RFC 6431 on Huawei Port Range Configuration Options for PPP IP Control Protocol (IPCP)

2011-11-21 Thread rfc-editor

A new Request for Comments is now available in online RFC libraries.


RFC 6431

Title:  Huawei Port Range Configuration Options 
for PPP IP Control Protocol (IPCP) 
Author: M. Boucadair, P. Levis,
G. Bajko, T. Savolainen,
T. Tsou
Status: Informational
Stream: Independent
Date:   November 2011
Mailbox:mohamed.boucad...@orange.com, 
pierre.le...@orange.com, 
gabor.ba...@nokia.com,
teemu.savolai...@nokia.com, 
tina.tsou.zout...@huawei.com
Pages:  16
Characters: 33981
Updates/Obsoletes/SeeAlso:   None

I-D Tag:draft-boucadair-pppext-portrange-option-09.txt

URL:http://www.rfc-editor.org/rfc/rfc6431.txt

This document defines two Huawei IPCP (IP Control Protocol) options
used to convey a set of ports.  These options can be used in the
context of port range-based solutions or NAT-based solutions for port
delegation and forwarding purposes.  This document is not an Internet 
Standards Track specification; it is published for informational purposes.


INFORMATIONAL: This memo provides information for the Internet community.
It does not specify an Internet standard of any kind. Distribution of
this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  http://www.ietf.org/mailman/listinfo/ietf-announce
  http://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see http://www.rfc-editor.org/rfcsearch.html.
For downloading RFCs, see http://www.rfc-editor.org/rfc.html.

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Last Call: RFC 1619 (PPP over SONET/SDH) to HISTORIC RFC

2011-10-27 Thread IESG Secretary
The IESG has received a request from an individual to reclassify RFC 1619 
(PPP over SONET/SDH) to HISTORIC. RFC 1619 has been obsoleted by RFC 2615 
and its current status is PROPOSED STANDARD.

The IESG plans to make a decision in the next few weeks, and solicits final 
comments on this action. Please send substantive comments to the i...@ietf.org 
mailing lists by 2011-11-24. Exceptionally, comments may be sent to 
i...@ietf.org instead. In either case, please retain the beginning of 
the Subject line to allow automated sorting.
___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


RFC 6361 on PPP Transparent Interconnection of Lots of Links (TRILL) Protocol Control Protocol

2011-08-25 Thread rfc-editor

A new Request for Comments is now available in online RFC libraries.


RFC 6361

Title:  PPP Transparent Interconnection of Lots 
of Links (TRILL) Protocol Control Protocol 
Author: J. Carlson, D. Eastlake 3rd
Status: Standards Track
Stream: IETF
Date:   August 2011
Mailbox:carls...@workingcode.com, 
d3e...@gmail.com
Pages:  8
Characters: 17705
Updates/Obsoletes/SeeAlso:   None

I-D Tag:draft-ietf-pppext-trill-protocol-08.txt

URL:http://www.rfc-editor.org/rfc/rfc6361.txt

The Point-to-Point Protocol (PPP) defines a Link Control Protocol
(LCP) and a method for negotiating the use of multiprotocol traffic
over point-to-point links.  This document describes PPP support for
the Transparent Interconnection of Lots of Links (TRILL) Protocol,
allowing direct communication between Routing Bridges (RBridges) via
PPP links.  [STANDARDS-TRACK]

This is now a Proposed Standard Protocol.

STANDARDS TRACK: This document specifies an Internet standards track
protocol for the Internet community,and requests discussion and suggestions
for improvements.  Please refer to the current edition of the Internet
Official Protocol Standards (STD 1) for the standardization state and
status of this protocol.  Distribution of this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  http://www.ietf.org/mailman/listinfo/ietf-announce
  http://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see http://www.rfc-editor.org/rfcsearch.html.
For downloading RFCs, see http://www.rfc-editor.org/rfc.html.

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Re: Experimental RFC to be: draft-simpson-isis-ppp-unique-02.txt

2011-08-15 Thread The IESG
The IESG recommends that 'Generation of Unique IS-IS System Identifiers'
draft-simpson-isis-ppp-unique-02.txt NOT be published as an
Experimental RFC.


A URL of this Internet Draft is:
http://datatracker.ietf.org/doc/draft-simpson-isis-ppp-unique/

The process for such documents is described at
http://www.rfc-editor.org/indsubs.html

Thank you,

The IESG Secretary





RFC Editor Note

 The IESG has concluded that this document extends an IETF protocol
 in a way that requires IETF review and should therefore not be
 published without IETF review and IESG approval.

 If the ISE decides to proceed with publication without the requested
 redirection to the ISIS (or TRILL) WG, the IESG requests the 
opportunity to add an IESG note to the document before publication.



___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Protocol Action: 'PPP TRILL Protocol Control Protocol' to Proposed Standard (draft-ietf-pppext-trill-protocol-08.txt)

2011-06-29 Thread The IESG
The IESG has approved the following document:
- 'PPP TRILL Protocol Control Protocol'
  (draft-ietf-pppext-trill-protocol-08.txt) as a Proposed Standard

This document has been reviewed in the IETF but is not the product of an
IETF Working Group.

The IESG contact person is Jari Arkko.

A URL of this Internet Draft is:
http://datatracker.ietf.org/doc/draft-ietf-pppext-trill-protocol/




Technical Summary

The Point-to-Point Protocol (PPP) defines a Link Control
Protocol (LCP) and a method for negotiating the use of
multi-protocol traffic over point-to-point links.  This
document describes PPP support for Transparent Interconnection
of Lots of Links (TRILL) Protocol, allowing direct
communication between Routing Bridges (RBridges) via PPP
links.

Working Group Summary
 
   There is consensus in the WG to publish this document.  There
was some discussion in the working group about IS-IS System
IDs, and the draft reflects the consensus.

   Note that the document author is the working group chair.
   There is no document shepherd due to this, and the responsible
   Area Director has verified that WG discussions were conducted
   properly and that there was consensus to send the document
   forward.

Document Quality

   There is a long list of vendors implementing TRILL, but at
this point there are none that have announced support for
TRILL over PPP.  The PPP extensions described here are
trivial, and the overall system implementation issues have
been discussed in detail with several of the TRILL WG
participants.  No significant implementation, deployment, or
interoperability concerns exist.

Significant reviewers include Bill Simpson, Donald Eastlake,
and Vern Schryver.

Personnel

   There is no Document Shepherd. The responsible
   Area Director is Jari Arkko.

RFC Editor Note

 N.A.
___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Re: Last Call: draft-ietf-pppext-trill-protocol-06.txt (PPP TRILL Protocol Control Protocol) to Proposed Standard

2011-06-12 Thread Jari Arkko
This document has been in IESG review last week. A number of technical 
issues were raised (thank you!) and we are almost done with addressing 
them. Still negotiating what change, if any, to be done based on the 
Security AD's Discuss.


However, the IESG has also asked me to treat this document as if it were 
an Individual Submission. This is not a negative assessment of the 
document content, the document was appreciated. But the IESG correctly 
noted that its not within the PPPEXT group's charter. It was my mistake 
to not catch this earlier. Sorry.


In any case, as a result, we will deal with this document as an 
Individual Submission. The main change is the last call period. The last 
call of this document will continue until it has been under review for 
four weeks, and will be re-evaluated in the IESG telechat on June 23rd. 
We'd be happy to receive additional reviews.


Jari

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-ietf-pppext-trill-protocol-06.txt (PPP TRILL Protocol Control Protocol) to Proposed Standard

2011-05-31 Thread Stewart Bryant

The RTG-dir review comments :

http://www.ietf.org/mail-archive/web/rtg-dir/current/msg01533.html

Should be addressed before publication.

- Stewart



On 25/05/2011 17:13, The IESG wrote:

The IESG has received a request from the Point-to-Point Protocol
Extensions WG (pppext) to consider the following document:
- 'PPP TRILL Protocol Control Protocol'
   draft-ietf-pppext-trill-protocol-06.txt  as a Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2011-06-08. Exceptionally, comments may be
sent to i...@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


The Point-to-Point Protocol (PPP) defines a Link Control Protocol
(LCP) and a method for negotiating the use of multi-protocol traffic
over point-to-point links.  This document describes PPP support for
Transparent Interconnection of Lots of Links (TRILL) Protocol,
allowing direct communication between Routing Bridges (RBridges) via
PPP links.





The file can be obtained via
http://datatracker.ietf.org/doc/draft-ietf-pppext-trill-protocol/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-ietf-pppext-trill-protocol/


No IPR declarations have been submitted directly on this I-D.


___
IETF-Announce mailing list
ietf-annou...@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce




--
For corporate legal information go to:

http://www.cisco.com/web/about/doing_business/legal/cri/index.html


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Last Call: draft-ietf-pppext-trill-protocol-06.txt (PPP TRILL Protocol Control Protocol) to Proposed Standard

2011-05-25 Thread The IESG

The IESG has received a request from the Point-to-Point Protocol
Extensions WG (pppext) to consider the following document:
- 'PPP TRILL Protocol Control Protocol'
  draft-ietf-pppext-trill-protocol-06.txt as a Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
i...@ietf.org mailing lists by 2011-06-08. Exceptionally, comments may be
sent to i...@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


   The Point-to-Point Protocol (PPP) defines a Link Control Protocol
   (LCP) and a method for negotiating the use of multi-protocol traffic
   over point-to-point links.  This document describes PPP support for
   Transparent Interconnection of Lots of Links (TRILL) Protocol,
   allowing direct communication between Routing Bridges (RBridges) via
   PPP links.





The file can be obtained via
http://datatracker.ietf.org/doc/draft-ietf-pppext-trill-protocol/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-ietf-pppext-trill-protocol/


No IPR declarations have been submitted directly on this I-D.


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


RFC 5578 on PPP over Ethernet (PPPoE) Extensions for Credit Flow and Link Metrics

2010-02-03 Thread rfc-editor

A new Request for Comments is now available in online RFC libraries.


RFC 5578

Title:  PPP over Ethernet (PPPoE) Extensions 
for Credit Flow and Link Metrics 
Author: B. Berry, Ed.,
S. Ratliff, E. Paradise,
T. Kaiser, M. Adams
Status: Informational
Date:   February 2010
Mailbox:bbe...@cisco.com, 
sratl...@cisco.com, 
pd...@cisco.com,  timothy.kai...@harris.com, 
michael.d.ad...@l-3com.com
Pages:  24
Characters: 54936
Obsoletes:  RFC4938

I-D Tag:draft-bberry-rfc4938bis-00.txt

URL:http://www.rfc-editor.org/rfc/rfc5578.txt

This document extends the Point-to-Point Protocol over Ethernet (PPPoE)
with an optional credit-based flow control mechanism and
an optional Link Quality Metric report.  These optional extensions
improve the performance of PPPoE over media with variable bandwidth
and limited buffering, such as mobile point-to-point radio links.  
This document is not an Internet Standards Track specification; it is
published for informational purposes.


INFORMATIONAL: This memo provides information for the Internet community.
It does not specify an Internet standard of any kind. Distribution of
this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  http://www.ietf.org/mailman/listinfo/ietf-announce
  http://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see http://www.rfc-editor.org/rfcsearch.html.
For downloading RFCs, see http://www.rfc-editor.org/rfc.html.

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


RFC 5072 on IP Version 6 over PPP

2007-09-24 Thread rfc-editor

A new Request for Comments is now available in online RFC libraries.


RFC 5072

Title:  IP Version 6 over PPP 
Author: S.Varada, Ed.,
D. Haskins, E. Allen
Status: Standards Track
Date:   September 2007
Mailbox:[EMAIL PROTECTED]
Pages:  16
Characters: 33910
Obsoletes:  RFC2472
See-Also:   

I-D Tag:draft-ietf-ipv6-over-ppp-v2-03.txt

URL:http://www.rfc-editor.org/rfc/rfc5072.txt

The Point-to-Point Protocol (PPP) provides a standard method of
encapsulating network-layer protocol information over
point-to-point links.  PPP also defines an extensible Link Control
Protocol, and proposes a family of Network Control Protocols
(NCPs) for establishing and configuring different network-layer
protocols.

This document defines the method for sending IPv6 packets over PPP
links, the NCP for establishing and configuring the IPv6 over PPP,
and the method for forming IPv6 link-local addresses on PPP links.

It also specifies the conditions for performing Duplicate Address
Detection on IPv6 global unicast addresses configured for PPP
links either through stateful or stateless address
autoconfiguration.

This document obsoletes RFC 2472.  [STANDARDS TRACK]

This document is a product of the IP Version 6 Working Group
Working Group of the IETF.

This is now a Draft Standard Protocol.

STANDARDS TRACK: This document specifies an Internet standards track
protocol for the Internet community,and requests discussion and suggestions
for improvements.Please refer to the current edition of the Internet
 Official Protocol Standards (STD 1) for the standardization state and
 status of this protocol.  Distribution of this memo is unlimited.

This announcement is sent to the IETF list and the RFC-DIST list.
Requests to be added to or deleted from the IETF distribution list
should be sent to [EMAIL PROTECTED]  Requests to be
added to or deleted from the RFC-DIST distribution list should
be sent to [EMAIL PROTECTED]

Details on obtaining RFCs via FTP or EMAIL may be obtained by sending
an EMAIL message to [EMAIL PROTECTED] with the message body 

help: ways_to_get_rfcs. For example:

To: [EMAIL PROTECTED]
Subject: getting rfcs

help: ways_to_get_rfcs

Requests for special distribution should be addressed to either the
author of the RFC in question, or to [EMAIL PROTECTED]  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.

Submissions for Requests for Comments should be sent to
[EMAIL PROTECTED]  Please consult RFC 2223, Instructions to RFC
Authors, for further information.


The RFC Editor Team
USC/Information Sciences Institute

...



___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf-announce


RFC 4938 on PPP Over Ethernet (PPPoE) Extensions for Credit Flow and Link Metrics

2007-06-30 Thread rfc-editor

A new Request for Comments is now available in online RFC libraries.





RFC 4938



Title:  PPP Over Ethernet (PPPoE) Extensions 

for Credit Flow and Link Metrics 

Author: B. Berry, H. Holgate

Status: Informational

Date:   June 2007

Mailbox:[EMAIL PROTECTED], 

[EMAIL PROTECTED]

Pages:  17

Characters: 38288

Updates/Obsoletes/SeeAlso:   None



I-D Tag:draft-bberry-pppoe-credit-06.txt



URL:http://www.rfc-editor.org/rfc/rfc4938.txt



This document extends the Point-to-Point over Ethernet (PPPoE)

Protocol with a credit-based flow control mechanism and

Link Quality Metric report.  This optional extension should

improve the performance of PPPoE over media with variable

bandwidth and limited buffering, such as mobile radio links.  This memo 

provides information for the Internet community.





INFORMATIONAL: This memo provides information for the Internet community. 

It does not specify an Internet standard of any kind. Distribution

of this memo is unlimited.



This announcement is sent to the IETF list and the RFC-DIST list.

Requests to be added to or deleted from the IETF distribution list

should be sent to [EMAIL PROTECTED]  Requests to be

added to or deleted from the RFC-DIST distribution list should

be sent to [EMAIL PROTECTED]



Details on obtaining RFCs via FTP or EMAIL may be obtained by sending

an EMAIL message to [EMAIL PROTECTED] with the message body 



help: ways_to_get_rfcs. For example:



To: [EMAIL PROTECTED]

Subject: getting rfcs



help: ways_to_get_rfcs



Requests for special distribution should be addressed to either the

author of the RFC in question, or to [EMAIL PROTECTED]  Unless

specifically noted otherwise on the RFC itself, all RFCs are for

unlimited distribution.



Submissions for Requests for Comments should be sent to

[EMAIL PROTECTED]  Please consult RFC 2223, Instructions to RFC

Authors, for further information.





The RFC Editor Team

USC/Information Sciences Institute



...





___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf-announce


RFC 4937 on IANA Considerations for PPP over Ethernet (PPPoE)

2007-06-30 Thread rfc-editor

A new Request for Comments is now available in online RFC libraries.





RFC 4937



Title:  IANA Considerations for PPP over 

Ethernet (PPPoE) 

Author: P. Arberg, V. Mammoliti

Status: Informational

Date:   June 2007

Mailbox:[EMAIL PROTECTED], 

[EMAIL PROTECTED]

Pages:  6

Characters: 11070

Updates/Obsoletes/SeeAlso:   None



I-D Tag:draft-arberg-pppoe-iana-03.txt



URL:http://www.rfc-editor.org/rfc/rfc4937.txt



This document describes the IANA considerations for the PPP over

Ethernet (PPPoE) protocol.  This memo provides information for the 

Internet community.





INFORMATIONAL: This memo provides information for the Internet community. 

It does not specify an Internet standard of any kind. Distribution

of this memo is unlimited.



This announcement is sent to the IETF list and the RFC-DIST list.

Requests to be added to or deleted from the IETF distribution list

should be sent to [EMAIL PROTECTED]  Requests to be

added to or deleted from the RFC-DIST distribution list should

be sent to [EMAIL PROTECTED]



Details on obtaining RFCs via FTP or EMAIL may be obtained by sending

an EMAIL message to [EMAIL PROTECTED] with the message body 



help: ways_to_get_rfcs. For example:



To: [EMAIL PROTECTED]

Subject: getting rfcs



help: ways_to_get_rfcs



Requests for special distribution should be addressed to either the

author of the RFC in question, or to [EMAIL PROTECTED]  Unless

specifically noted otherwise on the RFC itself, all RFCs are for

unlimited distribution.



Submissions for Requests for Comments should be sent to

[EMAIL PROTECTED]  Please consult RFC 2223, Instructions to RFC

Authors, for further information.





The RFC Editor Team

USC/Information Sciences Institute



...





___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf-announce


Protocol Action: 'IP Version 6 over PPP' to Draft Standard

2007-05-28 Thread The IESG
The IESG has approved the following document:

- 'IP Version 6 over PPP '
   draft-ietf-ipv6-over-ppp-v2-03.txt as a Draft Standard

This document is the product of the IP Version 6 Working Group Working 
Group. 

The IESG contact persons are Jari Arkko and Mark Townsley.

A URL of this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-ipv6-over-ppp-v2-03.txt

Technical Summary
 
  The Point-to-Point Protocol (PPP) provides a standard method of 
  encapsulating Network Layer protocol information over  
  point-to-point links.  PPP also defines an extensible Link Control  
  Protocol, and proposes a family of Network Control Protocols  
  (NCPs) for establishing and configuring different network-layer  
  protocols. 

  This document defines the method for sending IPv6 packets over PPP 
  links, the NCP for establishing and configuring the IPv6 over PPP  
  and the method for forming IPv6 link-local addresses on PPP links. 
  It also specifies the conditions for performing Duplicate Address 
  Detection on IPv6 global unicast addresses configured for PPP 
  links either through stateful or stateless address 
  autoconfiguration. 

Working Group Summary
 
  The IPv6 working group has reviewed this document and it
  reflects the consensus of the group.
 
Protocol Quality
 
  This specification has been reviewed for the IESG by
  Margaret Wasserman. In the working group, it was
  reviewed by the members of the mailing list and by
  the working group chairs.

Note to RFC Editor

  Please move reference [4] (IANA assigned numbers)
  to be informative.

  Please replace reference [5] with the following:

 [5] IEEE, Guidelines For 64-bit Global Identifier (EUI-64), 
 http://standards.ieee.org/regauth/oui/tutorials/EUI64.html


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf-announce


Document Action: 'IANA Considerations for PPP over Ethernet (PPPoE)' to Informational RFC

2007-03-16 Thread The IESG
The IESG has approved the following document:

- 'IANA Considerations for PPP over Ethernet (PPPoE) '
   draft-arberg-pppoe-iana-03.txt as an Informational RFC

This document has been reviewed in the IETF but is not the product of an
IETF Working Group. 

The IESG contact person is Mark Townsley.

A URL of this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-arberg-pppoe-iana-03.txt

Technical Summary

This document provides for an IANA registry of PPPoE TAG and
Code fields.  Known existing usages are reserved, and a first
come first served policy is established for future codes.

Working Group Summary

The PPPEXT working group reviewed the document and there are
no known concerns with the work.  PPPoE itself is not a
standard protocol (L2TP and DHCP are standards-track
alternatives), and future extensions are thus not encouraged.
However, the new registry will help prevent possible conflicts
that may develop before the standards-based solutions are
adopted by PPPoE users.

Protocol Quality

This document does not specify any protocol.  The registry
established reflects current practice within the community.


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf-announce


RFC 4618 on Encapsulation Methods for Transport of PPP/High-Level Data Link Control (HDLC) over MPLS Networks

2006-09-30 Thread rfc-editor

A new Request for Comments is now available in online RFC libraries.


RFC 4618

Title:  Encapsulation Methods for Transport of 
PPP/High-Level Data Link Control (HDLC) over 
MPLS Networks 
Author: L. Martini, E. Rosen,
G. Heron, A. Malis
Status: Standards Track
Date:   September 2006
Mailbox:[EMAIL PROTECTED], 
[EMAIL PROTECTED], 
[EMAIL PROTECTED],  [EMAIL PROTECTED]
Pages:  16
Characters: 33141
Updates/Obsoletes/SeeAlso:   None

I-D Tag:draft-ietf-pwe3-hdlc-ppp-encap-mpls-09.txt

URL:http://www.rfc-editor.org/rfc/rfc4618.txt

A pseudowire (PW) can be used to carry Point to Point Protocol (PPP)
or High-Level Data Link Control (HDLC) Protocol Data Units over a
Multiprotocol Label Switching (MPLS) network without terminating the
PPP/HDLC protocol.  This enables service providers to offer emulated
HDLC, or PPP link services over existing MPLS networks.  This document
specifies the encapsulation of PPP/HDLC Packet Data Units (PDUs)
within a pseudowire.  [STANDARDS TRACK]

This document is a product of the Pseudo Wire Emulation Edge to Edge
Working Group of the IETF.

This is now a Proposed Standard Protocol.

STANDARDS TRACK: This document specifies an Internet standards track
protocol for the Internet community,and requests discussion and 
suggestions for improvements.Please refer to the current edition of the 
Internet Official Protocol Standards (STD 1) for the standardization 
state and status of this protocol.  Distribution of this memo is 
unlimited.

This announcement is sent to the IETF list and the RFC-DIST list.
Requests to be added to or deleted from the IETF distribution list
should be sent to [EMAIL PROTECTED]  Requests to be
added to or deleted from the RFC-DIST distribution list should
be sent to [EMAIL PROTECTED]

Details on obtaining RFCs via FTP or EMAIL may be obtained by sending
an EMAIL message to [EMAIL PROTECTED] with the message body 

help: ways_to_get_rfcs. For example:

To: [EMAIL PROTECTED]
Subject: getting rfcs

help: ways_to_get_rfcs

Requests for special distribution should be addressed to either the
author of the RFC in question, or to [EMAIL PROTECTED]  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.

Submissions for Requests for Comments should be sent to
[EMAIL PROTECTED]  Please consult RFC 2223, Instructions to RFC
Authors, for further information.


Joyce K. Reynolds and Sandy Ginoza
USC/Information Sciences Institute

...



___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf-announce


Protocol Action: 'Encapsulation Methods for Transport of PPP/HDLC Over MPLS Networks' to Proposed Standard

2006-05-29 Thread The IESG
The IESG has approved the following document:

- 'Encapsulation Methods for Transport of PPP/HDLC Over MPLS Networks '
   draft-ietf-pwe3-hdlc-ppp-encap-mpls-09.txt as a Proposed Standard

This document is the product of the Pseudo Wire Emulation Edge to Edge Working 
Group. 

The IESG contact persons are Mark Townsley and Jari Arkko.

A URL of this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-pwe3-hdlc-ppp-encap-mpls-09.txt

* Technical Summary

This draft describes how a Point to Point Protocol (PPP), or High-
Level Data Link Control (HDLC) Protocol Data Units over an
MPLS network without terminating the PPP/HDLC protocol.

This enables service providers to offer emulated HDLC, or PPP
link services over existing MPLS networks. This document specifies
the encapsulation of PPP/HDLC Packet Data Units (PDUs) within
a PW.

* Working Group Summary

This work has been thoroughly analysed by the working group
and there is consensus for the design.

* Protocol Quality

There are many implementations of this protocol, and it is
in operational service.

Note to RFC Editor
 

OLD:

  It is also recommended that PPP devices MUST NOT negotiate PPP MRUs 
  larger than that of the AC MTU. 

NEW:

  It is also RECOMMENDED that the PPP devices be configured to not
  negotiate PPP MRUs larger that of the AC MTU.


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf-announce


Last Call: 'IANA Considerations for PPP over Ethernet (PPPoE)' to BCP (draft-arberg-pppoe-iana)

2006-05-24 Thread The IESG
The IESG has received a request from an individual submitter to consider the 
following document:

- 'IANA Considerations for PPP over Ethernet (PPPoE) '
   draft-arberg-pppoe-iana-01.txt as a BCP

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action.  Please send any comments to the
iesg@ietf.org or ietf@ietf.org mailing lists by 2006-06-21.

The file can be obtained via
http://www.ietf.org/internet-drafts/draft-arberg-pppoe-iana-01.txt


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf-announce


Last Call: 'Encapsulation Methods for Transport of PPP/HDLC Over MPLS Networks' to Proposed Standard

2006-03-23 Thread The IESG
The IESG has received a request from the Pseudo Wire Emulation Edge to Edge WG 
to consider the following document:

- 'Encapsulation Methods for Transport of PPP/HDLC Over MPLS Networks '
   draft-ietf-pwe3-hdlc-ppp-encap-mpls-08.txt as a Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action.  Please send any comments to the
iesg@ietf.org or ietf@ietf.org mailing lists by 2006-04-06.

The file can be obtained via
http://www.ietf.org/internet-drafts/draft-ietf-pwe3-hdlc-ppp-encap-mpls-08.txt


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf-announce


Last Call: 'IP Version 6 over PPP' to Draft Standard

2005-12-08 Thread The IESG
The IESG has received a request from the IP Version 6 Working Group WG to 
consider the following document:

- 'IP Version 6 over PPP '
   draft-ietf-ipv6-over-ppp-v2-02.txt as a Draft Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action.  Please send any comments to the
iesg@ietf.org or ietf@ietf.org mailing lists by 2005-12-22.

The file can be obtained via
http://www.ietf.org/internet-drafts/draft-ietf-ipv6-over-ppp-v2-02.txt

Implementation Report can be accessed at
http://www.ietf.org/IESG/implementation.html


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf-announce


Protocol Action: 'Certificate Extensions and Attributes Supporting Authentication in Point-to-Point Protocol (PPP) and Wireless Local Area Networks (WLAN)' to Proposed Standard

2005-09-06 Thread The IESG
The IESG has approved the following document:

- 'Certificate Extensions and Attributes Supporting Authentication in 
   Point-to-Point Protocol (PPP) and Wireless Local Area Networks (WLAN) '
   draft-ietf-pkix-rfc3770bis-03.txt as a Proposed Standard

This document is the product of the Public-Key Infrastructure (X.509) Working 
Group. 

The IESG contact persons are Sam Hartman and Russ Housley.

A URL of this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-pkix-rfc3770bis-03.txt

Technical Summary

 This document defines mechanisms supporting Extensible Authentication
 Protocol (EAP) authentication methods that employ X.509
 public key certificates.  This document defines two EAP extended key usage
 values and a public key certificate extension to carry Wireless LAN (WLAN
 System Service identifiers (SSIDs), and describes how these mechanisms may
 be applied to support authentication in Point-to-Point Protocol (PPP) and
 Wireless Local Area Networks (WLAN).
 
Working Group Summary
 
 The working group had consensus to advance the draft to Proposed
 Standard.
 
Protocol Quality
 
  This document obseletes and replaces RFC 3770.  It has been reviewed
 by the PKIX working group.  It has been reviewed for the IESG by Sam
 Hartman.

Note to RFC Editor
 
Section 1.1:

old: Three changes are included
new: Five significant  changes are included:


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf-announce


RE: PPP RFCs

2002-06-27 Thread srivatsans

Start with 1661 - PPP
1331 The Point-to-Point Protocol (PPP) for the Transmission of Multi-protocol 
Datagrams over Point-to-Point Links
1332 IPCP (N/w Control Protocol)
1333 PPP Link Quality Monitoring
1334 PPP Authentication Protocols.
1994 PPP Challenge Handshake Authentication Protocol (CHAP)

Hope this helps.

Thanks,
Srivatsan


-Original Message-
From:   Bill Cunningham [mailto:[EMAIL PROTECTED]]
Sent:   Thu 6/27/2002 1:10 AM
To: [EMAIL PROTECTED]
Cc:
Subject:PPP RFCs

Are there RFC's or drafts on the various LCP's that PPP uses or the Network
Control Protocol of PPP?







PPP RFCs

2002-06-26 Thread Bill Cunningham

Are there RFC's or drafts on the various LCP's that PPP uses or the Network
Control Protocol of PPP?




RE: PPP RFCs

2002-06-26 Thread Foulk, Scott

Start with RFC 1661, which obsoletes 1548.  

-Original Message-
From: Bill Cunningham [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, June 26, 2002 9:40 AM
To: [EMAIL PROTECTED]
Subject: PPP RFCs 


Are there RFC's or drafts on the various LCP's that PPP uses or the Network
Control Protocol of PPP?




Re: PPP RFCs

2002-06-26 Thread Bob Braden


  * From [EMAIL PROTECTED]  Wed Jun 26 12:55:35 2002
  * X-Authentication-Warning: ietf.org: majordom set sender to [EMAIL PROTECTED] 
using -f
  * From: Bill Cunningham [EMAIL PROTECTED]
  * To: [EMAIL PROTECTED]
  * Subject: PPP RFCs 
  * Date: Wed, 26 Jun 2002 15:40:23 -0400
  * MIME-Version: 1.0
  * Content-Transfer-Encoding: 7bit
  * X-Priority: 3
  * X-MSMail-Priority: Normal
  * X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4807.1700
  * Content-Transfer-Encoding: 7bit
  * Content-Transfer-Encoding: 7bit
  * X-Loop: [EMAIL PROTECTED]
  * X-AntiVirus: scanned by AMaViS 0.2.1
  * 
  * Are there RFC's or drafts on the various LCP's that PPP uses or the Network
  * Control Protocol of PPP?
  * 

We suggest that you go to the RFC Editor web page and search for
PPP.  You will get 81 hits.

RFC Editor




Re: PPP RFCs

2002-06-26 Thread Bill Cunningham

You know, I have been wondering about cable modems and their analog
usage...:-)
- Original Message -
From: Lloyd Wood [EMAIL PROTECTED]
To: Bill Cunningham [EMAIL PROTECTED]
Cc: ietf [EMAIL PROTECTED]
Sent: Wednesday, June 26, 2002 4:41 PM
Subject: Re: PPP RFCs


 On Wed, 26 Jun 2002, Bill Cunningham wrote:

  Are there RFC's or drafts on the various LCP's that PPP uses or the
Network
  Control Protocol of PPP?

 Yes.

 You're quite capable of finding them, you know.

 L.

 Hoping to forestall another 'modems' thread.

 http://www.ee.surrey.ac.uk/Personal/L.Wood/[EMAIL PROTECTED]





RE: PPP

2002-03-27 Thread Bob Braden


  * switching but a rose by any other name ...).  So all of these, including 
  * PPP, exist at layers 1-2 in the TCP/IP model (link, network, internetwork, 
  * transport, application) ...
  * 

(catching up on old email)

Note that this is not the common-accepted definition of the Internet
layering model.  The Host Requirements working grouip went through this
in detail in 1988, and agreed on the definitions in section 1.1.3 of
RFC 1122.  Strictly speaking, there IS no network layer in the
Internet model, although we commonly tolerate calling the Internet
layer (layer 3) the network layer.  Layer 2 is the link layer.

Bob Braden




Re: PPP

2002-03-11 Thread W. Mark Townsley



Brian Lloyd wrote:
 
 At 11:59 PM 3/6/2002, you wrote:
   sigh It has been many years since I argued this with Karl Fox back when
   he chaired the L2TP WG.
 
 Karl chaired only the pppext WG.
 
 Then at the time L2TP or the precursor discussions were done within the
 PPPEXT WG because the discussion was with Karl.
 
   At that time he agreed but also said that there
   was too much water under the bridge to fix L2TP at that time so it was
   going to go forward in its subtlely-broken form.  I haven't looked at it
   since then.  I don't even remember the lexicon so I will undoubtedly sound
   uninformed.
  
   The LCP negotiation should take place with the L2TP equivalent of the
   NAS.  That is independent of anything else that happens and nothing
   associated with that needs to be communicated to the edge device at the
   target network.  The authentication phase then takes place so you can do
   authorization and configuration.
 
 That would have been nice, but, the requirements were that it be possible for
 user authorization be completed at the LNS (the edge device at the target
 network), and at the LAC (NAS).
 
 Thank you for reminding me.  LNS and LAC were the terms I was looking for.
 
 WRT authentication, there is no reason not to do it in both places.  Let
 the protocol carry the information.
 
 In addition, we could not require the user to
 enter a username and password twice. You simply had to be able to drop in
 L2TP, and everything look the same as it did before to the end user.
 
 I agree that is the more desirable scenario.
 
   Once that is complete you can do the
   MLPPP and NCP negotiation(s) because then and only then do you know what
   the end system is authorized to do.
 
 Yup, that would have been nicer.
 
 Yes, it would.
 
   But MLPPP is negotiated during LCP, you say!  Right.  That is broken and
   I helped make it broken and, in retrospect, I am *really* sorry I did.
 
 That's OK, we'll forgive you ;-)
 
 Thank you.  It may seem silly but that has really bugged me for a number of
 years.  I hate the thought of having done flawed work.
 
 Barring redesign of PPP, getting around the wrong things being located in
 the LCP negotiation would have been made a little easier if we had been
 allowed to go through LCP negotiation twice. So, you could have LCP
 negotiated at the LAC,
 
 But you wouldn't have needed to do LCP negotiation twice.  The LAC
 negotiates LCP because that is the terminus of the link. 

Not just that, the LAC may also need to get authentication information from the
user so that it can know which LNS to forward to. 

 The LAC
 communicates the options negotiated back to the LNS.  

That's what we do now. Please read section 4.4.5 of RFC2661.

 Remember, the LCP
 options negotiate only indicate what the client is willing to accept
 therefore it doesn't really matter what it negotiates.  It is just there to
 prevent its peer from sending something it can't handle.

But, if the LNS, say, want's to do some different authentication... Say, PAP
with an OTP but the LAC negotiated CHAP, then, well... We have to start over PPP
LCP, which should be OK except that it used to break a lot of PPP clients.

 
 forward any necessary link parameters to the LNS so that it could set them
 correctly during LCP round 2, and then renegotiate LCP at the LNS to get
 things like MLPPP and perhaps authentication type which should have been
 designed into the negotiation process later.
 
 Right.  That is the crux of the problem.
 
 But -- and here is the point about broken PPP stacks -- at the time there
 were a lot of PPP stacks which would simply roll over and die if you tried
 to reneogtiate LCP after you had already begun (yes, in great violation to
 what it says in RFC 1661). This wasn't discovered until L2TP came along
 because before that, you really didn't see LCP renegotiation occur very much.
 
 sigh But we did know.  The argument was that it took too long to
 negotiate PPP as it was so anything we did to speed it up was necessary.  I
 have kicked myself for caving in to that argument for many years now.

Then let me give you a collective kick from all of the l2tp developers out there
;-)

I thought it was just a bug. I remember telling Robert Webster about this little
problem at a pacbell bakeoff many years ago. His jaw dropped, and he went back
and made an on-the-fly bugfix for it and afterwards it worked great. Note that
Robert worked at Shiva then, and maintained code for the PPP stack that for a
while was the original code base for much of the dialup client industry (e.g.
Windows, OS/2, and probably some others...).

 
 But, it was way too late as there were so many clients in the field with
 this bug. So, we ended up with Proxy LCP and Proxy Authentication like you
 see them today.
 
 I know: add more ugliness in order to deal with other ugliness.  I
 preferred the old days where people found problems, fixed them, and the
 fixes then found their ways into new versions

Re: PPP

2002-03-09 Thread Andrew McGregor

That top-layer-calls-next-layer etc ad-nauseam model seems to have been one 
of the original ideas for how to implement a stack.

Actual current implementations do all kinds of wierd stuff, but mostly pass 
around accumulating collections of buffers; so the payload buffer doesn't 
get copied to accomodate each new header, instead the kernel has a second 
buffer to contain the header (and later layers can add more).  What gets 
passed around (by way of various queues and internal plumbing schemes) is a 
structure of pointers to pieces of packet, which gets put together on 
transmission, often by the DMA engine in the device or by the device driver.

The layering is just a conceptual model for the logic of what is going on, 
and has no resemblance to the flow of control in a typical actual 
implementation.  There are simple educational implementations that follow 
the layering fairly closely, and they are interesting to read but tend not 
to be practical for high performance applications.

--On Tuesday, 5 March 2002 11:02 p.m. -0800 Christopher Evans 
[EMAIL PROTECTED] wrote:

 Here is a question that will tax your synapes to bursting point!

 How is PPP and TCP/IP libs wired together?  Like, DO I (OSI 8) call TCP
 and it calls IP and down the
 chain till it spills over and gets real physical (OSI 1)? I am confused.


 At 10:02 AM 3/5/02 -0500, you wrote:
 whoa, it's in the TCP/IP suite, it's not. So let me get this straight.
 TCP and UDP are part of IP. TCP provides error sum UDP doesn't and is
 therefore faster than TCP. They are encapsulated in IP, which is put
 into the data bitstream of a PPP frame. Layer 1 is the physical layer,
 are bitstreams sent at that level. BTW I have 56K dial-up no ISDN or DSL.
 - Original Message -









Re: PPP

2002-03-07 Thread Brian Lloyd

At 11:59 PM 3/6/2002, you wrote:
  sigh It has been many years since I argued this with Karl Fox back when
  he chaired the L2TP WG.

Karl chaired only the pppext WG.

Then at the time L2TP or the precursor discussions were done within the 
PPPEXT WG because the discussion was with Karl.

  At that time he agreed but also said that there
  was too much water under the bridge to fix L2TP at that time so it was
  going to go forward in its subtlely-broken form.  I haven't looked at it
  since then.  I don't even remember the lexicon so I will undoubtedly sound
  uninformed.
 
  The LCP negotiation should take place with the L2TP equivalent of the
  NAS.  That is independent of anything else that happens and nothing
  associated with that needs to be communicated to the edge device at the
  target network.  The authentication phase then takes place so you can do
  authorization and configuration.

That would have been nice, but, the requirements were that it be possible for
user authorization be completed at the LNS (the edge device at the target
network), and at the LAC (NAS).

Thank you for reminding me.  LNS and LAC were the terms I was looking for.

WRT authentication, there is no reason not to do it in both places.  Let 
the protocol carry the information.

In addition, we could not require the user to
enter a username and password twice. You simply had to be able to drop in 
L2TP, and everything look the same as it did before to the end user.

I agree that is the more desirable scenario.

  Once that is complete you can do the
  MLPPP and NCP negotiation(s) because then and only then do you know what
  the end system is authorized to do.

Yup, that would have been nicer.

Yes, it would.

  But MLPPP is negotiated during LCP, you say!  Right.  That is broken and
  I helped make it broken and, in retrospect, I am *really* sorry I did.

That's OK, we'll forgive you ;-)

Thank you.  It may seem silly but that has really bugged me for a number of 
years.  I hate the thought of having done flawed work.

Barring redesign of PPP, getting around the wrong things being located in 
the LCP negotiation would have been made a little easier if we had been 
allowed to go through LCP negotiation twice. So, you could have LCP 
negotiated at the LAC,

But you wouldn't have needed to do LCP negotiation twice.  The LAC 
negotiates LCP because that is the terminus of the link.  The LAC 
communicates the options negotiated back to the LNS.  Remember, the LCP 
options negotiate only indicate what the client is willing to accept 
therefore it doesn't really matter what it negotiates.  It is just there to 
prevent its peer from sending something it can't handle.

forward any necessary link parameters to the LNS so that it could set them
correctly during LCP round 2, and then renegotiate LCP at the LNS to get
things like MLPPP and perhaps authentication type which should have been
designed into the negotiation process later.

Right.  That is the crux of the problem.

But -- and here is the point about broken PPP stacks -- at the time there 
were a lot of PPP stacks which would simply roll over and die if you tried 
to reneogtiate LCP after you had already begun (yes, in great violation to 
what it says in RFC 1661). This wasn't discovered until L2TP came along 
because before that, you really didn't see LCP renegotiation occur very much.

sigh But we did know.  The argument was that it took too long to 
negotiate PPP as it was so anything we did to speed it up was necessary.  I 
have kicked myself for caving in to that argument for many years now.

But, it was way too late as there were so many clients in the field with 
this bug. So, we ended up with Proxy LCP and Proxy Authentication like you 
see them today.

I know: add more ugliness in order to deal with other ugliness.  I 
preferred the old days where people found problems, fixed them, and the 
fixes then found their ways into new versions, usually with a 
backward-compatibility switch.  I reject the argument, but we have lots of 
systems in the field; we can't fix them now.  Engineers from Microsoft 
(among others but they come immediately to mind) has been known to use that 
argument.  It is specious because they then turn around and reissue code on 
a regular basis to fix other bugs in their products.

There's not much else you can do if you want to complete PPP negotiation 
at the LNS, but *start* it at the LAC so that you can get the @domain 
portion of the username to determine where to tunnel the user. Sigh... 
Yes, if we had thought about running PPP over IP from the beginning, 
things might have looked very different in general... A more seperate link 
layer negotiation would have been one of them. But, PPP isn't nearly as 
difficult as, say, TDM over IP ;-)

This reared its ugly head when we started to do multilink PPP.  The problem 
was *very* clear then.  Pointing out that LCP and NCP were really 
completely separate protocols and represented different layers

Re: PPP

2002-03-06 Thread W. Mark Townsley



Brian Lloyd wrote:
 
 At 03:12 AM 3/4/2002, you wrote:
 I couldn't say it shorter and more clearly than Vint : PPP does NOT belong
 to the TCP/IP protocol suite.
 
 Other than it was designed for IP and the other stuff came along for the
 ride.  PPP was a relatively early product of the IETF and specifically
 designed for IP.
 
 It's a Layer 2(*) protocol, intended to carry multiple Layer 3 protocols
 (like IP, IPX,...) over a point-to-point connection (like PSTN, ISDN,...).
 
 PPP succeeded SLIP by bringing extended features : SLIP could only
 encapsulate IP while PPP can encapsulate several protocols, PPP supports
 authentication while SLIP didn't, etc.
 
 Remember that TCP/IP only covers Layer 3 up to Layer 7 : it's designed to
 be implemented on existing lower layers (1 and 2) :  LAN (Ethernet, Token
 Ring, Wireless Lans,...) or WAN (ISDN, ATM, Frame Relay,...).
 
 This is a common misconception.  The lower layers (1 and 2) that you
 mention are often completely routable networks in and of themselves.  You
 can even encapsulate IP within IP therefore IP is operating at layer 2 from
 that interpretation.  Ethernet is regularly routed now (people call it
 switching but a rose by any other name ...).  So all of these, including
 PPP, exist at layers 1-2 in the TCP/IP model (link, network, internetwork,
 transport, application) or layers 1-3b in the ISORM.
 
 This problem plagues developers working with PPP for the first time because
 they keep thinking in terms of PPP being only a link-layer protocol.  If
 they would remember that PPP operates at the network layer then they would
 stop making stupid mistakes like a badly-designed L2TP.

I don't see how classification of PPP as a layer 2, layer 3, or any other layer
would have had an affect on how we designed L2TP (perhaps it would have affected
the name of the protocol though). Layers aside, PPP was already deployed and it
was pretty obvious what we wanted to do - make it run over IP without the
installed base of PPP clients being made aware of it. How would you have done
this that is substantially different than L2TP? (As an aside, of the list of
obscene things we did have to do to make L2TP work, the worst were more due to
badly implemented PPP stacks than anything else.)

Tunneling, particularly L2 tunneling, is by its very definition a layer
violation. The perfect world where this is not necessary or desirable does not
exist beyond textbooks and laboratories. So here we are in the real world,
tunneling not just PPP but a plethora of L2 or L2-like layers. 

- Mark

 
 E.T.
 
 (*) Those layers always refer to the OSI model. Think of a Layer 2 or 3 or
 4 Switch : it doesn't depend on the protocol suite above, so we always
 refer to the vendor- technology- protocol-independent OSI reference model.
 
 I love watching people slavishly adhere to this or that model of
 layering.  Layering is a convenience, not a religion.  (Actually, I got
 that backwards.)  With the widespread use of encapsulating one networking
 or internetworking protocol in another, the whole concept of rigid layering
 goes out the window.  The cry of, its a network layer; its a link layer,
 should be right up there with, its a dessert topping; its a floor wax!
 
 --- The basic answer ends here ---
 
 Now a small yet technical recall : when data comes from an application to
 be transported on a physical medium (copper cable, fiber optics, radio
 waves, infra-red,...), on its way from Layer 7 to Layer 1 it reaches IP
 (Layer 3)
 
 ISO spent a lot of time trying to sell the 7-layer model and then didn't
 know how to backtrack when they discovered that there were really two
 network layers when you interconnect dissimilar networks using an
 internetworking protocol.  ATM, FR, Ethernet, etc., are all routable
 layer-3 protocols in their own regard so they opted to break layer three
 into three sublayers. (It is really three layers by their reckoning but ISO
 already had so much invested in the ISO Seven Layer Reference Model [tm]
 that they couldn't really switch to the ISO Nine Layer Reference Model
 Formerly Known As The Seven Layer Reference Model [tm].)
 
 that encapsulates it in a datagram/packet and specifies the destination
 network+host address. Then it's forwarded to PPP (Layer 2) that
 encapsulates it in a frame and specifies the way bits are organized to
 travel through the physical medium. Then it's forwarded to some Layer 1
 technology that converts the bits into a specific signal using a specific
 encoding scheme (V.90 on PSTN, I.430 on ISDN BRI,...) and finally reaches
 the physical medium to be physically transported through the network.
 
 To some extent you are right but your model needs to accommodate things
 like L2TP which tunnels traffic at layer 1|2 (depending on the model of the
 day) in a layer 4 (transport) protocol, or IP tunneled in IP.  It is
 probably better to be able to keep the concept of duality in your mind,
 i.e. when you hold you tongue one way

RE: PPP

2002-03-06 Thread TOMSON ERIC

WARNING : this answer will be very basic. My intention is not to go deep into the 
details but to give a short answer.

Suppose you have an Operating System supporting TCP/IP, whatever applications you run.
Suppose you have a modem and you use PPP to talk to a remote server.

Then data coming from an application on your system will be transported by either TCP 
segments or UDP segments and use port numbers.
Then those segments will be encapsulated into IP datagrams/packets and use IP 
addresses.
Then those datagrams/packets will be encapsulated into PPP frames with no particular 
addresses (HDLC broadcast address will be used, always set to FF Hex - this is normal, 
since this is a point-to-point connection, so only 2 DCEs are communicating and 
there's no particular need for individual physical addressing, like in a multi-point 
shared Ethernet network).
Then all those bits (frames actually represent organized groups of bits) will be 
converted into a particular signal (signal = electricity, light, micro-waves,...) 
using a particular encoding scheme (encoding scheme = AMI, Manchester, NRZI,...) able 
to be transported on a specific medium (medium = copper cable, fiber optics, air,...).
That's it.

I know, I know : this is a VERY basic answer. Some people will not forgive me for 
this, but when asked a basic question I can't do anything but give a basic answer.
And BTW, when facing a very complex question, I don't even think of answering it. I 
gladly leave it up to a more competent guy to answer it. Then I sit down and listen, 
too.

;)

-Original Message-
From: Christopher Evans [mailto:[EMAIL PROTECTED]]

Here is a question that will tax your synapes to bursting point!

How is PPP and TCP/IP libs wired together?  Like, DO I (OSI 8) call TCP
and it calls IP and down the 
chain till it spills over and gets real physical (OSI 1)? I am confused.

At 10:02 AM 3/5/02 -0500, you wrote:
whoa, it's in the TCP/IP suite, it's not. So let me get this straight. TCP
and UDP are part of IP. TCP provides error sum UDP doesn't and is therefore
faster than TCP. They are encapsulated in IP, which is put into the data
bitstream of a PPP frame. Layer 1 is the physical layer, are bitstreams sent
at that level. BTW I have 56K dial-up no ISDN or DSL.




Re: PPP

2002-03-06 Thread Brian Lloyd

At 02:42 AM 3/6/2002, you wrote:
I don't see how classification of PPP as a layer 2, layer 3, or any other 
layer
would have had an affect on how we designed L2TP (perhaps it would have 
affected
the name of the protocol though).

PPP actually consists of two distinct and separate sets of protocols.  The 
LCP and its negotiation should be totally separate from the NCPs and their 
negotiation.

Layers aside, PPP was already deployed and it
was pretty obvious what we wanted to do - make it run over IP without the
installed base of PPP clients being made aware of it.

Do it right would not have changed that.

How would you have done
this that is substantially different than L2TP? (As an aside, of the list of
obscene things we did have to do to make L2TP work, the worst were more due to
badly implemented PPP stacks than anything else.)

sigh It has been many years since I argued this with Karl Fox back when 
he chaired the L2TP WG.  At that time he agreed but also said that there 
was too much water under the bridge to fix L2TP at that time so it was 
going to go forward in its subtlely-broken form.  I haven't looked at it 
since then.  I don't even remember the lexicon so I will undoubtedly sound 
uninformed.

The LCP negotiation should take place with the L2TP equivalent of the 
NAS.  That is independent of anything else that happens and nothing 
associated with that needs to be communicated to the edge device at the 
target network.  The authentication phase then takes place so you can do 
authorization and configuration.  Once that is complete you can do the 
MLPPP and NCP negotiation(s) because then and only then do you know what 
the end system is authorized to do.

But MLPPP is negotiated during LCP, you say!  Right.  That is broken and 
I helped make it broken and, in retrospect, I am *really* sorry I did.

So, as I said, this is water under the bridge and it isn't going to 
change.  Any attempt to do so would be met with a barrage of but we have 
lots of systems in the field and this would break them arguments.

Tunneling, particularly L2 tunneling, is by its very definition a layer
violation. The perfect world where this is not necessary or desirable 
does not
exist beyond textbooks and laboratories. So here we are in the real world,
tunneling not just PPP but a plethora of L2 or L2-like layers.

There is nothing wrong with tunneling per-se.  In fact, it solves many 
problems.  IMHO tunneling is a good thing.  My comments had only to do with 
the fallacy of rigid layering, how many people don't really understand 
layering, and as a side issue, how PPP was really a suite of protocols at 
different layers and how that affects MLPPP and L2TP.

YMMV


Brian Lloyd
[EMAIL PROTECTED]
+1.530.676.1113 - voice
+1.360.838.9669 - fax




Re: PPP

2002-03-06 Thread W. Mark Townsley



Brian Lloyd wrote:
 
 At 02:42 AM 3/6/2002, you wrote:
 I don't see how classification of PPP as a layer 2, layer 3, or any other
 layer
 would have had an affect on how we designed L2TP (perhaps it would have
 affected
 the name of the protocol though).
 
 PPP actually consists of two distinct and separate sets of protocols.  The
 LCP and its negotiation should be totally separate from the NCPs and their
 negotiation.
 
 Layers aside, PPP was already deployed and it
 was pretty obvious what we wanted to do - make it run over IP without the
 installed base of PPP clients being made aware of it.
 
 Do it right would not have changed that.
 
 How would you have done
 this that is substantially different than L2TP? (As an aside, of the list of
 obscene things we did have to do to make L2TP work, the worst were more due to
 badly implemented PPP stacks than anything else.)
 
 sigh It has been many years since I argued this with Karl Fox back when
 he chaired the L2TP WG.  

Karl chaired only the pppext WG.

 At that time he agreed but also said that there
 was too much water under the bridge to fix L2TP at that time so it was
 going to go forward in its subtlely-broken form.  I haven't looked at it
 since then.  I don't even remember the lexicon so I will undoubtedly sound
 uninformed.
 
 The LCP negotiation should take place with the L2TP equivalent of the
 NAS.  That is independent of anything else that happens and nothing
 associated with that needs to be communicated to the edge device at the
 target network.  The authentication phase then takes place so you can do
 authorization and configuration.  

That would have been nice, but, the requirements were that it be possible for
user authorization be completed at the LNS (the edge device at the target
network), and at the LAC (NAS). In addition, we could not require the user to
enter a username and password twice. You simply had to be able to drop in L2TP,
and everything look the same as it did before to the end user. 

 Once that is complete you can do the
 MLPPP and NCP negotiation(s) because then and only then do you know what
 the end system is authorized to do.

Yup, that would have been nicer.

 
 But MLPPP is negotiated during LCP, you say!  Right.  That is broken and
 I helped make it broken and, in retrospect, I am *really* sorry I did.

That's OK, we'll forgive you ;-)

Barring redesign of PPP, getting around the wrong things being located in the
LCP negotiation would have been made a little easier if we had been allowed to
go through LCP negotiation twice. So, you could have LCP negotiated at the LAC,
forward any necessary link parameters to the LNS so that it could set them
correctly during LCP round 2, and then renegotiate LCP at the LNS to get
things like MLPPP and perhaps authentication type which should have been
designed into the negotiation process later. But -- and here is the point about
broken PPP stacks -- at the time there were a lot of PPP stacks which would
simply roll over and die if you tried to reneogtiate LCP after you had already
begun (yes, in great violation to what it says in RFC 1661). This wasn't
discovered until L2TP came along because before that, you really didn't see LCP
renegotiation occur very much. But, it was way too late as there were so many
clients in the field with this bug. So, we ended up with Proxy LCP and Proxy
Authentication like you see them today. There's not much else you can do if you
want to complete PPP negotiation at the LNS, but *start* it at the LAC so that
you can get the @domain portion of the username to determine where to tunnel
the user. Sigh... Yes, if we had thought about running PPP over IP from the
beginning, things might have looked very different in general... A more seperate
link layer negotiation would have been one of them. But, PPP isn't nearly as
difficult as, say, TDM over IP ;-)

There are even other bugs in the field we have had to code around with IPCP
negotiation, and don't even get me started on ACCM mapping

 
 So, as I said, this is water under the bridge and it isn't going to
 change.  Any attempt to do so would be met with a barrage of but we have
 lots of systems in the field and this would break them arguments.

Right. The same argument that led to some of the choices we had to make in L2TP.

 
 Tunneling, particularly L2 tunneling, is by its very definition a layer
 violation. The perfect world where this is not necessary or desirable
 does not
 exist beyond textbooks and laboratories. So here we are in the real world,
 tunneling not just PPP but a plethora of L2 or L2-like layers.
 
 There is nothing wrong with tunneling per-se.  In fact, it solves many
 problems.  IMHO tunneling is a good thing.  My comments had only to do with
 the fallacy of rigid layering, how many people don't really understand
 layering, and as a side issue, how PPP was really a suite of protocols at
 different layers and how that affects MLPPP and L2TP.

Then we agree more than we

RE: PPP

2002-03-05 Thread TOMSON ERIC

Brian (and anyone concerned),

I humbly think that before practicing literature, you need to learn ABC.
I'm not a researcher, not a great expert, not a guru : I'm a trainer and a consultant.
(Well actually I AM a guru... for my wife and my children! But this is out of 
purpose... ;)
I don't intend to develop new complex things but to explain the existing ones and make 
them understandable.

My answer tried to respect the same basic level as Bill's question's.
That's my job, teaching LAN  WAN technologies (and Datacom in general).
My humble experience led me to teach such matters in different steps.
First you teach ABC, then you teach grammar, then you can teach literature.
Trying to teach literature without preparation can create confusion.

Sorry if I shocked you with such a basic view on PPP compared to OSI and TCP/IP.
[May I recommend 2 basic books? A World of Protocols and Computer Networks...]
One can read that PPP is a suite - a combination of several protocols.
Among them : BCP, CHAP, LCP, MLP, PAP, PPPoE,... But seriously, does Bill care?
And also a different Network Control Protocol for each network layer supported.
If I had to go deeply into such details, my answer would have been too long - and out 
of purpose.

Hope you understand the need for basic ABC and don't only tolerate complex literature.
:)

-Original Message-
From: Brian Lloyd [mailto:[EMAIL PROTECTED]]
Sent: lundi 4 mars 2002 17:49
To: TOMSON ERIC
Cc: [EMAIL PROTECTED]
Subject: RE: PPP

At 03:12 AM 3/4/2002, you wrote:
I couldn't say it shorter and more clearly than Vint : PPP does NOT belong 
to the TCP/IP protocol suite.

Other than it was designed for IP and the other stuff came along for the 
ride.  PPP was a relatively early product of the IETF and specifically 
designed for IP.

It's a Layer 2(*) protocol, intended to carry multiple Layer 3 protocols 
(like IP, IPX,...) over a point-to-point connection (like PSTN, ISDN,...).

PPP succeeded SLIP by bringing extended features : SLIP could only 
encapsulate IP while PPP can encapsulate several protocols, PPP supports 
authentication while SLIP didn't, etc.

Remember that TCP/IP only covers Layer 3 up to Layer 7 : it's designed to 
be implemented on existing lower layers (1 and 2) :  LAN (Ethernet, Token 
Ring, Wireless Lans,...) or WAN (ISDN, ATM, Frame Relay,...).

This is a common misconception.  The lower layers (1 and 2) that you 
mention are often completely routable networks in and of themselves.  You 
can even encapsulate IP within IP therefore IP is operating at layer 2 from 
that interpretation.  Ethernet is regularly routed now (people call it 
switching but a rose by any other name ...).  So all of these, including 
PPP, exist at layers 1-2 in the TCP/IP model (link, network, internetwork, 
transport, application) or layers 1-3b in the ISORM.

This problem plagues developers working with PPP for the first time because 
they keep thinking in terms of PPP being only a link-layer protocol.  If 
they would remember that PPP operates at the network layer then they would 
stop making stupid mistakes like a badly-designed L2TP.

E.T.

(*) Those layers always refer to the OSI model. Think of a Layer 2 or 3 or 
4 Switch : it doesn't depend on the protocol suite above, so we always 
refer to the vendor- technology- protocol-independent OSI reference model.

I love watching people slavishly adhere to this or that model of 
layering.  Layering is a convenience, not a religion.  (Actually, I got 
that backwards.)  With the widespread use of encapsulating one networking 
or internetworking protocol in another, the whole concept of rigid layering 
goes out the window.  The cry of, its a network layer; its a link layer, 
should be right up there with, its a dessert topping; its a floor wax!


--- The basic answer ends here ---

Now a small yet technical recall : when data comes from an application to 
be transported on a physical medium (copper cable, fiber optics, radio 
waves, infra-red,...), on its way from Layer 7 to Layer 1 it reaches IP 
(Layer 3)

ISO spent a lot of time trying to sell the 7-layer model and then didn't 
know how to backtrack when they discovered that there were really two 
network layers when you interconnect dissimilar networks using an 
internetworking protocol.  ATM, FR, Ethernet, etc., are all routable 
layer-3 protocols in their own regard so they opted to break layer three 
into three sublayers. (It is really three layers by their reckoning but ISO 
already had so much invested in the ISO Seven Layer Reference Model [tm] 
that they couldn't really switch to the ISO Nine Layer Reference Model 
Formerly Known As The Seven Layer Reference Model [tm].)

that encapsulates it in a datagram/packet and specifies the destination 
network+host address. Then it's forwarded to PPP (Layer 2) that 
encapsulates it in a frame and specifies the way bits are organized to 
travel through the physical medium. Then it's forwarded to some Layer 1 
technology

RE: PPP

2002-03-05 Thread Brian Lloyd

At 03:12 AM 3/4/2002, you wrote:
I couldn't say it shorter and more clearly than Vint : PPP does NOT belong 
to the TCP/IP protocol suite.

Other than it was designed for IP and the other stuff came along for the 
ride.  PPP was a relatively early product of the IETF and specifically 
designed for IP.

It's a Layer 2(*) protocol, intended to carry multiple Layer 3 protocols 
(like IP, IPX,...) over a point-to-point connection (like PSTN, ISDN,...).

PPP succeeded SLIP by bringing extended features : SLIP could only 
encapsulate IP while PPP can encapsulate several protocols, PPP supports 
authentication while SLIP didn't, etc.

Remember that TCP/IP only covers Layer 3 up to Layer 7 : it's designed to 
be implemented on existing lower layers (1 and 2) :  LAN (Ethernet, Token 
Ring, Wireless Lans,...) or WAN (ISDN, ATM, Frame Relay,...).

This is a common misconception.  The lower layers (1 and 2) that you 
mention are often completely routable networks in and of themselves.  You 
can even encapsulate IP within IP therefore IP is operating at layer 2 from 
that interpretation.  Ethernet is regularly routed now (people call it 
switching but a rose by any other name ...).  So all of these, including 
PPP, exist at layers 1-2 in the TCP/IP model (link, network, internetwork, 
transport, application) or layers 1-3b in the ISORM.

This problem plagues developers working with PPP for the first time because 
they keep thinking in terms of PPP being only a link-layer protocol.  If 
they would remember that PPP operates at the network layer then they would 
stop making stupid mistakes like a badly-designed L2TP.

E.T.

(*) Those layers always refer to the OSI model. Think of a Layer 2 or 3 or 
4 Switch : it doesn't depend on the protocol suite above, so we always 
refer to the vendor- technology- protocol-independent OSI reference model.

I love watching people slavishly adhere to this or that model of 
layering.  Layering is a convenience, not a religion.  (Actually, I got 
that backwards.)  With the widespread use of encapsulating one networking 
or internetworking protocol in another, the whole concept of rigid layering 
goes out the window.  The cry of, its a network layer; its a link layer, 
should be right up there with, its a dessert topping; its a floor wax!


--- The basic answer ends here ---

Now a small yet technical recall : when data comes from an application to 
be transported on a physical medium (copper cable, fiber optics, radio 
waves, infra-red,...), on its way from Layer 7 to Layer 1 it reaches IP 
(Layer 3)

ISO spent a lot of time trying to sell the 7-layer model and then didn't 
know how to backtrack when they discovered that there were really two 
network layers when you interconnect dissimilar networks using an 
internetworking protocol.  ATM, FR, Ethernet, etc., are all routable 
layer-3 protocols in their own regard so they opted to break layer three 
into three sublayers. (It is really three layers by their reckoning but ISO 
already had so much invested in the ISO Seven Layer Reference Model [tm] 
that they couldn't really switch to the ISO Nine Layer Reference Model 
Formerly Known As The Seven Layer Reference Model [tm].)

that encapsulates it in a datagram/packet and specifies the destination 
network+host address. Then it's forwarded to PPP (Layer 2) that 
encapsulates it in a frame and specifies the way bits are organized to 
travel through the physical medium. Then it's forwarded to some Layer 1 
technology that converts the bits into a specific signal using a specific 
encoding scheme (V.90 on PSTN, I.430 on ISDN BRI,...) and finally reaches 
the physical medium to be physically transported through the network.

To some extent you are right but your model needs to accommodate things 
like L2TP which tunnels traffic at layer 1|2 (depending on the model of the 
day) in a layer 4 (transport) protocol, or IP tunneled in IP.  It is 
probably better to be able to keep the concept of duality in your mind, 
i.e. when you hold you tongue one way it looks like a link protocol but 
when you hold your tongue a different way it looks like a transport 
protocol.  I suspect that something like this gave early physicists fits 
when they were faced with the duality of nature.

So trying to be rigid in your categorization of any protocol is likely to 
cause you heartburn down the road (ask ISO).  It is far better to 
understand where it makes sense to put interfaces and then perform the 
functions that need to be performed.


--- The extended answer ends here ---

-Original Message-
From: vint cerf [mailto:[EMAIL PROTECTED]]

IP is encapsulated in PPP for all practical purposes. PPP can support
multiple protocols on a single point to point link in the same way
ethernet can support multiple protocols

And, no, as the above quote shows, Vint did not say that PPP does not 
belong to the TCP/IP protocol suite.  He just says that PPP usually 
encapsulates/transports IP datagrams as its

Re: PPP

2002-03-05 Thread Bill Cunningham

whoa, it's in the TCP/IP suite, it's not. So let me get this straight. TCP
and UDP are part of IP. TCP provides error sum UDP doesn't and is therefore
faster than TCP. They are encapsulated in IP, which is put into the data
bitstream of a PPP frame. Layer 1 is the physical layer, are bitstreams sent
at that level. BTW I have 56K dial-up no ISDN or DSL.
- Original Message -
From: Brian Lloyd [EMAIL PROTECTED]
To: TOMSON ERIC [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Sent: Monday, March 04, 2002 11:49 AM
Subject: RE: PPP


 At 03:12 AM 3/4/2002, you wrote:
 I couldn't say it shorter and more clearly than Vint : PPP does NOT
belong
 to the TCP/IP protocol suite.

 Other than it was designed for IP and the other stuff came along for the
 ride.  PPP was a relatively early product of the IETF and specifically
 designed for IP.

 It's a Layer 2(*) protocol, intended to carry multiple Layer 3 protocols
 (like IP, IPX,...) over a point-to-point connection (like PSTN,
ISDN,...).
 
 PPP succeeded SLIP by bringing extended features : SLIP could only
 encapsulate IP while PPP can encapsulate several protocols, PPP supports
 authentication while SLIP didn't, etc.
 
 Remember that TCP/IP only covers Layer 3 up to Layer 7 : it's designed to
 be implemented on existing lower layers (1 and 2) :  LAN (Ethernet, Token
 Ring, Wireless Lans,...) or WAN (ISDN, ATM, Frame Relay,...).

 This is a common misconception.  The lower layers (1 and 2) that you
 mention are often completely routable networks in and of themselves.  You
 can even encapsulate IP within IP therefore IP is operating at layer 2
from
 that interpretation.  Ethernet is regularly routed now (people call it
 switching but a rose by any other name ...).  So all of these, including
 PPP, exist at layers 1-2 in the TCP/IP model (link, network, internetwork,
 transport, application) or layers 1-3b in the ISORM.

 This problem plagues developers working with PPP for the first time
because
 they keep thinking in terms of PPP being only a link-layer protocol.  If
 they would remember that PPP operates at the network layer then they would
 stop making stupid mistakes like a badly-designed L2TP.

 E.T.
 
 (*) Those layers always refer to the OSI model. Think of a Layer 2 or 3
or
 4 Switch : it doesn't depend on the protocol suite above, so we always
 refer to the vendor- technology- protocol-independent OSI reference
model.

 I love watching people slavishly adhere to this or that model of
 layering.  Layering is a convenience, not a religion.  (Actually, I got
 that backwards.)  With the widespread use of encapsulating one networking
 or internetworking protocol in another, the whole concept of rigid
layering
 goes out the window.  The cry of, its a network layer; its a link layer,
 should be right up there with, its a dessert topping; its a floor wax!


 --- The basic answer ends here ---
 
 Now a small yet technical recall : when data comes from an application to
 be transported on a physical medium (copper cable, fiber optics, radio
 waves, infra-red,...), on its way from Layer 7 to Layer 1 it reaches IP
 (Layer 3)

 ISO spent a lot of time trying to sell the 7-layer model and then didn't
 know how to backtrack when they discovered that there were really two
 network layers when you interconnect dissimilar networks using an
 internetworking protocol.  ATM, FR, Ethernet, etc., are all routable
 layer-3 protocols in their own regard so they opted to break layer three
 into three sublayers. (It is really three layers by their reckoning but
ISO
 already had so much invested in the ISO Seven Layer Reference Model [tm]
 that they couldn't really switch to the ISO Nine Layer Reference Model
 Formerly Known As The Seven Layer Reference Model [tm].)

 that encapsulates it in a datagram/packet and specifies the destination
 network+host address. Then it's forwarded to PPP (Layer 2) that
 encapsulates it in a frame and specifies the way bits are organized to
 travel through the physical medium. Then it's forwarded to some Layer 1
 technology that converts the bits into a specific signal using a specific
 encoding scheme (V.90 on PSTN, I.430 on ISDN BRI,...) and finally reaches
 the physical medium to be physically transported through the network.

 To some extent you are right but your model needs to accommodate things
 like L2TP which tunnels traffic at layer 1|2 (depending on the model of
the
 day) in a layer 4 (transport) protocol, or IP tunneled in IP.  It is
 probably better to be able to keep the concept of duality in your mind,
 i.e. when you hold you tongue one way it looks like a link protocol but
 when you hold your tongue a different way it looks like a transport
 protocol.  I suspect that something like this gave early physicists fits
 when they were faced with the duality of nature.

 So trying to be rigid in your categorization of any protocol is likely to
 cause you heartburn down the road (ask ISO).  It is far better to
 understand where it makes sense

Re: PPP

2002-03-05 Thread Christopher Evans

Here is a question that will tax your synapes to bursting point!

How is PPP and TCP/IP libs wired together?  Like, DO I (OSI 8) call TCP
and it calls IP and down the 
chain till it spills over and gets real physical (OSI 1)? I am confused.


At 10:02 AM 3/5/02 -0500, you wrote:
whoa, it's in the TCP/IP suite, it's not. So let me get this straight. TCP
and UDP are part of IP. TCP provides error sum UDP doesn't and is therefore
faster than TCP. They are encapsulated in IP, which is put into the data
bitstream of a PPP frame. Layer 1 is the physical layer, are bitstreams sent
at that level. BTW I have 56K dial-up no ISDN or DSL.
- Original Message -





RE: PPP

2002-03-04 Thread TOMSON ERIC

I couldn't say it shorter and more clearly than Vint : PPP does NOT belong to the 
TCP/IP protocol suite.

It's a Layer 2(*) protocol, intended to carry multiple Layer 3 protocols (like IP, 
IPX,...) over a point-to-point connection (like PSTN, ISDN,...).

PPP succeeded SLIP by bringing extended features : SLIP could only encapsulate IP 
while PPP can encapsulate several protocols, PPP supports authentication while SLIP 
didn't, etc.

Remember that TCP/IP only covers Layer 3 up to Layer 7 : it's designed to be 
implemented on existing lower layers (1 and 2) :  LAN (Ethernet, Token Ring, Wireless 
Lans,...) or WAN (ISDN, ATM, Frame Relay,...).

E.T.

(*) Those layers always refer to the OSI model. Think of a Layer 2 or 3 or 4 Switch : 
it doesn't depend on the protocol suite above, so we always refer to the vendor- 
technology- protocol-independent OSI reference model.

--- The basic answer ends here ---

Now a small yet technical recall : when data comes from an application to be 
transported on a physical medium (copper cable, fiber optics, radio waves, 
infra-red,...), on its way from Layer 7 to Layer 1 it reaches IP (Layer 3) that 
encapsulates it in a datagram/packet and specifies the destination network+host 
address. Then it's forwarded to PPP (Layer 2) that encapsulates it in a frame and 
specifies the way bits are organized to travel through the physical medium. Then it's 
forwarded to some Layer 1 technology that converts the bits into a specific signal 
using a specific encoding scheme (V.90 on PSTN, I.430 on ISDN BRI,...) and finally 
reaches the physical medium to be physically transported through the network.

--- The extended answer ends here ---

-Original Message-
From: vint cerf [mailto:[EMAIL PROTECTED]]

IP is encapsulated in PPP for all practical purposes. PPP can support
multiple protocols on a single point to point link in the same way
ethernet can support multiple protocols

vint
At 08:01 AM 3/1/2002 -0500, Bill Cunningham wrote:
Is IP actually encapsulated in PPP, or is PPP and IP sent out at the same
time at different protocol layers? Kinda holding hands in a sense to each
other.




Re: PPP

2002-03-04 Thread grenville armitage


Layering dogma get all confused and convoluted when faced with
engineering ingenuity At what layer is ATM in the old Cells
in Frames spec? Or PPP when running ppp sessions over TCP?
Or blah over MPLS frames over PPP (over TCP)? Or?

PPP is a layer below the one it serves, and a layer above the
one it uses Just like most other protocols

cheers,
gja 
-- 
Grenville Armitage
http://gjaspace4mecom




Re: PPP

2002-03-01 Thread Bill Cunningham

Is IP actually encapsulated in PPP, or is PPP and IP sent out at the same
time at different protocol layers? Kinda holding hands in a sense to each
other.
- Original Message -
From: vint cerf [EMAIL PROTECTED]
To: Christopher Evans [EMAIL PROTECTED]; Bill Cunningham
[EMAIL PROTECTED]; Brian Lloyd [EMAIL PROTECTED]
Sent: Friday, March 01, 2002 7:16 AM
Subject: Re: PPP


 christopher,

 it is called tcp/ip because the encapsulation was read left to right

 so, for example:

 smtp/tcp/ip
 telnet/tcp/ip
 ftp/tcp/ip
 http/tcp/ip

 and

 ip/ppp/ethernet
 ip/ethernet
 ip/ppp/dial-up
 ip/ppp/dsl

 and so on

 the ordering is arbitrary, of course - we just picked higher level
protocol to the left
 as in higher order bit to the left as a way of presenting the protocol
layers.

 vint cerf

 At 11:58 PM 2/28/2002 -0800, Christopher Evans wrote:
 Why do they call it TCP/IP  ?   that sound reversed. it should be
 IP/TCP-UDP   as that makes sense in
 my head.
 





Re: PPP

2002-03-01 Thread vint cerf

IP is encapsulated in PPP for all practical purposes PPP can support
multiple protocols on a single point to point link in the same way
ethernet can support multiple protocols

vint
At 08:01 AM 3/1/2002 -0500, Bill Cunningham wrote:
Is IP actually encapsulated in PPP, or is PPP and IP sent out at the same
time at different protocol layers? Kinda holding hands in a sense to each
other




PPP

2002-02-28 Thread Bill Cunningham



In what layer is PPP in the TCP/IP 
suite?


Re: PPP

2002-02-28 Thread Paul Day

On Thu, 28 Feb 2002, Bill Cunningham wrote:
 In what layer is PPP in the TCP/IP suite?

The top of Layer 1 - it's part of the Network Interface layer of the
TCP/IP conceptual model

PD

-- 
Paul Day Web: wwwburst/~bonfire




RE: PPP

2002-02-28 Thread Michel Gilbert



Bill -

It is essentially a Data Link Layer protocol, operating at Layer 
2.

/Michel

  -Original Message-From: Bill Cunningham 
  [mailto:[EMAIL PROTECTED]]Sent: Thursday, February 28, 2002 6:55 
  AMTo: [EMAIL PROTECTED]Subject: PPP
  In what layer is PPP in the TCP/IP 
  suite?


RE: PPP

2002-02-28 Thread Paul Georgiou



PPP is 
a link layer protocol based on the TCO/IP model.
In the 
OSI model, PPP spans Data link and Network layer.
Hope 
this helps.

Regards,
Paul

  -Original Message-From: Bill Cunningham 
  [mailto:[EMAIL PROTECTED]]Sent: Thursday, February 28, 2002 6:55 
  AMTo: [EMAIL PROTECTED]Subject: PPP
  In what layer is PPP in the TCP/IP 
  suite?


RE: PPP

2002-02-28 Thread Paul Day

On Thu, 28 Feb 2002, Michel Gilbert wrote:
 It is essentially a Data Link Layer protocol, operating at Layer 2

Bill was after where it fits into the TCP/IP model I think you've got
that mixed up with the OSI model? :)

Layer 2 under the TCP/IP model is the Internet layer, which corresponds
to layer 3, Network, of the OSI model

If we want to get picky though, you could say PPP overlaps layer 1 and 2
of the TCP/IP model, so saying Layer 2 isn't incorrect, but by using the
term Data Link as opposed to Internet fot layer 2 makes me think
you're referring of the OSI model

*Back in his box now*

PD

-- 
Paul Day Web: wwwburst/~bonfire




Re: PPP

2002-02-28 Thread Matt Crawford

 DIVFONT face=3DArial size=3D2In what layer is PPP in the TCP/IP=
 =20suite?/FONT/DIV/BODY/HTML

Layer 271828




RE: PPP

2002-02-28 Thread Michel Gilbert
Title: RE: PPP





Paul -


Yep! Didn't read closely enough. Layer 2 in the OSI Reference Model, top of Layer 1 in TCP/IP - except for all of the places it appears elsewhere! :)

How's THAT for clarity?


/Michel


-Original Message-
From: Paul Day [mailto:[EMAIL PROTECTED]]
Sent: Thursday, February 28, 2002 10:49 AM
Cc: [EMAIL PROTECTED]
Subject: RE: PPP



On Thu, 28 Feb 2002, Michel Gilbert wrote:
 It is essentially a Data Link Layer protocol, operating at Layer 2.


Bill was after where it fits into the TCP/IP model. I think you've got
that mixed up with the OSI model? :)


Layer 2 under the TCP/IP model is the Internet layer, which corresponds
to layer 3, Network, of the OSI model.


If we want to get picky though, you could say PPP overlaps layer 1 and 2
of the TCP/IP model, so saying Layer 2 isn't incorrect, but by using the
term Data Link as opposed to Internet fot layer 2 makes me think
you're referring of the OSI model.


*Back in his box now*


PD


-- 
Paul Day Web: www.bur.st/~bonfire





Re: PPP

2002-02-28 Thread Brian Lloyd

At 03:55 AM 2/28/2002, you wrote:
In what layer is PPP in the TCP/IP suite?

I have read some of the other responses and it reinforces my belief that 
most people don't understand PPP's relationship to IP and either the 
5-layer (internet) or 7-layer (ISO) models.

PPP is really both the link and lower network layers. (The ISORMites 
discovered that layer three was really several layers in itself but found 
it difficult to say that the 7-layer model was really a 9-layer model so 
they created sublayers, i.e. layers 3A, 3B, and 3C.  Something about 
Padlipsky comes to mind here.) The best way to think of PPP is a degenerate 
network of two nodes, not a link between two devices.  If you think of it 
in this way, things like multilink and L2TP begin to make some sense.  The 
problem occurs when people forget this.

The way that I think of it is that the LCP negotiation represents 
configuration of the link layer while the NCP negotiation configuration at 
the network layer.

And I continue to kick myself for allowing negotiation of multilink as part 
of LCP instead of doing it after authentication.  I fear that this helped 
screw up L2TP too.  I admit I caved to people who were worried about how 
long it took PPP to complete negotiation, something that just isn't very 
important.


Brian Lloyd
[EMAIL PROTECTED]
+1.530.676.1113 - voice
+1.360.838.9669 - fax




Re: PPP

2002-02-28 Thread Frank Solensky

On Thu, 2002-02-28 at 12:20, Matt Crawford wrote:
  DIVFONT face=3DArial size=3D2In what layer is PPP in the TCP/IP=
  =20suite?/FONT/DIV/BODY/HTML
 
 Layer 271828

I should have exp()ected that





Re: PPP

2002-02-28 Thread J. Noel Chiappa

 From: Brian Lloyd [EMAIL PROTECTED]

 When all you have is a hammer, everything looks like a nail.
 ...
 I must admit, we all laughed when Karl Fox indicated that he had
 implemented PPP over TELNET back in 1993 or so. We thought it a
 hilarious joke. I guess my blood should have run cold back then.
 And to think that, the reason for PPP was a response to the limitations
 of SLIP and, oh by the way, we can use it to encapsulate IP over T1
 lines between dissimilar routers.

Why are you surprised? Simple tools (e.g. a screwdriver) have always had the
characteristic that they can be used for more things than complex ones (e.g.
a mortise-cutting bit for a drill press - now there's a cool tool, BTW - but
I digress). The ability of people to use tools for the wrong things (e.g.
using a screwdriver as a chisel) is somewhat independent of the complexity of
the tool, but does seem to be more common for simple ones, which are more
protean.

Anyway, simple protocols, like PPP and ARP (another canonical subject of
abuse) get reused in vile ways because the architecture which they are
components of is fundamentally under-provisioned with mechanisms. But, oh, I
forgot, the IPv4 architecture is basically fine, it just needs some
engineering refinements. And Eastasia is at war with Oceania...

Noel




Re: PPP

2002-02-28 Thread Vernon Schryver

 From: J. Noel Chiappa [EMAIL PROTECTED]

 Why are you surprised? Simple tools (e.g. a screwdriver) have always had the
 characteristic that they can be used for more things than complex ones (e.g.
 a mortise-cutting bit for a drill press - now there's a cool tool, BTW - but
 I digress). ...

That may be a digression, but it is a good elaboration of the all the
world's a nail saying.  Screwdrivers and hammers are not only more
flexible, but they are a lot harder to break and vastly easier to repair
or just sharpen when they get worn.  A mortise-cutting bit is an awesome
improvement over the alternative, even if you are crazy about grinding
your chisels to two angles, diamond stones, strops, and so forth.
However, as far as I can tell, hand sharpening a mortise-cutting bit
calls for real talent and skill, and don't even think about the equivalent
of grinding a new end onto a wrecked screwdriver.

 ...
 Anyway, simple protocols, like PPP and ARP (another canonical subject of
 abuse) get reused in vile ways because the architecture which they are
 components of is fundamentally under-provisioned with mechanisms. But, oh, I
 forgot, the IPv4 architecture is basically fine, it just needs some
 engineering refinements. And Eastasia is at war with Oceania...

That's backwards.  The architectures that are not under-provisioned
with mechanisms are total disasters, as anyone who was even slightly
technically involved with TP1-4 knows instinctively, unless they're
repressing painful memories.

In fact, absolutely everything is fundamentally under-provisioned with
mechanisms next year when someone comes up with a new application or
other idea.  It is a fraud and a deceit to claim to be able to
architect provisions for a significant or even noticable part of
the unforeseen future.  If your design covers any of the real future,
as opposed to the future you predicted, you're very lucky.  It is
not honest to confound great luck with great skill or talent.


Vernon Schryver[EMAIL PROTECTED]




RE: PPP

2002-02-28 Thread John Buda

I think Matt really meant PiPiPi

which is layer 3.1415926535897932384626433832795(and just keeps on going)

John Buda

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of Matt
Crawford
Sent: Thursday, February 28, 2002 12:21 PM
To: Bill Cunningham
Cc: [EMAIL PROTECTED]
Subject: Re: PPP


 DIVFONT face=3DArial size=3D2In what layer is PPP in the TCP/IP=
 =20suite?/FONT/DIV/BODY/HTML

Layer 2.71828




Re: PPP

2002-02-28 Thread J. Noel Chiappa

 From: Vernon Schryver [EMAIL PROTECTED]

 Anyway, simple protocols, like PPP and ARP (another canonical subject
 of abuse) get reused in vile ways because the architecture which they
 are components of is fundamentally under-provisioned with mechanisms.

 The architectures that are not under-provisioned with mechanisms are
 total disasters, as anyone who was even slightly technically involved
 with TP1-4 knows instinctively

Ahem. Just because your name is Vern doesn't mean my name is not-Vern.
Similarly, not all architectures which are not under-provisioned are
over-provisioned. There is a space in the middle...


 It is a fraud and a deceit to claim to be able to architect
 provisions for a significant or even noticable part of the unforeseen
 future. If your design covers any of the real future, as opposed to the
 future you predicted, you're very lucky. It is not honest to confound
 great luck with great skill or talent.

I don't agree with your contention that it's luck.

Let's take as an example Unix, which I would argue has lasted as long as it
has for two reasons: first, it was written in a basically portable language,
and second, the initial system provided basically the right set of
fundamental mechanisms/objects. Looking at the latter point, I think Unix V6
had the things it had not through luck, but because Ken Thompson et al
displayed *exactly* great skill and talent.

It is true that if you're striking off into a new area, it's more of a gamble
- and when you have a success, sometimes there is some luck involved. For
instance, in TCP/IP, I think it's lucky that the system has working
congestion control - because we certainly didn't understand how to do it
right when we went down the no congestion control in the switches road back
in the mid/late-70's. It's to some degree luck that there was a workable
solution for someone clever to figure out. So when people are moving into a
new area, it often takes a while before you find out what the envelope of
what's viable is.

However, outside things like that, there is clearly a great part of system
layout where study of past systems and how they failed and succeeded, along
with some guidelines, allows people to design great architecture. If you
look, you will actually find that quite often they knew that they had created
a successful architecture, and knew how and why they had done it, a long time
before it became obvious. Go look at the classic Thompson/Richie paper on V6
Unix for an example; and there are numerous others. The System/360
architects, and the PDP-11 architects, for example, both knew they had great
designs at a very, very early stage in the life cycle.


Also, you need to distinguish between commercially successful and
technically successful. Sometimes systems fail to succeed in the market,
but not because they are poorly architected (i.e. a technical failure), but
because the company screws up in other ways. Multics is a classic example; I
was involved with one in the router business.

Someone (maybe Napoleon - or maybe someone said it of Rommel) once said that
great generals make their own luck. So it is with system architects.

Noel




Re: PPP

2002-02-28 Thread Bill Cunningham

I have received several responses and most people say it's in the data
layer, and a couple of people think it's in the network layer. I don't
really pay much attention to the OSI model, I think it complicates the
complicated. I try to focus more on TCP/IP. Does PPP establish a link, then
terminate, or continue throughout session in UDP and TCP? I posted this
question on the PPP mailing list with less familiaritive response than ietf
general list.
- Original Message -
From: Brian Lloyd [EMAIL PROTECTED]
To: Bill Cunningham [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Sent: Thursday, February 28, 2002 11:52 AM
Subject: Re: PPP


 At 03:55 AM 2/28/2002, you wrote:
 In what layer is PPP in the TCP/IP suite?

 I have read some of the other responses and it reinforces my belief that
 most people don't understand PPP's relationship to IP and either the
 5-layer (internet) or 7-layer (ISO) models.

 PPP is really both the link and lower network layers. (The ISORMites
 discovered that layer three was really several layers in itself but found
 it difficult to say that the 7-layer model was really a 9-layer model so
 they created sublayers, i.e. layers 3A, 3B, and 3C.  Something about
 Padlipsky comes to mind here.) The best way to think of PPP is a
degenerate
 network of two nodes, not a link between two devices.  If you think of it
 in this way, things like multilink and L2TP begin to make some sense.  The
 problem occurs when people forget this.

 The way that I think of it is that the LCP negotiation represents
 configuration of the link layer while the NCP negotiation configuration at
 the network layer.

 And I continue to kick myself for allowing negotiation of multilink as
part
 of LCP instead of doing it after authentication.  I fear that this helped
 screw up L2TP too.  I admit I caved to people who were worried about how
 long it took PPP to complete negotiation, something that just isn't very
 important.


 Brian Lloyd
 [EMAIL PROTECTED]
 +1.530.676.1113 - voice
 +1.360.838.9669 - fax





Re: PPP

2002-02-28 Thread Christopher Evans

I kinda working on my own tcp/ip lib  and this is how I interprete it.

Your dumb terminal scripter makes connection

that activates PPP (with LCP confsync)

if that get an IP and return good then you can splat (encapulate)
IP/TCP/UDP packets 
out the line

er. and I must warn you I havnt got a working version so dont listen to me,
I am a techno moron.

Why do they call it TCP/IP  ?   that sound reversed. it should be
IP/TCP-UDP   as that makes sense in 
my head.


At 02:25 AM 3/1/02 -0500, Bill Cunningham wrote:
I have received several responses and most people say it's in the data
layer, and a couple of people think it's in the network layer. I don't
really pay much attention to the OSI model, I think it complicates the
complicated. I try to focus more on TCP/IP. Does PPP establish a link, then
terminate, or continue throughout session in UDP and TCP? I posted this
question on the PPP mailing list with less familiaritive response than ietf
general list.
- Original Message -
From: Brian Lloyd [EMAIL PROTECTED]
To: Bill Cunningham [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Sent: Thursday, February 28, 2002 11:52 AM
Subject: Re: PPP


 At 03:55 AM 2/28/2002, you wrote:
 In what layer is PPP in the TCP/IP suite?

 I have read some of the other responses and it reinforces my belief that
 most people don't understand PPP's relationship to IP and either the
 5-layer (internet) or 7-layer (ISO) models.

 PPP is really both the link and lower network layers. (The ISORMites
 discovered that layer three was really several layers in itself but found
 it difficult to say that the 7-layer model was really a 9-layer model so
 they created sublayers, i.e. layers 3A, 3B, and 3C.  Something about
 Padlipsky comes to mind here.) The best way to think of PPP is a
degenerate
 network of two nodes, not a link between two devices.  If you think of it
 in this way, things like multilink and L2TP begin to make some sense.  The
 problem occurs when people forget this.

 The way that I think of it is that the LCP negotiation represents
 configuration of the link layer while the NCP negotiation configuration at
 the network layer.

 And I continue to kick myself for allowing negotiation of multilink as
part
 of LCP instead of doing it after authentication.  I fear that this helped
 screw up L2TP too.  I admit I caved to people who were worried about how
 long it took PPP to complete negotiation, something that just isn't very
 important.


 Brian Lloyd
 [EMAIL PROTECTED]
 +1.530.676.1113 - voice
 +1.360.838.9669 - fax







PPP in HDLC framing

2001-09-12 Thread Sunil Shukla
Title: PPP in HDLC framing





Hi !!


I am working on PPP in HDLC like framing.
I have a doubt..
In case packet length exceeds MRU , then what is the fate of the packet and how it is handled..


Regards,
sunil





Re: PPP in HDLC framing

2001-09-12 Thread Chandra Shekar Reddy Challagonda
Title: PPP in HDLC framing



Actually the sender will see to it that it will not 
send any packet which exceeds the MRU. If the packet size is more than MRU 
then it isfragmented into the packets which are less than of MRU and sent 
by the sender.

Chandra



  - Original Message - 
  From: 
  Sunil 
  Shukla 
  To: [EMAIL PROTECTED] 
  Sent: Wednesday, September 12, 2001 3:10 
  PM
  Subject: PPP in HDLC framing
  
  Hi !! 
  I am working on PPP in HDLC like framing. I have a doubt.. In case packet length exceeds 
  MRU , then what is the fate of the packet and how it is handled.. 
  Regards, sunil 


The Information contained and transmitted by this E-MAIL is proprietary to Wipro 
and/or its Customer and is intended 
for use only by the individual or entity to which it is addressed, and may contain 
information that is privileged,
confidential or exempt from disclosure under applicable law. If this is a forwarded 
message, the content of this
E-MAIL may not have been sent with the authority of the Company. If you are not the 
intended recipient, an agent
of the intended recipient or a  person responsible for delivering the information to 
the named recipient,  you are
notified that any use, distribution, transmission, printing, copying or dissemination 
of this information in any way
or in any manner is strictly prohibited. If you have received this communication in 
error, please delete this mail 
notify us immediately at [EMAIL PROTECTED]



ML-PPP

2001-05-02 Thread srihari varada

Hello:

I would like to request for following information:

--  pointers to the Deployment experiences from Network Service
Providers on the ML-PPP
--  pointers to the archived mailing list on the PPP/ML-PPP

I would greately appreciate, if some one could provide with the above.

Regards,


Srihari Varada

 S/MIME Cryptographic Signature