SlideShare a Scribd company logo
2
Most read
4
Most read
5
Most read
Point to Point Protocol
PRESENTER: PHAN DINH VUONG
INSTRUCTOR: PROF.DR.FRIEDBERT KASPAR
Agenda
What is PPP?
Design Requirements
Data frame format
Byte stuffing
Control Protocol
Wireshark Demo
Q&A
OSI Model
What is Point-to-Point Protocol ?
What is the difference between point to point and peer to peer?
Answer:
- Point to point is a protocol for communication between two
computers using a serial interface (phone).
- Peep to peer (P2P) is a communication model in which each
party has the same capabilities and either party can initiate a
communication session (BitTorrent).
What is Point-to-Point Protocol ?
The Point-to-Point Protocol (PPP) provides a standard method for transporting
multi-protocol datagrams over point-to-point links. PPP is comprised of three
main components:
• A method for encapsulating multi-protocol datagrams.
• A Link Control Protocol (LCP) for establishing, configuring, and testing the
data-link connection.
• A family of Network Control Protocols (NCPs) for establishing and configuring
different network-layer protocols.
Design requirements?
• Packet framing: Packet (from network-layer)  Frames (start & end of frame)
• Transparency.To network layer packet (headers or data).
• Multiple network layer protocols. Able to support multiple network layer protocols (e.g., IP, RIP,
ICMP) running over the same physical link at the same time.
• Multiple types of links. Operate over a wide variety of link types: serial or parallel, synchronous or
asynchronous, low speed or high speed, electrical or optical.
• Error detection. Able to detect bit errors in the received frame.
• Connection liveness: detect a failure at the link level (e.g., the inability to transfer data from the
sending side of the link to the receiving side of this link) and signal this error condition to the
network layer.
• Network Layer Address Negotiation. mechanism for the communicating network layers (e.g., IP)
to learn or configure each other's network layer address.
• Simplicity.The first and foremost among all requirements . RFC 1547 states "the watchword for a
point-to-point protocol should be simplicity."
Design Non-requirements?
• Error correction. Required to detect bit errors but
is NOT required to correct
• Flow control. receive frames at the full rate of the underlying
physical layer .NO need to control for upper layers
• Sequencing. NOT required to deliver frames in the same order
• Multipoint links. Only a single sender and a single receiver.
Data frame format
01111110 11111111 00000011 Protocol Info Padding Check 01111110
• Flag: delimiter (framing)
• Address: not used in PPP as no support addressing(used in HDLC broadcast address)
• Control: always 00000011, transmission not sequenced, connectionless link.
• Protocol: upper layer protocol to which frame delivered (eg,IP 0x0021, IPX 0x002B)
• Info: upper layer data being carried
• Padding: In some cases, additional dummy bytes may be added to pad out the size
of the PPP frame.
• Check: cyclic redundancy check for error detection (2 0r 4 bytes, default 2 bytes)
Flag FlagAddress Control
1 byte 1 byte 1 byte 1 or 2 byte
Variable
length 2 or 4 bytes 1 byte
Variable
length
Stuffing
• Question: if receive <01111110> => It is data or flag?
• Sender: adds (“stuffs”) extra < 01111110> byte after
each < 01111110> data byte
• Receiver:
- two 01111110 bytes in a row:  discard first byte,
continue data reception
- single 01111110: flag byte
PPP PPP
A5
BB
01111110
B4
B4
01111110
BB
A5
A5 BB 01111110 01111110 B4
Control Protocol
Authentication
Value (in hex) Protocol
• c023 Password Authentication Protocol (PAP)
• c223 Challenge Handshake Authentication Protocol (CHAP)
Password Authentication Protocol (PAP)
Challenge Handshake Authentication Protocol(CHAP)
Wireshark Demo
Frame format
Point To Point Protocol
Point To Point Protocol
Q&A
Thank you!
References
• http://www-ee.uta.edu/online/wang/ppp.pdf
• Wikipedia: http://en.wikipedia.org/wiki/PPP
• RFC 1661: http://www.ietf.org/rfc/rfc1661.txt

More Related Content

PDF
Data Warehousing
PPTX
Computer network switching
PPTX
Transmission impairments
PPT
Mpls L3_vpn
PPTX
Ch 1 introduction to Embedded Systems (AY:2018-2019--> First Semester)
PDF
Criteria VI - GOVERNANCE,LEADERSHIP AND MANAGEMENT
PPTX
wired and wireless networks
PDF
HDFS Architecture
Data Warehousing
Computer network switching
Transmission impairments
Mpls L3_vpn
Ch 1 introduction to Embedded Systems (AY:2018-2019--> First Semester)
Criteria VI - GOVERNANCE,LEADERSHIP AND MANAGEMENT
wired and wireless networks
HDFS Architecture

What's hot (20)

PPTX
Point to-point protocol (ppp)
PPTX
Multiple Access Protocal
PPTX
HDLC(High level Data Link Control)
PPTX
Computer Network - Network Layer
PDF
Multiplexing
PPTX
PPP (Point to Point Protocol)
PPT
Error Detection And Correction
PPTX
Ethernet
PPT
Chapter 4 data link layer
PPTX
Address resolution protocol (ARP)
PPT
Ports & sockets
PPTX
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
PDF
Lecture 19 22. transport protocol for ad-hoc
PPTX
Unicast multicast & broadcast
PPTX
Internetworking
PPTX
IPv4 Addressing
PPTX
Multiple access protocol
PPT
Data link control
PPT
Introduction to Application layer
Point to-point protocol (ppp)
Multiple Access Protocal
HDLC(High level Data Link Control)
Computer Network - Network Layer
Multiplexing
PPP (Point to Point Protocol)
Error Detection And Correction
Ethernet
Chapter 4 data link layer
Address resolution protocol (ARP)
Ports & sockets
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
Lecture 19 22. transport protocol for ad-hoc
Unicast multicast & broadcast
Internetworking
IPv4 Addressing
Multiple access protocol
Data link control
Introduction to Application layer
Ad

Viewers also liked (11)

PPT
Point to point.48
PPTX
Presentation1
PPT
Cellular network presentation
PPT
Presentation on CDMA
PPT
Interferences
PPTX
Error Detection N Correction
PPT
Cdma presentation
PPT
Cdma system
PPT
Code division multiple access
PPT
Code Division Multiple Access- CDMA
Point to point.48
Presentation1
Cellular network presentation
Presentation on CDMA
Interferences
Error Detection N Correction
Cdma presentation
Cdma system
Code division multiple access
Code Division Multiple Access- CDMA
Ad

Similar to Point To Point Protocol (20)

PPTX
unit2-210710110327.pptx
PPTX
Know the advantages and disadvantages of peer-to-peer network and a server-ba...
PPT
lect18.ppt
PPTX
Web technologies: recap on TCP-IP
PPTX
data link layer.pptx
PDF
Unit 2 ppt-idc
PPTX
DLL Protocol.pptx
PPTX
CISSP - Chapter 4 - Network Fundamental
PPTX
PPTX
PDF
Unit 2 - Internet Protocol Overview - IT
PDF
ETE405-lec7.pdf
PDF
Introduction to Ethernet para radio enlace
PPT
Bluetooth
PPTX
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2
PPTX
02 coms 525 tcpip - introduction to tcpip
PPTX
Protocols and the TCP/IP Protocol Suite
PDF
Module 1 slides
PDF
01 dsdsssdsssadasdasdsdasdasdasdasdasdasProtocols.pdf
PPTX
Computer network coe351- part2- final
unit2-210710110327.pptx
Know the advantages and disadvantages of peer-to-peer network and a server-ba...
lect18.ppt
Web technologies: recap on TCP-IP
data link layer.pptx
Unit 2 ppt-idc
DLL Protocol.pptx
CISSP - Chapter 4 - Network Fundamental
Unit 2 - Internet Protocol Overview - IT
ETE405-lec7.pdf
Introduction to Ethernet para radio enlace
Bluetooth
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2
02 coms 525 tcpip - introduction to tcpip
Protocols and the TCP/IP Protocol Suite
Module 1 slides
01 dsdsssdsssadasdasdsdasdasdasdasdasdasProtocols.pdf
Computer network coe351- part2- final

Recently uploaded (20)

PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
master seminar digital applications in india
PDF
Basic Mud Logging Guide for educational purpose
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
Pharma ospi slides which help in ospi learning
PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PDF
Business Ethics Teaching Materials for college
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Open folder Downloads.pdf yes yes ges yes
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
Cardiovascular Pharmacology for pharmacy students.pptx
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Renaissance Architecture: A Journey from Faith to Humanism
102 student loan defaulters named and shamed – Is someone you know on the list?
master seminar digital applications in india
Basic Mud Logging Guide for educational purpose
Anesthesia in Laparoscopic Surgery in India
Pharma ospi slides which help in ospi learning
TR - Agricultural Crops Production NC III.pdf
PPH.pptx obstetrics and gynecology in nursing
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
Business Ethics Teaching Materials for college
2.FourierTransform-ShortQuestionswithAnswers.pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Open folder Downloads.pdf yes yes ges yes
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Cardiovascular Pharmacology for pharmacy students.pptx
Microbial disease of the cardiovascular and lymphatic systems
FourierSeries-QuestionsWithAnswers(Part-A).pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
human mycosis Human fungal infections are called human mycosis..pptx
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...

Point To Point Protocol

  • 1. Point to Point Protocol PRESENTER: PHAN DINH VUONG INSTRUCTOR: PROF.DR.FRIEDBERT KASPAR
  • 2. Agenda What is PPP? Design Requirements Data frame format Byte stuffing Control Protocol Wireshark Demo Q&A
  • 4. What is Point-to-Point Protocol ? What is the difference between point to point and peer to peer? Answer: - Point to point is a protocol for communication between two computers using a serial interface (phone). - Peep to peer (P2P) is a communication model in which each party has the same capabilities and either party can initiate a communication session (BitTorrent).
  • 5. What is Point-to-Point Protocol ? The Point-to-Point Protocol (PPP) provides a standard method for transporting multi-protocol datagrams over point-to-point links. PPP is comprised of three main components: • A method for encapsulating multi-protocol datagrams. • A Link Control Protocol (LCP) for establishing, configuring, and testing the data-link connection. • A family of Network Control Protocols (NCPs) for establishing and configuring different network-layer protocols.
  • 6. Design requirements? • Packet framing: Packet (from network-layer)  Frames (start & end of frame) • Transparency.To network layer packet (headers or data). • Multiple network layer protocols. Able to support multiple network layer protocols (e.g., IP, RIP, ICMP) running over the same physical link at the same time. • Multiple types of links. Operate over a wide variety of link types: serial or parallel, synchronous or asynchronous, low speed or high speed, electrical or optical. • Error detection. Able to detect bit errors in the received frame. • Connection liveness: detect a failure at the link level (e.g., the inability to transfer data from the sending side of the link to the receiving side of this link) and signal this error condition to the network layer. • Network Layer Address Negotiation. mechanism for the communicating network layers (e.g., IP) to learn or configure each other's network layer address. • Simplicity.The first and foremost among all requirements . RFC 1547 states "the watchword for a point-to-point protocol should be simplicity."
  • 7. Design Non-requirements? • Error correction. Required to detect bit errors but is NOT required to correct • Flow control. receive frames at the full rate of the underlying physical layer .NO need to control for upper layers • Sequencing. NOT required to deliver frames in the same order • Multipoint links. Only a single sender and a single receiver.
  • 8. Data frame format 01111110 11111111 00000011 Protocol Info Padding Check 01111110 • Flag: delimiter (framing) • Address: not used in PPP as no support addressing(used in HDLC broadcast address) • Control: always 00000011, transmission not sequenced, connectionless link. • Protocol: upper layer protocol to which frame delivered (eg,IP 0x0021, IPX 0x002B) • Info: upper layer data being carried • Padding: In some cases, additional dummy bytes may be added to pad out the size of the PPP frame. • Check: cyclic redundancy check for error detection (2 0r 4 bytes, default 2 bytes) Flag FlagAddress Control 1 byte 1 byte 1 byte 1 or 2 byte Variable length 2 or 4 bytes 1 byte Variable length
  • 9. Stuffing • Question: if receive <01111110> => It is data or flag? • Sender: adds (“stuffs”) extra < 01111110> byte after each < 01111110> data byte • Receiver: - two 01111110 bytes in a row:  discard first byte, continue data reception - single 01111110: flag byte PPP PPP A5 BB 01111110 B4 B4 01111110 BB A5 A5 BB 01111110 01111110 B4
  • 11. Authentication Value (in hex) Protocol • c023 Password Authentication Protocol (PAP) • c223 Challenge Handshake Authentication Protocol (CHAP)
  • 18. Q&A
  • 20. References • http://www-ee.uta.edu/online/wang/ppp.pdf • Wikipedia: http://en.wikipedia.org/wiki/PPP • RFC 1661: http://www.ietf.org/rfc/rfc1661.txt

Editor's Notes

  • #7: RIP, Routing Information ProtocolICMP, Internet Control Message Protocol
  • #11: Link Dead: This phase occurs when the link fails, or one side has been told to disconnect (e.g. a user has finished his or her dialup connection.)Link Establishment Phase: This phase is where Link Control Protocol negotiation is attempted. If successful, control goes either to the authentication phase or the Network-Layer Protocol phase, depending on whether authentication is desired.Authentication Phase: This phase is optional. It allows the sides to authenticate each other before a connection is established. If successful, control goes to the network-layer protocol phase.Network-Layer Protocol Phase: This phase is where each desired protocols&apos; Network Control Protocols are invoked. For example, IPCP is used in establishing IP service over the line. Data transport for all protocols which are successfully started with their network control protocols also occurs in this phase. Closing down of network protocols also occur in this phase.Link Termination Phase: This phase closes down this connection. This can happen if there is an authentication failure, if there are so many checksum errors that the two parties decide to tear down the link automatically, if the link suddenly fails, or if the user decides to hang up his connection.
  • #13: Weak-point: passwork and user are sent in clear text.