[go: up one dir, main page]

0% found this document useful (0 votes)
7 views17 pages

1 2 2 PPP

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 17

1.2.

2 PPP (POINT-TO-POINT PROTOCOL)


Although HDLC is a general protocol that can be used for both point-to-point and multipoint configurations, one of the most common protocols for point-to-point access is the Point-to-Point Protocol (PPP). PPP is a byte-oriented protocol.
Topics discussed in this section:
Framing Transition Phases Multiplexing Multilink PPP
11.1

Figure 11.32 PPP frame format

11.2

Note

PPP is a byte-oriented protocol using byte stuffing with the escape byte 01111101.

11.3

Figure 11.33 Transition phases

11.4

Figure 11.34 Multiplexing in PPP

11.5

Figure 11.35 LCP packet encapsulated in a frame

11.6

Table 11.2 LCP packets

11.7

Table 11.3 Common options

11.8

Figure 11.36 PAP packets encapsulated in a PPP frame

11.9

Figure 11.37 CHAP packets encapsulated in a PPP frame

11.10

Figure 11.38 IPCP packet encapsulated in PPP frame

11.11

Table 11.4 Code value for IPCP packets

11.12

Figure 11.39 IP datagram encapsulated in a PPP frame

11.13

Example 11.12
Let us go through the phases followed by a network layer packet as it is transmitted through a PPP connection. Figure 11.41 shows the steps. For simplicity, we assume unidirectional movement of data from the user site to the system site (such as sending an e-mail through an ISP). The first two frames show link establishment. We have chosen two options (not shown in the figure): using PAP for authentication and suppressing the address control fields. Frames 3 and 4 are for authentication. Frames 5 and 6 establish the network layer connection using IPCP.
11.14

Example 11.12 (continued)


The next several frames show that some IP packets are encapsulated in the PPP frame. The system (receiver) may have been running several network layer protocols, but it knows that the incoming data must be delivered to the IP protocol because the NCP protocol used before the data transfer was IPCP. After data transfer, the user then terminates the data link connection, which is acknowledged by the system. Of course the user or the system could have chosen to terminate the network layer IPCP and keep the data link layer running if it wanted to run another NCP protocol.
11.15

Figure 11.41 An example

11.16

Figure 11.41 An example (continued)

11.17

You might also like