当前位置:网站首页>IP lesson summary (3)
IP lesson summary (3)
2022-07-24 06:16:00 【Nine character Chen】
Catalog
Network type ---- Divide according to the protocol used in the data link layer
MA--- Multipoint access network
P2P--- Take you to point network
PPP--- Point to point agreement
PPP The agreement has a series of membership agreements
PPP Data transmission process :
Network type ---- Divide according to the protocol used in the data link layer
MA--- Multipoint access network
BMA--- Broadcast multipoint borrowing is like network
NBMA--- Non broadcast multipoint access network
P2P--- Take you to point network
Data link layer protocol
1. Ethernet protocol : Need to use MAC Address distinguishes and identifies different host devices --- Why Ethernet needs to be used MAC Address for data addressing , This is mainly because the layer-2 network using Ethernet components can contain multiple ( Two or more ) The interface of , Each Ethernet interface can carry out layer-2 communication by means of interactive Ethernet frames . --- BMA
1-2. When a network can only contain two devices , Then such a network does not need to be used MAC Address address , Such a network is called P2P The Internet .
T1 --- 1.544Mbps
E1 --- 2.048Mbps
1-3. Ethernet -- Frequency division technology --- So called frequency division , Send my radio waves of different frequency bands at the same time in the same transmission medium , And they don't interfere with each other , Realize the parallel transmission of data
2.HDLC--- String agreement ( Advanced data link control protocol )
2-1 The standard HDLC:ISO Those that meet industrial standards issued by the organization HDLC edition
2-2 Nonstandard HDLC: Major manufacturers based on Standards HDLC The agreement has been improved
( By default , The serial network of Cisco device components uses the encapsulation protocol HDLC, Huawei uses PPP agreement .)

PPP--- Point to point agreement
characteristic :
1 Strong compatibility , There is a unified version , And as long as it supports full duplex serial lines ,
You can use PPP Protocol encapsulation .
2 With strong portability
3 Support authentication and authorization
PPP The agreement has a series of membership agreements
--- LCP -- Link control protocol ( One )
--- NCP -- Network control protocol ( a pile )
--- IPCP agreement

F --- Flag --- 01111110
A --- Address --- 11111111 C --- control --- 00000011
agreement --- Indicates the protocol type used by the upper layer .
FCS --- Frame check sequence --- Ensure data integrity

PPP Data transmission process :
PPP The protocol and TCP The agreement is similar to , Before transmitting data , Need to establish PPP Conversation .
1, Link establishment phase --- LCP establish
2, Authentication phase --- optional
3, Network layer protocol negotiation stage
--- NCP negotiation --- NCP An agreement is a collection of agreements .
--- IPCP agreement
1. Link establishment phase --- LCP establish MRU --- PPP The maximum number of bytes allowed to be carried in the data part of the frame . --- 1500 Whether authentication is required in the second stage of byte and the authentication method

2, Authentication phase --- optional ---- PPP Usually by calling aaa Platform to complete the certification process .
PPP Both one-way authentication and two-way authentication are supported in
PAP----- Password authentication protocol --- The authenticated party sends the user name and password in clear text
To the certifier , If the authentication is successful , Then the certifier replies ACK; Otherwise reply NAK.

CHAP --- Challenge the handshake agreement --- safer , No longer send plaintext directly for authentication , Instead, authentication is performed by comparing the summary values .

HASH( Hash function ) --- Convert input of any length into output of fixed length .
1, Same input , Same output ;
2, Irreversibility
3, Avalanche effect
MDS --- HASH One of the algorithms , Input of any length can be converted into 128 The output of a
3, Network layer protocol negotiation stage --- NCP negotiation --- If the third floor uses IP agreement , You need to use IPCP Protocol to negotiate its parameters
1,IP Compression format of message ;2,IP Address

Once approved, the other party sends IP Address , Will automatically learn the host route to the address .

3、 ... and 、
obtain IP How to configure and obtain addresses :
[r1-Serial4/0/0]ip address ppp-negotiate
Giver :
[r2-Serial4/0/0]remote address 1.1.1.1 PAP Configuration method of authentication :
Certifier :
1, Create user information
[r1-aaa]local-user admin password cipher 1234S6 [r1-aaa]local-user admin service-type ppp
2, Configure authentication mode
[r1-Serial4/0/0]ppp authentication-mode pap
Certified party :
[r2-Serial4/0/0]ppp pap local-user admin password cipher 1234S6
PPP Your session is a one-time session
CHAP Authentication configuration method : Certifier :
1, Create user information
[r1-aaa]local-user admin password cipher 1234S6 [r1-aaa]local-user admin service-type ppp
2, Configure authentication mode
[r1-Serial4/0/0]ppp authentication-mode chap
Certified party :
[r2-Serial4/0/0]ppp chap user admin
[r2-Serial4/0/0]ppp chap password cipher 1234S6
边栏推荐
- 论文阅读-Endmember-Guided Unmixing Network (EGU-Net) 端元指导型高光谱解混网络
- Unity(二) 更多API和物理引擎
- JUC concurrent programming foundation (9) -- thread pool
- 简单三步快速实现内网穿透
- Statistical analysis of catering data --- Teddy cloud course homework
- Solve modularnotfounderror: no module named "cv2.aruco“
- 常见十大漏洞总结(原理、危害、防御)
- IP笔记(7)
- Lunix命令入门 - 用户及文件权限(chmod 详解)
- Unity Shader从内置渲染管线迁移到URP
猜你喜欢
随机推荐
【无需公网IP】为远程桌面树莓派配置固定的公网TCP端口地址
Sequential stack C language stack entry and exit traversal
unity2D横版游戏跳跃实时响应
IP笔记(9)
Using keras and LSTM to realize time series prediction of long-term trend memory -lstnet
unity2D游戏之让人物动起来-下
Thymeleaf quick start learning
不租服务器,自建个人商业网站(1)
The kernel apps to have died. it will restart automatically
Dameng database_ Small matters needing attention during use
Accurate calculation of time delay detailed explanation of VxWorks timestamp
Jupyter notebook select CONDA environment
IP笔记(11)
Dameng database_ Common commands
Hit the wall record (continuously updated)
IP作业(6)
Find the ArrayList < double > with the most occurrences in ArrayList < ArrayList < double >
IP笔记(12)
Day-7 JVM end
MySQL foundation - constraints









