Addison-Wesley

James Carlson

PPP Design, Implementation, and Debugging
2nd Edition
Table of Contents


Acknowledgmentsxi
Preface to the Second Editionxiii
CHAPTER ONEIntroduction1
Packet Switching Networks2
Dial-Up File Transfer Protocols3
Dial-Up Networking3
CHAPTER TWOPPP Communication Basics9
How PPP Fits In9
Media10
HDLC13
PPP Framing16
Standard Encapsulations29
Statistics and Management35
Auto-Detecting36
AHDLC Start-Up Issues42
Switched Circuit Integration44
Null-Modem Connection to Windows NT44
General Implementation Issues45
CHAPTER THREELCP and the PPP State Machines47
PPP Outline47
The Negotiation Messages55
LCP Negotiation Options72
CHAPTER FOURAuthentication and Security95
Authentication Protocols95
External Security Servers118
About Security120
Fast Reconnect125
CHAPTER FIVEThe Network Layer Protocols127
Internet Protocol (IP; IPCP)128
Open Systems Interconnection (OSI; OSINLCP)134
Xerox Network Systems Internet Datagram Protocol (XNS IDP; XNSCP)135
DECnet Phase IV Routing Protocol (DECnet; DNCP)136
AppleTalk (AT; ATCP)136
Internet Packet Exchange (IPX; IPXCP)140
Bridging (BCP)144
Banyan Vines (VINES; BVCP)149
NetBIOS Frames Control Protocol (NetBIOS; NBFCP)151
Systems Network Architecture (SNA; SNACP)152
Serial Data Transport Protocol (SDTP; SDCP)153
Internet Protocol Version 6 (IVPv6; IPV6CP)155
Simple Transportation Management Framework (STMF; STMFCP)156
Multiprotocol Label Switching (MPLS; MPLSCP)157
IP Addressing Issues158
CHAPTER SIXThe Transforming Layers169
Architecture170
Compression Negotiation177
Encryption Negotiation196
CHAPTER SEVENBandwidth Management and Call Control201
Demand-Dialing202
Aggregation of Multiple Links203
Active Bandwidth Management226
Cost Shifting232
CHAPTER EIGHTTunneling PPP239
Why Tunnel PPP?239
PPP Tunneling Protocols241
Layer Two Forwarding -- L2F242
Point-to-Point Tunneling Protocol -- PPTP243
Layer Two Tunneling Protocol -- L2TP243
PPP over Ethernet (PPPoE)245
Ad Hoc Tunneling246
CHAPTER NINEDebugging Links253
Approach253
Network-Layer Problems253
Negotiation and Communications255
Configuration Problems257
Link Failure258
Common Implementation Errors and Effects260
Example Traces264
Network Data274
MP, CCP, and ECP276
Appearance of Packets on Various Media277
Getting Traces from Common PPP Software277
Unix Systems278
UNIX Vendor PPP Implementations281
Personal Computer Software297
Communications Servers and Routers303
Test Tools310
CHAPTER TENOne PPP Implementation317
Overview317
Kernel Details319
The pppd Daemon323
The Utility Programs325
Modifying pppd326
Differences from RFC 1661327
Log Messages329
Other Notes338
The pppd Configuration Options339
Example Configuration343
CHAPTER ELEVENResources347
Other PPP-Related Books347
Related Books and Other Publications348
Getting RFCs, Internet Drafts, and Other Documents350
Help Sites352
USENET News Groups355
Meetings and Mailing Lists357
Publicly Available Source Code359
Binary-only Software360
Commercial Sources361
Other Resources361
APPENDIX ACross-References363
APPENDIX BDecimal, Hexadecimal, Octal, and Standard Characters375
Index379

© 2000 Addison-Wesley, all rights reserved.
Best viewed with any browser Valid HTML 3.2! Bobby Approved Hit counter