Академический Документы
Профессиональный Документы
Культура Документы
Point-to-Point 2. PPP defines how two devices can negotiate the establishment of
the link and the exchange of data.
3. PPP defines how network layer data are encapsulated in the data
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004 McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
On the other hand, to keep PPP simple, several services are missing:
12.1 Point-
Point-To-
To-Point Protocol
1. PPP does not provide flow control. A sender can send several
frames one after another with no concern about overwhelming
the receiver.
Frame Format
2. PPP has a very simple mechanism for error control. A CRC field Transition States
is used to detect errors. If the frame is corrupted, it is silently
discarded; the upper-layer protocol needs to take care of the
problem. Lack of error control and sequence numbering may cause
a packet to be received out of order.
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004 McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
http://highered.mcgraw-
hill.com/olcweb/cgi/pluginpop.cgi?it=swf::550::450::/sites/d
l/free/0072515848/93776/Fig12_02.swf::Figure%2012.2
PPP is a byte-oriented protocol using byte stuffing with the escape byte 01111101.
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004 McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
1
10/17/2012
Authentication Protocols
Bit Padding
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004 McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004 McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
0116 Configure-request Contains the list of proposed options and their values The first category, comprising the first four packet types, is used
0216 Configure-ack Accepts all options proposed for link configuration during the establish phase.
0316 Configure-nak Announces that some options are not acceptable
0416 Configure-reject Announces that some options are not recognized The second category, comprising packet types 5 and 6, is used for
0516 Terminate-request Requests to shut down the line link termination during the termination phase.
0616 Terminate-ack Accepts the shut down request
0716 Code-reject Announces an unknown code The last five packets are used for link monitoring and debugging.
0816 Protocol-reject Announces an unknown protocol
0916 Echo-request A type of hello message to check if the other end is alive
0A16 Echo-reply The response to the echo-request message
0B16 Discard-request A request to discard the packet
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004 McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
2
10/17/2012
12.5 PAP
Option Default
1. The system sends the user a challenge packet containing a challenge value,
usually a few bytes.
2. The user applies a predefined function that takes the challenge value and the
user's own password and creates a result. The user sends the result in the response
packet to the system.
3. The system does the same. It applies the same function to the password of the
user (known to the system) and the challenge value to create a result. If the result
created is the same as the result sent in the response packet, access is granted;
otherwise, it is denied. CHAP is more secure than PAP, especially if the system
continuously changes the challenge value. Even if the intruder learns the challenge
value and the result, the password is still secret.
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004 McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
12.7 CHAP
http://highered.mcgraw-
hill.com/olcweb/cgi/pluginpop.cgi?it=swf::550::450::/sites/dl/free/0
072515848/93776/Fig12_07.swf::Figure%2012.7
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004 McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
3
10/17/2012
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004 McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
01 Configure-request
02 Configure-ack
http://highered.mcgraw-
hill.com/olcweb/cgi/pluginpop.cgi?it=swf::550::450::/sites/dl/free
03 Configure-nak /0072515848/93776/Fig12_10.swf::Figure%2012.10
04 Configure-reject
05 Terminate-request
06 Terminate-ack
07 Code-reject
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004 McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
12.10 An example
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004 McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
4
10/17/2012
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004 McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
MA
CSMA
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004 McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
5
10/17/2012
http://highered.mcgraw-
hill.com/olcweb/cgi/pluginpop.cgi?it=swf::550::450::/sites/dl/free
/0072515848/93777/Fig13_5.swf::Figure%2013.5
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004 McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004 McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
This is so because the station, once the entire frame is sent, does
not keep a copy of the frame and does not monitor the line for
collision detection. Therefore, the frame transmission time Tfr
must be at least two times the maximum propagation time Tp.
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004 McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
6
10/17/2012
Example 12.5
Solution
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004 McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
Reservation
Polling
Token Passing
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004 McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004 McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
7
10/17/2012
http://highered.mcgraw-
hill.com/olcweb/cgi/pluginpop.cgi?it=swf::550::450::/sites/dl/free/0
072515848/93777/Fig13_13.swf::Figure%2013.3
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004 McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
13.3 Channelization
FDMA
TDMA
CDMA
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004 McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
Note::
Note Note::
Note
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004 McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
8
10/17/2012
Note::
Note
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004 McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004 McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004 McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
9
10/17/2012
Solution
The inner product of each code by itself is N. This is shown for code C; you
can prove for yourself that it holds true for the other codes.
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004 McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
Example 2
* Medium access methods can be categorized as random, controlled,
Check to see if the third property about orthogonal codes holds for or channelized.
our CDMA example.
* In the carrier sense multiple-access (CSMA) method, a station
must listen to the medium prior to sending data onto the line.
Solution
* A persistence strategy defines the procedure to follow when a
The inner product of each code by its complement is −N. This is shown for station senses an occupied medium.
code C; you can prove for yourself that it holds true for the other codes.
* Carrier sense multiple access with collision detection (CSMA/CD)
−C ) = [+1, +1, −1, −1] . [−
C . (− [ −1, −1, +1, +1] = − 1 − 1 − 1 − 1 = −4 is CSMA with a postcollision procedure.
The inner product of a code with the complement of another code is 0.
* Carrier sense multiple access with collision avoidance
−C ) = [+1, −1, +1, −1] . [−
B . (− [ −1, −1, +1, +1] = −1 + 1 + 1 − 1 = 0 (CSMA/CA) is CSMA with procedures that avoid a collision.
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004 McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
* Reservation, polling, and token passing are controlled-access * FDMA, TDMA, and CDMA are channelization methods.
methods.
* In FDMA, the bandwith is divided into bands; each band is
* In the reservation access method, a station reserves a slot for data reserved fro the use of a specific station.
by setting its flag in a reservation frame.
* In TDMA, the bandwidth is not divided into bands; instead the
* In the polling access method, a primary station controls bandwidth is timeshared.
transmissions to and from secondary stations.
* In CDMA, the bandwidth is not divided into bands, yet data
•In the token-passing access method, a station that has control of a from all inputs are transmitted simultaneously.
frame called a token can send data.
* CDMA is based on coding theory and uses sequences of
•Channelization is a multiple-access method in which the available numbers called chips. The sequences are generated using Walsh
bandwidth of a link is shared in time, frequency, or through code, tables.
between stations on a network.
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004 McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
10