PPP and SLIP. When your modem makes funny noises...

Similar documents
PPP encapsulation has been carefully designed to retain compatibility with most commonly used supporting hardware. PPP encapsulates data frames for

SLIP and PPP. Gursharan Singh Tatla

High-Level Data Link Control

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Data Link Protocols. 5.4 Framing

PPP (Point-to-Point Protocol)

WAN Data Link Protocols

Model 2120 Single Port RS-232 Terminal Server Frequently Asked Questions

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Configuring Asynchronous SLIP and PPP

Introduction To Computer Networking

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

VPN. Date: 4/15/2004 By: Heena Patel

WANs connect remote sites. Connection requirements vary depending on user requirements, cost, and availability.

Chapter 14 Point-to-Point Protocol (PPP)

Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

Chapter 10 Security Protocols of the Data Link Layer

CS 393/682 Network Security. Nasir Memon Polytechnic University Module 7 Virtual Private Networks

isco Connecting Routers Back to Back Through the AUX P

Application Note: Onsight Device VPN Configuration V1.1

Subnetting,Supernetting, VLSM & CIDR

ERserver. iseries. Remote Access Services: PPP connections

21.4 Network Address Translation (NAT) NAT concept

Calculating Bandwidth Requirements

RARP: Reverse Address Resolution Protocol

Virtual Private Network and Remote Access Setup

Cisco Which VPN Solution is Right for You?

Chapter 9. IP Secure

Chapter 2 - The TCP/IP and OSI Networking Models

Expert Reference Series of White Papers. Basics of IP Address Subnetting

OSI Model. Application Presentation Session Transport Network Data Link Physical. EE156 Computer Network Architecture

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

Quectel Cellular Engine

Virtual Private Network and Remote Access

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

Network Security. Chapter 10 Security Protocols of the Data Link Layer

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

7.1. Remote Access Connection

Challenges and Solutions in VoIP

Connecting Remote Users to Your Network with Windows Server 2003

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

VPN. VPN For BIPAC 741/743GE

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)

Protocols and Architecture. Protocol Architecture.

Introduction to TCP/IP

bintec Workshop WAN Partner Configuration Copyright November 8, 2005 Funkwerk Enterprise Communications GmbH Version 0.9

Introduction to WAN Technologies

Module 10: Supporting Remote Users

Ethernet. Ethernet. Network Devices

Network Working Group (PPP)

Palomar College Dial-up Remote Access

Lecture 8. IP Fundamentals

Content Page No. Unit I Lesson 1. Introduction to Digital Communication Lesson 2. WAN Technology Lesson 3. History about TCP/IP

Introduction to WAN Technologies

MCTS Guide to Microsoft Windows 7. Chapter 14 Remote Access

Cisco Networks (ONT) 2006 Cisco Systems, Inc. All rights reserved.

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

Internet Architecture and Philosophy

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS

Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF

Networking Test 4 Study Guide

Network Models and Protocols

04 Internet Protocol (IP)

IP Security. IPSec, PPTP, OpenVPN. Pawel Cieplinski, AkademiaWIFI.pl. MUM Wroclaw

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

Leased Line PPP Connections Between IOS and HP Routers

Prestige 310. Cable/xDSL Modem Sharing Router. User's Guide Supplement

Point-to-Point Connections

Firewalls and Virtual Private Networks

Windows Pocket PC. 1. Verizon Wireless Mobile Office Kit; which contains a serial data cable for your mobile phone and a PDA adapter

< Introduction > This technical note explains how to connect New SVR Series to DSL Modem or DSL Router. Samsung Techwin Co., Ltd.

Computer Networks. Data Link Layer

Encapsulating Voice in IP Packets

Terminal Services Overview

Transport and Network Layer

IP Addressing A Simplified Tutorial

: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

Connecting an M68HC08 Family Microcontroller to an Internet Service Provider (ISP) Using the Point-to-Point Protocol (PPP)

IP Tunneling and VPNs

DSL-2600U. User Manual V 1.0

How do I get to

RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller

ccna question and answers

VoIP Bandwidth Calculation

The BANDIT Device in the Network

How To Learn Cisco Cisco Ios And Cisco Vlan

Internetworking. Problem: There is more than one network (heterogeneity & scale)

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

The internetworking solution of the Internet. Single networks. The Internet approach to internetworking. Protocol stacks in the Internet

Improved Digital Media Delivery with Telestream HyperLaunch

"Charting the Course...

Internet Packets. Forwarding Datagrams

Pre-lab and In-class Laboratory Exercise 10 (L10)

Optimizing Converged Cisco Networks (ONT)

2. IP Networks, IP Hosts and IP Ports

WAN Technologies and Components

11/22/

Transcription:

PPP and SLIP When your modem makes funny noises... (C) Herbert Haas 2005/03/11 1

PPP / SLIP PPP Where is PPP used What is the task of LCP What is the task of NCP SLIP Why SLIP died out 2 2

Introduction (1) Goal of PPP Convey datagrams over a serial link Both synchronous or asynchronous serial links are supported Both bit or byte oriented transmissions are supported Basically, PPP consists of One Link Control Protocol (LCP) Several Network Control Protocols (NCPs) 3 The Point-to-Point Protocol (PPP) provides a standard method for transporting multi-protocol datagrams over point-to-point links. PPP is comprised of three main components: 1. A method for encapsulating multi-protocol datagrams. 2. A Link Control Protocol (LCP) for establishing, configuring, and testing the data-link connection. 3. A family of Network Control Protocols (NCPs) for establishing and configuring different network-layer protocols. 3

Introduction (2) HDLC is basis for encapsulation Only framing and error detection necessary Only simple unnumbered information frames (UI) PPP supports full-duplex links only (!) PPP Frame = Datagram + 2-8 bytes extra header Extra header consists of HDLC header and PPP header Byte Stuffing: Data dependent overhead! 4 Overhead Only 8 additional octets are necessary to form the encapsulation when used with the default HDLC framing. In environments where bandwidth is at a premium, the encapsulation and framing may be shortened to 2 or 4 octets. Byte Stuffing If the flag byte (126) occurs in the data field it has to be escaped using the escape byte 125, while byte 126 is transmitted as a two byte sequence (125, 94) and the escape byte itself is transmitted as (125, 93). 4

LCP Link Control Protocol (LCP) Setup, configure, test and terminate PPP connection Supports various environments LCP negotiates Encapsulation format options Maximal packet sizes Identification and authentification of peers (!) Determination of proper link functionality 5 In order to be sufficiently versatile to be portable to a wide variety of environments, PPP provides a Link Control Protocol (LCP). The LCP is used to automatically agree upon the encapsulation format options, handle varying limits on sizes of packets, authenticate the identity of its peer on the link, determine when a link is functioning properly and when it is defunct, detect a looped-back link and other common misconfiguration errors, and terminate the link. 5

NCPs Network Control Protocols (NCPs) Helper to establish various network protocols IP uses "IPCP" Typical tasks Assignment and management of IP addresses Compression and authentication 6 Point-to-Point links tend to exacerbate many problems with the current family of network protocols. For instance, assignment and management of IP addresses, which is a problem even in LAN environments, is especially difficult over circuit-switched point-to-point links (such as dial-up modem servers). These problems are handled by a family of Network Control Protocols (NCPs), which each manage the specific needs required by their respective network-layer protocols. NCPs have been developed for all important network layer protocols such as IP, which uses the IP Control Proocol (IPCP). There are also NCPs designed to enable compression and authentication. 6

Data Link Layer: HDLC Address 11111111 means "all stations" PPP does not assign individual station addresses Only the control field 00000011 is used Unnumbered Information (UI) command Protocol field identifies datagram Already part of PPP, not HDLC (!) Flag Address Control Protocol Data FCS Flag 01111110 11111111 00000011 16 Bits... 16 Bit CRC 01111110 (126) (255) (003) Up to 1500 bytes data (126) 7 Protocol: The True PPP Field The most important field is the protocol field, which has two octets and its value identifies the datagram encapsulated in the Information field of the packet. PPP Header Compression If protocol field compression is enabled, the protocol field is reduced from 2 to 1 byte. Since the first two bytes are always constant, that is the address byte (always 255) and the control byte (always 003), PPP also supports address-andcontrol-field-compression, which omits these bytes. Byte Stuffing If the flag byte (126) occurs in the data field it has to be escaped using the escape byte 125, while byte 126 is transmitted as a two byte sequence (125, 94) and the escape byte itself is transmitted as (125, 93). 7

Protocol Field 0xxx 3xxx 4xxx 7xxx 8xxx bxxx cxxx fxxx L3 protocol type L3 protocol type without associated NCPs Associated NCPs for protocols in range 0xxx 3xxx LCP, PAP, CHAP,... 0021 IP 002b Novell IPX Important Examples 002d Van Jacobson Compressed TCP/IP c021 Link Control Protocol (LCP) 002f Van Jacobson Uncompressed TCP/IP c023 Password Auth. Protocol (PAP) 8021 IP-NCP (IPCP) c025 Link Quality Report 802b IPX-NCP (IPXCP) c223 Challenge Handshake Auth. Protocol (CHAP) 8 Protocol Field Values Protocol field values in the "0***" to "3***" range identify the network-layer protocol of specific packets, and values in the "8***" to "b***" range identify packets belonging to the associated Network Control Protocols (NCPs), if any. Protocol field values in the "4***" to "7***" range are used for protocols with low volume traffic which have no associated NCP. Protocol field values in the "c***" to "f***" range identify packets as link-layer Control Protocols (such as LCP). All these numbers are controlled by the IANA (see RFC-1060). 8

SLIP Serial Line IP (SLIP) Asynchronous,character oriented, 8 bit, no parity Simple layer 2 frame format for serial lines Only provides framing Only encapsulates IP packets No flow control with XON/XOFF possible. Used in earlier "dial In" modem connections. 9 SLIP has its origins in the 3COM UNET TCP/IP implementation from the early 1980's. It is merely a packet framing protocol: SLIP defines a sequence of characters that frame IP packets on a serial line, and nothing more. It provides no addressing, packet type identification, error detection/correction or compression mechanisms. Because the protocol does so little, though, it is usually very easy to implement. 9

SLIP Framing END ESC IP packet C0 DB Byte Stuffing END ESC-END ESC-ESC END SLIP frame C0 DB DC DB DD C0 Framed IP packet C0... 192 DB... 219 DC... 220 DD... 221 10 The SLIP frame format is very simple. Actually the frame is only enclosed using a framing byte (C0) at each end. Using byte stuffing this special flag is masked inside the frame. 10

SLIP Disadvantages IP addresses must be preconfigured No dynamic assignment No protocol (type) field Only defined to transport IP packets No Frame Check Sequence (FCS) Higher layers must care! Bur higher layers just use checksums (CRC would be better) Inconstant overhead Depends on data pattern! 11 There are several features that many users would like SLIP to provide which it doesn't. SLIP is just a very simple protocol designed quite a long time ago when these problems were not really important issues. The following are commonly perceived shortcomings in the existing SLIP protocol. Both computers in a SLIP link need to know each other's IP addresses for routing purposes. Also, when using SLIP for hosts to dial-up a router, the addressing scheme may be quite dynamic and the router may need to inform the dialing host of the host's IP address. SLIP currently provides no mechanism for hosts to communicate addressing information over a SLIP connection. SLIP has no type field. Thus, only one protocol can be run over a SLIP connection, so in a configuration of two DEC computers running both TCP/IP and DECnet, there is no hope of having TCP/IP and DECnet share one serial line between them while using SLIP. Error detection is not absolutely necessary at the SLIP level because any IP application should detect damaged packets. The protocol overhead introduced by SLIP is data dependent. In worst cases the overhead is very high. Consider the case of a transmitted image which has very often the color value of 219. 11

Compressed SLIP CSLIP utilizes Van Jacobson header compression 40 byte TCP/IP header to 3-5 bytes Up to 16 CSLIP connections per link Useful for small TCP/IP packets 12 Compressed SLIP (CSLIP) is a common enhancement of today's SLIP implementation. CSLIP uses Van Jacobson header compression algorithm, which relies on the fact that most of the IP and TCP header remains constant during a connection. The current state of a TCP/IP connection is maintained by each endpoint of a link to enable compression and reconstruction of the TCP/IP header. Up to 16 TCP connections can be handled on the same link by CSLIP. 12