SlideShare a Scribd company logo
1 of 641
Download to read offline
Data Communication Network Basics
Huawei Confidential
2
Foreword
⚫ A data communication network consists of routers, switches, firewalls, wireless controllers, wireless
access points (APs), personal computers (PCs), network printers, and servers. The most basic function
of a data communication network is to implement data communication.
⚫ Nowadays, the data communication network has become the cornerstone of the intelligent world and
an important support for the digital transformation of enterprises.
⚫ Before grasping an in-depth understanding of products and solutions in the data communication
network field, you are expected to master common basic technologies and familiarize yourself with
basic protocols.
⚫ This course introduces basic knowledge about the data communication network, including basic
concepts of the data communication network, Internet Protocol (IP) routing, Ethernet switching,
network security, wide area network (WAN) technologies, network management and O&M, and
Quality of service (QoS).
Huawei Confidential
3
Objectives
⚫ Upon completion of this course, you will be able to:
 Describe the concepts and functions of the data communication network.
 Describe the common networking architecture of the data communication network.
 Describe common devices of the data communication network as well as their basic
functions and application scenarios.
 Describe the TCP/IP reference model and use this model to analyze the data
encapsulation and decapsulation processes.
 Describe basic concepts related to IP routing, Ethernet switching, network security, WAN
technologies, network management and O&M, and QoS.
Huawei Confidential
4
Contents
1. Basic Concepts of the Data Communication Network
2. IP Routing Basics
3. Ethernet Switching Basics
4. Network Security Overview
5. WAN Technologies
6. Network Management and O&M
7. QoS
Huawei Confidential
5
End-to-End Data Communication Industry
CloudCampus
CloudWAN
General-purpose
computing
Storage
High-performance
computing
Hyper-converged
data
center
network
(DCN)
Network security
End-to-end data communication industry
• The data communication network comprises a variety of data communication devices.
• The data communication network is the cornerstone for the digital world.
Huawei Confidential
6
Concepts of the Data Communication Network
⚫ A data communication network consists of routers, switches, firewalls, wireless controllers, wireless APs, PCs, network printers, and
servers. The most basic function of a data communication network is to implement data communication.
Hotel
AP
Firewall
Switch
Central
AP
RU
Wireless access
controller
(WAC)
Enterprise
Firewall
Switch
AP
Firewall
Switch
Switch Switch
Home network
Campus
network
AR
Micro-sized store
AP
Firewall AR
WAN
Internet WAN
or
Firewall
Switch
Higher
education
institution
AP AP
Switch Switch
Local
DC
DCN Spine
Leaf
Internet
access
zone
Intrusion
prevention
system (IPS)
Firewall
NE router
Production
environment zone
Server
Storage
network
Demilitarized
zone (DMZ)
Huawei Confidential
7
Simplest Data Communication Scenario
Ethernet twisted pair
PC1 PC2
Application layer
Transport layer
Network layer
Data link layer
Physical layer
Application layer
Transport layer
Network layer
Data link layer
Physical layer
IP address
Media access control
(MAC) address
IP address
MAC address
Layer 4 envelope
Transport layer
Layer 3 envelope
Network layer
Layer 2 envelope
Data link layer
Payload
Huawei Confidential
8
Common Network Devices: Campus Switches
• Is used to construct local area networks (LANs).
• Connects terminals (such as PCs and servers) to networks.
• Enables exchanges of Ethernet data frames.
Switch
A campus switch:
Huawei Confidential
9
Common Network Devices: CloudEngine S Series Campus Switches
CloudEngine S series campus switches (fixed) CloudEngine S series campus switches (modular)
CloudEngine S5731-H48T4XC
Viewing product information
CloudEngine S12700E-8
Viewing product information
Main
control
board
Service
board
Switch
fabric unit
(SFU)
Power module
Centralized monitoring unit (CMU)
Huawei Confidential
10
Common Network Devices: Routers
• Is used to connect to different broadcast domains and
IP network segments.
• Maintains routing tables and runs routing protocols to
discover data forwarding paths (routing information).
• Forwards IP packets according to its routing table.
• Connects to a WAN, with functions such as network
address translation and access control.
Router
Internet
A router:
Huawei Confidential
11
Common Network Devices: NetEngine Series Routers
NetEngine access router (AR) NetEngine metro router
NetEngine AR6121
Viewing product information
NetEngine 8000
Viewing product information
Huawei Confidential
12
Common Network Devices: DC Switches
Test environment zone
Production environment zone
Spine
Leaf
Spine
Leaf
Core
Campus access
zone
WAN access
zone
Internet access
zone
Server Server
• Is an Ethernet switch applied in DCs.
• Connects to a myriad of servers, firewalls,
intrusion prevention system (IPS) devices,
and load balancers to meet network
requirements of DCs in the cloud era.
• Is required to provide high performance,
high density, low latency, and large buffer.
• Provides high scalability and supports
large-scale networking through the spine-
leaf architecture
A DC switch:
Huawei Confidential
13
Common Network Devices: CloudEngine Series DC Switches
CloudEngine series DC switches
CloudEngine 12800 and 16800
Viewing product information
CloudEngine 6800
Viewing product information
Huawei Confidential
14
Common Network Devices: Firewalls
Firewall
Untrust zone
Trust zone
DMZ
• Isolates networks of different security levels.
• Implements traffic control (using security policies).
• Implements intrusion prevention, Uniform Resource
Locator (URL) filtering, data filtering, and application
behavior control.
• Implements user identity authentication.
• Implements Remote Authentication Dial In User
Service (RADIUS).
• Implements data encryption and virtual private
network (VPN) services.
• Implements Network Address Translation (NAT) and
other security functions.
Internet
A firewall:
Huawei Confidential
15
Common Network Devices: HiSec Engine USG Series
Firewalls
HiSec Engine unified security gateway (USG) series firewalls
HiSec Engine USG6600E
Viewing product information
Huawei Confidential
16
Common Network Devices: WAC and APs
Fat AP
Internet
• Networking characteristics: Fat APs work
independently and require separate
configurations. Fat APs provide only simple
functions and are cost-effective.
• Applicability: homes, micro-sized stores, etc.
WAC + Fit APs
• Networking characteristics: Fit APs are managed and configured by
the WAC in a unified manner, providing various functions. Fit APs have
high requirements on network maintenance personnel's skills.
• Applicability: medium- and large-sized enterprises
Fat AP
Fit AP
WAC
Huawei Confidential
17
Common Network Devices: WAC and AirEngine APs
WAC
AP
AirEngine 9700-M
Viewing product information
AirEngine 8760-X1-PRO
Viewing product information
Huawei Confidential
18
Network Topology
• Is presented as a structured layout using
transmission media (such as twisted pairs and
optical fibers) to interconnect various devices
(such as computers, routers, and switches).
• Is a very important network concept used to
describe the physical or logical structure of a
network in the network engineering field.
iStack/CSS link
Egress zone
Core layer
Aggregation layer
Access layer
Terminal layer
Internet WAN
Network management
and O&M zone
DC
A network topology:
Huawei Confidential
19
Management Modes for Common Network Devices
Console cable
Console port
Management mode 1: You can log in to a
device through the console port from a PC.
Typically, this method is used in scenarios
where a device is powered on for the first
time.
Management traffic
Management mode 2: You can
remotely manage a device through a
PC using Telnet and secure shell
protocol (SSH), or through a web.
Management traffic
Management mode 3: The network management system
(NMS) remotely manages and delivers configurations to a
device through Telnet, SSH, or Simple Network
Management Protocol (SNMP). On this basis, the
software-defined networking (SDN) controller manages
the device through Network Configuration Protocol
(NETCONF).
Huawei Confidential
20
iMaster NCE
Full-lifecycle automation
Device plug-and-play and self-service
Intelligent closed-loop management based
on big data and AI
Predictive maintenance, solving problems
before customer complaints
All-cloud platform with ultra-large capacity
Ultra-large capacity and elastic scalability
Open programmability-enabled and
scenario-based application ecosystem
Simplified IT application integration based
on Design Studio
Network
automation
Network
intelligence
Development & operations (DevOps)
iMaster NCE
Analysis
Management Control
IT/Operations
support system
(OSS)/Application
Multi-tenant Multi-service Multi-industry
Network
Cloud platform
Huawei Confidential
21
Reference Model in the Data Communication Network
Application layer
Transport layer
Network layer
Data link layer
Physical layer
Contains various types of applications that provide abundant system application interfaces for
users' application software.
Establishes, maintains, and cancels end-to-end data transmission, controls transmission speeds,
and adjusts the data sequences.
Implements end-to-end data transmission between any two nodes based on the network layer
addresses contained in the data.
A logical data link is established between adjacent nodes connected through a physical link to
implement direct data communication in point-to-point (P2P) or point-to-multipoint (P2MP)
mode on the link.
Converts logical 0s and 1s into physical signals (optical/electrical signals) that can be carried by
transmission media, sends and receives physical signals, and transmits physical signals on
transmission media.
1
2
3
4
5
Huawei Confidential
22
Reference Model and Common Protocols in the Data
Communication Network
Application layer
Transport layer
Network layer
Data link layer
Physical layer
Telnet, FTP, TFTP, SNMP, HTTP, Simple Mail Transfer Protocol
(SMTP), DHCP, etc.
Transmission Control Protocol (TCP), User Datagram Protocol
(UDP), etc.
Internet Protocol version 4 (IPv4), Internet Protocol version 6 (IPv6), Internet Control
Message Protocol (ICMP), Internet Control Message Protocol version 6 (ICMPv6), Open
Shortest Path First (OSPF), intermediate system-to-intermediate system (IS-IS), Border
Gateway Protocol (BGP), etc.
Point-to-Point Protocol (PPP), Link Layer Discovery Protocol
(LLDP), Point-to-Point Tunneling Protocol (PPTP), etc.
EIA/TIA-232, etc.
1
2
3
4
5
Huawei Confidential
23
Application Layer
Application
Layer
Transport
Layer
Network
Layer
Data Link
Layer
Physical
Layer
Application layer
Transport layer
Network layer
Data link layer
Physical layer
• The application layer provides interfaces for application software so that
applications can use network services.
• The application layer protocol designates transport layer protocols and ports.
• The protocol data unit (PDU) corresponding to the application layer is called
data, which is also the payload to be transmitted by a network system.
• HTTP (TCP port 80): Hypertext Transfer Protocol, providing web browsing
services
• Telnet (TCP port 23): a remote login protocol, providing remote device
management services
• FTP (TCP port 20 and TCP port 21): File Transfer Protocol, providing file
resource sharing services
• DHCP (UDP port 67 and UDP port 68): Dynamic Host Configuration Protocol,
providing dynamic address management services
• TFTP (UDP port 69): Trivial File Transfer Protocol, providing simple file transfer
services
• ...
Huawei Confidential
24
Transport Layer
Application layer
Transport layer
Network layer
Data link layer
Physical layer
• The transport layer receives data from the application layer,
encapsulates the data with the corresponding transport layer
protocol header, and helps establish an end-to-end connection.
• Typical transport layer protocols include TCP and UDP.
• The PDU corresponding to the transport layer is called segment.
Latest transport layer protocols: Multipath Transmission Control Protocol (MPTCP), data
center TCP (DCTCP), Data Center Quantized Congestion Notification (DCQCN), Quick UDP
Internet Connections (QUIC), etc.
TCP UDP
Connection-oriented Connectionless
Reliable transmission Best-effort transmission
Flow control and window mechanism None
Applications: HTTP, FTP, Telnet, etc. Applications: DNS, SNMP, etc.
Application
Layer
Transport
Layer
Network
Layer
Data Link
Layer
Physical
Layer
Huawei Confidential
25
Transport Layer: Port Number
PC1 PC2
Network
IP address: 1.1.1.1
TCP port 1024 TCP port 1231
HTTP application Telnet
IP address: 2.2.2.2
TCP port 80 TCP port 23
HTTP application Telnet
• Generally, the source port is randomly allocated, while the destination port is specified by the corresponding
application.
• Generally, the source port used by the application client is an idle port whose number is greater than 1023.
• The number of the destination port is the same as that of the listening port of an application (or a service) enabled
on the server. For example, the default port number for HTTP is 80.
Web browser Web server
HTTP payload
Source IP address: 1.1.1.1
Destination IP address:
2.2.2.2
Source port number:
1024
Destination port
number: 80
IP header TCP header
Application
Layer
Transport
Layer
Network
Layer
Data Link
Layer
Physical
Layer
Huawei Confidential
26
Network Layer
Application layer
Transport layer
Network layer
Data link layer
Physical layer
• The transport layer is responsible for connections between nodes, while
the network layer is for end-to-end data transmission from one node
to another and for data forwarding from the source to the destination.
• The PDU corresponding to the network layer is called packet.
• The network layer defines the packet format, provides logical addresses
for nodes, and is responsible for the addressing and routing of data
packets.
IPv4 IPv6
OSPFv2 IS-IS BGP OSPFv3 IPv6 IS-IS BGP4+
Key protocols
Application
Layer
Transport
Layer
Network
Layer
Data Link
Layer
Physical
Layer
Huawei Confidential
27
Network Layer: IPv4 and IPv6 Network Addresses
PC1
1.1.1.1/24
PC2
2.2.2.2/24
IPv4
network
• An IPv4 address identifies a node (or a device interface) on
an IPv4 network.
• An IPv4 address is 32 bits long.
• An IPv4 address is usually represented in dotted decimal
notation.
• A subnet mask of an IPv4 address is 32 bits and can be
expressed in dotted decimal notation or be presented by a
mask length.
• In a subnet mask of an IPv4 address, bits with the value of 1
correspond to the network bits, while bits with the value of 0
the host bits. As such, the network and host bits in an IPv4
address can be identified.
PC1
FC00:1::1/64
PC2
FC00:2::1/64
IPv6
network
• The network addresses used on an IPv6 network are IPv6
addresses.
• An IPv6 address is 128 bits long.
• An IPv6 address is usually expressed in hexadecimal numbers
separated by colons (:).
• An IPv6 address is expressed in the format of IPv6
address/mask length, specifying the mask length of the
network part in the address.
Application
Layer
Transport
Layer
Network
Layer
Data Link
Layer
Physical
Layer
Huawei Confidential
28
Network Layer: Packet Forwarding Based on Network
Addresses
R1
Network
Outbound
Interface
Network A GE1/0/0
… …
… …
Routing table of R1
PC1
Address 1
Payload
Network layer header
PC2
Address 2
• Source network address
• Destination network address
GE1/0/0
Network A
• The network layer header of the
packet sent by the source node
carries the network addresses of the
source and destination nodes of the
packet.
• Routing-capable devices (such as
routers) maintain routing tables.
• When receiving packets, these
devices read the destination
addresses carried in the packets at
the network layer and query the
addresses in their routing tables.
After finding matching entries, the
devices forward the packets
according to the entries.
Application
Layer
Transport
Layer
Network
Layer
Data Link
Layer
Physical
Layer
Huawei Confidential
29
Data Link Layer
Application layer
Transport layer
Network layer
Data link layer
Physical layer
• The data link layer is responsible for data transmission between two
adjacent nodes on a physical link, and provides error notification and
flow control.
• The data link layer encapsulates packets from the network layer into
frames and converts the frames into bits for data transmission at the
physical layer.
• During the assembly of a data frame, the address is written into the
header of the data frame for addressing and forwarding.
• The network layer implements data transmission between any two
nodes on the global network. During this process, data may pass
through multiple links. One basic function of the data link layer is to
transmit data from one node to another adjacent node on these links.
• Common data link layer protocols include LLDP, PPP, and Spanning
Tree Protocol (STP).
• The PDU corresponding to the data link layer is called frame.
Application
Layer
Transport
Layer
Network
Layer
Data Link
Layer
Physical
Layer
Huawei Confidential
30
Data Link Layer: Ethernet
• Ethernet is a well-known and widely used technology defined in IEEE 802.3.
• Currently, network interfaces of PCs comply with the Ethernet standard.
• An address defined in the data link layer is called a MAC address, which is
compulsory for all Ethernet NICs that comply with the IEEE 802 standards.
• A MAC address is 48 bits long and is usually expressed in hexadecimal
format. The following are two examples:
 00-21-0A-B9-DC-79
 0021-0AB9-DC79.
• A device that works at the data link layer, such as an Ethernet switch,
maintains a MAC address table that guides frame forwarding.
Application
Layer
Transport
Layer
Network
Layer
Data Link
Layer
Physical
Layer
Huawei Confidential
31
Physical Layer
Application layer
Transport layer
Network layer
Data link layer
Physical layer
• After data arrives at the physical layer, the physical layer converts a
digital signal into an optical signal, an electrical signal, or an
electromagnetic wave signal based on the physical media.
• The PDU corresponding to the physical layer is called bit.
• The physical layer defines physical features and specifications such as
cables, pins, and ports.
• Common transmission media include Ethernet twisted pairs, optical
fibers, and electromagnetic waves.
Application
Layer
Transport
Layer
Network
Layer
Data Link
Layer
Physical
Layer
Huawei Confidential
32
Encapsulation and Decapsulation During Data Transmission
Application
layer
Transport layer
Network layer
Data link layer
Physical layer
Data payload
101010111100…
PDU
Segment
Packet
Frame
Bit
Data payload
Transport layer
header
Upper-layer
data
IP header
Upper-layer
data
Frame header
Frame
trailer
Data payload
101010111100…
Data payload
Upper-layer data
Upper-layer data
Encapsulation Decapsulation
Huawei Confidential
33
Contents
1. Basic Concepts of the Data Communication Network
2. IP Routing Basics
3. Ethernet Switching Basics
4. Network Security Overview
5. WAN Technologies
6. Network Management and O&M
7. QoS
Huawei Confidential
34
Concepts of Routing
Destination/Mask Protocol Preference Cost Next Hop Interface
192.168.1.0/24 Direct 0 0 192.168.1.254 GE0/0/0
192.168.12.0/24 Direct 0 0 192.168.12.1 GE0/0/2
192.168.2.0/24 OSPF 10 3 192.168.12.2 GE0/0/2
Routing table of R1
R1
PC1
192.168.1.1/24
Data
IP header
PC2
192.168.2.1/24
GE0/0/0
Data submitted by an upper layer
(for example, the transport layer)
is put into an envelope.
Data encapsulation at the network layer
(Source/Destination IP address)
When a router (or a routing-capable device) receives an IP data packet, it searches its routing table for the destination IP
address of the packet and selects an optimal path to forward the packet. This process is called routing.
Huawei Confidential
35
How to Obtain Routing Information
A router forwards packets based on its routing table. To achieve this, the router needs to discover routes. Common
three types of routes are as follows:
GE0/0/0
10.1.1.0/24
20.1.1.0/24
GE0/0/1
GE0/0/1
30.1.1.0/24
40.1.1.0/24
GE0/0/2
Direct route
Route Type
Destination
/Mask
Outbound
Interface
Direct 10.1.1.0/24 GE0/0/0
Direct 20.1.1.0/24 GE0/0/1
Static route Dynamic route
Route
Type
Destination
/Mask
Outbound
Interface
Static 30.1.1.0/24 GE0/0/1
Dynamic routing
protocol: OSPF
Route Type
Destination
/Mask
Outbound
Interface
Dynamic 40.1.1.0/24 GE0/0/2
Direct routes are automatically generated
by devices and point to directly connected
local networks.
Static routes are manually configured by
network administrators.
Dynamic routes are learned by dynamic routing
protocols running on routers.
Huawei Confidential
36
Application Scenarios of Static Routes
GE0/0/1
20.1.1.2/24
GE0/0/0
10.0.0.2/24
GE0/0/1
20.1.1.3/24
GE0/0/0
10.0.0.1/24
Router A Router C
Router B
Destined for
20.1.1.0/24
Destination
Network
Type Next Hop
20.1.1.0 Static 10.0.0.2
10.0.0.0 Direct 10.0.0.1
• Static routes are manually configured by network
administrators. They are easy to configure, have low
system requirements, and apply to stable and small
networks with simple topologies.
• However, static routes cannot automatically adapt
to network topology changes, thus requiring manual
intervention.
• Router A forwards packets destined for 20.1.1.0/24.
As only direct routes are available in the routing
table of Router A, no matching route is found for
packet forwarding. In this case, a static route can be
manually configured so that Router A can forward
packets destined for 20.1.1.0/24 to the next hop
10.0.0.2.
Huawei Confidential
37
Overview of Dynamic Routes
• Dynamic routing protocols can automatically discover and
generate routes, and update routes when the topology
changes. These protocols effectively reduce the workload
of management personnel and are more suitable to large
networks.
Static route
• When the network scale continues to expand, it becomes
increasingly complex to manually configure static routes. In
addition, static routes cannot adapt to network topology
changes in a timely and flexible manner.
Dynamic routing protocol: OSPF
Static route Dynamic route
• Static routes need to
be manually configured
on devices.
• Static routes cannot
adapt to link changes.
• Dynamic routes can be
automatically
discovered and learned.
• Dynamic routes can
adapt to topology
changes.
Huawei Confidential
38
OSPF Application on a Campus Network
Internet
Office building 1 Office building 2 Office building 3
Server cluster
Firewall
Core switch
Aggregation
switch
Aggregation
switch
Aggregation
switch
OSPF is configured on the core switch and
aggregation switches to enable route
reachability on the campus network.
Huawei Confidential
39
Concepts of AS
AS 100
AS 200
• A large number of organizations use IGP routing protocols
such as OSPF and IS-IS on their internal networks. However,
as the network size increases, the number of routes on the
network also rises, thus leading to the failure of IGP to
manage large-scale networks. To solve this issue, the concept
of Autonomous System (AS) emerges.
• An AS consists of a set of devices that are managed by the
same organization and use the same route selection policy.
• Each of these ASs is uniquely identified using an Autonomous
System Number (ASN), which is distributed by the Internet
Assigned Numbers Authority (IANA).
• Which routing protocols should be used to transmit routes
for inter-AS communication?
?
...
...
OSPF
IS-IS
...
...
...
OSPF
...
Huawei Confidential
40
Route Transmission Through BGP
AS 100
OSPFv3 and RIPng AS 200
IS-IS and IPv6
BGP
BGP
• IGP enables a router discover routes to each segment of the local AS, implementing data
communication within the AS.
• On a large-scale network consisting of multiple ASs, an exterior gateway protocol (EGP) is
used to implement route exchange between ASs.
• The Internet is an ultra-large network consisting of multiple ASs. EGP is used on the backbone
nodes of the Internet to implement route exchange between ASs. BGP is the most well-known
and widely used EGP today.
Huawei Confidential
41
BGP Application on Enterprise Networks
Communication within an enterprise network Communication between enterprise and carrier networks
On a large enterprise network, BGP is used for route exchange between the
headquarter and branches. The two parties respectively belong to different
ASs and are deployed by corresponding network management teams.
BGP can be used for route exchange between an enterprise and a carrier
so that both the enterprise network and carrier network can obtain specif
ic routes from each other.
AS 100
AS 200 AS 800
BGP
HQ
Branch Branch
AS 200 AS 800
Carrier X
Enterprise
B
Enterprise
N
BGP
BGP
BGP
Enterprise A
AS 1000
AS 100
Huawei Confidential
42
Contents
1. Basic Concepts of the Data Communication Network
2. IP Routing Basics
3. Ethernet Switching Basics
4. Network Security Overview
5. WAN Technologies
6. Network Management and O&M
7. QoS
Huawei Confidential
43
Ethernet Layer 2 Switching
Core switch
Access switch 1 Access switch 2
Terminal 1
192.168.1.1/24
5469-98AB-0001
Terminal 2
192.168.1.2/24
5469-98AB-0002
Terminal 3
192.168.1.3/24
5469-98AB-0003
Terminal 4
192.168.1.4/24
5469-98AB-0004
Layer 2
communication
Payload
TCP/UDP header
IP
header
Ethernet
header
Ethernet
trailer
Layer 4
header
Layer 3
header
Layer 2
header
Destination
MAC address
Source MAC
address
• Layer 2 switching is a basic function of Ethernet switches.
• Layer 2 switching is a process in which a switch forwards a frame based on
the destination MAC address in the frame's Layer 2 header.
• Each switch maintains a MAC address table for frame forwarding.
• Upon receipt of a frame, a switch reads the frame's destination MAC
address, searches for this MAC address in the local MAC address table, and
then processes the frame accordingly. In addition, the switch learns the
source MAC address of the frame.
Huawei Confidential
44
Ethernet Layer 2 Switching and MAC Address Table
PC1 PC2
IP: 2001:DB8:1::1/64
MAC: 0050-5600-0001
IP: 2001:DB8:1::2/64
MAC: 0050-5600-0002
Source IP address 2001:DB8:1::1
Destination MAC address 0050-5600-0002
Destination IP address 2001:DB8:1::2
Source MAC address 0050-5600-0001
GE0/0/1 GE0/0/2
Source IP address 2001:DB8:1::1
Destination MAC address 0050-5600-0002
Destination IP address 2001:DB8:1::2
Source MAC address 0050-5600-0001
Upon receipt of a frame, a switch
reads the frame's destination MAC
address, searches for this MAC
address in the local MAC address
table, and then processes the
frame accordingly. In addition, the
switch learns the source MAC
address of the frame.
MAC addresses are used to implement data frame addressing and node
identification on the Ethernet.
Huawei Confidential
45
MAC Address Table
PC1
00e0-fc12-3458
Printer
00e0-fc12-3457
GE0/0/1 GE0/0/2
Switch
• A MAC address table records the mapping between the
MAC addresses learned by a switch and the interfaces, and
the VLANs to which the interfaces belong.
• The display mac-address command can be run on the
switch to check its MAC address table.
MAC Address Interface VLAN
00e0-fc12-3458 GE0/0/1 100
00e0-fc12-3457 GE0/0/2 200
Huawei Confidential
46
Why Do We Need VLAN?
Switch
...
PC1
GE0/0/1
PC24
GE0/0/24
PC2
GE0/0/2
PC23
GE0/0/23
PC3
GE0/0/3
Broadcast, unknown unicast, and multicast (BUM) frames
• By default, all interfaces of a switch belong to the same broadcast domain.
• When there are a large number of switches on a network, the broadcast domain becomes
large and the network may be flooded with a myriad of broadcast packets.
• Network units cannot be flexibly planned based on service requirements.
Huawei Confidential
47
VLAN
Virtual Local Area Network (VLAN) technology allows a physical LAN to be divided into multiple logical LANs
(multiple VLANs). Each VLAN functions as a separate broadcast domain, with hosts in the same VLAN able to directly
communicate with one another, while those in different VLANs cannot. As a result, broadcast packets are confined
within a single VLAN.
Switch
...
PC1
GE0/0/1
PC24
GE0/0/24
PC2
GE0/0/2
PC23
GE0/0/23
PC3
GE0/0/3
VLAN10: VLAN for the marketing
department
VLAN20: VLAN for the R&D
department
Huawei Confidential
48
VLAN Communication Across Switches
Tagged frame
(802.1Q tag)
PC4
VLAN10: VLAN
for the
technology
department
PC5
Switch1
GE0/0/4
GE0/0/1 GE0/0/2 GE0/0/3
VLAN10: VLAN for the
technology
department
VLAN20:
VLAN for the
accounting
department
PC1 PC2 PC3
Switch2
GE0/0/4
GE0/0/1 GE0/0/2 GE0/0/3
• To enable a switch to distinguish data frames from different VLANs, you need to add a field that identifies the
VLANs to which the data frames belong.
• As defined by IEEE 802.1Q, a 4-byte VLAN tag is inserted between the Source/Destination MAC address field and
Length/Type field in an Ethernet frame to identify the VLAN to which the frame belongs.
20
Untagged
frame
20
VLAN20:
VLAN for the
accounting
department
Huawei Confidential
49
Types of Layer 2 Ethernet Interfaces
Layer 2 Ethernet interfaces on a switch are classified into the
following types:
• Access: often connects to a terminal such as a user PC or
server. In most cases, access interfaces connecting to the
NICs of such terminals can only receive and send
untagged frames, and an access interface can join only
one VLAN.
• Trunk: allows data frames from multiple VLANs to pass
through. These data frames are differentiated by 802.1Q
tags. A trunk interface is used for connecting switches
and can connect to a sub-interface on a device (such as a
router or firewall).
• Hybrid: allows data frames from multiple VLANs to pass
through. These data frames are differentiated by 802.1Q
tags. The data frames sent from a hybrid interface can be
manually configured to carry tags for some VLANs and
not to carry tags for other VLANs.
Access Trunk
Core switch
Access switch 1 Access switch 2
VLAN 10 (office)
VLAN 20
(monitoring)
Terminal 1
2001:DB8:1::1/64
Terminal 2
2001:DB8:1::2/64
Terminal 3
2001:DB8:1::3/64
Terminal 4
2001:DB8:2::1/64
Huawei Confidential
50
Technical Background: Redundancy and Loops on a Layer 2
Switching Network
The introduction of redundancy brings Layer 2 loops.
Without redundancy design
The access switch has only one uplink.
If this link fails, downstream PCs will
be disconnected.
Access switch
Aggregation
switch
There is only one aggregation switch. If
this switch fails, downstream devices
will be disconnected.
Aggregation
switch
Aggregation
switch
Access switch
Layer 2
loop
Layer 2 loops occur at the
expense of enhanced
network redundancy.
Huawei Confidential
51
Technical Background: Layer 2 Loops Caused by Human Errors
Case 2
Case 1
Layer
2 loop
Layer
2 loop
Some Layer 2 loops may be attributed to human negligence,
for example, incorrect cable connections between devices.
Some Layer 2 loops may be attributed to incorrect
configurations. In this example, the network administrator does
not bundle the links between Switch1 and Switch2 to a logical
link (aggregated link), causing Layer 2 loops.
Switch1
Switch2
Huawei Confidential
52
Problems Caused by Layer 2 Loops
BUM frame
1
2 2
3
3
4
4
Typical problem 2: MAC address flapping
Typical problem 1: broadcast storm
Upon receiving BUM frames, Switch3 floods the frames. The
flooding happens once again after Switch1 and Switch2 receive
the frames, leading to network resource exhaustion and
breakdown.
Switch1 Switch2
Switch3
BUM frame
Source MAC address: 5489-
98EE-788A
1
Switch1 Switch2
Switch3
GE0/0/2
MAC address flapping occurs. For example, Switch1 sees the
MAC address 5489-98EE-788A rapidly changing its location
between GE0/0/1 and GE0/0/2.
Huawei Confidential
53
Spanning Tree Protocol
On a network with a spanning tree protocol, switches exchange BPDUs to calculate a loop-
free network topology. Finally, one or more interfaces on the network are blocked to eliminate loops.
With a spanning
tree protocol
With a spanning
tree protocol
With a spanning
tree protocol
BPDU packet
Switch1
(root)
Switch1 Switch2
Switch3
Switch2
Switch3
An interface is
blocked.
Huawei Confidential
54
Spanning Tree Protocol: Dynamically Responding to Network
Topology Changes and Adjusting Blocked Interfaces
A spanning tree protocol running on a switch continuously monitors the network topology. Upon detecting network
topology changes, the spanning tree protocol can automatically make adjustment.
Therefore, a spanning tree protocol can be used to eliminate Layer 2 loops and also provide a network redundancy
solution.
An interface
is blocked.
A link is faulty.
Switch1 Switch2
Switch3
Switch1 Switch2
Switch3
The interface
is restored.
1
2
3
Huawei Confidential
55
Technical Background: Inter-VLAN Communication
PC1
VLAN 10
PC2
VLAN 10
Layer 2
communication
When PC1 and PC2 belong to the same
VLAN (using the same IP subnet), they
are in the same broadcast domain and
can directly communicate with each
other. This is also known as Layer 2
communication.
PC1
VLAN 10
PC2
VLAN 20
Layer 2
communication
When PC1 and PC2 belong to
different VLANs, they are in different
broadcast domains and cannot
communicate with each other.
PC1
VLAN 10
PC2
VLAN 20
To allow devices in different VLANs
to communicate with each other, a
routing-capable device is used to
implement Layer 3 communication.
Router
Layer 2 switch Layer 2 switch Layer 2 switch
Huawei Confidential
56
Inter-VLAN Communication Using Ethernet Sub-Interfaces
PC1
VLAN 10
192.168.1.1/24
Default gateway:
192.168.1.254
Router
PC2
VLAN 20
192.168.2.1/24
Default gateway:
192.168.2.254
GE0/0/1.1
192.168.1.254
GE0/0/1.2
192.168.2.254
GE0/0/24
Trunk (VLANs 10 and 20)
GE0/0/1
Access (VLAN 10)
GE0/0/2
Access (VLAN 20)
• A router connects to a switch through a physical interface
(GE0/0/1), which allows for the creation of two sub-
interfaces GE0/0/1.1 and GE0/0/1.2 as the default gateways
of VLANs 10 and 20, respectively.
• The sub-interfaces created on a router are used to
implement inter-VLAN communication.
 Sub-interfaces are logical interfaces created based on an
Ethernet interface and are identified by the physical
interface ID and sub-interface ID.
 Based on service requirements, a network administrator
can create multiple sub-interfaces on a physical interface
and configure IP addresses and VLAN IDs for these sub-
interfaces.
Huawei Confidential
57
Layer 3 Switch and VLANIF Interface
• A Layer 2 switch provides only the Layer 2
switching function.
• Apart from providing the Layer 2 switching
function, a Layer 3 switch can implement
routing and forwarding through Layer 3
interfaces (such as VLANIF interfaces).
• A VLANIF interface is a Layer 3 logical
interface that can remove and add VLAN
tags in packets. This allows devices in
different VLANs to communicate with each
other.
• A VLANIF interface number corresponds a
VLAN ID. For example, VLAN 10 corresponds
to VLANIF 10.
Routing module
Switching module
Layer 3 switch
VLANIF 20
192.168.2.254/24
VLANIF 10
192.168.1.254/24
PC1
192.168.1.1/24
Gateway: 192.168.1.254
PC2
192.168.1.2/24
Gateway: 192.168.1.254
PC3
192.168.2.1/24
Gateway: 192.168.2.254
GE0/0/1
(Access, PVID = 10)
GE0/0/2
(Access, PVID = 10)
GE0/0/3
(Access, PVID = 20)
Huawei Confidential
58
Core switch
Access switch 1 Access switch 2
Terminal 1 Terminal 2 Terminal 3 Terminal 4
Internet
• High reliability and high link bandwidth are two
important objectives to achieve on a commercial
network.
• As shown in the figure, if links 1 to 5 are all key
links on the network. How can we ensure the
reliability of these links and improve their
bandwidth?
1 2
3 4
5
How to Improve the Bandwidth and Reliability of Ethernet Links
Huawei Confidential
59
Core switch
Access switch1 Access switch2
Terminal 1 Terminal 2 Terminal 3 Terminal 4
Internet
• Link aggregation is a method of bundling several
physical links into a logical link to increase
bandwidth and reliability.
• These aggregated links are also known as Eth-
Trunks.
Firewall1 Firewall2
GE0/0/1
GE0/0/2
GE0/0/1
GE0/0/2
Eth-Trunk1 Eth-Trunk1
Increased
bandwidth
Higher
reliability
Load balancing
Ethernet Link Aggregation
Huawei Confidential
60
Working Modes of Ethernet Link Aggregation
Switch1 Higher LACP
system priority
Switch2 Lower LACP
system priority
Active interface selected by
Switch1
Active interface elected by
Switch2
Switch2
Switch1
Manual mode LACP mode
• In this mode, an Eth-Trunk interface is manually created and
member interfaces are manually added to the Eth-Trunk interface,
without the use of Link Aggregation Control Protocol (LACP).
• This mode is applicable when high link bandwidth is required
between two directly connected devices that do not support LACP.
• Faults, such as link layer faults and incorrect link connections,
cannot be detected.
• In this mode, LACP is used in link aggregation.
• LACP provides a standard negotiation mechanism for devices to
automatically aggregate multiple links.
• After an aggregated link is formed, LACP maintains the link status
and adjusts or disables link aggregation when the link aggregation
condition changes.
Huawei Confidential
61
iStack and CSS
Stack cable Stack
• Intelligent stack (iStack) is a technology that connects multiple stacking-capable switches through stack
cables to form a logical switch for data forwarding.
• A cluster switch system (CSS) combines two clustering-capable switches into a single logical switch.
• Generally, the CSS function is used to set up a stack of modular switches, while the iStack function a stack of
fixed switches.
iStack CSS
Link aggregation
CSS link
Link
aggregation
Equivalent to
Equivalent to
Huawei Confidential
62
Link Aggregation Application (1/2)
Interface expansion
iStack
• If the port density of an existing switch cannot meet the access
requirements of users, you can deploy new switches and add all
the switches to a stack to increase the number of interfaces.
Bandwidth expansion and redundancy backup
Aggregation
layer
Access
layer
iStack
• To achieve higher uplink bandwidth, you can deploy new switches
and add all the switches to a stack, and bundle physical links of the
member switches into a LAG. This also implements device backup
and inter-device redundancy backup, thus improving reliability.
iStack link
iStack link Eth-Trunk
Access
layer
Huawei Confidential
63
Link Aggregation Application (2/2)
• Two switches on the network set up a CSS to form a single logical switch. The simplified networking does not
require protocols such as Multiple Spanning Tree Protocol (MSTP) and Virtual Router Redundancy Protocol (VRRP),
simplifying network configuration. Additionally, the use of inter-device link aggregation achieves fast convergence
and improves reliability.
MSTP + VRRP
CSS
Aggregation
layer
Access layer
CSS link Eth-Trunk
Huawei Confidential
64
Typical Architecture
iStack
CSS
iStack
iStack
iStack/CSS link
Eth-Trunk
Aggregation layer
Core layer
• Access devices that are geographically close to each other (for
example, access switches in the same building) are virtualized
into one logical device using iStack. This ensures sufficient ports
and simplifies device management.
• Access devices connect to aggregation devices through Eth-
Trunks. The logical network structure is simple, without the use
of STP or VRRP. As such, the network has advantages in high
reliability, high uplink bandwidth, and fast convergence.
• iStack is configured on aggregation switches, and Eth-Trunks
are configured between upstream/downstream switches to
form a reliable and loop-free network.
• The CSS cluster networking is used at the core layer, and Eth-
Trunks are configured between upstream/downstream switches
to form a reliable and loop-free network.
Access layer
Network
Huawei Confidential
65
Contents
1. Basic Concepts of the Data Communication Network
2. IP Routing Basics
3. Ethernet Switching Basics
4. Network Security Overview
5. WAN Technologies
6. Network Management and O&M
7. QoS
Huawei Confidential
66
Firewall: Security Zone
DMZ
GE1/0/5
Server
172.16.1.1/24
Firewall
PC1
192.168.1.1/24
GE1/0/1
Untrust zone
Trust zone
GE1/0/0
Internet
• A security zone, also known as a zone, is a concept of the firewall.
Most security policies are implemented based on security zones.
• A security zone is a collection of networks connected through one or
more interfaces. Users on the networks in a security zone have the
same security attributes.
• Firewall interfaces must be added to security zones. Otherwise, the
firewall cannot work properly.
• Each security zone defines its security level, which is also called
priority. The priority value ranges from 1 to 100. A larger value
indicates a higher security level.
• By default, four security zones are preset on the firewall: Trust,
Untrust, DMZ, and local zones.
• Users can define new security zones as required.
Huawei Confidential
67
Firewall: Security Policy
• The security policy controls traffic forwarding and performs integrated content security detection on traffic.
• The firewall can identify traffic attributes and match the attributes with security policy conditions. If all conditions are matched, the
traffic matches the security policy and the firewall performs the action defined in the security policy.
• Integrated content security detection indicates that the firewall uses the Intelligent Awareness Engine (IAE) to detect and process
traffic contents at one time, implementing content security functions including antivirus, intrusion defense, and URL filtering.
Trust
Internet
Untrust
Security policy
Traffic forwarding control
Content security monitoring
Huawei Confidential
68
NAT
⚫ Network address translation (NAT) is a method of parsing an IP packet header and replacing the
source or destination IP address in the packet header automatically, allowing users on private
networks to access public networks through private IP addresses. Users are unaware of the
translation from a private IP address into a public one.
Data
TCP/UDP header
IP header
Source IP
address
Destination
IP address
Source port
number
Destination
port number
Layer 4 header
Layer 3 header
Common types of NAT are as follows:
• Source IP address-based NAT
 No-port address translation (No-PAT)
 Network address and port translation (NAPT)
• Destination IP address-based NAT
 NAT server
 Destination NAT
Huawei Confidential
69
IPsec VPN
• Enterprise branches can interconnect with each other in various modes, for example, through WAN private lines or
Internet lines.
• Considering costs and requirements, some enterprises choose to use the Internet lines for interconnection, while
security risks may occur. Internet Protocol Security (IPsec) encrypts data packets to ensure secure interconnection
for enterprises.
Internet
VPN
Huawei Confidential
70
Contents
1. Basic Concepts of the Data Communication Network
2. IP Routing Basics
3. Ethernet Switching Basics
4. Network Security Overview
5. WAN Technologies
6. Network Management and O&M
7. QoS
Huawei Confidential
71
WAN
A WAN, short for wide area network, is a network that connects LANs in different areas. A WAN generally covers tens
of kilometers to thousands of kilometers. It can connect multiple regions, cities, and countries, or provide long-distance
communication across several continents, forming an international remote network.
DC
Enterprise
branch
Enterprise
HQ
Residential area
LAN
WAN LAN
Internet
service
provider (ISP)
Huawei Confidential
72
WAN Device Roles
⚫ There are three basic roles of WAN devices: customer edge (CE), provider edge (PE), and provider (P).
 CE: edge devices within a customer network that connect to one or more PEs at a service provider's site.
 PE: edge devices within a service provider network that connect to CEs. PEs are important network nodes that
can connect to both CEs and Ps.
 P: devices within a service provider network that do not directly connect to CEs.
CE
CE
PE
PE
PE
PE
Enterprise A
Enterprise B
P
CE
CE
Enterprise C
Enterprise D
Service provider
Huawei Confidential
73
Traditional IP Routing and Forwarding
Traditional IP routing and forwarding uses the hop-by-hop forwarding mode, in which a packet is decapsulated by all
routers that receive the packet. Each router needs to obtain the network layer information about the packet and
selects routing entries for packet forwarding based on the longest match rule. The repeated processes of packet
decapsulation, routing entry selection, and packet re-encapsulation result in low forwarding performance.
Destination/Mask Protocol Preference Cost Next Hop Interface
192.168.1.0/24 Direct 0 0 192.168.1.254 GE0/0/0
192.168.12.0/24 Direct 0 0 192.168.12.1 GE0/0/2
192.168.2.0/24 OSPF 10 3 192.168.12.2 GE0/0/2
R1 R2 R5 R6
R3
R4
PC1:192.168.1.1/24 PC2:192.168.2.1/24
IGP
G0/0/2
Routing table of R1
Characteristics of traditional IP routing and forwarding:
▫ All routers need to know the network-wide routes.
▫ Traditional IP routing and forwarding is connectionless and
cannot guarantee end-to-end QoS.
IP
address
Data
IP
address
Data
IP
address
Data
IP
address
Data
IP
address
Data
Huawei Confidential
74
MPLS Label-Based Forwarding
⚫ Multiprotocol Label Switching (MPLS) is a
technology applied on IP backbone networks.
⚫ MPLS is a tunneling technology that provides
connection-oriented switching for the network
layer based on IP routing and control protocols,
guaranteeing QoS.
⚫ Local MPLS labels, instead of IP routes, are
searched for to forward packets, greatly improving
forwarding efficiency.
⚫ Labels used in MPLS label-based forwarding can
be manually configured or dynamically allocated
using a label distribution protocol.
IGP
R1 R2
PE
node
R5
PE node
R6
R3
P node
R4
P node
PC1:192.168.1.1/24 PC2:192.168.2.1/24
MPLS domain
IP
address
Data
MPLS Label 1
IP address
Data
MPLS Label 2
IP address
Data
IP
address
Data
IP
address
Data
Huawei Confidential
75
MPLS VPN Overview
MPLS VPN backbone:
a backbone network
built by the service
provider
PE1 P PE2
CE
CE
Site 1 of customer A Site 2 of customer A
Site 1 of customer B Site 2 of customer B
CE
CE
• Customer A and customer B have two sites respectively. Both customers purchase MPLS VPN services from the same service
provider.
• For example, customer A wants to exchange routes between site 1 and site 2 through the MPLS VPN network so that data between
the two sites can be transmitted through the MPLS VPN network. From the perspective of customer A, the logical network is as
follows:
CE
Site 1 of customer A Site 2 of customer A
CE
MPLS VPN network
P
Route to site 1 Route to site 1
Data sent to site 1
Data sent to site 1
Huawei Confidential
76
Contents
1. Basic Concepts of the Data Communication Network
2. IP Routing Basics
3. Ethernet Switching Basics
4. Network Security Overview
5. WAN Technologies
6. Network Management and O&M
7. QoS
Huawei Confidential
77
Network Management
Network management plays an important role on a communications network. It ensures that devices
work properly and the communications network runs properly to provide efficient, reliable, and secure
communications services.
Common enterprise network architecture
Network
administrator
The network administrator manages
and maintains the network for
stable network operations.
Huawei Confidential
78
Network Management Modes
Network administrator Network management station
Web-based
network
management
CLI-based
network
management
SNMP-based
centralized
network
management
Traditional network management
Enterprise resource
planning (ERP)
Network
automation
Network
intelligence
`
Cloud platform
Northbound API
Commercial
application
iMaster NCE
DC Campus WAN Branch
Video
meeting
Advertisement
operations
Office OS
Analysis
Management Control
iMaster NCE-based network management
…
Huawei Confidential
79
Web-Based and CLI-Based Network Management
⚫ CLI-based and web-based network management modes are generally used for managing small-scale networks.
 Network administrators can log in to devices through HTTPS, Telnet, or the console port for device management.
 The two modes are cost-effective, as programs or servers do not need to be installed on networks.
 Network administrators must have a good command of network knowledge and vendor-specific network configuration
commands.
 These modes have great limitations for large-scale networks with a complicated topology.
Network administrator
One-to-one management
Vendor A
Switch
Vendor A
Firewall
Vendor A
AC
Vendor A
Router
Vendor B
Router
Vendor C
Switch
Vendor D
Switch
Huawei Confidential
80
SNMP-Based Centralized Management
⚫ SNMP is a standard network management protocol widely used on TCP/IP networks. It provides a
method for managing NEs through using a central computer (that is, a network management station)
that runs network management software.
NMS Network
administrator
SNMP
packet exchange
One-to-many
management
• Network administrators can use the NMS to
query and modify information, and
troubleshoot faults on any node on
networks, improving work efficiency.
• Network devices of different types and from
different vendors are managed in a unified
manner.
Huawei Confidential
81
Typical SNMP Architecture
• On a network where SNMP is used for network management,
an NMS functions as a network management center and runs a
management process. Each managed device needs to run an
agent process. The management process and agent processes
transmit SNMP messages for communication.
• An NMS is a system that uses SNMP to manage and monitor
network devices and runs on a server.
• Managed devices are devices that are managed by the NMS on
the network.
• Agent processes run on managed devices to maintain the
information data of the managed devices, respond to requests
from the NMS, and report the management data to the NMS.
Network
management process
NMS
Client
Monitor
A GUI is provided.
SNMP packet
Agent
process
Managed device
Agent
process
Managed device
IP network
Agent
process
Managed device
Huawei Confidential
82
SNMP Management Model
• Query/Modify operation:
▫ The NMS sends an SNMP request packet to an agent process.
▫ The agent process searches the MIB on the device for desired
information and sends an SNMP response packet to the NMS.
• Trap operation:
▫ If the trap triggering conditions defined for a module on the
managed device are met, the agent process sends a message to
notify the NMS that a trap has occurred on the device. This
helps network administrators promptly process network faults.
Network
management process
NMS
Agent process
Managed device
Management
information base (MIB)
Managed object
SNMP packet
exchange
Huawei Confidential
83
Huawei iMaster NCE
Huawei iMaster NCE is an intelligent network automation platform that integrates management, control, analysis, and
AI functions.
• iMaster NCE manages and controls:
▫ Traditional devices through traditional technologies such as CLI and
SNMP.
▫ SDN-capable networks through NETCONF (based on the YANG model).
• iMaster NCE collects network data through protocols such as
SNMP and telemetry, performs intelligent big data analysis based
on AI algorithms, and displays device and network status in
multiple dimensions through dashboards and reports, helping
O&M personnel quickly detect and handle device and network
exceptions and ensuring normal running of devices and networks.
Telemetry
Traditional
device
SDN-capable network device
NETCONF/YANG
CLI/SNMP
Unified cloud platform
Management Control Analysis
iMaster NCE
Open API
Intent engine
Cloud platform & applications
Huawei Confidential
84
NETCONF Overview
NETCONF provides a network device management mechanism. You can use NETCONF to add, modify, or delete
configurations of network devices, and obtain configurations and status of network devices.
NETCONF server
Device
Device 1 Device 2 Device 3
Network
NETCONF client
NETCONF
message exchange
NETCONF has three objects:
▫ NETCONF client
▫ NETCONF server
▫ NETCONF message
NETCONF requires
that messages
exchanged between a
client and server be
encoded using XML.
Huawei Confidential
85
Advantages of NETCONF
Description NETCONF SNMP CLI
API type
Machine-machine interface: As the interface definition is
complete and standard, the interface is easy to control and
use.
Machine-
machine
interface
Man-machine
interface
Operation
efficiency
High: Data is modeled based on objects. Only one-time
interaction is required for operations on an object.
Operations such as filtering, batch processing, and packet
splitting are supported.
Medium Low
Scalability Proprietary protocol capabilities can be extended. Weak Minor
Transaction
processing
Supported: transaction processing mechanisms such as trial
running, rollback upon errors, and configuration rollback
are supported.
Not supported
Partially
supported
Secure
transmission
Multiple security protocols: SSH, TLS, Blocks Extensible
Exchange Protocol (BEEP)/TLS, and Simple Object Access
Protocol (SOAP)/HTTP/TLS
Only SNMPv3
supports secure
transmission.
SSH is
supported.
Huawei Confidential
86
Typical NETCONF Interaction
<?xml version="1.0" encoding="UTF-8"?>
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-
id= "101">
<edit-config>
<target>
<running/>
</target>
<config>
Configuration content in XML format
</config>
</edit-config>
</rpc>
This operation is to
modify configurations.
<?xml version="1.0" encoding="UTF-8"?>
<rpc-reply message-id="101"
xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<ok/>
</rpc-reply>
RPC
SSH connection
RPC reply
The modification succeeds.
Huawei Confidential
87
YANG Language Overview
⚫ YANG is a data modeling language that standardizes NETCONF data content.
⚫ A YANG model defines a data hierarchy and can be used for NETCONF-based operations. Objects of data modeling
include configuration data, state data, RPCs, and notifications. This is a complete description of all data transmitted
between a NETCONF client and server.
A data model is an abstraction and expression of data features.
A model is an abstraction and expression of things.
Name, gender,
height, weight, age,
etc.
Person Router
Interface, routing
protocol, IP address,
and routing table,
etc.
Huawei Confidential
88
Telemetry Overview
⚫ Telemetry, also called network telemetry, is a technology that remotely collects data from physical or virtual devices at a high speed.
⚫ Devices periodically send information including interface traffic statistics, CPU usage, and memory usage to collectors in push mode.
Compared with the traditional pull mode (question-answer interaction), the push mode provides faster and real-time data collection.
T < 1s
T > 5 min
"Subscription
and push"
Pull
Telemetry supports data
collection within
subseconds.
SNMP Telemetry
Huawei Confidential
89
Contents
1. Basic Concepts of the Data Communication Network
2. IP Routing Basics
3. Ethernet Switching Basics
4. Network Security Overview
5. WAN Technologies
6. Network Management and O&M
7. QoS
Huawei Confidential
90
Bandwidth/Throughput
• Bandwidth, also called throughput, refers to the maximum number of data bits transmitted between two ends
within a specified period (1 second) or the average rate at which specific data flows are transmitted between two
network nodes.
• Bandwidth is expressed in bit/s.
• In concept, bandwidth can be compared to the volume of water that can flow through a pipe in a water supply
system.
IP network
Huawei Confidential
91
Delay
• A delay refers to the period of time during which a packet is transmitted from a source to its destination.
• Use voice transmission as an example. A delay refers to the period from when words are spoken to when
they are heard. If a long delay occurs, voices become unclear, discontinuous, or interrupted.
• Most users are insensitive to a delay of less than 100 ms. If a delay ranging from 100 ms to 300 ms occurs,
the speaker can sense slight pauses in the responder's reply, which can seem annoying to both. If a delay
greater than 300 ms occurs, both the speaker and responder obviously sense the delay.
IP network
Huawei Confidential
92
Delay Variation: Jitter
• Jitter refers to the difference in delays of packets in the same flow.
• Jitters occur if the period between a device sending a packet and another device receiving the packet differs from
one packet to another in a flow, negatively affecting service qualities.
• Real-time services, such as voice and video services, are highly sensitive to jitters. Voice or video services are
interrupted if packets of these services are sent and received with timing variations.
• Jitters also affect protocol packet transmission. Some protocols send interactive packets at a fixed interval. If the
jitter is too large, protocol flapping occurs. All transmission systems cause a jitter, but the service quality will not be
affected if the jitter does not exceed a specific tolerance. The buffer can overcome the excessive jitter, which,
however, increases the delay.
IP network
Huawei Confidential
93
Packet Loss Rate
IP network
• Slight packet loss does not affect services. For example, the speaker and the responder are unaware of the loss of a
bit or a packet in voice transmission.
• The loss of a bit or a group of packet in video transmission may cause the image on the screen to become garbled
instantly, but the image can be restored quickly. TCP can be used to transmit data to handle slight packet loss as
TCP allows the lost packets to be retransmitted.
• The packet loss rate refers to the percentage of the number of packets lost during data transmission.
Huawei Confidential
94
QoS Specifications of Common Services
Service Type Bandwidth/Throughput Delay Jitter Packet Loss Rate
Delay
Indicator
Jitter
Indicator
Packet Loss
Rate
Indicator
Video
conference and
teleconference
High
Highly
sensitive
Highly sensitive Predictable ≤ 50 ms ≤ 10 ms ≤ 0.1%
E-commerce Medium Sensitive Sensitive
Sensitive,
reliable
transmission
≤ 200 ms ≤ 100 ms
Best-effort
TCP
guarantee
Streaming
media
High
Relatively
sensitive
Relatively sensitive Predictable ≤ 1s ≤ 200 ms ≤ 0.1%
Email and file
transmission
Low Delay-tolerant Jitter-tolerant
Best-effort
transmission
N/A N/A
Best-effort
TCP
guarantee
HTML web page
browsing
Not specific
Relatively
delay-tolerant
Relatively jitter-
tolerant
Best-effort
transmission
N/A N/A N/A
FTP service Medium Sensitive Sensitive
Sensitive,
reliable
transmission
N/A N/A
Best-effort
TCP
guarantee
Huawei Confidential
95
IntServ Service Model
R1 R2
A bandwidth
of 2 Mbit/s is
required.
A bandwidth
of 2 Mbit/s is
required.
A bandwidth
of 2 Mbit/s is
required.
A bandwidth
of 2 Mbit/s is
required.
OK
OK
OK
OK
• Take multiprotocol label switching traffic engineering (MPLS TE) as an example. The IntServ model uses Resource Reservation
Protocol (RSVP) for signaling. Resources such as bandwidth and priority are reserved on a known path, and each network element
along the path must reserve required resources for data flows requiring QoS guarantee. This resource reservation state is called soft
state.
• A soft state is a temporary state that refreshes periodically using RSVP messages. Each network element checks whether sufficient
resources can be reserved based on these RSVP messages. The path is available only when all involved network elements can provide
sufficient resources.
• The IntServ model takes effect only when all nodes on the end-to-end network support the model. Since devices at the core layer,
aggregation layer, and access layer have different functions, the IntServ model is not supported by these devices. Therefore, the
IntServ model cannot be widely used on Internet backbone networks.
Huawei Confidential
96
DiffServ Service Model
Video Video
Data Data
Voice Voice
Service Type Priority
Voice 5
Video 4
Data 0
• In the DiffServ model, edge nodes classify and aggregate traffic. Edge nodes flexibly classify packets based on a combination
of conditions in packets, and then mark the packets with different priorities. Other nodes only need to identify the marked
priorities for resource allocation and traffic control.
• In the DiffServ model, an application does not need to apply for network resources before sending packets and no signaling
protocol is required. The DiffServ model provides differentiated services based on the QoS parameters of each data flow. In
addition, packets are classified into different service levels, and traffic control and forwarding are performed in a
differentiated manner, ensuring end-to-end QoS.
Huawei Confidential
97
General QoS Service Process
Traffic
policing
Data flow
Inbound
interface
Outbound
interface
Traffic
classificati
on
Congestion management
Queue 0
Queue 1
Queue N
...
Other
operations
Congestion
avoidance
Entering a
queue
Leaving the
queue
Scheduling
General principles:
• Traffic classification, traffic marking, and traffic policing are performed in the inbound direction on a service access
interface.
• Traffic shaping is performed in the outbound direction on a service access interface. If packets of various levels are involved,
queue scheduling and a packet discard policy are also required in the outbound direction on the service access interface.
• Congestion management and congestion avoidance are performed in the outbound direction on a network-side interface.
Huawei Confidential
98
Quiz
1. In the network reference model of the data communication network, at which
layer do routing protocols such as OSPF and IS-IS work?
A. Application layer
B. Transport layer
C. Network layer
D. Data link layer
E. Physical layer
Huawei Confidential
99
Summary
⚫ A data communication network comprises multiple types of devices and is deployed with
multiple technologies and network protocols.
⚫ Before grasping an in-depth understanding of products and solutions in the data
communication network field, you are expected to master basic technologies and familiarize
yourself with common data communication devices and basic protocols.
⚫ This course introduces basic knowledge about the data communication network, including
basic concepts of the data communication, IP routing, Ethernet switching, network security,
WAN technologies, network management and O&M, and QoS of the network, laying a solid
foundation for further learning.
Huawei Confidential
100
Thank you.
Huawei Confidential
1
Huawei Enterprise Datacom Network Solutions Overview
⚫ Security Level:
Huawei Confidential
2
Foreword
This document provides an overview of Huawei's datacom business in
the enterprise market, covering Huawei's datacom organizations,
business priorities, major products and solutions, and typical use cases.
Scenario-specific solutions mentioned in this document will be further
detailed in other relevant documents.
Huawei Confidential
3
Objectives
⚫ On completion of this course, you will be able to:
 Understand the scenario classifications and basic concepts of Huawei's
datacom network solutions.
 Learn about the basic concepts, typical architectures, and typical application
scenarios of campus networks, WLANs, data center networks, WANs, and
Network security.
 Gain insight into Huawei's solutions in each scenario.
Huawei Confidential
4
Contents
1. Huawei Enterprise Datacom Business Overview
2. Huawei Enterprise Datacom Network Solutions
3. Success Stories
Huawei Confidential
5
Overview and Objectives
This section describes Huawei's vision for the datacom industry, as well
as R&D organizational structure, R&D investment, and achievements in
each datacom domain.
Huawei Confidential
6
Huawei's Vision for the Datacom Industry: IP on Everything
Connecting
applications
5G
Optical
Copper
Computing power
Intelligence
Data
Connecting
everything
MPLS
IPv6 Enhanced
IPv4
• Ultra-high
bandwidth
• Security
• Ubiquitous
connectivity
• Automation
• Deterministic
quality
• Low latency
Digital
currency
Industrial
control
Medical
data
VR video
e-Government
IP 2030
Delivering the non-stop intelligence and computing power of the intelligent world to everything,
and building ubiquitous intelligent IP connections
IP on Everything
Huawei Confidential
7
Huawei Datacom Product Line: Business Focuses and
Organizational Structure
Enterprise business
The first-choice partner for enterprise and industry digital transformation
Serving global enterprises and industry players
Carrier business
The best strategic partner
Serving global carriers
Backbone
router
Network
management
Metro
router
Campus
network
Data center
network
Network
security
6 domains
Energy
Government Finance Transportation
…
Manufacturing
Education
Huawei Confidential
8
Huawei Keeps Innovating and Advancing Datacom
Technologies, with 26 Years of Expertise
R&D staff
11,000+
scientists and top experts
100+
of annual revenue reinvested into R&D
~15%
research centers worldwide
14
0
10
20
30
40
50
60
70
80
Ethernet FlexE WLAN 5G transport SDN/NFV SRv6 Network
cloudification
Leading contributions to many fields,
including Wi-Fi 6, IPv6 Enhanced, and 400G
Contributions to 550+ IETF RFCs
OpenStack IETF IEEE OPNFV ONAP ITU Broadband Forum
Huawei Confidential
9
12+
Industry standards bodies and
open source organizations
that Huawei has joined
50+
Working groups that Huawei
participates in as chair or higher
IETF RFCs
550+
11,500+
Total patents granted by the
end of 2021
One of top vendors contributing to IETF RFCs
https://www.arkko.com/tools/allstats/ Note: Futurewei is a wholly-owned subsidiary of Huawei.
No. 1 contributions in 6 fields in 2021
• IETF routing domain and O&M domain RFCs
• IEEE 802.11be (Wi-Fi 7) standards
• IEEE 802.3 MAC architecture standards
• IEEE 802.1 TSN standards
• SPN product (including ITU-T) standards
• Mobile bearer network clock standards
49
43
14
20
44
26
0
10
20
30
40
50
60
70
2017 2018 2019 2020 2021
Vendor C
Huawei
Vendor N
Vendor J
Vendor E
Vendor G
Key Player and Contributor: 20 Years of Dedication in Major
IP Standards-Defining Organizations
In 2021, China Communications
Standards Association (CCSA)
released the IPv6 Enhanced standard
system and Huawei helped set up the
IPv6 national standard team.
Huawei Confidential
10
SRv6 is a next-generation protocol for IPv4 and IPv6 evolution. It's also the basis of next-
generation networks. SRv6 is considered as "5G" for IP protocols.
Huawei's more than 10 top experts dedicated to SRv6 standards
Li Zhenbin, Huawei's SRv6 chief expert and also IETF IAB member
IGP for SRv6
BGP for SRv6
SRv6 VPN
PCE for SRv6
SRv6 OAM
SRv6 SFC
SRv6 SD-WAN
SRv6 ANG
models
FPC YANG
models
Hu Zhibo/
Dean Cheng
Mash Chen/
Zhuang Shunwan
Donald Eastlake/
Zhuang Shunwan
Dhruv
Cheng Li
Haoyu Song/Li
Cheng
Linda Dunbar
Hu Zhibo
Wang Zitao
3GPP CT
Chairman
Georg Mayer
SR
pioneer
Stefano. Previdi
SRv6 in
3GPP
Wireless
Li Zhenbin
Wu Qin
Huawei IP
Standards
Representative
IETF
L3SM/L2SM
Chair
SRv6 in
RTG Area
SRv6 in
OPS Area
Transmission
2 2 0 1 1
3
9
3
6 8
12
17
22
25
10
IETF 101 IETF 102 IETF 103 IETF 104 IETF 105
IETF meeting-specific SRv6 standards document
contributions by vendors
Vendor C Huawei Huawei and vendor C*
SRv6 standards document contributions by
vendors
Huawei
Huawei and
vendor C*
Vendor C
Others
Up to 75%
Data as of IETF 105
Leading the SRv6 Standards: 10+ Top Experts, Remarkable
Contributions to 60% of SRv6 Drafts
Huawei Confidential
11
Core Contributor to Wi-Fi 6: No. 1 in Submitted Proposals
Dr. Osama Aboul Magd,
Huawei's top expert, serves
as the Chair of the 802.11ax
standard working group.
Huawei's
contributions
No. 1
Submitting 318 new proposals (15% of the total),
ranking No. 1 among equipment vendors
Holding 18% of global Wi-Fi 6 patents, ranking
No. 1 among equipment vendors
OFDMA
64T64R
Massive-MIMO
3GPP: 5G 256-QAM
IEEE: Wi-Fi 6
8T8R
UL MU-MIMO OFDMA 1024-QAM
Wi-Fi 6 inherits Huawei's 5G technologies, and its key technologies
are derived from Huawei's proposals.
Huawei Confidential
12
AirEngine CloudEngine NetEngine HiSecEngine
Cloud campus
network
Hyper-converged data
center network
Cloud WAN Network security
Huawei Datacom Portfolio: "Four Engines" Products +
Integrated Management, Control, and Analysis Platform
Huawei Confidential
13
Maintaining a Leading Position in the Global Datacom Market
NetEngine
WAN routers
No. 1
in the Chinese enterprise router
market
WAN
* 2017–2021 OMDIA data
CloudEngine
data center switches
No. 1
global shipments of enterprise data
center switch ports
Data center network
CloudEngine S-series
campus switches
No. 1
global shipments of 10/25GE ports
of enterprise campus switches
HiSecEngine
USG series firewalls
No. 1
share in the Chinese hardware
firewall equipment market
Network security
* 2021 Gartner data * 2021 Gartner data * 2021 IDC data
Campus network
Huawei Confidential
14
WAN
A challenger in Gartner
MQ for 5 consecutive years
Network firewall
Cyber security
NetEngine series routers:
Campus network Data center network
AirEngine Wi-Fi 6:
Frost & Sullivan
2021 Global Wi-Fi
6 Market
Leadership Award
A visionary in
Gartner MQ
Huawei's
CloudCampus Solution
2021 Gartner Peer Insights
Customers' Choice
SD-WAN
Data center
switches:
a leader
named by
Forrester
Data center switches:
Frost & Sullivan
2021 Global
Technology
Leadership Award
Interop Best of
Show Award
Huawei CloudFabric
Solution
2021 Gartner Peer Insights
Customers' Choice
Interop Best of
Show Award
Frost & Sullivan
2021 New Product Innovation
Leadership Award
Gartner Peer Insights
Customers' Choice, with the
highest rating
Winning Many Awards and Wide Industry Recognition
Huawei Confidential
15
Cloud Reshapes Enterprise IT Modes and Extends Connectivity,
Driving the Upgrade of the Datacom Industry
cloud
cloud
cloud
PC + mobile terminal + IoT terminal
As-Is: client-server mode To-Be: cloud service mode
Changes in cloud and terminals
drive network upgrades
Server
Campus
office
Campus
production
Campus
assets
PC
Campus
office
Campus
office
Campus
office
Security mode change
Deterministic service quality
Data traffic explosion
Flat network architecture
Expanded management scope
Network boundary extension
Cloud
Hundreds of billion IoT terminal connections by 2025
85% of enterprise applications will be
cloud-based by 2025
Huawei Confidential
16
What is IPv6 Enhanced?
TCP/IP standard model
Application
layer
Transport
layer
Network
layer
Network
interface
layer
Technology
enhancement
IPv6
Enhanced
Innovation directions
IPv6
IPv6
IPv6 Enhanced (Comprehensive Upgrade from IPv6):
Building a Technology Base for Digital Networks
Per-hop latency: best-effort → ~30 µs
+Security +Deterministic quality
+Automation
+Ubiquitous
connectivity
+Low latency
+Ultra-high
bandwidth
100GE → 400GE
Fault recovery: days → minutes
Per-hop jitter:
Not guaranteed → ~20 µs
Threat containment:
days → minutes
Multi-hop to clouds →
one hop to clouds
SRv6
FlexE
Network-security
association
Security knowledge
graph
APN6
In-band flow
measurement
ADN, AI
Non-blocking
interconnection 400GE
One-hop cloud
access
Resource
isolation
Proactive O&M
Cloud-network-
security integration
Application
awareness
IPv6+1.0
Network programmability
SRv6 BE/TE/Policy
IPv6+2.0
Experience assurance capability
FlexE/IFIT/BIER 6/DIP
IPv6+3.0
Application-driven capability
APN6
IPv6
Basic network capabilities
1996–2019 2020–2021 2021–2023 2023–2025
Huawei Confidential
17
Intelligent Cloud-Network, Accelerating Industry Digital
Transformation
Vision
Solution features
Industry-specific
solutions
Theme
Datacom solutions
Cross-industry
solutions
Products
IP on Everything
Bring digital to every person, home, and organization
for a fully connected, intelligent world
Digital Intelligent Service-oriented
Intelligent
cloud-network
@ carrier
Intelligent Cloud-Network, Accelerating Industry Digital Transformation
Intelligent cloud-network solutions
CloudEngine NetEngine HiSecEngine
AirEngine iMaster NCE
CloudWAN 3.0
Cloud WAN (* for the enterprise market)
CloudCampus 3.0
Cloud campus
network
HiSec 3.0
Network security
Intelligent Cloud-Network
(* for the carrier market)
Intelligent
cloud-network
@ governments
Intelligent
cloud-network
@ cities
Intelligent
cloud-network
@ finance
Intelligent
cloud-network
@ mining
Intelligent
cloud-network
@ electric power
Intelligent
cloud-network
@ manufacturing
Intelligent
cloud-network
@ airports
Intelligent
cloud-network
@ education
Intelligent
cloud-network
@ healthcare
CloudFabric 3.0
Hyper-converged data
center network
Huawei Confidential
18
Section Summary
This section describes Huawei's vision for the datacom industry, as well
as R&D organizational structure, R&D investment, and market position
in each datacom domain.
On completion of this section, you will gain a clear consensus on future
datacom network development trends
Huawei Confidential
19
Quiz
1. What are the names of four engines of Huawei datacom? What
product categories do they represent?
2. What is Huawei's vision for the datacom industry?
Huawei Confidential
20
Contents
1. Huawei Enterprise Datacom Business Overview
2. Huawei Enterprise Datacom Network Solutions
3. Success Stories
Huawei Confidential
21
Datacom Accelerates the Flow of Data, Building Global
Digital Network Infrastructures
Global Digital Strategy
Industry digital transformation
Healthcare
Health for all
Healthcare IoT
Medical insurance
network
Digital government
Government
Gov. extranet
Smart city
Manufacturing
Advanced
manufacturing
Manufacturing
Light industry
Strong transportation
Transportation
Railway & urban rail
Roadway
Smart finance
Finance
Bank
Securities & insurance
Education
Educational
modernization
Higher education
Primary & secondary
education
Energy Internet
Energy
Electric power
Oil & gas
Datacom network
Campus network Data center network
Security
Metro network Backbone network
101011110100000101010101011110 0100010101011010111101011101010 0100010101011010111101011101010
1010111101
1010111101
1
0
1
0
1
1
101011
101011
1
0
1
0
1
1
Digital
government
Digital
society
Digital
economy
Digital
economy
Digital
education
Digital
village
Smart
broadband
5G
communications
Digital
technology
Remote
healthcare
Other 11
projects
Digital China
Accelerating digital development
Digital Compass
Shaping Europe's digital future
Smart Africa
Accelerating digital transformation in African
countries
Huawei Confidential
22
Cloud-Network Is the "Power Grid" of the Digital World,
Supplying Non-Stop Digital to Numerous Industries
In the past, electricity drove industrialization. Today, clouds drive digitalization.
0101
0101
Services
Power grid
Power generation
Power consumption
Wind power
Hydropower
Coal power
Government
cloud
Private
cloud
Public
cloud
Cloud-network
supplies
Enterprises
supplies
electric power computing power
Huawei Confidential
23
Huawei Intelligent Cloud-Network: Empowering Enterprise
Digital Development with Data-driven Intelligence
Empowering digital development with data-driven
intelligence
CloudWAN
Cloud WAN
VM
VM
VM
CloudCampus
Cloud campus network
(industrial Internet campus)
AR Switch AP
Network
security
CloudFabric
Hyper-converged DCN
IPv6
Enhanced
Network security
Hyper-converged DCN
Cloud WAN
Cloud campus network
Intelligent resource scheduling, and fault self-healing,
enabling all-Ethernet DCNs
Real-time status visualization, intelligent resource
scheduling, and one-click service subscription, enabling
smooth service cloudification and SLA assurance
Network fault self-healing and open network programmability,
enabling all-scenario data awareness and interaction
Unified cloud-based management, intelligent security
protection, and cloud-network-security integration, ensuring
E2E security for data collection, aggregation, and processing
Intelligent cloud-network solutions
Huawei Confidential
24
(CloudCampus Network)
CloudCampus 3.0
Huawei Confidential
25
Campus Network, a Bridge Between the Physical and
Digital Worlds
Warehousing
campus
Manufacturing
campus
R&D campus
Retail store
Home office
HQ campus
SaaS cloud
Private
cloud
With the further development of wireless, IoT, and cloud on enterprise campuses, IT and OT infrastructures become ubiquitous. As such, enterprises urgently
need to break the boundaries from HQ to branches sites, from workplace to production services, and from fixed to mobile terminals. In this way, cross-regional
remote collaboration, cross-service converged transport, and cross-terminal unified access come true.
Today's campus network is transformed from a service support system into a key production factor to enable efficient flow of enterprise data and services. If
we compare an enterprise as a person, the enterprise's network is the blood vessels while data is the blood that carries oxygen and nutrients. The smooth flow
of blood determines the vitality of the person. Likewise, network quality is crucial to improving enterprise office and production efficiency and attaining
business growth goals.
Huawei Confidential
26
Three Changes Drive Campus Networks Towards the
All-Cloud Era
Service
deployment
Terminal
access
Data flow
Traditional IT IT in the cloud era
Public & private clouds
Local server
...
...
Wi-Fi
IoT
HQ
Branch 1 Branch n
HQ Branch n
Branch 1
Driven by both business and technology, enterprises
are undergoing profound changes to service
deployment modes, data flow scope, and terminal
access modes. As such, campus networks are
marching into the cloud era from the PC era.
• Service deployment (on-premises → public or
private cloud-based): This change brings better
economics and scalability. Users can access and use
services anytime and anywhere.
• Data flow (local data exchange → cross-domain
data exchange): This change helps build a global
enterprise network that enables real-time interaction
between HQ and branches.
• Terminal access (Ethernet cable- or optical fiber-
based wired access → fully-wireless access): This
change removes the restriction of wired access and
enables users and terminals to move freely on demand.
Wired
On-premises →
Cloud-based
Wired →
Wireless
LAN → Cross-
domain
Huawei Confidential
27
Four Challenges Faced by Campus Networks in the
Cloud Era
76% of enterprises are dissatisfied with their
wireless experience, according to IDC:
• Wi-Fi hotspot deployment results in
discontinuous coverage, signal blind spots, and
frequent disconnection during roaming.
• APs interfere with each other, but effective
global optimization methods are unavailable,
resulting in low performance and poor user
experience.
Multi-branch interconnection is a must for midsize
and large enterprises. Today's pain points include:
• Scattered branches, slow private line
provisioning, high cost, complex and error-prone
manual deployment, and difficult service
cloudification
• Poor service experience, lack of service visibility,
network congestion, frequent video buffering
and artifacts, and low user satisfaction
Enterprises of all sizes pursue a campus network that
aligns with business development. But they face the
following challenges:
• Given the influx of terminals, inflexible networks
cannot achieve fast capacity expansion, resulting in
time-consuming terminal onboarding.
• Wi-Fi upgrade is needed, but old Ethernet cables
cannot quickly meet bandwidth needs and re-cabling
is costly.
Coverage hole
Signal interference
Branch Branch
CLI
76% of enterprises require campus network
reconstruction in the next 2 years. But the reality is:
• Planning relies on professional skills. CLI-based
deployment is time-consuming and labor-
intensive. Policy change response is slow and
inefficient.
• The huge number of devices complicates O&M.
SNMP-based management suffers from lack of
visibility, difficult fault locating, and time-
consuming troubleshooting.
Engineers
HQ
WAN
In the cloud era, Wi-Fi is the preferred access mode for terminals. Ubiquitous WLANs are required to ensure terminal access anytime, anywhere.
Furthermore, the influx of terminals calls for flexibly scalable campus networks to quickly adapt to service changes and facilitate rapid terminal
onboarding and service rollout. Data interaction between HQ and branches is also becoming more frequent than ever. In turn, this requires stable,
reliable, and economical connection modes to ensure high-speed and high-quality cross-domain data interaction and collaboration. More efficient
deployment and O&M methods are another urgent needs, as they are crucial to managing numerous devices and user terminals in a more fine-
grained manner. Traditional solutions, however, cannot meet these expectations.
Enterprises are taking strides towards the all-cloud era, rising great challenges to networks
Wi-Fi
discontinuous
networking
Cross-domain
fragile
infrastructure
Cloud
outpacing
network
Difficult
network
scaling
Huawei Confidential
28
CloudCampus 3.0: Fully-Wireless Intelligent Cloud Campus
Network, Inspiring Digital Innovation
L3 autonomous driving
90% fewer complaints
One global network
40% lower private line costs
Low-carbon intelligence
30% smaller energy consumption
of the entire network
Fully-wireless experience
40% higher productivity
SD-WAN
Router
Education Finance
Healthcare Retail MSP
Manufacturing
...
NETCONF/YANG Telemetry
Automated
deployment
Intelligent
O&M
Huawei Confidential
29
Fully-Wireless Experience: Breaking Down Boundaries and
Inspiring Enterprise Innovation
Zero signal blind spot
Unique dynamic-zoom smart antenna
Industry's only to support both omnidirectional and
high-density modes, intelligently adapting to diverse
scenarios and increasing performance by 20%
Zero interruption
during roaming
Unique AI roaming algorithm
70% higher roaming success rate, 30%
larger bandwidth during roaming
Zero packet loss for
intelligent control
First-of-the-kind Wi-Fi 6E network
for smart manufacturing
6 GHz frequency band, ultra-low interference
Air interface slicing: 99.999% @ 10 ms
AG
V
Production line AOI
Wireless extends from workplaces to production environments. How to build a
Wi-Fi 6 network that delivers a continuous experience?
76%
of enterprises are not satisfied
with their WLAN experience.
No signal or
weak signal
Connected
but slow
Roaming with
frequent interruptions
Unstable network
Huawei Confidential
30
Low-Carbon Intelligence: 3 Layers Simplified into 2 Layers,
Entire Network Managed as One Device
Public area Mobile office
Desktop
1/2.5/10GE
Access switch
PoE-out
Core switch
10/25/40GE Central switch
Remote unit
ELV room
Aggregation
switch
Access switch
Central
switch
RU
37%
TCO savings
Low carbon and
energy saving
• Power consumption control and intelligent
hibernation on ports and the entire device
• Fanless design for super quietness, reducing
energy consumption by 30%
Simplified
architecture
• 3 layers → 2 layers, reducing managed
nodes by 80%
• Planning-free, management-free, and
plug-and-play RUs
Service
continuity
• Exclusive optical-electrical PoE + secondary
PoE, ensuring network continuity even
without local mains supply
• Ultra-high bandwidth offered by the hybrid
cable, no cable replacement for 15 years
Network-wide automation |
AI-powered intelligent O&M
Huawei Confidential
31
One network across
geographic locations
Unique "SD-WAN + SRv6",
enabling ultra-fast multi-
branch interconnection
One network on and
off the cloud
One hop cloud access,
multi-cloud
interconnection, ultrafast
cloud access
2x
cloud access
efficiency
5G/MPLS
/Internet
Internet
SaaS
IaaS
One network for
multiple services
Unique free mobility,
security segmentation for
services, consistent user
experience
Public
cloud
Private
cloud
Challenge: difficult cross-
domain interworking
• How to construct production, OA, and IoT networks
in a unified manner?
• How to reduce the costs of branch interconnection
that relies heavily on costly private lines?
• How to improve cloud access efficiency for services
that need to go through HQ?
50%
Lower network
construction costs
40%
Smaller private
line costs
Google
Office 365
VPC
One Global Network: Ubiquitous Connectivity from Any
Branch, for Any User, on Any Terminal
HQ
MPLS
Internet
5G
Remote campus
Branch
SD-WAN
Huawei Confidential
32
L3 Autonomous Driving: Autonomous Driving Network for
Reliable and Stable Services
47%
44.50%
7.50%
1%
是,企业计划近期实现网络自
动化/智能化
是,企业计划3年实现网络自
动化/智能化
是,企业计划3年以上实现网
络自动化/智能化
并不是
Enterprise network automation and intelligence
transformation plan
SD-WAN
Management + control + analysis
Roaming
success rate
50% Terminal
identification
rate
60%
98%
90%
Traditional
solution
Huawei
solution
AirEngine Wi-Fi 6 CloudEngine S switch HiSecEngine firewall
NetEngine AR
Network challenges faced by enterprise
digital transformation
Yes, very soon
Yes, in the next 3 years
Yes, in more than 3 years
No plan
Huawei Confidential
33
Section Summary
This section describes the four differentiators of CloudCampus 3.0: fully-wireless experience,
low-carbon intelligence, one global network, and L3 autonomous driving.
⚫ Fully-wireless experience: Huawei WLAN provides unique features, such as fully-wireless
intelligent continuous networking, dynamic-zoom smart antenna, AI roaming, and Wi-Fi 6
Advanced.
⚫ Low-carbon intelligence: The simplified architecture stands out with super power supply via
hybrid cable and management-free remote units (RUs).
⚫ One global network: SD-WAN helps build one network on and off the cloud.
⚫ L3 autonomous driving: iMaster NCE offers compelling features such as intelligent
verification and application assurance 360.
Huawei Confidential
34
(Hyper-converged DCN)
CloudFabric 3.0
Huawei Confidential
35
Three IT Changes Drive DCNs Towards All-Ethernet
Scale: 100x
Centralized
↓
Distributed
IT
architecture
Computing
unit
Storage
media
PCIe
IB Ethernet
Performance: 100x
or
As-Is To-Be
Capacity: 1000x
SCSI NVMe
FC (32G) RoCE (400G)
PCIe is replaced
HDD → SSD
Ethernet Ethernet
Centralized Distributed
CPU/GPU interconnection
over Ethernet
All-flash storage
interconnection over Ethernet
Server interconnection
over Ethernet
NetApp DELLEMC
Intel Ascend Kirin
Huawei Confidential
36
CloudFabric 3.0 Hyper-converged DCN Solution
Full-lifecycle automation
Reduces TTM by 90%
Network-wide
Intelligent O&M
Proactively predicts 90%
of faults
Improves IOPS by 90%
Unleashes 100% of
computing power
Ethernet for HPC
Multi-cloud
Three characteristics
Core benefits
OpenStack
Kubernetes
FusionSphere
VMware
Network-wide intelligent O&M
• Device-, interface-, optical module-,
network-, and service-level
• Predictive maintenance, zero service
interruption
Full-lifecycle automation
• Automated network planning, construction,
maintenance, and optimization
• Intent-driven network, NaaS
Lossless Ethernet
• Zero packet loss for local and
long-distance transmission
• Convergence of computing and
storage networks
Optimization
Planning
Construction Maintenance
Hyper-Converged DCN
Automation Intelligence
General-purpose
computing Storage HPC
Ethernet for active-active
storage
Huawei Confidential
37
L3.5 Autonomous Driving Network, Accelerating Evolution
Towards Multi-Cloud and Multi-DC
Industry
3.2
3.4
3.6
3.7
3.3
3.6
2.5
2.7
2.9
2.9
2.9
2.7
3.51
2.80
Simulation &
verification
Network
automation
Intelligent fault
remediation
Simulation &
verification
AI inference
Digital twin
Public cloud
Leaf Leaf
Spine Spine
Leaf Leaf
DC 1
Industry cloud
Leaf Leaf
Spine Spine
Leaf Leaf
DC n
Customer service systems and
operation platforms
Northbound: interconnection
with service systems
Southbound:
network-agnostic
2022
OpenStack Kubernetes FusionSphere
Red Hat
Faster
construction
Faster
deployment
Planning +
Design
Deployment +
Provisioning
Service
Provisioning
Monitoring +
Troubleshooting
Network
Change
Parameter
Adjustment
Faster
troubleshooting
Cross-cloud connectivity:
months → minutes
Service provisioning:
days → minutes
Fault locating:
hours → minutes
Full-lifecycle automation
Optimization
Planning
Construction Maintenance
Huawei Confidential
38
CloudFabric Easy
Lightweight SDN solution for
small and midsize DCs
iMaster NCE-Fabric single-node
system or cluster (mandatory)
CloudEngine switch
iMaster NCE-FabricInsight
single-node system (optional)
Simplification
• 8x the industry's leaf
scale, facilitating
network capacity
expansion
• Modular spine
switches: flexible
scalability and high
reliability
EasY-Maintenance
• Comprehensive health
evaluation, automatic
detection of 90% risks
• Proactive fault O&M,
rectifying faults in
minutes
Automation
• 3-step service
provisioning, taking
only minutes
• Pre-event simulation
and post-event
verification, ensuring
100% configuration
correctness
Expandability
• Factory installation
and automatic joint
commissioning,
50%↓ service costs
• One-click
deployment,
involving only 3
steps with 3
parameters
CloudFabric Easy Solution, Helping SMEs Build Cloud Data
Center Networks in an "EASY" Way
Huawei Confidential
39
Challenge: Ethernet packet loss has gone
unsolved for 40 years
Why is Ethernet prone to
packet loss?
N:1 traffic, exceeding the receive
bandwidth
Higher packet loss for more nodes
Real-time, precise speed control through AI algorithm,
rather than O&M experts
Innovatively introduce AI algorithm to address
this global challenge
Years of research has failed to resolve this issue.
• Real-time
traffic model
• Tens of
millions of
random
samples
Non-precise
backpressure Traffic control
Frequent transmission
suspension
Overly low throughput
Ever-changing traffic
Difficult to seize the
best time window
……
Scenario auto-adaptation, a result after training of tens
of millions of random samples
Random samples for
adaption to any scenario
+
Real service samples to
ensure service effects
OLTP VDI Video
OLAP AI
Unique algorithm
Ethernet for HPC: Eliminates Ethernet Packet Loss and
Unleashes 100% of Computing Power
Packet loss
Scenario auto-
adaptation
Zero packet
loss at 100%
throughput
Scale auto-
adaptation
Huawei Confidential
40
Why cannot a traditional Ethernet be used for
cross-DC active-active storage?
Lossless algorithm upgrade: zero packet loss for a
70 km long-distance transmission on an Ethernet
vs
The RTT for 70 km intra-city transmission reaches up to
1 ms. The traditional lossless algorithm cannot ensure
zero packet loss over such a long-distance transmission.
Three-dimensional lossless
algorithm fails in long-distance
transmission scenarios
+ Spatiotemporal
variable
(distance, delay,
jitter, etc.)
Four-dimensional lossless
algorithm ensures zero
packet loss over long-
distance transmission.
Service
requirement
Traffic
model Network status
One more dimension,
100x difficulty
Annual
saving of
CNY25.73
million
100+ 8G FC links → 10 100GE links
8G*128 100G*10
Example (a bank with cross-DC active-active storage): 10 x 100GE lossless Ethernet links
replace 100+ FC links, reducing links by 90%+.
Ethernet for Active-Active Storage: Lossless Long-Distance
Transmission, 90%+ Fewer Links
Active DC Intra-city active-
active DC
Active DC
Huawei switch
Traditional Ethernet:
> 0.2% packet loss rate
over long-distance
transmission
Requirement Actual situation
Intra-city active-
active DC
Active-active
storage requires
zero packet loss
Huawei Confidential
41
Section Summary
This section describes Huawei's hyper-converged data center network products and major
solutions:
⚫ L3.5 autonomous driving network, accelerating evolution towards multi-cloud and multi-DC
⚫ CloudFabric Easy Solution, helping SMEs build cloud data center networks in an "EASY" way
⚫ Ethernet for HPC, eliminating Ethernet packet loss and unleashing 100% of computing
power
⚫ Ethernet for active-active storage, achieving lossless long-distance transmission and
reducing links by 90%+
Huawei Confidential
42
(CloudWAN)
CloudWAN 3.0
Huawei Confidential
43
CloudWAN 3.0: Leading WANs into the Intelligent Cloud-
Network Era
SRv6
FlexE-based slicing
100+ commercial cases worldwide
IPv6 Enhanced, laying a foundation for digital infrastructure
IFIT NETCONF/YANG
Township Federal HQ
State
DC
Real-time
visibility
Fault locating
in minutes
Failover in
milliseconds
One-fiber multipurpose transport: deterministic
experience
• Hierarchical slicing: 1000+ slices, 10x the
industry average.
• Slice ID-based slicing for simplified deployment
One-network wide connection: network digitalization
• Industry-unique hop-by-hop measurement
technology, enabling real-time visibility of network-
wide status and troubleshooting within minutes
One-hop cloud access: flexible cloud-network
connection
• SRv6 enables service provisioning within minutes
and agile service cloudification.
One-click fast scheduling: cloud-network
coordinated scheduling
• SDN + intelligent cloud-map algorithm, improving
cloud-network resource utilization by 30%
| |
Huawei Confidential
44
MPLS MPLS VLAN Cloud path 10
Cloud path 20
Cloud path 30
27
36
27
16
SR & SRv6 standards document contributions
by vendors
Huawei
Vendor C &
Huawei
Vendor C
Others
Huawei leads or participates in the
formulation of 59% of SRv6 standards.
Major contributor to SRv6 standards
Leading global SRv6 commercial use
100+ SRv6 commercial deployments
(as of 2022)
One-Hop Cloud Access: Overcoming Process Barriers with
Technology to Enable Fast and Smooth Cloudification for Enterprises
VXLAN
Interop Best
of Show
Award
Frost & Sullivan Global
New Product
Innovation Leadership
Award
Industry: multi-level cross-department
collaboration
10+ stages, 30+ days for provisioning
Huawei: configuration-free cross-domain cloud
path deployment
Provisioning within minutes and application-
level assurance
Cloud path 20: 100 Mbps
bandwidth, latency < 2 ms
Cloud path 30: 50 Mbps
bandwidth, latency < 10 ms
Huawei Confidential
45
Most powerful hierarchical slicing, maximal network value
Huawei Other vendor
vs.
1000+ slices:
Huawei-exclusive
32
1000
Restricted protocol path
computation capability
Patented slice ID-
based slicing,
planning free
Configuration within
hours, requiring
address planning
Slice-based hard
isolation, guaranteeing
bandwidth and latency
Soft isolation and
bandwidth sharing,
unable to guarantee SLAs
10 Mbps granularity,
without wasting
resources
Only 5 Gbps
granularity
supported
10 Mbps/slice
…
5 Gbps/slice
One-Fiber Multipurpose Transport: Hierarchical Slicing Enables
IP-Based Production Networks and Ensures Deterministic SLAs
Remote
mgmt.
Video
security
Office
service
Remote
mgmt.
Video
security
Office
service
Office
service
Production
service
Video
service
slice
Control
service
slice
10+ networks → N slices
over 1 network
Multi-network
convergence and private
network-like experience
Telepresence conference:
latency < 10 ms
Video security:
bandwidth > 100 Mbps
Office service: service
isolation
Office
service
slice
Before Now
More
Faster
Better
More
cost-
effective
FlexE-based slice 1
FlexE-based slice 2
FlexE-based slice 3
FlexE-based slice 4
Huawei Confidential
46
90% 12% 25%
IDC1 IDC2 IDC3
CNY120 million/year
investment
38% resource
utilization Computing
power
Cost
Storage
Cloud
factors
Network
factors
Bandwidth
Reliability
Latency
45% 50% 47%
IDC1 IDC2 IDC3
Lower TCO
Cloud-network
resource utilization
Intelligent cloud-map
algorithm
Active DC
Intra-city DR DC
Inter-city DR DC
Cloud management
platform
Cloud resource
information
90,000
cameras
200T/day
video data
90% 10%
50% 50% 30%
CNY 30
million/year
One-Click Fast Scheduling: Intelligent Cloud-Map Algorithm
Improves IDC Resource Utilization by 30%
Huawei: cloud-network coordinated scheduling, enabling
efficient resource utilization
Industry: unbalanced cloud-network
resource loads, wasting investment
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf

More Related Content

Similar to HCSA-Presales-IP+Network+V3.0+Training+Material.pdf

Investigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureInvestigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureFiras Alsayied
 
Data center & wireless lan
Data center & wireless lanData center & wireless lan
Data center & wireless lanjency j
 
Critical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems WorldwideCritical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems WorldwideAngela Hays
 
DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0Shah Sheikh
 
How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation? How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation? PECB
 
SDN Application Delivery
SDN Application DeliverySDN Application Delivery
SDN Application DeliveryNimit Shishodia
 
Chp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce techChp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce techcheqala5626
 
Module 1 notes for IoT BETCK105H (VTU) Introduction to IoT
Module 1 notes for IoT BETCK105H (VTU) Introduction to IoTModule 1 notes for IoT BETCK105H (VTU) Introduction to IoT
Module 1 notes for IoT BETCK105H (VTU) Introduction to IoTashwini870728
 
Webinar: The Software Matters in Open Networking
Webinar: The Software Matters in Open NetworkingWebinar: The Software Matters in Open Networking
Webinar: The Software Matters in Open NetworkingStorage Switzerland
 
Wireless deployment strategies in WNS-is
Wireless deployment strategies in WNS-isWireless deployment strategies in WNS-is
Wireless deployment strategies in WNS-isssuser5b84591
 
IoT Standards & Ecosystem
IoT Standards & EcosystemIoT Standards & Ecosystem
IoT Standards & EcosystemHarish Vadada
 
IoT, M2M and IoT System Management
IoT, M2M and IoT System ManagementIoT, M2M and IoT System Management
IoT, M2M and IoT System ManagementVikram Nandini
 
Simplifying SDN Networking Across Private and Public Clouds
Simplifying SDN Networking Across Private and Public CloudsSimplifying SDN Networking Across Private and Public Clouds
Simplifying SDN Networking Across Private and Public Clouds5nine
 
IRJET- SDN Simulation in Mininet to Provide Security Via Firewall
IRJET- SDN Simulation in Mininet to Provide Security Via FirewallIRJET- SDN Simulation in Mininet to Provide Security Via Firewall
IRJET- SDN Simulation in Mininet to Provide Security Via FirewallIRJET Journal
 
Motorola Wing 5.6 specification sheet
Motorola  Wing 5.6 specification sheetMotorola  Wing 5.6 specification sheet
Motorola Wing 5.6 specification sheetAdvantec Distribution
 
COM526_Lecture 1.pdf
COM526_Lecture 1.pdfCOM526_Lecture 1.pdf
COM526_Lecture 1.pdfSherefHesham
 
Wireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit BhatiaWireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit BhatiaArpit Bhatia
 
Software Defined Networking Attacks and Countermeasures .docx
Software Defined Networking Attacks and Countermeasures .docxSoftware Defined Networking Attacks and Countermeasures .docx
Software Defined Networking Attacks and Countermeasures .docxrosemariebrayshaw
 

Similar to HCSA-Presales-IP+Network+V3.0+Training+Material.pdf (20)

Investigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureInvestigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a Secure
 
Rkp internet part i
Rkp internet part iRkp internet part i
Rkp internet part i
 
Data center & wireless lan
Data center & wireless lanData center & wireless lan
Data center & wireless lan
 
CentralizedSerialWP
CentralizedSerialWPCentralizedSerialWP
CentralizedSerialWP
 
Critical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems WorldwideCritical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems Worldwide
 
DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0
 
How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation? How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation?
 
SDN Application Delivery
SDN Application DeliverySDN Application Delivery
SDN Application Delivery
 
Chp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce techChp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce tech
 
Module 1 notes for IoT BETCK105H (VTU) Introduction to IoT
Module 1 notes for IoT BETCK105H (VTU) Introduction to IoTModule 1 notes for IoT BETCK105H (VTU) Introduction to IoT
Module 1 notes for IoT BETCK105H (VTU) Introduction to IoT
 
Webinar: The Software Matters in Open Networking
Webinar: The Software Matters in Open NetworkingWebinar: The Software Matters in Open Networking
Webinar: The Software Matters in Open Networking
 
Wireless deployment strategies in WNS-is
Wireless deployment strategies in WNS-isWireless deployment strategies in WNS-is
Wireless deployment strategies in WNS-is
 
IoT Standards & Ecosystem
IoT Standards & EcosystemIoT Standards & Ecosystem
IoT Standards & Ecosystem
 
IoT, M2M and IoT System Management
IoT, M2M and IoT System ManagementIoT, M2M and IoT System Management
IoT, M2M and IoT System Management
 
Simplifying SDN Networking Across Private and Public Clouds
Simplifying SDN Networking Across Private and Public CloudsSimplifying SDN Networking Across Private and Public Clouds
Simplifying SDN Networking Across Private and Public Clouds
 
IRJET- SDN Simulation in Mininet to Provide Security Via Firewall
IRJET- SDN Simulation in Mininet to Provide Security Via FirewallIRJET- SDN Simulation in Mininet to Provide Security Via Firewall
IRJET- SDN Simulation in Mininet to Provide Security Via Firewall
 
Motorola Wing 5.6 specification sheet
Motorola  Wing 5.6 specification sheetMotorola  Wing 5.6 specification sheet
Motorola Wing 5.6 specification sheet
 
COM526_Lecture 1.pdf
COM526_Lecture 1.pdfCOM526_Lecture 1.pdf
COM526_Lecture 1.pdf
 
Wireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit BhatiaWireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit Bhatia
 
Software Defined Networking Attacks and Countermeasures .docx
Software Defined Networking Attacks and Countermeasures .docxSoftware Defined Networking Attacks and Countermeasures .docx
Software Defined Networking Attacks and Countermeasures .docx
 

Recently uploaded

Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 

Recently uploaded (20)

Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 

HCSA-Presales-IP+Network+V3.0+Training+Material.pdf

  • 2. Huawei Confidential 2 Foreword ⚫ A data communication network consists of routers, switches, firewalls, wireless controllers, wireless access points (APs), personal computers (PCs), network printers, and servers. The most basic function of a data communication network is to implement data communication. ⚫ Nowadays, the data communication network has become the cornerstone of the intelligent world and an important support for the digital transformation of enterprises. ⚫ Before grasping an in-depth understanding of products and solutions in the data communication network field, you are expected to master common basic technologies and familiarize yourself with basic protocols. ⚫ This course introduces basic knowledge about the data communication network, including basic concepts of the data communication network, Internet Protocol (IP) routing, Ethernet switching, network security, wide area network (WAN) technologies, network management and O&M, and Quality of service (QoS).
  • 3. Huawei Confidential 3 Objectives ⚫ Upon completion of this course, you will be able to:  Describe the concepts and functions of the data communication network.  Describe the common networking architecture of the data communication network.  Describe common devices of the data communication network as well as their basic functions and application scenarios.  Describe the TCP/IP reference model and use this model to analyze the data encapsulation and decapsulation processes.  Describe basic concepts related to IP routing, Ethernet switching, network security, WAN technologies, network management and O&M, and QoS.
  • 4. Huawei Confidential 4 Contents 1. Basic Concepts of the Data Communication Network 2. IP Routing Basics 3. Ethernet Switching Basics 4. Network Security Overview 5. WAN Technologies 6. Network Management and O&M 7. QoS
  • 5. Huawei Confidential 5 End-to-End Data Communication Industry CloudCampus CloudWAN General-purpose computing Storage High-performance computing Hyper-converged data center network (DCN) Network security End-to-end data communication industry • The data communication network comprises a variety of data communication devices. • The data communication network is the cornerstone for the digital world.
  • 6. Huawei Confidential 6 Concepts of the Data Communication Network ⚫ A data communication network consists of routers, switches, firewalls, wireless controllers, wireless APs, PCs, network printers, and servers. The most basic function of a data communication network is to implement data communication. Hotel AP Firewall Switch Central AP RU Wireless access controller (WAC) Enterprise Firewall Switch AP Firewall Switch Switch Switch Home network Campus network AR Micro-sized store AP Firewall AR WAN Internet WAN or Firewall Switch Higher education institution AP AP Switch Switch Local DC DCN Spine Leaf Internet access zone Intrusion prevention system (IPS) Firewall NE router Production environment zone Server Storage network Demilitarized zone (DMZ)
  • 7. Huawei Confidential 7 Simplest Data Communication Scenario Ethernet twisted pair PC1 PC2 Application layer Transport layer Network layer Data link layer Physical layer Application layer Transport layer Network layer Data link layer Physical layer IP address Media access control (MAC) address IP address MAC address Layer 4 envelope Transport layer Layer 3 envelope Network layer Layer 2 envelope Data link layer Payload
  • 8. Huawei Confidential 8 Common Network Devices: Campus Switches • Is used to construct local area networks (LANs). • Connects terminals (such as PCs and servers) to networks. • Enables exchanges of Ethernet data frames. Switch A campus switch:
  • 9. Huawei Confidential 9 Common Network Devices: CloudEngine S Series Campus Switches CloudEngine S series campus switches (fixed) CloudEngine S series campus switches (modular) CloudEngine S5731-H48T4XC Viewing product information CloudEngine S12700E-8 Viewing product information Main control board Service board Switch fabric unit (SFU) Power module Centralized monitoring unit (CMU)
  • 10. Huawei Confidential 10 Common Network Devices: Routers • Is used to connect to different broadcast domains and IP network segments. • Maintains routing tables and runs routing protocols to discover data forwarding paths (routing information). • Forwards IP packets according to its routing table. • Connects to a WAN, with functions such as network address translation and access control. Router Internet A router:
  • 11. Huawei Confidential 11 Common Network Devices: NetEngine Series Routers NetEngine access router (AR) NetEngine metro router NetEngine AR6121 Viewing product information NetEngine 8000 Viewing product information
  • 12. Huawei Confidential 12 Common Network Devices: DC Switches Test environment zone Production environment zone Spine Leaf Spine Leaf Core Campus access zone WAN access zone Internet access zone Server Server • Is an Ethernet switch applied in DCs. • Connects to a myriad of servers, firewalls, intrusion prevention system (IPS) devices, and load balancers to meet network requirements of DCs in the cloud era. • Is required to provide high performance, high density, low latency, and large buffer. • Provides high scalability and supports large-scale networking through the spine- leaf architecture A DC switch:
  • 13. Huawei Confidential 13 Common Network Devices: CloudEngine Series DC Switches CloudEngine series DC switches CloudEngine 12800 and 16800 Viewing product information CloudEngine 6800 Viewing product information
  • 14. Huawei Confidential 14 Common Network Devices: Firewalls Firewall Untrust zone Trust zone DMZ • Isolates networks of different security levels. • Implements traffic control (using security policies). • Implements intrusion prevention, Uniform Resource Locator (URL) filtering, data filtering, and application behavior control. • Implements user identity authentication. • Implements Remote Authentication Dial In User Service (RADIUS). • Implements data encryption and virtual private network (VPN) services. • Implements Network Address Translation (NAT) and other security functions. Internet A firewall:
  • 15. Huawei Confidential 15 Common Network Devices: HiSec Engine USG Series Firewalls HiSec Engine unified security gateway (USG) series firewalls HiSec Engine USG6600E Viewing product information
  • 16. Huawei Confidential 16 Common Network Devices: WAC and APs Fat AP Internet • Networking characteristics: Fat APs work independently and require separate configurations. Fat APs provide only simple functions and are cost-effective. • Applicability: homes, micro-sized stores, etc. WAC + Fit APs • Networking characteristics: Fit APs are managed and configured by the WAC in a unified manner, providing various functions. Fit APs have high requirements on network maintenance personnel's skills. • Applicability: medium- and large-sized enterprises Fat AP Fit AP WAC
  • 17. Huawei Confidential 17 Common Network Devices: WAC and AirEngine APs WAC AP AirEngine 9700-M Viewing product information AirEngine 8760-X1-PRO Viewing product information
  • 18. Huawei Confidential 18 Network Topology • Is presented as a structured layout using transmission media (such as twisted pairs and optical fibers) to interconnect various devices (such as computers, routers, and switches). • Is a very important network concept used to describe the physical or logical structure of a network in the network engineering field. iStack/CSS link Egress zone Core layer Aggregation layer Access layer Terminal layer Internet WAN Network management and O&M zone DC A network topology:
  • 19. Huawei Confidential 19 Management Modes for Common Network Devices Console cable Console port Management mode 1: You can log in to a device through the console port from a PC. Typically, this method is used in scenarios where a device is powered on for the first time. Management traffic Management mode 2: You can remotely manage a device through a PC using Telnet and secure shell protocol (SSH), or through a web. Management traffic Management mode 3: The network management system (NMS) remotely manages and delivers configurations to a device through Telnet, SSH, or Simple Network Management Protocol (SNMP). On this basis, the software-defined networking (SDN) controller manages the device through Network Configuration Protocol (NETCONF).
  • 20. Huawei Confidential 20 iMaster NCE Full-lifecycle automation Device plug-and-play and self-service Intelligent closed-loop management based on big data and AI Predictive maintenance, solving problems before customer complaints All-cloud platform with ultra-large capacity Ultra-large capacity and elastic scalability Open programmability-enabled and scenario-based application ecosystem Simplified IT application integration based on Design Studio Network automation Network intelligence Development & operations (DevOps) iMaster NCE Analysis Management Control IT/Operations support system (OSS)/Application Multi-tenant Multi-service Multi-industry Network Cloud platform
  • 21. Huawei Confidential 21 Reference Model in the Data Communication Network Application layer Transport layer Network layer Data link layer Physical layer Contains various types of applications that provide abundant system application interfaces for users' application software. Establishes, maintains, and cancels end-to-end data transmission, controls transmission speeds, and adjusts the data sequences. Implements end-to-end data transmission between any two nodes based on the network layer addresses contained in the data. A logical data link is established between adjacent nodes connected through a physical link to implement direct data communication in point-to-point (P2P) or point-to-multipoint (P2MP) mode on the link. Converts logical 0s and 1s into physical signals (optical/electrical signals) that can be carried by transmission media, sends and receives physical signals, and transmits physical signals on transmission media. 1 2 3 4 5
  • 22. Huawei Confidential 22 Reference Model and Common Protocols in the Data Communication Network Application layer Transport layer Network layer Data link layer Physical layer Telnet, FTP, TFTP, SNMP, HTTP, Simple Mail Transfer Protocol (SMTP), DHCP, etc. Transmission Control Protocol (TCP), User Datagram Protocol (UDP), etc. Internet Protocol version 4 (IPv4), Internet Protocol version 6 (IPv6), Internet Control Message Protocol (ICMP), Internet Control Message Protocol version 6 (ICMPv6), Open Shortest Path First (OSPF), intermediate system-to-intermediate system (IS-IS), Border Gateway Protocol (BGP), etc. Point-to-Point Protocol (PPP), Link Layer Discovery Protocol (LLDP), Point-to-Point Tunneling Protocol (PPTP), etc. EIA/TIA-232, etc. 1 2 3 4 5
  • 23. Huawei Confidential 23 Application Layer Application Layer Transport Layer Network Layer Data Link Layer Physical Layer Application layer Transport layer Network layer Data link layer Physical layer • The application layer provides interfaces for application software so that applications can use network services. • The application layer protocol designates transport layer protocols and ports. • The protocol data unit (PDU) corresponding to the application layer is called data, which is also the payload to be transmitted by a network system. • HTTP (TCP port 80): Hypertext Transfer Protocol, providing web browsing services • Telnet (TCP port 23): a remote login protocol, providing remote device management services • FTP (TCP port 20 and TCP port 21): File Transfer Protocol, providing file resource sharing services • DHCP (UDP port 67 and UDP port 68): Dynamic Host Configuration Protocol, providing dynamic address management services • TFTP (UDP port 69): Trivial File Transfer Protocol, providing simple file transfer services • ...
  • 24. Huawei Confidential 24 Transport Layer Application layer Transport layer Network layer Data link layer Physical layer • The transport layer receives data from the application layer, encapsulates the data with the corresponding transport layer protocol header, and helps establish an end-to-end connection. • Typical transport layer protocols include TCP and UDP. • The PDU corresponding to the transport layer is called segment. Latest transport layer protocols: Multipath Transmission Control Protocol (MPTCP), data center TCP (DCTCP), Data Center Quantized Congestion Notification (DCQCN), Quick UDP Internet Connections (QUIC), etc. TCP UDP Connection-oriented Connectionless Reliable transmission Best-effort transmission Flow control and window mechanism None Applications: HTTP, FTP, Telnet, etc. Applications: DNS, SNMP, etc. Application Layer Transport Layer Network Layer Data Link Layer Physical Layer
  • 25. Huawei Confidential 25 Transport Layer: Port Number PC1 PC2 Network IP address: 1.1.1.1 TCP port 1024 TCP port 1231 HTTP application Telnet IP address: 2.2.2.2 TCP port 80 TCP port 23 HTTP application Telnet • Generally, the source port is randomly allocated, while the destination port is specified by the corresponding application. • Generally, the source port used by the application client is an idle port whose number is greater than 1023. • The number of the destination port is the same as that of the listening port of an application (or a service) enabled on the server. For example, the default port number for HTTP is 80. Web browser Web server HTTP payload Source IP address: 1.1.1.1 Destination IP address: 2.2.2.2 Source port number: 1024 Destination port number: 80 IP header TCP header Application Layer Transport Layer Network Layer Data Link Layer Physical Layer
  • 26. Huawei Confidential 26 Network Layer Application layer Transport layer Network layer Data link layer Physical layer • The transport layer is responsible for connections between nodes, while the network layer is for end-to-end data transmission from one node to another and for data forwarding from the source to the destination. • The PDU corresponding to the network layer is called packet. • The network layer defines the packet format, provides logical addresses for nodes, and is responsible for the addressing and routing of data packets. IPv4 IPv6 OSPFv2 IS-IS BGP OSPFv3 IPv6 IS-IS BGP4+ Key protocols Application Layer Transport Layer Network Layer Data Link Layer Physical Layer
  • 27. Huawei Confidential 27 Network Layer: IPv4 and IPv6 Network Addresses PC1 1.1.1.1/24 PC2 2.2.2.2/24 IPv4 network • An IPv4 address identifies a node (or a device interface) on an IPv4 network. • An IPv4 address is 32 bits long. • An IPv4 address is usually represented in dotted decimal notation. • A subnet mask of an IPv4 address is 32 bits and can be expressed in dotted decimal notation or be presented by a mask length. • In a subnet mask of an IPv4 address, bits with the value of 1 correspond to the network bits, while bits with the value of 0 the host bits. As such, the network and host bits in an IPv4 address can be identified. PC1 FC00:1::1/64 PC2 FC00:2::1/64 IPv6 network • The network addresses used on an IPv6 network are IPv6 addresses. • An IPv6 address is 128 bits long. • An IPv6 address is usually expressed in hexadecimal numbers separated by colons (:). • An IPv6 address is expressed in the format of IPv6 address/mask length, specifying the mask length of the network part in the address. Application Layer Transport Layer Network Layer Data Link Layer Physical Layer
  • 28. Huawei Confidential 28 Network Layer: Packet Forwarding Based on Network Addresses R1 Network Outbound Interface Network A GE1/0/0 … … … … Routing table of R1 PC1 Address 1 Payload Network layer header PC2 Address 2 • Source network address • Destination network address GE1/0/0 Network A • The network layer header of the packet sent by the source node carries the network addresses of the source and destination nodes of the packet. • Routing-capable devices (such as routers) maintain routing tables. • When receiving packets, these devices read the destination addresses carried in the packets at the network layer and query the addresses in their routing tables. After finding matching entries, the devices forward the packets according to the entries. Application Layer Transport Layer Network Layer Data Link Layer Physical Layer
  • 29. Huawei Confidential 29 Data Link Layer Application layer Transport layer Network layer Data link layer Physical layer • The data link layer is responsible for data transmission between two adjacent nodes on a physical link, and provides error notification and flow control. • The data link layer encapsulates packets from the network layer into frames and converts the frames into bits for data transmission at the physical layer. • During the assembly of a data frame, the address is written into the header of the data frame for addressing and forwarding. • The network layer implements data transmission between any two nodes on the global network. During this process, data may pass through multiple links. One basic function of the data link layer is to transmit data from one node to another adjacent node on these links. • Common data link layer protocols include LLDP, PPP, and Spanning Tree Protocol (STP). • The PDU corresponding to the data link layer is called frame. Application Layer Transport Layer Network Layer Data Link Layer Physical Layer
  • 30. Huawei Confidential 30 Data Link Layer: Ethernet • Ethernet is a well-known and widely used technology defined in IEEE 802.3. • Currently, network interfaces of PCs comply with the Ethernet standard. • An address defined in the data link layer is called a MAC address, which is compulsory for all Ethernet NICs that comply with the IEEE 802 standards. • A MAC address is 48 bits long and is usually expressed in hexadecimal format. The following are two examples:  00-21-0A-B9-DC-79  0021-0AB9-DC79. • A device that works at the data link layer, such as an Ethernet switch, maintains a MAC address table that guides frame forwarding. Application Layer Transport Layer Network Layer Data Link Layer Physical Layer
  • 31. Huawei Confidential 31 Physical Layer Application layer Transport layer Network layer Data link layer Physical layer • After data arrives at the physical layer, the physical layer converts a digital signal into an optical signal, an electrical signal, or an electromagnetic wave signal based on the physical media. • The PDU corresponding to the physical layer is called bit. • The physical layer defines physical features and specifications such as cables, pins, and ports. • Common transmission media include Ethernet twisted pairs, optical fibers, and electromagnetic waves. Application Layer Transport Layer Network Layer Data Link Layer Physical Layer
  • 32. Huawei Confidential 32 Encapsulation and Decapsulation During Data Transmission Application layer Transport layer Network layer Data link layer Physical layer Data payload 101010111100… PDU Segment Packet Frame Bit Data payload Transport layer header Upper-layer data IP header Upper-layer data Frame header Frame trailer Data payload 101010111100… Data payload Upper-layer data Upper-layer data Encapsulation Decapsulation
  • 33. Huawei Confidential 33 Contents 1. Basic Concepts of the Data Communication Network 2. IP Routing Basics 3. Ethernet Switching Basics 4. Network Security Overview 5. WAN Technologies 6. Network Management and O&M 7. QoS
  • 34. Huawei Confidential 34 Concepts of Routing Destination/Mask Protocol Preference Cost Next Hop Interface 192.168.1.0/24 Direct 0 0 192.168.1.254 GE0/0/0 192.168.12.0/24 Direct 0 0 192.168.12.1 GE0/0/2 192.168.2.0/24 OSPF 10 3 192.168.12.2 GE0/0/2 Routing table of R1 R1 PC1 192.168.1.1/24 Data IP header PC2 192.168.2.1/24 GE0/0/0 Data submitted by an upper layer (for example, the transport layer) is put into an envelope. Data encapsulation at the network layer (Source/Destination IP address) When a router (or a routing-capable device) receives an IP data packet, it searches its routing table for the destination IP address of the packet and selects an optimal path to forward the packet. This process is called routing.
  • 35. Huawei Confidential 35 How to Obtain Routing Information A router forwards packets based on its routing table. To achieve this, the router needs to discover routes. Common three types of routes are as follows: GE0/0/0 10.1.1.0/24 20.1.1.0/24 GE0/0/1 GE0/0/1 30.1.1.0/24 40.1.1.0/24 GE0/0/2 Direct route Route Type Destination /Mask Outbound Interface Direct 10.1.1.0/24 GE0/0/0 Direct 20.1.1.0/24 GE0/0/1 Static route Dynamic route Route Type Destination /Mask Outbound Interface Static 30.1.1.0/24 GE0/0/1 Dynamic routing protocol: OSPF Route Type Destination /Mask Outbound Interface Dynamic 40.1.1.0/24 GE0/0/2 Direct routes are automatically generated by devices and point to directly connected local networks. Static routes are manually configured by network administrators. Dynamic routes are learned by dynamic routing protocols running on routers.
  • 36. Huawei Confidential 36 Application Scenarios of Static Routes GE0/0/1 20.1.1.2/24 GE0/0/0 10.0.0.2/24 GE0/0/1 20.1.1.3/24 GE0/0/0 10.0.0.1/24 Router A Router C Router B Destined for 20.1.1.0/24 Destination Network Type Next Hop 20.1.1.0 Static 10.0.0.2 10.0.0.0 Direct 10.0.0.1 • Static routes are manually configured by network administrators. They are easy to configure, have low system requirements, and apply to stable and small networks with simple topologies. • However, static routes cannot automatically adapt to network topology changes, thus requiring manual intervention. • Router A forwards packets destined for 20.1.1.0/24. As only direct routes are available in the routing table of Router A, no matching route is found for packet forwarding. In this case, a static route can be manually configured so that Router A can forward packets destined for 20.1.1.0/24 to the next hop 10.0.0.2.
  • 37. Huawei Confidential 37 Overview of Dynamic Routes • Dynamic routing protocols can automatically discover and generate routes, and update routes when the topology changes. These protocols effectively reduce the workload of management personnel and are more suitable to large networks. Static route • When the network scale continues to expand, it becomes increasingly complex to manually configure static routes. In addition, static routes cannot adapt to network topology changes in a timely and flexible manner. Dynamic routing protocol: OSPF Static route Dynamic route • Static routes need to be manually configured on devices. • Static routes cannot adapt to link changes. • Dynamic routes can be automatically discovered and learned. • Dynamic routes can adapt to topology changes.
  • 38. Huawei Confidential 38 OSPF Application on a Campus Network Internet Office building 1 Office building 2 Office building 3 Server cluster Firewall Core switch Aggregation switch Aggregation switch Aggregation switch OSPF is configured on the core switch and aggregation switches to enable route reachability on the campus network.
  • 39. Huawei Confidential 39 Concepts of AS AS 100 AS 200 • A large number of organizations use IGP routing protocols such as OSPF and IS-IS on their internal networks. However, as the network size increases, the number of routes on the network also rises, thus leading to the failure of IGP to manage large-scale networks. To solve this issue, the concept of Autonomous System (AS) emerges. • An AS consists of a set of devices that are managed by the same organization and use the same route selection policy. • Each of these ASs is uniquely identified using an Autonomous System Number (ASN), which is distributed by the Internet Assigned Numbers Authority (IANA). • Which routing protocols should be used to transmit routes for inter-AS communication? ? ... ... OSPF IS-IS ... ... ... OSPF ...
  • 40. Huawei Confidential 40 Route Transmission Through BGP AS 100 OSPFv3 and RIPng AS 200 IS-IS and IPv6 BGP BGP • IGP enables a router discover routes to each segment of the local AS, implementing data communication within the AS. • On a large-scale network consisting of multiple ASs, an exterior gateway protocol (EGP) is used to implement route exchange between ASs. • The Internet is an ultra-large network consisting of multiple ASs. EGP is used on the backbone nodes of the Internet to implement route exchange between ASs. BGP is the most well-known and widely used EGP today.
  • 41. Huawei Confidential 41 BGP Application on Enterprise Networks Communication within an enterprise network Communication between enterprise and carrier networks On a large enterprise network, BGP is used for route exchange between the headquarter and branches. The two parties respectively belong to different ASs and are deployed by corresponding network management teams. BGP can be used for route exchange between an enterprise and a carrier so that both the enterprise network and carrier network can obtain specif ic routes from each other. AS 100 AS 200 AS 800 BGP HQ Branch Branch AS 200 AS 800 Carrier X Enterprise B Enterprise N BGP BGP BGP Enterprise A AS 1000 AS 100
  • 42. Huawei Confidential 42 Contents 1. Basic Concepts of the Data Communication Network 2. IP Routing Basics 3. Ethernet Switching Basics 4. Network Security Overview 5. WAN Technologies 6. Network Management and O&M 7. QoS
  • 43. Huawei Confidential 43 Ethernet Layer 2 Switching Core switch Access switch 1 Access switch 2 Terminal 1 192.168.1.1/24 5469-98AB-0001 Terminal 2 192.168.1.2/24 5469-98AB-0002 Terminal 3 192.168.1.3/24 5469-98AB-0003 Terminal 4 192.168.1.4/24 5469-98AB-0004 Layer 2 communication Payload TCP/UDP header IP header Ethernet header Ethernet trailer Layer 4 header Layer 3 header Layer 2 header Destination MAC address Source MAC address • Layer 2 switching is a basic function of Ethernet switches. • Layer 2 switching is a process in which a switch forwards a frame based on the destination MAC address in the frame's Layer 2 header. • Each switch maintains a MAC address table for frame forwarding. • Upon receipt of a frame, a switch reads the frame's destination MAC address, searches for this MAC address in the local MAC address table, and then processes the frame accordingly. In addition, the switch learns the source MAC address of the frame.
  • 44. Huawei Confidential 44 Ethernet Layer 2 Switching and MAC Address Table PC1 PC2 IP: 2001:DB8:1::1/64 MAC: 0050-5600-0001 IP: 2001:DB8:1::2/64 MAC: 0050-5600-0002 Source IP address 2001:DB8:1::1 Destination MAC address 0050-5600-0002 Destination IP address 2001:DB8:1::2 Source MAC address 0050-5600-0001 GE0/0/1 GE0/0/2 Source IP address 2001:DB8:1::1 Destination MAC address 0050-5600-0002 Destination IP address 2001:DB8:1::2 Source MAC address 0050-5600-0001 Upon receipt of a frame, a switch reads the frame's destination MAC address, searches for this MAC address in the local MAC address table, and then processes the frame accordingly. In addition, the switch learns the source MAC address of the frame. MAC addresses are used to implement data frame addressing and node identification on the Ethernet.
  • 45. Huawei Confidential 45 MAC Address Table PC1 00e0-fc12-3458 Printer 00e0-fc12-3457 GE0/0/1 GE0/0/2 Switch • A MAC address table records the mapping between the MAC addresses learned by a switch and the interfaces, and the VLANs to which the interfaces belong. • The display mac-address command can be run on the switch to check its MAC address table. MAC Address Interface VLAN 00e0-fc12-3458 GE0/0/1 100 00e0-fc12-3457 GE0/0/2 200
  • 46. Huawei Confidential 46 Why Do We Need VLAN? Switch ... PC1 GE0/0/1 PC24 GE0/0/24 PC2 GE0/0/2 PC23 GE0/0/23 PC3 GE0/0/3 Broadcast, unknown unicast, and multicast (BUM) frames • By default, all interfaces of a switch belong to the same broadcast domain. • When there are a large number of switches on a network, the broadcast domain becomes large and the network may be flooded with a myriad of broadcast packets. • Network units cannot be flexibly planned based on service requirements.
  • 47. Huawei Confidential 47 VLAN Virtual Local Area Network (VLAN) technology allows a physical LAN to be divided into multiple logical LANs (multiple VLANs). Each VLAN functions as a separate broadcast domain, with hosts in the same VLAN able to directly communicate with one another, while those in different VLANs cannot. As a result, broadcast packets are confined within a single VLAN. Switch ... PC1 GE0/0/1 PC24 GE0/0/24 PC2 GE0/0/2 PC23 GE0/0/23 PC3 GE0/0/3 VLAN10: VLAN for the marketing department VLAN20: VLAN for the R&D department
  • 48. Huawei Confidential 48 VLAN Communication Across Switches Tagged frame (802.1Q tag) PC4 VLAN10: VLAN for the technology department PC5 Switch1 GE0/0/4 GE0/0/1 GE0/0/2 GE0/0/3 VLAN10: VLAN for the technology department VLAN20: VLAN for the accounting department PC1 PC2 PC3 Switch2 GE0/0/4 GE0/0/1 GE0/0/2 GE0/0/3 • To enable a switch to distinguish data frames from different VLANs, you need to add a field that identifies the VLANs to which the data frames belong. • As defined by IEEE 802.1Q, a 4-byte VLAN tag is inserted between the Source/Destination MAC address field and Length/Type field in an Ethernet frame to identify the VLAN to which the frame belongs. 20 Untagged frame 20 VLAN20: VLAN for the accounting department
  • 49. Huawei Confidential 49 Types of Layer 2 Ethernet Interfaces Layer 2 Ethernet interfaces on a switch are classified into the following types: • Access: often connects to a terminal such as a user PC or server. In most cases, access interfaces connecting to the NICs of such terminals can only receive and send untagged frames, and an access interface can join only one VLAN. • Trunk: allows data frames from multiple VLANs to pass through. These data frames are differentiated by 802.1Q tags. A trunk interface is used for connecting switches and can connect to a sub-interface on a device (such as a router or firewall). • Hybrid: allows data frames from multiple VLANs to pass through. These data frames are differentiated by 802.1Q tags. The data frames sent from a hybrid interface can be manually configured to carry tags for some VLANs and not to carry tags for other VLANs. Access Trunk Core switch Access switch 1 Access switch 2 VLAN 10 (office) VLAN 20 (monitoring) Terminal 1 2001:DB8:1::1/64 Terminal 2 2001:DB8:1::2/64 Terminal 3 2001:DB8:1::3/64 Terminal 4 2001:DB8:2::1/64
  • 50. Huawei Confidential 50 Technical Background: Redundancy and Loops on a Layer 2 Switching Network The introduction of redundancy brings Layer 2 loops. Without redundancy design The access switch has only one uplink. If this link fails, downstream PCs will be disconnected. Access switch Aggregation switch There is only one aggregation switch. If this switch fails, downstream devices will be disconnected. Aggregation switch Aggregation switch Access switch Layer 2 loop Layer 2 loops occur at the expense of enhanced network redundancy.
  • 51. Huawei Confidential 51 Technical Background: Layer 2 Loops Caused by Human Errors Case 2 Case 1 Layer 2 loop Layer 2 loop Some Layer 2 loops may be attributed to human negligence, for example, incorrect cable connections between devices. Some Layer 2 loops may be attributed to incorrect configurations. In this example, the network administrator does not bundle the links between Switch1 and Switch2 to a logical link (aggregated link), causing Layer 2 loops. Switch1 Switch2
  • 52. Huawei Confidential 52 Problems Caused by Layer 2 Loops BUM frame 1 2 2 3 3 4 4 Typical problem 2: MAC address flapping Typical problem 1: broadcast storm Upon receiving BUM frames, Switch3 floods the frames. The flooding happens once again after Switch1 and Switch2 receive the frames, leading to network resource exhaustion and breakdown. Switch1 Switch2 Switch3 BUM frame Source MAC address: 5489- 98EE-788A 1 Switch1 Switch2 Switch3 GE0/0/2 MAC address flapping occurs. For example, Switch1 sees the MAC address 5489-98EE-788A rapidly changing its location between GE0/0/1 and GE0/0/2.
  • 53. Huawei Confidential 53 Spanning Tree Protocol On a network with a spanning tree protocol, switches exchange BPDUs to calculate a loop- free network topology. Finally, one or more interfaces on the network are blocked to eliminate loops. With a spanning tree protocol With a spanning tree protocol With a spanning tree protocol BPDU packet Switch1 (root) Switch1 Switch2 Switch3 Switch2 Switch3 An interface is blocked.
  • 54. Huawei Confidential 54 Spanning Tree Protocol: Dynamically Responding to Network Topology Changes and Adjusting Blocked Interfaces A spanning tree protocol running on a switch continuously monitors the network topology. Upon detecting network topology changes, the spanning tree protocol can automatically make adjustment. Therefore, a spanning tree protocol can be used to eliminate Layer 2 loops and also provide a network redundancy solution. An interface is blocked. A link is faulty. Switch1 Switch2 Switch3 Switch1 Switch2 Switch3 The interface is restored. 1 2 3
  • 55. Huawei Confidential 55 Technical Background: Inter-VLAN Communication PC1 VLAN 10 PC2 VLAN 10 Layer 2 communication When PC1 and PC2 belong to the same VLAN (using the same IP subnet), they are in the same broadcast domain and can directly communicate with each other. This is also known as Layer 2 communication. PC1 VLAN 10 PC2 VLAN 20 Layer 2 communication When PC1 and PC2 belong to different VLANs, they are in different broadcast domains and cannot communicate with each other. PC1 VLAN 10 PC2 VLAN 20 To allow devices in different VLANs to communicate with each other, a routing-capable device is used to implement Layer 3 communication. Router Layer 2 switch Layer 2 switch Layer 2 switch
  • 56. Huawei Confidential 56 Inter-VLAN Communication Using Ethernet Sub-Interfaces PC1 VLAN 10 192.168.1.1/24 Default gateway: 192.168.1.254 Router PC2 VLAN 20 192.168.2.1/24 Default gateway: 192.168.2.254 GE0/0/1.1 192.168.1.254 GE0/0/1.2 192.168.2.254 GE0/0/24 Trunk (VLANs 10 and 20) GE0/0/1 Access (VLAN 10) GE0/0/2 Access (VLAN 20) • A router connects to a switch through a physical interface (GE0/0/1), which allows for the creation of two sub- interfaces GE0/0/1.1 and GE0/0/1.2 as the default gateways of VLANs 10 and 20, respectively. • The sub-interfaces created on a router are used to implement inter-VLAN communication.  Sub-interfaces are logical interfaces created based on an Ethernet interface and are identified by the physical interface ID and sub-interface ID.  Based on service requirements, a network administrator can create multiple sub-interfaces on a physical interface and configure IP addresses and VLAN IDs for these sub- interfaces.
  • 57. Huawei Confidential 57 Layer 3 Switch and VLANIF Interface • A Layer 2 switch provides only the Layer 2 switching function. • Apart from providing the Layer 2 switching function, a Layer 3 switch can implement routing and forwarding through Layer 3 interfaces (such as VLANIF interfaces). • A VLANIF interface is a Layer 3 logical interface that can remove and add VLAN tags in packets. This allows devices in different VLANs to communicate with each other. • A VLANIF interface number corresponds a VLAN ID. For example, VLAN 10 corresponds to VLANIF 10. Routing module Switching module Layer 3 switch VLANIF 20 192.168.2.254/24 VLANIF 10 192.168.1.254/24 PC1 192.168.1.1/24 Gateway: 192.168.1.254 PC2 192.168.1.2/24 Gateway: 192.168.1.254 PC3 192.168.2.1/24 Gateway: 192.168.2.254 GE0/0/1 (Access, PVID = 10) GE0/0/2 (Access, PVID = 10) GE0/0/3 (Access, PVID = 20)
  • 58. Huawei Confidential 58 Core switch Access switch 1 Access switch 2 Terminal 1 Terminal 2 Terminal 3 Terminal 4 Internet • High reliability and high link bandwidth are two important objectives to achieve on a commercial network. • As shown in the figure, if links 1 to 5 are all key links on the network. How can we ensure the reliability of these links and improve their bandwidth? 1 2 3 4 5 How to Improve the Bandwidth and Reliability of Ethernet Links
  • 59. Huawei Confidential 59 Core switch Access switch1 Access switch2 Terminal 1 Terminal 2 Terminal 3 Terminal 4 Internet • Link aggregation is a method of bundling several physical links into a logical link to increase bandwidth and reliability. • These aggregated links are also known as Eth- Trunks. Firewall1 Firewall2 GE0/0/1 GE0/0/2 GE0/0/1 GE0/0/2 Eth-Trunk1 Eth-Trunk1 Increased bandwidth Higher reliability Load balancing Ethernet Link Aggregation
  • 60. Huawei Confidential 60 Working Modes of Ethernet Link Aggregation Switch1 Higher LACP system priority Switch2 Lower LACP system priority Active interface selected by Switch1 Active interface elected by Switch2 Switch2 Switch1 Manual mode LACP mode • In this mode, an Eth-Trunk interface is manually created and member interfaces are manually added to the Eth-Trunk interface, without the use of Link Aggregation Control Protocol (LACP). • This mode is applicable when high link bandwidth is required between two directly connected devices that do not support LACP. • Faults, such as link layer faults and incorrect link connections, cannot be detected. • In this mode, LACP is used in link aggregation. • LACP provides a standard negotiation mechanism for devices to automatically aggregate multiple links. • After an aggregated link is formed, LACP maintains the link status and adjusts or disables link aggregation when the link aggregation condition changes.
  • 61. Huawei Confidential 61 iStack and CSS Stack cable Stack • Intelligent stack (iStack) is a technology that connects multiple stacking-capable switches through stack cables to form a logical switch for data forwarding. • A cluster switch system (CSS) combines two clustering-capable switches into a single logical switch. • Generally, the CSS function is used to set up a stack of modular switches, while the iStack function a stack of fixed switches. iStack CSS Link aggregation CSS link Link aggregation Equivalent to Equivalent to
  • 62. Huawei Confidential 62 Link Aggregation Application (1/2) Interface expansion iStack • If the port density of an existing switch cannot meet the access requirements of users, you can deploy new switches and add all the switches to a stack to increase the number of interfaces. Bandwidth expansion and redundancy backup Aggregation layer Access layer iStack • To achieve higher uplink bandwidth, you can deploy new switches and add all the switches to a stack, and bundle physical links of the member switches into a LAG. This also implements device backup and inter-device redundancy backup, thus improving reliability. iStack link iStack link Eth-Trunk Access layer
  • 63. Huawei Confidential 63 Link Aggregation Application (2/2) • Two switches on the network set up a CSS to form a single logical switch. The simplified networking does not require protocols such as Multiple Spanning Tree Protocol (MSTP) and Virtual Router Redundancy Protocol (VRRP), simplifying network configuration. Additionally, the use of inter-device link aggregation achieves fast convergence and improves reliability. MSTP + VRRP CSS Aggregation layer Access layer CSS link Eth-Trunk
  • 64. Huawei Confidential 64 Typical Architecture iStack CSS iStack iStack iStack/CSS link Eth-Trunk Aggregation layer Core layer • Access devices that are geographically close to each other (for example, access switches in the same building) are virtualized into one logical device using iStack. This ensures sufficient ports and simplifies device management. • Access devices connect to aggregation devices through Eth- Trunks. The logical network structure is simple, without the use of STP or VRRP. As such, the network has advantages in high reliability, high uplink bandwidth, and fast convergence. • iStack is configured on aggregation switches, and Eth-Trunks are configured between upstream/downstream switches to form a reliable and loop-free network. • The CSS cluster networking is used at the core layer, and Eth- Trunks are configured between upstream/downstream switches to form a reliable and loop-free network. Access layer Network
  • 65. Huawei Confidential 65 Contents 1. Basic Concepts of the Data Communication Network 2. IP Routing Basics 3. Ethernet Switching Basics 4. Network Security Overview 5. WAN Technologies 6. Network Management and O&M 7. QoS
  • 66. Huawei Confidential 66 Firewall: Security Zone DMZ GE1/0/5 Server 172.16.1.1/24 Firewall PC1 192.168.1.1/24 GE1/0/1 Untrust zone Trust zone GE1/0/0 Internet • A security zone, also known as a zone, is a concept of the firewall. Most security policies are implemented based on security zones. • A security zone is a collection of networks connected through one or more interfaces. Users on the networks in a security zone have the same security attributes. • Firewall interfaces must be added to security zones. Otherwise, the firewall cannot work properly. • Each security zone defines its security level, which is also called priority. The priority value ranges from 1 to 100. A larger value indicates a higher security level. • By default, four security zones are preset on the firewall: Trust, Untrust, DMZ, and local zones. • Users can define new security zones as required.
  • 67. Huawei Confidential 67 Firewall: Security Policy • The security policy controls traffic forwarding and performs integrated content security detection on traffic. • The firewall can identify traffic attributes and match the attributes with security policy conditions. If all conditions are matched, the traffic matches the security policy and the firewall performs the action defined in the security policy. • Integrated content security detection indicates that the firewall uses the Intelligent Awareness Engine (IAE) to detect and process traffic contents at one time, implementing content security functions including antivirus, intrusion defense, and URL filtering. Trust Internet Untrust Security policy Traffic forwarding control Content security monitoring
  • 68. Huawei Confidential 68 NAT ⚫ Network address translation (NAT) is a method of parsing an IP packet header and replacing the source or destination IP address in the packet header automatically, allowing users on private networks to access public networks through private IP addresses. Users are unaware of the translation from a private IP address into a public one. Data TCP/UDP header IP header Source IP address Destination IP address Source port number Destination port number Layer 4 header Layer 3 header Common types of NAT are as follows: • Source IP address-based NAT  No-port address translation (No-PAT)  Network address and port translation (NAPT) • Destination IP address-based NAT  NAT server  Destination NAT
  • 69. Huawei Confidential 69 IPsec VPN • Enterprise branches can interconnect with each other in various modes, for example, through WAN private lines or Internet lines. • Considering costs and requirements, some enterprises choose to use the Internet lines for interconnection, while security risks may occur. Internet Protocol Security (IPsec) encrypts data packets to ensure secure interconnection for enterprises. Internet VPN
  • 70. Huawei Confidential 70 Contents 1. Basic Concepts of the Data Communication Network 2. IP Routing Basics 3. Ethernet Switching Basics 4. Network Security Overview 5. WAN Technologies 6. Network Management and O&M 7. QoS
  • 71. Huawei Confidential 71 WAN A WAN, short for wide area network, is a network that connects LANs in different areas. A WAN generally covers tens of kilometers to thousands of kilometers. It can connect multiple regions, cities, and countries, or provide long-distance communication across several continents, forming an international remote network. DC Enterprise branch Enterprise HQ Residential area LAN WAN LAN Internet service provider (ISP)
  • 72. Huawei Confidential 72 WAN Device Roles ⚫ There are three basic roles of WAN devices: customer edge (CE), provider edge (PE), and provider (P).  CE: edge devices within a customer network that connect to one or more PEs at a service provider's site.  PE: edge devices within a service provider network that connect to CEs. PEs are important network nodes that can connect to both CEs and Ps.  P: devices within a service provider network that do not directly connect to CEs. CE CE PE PE PE PE Enterprise A Enterprise B P CE CE Enterprise C Enterprise D Service provider
  • 73. Huawei Confidential 73 Traditional IP Routing and Forwarding Traditional IP routing and forwarding uses the hop-by-hop forwarding mode, in which a packet is decapsulated by all routers that receive the packet. Each router needs to obtain the network layer information about the packet and selects routing entries for packet forwarding based on the longest match rule. The repeated processes of packet decapsulation, routing entry selection, and packet re-encapsulation result in low forwarding performance. Destination/Mask Protocol Preference Cost Next Hop Interface 192.168.1.0/24 Direct 0 0 192.168.1.254 GE0/0/0 192.168.12.0/24 Direct 0 0 192.168.12.1 GE0/0/2 192.168.2.0/24 OSPF 10 3 192.168.12.2 GE0/0/2 R1 R2 R5 R6 R3 R4 PC1:192.168.1.1/24 PC2:192.168.2.1/24 IGP G0/0/2 Routing table of R1 Characteristics of traditional IP routing and forwarding: ▫ All routers need to know the network-wide routes. ▫ Traditional IP routing and forwarding is connectionless and cannot guarantee end-to-end QoS. IP address Data IP address Data IP address Data IP address Data IP address Data
  • 74. Huawei Confidential 74 MPLS Label-Based Forwarding ⚫ Multiprotocol Label Switching (MPLS) is a technology applied on IP backbone networks. ⚫ MPLS is a tunneling technology that provides connection-oriented switching for the network layer based on IP routing and control protocols, guaranteeing QoS. ⚫ Local MPLS labels, instead of IP routes, are searched for to forward packets, greatly improving forwarding efficiency. ⚫ Labels used in MPLS label-based forwarding can be manually configured or dynamically allocated using a label distribution protocol. IGP R1 R2 PE node R5 PE node R6 R3 P node R4 P node PC1:192.168.1.1/24 PC2:192.168.2.1/24 MPLS domain IP address Data MPLS Label 1 IP address Data MPLS Label 2 IP address Data IP address Data IP address Data
  • 75. Huawei Confidential 75 MPLS VPN Overview MPLS VPN backbone: a backbone network built by the service provider PE1 P PE2 CE CE Site 1 of customer A Site 2 of customer A Site 1 of customer B Site 2 of customer B CE CE • Customer A and customer B have two sites respectively. Both customers purchase MPLS VPN services from the same service provider. • For example, customer A wants to exchange routes between site 1 and site 2 through the MPLS VPN network so that data between the two sites can be transmitted through the MPLS VPN network. From the perspective of customer A, the logical network is as follows: CE Site 1 of customer A Site 2 of customer A CE MPLS VPN network P Route to site 1 Route to site 1 Data sent to site 1 Data sent to site 1
  • 76. Huawei Confidential 76 Contents 1. Basic Concepts of the Data Communication Network 2. IP Routing Basics 3. Ethernet Switching Basics 4. Network Security Overview 5. WAN Technologies 6. Network Management and O&M 7. QoS
  • 77. Huawei Confidential 77 Network Management Network management plays an important role on a communications network. It ensures that devices work properly and the communications network runs properly to provide efficient, reliable, and secure communications services. Common enterprise network architecture Network administrator The network administrator manages and maintains the network for stable network operations.
  • 78. Huawei Confidential 78 Network Management Modes Network administrator Network management station Web-based network management CLI-based network management SNMP-based centralized network management Traditional network management Enterprise resource planning (ERP) Network automation Network intelligence ` Cloud platform Northbound API Commercial application iMaster NCE DC Campus WAN Branch Video meeting Advertisement operations Office OS Analysis Management Control iMaster NCE-based network management …
  • 79. Huawei Confidential 79 Web-Based and CLI-Based Network Management ⚫ CLI-based and web-based network management modes are generally used for managing small-scale networks.  Network administrators can log in to devices through HTTPS, Telnet, or the console port for device management.  The two modes are cost-effective, as programs or servers do not need to be installed on networks.  Network administrators must have a good command of network knowledge and vendor-specific network configuration commands.  These modes have great limitations for large-scale networks with a complicated topology. Network administrator One-to-one management Vendor A Switch Vendor A Firewall Vendor A AC Vendor A Router Vendor B Router Vendor C Switch Vendor D Switch
  • 80. Huawei Confidential 80 SNMP-Based Centralized Management ⚫ SNMP is a standard network management protocol widely used on TCP/IP networks. It provides a method for managing NEs through using a central computer (that is, a network management station) that runs network management software. NMS Network administrator SNMP packet exchange One-to-many management • Network administrators can use the NMS to query and modify information, and troubleshoot faults on any node on networks, improving work efficiency. • Network devices of different types and from different vendors are managed in a unified manner.
  • 81. Huawei Confidential 81 Typical SNMP Architecture • On a network where SNMP is used for network management, an NMS functions as a network management center and runs a management process. Each managed device needs to run an agent process. The management process and agent processes transmit SNMP messages for communication. • An NMS is a system that uses SNMP to manage and monitor network devices and runs on a server. • Managed devices are devices that are managed by the NMS on the network. • Agent processes run on managed devices to maintain the information data of the managed devices, respond to requests from the NMS, and report the management data to the NMS. Network management process NMS Client Monitor A GUI is provided. SNMP packet Agent process Managed device Agent process Managed device IP network Agent process Managed device
  • 82. Huawei Confidential 82 SNMP Management Model • Query/Modify operation: ▫ The NMS sends an SNMP request packet to an agent process. ▫ The agent process searches the MIB on the device for desired information and sends an SNMP response packet to the NMS. • Trap operation: ▫ If the trap triggering conditions defined for a module on the managed device are met, the agent process sends a message to notify the NMS that a trap has occurred on the device. This helps network administrators promptly process network faults. Network management process NMS Agent process Managed device Management information base (MIB) Managed object SNMP packet exchange
  • 83. Huawei Confidential 83 Huawei iMaster NCE Huawei iMaster NCE is an intelligent network automation platform that integrates management, control, analysis, and AI functions. • iMaster NCE manages and controls: ▫ Traditional devices through traditional technologies such as CLI and SNMP. ▫ SDN-capable networks through NETCONF (based on the YANG model). • iMaster NCE collects network data through protocols such as SNMP and telemetry, performs intelligent big data analysis based on AI algorithms, and displays device and network status in multiple dimensions through dashboards and reports, helping O&M personnel quickly detect and handle device and network exceptions and ensuring normal running of devices and networks. Telemetry Traditional device SDN-capable network device NETCONF/YANG CLI/SNMP Unified cloud platform Management Control Analysis iMaster NCE Open API Intent engine Cloud platform & applications
  • 84. Huawei Confidential 84 NETCONF Overview NETCONF provides a network device management mechanism. You can use NETCONF to add, modify, or delete configurations of network devices, and obtain configurations and status of network devices. NETCONF server Device Device 1 Device 2 Device 3 Network NETCONF client NETCONF message exchange NETCONF has three objects: ▫ NETCONF client ▫ NETCONF server ▫ NETCONF message NETCONF requires that messages exchanged between a client and server be encoded using XML.
  • 85. Huawei Confidential 85 Advantages of NETCONF Description NETCONF SNMP CLI API type Machine-machine interface: As the interface definition is complete and standard, the interface is easy to control and use. Machine- machine interface Man-machine interface Operation efficiency High: Data is modeled based on objects. Only one-time interaction is required for operations on an object. Operations such as filtering, batch processing, and packet splitting are supported. Medium Low Scalability Proprietary protocol capabilities can be extended. Weak Minor Transaction processing Supported: transaction processing mechanisms such as trial running, rollback upon errors, and configuration rollback are supported. Not supported Partially supported Secure transmission Multiple security protocols: SSH, TLS, Blocks Extensible Exchange Protocol (BEEP)/TLS, and Simple Object Access Protocol (SOAP)/HTTP/TLS Only SNMPv3 supports secure transmission. SSH is supported.
  • 86. Huawei Confidential 86 Typical NETCONF Interaction <?xml version="1.0" encoding="UTF-8"?> <rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message- id= "101"> <edit-config> <target> <running/> </target> <config> Configuration content in XML format </config> </edit-config> </rpc> This operation is to modify configurations. <?xml version="1.0" encoding="UTF-8"?> <rpc-reply message-id="101" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"> <ok/> </rpc-reply> RPC SSH connection RPC reply The modification succeeds.
  • 87. Huawei Confidential 87 YANG Language Overview ⚫ YANG is a data modeling language that standardizes NETCONF data content. ⚫ A YANG model defines a data hierarchy and can be used for NETCONF-based operations. Objects of data modeling include configuration data, state data, RPCs, and notifications. This is a complete description of all data transmitted between a NETCONF client and server. A data model is an abstraction and expression of data features. A model is an abstraction and expression of things. Name, gender, height, weight, age, etc. Person Router Interface, routing protocol, IP address, and routing table, etc.
  • 88. Huawei Confidential 88 Telemetry Overview ⚫ Telemetry, also called network telemetry, is a technology that remotely collects data from physical or virtual devices at a high speed. ⚫ Devices periodically send information including interface traffic statistics, CPU usage, and memory usage to collectors in push mode. Compared with the traditional pull mode (question-answer interaction), the push mode provides faster and real-time data collection. T < 1s T > 5 min "Subscription and push" Pull Telemetry supports data collection within subseconds. SNMP Telemetry
  • 89. Huawei Confidential 89 Contents 1. Basic Concepts of the Data Communication Network 2. IP Routing Basics 3. Ethernet Switching Basics 4. Network Security Overview 5. WAN Technologies 6. Network Management and O&M 7. QoS
  • 90. Huawei Confidential 90 Bandwidth/Throughput • Bandwidth, also called throughput, refers to the maximum number of data bits transmitted between two ends within a specified period (1 second) or the average rate at which specific data flows are transmitted between two network nodes. • Bandwidth is expressed in bit/s. • In concept, bandwidth can be compared to the volume of water that can flow through a pipe in a water supply system. IP network
  • 91. Huawei Confidential 91 Delay • A delay refers to the period of time during which a packet is transmitted from a source to its destination. • Use voice transmission as an example. A delay refers to the period from when words are spoken to when they are heard. If a long delay occurs, voices become unclear, discontinuous, or interrupted. • Most users are insensitive to a delay of less than 100 ms. If a delay ranging from 100 ms to 300 ms occurs, the speaker can sense slight pauses in the responder's reply, which can seem annoying to both. If a delay greater than 300 ms occurs, both the speaker and responder obviously sense the delay. IP network
  • 92. Huawei Confidential 92 Delay Variation: Jitter • Jitter refers to the difference in delays of packets in the same flow. • Jitters occur if the period between a device sending a packet and another device receiving the packet differs from one packet to another in a flow, negatively affecting service qualities. • Real-time services, such as voice and video services, are highly sensitive to jitters. Voice or video services are interrupted if packets of these services are sent and received with timing variations. • Jitters also affect protocol packet transmission. Some protocols send interactive packets at a fixed interval. If the jitter is too large, protocol flapping occurs. All transmission systems cause a jitter, but the service quality will not be affected if the jitter does not exceed a specific tolerance. The buffer can overcome the excessive jitter, which, however, increases the delay. IP network
  • 93. Huawei Confidential 93 Packet Loss Rate IP network • Slight packet loss does not affect services. For example, the speaker and the responder are unaware of the loss of a bit or a packet in voice transmission. • The loss of a bit or a group of packet in video transmission may cause the image on the screen to become garbled instantly, but the image can be restored quickly. TCP can be used to transmit data to handle slight packet loss as TCP allows the lost packets to be retransmitted. • The packet loss rate refers to the percentage of the number of packets lost during data transmission.
  • 94. Huawei Confidential 94 QoS Specifications of Common Services Service Type Bandwidth/Throughput Delay Jitter Packet Loss Rate Delay Indicator Jitter Indicator Packet Loss Rate Indicator Video conference and teleconference High Highly sensitive Highly sensitive Predictable ≤ 50 ms ≤ 10 ms ≤ 0.1% E-commerce Medium Sensitive Sensitive Sensitive, reliable transmission ≤ 200 ms ≤ 100 ms Best-effort TCP guarantee Streaming media High Relatively sensitive Relatively sensitive Predictable ≤ 1s ≤ 200 ms ≤ 0.1% Email and file transmission Low Delay-tolerant Jitter-tolerant Best-effort transmission N/A N/A Best-effort TCP guarantee HTML web page browsing Not specific Relatively delay-tolerant Relatively jitter- tolerant Best-effort transmission N/A N/A N/A FTP service Medium Sensitive Sensitive Sensitive, reliable transmission N/A N/A Best-effort TCP guarantee
  • 95. Huawei Confidential 95 IntServ Service Model R1 R2 A bandwidth of 2 Mbit/s is required. A bandwidth of 2 Mbit/s is required. A bandwidth of 2 Mbit/s is required. A bandwidth of 2 Mbit/s is required. OK OK OK OK • Take multiprotocol label switching traffic engineering (MPLS TE) as an example. The IntServ model uses Resource Reservation Protocol (RSVP) for signaling. Resources such as bandwidth and priority are reserved on a known path, and each network element along the path must reserve required resources for data flows requiring QoS guarantee. This resource reservation state is called soft state. • A soft state is a temporary state that refreshes periodically using RSVP messages. Each network element checks whether sufficient resources can be reserved based on these RSVP messages. The path is available only when all involved network elements can provide sufficient resources. • The IntServ model takes effect only when all nodes on the end-to-end network support the model. Since devices at the core layer, aggregation layer, and access layer have different functions, the IntServ model is not supported by these devices. Therefore, the IntServ model cannot be widely used on Internet backbone networks.
  • 96. Huawei Confidential 96 DiffServ Service Model Video Video Data Data Voice Voice Service Type Priority Voice 5 Video 4 Data 0 • In the DiffServ model, edge nodes classify and aggregate traffic. Edge nodes flexibly classify packets based on a combination of conditions in packets, and then mark the packets with different priorities. Other nodes only need to identify the marked priorities for resource allocation and traffic control. • In the DiffServ model, an application does not need to apply for network resources before sending packets and no signaling protocol is required. The DiffServ model provides differentiated services based on the QoS parameters of each data flow. In addition, packets are classified into different service levels, and traffic control and forwarding are performed in a differentiated manner, ensuring end-to-end QoS.
  • 97. Huawei Confidential 97 General QoS Service Process Traffic policing Data flow Inbound interface Outbound interface Traffic classificati on Congestion management Queue 0 Queue 1 Queue N ... Other operations Congestion avoidance Entering a queue Leaving the queue Scheduling General principles: • Traffic classification, traffic marking, and traffic policing are performed in the inbound direction on a service access interface. • Traffic shaping is performed in the outbound direction on a service access interface. If packets of various levels are involved, queue scheduling and a packet discard policy are also required in the outbound direction on the service access interface. • Congestion management and congestion avoidance are performed in the outbound direction on a network-side interface.
  • 98. Huawei Confidential 98 Quiz 1. In the network reference model of the data communication network, at which layer do routing protocols such as OSPF and IS-IS work? A. Application layer B. Transport layer C. Network layer D. Data link layer E. Physical layer
  • 99. Huawei Confidential 99 Summary ⚫ A data communication network comprises multiple types of devices and is deployed with multiple technologies and network protocols. ⚫ Before grasping an in-depth understanding of products and solutions in the data communication network field, you are expected to master basic technologies and familiarize yourself with common data communication devices and basic protocols. ⚫ This course introduces basic knowledge about the data communication network, including basic concepts of the data communication, IP routing, Ethernet switching, network security, WAN technologies, network management and O&M, and QoS of the network, laying a solid foundation for further learning.
  • 101. Huawei Confidential 1 Huawei Enterprise Datacom Network Solutions Overview ⚫ Security Level:
  • 102. Huawei Confidential 2 Foreword This document provides an overview of Huawei's datacom business in the enterprise market, covering Huawei's datacom organizations, business priorities, major products and solutions, and typical use cases. Scenario-specific solutions mentioned in this document will be further detailed in other relevant documents.
  • 103. Huawei Confidential 3 Objectives ⚫ On completion of this course, you will be able to:  Understand the scenario classifications and basic concepts of Huawei's datacom network solutions.  Learn about the basic concepts, typical architectures, and typical application scenarios of campus networks, WLANs, data center networks, WANs, and Network security.  Gain insight into Huawei's solutions in each scenario.
  • 104. Huawei Confidential 4 Contents 1. Huawei Enterprise Datacom Business Overview 2. Huawei Enterprise Datacom Network Solutions 3. Success Stories
  • 105. Huawei Confidential 5 Overview and Objectives This section describes Huawei's vision for the datacom industry, as well as R&D organizational structure, R&D investment, and achievements in each datacom domain.
  • 106. Huawei Confidential 6 Huawei's Vision for the Datacom Industry: IP on Everything Connecting applications 5G Optical Copper Computing power Intelligence Data Connecting everything MPLS IPv6 Enhanced IPv4 • Ultra-high bandwidth • Security • Ubiquitous connectivity • Automation • Deterministic quality • Low latency Digital currency Industrial control Medical data VR video e-Government IP 2030 Delivering the non-stop intelligence and computing power of the intelligent world to everything, and building ubiquitous intelligent IP connections IP on Everything
  • 107. Huawei Confidential 7 Huawei Datacom Product Line: Business Focuses and Organizational Structure Enterprise business The first-choice partner for enterprise and industry digital transformation Serving global enterprises and industry players Carrier business The best strategic partner Serving global carriers Backbone router Network management Metro router Campus network Data center network Network security 6 domains Energy Government Finance Transportation … Manufacturing Education
  • 108. Huawei Confidential 8 Huawei Keeps Innovating and Advancing Datacom Technologies, with 26 Years of Expertise R&D staff 11,000+ scientists and top experts 100+ of annual revenue reinvested into R&D ~15% research centers worldwide 14 0 10 20 30 40 50 60 70 80 Ethernet FlexE WLAN 5G transport SDN/NFV SRv6 Network cloudification Leading contributions to many fields, including Wi-Fi 6, IPv6 Enhanced, and 400G Contributions to 550+ IETF RFCs OpenStack IETF IEEE OPNFV ONAP ITU Broadband Forum
  • 109. Huawei Confidential 9 12+ Industry standards bodies and open source organizations that Huawei has joined 50+ Working groups that Huawei participates in as chair or higher IETF RFCs 550+ 11,500+ Total patents granted by the end of 2021 One of top vendors contributing to IETF RFCs https://www.arkko.com/tools/allstats/ Note: Futurewei is a wholly-owned subsidiary of Huawei. No. 1 contributions in 6 fields in 2021 • IETF routing domain and O&M domain RFCs • IEEE 802.11be (Wi-Fi 7) standards • IEEE 802.3 MAC architecture standards • IEEE 802.1 TSN standards • SPN product (including ITU-T) standards • Mobile bearer network clock standards 49 43 14 20 44 26 0 10 20 30 40 50 60 70 2017 2018 2019 2020 2021 Vendor C Huawei Vendor N Vendor J Vendor E Vendor G Key Player and Contributor: 20 Years of Dedication in Major IP Standards-Defining Organizations In 2021, China Communications Standards Association (CCSA) released the IPv6 Enhanced standard system and Huawei helped set up the IPv6 national standard team.
  • 110. Huawei Confidential 10 SRv6 is a next-generation protocol for IPv4 and IPv6 evolution. It's also the basis of next- generation networks. SRv6 is considered as "5G" for IP protocols. Huawei's more than 10 top experts dedicated to SRv6 standards Li Zhenbin, Huawei's SRv6 chief expert and also IETF IAB member IGP for SRv6 BGP for SRv6 SRv6 VPN PCE for SRv6 SRv6 OAM SRv6 SFC SRv6 SD-WAN SRv6 ANG models FPC YANG models Hu Zhibo/ Dean Cheng Mash Chen/ Zhuang Shunwan Donald Eastlake/ Zhuang Shunwan Dhruv Cheng Li Haoyu Song/Li Cheng Linda Dunbar Hu Zhibo Wang Zitao 3GPP CT Chairman Georg Mayer SR pioneer Stefano. Previdi SRv6 in 3GPP Wireless Li Zhenbin Wu Qin Huawei IP Standards Representative IETF L3SM/L2SM Chair SRv6 in RTG Area SRv6 in OPS Area Transmission 2 2 0 1 1 3 9 3 6 8 12 17 22 25 10 IETF 101 IETF 102 IETF 103 IETF 104 IETF 105 IETF meeting-specific SRv6 standards document contributions by vendors Vendor C Huawei Huawei and vendor C* SRv6 standards document contributions by vendors Huawei Huawei and vendor C* Vendor C Others Up to 75% Data as of IETF 105 Leading the SRv6 Standards: 10+ Top Experts, Remarkable Contributions to 60% of SRv6 Drafts
  • 111. Huawei Confidential 11 Core Contributor to Wi-Fi 6: No. 1 in Submitted Proposals Dr. Osama Aboul Magd, Huawei's top expert, serves as the Chair of the 802.11ax standard working group. Huawei's contributions No. 1 Submitting 318 new proposals (15% of the total), ranking No. 1 among equipment vendors Holding 18% of global Wi-Fi 6 patents, ranking No. 1 among equipment vendors OFDMA 64T64R Massive-MIMO 3GPP: 5G 256-QAM IEEE: Wi-Fi 6 8T8R UL MU-MIMO OFDMA 1024-QAM Wi-Fi 6 inherits Huawei's 5G technologies, and its key technologies are derived from Huawei's proposals.
  • 112. Huawei Confidential 12 AirEngine CloudEngine NetEngine HiSecEngine Cloud campus network Hyper-converged data center network Cloud WAN Network security Huawei Datacom Portfolio: "Four Engines" Products + Integrated Management, Control, and Analysis Platform
  • 113. Huawei Confidential 13 Maintaining a Leading Position in the Global Datacom Market NetEngine WAN routers No. 1 in the Chinese enterprise router market WAN * 2017–2021 OMDIA data CloudEngine data center switches No. 1 global shipments of enterprise data center switch ports Data center network CloudEngine S-series campus switches No. 1 global shipments of 10/25GE ports of enterprise campus switches HiSecEngine USG series firewalls No. 1 share in the Chinese hardware firewall equipment market Network security * 2021 Gartner data * 2021 Gartner data * 2021 IDC data Campus network
  • 114. Huawei Confidential 14 WAN A challenger in Gartner MQ for 5 consecutive years Network firewall Cyber security NetEngine series routers: Campus network Data center network AirEngine Wi-Fi 6: Frost & Sullivan 2021 Global Wi-Fi 6 Market Leadership Award A visionary in Gartner MQ Huawei's CloudCampus Solution 2021 Gartner Peer Insights Customers' Choice SD-WAN Data center switches: a leader named by Forrester Data center switches: Frost & Sullivan 2021 Global Technology Leadership Award Interop Best of Show Award Huawei CloudFabric Solution 2021 Gartner Peer Insights Customers' Choice Interop Best of Show Award Frost & Sullivan 2021 New Product Innovation Leadership Award Gartner Peer Insights Customers' Choice, with the highest rating Winning Many Awards and Wide Industry Recognition
  • 115. Huawei Confidential 15 Cloud Reshapes Enterprise IT Modes and Extends Connectivity, Driving the Upgrade of the Datacom Industry cloud cloud cloud PC + mobile terminal + IoT terminal As-Is: client-server mode To-Be: cloud service mode Changes in cloud and terminals drive network upgrades Server Campus office Campus production Campus assets PC Campus office Campus office Campus office Security mode change Deterministic service quality Data traffic explosion Flat network architecture Expanded management scope Network boundary extension Cloud Hundreds of billion IoT terminal connections by 2025 85% of enterprise applications will be cloud-based by 2025
  • 116. Huawei Confidential 16 What is IPv6 Enhanced? TCP/IP standard model Application layer Transport layer Network layer Network interface layer Technology enhancement IPv6 Enhanced Innovation directions IPv6 IPv6 IPv6 Enhanced (Comprehensive Upgrade from IPv6): Building a Technology Base for Digital Networks Per-hop latency: best-effort → ~30 µs +Security +Deterministic quality +Automation +Ubiquitous connectivity +Low latency +Ultra-high bandwidth 100GE → 400GE Fault recovery: days → minutes Per-hop jitter: Not guaranteed → ~20 µs Threat containment: days → minutes Multi-hop to clouds → one hop to clouds SRv6 FlexE Network-security association Security knowledge graph APN6 In-band flow measurement ADN, AI Non-blocking interconnection 400GE One-hop cloud access Resource isolation Proactive O&M Cloud-network- security integration Application awareness IPv6+1.0 Network programmability SRv6 BE/TE/Policy IPv6+2.0 Experience assurance capability FlexE/IFIT/BIER 6/DIP IPv6+3.0 Application-driven capability APN6 IPv6 Basic network capabilities 1996–2019 2020–2021 2021–2023 2023–2025
  • 117. Huawei Confidential 17 Intelligent Cloud-Network, Accelerating Industry Digital Transformation Vision Solution features Industry-specific solutions Theme Datacom solutions Cross-industry solutions Products IP on Everything Bring digital to every person, home, and organization for a fully connected, intelligent world Digital Intelligent Service-oriented Intelligent cloud-network @ carrier Intelligent Cloud-Network, Accelerating Industry Digital Transformation Intelligent cloud-network solutions CloudEngine NetEngine HiSecEngine AirEngine iMaster NCE CloudWAN 3.0 Cloud WAN (* for the enterprise market) CloudCampus 3.0 Cloud campus network HiSec 3.0 Network security Intelligent Cloud-Network (* for the carrier market) Intelligent cloud-network @ governments Intelligent cloud-network @ cities Intelligent cloud-network @ finance Intelligent cloud-network @ mining Intelligent cloud-network @ electric power Intelligent cloud-network @ manufacturing Intelligent cloud-network @ airports Intelligent cloud-network @ education Intelligent cloud-network @ healthcare CloudFabric 3.0 Hyper-converged data center network
  • 118. Huawei Confidential 18 Section Summary This section describes Huawei's vision for the datacom industry, as well as R&D organizational structure, R&D investment, and market position in each datacom domain. On completion of this section, you will gain a clear consensus on future datacom network development trends
  • 119. Huawei Confidential 19 Quiz 1. What are the names of four engines of Huawei datacom? What product categories do they represent? 2. What is Huawei's vision for the datacom industry?
  • 120. Huawei Confidential 20 Contents 1. Huawei Enterprise Datacom Business Overview 2. Huawei Enterprise Datacom Network Solutions 3. Success Stories
  • 121. Huawei Confidential 21 Datacom Accelerates the Flow of Data, Building Global Digital Network Infrastructures Global Digital Strategy Industry digital transformation Healthcare Health for all Healthcare IoT Medical insurance network Digital government Government Gov. extranet Smart city Manufacturing Advanced manufacturing Manufacturing Light industry Strong transportation Transportation Railway & urban rail Roadway Smart finance Finance Bank Securities & insurance Education Educational modernization Higher education Primary & secondary education Energy Internet Energy Electric power Oil & gas Datacom network Campus network Data center network Security Metro network Backbone network 101011110100000101010101011110 0100010101011010111101011101010 0100010101011010111101011101010 1010111101 1010111101 1 0 1 0 1 1 101011 101011 1 0 1 0 1 1 Digital government Digital society Digital economy Digital economy Digital education Digital village Smart broadband 5G communications Digital technology Remote healthcare Other 11 projects Digital China Accelerating digital development Digital Compass Shaping Europe's digital future Smart Africa Accelerating digital transformation in African countries
  • 122. Huawei Confidential 22 Cloud-Network Is the "Power Grid" of the Digital World, Supplying Non-Stop Digital to Numerous Industries In the past, electricity drove industrialization. Today, clouds drive digitalization. 0101 0101 Services Power grid Power generation Power consumption Wind power Hydropower Coal power Government cloud Private cloud Public cloud Cloud-network supplies Enterprises supplies electric power computing power
  • 123. Huawei Confidential 23 Huawei Intelligent Cloud-Network: Empowering Enterprise Digital Development with Data-driven Intelligence Empowering digital development with data-driven intelligence CloudWAN Cloud WAN VM VM VM CloudCampus Cloud campus network (industrial Internet campus) AR Switch AP Network security CloudFabric Hyper-converged DCN IPv6 Enhanced Network security Hyper-converged DCN Cloud WAN Cloud campus network Intelligent resource scheduling, and fault self-healing, enabling all-Ethernet DCNs Real-time status visualization, intelligent resource scheduling, and one-click service subscription, enabling smooth service cloudification and SLA assurance Network fault self-healing and open network programmability, enabling all-scenario data awareness and interaction Unified cloud-based management, intelligent security protection, and cloud-network-security integration, ensuring E2E security for data collection, aggregation, and processing Intelligent cloud-network solutions
  • 125. Huawei Confidential 25 Campus Network, a Bridge Between the Physical and Digital Worlds Warehousing campus Manufacturing campus R&D campus Retail store Home office HQ campus SaaS cloud Private cloud With the further development of wireless, IoT, and cloud on enterprise campuses, IT and OT infrastructures become ubiquitous. As such, enterprises urgently need to break the boundaries from HQ to branches sites, from workplace to production services, and from fixed to mobile terminals. In this way, cross-regional remote collaboration, cross-service converged transport, and cross-terminal unified access come true. Today's campus network is transformed from a service support system into a key production factor to enable efficient flow of enterprise data and services. If we compare an enterprise as a person, the enterprise's network is the blood vessels while data is the blood that carries oxygen and nutrients. The smooth flow of blood determines the vitality of the person. Likewise, network quality is crucial to improving enterprise office and production efficiency and attaining business growth goals.
  • 126. Huawei Confidential 26 Three Changes Drive Campus Networks Towards the All-Cloud Era Service deployment Terminal access Data flow Traditional IT IT in the cloud era Public & private clouds Local server ... ... Wi-Fi IoT HQ Branch 1 Branch n HQ Branch n Branch 1 Driven by both business and technology, enterprises are undergoing profound changes to service deployment modes, data flow scope, and terminal access modes. As such, campus networks are marching into the cloud era from the PC era. • Service deployment (on-premises → public or private cloud-based): This change brings better economics and scalability. Users can access and use services anytime and anywhere. • Data flow (local data exchange → cross-domain data exchange): This change helps build a global enterprise network that enables real-time interaction between HQ and branches. • Terminal access (Ethernet cable- or optical fiber- based wired access → fully-wireless access): This change removes the restriction of wired access and enables users and terminals to move freely on demand. Wired On-premises → Cloud-based Wired → Wireless LAN → Cross- domain
  • 127. Huawei Confidential 27 Four Challenges Faced by Campus Networks in the Cloud Era 76% of enterprises are dissatisfied with their wireless experience, according to IDC: • Wi-Fi hotspot deployment results in discontinuous coverage, signal blind spots, and frequent disconnection during roaming. • APs interfere with each other, but effective global optimization methods are unavailable, resulting in low performance and poor user experience. Multi-branch interconnection is a must for midsize and large enterprises. Today's pain points include: • Scattered branches, slow private line provisioning, high cost, complex and error-prone manual deployment, and difficult service cloudification • Poor service experience, lack of service visibility, network congestion, frequent video buffering and artifacts, and low user satisfaction Enterprises of all sizes pursue a campus network that aligns with business development. But they face the following challenges: • Given the influx of terminals, inflexible networks cannot achieve fast capacity expansion, resulting in time-consuming terminal onboarding. • Wi-Fi upgrade is needed, but old Ethernet cables cannot quickly meet bandwidth needs and re-cabling is costly. Coverage hole Signal interference Branch Branch CLI 76% of enterprises require campus network reconstruction in the next 2 years. But the reality is: • Planning relies on professional skills. CLI-based deployment is time-consuming and labor- intensive. Policy change response is slow and inefficient. • The huge number of devices complicates O&M. SNMP-based management suffers from lack of visibility, difficult fault locating, and time- consuming troubleshooting. Engineers HQ WAN In the cloud era, Wi-Fi is the preferred access mode for terminals. Ubiquitous WLANs are required to ensure terminal access anytime, anywhere. Furthermore, the influx of terminals calls for flexibly scalable campus networks to quickly adapt to service changes and facilitate rapid terminal onboarding and service rollout. Data interaction between HQ and branches is also becoming more frequent than ever. In turn, this requires stable, reliable, and economical connection modes to ensure high-speed and high-quality cross-domain data interaction and collaboration. More efficient deployment and O&M methods are another urgent needs, as they are crucial to managing numerous devices and user terminals in a more fine- grained manner. Traditional solutions, however, cannot meet these expectations. Enterprises are taking strides towards the all-cloud era, rising great challenges to networks Wi-Fi discontinuous networking Cross-domain fragile infrastructure Cloud outpacing network Difficult network scaling
  • 128. Huawei Confidential 28 CloudCampus 3.0: Fully-Wireless Intelligent Cloud Campus Network, Inspiring Digital Innovation L3 autonomous driving 90% fewer complaints One global network 40% lower private line costs Low-carbon intelligence 30% smaller energy consumption of the entire network Fully-wireless experience 40% higher productivity SD-WAN Router Education Finance Healthcare Retail MSP Manufacturing ... NETCONF/YANG Telemetry Automated deployment Intelligent O&M
  • 129. Huawei Confidential 29 Fully-Wireless Experience: Breaking Down Boundaries and Inspiring Enterprise Innovation Zero signal blind spot Unique dynamic-zoom smart antenna Industry's only to support both omnidirectional and high-density modes, intelligently adapting to diverse scenarios and increasing performance by 20% Zero interruption during roaming Unique AI roaming algorithm 70% higher roaming success rate, 30% larger bandwidth during roaming Zero packet loss for intelligent control First-of-the-kind Wi-Fi 6E network for smart manufacturing 6 GHz frequency band, ultra-low interference Air interface slicing: 99.999% @ 10 ms AG V Production line AOI Wireless extends from workplaces to production environments. How to build a Wi-Fi 6 network that delivers a continuous experience? 76% of enterprises are not satisfied with their WLAN experience. No signal or weak signal Connected but slow Roaming with frequent interruptions Unstable network
  • 130. Huawei Confidential 30 Low-Carbon Intelligence: 3 Layers Simplified into 2 Layers, Entire Network Managed as One Device Public area Mobile office Desktop 1/2.5/10GE Access switch PoE-out Core switch 10/25/40GE Central switch Remote unit ELV room Aggregation switch Access switch Central switch RU 37% TCO savings Low carbon and energy saving • Power consumption control and intelligent hibernation on ports and the entire device • Fanless design for super quietness, reducing energy consumption by 30% Simplified architecture • 3 layers → 2 layers, reducing managed nodes by 80% • Planning-free, management-free, and plug-and-play RUs Service continuity • Exclusive optical-electrical PoE + secondary PoE, ensuring network continuity even without local mains supply • Ultra-high bandwidth offered by the hybrid cable, no cable replacement for 15 years Network-wide automation | AI-powered intelligent O&M
  • 131. Huawei Confidential 31 One network across geographic locations Unique "SD-WAN + SRv6", enabling ultra-fast multi- branch interconnection One network on and off the cloud One hop cloud access, multi-cloud interconnection, ultrafast cloud access 2x cloud access efficiency 5G/MPLS /Internet Internet SaaS IaaS One network for multiple services Unique free mobility, security segmentation for services, consistent user experience Public cloud Private cloud Challenge: difficult cross- domain interworking • How to construct production, OA, and IoT networks in a unified manner? • How to reduce the costs of branch interconnection that relies heavily on costly private lines? • How to improve cloud access efficiency for services that need to go through HQ? 50% Lower network construction costs 40% Smaller private line costs Google Office 365 VPC One Global Network: Ubiquitous Connectivity from Any Branch, for Any User, on Any Terminal HQ MPLS Internet 5G Remote campus Branch SD-WAN
  • 132. Huawei Confidential 32 L3 Autonomous Driving: Autonomous Driving Network for Reliable and Stable Services 47% 44.50% 7.50% 1% 是,企业计划近期实现网络自 动化/智能化 是,企业计划3年实现网络自 动化/智能化 是,企业计划3年以上实现网 络自动化/智能化 并不是 Enterprise network automation and intelligence transformation plan SD-WAN Management + control + analysis Roaming success rate 50% Terminal identification rate 60% 98% 90% Traditional solution Huawei solution AirEngine Wi-Fi 6 CloudEngine S switch HiSecEngine firewall NetEngine AR Network challenges faced by enterprise digital transformation Yes, very soon Yes, in the next 3 years Yes, in more than 3 years No plan
  • 133. Huawei Confidential 33 Section Summary This section describes the four differentiators of CloudCampus 3.0: fully-wireless experience, low-carbon intelligence, one global network, and L3 autonomous driving. ⚫ Fully-wireless experience: Huawei WLAN provides unique features, such as fully-wireless intelligent continuous networking, dynamic-zoom smart antenna, AI roaming, and Wi-Fi 6 Advanced. ⚫ Low-carbon intelligence: The simplified architecture stands out with super power supply via hybrid cable and management-free remote units (RUs). ⚫ One global network: SD-WAN helps build one network on and off the cloud. ⚫ L3 autonomous driving: iMaster NCE offers compelling features such as intelligent verification and application assurance 360.
  • 135. Huawei Confidential 35 Three IT Changes Drive DCNs Towards All-Ethernet Scale: 100x Centralized ↓ Distributed IT architecture Computing unit Storage media PCIe IB Ethernet Performance: 100x or As-Is To-Be Capacity: 1000x SCSI NVMe FC (32G) RoCE (400G) PCIe is replaced HDD → SSD Ethernet Ethernet Centralized Distributed CPU/GPU interconnection over Ethernet All-flash storage interconnection over Ethernet Server interconnection over Ethernet NetApp DELLEMC Intel Ascend Kirin
  • 136. Huawei Confidential 36 CloudFabric 3.0 Hyper-converged DCN Solution Full-lifecycle automation Reduces TTM by 90% Network-wide Intelligent O&M Proactively predicts 90% of faults Improves IOPS by 90% Unleashes 100% of computing power Ethernet for HPC Multi-cloud Three characteristics Core benefits OpenStack Kubernetes FusionSphere VMware Network-wide intelligent O&M • Device-, interface-, optical module-, network-, and service-level • Predictive maintenance, zero service interruption Full-lifecycle automation • Automated network planning, construction, maintenance, and optimization • Intent-driven network, NaaS Lossless Ethernet • Zero packet loss for local and long-distance transmission • Convergence of computing and storage networks Optimization Planning Construction Maintenance Hyper-Converged DCN Automation Intelligence General-purpose computing Storage HPC Ethernet for active-active storage
  • 137. Huawei Confidential 37 L3.5 Autonomous Driving Network, Accelerating Evolution Towards Multi-Cloud and Multi-DC Industry 3.2 3.4 3.6 3.7 3.3 3.6 2.5 2.7 2.9 2.9 2.9 2.7 3.51 2.80 Simulation & verification Network automation Intelligent fault remediation Simulation & verification AI inference Digital twin Public cloud Leaf Leaf Spine Spine Leaf Leaf DC 1 Industry cloud Leaf Leaf Spine Spine Leaf Leaf DC n Customer service systems and operation platforms Northbound: interconnection with service systems Southbound: network-agnostic 2022 OpenStack Kubernetes FusionSphere Red Hat Faster construction Faster deployment Planning + Design Deployment + Provisioning Service Provisioning Monitoring + Troubleshooting Network Change Parameter Adjustment Faster troubleshooting Cross-cloud connectivity: months → minutes Service provisioning: days → minutes Fault locating: hours → minutes Full-lifecycle automation Optimization Planning Construction Maintenance
  • 138. Huawei Confidential 38 CloudFabric Easy Lightweight SDN solution for small and midsize DCs iMaster NCE-Fabric single-node system or cluster (mandatory) CloudEngine switch iMaster NCE-FabricInsight single-node system (optional) Simplification • 8x the industry's leaf scale, facilitating network capacity expansion • Modular spine switches: flexible scalability and high reliability EasY-Maintenance • Comprehensive health evaluation, automatic detection of 90% risks • Proactive fault O&M, rectifying faults in minutes Automation • 3-step service provisioning, taking only minutes • Pre-event simulation and post-event verification, ensuring 100% configuration correctness Expandability • Factory installation and automatic joint commissioning, 50%↓ service costs • One-click deployment, involving only 3 steps with 3 parameters CloudFabric Easy Solution, Helping SMEs Build Cloud Data Center Networks in an "EASY" Way
  • 139. Huawei Confidential 39 Challenge: Ethernet packet loss has gone unsolved for 40 years Why is Ethernet prone to packet loss? N:1 traffic, exceeding the receive bandwidth Higher packet loss for more nodes Real-time, precise speed control through AI algorithm, rather than O&M experts Innovatively introduce AI algorithm to address this global challenge Years of research has failed to resolve this issue. • Real-time traffic model • Tens of millions of random samples Non-precise backpressure Traffic control Frequent transmission suspension Overly low throughput Ever-changing traffic Difficult to seize the best time window …… Scenario auto-adaptation, a result after training of tens of millions of random samples Random samples for adaption to any scenario + Real service samples to ensure service effects OLTP VDI Video OLAP AI Unique algorithm Ethernet for HPC: Eliminates Ethernet Packet Loss and Unleashes 100% of Computing Power Packet loss Scenario auto- adaptation Zero packet loss at 100% throughput Scale auto- adaptation
  • 140. Huawei Confidential 40 Why cannot a traditional Ethernet be used for cross-DC active-active storage? Lossless algorithm upgrade: zero packet loss for a 70 km long-distance transmission on an Ethernet vs The RTT for 70 km intra-city transmission reaches up to 1 ms. The traditional lossless algorithm cannot ensure zero packet loss over such a long-distance transmission. Three-dimensional lossless algorithm fails in long-distance transmission scenarios + Spatiotemporal variable (distance, delay, jitter, etc.) Four-dimensional lossless algorithm ensures zero packet loss over long- distance transmission. Service requirement Traffic model Network status One more dimension, 100x difficulty Annual saving of CNY25.73 million 100+ 8G FC links → 10 100GE links 8G*128 100G*10 Example (a bank with cross-DC active-active storage): 10 x 100GE lossless Ethernet links replace 100+ FC links, reducing links by 90%+. Ethernet for Active-Active Storage: Lossless Long-Distance Transmission, 90%+ Fewer Links Active DC Intra-city active- active DC Active DC Huawei switch Traditional Ethernet: > 0.2% packet loss rate over long-distance transmission Requirement Actual situation Intra-city active- active DC Active-active storage requires zero packet loss
  • 141. Huawei Confidential 41 Section Summary This section describes Huawei's hyper-converged data center network products and major solutions: ⚫ L3.5 autonomous driving network, accelerating evolution towards multi-cloud and multi-DC ⚫ CloudFabric Easy Solution, helping SMEs build cloud data center networks in an "EASY" way ⚫ Ethernet for HPC, eliminating Ethernet packet loss and unleashing 100% of computing power ⚫ Ethernet for active-active storage, achieving lossless long-distance transmission and reducing links by 90%+
  • 143. Huawei Confidential 43 CloudWAN 3.0: Leading WANs into the Intelligent Cloud- Network Era SRv6 FlexE-based slicing 100+ commercial cases worldwide IPv6 Enhanced, laying a foundation for digital infrastructure IFIT NETCONF/YANG Township Federal HQ State DC Real-time visibility Fault locating in minutes Failover in milliseconds One-fiber multipurpose transport: deterministic experience • Hierarchical slicing: 1000+ slices, 10x the industry average. • Slice ID-based slicing for simplified deployment One-network wide connection: network digitalization • Industry-unique hop-by-hop measurement technology, enabling real-time visibility of network- wide status and troubleshooting within minutes One-hop cloud access: flexible cloud-network connection • SRv6 enables service provisioning within minutes and agile service cloudification. One-click fast scheduling: cloud-network coordinated scheduling • SDN + intelligent cloud-map algorithm, improving cloud-network resource utilization by 30% | |
  • 144. Huawei Confidential 44 MPLS MPLS VLAN Cloud path 10 Cloud path 20 Cloud path 30 27 36 27 16 SR & SRv6 standards document contributions by vendors Huawei Vendor C & Huawei Vendor C Others Huawei leads or participates in the formulation of 59% of SRv6 standards. Major contributor to SRv6 standards Leading global SRv6 commercial use 100+ SRv6 commercial deployments (as of 2022) One-Hop Cloud Access: Overcoming Process Barriers with Technology to Enable Fast and Smooth Cloudification for Enterprises VXLAN Interop Best of Show Award Frost & Sullivan Global New Product Innovation Leadership Award Industry: multi-level cross-department collaboration 10+ stages, 30+ days for provisioning Huawei: configuration-free cross-domain cloud path deployment Provisioning within minutes and application- level assurance Cloud path 20: 100 Mbps bandwidth, latency < 2 ms Cloud path 30: 50 Mbps bandwidth, latency < 10 ms
  • 145. Huawei Confidential 45 Most powerful hierarchical slicing, maximal network value Huawei Other vendor vs. 1000+ slices: Huawei-exclusive 32 1000 Restricted protocol path computation capability Patented slice ID- based slicing, planning free Configuration within hours, requiring address planning Slice-based hard isolation, guaranteeing bandwidth and latency Soft isolation and bandwidth sharing, unable to guarantee SLAs 10 Mbps granularity, without wasting resources Only 5 Gbps granularity supported 10 Mbps/slice … 5 Gbps/slice One-Fiber Multipurpose Transport: Hierarchical Slicing Enables IP-Based Production Networks and Ensures Deterministic SLAs Remote mgmt. Video security Office service Remote mgmt. Video security Office service Office service Production service Video service slice Control service slice 10+ networks → N slices over 1 network Multi-network convergence and private network-like experience Telepresence conference: latency < 10 ms Video security: bandwidth > 100 Mbps Office service: service isolation Office service slice Before Now More Faster Better More cost- effective FlexE-based slice 1 FlexE-based slice 2 FlexE-based slice 3 FlexE-based slice 4
  • 146. Huawei Confidential 46 90% 12% 25% IDC1 IDC2 IDC3 CNY120 million/year investment 38% resource utilization Computing power Cost Storage Cloud factors Network factors Bandwidth Reliability Latency 45% 50% 47% IDC1 IDC2 IDC3 Lower TCO Cloud-network resource utilization Intelligent cloud-map algorithm Active DC Intra-city DR DC Inter-city DR DC Cloud management platform Cloud resource information 90,000 cameras 200T/day video data 90% 10% 50% 50% 30% CNY 30 million/year One-Click Fast Scheduling: Intelligent Cloud-Map Algorithm Improves IDC Resource Utilization by 30% Huawei: cloud-network coordinated scheduling, enabling efficient resource utilization Industry: unbalanced cloud-network resource loads, wasting investment