Beruflich Dokumente
Kultur Dokumente
Wired or wireless
RG-45 cable
Network cables:
Coaxial:
Or use bridges or boosters, repeaters to extend the distance. Finally use fibre optics others
• 10Base-T
• 100Base-Tx
• 1000Base-T 4 pairs of category 5e twisted pair cable supports 1Ghz transmission speed
Fiber Optic
-100Base-FX 100mb/ps
Serial
-RS-232 20000bps
Broadcast domains
Collision Domains
-Full duplex: You can send and receive at the same time. Act as a server and client
simultaneously.
Encryption: Provide protection over the network to mitigate from hacking. Required key.
Session
Sender top to bottom Receiver bottom to top: Application, presentation, session, transportation,
network, data link, physical
Frame Formats
Frame check sequence: To check if the packet is complete or if there if it is fragmented. A packet is
1500/1536
2048 (0x0800) - IP
2054(0x0806) - ARP
Carrier sense:
Layer 2
Just need a switch and the end device. A switch can establish a connection with only MAC Addresses.
Network layer:
IP packet (0x0800) length 60 bytes, source destination. Time to leave 255-0, packet dropped afterwards
at 0.
-Class A 10.0.0.0 ~ 10.255(network).255.255 Multiple hosts. Check first that number ranges /8
-Class B /16
Class D
E.G
Class C 192.168.1.0
Network 6
IP Gateway
GIves us access to the.
Time to live:
ICMP Types
Every link is counted as a hop count and ads to the time required to send a message.
Proxy ARP takes longer because of connecting with the proxy gateway.
TCP Wired networks, conjunction control, monitoring packets. Three hand-way shake, security and
sharing of certificates. TCP is the best for safety. UDP. Doesn’t do floor control or three-way handshake.
Company usually wireless network. Wireless access point is linked to the wired connection so that
monitoring occurs on the main router, called traceback. Logs are maintained according to MAC address,
which are constant per devices.
Multiple collisions.
Establishing connectivity to the Switch or router: Remotely, tele, or mini usb/console physically
Data bits 8
Party: None
Stop bits 1
Flow control none.
CLI Interfaces:
Allows remote access VTY (Virtual teletype terminal) 0-4 five times. Can be changed.
There is one root bridge and following from there are non-root bridges or downstream bridges.
Redundancy is recommended however there may be broadcast storms. MAC instability. So, the
spanning tree protocol was introduced. To send the packet along the shortest path.
-Bridge ID (Bridge number and MAC ID): BPDU packet sent to the switches, returning switch
number and MAC address. Only if the bridge ID is the same, the path codes are used to determine the
shortest path according to the cable speed.
The smallest bridge ID is elected as the root bridge. The highest priority or election criteria. The MAC
address is the determinant.
BPDU (Bridge Protocol Data Unit) through STP (Spanning Tree Protocol) for bridges and switches:
-We are trying to control the management of data to avoid loops and broadcast storms. The
bridge facilitates communication.
-TCN BDPU: Goes from downstream roots to the upstream roots to better understand the
topology of the tree. A status call, these protocols are a notification and update the tree hierarchy. Hello
tree over 2 seconds. The TCN BPDU refreshes/responds every 30 seconds.
Route Path Cost: In order to determine the shortest path that is loop free. The root bridge path
cost is always 0.
The highest port identifier (the lowest port number) represents the port assigned as the root
port with other ports defaulting to the alternative port role.
To propagate a Hello Timer (2 seconds) the upstream will propagate over 1 second. A maximum
ae timer by default represents a period of 20 seconds.
Root Failure:
When a switch is done it cannot send BPDU, so the switches reestablish the bridge root through
the Spanning Tree Protocol (STP). If the device fails
If the port is down. The port table is relabeled. The alternative port is named as a designated
port as it cannot be communicated any other way in this circumstance. Full recovery of the STP
topology occurs after approximately 50 seconds.
STP Modes:
To further mitigate against loops, the switches are not all the same mode and must be
configured by the technician.
-mstp (multiple)
-rstp (rapid)
-stp
If the stp is a priority the priority refers to integers between 0 to 61440 in increments of 4096,
16 increments. With a default value of 32768.
If a legcy stp standard is use the path cost ranges between 1 to 200000
If IEEE 802.1D standard is used the path cost ranges from 1 to 65535
If the IEEE 802.1t standard is used the path cost is ranges from 1 to 200000000.
All root bridges must be designated. Root protection only applies while not an edge port or a
command of loop protection is enabled.
STP Weaknesses: Ensures loop-free network however has a slow network topography as changes occur.
Convergence timers (30-50 seconds). Regular service interuptions
RSTP: Employs a proposal and agreement process which allows for immediate negotiation of links to
take place, effectively removing the time taken for convergence-based timers to expire before spanning
tree convergence can occur. Proposal & Agreement, immediate negotiation. Each downstream switch
gradually begins to learn of the true root bridge and the path via which the root bridge can be reached.
Backup port role represents the backup for the path for the LAN segment in the direction leading away
from the root bride. An edge port directly connects to a terminal and no other, where redundant links
exist,
RST BPDU
-00 unknown
-01 Alternate/backup
-Designated port
Static route would have to be reconfigured manually should the route fail. Only use a static route for
small networks of few users.
The convergence of a RSTP follow on from STP. There is an additional port on the LAN side, the edge
port.
All designated ports. One is a superior BPDU. When the BDPU is sent, not propagated downstream. The
edge port is connected to the computer.
The downstream port is blocked, and synchronization occurs. RST BPDU sent back and forth.
Link/Root failure
After not receiving three consecutive Hello intervals, the agreement process is reinsitialised in order to
discover port roles for the LAN segment.
Link failure is noticed immediately, the address entries are flushed. An RST BPDU will negotiate the port
states as part of negotiation and agreement process - MAC Addresses are dropped and updated
No waiting, part of configuration settings. When an STP enabled device is added to an RSTP system it
reverts to STP.
The edge ports that are shut down by the switch can be manually started only by the network
administrator.
STP DPDU-protection command should be ued to enable BDPU protection and is confiugred globally
within the system view.
Loop prevention
Packet is df
-Authentication
Metric
OSPD
OSPF
For 4 devices
Request + Acknoledgenent X2
10 seconds
30 second interval
OSPF metric: By default, the metric is 10 which can be changed as per user preference, there can be
alternative.
10/8*bandwidth
DHCP
Usually wireless
To assign an IP address
-Manual: Administrator visits the machine and the IP address assigned is physically
DHCP messages
Reply is unicast
Once a user/machine leaves the IP address can be reassigned. Maximum of 24hrs usage of an IP
address. Notification to renew sent at 50% usage. Down to the minute and second.
FTP
Used to transfer files from the server to the client. VRP operating system.
Both the client and server must use the same password otherwise they cannot communicate with each
other. Two port numbers used to exchange packets.
-Port 23
Authentication modes:
-Password: Authentication
For some you can determine if a change was made and by who
E.g 2 LANs connected by a LAN. LAN a, LAN b, LAN c. Where LAN c is he link between LAN a,b.
Relying on the IP address a Router uses the routing table, compared to a switch which utilises
MAC Addresses. Routers are responsible for routing decisions because of the routing table. All network
nodes are included.
ROUTING Protocol: RIPv1, RIPv2, ARP
PRE: Preferences. A router selects the best path based on the highest preferences (smallest val)
RIP = 100
OSPF = 10
Static preference = 60
A static route can be assigned on serial links or on ethernet (data link layer) link/cable.
[RTB} (On router B) ip route-static 192.168.1.0 255.255.255.0 (Subnet mask) Serial 1/0/0
More than one static route to a destination. Which comes with additional cost, ISP.
Special case of default static route when a destination static route is unknown. Works on any unassigned
network:
[RTA] ip route-static 0.0.0.0 0.0.0.0 10.0.12.2 preference of 60 by default. Can access any + verification
Display ip route-table:
Without a static route you are required to have a routing protocol saved on the routing table.
Small organisation
Simple to implement
Principle Behavior
When a network fails the next best route might have loops, the routers learn among themselves. The
metric cap can be changed.
Split horizon:
A route that is down and learnt on an interface cannot be advertised on the same to prevent
loops.
Has additional overheads, the routing message size is increased because of advanced
notifications as the routing table is updated.
On Huawei AR2200 series router split horizon and poisoned reverse cannot be applied at the same time,
poison reverse is preferred and enabled.
Loop prevention-triggered update
If the router is not configured for RIP version 2 authentication it reverts back to RIP version 1
and discards authenticated RIPv2 messages.
[RTA] rip
[RTA-rip-1] version 2
RIP metricin/out
*Command:
Scalable
Configure on ethernet
Configure as High-level data link control (HDLC) -data link layer OSI model
OSPF can operate on multiaccess network that does not support broadcast.
Designated Router are implemented by NBMA (Non-broadcast multi access) act as an access
point with backup routers (neighbor(not BDR-backup designated router) or adjacent(linked to
neighbour))
Link State Establishment: Each router transitions between neighbour and adjacent state.
Each router according to LSA has its own individual unique LSDB
DR election process: Priority set at 1. If priority of 0 then it doesn’t participate in the election. Highest
priority becomes the Designated Router (sends advertisements for efficiency)
A link state protocol, uses LSA (link state advertisement) the information is LSA saved on the LSDB (link
state database) on the routing table.
If a logical interface has been configured the Router ID is the highest configured logical interfaces IP
address
Multi area
Allows an OSPF to compartmentalise based on a link state database that is identical for an area
while granting information on destination of the OSPF domain
Default Process id 1
OSPF authentication
Prevent an interface from forming neighbor relationships with peers (sharing its router table)
Discover (broadcast)
Offer (unicast)
Request (broadcast)
ACK (unicast)
Dhcp server excluded-ip-address 10.1.1.2 ***excluded the Ip address of the DNS IP address
server
Dhcp enable
[Huawei-ip-pool-pool2]gateway-list 10.2.2.1
[Huawei-ip-pool-pool2]lease day 1
[Huawei-ip-pool-pool2]quit
FTP protocol
Sending files
Security, ssh
Password vty 0 4
Switches have a gateway only if it is layer 3 separating full access to private access. On a router,
its port assigned Ip address
Default gateway: IP address door taking your from one subnet to another.
Layer 2 switch have are not gateways they use MAC addresses and are on the same LAN
Intermediate Training
Huawei enterprise solutions for performance, scalability, reliability, security and management
Link Aggregation
Optimizing the throughput of data, link aggregation enables the binding of multiple physical interfaces
into a single logical pipe. (Performance, scalability, reliability)
Link Aggregation
Provides for increased bandwidth, enhanced reliability and support of load balancing.
Frames with the same source MAC addresses are transmitted over the same physical link
….
….
...
Use undo port switch, then an IP address can be assigned to the interface.
Displaying Aggrgation
….
LAN Limitation
VLAN Technology
Enable logical isolation of network traffic
Drop Eligibility Criteria (DEI) such as true or false bit. determines eligiblity to discard data.
Link Types
Trunk: Backbone for the transmission of VLAN traffic. Difference between switches
Access: Between and end system and a swtich device participating in VLAN tagging.
Port VLAN ID
You can set each VLAN to accept default VLAN for the interface to be recognised as the Port VLAN ID
(PVID). This deter,mines the behaviour that is applied to any frames being received or transmitted.
if a tag and PVID vary the frame is not forwarded and discarded. A untagged fram is forwarded to the
interface of the switch to all other destinations to be understood
Hybrid ports Represent the default for Huawei devices. If it is tagged the PVID allows it to travel. If it is
untagged it must be in the access area to be transmitted. If it is on the trunk it must be tagged to travel.
A tag must be added by the port which received an untagged frame from an end system.
Creating a VLAN
VLAN range 1-4094.
All Huawei switches are Hybrid Look at the image for the switch.
Creating VLANs
vlan <ID>
port <location>
Associated with voice VLAN based on the Organisationallu Unique identifer (OUI)
PDU (Protocol Data Unit) are sent from GARP and use multicast MAC address 01:20-C2-00-00-21.
0: LeaveAll event
1: JoinEmpty event
2: JoinIn event
3: LeaveEmpty event
4: LeaveIn event
5: Empty event
JoinEmpty: Unregistered
LeaveIn:
LeaveEmpty:
GVRP
Registration modes
VLAN Types:
Registration modes:
Enabling GVRP
Command gvrp is used to enable GVRP once the interface has neem configured to operate as part of
VLAN.
VLAN Routing
VLAN frames are routed over a trunk link for port conservation.
performs port receiving VLAN packet will remove the VLAN tag from the fram and forward the
packet via layer 3 routing
Applied to each logical interface, if it remains disabled on the sub-interface the router will
discard packets!!
BYOD
Wireless coverage
Wireless LAN solutions
Wireless LAN security
Principle and Configuration of HDLC and PPP
Point-to-point : Data link layer 2
Serial Signaling
Connect via ethernet or serial link
Synchrnoous access
Asynchrnonouos access
Config validation
[RTA] display ip interface brief
Encapsulates and transmits network layer packets over point-to-point (P2P) over full-duplex
synchronous and asynchronous links. Built on Serial Line Internet Protocol (SLIP).
Frame relay (FR) only supports synchronous links – such as with Banks that are standalone.
Components of PPP
PPP encapsulation method: ….
Configure Request
Configure-Acknolodgement
Configure-Reject
Authenticaton protocol
Magic Number
[RTA] aaa
Point-to-Multipoint: Used to connect multiple remote devices, each PVC will map the protocol
address of its connected remote device. Different PVCs can reach different remote devices.
The address mapping must be configured manually, or dynamically set up through the Inverse address
resolution protocol(InARP)
***See Syntax***
Using the fr Inarp it is possible to discover all permanent virtual circuits (PVC) associated with the local
interface
This config helps upper layer protocols locate a peer device based on the protocol address o f the peer
device.
READ rules
PADO:
PADR:
PADS:
PADT:
Dial-up interface
A NAT must be able to create a mapping table within the gateway to allow the gateway to allow the
gateway to determine as to which private network destination address a packet received from the
public network should be sent, again requiring address translation to be performed along the return
path
Static NAT
Represents a one –to-one (1 IP address) mapping of static NAT that is manually configured by the
administrator
Dynamic NAT
Works on the principle of an address pool. Internal end systems wishing to forward traffic to a public
network can associate with a public address from an address pool.
Easy IP
The WAN interfaces address used as a single public address for all internal users, with port numbers
used to distinguish sessions. Create an Easy IP through a dial-up to receive a temporary public IP address
received by the outbound interface. Small scale enterprises.
Mapping occurs.
[RTA]nat static global 200.10.10.5 inside 192.168.1.1 .... invoking NAT static
...
Netmask: 255.255.255.255
[RTA-acl-basic-2000]quit
[RTA-Serial1/0/0]nat outbound 2000 address-group 1 no-pat
Rule 5, 10, 15
outbound – we request their port numbers and IP addresses, belongs to address group 1
Easy IP Configuration
Very similar to dynamic, rely on the creation of an access control list for defining address range to which
to translate. Perform the nat outbound command.
ip address ppp-negotiate
prof
[Huawei-acl-adv-3002]quit
[Huawei-cellular0/0/0]quit
[Huawei]ip route-static 0.0.0.0 cellular 0/0/0
IPv6-128 bits due to increased security, however it is streamlined and incorporated making it less bulky
Parameter: Source IP
Advanced
Parameter: Source & Destination IP, Protocol, Source & Destination port
Layer 2 ACL
Basic ACL
[RTA-acl-basic-2000]rule deny source 192.168.1.0 0.0.0.255
Advanced ACL
[RTA]acl 3000
[RTA-acl-adv-3000]rule deny tcp source 192.168.1.0 0.0.0.255 desination 172.16.10.1 0.0.0.0
destination-port eq 21 … FTP ports 20 or 21
Accounting
AAA Local Config
Both must have the same user name and password
Two modes:
Reachability
...
Required network layer communication for an IPSec VPN. An advanced ACL is needed to determine the
protocols, ports and ip addresses.
E.g. use authentication algorithms [md5 | sha1 | sha2-256 | sha 2-384 | ….]
The sha* must correlate between devices that are to communicate.
Policy-name
seq-number (1-15)
Multiple IPSec policies with the same IPSec policy name constitute an IPSec policy group. The IPSec
policy gorup contains a maximum of 16 IPSec policies. The smalledst IPSec sequence number has the
highest priority. The group must be applied to an interface
The Tunnel local and Tunnel remote have links that determine where the tunnel starts and ends.
The Inbound SPI must be the same as the outbound SPI, the number
Finally, authentication key must be defined as inbound and outbound, they must be the same
…
...
Can be implemented on tunneling. Less secure. Ideal to implement GRE tunnel and IPSec VPN
IPSec VPN (Virtual Private Network) support for GRE (Generic Routing Encapsulation)
GRE Keepalive
,,,
GRE Configuration
Simple Network Management Protocol (SNMP)
Management solutions widely used in TCP/IP networks. Adaptation of SGMP protocol, forms the basis
for common network management throughout the system. SNMP is effectively a communication
medium between the network elements and the network adminstrator/(NMS).
Network Management Station (NMS) relies on SNMP to define sources for network information.
SNMP relays reports in the form of trap messages to the NMS so that the station can obtain network
status in near real time. This allows the network administrator to quickly act on system discrepancies
and failures.
Software:
Applications
User Accounts
Hardware:
Workstations
Servers
Network cards
Routing devices
Switches
SNMP Architecture
The network management station (NMS) has network management requests that it makes know to the
elements; hosts, gateways, terminal servers etc. The management agent resides on the network
element in order to Retrieve/get or alter/set vaiables.
NMS associates with the management agent on each of the network elements that perform NMS
designed functions composing the MIB (Management Information Base) objects.
MIB Objects
Specifies the variables to be maintained by each network element. These variables are queried and set
by the management process.
The SNMP MIB has the same tree structure as the DNS (Domain Name System) with the top objects:
ISO
ITU-T (CCITT)
Version 3:
Traffic
Practical Training
Entry Training
..
//
Intermediate Training
..
Lessons from the mock exams
Loopback address 127.0.0.1
VLAN 12 bits
-Application
-Presentation
-Session
-Transportation
-Network
-Data link
-Physical
-Transport
-Network
-Data link
OSFP uses SPF (Shortest Path First) algorithm to calculate the shortest route
Repeaters, hubs, network interface cards, cables and connector operate on the Physical layer
Two others will either exchange LSA or send Hello packet to each other due to the existence of DR in
Broadcast network of OSPF
A static route can be neither configured manually by a network administrator nor generated
automatically.
When a network condition changes a static route canNOT be rectified automatically without
reconfiguration by the network administrator
Root bridges provide root ports and designated, alternative ports
Routing information Protocol (RIP) is NOT available in the RIPv2, RIPv2 and RIPv3 versions
When a trunk port receives an untagged frame, the switch will NOT drop the frame
One router forwards the packets according to the routing table on itself without considering the routing
table of any neighbour routers
A trunk port does not always send tagged frames to the peer equipment.
Each router only knows how to forward the packet to the net hop IP address. It doesn’t know the end to
end forwarding path. This type of forwarding is called Hop by Hop forwarding
When a node transmits data over a network medium, the data is transmitted to all the nodes on the
network. The topology used is BUS
A router runs OSFP and its interface serial 0 and IP address 10.0.0.1/30 belongs to the backbone area.
The command used to enable OSFP on this interface is = [Quidway-osfp –1area-0.0.0.0]network
10.0.0.0 0.0.0.3
Switch –A and Switch-B are configured with ports in VLAN for deparments. Each VLAN contains 20 users.
Only 5 subnets are required.
Access ports:
-MAC sub-layer
-LLC sub-layer
-User can specify the route preference of RIP higher than that of static routes
-If the route calculated by other routing protocol which is imported by RIP does not specify the
cost value, the cost value will be set as 1 by default
Routed protocols:
-IP
VLAN interfaces:
-A virtual interface is required to be created for VLAN if we want to assign an IP address for that
VLAN
If two static routes are configured to the route 10.1.1.1/32. If one does not have a value for the
preference_value parameter and the other static route is assigned with 100 for the preference_value
parameter
-The route not assigned a preference_value parameter will function as the working route
Functions of a router:
-IP address
-Protocol number
-Port number
-FTP
-TFTP
OSPF takes the precedence to select the biggest IP address of all the loopback addresses as a router ID
unless you specify a router ID manually.
The frame is the PDU that resides at the data link layer
-Blocking
-Listening
-Learning
-Forwarding
-Disabled
Route Information Protocol uses the hop count to determine the value cost
IP address consists of: Network address, Host address, subnet field, non-default masks, default subnet
mask
-Challenge packet
-Response packet
-Success packet
-Failure packet
-Increased bandwidth (the capacity of multiple links is combined into one logical link
-Automatic failover
-Failback (The traffic from a failed link is automatically switched over to other working links
DHCP offer packet can carry more than one DNS server address
After a fault occurs in a network, a static route canNOT be rectified automatically and the network
administrator is needed to reconfigure.
(RIP) Routing Information Protocol is not available in RIPv1, RIPv2 and RIPv3 versions
On Huawei switches you can run the VLAN batch command to create multiple VLANs in batches
HDLC is ISO standard link layer protocol and it is used to encapsulate data transmitted on asynchronous
link
One of the significant features of the PPP protocol is the authentication function. With this function, the
two ends of a link can negotiate with each other to use which authentication protocol and then perform
authentication. A PPP connection is established only when the authentication is successful.
When you configure Frame Relay on Quidway routers, you can configure inverse ARP instead of static
address mapping because the function of inverse ARP is to provide dynamic address mapping.
The operation deleting the configuration files saved in the storage devices will become effective after
rebooting the router.
Frame relay point-to-multipoint sub-port canNOT connect multiple remote nodes together through a
PVC
-MVRP (Multiple VLAN registration Protocol) sends PDU (protocol data unit)
ARP (Address Resolution Protocol) performs required IP routing. It finds the hardware address (MAC
address) from the IP address. ARP maintains a cache table of MAC addresses mapped to IP addresses.
HDLC is NOT ISO standard link layer protocol and it is used to encapsulated data transmitted on
asynchronous link.
The standard defined by IEEE to regulate the implementation of VLAN between switches is 802.1Q
A switch supporting 802.1Q protocol can support a maximum number of 4096 VLANs
When two routers synchronise their LSDBs they use DD packets to describe their LSDBs
IGP(Internal gateway protocol) is the protocol which is used for asynchronous systems
OSPF takes the precedence to select the IP address of all loopback port addresses as a router ID unless
you specify a router ID
Hop count is the parameter used by RIP to calculate the value of cost
On Huawei switches running STP, the default value of forward delay is 15 seconds
To release the IP address assigned by the DHCP server on Windows XP, command IPconfig/release
The protocols that can be used for file transfer is FTP and TFTP
CHAP packets:
Challenge
Response
Success
Failure