Cart
Free US shipping over $10
Proud to be B-Corp

PPP and L2TP Uyless N. Black

PPP and L2TP By Uyless N. Black

PPP and L2TP by Uyless N. Black


$31.99
Condition - Very Good
Only 1 left

Summary

PLEASE PROVIDE COURSE INFORMATION

PLEASE PROVIDE

PPP and L2TP Summary

PPP and L2TP: Remote Access Communications by Uyless N. Black

2246B-6 In this detailed guide, respected communications consultant Uyless Black gives networking professionals crucial information for designing large-scale remote access solutions, including state-of-the-art Virtual Private Networks (VPNs) and business DSL implementations. You'll find detailed coverage of both the PPP and L2TP protocols, including real-world help with configuration, security, and management. Coverage includes all this, and more: * PPP and L2TP: goals, benefits, and components * PPP negotiation model and protocol support (IP, IPX, Appletalk) * High-Level Data Link Control (HDLC), Link Control Protocol (LCP), and Network Control Protocol (NCP) * PPP security: encryption keys, PAP, CHAP, RADIUS, and the latest IPSec standards * L2TP tunnel sessions, messages, traffic accounting, and security considerations * Integrating L2TP with other protocols and services: ATM, Frame Relay, and Mobile PPP Secure, Internet-based remote access can deliver unprecedented flexibility and cost savings to companies and professionals who know how to take advantage of it-and with this authoritative guide, you will too.

About Uyless N. Black

About the Author

Uyless Black is a widely known and respected consultant and lecturer on computer networks and data communications. He is the author of all the books in his Prentice Hall Series in Advanced Communications Technologies, including Voice Over IP, Residential Broadband Networking, ATM: Foundation for Broadband Networks, and Advanced Internet Technologies.

Table of Contents

(NOTE: Each chapter concludes with Summary.)

1. Introduction.

Why PPP Was Developed. What PPP Does. Applications of PPP. The Network Access Server (NAS). Operations of a Data Link Protocol. Eliminating ACKs, NAKs, and Retransmissions. The Data Link Handshake. How PPP Fits into the Picture. Beyond the Individual Link Operations: Layer Two Tunneling Protocol (L2TP). The Internet Layered Architecture. Data Link Protocols and the Internet Model. A General Look at PPP Operations. The PPP Family.



2. PPP, HDLC, and the Frames.

HDLC. Relationship of PPP's Operations and HDLC. Relationship of PPP to Network Control Protocols (NCPs). PPP and HDLC Formats. Asynchronous HDLC (AHDLC). Octet-Synchronous HDLC. Bit-Synchronous HDLC. Explanation of Terms. The PPP PDU. Auto-Detect Operations. PPP and Error Checking. Error Checking and Retransmission. Error Checking but No Retransmission.



3. The Principal PPP Entities: LCP.

Link Control Protocol (LCP) Basics. The PPP Phases. Link Dead (physical layer not ready). Link Establishment Phase. Authentication Phase. Network-Layer Protocol Phase. Link Termination Phase. Use of Timers During the Authentication and Network Layer Phases. Introduction to the Options. The PPP Option Negotiation Automaton. Another Look at the Layered Architecture. PPP States, Events, and Actions. States. Events. Actions. The LCP Information. The LCP Packets. Error Recovery. Link Configuration Packets. Link Termination Packets. Link Maintenance Packets.



4. The Principal PPP Entities: NCP.

Purpose of NCP. Address Management and Assignment Operations. The Internet Protocol Control Protocol (IPCP). Configuration Options. The Internet Protocol Version 6 Control Protocol (IPv6CP). Other Network Protocols. Open Systems Interconnection NCP (OSINLCP). System Network Architecture (SNA) NCP (SNACP). Net BIOS Frames NCP (NBFCP). Internetwork Packet Exchange NCP (IPXCP). Bridge NCP (BCP). Apple Talk NCP (ATCP). Xerox Network Systems Internet Datagram NCP (XNSCP). BANYAN VINES NCP (BVCP). DECnet Phase IV NCP (DNCP).



5. PPP Security Operations.

What Is Internet Security? Encryption Keys. Private and Public Keys. Distribution of Keys. The Password Authentication Protocol (PAP). The Challenge-Handshake Authentication Protocol (CHAP). The CHAP Packets. RADIUS. Example of RADIUS Configuration. The RADIUS Packet Exchange. IPSec. IPSec and the AH and ESP Operations. IPSec and L2TP. Other References.



6. Other PPP Operations.

Recommended Extensions. Vendor Extensions. The OUI. Maximum Receive Unit (MRU). Asynchronous Control Character Map (ACCM). Authentication Protocol. Quality Protocol. Magic Number. Protocol Field Compression (PFC). Address and Control Field Compression. PPP and LAPB. The PPP Reliable Link Operations. Running PPP Over X.25. Running PPP Over ISDN. Running PPP Over SONET. Link Quality Monitoring (LQM). Other PPP Procedures. FCS Alternatives. Self Describing PAD. Numbered Mode. Multilink Procedure. DCE Identifier. Multilink Plus Procedure. Link Discriminator. Network-Layer Protocols.



7. PPP Multilink Protocol (MP).

Purpose of the Multilink Protocol (MP). Model for MP. The PPP MP Approach. MP Negotiation During LCP Operations. Rules on the Use of PPP Options. Configuration Options. Packet Formats. Example of MP Operations. Example of Fragment-Loss Detection. Guidance on Buffer-Space Requirements. Protocol Extensions. MP Configuration Option Types. Multilink Maximum Received Reconstructed Unit (MRRU). Short Sequence Number Header Format Option. Endpoint Descriminator Option. PPP Bandwidth Allocation Protocol (BAP) and Bandwidth Allocation Control Protocol (BACP). BACP Operations. BAP Operations.



8. Layer Two Tunneling Protocol (L2TP).

Purpose of L2TP. Benefits of L2TP. Terminology Dealing with L2TP. How the Components Fit Together. The L2TP Tunnel and Tunnel Sessions. The L2TP Messages. The L2TP Protocol Stack. The L2TP Header and Messages (AVPs). The Fields Following the Header. The AVPs. Avp Categories. The L2TP Control Messages. Examples of L2TP Operations. Window Management and Accounting for Traffic. Slow Start. Congestion Avoidance. Security Considerations. Tunnel Endpoint Security. L2TP and IPSec. Extensions. Link Extensions.



9. L2TP and Other Protocols and Services.

Running L2TP over ATM or Frame Relay. Review of ATM and Frame Relay Excapsulation Procedures. ATM and L2TP. Frame Relay and L2TP. L2TP-Over-IP MTU Path Discovery (L2TPMTU). Review of IP Fragmentation. The Problem and Solution. Problem with MTU Path Discovery on L2TP Tunnels. L2TPMTU Operations. Mobile PPP (MPPP). The Three Methods. IPSec and L2TP. The Compulsory Tunnel. The Voluntary Tunnel. Summary of L2TP Requirements for Security. RADIUS and L2TP. Other Type of Tunnels. Authentication Alternatives. Multiprotocol Label-Switching (MPLS) Extension. Other Drafts of Interest. Alternate Data Channel Extension. L2TP Dynamic Data Window Adjustment. IP Tunnel MIB.



Appendix A: HDLC Overview.


Appendix B: The Internet: Architecture.


Abbreviations.


Index.

Additional information

GOR004133251
9780130224620
0130224626
PPP and L2TP: Remote Access Communications by Uyless N. Black
Used - Very Good
Hardback
Pearson Education (US)
1999-12-24
219
N/A
Book picture is for illustrative purposes only, actual binding, cover or edition may vary.
This is a used book - there is no escaping the fact it has been read by someone else and it will show signs of wear and previous use. Overall we expect it to be in very good condition, but if you are not entirely satisfied please get in touch with us

Customer Reviews - PPP and L2TP