point-to-point links such as modem dialup, DSL, and cable modem

• SLIP (serial line Internet protocol) was first but could only support IP and only static IP address assignment

• PPP solves both above problems

Page 3: Data Communications

11.3

PPP States

• Idle state – link is not being used• Establishing state – one endpoint starts a

dialog; options are exchanged between endpoints; several packets may be exchanged

• Authenticating state – optional, two sides agree to authenticate (described later)

Page 4: Data Communications

11.4

PPP States

• Networking state – primary state, exchange of user control and data packets can now be performed

• Terminate state – one side wishes to tear down connection; several packets exchanged (housekeeping)

• (See figure next slide)

Page 5: Data Communications

11.5

Figure 12-2Transition States

Page 6: Data Communications

11.6

PPP Layers

• PPP has only two layers – physical and data link

• Physical layer is not defined – it is whatever the user uses

• Data link layer looks like HDLC, except address field = 11111111 (broadcast), control field = 11000000 (a HDLC U-frame)

Page 7: Data Communications

11.7

Figure 12-1

PPP Frames

Page 8: Data Communications

11.8

PPP Layers

• The Data field carries the packets from one of three other protocols - Link Control Protocol, authentication protocols, and Network Control Protocol, all described shortly

Page 9: Data Communications

11.9

12.3 Protocol stack

Page 10: Data Communications

11.10

Link Control Protocol (LCP)

• Responsible for establishing, maintaining, configuring, terminating link, and negotiation

• All LCP packets are carried in payload field of PPP frame – PPP field Protocol = hex C021

Page 11: Data Communications

11.11

Figure 15-5

LCP Packet Encapsulated in a Frame

Page 12: Data Communications

11.12

Table 12.1 LCP packets and their codes

Code Packet Type Description

0116Configure-request

Contains the list of proposed options and their values

0216 Configure-ack Accepts all options proposed0316 Configure-nak Announces that some options are not acceptable0416 Configure-reject Announces that some options are not recognized

0516Terminate-request Requests to shut down the line

0616 Terminate-ack Accepts the shut down request0716 Code-reject Announces an unknown code0816 Protocol-reject Announces an unknown protocol

0916 Echo-request A type of hello message to check if the other end is alive

0A16 Echo-reply The response to the echo-request message0B16 Discard-request A request to discard the packet

Page 13: Data Communications

11.13

Table 12.2 Common options

Option Default

Maximum receive unit 1500

Authentication protocol None

Protocol field compression OffAddress and control field compression Off

Page 14: Data Communications

11.14

Authentication

• Potentially important since this is dial-up communication

• Two possible protocols for authentication:– Password Authentication Protocol (PAP– Challenge Handshake Authentication Protocol

(CHAP)

Page 15: Data Communications

11.15

Authentication – PAP

• Two-step process– User sends ID and password– System verifies

• PAP packets are encapsulate in a PPP frame• There are 3 types of PAP packets (see the

next two slides)

Page 16: Data Communications

11.16

Figure 12-5

PAP

Page 17: Data Communications

11.17

Figure 12-6

PAP Packets

Page 18: Data Communications

11.18

Authentication – CHAP

• Three-way handshake– System sends a challenge packet– User applies a predefined function that takes

the challenge value and the user’s own password and creates a result

– System does the same; then compares its result to user’s result

Page 19: Data Communications

11.19

Figure 12-7CHAP

Page 20: Data Communications

11.20

Figure 12-8CHAP Packets

Page 21: Data Communications

11.21

IPCP (An NCP Protocol)

• Now that a link has been established and optional security has been established, we need to establish a network layer connection

• IPCP, or Internetwork Protocol Control Protocol, is an NCP (Network Control Protocol)

Page 22: Data Communications

11.22

IPCP• Seven packet types:– Configure-request (01)– Configure-ACK (02)– Configure-NAK (03)– Configure-reject (04)– Terminate-request (05)– Terminate-ACK (06)– Code-reject (07)

Page 23: Data Communications

11.23

Figure 12-9

IPCP Packet Encapsulated in PPP Frame

Page 24: Data Communications

11.24

12.10 An example

Page 25: Data Communications

11.25

An Example