HCNA(HCDA) Huawei Certified Network Associate Training.pdf

download HCNA(HCDA) Huawei Certified Network Associate Training.pdf

If you can't read please download the document

Transcript of HCNA(HCDA) Huawei Certified Network Associate Training.pdf

  • HUAWEI TECHNOLOGIES CO., LTD. Huawei Confidential 1

    The privilege of HCNA/HCNP/HCIE: With any Huawei Career Certification, you have the privilege on http://learning.huawei.com/en to enjoy:

    1Comprehensive E-Learning Courses

    ContentAll Huawei Career Certification E-Learning courses

    Methods to get the E-learning privilege : submit Huawei Account and email being used for Huawei Account

    registration to [email protected] .

    2 Training Material Download

    Content: Huawei product training material and Huawei career certification training material

    MethodLogon http://learning.huawei.com/en and enter HuaWei Training/Classroom Training ,then you can

    download training material in the specific training introduction page.

    3 Priority to participate in Huawei Online Open Class(LVC)

    ContentThe Huawei career certification training covering all ICT technical domains like R&S, UC&C, Security,

    Storage and so on, which are conducted by Huawei professional instructors

    MethodThe plan and participate method please refer to LVC Open Courses Schedule

    4Learning Tool: eNSP

    eNSP (Enterprise Network Simulation Platform) is a graphical network simulation tool which is developed by

    Huawei and free of charge. eNSP mainly simulates enterprise routers, switches as close to the real hardware as

    it possible, which makes the lab practice available and easy without any real device.

    In addition, Huawei has built up Huawei Technical Forum which allows candidates to discuss technical issues with

    Huawei experts , share exam experiences with others or be acquainted with Huawei Products(

    http://support.huawei.com/ecommunity/

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • Huawei Certification

    HCDA-HNTD

    Huawei Networking Technology and Device

    Huawei Technologies Co.,Ltd

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • Copyright Huawei Technologies Co., Ltd. 2012. All rights reserved.

    No part of this document may be reproduced or

    transmitted in any form or by any means without prior written consent of Huawei Technologies Co., Ltd.

    Trademarks and Permissions

    and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd. All other trademarks and trade names

    mentioned in this document are the property of their respective holders.

    Notice

    The information in this document is subject to change without notice. Every effort has been made in the preparation

    of this document to ensure accuracy of the contents, but all

    statements, information, and recommendations in this document do not constitute the warranty of any kind, express

    or implied.

    Huawei Certification

    HCDA-HNTD Huawei Networking Technology and

    Device

    Edition 1.6

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • Huawei Certification System

    8KRG_OTM UT OZY YZXUTM ZKINTOIGR GTJ VXULKYYOUTGR ZXGOTOTM Y_YZKSGIIUXJOTM ZU JOLLKXKTZ I[YZUSKXY GZ JOLLKXKTZ RK\KRY UL /): ZKINTURUM_.[G]KO IKXZOLOIGZOUT OY IUSSOZZKJ ZU VXU\OJK I[YZUSY ]OZN G[ZNKTZOIVXULKYYOUTGRIKXZOLOIGZOUT

    (GYKJ UT INGXGIZKXOYZOIY UL /): ZKINTURUMOKY GTJ I[YZUSKXYTKKJY GZJOLLKXKTZ RK\KRY .[G]KO IKXZOLOIGZOUT VXU\OJKY I[YZUSKXY ]OZNIKXZOLOIGZOUTY_YZKSULLU[XRK\KRY

    .)*' .[G]KO )KXZOLOIGZOUT *GZGIUS 'YYUIOGZK OY VXOSGX_ LUX /6TKZ]UXQSGOTZKTGTIKKTMOTKKXYGTJGT_UZNKXY]NU]GTZZURKGXTZNK/6TKZ]UXQQTU]RKJMK.)*'IKXZOLOIGZOUTIU\KXYZNK:)6/6HGYOIYXU[ZOTMY]OZINOTM GTJ UZNKX IUSSUT LU[TJGZOUTGR QTU]RKJMK UL /6 TKZ]UXQYZUMKZNKX ]OZN .[G]KO IUSS[TOIGZOUTY VXUJ[IZY \KXYGZORK XU[ZOTMVRGZLUXS

  • HC

    IE-

    R&S

    UC&

    C VC

    Cl

    oud

    Stor

    age

    Wire

    less

    Tra

    nsm

    issi

    on S

    ecur

    ity

    ICT

    Car

    eer C

    ertif

    icat

    ion

    Expert

    HCN

    A-

    Desi

    gn

    HCN

    P-

    Desi

    gn

    HCN

    A(HC

    DA)

    HCAr

    HCN

    A-W

    LAN

    HC

    NA-

    U

    C HC

    NA-

    VC

    HC

    NA-

    Clou

    d HC

    NA-

    LT

    E HC

    NA-

    Tr

    ansm

    issi

    on

    HCN

    A-Se

    curit

    y HC

    NA-

    CC

    HCN

    P-Ca

    rrie

    r (H

    CDP-

    Carr

    ier)

    HC

    NP-

    WLA

    N

    HCN

    P-

    UC

    HCN

    P-

    VC

    HCN

    P-

    Clou

    d HC

    NP-

    LT

    E HC

    NP-

    Tran

    smis

    sion

    HC

    NP-

    R&S

    (HCD

    P)

    HCN

    P-

    Secu

    rity

    HCN

    P-St

    orag

    e HC

    NP-

    CC

    HCN

    A-St

    orag

    e

    H

    Associate

    Professional

    HCIE

    - De

    sign

    Prop

    osed

    Adv

    ance

    d re

    latio

    nshi

    p N

    eces

    sary

    adv

    ance

    d re

    latio

    nshi

    p

    HC

    IE-

    Carr

    ier

    HCIE

    - LT

    E HC

    IE-

    WLA

    N

    HCIE

    -Se

    curit

    y

    HCIE

    -Tr

    ansm

    issi

    on

    HCIE

    - CC

    HC

    IE-

    UC

    HCIE

    - Cl

    oud

    HCIE

    - VC

    HC

    IE-

    Stor

    age

    Architect

    Rout

    ing

    & S

    witc

    hing

    W

    LAN

    IC

    T Co

    nver

    genc

    e De

    sign

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • ,UXK]UXJ

    5[ZROTK

    :NOY HUUQ OY GHU[Z ZNK .[G]KO IKXZOLOKJ *GZGIUS 'YYUIOGZK IKXZOLOIGZOUT:NK

    YZ[JKTZY]NU]GTZZUVXKVGXKLUXZNK.)*'K^GSUX]GTZZURKGXTZNKZKINTURUM_

    GHU[Z:)6/6VXUZUIURYZGIQYXU[ZKXY]OZIN='4+ZNKXTKZGTJNU]ZUIUTLOM[XK[YK

    UTZNK

  • OSVRKSKTZGZOUTYUTZNK
  • _

    Icons Used in This Book

    IPv6 Router SOHO Router Voice Router Low-end Router

    Core Router Hub Convergence Switch Core Switch

    Edge Switch Cascade Switch AP AP Amplifier Wireless Bridge

    Wireless Network Card Access Server Audio Gateway Firewall Internet Telephony

    Socket switch

    High-end Router

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • HCDA-HNTD

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • Table of Contents Module 1 Network Fundamentals .................................................................................Page 1

    IP Network Fundamental ...............................................................................................Page 3

    TCPIP Basis...........................................................................................................................Page 43

    IP Addressing and Routing ...........................................................................................Page 86

    Protocols of Transprot Layer.........................................................................................Page 127

    Introduction to Common Application........................................................................Page 148

    Module 2 Routing ................................................................................................................Page 163

    VRP Basis and Operation ...............................................................................................Page 165

    Routing Protocol Basis.....................................................................................................Page 202

    Static Route .........................................................................................................................Page 230

    Dynamic Routing Protocol Basis...................................................................................Page 248

    Distance-vector Routing Protocol ...............................................................................Page 260

    RIP Routing Protocol.........................................................................................................Page 283

    RIP Troubleshooting..........................................................................................................Page 311

    OSPF Routing Protocol Basis..........................................................................................Page 342

    Module 3 Switching ..............................................................................................................Page 375

    Ethernet Overview .............................................................................................................Page 377

    Principle of Ethernet Device ...........................................................................................Page 395

    Ethernet Port Technology ................................................................................................Page 422

    VLAN Technology Principle and Configuration.........................................................Page 449

    VLAN Routing .......................................................................................................................Page 470

    STP Principle and Configuration.....................................................................................Page 489

    VRRP Principle and Configuration..................................................................................Page 522

    Page1

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • Module 4 WAN ........................................................................................................................Page 545

    HDLC Principle and Configuration.................................................................................Page 547

    PPP Principle and Configuration ....................................................................................Page 563

    FR Principle and Configuration........................................................................................Page 697

    Module 5 Network Security-Firewall Product Basis .....................................................Page 631

    Firewall Product Basis .........................................................................................................Page 633

    USG Basic Function and Configuration ........................................................................Page 655

    Module 6 Product.....................................................................................................................Page 695

    Huawei NE40E-X Series Router Introduction..............................................................Page 697

    AR G3 & Sx7 Brief ...............................................................................................................Page 726

    Page2

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • Module 1 Network Fundamentals

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • Page3

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • Page4

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • Page5

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • Page6

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • Data refers to information in any format. The format used to encode any information must follow agreed or standard rules before successful communication between a sender and receiver is possible.

    For example, a picture can be broken down into a number of dots referred to as pixels, each pixel can then be represented by a number which can then be encoded ready for transmission. The format used to encode the image data by the sender must be understood by the receiver to enable them to decode and rebuild the picture.

    Common types of data that can be encoded for transmission include text, numbers, pictures, audio, and video. many standard ways of encoding the different types of data exist.

    Data communication is the process of exchanging data between two devices through a transmission medium, such as a wired or wireless network.

    Page7

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • A simple data communication system consists of a message, a sender, a receiver, a (transfer) medium, and a protocol.

    Message:

    A message contains information that needs to be communicated. This could be text, numbers, a picture, sound, or video which will be encoded and transmitted as one or more messages.

    Sender:

    The sender is a device or system that transmits the message, this could be a PC, a workstation, a server, or a mobile phone.

    Receiver:

    The receiver is a device or system that receives the message, this could be a PC, a workstation, a server, a mobile phone, or a television.

    Medium:

    The medium is a physical or logical connection between the sender and the receiver which is capable of carrying the message. Typical types of medium are twisted pair cable, coaxial cable, optical fiber and radio wave.

    Protocol:

    Page8

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • The protocol is the set of rules that controls the way in which data exchanged. The protocol does not necessarily define what the original data is or how it is encoded, just how it should be exchanged by two communicating devices. Protocol rules define such things as the speed at which data is transferred and the size of the data unit that is sent. It will also define when a communication session starts and ends. These rules can be likened to the rules which define the way we talk to each other or read and write, without such rules even if we use the same language we cannot communicate.

    Page9

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • There are three different ways in which two devices can communicate in data networking:

    Simplex communication:

    Simplex communication is in one direction. One device can only send messages, the other one can only receive messages.

    For example a keyboard is a device which only sends data and a monitor a device that can only receive data both use simplex communication.

    Half-duplex communication:

    Half-duplex communication is two way but only one device can be sending at any time, the other must be receiving. Both devices are capable of sending and receiving but communication can only be in one direction at a time.Two-way radios, such as those used by police and taxis work in half-duplex mode.

    Full-duplex communication:

    Full-duplex communication is two way concurrently, both devices can send and receive messages at the same time.A motorway is full duplex as traffic is able to travel in both directions at the same time .Telephony networks are also full duplex, however most humans can only either talk orlisten - not do both at the same time.

    Page10

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • Page11

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • A network is any group of people, things or places that are interconnected in some way. Networks exist everywhere in our life, we have road, rail, telephone and postal networks which we use on a daily basis.

    A computer network consists of two or more computers and peripheral which are interconnected by communication lines.The computers in a network can easily exchange and share information and resources .

    Computer networks were developed to meet increasing requirements for exchanging information and sharing resources.

    In early computer networks , each computer was an independent device, there was little or no communication between systems.

    As computer and communication technologies evolved, communication between different systems was made possible.

    Standard protocols understood by different systems made sharing resources and data possible and improved resource utilisation.

    Page12

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • In recent years, the computer network is developing rapidly. The computer communications network and the Internet have become the basic part of the society. The computer network is applied to many fields of industry and commerce, including e-bank, e-commerce, modernized enterprise management,and information service. From remote education to government routines, and to todays e-community without the network technology they can not work. The saying "network exists everywhere in the world" is not an exaggerated statement. The computer network came into being in 1960s. At that time, the network was a host-based low-speed serial connection providing program running, remote printing, and data service. The System Network Architecture (SNA) of IBM and X.25 public data network are such kind of network. In 1960s, the defense department of US funded a packet switching network called ARPANET, which was the earliest rudiment of the Internet. In 1970s, the commercial computing mode, which featured personal computers,came forth. Initially, personal computers were used as independent devices. Because of the complexity of commercial computing, many terminal devices needed to cooperate, and thus the local area network (LAN) was developed. The LAN reduced the expense on printers and disks dramatically.

    Page13

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • In 1980s and 1990s, in order to deal with the increasing demand on remote computing,the computer industry developed many wide area network protocols (including TCP/IP and IPX/SPX). Then the Internet was expanded fast. Nowadays TCP/IP is extensively used on the Internet.

    Page14

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • The topology defines the organization of devices in a network. A LAN can adopt various topologies, such as the bus topology and star topology.

    In the bus topology, all devices are connected to a linear network media, which is called the bus. When a node transmits data in a network adopting the bus topology, the data reaches all nodes. Each node checks the data. If the data is not sent to this node, the node discards the data. If the data is sent to this node,the node accepts the data and transfers the data to the upper layer protocol. A typical bus topology has simple layout of lines. Such layout uses short network media, and thus, the expense on cables is low. However, this topology makes it difficult to diagnose and isolate faults. Once a fault occurs, the entire network will be affected. In addition, each device in the LAN sends data to all the other devices, which consumes large amount of bandwidth. It will lower network performance.

    In the star topology, devices are connected to a central control point. A device communicates with another device through the point-to-point connection between it and the hub or switch. The start topology is easy to design and install, because network media connect the hub or switch and workstations. The star topology is easy to maintain, because the network can be easily

    Page15

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • modified and network faults can be easily be located. The star topology is extensively used in LAN construction. Of course the star topology has its weakness. Once the central control device becomes faulty, the single point failure may be occur. In addition, a Network media can connect only one device, so large amount of network media are needed and the LAN installation cost increases.

    These topologies are logical structures and are not necessarily related to the physical structure of devices. For example, logical bus and ring topologies usually adopt the physical star structure. A WAN usually adopts the star, tree, fullmeshed, or half-meshed topology.

    Page16

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • The Internet is a large network formed by networks and devices. Based on the covered geographic scope, networks are classified into LAN, WAN, and Metropolitan Area Network (MAN) whose size is between the LAN and WAN.

    Local Area Network (LAN)

    A LAN is formed by connected communication devices in a small area. A LAN covers a room, a building, or an industry garden. A LAN covers several kilometers. It is a combination of computers, printers, modems, and other devices interconnected through various media within several kilometers.

    Wide Area Network (WAN)

    A WAN covers a larger geographic scope, such as a state or a continent. It provides the data communication service in a large area and is used to connect LANs. The China Packet Network (CHINAPAC), China Data Digital Network (CHINADDN), China Education and Research network (CERnet), CHINANET, and China Next Generation Internet (CNGI) are all WANs. A WAN connects LANs that are far from each other.

    Page17

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • A LAN is formed by interconnected communication devices in a small area, such as a room, a building, and a campus. In general, a LAN covers several kilometers. The LAN is featured by short distance, low delay, high data transmission speed, and high reliability. Common LANs are Ethernet and Asynchronous Transfer Mode (ATM). They are different in topology, transmission speed, and data format.Ethernet is the most widely used LAN. The following network devices are used in LAN construction: Cables: A LAN is extended by cables. Various cables are used in LANs, for example, the fiber, twisted pair, and coaxial cable. Network Interface Card (NIC): An NIC is inserted in the main board slot of a computer. It transforms the data to the format that other network devices can identify and transmits the data through the network media. Hub: A hub is a shared device that provides many network interfaces to connect computers in the network. The hub is called a shared device because all its interfaces share a bus. At the same time, only one user can transmit data, and so the data amount and speed of each user (interface) depends on the number of active users (interfaces). Switch: also called a switched hub. A switch also provides many interfaces to connect network nodes but its performance is much higher than that of a shared hub. It can be considered to have many buses so that devices connected to each interface can independently transmit data without affecting other devices. For

    Page18

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • users,the interfaces are independent of each other and have fixed bandwidth. In addition, a switch has some functions that a hub lacks, such as data filtering,network segmentation, and broadcast control. Router: A router is a computer device used to connect networks. A router works at the third layer (network layer) of the OSI model and is used to route, store, and forward packets between networks. Generally, a router supports two or more network protocols so that it can connect different type of networks A router can also run dynamic routing protocols to dynamically route packets.

    Page19

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • A WAN covers a larger geographic scope, such as a state or a continent. The China Packet Network (CHINAPAC), China Data Digital Network (CHINADDN),China Education and Research network (CERnet), CHINANET, and abuilding China Next Generation Internet (CNGI) are all WANs. A WAN connects LANs that are far from each other. It consists of the end system(users on two ends) and the communication system (the link between two ends). The communication system is the key of the WAN and it falls into the following types: Integrated Service Digital Network (ISDN): a dial-up connection mode. The ISDN BRI provides 2B+D data channels. Each B channel provides the speed of 64 kbit/s and the highest speed can be 128 kbit/s. The ISDN PRI has two standards: the European standard (30B+D) and the North America standard (23B+D). The ISDN uses the data transmission mode, which features fast connection and high reliability. Two devices in the ISDN can identify the number of each other. The call cost of the ISND is higher than that of the ordinary telephony network, but the double-channel structure supports two independent lines. The ISND is applicable to individual subscribers or small offices. Leased Line: called DDN in China. It is a point-to-point connection that transmits data at the speed of 64 kbit/s to 2.048 Mbit/s. The leased line guarantees data transmission and provides constant bandwidth, but the cost is high and the point to-point structure is not very flexible.

    Page20

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • X.25: a WAN type that appeared early and is still in extensive use at present. It transmits data at the speed of 9600 bit/s to 2 Mbit/s. X.25 adopts the redundant mode and is fault tolerant, so it features high reliability. But the transmission speed is low and the delay is high. Frame Relay: a comparatively newer technology developed on the basis of X.25. The transmission speed is between 64 kbit/s and 2.048 Mbit/s. The Frame Relay is flexible. It implements point-to-multipoint connection. In addition, FR can transmit data at a speed that exceeds the Committed Information Rate (CIR) when large amount of data needs to be transmitted, and it allows certain burst traffic. For these reasons, FR is a good choice for business subscribers. Asynchronous Transfer Mode (ATM): a cell exchange network that features high speed, low delay, and guaranteed transmission quality. Most of ATM network use fibers as the connection medium. The fiber provides a high speed of over 1gigabit, but the cost is also high. ATM is also a WAN protocol.

    Page21

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • The WAN operates in a scope larger than that of the LAN. In the WAN, the network access is implemented through various serial connections. Generally, enterprise networks are connected to the local ISP through the WAN lines. The WAN provides fulltime and part-time connections. In the WAN, serial interfaces can work at different speeds.

    The following devices are used in the WAN:

    Router: In the WAN, messages are sent to the destination according to the address. The process of looking for the transmission path is called routing. A router will send data to the destination by establishing routes between WANs and LANS according to their address information.

    Modem: As the device used to transform signals between the end system and communication system, a modem is the indispensable device in a WAN. Modems are classified into synchronous modem and asynchronous modem. The synchronous modem is connected to the synchronous serial interface and is applied to the leased line, Frame Relay, and X.25. The asynchronous modem is connected to the asynchronous serial interface and is applied to the PSTN.

    Page22

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • ARPAnet solves the problem of network robustness. That is, once a device fault or link fault occurs, data transmission must be ensured between any two nodes if the two nodes are physically connected. For the high ability of self-healing,ARPAnet meets the requirement in wars. It comes of the Defence Advanced Research Projects Agency (DARPA).

    In 1985, the National Science Foundation (NSF) established the NSFnet. NSF established a WAN consisting of regional networks and connected these regional networks to the super computer center. In June 1990, the NFSnet took the place of the ARPAnet and became the backbone network of the Internet. Owing to the NSFnet, the Internet is open to the public, while it was only used by computer science researchers and governments before.

    The second leap of the Internet was attributed to the commercialization in early of the 1990s. As soon as commercial organizations entered the world of Internet, they found the great potential of Internet in communications, information searching, and customer service. Then numerous enterprises in the world swarmed into the Internet, which resulted in a new leap of the Internet. In 1995, NSFnet came to an end and it was replaced by a new Internet backbone network operated by multiple private companies.

    Page23

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • Currently, the Internet is not a simple hierarchy, instead, it is formed by many WANs and LANs connected by connecting devices and exchange devices. End users are connected to the Internet through the service provided by Internet service providers (ISPs). ISPs are classified into international service providers, national service providers, regional ISPs, and local ISPs. International service provider An international service provider connects networks of different countries. National service provider (NSP) A national service provider operates on backbone networks that are built and maintained by professional companies. These backbone networks are connected by complicated switching devices (usually operated by the third party) so that end users can be connected to the backbone network. The switching devices are called network access points (NAPs). NAPs transmit data at a high speed. Regional ISP A regional ISP is a small ISP connected to one or more NSPs. Regional ISPs transmit data at a lower speed. Local ISP A local ISP provides service for end users. A local ISP is connected to a regional ISP or an NSP. Most end users are connected to local ISPs.

    Page24

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • NAP An NAP connects backbone networks. It is usually a complicated switching workstation operated by the third party.

    Page25

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • Page26

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • A network protocol is a set of formats and conventions stipulated and observed by communication parties so that devices in different computer networks can communicate. A network protocol is the standardized description of a series of rules and conventions. It defines how network devices exchange information.Network protocols are basis of the computer network. Only the devices that comply with related network protocols (laws for interconnected devices in the network) can communicate with each other. Any device that does not comply with the network protocol cannot communicate with other devices.

    What is a protocol? Take the telegraph for example. Before sending a telegraph,the two parties must define the transmission format of the telegraph, for example,what signal indicates the start, what signal indicates the end, how to handle errors,and how to express the name and address of the sender. The predefined format and convention is a protocol.

    Network protocols include the Transfer Control Protocol/Internet Protocol (TCP/IP), Internetwork Packet eXchange/Sequenced Packet eXchange (Novell IPX/SPX), and IBM System Network Architecture (SNA). The most widely used protocol is the TCP/IP stack, which has become the standard protocol of the Internet.

    Page27

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • A standard is a set of rules and processes that are widely used or defined by the government. A standard describes stipulations in a protocol and sets the simplest performance set for guaranteeing network communications. IEEE 802.X is the dominant LAN standard.

    Page28

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • Many international standardization organizations made great contributions to development of the computer network. They unify network standards so that devices of different vendors can communicate with each other. Till now, the following standardization organizations have made contributions to development of the computer network.

    International Organization for Standardization (ISO)

    ISO stipulates standards for large-scale networks, including the Internet. The ISP brings forward the OSI model that describes the working mechanism of network.

    The OSI model is a comprehensible and clear hierarchical model of the computer network.

    Institute of Electrical and Electronics (IEEE)

    IEEE defines standards for network hardware so that hardware devices of different vendors can communicate with each other. The IEEE LAN standard is the dominant standard for LANs. IEEE defines the 802.X protocol suite. 802.3 is the standard for the Ethernet; 802.4 is the standard for the token bus network;802.5 is the standard for token ring; 802.11 the standard fro the wireless local

    Page29

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • area network (WLAN).

    American National Standards Institute (ANSI)

    ANSI is an organization formed by companies, governments, and other members voluntarily. The ANSI defines the standard for the fiber distribution data interface.

    Electronic Industries Association/Telecomm Industries Association (EIA/TIA) They define the standards for network cables, for example, RS232, CAT5, HSSI,and V.24. They also define the standard for cabling, for example, EIA/TIA 568B.

    International Telecomm Union (ITU)

    They define the standard for the telecom network working as the WAN, for example, X.25 and Frame Relay.

    Internet Engineering Task Force (IETF)

    Founded at the end of 1985, the IETF is responsible for researching and establishing technical specifications related to the Internet. Now IETF has become the most authoritative research institute in the global Internet field.

    Page30

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • IETF produces two types of files: Internet drafts and RFCs.

    RFCs, which are used as standards, fall into the following types:

    Proposals, namely, the recommended solutions Accepted standards that are used by all users and cannot be changed Optimal practices, a kind of introduction IETF standards are called RFCs, which are a series of files published by IETF.

    In the past, RFC stood for Request for Comments. Now RFC is only a name without any special meaning. Currently, RFCs are formal files. There are about 5000 RFC files. The first one is RFC 1 Host Software, which was published on April 7th, 1969.

    Many Internet-related protocols, such as IP, OSPF, BGP, and MPLS, are defined by RFCs.

    Page31

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • Page32

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • A typical IP network is comprised of a backbone network, Metropolitan Area Network (MAN) and Access Network. The backbone network commonly interconnects networks from different countries and cities. Metropolitan Area Networks are located between the backbone network and the access network, and it is commonly comprised of a backbone layer, convergence layer and access layer. Access networks are used for terminal user access, it is usually in the layer2 access network, which is under the service access point. Users can access the internet via xDSL, Ethernet and so on.

    The target network structure of IP MAN is divided into:

    IP MAN Service access point (BRAS and service router) and the upper layer routers that compose the layer3 network.

    IP MAN is comprised of a backbone layer, convergence layer and access layer.

    Broadband access network The layer2 access network, which is under the service access point.

    The network structure is divided into the layer2 convergence network and the last mile access network.

    Page33

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • On the service plane, the structure can be divided into a public access network plane and the major account access network plane.

    Page34

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • The Metropolitan Area Network (MAN) is located between the backbone network and the access network, and interlinks different areas of a city.

    The MAN provides the following services:

    Internet access There are two access modes: dialup access mode and private line access mode.

    In the dialup access mode, subscribers have different service attributes. In the private line access mode, subscribers in the same group have the same service attributes. The Asymmetric Digital Subscriber Line (ADSL) and Local Area Network (LAN) technologies are widely used as Internet access services. Both technologies support dialup access and private line access modes.

    Virtual private network (VPN)

    In recent years, enterprises have increasing requirements for diversified services. As such, VPN technology has become more and more popular. VPN is a private network constructed within a public network infrastructure with the help of Internet service providers (ISPs) and network service providers (NSPs).

    Based on the implementation layer, VPN can be classified into Layer 2 VPN (L2VPN), Layer 3 VPN (L3VPN) and the Virtual

    Page35

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • Private Dial Network (VPDN). The VPDN provides network access to mobile personnel in enterprises and small-sized ISPs using the dialup function of the public network and the access network.

    Page36

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • The common Internet access modes are ADSL, Ethernet, and leased line. Household users usually choose the ADSL access mode, residential users prefer the Ethernet access mode, and enterprise users select the leased line access mode. Normally, the access network uses Layer 2 devices, such as digital subscriber line access multiplexers (DSLAM) and Ethernet switches, to provide the access service for users. The access network does not perform any control on users and it simply sets up Layer 2 connections to transparently transmit user information to upper-layer devices. The access network refers to all devices at the access layer.

    The access layer uses the broadband remote access server (BRAS) to manage users.

    The convergence layer generally uses aggregation routers or Layer 3 switches. The convergence layer aggregates traffic from the BRAS into the MAN devices and forwards this traffic through routing functions.

    The following shows the Internet access process:

    A user sends an Internet access request. Layer 2 devices in the access network establish a Layer 2 connection and transparently transmit the request to the BRAS.

    Page37

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • The BRAS performs user identity authentication and authorization, and allocates IP addresses to the user.

    The BRAS routes the user packets to devices at the convergence layer. The devices at the convergence layer forward the packets through routing functions, to allow the user to have access to the Internet.

    Page38

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • VPN services are classified into L3VPN services, L2VPN services and VPDN services. Here, we talk about the most common L3VPN services. L3VPN has multiple types, such as Internet Protocol Security VPN (IPSec VPN), Ground Radar Equipment VPN (GRE VPN) and Border Gateway Protocol/Multiple protocol Label Switching VPN (BGP/MPLS VPN).

    The BGP/MPLS VPN model has three parts: customer edge (CE), provider edge (PE) and provider (P).

    CE: It is an edge device on the user network. A CE provides interfaces that are directly connected to the service provider (SP) network. It can be a router, switch or a host.

    PE: It is an edge router provided by the SP. A PE device is directly connected to the CE. On the MPLS network, all VPN operations are performed in the PEs.

    P: It is a backbone router on the SP network. A P device is not directly connected to the CE. The P device forwards MPLS data, and does not maintain VPN information.

    As shown in the figure on this slide, enterprise private line users A, B and C can communicate with each other on the LAN by means of the BGP/MPLS VPN network.

    Page39

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • Generally, the performance of the backbone network can be evaluated using the following indicators:

    High reliability Devices on the backbone network must be stable, which is critical to the stable operation of the entire network. Therefore, network architects should properly design the network architecture and develop reliable network backup policies to ensure strong network self-healing capabilities.

    Flexibility and scalability

    To meet future network services, the network must be seamlessly expanded and upgraded while minimally affecting the network architecture and devices.

    Flat networking The number of network layers and hops should be minimized to facilitate network management.

    Proper planning of quality of service (QoS) In, the IP network also supports voice over IP (VoIP), video and key customer services. These services have high requirements on service in addition to carrying Internet access service quality. Therefore, support for QoS is network to the telecommunications network. To achieve support for QoS, QoS should be properly planned.

    Operability and manageability Centralized monitoring,

    Page40

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • rights-based management, and unified allocation of bandwidth resources are supported, which make the entire network controllable. one of the necessary conditions for the transition of the IP.

    Page41

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • Hierarchical plane structure

    The hierarchical plane structure is commonly applied in the early-stage backbone network. Currently, most carriers in China use this structure, which is divided into three layers, core backbone layer, core convergence layer and core access layer. The core backbone layer is divided by area. Areas are connected in full-mesh or partial-mesh mode to improve network robustness. The core convergence layer adopts dual homing networking. Devices at this layer are dual-uplinked to an area or two areas at the core backbone.

    Hierarchical spatial plane structure

    In the hierarchical spatial plane structure, the network is divided in layers and planes. Different planes carry different services. Normally, services on two different planes are independent from each other. When one plane fails, the other plane acts as a backup plane. When designing the network, architects usually design the plane as one that can carry all services. As a network requires carrying multiple services, the hierarchical plane network model stands out with its features of a clear structure, large backup capacity and high security.

    Page42

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • Page43

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • Page44

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • Page45

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • Page46

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • Since the 1960s, computer networks have undergone a dramatic

    development. To take the leading position and have a larger share

    in the communication market, manufacturers competed in

    advertising their own network structures and standards which

    included IBMs SNA, Novells IPX/SPX., Apples Apple Talk, DECs DECnet and TCP/IP, which remains the most widely used today.

    These companies pushed software and hardware that use their

    protocols to the market enthusiastically. All these efforts promoted

    the fast development of network technology and the prosperity of

    the market of network devices. However, the network became more

    and more complicated due to lack of compatibility between the

    various protocols.

    To improve network compatibility, the International Organization for

    Standardization (ISO) developed the Open System Interconnection

    Reference Model (OSI RM) which soon became the model of

    network communications. The ISO followed the following principles

    when they designed the OSI reference model:

    Page47

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • 1. Each layer of the model has its own responsibilities which

    should help it stand out as an independent layer.

    2. To avoid function overlapping, there should be enough layers.

    The OSI reference model has the following advantages:

    1. It simplifies network related operations.

    2. It provides compatibility and standard interfaces for systems

    designed by different institutions.

    3. It enables all manufactures to be able to produce compatible

    network devices, which facilitates the standardization of networks.

    4. It lays the complex concept of communications down into

    simpler and smaller problems, which facilitates our

    understanding and operations.

    5. It separates the whole network into areas, which guarantees

    changes in one area will not affect other areas and networks in

    each area can be updated quickly and independently.

    Page48

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • The OSI reference model has seven layers. From bottom to top,

    they are physical layer, data link layer, network layer, transport layer,

    session layer, presentation layer and application layer.

    The bottom three layers are usually called lower layer or the media

    layer, which is responsible for transmitting data in the network.

    Networking devices often work at lower layers and network

    interconnection is achieved by the cooperation of software and

    hardware. Layer 5 to layer 7 form the upper layer or the host layer.

    The upper layer guarantees data is transmitted correctly, which is

    achieved by software.

    Page49HC Series

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • The functions of each layer of the OSI Reference Model are listed

    as follows:

    Physical layer: providing a standardized interface to physical

    transmission media including voltage, wire speed and pin-out of

    cables.

    Data link layer: combines bits into bytes and bytes into frames.

    Provides access to media using MAC address and error detection.

    Network layer: providing logical addresses for routers to decide

    path.(path selection)

    Transport layer: providing reliable or unreliable data transfer

    services and error correction before retransmission.

    Session layer: establishing, managing and terminating the

    connections between the local and remote application. Service

    requests and responds of application programs in different devices

    form the communication of this layer RPC,NFS and SQL belong to

    this layer.

    Presentation layer: providing data encoding and translation. Make

    sure that the data sent by the application layer of one system can

    be understood by the application layer of another system.

    Application layer: providing network services as the closest layer to users among the seven layers. Page50

    HUAWEI TECHNOLOGIESPage50 HC Series

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • Since the OSI reference model and protocols are comparatively

    complicated, they do not spread widely. However, TCP/IP has been

    widely accepted for its openness and simplicity. The TCP/IP stack

    has already been the main stream protocols for the Internet.

    The TCP/IP model also takes a layered structure. Each layer of the

    model is independent from each other but they work together very

    closely.

    The difference between the TCP/IP model and the OSI reference

    model is that the former groups the presentation layer and the

    session layer have been merged into the application layer. So the

    TCP/IP model has only five layers. From bottom to top, they are:

    physical layer, data link layer, network layer, transport layer and

    application layer.

    Page51

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • Each layer of the TCP/IP model corresponds to different protocols.

    The TCP/IP protocol stack is a set of communication protocols. Its

    name, the TCP/IP protocol suite, is named after two of its most

    important protocols: the Transmission Control Protocol (TCP) and

    the Internet Protocol (IP). The TCP/IP protocol stack ensures the

    communication between network devices. It is a set of rules that

    define how information is delivered in the network.

    Page52

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • Each layer of the TCP/IP model uses Protocol Data Unit (PDU) to

    exchange information and enable communication between network

    services. During encapsulation, each succeeding layer encapsulates

    the PDU that it receives from the layer above. At each stage of the

    process, a PDU has a different name to reflect its new appearance.

    For example, the transport layer adds TCP header to the PDU from

    the upper layer to generate the layer 4 PDU, which is called a

    segment. Segments are then delivered to the network layer. They

    become packets after the network layer adds the IP header into

    those PDUs. The packets are transmitted to the data link layer,

    where they are added data link layer headers to become frames.

    Finally, those frames are encoded into bit stream to be transmitted

    through network medium. This process in which data are delivered

    following the protocol suite from the top to the bottom and are added

    with headers and tails is called encapsulation.

    Page53

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • After encapsulation, data is sent to the receiving device after

    transmission. The receiving device will decode the data to extract

    the original service data unit and decides how to pass the data to

    an appropriate application program along the protocol stack. This

    reverse process is called de-encapsulation. The corresponding

    layers, or peers, of different devices communicates through

    encapsulation and de-encapsulation.

    As the figure above shows, Host A is communicating with Host B.

    Host A delivers data transformed from an upper layer protocol to

    the transport layer. The transport layer encapsulates the data

    within the segment and send it to the network layer, which adds a

    header. Then the segment is encapsulated within an IP packet,

    which adds another header, called the IP header. Next, the IP

    packet is sent to data link layer where it is encapsulated within a

    frame header and trailer. The physical layer then transforms the

    frame into bit stream and sends it to Host B through the physical

    cable.

    Page54

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • When Host B receives the bit stream, it sends it to its data link layer.

    The data link layer removes the frame header and trailer, then

    passes the packet to the upper layer - network layer. Then the

    network layer removes the IP header from the packet and passes

    segment to the transport layer. In the similar way, the transport

    layer extracts the original data and delivers it to the top layer, the

    application layer.

    The process of encapsulation or de-capsulation is done layer by

    layer. Each layer of the TCP/IP has to deal with data both from its

    upper and lower layers by adding or deleting packet headers.

    Page55

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • The main functions of the physical layer are:

    It specifies the media, interface and signaling types.

    It specify the electrical, mechanical, procedural, and functional

    requirements for activating, maintaining, and deactivating a physical

    link between end systems.

    It specify the features such as voltage, wire speed, maximum transmission distance and pin-out.

    The physical layer provides standards of the transmission media

    and connectors.

    The common physical layer standards include IEEE 802.3 for

    Ethernet, IEEE 802.4 for token bus networks, IEEE 802.5 for token

    ring networks and Fiber Distributed Data Interface (FDDI) specified

    by the X3T9.5 committee of ANSI. The common physical layer

    standard for WANs include EIA/TIA-232 (RS-232), V.24 and V.35

    developed by ITU for serial ports and G.703, which involves the

    physical and electrical and electronic standards for all digital

    interfaces.

    Page56

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • Physical layer mediums include coaxial cable, twisted pair, fiber and

    wireless radio. Coaxial cable is an electrical cable consisting of a

    round conducting wire. The coaxial cable can be grouped into thick

    coaxial cable and thin coaxial cable according to their diameters.

    The thick coaxial cable is more suitable for large LANs since its

    transmission distance is longer and it is more reliable. The thick

    coaxial cable does not need to be cut but you must install transceiver

    for networks using thick coaxial cable. The thin coaxial cable is easy

    to install and is much cheaper, but you need to cut the thin coaxial

    cable and put basic network connectors (BNC) on its two sides and

    then inserts the two sides into T-shape connectors when installing

    the cable. So when there are many connectors, the safety is

    influenced.

    Page57

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • Twisted pair is the most widely used cable, which is twisted by a

    pair of insulated copper wires whose diameters are about 1mm.

    Twisted pair has two types: Shielded Twisted Pair (STP) and

    Unshielded Twisted Pair (UTP) . STP cabling includes metal

    shielding over each individual pair of copper wires, so it is very

    capable of keeping electromagnetic interferences and wireless

    radio interference at bay. STP is easy to install but its price is

    comparatively high. UTP is easy to install and its price is cheaper,

    however, its capability of anti-interference is not as powerful as

    that of STP and its transmission distance is not that long.

    Fiber consists of fiberglass and the shielding layer and it will not

    be interfered by electromagnetic signals. The transmission speed

    of fiber is fast and the transmission distance is long, but fiber is

    very expensive. Optical fiber connectors are connectors for the

    light, which are very smooth and should not have any cuts.

    Fiber connectors are not installed easily.

    Wireless radio makes communications without physical links.

    Wireless radio refers to electromagnetic waves with frequencies

    within the radio frequency that are transmitted in the space

    including the air and vacuum. We should put all the aspects into

    consideration such as the distance, price, bandwidth requirement,

    cables that the network devices support etc. when we make a

    choice of physical medium.

    Repeaters and hubs are devices working at the physical layer,

    but with the development of networks, they are not used so much

    as in the past. Well not discuss them here.

    Page58

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • Data link layer is the first logical layer of the physical layer. It encodes physical address for terminals and help network devices decide whether to pass data to upper layers along the protocol stack. It also points out which protocol the data should be delivered to with some of its fields and at the same time, it provides functions like sequencing and traffic control.

    The data link layer has two sub-layers: Logical Link Control sub-layer (LLC) and Media Access Control sub-layer (MAC) .

    LLC lies between the network layer and the MAC sub-layer. This sub-layer is responsible for identifying protocols and encapsulating data for transmission. The LLC sub-layer performs most functions of the data link layer and some functions of the network layer such as sending and receiving frames. When it sends a frame,it adds the address and CRC to the original data. When it receives a frame, it takes apart the frame and performs address identification and CRC. It also provides flow control, frame sequence check, and error recovery. Besides these, it can perform some of the network functions including datagram, virtual links and multiplexing.

    The MAC sub-layer defines how data is transmitted through physical links. It communicates with the physical layer, specifies physical addresses, network topology, and line standards and performs error notification, sequence transmission and traffic control etc.

    Page59

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • Data link layer protocols specify the frame encapsulation at the data link layer. A common data link layer protocol for LANs is IEEE 802.2LLC.

    Common data link layer protocols for WANs include High-level Data Link Control (HDLC) , Point-to-Point Protocol (PPP) and Frame Relay (FR).

    HDLC is a bit-oriented synchronous data link layer protocol developed by the ISO. HDLC specifies data encapsulation for synchronous serial links with frame characters and CRC.

    PPP is defined by Request For Comment (RFC) 1661. PPP consists of the Link Control Protocol (LCP) , the Network Control Protocol (NCP) and other PPP extended protocol stacks. PPP is commonly used to act as a data link layer protocol for connection over synchronous and asynchronous circuits and it supports multiple network layer protocols. PPP is the default data link layer protocol for data encapsulation of the serial ports of VRP routers.

    FR is a protocol conforming with the industrial standards and it is an example of packet-switched technology. PPP uses error verification mechanism, which speeds up data transmission.

    Ethernet switches are common network devices work at the data link layer.

    Page60

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • As every person is given a name for identification, each network

    device is labeled with a physical address, namely, the MAC address.

    The MAC address of a network device is unique globally. A MAC

    address consists of 48 binary digits and is often printed in

    hexadecimal digits for human use. The first six hexadecimal bits are

    assigned to producers by IEEE and the last six bits are decided by

    producers themselves. For example, the first six hexadecimal bits of

    the MAC address of Huaweis products is 0x00e0fc.

    Network Interface Card (NIC) has a fixed MAC address. Most NIC

    producers burn the MAC address of their products into the ROM.

    When an NIC is initialized, the MAC address in the ROM is read into

    the RAM. When you insert a new NIC into a computer, the physical

    address of the computer is replaced by the physical address of the

    NIC.

    However if you insert two NICs into your computer, then your

    computer may have two MAC addresses, so a network device may

    have multiple MAC addresses.

    Page61

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • The data link layer ensures that datagram are forwarded between

    devices on the same network, while the network layer is responsible

    for forwarding packets from source to destination across networks.

    The functions of the network layer can be generalized as follows:

    Provide logical addresses for transmission across networks.

    Routing: to forward packets from one network to another.

    The router is a common network device that works at the network

    layer. Routers functions mainly for forwarding packets among

    networks. In the above figure,Host A and Host B reside on different

    networks or links. When the router that resides on the same network

    as Host A receives frames from Host A, the router passes those

    frames to the network layer after it ensures that the frames should be

    sent to itself by analyzing the frame header. Then the network layer

    checks where those frames should go according to the destination

    address in the network layer header and later it forwards those

    frames to the next hop. The process repeats until the frames are sent

    to Host B.

    Page62

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • Common network layer protocols include the Internet Protocol (IP) ,

    the Internet Control Message Protocol (ICMP) , the Address

    Resolution Protocol (ARP) and the Reverse Address Resolution

    Protocol (RARP) .

    IP is the most important one among the network layer protocols and

    its functions represent the main functions of the network layer. The

    functions of IP include providing logical address, routing and

    encapsulating or de-encapsulating packets. ICMP, ARP and RARP

    facilitate IP to achieve the network layer functions.

    ICMP is a management protocol and it provides information for IP.

    ICMP information is carried by IP packets.

    ARP maps an IP address to a hardware address, which is the

    standard method for finding a host's hardware address when only its

    network layer address is known.

    RARP maps a hardware address to an IP address, which means to

    get a hosts IP address through its hardware address.

    Page63

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • The network layer address we mentioned here refers to the IP

    address. The IP address is a logical address instead of a hardware

    address. The hardware address such as the MAC address, is

    burned on the NIC and it is for the communication between devices

    that are on the same link. However, the IP address is used for

    communication between devices on different networks.

    An IP address is 4-byte long and is made up of the network address

    and the host address. It is often presented in dotted decimal notation,

    for example, 10.8.2.48.

    More information about the IP address will be introduced in later

    chapters.

    Page64

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • The transport layer provides transparent transfer of data between

    hosts. It shields the complexity of communications for the upper

    applications and is usually responsible for end-to-end connection.

    The main functions of the transport layer involve:

    Encapsulate data received from the application layer and decapsulate data received from the network layer.

    Create end-to-end connections to transmit data streams.

    Send data segments from one host to another, perform error recovery, flow control, and ensure complete data transfer.

    Some of the transport layer protocols ensure data are transmitted correctly which means data are not lost or changed during

    transmission and the order of data packets remains the same when

    they are received at the end.

    Page65

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • Transport layer protocols mainly include the Transmission Control

    Protocol (TCP) and the User Datagram Protocol (UDP) .

    Page66

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • Although TCP and UDP are both protocols of the transport layer, their contributions to the application layer differ greatly.

    TCP provides connection-oriented and reliable transmission. Connection-oriented transmission means that applications which use TCP as their transport layer protocol need to create a TCP connection before they exchange data.

    TCP provides reliable transmission services for the upper layer through its mechanisms of error detection, verification and reassembly. However, creating the TCP connection and performing these mechanisms may bring a lot of extra efforts and increase the cost.

    UDP does not guarantee reliability or ordering in the way that TCP does. It provides a simpler service that does not guarantee the reliability which means datagrams may arrive out of order, appear duplicated, or go missing without notice. UDP focuses on applications that require more on transmission efficiency such as SNMP and Radius. Take SNMP as an example, it monitors networks and sends out warnings from time to time. If SNMP is demanded to create a TCP connection every time when it sends a small amount of information, undoubtedly, the transmission efficiency will be affected. So time-sensitive applications like SNMP and Radius often use UDP as their transport layer protocol. Besides this, UDP is also appropriate for applications that are equipped with some mechanisms for reliability by themselves.

    Page67

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • The main functions of the application layer are:

    Provide user interfaces and deal with specific applications.

    Provide data encryption, de-encryption, compression and decompression.

    Specify the standards of data presentation.

    Page68

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • The application layer has many protocols and the following protocols

    may help you use and manage a TCP/IP network.

    File Transfer Protocol (FTP) is used to transfer data from one computer to another over the Internet, or through a network. It is

    often used for interactive user sessions.

    Hypertext Transfer Protocol (HTTP) is a communication protocol used to transfer or convey information on the World Wide Web.

    TELNET is used to transmit data that carries the Telnet control information. It provides standards for interacting with terminal

    devices or terminal processing. Telnet supports end-to-end

    connections and process-to-process distributed communications.

    Simple Message Transfer Protocol (SMTP) and Post Office Protocol 3 (POP3) are for sending and receiving emails.

    DNS (Domain Name Server) translates a domain name to an IP address and allows decentralized management on domain resources.

    Trivial File Transfer Protocol (TFTP ) is a very simple file transfer protocol. TFTP is designed for high throughput file transfer for

    ordinary purposes.

    Page69

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • Routing Information Protocol (RIP) is the protocol for routers to change routing information through an IP network.

    Simple Network Management Protocol (SNMP) collects network management information and makes that information exchanged

    between the network management control console and network

    devices including routers, bridges and servers.

    Remote Authentication Dial In User Service (Radius) performs user authorization, authentication and accounting.

    Page70

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • Page71

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • To illustrate the encapsulation process, imagine there is network

    whose transport layer uses TCP, the network layer applies IP and

    the data link layer takes Ethernet standards. The above figure

    shows the encapsulation of a TCP/IP packet on that network.

    The original data is encapsulated and delivered to the transport

    layer. And then the transport layer adds a TCP header to the data

    and passes it down to the network layer. The network layer

    encapsulates the IP header in front of the segment and delivers it to

    the data link layer. The data link layer encapsulates Ethernet

    header and trailer to the IP packet and then passes it to the

    physical layer. At last, the physical layer sends the data to the

    physical link as bit streams. The length of each field in the header is

    pointed out in the above figure. Now, well take a close look into the whole process from the top to the bottom.

    Page72

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • The above is a TCP data segment encapsulated in an IP packet. The

    TCP segment consists of the TCP header and the TCP data. The

    maximum length of a TCP header is 60 bytes. If there is not the

    Option field, normally, the header is 20-bytes long.

    The structure of a TCP header is shown as in the above figure. We

    are going to explain just some of it. For more details, please refer to

    the transport layer protocols.

    Source Port: Indicates the source port number. TCP allocates source port numbers for every application.

    Destination Port: Indicates the destination port number.

    Sequence Number: Indicates the sequence number which labels TCP data streams.

    Port number is used to distinguish applications,80 means HTTP application,23 for telnet,20 and 21 for ftp,53 for DNS.

    Ack Num: Indicates the acknowledgement sequence number. Ack Num includes the next sequence number that the sender expects.

    The value of this field is the sequence number that the sender of the

    acknowledgement expects next.

    Option: Indicates the optional fields.

    Page73

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • The network layer adds the IP header to TCP datagram which it

    receives from the transport layer. Usually, the IP header has a fixed

    length of 20 bytes which does not include the IP options. The IP

    header consists of the following fields:

    Version: indicates the version of the IP protocol. At present, the version is 4. The version is 6 for the next generation IP protocol.

    IP header length is the number of 32-bit words forming the header including options. Since it is a 4-bit field, its maximum length is 60

    bytes.

    TOS: 8 bits. It consists of a 3-bit COS (Class of Service) field, a 4-bit TOS field and a 1-bit final bit. The 4 bits of the TOS field indicates

    the minimum delay, the

    maximum throughput, the highest reliability and the minimum cost

    respectively.

    Total length: indicates the length of the whole IP packet including the original data. This field is 16 bit long which means an IP packet

    can be 65535 bytes at most. Although an IP packet can be up to

    65535 byte long, most data link layers segment them before

    transmission. Furthermore, hosts cannot receive a packet more than

    576 bytes and UDP limits packets within 512 bytes. However,

    Page74

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • nowadays many applications allow IP datagram that are more

    than 8192 bytes to go through the links especially for

    applications that support NFS.

    Identification: identifies every datagram the host sends. The value increases with the number of datagram the host sends.

    Time to Live (TTL) : indicates the number of routers a packet can travel through. The value decreases one every time the

    packet passes a router. When the value turns to 0, the packet

    will be discarded.

    Protocol: indicates the next level protocol used in the data portion of the internet datagram. It is similar to the port number.

    IP protocols use protocol number to mark upper layer protocols.

    The protocol number of TCP is 6 and the protocol number of

    UDP is 17.

    Header checksum: calculates the checksum of the IP header to see if the header is complete.

    The source IP address field and the destination IP address filed point out the IP addresses of the source and the destination.

    Page75

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • The physical layer has limitations on the length of frame it sends

    every time. Whenever the network layer receives an IP

    datagram, it needs to decide which interface the

    datagram should choose and check the MTU of that

    interface. IP uses a technique called fragmentation to

    solve the problem of heterogeneous MTUs.

    When a datagram is longer than the MTU of the network over which

    it must be sent, it is divided into smaller fragments which

    are sent separately.

    Fragmentation can be done on the source host or the intermediary

    router.

    Fragments of an IP datagram are not reassembled until they arrive

    at the final destination. The reassembly is performed by

    the IP layer at the destination.

    Datagram can be fragmented for more than one time. The IP

    header provides enough information for fragmentation and

    reassembly.

    Page76

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • Flags: 3 bits

    Multiple control bits:

    0bit: reserved, must be 0.

    1bit: (DF) 0 = can be fragmented, 1 = cannot be

    fragmented.

    2bit: (MF) 0 = final fragmentation, 1 = more

    fragmentation.

    The values of DF and MF cannot be 1 at the same time.

    0 1 2

    +---+---+---+

    | | D | M |

    | 0 | F | F |

    +---+---+---+

    Fragment offset: indicates the position of the fragment within the original datagram. When an IP datagram is fragmented,

    each fragment becomes a packet with its own IP

    header and will be routed independently of any other

    datagrams.

    Page77

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • The Ethernet header is made up of three fields:

    DMAC: indicates the MAC address of the destination.

    SMAC: indicates the MAC address of the source.

    LENGTH/TYPE: its meanings vary with its values.

    When the value is bigger than 1500, it indicates the frame type, for example the upper layer protocol type. The common

    protocol types are:

    0X0800 IP packets

    0X0806 ARP request/response message

    0X8035 RARP request/response message

    When the value is smaller than 1500, it indicates the length of data frame.

    DATA/PAD: the original data. Ethernet standards specify that the minimum data length should be 46 bytes. If the data is less than

    46 bytes, add the Pad field to fill it.

    FCS: the frame check field.

    Page78

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • Page79

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • The above is an example of an HTTP packet that is captured, which

    may facilitate your understanding towards packet encapsulation. The

    bottom displays the actual data and the top is information analyzed

    by the software.

    Page80

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • This page illustrates data encapsulation at the data link layer. The

    encapsulation format used here is Ethernet, which is mentioned

    earlier.

    The figure above shows DMAC at the top and then comes SMAC

    and the type field is listed at the bottom.

    DMAC is 00d0: f838: 43cf

    SMAC is 0011: 5b66: 6666

    Type field value is 0x0800, which indicates that it is an IP packet.

    Page81

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • This page illustrates data encapsulation at the network layer. An IP

    packet is made up of two parts, the IP header and the IP data. As

    described previously, the IP header consists of many fields. In the

    above example, the value of the version field is 4, which indicates

    the packet is an IPv4 packet. The packet header is 20-byte long.

    The protocol field is 0x06, which tells us that the packet to be

    encapsulated is a TCP packet. The IP address of the source is

    192.168.0.123 and the IP address of the destination is

    202.109.72.70.

    Page82

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • This page illustrates data encapsulation at the transport layer. The

    transport layer here uses TCP protocols. The source port number is

    a random number 3514 and the destination port number is 80,

    which is the number assigned for the HTTP protocol. So the

    datagram is from the source to visit the HTTP service of the

    destination host.

    Page83

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • 1. What are the layers of the OSI reference model?

    The OSI reference model consists of seven layers, namely, the

    physical layer, the data link layer, the network layer, the transport

    layer, the session layer and the application layer.

    2. What are the functions of each layer in the TCP/IP protocol stack?

    The TCP/IP protocol stack has five layers: the physical layer, the

    data link layer, the network layer, the transport layer and the

    application layer. The physical layer specifies the mechanical,

    electrical and electronic standards for transmission. The data link

    layer provides controls on the physical layer, detects errors and

    performs traffic control (optional). The network layer checks the

    network topology to decide the best route for data transmission. The

    basic function of the transport layer is to segment the data it

    received from the application layer and combines data segments

    before it sends the data to the application layer. It builds end-to-end

    connections to send data segments from one host to the other host.

    The application layer provides network services for application

    programs.

    Page84

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • 3. What is the process of packet encapsulation and de-

    encapsulation?

    De-encapsulation is the reverse process of encapsulation.

    Encapsulation means to add headers to the original data layer by

    layer from the top of the protocol stack to

    the bottom; while de-encapsulation is to strip off those headers

    from the lower layers to the upper layers.

    4. What are the differences between the MAC address and the

    IP address?

    MAC address is a 48-byte physical address printed on the

    hardware of a device. The MAC address cant be changed. The IP address is a 32-byte address works at the network layer and

    IP addresses can be changed. IP addresses are grouped into

    public addresses and private addresses. Public addresses are

    unique globally, while private addresses can be used repetitively

    in different LAN segments.

    Page85

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • Page86

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • In TCP/IP protocols, each layer has its own communication method,

    Data Link Layer use MAC Addresses, the Network Layer use IP

    Addresses. After understanding the functions of these layers, this

    course mainly introduces IP Addressing used at the Network Layer,

    as well as packet forwarding between Network Layer devices,

    which is the basis for routing.

    This chapter introduces the layer 3 Network Layer in TCP/IP protocols. The main function of the Network Layer is achieved

    through using the IP protocol, which includes IP Addressing and IP

    Routing.

    Page87

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • Page88

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • Page89

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • As the slide shows, this procedure is called encapsulation, in which

    data is transferred along the TCP/IP protocol stack, from the upper

    layer downward, meanwhile, corresponding header and trailer are

    added. After the data encapsulation and transmission in the

    network, the receiving equipment will delete the information added,

    and decide how to deliver the data to proper application along the

    TCP/IP protocol stack, according to the information in the header.

    Among different layers of TCP/IP model, information is exchanged

    to ensure the communication between network equipment. The

    PDU is used for exchanging information. The PDU is different for

    different layers, and with different names. For instance, in the

    transport layer, the PDU with TCP layer is called a segment; after

    the segment is transmitted to network layer, and added with an IP

    header, the PDU is called a packet. The PDU with layer 2 header is

    called a frame. Finally, the frame is processed as bits, and

    transmitted through network media.

    Page90

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • The network layer receives data from the transport layer, and adds source address and destination address into the data. As learned in previous chapters, the data link layer has the physical address (MAC address), which is globally unique. When there is data to be sent, the source network equipment queries the MAC address of the other end equipment, and sends it out.

    However, the MAC addresses are existent in a flat address space, without clear address classification. Thus, it is only suitable for the communication within the same network segment. Besides, the MAC address is fixed in the hardware, with poor flexibility. Hence, for communication between different networks, usually it is based on IP address based on software, to provide better flexibility.

    Page91

    More

    Learning

    Resources:

    http://l

    earning.h

    uawei.c

    om/e

    n

  • IP address is composed of 32 bits, which are divided into four

    octets, or four bytes.

    The IP address could be represented in the following methods:

    Dotted decimal format:10.110.128.111

    Binary format00001010.01101110.10000000.01101111

    Hexadecimal format:0a.7e.80.7f

    Usually, IP addresses are represented in the dotted decimal format;

    and seldom in hexadecimal format. The hierarchical scheme for IP

    addresses is composed of two parts, network and host.

    The hierarchical scheme of IP addresses is similar to that of

    telephone numbering, which is also globally unique. For example,

    the telephone number 010-8288248: the 010 represents the city

    code of Beijing, and 82882484 represents a telephone in Beijing

    city. It is the same for IP addresses. The preceding network part of

    an address represents a network segment, while the latter host

    portion represents the device in a given