You are on page 1of 31

IP Network Fundamental P-1

Confidential Information of Huawei. No Spreading Without Permission


IP Network Fundamental P-2

Confidential Information of Huawei. No Spreading Without Permission


IP Network Fundamental P-3

Confidential Information of Huawei. No Spreading Without Permission


IP Network Fundamental P-4

Confidential Information of Huawei. No Spreading Without Permission


IP Network Fundamental P-5

 Data refers to information in any format. The format used to encode any information
must follow agreed or standard rules before successful communication between a
sender and receiver is possible.
 For example, a picture can be broken down into a number of dots referred to as
pixels, each pixel can then be represented by a number which can then be encoded
ready for transmission. The format used to encode the image data by the sender must
be understood by the receiver to enable them to decode and rebuild the picture.
 Common types of data that can be encoded for transmission include text, numbers,
pictures, audio, and video. many standard ways of encoding the different types of
data exist.
 Data communication is the process of exchanging data between two devices through
a transmission medium, such as a wired or wireless network.

Confidential Information of Huawei. No Spreading Without Permission


IP Network Fundamental P-6

 A simple data communication system consists of a message, a sender, a receiver, a


(transfer) medium, and a protocol.
 Message:
 A message contains information that needs to be communicated. This could be text,
numbers, a picture, sound, or video which will be encoded and transmitted as one or
more messages.
 Sender:
 The sender is a device or system that transmits the message, this could be a PC, a
workstation, a server, or a mobile phone.
 Receiver:
 The receiver is a device or system that receives the message, this could be a PC, a
workstation, a server, a mobile phone, or a television.
 Medium:
 The medium is a physical or logical connection between the sender and the receiver
which is capable of carrying the message. Typical types of medium are twisted pair
cable, coaxial cable, optical fiber and radio wave.

Confidential Information of Huawei. No Spreading Without Permission


IP Network Fundamental P-8

 There are three different ways in which two devices can communicate in data
networking:
 Simplex communication:
 Simplex communication is in one direction. One device can only send messages, the
other one can only receive messages.
 For example a keyboard is a device which only sends data and a monitor a device
that can only receive data both use simplex communication.
 Half-duplex communication:
 Half-duplex communication is two way but only one device can be sending at any
time, the other must be receiving. Both devices are capable of sending and receiving
but communication can only be in one direction at a time.Two-way radios, such as
those used by police and taxis work in half-duplex mode.
 Full-duplex communication:
 Full-duplex communication is two way concurrently, both devices can send and
receive messages at the same time.A motorway is full duplex as traffic is able to
travel in both directions at the same time .Telephony networks are also full duplex,
however most humans can only either talk orlisten - not do both at the same time.

Confidential Information of Huawei. No Spreading Without Permission


IP Network Fundamental P-9

Confidential Information of Huawei. No Spreading Without Permission


IP Network Fundamental P-10

 A network is any group of people, things or places that are interconnected in some
way. Networks exist everywhere in our life, we have road, rail, telephone and postal
networks which we use on a daily basis.
 A computer network consists of two or more computers and peripheral which are
interconnected by communication lines.The computers in a network can easily
exchange and share information and resources .
 Computer networks were developed to meet increasing requirements for exchanging
information and sharing resources.
 In early computer networks , each computer was an independent device, there was
little or no communication between systems.
 As computer and communication technologies evolved, communication between
different systems was made possible.
 Standard protocols understood by different systems made sharing resources and data
possible and improved resource utilisation.

Confidential Information of Huawei. No Spreading Without Permission


IP Network Fundamental P-11

 In recent years, the computer network is developing rapidly. The computer


communications network and the Internet have become the basic part of the society.
The computer network is applied to many fields of industry and commerce, including
e-bank, e-commerce, modernized enterprise management,and information service.
From remote education to government routines, and to today’s e-community without
the network technology they can not work.
 The saying "network exists everywhere in the world" is not an exaggerated statement.
 The computer network came into being in 1960s. At that time, the network was a
host-based low-speed serial connection providing program running, remote printing,
and data service. The System Network Architecture (SNA) of IBM and X.25 public
data network are such kind of network. In 1960s, the defense department of US
funded a packet switching network called ARPANET, which was the earliest rudiment
of the Internet.
 In 1970s, the commercial computing mode, which featured personal computers,came
forth. Initially, personal computers were used as independent devices.

Confidential Information of Huawei. No Spreading Without Permission


IP Network Fundamental P-13

 The topology defines the organization of devices in a network. A LAN can adopt
various topologies, such as the bus topology and star topology.
 In the bus topology, all devices are connected to a linear network media, which is
called the bus. When a node transmits data in a network adopting the bus topology,
the data reaches all nodes. Each node checks the data. If the data is not sent to this
node, the node discards the data. If the data is sent to this node,the node accepts the
data and transfers the data to the upper layer protocol. A typical bus topology has
simple layout of lines. Such layout uses short network media, and thus, the expense
on cables is low. However, this topology makes it difficult to diagnose and isolate
faults. Once a fault occurs, the entire network will be affected. In addition, each device
in the LAN sends data to all the other devices, which consumes large amount of
bandwidth. It will lower network performance.
 In the star topology, devices are connected to a central control point. A device
communicates with another device through the point-to-point connection between it
and the hub or switch. The start topology is easy to design and install, because
network media connect the hub or switch and workstations. The star topology is easy
to maintain, because the network can be easily modified and network faults can be
easily be located.

Confidential Information of Huawei. No Spreading Without Permission


IP Network Fundamental P-15

 The Internet is a large network formed by networks and devices. Based on the
covered geographic scope, networks are classified into LAN, WAN, and Metropolitan
Area Network (MAN) whose size is between the LAN and WAN.
 Local Area Network (LAN)
 A LAN is formed by connected communication devices in a small area. A LAN covers
a room, a building, or an industry garden. A LAN covers several kilometers. It is a
combination of computers, printers, modems, and other devices interconnected
through various media within several kilometers.
 Wide Area Network (WAN)
 A WAN covers a larger geographic scope, such as a state or a continent. It provides
the data communication service in a large area and is used to connect LANs. The
China Packet Network (CHINAPAC), China Data Digital Network (CHINADDN),
China Education and Research network (CERnet), CHINANET, and China Next
Generation Internet (CNGI) are all WANs. A WAN connects LANs that are far from
each other.

Confidential Information of Huawei. No Spreading Without Permission


IP Network Fundamental P-16

 A LAN is formed by interconnected communication devices in a small area, such as a


room, a building, and a campus. In general, a LAN covers several kilometers. The
LAN is featured by short distance, low delay, high data transmission speed, and high
reliability.
 Common LANs are Ethernet and Asynchronous Transfer Mode (ATM). They are
different in topology, transmission speed, and data format.Ethernet is the most widely
used LAN.
 The following network devices are used in LAN construction:
 Cables: A LAN is extended by cables. Various cables are used in LANs, for example,
the fiber, twisted pair, and coaxial cable.
 Network Interface Card (NIC): An NIC is inserted in the main board slot of a
computer. It transforms the data to the format that other network devices can identify
and transmits the data through the network media.
 Hub: A hub is a shared device that provides many network interfaces to connect
computers in the network. The hub is called a shared device because all its interfaces
share a bus. At the same time, only one user can transmit data, and so the data
amount and speed of each user (interface) depends on the number of active users
(interfaces).

Confidential Information of Huawei. No Spreading Without Permission


IP Network Fundamental P-18

 A WAN covers a larger geographic scope, such as a state or a continent. The China
Packet Network (CHINAPAC), China Data Digital Network (CHINADDN),China
Education and Research network (CERnet), CHINANET, and abuilding China Next
Generation Internet (CNGI) are all WANs.
 A WAN connects LANs that are far from each other. It consists of the end
system(users on two ends) and the communication system (the link between two
ends).
 The communication system is the key of the WAN and it falls into the following types:
 Integrated Service Digital Network (ISDN): a dial-up connection mode. The ISDN BRI
provides 2B+D data channels. Each B channel provides the speed of 64 kbit/s and
the highest speed can be 128 kbit/s. The ISDN PRI has two standards:
 the European standard (30B+D) and the North America standard (23B+D). The ISDN
uses the data transmission mode, which features fast connection and high reliability.
Two devices in the ISDN can identify the number of each other. The call cost of the
ISND is higher than that of the ordinary telephony network, but the double-channel
structure supports two independent lines.

Confidential Information of Huawei. No Spreading Without Permission


IP Network Fundamental P-20

 The WAN operates in a scope larger than that of the LAN. In the WAN, the network
access is implemented through various serial connections. Generally, enterprise
networks are connected to the local ISP through the WAN lines. The WAN provides
fulltime and part-time connections. In the WAN, serial interfaces can work at different
speeds.
 The following devices are used in the WAN:
 Router: In the WAN, messages are sent to the destination according to the address.
The process of looking for the transmission path is called routing. A router will send
data to the destination by establishing routes between WANs and LANS according to
their address information.
 Modem: As the device used to transform signals between the end system and
communication system, a modem is the indispensable device in a WAN. Modems are
classified into synchronous modem and asynchronous modem. The synchronous
modem is connected to the synchronous serial interface and is applied to the leased
line, Frame Relay, and X.25. The asynchronous modem is connected to the
asynchronous serial interface and is applied to the PSTN.

Confidential Information of Huawei. No Spreading Without Permission


IP Network Fundamental P-21

 ARPAnet solves the problem of network robustness. That is, once a device fault or
link fault occurs, data transmission must be ensured between any two nodes if the
two nodes are physically connected. For the high ability of self-healing,ARPAnet
meets the requirement in wars. It comes of the Defence Advanced Research Projects
Agency (DARPA).
 In 1985, the National Science Foundation (NSF) established the NSFnet. NSF
established a WAN consisting of regional networks and connected these regional
networks to the super computer center. In June 1990, the NFSnet took the place of
the ARPAnet and became the backbone network of the Internet. Owing to the
NSFnet, the Internet is open to the public, while it was only used by computer science
researchers and governments before.
 The second leap of the Internet was attributed to the commercialization in early of the
1990s. As soon as commercial organizations entered the world of Internet, they found
the great potential of Internet in communications, information searching, and
customer service. Then numerous enterprises in the world swarmed into the Internet,
which resulted in a new leap of the Internet.
 In 1995, NSFnet came to an end and it was replaced by a new Internet backbone
network operated by multiple private companies.

Confidential Information of Huawei. No Spreading Without Permission


IP Network Fundamental P-22

 Currently, the Internet is not a simple hierarchy, instead, it is formed by many WANs
and LANs connected by connecting devices and exchange devices. End users are
connected to the Internet through the service provided by Internet service providers
(ISPs). ISPs are classified into international service providers, national service
providers, regional ISPs, and local ISPs.
 International service provider
 An international service provider connects networks of different countries.
 National service provider (NSP)
 A national service provider operates on backbone networks that are built and
maintained by professional companies. These backbone networks are connected by
complicated switching devices (usually operated by the third party) so that end users
can be connected to the backbone network. The switching devices are called network
access points (NAPs). NAPs transmit data at a high speed.

Confidential Information of Huawei. No Spreading Without Permission


IP Network Fundamental P-24

Confidential Information of Huawei. No Spreading Without Permission


IP Network Fundamental P-25

 A network protocol is a set of formats and conventions stipulated and observed by


communication parties so that devices in different computer networks can
communicate. A network protocol is the standardized description of a series of rules
and conventions. It defines how network devices exchange information.Network
protocols are basis of the computer network. Only the devices that comply with
related network protocols (laws for interconnected devices in the network) can
communicate with each other. Any device that does not comply with the network
protocol cannot communicate with other devices.
 What is a protocol? Take the telegraph for example. Before sending a telegraph,the
two parties must define the transmission format of the telegraph, for example,what
signal indicates the start, what signal indicates the end, how to handle errors,and how
to express the name and address of the sender. The predefined format and
convention is a protocol.

 Network protocols include the Transfer Control Protocol/Internet Protocol(TCP/IP),


Internetwork Packet eXchange/Sequenced Packet eXchange (NovellIPX/SPX), and
IBM System Network Architecture (SNA). The most widely used protocol is the
TCP/IP stack, which has become the standard protocol of the Internet.

Confidential Information of Huawei. No Spreading Without Permission


IP Network Fundamental P-26

 A standard is a set of rules and processes that are widely used or defined by the
government. A standard describes stipulations in a protocol and sets the simplest
performance set for guaranteeing network communications. IEEE 802.X is the
dominant LAN standard.

Confidential Information of Huawei. No Spreading Without Permission


IP Network Fundamental P-27

 Many international standardization organizations made great contributions to


development of the computer network. They unify network standards so that devices
of different vendors can communicate with each other. Till now, the following
standardization organizations have made contributions to development of the
computer network.
 International Organization for Standardization (ISO)
 ISO stipulates standards for large-scale networks, including the Internet. The ISP
brings forward the OSI model that describes the working mechanism of network.
 The OSI model is a comprehensible and clear hierarchical model of the computer
network.
 Institute of Electrical and Electronics (IEEE)
 IEEE defines standards for network hardware so that hardware devices of different
vendors can communicate with each other. The IEEE LAN standard is the dominant
standard for LANs. IEEE defines the 802.X protocol suite. 802.3 is the standard for
the Ethernet; 802.4 is the standard for the token bus network;802.5 is the standard for
token ring; 802.11 the standard fro the wireless local area network (WLAN).

Confidential Information of Huawei. No Spreading Without Permission


IP Network Fundamental P-29

 IETF produces two types of files: Internet drafts and RFCs.RFCs, which are used as
standards, fall into the following types:
 Proposals, namely, the recommended solutions
 Accepted standards that are used by all users and cannot be changed
 Optimal practices, a kind of introduction IETF standards are called RFCs, which are a
series of files published by IETF.
 In the past, RFC stood for Request for Comments. Now RFC is only a name without
any special meaning. Currently, RFCs are formal files. There are about 5000 RFC
files. The first one is RFC 1 Host Software, which was published on
 April 7th, 1969. Many Internet-related protocols, such as IP, OSPF, BGP, and MPLS,
are defined by RFCs.

Confidential Information of Huawei. No Spreading Without Permission


IP Network Fundamental P-30

Confidential Information of Huawei. No Spreading Without Permission


IP Network Fundamental P-31

 A typical IP network is comprised of a backbone network, Metropolitan Area Network


(MAN) and Access Network. The backbone network commonly interconnects
networks from different countries and cities. Metropolitan Area Networks are located
between the backbone network and the access network, and it is commonly
comprised of a backbone layer, convergence layer and access layer. Access
networks are used for terminal user access, it is usually in the layer2 access network,
which is under the service access point. Users can access the internet via xDSL,
Ethernet and so on.
 The target network structure of IP MAN is divided into:
 IP MAN Service access point (BRAS and service router) and the upper layer routers
that compose the layer3 network.
 IP MAN is comprised of a backbone layer, convergence layer and access layer.
 Broadband access network
 The layer2 access network, which is under the service access point.

Confidential Information of Huawei. No Spreading Without Permission


IP Network Fundamental P-33

 The Metropolitan Area Network (MAN) is located between the backbone network and
the access network, and interlinks different areas of a city.
 The MAN provides the following services:
 Internet access
 There are two access modes: dialup access mode and private line access mode.
 In the dialup access mode, subscribers have different service attributes. In the private
line access mode, subscribers in the same group have the same service attributes.
The Asymmetric Digital Subscriber Line (ADSL) and Local Area Network (LAN)
technologies are widely used as Internet access services. Both technologies support
dialup access and private line access modes.
 Virtual private network (VPN)
 In recent years, enterprises have increasing requirements for diversified services. As
such, VPN technology has become more and more popular. VPN is a private network
constructed within a public network infrastructure with the help of Internet service
providers (ISPs) and network service providers (NSPs).

Confidential Information of Huawei. No Spreading Without Permission


IP Network Fundamental P-35

 The common Internet access modes are ADSL, Ethernet, and leased line. Household
users usually choose the ADSL access mode, residential users prefer the Ethernet
access mode, and enterprise users select the leased line access mode. Normally, the
access network uses Layer 2 devices, such as digital subscriber line access
multiplexers (DSLAM) and Ethernet switches, to provide the access service for users.
The access network does not perform any control on users and it simply sets up
Layer 2 connections to transparently transmit user information to upper-layer devices.
The access network refers to all devices at the access layer.
 The access layer uses the broadband remote access server (BRAS) to manage
users.
 The convergence layer generally uses aggregation routers or Layer 3 switches. The
convergence layer aggregates traffic from the BRAS into the MAN devices and
forwards this traffic through routing functions.
 The following shows the Internet access process:
 A user sends an Internet access request. Layer 2 devices in the access network
establish a Layer 2 connection and transparently transmit the request to the BRAS.

Confidential Information of Huawei. No Spreading Without Permission


IP Network Fundamental P-37

 VPN services are classified into L3VPN services, L2VPN services and VPDN
services. Here, we talk about the most common L3VPN services. L3VPN has multiple
types, such as Internet Protocol Security VPN (IPSec VPN), Ground Radar
Equipment VPN (GRE VPN) and Border Gateway Protocol/Multiple protocol Label
Switching VPN (BGP/MPLS VPN).
 The BGP/MPLS VPN model has three parts: customer edge (CE), provider edge (PE)
and provider (P).
 CE: It is an edge device on the user network. A CE provides interfaces that are
directly connected to the service provider (SP) network. It can be a router, switch or a
host.
 PE: It is an edge router provided by the SP. A PE device is directly connected to the
CE. On the MPLS network, all VPN operations are performed in the PEs.
 P: It is a backbone router on the SP network. A P device is not directly connected to
the CE. The P device forwards MPLS data, and does not maintain VPN information.
 As shown in the figure on this slide, enterprise private line users A, B and C can
communicate with each other on the LAN by means of the BGP/MPLS VPN network.

Confidential Information of Huawei. No Spreading Without Permission


IP Network Fundamental P-38

 Generally, the performance of the backbone network can be evaluated using the
following indicators:
 High reliability
 Devices on the backbone network must be stable, which is critical to the stable
operation of the entire network. Therefore, network architects should properly design
the network architecture and develop reliable network backup policies to ensure
strong network self-healing capabilities.
 Flexibility and scalability
 To meet future network services, the network must be seamlessly expanded and
upgraded while minimally affecting the network architecture and devices.
 Flat networking
 The number of network layers and hops should be minimized to facilitate network
management.
 Proper planning of quality of service (QoS) In, the IP network also supports voice over
IP (VoIP), video and key customer services. These services have high requirements
on service in addition to carrying Internet access service quality. Therefore, support
for QoS is one of the necessary conditions for the

Confidential Information of Huawei. No Spreading Without Permission


IP Network Fundamental P-40

 Hierarchical plane structure


 The hierarchical plane structure is commonly applied in the early-stage backbone
network. Currently, most carriers in China use this structure, which is divided into
three layers, core backbone layer, core convergence layer and core access layer. The
core backbone layer is divided by area. Areas are connected in full-mesh or partial-
mesh mode to improve network robustness. The core convergence layer adopts dual
homing networking. Devices at this layer are dual-uplinked to an area or two areas at
the core backbone.
 Hierarchical spatial plane structure
 In the hierarchical spatial plane structure, the network is divided in layers and planes.
Different planes carry different services. Normally, services on two different planes
are independent from each other. When one plane fails, the other plane acts as a
backup plane. When designing the network, architects usually design the plane as
one that can carry all services. As a network requires carrying multiple services, the
hierarchical plane network model stands out with its features of a clear structure,
large backup capacity and high security.

Confidential Information of Huawei. No Spreading Without Permission


IP Network Fundamental P-41

1. How many types do data communicate include?


Simplex, Half-duplex, Full-duplex

Confidential Information of Huawei. No Spreading Without Permission


IP Network Fundamental P-42

Confidential Information of Huawei. No Spreading Without Permission

You might also like