HCNA-HNTD Entry Training Guide v2.1
HCNA-HNTD Entry Training Guide v2.1
HCNA-HNTD Entry Training Guide v2.1
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
n
ea
rn
in
g.
hu
HCNA HNTD
ENTRY
aw
ei
.c
om
/e
Huawei Certification
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
tp
:/
/l
n
aw
ei
.c
om
/e
in
g.
hu
Notice
ht
tp
:/
/l
ea
rn
The information in this document is subject to change without notice. Every effort
has been made in the preparation of this document to ensure accuracy of the
contents, but all statements, information, and recommendations in this document
do not constitute the warranty of any kind, express or implied.
s:
Huawei Certification
ce
HCNA-HNTD
Mo
re
Le
ar
ni
ng
Re
so
ur
n
aw
ei
.c
om
/e
Version Control
Date
Changes
2.0
Initial Release
2.1
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
tp
:/
/l
ea
rn
in
g.
hu
Version
n
aw
ei
.c
om
/e
Table of Contents
in
g.
hu
rn
ea
/l
:/
tp
ht
s:
ce
ur
so
Re
ng
ni
Module 3- Supporting and Maintaining Enterprise Local Area Networks .... Page 217
Establishing a Single Switched Network ................................................. Page 219
Mo
re
Le
ar
n
aw
ei
.c
om
/e
in
g.
hu
rn
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
tp
:/
/l
ea
n
aw
ei
.c
om
/e
in
g.
hu
Relying on its strong technical and professional training and certification system
and in accordance with customers of different ICT technology levels, Huawei
certification is committed to providing customers with authentic, professional
certification, and addresses the need for the development of quality engineers
that are capable of supporting Enterprise networks in the face of an ever changing
ICT industry. The Huawei certification portfolio for routing and switching (R&S) is
comprised of three levels to support and validate the growth and value of
customer skills and knowledge in routing and switching technologies.
rn
The Huawei Certified Network Associate (HCNA) certification level validates the
:/
/l
ea
s:
ht
tp
HCNA certification covers fundamentals skills for TCP/IP, routing, switching and
related IP network technologies, together with Huawei data communications
products, and skills for versatile routing platform (VRP) operation and
management.
so
ur
ce
ng
Re
Mo
re
Le
ar
ni
n
aw
ei
.c
om
/e
Foreword
Outline
in
g.
hu
The HNTD guide contains content relating to the HCDA certification, for
development of engineers who wish to prepare for the HCNA-HNTD examination
or familiarize with TCP/IP technologies and protocols, as well as LAN, WAN
technologies and products, including VRP.
Content
rn
The book contains a total of five modules, starting from the basic knowledge of
/l
ea
data communications; this guide introduces the fields of switching, routing, WAN,
IP security and other basic knowledge, as well as configuration and
implementation of covered technologies using the VRP platform.
:/
ht
tp
ce
s:
Module 2 describes the basics for navigation and operation of the Huawei
versatile routing platform (VRP), to enhance the skills for navigation and
management of Huawei VRP supported products.
Re
so
ur
ng
ni
principles of routing along with skills and knowledge for basic implementation and
support of RIP and OSPF protocols.
Le
ar
Mo
re
Huawei products.
n
aw
ei
.c
om
/e
Scope
in
g.
hu
rn
Prerequisites
/l
ea
:/
Security Declaration
s:
ht
tp
When upgrading the device software or installing a patch, the MD5 hash value
can be checked to confirm software validity. In order to prevent the software from
being modified or replaced, and so prevent potential security risks, you are
advised to perform this operation.
ce
Re
so
ur
A password configured as plain text is saved in the configuration file in plain text.
Plain text passwords represent a high security risk and so the use of cipher text
passwords is recommended. To ensure device security, do not disable the
password complexity check feature where supported, and change the password
periodically.
ng
When configuring the password in cipher text, do not start with or end with the
following characters. If the password starts with or ends with the following
ni
ar
For versions earlier than V200R005C00: The password cannot start with or end
with %$%$......%$%$.
Le
For
version
V200R005C00:
Mo
re
with %@%@......%@%@.
The
password cannot
start
with
or
end
n
aw
ei
.c
om
/e
For V200R005C10 and later versions: The password cannot start with or end
with %@%@......%@%@ or @%@%......@%@%.
in
g.
hu
VRP currently supports the following encryption algorithms: DES, 3DES, AES,
RSA, SHA1, SHA-2, and MD5. The encryption algorithm applied will depend on
the applicable scenario. It is recommended the following encryption algorithms be
For symmetrical encryption, use AES with a key of 128 bits or higher.
rn
For asymmetrical encryption, use RSA with the key of 2048 bits or higher.
For hash algorithms, use SHA2 with a key of 256 bits or higher.
/l
ea
:/
ht
tp
Some personal data may be obtained or used during operation or fault location of
purchased products, services and features for which you are obligated to make
privacy policies and take measures according to the applicable laws of the country
to protect personal data.
s:
ur
ce
Devices can transfer files through FTP, TFTP, and SFTP using SSHv1.99 or
SSHv2. Using FTP, TFTP, or SFTP with SSHv1.99 has potential security risks,
therefore SFTP with SSHv2.0 is recommended.
so
Telnet and STelnet can be used to log in to the device. Using Telnet or STelnet
Re
with SSHv1.99 has potential security risks, therefore use of STelnet with SSHv2.0
is recommended.
HTTP and HTTPS can be used to log in to the web NMS. Using HTTP has
ng
Mo
re
Le
ar
ni
n
aw
ei
.c
om
/e
in
g.
hu
Devices support a mirroring function that is used for network detection and fault
management, and may involve personal communication information. Huawei
cannot collect or store user communication information without permission. It is
recommended that relevant functions used to collect or store user communication
information be enabled under applicable laws and regulations. During user
communication, information usage and storage, measures must be taken to
protect user communication information.
rn
Devices support NetStream which collects statistics and analyzes service traffic.
During service provisioning, personal data may be involved for which you are
obligated to make privacy policies and take measures according to the applicable
laws of the country to protect personal data.
Devices support the packet capture function. This function is mainly used to
tp
:/
/l
ea
detect transmission faults and errors. Huawei cannot collect or store user
communication information without permission. It is recommended that relevant
functions used to collect or store user communication information be enabled
under applicable laws and regulations. During user communication information
collection and storage, measures must be taken to protect user communication
information.
s:
ht
Devices support IPS and URL filtering that involves personal communication,
information collection or storage. Huawei will not collect or save user
communication information independently. You must use the features in
ur
ce
compliance with applicable laws and regulations. Ensure that your customers'
privacy is protected when you are collecting or saving communication information.
so
Re
Mo
re
Le
ar
ni
ng
If some advanced commands for engineering or fault location are incorrectly used,
exceptions may occur or services may be interrupted. It is recommended that the
advanced commands be used by engineers with relevant rights. If necessary, an
application for support from Huawei should be made.
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
in
g.
hu
Convergence switch
Access switch
Hub
Host Terminal
Portable computer
Access server
Telephone
Firewall
RADIUS Server
Mail Server
Access Point
IP telephone
Storage server
App Server
Dome Camera
PTZ Camera
ht
tp
:/
/l
ea
rn
Router
Tablet computer
s:
Smartphone
ur
ce
NMS
Access Controller
Mo
re
Le
ar
ni
ng
Re
so
IPTV
DSLAM
n
in
g.
hu
Introduction
aw
ei
.c
om
/e
Huawei Certification
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
tp
:/
/l
ea
rn
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 15
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 16
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 17
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
Page 18
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ur
ce
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
The evolution in enterprise solutions has enabled for public and third party IP
networks to provide this anywhere anytime connectivity, along with the
development of technologies that establish private network connections over
this public network infrastructure, to extend the remote capabilities of the
enterprise network beyond the physical boundaries of the enterprise, allowing
remote office and users alike to establish a single enterprise domain that
spans over a large geographic expanse.
Page 19
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ur
ce
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
Page 20
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
2. Small and medium sized enterprise networks must take into account the
performance of the network as well as providing redundancy in the event of
network failure in order to maintain service availability to all users. As the
network grows, the threat to the security of the network also increases which
may also hinder services.
Page 21
re
Mo
Page 22
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
Module 1
in
g.
hu
Huawei Certification
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
tp
:/
/l
ea
rn
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 25
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 26
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 27
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
Page 28
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
The coaxial cable represents a more historic form of transmission medium that
may today be limited in usage within the enterprise network. As a transmission
medium, the coaxial cable comprises generally of two standards, the 10Base2
and 10Base5 forms, that are known as Thinnet or Thinwire, and Thicknet or
Thickwire respectively.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
Page 29
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ur
ce
s:
ht
Ethernet cabling has become the standard for many enterprise networks
providing a transmission medium that supports a much higher transmission
capacity. The medium supports a four copper wire pair contained within a
sheath which may or may not be shielded against external electrical
interference. The transmission capacity is determined mainly based on the
category of cable with category 5 (CAT5) supporting Fast Ethernet
transmission capacity of up to 100Mbps, while a higher Gigabit Ethernet
transmission capacity is supported from Category 5 extended (CAT5e)
standards and higher.
Mo
re
Le
ar
ni
ng
Re
so
Page 30
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
Page 31
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
so
ur
ce
s:
ht
Mo
re
Le
ar
ni
ng
Re
Page 32
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
Re
so
ur
Mo
re
Le
ar
ni
ng
Page 33
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
End stations within such a collision domain rely on contention for the
transmission of data to an intended destination. This contentious behavior
requires each end station monitor for incoming data on the segment before
making any attempt to transmit, in a process referred to as Carrier Sense
Multiple-Access Collision Detection (CSMA/CD). However, even after taking
such precautions the potential for the occurrence of collisions as a result of
simultaneous transmission by two end stations remains highly probable.
Page 34
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ht
Transmission modes are defined in the form of half and full duplex, to
determine the behavior involved with the transmission of data over the
physical medium.
so
ur
ce
s:
Half duplex refers to the communication of two or more devices over a shared
physical medium in which a collision domain exists, and with it CSMA/CD is
required to detect for such collisions. This begins with the station listening for
reception of traffic on its own interface, and where it is quiet for a given period,
will proceed to transmit its data. If a collision were to occur, transmission
would cease, followed by initiation of a backoff algorithm to prevent further
transmissions until a random value timer expires, following which
retransmission can be reattempted.
Mo
re
Le
ar
ni
ng
Re
Page 35
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ht
ur
ce
s:
Mo
re
Le
ar
ni
ng
Re
so
Page 36
re
Mo
Page 37
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 38
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 39
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 40
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
The IEEE 802 standards represent a universal standard for managing the
physical transmission of data across the physical network and comprises of
standards including the Ethernet standard 802.3 for physical transmission over
local area networks. Alternative standards exist for transmission over wide
area networks operating over serial based media, including Frame Relay,
HDLC and more legacy standards such as ATM. TCP/IP has been widely
adopted as the protocol suite defining the upper layer standards, regulating
the rules (protocols) and behavior involved in managing the logical forwarding
and delivery between end stations.
Page 41
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
The TCP/IP reference model primarily concerns with the core principles of the
protocol suite, which can be understood as the logical transmission and
delivery of traffic between end stations. As such the TCP/IP protocol reference
model provides a four layer representation of the network, summarizing
physical forwarding behavior under the network interface layer, since lower
layer operation is not the concern of the TCP/IP protocol suite.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
Primary focus remains on the network (or Internet) layer which deals with how
traffic is logically forwarded between networks, and the transport (sometimes
referred to as host-to-host) layer that manages the end-to-end delivery of
traffic, ensuring reliability of transportation between the source and destination
end stations. The application layer represents an interface through a variety of
protocols that enable services to be applied to end user application processes.
Page 42
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
Page 43
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
As instructions are applied to the data, the general size of the data increases.
The additional instructions represent overhead to the existing data and are
recognized as instructions to the layer at which the instructions were applied.
To other layers, the encapsulated instructions are not distinguished from the
original data. The final appending of instructions is performed as part of the
lower layer protocol standards (such as the IEEE 802.3 Ethernet standard)
before being carried as an encoded signal over a physical medium.
Page 44
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
Ethernet frames contain instructions that govern how and whether data can be
transmitted over the medium between two or more points. Ethernet frames
come in two general formats, the selection of which is highly dependant on the
protocols that have been defined prior to the framing encapsulation.
Page 45
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
so
ur
ce
s:
ht
Two frame formats are recognized as standard for Ethernet based networks.
The DIX version 2 frame type standard was originally developed during the
early 1980s, where today it is recognized as the Ethernet II frame type.
Ethernet II was eventually accepted and integrated into the IEEE 802
standards, highlighted as part of section 3.2.6 of the IEEE 802.3x-1997
standards documentation. The IEEE 802.3 Ethernet standard was originally
developed in 1983, with key differences between the frame formats including a
change to the type field that is designed to identify the protocol to which the
data should be forwarded to once the frame instructions have been processed.
In the IEEE 802.3 Ethernet format, this is represented as a length field which
relies on an extended set of instructions referred to as 802.2 LLC to identify
the forwarding protocol.
ni
ng
Re
Ethernet II and IEEE 802.3 associate with upper layer protocols that are
distinguished by a type value range, where protocols supporting a value less
than or equal to 1500 (or 05DC in Hexadecimal) will employ the IEEE 802.3
Ethernet frame type at the data link layer. Protocols represented by a type
value greater than or equal to 1536 (or 0600 in Hexadecimal) will employ the
Ethernet II standard, and which represents the majority of all frames within
Ethernet based networks.
Mo
re
Le
ar
Other fields found within the frame include the destination and source MAC
address fields that identify the sender and the intended recipient(s), as well as
the frame check sequence field that is used to confirm the integrity of the
frame during transmission.
Page 46
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
The Ethernet II frame references a hexadecimal type value which identifies the
upper layer protocol. One common example of this is the Internet Protocol (IP)
which is represented by a hexadecimal value of 0x0800. Since this value for
IP represents a value greater than 0x0600 , it is determined that the Ethernet II
frame type should be applied during encapsulation. Another common protocol
that relies on the Ethernet II frame type at the data link layer is ARP, and is
represented by the hexadecimal value of 0x0806.
Page 47
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
For the IEEE 802.3 frame type, the type field is contained as part of the SNAP
extension header and is not so commonly applied the protocols in todays
networks, partially due to the requirement for additional instructions which
results in additional overhead per frame. Some older protocols that have
existed for many years but that are still applied in support of Ethernet networks
are likely to apply the IEEE 802.3 frame type. One clear example of this is
found in the case of the Spanning Tree Protocol (STP) that is represented by a
value of 0x03 within the type field of the SNAP header.
Page 48
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
Page 49
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
Page 50
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ur
ce
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
Where hosts exist within a shared collision domain, all connected hosts will
receive the unicast transmission but the frame will be generally ignored by all
hosts where the MAC address in the destination MAC field of the frame does
not match the MAC value of the receiving host on a given interface, leaving
only the intended host to accept and process the received data. Unicast
transmissions are only forwarded from a single physical interface to the
intended destination, even in cases where multiple interfaces may exist.
Page 51
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
Page 52
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
A more efficient alternative to broadcast that has begun to replace the use of
broadcasts in many newer technologies is the multicast frame type. Multicast
forwarding can be understood as a form of selective broadcast that allows
select hosts to listen for a specific multicast MAC address in addition to the
unicast MAC address that is associated with the host, and process any frames
containing the multicast MAC address in the destination MAC field of the
frame.
so
ur
Mo
re
Le
ar
ni
ng
Re
In a local area network, the true capability of multicast behavior at the data link
layer is limited since forwarding remains similar to that of a broadcast frame in
which interrupts are still prevalent throughout the network. The only clear
difference with broadcast technology is in the selective processing by
receiving end stations. As networks expand to support multiple local area
networks, the true capability of multicast technology as an efficient means of
transmission becomes more apparent.
Page 53
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ur
ce
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
Where two hosts are connected over a medium capable of supporting full
duplex transmission as in the case of media such as 10BaseT, it is considered
not possible for transmitted frames to suffer collisions since transmission and
receipt of frames occurs over separate wires and therefore there is no
requirement for CSMA/CD to be implemented.
Page 54
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
Once a frame is forwarded from the physical interface of the host, it is carried
over the medium to its intended destination. In the case of a shared network,
the frame may be received by multiple hosts who will assess whether the
frame is intended for their interface by analyzing the destination MAC address
in the frame header. If the destination MAC address and the MAC address of
the host are not the same, or the destination MAC address is not a MAC
broadcast or multicast address to which the host is listening for, the frame will
be ignored and discarded.
Re
so
ur
For the intended destination, the frame will be received and processed, initially
by confirming that the frame is intended for the hosts physical interface. The
host must also confirm that the integrity of the frame has been maintained
during transmission by taking the value of the frame check sequence (FCS)
field and comparing this value with a value determined by the receiving host. If
the values do not match, the frame will be considered as corrupted and will be
subsequently discarded.
Mo
re
Le
ar
ni
ng
For valid frames, the host will then need to determine the next stage of
processing by analyzing the type field of the frame header and identify the
protocol to which this frame is intended. In this example the frame type field
contains a hexadecimal value of 0x0800 that identifies that the data taken from
the frame should be forwarded to the Internet Protocol, prior to which, the
frame header and trailer are discarded.
Page 55
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ht
1. Data link layer frames contain a Type field that references the next
protocol to which data contained within the frame should be forwarded.
Common examples of forwarding protocols include IP (0x0800) and ARP
(0x0806).
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
Page 56
re
Mo
Page 57
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 58
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 59
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 60
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
Prior to discarding the frame header and trailer, it is necessary for the next set
of instructions to be processed to be determined from the frame header. As
highlighted, this is identified by determining the field value in the type field,
which in the this instance represents a frame that is destined for the IP
protocol following completion of the frame process.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
The key function of the frame is to determine whether the intended physical
destination has been reached, that the integrity of the frame has remained in
tact. The focus of this section will identify how data is processed following the
discarding of the frame headers and propagation of the remaining data to the
Internet Protocol.
Page 61
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
ng
Re
so
ur
ce
Mo
re
Le
ar
ni
Page 62
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
Each IPv4 address represents a 32 bit value that is often displayed in a dotted
decimal format but for detailed understanding of the underlying behavior is
also represented in a binary (Base 2) format. IP addresses act as identifiers
for end systems as well as other devices within the network, as a means of
allowing such devices to be reachable both locally and by sources that are
located remotely, beyond the boundaries of the current network.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
The IP address consists of two fields of information that are used to clearly
specify the network to which an IP address belongs as well as a host identifier
within the network range, that is for the most part unique within the given
network.
Page 63
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
Each network range contains two important addresses that are excluded from
the assignable network range to hosts or other devices. The first of these
excluded addresses is the network address that represents a given network as
opposed to a specific host within the network. The network address is
identifiable by referring to the host field of the network address, in which the
binary values within this range are all set to 0, for which it should also be
noted that an all 0 binary value may not always represent a 0 value in the
dotted decimal notation.
Mo
re
Le
ar
ni
ng
Re
so
ur
The second excluded address is the broadcast address that is used by the
network layer to refer to any transmission that is expected to be sent to all
destinations within a given network. The broadcast address is represented
within the host field of the IP address where the binary values within this range
are all set to 1. Host addresses make up the range that exists between the
network and broadcast addresses.
Page 64
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
The use of binary, decimal and hexadecimal notations are commonly applied
throughout IP networks to represent addressing schemes, protocols and
parameters, and therefore knowledge of the fundamental construction of these
base forms is important to understanding the behavior and application of
values within IP networks.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
Page 65
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
Page 66
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
Page 67
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
Re
so
ur
In truth, a single Ethernet network could never support such a large number of
hosts since Ethernet does not scale well, due in part to broadcasts that
generate excessive network traffic within a single local area network. Class C
address ranges allow for a much more balanced network that scales well to
Ethernet networks, supplying just over 2 million potential networks, with each
network capable of supporting around 256 addresses, of which 254 are
assignable to hosts.
Mo
re
Le
ar
ni
ng
Class D is a range reserved for multicast, to allow hosts to listen for a specific
address within this range, and should the destination address of a packet
contain a multicast address for which the host is listening, the packet shall be
processed in the same way as a packet destined for the hosts assigned IP
address. Each class is easily distinguishable in binary by observing the bit
value within the first octet, where a class A address for instance will always
begin with a 0 for the high order bit, whereas in a Class B the first two high
order bits are always set as 1 and 0, allowing all classes to be easily
determined in binary.
Page 68
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ur
ce
s:
ht
Within IPv4, specific addresses and address ranges have been reserved for
special purposes. Private address ranges exist within the class A, B and C
address ranges to prolong the rapid decline in the number of available IP
addresses. The number of actual end systems and devices that require IP
addressing in the world today exceeds the 4294967296 addresses of the 32
bit IPv4 address range, and therefore a solution to this escalating problem was
to allocate private address ranges that could be assigned to private networks,
to allow for conservation of public network addresses that facilitate
communication over public network infrastructures such as the Internet.
Re
so
Private networks have become common throughout the enterprise network but
hosts are unable to interact with the public network, meaning that address
ranges can be reused in many disparate enterprise networks. Traffic bound for
public networks however must undergo a translation of addresses before data
can reach the intended destination.
Mo
re
Le
ar
ni
ng
Page 69
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
For a host to forward traffic to another host, it must firstly determine whether
the destination is part of the same IP network. This is achieved through
comparison of the destination network to the source network (host IP address)
from which the data is originating. Where the network ranges match, the
packet can be forwarded to the lower layers where Ethernet framing presides,
for processing. In the case where the intended destination network varies from
the originating network, the host is expected to have knowledge of the
intended network and the interface via which a packet/frame should be
forwarded before the packet can be processed by the lower layers. Without
this information, the host will proceed to drop the packet before it even
reaches the data link layer.
Page 70
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
Page 71
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
Page 72
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ur
ce
s:
ht
Re
so
This is understood as the address where all host bit values are set to 0, in this
case generating a default network address of 192.168.1.0. Where the host
values are represented by a continuous string of 1 values, the broadcast
address for the network can be determined. Where the last octet contains a
string of 1 values, it represents a decimal value of 255, for which a broadcast
address of 192.168.1.255 can be derived.
Mo
re
Le
ar
ni
ng
Page 73
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
Page 74
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
One of the main constraints of the default subnet mask occurs when multiple
network address ranges are applied to a given enterprise in order to generate
logical boundaries between the hosts within the physical enterprise network.
The application of a basic addressing scheme may require a limited number of
hosts to be associated with a given network, for which multiple networks are
applied to provide the logical segmentation of the network. In doing so
however, a great deal of address space remains unused, displaying the
inefficiency of default subnet mask application.
Page 75
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
so
ur
In the example given, a simple variation has been made to the default class C
network which by default is governed by a 24 bit mask. The variation comes in
the form of a borrowed bit from the host ID which has been applied as part of
the network address. Where the deviation of bits occurs in comparison to the
default network, the additional bits represent what is known as the subnet ID.
Mo
re
Le
ar
ni
ng
Re
In this case a single bit has been taken to represent the sub-network for which
two sub-networks can be derived, since a single bit value can only represent
two states of either 1 or 0. Where the bit is set to 0 it represents a value of 0,
where is it is set to 1 it represents a value of 128. In setting the host bits to 0,
the sub-network address can be found for each sub-network, by setting the
host bits to 1, the broadcast address for each sub-network is identifiable. The
number of supported hosts in this case represents a value of 27 minus the
sub-network address and broadcast address for each sub-network, resulting in
each sub-network supporting a total of 126 valid host addresses.
Page 76
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
A single default class C address range has been defined, for which variable
length subnet masks are required to accommodate each of the logical
networks within a single default address range. Effective subnet mask
assignment requires that the number of host bits necessary to accommodate
the required number of hosts be determined, for which the remaining host bits
can be applied as part of the subnet ID, that represents the variation in the
network ID from the default network address.
Page 77
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
so
ur
ce
s:
ht
Mo
re
Le
ar
ni
ng
Re
This notation works on the principle that classful address ranges such as that
of class C can be understood to have a 24 bit prefix that represents the subnet
or major network boundary, and for which it is possible to summarize multiple
network prefixes into a single larger network address prefix that represents the
same networks but as a single address prefix. This has helped to alleviate the
number of routes that are contained particularly within large scale routing
devices that operate on a global scale, and has provided a more effective
means of address management. The result of CIDR has had far reaching
effects and is understood to have effectively slowed the overall exhaustion
rate of the IPv4 address space.
Page 78
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
The forwarding of packets requires that the packet first determine a forwarding
path to a given network, and the interface via which a packet should be
forwarded from, before being encapsulated as a frame and forwarded from the
physical interface. In the case where the intended network is different from the
originating network, the packet must be forwarded to a gateway via which the
packet is able to reach its intended destination.
Re
so
ur
ce
Mo
re
Le
ar
ni
ng
In the case of hosts that belong to different networks that are not divided by a
physical gateway, it is the responsibility of the host to function as the gateway,
for which the host must firstly be aware of the route for the network to which
packets are to be forwarded, and should specify the hosts own interface IP
address as the gateway IP address, via which the intended destination
network can be reached.
Page 79
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
The data of forwarded packets exists in many formats and consists of varying
sizes, often the size of data to be transmitted exceeds the size that is
supported for transmission. Where this occurs it is necessary for the data
block to be broken down into smaller blocks of data before transmission can
occur. The process of breaking down this data into manageable blocks is
known as fragmentation.
Re
so
ur
ce
The identification, flags and fragment offset fields are used to manage
reassembly of fragments of data once they are received at their final intended
destination. Identification distinguishes between data blocks of traffic flows
which may originate from the same host or different hosts. The flags field
determines which of a number of fragments represents the last fragment at
which time initiation of a timer is started prior to reassembly, and to notify that
reassembly of the packet should commence.
Mo
re
Le
ar
ni
ng
Finally the fragment offset labels the bit value for each fragment as part of a
number of fragments, the first fragment is set with a value of 0 and
subsequent fragments specify the value of first bit following the previous
fragment, for example where the initial fragment contains data bits 0 through
to 1259, the following fragment will be assigned an offset value of 1260.
Page 80
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
Page 81
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
Upon verification that the packet has reached its intended destination, the
network layer must determine the next set of instructions that are to be
processed. This is determined by analyzing the protocol field of the IP header.
As with the type field of the frame header, a hexadecimal value is used to
specify the next set of instructions to be processed.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
It should be understood that the protocol field may refer to protocols at either
the network layer, such as in the case of the Internet Control Message
Protocol (ICMP), but may also refer to upper layer protocols such as the
Transmission Control Protocol (06/0x06) or User Datagram Protocol
(17/0x11), both of which exist as part of the transport layer within both the
TCP/IP and OSI reference models.
Page 82
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ht
1. The IP subnet mask is a 32 bit value that describes the logical division
between the bit values of an IP address. The IP address is as such
divided into two parts for which bit values represent either a network or
sub-network, and the host within a given network or sub-network.
so
ur
ce
s:
2. IP packets that are unable to reach the intended network are susceptible
to being indefinitely forwarded between networks in an attempt to discover
their ultimate destination. The Time To Live (TTL) feature is used to
ensure that a lifetime is applied to all IP packets, so as to ensure that in
the event that an IP packet is unable to reach its destination, it will
eventually be terminated. The TTL value may vary depending on the
original source.
Mo
re
Le
ar
ni
ng
Re
Page 83
re
Mo
Page 84
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 85
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 86
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 87
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
Page 88
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
In order to resolve this, a redirect message is sent to the host. The redirect
message advises the host to send its traffic for the intended destination
directly to the gateway to with which the destination network is associated,
since this represents a shorter path to the destination. The gateway proceeds
however to forward the data of the original packet to its intended destination.
Page 89
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
Page 90
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
Typical examples include cases where loops may have occurred in the
network, and consequentially caused the time to live parameter in the IP
header to expire, resulting in a ttl exceeded in transit error message being
generated. Other examples include an intended destination being
unreachable, which could relate to a more specific issue of the intended
network not being known by the receiving gateway, or that the intended host
within the destination network not being discovered. In all events an ICMP
message is generated with a destination based on the source IP address
found in the IP header, to ensure the message notifies the sending host.
Page 91
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
ICMP messages are sent using the basic IP header, which functions together
as an integral part of the ICMP message, such is the case with the TTL
parameter that is used to provide support for determining whether a
destination is reachable. The format of the ICMP message relies on two fields
for message identification in the form of a type/code format, where the type
field provides a general description of the message type, and the code and a
more specific parameter for the message type.
Re
so
ur
Mo
re
Le
ar
ni
ng
As a final means of tracing data to a specific process, the ICMP message may
carry the IP header and a portion of the data that contains upper layer
information that enables the source to identify the process for which an error
occurred, such as cases where the ICMP TTL expires in transit.
Page 92
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
A wide number of ICMP type values exist to define clearly the different
applications of the ICMP control protocol. In some cases the code field is not
required to provide a more specific entry to the type field, as is found with
echo requests that have a type field of 8 and the corresponding reply, which is
generated and sent as a separate ICMP message to the source address of the
sender, and defined using a type field of 0.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
Alternatively, certain type fields define a very general type for which the
variance is understood through the code field, as in the case of the type 3
parameter. A type field of 3 specifies that a given destination is unreachable,
while the code field reflects the specific absence of either the network, host,
protocol, port (TCP/UDP), ability to perform fragmentation (code 4), or source
route (code 5) in which a packet, for which a forwarding path through the
network is strictly or partially defined, fails to reach its destination.
Page 93
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
The application of ICMP can be understood through the use of tools such as
Ping. The Ping application may be used as a tool in order to determine
whether a destination is reachable as well as collect other related information.
The parameters of the Ping application allow an end user to specify the
behavior of the end system in generating ICMP messages, with consideration
of the size of the ICMP datagram, the number of ICMP messages generated
by the host, and also the duration in which it is expected a reply is received
before a timeout occurs. This is important where a large delay occurs since a
timeout may be reported by the Ping application before the ICMP message
has had the opportunity to return to the source.
Page 94
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
Page 95
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
For a given destination, the reachability to each hop along the path is
measured by initially defining a TTL value in the IP header of 1, causing the
TTL value to expire before the receiving gateway is able to propagate the
ICMP message any further, thus generating a TTL expired in transit message
together with timestamp information, allowing for a hop by hop assessment of
the path taken through the network by the datagram to the destination, and a
measurement of the round trip time. This provides an effective means of
identifying the point of any packet loss or delay that may be incurred in the
network and also aids in the discovery of routing loops.
Page 96
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
ng
Re
so
ur
This is achieved by measuring the duration between when the ICMP message
was sent and when the corresponding TTL expired in transit ICMP error is
received. When receiving a packet, the ultimate destination is unable to
discover the port specified in the packet, and thus returns an ICMP Type 3,
Code 3 (Port Unreachable) packet, and after three attempts the traceroute test
ends. The test result of each probe is displayed by the source, in accordance
with the path taken from the source to the destination. If a fault occurs when
the trace route command is used, the following information may be displayed:
ni
ar
Le
Mo
re
Page 97
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ht
1. The Ping application uses the echo request message of type 8 to attempt
to discover the destination. A separate echo reply message, defined by a
type field of 0, is returned to the original source based on the source IP
address in the IP header field.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
2. In the event that the TTL value of an IP datagram reaches 0 before the
datagram is able to reach the intended destination, the gateway device
receiving the datagram will proceed to discard it and return an ICMP
message to the source to notify that the datagram in question was unable
to reach the intended destination. The specific reason will be defined by
the code value to reflect for example whether the failure was due to a
failure to discover the host, a port on the host or whether the service for a
given protocol was not supported etc.
Page 98
re
Mo
Page 99
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 100
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 101
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 102
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
Page 103
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
The ARP packet is generated as part of the physical target address discovery
process. Initial discovery will contain partial information since the destination
hardware address or MAC address is to be discovered. The hardware type
refers to Ethernet with the protocol type referring to IP, defining the
technologies associated with the ARP discovery. The hardware and protocol
length identifies the address length for both the Ethernet MAC address and the
IP address, and is defined in bytes.
Re
so
ur
The operation code specifies one of two states, where the ARP discovery is
set as REQUEST for which reception of the ARP transmission by the
destination will identify that a response should be generated. The response
will generate REPLY for which no further operation is necessary by the
receiving host of this packet, and following which the ARP packet will be
discarded. The source hardware address refers to the MAC address of the
sender on the physical segment to which ARP is generated. The source
protocol address refers to the IP address of the sender.
Mo
re
Le
ar
ni
ng
Page 104
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
For a given destination the host will determine the IP address to which data is
to be forwarded, however before encapsulation of the data can commence,
the host must determine whether a physical forwarding path is known. If the
forwarding path is known encapsulation to the destination can proceed,
however quite often the destination is not known and ARP must be
implemented before data encapsulation can be performed.
Page 105
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
so
ur
ce
Learned addresses will populate the ARP cache table and remain active for a
fixed period of time, during which the intended destination can be discovered
without the need for addition ARP discovery processes. Following a fixed
period, the ARP cache table will remove ARP entries to maintain the ARP
cache tables integrity, since any change in the physical location of a
destination host may result in the sending host inadvertently addressing data
to a destination at which the destination host no longer resides.
Mo
re
Le
ar
ni
ng
Re
The ARP cache lookup is the first operation that an end system will perform
before determining whether it is necessary to generate an ARP request. For
destinations beyond the boundaries of the hosts own network, an ARP cache
lookup is performed to discover the physical destination address of the
gateway, via which the intended destination network can be reached.
Page 106
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
The host is currently unaware of the location of the destination and therefore
must send the ARP request as a broadcast to all destinations within the same
local network boundary. This means that a broadcast address is used as the
destination MAC address. Once the frame is populated, it is forwarded to the
physical layer where it is propagated along the physical medium to which the
host is connected. The broadcasted ARP packet will be flooded throughout the
network to all destinations including any gateway that may be present,
however the gateway will prevent this broadcast from being forwarded to any
network beyond the current network.
Page 107
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
If the intended network destination exists, the frame will arrive at the physical
interface of the destination at which point lower layer processing will ensue.
ARP broadcasts mean that all destinations within the network boundary will
receive the flooded frame, but will cease to process the ARP request, since
the destination protocol address does not match to the IP address of those
destinations.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
Where the destination IP address does match to the receiving host, the ARP
packet will be processed. The receiving host will firstly process the frame
header and then process the ARP request. The destination host will use the
information from the source hardware address field in the ARP header to
populate its own ARP cache table, thus allowing for a unicast frame to be
generated for any frame forwarding that may be required, to the source from
which the ARP request was received.
Page 108
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
The destination will determine that the ARP packet received is an ARP
request and will proceed to generate an ARP reply that will be returned to the
source, based on the information found in the ARP header. A separate ARP
packet is generated for the reply, for which the source and destination protocol
address fields will be populated. However, the destination protocol address in
the ARP request packet now represents the source protocol address in the
ARP reply packet, and similarly the source protocol address of the ARP
request becomes the destination protocol address in the ARP reply.
Mo
re
Le
ar
ni
ng
Re
so
ur
The destination hardware address field is populated with the MAC of the
source, discovered as a result of receiving the ARP request. For the required
destination hardware address of the ARP request, it is included as the source
hardware address of the ARP reply, and the operation code is set to reply, to
inform the destination of the purpose of the received ARP packet, following
which the destination is able to discard the ARP packet without any further
communication. The ARP reply is encapsulated in the Ethernet frame header
and trailer, with the destination MAC address of the Ethernet frame containing
the MAC entry in the ARP cache table, allowing the frame to be forwarded as
a unicast frame back to the host that originated the ARP request.
Page 109
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
Upon receiving the ARP reply, the originating host will validate that the
intended destination is correct based on the frame header, identify that the
packet header is ARP from the type field and discard the frame headers. The
ARP reply will then be processed, with the source hardware address of the
ARP reply being used to populate the ARP cache table of the originating host
(Host A).
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
Following the processing of the ARP reply, the packet is discarded and the
destination MAC information is used to facilitate the encapsulation process of
the initial application or protocol that originally requested discovery of the
destination at the data link layer.
Page 110
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ur
ce
s:
ht
The ARP protocol is also applied to other cases such as where transparent
subnet gateways are to be implemented to facilitate communication across
physical networks, where hosts are considered to be part of the same
subnetwork. This is referred to as Proxy ARP since the gateway operates as a
proxy for the two physical networks. When an ARP request is generated for a
destination that is considered to be part of the same subnet, the request will
eventually be received by the gateway. The gateway is able to determine that
the intended destination exists beyond the physical network on which the ARP
request was generated.
ng
Re
so
Mo
re
Le
ar
ni
The gateway upon confirming the reachability to the intended destination will
then generate an ARP reply to the original source (Host A) using the hardware
address of the interface on which the ARP reply was forwarded. The gateway
will as a result operate as an agent between the two physical networks to
facilitate data link layer communication, with both hosts forwarding traffic
intended for destinations in different physical networks to the relevant physical
address of the Proxy gateway.
Page 111
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
Re
so
ur
ce
The ARP request is flooded throughout the network to all link layer
destinations by setting the destination MAC as broadcast, to ensure all end
stations and gateways receive the flooded frame. All destinations will process
the frame, and should any destination discover that the destination IP address
within the ARP request match the address of a receiving end station or
gateway, an ARP reply will be generated and returned to the host that
generated the ARP request.
Mo
re
Le
ar
ni
ng
Through this method the originating host is able to identify duplication of the IP
address within the network, and flag an IP address conflict so to request that a
unique address be assigned. This means of generating a request based on
the hosts own IP address defines the basic principles of gratuitous ARP.
Page 112
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
Page 113
re
Mo
Page 114
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 115
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 116
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 117
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
Page 118
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ur
ce
s:
ht
As a means for allowing for many processes within a single host to use TCP
communication facilities simultaneously, TCP provides a set of logical ports
within each host. The port value together with the network layer address is
referred to as a socket, for which a pair of sockets provide a unique identifier
for each connection, in particular where a socket is used simultaneously in
multiple connections. That is to say, a process may need to distinguish among
several communication streams between itself and another process (or
processes), for which each process may have a number of ports through
which it communicates with the port or ports of other processes.
ng
Re
so
Certain processes may own ports and these processes may initiate
connections on the ports that they own. These ports are understood as IANA
assigned system ports or well known ports and exist in the port value range of
0 1023. A range of IANA assigned user or registered ports also exist in the
range of 1024 49151, with dynamic ports, also known as private or
ephemeral ports in the range of 49152 65535, which are not restricted to any
specific application. Hosts will generally be assigned a user port value for
which a socket is generated to a given application.
Mo
re
Le
ar
ni
Common examples of TCP based applications for which well known port
numbers have been assigned include FTP, HTTP, TELNET, and SMTP, which
often will work alongside other well known mail protocols such as POP3 (port
110) and IMAP4 (port 143).
Page 119
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
The TCP header allows TCP based applications to establish connectionoriented data streams that are delivered reliability, and to which flow control is
applied. A source port number is generated where a host intends to establish
a connection with a TCP based application, for which the destination port will
relate to a well known/registered port to which a well known/registered
application is associated.
Re
so
ur
ce
Code bits represent functions in TCP, and include an urgent bit (URG) used
together the urgent pointer field for user directed urgent data notifications,
acknowledgment of received octets in association with the acknowledgement
field (ACK), the push function for data forwarding (PSH), connection reset
operations (RST), synchronization of sequence numbers (SYN) and indication
that no more data is to be received from the sender (FIN). Additional code bits
were introduced in the form of ECN-Echo (ECE) and Congestion Window
Reduced (CWR) flags, as a means of supporting congestion notification for
delay sensitive TCP applications.
Mo
re
Le
ar
ni
ng
The explicit congestion notification (ECN) nonce sum (NS) was introduced as
a follow-up alteration to eliminate the potential abuse of ECN where devices
along the transmission path may remove ECN congestion marks. The Options
field contains parameters that may be included as part of the TCP header,
often used during the initial connection establishment, as in the case of the
maximum segment size (MSS) value, that may be used to define the size of
the segment that the receiver should use. TCP header size must be a sum of
32 bits, and where this is not the case, padding of 0 values will be performed.
Page 120
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
When two processes wish to communicate, each TCP must first establish a
connection (initialize the synchronization of communication on each side).
When communication is complete, the connection is terminated or closed to
free the resources for other uses. Since connections must be established
between unreliable hosts and over the unreliable Internet domain, a
handshake mechanism with clock-based sequence numbers is used to avoid
erroneous initialization of connections.
Re
so
ur
Mo
re
Le
ar
ni
ng
Page 121
n
aw
ei
.c
om
/e
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
tp
:/
/l
ea
rn
in
g.
hu
The final step of the connection handshake involves the initial TCP
acknowledging the sequence number of the peering TCP by setting the
acknowledgement number to equal the received sequence number plus one,
together with the ACK bit in the TCP header, allowing an ESTABLISHED state
to be reached.
Page 122
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
Since the TCP transmission is sent as a data stream, every octet can be
sequenced, and therefore each octet can be acknowledged. The
acknowledgement number is used to achieve this by responding to the sender
as confirmation of receipt of data, thus providing data transport reliability. The
acknowledgement process however is cumulative, meaning that a string of
octets can be acknowledged by a single acknowledgement by reporting to the
source the sequence number that immediately follows the sequence number
that was successfully received.
Re
so
ur
In the example a number of bytes (octets) are transmitted together before TCP
acknowledgement is given. Should an octet fail to be transmitted to the
destination, the sequence of octets transmitted will only be acknowledged to
the point at which the loss occurred. The resulting acknowledgement will
reflect the octet that was not received in order to reinitiate transmission from
the point in the data stream at which the octet was lost.
Mo
re
Le
ar
ni
ng
Page 123
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
The TCP window field provides a means of flow control that governs the
amount of data sent by the sender. This is achieved by returning a "window"
with every TCP segment for which the ACK field is set, indicating a range of
acceptable sequence numbers beyond the last segment successfully
received. The window indicates the permitted number of octets that the sender
may transmit before receiving further permission.
so
ur
ce
In the example, TCP transmission from host A to server A contains the current
window size for host A. The window size for server A is determined as part of
the handshake, which based on the transmission can be assumed as 2048.
Once data equivalent to the window size has been received, an
acknowledgement will be returned, relative to the number of bytes received,
plus one. Following this, host A will proceed to transmit the next batch of data.
Mo
re
Le
ar
ni
ng
Re
Page 124
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ur
ce
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
Page 125
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ur
ce
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
The simplified structure and operation of UDP makes it ideal for application
programs to send messages to other programs, with a minimum of protocol
mechanism such in the case of acknowledgements and windowing for
example, as found in TCP segments. In balance however, UDP does not
guarantee delivery of data transmission, nor protection from datagram
duplication.
Page 126
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
Page 127
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
Where stream data is transported over UDP such as in the case of voice and
video applications, additional protocol mechanisms may be applied to
enhance the capability of UDP, as in the case of the real time transport
protocol (RTP) which helps to support the inability of UDP by providing a
sequencing mechanism using timestamps to maintain the order of such
audio/video data streams, effectively supporting partial connection oriented
behavior over a connectionless transport protocol.
Page 128
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
For delay sensitive data streams, this would result in incomprehensible audio
and video transmissions due to both delay and duplication, as a result of
retransmission from the point where acknowledgements are generated. In
such cases, minimal loss of the data stream is preferable over retransmission,
and as such UDP is selected as the transport mechanism, in support of delay
sensitive traffic.
Page 129
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
2. The three-way handshake involves SYN and ACK code bits in order to
establish and confirm the connection between the two end systems,
between which transmission of datagrams is to occur.
Page 130
re
Mo
Page 131
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 132
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 133
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 134
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
Data forwarding can be collectively defined as either local or remote for which
the forwarding process relies on the application of the protocol stack in order
to achieve end-to-end transmission. End systems may be part of the same
network, or located in different networks, however the general forwarding
principle to enable transmission between hosts follows a clear set of protocols
that have been introduced as part of the unit. How these protocols work
together shall be reinforced, as well as building the relationship between the
upper layer TCP/IP protocols and the lower link layer based Ethernet protocol
standards.
Page 135
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ur
ce
s:
ht
An end system that intends to forward data to a given destination must initially
determine whether or not it is possible to reach the intended destination. In
order to achieve this, the end system must go through a process of path
discovery. An end system should be understood to be capable of supporting
operation at all layers since its primary function is as a host to applications. In
relation to this, it must also be capable of supporting lower layer operations
such as routing and link layer forwarding (switching) in order to be capable of
upper/application layer data forwarding. The end system therefore contains a
table that represents network layer reachability to the network for which the
upper layer data is destined.
Mo
re
Le
ar
ni
ng
Re
so
End systems will commonly be aware of the network to which they reside, but
may be without a forwarding path in cases where remote network discovery
has not been achieved. In the example given, host A is in possession of a path
to the destined network through the any network address that was briefly
introduced as part of the IP Addressing section. The forwarding table identifies
that traffic should be forwarded to the gateway as a next hop via the interface
associated with the logical address of 10.1.1.1.
Page 136
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
This requires that the ARP cache table be consulted to identify whether an
association between the intended next hop and the physical path is known.
From the example it can be seen that an entry to the next hop gateway
address is present in the ARP cache table. Where an entry cannot be found,
the Address Resolution Protocol (ARP) must be initiated to perform the
discovery and resolve the physical path.
Page 137
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
When both the logical and physical path forwarding discovery is complete, it is
possible for encapsulation of data to be performed for successful transmission
over IP/Ethernet based networks. Upper layer processes in terms of
encryption and compression may be performed following which transport layer
encapsulation will occur, identifying the source and destination ports via which
upper layer data should be forwarded.
so
ur
ce
Mo
re
Le
ar
ni
ng
Re
Values representing the TCP fields are included as part of the checksum,
which is calculated using a ones compliment calculation process, to ensure
TCP segment integrity is maintained once the TCP header is received and
processed at the ultimate destination. In the case of basic TCP code
operations, upper layer data may not always be carried in the segment, as in
the case of connection synchronization, and acknowledgements to received
data.
Page 138
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ur
ce
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
In the case that the MTU changes along the forwarding path, only then will
fragmentation will be performed. The time to live field will be populated with a
set value depending on the system, in ARG3 series routers, this is set with an
initial value of 255. The protocol field is populated based on the protocol
encapsulated prior to IP. In this case the protocol in question is TCP for which
the IP header will populate the protocol field with a value of 0x06 as instruction
for next header processing. Source and destination IP addressing will reflect
the originating source and the ultimate destination.
Page 139
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ht
Link layer encapsulation relies on IEEE 802.3 Ethernet standards for physical
transmission of upper layer data over Ethernet networks. Encapsulation at the
lower layers is performed by initially determining the frame type that is used.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
Where the upper layer protocol is represented by a type value greater than
1536 (0x0600) as is the case with IP (0x0800), the Ethernet II frame type is
adopted. The type field of the Ethernet II frame header is populated with the
type value of 0x0800 to reflect that the next protocol to be processed following
frame processing will be IP. The destination MAC address determines the next
physical hop, which in this case represents the network gateway.
Page 140
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
Page 141
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
Re
so
ur
ce
Mo
re
Le
ar
ni
ng
If there is a match, the frame is processed and the type field is used to
determine the next header to be processed. Once the next header is
determined, the frame header and trailer are discarded.
Page 142
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
The packet is received by the network layer, and in particular IP, at which
point the IP header is processed. A checksum value exists at each layer of the
protocol stack to maintain the integrity at all layers for all protocols. The
destination IP is used to determine whether the packet has reached its
ultimate destination. The gateway however determines that this is not the case
since the destination IP and the IP belonging to the gateway do not match.
Re
so
ur
ce
The gateway must therefore determine the course of action to take with
regards to routing the packet to an alternate interface, and forward the packet
towards the network for which it is intended. The gateway must firstly however
ensure that the TTL value has not reached 0, and that the size of the packet
does not exceed the maximum transmission unit value for the gateway. In the
event that the packet is larger than the MTU value of the gateway,
fragmentation will generally commence.
Mo
re
Le
ar
ni
ng
Once a packets destination has been located in the forwarding table of the
gateway, the packet will be encapsulated in a new frame header consisting of
new source and destination MAC addresses for the link layer segment, over
which the resulting frame is to be forwarded, before being once again
transmitted to the next physical hop. Where the next physical hop is not
known, ARP will again be used to resolve the MAC address.
Page 143
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ht
Frames received at the ultimate destination will initially determine whether the
frame has arrived at the intended location. The example shows two servers on
a shared Ethernet network over which both receive a copy of the frame.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
The frame is ultimately discarded by server B since the destination MAC value
and the interface MAC address of server B do not match. Server A however
successfully receives the frame and learns that the MAC fields are the same,
the integrity of the frame based on the FCS can also be understood to be
correct. The frame will use the type field to identify 0x0800 as the next header,
following which the frame header and trailer are discarded and the packet is
received by IP.
Page 144
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
Upon reaching the ultimate destination, the IP packet header must facilitate a
number of processes. The first includes validating the integrity of the packet
header through the checksum field, again applying a ones compliment value
comparison based on a sum of the IP header fields. Where correct, the IP
header will be used to determine whether the destination IP matches the IP
address of the current end station, which in this case is true.
Re
so
ur
ce
If any fragmentation occurred during transmission between the source and the
destination, the packet must be reassembled at this point. The identification
field will collect the fragments belonging to a single data source together, the
offset will determine the order and the flags field will specify when the
reassembly should commence, since all fragments must be received firstly
and a fragment with a flag of 0 will be recognized as the last fragment to be
received.
Mo
re
Le
ar
ni
ng
A timer will then proceed during which time the reassembly must be
completed, should reassembly fail in this time period, all fragments will be
discarded. The protocol field will be used to identify the next header for
processing and the packet header will be discarded. It should be noted that
the next header may not always be a transport layer header, a clear example
of where this can be understood is in the case of ICMP, which is understood to
also be a network layer protocol with a protocol field value of 0x01.
Page 145
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
In the example it can be understood that a TCP connection has already been
established and the segment represents an acknowledgement for the
transmission of HTTP traffic from the HTTP server to the acknowledging host.
The host is represented by the port 1027 as a means to distinguish between
multiple HTTP connections that may exist between the same source host and
destination server. In receiving this acknowledgement, the HTTP server will
continue to forward to the host within the boundaries of the window size of the
host.
Page 146
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
ce
so
ur
3. The delivery of data relies on the destination port number in the TCP and
UDP headers to identify the application to which the data is intended.
Following analysis of this value by the TCP or UDP protocol, the data is
forwarded.
Mo
re
Le
ar
ni
ng
Re
4. The source port of the TCP header for the HTTP traffic distinguishes
between the different application sessions that are active. Return HTTP
traffic from the HTTP server is able to identify each individual web browser
session based on this source port number. For example, the source port
of two separate requests for HTTP traffic originating from IP source
10.1.1.1 may originate from source ports 1028 and 1035, however the
destination port in both cases remains as port 80, the HTTP server.
Page 147
re
Mo
Page 148
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
Module 2
in
g.
hu
Huawei Certification
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
tp
:/
/l
ea
rn
Huawei Device
Navigation & Configuration
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 151
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 152
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 153
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
ng
Re
so
ur
As a result, the need for collision detection in the form of CSMA/CD is ever
present in such shared Ethernet networks. Following the adoption of switched
media such as that of 100BaseT, data transmission and reception became
isolated within channels (wire pairs), enabling the potential for collisions to
occur to be eliminated. This medium as a form of non-shared Ethernet
provides only a means for point-to-point communication, however used
together with other devices such as hubs, a shared Ethernet network is once
again possible, along with the potential for collisions.
Mo
re
Le
ar
ni
The switch was introduced as part of the evolution of the bridge, and is
capable of breaking down the shared collision domain into multiple collision
domains. The collision domains operate as a collection of point-to-point links
for which the threat of collisions is removed and link-layer traffic is isolated, to
allow higher transmission rates that optimize traffic flow within the Ethernet
network.
Page 154
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
Routers are synonymous with the term gateway for which the two are often
used interchangeably. A single IP network can generally be understood to
make up a broadcast domain, which refers to the scope of a link-layer
segment. Routers are generally responsible for routing Internet datagrams (IP
packets) to a given destination based on the knowledge of a forwarding
address for the destination network, found within an internally managed
forwarding table.
Page 155
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
Page 156
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
A familiarity with the versions of VRP network operating system (NOS) aids in
ensuring that the version currently being used is up to date and supports
certain features that may be required in an enterprise network. The general
trend for most Huawei devices is to operate using VRP version 5.x currently,
where x may vary depending on the product and VRP release. VRP version 8
is a recent revision of VRP built with a highly refined architecture for the next
generation of technologies and constructed around the need for greater
efficiency, but is not present in all Huawei products.
Page 157
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ur
ce
s:
ht
ng
Re
so
The Sx7 Series Ethernet Switch provides data transport functionality, and has
been developed by Huawei to meet the requirements for reliable access and
high-quality transmission of multiple services on the enterprise network. This
series of switch is positioned for access or aggregation layer operation in the
enterprise network, and provides a large switching capacity, high port density,
and cost-effective packet forwarding capabilities.
Mo
re
Le
ar
ni
Management of the ARG3 series routers and Sx7 series of switch can be
achieved through establishing a connection to the console interface, and in the
case of the AR2200, a connection is also possible to be established via a Mini
USB interface.
Page 158
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
Page 159
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
The example defines the port settings that should be applied, for which the
restore default button will automatically reassign should any change have
been made to these settings. Once the OK button is pressed, a session will be
established with the VRP of the device. If the device is operating using factory
default settings, the user will be prompted for a password, which will be
assigned as the default login password for future connection attempts.
Page 160
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
The Huawei AR2200 router, additionally supports the means for terminal
connectivity via a USB connection. A type B mini USB interface exists on the
front panel of the AR2200 series router through which hosts are able to
establish a USB based connection as a serial alternative to that of RS-232.
Page 161
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
A slight variation in the setup process requires that the mini USB firstly
establish drivers to allow USB functionality. The mini USB driver can be
obtained by visiting http://support.huawei.com/enterprise, and under the path
Support > Software > Enterprise Networking > Router > Access Router > AR
> AR2200, choose the relevant VRP version & patch path option, and
download the file labeled AR&SRG_MiniUSB_driver.zip. It should be noted
that the mini USB driver supports only Windows XP, Windows Vista, and
Windows 7 operating systems.
so
ur
When upgrading the device software or installing a patch, the MD5 hash value
can be checked to confirm software validity. In order to prevent the software
from being modified or replaced, you are advised to perform this operation.
ng
Re
Installing requires the user to firstly double-click the driver installation file on
the PC and click Next. Secondly select I accept the terms in the license
agreement and click Next. Click the Change button to change the driver
directory if required, and click Next. Click Install and decompress the driver.
When the system finishes decompressing the driver, click Finish.
Mo
re
Le
ar
ni
Users should then find the DISK1 folder in the specified driver directory, and
double-click the file setup.exe Following the opening of a second installation
window click Next. Users should again select I accept the terms in the license
agreement and click Next to install the driver. Once complete, click Finish to
finish installing the driver. Right-click My Computer, and choose Manage >
Device Manager > Ports(COM&LPT). The system should display the
TUSB3410 Device indicating the driver that has been installed.
Page 162
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ht
As with the RS-232 console connection, the Mini USB serial connection
requires establishment to terminal emulation software to enable interaction
with the VRP command line.
so
ur
ce
s:
Use the terminal emulation software to log in to the device through the mini
USB port, (for which the Windows HyperTerminal is used as an example). On
the host PC, start the HyperTerminal application, for which the location may
vary for each version of Windows, and create a connection by providing a
suitable terminal connection name and click OK. Select the relevant
connection (COM) port and then set the communication parameters for the
serial port of the PC. These parameters should match the default values that
are set when pressing the Restore Defaults button.
Mo
re
Le
ar
ni
ng
Re
Page 163
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
Page 164
re
Mo
Page 165
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 166
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 167
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 168
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
The startup/boot process is the initial phase of operation for any administrator
or engineer accessing Huawei based products operating with VRP. The boot
screen informs of the system startup operation procedures as well as the
version of the VRP image that is that currently implemented on the device,
along with the storage location from where it is loaded. Following the initial
startup procedure, an option for auto-configuration of the initial system settings
prompts for a response, for which the administrator can choose whether to
follow the configuration steps, or manually configure the basic system
parameters. The auto-configuration process can be terminated by selecting
the yes option at the given prompt.
Page 169
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
so
ur
ce
s:
ht
Mo
re
Le
ar
ni
ng
Re
The command line views can be determined based on the parenthesis, and
information contained within these parenthesis. The presence of chevrons
identifies that the user is currently in the User View, whereas square brackets
show that a transition to the System View has occurred.
Page 170
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ht
s:
ce
ur
so
Re
ng
CTRL+Y deletes all the characters on the right side of the cursor.
ni
Mo
re
Le
ar
Page 171
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
Page 172
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
There are two forms of help feature that can be found within the VRP, these
come in the form of partial help and complete help functions. In entering a
character string followed directly by a question mark (?), VRP will implement
the partial help function to display all commands that begin with this character
string. An example of this is demonstrated. In the case of the full help feature,
a question mark (?) can be placed on the command line at any view to display
all possible command names, along with descriptions for all commands
pertaining to that view. Additionally the full help feature supports entry of a
command followed by a question mark (?) that is separated by a space. All
keywords associated with this command, as well as simple descriptions, are
then displayed.
Page 173
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
For the majority of industries, it is likely that multiple devices will exist, each of
which needs to be managed. As such, one of the first important tasks of
device commissioning involves setting device names to uniquely identify each
device in the network. The system name parameter on AR2200 series router
is configured as Huawei by default, for the S5700 series of switch the default
system name is Quidway. The implementation of the system name takes
effect immediately after configuration is complete.
Page 174
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ur
ce
s:
ht
The system clock reflects the system timestamp, and is able to be configured
to comply with the rules of any given region. The system clock must be
correctly set to ensure synchronization with other devices and is calculated
using the formula: Coordinated Universal Time (UTC) + Time zone offset +
Daylight saving time offset. The clock datetime command is used to set the
system clock following the HH:MM:SS YYYY-MM-DD formula. It should be
noted however that if the time zone has not been configured or is set to 0, the
date and time set are considered to be UTC, therefore it is recommended that
the clock timezone be set firstly before configuring the system time and date.
Re
so
The setting of the local timezone is achieved using the clock timezone
command and is implemented based on the time-zone-name { add | minus }
offset formula, where the add value indicates that the time of time-zone-name
is equal to the UTC time plus the time offset and minus indicates the time of
time-zone-name is equal to the UTC time minus the time offset.
Mo
re
Le
ar
ni
ng
Page 175
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
so
ur
ce
s:
ht
The header command provides a means for displaying notifications during the
connection to a device. The login header indicates a header that is displayed
when the terminal connection is activated, and the user is being authenticated
by the device. The shell header indicates a header that is displayed when the
session is set up, after the user logs in to the device. The header information
can be applied either as a text string or retrieved from a specified file. Where a
text string is used, a start and end character must be defined as a marker to
identify the information string, where in the example the character defines the
information string. The string represents a value in the range of 1 to 2000
characters, including spaces. The information based header command follows
the format of header { login | shell } information text where information
represents the information string, including start and end markers.
Mo
re
Le
ar
ni
ng
Re
In the case of a file based header, the format header { login | shell } file filename is applied, where file-name represents the directory and file from which
the information string can be retrieved.
Page 176
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
ni
ng
Re
so
ur
The Monitoring level is defined at a user level of 1 for which command levels 0
and 1 can be applied, allowing for the majority of display commands to be
used, with exception to display commands showing the current and saved
configuration. A user level of 2 represents the Configuration level for which
command levels up to 2 can be defined, enabling access to commands that
configure network services provided directly to users, including routing and
network layer commands. The final level is the Management level which
represents a user level of 3 through to 15 and a command level of up to 3,
enabling access to commands that control basic system operations and
provide support for services.
Mo
re
Le
ar
These commands include file system, FTP, TFTP, configuration file switching,
power supply control, backup board control, user management, level setting,
system internal parameter setting, and debugging commands for fault
diagnosis. The given example demonstrates how a command privilege can be
changed, where in this case, the save command found under the user view
requires a command level of 3 before the command can be used.
Page 177
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
The console port is an asynchronous serial port provided by the main control
board of the device, and uses a relative number of 0. VTY is a logical terminal
line that allows a connection to be set up when a device uses telnet services
to connect to a terminal for local or remote access to a device. A maximum of
15 users can use the VTY logical user interface to log in to the device by
extending the range from 0 4 achieved by applying the user-interface
maximum-vty 15 command. If the set maximum number of login users is 0, no
users are allowed to log in to the router through telnet or SSH. The display
user-interface command can be used to display relevant information regarding
the user interface.
Page 178
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
For both the console and VTY terminal interfaces, certain attributes can be
applied to modify the behavior as a means of extending features and
improving security. A user allows a connection to remain idle for a given
period of time presents a security risk to the system. The system will wait for a
timeout period before automatically terminating the connection. This idle
timeout period on the user interface is set to 10 minutes by default .
so
ur
ce
Mo
re
Le
ar
ni
ng
Re
For each command that is used, a record is stored in the history command
buffer which can be retrieved through navigation using the () or CTRL+P and
the () or Ctrl+N key functions. The number of recorded commands in the
history command buffer can be increased using the history-command maxsize command to define up to 256 stored commands. The number of
commands stored by default is 10.
Page 179
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ur
ce
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
It is generally recommended that for each user that is granted telnet access,
the user be identified through usernames and passwords to allow for
distinction of individual users. Each user should also be granted privilege
levels, based on each users role and responsibility.
Page 180
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
Re
so
ur
ce
In order to allow the AR2200 to communicate with all the hosts on the physical
network, configure a primary IP address and a secondary IP address for the
interface. The interface has only one primary IP address. If a new primary IP
address is configured on an interface that already has a primary IP address,
the new IP address overrides the original one. The IP address can be
configured for an interface using the command ip address <ip-address > {
mask | mask-length } where mask represents the 32 bit subnet mask e.g.
255.255.255.0, and mask-length represents the alternative mask-length value
e.g. 24, both of which can be used interchangeably.
Mo
re
Le
ar
ni
ng
Page 181
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
Page 182
re
Mo
Page 183
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 184
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 185
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 186
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ht
The file system manages files and directories on the storage devices. It can
create, delete, modify, or rename a file or directory, or display the contents of
a file.
ur
ce
s:
The file system has two functions: managing storage devices and managing
the files that are stored on those devices. A number of directories are defined
within which files are stored in a logical hierarchy. These files and directories
can be managed through a number of functions which allow the changing or
displaying of directories, displaying files within such directories or subdirectories, and the creation or deletion of directories.
Mo
re
Le
ar
ni
ng
Re
so
Page 187
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
Making changes to the existing file system directories generally relates to the
capability to create and delete existing directories within the file system. Two
common commands that are used in this case. The mkdir directory command
is used to create a folder in a specified directory on a designated storage
device, where directory refers to the name given to the directory and for which
the directory name can be a string of 1 to 64 characters. In order to delete a
folder within the file system, the rmdir directory command is used, with
directory again referring to the name of the directory. It should be noted that a
directory can only be deleted if there are no files contained within that
directory.
Page 188
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ur
ce
s:
ht
Making changes to the files within a file system includes copying, moving,
renaming, compressing, deleting, undeleting, deleting files in the recycle bin,
running files in batch and configuring prompt modes. Creating a duplicate of
an existing file can be done using the copy source-filename destinationfilename command, where if the destination-filename is the same as that of an
existing file (source-filename), the system will display a message indicating
that the existing file will be replaced. A target file name cannot be the same as
that of a startup file, otherwise the system displays a message indicating that
the operation is invalid and that the file is a startup file.
Mo
re
Le
ar
ni
ng
Re
so
Page 189
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ur
ce
s:
ht
For the removal of files within a file system, the delete function can be applied
using the command delete [ /unreserved ] [ /force ] { filename | device-name }.
Generally files that are deleted are directed to a recycle bin from where files
can recovered using the undelete { filename | device-name } command,
however should the /unreserved command be used, the file will be
permanently deleted. The system will generally display a message asking for
confirmation of file deletion, however if the /force parameter is included, no
prompt will be given. The filename parameter refers to the file which is to be
deleted, while the device-name parameter defines the storage location.
Mo
re
Le
ar
ni
ng
Re
so
Where a file is directed to the recycle bin, it is not permanently deleted and
can be easily recovered. In order to ensure that such files in the recycle bin
are deleted permanently, the reset recycle-bin [ filename ]command can be
applied, where the filename parameter can be used to define a specific file for
permanent deletion.
Page 190
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ht
When powered on, the device retrieves configuration files from a default save
path to initialize itself, which is then stored within the RAM of the device. If
configuration files do not exist in the default save path, the router uses default
initialization parameters.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
Page 191
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ur
ce
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
The display saved-configuration [ last | time ] shows the output of the stored
configuration file used at startup to generate the current-configuration. Where
the last parameter is used it displays the configuration file used in the current
startup. The configuration file is displayed only when it is configured for the
current startup. The time parameter will display the time when the
configuration was last saved.
Page 192
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
Using the save [configuration-file] command will save the current configuration
information to a default storage path. The configuration-file parameter allows
the current configuration information to be saved to a specified file. Running
the save command with the configuration-file parameter does not affect the
current startup configuration file of the system. When configuration-file is the
same as the configuration file stored in the default storage path of the system,
the function of this command is the same as that of the save command.
Mo
re
Le
ar
ni
ng
Re
so
ur
The example demonstrates the use of the save command to save the currentconfiguration, which by default will be stored to the default vrpcfg.zip file in the
default storage location of the device.
Page 193
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
The currently used save configuration file can be discovered through the use
of the display startup command. In addition the display startup command can
be used to query the name of the current system software file, name of the
next system software file, name of the backup system software file, names of
the four currently used (if used) system software files, and names of the next
four system software files. The four system software files are the
aforementioned configuration file, voice file, patch file, and license file.
Page 194
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ht
ur
ce
s:
The filename extension of the configuration file must be .cfg or .zip, and the
file must be stored in the root directory of a storage device. When the router is
powered on, it reads the configuration file from the flash memory by default to
initialize. The data in this configuration file is the initial configuration. If no
configuration file is saved in the flash memory, the router uses default
parameters to initiate.
Mo
re
Le
ar
ni
ng
Re
so
Page 195
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
When the compare configuration [configuration-file] [current-line-number saveline-number] command is used, the system performs a line by line comparison
of the saved configuration with the current configuration starting from the first
line. If the current-line-number save-line-number parameters are specified, the
system skips the non relevant configuration before the compared lines and
continues to find differences between the configuration files.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
The system will then proceed to output the configuration differences between
the saved configuration and the current configuration files. The comparison
output information is restricted to 150 characters by default. If the comparison
requires less than 150 characters, all variations until the end of two files are
displayed.
Page 196
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ht
ur
ce
s:
If the two configuration files are the same, they are deleted at the same time
after this command is executed. The default configuration file is used when the
router is started next time. If the two configuration files are different, the
configuration file used in the current startup is deleted after this command is
executed.
Mo
re
Le
ar
ni
ng
Re
so
If no configuration file is configured for the device current startup, the system
displays a message indicating that the configuration file does not exist after
this command is executed. Once the reset saved-configuration command is
used, a prompt will be given to confirm the action, for which the user is
expected to confirm, as shown in the example.
Page 197
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
The storage devices are product dependant, and include flash memory, SD
cards, or USB flash drives. The AR2200 router for example has a built-in flash
memory and a built-in SD card (in slot sd1). The router provides two reserved
USB slots (usb0 and usb1) and an SD card slot (sd0). For the S5700 it
includes a built in flash memory with a capacity that varies dependant on the
model, with 64MB supported in the S5700C-HI, S5700-LI, S5700S-LI and
S5710-EI models, and 32 MB for all others. The details regarding the Huawei
product storage devices can be detailed by using the display version
command as shown.
Page 198
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
Formatting a storage device is likely to result in the loss of all files on the
storage device, and the files cannot be restored, therefore extra care should
be taken when performing any format command and should be avoided unless
absolutely necessary. The format [storage-device] command is used along
with the storage-device parameter to define the storage location which is
required to be formatted.
Page 199
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
When the terminal device displays that the system has failed, the fixdisk
command can be used to attempt to fix the abnormal file system in the storage
device, however it does not provide any guarantee as to whether the file
system can be restored successfully. Since the command is used to rectify
problems, if no problem has occurred in the system it is not recommended that
this command be run. It should also be noted that this command does not
rectify device-level problems.
Page 200
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
1. The file system attribute d represents that the entry is a directory in the file
system. It should be noted that this directory can only be deleted once any
files contained within the directory have been deleted. The remaining rwx
values refer to whether the directory (or file) can be read, written to, and/or
executed.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
Page 201
re
Mo
Page 202
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 203
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 204
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 205
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
Version 5.90
(AR2200 V200R001C00)
(AR2200 V200R002C00)
Re
Version 5.110
so
ur
ce
As the product version increases, so do the features that are supported by the
version. The product version format includes a product code Vxxx , Rxxx
denotes a major version release and Cxx a minor version release. If a service
pack is used to patch the VRP product version, an SPC value may also be
included in the VRP product version number. Typical examples of the VRP
version upgrades for the AR2200 include:
Mo
re
Le
ar
ni
ng
Version 5.120
Page 206
(AR2200 V200R003C00)
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
File transfer refers to the means by which files are sent to or retrieved from a
remote server or storage location. Within the IP network this application can
be implemented for a wide range of purposes. As part of effective practice, it is
common for important files be duplicated and backed up within a remote
storage location to prevent any loss that would affect critical systems
operations. This includes files such as the VRP image of products which
(should the existing image suffer loss through use of the format command or
other forms of error), can be retrieved remotely and used to recover system
operations. Similar principles apply for important configuration files and
maintaining records of activity within devices stored in log files, which may be
stored long term within the remote server.
Page 207
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ur
ce
s:
ht
FTP is a standard application protocol based on the TCP/IP protocol suite and
used to transfer files between local clients and remote servers. FTP uses two
TCP connections to copy a file from one system to another. The TCP
connections are usually established in client-server mode, one for control (the
server port number is 21) and the other for data transmission (the sever port
number is 20). FTP as a file transfer protocol is used to control connections by
issuing commands from the client (RTA) to the server and transmits replies
from the server to the client, minimizing the transmission delay. In terms of
data transmission, FTP transmits data between the client and server,
maximizing the throughput.
Mo
re
Le
ar
ni
ng
Re
so
Trivial File Transfer Protocol (TFTP) is a simple file transfer protocol over
which a router can function as a TFTP client to access files on a TFTP server.
Unlike FTP, TFTP has no complex interactive access interface and
authentication control. Implementation of TFTP is based on the User
Datagram Protocol (UDP). The client initiates the TFTP transfer. To download
files, the client sends a read request packet to the TFTP server, receives
packets from the server, and returns an acknowledgement to the server. To
upload files, the client sends a write request packet to the TFTP server, sends
packets to the server, and receives acknowledgement from the server.
Page 208
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
The example demonstrates how connection between an FTP server and client
is established in order to retrieve a VRP image that can be used as part of the
system upgrade process. Prior to any transfer of data, it is necessary to
establish the underlying connectivity over which files can be transferred. This
begins by providing suitable IP addressing for the client and the server. Where
the devices are directly connected, interfaces can be applied that belong to the
same network. Where devices belong to networks located over a large
geographic area, devices must establish relevant IP addressing within their
given networks and be able to discover a relevant network path over IP via
which client/server connectivity can be established.
Page 209
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
The example demonstrates the use of the delete file system command to
remove the existing image file. It should be noted that the system image, while
deleted will not impact the current operation of the device as long as the
device remains operational, therefore the device should not be powered off or
restarted before a new VRP image file is restored within the storage location
of the device, and set to be used during the next system startup.
Page 210
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ur
ce
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
Prior to file transmission, the user may be required to set the file type for which
two formats exist, ASCII and Binary. ASCII mode is used for text, in which
data is converted from the sender's character representation to "8-bit ASCII"
before transmission, and then to the receiver's character representation.
Binary mode on the other hand requires that the sender send each file byte for
byte. This mode is often used to transfer image files and program files, and
should be applied when sending or retrieving any VRP image file. In the
example, the get vrp.cc command has been issued in order to retrieve the new
VRP image located within the remote server.
Page 211
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
In the event that the client wishes to retrieve a VRP image from a TFTP
server, a connection to the server need not first be established. Instead the
client must define the path to the server within the command line, along with
the operation that is to be performed. It should also be noted that the AR2200
& S5700 models serve as the TFTP client only and transfer files only in binary
format. As can be seen from the example, the get command is applied for
retrieval of the VRP image file from the TFTP server following the defining of
the destination address of the TFTP server.
Page 212
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
The transfer of the VRP image file to the client once successfully achieved,
requires that the image be enabled as the startup system software during the
next system startup process. In order to change the system software version,
the startup system-software command must be run and include the system
software file to be used in the next startup. A system software file must use .cc
as the file name extension, and the system software file used in the next
startup cannot be that used in the current startup.
Mo
re
Le
ar
ni
ng
Re
so
ur
Additionally, the storage directory of a system software file must be the root
directory, otherwise the file will fail to run. The display startup command
should be used to verify that the change to the startup system software has
been performed successfully. The output for the startup system software
should show the existing VRP image, while the next startup system software
should display the transferred VRP image that is now present within the root
directory of the device.
Page 213
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
Confirmation of the startup system software allows for the safe initiation of the
system software during the next system boot. In order to apply the changes
and allow for the new system software to take effect, the device must be
restarted. The reboot command can be used in order to initiate the system
restart. During the reboot process, a prompt will be displayed requesting
confirmation regarding whether the configuration file for the next system
startup be saved.
Mo
re
Le
ar
ni
ng
Re
so
ur
In some cases, the saved-configuration file may be erased by the user in order
to allow for a fresh configuration to be implemented. Should this have
occurred, the user is expected define a response of no at the Continue?
prompt. If the user chooses yes at this point, the current-configuration will be
rewritten to the saved-configuration file and applied once again during the next
startup. If the user is unaware of the changes for which the save prompt is
providing a warning, it is recommended that the user select no or n and
perform a comparison of the saved and current configuration to verify the
changes. For the reboot prompt, a response of yes or y is required to
complete the reboot process.
Page 214
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ht
1. A client device must have the capability to reach the FTP server over IP,
requiring an IP address be configured on the interface via which the FTP
server can be reached. This will allow a path to be validated to the FTP
server at the network layer if one exists.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
2. The user can run the configuration command display startup to validate
that current startup system software (VRP) is active, identified by the .cc
extension.
Page 215
re
Mo
Page 216
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
Module 3
in
g.
hu
Huawei Certification
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
tp
:/
/l
ea
rn
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 219
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 220
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 221
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
Page 222
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ht
As a link layer device, each switch relies on a MAC based table that provides
association between a destination MAC address and the port interface via
which a frame should be forwarded. This is commonly referred to as the MAC
address table.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
The initiation of a switch begins with the switch having no knowledge of end
systems and how frames received from end systems should be forwarded. It
is necessary that the switch build entries within the MAC address table to
determine the path that each frame received should take in order to reach a
given destination, so as to limit broadcast traffic within the local network.
These path entries are populated in the MAC address table as a result of
frames received from end systems. In the example, Host A has forwarded a
frame to Switch A, which currently has no entries within its MAC address table.
Page 223
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
The frame that is forwarded from Host A contains a broadcast MAC address
entry in the destination address field of the frame header. The source address
field contains the MAC address of the peering device, in this case Host A. This
source MAC address is used by the switch in order to populate the MAC
address table, by associating the MAC entry in the source address field with
the switch port interface upon which the frame was received. The example
demonstrates how the MAC address is associated with the port interface to
allow any returning traffic to this MAC destination to be forwarded directly via
the associated interface.
Page 224
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
The general behavior of an ARP request involves the frame being flooded to
all intended destinations primarily due to the MAC broadcast
(FF:FF:FF:FF:FF:FF) that represents the current destination. The switch is
therefore responsible for forwarding this frame out of every port interface with
exception to the port interface on which the frame was received, in an attempt
to locate the intended IP destination as listed within the ARP header for which
an ARP reply can be generated. As demonstrated in the example, individual
frames are flooded from the switch via port interfaces G0/0/2 and G0/0/3
towards hosts B and host C respectively.
Page 225
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
As a result of the ARP request header, the receiving host is able to determine
that the ARP header is intended for the IP destination of 10.1.1.3, along with
the local source address (MAC) from which the frame originated, and use this
information to generate a unicast reply. The information regarding Host A is
associated with the IP address of 10.1.1.3 and stored within the MAC address
table of Host C. In doing so, the generation of broadcast traffic is minimized,
thereby reducing the number of interrupts to local destinations as well as
reduction of the number of frames propagating the local network.
Mo
re
Le
ar
ni
ng
Re
so
ur
Once the frame is received from Host C by Switch A, the switch will populate
the MAC address table with the source MAC address of the frame received,
and associate it with the port interface on which the frame was received. The
switch then uses the MAC address table to perform a lookup, in order to
discover the forwarding interface, based on the destination MAC address of
the frame. In this case the MAC address of the frame refers to Host A, for
which an entry now exists via interface G0/0/1, allowing the frame to be
forwarded to the known destination.
Page 226
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
Early Ethernet systems operated based on a 10Mbps half duplex mode and
applied mechanisms such as CSMA/CD to ensure system stability. The
transition to a twisted pair medium gave rise to the emergence of full-duplex
Ethernet, which greatly improved Ethernet performance and meant two forms
of duplex could be negotiated. The auto-negotiation technology allows newer
Ethernet systems to be compatible with earlier Ethernet systems.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
Page 227
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
In the event that the configuration parameters for negotiation are changed
from using auto negotiation, the defined parameters should be checked using
the display interface <interface> command to verify that the negotiated
parameters allow for the link layer interface negotiation to be successful. This
is verified by the line protocol current state being displayed as UP. The
displayed information reflects the current parameter settings for an interface.
Page 228
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
Page 229
re
Mo
Page 230
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 231
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 232
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 233
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ur
ce
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
Page 234
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
One of the initial effects of redundant switching loops comes in the form of
broadcast storms. This occurs when an end system attempts to discover a
destination for which neither itself nor the switches along the switching path
are aware of. A broadcast is therefore generated by the end system which is
flooded by the receiving switch.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
The flooding effect means that the frame is forwarded via all interfaces with
exception to the interface on which the frame was received. In the example,
Host A generates a frame, which is received by Switch B which is
subsequently forwarded out of all other interfaces. An instance of the frame is
received by the connected switches A and C, which in turn flood the frame out
of all other interfaces. The continued flooding effect results in both Switch A
and Switch C flooding instances of the frame from one switch to the other,
which in turn is flooded back to Switch B, and thus the cycle continues. In
addition, the repeated flooding effect results in multiple instances of the frame
being received by end stations, effectively causing interrupts and extreme
switch performance degradation.
Page 235
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
In the example, Switch B updates the MAC address table with the MAC
address of Host A and associates this source with interface G0/0/3, the port
interface on which the frame was received. As frames are uncontrollably
flooded within the switching network, a frame is again received with the same
source MAC address as Host A, however this time the frame is received on
interface G0/0/2. Switch B must therefore assume that the host that was
originally reachable via interface G0/0/3 is now reachable via G0/0/2, and will
update the MAC address table accordingly. The result of this process leads to
MAC instability and continues to occur endlessly between both the switch port
interfaces connecting to Switch A and Switch C since frames are flooded in
both directions as part of the broadcast storm effect.
Page 236
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
The challenge for the switching network lies in the ability to maintain switching
redundancy to avoid isolation of end systems in the event of switch system or
link failure, and the capability to avoid the damaging effects of switching loops
within a switching topology which implements redundancy. The resulting
solution for many years has been to implement the spanning tree protocol
(STP) in order to prevent the effects of switching loops. Spanning tree works
on the principle that redundant links be logically disabled to provide a loop free
topology, whilst being able to dynamically enable secondary links in the event
that a failure along the primary switching path occurs, thereby fulfilling the
requirement for network redundancy within a loop free topology. The switching
devices running STP discover loops on the network by exchanging information
with one another, and block certain interfaces to cut off loops. STP has
continued to be an important protocol for the LAN for over 20 years.
Page 237
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
The removal of any potential for loops serves as the primary goal of spanning
tree for which an inverted tree type architecture is formed. At the base of this
logical tree is the root bridge/switch. The root bridge represents the logical
center but not necessarily the physical centre of the STP-capable network.
The designated root bridge is capable of changing dynamically with the
network topology, as in the event where the existing root bridge fails to
continue to operate as the root bridge. Non-root bridges are considered to be
downstream from the root bridge and communication to non-root bridges flows
from the root bridge towards all non-root bridges. Only a single root bridge can
exist in a converged STP-capable network at any one time.
Page 238
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
Discovery of the root bridge for an STP network is a primary task performed in
order to form the spanning tree. The STP protocol operates on the basis of
election, through which the role of all switches is determined. A bridge ID is
defined as the means by which the root bridge is discovered. This comprises
of two parts, the first being a 16 bit bridge priority and the second, a 48 bit
MAC address.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
The device that is said to contain the highest priority (smallest bridge ID) is
elected as the root bridge for the network. The bridge ID comparison takes
into account initially the bridge priority, and where this priority value is unable
to uniquely identify a root bridge, the MAC address is used as a tie breaker.
The bridge ID can be manipulated through alteration to the bridge priority as a
means of enabling a given switch to be elected as the root bridge, often in
support of an optimized network design.
Page 239
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ur
ce
s:
ht
ng
Re
so
Bridge Protocol Data Units are not directly forwarded by switches, instead the
information that is carried within a BPDU is often used to generate a switches
own BPDU for transmission. A Configuration BPDU carries a number of
parameters that are used by a bridge to determine primarily the presence of a
root bridge and ensure that the root bridge remains the bridge with the highest
priority. Each LAN segment is considered to have a designated switch that is
responsible for the propagation of BPDU downstream to non-designated
switches.
Mo
re
Le
ar
ni
The Bridge ID field is used to determine the current designated switch from
which BPDU are expected to be received. The BPDU is generated and
forwarded by the root bridge based on a Hello timer, which is set to 2 seconds
by default. As BPDU are received by downstream switches, a new BPDU is
generated with locally defined parameters and forwarded to all non-designated
switches for the LAN segment.
Page 240
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
The path cost (PC) is a value associated with the root port, which is the port
on a downstream switch that connects to the LAN segment, on which a
designated switch or root bridge resides. This value is used to generate the
root path cost for the switch, by adding the path cost to the RPC value that is
received from the designated switch in a LAN segment, to define a new root
path cost value. This new root path cost value is carried in the BPDU of the
designated switch and is used to represent the path cost to the root.
Page 241
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
Page 242
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ht
ur
ce
s:
ng
Re
so
The root port identifies the port that offers the lowest cost path to the root,
based on the root path cost. The example demonstrates the case where two
possible paths exist back to the root, however only the port that offers the
lowest root path cost is assigned as the root port. Where two or more ports
offer equal root path costs, the decision of which port interface will be the root
port is determined by comparing the bridge ID in the configuration BPDU that
is received on each port.
Mo
re
Le
ar
ni
Any port that is not assigned a designated or root port role is considered an
alternate port, and is able to receive BPDU from the designated switch for the
LAN segment for the purpose of monitoring the status of the redundant link,
but will not process the received BPDU. The IEEE 802.1D-1990 standard for
STP originally defined this port role as backup, however this was amended to
become the alternate port role within the IEEE 802.1D-1998 standards
revision.
Page 243
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
The port ID represents a final means for determining port roles alongside the
bridge ID and root path cost mechanism. In scenarios where two or more ports
offer a root path cost back to the root that is equal and for which the upstream
switch is considered to have a bridge ID that is equal, primarily due to the
upstream switch being the same switch for both paths, the port ID must be
applied to determine the port roles.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
The port ID is tied to each port and comprises of a port priority and a port
number that associates with the port interface. The port priority is a value in
the range of 0 to 240, assigned in increments of 16, and represented by a
value of 128 by default. Where both port interfaces offer an equal port priority
value, the unique port number is used to determine the port roles. The highest
port identifier (the lowest port number) represents the port assigned as the
root port, with the remaining port defaulting to an alternate port role.
Page 244
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ur
ce
s:
ht
The root bridge is responsible for the generation of configuration BPDU based
on a BPDU interval that is defined by a Hello timer. This Hello timer by default
represents a period of 2 seconds. A converged spanning tree network must
ensure that in the event of a failure within the network, that switches within the
STP enabled network are made aware of the failure. A Max Age timer is
associated with each BDPU and represents life span of a BPDU from the point
of conception by the root bridge, and ultimately controls the validity period of a
BDPU before it is considered obsolete. This MAX Age timer by default
represents a period of 20 seconds.
Re
so
Once a configuration BPDU is received from the root bridge, the downstream
switch is considered to take approximately 1 second to generate a new BPDU,
and propagate the generated BPDU downstream. In order to compensate for
this time, a message age (MSG Age) value is applied to each BPDU to
represent the offset between the MAX Age and the propagation delay, and for
each switch this message age value is incremented by 1.
Mo
re
Le
ar
ni
ng
As BPDU are propagated from the root bridge to the downstream switches the
MAX Age timer is refreshed. The MAX Age timer counts down and expires
when the MAX Age value exceeds the value of the message age, to ensure
that the lifetime of a BPDU is limited to the MAX Age, as defined by the root
bridge. In the event that a BPDU is not received before the MAX Age timer
expires, the switch will consider the BPDU information currently held as
obsolete and assume an STP network failure has occurred.
Page 245
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ur
ce
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
Where the BDPU is superior, the switch will acknowledge the presence of a
better candidate for the role of root bridge, by ceasing to propagate BPDU in
the direction from which the superior BPDU was received. The switch will also
amend the root ID field of its BPDU to advertise the bridge ID of the root
bridge candidate as the current new root bridge.
Page 246
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
In the case where equal root path costs exist on two or more LAN segments to
the same upstream switch, the port ID is used to discover the port roles.
Where an equal root path cost exists between two switches as in the given
example, the bridge ID is used to determine which switch represents the
designated switch for the LAN segment. Where the switch port is neither a
root port nor designated port, the port role is assigned as alternate.
Page 247
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
As part of the root bridge and port role establishment, each switch will
progress through a number of port state transitions. Any port that is
administratively disabled will be considered to be in the disabled state.
Enabling of a port in the disabled state will see a state transition to the
blocking state .
Re
so
ur
ce
ni
ng
A transition to the blocking state from the listening or other states may
occur in the event that the port is changed to an alternate port role. The
transition between listening to learning and learning to forwarding states is
greatly dependant on the forward delay timer, which exists to ensure that any
propagation of BDPU information to all switches in the spanning tree topology
is achievable before the state transition occurs.
Mo
re
Le
ar
The learning state maintains the restriction of user traffic forwarding to ensure
prevention of any switching loops however allows for the population of the
MAC address table throughout the spanning tree topology to ensure a stable
switching network. Following a forward delay period, the forwarding state is
reached. The disabled state is applicable at any time during the state
transition period through manual intervention (i.e. the shutdown command) .
Page 248
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ur
ce
s:
ht
Events that cause a change in the established spanning tree topology may
occur in a variety of ways, for which the spanning tree protocol must react to
quickly re-establish a stable and loop free topology. The failure of the root
bridge is a primary example of where re-convergence is necessary. Non-root
switches rely on the intermittent pulse of BPDU from the root bridge to
maintain their individual roles as non-root switches in the STP topology. In the
event that the root bridge fails, the downstream switches will fail to receive a
BPDU from the root bridge and as such will also cease to propagate any
BPDU downstream. The MAX Age timer is typically reset to the set value (20
seconds by default) following the receipt of each BPDU downstream.
Mo
re
Le
ar
ni
ng
Re
so
With the loss of any BPDU however, the MAX Age timer begins to count down
the lifetime for the current BPDU information of each non-root switch, based
on the (MAX Age MSG Age) formula. At the point at which the MSG Age
value is greater than the MAX Age timer value, the BPDU information received
from the root becomes invalid, and the non-root switches begin to assume the
role of root bridge. Configuration BPDU are again forwarded out of all active
interfaces in a bid to discover a new root bridge. The failure of the root bridge
invokes a recovery duration of approximately 50 seconds due to the Max Age
+ 2x Forward Delay convergence period.
Page 249
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
In the case of an indirect link failure, a switch loses connection with the root
bridge due to a failure of the port or media, or due possibly to manual
disabling of the interface acting as the root port. The switch itself will become
immediately aware of the failure, and since it only receives BPDU from the
root in one direction, will assume immediate loss of the root bridge, and assert
its position as the new root bridge.
so
ur
ce
Mo
re
Le
ar
ni
ng
Re
Following the expiry of the MAX Age timer, switch C will change the port role
of the alternate port to that of a designated port and proceed to forward BPDU
from the root towards switch B, which will cause the switch to concede its
assertion as the root bridge and converge its port interface to the role of root
port. This represents a partial topology failure however due to the need to wait
for a period equivalent to MAX Age + 2x forward delay, full recovery of the
STP topology requires approximately 50 seconds.
Page 250
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
This will begin the transition through the listening, learning and forwarding
states and achieve recovery within a 2x forward delay period. In the event of
any failure, where the link that provides a better path is reactivated, the
spanning tree topology must again re-converge in order to apply the optimal
spanning tree topology.
Page 251
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
Re
so
ur
Mo
re
Le
ar
ni
ng
Page 252
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
so
ur
ce
This new BPDU is referred to as the TCN BPDU and is distinguished from the
original STP configuration BPDU through the setting of the BPDU type value
to 128 (0x80). The function of the TCN BPDU is to inform the upstream root
bridge of any change in the current topology, thereby allowing the root to send
a notification within the configuration BPDU to all downstream switches, to
reduce the timeout period for MAC address table entries to the equivalent of
the forward delay timer, or 15 seconds by default.
ni
ng
Re
The flags field of the configuration BPDU contains two fields for Topology
Change (TC) and Topology Change Acknowledgement (TCA). Upon receiving
a TCN BPDU, the root bridge will generate a BPDU with both the TC and TCA
bits set, to respectively notify of the topology change and to inform the
downstream switches that the root bridge has received the TCN BPDU, and
therefore transmission of the TCN BPDU should cease.
Mo
re
Le
ar
The TCA bit shall remain active for a period equal to the Hello timer (2
seconds), following which configuration BPDU generated by the root bridge
will maintain only the TC bit for a duration of (MAX Age + forward delay), or 35
seconds by default.
Page 253
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
The effect of the TCN BPDU on the topology change process ensures that the
root bridge is notified of any failure within the spanning tree topology, for which
the root bridge is able to generate the necessary flags to flush the current
MAC address table entries in each of the switches. The example
demonstrates the results of the topology change process and the impact on
the MAC address table. The entries pertaining to switch B have been flushed,
and new updated entries have been discovered for which it is determined that
Host B is now reachable via port interface Gigabit Ethernet 0/0/1.
Page 254
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
Huawei Sx7 series switches to which the S5700 series model belongs, is
capable of supporting three forms of spanning tree protocol. Using the stp
mode command, a user is able to define the mode of STP that should be
applied to an individual switch. The default STP mode for Sx7 series switches
is MSTP, and therefore must be reconfigured before STP can be used.
Page 255
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
As part of good switch design practice, it is recommended that the root bridge
be manually defined. The positioning of the root bridge ensures that the
optimal path flow of traffic within the enterprise network can be achieved
through configuration of the bridge priority value for the spanning tree protocol.
The stp priority [priority] command can be used to define the priority value,
where priority refers to an integer value between 0 and 61440, assigned in
increments of 4096. This allows for a total of 16 increments, with a default
value of 32768. It is also possible to assign the root bridge for the spanning
tree through the stp root primary command.
Page 256
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
It has been understood that Huawei Sx7 series of switches support three
forms of path cost standard in order to provide compatibility where required,
however defaults to support the 802.1t path cost standard. The path cost
standard can be adjusted for a given switch using the stp pathcost-standard {
dot1d-1998 | dot1t | legacy } command, where dot1d-1998, dot1t and legacy
refer to the path cost standards described earlier in this section.
so
ur
ce
In addition, the path cost of each interface can also be assigned manually to
support a means of detailed manipulation of the stp path cost. This method of
path cost manipulation should be used with great care however as the path
cost standards are designed to implement the optimal spanning tree topology
for a given switching network and manipulation of the stp cost may result in
the formation of a sub-optimal spanning tree topology.
Mo
re
Le
ar
ni
ng
Re
The command stp cost [cost] is used, for which the cost value should follow
the range defined by the path cost standard. If a Huawei legacy standard is
used, the path cost ranges from 1 to 200000. If the IEEE 802.1D standard is
used, the path cost ranges from 1 to 65535. If the IEEE 802.1t standard is
used, the path cost ranges from 1 to 200000000.
Page 257
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
so
ur
ce
To address this problem, the switch provides the root protection function. The
root protection function protects the role of the root switch by retaining the role
of the designated port. When the port receives a BPDU with a higher priority,
the port stops forwarding packets and turns to the listening state, but it still
retains a designated port role. If the port does not receive any BPDU with a
higher priority for a certain period, the port status is restored from the listening
state.
Mo
re
Le
ar
ni
ng
Re
The configured root protection is valid only when the port is the designated
port and the port maintains the role. If a port is configured as an edge port, or
if a command known as loop protection is enabled on the port, root protection
cannot be enabled on the port.
Page 258
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
Using the display stp command, the current STP configuration can be
determined. A number of timers exist for managing the spanning tree
convergence, including the hello timer, max age timer, and forward delay, for
which the values displayed represent the default timer settings, and are
recommended to be maintained.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
The current bridge ID can be identified for a given switch through the CIST
Bridge configuration, comprised of the bridge ID and MAC address of the
switch. Statistics provide information regarding whether the switch has
experienced topology changes, primarily through the TC or TCN received
value along with the last occurrence as shown in the time since last TC entry.
Page 259
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
Page 260
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
1. Following the failure of the root bridge for a spanning tree network, the
next best candidate will be elected as the root bridge. In the event that the
original root bridge becomes active once again in the network, the process
of election for the position of root bridge will occur once again. This
effectively causes network downtime in the switching network as
convergence proceeds.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
2. The Root Path Cost is the cost associated with the path back to the root
bridge, whereas the Path Cost refers to the cost value defined for an
interface on a switch, which is added to the Root Path Cost, to define the
Root Path Cost for the downstream switch.
Page 261
re
Mo
Page 262
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 263
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 264
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 265
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
RSTP employs a proposal and agreement process which allows for immediate
negotiation of links to take place, effectively removing the time taken for
convergence based timers to expire before spanning tree convergence can
occur. The proposal and agreement process tends to follow a cascading effect
from the point of the root bridge through the switching network, as each
downstream switch begins to learn of the true root bridge and the path via
which the root bridge can be reached.
Page 266
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
Switches operating in RSTP mode implement two separate port roles for
redundancy. The alternate port represents a redundant path to the root bridge
in the event that the current path to the root bridge fails. The backup port role
represents a backup for the path for the LAN segment in the direction leading
away from the root bridge. It can be understood that a backup port represents
a method for providing redundancy to the designated port role in a similar way
that an alternate port provides a method of redundancy to the root port.
Mo
re
Le
ar
ni
ng
Re
so
ur
The backup port role is capable of existing where a switch has two or more
connections to a shared media device such as that of a hub, or where a single
point-to-point link is used to generate a physical loopback connection between
ports on the same switch. In both instances however the principle of a backup
port existing where two or more ports on a single switch connect to a single
LAN segment still applies.
Page 267
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
It can directly change from the Disabled state to the Forwarding state without
any delay, just like an STP-incapable port. If an edge port receives bogus
configuration BPDU from attackers, it is deprived of the edge port attributes
and becomes a common STP port. The STP calculation is implemented again,
causing network flapping.
Page 268
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
RSTP introduces a change in port states that are simplified from five to three
types. These port types are based on whether a port forwards user traffic and
learns MAC addresses. If a port neither forwards user traffic nor learns MAC
addresses, the port is in the Discarding state. The port is considered to be in a
learning state where a port does not forward user traffic but learns MAC
addresses. Finally where a port forwards user traffic and learns MAC
addresses, the port is said to be in the Forwarding state.
Page 269
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
The BPDU format employed in STP is also applied to RSTP with variance in
some of the general parameters. In order to distinguish STP configuration
BPDU from Rapid Spanning Tree BPDU, thus known as RST BPDU, the
BPDU type is defined. STP defines a configuration BPDU type of 0 (0x00) and
a Topology Change Notification BPDU (TCN BPDU) of 128 (0x80), RST
BPDU are identified by the BPDU type value 2 (0x02). Within the flags field of
the RST BPDU, additional parameter designations are assigned to the BPDU
fields.
Mo
re
Le
ar
ni
ng
Re
so
ur
The flags field within STP implemented only the use of the Topology Change
(TC) and Acknowledgement (TCA) parameters as part of the Topology
Change process while other fields were reserved. The RST BPDU has
adopted these fields to support new parameters. These include flags
indicating the proposal and agreement process employed by RSTP for rapid
convergence, the defining of the port role, and the port state.
Page 270
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
In STP, after the topology becomes stable, the root bridge sends configuration
BPDU at an interval set by the Hello timer. A non-root bridge does not send
configuration BPDU until it receives configuration BPDU sent from the
upstream device. This renders the STP calculation complicated and timeconsuming. In RSTP, after the topology becomes stable, a non-root bridge
sends configuration BPDU at Hello intervals, regardless of whether it has
received the configuration BPDU sent from the root bridge; such operations
are implemented on each device independently.
Page 271
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
Page 272
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
Each switch proclaiming to be the root bridge will negotiate the port states for
a given LAN segment by generating an RST BPDU with the proposal bit set in
the flags field. When a port receives an RST BPDU from the upstream
designated bridge, the port compares the received RST BPDU with its own
RST BPDU. If its own RST BPDU is superior to the received one, the port
discards the received RST BPDU and immediately responds to the peering
device with its own RST BPDU that includes a set proposal bit.
Page 273
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
Since timers do not play a role in much of the RSTP topology convergence
process as found with STP, it is important that the potential for switching loops
during port role negotiation be restricted. This is managed by the
implementation of a synchronization process that determines that following the
receipt of a superior BPDU containing the proposal bit, the receiving switch
must set all downstream designated ports to discarding as part of the sync
process.
Mo
re
Le
ar
ni
ng
Re
so
ur
Where the downstream port is an alternate port or an edge port however, the
status of the port role remains unchanged. The example demonstrates the
temporary transition of the designated port on the downstream LAN segment
to a discarding state, and therefore blocking any frame forwarding during the
upstream proposal and agreement process.
Page 274
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
Page 275
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
During the final stage of the proposal and agreement process, the RST BPDU
containing the agreement bit is received by the upstream switch, allowing the
designated port to transition immediately from a discarding state to forwarding
state. Following this, the downstream LAN segment(s) will begin to negotiate
the port roles of the interfaces using the same proposal and agreement
process.
Page 276
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
Page 277
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
Topology changes affect RSTP similarly to the way STP is affected, however
there are some minor differences between the two. In the example, a failure of
the link has occurred on switch C. Switch A and switch C will detect the link
failure immediately and flush the address entries for ports connected to that
link. An RST BPDU will begin to negotiate the port states as part of the
proposal and agreement process, following which a Topology Change
notification will occur, together with the forwarding of the RST BPDU
containing the agreement.
so
ur
This RST BPDU will have both the Agreement bit and also the TC bit set to 1,
to inform upstream switches of the need to flush their MAC entries on all port
interfaces except the port interface on which the RST BPDU containing the set
TC bit was received.
Mo
re
Le
ar
ni
ng
Re
The TC bit will be set in the periodically sent RST BPDU, and forwarded
upstream for a period equivalent to Hello Time+1 second, during which all
relevant interfaces will be flushed and shall proceed to re-populate MAC
entries based on the new RSTP topology. The red (darker) x in the example
highlights which interfaces will be flushed as a result of the topology change.
Page 278
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
Page 279
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
The configuration of the spanning tree mode of Sx7 switches requires that the
stp mode command be used to set the mode to RSTP. In doing so the Sx7
series switch will generate RST BPDU in relation to RSTP, as opposed to
other spanning tree implementations. This command is configured from the
system-view and should be applied to all switches participating in the rapid
spanning tree topology.
Page 280
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
The display stp command will provide relative information regarding RSTP
configuration as many of the parameters follow the principle STP architecture.
The mode information will determine as to whether a switch is currently
operating using RSTP.
Page 281
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
An edge interface defines a port that does not participate in the spanning tree
topology. These interfaces are used by end systems to connect to the
switching network for the purpose of forwarding frames. Since such end
systems do not require to negotiate port interface status, it is preferable that
the port be transitioned directly to a forwarding state to allow frames to be
forwarded over this interface immediately.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
Page 282
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
In the event that multiple ports on a switch are to be configured as edge ports,
the stp edged-port default command is applied which enforces that all port
interfaces on a switch become edge ports. It is important to run the stp edgedport disable command on the ports that need to participate in STP calculation
between devices, so as to avoid any possible loops that may be caused as a
result of STP topology calculations.
Page 283
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
Page 284
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
The switch maintains the status of the root port and blocked ports by
continually receiving BPDU from the upstream switch. If the root switch cannot
receive BPDU from the upstream switch due to link congestion or
unidirectional link failure, the switch re-selects a root port. The previous root
port then becomes a designated port and the blocked ports change to the
forwarding state. As a result, loops may occur on the network.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
The switch provides loop protection to prevent network loops. After the loop
protection function is enabled, the root port is blocked if it cannot receive
BPDU from the upstream switch. The blocked port remains in the blocked
state and does not forward packets. This prevents loops on the network. If an
interface is configured as an edge interface or root protection is enabled on
the interface, loop protection cannot be enabled on the interface. The stp loopprotection command should be applied to enable this feature in the interfaceview.
Page 285
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
Page 286
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
1. The sync is a stage in the convergence process that involves the blocking
of designated ports while RST BPDU are transmitted containing proposal
and agreement messages to converge the switch segment. The process
is designed to ensure that all interfaces are in agreement as to their port
roles in order to ensure that no switching loops will occur once the
designated port to any downstream switch is unblocked.
Page 287
re
Mo
Page 288
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
Module 4
in
g.
hu
Huawei Certification
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
tp
:/
/l
ea
rn
Establishing Internetwork
Communication
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 291
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 292
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 293
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
Page 294
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
The principles surrounding switching have dealt mainly with the forwarding of
traffic within the scope of a local area network and the gateway, which has
until now defined the boundary of the broadcast domain. Routers are the
primary form of network layer device used to define the gateway of each local
area network and enable IP network segmentation. Routers generally function
as a means for routing packets from one local network to the next, relying on
IP addressing to define the IP network to which packets are destined.
Page 295
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
The router is responsible for determining the forwarding path via which
packets are to be sent en route to a given destination. It is the responsibility of
each router to make decisions as to how the data is forwarded. Where a router
has multiple paths to a given destination, route decisions based on
calculations are made to determine the best next hop to the intended
destination. The decisions governing the route that should be taken can vary
depending on the routing protocol in use, ultimately relying on metrics of each
protocol to make decisions in relation to varying factors such as bandwidth
and hop count.
Page 296
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
Re
so
ur
The destination & mask are used in combination to identify the destination IP
address or the destination network segment where the destination host or
router resides. The protocol (Proto) field, indicates the protocol through which
routes are learned. The preference (Pre) specifies the preference value that is
associated with the protocol, and is used to decide which protocol is applied to
the routing table where two protocols offer similar routes. The router selects
the route with the highest preference (the smallest value) as the optimal route.
Mo
re
Le
ar
ni
ng
A cost value represents the metric that is used to distinguish when multiple
routes to the same destination have the same preference, the route with the
lowest cost is selected as the optimal route. A next hop value indicates the IP
address of the next network layer device or gateway that an IP packet passes
through. In the example given a next hop of 127.0.0.1 refers to the local
interface of the device as being the next hop. Finally the interface parameter
indicates the outgoing interface through which an IP packet is forwarded.
Page 297
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
so
ur
ce
Each entry in the FIB table contains the physical or logical interface through
which a packet is sent in order to reach the next router. An entry also indicates
whether the packet can be sent directly to a destination host in a directly
connected network. The router performs an "AND" operation on the
destination address in the packet and the network mask of each entry in the
FIB table.
Mo
re
Le
ar
ni
ng
Re
The router then compares the result of the "AND" operation with the entries in
the FIB table to find a match. The router chooses the optimal route to forward
packets according to the best or "longest" match. In the example, two entries
to the network 10.1.1.0 exist with a next hop of 20.1.1.2. Forwarding to the
destination of 10.1.1.1 will result in the longest match principle being applied,
for which the network address 10.1.1.0/30 provides the longest match.
Page 298
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
A routing table may contain the routes originating from multiple protocols to a
given destination. Not all routing protocols are considered equal, and where
the longest match for multiple routes of differing routing protocols to the same
destination are equal, a decision must be made regarding which routing
protocol (including static routes) will take precedence.
so
ur
ce
Only one routing protocol at any one time determines the optimal route to a
destination. To select the optimal route, each routing protocol (including the
static route) is configured with a preference (the smaller the value, the higher
the preference). When multiple routing information sources coexist, the route
with the highest preference is selected as the optimal route and added to the
local routing table.
Mo
re
Le
ar
ni
ng
Re
In the example, two protocols are defined that provide a means of discovery of
the 10.1.1.0 network via two different paths. The path defined by the RIP
protocol appears to provide a more direct route to the intended destination,
however due to the preference value, the route defined by the OSPF protocol
is preferred and therefore installed in the routing table as the preferred route.
A summary of the default preference values of some common routing
mechanisms are provided to give an understanding of the default preference
order.
Page 299
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
Each segment provides a cost metric value along a path that is combined to
identify the cost of the route. Another common factor is network bandwidth, on
which the cost mechanism is sometimes based. A link with a higher speed
(capacity) represents a lower cost value, allowing preference of one path over
another to be made, whilst links of equal speed are given a balanced cost for
efficient load balancing purposes. A lower metric always takes precedence
and therefore the metric of 50 as shown in the example, defines the optimal
route to the given destination for which an entry can be found in the routing
table.
Page 300
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
Page 301
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
1. Routing decisions are made initially based on the longest match value,
regardless of the preference value assigned for routes to the same
network. If the longest match value for two routes to the same destination
is equal, the preference shall be used, where the preference is also equal,
the metric shall be used. In cases where the metric value is also the
same, protocols will commonly apply a form of load balancing of data over
the equal cost links.
Mo
re
Le
ar
ni
ng
Re
so
ur
Page 302
re
Mo
Page 303
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 304
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 305
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 306
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
Page 307
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ht
Static routes can be applied to networks that use both serial and Ethernet
based media, however in each situation the conditions of applying the static
route vary in which either the outbound interface or the next-hop IP address
must be defined.
ur
ce
s:
Mo
re
Le
ar
ni
ng
Re
so
For example, the protocol used to encapsulate over the serial medium is the
Point-to-Point protocol (PPP). The remote IP address is obtained following
PPP negotiation, therefore it is necessary to specify only the outbound
interface. The example also defines a form of point-to-point Ethernet
connection, however Ethernet represents a broadcast technology in nature
and therefore the principles of point-to-point technology do not apply.
Page 308
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
In the case of broadcast interfaces such as Ethernet, the next hop must be
defined. Where the Ethernet interface is specified as the outbound interface,
multiple next hops are likely to exist and the system will not be able to decide
which next hop is to be used. In determining the next hop, a router is able to
identify the local connection over which the packet should be received.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
Page 309
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
The configuration of the static route is achieved using the ip route-static ipaddress { mask | mask-length } interface-type interface-number [ nexthopaddress ] where the ip-address refers to the network or host destination
address. The mask field can be defined as either a mask value or based on
the prefix number. In the case of a broadcast medium such as Ethernet, the
next hop address is used. Where a serial medium is used, the interface-type
and interface-number are assigned (e.g. serial 1/0/0) to the command to
define the outgoing interface.
Page 310
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
Where equal cost paths exist between the source and destination networks,
load balancing can be implemented to allow traffic to be carried over both links.
In order to achieve this using static routes, both routes must meet the
parameters for an equal longest match, preference and metric value. The
configuration of multiple static routes, one for each next hop or outbound
interface in the case of serial medium is required.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
Page 311
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
The routing table can be queried to verify the results by running the display ip
routing-table command after the static routes are configured. The static route
is displayed in the routing table, and results show two entries to the same
destination, with matching preference and metric values. The different next
hop addresses and variation in the outbound interface identifies the two paths
that are taken, and confirms that load balancing has been achieved.
Page 312
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
The application of static routes allows for a number of ways that routes can be
manipulated to achieve routing requirements. It is possible for the preference
of a static route to be changed for the purpose of enabling the preference of
one static route over another, or where used with other protocols, to ensure
the static route is either preferred or preference is given to the alternative
routing protocol.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
The default preference value of a static route is 60, therefore by adjusting this
preference value, a given static route can be treated with unequal preference
over any other route, including other static routes. In the example given, two
static routes exist over two physical LAN segments, while normally both static
routes would be considered equal, the second route has been given a lesser
preference (higher value) causing it to be removed from the routing table. The
principle of a floating static route means that the route with a lesser preference
will be applied to the routing table, should the primary route ever fail.
Page 313
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
Page 314
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
In the event that the primary static route should fail as a result of physical link
failure or through the disabling of an interface, the static route will no longer be
able to provide a route to the intended destination and therefore will be
removed from the routing table. The floating static route is likely to become the
next best option for reaching the intended destination, and will be added to the
routing table to allow packets to be transmitted over a second alternative path
to the intended destination, allowing continuity in light of any failure.
Mo
re
Le
ar
ni
ng
Re
so
ur
When the physical connection for the original route is restored, the original
static route also will take over from the current floating static route, for which
the route will be restored in the routing table causing the floating static route to
once again await application.
Page 315
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
The default static route is a special form of static route that is applied to
networks in which the destination address is unknown, in order to allow a
forwarding path to be made available. This provides an effective means of
routing traffic for an unknown destination to a router or gateway that may have
knowledge of the forwarding path within an enterprise network.
so
ur
ce
The default route relies on the any network address of 0.0.0.0 to match any
network to which a match could not be found in the routing table, and provides
a default forwarding path to which packets for all unknown network
destinations should be routed. In the example, a default static route has been
implemented on RTA, identifying that should packets for a network that is
unknown be received, such packets should be forwarded to the destination
10.0.12.2.
Mo
re
Le
ar
ni
ng
Re
In terms of routing table decision making, as a static route, the default route
maintains a preference of 60 by default, however operates as a last resort in
terms of the longest match rule in the route matching process.
Page 316
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
The configuration of the static route once configured will appear within the
routing table of the router. The display ip routing-table command is used to
view this detail. As a result, all routes in the example where not associated
with any other routes in the routing table will be forwarded to the next hop
destination of 10.0.12.2 via the interface Gigabit Ethernet 0/0/0.
Page 317
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
Page 318
re
Mo
Page 319
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 320
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 321
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 322
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
Page 323
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
Page 324
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
Page 325
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ht
ur
ce
s:
In order to resolve the problem with infinite route metrics, a value that would
represent infinity was defined that allowed the number of possible hops to be
restricted to a limit of 15 hops. This metric assumes a network size that is
deemed suitable to accommodate the size of networks for which the RIP
routing protocol is suited, and also beyond the scale that it is expected any
network of this type is expected to reach.
Mo
re
Le
ar
ni
ng
Re
so
A hop count of 16 would assume the route to be unreachable and cause the
network status for the given network to be changed accordingly. Routing loops
can occur through a router sending packets to itself, between peering routers
or as a result of traffic flow between multiple routers.
Page 326
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
The example demonstrates how a loop can potentially form where RIP is the
routing protocol. A network (10.0.0.0/8) has been learned through the sending
of route advertisements from RTA to RTC, for which RTC will have updated its
routing table with the network and the metric of 1, in order to reach the
destination.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
In the event of failure of the connection between router RTA and the network
to which it is directly connected, the router will immediately detect loss of the
route and consider the route unreachable. Since RTC is possessing
knowledge of the network, a route advertisement is forwarded containing
information regarding network 10.0.0.0/8. Upon reception of this, RTA will
learn of a new route entry for 10.0.0.0/8 with a metric of 2. Since RTC
originally learned the route from RTA, any change will need to be updated in
RTC also, with a route advertisement being sent to RTC with a metric of 3.
This will repeat for an infinite period of time. A metric of 16 allows a cap to be
placed on infinity, thereby allowing any route reaching a hop count of 16 to be
deemed unreachable.
Page 327
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
Page 328
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
In the example, RTA advertises a metric of 1 for the network to RTC, while
RTC advertises the same network back to RTA to ensure that if 10.0.0.0/8
network fails, RTA will not discover a better path to this network via any other
router. This involves however an increase in the size of the RIP routing
message, since routes containing the network information received now must
also carry the network update, deeming the route unreachable, back to the
neighboring router from which the advertisement originated. In Huawei
AR2200 series routers, split horizon and poisoned reverse cannot be applied
at the same time, if both are configured, only poisoned reverse will be
enabled.
Page 329
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
The default behavior of RIP involves updates of the routing table being sent
periodically to neighbors as a route advertisement, which by default is set to
occur approximately every 30 seconds. Where links fail however, it also
requires that this period be allowed to expire before informing the neighboring
routers of the failure.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
Triggered updates occur when the local routing information changes and the
local router immediately notifies its neighbors of the changes in routing
information, by sending the triggered update packet. Triggered updates
shorten the network convergence time. When the local routing information
changes, the local router immediately notifies its neighbors of the changes in
routing information, rather than wait for a periodic update.
Page 330
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
RIP is a UDP-based protocol. Each router that uses RIP uses a routing
process that involves all communications directed at another router being sent
to port 520, including all routing update messages. RIP generally transmits
routing update messages as broadcast messages, destined for the broadcast
address of 255.255.255.255, referring to all networks. Each router however
will generate its own broadcast of routing updates following every update
period.
Re
so
ur
The command and version fields are used once per packet, with the command
field detailing whether the packet is a request or response message, for which
all update messages are considered response messages. The version refers
to the version of RIP, which in this case is version 1. The remaining fields are
used to support the network advertisements for which up to 25 route entries
can be advertised in a single RIP update message.
Mo
re
Le
ar
ni
ng
The address family identifier lists the protocol type that is being supported by
RIP, which in this example is IP. The remaining fields are used to carry the IP
network address and the hop metric that contains a value between 1 and 15
(inclusive) and specifies the current metric for the destination; or the value 16
(infinity), which indicates that the destination is not reachable.
Page 331
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
The introduction of a new version of RIP, known as RIP version 2, does not
change RIP as such but rather provides extensions to the current RIP protocol
to allow for a number of ambiguities to be resolved. The format of the RIP
datagram applies the same principles of the original RIP protocol with the
same command parameters. The version field highlights the extended fields
are part of version 2.
Re
so
ur
ce
The address family identifier continues to refer to the protocol being supported
and also may be used in support of authentication information as explained
shortly. The route tag is another feature that is introduced to resolve limitations
that exist with support for interaction between autonomous systems in RIP, the
details of which however fall outside of the scope of this course. Additional
parameter extensions have been made part of the route entry including the
Subnet Mask field which contains the subnet mask that is applied to the IP
address, to define the network or sub-network portion of the address.
Mo
re
Le
ar
ni
ng
The Next Hop field now allows for the immediate next hop IP address, to
which packets destined for the destination address specified in a route entry,
should be forwarded. In order to reduce the unnecessary load of hosts that are
not listening for RIP version 2 packets, an IP multicast address is used to
facilitate periodic broadcasts, for which the IP multicast address used is
224.0.0.9.
Page 332
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
Page 333
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
Page 334
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
It is required for all routers supporting the RIP routing process to first enable
the process on each router. The rip [process-id] command is used to enable
this, with the process-id identifying a specific process ID to which the router is
associated. If the process ID is not configured, the process will default to a
process ID of 1.Where variation in the process ID exists, the local router will
create separate RIP routing table entries for each process that is defined.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
The version 2 command enables the RIP version 2 extension to RIP allowing
for additional capability for subnets, authentication, inter-autonomous system
communication etc. The network <network-address> command specifies the
network address for which RIP is enabled, and must be the address of the
natural network segment.
Page 335
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
The rip metricin <metric value> command allows for manipulation of the
metric, where the metric value refers to the metric that is to be applied. It
should also be noted that for the rip metricin command the metric value is
added to the metric value currently associated with the route. In the example,
the route entry for network 10.0.0.0/8 contains a metric of 1, and is
manipulated upon arrival at the interface of RTC, resulting in the metric value
of 3 being associated with the route.
Page 336
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
The rip metricout command allows for the metric to be manipulated for the
route when a RIP route is advertised. Increasing the metric of an interface also
increases the metric of the RIP route sent on the interface but does not affect
the metric of the route in the routing table of the router to which the rip
metricout command is applied.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
In its most basic form the rip metricout command defines the value that must
be adopted by the forwarded route entry, but is also capable of supporting
filtering mechanisms to selectively determine to which routes the metric
should be applied. The general behavior of RIP is to increment the metric by
one before forwarding the route entry to the next hop. If the rip metricout
command is configured, only the metric value referenced in the command is
applied.
Page 337
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
The configuration of both split horizon and poisoned reverse are performed on
a per interface basis, with the rip split-horizon command being enabled by
default (with exception to NBMA networks) in order to avoid many of the
routing loop issues that have been covered within this section. The
implementation of both split horizon and poisoned reverse is not permitted on
the AR2200 series router, therefore where poisoned reverse is configured on
the interface using the rip poison-reverse command, split horizon will be
disabled.
Page 338
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
Page 339
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
Page 340
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
The undo rip input command allows an interface to reject all RIP update
messages and prevent RIP information from being added to the routing table
for a given interface. This may be applied in situations where the flow of traffic
may require to be controlled via certain interfaces only, or prevent RIP from
being received by the router completely. As such any RIP update messages
sent to the interface will be discarded immediately. The rip input command can
be used to re-enable an interface to resume receipt of RIP updates.
Page 341
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
The display rip <process_id> interface <interface> verbose command can also
be used to confirm the implementation of restrictions to the interface. Where
the interface has been configured with the undo rip input, the capability to
receive RIP routes will be considered disabled as highlighted under the Input
parameter.
Page 342
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
The silent interface allows for RIP route updates to be received and used to
update the routing table of the router, but will not allow an interface to
participate in RIP. In comparison, the silent-interface command has a higher
precedence than both rip input & rip output commands. Where the silentinterface all command is applied, the command takes the highest priority,
meaning no single interface can be activated. The silent-interface command
must be applied per interface to allow for a combination of active and silent
interfaces.
Mo
re
Le
ar
ni
ng
Re
so
ur
A common application of the silent interface is for non broadcast multi access
networks. Routers may be required to receive RIP update messages but wish
not to broadcast/multicast its own updates, requiring instead that a relationship
with the peering router be made through the use of the peer <ip address>
command.
Page 343
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
The display rip command provides a more comprehensive router based output
for which global parameters can be verified along with certain interface based
parameters. The implementation of the silent-interface command on a given
interface for example can be observed through this command.
Page 344
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
Page 345
re
Mo
Page 346
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 347
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 348
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 349
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
Open Shortest Path First or OSPF is regarded as a link state protocol that is
capable of quickly detecting topological changes within the autonomous
system and establish loop free routes in a short period of time, with minimum
additional communication overhead for negotiating topology changes between
peering routers. OSPF also deals with scalability issues that occur when
communication between an expanding number of routers becomes so
extreme that it begins to lead to instability within the autonomous system. This
is managed through the use of areas that limits the scope of router
communication to an isolated group within the autonomous system allowing
small, medium and even large networks to be supported by OSPF. The
protocol is also able to work over other protocols such as MPLS, a label
switching protocol, to provide network scalability even over geographically
disperse locations. In terms of optimal path discovery, OSPF provides rich
route metrics that provides more accuracy than route metrics applied to
protocols such as RIP to ensure that routes are optimized, based on not only
distance but also link speed.
Page 350
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
The convergence of OSPF requires that each and every router actively
running the OSPF protocol have knowledge of the state of all interfaces and
adjacencies (relationship between the routers that they are connected to), in
order to establish the best path to every network. This is initially formed
through the flooding of Link State Advertisements (LSA) which are units of
data that contain information such as known networks and link states for each
interface within a routing domain. Each router will use the LSA received to
build a link state database (LSDB) that provides the foundation for establishing
the shortest path tree to each network, the routes from which are ultimately
incorporated into the IP routing table.
Page 351
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
The router ID is a 32-bit value assigned to each router running the OSPF
protocol. This value uniquely identifies the router within an Autonomous
System. The router ID can be assigned manually, or it can be taken from a
configured address. If a logical (loopback) interface has been configured, the
router ID will be based upon the IP address of the highest configured logical
interface, should multiple logical interfaces exist.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
If no logical interfaces have been configured, the router will use the highest IP
address configured on a physical interface. Any router running OSPF can be
restarted using the graceful restart feature to renew the router ID should a new
router ID be configured. It is recommended that the router ID be configured
manually to avoid unexpected changes to the router ID in the event of
interface address changes.
Page 352
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
OSPF supports various network types, and in each case will apply a different
behavior in terms of how neighbor relationships are formed and how
communication is facilitated. Ethernet represents a form of broadcast network
that involves multiple routers connected to the same network segment. One of
the primary issues faced regards how communication occurs between the
neighboring routers in order to minimize OSPF routing overhead. If an
Ethernet network is established, the broadcast network type will be applied
automatically in OSPF.
Page 353
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
Page 354
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ur
ce
s:
ht
OSPF may operate over multi access networks that do not support broadcasts.
Such networks include Frame Relay and ATM that commonly operate using
hub and spoke type topologies, which rely on the use of virtual circuits in order
for communication be to achieved. OSPF may specify two types of networks
that can be applied to links connected to such environments. The Non
Broadcast Multi Access (NBMA) network type emulates a broadcast network
and therefore requires each peering interface be part of the same network
segment. Unlike a broadcast network, the NBMA forwards OSPF packets as a
unicast, thereby requiring multiple instances of the same packet be generated
for each destination.
Mo
re
Le
ar
ni
ng
Re
so
Point-to-Multipoint may also be applied as the network type for each interface,
in which case a point-to-point type behavior is applied. This means that each
peering must be associated with different network segments. Designated
Routers are associated with broadcast networks, and therefore are
implemented by NBMA networks. Most importantly is the positioning of a DR
which must be assigned on the hub node of the hub and spoke architecture to
ensure all nodes can communicate with the DR.
Page 355
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ur
ce
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
Page 356
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ur
ce
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
An adjacency is bound to the network that the two routers have in common. If
two routers have multiple networks in common, they may have multiple
adjacencies between them.
Page 357
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
Re
so
ur
ce
Once the router receives a response in the form of a Hello packet containing
the router ID of the router receiving the response, a 2-way state will be
achieved and a neighbor relationship formed. In the case of NBMA networks,
an attempt state is achieved when communication with the neighbor has
become inactive and an attempt is being made to re-establish communication
through periodic sending of Hello packets. Routers that do not achieve an
adjacent relationship will remain in a neighbor state with a 2-way state of
communication.
Mo
re
Le
ar
ni
ng
Routers such as DR and BDR will build an adjacent neighbor state with all
other neighboring routers, and therefore must exchange link state information
in order to establish a complete link state database. This requires that peering
routers that establish an adjacency first negotiate for exchange of link state
information (ExStart) before proceeding to exchange summary information
regarding the networks they are aware of. Neighbors may identify routes they
are either not aware of or do not have up to date information for, and therefore
request additional details for these routes as part of the loading state. A fully
synchronized relationship between neighbors is determined by the full state at
which time both peering routers can be considered adjacent.
Page 358
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
Neighbor discovery is achieved through the use of Hello packets that are
generated at intervals based on a Hello timer, which by default is every 10
seconds for broadcast and point to point network types; whereas for NBMA
and Point to Multipoint network types the hello interval is 30 seconds. The
hello packet contains this interval period, along with a router priority field that
allows neighbors to determine the neighbor with the highest router ID for
identification of the DR and BDR in broadcast and NBMA networks.
Mo
re
Le
ar
ni
ng
Re
so
ur
A period specifying how long a hello packet is valid before the neighbor is
considered lost must also be defined, and this is carried as the router dead
interval within the hello packet. This dead interval is set by default to be four
times the hello interval, thus being 40 seconds for broadcast and point to point
networks, and 120 seconds for NBMA and Point to Multipoint networks.
Additionally, the router ID of both the DR and BDR are carried, where
applicable, based on the network for which the hello packet is generated.
Page 359
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
Page 360
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
Page 361
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
When the neighbor sees an LSA that is more recent than its own database
copy, it makes a note that this newer LSA should be requested. This sending
and receiving of Database Description packets is called the "Database
Exchange Process". During this process, the two routers form a master/slave
relationship. Each Database Description packet has a sequence number.
Database Description packets sent by the master are acknowledged by the
slave through echoing of the sequence number.
Page 362
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
During and after the Database Exchange Process, each router has a list of
those LSAs for which the neighbor has more up-to-date instances. The Link
State Request packet is used to request the pieces of the neighbor's database
that are more up-to-date. Multiple Link State Request packets may need to be
used.
ng
Re
so
ur
ce
Link State Update packets implement the flooding of LSAs. Each Link State
Update packet carries a collection of LSAs one hop further from their origin.
Several LSAs may be included in a single packet. On broadcast networks, the
Link State Update packets are multicast. The destination IP address specified
for the Link State Update Packet depends on the state of the interface. If the
interface state is DR or Backup, the address AllSPFRouters (224.0.0.5) should
be used. Otherwise, the address AllDRouters (224.0.0.6) should be used. On
non-broadcast networks, separate Link State Update packets must be sent, as
unicast, to each adjacent neighbor (i.e. those in a state of Exchange or
greater). The destination IP addresses for these packets are the neighbors' IP
addresses.
Mo
re
Le
ar
ni
When the Database Description Process has completed and all Link State
Requests have been satisfied, the databases are deemed synchronized and
the routers are marked fully adjacent. At this time the adjacency is fully
functional and is advertised in the two routers' router-LSAs.
Page 363
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
Page 364
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
A router that has achieved a full state is considered to have received all link
state advertisements (LSA) and synchronized its link state database (LSDB)
with that of the adjacent neighbors. The link state information collected in the
link state database is then used to calculate the shortest path to each network.
Each router only relies on the information in the LSDB in order to
independently calculate the shortest path to each destination, as opposed to
relying on select route information from peers which is deemed to be the best
route to a destination. The calculation of the shortest path tree however means
that each router must utilize additional resources to achieve this operation.
Page 365
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
Page 366
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
Page 367
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ur
ce
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
The parenthesis information reflects the ospf process and level at which ospf
parameters can be configured, including the area to which each link (or
interface) is associated. Networks that are to be advertised into a given area
are determined through the use of the network command. The mask is
represented as a wildcard mask for which a bit value of 0 represents the bits
that are fixed (e.g. network id) and where the bit values in the mask represent
a value of 1, the address can represent any value.
Page 368
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
Page 369
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
ur
ce
Mo
re
Le
ar
ni
ng
Re
so
Page 370
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
Page 371
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
It is often necessary to control the flow of routing information and limit the
range for which such routing protocols can extend. This is particularly the case
where connecting with external networks from whom knowledge of internal
routes is to be protected. In order to achieved this, the silent interface
command can be applied as a means to restrict all OSPF communication via
the interface on which the command is implemented.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
After an OSPF interface is set to be in the silent state, the interface can still
advertise its direct routes. Hello packets on the interface, however, will be
blocked and no neighbor relationship can be established on the interface. The
command silent-interface [interface-type interface-number] can be used to
define a specific interface that is to restrict OSPF operation, or alternatively
the command silent-interface all can be used to ensure that all interfaces
under a specific process be restricted from participating in OSPF.
Page 372
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
The implementation of the silent interface on a per interface basis means that
the specific interface should be observed to validate the successful application
of the silent interface command. Through the display ospf <process_id>
interface <interface> command, where the interface represents the interface to
which the silent interface command has been applied, it is possible to validate
the implementation of the silent interface.
Page 373
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
1. The dead interval is a timer value that is used to determine whether the
propagation of OSPF Hello packets has ceased. This value is equivalent
to four times the Hello interval, or 40 seconds by default on broadcast
networks. In the event that the dead interval counts down to zero, the
OSPF neighbor relationship will terminate.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
2. The DR and BDR use the multicast address 224.0.0.6 to listen for link
state updates when the OSPF network type is defined as broadcast.
Page 374
re
Mo
Page 375
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
Module 5
in
g.
hu
Huawei Certification
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
tp
:/
/l
ea
rn
Implementing Network
Application Services
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 379
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 380
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 381
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
Enterprise networks are often comprised of multiple end systems that require
IP address assignment in order to connect with the network segment to which
the end system is attached. For small networks, a minimal number of end
systems attached to the network allows for simple management of the
addressing for all end systems.
Re
so
ur
ce
Mo
re
Le
ar
ni
ng
In cases it is also possible that there may be more hosts than available IP
addresses on a network. Some hosts cannot be allocated a fixed IP address
and need to dynamically obtain IP addresses using the DHCP server. Only a
few hosts on a network require fixed IP addresses.
Page 382
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
Re
so
ur
ce
Mo
re
Le
ar
ni
ng
Page 383
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
Re
so
ur
Mo
re
Le
ar
ni
ng
A DHCP Decline message is sent by a DHCP client, to notify the DHCP server
that the assigned IP address conflicts with another IP address. The DHCP
client will then apply to the DHCP server for another IP address.
Page 384
n
aw
ei
.c
om
/e
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
tp
:/
/l
ea
rn
in
g.
hu
A final message type is the DHCP Inform message, and is sent by a DHCP
client to obtain other network configuration information such as the gateway
address and DNS server address after the DHCP client has obtained an IP
address.
Page 385
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
The AR2200 and S5700 series devices can both operate as a DHCP server to
assign IP addresses to online users. Address pools are used in order to define
the addresses that should be allocated to end systems. There are two general
forms of address pools which can be used to allocate addresses, the global
address pool and the interface address pool.
Re
so
ur
ce
The use of an interface address pool enables only end systems connected to
the same network segment as the interface to be allocated IP addresses from
this pool. The global address pool once configured allows all end systems
associated with the server to obtain IP addresses from this address pool, and
is implemented using the dhcp select global command to identify the global
address pool. In the case of the interface address pool, the dhcp select
interface command identifies the interface and network segment to which the
interface address pool is associated.
Mo
re
Le
ar
ni
ng
The interface address pool takes precedence over the global address pool. If
an address pool is configured on an interface, the clients connected to the
interface obtain IP addresses from the interface address pool even if a global
address pool is configured. On the S5700 switch, only logical VLANIF
interfaces can be configured with interface address pools.
Page 386
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
s:
ht
so
ur
ce
The discovery of one or multiple DHCP servers results in each DHCP server
offering an IP address to the DHCP client. After receiving the DHCP Discover
message, each DHCP server selects an unassigned IP address from the IP
address pool, and sends a DHCP Offer message with the assigned IP address
and other configuration information to the client.
ng
Re
If multiple DHCP servers send DHCP Offer messages to the client, the client
accepts the first DHCP Offer message received. The client then broadcasts a
DHCP Request message with the selected IP address. After receiving the
DHCP Request message, the DHCP server that offers the IP address sends a
DHCP ACK message to the DHCP client. The DHCP ACK message contains
the offered IP address and other configuration information.
Mo
re
Le
ar
ni
Upon receiving the DHCP ACK message, the DHCP client broadcasts
gratuitous ARP packets to detect whether any host is using the IP address
allocated by the DHCP sever. If no response is received within a specified
time, the DHCP client uses this IP address. If a host is using this IP address,
the DHCP client sends the DHCP Decline packet to the DHCP server,
reporting that the IP address cannot be used, following which the DHCP client
applies for another IP address.
Page 387
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ht
After obtaining an IP address, the DHCP client enters the binding state. Three
timers are set on the DHCP client to control lease update, lease rebinding,
and lease expiration. When assigning an IP address to a DHCP client, a
DHCP server specifies values for the timers.
ur
ce
s:
If the DHCP server does not set the values for the timers, the DHCP client
uses the default values. The default values define that when 50% of the lease
period remains, the release renewal process should begin, for which a DHCP
client is expected to renew its IP address lease. The DHCP client
automatically sends a DHCP Request message to the DHCP server that has
allocated an IP address to the DHCP client.
Mo
re
Le
ar
ni
ng
Re
so
If the IP address is valid, the DHCP server replies with a DHCP ACK message
to entitle the DHCP client a new lease, and then the client re-enters the
binding state. If the DHCP client receives a DHCP NAK message from the
DHCP server, it enters the initializing state.
Page 388
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
After the DHCP client sends a DHCP Request message to extend the lease,
the DHCP client remains in an updating state and waits for a response. If the
DHCP client does not receive a DHCP Reply message from the DHCP server
after the DHCP server rebinding timer expires which by default occurs when
12.5% of the lease period remains, the DHCP client assumes that the original
DHCP server is unavailable and starts to broadcast a DHCP Request
message, for which any DHCP server on the network can reply with a DHCP
ACK or NAK message.
Mo
re
Le
ar
ni
ng
Re
so
ur
If the received message is a DHCP ACK message, the DHCP client returns to
the binding state and resets the lease renewal timer and server binding timer.
If all of the received messages are DHCP NAK messages, the DHCP client
goes back to the initializing state. At this time, the DHCP client must stop
using this IP address immediately and request a new IP address.
Page 389
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
The lease timer is the final timer in the expiration process, and if the DHCP
client does not receive a response before the lease expiration timer expires,
the DHCP client must stop using the current IP address immediately and
return to the initializing state. The DHCP client then sends a DHCP
DISCOVER message to apply for a new IP address, thus restarting the DHCP
cycle.
Page 390
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
There are two forms of pool configuration that are supported in DHCP, these
include defining a global pool or an interface based pool. The dhcp select
interface command is used to associate an interface with the interface address
pool in order to provide configuration information to connected hosts. The
example demonstrates how interface Gigabit Ethernet 0/0/0 has been
assigned as part of an interface address pool.
Page 391
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
Each DHCP server will define one or multiple pools which may be associated
globally or with a given interface. For determining the pool attributes
associated with an interface, the display ip pool interface <interface>
command is used. The DHCP pool will contain information including the lease
period for each IP address that is leased, as well as the pool range that is
supported. In the event that other attributes are supported for DHCP related
propagation to clients such as with the IP gateway, subnet mask, and DNS
server, these will also be displayed.
Page 392
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
The example demonstrates the DHCP configuration for a global address pool
that is assigned to the network 10.2.2.0. The dhcp enable command is the
prerequisite for configuring DHCP-related functions, and takes effect only after
the dhcp enable command is run. A DHCP server requires the ip pool
command be configured in the system view to create an IP address pool and
set IP address pool parameters, including a gateway address, the IP address
lease period etc. The configured DHCP server can then assign IP addresses
in the IP address pool to clients.
Mo
re
Le
ar
ni
ng
Re
so
ur
A DHCP server and its client may reside on different network segments. To
enable the client to communicate with the DHCP server, the gateway-list
command is used to specify an egress gateway address for the global address
pool of the DHCP server. The DHCP server can then assign both an IP
address and the specified egress gateway address to the client. The address
is configured in dotted decimal notation for which a maximum of eight gateway
addresses, separated by spaces, can be configured.
Page 393
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
The information regarding a pool can be also observed through the used of the
display ip pool command. This command will provide an overview of the
general configuration parameters supported by a configured pool, including
the gateway and subnet mask for the pool, as well general statistics that allow
an administrator to monitor the current pool usage, to determine the number of
addresses allocated, along with other usage statistics.
Page 394
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ht
1. IP addresses that are used for server allocation such as any local DNS
servers in order to avoid address conflicts.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
Page 395
re
Mo
Page 396
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 397
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 398
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 399
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
The implementation of an FTP server within the enterprise network allows for
effective backup and retrieval of important system and user files, which may
be used to maintain the daily operation of an enterprise network. Typical
examples of how an FTP server may be applied include the backing up and
retrieval of VRP image and configuration files. This may also include the
retrieval of log files from the FTP server to monitor the FTP activity that has
occurred.
Page 400
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
The transfer of FTP files relies on two TCP connections. The first of these is a
control connection which is set up between the FTP client and the FTP server.
The server enables common port 21 and then waits for a connection request
from the client. The client then sends a request for setting up a connection to
the server. A control connection always waits for communication between the
client and the server, transmits related commands from the client to the
server, as well as responses from the server to the client.
Mo
re
Le
ar
ni
ng
Re
so
ur
The server uses TCP port 20 for data connections. Generally, the server can
either open or close a data connection actively. For files sent from the client to
the server in the form of streams, however, only the client can close a data
connection. FTP transfers each file in streams, using an End of File (EOF)
indicator to identify the end of a file. A new data connection is therefore
required for each file or directory list to be transferred. When a file is being
transferred between the client and the server, it indicates that a data
connection is set up.
Page 401
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
There are two FTP transmission modes which are supported by Huawei,
these are ASCII mode and binary mode. ASCII mode is used for text, in which
data is converted from the sender's character representation to "8-bit ASCII"
before transmission. Put simply, ASCII characters are used to separate
carriage returns from line feeds. In binary mode the sender sends each file
byte for byte. This mode is often used to transfer image files and program files
for which characters can be transferred without format converting.
Page 402
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
Implementing the FTP service is achievable on both the AR2200 series router
and S5700 series switch, for which the service can be enabled through the ftp
server enable command. After the FTP server function is enabled, users can
manage files in FTP mode. The set default ftp-directory command sets the
default working directory for FTP users. Where no default FTP working
directory is set, the user will be unable to log into the router, and will instead
be prompted with a message notifying that the user has no authority to access
any working directory.
Page 403
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
Access to the FTP service can be achieved by assigning individual user login
to manage access on a per user basis. AAA is used to configure local
authentication and authorization. Once the AAA view is entered, the local user
can be created, by defining a user account and password. The account is
capable of associating with a variety of services, which are specified using the
service-type command, to allow for the ftp service type to be supported by
AAA.
so
ur
If the ftp directory of the user should vary from the default directory, the ftpdirectory command can be used to specify the directory for the user. If the
number of active connections possible with a local user account is to be
limited, the access-limit command can be applied. This can range from 1 to
800, or unlimited where an access limit is not applied.
Mo
re
Le
ar
ni
ng
Re
Page 404
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
Following configuration of the FTP service on the FTP server, it is possible for
users to establish a connection between the client and the server. Using the
ftp command on the client will establish a session through which the AAA
authentication will be used to validate the user using AAA password
authentication. If correctly authenticated, the client will be able to configure as
well as send/retrieve files to and from the FTP server.
Page 405
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ht
1. In order for the control connection and data connection of the FTP service
to be established successfully, TCP ports 20 and 21 must be enabled.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
Page 406
re
Mo
Page 407
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 408
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 409
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
Page 410
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
Page 411
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
ce
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
The telnet terminal drivers interpret the keystrokes of users and translates
these to a universal character standard, based on a network virtual terminal
(NVT) which operates as a form of virtual intermediary between systems,
following which the transmission via the TCP/IP connection to the server is
performed. The server decodes the NVT characters and passes the decoded
characters to a pseudo terminal driver which exists to allow the operating
system to receive the decoded characters.
Page 412
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
Page 413
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
Page 414
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
Page 415
n
aw
ei
.c
om
/e
in
g.
hu
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
Page 416
re
Mo
Page 417
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e