1.
Data Communication
Network Basics
1. Basic Concepts of Data Communication
Communication is the transfer and exchange of information between
people, or between people and devices, through a specific medium.
Network communication refers to the communication between terminal
devices over a computer network.
Examples:
Two computers connected via a network cable.
Multiple computers connected through a router or switch.
A computer downloading files via the Internet.
Analogy with Express Delivery:
Just like express delivery involves packaging, labeling, and sending
items to a destination, network communication involves packaging
data (called encapsulation) with headers and tails, attaching destination
addresses, and sending it through networks (routers and switches).
Data is forwarded to the destination, much like a package reaching its
consignee after being sorted and routed through distribution centers.
2. Data Transfer Process
Encapsulation: Data is packaged with additional information (headers and
tails) at each layer of the communication process.
Decapsulation: The reverse process, where the headers and tails are
removed at the destination to retrieve the original data.
Steps in the Data Transfer Process:
1. Data Payload: The core information to be transmitted.
1. Data Communication Network Basics 1
2. Packet: A data unit composed of a header, payload, and sometimes a
tail.
3. Header: Information added before the payload to help with transmission
(e.g., the destination address).
4. Tail: Information added after the payload to help complete the
transmission (optional for some packets).
5. Gateway: A device that handles routing, protocol conversion, and data
exchange between networks.
6. Router: Selects the best path for data packets to reach their destination.
3. Network Devices and Basic Functions
Terminal Devices: These are the endpoints of data communication (e.g.,
computers, servers, mobile phones).
Switch:
A network device that connects terminals in a Layer 2 network
(Ethernet switches).
Functions: Data frame switching, providing access to end-user devices,
basic access security, and Layer 2 link redundancy (broadcast
domains).
Router:
A Layer 3 network device that forwards packets across different
networks.
Functions: Maintains routing tables, selects paths, performs network
address translation (NAT), isolates broadcast domains, and provides
WAN access.
Firewall:
A security device placed between two networks with different trust
levels (e.g., between a company's internal network and the Internet).
Functions: Controls data flow between networks, implements security
policies, provides access control, user authentication, remote access,
VPN services, and NAT.
1. Data Communication Network Basics 2
Wireless LAN (WLAN) Devices:
Access Controllers (ACs) provide high-speed, secure WLAN services.
Fit Access Points (APs) offer wireless connectivity and are managed by
ACs to provide robust WLAN control.
4. Network Type and Topology Type
Network Types:
LAN (Local Area Network): Covers a small area (e.g., a building or
campus), typically using Ethernet and Wi-Fi technologies.
MAN (Metropolitan Area Network): Covers a larger area, like a city or
campus, often using high-speed Ethernet and WiMAX.
WAN (Wide Area Network): Connects large geographical areas, such
as multiple cities or countries (e.g., the Internet).
Network Topologies:
Star: All devices connect through a central node (e.g., a switch).
Pros: Easy to monitor and expand.
Cons: Central node failure affects the entire network.
Bus: Devices are connected along a single cable (e.g., coaxial cable).
Pros: Simple installation, minimal cable use.
Cons: A cable fault can disrupt the entire network; less secure.
Ring: Devices form a closed loop, with data circulating through the ring.
Pros: Saves cable resources.
Cons: Adding new devices is difficult, as the ring must be broken.
Other topologies include tree, full-mesh, and partial-mesh, each with different
levels of redundancy and complexity depending on the network design.
5. Network Engineering
Network Engineering involves planning, designing, implementing,
troubleshooting, and maintaining networks. The goal is to create cost-
1. Data Communication Network Basics 3
effective and efficient network solutions that meet the user’s requirements.
This includes:
Routing and Switching: Implementing configurations and optimizing
traffic flow.
Wireless: Managing Wi-Fi networks for seamless communication.
Security: Setting up firewalls, access control lists (ACLs), and
encryption.
Storage: Ensuring that data is stored and retrieved efficiently.
6. Network Engineers
Role: Network engineers are responsible for implementing and managing
network infrastructures. They possess strong technical skills and must
understand routing, switching, network security, and wireless technologies.
Responsibilities:
Develop project plans and solutions.
Ensure timely and successful implementation.
Provide stakeholder training and deliver documentation after project
completion.
Core Competencies include technical knowledge, communication skills,
problem-solving, and industry expertise. Engineers must also maintain strong
teamwork, service awareness, and adaptability to evolving technologies.
1. Data Communication Network Basics 4
2. Network Reference Model
1. What is Data and Data Transfer
In the digital age, data represents information such as text, images, and
videos in binary form (0s and 1s) that computers can process.
For applications to use and transmit this information, it must first be
translated into data using specific rules.
Data transfer is the process of transmitting this data between devices
across a network.
The process involves encapsulation at each layer and decapsulation at the
receiving device to retrieve the original data.
2. Common Standard Protocols
Standard protocols are rules governing data transmission over a network.
They ensure interoperability and proper data flow between devices, with
each layer of the network model using Packet Data Units (PDUs).
Common standardization organizations include:
IETF: Develops and promotes TCP/IP protocols.
IEEE: Responsible for Ethernet and Wi-Fi standards.
ISO: Created the OSI model, a key reference for networking standards.
Common Protocols by Layer:
Application Layer:
HTTP, FTP, DNS, SMTP, Telnet, TFTP, SNMP, DHCP.
Transport Layer:
TCP (reliable, connection-oriented communication), UDP
(connectionless, faster, but unreliable).
Network Layer:
2. Network Reference Model 1
IP (addressing and forwarding), ICMP (control and diagnostics), IGMP
(multicast management).
Data Link Layer:
Ethernet (used in LANs), PPP (used in WANs), PPPoE (for connecting
multiple hosts to a concentrator).
3. Layered Model Concept
The layered model organizes the functions of network protocols into
different layers, simplifying development and troubleshooting while
promoting standardization.
Key Benefits:
Simplified Development: Clear divisions allow developers to focus on
specific layers.
Industry Standardization: Functions are defined by international
bodies, ensuring compatibility across networks.
Improved Compatibility: Layers provide interfaces to ensure
communication between different hardware and software.
The two most common models are:
OSI Model (7 layers): Physical, Data Link, Network, Transport, Session,
Presentation, Application.
TCP/IP Model (4 layers): Network Access, Internet, Transport, Application.
4. OSI Model
The Seven Layers of the OSI Model:
1. Physical Layer:
Responsible for the transmission of raw bitstreams (0s and 1s) over a
physical medium like cables, fiber optics, or wireless.
Defines electrical and physical specifications (e.g., voltage levels, cable
types, and pin configurations).
2. Network Reference Model 2
2. Data Link Layer:
Encapsulates data packets into frames and controls how data is placed
onto the physical medium.
Provides error detection and correction using techniques like
checksums.
Uses MAC addresses to identify devices on the same network segment.
3. Network Layer:
Defines logical addressing (e.g., IP addresses) and determines the best
path for data to travel between networks.
Routers operate at this layer, handling data routing from source to
destination.
4. Transport Layer:
Manages end-to-end communication between devices. It ensures
reliable data transmission (via protocols like TCP) or provides faster, but
less reliable, communication (via protocols like UDP).
Responsible for error checking, flow control, and data sequencing.
5. Session Layer:
Establishes, manages, and terminates sessions or connections between
applications on different devices.
Coordinates communication between systems and maintains sessions,
even when interruptions occur.
6. Presentation Layer:
Translates data formats so that the application layer of one system can
understand the data from another system.
Provides functions like data encryption, compression, and translation
(e.g., converting from ASCII to EBCDIC).
7. Application Layer:
The layer closest to the end user, providing network services directly to
applications (e.g., web browsers, email clients).
Examples include HTTP, FTP, SMTP, and DNS.
2. Network Reference Model 3
5. TCP/IP Model
The Layers of the TCP/IP Model:
1. Network Access Layer:
Combines the physical and data link layers of the OSI model.
Manages the transmission of data between devices on the same
network, handling physical transmission and data framing.
2. Internet Layer:
Equivalent to the network layer of the OSI model.
Responsible for logical addressing and routing, using IP addresses to
move packets from source to destination across different networks.
3. Host-to-Host Layer (Transport Layer):
Combines the transport layer functions from the OSI model, ensuring
reliable communication between devices.
Manages data flow control, error checking, and packet retransmission
(e.g., using TCP for reliability and UDP for speed).
4. Application Layer:
Combines the functions of the session, presentation, and application
layers from the OSI model.
Directly supports application-level functions, including protocols like
HTTP, FTP, and DNS.
Differences Between OSI and TCP/IP Models
The OSI model is a conceptual framework with seven distinct layers, while
the TCP/IP model is a practical implementation with four layers.
The TCP/IP model is more widely used due to its direct relevance to Internet
protocols like TCP and IP.
The OSI model separates network functions in detail, which is useful for
understanding specific aspects of network communication, but the TCP/IP
model simplifies this into fewer layers.
2. Network Reference Model 4
6. Application Layer and Related Protocols
Purpose:
The application layer provides interfaces and protocols for applications
to use network services, such as file transfer, remote login, and web
browsing.
PDU (Protocol Data Unit):
At the application layer, data is referred to simply as "data" and contains
information relevant to the specific application protocol in use.
Communication Structure:
It often uses the client/server model, where a client (requesting service)
communicates with a server (providing service) using defined
protocols.
i. FTP (File Transfer Protocol)
Purpose:
FTP is used for transferring files between computers over a network,
allowing users to download and upload files.
Structure: FTP follows a Client/Server (C/S) architecture.
FTP Client: The client software allows users to connect to an FTP
server, authenticate, and operate files (e.g., uploading, downloading,
renaming).
FTP Server: The server hosts files and manages client access. It listens
for incoming client connections, authenticates users, and provides
access to stored files.
Ports: FTP uses TCP ports 20 (data transfer) and 21 (control commands).
Usage: Often used in website management, software distribution, and
backup systems.
ii. Telnet
2. Network Reference Model 5
Purpose: Telnet provides a standard protocol for remote login, allowing
users to operate devices or servers remotely as if they were physically
present.
Structure:
A Telnet client is installed on a local PC, allowing the user to connect to
a remote Telnet server.
The Telnet server runs on the remote device, processing commands
received from the client as if they were entered directly on the server’s
console.
Ports: Telnet operates over TCP port 23.
Security Considerations: Telnet transmits data, including login credentials,
in plain text, which is insecure. SSH (Secure Shell) is often preferred as a
secure alternative.
Usage: Telnet is useful for managing network devices like routers and
switches, but its use is limited today due to security concerns.
iii. HTTP (HyperText Transfer Protocol)
Purpose: It is used to transmit hypertext documents (e.g., HTML) and
multimedia resources between web servers and clients (browsers).
Structure: HTTP operates using the client/server model:
HTTP Client: Usually a web browser, which sends requests to a web
server.
HTTP Server: Responds to client requests by delivering web pages,
files, or other resources.
Ports: HTTP typically uses TCP port 80. HTTPS operates on TCP port 443.
Usage: HTTP is used for browsing websites, accessing APIs, and
transferring web data.
7. Transport Layer and Related Protocols
Role: The transport layer receives data from application layer protocols and
encapsulates it with transport-layer protocol headers, enabling end-to-end
2. Network Reference Model 6
(port-to-port) connections.
PDU: At the transport layer, PDUs are called segments (for TCP) or
datagrams (for UDP).
i. TCP (Transmission Control Protocol):
Connection-Oriented: TCP establishes a connection before data transfer
using a three-way handshake.
Reliable: TCP ensures that all segments are delivered in sequence and
without errors using acknowledgments and retransmission mechanisms.
Header Details:
Source Port (16 bits): The port number of the application sending the
segment.
Destination Port (16 bits): The port number of the application receiving
the segment.
Sequence Number (32 bits): Used to keep track of data byte order.
Acknowledgment Number (32 bits): Indicates the next expected byte
from the other party.
Header Length (4 bits): Specifies the size of the TCP header.
Control Bits (Flags): Includes SYN, ACK, FIN, etc., to manage the state
of the connection.
Window Size (16 bits): Controls flow by specifying how much data the
receiver can accept.
Checksum (16 bits): Ensures data integrity.
Urgent Pointer (16 bits): Indicates urgent data if the URG flag is set.
Options: Optional fields (up to 40 bytes) used for additional features
like maximum segment size.
ii. UDP (User Datagram Protocol):
Connectionless: UDP sends data without establishing a connection,
making it faster but less reliable.
Header Details:
2. Network Reference Model 7
Source Port (16 bits): The port number of the application sending the
datagram.
Destination Port (16 bits): The port number of the application receiving
the datagram.
Length (16 bits): The total length of the UDP header and data.
Checksum (16 bits): Provides data integrity verification.
Use Cases: Best for time-sensitive applications like video streaming or
gaming, where speed is more critical than reliability.
TCP Connection Setup - Three-Way Handshake
TCP uses a three-step process to establish a connection:
1. SYN (Synchronization) Packet:
Client → Server: The client sends a TCP segment with the SYN flag set.
This segment indicates that the client wants to establish a connection
and begins the process.
Sequence Number: The client includes an initial sequence number ( a ),
which is a randomly generated 32-bit number.
Acknowledgment Number: Since this is the first segment, the
acknowledgment number is set to 0.
2. SYN-ACK (Synchronization-Acknowledgment) Packet:
Server → Client: The server receives the SYN packet, acknowledges it,
and responds with a TCP segment that has both the SYN and ACK flags
set.
Sequence Number: The server sends its own randomly generated
initial sequence number ( b ).
Acknowledgment Number: The server sets this number to a + 1 to
acknowledge receipt of the client’s SYN segment. This indicates that
the server has received and is expecting the next segment from the
client to begin with sequence number a + 1 .
3. ACK (Acknowledgment) Packet:
Client → Server: After receiving the SYN-ACK packet, the client sends a
final ACK packet to the server.
2. Network Reference Model 8
Sequence Number: The client sets this sequence number to a + 1 ,
which is the next sequence number in line after the original SYN
segment.
Acknowledgment Number: The client sets this to b + 1 to
acknowledge the receipt of the server’s SYN segment.
TCP Sequence and Acknowledgment Numbers
TCP uses sequence and acknowledgment numbers for reliability:
Sequence Numbers: Every byte in the data stream is numbered. The
segment's sequence number indicates the first byte in that segment.
Acknowledgment Numbers: After receiving a segment, the receiver
acknowledges it by sending the next expected sequence number. This
ensures data is received in the correct order.
TCP Sliding Window Mechanism
The sliding window controls data flow to match the receiver’s buffer size,
ensuring efficient data transfer:
1. Window Initialization:
During the TCP handshake, both the sender and receiver negotiate the
window size.
The receiver specifies the maximum number of bytes it can receive and
store in its buffer at one time.
This value is communicated to the sender in the Window Size field of
the TCP header
2. Data Transmission: The sender transmits data up to the window size
advertised by the receiver.
3. Acknowledgment and Window Adjustment:
The receiver stores incoming data in its buffer and updates the window
size as it processes the data.
As the receiver receives data, it sends back an acknowledgment (ACK)
to the sender, indicating the next expected sequence number. This tells
the sender that all bytes up to that sequence number have been
successfully received.
2. Network Reference Model 9
4. Sliding the Window
As the sender receives acknowledgments, it "slides" the window
forward, allowing it to send more data.
TCP dynamically adjusts the window size based on network conditions
and the receiver’s buffer availability:
TCP Connection Termination - Four-Way Handshake
To close a TCP connection, a four-step process is used:
1. FIN from PC1: The client sends a segment with the FIN flag, indicating it
wants to terminate the connection.
2. ACK from PC2: The server acknowledges the FIN with an ACK segment.
3. Data Check and FIN from PC2: If the server has remaining data, it sends it
and then sends a FIN segment. Otherwise, it directly sends the FIN
segment.
4. ACK from PC1: The client acknowledges the FIN, and the connection is
closed.
This four-step process ensures that both sides properly close the connection
and release resources.
8. Network Layer and Related Protocols
The network layer ensures data (packets) is transmitted from one host to
another, across networks. It determines the best path for data to travel and
manages logical addressing and packet forwarding.
PDU: At the network layer, the Protocol Data Units (PDUs) are called
packets.
Key Functions of the Network Layer
1. Logical Addressing:
The network layer assigns logical addresses (IP addresses) to identify
devices on the network.
IP addresses help identify both the source and the destination of each
packet, allowing for communication across different networks.
2. Network Reference Model 10
2. Routing:
The network layer determines the best path for packets to travel from
the source to the destination using routing protocols and routing
tables.
Routers, the devices that operate at this layer, read the destination
address of packets and consult their routing tables to forward packets
toward the destination.
3. Forwarding:
Routers forward packets from one network to another based on routing
information. This involves checking the destination IP address in the
packet header and finding the best match in the routing table.
Network Layer Protocols
1. IPv4 (Internet Protocol Version 4):
IPv4 is the most widely used network layer protocol.
It uses a 32-bit address space, represented in dot-decimal notation
(e.g., 192.168.1.1 ).
IPv4 handles packet encapsulation, addressing, and routing.
2. IPv6 (Internet Protocol Version 6):
IPv6 is the next generation of IP addressing, designed to replace IPv4
due to address exhaustion.
It uses a 128-bit address space, providing a vastly larger number of
addresses.
IPv6 addresses are written in hexadecimal and separated by colons
(e.g., 2001:0db8:85a3:0000:0000:8a2e:0370:7334 ).
3. ICMP (Internet Control Message Protocol):
ICMP helps manage and control the network, providing diagnostic
functions like ping and traceroute.
It is used to report errors (e.g., destination unreachable) and to check
connectivity between devices.
4. IGMP (Internet Group Management Protocol):
2. Network Reference Model 11
IGMP is used for managing multicast group memberships in IPv4
networks. It allows hosts and routers to communicate about multicast
group membership, supporting applications like streaming media.
IP Addresses and Routing
IP Addresses: Each device on a network has a unique IP address used for
identifying it in communication.
Routing Tables: Routers maintain routing tables, which are essentially maps
that determine the best path for packets to reach their destination. Routing
tables are populated using routing protocols
How IP Packets Are Encapsulated and Forwarded
1. Encapsulation:
When the network layer receives data from the transport layer (e.g., a
TCP segment or UDP datagram), it encapsulates this data into an IP
packet.
The IP packet header contains essential information, including:
Source IP Address: The address of the device sending the packet.
Destination IP Address: The address of the target device.
Other fields such as Time-to-Live (TTL) to prevent infinite looping.
2. Packet Forwarding:
Each router the packet encounters along its path reads the destination
IP address and checks its routing table for the best match.
Based on the routing table entry, the router forwards the packet to the
next hop (another router or the final destination).
This process repeats until the packet reaches its destination.
3. Receiving the Packet:
When the packet arrives at the destination host, the network layer
checks if the destination IP matches its own. If it matches, the packet is
passed up to the transport layer for further processing.
9. Data Link Layer and Related Protocols
2. Network Reference Model 12
The Data Link Layer provides communication within a local network.
PDU (Protocol Data Unit): At the data link layer, PDUs are called frames.
Functions of the Data Link Layer
1. Framing:
The data link layer encapsulates network layer packets into frames.
This encapsulation includes adding headers and trailers that contain
information such as the source and destination MAC addresses and
error-checking data.
2. Physical Addressing:
Unlike the network layer, which uses IP addresses, the data link layer
uses MAC (Media Access Control) addresses to identify devices on
the same network segment.
MAC addresses are unique to each network interface card (NIC).
3. Error Control:
Error-checking mechanisms, such as cyclic redundancy checks (CRC),
are added to the frame to detect and potentially correct errors during
transmission.
Data Link Layer Protocols
Ethernet: The most widely used protocol at this layer. It supports multiple
access and operates within a broadcast domain, typically defined as an IP
network segment.
PPP (Point-to-Point Protocol) and PPPoE (PPP over Ethernet): Used in
direct connections like DSL.
Ethernet and MAC Addresses
Ethernet: Functions as a broadcast multiple access protocol, meaning that
when a device sends a frame, it can be received by all devices within the
broadcast domain.
MAC Address: A 48-bit hardware address assigned to the NIC, usually
represented in formats like 48-A4-72-1C-8F-4F . It is used to identify and
2. Network Reference Model 13
communicate with specific devices within the network segment.
ARP (Address Resolution Protocol)
ARP is essential for mapping IP addresses (used at the network layer) to MAC
addresses (used at the data link layer). It enables devices to find the MAC
address corresponding to a given IP address, allowing for proper frame delivery
within the same network segment.
ARP Implementation Process (Steps):
1. ARP Table Lookup:
Before sending a frame, a device (e.g., Host 1) checks its ARP table to
see if it already has the MAC address corresponding to the destination
IP address.
If the MAC address is found in the ARP table, the device uses it to send
the frame. If not, the device initiates an ARP request.
2. Sending an ARP Request:
If the destination MAC address is not in the ARP table, the device sends
an ARP request. This is a broadcast message sent to all devices within
the network segment.
The ARP request contains:
The source MAC and IP addresses (from Host 1).
The target IP address (IP address of Host 2).
The destination MAC address is set to FF-FF-FF-FF-FF-FF (broadcast).
3. Flooding the ARP Request:
The ARP request, encapsulated in an Ethernet frame, is broadcast to all
devices within the network segment. The Ethernet switch forwards the
frame to all ports except the one it was received on.
4. Receiving the ARP Request:
Each device that receives the ARP request checks whether the target IP
address matches its own IP address.
If the IP address matches (e.g., Host 2), the device records the sender's
(Host 1’s) MAC and IP addresses in its ARP table and prepares an ARP
2. Network Reference Model 14
reply.
5. Sending an ARP Reply:
Host 2 sends an ARP reply directly to Host 1. This is a unicast message,
meaning it is sent only to Host 1 (not broadcasted).
The ARP reply includes:
The source MAC and IP addresses (from Host 2).
The destination MAC and IP addresses (for Host 1).
The operation type in the ARP reply is set to “reply.”
6. Forwarding the ARP Reply:
The switch forwards the ARP reply only to Host 1 based on the MAC
address of Host 1 contained in the frame.
7. Updating the ARP Table:
Upon receiving the ARP reply, Host 1 updates its ARP table with the
MAC address of Host 2.
Host 1 now has the MAC address associated with Host 2’s IP address
and can encapsulate this MAC address in the frame header for data
transmission.
ARP Cache
ARP Table: Devices maintain an ARP cache to store IP-to-MAC address
mappings temporarily. This cache helps reduce network traffic by
preventing the need for frequent ARP requests.
Expiration: ARP entries have a validity period (usually around 180 seconds).
After this period, entries are removed, and a new ARP request is necessary
if the device needs to communicate again.
10. Physical Layer and Related Protocols
The Physical Layer deals with the transmission of bitstreams over physical
media like cables or wireless signals. It defines the electrical, optical, and
mechanical properties of data transmission.
PDU (Protocol Data Unit): At the physical layer, the PDUs are called
bitstreams.
2. Network Reference Model 15
Functions of the Physical Layer
1. Bitstream Transmission:
The physical layer is responsible for converting digital data
(bitstreams) into physical signals suitable for the transmission
medium (e.g., electrical signals for copper cables, optical signals for
fiber, or electromagnetic waves for wireless communication).
2. Media and Interface Standardization:
This layer defines the physical characteristics of the transmission
media, such as cable types, connectors, and pin configurations.
It also sets standards for electrical voltages, modulation techniques,
and interface specifications to ensure devices can transmit and
receive data correctly
Common Transmission Media:
Twisted Pairs:
Common in Ethernet networks.
Composed of pairs of wires twisted together to reduce
electromagnetic interference (EMI).
Optical Fibers:
Transmits data as light pulses, providing high-speed and long-
distance communication capabilities.
Serial Cables:
Widely used in WANs (Wide Area Networks) for connecting
devices over long distances.
Wireless Signals:
Uses electromagnetic waves to transmit data through the air.
Commonly used in wireless local area networks (WLANs) and
mobile networks.
11. Data Transfer, Encapsulation, and Decapsulation
Data Transfer: Data moves from one device to another through various
network layers. Each layer adds its own headers to the data, preparing it for
2. Network Reference Model 16
transmission.
Encapsulation: The process of adding headers (and sometimes trailers) to
the data at each layer, such as adding the TCP header at the transport layer
or the IP header at the network layer.
Decapsulation: The reverse of encapsulation, where headers are removed
at each layer on the receiving device to retrieve the original data.
For example, when you access a website, the data (HTML page) is
encapsulated with HTTP, TCP, IP, and Ethernet headers before being
transmitted over the network. At the receiving end, these headers are removed
(decapsulated) layer by layer until the web page data is delivered to your
browser.
2. Network Reference Model 17
3. Huawei VRP Basics
1. Common Network Devices
Huawei VRP is deployed across a wide range of network devices, including:
Routers: Direct data between different networks and select the best paths
for data transmission.
Switches: Primarily work at Layer 2 (Data Link Layer) to forward Ethernet
frames within a LAN.
Firewalls: Enforce network security rules by controlling inbound and
outbound traffic.
These devices use Huawei's VRP to manage communication, security, and
routing functions efficiently.
2. VRP Basics
VRP (Versatile Routing Platform) is Huawei’s proprietary network operating
system used in its datacom devices. It provides a unified management interface
and modular, component-based architecture.
Key Features:
Unified Management Interface: Provides consistent interfaces across
different devices, making management easier.
Control and Forwarding Planes: Separation of control and forwarding
planes enhances performance.
Multi-process Support: VRP 8, the latest version, supports multi-core
CPUs and improves performance by allowing parallel processing.
Evolution of VRP:
VRP1: Used in low-end devices.
VRP3: Introduced distributed architecture for core routers and switches.
VRP5 and VRP8: Improved multi-process capabilities, higher performance,
and broader compatibility across different device types.
3. Huawei VRP Basics 1
3. Device Management Modes
i. Web System
What it is: The web system provides a graphical user interface (GUI) for
device management. This is a visual way to manage the device, making it
user-friendly, especially for beginners or those who prefer visual interfaces.
Functionality: While it offers ease of use, it may not provide access to all
device functions—some advanced features or configurations may not be
available through the web system.
Login Methods:
HTTP: Unencrypted communication, suitable for local and non-critical
environments.
HTTPS: Encrypted and secure, recommended for most environments,
especially when accessing the device remotely.
ii. CLI (Command Line Interface)
What it is: The CLI mode involves using commands directly through a
console to manage and maintain the device. It allows for more refined and
comprehensive management, giving access to advanced features not
available through the web system.
Skill Requirement: Users must be familiar with the device’s commands and
syntax to effectively use the CLI.
Login Methods:
Console Port: Physical access using a console cable for local
management.
Telnet: Remote access method but is not secure (unencrypted).
SSH: Secure remote access method, encrypting communication for
security.
VRP User Interfaces
VRP (Versatile Routing Platform) offers different interfaces to manage and
monitor devices based on how a user accesses the device.
3. Huawei VRP Basics 2
i. Console User Interface
Used for local access when the serial port of a user terminal is directly
connected to the device's console port. This method is often used for initial
configuration or troubleshooting when remote access is not available.
ii. VTY (Virtual Teletype) User Interface
Used for remote access when a user connects to the device via Telnet or
SSH. Once connected, a VTY channel is established, allowing the user to
remotely manage the device.
VRP User Levels
To manage and control user permissions effectively, VRP provides different
user levels and command levels. This segmentation ensures that users have
appropriate permissions based on their role and expertise.
Here’s how the system works:
Command
User Level Name Available Commands
Level
Basic network diagnosis
commands like ping and
tracert , accessing external
0 0 Visit level
devices (e.g., Telnet client
commands), and some display
commands.
System maintenance and
monitoring commands, primarily
1 0 and 1 Monitoring level
used for displaying system
information.
Commands for configuring
services like routing and IP
Configuration
2 0, 1, and 2 settings, providing users with the
level
capability to set up and modify
network services directly.
3-15 0, 1, 2, and 3 Management Comprehensive commands for
level system control, including file
management, FTP, TFTP, user
management, and debugging
commands for advanced
3. Huawei VRP Basics 3
troubleshooting and system
control.
Access Control and Command Permissions
Access Control: The device controls user access by mapping user levels to
command levels. This mapping ensures that users can only access
commands that match their level or lower.
Default User Level Range: By default, user levels range from 0 to 15, and
the command levels range from 0 to 3.
For example:
A user with level 2 can execute commands at levels 0, 1, and 2 but
cannot access level 3 commands.
A higher-level user (like level 3 or above) has access to all commands,
including management and debugging functions.
3. CLI Command Views
Huawei VRP uses a Command-Line Interface (CLI) to manage network
devices. The CLI is structured into hierarchical views, which help navigate
different configuration tasks.
User View: The default view upon login, used for basic commands like ping
and display . No configuration is allowed here.
<Huawei>
System View: Accessed via system-view , this view allows global device
configuration.
<Huawei> system-view
[Huawei]
Interface View: Used to configure specific network interfaces (e.g.,
GigabitEthernet, Serial).
[Huawei] interface GigabitEthernet 0/0/1
3. Huawei VRP Basics 4
[Huawei-GigabitEthernet0/0/1]
Protocol View: Used to configure routing protocols like OSPF or BGP.
[Huawei] ospf 1
[Huawei-ospf-1]
Navigating Views:
system-view : Enter system view from user view.
interface <interface type> <number> : Enter an interface view.
quit : Return to the previous view.
return : Return to the user view.
4. Basic Commands and Function Keys of the CLI
Huawei VRP CLI supports a range of commands for configuring devices. Here
are some essential commands and features:
File System Operation Commands:
pwd : Displays the current directory.
dir : Lists files in the directory.
copy / move : Copies or moves files between directories.
Basic Configuration Commands:
sysname name : Configures the system name.
clock timezone : Sets the time zone.
user-interface vty 0 4 : Configures remote access settings.
interface interface-number : Enters a specific interface for configuration.
ip address ip-address { mask } : Sets the IP address for an interface.
Example:
To set the hostname:
3. Huawei VRP Basics 5
[Huawei] sysname MyRouter
To set an IP address on an interface:
[Huawei] interface GigabitEthernet 0/0/1
[Huawei-GigabitEthernet0/0/1] ip address 192.168.1.1 255.25
5.255.0
VRP8 Specific Commands:
display configuration candidate : Shows uncommitted commands.
display current-configuration : Displays effective settings from the running
configuration database.
Command Help and Navigation:
Backspace: Deletes a character.
?: Displays help or lists available commands.
Ctrl+A: Moves the cursor to the beginning of the line.
Ctrl+E: Moves the cursor to the end of the line.
3. Huawei VRP Basics 6