Ethereal Exercise 2 (Part A): Link Control Protocol

Size: px
Start display at page:

Download "Ethereal Exercise 2 (Part A): Link Control Protocol"

Transcription

1 Course: Semester: ELE437 Ethereal Exercise 2 (Part A): Link Control Protocol Introduction In this exercise some details at the data link layer will be examined. In particular, the Link Control Protocol (LCP) used with the Point-to-Point Protocol (PPP) will be examined. By looking at a capture of the establishment of a dial-up Internet connection, it s possible to see what LCP packets are used to establish a link, authenticate the client, and set up the connection to use IP packets at the network layer. At the end, you ll also see what is done to terminate the connection. PPP and LCP are presented on pages of the Tanenbaum textbook. The connection establishment, use, and termination process is shown in Figure 3-28 on page 241 of the textbook. Several of the LCP packet types used in this paper are described on pages Background Information When establishing a dial-up connection, a physical link must first be established. This is the time period that you ll typically hear the modem making a variety of irritating sounds. First, the communication speed must be agreed upon. The modem will initially attempt to connect to the remote device at its maximum speed. If no response to this request is received, or it is received but is corrupt, then the modem will fall back on the next highest speed setting. This fallback process repeats until a speed is agreed on or there are no speeds left to try. If there are no speeds left, the connection attempt is abandoned. If a speed is agreed on, compression and error correction schemes are agreed upon for use at the physical layer. After this, the exchange of LCP packets begins. While LCP packets are actually handled at the link layer, the capture file used in this exercise shows Ethernet II as the link layer protocol, and then the LCP packets at the next layer up. This is due to Microsoft s Network Monitor, which is where Ethereal is getting the captured network activity from. The most significant result of this in terms of packet analysis is that you cannot see the actual PPP packets or framing. This means that the information on the PPP frame format from the textbook will not be used in this exercise. 1

2 Figure 1: SEND Address in the Ethernet II Header If you look in Figure 1 above, you ll notice that the Ethernet II data has been selected in one of the LCP packets. If you look at the raw data pane (bottom) then you ll also notice that the word SEND appears twice at the beginning of the packet. This is where the source and destination MAC addresses would normally be. However, since it was already pointed out that these aren t really Ethernet packets, that would suggest that the addresses aren t real either. While they aren t MAC addresses, when the characters for the address spell out SEND it means that the selected packet was sent by the client. Similarly, when the characters RECV appear, it means that the selected packet was received from the server. You will need to keep this in mind when you look at the capture file yourself. Section 1: LCP Packet Format Before the dial-up connection can be used to connect to the Internet, packets must be sent between the client and the dial-up server to set up a link. Let s take a look at the general LCP packet format, shown in Table 1 below. Table 1: LCP Packet Format Byte Offset Field Size (Bytes) Length - 4 Field LCP Packet Code Packet ID Length Payload / Data The first field, LCP Packet Code, is used to specify what type of LCP packet this is. This code will determine how the packet recipient will interpret its contents. A list of all valid LCP Packet Codes is listed in Table 2 below. 2

3 Table 2: LCP Packet Types LCP Packet Code Packet Type 1 Configure-Request 2 Configure-Ack 3 Configure-Nak 4 Configure-Reject 5 Terminate-Request 6 Terminate-Ack 7 Code-Reject 8 Protocol-Reject 9 Echo-Request 10 Echo-Reply 11 Discard-Request 12 Identification 13 Time-Remaining Several of these packet types will be used during this exercise. The second field, Packet ID, is used to distinguish the current packet from other LCP packets with the same Packet Code. The packet ID values will not be important in this exercise. The third field, Length, specifies the number of bytes in the current LCP packet. This length includes the 4 header bytes (consisting of the first three fields) plus the number of payload (data) bytes in the packet. Now that you have a basic understanding of the packet format, let s look at a specific example. Section 2: Configuration Request Packets Initially, the format of the LCP packets is fixed to ensure that the client and server can communicate. However, this packet format may have unused or oversized fields that would be noticeable overhead over a dial-up connection. We all know that dial-up is slow, so anything that might make it even slower should definitely be avoided. To reduce overhead and ensure that the client and server can communicate with one another, both the client and server send Configuration Request packets to one another. The format of Configuration Request packets is given in Table 3 on the next page. 3

4 Table 3: Configuration Request Format Byte Offset Field Size (Bytes) Length - 4 Field 0x01 Packet ID Length Configuration Options In this case, the LCP Packet Code in the first field is 1 (or 0x01 in hexadecimal), which corresponds to the Configure-Request packet type. The Packet ID can be ignored and the Length field is defined the same way as described in Section 1. For the last field, look at the Configuration Option format in Table 4 below. Table 4: Configuration Option Format Byte Offset Field Size (Bytes) 1 1 Length - 2 Field Name Option ID Length Option Data Any number of Configuration Options can be in the Configuration Request packet. For each Configuration Option, the Option ID specifies a particular option that the sender wishes to agree upon with the packet s recipient. A list of valid Option IDs is in Table 5 below. Table 5: Configuration Option IDs Option ID number Decimal Hexadecimal Option Name 1 0x01 Maximum-Receive-Unit (MRU) 2 0x02 Async-Control-Character-Map 3 0x03 Authentication-Protocol 4 0x04 Quality-Protocol 5 0x05 Magic-Number 6 0x06 RESERVED 7 0x07 Protocol-Field-Compression 8 0x08 Address-and-Control-Field-Compression 9 0x09 FCS-Alternatives 10 0x0A Self-Describing-Pad 11 0x0B Numbered-Mode 12 0x0C Multi-Link-Procedure 13 0x0D Callback 14 0x0E Connect-Time 15 0x0F Compound-Frames 16 0x10 Nominal-Data-Encapsulation 17 0x11 Multilink-MRRU 18 0x12 Multilink-Short-Sequence-Number-Header-Format 19 0x13 Multilink-Endpoint-Discriminator 4

5 Option ID numbers 1 (MRU) and 3 (Authentication-Protocol) will be the most important for this exercise, although a few others including 2, 7, 8, 13, and 17 are also used. For additional information on each of the different Configuration Options, read the RFC 1548 selections provided on pages 9-13 of this handout. Section 3: Configuration Reject and Configuration Ack Packets When the configuration request contains one or more configuration options that are unrecognizable to the receiving party, it must send a Configure-Reject (LCP type 4) packet to the sender. The format of the Configure-Reject packet is the same as the Configure-Request, but instead of including desired configuration options the rejected configuration options are included. When a Configure-Reject packet is received, it can be examined to find out which configuration options were rejected. A new Configure- Request can then be transmitted with alternative configuration options that the receiver might accept. This Request-Reject procedure is repeated until a Configure-Ack packet is received. A Configuration Acknowledgement packet (Configure-Ack, LCP type 2) indicates that the client and server have agreed on how to communicate with one another. The format of the Configure-Ack packet is the same as the Configure-Request packet with the exception of the LCP type code (2 for Configure-Ack, 1 for Configure-Request). The configuration options accepted from the last Configure-Request are simply copied into the Options field in the Configure-Ack packet. Note that the options might not be copied into the Ack packet in the same order as they were originally received. Section 4: Preview of Exercise 2, Part B Once the connection configuration has been completed, as done in Sections 2 and 3, it is often necessary for the server to authenticate the client. In part B of this exercise, authentication is necessary for the client to inform the server that they have a valid user name and password. Once this information has been verified, the connection can be used with network layer protocols including IP. When done using the connection, it needs to be terminated. As a preview of Part B of this exercise, you may want to take a look at the RFC on CHAP. You will not be asked any questions about the security mechanisms used by CHAP, but you will be asked about the protocol s basic operation. If you re interested in the security aspect, an example of a similar protocol is provided in section of the textbook, on pages You may also visit the ELE437 course web site for links to other information. Searching for information on IPCP and CCP online should also be helpful. 5

6 Questions 1) Which configuration options, if any, were rejected by the a. Client b. Server (Dial-up router) 2) Which configuration options, if any, replaced the options rejected by the a. Client b. Server (Dial-up Router) 3) In packet #3, a. What does the value 04 at byte offset 000E in the raw pane represent? b. At what byte offset in the raw pane is the LCP packet length located? c. How many bytes are used to represent the LCP packet length? d. Why isn t the length value 17 since there are only 17 bytes used in the Options field? 4) For authentication of the client, a. What protocol does the server request that the client to use? b. What is the PPP protocol ID number assigned to this protocol? (Hint: Look at both the capture file and the PPP Packet Encapsulation information on pages 7 and 8) c. What algorithm is used? Grading - 14 points - The questions have the following point values: 1) 4 points (2 for each) 2) 2 points (1 for each) 3) 5 points (1 for a-c, 2 for d) 4) 3 points (1 for each) 6

7 PPP Packet Encapsulation and Protocol ID Numbers Selection from RFC 1548 ( 2. PPP Encapsulation The PPP encapsulation is used to disambiguate multiprotocol datagrams. This encapsulation requires framing to indicate the beginning and end of the encapsulation. Methods of providing framing are specified in companion documents. A summary of the PPP encapsulation is shown below. The fields are transmitted from left to right. Protocol Field Protocol Information Padding 16 bits * * The Protocol field is two octets and its value identifies the datagram encapsulated in the Information field of the packet. The field is transmitted and received most significant octet first. The structure of this field is consistent with the ISO 3309 extension mechanism for address fields. All Protocols MUST be odd; the least significant bit of the least significant octet MUST equal "1". Also, all Protocols MUST be assigned such that the least significant bit of the most significant octet equals "0". Frames received which don't comply with these rules MUST be treated as having an unrecognized Protocol. Protocol field values in the "0***" to "3***" range identify the network-layer protocol of specific packets, and values in the "8***" to "b***" range identify packets belonging to the associated Network Control Protocols (NCPs), if any. Protocol field values in the "4***" to "7***" range are used for protocols with low volume traffic which have no associated NCP. Protocol field values in the "c***" to "f***" range identify packets as link-layer Control Protocols (such as LCP). Up-to-date values of the Protocol field are specified in the most recent "Assigned Numbers" RFC [2]. Current values are assigned as follows: Value (in hex) Protocol Name 0001 Padding Protocol 0003 to 001f reserved (transparency inefficient) 0021 Internet Protocol 0023 OSI Network Layer 0025 Xerox NS IDP 0027 DECnet Phase IV 0029 Appletalk 002b Novell IPX 7

8 002d 002f Van Jacobson Compressed TCP/IP Van Jacobson Uncompressed TCP/IP 0031 Bridging PDU 0033 Stream Protocol (ST-II) 0035 Banyan Vines 0037 unused 0039 AppleTalk EDDP 003b AppleTalk SmartBuffered 003d Multi-Link 005d reserved (compression inefficient) 00cf reserved (PPP NLPID) 00fd 1st choice compression 00ff reserved (compression inefficient) d Hello Packets 0203 IBM Source Routing BPDU 0231 Luxcom 0233 Sigma Network Systems 8021 Internet Protocol Control Protocol 8023 OSI Network Layer Control Protocol 8025 Xerox NS IDP Control Protocol 8027 DECnet Phase IV Control Protocol 8029 Appletalk Control Protocol 802b Novell IPX Control Protocol 802d Reserved 802f Reserved 8031 Bridging NCP 8033 Stream Protocol Control Protocol 8035 Banyan Vines Control Protocol 8037 unused 8039 Reserved 803b Reserved 803d Multi-Link Control Protocol 80fd Compression Control Protocol 80ff Reserved c021 c023 c025 c223 Link Control Protocol Password Authentication Protocol Link Quality Report Challenge Handshake Authentication Protocol Developers of new protocols MUST obtain a number from the Internet Assigned Numbers Authority (IANA), at IANA@isi.edu. Information Field The Information field is zero or more octets. The Information field contains the datagram for the protocol specified in the Protocol field. The maximum length for the Information field, including Padding, is termed the Maximum Receive Unit (MRU), which defaults to 1500 octets. By negotiation, consenting PPP implementations may use other values for the MRU. Padding 8

9 On transmission, the Information field MAY be padded with an arbitrary number of octets up to the MRU. It is the responsibility of each protocol to distinguish padding octets from real information. Configuration Option Formats Selections from RFC 1548 ( 6.1 Maximum-Receive-Unit Description This Configuration Option may be sent to inform the peer that the implementation can receive larger packets, or to request that the peer send smaller packets. The default value is 1500 octets. If smaller packets are requested, an implementation MUST still be able to receive the full 1500 octet information field in case link synchronization is lost. Implementation Note: This option is used to indicate an implementation capability. The peer is not required to maximize the use of the capacity. For example, when a MRU is indicated which is 2048 octets, the peer is not required to send any packet with 2048 octets. The peer need not Configure-Nak to indicate that it will only send smaller packets, since the implementation will always require support for at least 1500 octets. A summary of the Maximum-Receive-Unit Configuration Option format is shown below. The fields are transmitted from left to right Type Length Maximum-Receive-Unit Type: 1 Length: 4 Maximum-Receive-Unit The Maximum-Receive-Unit field is two octets, and specifies the maximum number of octets in the Information and Padding fields. It does not include the framing, Protocol field, FCS, nor any transparency bits or bytes. 6.2 Async-Control-Character-Map Description 9

10 This Configuration Option provides a method to negotiate the use of control character transparency on asynchronous links. For asynchronous links, the default value is 0xffffffff, which causes all octets less than 0x20 to be mapped into an appropriate two octet sequence. For most other links, the default value is 0, since there is no need for mapping. However, it is rarely necessary to map all control characters, and often it is unnecessary to map any control characters. The Configuration Option is used to inform the peer which control characters MUST remain mapped when the peer sends them. The peer MAY still send any other octets in mapped format, if it is necessary because of constraints known to the peer. The peer SHOULD Configure-Nak with the logical union of the sets of mapped octets, so that when such octets are spuriously introduced they can be ignored on receipt. A summary of the Async-Control-Character-Map Configuration Option format is shown below. The fields are transmitted from left to right Type Length Async-Control-Character-Map ACCM (cont) Type: 2 Length: 6 Async-Control-Character-Map The Async-Control-Character-Map field is four octets and indicates the set of control characters to be mapped. The map is sent most significant octet first. Each numbered bit corresponds to the octet of the same value. If the bit is cleared to zero, then that octet need not be mapped. If the bit is set to one, then that octet MUST remain mapped. For example, if bit 19 is set to zero, then the ASCII control character 19 (DC3, Control-S) MAY be sent in the clear. Note: The least significant bit of the least significant octet (the final octet transmitted) is numbered bit 0, and would map to the ASCII control character NUL. 10

11 6.3 Authentication-Protocol Description On some links it may be desirable to require a peer to authenticate itself before allowing network-layer protocol packets to be exchanged. This Configuration Option provides a method to negotiate the use of a specific authentication protocol. By default, authentication is not required. An implementation MUST NOT include multiple Authentication- Protocol Configuration Options in its Configure-Request packets. Instead, it SHOULD attempt to configure the most desirable protocol first. If that protocol is Configure-Nak'd, then the implementation SHOULD attempt the next most desirable protocol in the next Configure-Request. If an implementation sends a Configure-Ack with this Configuration Option, then it is agreeing to authenticate with the specified protocol. An implementation receiving a Configure-Ack with this Configuration Option SHOULD expect the peer to authenticate with the acknowledged protocol. There is no requirement that authentication be full duplex or that the same protocol be used in both directions. It is perfectly acceptable for different protocols to be used in each direction. This will, of course, depend on the specific protocols negotiated. A summary of the Authentication-Protocol Configuration Option format is shown below. The fields are transmitted from left to right Type Length Authentication-Protocol Data Type: 3 Length: >= 4 Authentication-Protocol The Authentication-Protocol field is two octets and indicates the authentication protocol desired. Values for this field are always the same as the PPP Protocol field values for that same authentication protocol. Up-to-date values of the Authentication-Protocol field are specified in the most recent "Assigned Numbers" RFC [2]. Current values are assigned as follows: Value (in hex) c023 c223 Protocol Password Authentication Protocol Challenge Handshake Authentication Protocol 11

12 Data The Data field is zero or more octets and contains additional data as determined by the particular protocol. 6.6 Protocol-Field-Compression Description This Configuration Option provides a method to negotiate the compression of the PPP Protocol field. By default, all implementations MUST transmit packets with two octet PPP Protocol fields. PPP Protocol field numbers are chosen such that some values may be compressed into a single octet form which is clearly distinguishable from the two octet form. This Configuration Option is sent to inform the peer that the implementation can receive such single octet Protocol fields. As previously mentioned, the Protocol field uses an extension mechanism consistent with the ISO 3309 extension mechanism for the Address field; the Least Significant Bit (LSB) of each octet is used to indicate extension of the Protocol field. A binary "0" as the LSB indicates that the Protocol field continues with the following octet. The presence of a binary "1" as the LSB marks the last octet of the Protocol field. Notice that any number of "0" octets may be prepended to the field, and will still indicate the same value (consider the two binary representations for 3, and ). When using low speed links, it is desirable to conserve bandwidth by sending as little redundant data as possible. The Protocol- Field-Compression Configuration Option allows a trade-off between implementation simplicity and bandwidth efficiency. If successfully negotiated, the ISO 3309 extension mechanism may be used to compress the Protocol field to one octet instead of two. The large majority of packets are compressible since data protocols are typically assigned with Protocol field values less than 256. Compressed Protocol fields MUST NOT be transmitted unless this Configuration Option has been negotiated. When negotiated, PPP implementations MUST accept PPP packets with either double-octet or single-octet Protocol fields, and MUST NOT distinguish between them. The Protocol field is never compressed when sending any LCP packet. This rule guarantees unambiguous recognition of LCP packets. When a Protocol field is compressed, the Data Link Layer FCS field is calculated on the compressed frame, not the original uncompressed frame. 12

13 A summary of the Protocol-Field-Compression Configuration Option format is shown below. The fields are transmitted from left to right. Type: 7 Length: Type Length Address-and-Control-Field-Compression Description This Configuration Option provides a method to negotiate the compression of the Data Link Layer Address and Control fields. By default, all implementations MUST transmit frames with Address and Control fields appropriate to the link framing. Since these fields usually have constant values for point-to-point links, they are easily compressed. This Configuration Option is sent to inform the peer that the implementation can receive compressed Address and Control fields. If a compressed frame is received when Address-and-Control-Field- Compression has not been negotiated, the implementation MAY silently discard the frame. The Address and Control fields MUST NOT be compressed when sending any LCP packet. This rule guarantees unambiguous recognition of LCP packets. When the Address and Control fields are compressed, the Data Link Layer FCS field is calculated on the compressed frame, not the original uncompressed frame. A summary of the Address-and-Control-Field-Compression configuration option format is shown below. The fields are transmitted from left to right. Type: 8 Length: Type Length

Ethereal Exercise 2 (Part B): Link Control Protocol

Ethereal Exercise 2 (Part B): Link Control Protocol Course: Semester: ELE437 Introduction Ethereal Exercise 2 (Part B): Link Control Protocol In this half of Exercise 2, you will look through a more complete capture of a dial-up connection being established.

More information

Request for Comments: 1332 Obsoletes: RFC 1172 May The PPP Internet Protocol Control Protocol (IPCP)

Request for Comments: 1332 Obsoletes: RFC 1172 May The PPP Internet Protocol Control Protocol (IPCP) Network Working Group G. McGregor Request for Comments: 1332 Merit Obsoletes: RFC 1172 May 1992 The PPP Internet Protocol Control Protocol (IPCP) Status of this Memo This RFC specifies an IAB standards

More information

The Point-to-Point Protocol (PPP) for the Transmission of Multi-protocol Datagrams over Point-to-Point Links

The Point-to-Point Protocol (PPP) for the Transmission of Multi-protocol Datagrams over Point-to-Point Links Network Working Group W. Simpson Request for Comments: 1331 Daydreamer Obsoletes: RFCs 1171, 1172 May 1992 The Point-to-Point Protocol (PPP) for the Transmission of Multi-protocol Datagrams over Point-to-Point

More information

Point-to-Point Protocol (PPP)

Point-to-Point Protocol (PPP) Point-to-Point Protocol (PPP) www.ine.com PPP» Point-to-Point Protocol» Open standard» Operates in the LLC sub-layer of data link layer in OSI» Originally designed for dial-up connections (modems, ISDN,

More information

Teldat Router. PPP Interface

Teldat Router. PPP Interface Teldat Router PPP Interface Doc. DM710-I Rev. 10.11 December, 2003 INDEX Chapter 1 PPP Interface...1 1. Description...2 2. PPP Frame structure...3 2.1. Asynchronous PPP adaptation...3 3. Link Control Protocol...5

More information

Network Working Group

Network Working Group Network Working Group Request for Comments: 2637 Category: Informational K. Hamzeh Ascend Communications G. Pall Microsoft Corporation W. Verthein 3Com J. Taarud Copper Mountain Networks W. Little ECI

More information

Network Working Group Request for Comments: 1962 Category: Standards Track June 1996

Network Working Group Request for Comments: 1962 Category: Standards Track June 1996 Network Working Group D. Rand Request for Comments: 1962 Novell Category: Standards Track June 1996 Status of this Memo The PPP Compression Control Protocol (CCP) This document specifies an Internet standards

More information

Network Working Group Request for Comments: 1663 Category: Standards Track July 1994

Network Working Group Request for Comments: 1663 Category: Standards Track July 1994 Network Working Group D. Rand Request for Comments: 1663 Novell Category: Standards Track July 1994 Status of this Memo PPP Reliable Transmission This document specifies an Internet standards track protocol

More information

Network Working Group Request for Comments: 1377 November The PPP OSI Network Layer Control Protocol (OSINLCP)

Network Working Group Request for Comments: 1377 November The PPP OSI Network Layer Control Protocol (OSINLCP) Network Working Group Request for Comments: 1377 D. Katz cisco November 1992 Status of this Memo The PPP OSI Network Layer Control Protocol (OSINLCP) This RFC specifies an IAB standards track protocol

More information

Network Working Group. Category: Standards Track June 1996

Network Working Group. Category: Standards Track June 1996 Network Working Group G. Meyer Request for Comments: 1968 Spider Systems Category: Standards Track June 1996 Status of this Memo The PPP Encryption Control Protocol (ECP) This document specifies an Internet

More information

Advanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science

Advanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science Advanced Computer Networks Rab Nawaz Jadoon Department of Computer Science DCS COMSATS Institute of Information Technology Assistant Professor COMSATS University, Lahore Pakistan Advanced Computer Networks

More information

Network Working Group. Category: Informational DayDreamer August 1996

Network Working Group. Category: Informational DayDreamer August 1996 Network Working Group Request for Comments: 1974 Category: Informational R. Friend Stac Electronics W. Simpson DayDreamer August 1996 PPP Stac LZS Compression Protocol Status of this Memo This memo provides

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

Request for Comments: 1661 STD: 51 July 1994 Obsoletes: 1548 Category: Standards Track

Request for Comments: 1661 STD: 51 July 1994 Obsoletes: 1548 Category: Standards Track Network Working Group W. Simpson, Editor Request for Comments: 1661 Daydreamer STD: 51 July 1994 Obsoletes: 1548 Category: Standards Track The Point-to-Point Protocol (PPP) Status of this Memo This document

More information

Functional Specification (Preliminary) S-7600A

Functional Specification (Preliminary) S-7600A S-7600A TCP/IP NETWORK PROTOCOL STACK LSI Preliminary - Revision 011 Functional Specification (Preliminary) S-7600A TCP/IP Network Protocol LSI Components Marketing Dept Marketing Section 2 Tel +81-43-211-1028

More information

Lecture 1.1: Point to Point Protocol (PPP) An introduction

Lecture 1.1: Point to Point Protocol (PPP) An introduction Lecture 1.1: Point to Point Protocol (PPP) An introduction "the watchword for a point-to-point protocol should be simplicity" (RFC 1547, PPP requirements). disattended by 50+ RFCs Recommended reading:

More information

Flow control: Ensuring the source sending frames does not overflow the receiver

Flow control: Ensuring the source sending frames does not overflow the receiver Layer 2 Technologies Layer 2: final level of encapsulation of data before transmission over a physical link responsible for reliable transfer of frames between hosts, hop by hop, i.e. on a per link basis

More information

Request for Comments: August 1996

Request for Comments: August 1996 Network Working Group Request for Comments: 1963 Category: Informational K. Schneider S. Venters ADTRAN, Inc. August 1996 Status of This Memo PPP Serial Data Transport Protocol (SDTP) This memo provides

More information

Request for Comments: 1552 Category: Standards Track December The PPP Internetwork Packet Exchange Control Protocol (IPXCP)

Request for Comments: 1552 Category: Standards Track December The PPP Internetwork Packet Exchange Control Protocol (IPXCP) Network Working Group W. Simpson Request for Comments: 1552 Daydreamer Category: Standards Track December 1993 The PPP Internetwork Packet Exchange Control Protocol (IPXCP) Status of this Memo This document

More information

Network Working Group Request for Comments: 1762 Obsoletes: 1376 March 1995 Category: Standards Track. The PPP DECnet Phase IV Control Protocol (DNCP)

Network Working Group Request for Comments: 1762 Obsoletes: 1376 March 1995 Category: Standards Track. The PPP DECnet Phase IV Control Protocol (DNCP) Network Working Group S. Senum Request for Comments: 1762 DigiBoard Obsoletes: 1376 March 1995 Category: Standards Track Status of this Memo The PPP DECnet Phase IV Control Protocol (DNCP) This document

More information

Data Link Layer, Part 4. Exemplary Protocols

Data Link Layer, Part 4. Exemplary Protocols CS 455 Examplary DLL Protocols, Page 1 Data Link Layer, Part 4 Exemplary Protocols These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU

More information

Network Working Group Request for Comments: October 1996

Network Working Group Request for Comments: October 1996 Network Working Group Request for Comments: 2023 Category: Standards Track D. Haskin E. Allen Bay Networks, Inc. October 1996 IP Version 6 over PPP Status of this Memo This document specifies an Internet

More information

A Method for Transmitting PPP Over Ethernet (PPPoE)

A Method for Transmitting PPP Over Ethernet (PPPoE) Network Working Group Request for Comments: 2516 Category: Informational L. Mamakos K. Lidl J. Evarts UUNET Technologies, Inc. D. Carrel D. Simone RedBack Networks, Inc. R. Wheeler RouterWare, Inc. February

More information

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering

More information

PPPoE Technology White Paper

PPPoE Technology White Paper PPPoE Technology White Paper Keywords: PPP, Ethernet, PPPoE Abstract: Point-to-Point Protocol over Ethernet (PPPoE) provides access to the Internet for hosts on an Ethernet through a remote access device

More information

Increasing Bandwidth. Contents

Increasing Bandwidth. Contents 2 Increasing Bandwidth Contents Overview...................................................... 2-2 Configuring MLPPP............................................. 2-4 PPP.......................................................

More information

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Data Link Protocols. TCP/IP Suite and OSI Reference Model Data Link Protocols Relates to Lab. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point Protocol (PPP). 1 TCP/IP Suite

More information

POINT TO POINT DATALINK PROTOCOLS. ETI 2506 Telecommunication Systems Monday, 7 November 2016

POINT TO POINT DATALINK PROTOCOLS. ETI 2506 Telecommunication Systems Monday, 7 November 2016 POINT TO POINT DATALINK PROTOCOLS ETI 2506 Telecommunication Systems Monday, 7 November 2016 TELECOMMUNICATION SYLLABUS Principles of Telecom (IP Telephony and IP TV) - Key Issues to remember PPP Frame

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of

More information

Internet Protocols (chapter 18)

Internet Protocols (chapter 18) Internet Protocols (chapter 18) CSE 3213 Fall 2011 Internetworking Terms 1 TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol

More information

Lecture (06) Network Access layer fundamentals (4) LAN, & WAN Internetwork Layer I

Lecture (06) Network Access layer fundamentals (4) LAN, & WAN Internetwork Layer I Lecture (06) Network Access layer fundamentals (4) LAN, & WAN Internetwork Layer I By: Dr. Ahmed ElShafee ١ Agenda OSI Layer 2 of WANs Internetwork layer Introduction Network Layer Interaction with the

More information

IP and Network Technologies. IP over WAN. Agenda. Agenda

IP and Network Technologies. IP over WAN. Agenda. Agenda IP and Network Technologies IP over WAN Address Resolution, Encapsulation, Routing, NBMA PPP, Inverse ARP, Overview IP over ATM for transport of IP datagrams over a network encapsulation and address resolution

More information

TECHNICAL INTRODUCTION...2 BRIEF TECHNICAL INTRODUCTION...2 SUPPORTED PROTOCOLS...2 High-Level Protocols...2 Low-Level Protocols...2 REQUIREMENTS...

TECHNICAL INTRODUCTION...2 BRIEF TECHNICAL INTRODUCTION...2 SUPPORTED PROTOCOLS...2 High-Level Protocols...2 Low-Level Protocols...2 REQUIREMENTS... S n i f f e m 1. 0 1 Whiitepaper TECHNICAL INTRODUCTION...2 BRIEF TECHNICAL INTRODUCTION...2 SUPPORTED PROTOCOLS...2 High-Level Protocols...2 Low-Level Protocols...2 REQUIREMENTS...2 Hardware...2 Software...2

More information

Configuring Legacy DDR Hubs

Configuring Legacy DDR Hubs Configuring Legacy DDR Hubs This chapter describes how to configure legacy dial-on-demand routing (DDR) on interfaces functioning as the hub in a hub-and-spoke network topology. It includes the following

More information

Request for Comments: August PPP for Data Compression in Data Circuit-Terminating Equipment (DCE)

Request for Comments: August PPP for Data Compression in Data Circuit-Terminating Equipment (DCE) Network Working Group Request for Comments: 1976 Category: Informational K. Schneider S. Venters ADTRAN, Inc. August 1996 PPP for Data Compression in Data Circuit-Terminating Equipment (DCE) Status of

More information

Network Working Group. Category: Informational August 1996

Network Working Group. Category: Informational August 1996 Network Working Group J. Woods Request for Comments: 1979 Proteon, Inc. Category: Informational August 1996 Status of This Memo PPP Deflate Protocol This memo provides information for the Internet community.

More information

Data-link. Examples of protocols. Generating polynomials. Example. Error detection in TCP/IP. Multiple Access Links and Protocols

Data-link. Examples of protocols. Generating polynomials. Example. Error detection in TCP/IP. Multiple Access Links and Protocols Computer Networking Data-link layer Prof. Andrzej Duda duda@imag.fr http://duda.imag.fr Data Link Layer Our goals: Understand principles behind link layer services: sharing a broadcast channel: multiple

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

Chapter 11 Data Link Control 11.1

Chapter 11 Data Link Control 11.1 Chapter 11 Data Link Control 11.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 11-1 FRAMING The data link layer needs to pack bits into frames, so that each

More information

Request for Comments: Category: Standards Track Cisco Systems April Point-to-Point Protocol (PPP) Bridging Control Protocol (BCP)

Request for Comments: Category: Standards Track Cisco Systems April Point-to-Point Protocol (PPP) Bridging Control Protocol (BCP) Network Working Group Request for Comments: 3518 Obsoletes: 2878 Category: Standards Track M. Higashiyama Anritsu F. Baker T. Liao Cisco Systems April 2003 Point-to-Point Protocol (PPP) Bridging Control

More information

Request for Comments: 1333 May 1992

Request for Comments: 1333 May 1992 Network Working Group Request for Comments: 1333 W. Simpson Daydreamer May 1992 PPP Link Quality Monitoring Status of this Memo This RFC specifies an IAB standards track protocol for the Internet community,

More information

Terminal Services Commands translate lat

Terminal Services Commands translate lat translate lat translate lat To translate a connection request to another protocol connection type when receiving a local-area transport (LAT) request, use the translate lat command in global configuration

More information

Introduction to TCP/IP networking

Introduction to TCP/IP networking Introduction to TCP/IP networking TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute TCP : Transmission Control Protocol HTTP, FTP, ssh What is an internet? A set

More information

Service Managed Gateway TM. Configuring Dual ADSL PPP with Worker Standby or Load Share Mode

Service Managed Gateway TM. Configuring Dual ADSL PPP with Worker Standby or Load Share Mode Service Managed Gateway TM Configuring Dual ADSL PPP with Worker Standby or Load Share Mode Issue 1.3 Date 15 November 2011 Table of contents 1 Introduction... 3 1.1 Scope... 3 1.2 Readership... 3 1.3

More information

Other Protocols. Arash Habibi Lashkari

Other Protocols. Arash Habibi Lashkari LAN Technology Other Protocols Arash Habibi Lashkari PHD of Computer Science - Information Security July 2010 Other Protocols Outlines: FDDI: Fiber Distributed Data Interface Token Ring: IEEE 802.5 LAN

More information

Network Working Group Request for Comments: 2866 Category: Informational June 2000 Obsoletes: 2139

Network Working Group Request for Comments: 2866 Category: Informational June 2000 Obsoletes: 2139 Network Working Group C. Rigney Request for Comments: 2866 Livingston Category: Informational June 2000 Obsoletes: 2139 Status of this Memo RADIUS Accounting This memo provides information for the Internet

More information

CE3005: Computer Networks Laboratory 3 SNIFFING AND ANALYSING NETWORK PACKETS

CE3005: Computer Networks Laboratory 3 SNIFFING AND ANALYSING NETWORK PACKETS SNIFFING AND ANALYSING NETWORK PACKETS 1. OBJECTIVE To further understand how the Internet really works and how the concept of encapsulation is being implemented in the different layers of the TCP/IP protocol

More information

Request for Comments: Category: Standards Track July 2000

Request for Comments: Category: Standards Track July 2000 Network Working Group Request for Comments: 2878 Obsoletes: 1638 Category: Standards Track M. Higashiyama Anritsu F. Baker Cisco July 2000 Status of this Memo PPP Bridging Control Protocol (BCP) This document

More information

Network Working Group Request for Comments: 2059 Category: Informational January 1997

Network Working Group Request for Comments: 2059 Category: Informational January 1997 Network Working Group C. Rigney Request for Comments: 2059 Livingston Category: Informational January 1997 Status of this Memo RADIUS Accounting This memo provides information for the Internet community.

More information

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst EITF25 Internet Techniques and Applications L7: Internet Stefan Höst What is Internet? Internet consists of a number of networks that exchange data according to traffic agreements. All networks in Internet

More information

SLIP and PPP Configuration Commands

SLIP and PPP Configuration Commands CHAPTER 15 SLIP and PPP Configuration Commands SLIP and PPP define methods of sending Internet Protocol (IP) packets over standard EIA/TIA-232 asynchronous serial lines with minimum line speeds of 1200

More information

Unit 5: Internet Protocols skong@itt-tech.edutech.edu Internet Protocols She occupied herself with studying a map on the opposite wall because she knew she would have to change trains at some point. Tottenham

More information

Category: Informational Stac Technology August 1996

Category: Informational Stac Technology August 1996 Network Working Group Request for Comments: 1967 Category: Informational K. Schneider ADTRAN, Inc. R. Friend Stac Technology August 1996 Status of This Memo PPP LZS-DCP Compression Protocol (LZS-DCP) This

More information

Chapter 5 TCP/IP SUITE

Chapter 5 TCP/IP SUITE Chapter 5 TCP/IP SUITE Objectives:- TCP/ IP Model Concept. Defining/functioning of different Layers of TCP / IP suite. 5.1 Introduction Addressing mechanism in the Internet An IP address is an address

More information

Lab Using Wireshark to Examine Ethernet Frames

Lab Using Wireshark to Examine Ethernet Frames Topology Objectives Part 1: Examine the Header Fields in an Ethernet II Frame Part 2: Use Wireshark to Capture and Analyze Ethernet Frames Background / Scenario When upper layer protocols communicate with

More information

Category: Standards Track G. McGregor Lloyd Internetworking D. Carr Newbridge Networks Corporation November 1994

Category: Standards Track G. McGregor Lloyd Internetworking D. Carr Newbridge Networks Corporation November 1994 Network Working Group Request for Comments: 1717 Category: Standards Track K. Sklower University of California, Berkeley B. Lloyd G. McGregor Lloyd Internetworking D. Carr Newbridge Networks Corporation

More information

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided.

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided. 113 Chapter 9 TCP/IP Transport and Application Layer Services that are located in the transport layer enable users to segment several upper-layer applications onto the same transport layer data stream.

More information

TCP /IP Fundamentals Mr. Cantu

TCP /IP Fundamentals Mr. Cantu TCP /IP Fundamentals Mr. Cantu OSI Model and TCP/IP Model Comparison TCP / IP Protocols (Application Layer) The TCP/IP subprotocols listed in this layer are services that support a number of network functions:

More information

August AppleTalk tunneling, which allows AppleTalk data to pass through foreign networks and over point-to-point links

August AppleTalk tunneling, which allows AppleTalk data to pass through foreign networks and over point-to-point links Network Working Group Request for Comments: 1504 A. Oppenheimer Apple Computer August 1993 Status of This Memo Appletalk Update-Based Routing Protocol: Enhanced Appletalk Routing This memo provides information

More information

Telematics. 5th Tutorial - LLC vs. MAC, HDLC, Flow Control, E2E-Arguments

Telematics. 5th Tutorial - LLC vs. MAC, HDLC, Flow Control, E2E-Arguments 19531 - Telematics 5th Tutorial - LLC vs. MAC, HDLC, Flow Control, E2E-Arguments Bastian Blywis Department of Mathematics and Computer Science Institute of Computer Science 18. November, 2010 Institute

More information

Data Communication Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 34 TCP/ IP I

Data Communication Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 34 TCP/ IP I Data Communication Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 34 TCP/ IP I Hello and welcome to today s lecture on TCP/IP. (Refer Slide

More information

Chapter 10 Security Protocols of the Data Link Layer

Chapter 10 Security Protocols of the Data Link Layer Chapter 10 Security Protocols of the Data Link Layer IEEE 802.1x Point-to-Point Protocol (PPP) Point-to-Point Tunneling Protocol (PPTP) [NetSec], WS 2005/06 10.1 Scope of Link Layer Security Protocols

More information

SMDS Commands. SMDS Commands 10-1

SMDS Commands. SMDS Commands 10-1 C H A P T E R 1 0 SMDS Commands Use the commands in this chapter to configure the Switched Multimegabit Data Service (SMDS), a wide-area networking service offered by some Regional Bell Operating Companies

More information

Chapter 5 Data-Link Layer: Wired Networks

Chapter 5 Data-Link Layer: Wired Networks Sungkyunkwan University Chapter 5 Data-Link Layer: Wired Networks Prepared by Syed M. Raza and H. Choo 2018-Fall Computer Networks Copyright 2000-2018 Networking Laboratory Chapter 5 Outline 5.1 Introduction

More information

(Sicherungsschicht) Chapter 5 (part 2) [Wa0001] HDLC - 1.

(Sicherungsschicht) Chapter 5 (part 2) [Wa0001] HDLC - 1. Data Link Layer (cont.) (Sicherungsschicht) Chapter 5 (part 2) [Wa0001] HDLC - 1 LOGICAL LINK CONTROL MEDIUM ACCESS CONTROL PHYSICAL SIGNALING DATA LINK LAYER PHYSICAL LAYER ACCESS UNIT INTERFACE PHYSICAL

More information

Lab Using Wireshark to Examine Ethernet Frames

Lab Using Wireshark to Examine Ethernet Frames Topology Objectives Part 1: Examine the Header Fields in an Ethernet II Frame Part 2: Use Wireshark to Capture and Analyze Ethernet Frames Background / Scenario When upper layer protocols communicate with

More information

ECE4110 Internetwork Programming. Introduction and Overview

ECE4110 Internetwork Programming. Introduction and Overview ECE4110 Internetwork Programming Introduction and Overview 1 EXAMPLE GENERAL NETWORK ALGORITHM Listen to wire Are signals detected Detect a preamble Yes Read Destination Address No data carrying or noise?

More information

CCNA 1 Chapter 7 v5.0 Exam Answers 2013

CCNA 1 Chapter 7 v5.0 Exam Answers 2013 CCNA 1 Chapter 7 v5.0 Exam Answers 2013 1 A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the

More information

XNS Commands. Not all Cisco access servers support XNS. For more information, refer to the release notes for the release you are running. Note.

XNS Commands. Not all Cisco access servers support XNS. For more information, refer to the release notes for the release you are running. Note. XNS Commands Developed by the Xerox Corporation, the XNS protocols are designed to be used across a variety of communication media, processors, and office applications. Ungermann-Bass, Inc. (now a part

More information

Chapter 5 OSI Network Layer

Chapter 5 OSI Network Layer Chapter 5 OSI Network Layer The protocols of the OSI model Network layer specify addressing and processes that enable Transport layer data to be packaged and transported. The Network layer encapsulation

More information

Debugging a Virtual Access Service Managed Gateway

Debugging a Virtual Access Service Managed Gateway Debugging a Virtual Access Service Managed Gateway Issue: 1.0 Date: 09 July 2013 Table of Contents 1 About this document... 3 1.1 Scope... 3 2 WAN connectivity... 4 2.1 ADSL... 4 2.1.1 Active data connections...

More information

Configuring X.25 and LAPB

Configuring X.25 and LAPB Configuring X.25 and LAPB This chapter describes how to configure connections through X.25 networks and Link Access Procedure, Balanced (LAPB) connections. LAPB procedures are presented first for those

More information

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review. THE OSI MODEL Application Presentation Session Transport Network Data-Link Physical OSI Model Chapter 1 Review By: Allan Johnson Table of Contents Go There! Go There! Go There! Go There! Go There! Go There!

More information

RADIUS Attributes Overview and RADIUS IETF Attributes

RADIUS Attributes Overview and RADIUS IETF Attributes RADIUS Attributes Overview and RADIUS IETF Attributes First Published: March 19, 2001 Last Updated: September 23, 2009 Remote Authentication Dial-In User Service (RADIUS) attributes are used to define

More information

Network Working Group Request For Comments: 1638 Category: Standards Track IBM Editors June 1994

Network Working Group Request For Comments: 1638 Category: Standards Track IBM Editors June 1994 Network Working Group Request For Comments: 1638 Category: Standards Track F. Baker ACC R. Bowen IBM Editors June 1994 Status of this Memo PPP Bridging Control Protocol (BCP) This document specifies an

More information

Chapter 3. The Data Link Layer

Chapter 3. The Data Link Layer Chapter 3 The Data Link Layer 1 Data Link Layer Algorithms for achieving reliable, efficient communication between two adjacent machines. Adjacent means two machines are physically connected by a communication

More information

Chapter 6 Addressing the Network- IPv4

Chapter 6 Addressing the Network- IPv4 Chapter 6 Addressing the Network- IPv4 Objectives Explain the structure IP addressing and demonstrate the ability to convert between 8- bit binary and decimal numbers. Given an IPv4 address, classify by

More information

Data Link Layer (cont.) ( h h h ) (Sicherungsschicht) HDLC - 1.

Data Link Layer (cont.) ( h h h ) (Sicherungsschicht) HDLC - 1. Data Link Layer (cont.) ( h h h ) (Sicherungsschicht) HDLC - 1 LOGICAL L LINK CONTROL MEDIUM ACCESS CONTROL PHYSICAL SIGNALING DATA LINK LAYER PHYSICAL LAYER ACCESS UNIT INTERFACE PHYSICAL MEDIA ATTACHMENT

More information

HP MSR Router Series. Layer 2 - WAN Access Configuration Guide(V7)

HP MSR Router Series. Layer 2 - WAN Access Configuration Guide(V7) HP MSR Router Series Layer 2 - WAN Access Configuration Guide(V7) Part number: 5998-6465 Software version: CMW710-R0106 Document version: 6PW101-20140807 Legal and notice information Copyright 2014 Hewlett-Packard

More information

Configuring Banyan VINES

Configuring Banyan VINES Configuring Banyan VINES This chapter describes how to configure Banyan VINES and provides configuration examples. For a complete description of the VINES commands in this chapter, refer to the Banyan

More information

frame-relay lapf n201

frame-relay lapf n201 frame-relay lapf n201 frame-relay lapf n201 To set the Link Access Procedure for Frame Relay (LAPF) N201 value (the maximum length of the Information field of the LAPF I frame), use the frame-relay lapf

More information

INTERNET-DRAFT IP Version 6 over PPP February Table of Contents. 1. Introduction Specification of Requirements...

INTERNET-DRAFT IP Version 6 over PPP February Table of Contents. 1. Introduction Specification of Requirements... HTTP/1.1 200 OK Date: Tue, 09 Apr 2002 03:48:38 GMT Server: Apache/1.3.20 (Unix) Last-Modified: Thu, 15 Feb 1996 23:00:00 GMT ETag: "2f52fa-4e8d-3123baf0" Accept-Ranges: bytes Content-Length: 20109 Connection:

More information

Computer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan

Computer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan Computer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan Chapter: 6 Data Link layer: Services and Data Link

More information

1: Review Of Semester Provide an overview of encapsulation.

1: Review Of Semester Provide an overview of encapsulation. 1: Review Of Semester 1 1.1.1.1. Provide an overview of encapsulation. Networking evolves to support current and future applications. By dividing and organizing the networking tasks into separate layers/functions,

More information

NetWare Link-Services Protocol

NetWare Link-Services Protocol 44 CHAPTER Chapter Goals Describe the Network Link-Service Protocol. Describe routing with NLSP. Describe the data packet used by NLSP. Background The (NLSP) is a link-state routing protocol from Novell

More information

Introduction to Networks and the Internet

Introduction to Networks and the Internet Introduction to Networks and the Internet CMPE 80N Announcements Project 2. Reference page. Library presentation. Internet History video. Spring 2003 Week 7 1 2 Today Internetworking (cont d). Fragmentation.

More information

Time Division Multiplexing (TDM) Demarcation Point Serial and parallel ports HDLC Encapsulation PPP

Time Division Multiplexing (TDM) Demarcation Point Serial and parallel ports HDLC Encapsulation PPP CCNA4 Chapter 2 * Time Division Multiplexing (TDM) TDM divides the bandwidth of a single link into separate channels or time slots. The multiplexer (MUX) accepts input from attached devices in a round-robin

More information

UNIT-II 1. Discuss the issues in the data link layer. Answer:

UNIT-II 1. Discuss the issues in the data link layer. Answer: UNIT-II 1. Discuss the issues in the data link layer. Answer: Data Link Layer Design Issues: The data link layer has a number of specific functions it can carry out. These functions include 1. Providing

More information

User Datagram Protocol

User Datagram Protocol Topics Transport Layer TCP s three-way handshake TCP s connection termination sequence TCP s TIME_WAIT state TCP and UDP buffering by the socket layer 2 Introduction UDP is a simple, unreliable datagram

More information

RADIUS Attributes Overview and RADIUS IETF Attributes

RADIUS Attributes Overview and RADIUS IETF Attributes RADIUS Attributes Overview and RADIUS IETF Attributes Remote Authentication Dial-In User Service (RADIUS) attributes are used to define specific authentication, authorization, and accounting (AAA) elements

More information

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided. 223 Chapter 19 Inter mediate TCP The Transmission Control Protocol/Internet Protocol (TCP/IP) suite of protocols was developed as part of the research that the Defense Advanced Research Projects Agency

More information

Position of IP and other network-layer protocols in TCP/IP protocol suite

Position of IP and other network-layer protocols in TCP/IP protocol suite Position of IP and other network-layer protocols in TCP/IP protocol suite IPv4 is an unreliable datagram protocol a best-effort delivery service. The term best-effort means that IPv4 packets can be corrupted,

More information

CCNA Exploration1 Chapter 7: OSI Data Link Layer

CCNA Exploration1 Chapter 7: OSI Data Link Layer CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the

More information

The Internet. 9.1 Introduction. The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications.

The Internet. 9.1 Introduction. The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications. The Internet 9.1 Introduction The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications. Associated with each access network - ISP network, intranet,

More information

PPP Configuration Options

PPP Configuration Options PPP Configuration Options 1 PPP Configuration Options PPP can be configured to support various functions including: Authentication using either PAP or CHAP Compression using either Stacker or Predictor

More information

AN2120. Connecting an M68HC08 Family Microcontroller to an Internet Service Provider (ISP) Using the Point-to-Point Protocol (PPP) Introduction

AN2120. Connecting an M68HC08 Family Microcontroller to an Internet Service Provider (ISP) Using the Point-to-Point Protocol (PPP) Introduction Semiconductor Products Sector Application Note Order this document by /D Connecting an M68HC08 Family Microcontroller to an Internet Service Provider (ISP) Using the Point-to-Point Protocol (PPP) By Rene

More information

Data Link layer (CN chap 3.1, 3.4, 3.6)

Data Link layer (CN chap 3.1, 3.4, 3.6) Data Link layer (CN chap 3.1, 3.4, 3.6) The OSI model an old friend... Application Presentation Session Transport Network Data link Physical F.eks. ftp, mail, http,... handles data structures and conversion

More information

CHAPTER-2 IP CONCEPTS

CHAPTER-2 IP CONCEPTS CHAPTER-2 IP CONCEPTS Page: 1 IP Concepts IP is a very important protocol in modern internetworking; you can't really comprehend modern networking without a good understanding of IP. Unfortunately, IP

More information

Chapter 11 Data Link Control 11.1

Chapter 11 Data Link Control 11.1 Chapter 11 Data Link Control 11.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 11-1 1 FRAMING The data link layer needs to pack bits into frames,, so that

More information

ACL Rule Configuration on the WAP371

ACL Rule Configuration on the WAP371 Article ID: 5089 ACL Rule Configuration on the WAP371 Objective A network access control list (ACL) is an optional layer of security that acts as a firewall for controlling traffic in and out of a subnet.

More information