0% found this document useful (0 votes)
64 views11 pages

Huawei Datacom Basics Course Guide

The document is a condensed course on Datacom basics, focusing on essential concepts for the Huawei ICT exam, including communication fundamentals, network devices, types, topologies, OSI and TCP/IP models, and key protocols. It covers the roles of switches, routers, firewalls, and WLAN components, as well as ARP and IP forwarding processes. Additionally, it outlines the Huawei VRP system, CLI essentials, and critical knowledge areas for exam preparation.

Uploaded by

chatstic5
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
64 views11 pages

Huawei Datacom Basics Course Guide

The document is a condensed course on Datacom basics, focusing on essential concepts for the Huawei ICT exam, including communication fundamentals, network devices, types, topologies, OSI and TCP/IP models, and key protocols. It covers the roles of switches, routers, firewalls, and WLAN components, as well as ARP and IP forwarding processes. Additionally, it outlines the Huawei VRP system, CLI essentials, and critical knowledge areas for exam preparation.

Uploaded by

chatstic5
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

🚀 Condensed Datacom Basics Course (Huawei ICT Edition)

(Fast learning, high-yield concepts, exactly what you need for the exam)

1. Communication and Data Transfer Basics

📚 Source: Data Communication Network Basis

⭐ Key Concepts

 Communication means transferring information between devices.

 Computers cannot understand text/images directly → everything must become data (0s and 1s).

 A complete transfer involves:


Data → Encapsulation → Transmission → Forwarding → Decapsulation → Data

⭐ Packet Structure

 Payload – actual data

 Header – control information added before the payload

 Trailer/Tail – control information added after the payload

 The process is:

o Encapsulation: adding headers/trailers

o Decapsulation: removing them at the destination

2. Network Devices (Switch, Router, Firewall, WLAN)

📚 Source: Data Communication Network Basis

⭐ Switch

 Layer 2 device (Ethernet)

 Uses MAC address table

 Forwards frames inside the same LAN

 Creates and manages broadcast domains

✔ Entry aging

MAC table entry disappears after ~300 seconds of inactivity.

Why Do We Need VLANs?

✔ Without VLAN
 All devices are in the same broadcast domain

 ARP/DHCP broadcasts reach everyone

✔ With VLAN

Each VLAN becomes a separate broadcast domain.

⭐ Router

 Layer 3 device (IP)

 Uses IP routing table

 Connects different networks

 Performs path selection, NAT, WAN access

⭐ Firewall

 Security device

 Separates zones (Trust / Untrust / DMZ ” Semi-trusted zone (Demilitarized Zone) ”)

 Applies security policies, filtering, VPN, NAT, encryption

⭐ WLAN Components

 AP (Access Point)

 AC (Access Controller)

 Provides Wi-Fi access, authentication, roaming management

3. Network Types & Topologies

📚 Source: Data Communication Network Basis

⭐ Network Types

 LAN – small area (office, home, campus) _ High-speed links (1G/10G Ethernet)

 MAN – city-level networks

 WAN – large geographical area, includes the Internet

⭐ Topologies

 Star (most common)

 Bus

 Ring
 Tree

 Full-mesh

 Partial-mesh

4. OSI & TCP/IP Models

📚 Source: Network Reference Model

⭐ OSI Model (7 layers)

1. Physical

2. Data Link

3. Network

4. Transport

5. Session

6. Presentation

7. Application

⭐ TCP/IP Equivalent Model (used by Huawei)

 Application Layer (HTTP, DNS, FTP, etc.)

 Transport Layer (TCP, UDP)

 Network Layer (IP, ICMP, IGMP)

 Network Access Layer (Ethernet, PPP, PPPoE)

📌 ICT exam tests:


→ mapping protocols to their layer
→ traffic flow through the layers

5. Essential Protocols

📚 Source: Network Reference Model

⭐ Application Layer Protocols


Protocol Purpose

HTTP Web browsing :

 HTTP → port 80

 HTTPS → port 443 (encrypted with TLS)

FTP File transfer :

 Control channel → TCP 21

 Data transfer → TCP 20

DNS Name → IP resolution:

 DNS → UDP 53 (most queries)

 DNS → TCP 53 (zone transfers, large responses)

Telnet Remote login (not encrypted):

Telnet → TCP 23

SMTP(Simple Email sending:


Mail Transfer
SMTP → TCP 25
Protocol)

DHCP Dynamic IP assignment:

 DHCP Discover/Request → UDP 68 (client)

 DHCP Offer/Ack → UDP 67 (server)

⭐ Transport Layer

TCP (reliable) Transmission Controll Protocol

 Connection-oriented

 Uses 3-way handshake (SYN and Ack)

 Uses Sequence and ACK numbers

 Uses sliding window for flow control

 Uses 4-way handshake to close connections (Fin and Ack)

UDP (unreliable) User Datagram Protocol

 Connectionless
 Faster, simpler (streaming, VoIP)

⭐ Network Layer

 IP (routing packets end-to-end)

 ICMP (ping, traceroute) Internet Controll Message Protocol

Nb: traceroute work with TTL and time exceed message

 IGMP (multicast group management) Internet Group Management Protocol

Ex: video streaming, online game

⭐ Data Link Layer

 Ethernet (frames with MAC addressing)

 PPP / PPPoE (WAN access)

Ethernet : manage how data moves physically over local (LAN)

PPP: Manage authentication and IP assignment for a single dedicated link (link diap-up)

PPPoE: Puts PPP’s authentication features inside Ethernet data packets to provide secure, verifiable
internet access over shared local infrastructure

6. ARP and IP Forwarding

📚 Source: Network Reference Model

⭐ ARP (Address Resolution Protocol)

 Maps IP address → MAC address

 Steps:

1. ARP Request (broadcast): "Who has this IP?"

2. ARP Reply (unicast): "I have it, here is my MAC"

3. Entry stored in ARP table (valid ~180s)

⭐ IP Forwarding

 Router checks destination IP

 Searches routing table

 Forwards to next hop

 Rewrites Layer 2 frame with next-hop MAC


📌 Key exam point:
→ Routers forward based on IP, not MAC.

7. Huawei VRP System Basics

📚 Source: Huawei VRP Basics

⭐ VRP = Huawei’s operating system (Versatile Routing Platform)

Used on switches, routers, firewalls.

⭐ Device Startup

1. BootROM performs hardware initialization

2. VRP system software loads

3. Configuration file applied from flash

⭐ Storage Types

 Flash → system software + configuration

 NVRAM → system parameters

 SD card (some models)

 USB (external storage)

⭐ Access Methods

 Console (local setup)

 Telnet (remote unencrypted)

 SSH (secure remote login)

VRP has evolved through many versions:


VRP 1 → VRP 5 → VRP 8 (current generation)

VRP Boot Process (Important for ICT)

When a Huawei device powers on:

Step 1 — BootROM loads

Performs:

 Hardware initialization

 System checks

 Basic diagnostics
Step 2 — System Software Loads

Loads VRP from flash memory into RAM.

Step 3 — Configuration File Loads

Applies the startup configuration file (usually [Link] or [Link]).

Step 4 — Device becomes operational

Interfaces come up, routing protocols start, CLI available.

VTYs are configured under:

user-interface vty 0 4

VRP User Levels (Very Important!)

Huawei defines 16 user privilege levels (0–15).


They group them into 4 categories:

Level Range Name Description

0 Visit Level Only basic commands (ping, display)

1 Monitoring Level Show commands only

2 Configuration Can configure system


Level

3–15 Management Level Full control (admin)

Most devices use:

 Level 0 → guest

 Level 1 → operator

 Level 15 → admin (super user)

You can see your level with:

display user-interface

🔷 Flash Memory

Stores:
 System software (.cc or .bin files)

 Startup configuration ([Link])

 Logs

 Backups

List files with:

dir

🔷 Startup File

The OS reads this file at boot:

[Link]

You can set startup configuration with:

startup saved-configuration default

🔷 Backup Configuration

You can export configs to:

 USB

 TFTP

 FTP

Example:

tftp [Link] put [Link]

8. Huawei CLI Essentials

📚 Source: Huawei VRP Basics

⭐ Enter System View

<Huawei> system-view

[Huawei]

⭐ Change Device Name

[Huawei] sysname R1
⭐ Configure an Interface

[Huawei] interface GigabitEthernet 0/0/1

[Huawei-GE0/0/1] ip address [Link] 24

⭐ Save Configuration

<Huawei> save

⭐ Show Current Configuration

<Huawei> display current-configuration

⭐ Remove a Configuration (undo)

undo ip address

undo sysname

⭐ Help System

 ? → show possible commands

 Tab → auto-complete commands

9. What You MUST Know for the ICT Datacom Exam

✓ OSI & TCP/IP models

✓ How data flows through layers

✓ ARP, ICMP, IP forwarding

✓ Switch vs Router roles

✓ TCP handshake & reliability mechanisms

✓ Network topologies (star, ring, mesh…)

✓ Basic VRP commands

✓ Interface configuration + display commands

Master these → you pass Datacom Basics with confidence.

✔ How switching works:

Switches maintain a MAC address table.

Incoming Frame Action


If MAC is known Forward out specific port

If MAC unknown Broadcast (flooding)

If MAC is local Drop (when a frame is received from a port and the
destination device is located on the same port)

Huawei categorizes wireless devices as:

 AP (Access Point) → provides Wi-Fi

 AC (Access Controller) → manages APs

✔ Two types of APs

1️⃣ Fat AP

 Works independently

 Handles all wireless functions

 Used in small networks

2️⃣ Fit AP

 Lightweight AP that requires an AC

 AC handles:

o Authentication

o Channel management

o Roaming

o Configuration

Used in enterprise networks.

✔ AC (Access Controller)

Think of AC as the "brain" of the WLAN.

It controls:

 AP configuration

 Radio resource management

 Load balancing

 Roaming
 Security policies

The AP only handles the radio signals.

Let’s visualize Huawei’s typical enterprise network:

[Internet]

Firewall (security zone boundary)

Router (routing + NAT)

Core Switch (L3)

Aggregation Switch (optional)

Access Switch (L2) → PCs, servers, phones

Wireless APs controlled by AC

PDU: Protocol Data Unit

Layer 4 : TCP – segment , UDP – Datagram

Layer 3 : Packet

Layer 2 : Frame

Layer 1 : bits

Common questions

Powered by AI

TCP (Transmission Control Protocol) is a connection-oriented protocol that ensures reliable data transmission through error detection and acknowledgment features. It establishes a connection via a three-way handshake, monitors packet delivery with sequence and acknowledgment numbers, and adjusts flow control using a sliding window. UDP (User Datagram Protocol), on the other hand, is connectionless and does not guarantee delivery, order, or integrity, which makes it faster but less reliable. TCP is suited for applications requiring high reliability like web browsing and email, while UDP is preferred in real-time applications such as video streaming and online games where speed takes precedence over reliability .

Huawei's VRP enhances operation efficiency by integrating a versatile set of functions tailored for routers, switches, and firewalls, thus standardizing configuration and management across different network devices. VRP's structured boot process ensures quick and reliable device startup, while its user interface levels facilitate scalable access control and management. Furthermore, its robust CLI commands empower administrators to efficiently configure, monitor, and troubleshoot devices, thereby ensuring optimized network performance and reducing downtime .

Access Controllers (AC) significantly improve the management of wireless networks, especially in large enterprise settings, by centralizing control over various aspects of wireless connectivity. ACs manage authentication, channel allocation, and roaming configurations, which helps maintain consistent performance and security across connected devices. They streamline wireless operations via load balancing and enforce security policies, enhancing both the reliability and scalability of the network. This centralized management reduces administrative overhead and allows for easier updates and troubleshooting, which is crucial in dynamic and high-density environments .

The ICMP protocol is instrumental for network diagnostics as it provides essential tools for detecting and reporting network communication issues. It is used by diagnostic applications like ping and traceroute to test connectivity, measure round-trip time, and discover the route taken by packets through the network. ICMP's error messaging abilities help network administrators identify unreachable hosts, network congestion, and packet transmission failures, thus playing a vital role in maintaining efficient and reliable network operations .

Understanding the TCP/IP and OSI models is critically beneficial for preparing for ICT datacom exams as they provide foundational frameworks that describe how various network protocols and processes function. Familiarity with these models aids in mapping and conceptualizing the tasks of network communication layers, improving one's ability to solve practical networking problems. This knowledge supports the identification of protocols applicable at each layer and comprehends their role in data transmission, which is often tested in exams. Furthermore, this understanding allows for predicting traffic flows, optimizing configurations, and effectively troubleshooting network issues .

DHCP (Dynamic Host Configuration Protocol) and DNS (Domain Name System) are crucial for network management and user convenience. DHCP automates IP address assignment, simplifying device configuration and ensuring efficient utilization of IP address spaces by dynamically allocating and reclaiming IPs as devices connect and disconnect. DNS translates human-readable domain names into IP addresses, making it possible for users to access network resources like websites without needing to remember numerical IP addresses. Both protocols enhance network functionality by streamlining communication and improving accessibility and configuration .

VLANs improve network performance and security by segmenting a single broadcast domain into multiple logical networks, which reduces multicast and broadcast traffic within each VLAN. This segmentation enhances performance by minimizing unnecessary traffic and thereby preventing network congestion. From a security perspective, VLANs create isolated environments in which sensitive data can be restricted to specific network segments, reducing the risk of unauthorized access or data leakage .

Encapsulation is the process of adding headers and trailers around the payload data to ensure data is properly packaged for transmission through the network. This step is essential because the headers contain control information such as addresses and protocol identifiers that facilitate the accurate delivery of data, while trailers may contain error-checking data. It enables data to be multiplexed and demultiplexed efficiently across networks, ensures integrity during transfer, and helps manage data flow and error handling .

The OSI model divides network functionality into seven layers, providing a clear framework for troubleshooting. By isolating issues to specific layers—Physical, Data Link, Network, Transport, Session, Presentation, and Application—technicians can systematically diagnose problems. For example, determining whether an issue is related to networking software versus hardware can be done by understanding which layer the problem resides in. This structured approach aids in efficient resolution of issues, improving overall communication reliability .

A switch minimizes unnecessary traffic within a LAN by maintaining a MAC address table, allowing it to forward frames only to specific ports where the destination devices are located instead of broadcasting to all ports. This targeted forwarding reduces the amount of unnecessary traffic, thereby optimizing the network's efficiency. Additionally, switches can configure VLANs to further isolate traffic into different broadcast domains, enhancing performance and reducing congestion .

You might also like