You are on page 1of 25

PPPOA

Supervised by : Eng. Safa’a Hussein

Done by:
Marwa Abdulqader
Rafa Najeeb
Amal Qasem
Dina Abdulqader
PPPOA
This topic about PPPOA we wil talk about:
1. PPP (point to point)
2. ATM (Asynchronous Transfer Mode )
3. PPPOA (point to point over ATM)
4. Differences between PPPOA & PPPAE
ppp technology
 Definition of ppp technology
 characteristics of this technology
 disadvantages of ATM technolog
Difination:
Point-to-Point Protocol (PPP) is a data link layer (layer 2)
communication protocol between two routers directly without any
host or any other networking in between .

The is a dicated line between the tow devices and the link is lease
for the enterprice all the time . To access the internet.
characteristics of
this technology
PPP uses a variation of High-level Data Link Control for packet encapsulation. PPP is
data between two directly connected 3 also used to tunnel IP or other network Layer
nodes over a physical connection or over a direct link. Since IP and TCP do not
support point-to-point connections, the use of PPP can enable them over Ethernet
.and other physical media
. an authentication request. PPP can use Challenge-Handshake Authentication Protocol
(chap) or Password Authentication Protocol (PAP).
TO establishe testing and configratin use LCP.
4-FOR negotition and facilities for netwok layer use NCPS.like IPCP.
Link that use T1 ,e1 ……
Disadvantages of ppp

1-in PPP link sits idle until a PPP client attempts to


establish a connection this is no efficinet .
The bandwidth is fixed.
Costly.
ATM technology
 Definition of ATM technology
 characteristics of this technology
 description of how the ATM works
 A list of the advantages
 disadvantages of ATM technolog
DIFINATON
The term ATM stands for Asynchronous Transfer Mode and is an advanced
technology with high bandwidth and low delay that allows a range of
different
applications and services to be supported and transmitted over a single
network ATM technology adapts to both local and wide area networks and
supports data transfer speeds from 25 Mbps to 1.2 Gbps or more.

.
characteristics of this technology

Unlike other transmission technologies, ATM technology does not send data in the
form of different-sized frames, but rather sends information in the form of Uniform
Sized Cells, and each cell cannot carry more than 53 bytes, which is divided into
two part
1-Header: consists of 5 bytes and carries addresses
2-Payload: It consists of 48 bytes and carries data and application information .
Transferring data in the form of small cells is more effective and efficient than
transferring it in the form of large packages or frames of different sizes.
list of the advantages
 High speed
 Flexibility, which is as follows:
A- Providing a wide range of services,
B-Providing integration between local networks and wide
networks which facilitates and simplifies their
management.
C- Providing a solid global standard that has begun to
spread widely .
disadvantages of ATM technolog :

 The ATM standards have  Incompatibility with many  Upgrading existing networks
not been fully agreed network components to become compatible with
upon ATM technology is costly

summary
ATM technology uses small cells to transfer data, each of which can hold 53 bits of
data, and the data transfer speed ranges between 25 megabits per second and 1.2
gigabits per second, but it is not compatible with many components of current
network
description of how the
ATM works

the way this technology works is very similar to the way Frame Relay technology
works in terms of the need to provide a virtual path between the sending and
receiving devices before starting the data transfer process
Terms used in ATM technology to describe virtual connections are:
 Virtual Channels
 Virtual Paths
PPPoA Baseline Architecture
 Introduction.

 Assumption.

 Technology Brief.

 Advantages and Disadvantages of PPPoA Architecture.

 Typical PPPoA Network Architecture .

 Operational Description of PPPoA Architecture .

 How the Service Destination is Reached .


introdaction
PPPoA architecture inherits most of the advantages of PPP used in
the Dial model. Some of the key points are listed below

Assumption
The baseline architecture assumes the need for providing high speed Internet
access and corporate access to the end subscriber using PPPoA as the core
backbone. We will discuss this architecture based on private virtual channels
(PVCs), the method used most often in current deployments. The architecture
using switched virtual circuits (SVCs) will be discussed in a separate paper
Technology Brief
PPP over ATM adaptation layer 5 (AAL5) (RFC
2364) uses AAL5 as the framed protocol, which
supports both PVC and SVC. PPPoA was
primarily implemented as part of ADSL. It relies
on RFC1483, operating in either Logical Link
Control-Subnetwork Access Protocol (LLC-
SNAP) or VC-Mux mode. A customer premises
equipment (CPE) device encapsulates the PPP
session based on this RFC for transport across
the ADSL loop and the digital subscriber line
access multiplexer (DSLAM)
Advantages

IP address conservation at IP management overhead


Per session authentication
for the Network
based on Password the CPE. This allows the
Access Provider/Network
Authentication Protocol (PAP) service provider to assign Services Provider
or Challenge Handshake only one IP address for a (NAP/NSP) for each
Authentication Protocol CPE, with the CPE configured individual user is reduced
(CHAP). This is the greatest for network address while conserving IP
advantage of PPPoA as translation (NAT). All users addresses. Additionally, the
behind one CPE service provider can provide
authentication
a small subnet of IP
overcomes the security hole can use a single IP address
addresses
in a bridging architecture to reach different to overcome the limitations
destinations. of port address translation
(PAT) and NAT
Advantages

Troubleshooting individual Highly scalable as we can terminate a


subscribers. The NSP can very high number of PPP sessions on an
easily identify which aggregation router.Authentication,
subscribers are on or off authorization, and accounting can be
based on active PPP sessions, handled for each user using external
rather than troubleshooting RADIUS servers
entire groups as is the case
with bridging
architecture.
Disadvantages

Increased complexity of the CPE The service provider needs


Only a single session per CPE setup. Help desk personnel at to maintain a database of
on one virtual channel (VC). the service provider need to be sernames and passwords for
Since the username and more knowledgeable. Since the all subscribers. If
password are configured on the username and password are tunnels or proxy services are
CPE, all users behind the CPE configured on the CPE, the used, then the
for that particular VC can subscriber or the CPE vendor authentication can be done
access only one set of services will need to make setup on the basis of the domain
. Users cannot select different changes. Using multiple VCs name and the user
sets of services, although using increases configuration authentication is done at
multiple VCs and establishing complexity.This however, can be the corporate gateway. This
different PPP sessions on overcome by an reduces the size of the
different VCs is possible. autoconfiguration feature which database that the service
is not yet released provider has to maintain.
typical PPPoA Network Architecture
This diagram shows a typical PPPoA network architecture. Customers using CPEs connect to
the service provider's network through a DSLAM, which connects to a aggregator using ATM.
Operational Description of PPPoA Architecture
When the CPE is first powered on, it starts sending LCP configuration requests
to the aggregation server. The aggregation server, with the PVCs configured,
also sends out the LCP configuration request on a Virtual Access Interface
(associated with the PVC). When each one sees the configuration request of the
other, they acknowledge the requests and the LCP state is opened. For the
authentication stage, the CPE sends the authentication request to the
aggregation server. The server, depending on its configuration, either
authenticates the user based on the domain name (if supplied), or the username
using its local database or RADIUS servers. If the request from the subscriber is
in the form of sername@domainname, the aggregation server will try to create a
tunnel to the destination, if one is not already there. After the tunnel is created,
the aggregation server forwards the PPP requests from the subscriber to the
destination. The destination, in turn, authenticates the user and assigns an IP
address. If the request from the subscriber does not include the domain name,
the user is authenticated by the local database. If SSG isconfigured on the
ggregation router, the user can access the default network as specified and can
get an option to select different services.
How the Service Destination is Reached

In PPPoA architectures, the service destination can be reached in different ways. Some of the most
commonly deployed methods are:
• Terminating PPP sessions at the service provider
• L2TP Tunneling
• Using SSG

In all three methods there is a fixed set of PVCs defined from the CPE to the DSLAM that is switched
to a fixed set of PVCs on the aggregation router. The PVCs are mapped from the DSLAM to the
aggregation router through an ATM cloud we will talk about this in the next page :
How the Service Destination is Reached
Terminating PPP at Aggregation

The PPP sessions initiated by the subscriber are terminated at the service provider which authenticates users using
either a local database on the router or through RADIUS servers. After the user is authenticated, IPCP negotiation
takes place and the IP address is assigned to the CPE. After the IP address has been assigned,there is a host route
established both on the CPE and on the aggregation router. The IP addresses allocated tothe subscriber, if legal,
are advertised to the edge router. The edge router is the gateway through which the subscriber can access the
Internet. If the IP addresses are private, the service provider translates them before advertising them to the edge
router
How the Service Destination is Reached
L2TP/L2F Tunneling

PPP sessions, depending on the service provider or corporation, tunnel to the


upstream termination point using L2TP or L2F instead of being terminated on the
service provider?s aggregation router. This termination point authenticates the
username and the subscriber is assigned an IP address via DHCP or a local pool.
For this scenario there is usually one tunnel established between the L2TP
Access Concentrator/network access server (LAC/NAS) and home gateway or
L2TP Network Server (LNS). The LAC authenticates the incoming session based
on the domain name; the username is authenticated at the final destination or
home gateway. In this model, however, the user can only have access to the final
destination and can access only one destination at a time. For example, if the
CPE is configured with a username of rtr@cisco.com, the PCs behind that CPE
can only have access to the Cisco domain. If they want to connect to another
corporate network, they need to change the username and password on the CPE
to reflect that corporate domain name. The tunnel destination in this case is
reached by using a routing protocol, static routes, or doing classical IP over ATM
(if the ATM is preferred as Layer 2).
How the Service Destination is Reached
Using Service Selection Gateway (SSG)

The main advantage of SSG over tunneling is that SSG provides


mapping of one-to-many services, whereas tunneling provides only one-
to-one mapping. This becomes very useful when a single user needs
access to multiple services, or multiple users at a single location each
need access to a unique service. SSG uses the Web-based Service
Selection Dashboard (SSD), which consists of different services and is
available to the user. The user can access one service or multiple
services at one time. Another advantage of using SSG is that the service
provider can bill the user based on the services used and the session
time, and the user can turn services on and off through the SSD .
Users are authenticated as the PPP session comes in from the
subscribers. Users are assigned IP addresses from either the local pool
or the RADIUS server. After a user is successfully authenticated, a
source object is created by the SSG code and the user is given access
to a default network. The default network contains the SSD server. Using
a browser, the user logs in to the Dashboard, is authenticated by the
AAA server, and depending on the user?s profile stored in the RADIUS
server, is offered a set of services to access.
Differences between PPPOE & PPPOA

3. PPPoE is often used in


1. PPPoE means Point-to-Point lower packages while
Protocol over Ethernet PPPoA is often used
while PPPoA means in enterprise packages 5. PPPoA has slightly less
Point-to-Point Protocol
overhead than
overATM
PPPoE therefore, it is
a bit faster.
2. PPPoE encapsulates PPP frames 4. PPPoE is more
inside the Ethernet frames while commonly used than
PPPoA en PPPoA.
capsulates frames inside AAAL5.

You might also like