SLIP and PPP. Gursharan Singh Tatla. mailme@gursharansingh.in www.eazynotes.com. 1 www.eazynotes.com



Similar documents
PPP encapsulation has been carefully designed to retain compatibility with most commonly used supporting hardware. PPP encapsulates data frames for

Data Link Protocols. TCP/IP Suite and OSI Reference Model

High-Level Data Link Control

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

PPP (Point-to-Point Protocol)

WAN Data Link Protocols

Data Link Protocols. 5.4 Framing

Model 2120 Single Port RS-232 Terminal Server Frequently Asked Questions

Chapter 10 Security Protocols of the Data Link Layer

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

WANs connect remote sites. Connection requirements vary depending on user requirements, cost, and availability.

Subnetting,Supernetting, VLSM & CIDR

L2F Case Study Overview

How To Understand The History Of The Network And Network (Networking) In A Network (Network) (Netnet) (Network And Network) (Dns) (Wired) (Lannet) And (Network Network)

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

ERserver. iseries. Remote Access Services: PPP connections

VPN. Date: 4/15/2004 By: Heena Patel

7.1. Remote Access Connection

Internet Access Setup

Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine

Network Security. Chapter 10 Security Protocols of the Data Link Layer

CS 393/682 Network Security. Nasir Memon Polytechnic University Module 7 Virtual Private Networks

Internet Access Setup

Matrix Technical Support Mailer 167 NAVAN CNX200 PPTP VPN with Windows Client

VPN. VPN For BIPAC 741/743GE

Prestige 310. Cable/xDSL Modem Sharing Router. User's Guide Supplement

Application Note: Onsight Device VPN Configuration V1.1

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance

Supporting Document PPP

Network Security Firewall Manual Building Networks for People

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

I. What is VPN? II. Types of VPN connection. There are two types of VPN connection:

iseries TCP/IP routing and workload balancing

Quectel Cellular Engine

Cisco 12 CCNA Certification

Creating a VPN Using Windows 2003 Server and XP Professional

CCNP2 - Implementing Secure Converged Wide-area Networks v5.0

Introduction To Computer Networking

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

Network Security 1 Module 4 Trust and Identity Technology

CTS2134 Introduction to Networking. Module 07: Wide Area Networks

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

White Paper. Technical Capabilities of the DF1 Half-Duplex Protocol

ASUS WL-5XX Series Wireless Router Internet Configuration. User s Guide

isco Connecting Routers Back to Back Through the AUX P

Chapter 9. IP Secure

Overview of Routing between Virtual LANs

Network Layers. CSC358 - Introduction to Computer Networks

Configuring Asynchronous SLIP and PPP

BASIC ANALYSIS OF TCP/IP NETWORKS

CCT vs. CCENT Skill Set Comparison

Routing and Remote Access Service

DSL-2600U. User Manual V 1.0

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

Expert Reference Series of White Papers. Basics of IP Address Subnetting

Domain 6.0: Network Security

Linksys Gateway SPA2100-SU Manual

Figure 1 - T1/E1 Internet Access

While every effort was made to verify the following information, no warranty of accuracy or usability is expressed or implied.

9 Simple steps to secure your Wi-Fi Network.

Case Study for Layer 3 Authentication and Encryption

Authentication, Authorization and Accounting (AAA) Protocols

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

Introduction to WAN Technologies

Connecting an M68HC08 Family Microcontroller to an Internet Service Provider (ISP) Using the Point-to-Point Protocol (PPP)

CA106 Web Design. Dr. Dónal Fitzpatrick, School of Computing Room l2.48, Extension 8929,

DSL Forum Technical Report TR-045. PPP Static Interoperability Testing

A Dynamic Extensible Authentication Protocol for Device Authentication in Transport Layer Raghavendra.K 1, G. Raghu 2, Sumith N 2

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0

Connecting Remote Users to Your Network with Windows Server 2003

DCB Ethernet Tunnel Family Configuration Guide

Technical Support Information

11/22/

Inmarsat B Application Note

F5 BIG-IP V9 Local Traffic Management EE Demo Version. ITCertKeys.com

How To Configure Apple ipad for Cyberoam L2TP

Transport and Network Layer

3.1 RS-232/422/485 Pinout:PORT1-4(RJ-45) RJ-45 RS-232 RS-422 RS-485 PIN1 TXD PIN2 RXD PIN3 GND PIN4 PIN5 T PIN6 T PIN7 R+ PIN8 R-

SRX 210 Services Gateway T1 Interface Configuration

Understand Wide Area Networks (WANs)

Broadband Service Architecture for Access to Legacy Data Networks over ADSL Issue 1

Step-by-Step Configuration

Application. Transport. Network. Data Link. Physical. Network Layers. Goal

Chapter 2 - The TCP/IP and OSI Networking Models

The following sections describe the Gateway configuration pages in the SBG1000 Setup Program.

FINS Gateway For OMRON PLCs

BRI to PRI Connection Using Data Over Voice

IP Tunneling and VPNs

Secure Substation Automation for Operations & Maintenance

Interconnecting Cisco Networking Devices, Part 2 Course ICND2 v2.0; 5 Days, Instructor-led

RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller

1ISDN. August Software Reference ISDN 1

Chapter 4: Security of the architecture, and lower layer security (network security) 1

How To Learn Cisco Cisco Ios And Cisco Vlan

Transcription:

SLIP and PPP Gursharan Singh Tatla mailme@gursharansingh.in 1

Data Link Layer in Internet We know that Internet consists of individual systems that are connected to each other. Basically, it is wide are network that is built up from point-to-point leased lines. In these point-to-point lines, two major data link protocols are used: Serial Line Internet Protocol (SLIP) Point-to-Point Protocol (PPP) 2

Serial Line Internet Protocol (SLIP) It is a means of sending Internet Protocol datagrams over a serial link. It can be used by two systems to communicate via a direct cable connection or modem link. The initial purpose of this protocol was to connect Sun workstation to the Internet over a dial-up line using modem. 3

Problems with SLIP It does not perform any error detection and correction. It supports only IP (Internet Protocol). So, it cannot be used for other networks that do not use IP (for e.g.: Novell LANs). It does not support the allocation of dynamic IP address. Both the communicating systems should be assigned a specific IP address before hand. It does not provide any authentication. It is not an approved Internet standard. 4

Data Format of SLIP The data format of SLIP is: Data End Flag A special END character (equivalent to decimal 192) marks the end of data. 5

Point-to-Point Protocol (PPP) PPP was devised by IETF (Internet Engineering Task Force) to create a data link protocol for point-to-point lines that can solve all the problems of SLIP. It is the most commonly used data link protocol. It is used to connect the home PC to the ISP server. 6

Benefits of PPP PPP defines the format of the frame to be exchanged between the devices. It defines Link Control Protocol (LCP) for: Establishing the link between two devices. Maintaining this established link. Configuring this link. Terminating this link after the transfer. 7

It provides error detection. Benefits of PPP (Contd ) Unlike SLIP, that supports only IP, it supports multiple protocols. It supports dynamic allocation of IP address. It provides authentication. It provides NCP (Network Control Protocol), that supports variety of network layer protocol. 8

PPP Frame Format Frame format of PPP is similar to HDLC frame: 01111110 11111111 00000011 01111110 Flag Address Control Protocol Information FCS Flag 1 Byte 1 Byte 1 Byte 1 or 2 Byte Variable 2 or 4 Byte 1 Byte Flag Field: It marks the beginning and end of the PPP frame. Flag byte is 01111110. Address Field: This field is of 1 byte and is always 11111111. This address is the broadcast address i.e. all stations accept this frame. 9

PPP Frame Format Frame format of PPP is similar to HDLC frame: 01111110 11111111 00000011 01111110 Flag Address Control Protocol Information FCS Flag 1 Byte 1 Byte 1 Byte 1 or 2 Byte Variable 2 or 4 Byte 1 Byte Control Field: It is also of 1 byte. It uses the format of U-Frame in HDLC. The value is always 00000011 to show that the frame does not contain any sequence number and there is no flow control or error control. Protocol Field: This field specifies the kind of protocol of the data in the information field. 10

PPP Frame Format Frame format of PPP is similar to HDLC frame: 01111110 11111111 00000011 01111110 Flag Address Control Protocol Information FCS Flag 1 Byte 1 Byte 1 Byte 1 or 2 Byte Variable 2 or 4 Byte 1 Byte Information Field: Its length is variable. It carries user data or other information. FCS Field: It stands for Frame Check Sequence. It contains checksum. It is either 2 bytes or 4 bytes. 11

Transition Phases in PPP The PPP connection goes through different states: 12

Down: Transition Phases in PPP In down phase, the link is not used. Establish: Connection goes into this phase when one of the nodes start communication. Authenticate: This phase is optional. The two nodes may decide during establishment phase, to use this phase. 13

Transition Phases in PPP Up: In this phase, data transfer takes place. The connection remains in this phase until one of the node wants to end the connection. Terminate: In this phase, connection is terminated. 14

PPP Stack PPP uses several other protocols to establish link, authenticate users and to carry the network layer data: The various protocols used are: Link Control Protocol Authenticate Protocol Network Control Protocol 15

Link Control Protocol It is responsible for establishing, maintaining, configuring and terminating the link. It provides negotiation mechanism to set options between two nodes. All LCP packets are carried in the information field of the PPP frame. 16

Authentication Protocol Authentication protocol helps to validate the identity of a user who needs to access the resources. There are two authentication protocols: Password Authentication Protocols (PAP) Challenge Handshake Authentication Protocol (CHAP) 17

Password Authentication Protocol (PAP) This protocol provides two step authentication procedure: Step 1: Username and password is provided by the user who wants to access the system. Step 2: The system checks the validity of username and password, and either accepts or rejects the connection. 18

Challenge Handshake Authentication Protocol (CHAP) It provides more security than PAP. In this method, password is kept secret. It is a three way authentication protocol: Step 1: System sends a challenge packet to the user. It contains a value, usually a few bytes. Step 2: Using a predefined function, a user combines this challenge value with the user password and sends the resultant packet back to the system. Step 3: System then applies the same function to the password of the user & challenge value, and creates a result. If the result is same as the result sent in the response packet, access is granted, otherwise, it is denied. 19

Network Control Protocol (NCP) After establishing the link & authenticating the user, PPP connects to the network layer. This connection is established by NCP. Therefore, NCP is a set of control protocols that allow the encapsulation of the data coming from the network layer. After the network layer configuration is done by one of the NCP, the user can exchange data from the network layer. 20

Differences Between SLIP & PPP S. No. SLIP PPP 1. SLIP stands for Serial Line Internet Protocol. 2. SLIP does not perform error detection & correction. PPP stands for Point-to-Point Protocol PPP performs error detection & correction. 3. SLIP supports only IP. PPP supports multiple protocols. 4. IP address is assigned statically. 5. SLIP does not provide any authentication. 6. SLIP is not approved Internet standard. IP address is assigned dynamically PPP provides authentication. PPP is approved Internet standard. 21

22