Documente Academic
Documente Profesional
Documente Cultură
11.1
Figure 11.25 Normal response mode
11.2
Figure 11.26 Asynchronous balanced mode
11.3
Figure 11.27 HDLC frames
11.4
Figure 11.28 Control field format for the different frame types
11.5
Table 11.1 U-frame control command and response
11.6
Example 11.9
11.7
Figure 11.29 Example of connection and disconnection
11.8
Example 11.10
Figure 11.30 shows an exchange using piggybacking.
Node A begins the exchange of information with an
I-frame numbered 0 followed by another I-frame
numbered 1.
Node B piggybacks its acknowledgment of both frames
onto an I-frame of its own. Node B’s first
I-frame is also numbered 0 [N(S) field] and contains a 2
in its N(R) field, acknowledging the receipt of A’s frames
1 and 0 and indicating that it expects frame 2 to arrive
next.
Node B transmits its second and third I-frames
(numbered 1 and 2) before accepting further frames from
node A.
11.9
Example 11.10 (continued)
11.10
Figure 11.30 Example of piggybacking without error
11.11
Piggybacking without Error
• Node A begins the exchange of information with an I-frame
numbered 0 followed by another I-frame numbered 1.
• Node B's first I-frame is also numbered 0 [N(S) field] and contains a
2 in its N(R) field, acknowledging the receipt of Ns frames 1 and 0
and indicating that it expects frame 2 to arrive next.
• The number 3 in the N(R) field tells B that frames 0, 1, and 2 have
all been accepted and that A is now expecting frame number 3.
Example 11.11
11.14
Figure 11.31 Example of piggybacking with error
11.15
Piggybacking with Error
Node B sends three data frames (0, 1, and 2), but
frame 1 is lost.
When node A receives frame 2, it discards it and sends
a REI frame for frame 1.
Note that the protocol being used is Go-Back-N with
the special use of an REI frame as a NAK frame.
The NAK frame does two things here: It confirms the
receipt of frame and declares that frame 1 and any
following frames must be resent.
Node B, after receiving the REI frame, resends frames
1 and 2.
Node A acknowledges the receipt by sending an RR
frame (ACK) with acknowledgment number 3.
11-7 POINT-TO-POINT PROTOCOL
11.17
11-7 POINT-TO-POINT PROTOCOL
11.18
11.4.1 Services
11.19
11.4.1 Services
11.21
PPP frame format
❑ Flag.
A PPP frame starts and ends with a 1-byte flag with the bit
pattern 01111110.
❑ Address.
The address field in this protocol is a constant value and set to
11111111 (broadcast address).
❑ Control.
• This field is set to the constant value 00000011.
• PPP does not provide any flow control.
• Error control is also limited to error detection.
❑ Protocol.
The protocol field defines what is being carried in the data field:
either user data or other information.
This field is by default 2 bytes long, but the two parties can
agree to use only 1 byte.
11.22
PPP frame format
❑ Payload field.
• This field carries either the user data or other information.
• The data field is a sequence of bytes - maximum of 1500 bytes.
• The data field is byte-stuffed if the flag byte pattern appears.
• Because there is no field defining the size of the data field,
padding is needed if the size is less than the maximum default
value.
❑ FCS.
The frame check sequence (FCS) is simply a 2-byte or 4-byte
standard CRC.
11.23
Note
11.24
Figure 11.33 Transition phases
11.25
Figure 11.33 Transition phases
11.26
11.4.4 Multiplexing
11.27
Figure 11.34 Multiplexing in PPP
11.28
Figure 11.35 LCP packet encapsulated in a frame
11.29
Table 11.2 LCP packets
11.30
Table 11.2 LCP packets
Code
The code field defines the type of LCP packet.
There are 11 types of packets.
There are three categories of packets.
11.31
Table 11.2 LCP packets
Length
The length field defines the length of the entire LCP packet.
Information
11.32
Table 11.3 Common options
PPP is designed for use over dial-up links where verification of user
identity is necessary.
Authentication means validating the identity of a user who needs to
access a set of resources.
PPP has created two protocols for authentication:
Password Authentication Protocol and
Challenge Handshake Authentication Protocol.
Note that these protocols are used during the authentication phase.
11.33
PAP - Password Authentication Protocol
When a PPP frame is carrying any PAP packets, the value of the
protocol field is 0xC023.
The three PAP packets are authenticate-request, authenticate-ack,
and authenticate-nak.
1. The first packet is used by the user to send the user name
and password.
2. The second is used by the system to allow access.
3. The third is used by the system to deny access.
11.34
Figure 11.24: PAP packets encapsulated in a PPP frame
11.35
CHAP - Challenge Handshake Authentication Protocol
11.36
Figure 11.25: CHAP packets encapsulated in a PPP frame
11.37
CHAP - Challenge Handshake Authentication Protocol
Even if the intruder learns the challenge value and the result,
the password is still secret.
11.38
CHAP - Challenge Handshake Authentication Protocol
CHAP packets are encapsulated in the PPP frame with the
protocol value C223 in hexadecimal.
There are four CHAP packets:
challenge, response, success, failure.
1. The first packet is used by the system to send the challenge
value.
2. The second is used by the user to return the result of the
calculation.
3. The third is used by the system to allow access to the system.
4. The fourth is used by the system to deny access to the system.
Network Control Protocols
11.42
Table 11.4 Code value for IPCP packets
11.43
Figure 11.39 IP datagram encapsulated in a PPP frame
11.44
Multilink PPP
11.46
Example 11.12
11.47
Example 11.12 (continued)
After data transfer, the user then terminates the data link
connection, which is acknowledged by the system. Of
course the user or the system could have chosen to
terminate the network layer IPCP and keep the data link
layer running if it wanted to run another NCP protocol.
11.48
Figure 11.41 An example
11.49
Figure 11.41 An example (continued)
11.50
Figure 11.29: An example
11.51