Professional Documents
Culture Documents
Recommendations: Huawei Learning Website
Recommendations: Huawei Learning Website
Huawei e-Learning
https://ilearningx.huawei.com/portal/#/portal/ebg/51
Huawei Certification
http://support.huawei.com/learning/NavigationAction!createNavi?navId=_31
&lang=en
Find Training
http://support.huawei.com/learning/NavigationAction!createNavi?navId=_trai
ningsearch&lang=en
More Information
Huawei learning APP
Page 2 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Objectives
Upon completion of this course, you will be able to:
Describe what cloud computing is.
Page 3 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Cloud Computing Is Around Us
Page 4 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
What Can Cloud Computing Do?
Page 5 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
You May Be Using the Cloud Already
Page 6 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Cloud Computing Is Already Here
Page 7 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Cloud Computing Advantages
Buy
Page 8 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Cloud Computing Advantages
3. Resource pooling
Page 9 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Cloud Computing Advantages
L: 1.3 m, Φ: 1 m
L: 1 m, Φ: 0.7 m
L: 0.71 m, Φ: 0.5 m
Page 10 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Cloud Computing Is Already Here
Page 11 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Cloud Computing Definition
The National Institute of Standards and Technology (NIST) defines cloud
computing as follows:
Page 12 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Why the Term “Cloud Computing”?
The cloud is a metaphor for the Internet. It is an abstraction of the Internet
and the infrastructure that underpins it. Computing refers to computing
services provided by a sufficiently powerful computer capable of providing
a range of functionalities, resources, and storage. Put together, cloud
computing can be understood as the delivery of on-demand, measurable
computing services over the Internet.
Page 13 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Cloud Computing Is Around Us
Page 14 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
A Brief History of the Internet
1989 2014
The first commercial The browser alliance led
by Google reinforced
1969 network operator 1990
support for HTTPS.
PSINet was founded.
ARPANET was born. The first network
1986 search engine Archie 2004
was launched. Facebook was
The modern email
founded. With it came
1981 routing system 1991
The complete TCP/I the phenomenon of
MERS was
WWW was officially
specifications of the P social networking.
developed.
TCP/IP protocol suite 1984 open to the public. 2000
were established. DNS technology was The dotcom bubble
1983 introduced. 1995 burst.
ARPANET, PRNET, and
E-commerce
SATNET communicated
platforms such as
through TCP/IP.
Amazon and eBay
were created.
Page 15 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
A Brief History of Computing
Problem Instructions
SubJob
1
Part 1 Instructions
Job SubJob
Part 2 Instructions 2
Problem
Part 3 Instructions
SubJob
Parallel Distributed
Part 4 3
Instructions Computing Computing
Grid Cloud
Computing computing
Page 16 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Cloud Computing Evolution
Cloud computing 2.0
Software-defined, integration
Page 17 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Cloud Computing Is Around Us
Page 18 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Cloud Deployment Models
Hybrid cloud
Page 19 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Cloud Deployment Models
Page 20 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Cloud Service Models
Traditional IaaS PaaS SaaS
In-house
Data Data Data Data Data
In-house
Runtime Runtime Runtime Runtime Runtime
environment environment environment environment environment
Page 21 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Quiz
1. Which of the following services offered by HUAWEI CLOUD (public cloud) falls
into the category of SaaS services?
A. Elastic Cloud Server (ECS)
B. Facial recognition
2. The measurable service characteristic of cloud computing means that users pay
for how long and how much they use the cloud service.
A. TRUE
B. FALSE
Page 22 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Summary
Describe what cloud computing is.
Page 23 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Recommendations
Huawei e-Learning website:
http://support.huawei.com/learning/Index!toTrainIndex
Page 24 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Thank You
www.huawei.com
Introduction to Compute
Virtualization
Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Foreword
Cloud computing 1.0 focused on virtualization which today has become
the foundation of cloud computing. This chapter focuses on the
architecture and technologies involved in compute virtualization.
Page 2 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Objectives
Upon completion of this course, you will:
Be able to describe what virtualization is.
Page 3 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Introduction to Virtualization
2. Introduction to KVM
3. Introduction to FusionCompute
Page 4 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
What’s a Virtual Machine (VM)?
How is a virtual
machine
created?
Page 5 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
What’s Virtualization?
Page 6 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
A Brief History of Compute Virtualization
2007 2014
HP launched HP-UX Rocket was launched.
1964 Integrity VMs. 2008
IBM began to Microsoft added
Page 8 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Important Concepts in Compute
Virtualization
Guest OS:
Physical Server Virtual Machine
Operating system running in a virtual machine
Application Application (VM)
Guest Machine:
Host OS Guest OS
Virtual machine created through virtualization
Hypervisor:
Guest Machine
Virtualization software layer, or
Virtual Machine Virtual Machine Monitor (VMM)
Monitor
(Hypervisor)
Host OS:
Host Machine:
Physical machine
Page 9 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Types of Compute Virtualization
App App
VM VM VM App VMM
VMM Host OS
Hardware Hardware
Page 10 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Characteristics of Virtualization
Host OS
Partitioned Isolated
Encapsulated Independen
t VM VM
Page 11 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
CPU Virtualization
Full virtualization Paravirtualization
Application Application
Ring 3 Ring 3
Ring 2 Ring 2
Paravirtualized
Guest OS
Ring 1 Ring 1 Guest OS
Hypervisor Hypervisor
Ring 0 Ring 0
Hardware Hardware
Page 12 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Memory Virtualization
VM memory
Host
memory
Page 14 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
I/O Virtualization
Emulation [Full Virtualization]: Complete simulation of the hardware, for example,
keyboard and mouse. Access to such hardware depends on the capture of focus
by the host, and leads to poor performance in some cases.
IO-through: Hardware devices capable of I/O passthrough, such as hard disks and
NICs, are directly allocated to VMs. In Xen, Dom0 allocates hardware devices but
does not take part in the access of the hardware. Hardware support is required.
Page 15 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Cloud Computing and Virtualization
Cloud
Computing
Page 16 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Mainstream Compute Virtualization
Technologies
Compute Virtualization
CPU virtualization, memory virtualization,
I/O virtualization
KVM Hyper-V
Huawei
FusionSphere
Page 17 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Xen vs. KVM
PV
Backends
HW PV PV PV QEMU QEMU
Drivers Frontends Frontends Frontends
KVM
Xen Lunix
HW Drivers
Hardware Hardware
Page 18 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Introduction to Virtualization
2. Introduction to KVM
3. Introduction to FusionCompute
Page 19 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
What’s KVM?
VM VM
Application program A Application program B
Binaries/Libraries Binaries/Libraries
User
Guest OS Guest OS
Space User
ProcessesSpace QEMU QEMU
Processes
User space
Kernel space
KVM
Linux kernel
module
Physical
hardware
Page 20 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
KVM Architecture
Management Tools
Virt-
Virsh Virt-viewer Virt-install Others
manager
Libvirt
Linux Kernel
(KVM module)
QEMU QEMU
Guest Guest
OS OS
Page 21 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Libvirt
VM VM VM VM
(Guest OS) (Guest OS) (Guest OS) (Guest OS)
Manage
-ment
Hypervisor Hypervisor Tools Hypervisor
Libvirt
Linux host Linux host
Node Node
Page 22 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
KVM I/O Process - Default
Guest OS
4
I/O Shared Page 1 10
QEMU I/O 7 Device
Emulation Code
Driver
3 8
Notification 2 9
I/O Trap
5 Code
KVM Module
Linux Kernel
Device
Driver
Physical Hardware
Page 23 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
KVM I/O Process - Virtio
Guest OS
QEMU
1 8
3 2
Virtio Backend Virtio Frontend
Driver vring Driver
6 7
Notification
I/O Trap
4 Code
KVM Module
Linux Kernel
Device Driver
Physical Hardware
Page 24 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Introduction to Virtualization
2. Introduction to KVM
3. Introduction to FusionCompute
Page 25 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
FusionCompute Architecture
VRM
Virtual Resource Pools
Cluster
Page 26 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
FusionCompute Advantages
Unified management Quick VM
of virtual and provisioning
physical resources
Physical
resourc Physical
e resource
Physical
resourc
e
Virtual
resourc
e
VRM VRM
Page 27 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Functions of FusionCompute Components
Component Function
CNA provides the following functions:
• Provides virtual computing functions.
CNA
• Manages VMs on compute nodes.
• Manages compute, storage, and network resources on compute nodes.
VRM provides the following functions:
• Manages block storage resources in clusters.
• Manages network resources, such as IP addresses and VLANs in clusters, and assigns IP
addresses to VMs.
• Manages the lifecycle of VMs in clusters, and allocates and migrates VMs across compute
nodes.
VRM
• Dynamically schedules resources in clusters.
• Manages virtual resources and user data in a unified manner and provides elastic
computing, storage, and IP address services.
• Provides a unified Web UI portal, allowing O&M engineers to remotely access the
FusionCompute system to monitor and manage resources, and create and view resource
reports.
Page 28 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Quiz
1. In compute virtualization, which of the following allocates CPU and memory
resources to VMs? ( )
A. Guest OS
B. VMM
C. Hypervisor
D. Host OS
B. FALSE
Page 29 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Summary
This chapter provides basic knowledge about compute virtualization, including
CPU, memory, and I/O virtualization. It introduces you to open-source
virtualization technology by using KVM as an example, and also to commercial
virtualization products by using FusionCompute as an example.
Page 30 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Recommendations
Huawei e-Learning website
http://support.huawei.com/learning/Index!toTrainIndex
Page 31 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Thank You
www.huawei.com
Network Basics for Cloud Computing
Page 2 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Objectives
Upon completion of this course, you will:
Understand how physical and virtual switches work.
Page 3 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Network Architecture for Virtualization
Page 4 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
How Do VMs Communicate?
How do VMs
communicate
with each
other?
Page 5 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Network Architecture for Virtualization
Physical server
Physical server
Physical server
Physical server
VM VM VM VM VM VM VM VM
Page 7 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Basic Network Concepts
VM
VM on network
segment A
Communication
source
1
0 VM VM
VM VM VM VM on network
segment B
VM
VM on network
Broadcast & Unicast Routing segment C
Default
VLAN
gateway
VM VM on
network Trunk
segment A
VM VM on
network VLAN 1 VLAN 2 VLAN 3 VLAN 1 VLAN 2 VLAN 3
segment C
Page 8 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Network Architecture for Virtualization
Page 9 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Physical Network Devices
Page 10 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Router in a Virtualized Environment
Internet
VM VM VM VM VM VM
Page 11 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Layer 3 Switch in a Virtualized
Environment
VM VM VM
Page 12 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Layer 2 Switches in a Virtualized
Environment
VM VM VM
Page 13 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Physical NICs in a Virtualized Environment
Physical Logical
form form
Management traffic
Not
bundled
Service traffic
Bundled
Storage traffic
Page 14 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Network Architecture for Virtualization
Page 15 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Mainstream Virtual Network Architecture
Bridged NAT
Virtual
Switch
Host Machine
Page 16 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Bridged vs. NAT
Bridge
NAT
d
VM VM VM VM
Page 17 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Virtual Switch - Open vSwitch
Page 18 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Distributed Virtual Switch
Page 19 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Network Architecture for Virtualization
Page 20 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
FusionCompute Network Architecture
Port group Port group Port group Port group Port group Port group
VLAN 100 VLAN 200 VLAN 300 VLAN 300 VLAN 200 VLAN 100
Virtual Virtual
Switch Uplink
Switch
Uplink
Host Machine 1 Host Machine 2
Page 21 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Traffic Flow
Port group Port group Port group Port group Port group Port group
VLAN 100 VLAN 200 VLAN 300 VLAN 300 VLAN 200 VLAN 100
Virtual Virtual
Switch Uplink
Switch
Uplink
Host Machine 1 Host Machine 2
Page 22 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Security Group
Security Group
Page 23 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Quiz
1. Which of the following falls into the category of “north-south traffic”? ()
A. Traffic between VMs in a data center
B. Traffic generated when users access the data center through the Internet
2. One VM can have multiple virtual NICs connecting it to different virtual switches.
A. TRUE
B. FALSE
Page 24 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Summary
This chapter covers basic knowledge about the physical and virtual
networks used in virtualized environments.
Page 25 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Recommendations
Huawei e-Learning website:
http://support.huawei.com/learning/Index!toTrainIndex
Page 26 Copyright © 2019 Huawei Technologies Co., Ltd. All rights reserved.
Thank You
www.huawei.com
Storage Virtualization Basics
Copyright © Huawei Technologies Co., Ltd. 2019
Foreword
Data has become an enterprise’s most important asset. How is data stored on
the cloud? How is this different from the way it is stored with traditional IT? This
chapter will answer these questions.
5. Introduction to VM Disks
Shared Catalog
File System
Logical
Volumes
Distributed
Storage
Virtual file
system
Logical
Attach to compute cluster
volume
and format
Physical
NFS file
volume Logical division
Format system
RAID or Replication
Logical
volume Attach to compute cluster
Physical
volume Logical division
RAID or Replication
5. Introduction to VM Disks
Price
5. Introduction to VM Disks
Storage
Pool
RAID
RAID
Efficient Safe
Parallel read and write on Parity check and hot backup
1
multiple disks
Windows Unix-like
client client
IP/FC network
CIFS NFS
Distributed
Storage
Pool
Replication
Distributed
Storage Pool
Distributed Distributed
Storage Pool Storage Pool
5. Introduction to VM Disks
Virtual file
system
Logical
Attach to compute cluster
volume
and format
Physical
NFS file
volume Format
Logical division system
RAID or Replication
Logical
volume Attach to compute cluster
Physical
volume Logical division
RAID or Replication
On top of a physical volume, you can create one or more logical units of specified
capacities. These logical units are called Logical Unit Numbers (LUNs) and can be mapped
to hosts as basic block devices.
Segmentation
Physical volume
RAID
Hard disk
5. Introduction to VM Disks
User view
Administrator view
RAW All
VMDK VMware
VHD Microsoft Hyper-V, Huawei FusionCompute
QCOW
QEMU or KVM virtualization platforms only
QED
VDI Oracle
5. Introduction to VM Disks
Data store
Shared catalog
LUN
Storage device
FusionStorage
Block
SAN/NAS
Storage resource
Type
• Common
Multi-tenant • Shared
sharing
Space-saving
Temporary
Configuration Mode
data storage Customer needs • Common
Fast read/write • Thin-provision
Disk Mode
• Dependent
• Independent & persistent
• Independent & nonpersistent
B. SAS disk
C. SATA disk
D. NL-SAS disk
2. SATA disks use a parallel interface while SAS disks use a serial interface.
A. TRUE
B. FALSE
What do I get
by using
virtualization?
VM VM VM VM VM VM VM VM
Cluster
VM
VM VM VM VM VM VM VM
Cluster
VM
VM
VM
VM
Cluster
70%
VM 3 VM 3 VM 3
2 GB 2 GB 2 GB
70%
VM 2 VM 2 VM 3
2 GB 2 GB 2 GB
20%
VM 1 VM 1 VM 3
2 GB 2 GB 2 GB
Hypervisor
4 GB
VM 75% VM
VM 25%
Write Write
Read Read
Create Delete
Write
Read
Write
Read
Restore
VM
Interconnect
Remote Access
Local Access
VM
VM
NUMA-Node1
VM Features
HA Load Balancing
• CNA host failure • Cluster resource scheduling
• Data store failure • Power management
• Blue screen of death • DRS rules
(BSOD) on a Windows VM
Cluster
VM HA
Do nothing
Do nothing
Restart VM
VM HA
VM HA
VM VM VM VM VM VM VM VM
Cluster
Host Group
Currently, IMC mode only allows VM live migration between hosts using Intel CPUs.
IMC mode allows the hosts in a cluster to present the same CPU function set to VMs running on
them, despite the fact that these hosts may be using CPUs with different performance baselines.
For the IMC mode to work for a cluster that already contains hosts and VMs, ensure that the
following conditions are met:
The CPU generations of the hosts in the cluster are the same as or later than the target IMC mode.
The CPU generations of the running or hibernating VMs in the cluster are the same as or earlier than the
target IMC mode. If any VM in the cluster does not meet this requirement, stop this VM or migrate it to
another cluster.
VM Features
Virtual
Machines
Quota Quota
Limit Limit
B. Modify a snapshot
D. Replicate a snapshot
2. Templates can be used to quickly deploy VMs. At present, templates can be created
only by converting or cloning VMs.
A. TRUE
B. FALSE
BILL
RFID
Sensors
Embedded Systems
$ $
Such data sets are generated by the IoT. Due to a radical increase in total IoT
connections, ever more massive data sets will be generated.
Data
Collect Cleanse
Intelligence Information
Use Associate
Knowledge
Algorithms Scenario
Algorithms are the fundamental Big data, computing power, and
way by which AI is realized, and algorithms are input that will create
an effective method to extract meaningful output only if applied to
data intelligence. practical business scenarios.
IoT
system
collector
Virtual visual
Traditional Internet
system
Video
collector
Big data
Virtual sensing
Air, water, system
and soil
sensors
Virtual motion
system
Office
equipment
computing
Mobile Internet
Cloud
Virtual motion
Household system
appliances
Virtual motion
Production system
equipment
The 5G Era
5G refers to the 5th generation of mobile communications technologies and
standards.
Massive
Enhanced mobile Reliable,
number of
broadband low-latency
connections
4G
5G
Difference VM Docker
Size
Boot speed
Integration
Container
Docker uses containers to run applications. A container is a runtime instance of a docker image.
A container can be started, started, stopped, and deleted. Each container is an isolated and
secure platform.
Repository
A repository is a set of Docker images. A Registry is a hosted service containing repositories of
images. Each image has a unique tag.
Host Registry
repository 1
Docker daemon
Image 1
Docker Client
container 1 Image 1 Image 3
container 2a Image 2
repository 2
container 2b Image 2
Image 4
Network
Congestion Edge
Computing
Latency
Fog
Computing
Security
Cloud DC
Core
Network
Fog Fog
Cloud DC
Low latency
Edge
Computing
ITS
IoT/M2M
HD video, bandwidth-intensive
Smart
Gaming Transportation
Cloud
Computing Smart
HD Images
Video
Transmission network efficiency
Home Surveillance
Web
Services Web
Storage High-quality user experience
Search
SNS
Timeliness
Pros Cons
Independent deployment, flexible scalability
Complex development and testing
process due to project splitting
Now
on a server to respond to microservice or function to
multiple events. respond to each event.
Users don’t have to worry Users don’t have to worry Users don’t have to worry
about physical resources. about middleware. about the backend.
Able to Quick
No need focus on boot, Infinite
short life Automated
for O&M the code elasticity
cycle
A. Big data
B. Cognitive analysis capability
C. Computing power
D. Scenario
2. The only function of the Internet of Things is to collect the data generated by connected
objects.
A. True
B. False
Huawei e-Learning
https://ilearningx.huawei.com/portal/#/portal/ebg/51
Huawei Certification
http://support.huawei.com/learning/NavigationAction!createNavi?navId=_31
&lang=en
Find Training
http://support.huawei.com/learning/NavigationAction!createNavi?navId=_trai
ningsearch&lang=en
More Information
Huawei learning APP