SlideShare uma empresa Scribd logo
1 de 20
Point to Point Protocol
PRESENTER: PHAN DINH VUONG
INSTRUCTOR: PROF.DR.FRIEDBERT KASPAR
Agenda
What is PPP?
Design Requirements
Data frame format
Byte stuffing
Control Protocol
Wireshark Demo
Q&A
OSI Model
What is Point-to-Point Protocol ?
What is the difference between point to point and peer to peer?
Answer:
- Point to point is a protocol for communication between two
computers using a serial interface (phone).
- Peep to peer (P2P) is a communication model in which each
party has the same capabilities and either party can initiate a
communication session (BitTorrent).
What is Point-to-Point Protocol ?
The Point-to-Point Protocol (PPP) provides a standard method for transporting
multi-protocol datagrams over point-to-point links. PPP is comprised of three
main components:
• A method for encapsulating multi-protocol datagrams.
• A Link Control Protocol (LCP) for establishing, configuring, and testing the
data-link connection.
• A family of Network Control Protocols (NCPs) for establishing and configuring
different network-layer protocols.
Design requirements?
• Packet framing: Packet (from network-layer)  Frames (start & end of frame)
• Transparency.To network layer packet (headers or data).
• Multiple network layer protocols. Able to support multiple network layer protocols (e.g., IP, RIP,
ICMP) running over the same physical link at the same time.
• Multiple types of links. Operate over a wide variety of link types: serial or parallel, synchronous or
asynchronous, low speed or high speed, electrical or optical.
• Error detection. Able to detect bit errors in the received frame.
• Connection liveness: detect a failure at the link level (e.g., the inability to transfer data from the
sending side of the link to the receiving side of this link) and signal this error condition to the
network layer.
• Network Layer Address Negotiation. mechanism for the communicating network layers (e.g., IP)
to learn or configure each other's network layer address.
• Simplicity.The first and foremost among all requirements . RFC 1547 states "the watchword for a
point-to-point protocol should be simplicity."
Design Non-requirements?
• Error correction. Required to detect bit errors but
is NOT required to correct
• Flow control. receive frames at the full rate of the underlying
physical layer .NO need to control for upper layers
• Sequencing. NOT required to deliver frames in the same order
• Multipoint links. Only a single sender and a single receiver.
Data frame format
01111110 11111111 00000011 Protocol Info Padding Check 01111110
• Flag: delimiter (framing)
• Address: not used in PPP as no support addressing(used in HDLC broadcast address)
• Control: always 00000011, transmission not sequenced, connectionless link.
• Protocol: upper layer protocol to which frame delivered (eg,IP 0x0021, IPX 0x002B)
• Info: upper layer data being carried
• Padding: In some cases, additional dummy bytes may be added to pad out the size
of the PPP frame.
• Check: cyclic redundancy check for error detection (2 0r 4 bytes, default 2 bytes)
Flag FlagAddress Control
1 byte 1 byte 1 byte 1 or 2 byte
Variable
length 2 or 4 bytes 1 byte
Variable
length
Stuffing
• Question: if receive <01111110> => It is data or flag?
• Sender: adds (“stuffs”) extra < 01111110> byte after
each < 01111110> data byte
• Receiver:
- two 01111110 bytes in a row:  discard first byte,
continue data reception
- single 01111110: flag byte
PPP PPP
A5
BB
01111110
B4
B4
01111110
BB
A5
A5 BB 01111110 01111110 B4
Control Protocol
Authentication
Value (in hex) Protocol
• c023 Password Authentication Protocol (PAP)
• c223 Challenge Handshake Authentication Protocol (CHAP)
Password Authentication Protocol (PAP)
Challenge Handshake Authentication Protocol(CHAP)
Wireshark Demo
Frame format
Q&A
Thank you!
References
• http://www-ee.uta.edu/online/wang/ppp.pdf
• Wikipedia: http://en.wikipedia.org/wiki/PPP
• RFC 1661: http://www.ietf.org/rfc/rfc1661.txt

Mais conteúdo relacionado

Mais procurados (20)

Transport layer services
Transport layer servicesTransport layer services
Transport layer services
 
Transport layer
Transport layer Transport layer
Transport layer
 
IPv4
IPv4IPv4
IPv4
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
 
TCP/ IP
TCP/ IP TCP/ IP
TCP/ IP
 
Switching
SwitchingSwitching
Switching
 
Point to-point protocol (ppp)
Point to-point protocol (ppp)Point to-point protocol (ppp)
Point to-point protocol (ppp)
 
Token bus
Token busToken bus
Token bus
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
File transfer protocol
File transfer protocolFile transfer protocol
File transfer protocol
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
DHCP
DHCPDHCP
DHCP
 
Network layer - design Issues
Network layer - design IssuesNetwork layer - design Issues
Network layer - design Issues
 
Dhcp ppt
Dhcp pptDhcp ppt
Dhcp ppt
 
Design issues for the layers
Design issues for the layersDesign issues for the layers
Design issues for the layers
 
Domain name system
Domain name systemDomain name system
Domain name system
 
Chap 8 switching
Chap 8 switchingChap 8 switching
Chap 8 switching
 
HDLC
HDLCHDLC
HDLC
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
 

Destaque

Point to point.48
Point to point.48Point to point.48
Point to point.48myrajendra
 
Presentation1
Presentation1Presentation1
Presentation1tapubhai
 
Cellular network presentation
Cellular network presentationCellular network presentation
Cellular network presentationAditya Pandey
 
Interferences
InterferencesInterferences
InterferencesAJAL A J
 
Error Detection N Correction
Error Detection N CorrectionError Detection N Correction
Error Detection N CorrectionAnkan Adhikari
 
Cdma presentation
Cdma presentationCdma presentation
Cdma presentationbsnlpandian
 
Cdma system
Cdma systemCdma system
Cdma systemtrimba
 
Code division multiple access
Code division multiple accessCode division multiple access
Code division multiple accessmangal das
 
Code Division Multiple Access- CDMA
Code Division Multiple Access- CDMA Code Division Multiple Access- CDMA
Code Division Multiple Access- CDMA ViVek Patel
 

Destaque (11)

Point to point.48
Point to point.48Point to point.48
Point to point.48
 
Presentation1
Presentation1Presentation1
Presentation1
 
Cellular network presentation
Cellular network presentationCellular network presentation
Cellular network presentation
 
Presentation on CDMA
Presentation on CDMAPresentation on CDMA
Presentation on CDMA
 
Interferences
InterferencesInterferences
Interferences
 
Error Detection N Correction
Error Detection N CorrectionError Detection N Correction
Error Detection N Correction
 
CDMA
CDMACDMA
CDMA
 
Cdma presentation
Cdma presentationCdma presentation
Cdma presentation
 
Cdma system
Cdma systemCdma system
Cdma system
 
Code division multiple access
Code division multiple accessCode division multiple access
Code division multiple access
 
Code Division Multiple Access- CDMA
Code Division Multiple Access- CDMA Code Division Multiple Access- CDMA
Code Division Multiple Access- CDMA
 

Semelhante a Point To Point Protocol

Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IPPiero Fraternali
 
data link layer.pptx
data link layer.pptxdata link layer.pptx
data link layer.pptxHarshalBodhe4
 
Unit 2 ppt-idc
Unit 2 ppt-idcUnit 2 ppt-idc
Unit 2 ppt-idchiya123jes
 
CISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalCISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalKarthikeyan Dhayalan
 
Unit 2 - Internet Protocol Overview - IT
Unit 2 - Internet Protocol Overview - ITUnit 2 - Internet Protocol Overview - IT
Unit 2 - Internet Protocol Overview - ITDeepraj Bhujel
 
ETE405-lec7.pdf
ETE405-lec7.pdfETE405-lec7.pdf
ETE405-lec7.pdfmashiur
 
Introduction to Ethernet para radio enlace
Introduction to Ethernet para radio enlaceIntroduction to Ethernet para radio enlace
Introduction to Ethernet para radio enlacejonatanmedeirosgomes1
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2CCNA (R & S) Module 02 - Connecting Networks - Chapter 2
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2Waqas Ahmed Nawaz
 
02 coms 525 tcpip - introduction to tcpip
02   coms 525 tcpip -  introduction to tcpip02   coms 525 tcpip -  introduction to tcpip
02 coms 525 tcpip - introduction to tcpipPalanivel Kuppusamy
 
Computer network coe351- part2- final
Computer network coe351- part2- finalComputer network coe351- part2- final
Computer network coe351- part2- finalTaymoor Nazmy
 
PPP(Point-to-Point Protocol): Components & Characteristics
PPP(Point-to-Point Protocol): Components & CharacteristicsPPP(Point-to-Point Protocol): Components & Characteristics
PPP(Point-to-Point Protocol): Components & CharacteristicsAnuj Parajuli
 
Networking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol FunctionsNetworking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol FunctionsGayathri Kesavan
 
ND0801_Assignment_3_Protocols for P3
ND0801_Assignment_3_Protocols for P3ND0801_Assignment_3_Protocols for P3
ND0801_Assignment_3_Protocols for P3John Mathias
 

Semelhante a Point To Point Protocol (20)

unit2-210710110327.pptx
unit2-210710110327.pptxunit2-210710110327.pptx
unit2-210710110327.pptx
 
lect18.ppt
lect18.pptlect18.ppt
lect18.ppt
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IP
 
data link layer.pptx
data link layer.pptxdata link layer.pptx
data link layer.pptx
 
Unit 2 ppt-idc
Unit 2 ppt-idcUnit 2 ppt-idc
Unit 2 ppt-idc
 
DLL Protocol.pptx
DLL Protocol.pptxDLL Protocol.pptx
DLL Protocol.pptx
 
CISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalCISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network Fundamental
 
Ppp
PppPpp
Ppp
 
Ppp
PppPpp
Ppp
 
Unit 2 - Internet Protocol Overview - IT
Unit 2 - Internet Protocol Overview - ITUnit 2 - Internet Protocol Overview - IT
Unit 2 - Internet Protocol Overview - IT
 
ETE405-lec7.pdf
ETE405-lec7.pdfETE405-lec7.pdf
ETE405-lec7.pdf
 
Introduction to Ethernet para radio enlace
Introduction to Ethernet para radio enlaceIntroduction to Ethernet para radio enlace
Introduction to Ethernet para radio enlace
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2CCNA (R & S) Module 02 - Connecting Networks - Chapter 2
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2
 
02 coms 525 tcpip - introduction to tcpip
02   coms 525 tcpip -  introduction to tcpip02   coms 525 tcpip -  introduction to tcpip
02 coms 525 tcpip - introduction to tcpip
 
Module 1 slides
Module 1 slidesModule 1 slides
Module 1 slides
 
Computer network coe351- part2- final
Computer network coe351- part2- finalComputer network coe351- part2- final
Computer network coe351- part2- final
 
PPP(Point-to-Point Protocol): Components & Characteristics
PPP(Point-to-Point Protocol): Components & CharacteristicsPPP(Point-to-Point Protocol): Components & Characteristics
PPP(Point-to-Point Protocol): Components & Characteristics
 
Networking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol FunctionsNetworking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol Functions
 
ND0801_Assignment_3_Protocols for P3
ND0801_Assignment_3_Protocols for P3ND0801_Assignment_3_Protocols for P3
ND0801_Assignment_3_Protocols for P3
 

Último

Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 

Último (20)

Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 

Point To Point Protocol

  • 1. Point to Point Protocol PRESENTER: PHAN DINH VUONG INSTRUCTOR: PROF.DR.FRIEDBERT KASPAR
  • 2. Agenda What is PPP? Design Requirements Data frame format Byte stuffing Control Protocol Wireshark Demo Q&A
  • 4. What is Point-to-Point Protocol ? What is the difference between point to point and peer to peer? Answer: - Point to point is a protocol for communication between two computers using a serial interface (phone). - Peep to peer (P2P) is a communication model in which each party has the same capabilities and either party can initiate a communication session (BitTorrent).
  • 5. What is Point-to-Point Protocol ? The Point-to-Point Protocol (PPP) provides a standard method for transporting multi-protocol datagrams over point-to-point links. PPP is comprised of three main components: • A method for encapsulating multi-protocol datagrams. • A Link Control Protocol (LCP) for establishing, configuring, and testing the data-link connection. • A family of Network Control Protocols (NCPs) for establishing and configuring different network-layer protocols.
  • 6. Design requirements? • Packet framing: Packet (from network-layer)  Frames (start & end of frame) • Transparency.To network layer packet (headers or data). • Multiple network layer protocols. Able to support multiple network layer protocols (e.g., IP, RIP, ICMP) running over the same physical link at the same time. • Multiple types of links. Operate over a wide variety of link types: serial or parallel, synchronous or asynchronous, low speed or high speed, electrical or optical. • Error detection. Able to detect bit errors in the received frame. • Connection liveness: detect a failure at the link level (e.g., the inability to transfer data from the sending side of the link to the receiving side of this link) and signal this error condition to the network layer. • Network Layer Address Negotiation. mechanism for the communicating network layers (e.g., IP) to learn or configure each other's network layer address. • Simplicity.The first and foremost among all requirements . RFC 1547 states "the watchword for a point-to-point protocol should be simplicity."
  • 7. Design Non-requirements? • Error correction. Required to detect bit errors but is NOT required to correct • Flow control. receive frames at the full rate of the underlying physical layer .NO need to control for upper layers • Sequencing. NOT required to deliver frames in the same order • Multipoint links. Only a single sender and a single receiver.
  • 8. Data frame format 01111110 11111111 00000011 Protocol Info Padding Check 01111110 • Flag: delimiter (framing) • Address: not used in PPP as no support addressing(used in HDLC broadcast address) • Control: always 00000011, transmission not sequenced, connectionless link. • Protocol: upper layer protocol to which frame delivered (eg,IP 0x0021, IPX 0x002B) • Info: upper layer data being carried • Padding: In some cases, additional dummy bytes may be added to pad out the size of the PPP frame. • Check: cyclic redundancy check for error detection (2 0r 4 bytes, default 2 bytes) Flag FlagAddress Control 1 byte 1 byte 1 byte 1 or 2 byte Variable length 2 or 4 bytes 1 byte Variable length
  • 9. Stuffing • Question: if receive <01111110> => It is data or flag? • Sender: adds (“stuffs”) extra < 01111110> byte after each < 01111110> data byte • Receiver: - two 01111110 bytes in a row:  discard first byte, continue data reception - single 01111110: flag byte PPP PPP A5 BB 01111110 B4 B4 01111110 BB A5 A5 BB 01111110 01111110 B4
  • 11. Authentication Value (in hex) Protocol • c023 Password Authentication Protocol (PAP) • c223 Challenge Handshake Authentication Protocol (CHAP)
  • 16.
  • 17.
  • 18. Q&A
  • 20. References • http://www-ee.uta.edu/online/wang/ppp.pdf • Wikipedia: http://en.wikipedia.org/wiki/PPP • RFC 1661: http://www.ietf.org/rfc/rfc1661.txt

Notas do Editor

  1. RIP, Routing Information ProtocolICMP, Internet Control Message Protocol
  2. Link Dead: This phase occurs when the link fails, or one side has been told to disconnect (e.g. a user has finished his or her dialup connection.)Link Establishment Phase: This phase is where Link Control Protocol negotiation is attempted. If successful, control goes either to the authentication phase or the Network-Layer Protocol phase, depending on whether authentication is desired.Authentication Phase: This phase is optional. It allows the sides to authenticate each other before a connection is established. If successful, control goes to the network-layer protocol phase.Network-Layer Protocol Phase: This phase is where each desired protocols&apos; Network Control Protocols are invoked. For example, IPCP is used in establishing IP service over the line. Data transport for all protocols which are successfully started with their network control protocols also occurs in this phase. Closing down of network protocols also occur in this phase.Link Termination Phase: This phase closes down this connection. This can happen if there is an authentication failure, if there are so many checksum errors that the two parties decide to tear down the link automatically, if the link suddenly fails, or if the user decides to hang up his connection.
  3. Weak-point: passwork and user are sent in clear text.