Vous êtes sur la page 1sur 15

PPP Stack

For establishing the connection, authentication


and transmit the data, PPP use the protocol
stack.
The protocol stack has:
i) Link Control protocol (LCP)
ii) Authentication protocol (AP)
iii) Network control protocol (NCP )
Protocol Structure
A PPP packet carry the packets related to one of these
protocols in its data field.
Link Control Protocol ( L C P )
 LCP negotiate, establishing, maintaining,
Configuring & Terminating links.
 LCP packets are carried in the data field of
the PPP frame.
No user data carried during these states.
LCP packet encapsulated in a frame

Code – holds the type of LCP packet.

ID - holds a value used to match a request with the reply.

Length – holds the total length of LCP packet.

Information – This field contains extra information needed for


some LCP packets.
List of LCP packets and their codes
Code Packet Type Description

0116 Configure- Contains the list of proposed options and their values
request
0216 Configure-ack Accepts all options proposed
0316 Configure-nak Announces that some options are not acceptable
0416 Configure-reject Announces that some options are not recognized

0516 Terminate- Requests to shut down the line


request
0616 Terminate-ack Accepts the shut down request
0716 Code-reject Announces an unknown code
0816 Protocol-reject Announces an unknown protocol
A type of hello message to check if the other end is
0916 Echo-request
alive
0A16 Echo-reply The response to the echo-request message
0B16 Discard-request A request to discard the packet
2) Authentication Protocol
 For validating the identity of a user who wants to
access resource.
Two types of Authentication Protocols:
a) Password Authentication Protocol (PAP)
b) Challenge Handshake Authentication Protocol (CHAP )
a) Password Authentication Protocol ( PAP)

User wants to access a system. He send user name


and pass word.

 System checks the validity of the identification &


pass word, and accept or reject the connection.
PAP packets
b) Challenge Handshake Authentication Protocol
(CHAP)
This provides greater security than PAP. In this
method the password is kept secret.
The system sends to the user a challenge packet
containing the challenge value.
User process the name and password using the
challenge value and creates a result. The result is sent
using a response packet to the system.
Using the same procedure, system also create a
result.
 If the result created is same as the result sent in the
response packet, access is granted, otherwise it is
denied.
Challenge Handshake Authentication Protocol ( CHAP )
CHAP packets
4 CHAP packets- Challenge, Response, Success, & failure
Multiple
Access
Multiple-access protocols
In multiple access, stations are connected to a shared link.
Access to the shared link are coordinated by multiple access
protocol. There are 3 categories of multiple access protocols.

Vous aimerez peut-être aussi