@chapter 4 Adv Net
@chapter 4 Adv Net
CHAPTER FOUR
Wide area network protocols
Mulugeta G..
2
Enterprises.
• WANs use diverse networking equipment and technology.
• The key WAN protocols that are in use are Asynchronous Transfer
serial cables, telephone line, trunk line, cellular phone, exclusive radio links,
or fiber optic links.
• Point-to-point protocol is a WAN protocol widely used by customers for
asynchronous circuits.
• PPP is used to transmit multiprotocol data between two directly connected
(point-to-point) computers.
• Data is transmitted in frames. It is also known as RFC 1661.
4
Protocol over ATM (PPPoA) are the two standard encapsulated PPP
forms.
• They are employed to perform functions such as those executed by
DSL services
5
Components of PPP
• Encapsulation Component
• It encapsulates the datagram so that it can be transmitted over the specified
physical layer.
Components of PPP
• Network Control Protocols (NCPs)
Services of PPP
• Services Provided by PPP are
exchange of data.
• Stating the method of encapsulation of network layer data in the frame.
• Cisco uses its own HDLC implementation; therefore Cisco routers are not able to
link.
• Serial link and Ethernet link both use different encapsulation methods for
data transmission.
• Serial link cannot carry the frame formatted with Ethernet encapsulation
encapsulation.
• Serial protocols and encapsulation methods are primarily described in WAN
technology.
• HDLC is an encapsulation method for serial link.
10
password combination.
• The password can pass through an established encrypted tunnel for
and snooping.
11
establishment process.
• PAP uses a two-way handshake process for authentication using the
following steps.
• Step 1. Client sends username and password to server.
they could authenticate and establish a PPP session on the client's behalf.
• It's possible to send PAP authentication requests through existing encrypted
tunnels.
• But, if other authentication options are available, such as CHAP, teams
a random string.
• This challenge phrase is combined with device hostnames using one-way
hash functions.
• With this process, CHAP can authenticate in a way that static secret
• The client performs a hostname lookup on the server and uses the
password that both the client and server know to create an encrypted
one-way hash.
16
• The server will decrypt the hash and verify that it matches the initial
challenge string.
• If the strings match, the server responds with an authentication-success
packet.
• If the strings do not match, the server sends an authentication-failure
PAP.
• CHAP can be set up to do repeated midsession authentications
18
• Router 1
• Enable
• Config terminal
• Interface s0/0
• Encapsulation ppp
• Router 1
• Enable
• Config terminal
• Interface s0/0
• Encapsulation ppp
• exit
?
END OF CHAPTER FOUR
Next: Chapter Five: Introduction to Network Security