Ludhiana College of Engineering and Technology Katani Kalan, Ludhiana 141113

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 19

LUDHIANA COLLEGE OF ENGINEERING AND

TECHNOLOGY KATANI KALAN, LUDHIANA 141113

LECTURE NOTES

SUBJECT - ROUTING AND SWITCHING

SUBJECT CODE - BTEC-905A-18

Contact :

Mail: info@lcetldh.com , ludhianalcet@gmail.com

international@lcetldh.com

Phone: 0161-2834307 Mobile: 94785-03999,94785-03666

Website: www.lcetldh.com
MODULE 1

TOPIC 1A Network Architecture Basics

Before you can truly understand network security, you have to first understand network
architecture .In this section is a quick review of network concepts and terms and it will help you
to have a basic understanding of the TCP/IP protocol.

As you may know, every network design can be divided into seven logical parts, each of which
handles a different part of the communication task. This seven-layered design is called the OSI
Reference Model. It was created by the International Standards Organizations (ISO) to provide a
logical model for describing network communications, and it helps vendors standardize
equipment and software. Below figure shows the OSI Reference Model and gives examples of
each layer.

Physical

This layer is the actual physical media that carries the data. Different types of media use different
standards. For example, coaxial cable, unshielded twisted pair (UTP), and fiber optic cable each
serve a different purpose: coaxial cable is used in older LAN installations as well as Internet
service through cable TV networks, UTP is generally used for in-house cable runs, while fiber
optic is generally used for long-haul connections that require a high load capacity.

Data Link

This layer relates to different pieces of network interface hardware on the network. It helps
encode the data and put it on the physical media. It also allows devices to identify each other
when trying to communicate with another node. An example of a data link layer address is your
network card's MAC address. (No, the MAC address doesn't have anything to do with Apple
computers; it's the Medium Access Control number that uniquely identifies your computer's card
on the network.) On an Ethernet network, MAC addresses are the way your computer can be
found. Corporations used many different types of data link standards in the 1970s and 80s,
mostly determined by their hardware vendor. IBM used Token Ring for their PC networks and
SNA for most of their bigger hardware, DEC used a different standard, and Apple used yet
another. Most companies use Ethernet today because it is widespread and cheap.

Network

This layer is the first part that you really see when interacting with TCP/IP networks. The
network layer allows for communications across different physical networks by using a
secondary identification layer. On TCP/IP networks, this is an IP address. The IP address on your
computer helps get your data routed from place to place on the network and over the Internet.
This address is a unique number to identify your computer on an IP-based network. In some
cases, this number is unique to a computer; no other machine on the Internet can have that
address. This is the case with normal publicly routable IP addresses. On internal LANs,
machines often use private IP address blocks. These have been reserved for internal use only and
will not route across the Internet. These numbers may not be unique from network to network
but still must be unique within each LAN. While two computers may have the same private IP
address on different internal networks, they will never have the same MAC address, as it is a
serial number assigned by the NIC manufacturer. There are some exceptions to this (see the
sidebar Follow the MAC), but generally the MAC address will uniquely identify that computer
(or at least the network interface card inside that computer).

Transport

This level handles getting the data packet from point A to point B. This is the layer where the
TCP and UDP protocols reside. TCP (Transmission Control Protocol) basically ensures that
packets are consistently sent and received on the other end. It allows for bit-level error
correction, retransmission of lost segments, and fragmented traffic and packet reordering. UDP
(User Datagram Protocol) is a lighter weight scheme used for multimedia traffic and short, low-
overhead transmissions like DNS requests. It also does error detection and data multiplexing, but
does not provide any facility for data reordering or ensured data arrival. This layer and the
network layer are where most firewalls operate.
Session

The session layer is primarily involved with setting up a connection and then closing it down. It
also sometimes does authentication to determine which parties are allowed to participate in a
session. It is mostly used for specific applications higher up the model.

Presentation

This layer handles certain encoding or decoding required to present the data in a format readable
by the receiving party. Some forms of encryption could be considered presentation. The
distinction between application and session layers is fine and some people argue that the
presentation and application layers are basically the same thing.

Application

This final level is where an application program gets the data. This can be FTP, HTTP, SMTP, or
many others. At this level, some program handling the actual data inside the packet takes over.
This level gives security professionals fits, because most security exploits happen here.

TOPIC 1B Enterprise Network Constructs


Enterprise networking refers to the physical, virtual and logical design of a network, and how the various
software, hardware and protocols work together to transmit data. When it comes to enterprise networking,
every organization has different needs, and in the era of digital transformation, modern enterprises are
relying more on software-driven solutions to power intelligent network architecture, automation and
design.

What is an Enterprise Network Made Of?

Routers
Routers are devices on the network that connect multiple networks together. They forward data
from one device to another, which is sent in packets. They also connect devices on networks to
the internet. It is possible to add other features to routers to increase ease of use or security.
Switches
Switches can be thought of as network controllers. They connect devices such as computers,
printers, and servers on the network, and enable data to be transferred within it. Switches make it
possible for devices on the network to talk to each other and other networks, resulting in a single
network of shared resources.

Wireless Access Points


Wireless access points perform the precise function they’re named for: enabling wireless
connections. WAPs work like a router, sending data from one device to another.

TOPIC 1C Ethernet Framing

In an Ethernet Network , devices share data using packets. They contain, among other things, the
Ethernet frame, which is divided into several data sets. These records consist of binary code
that provides important information, such as addresses, control information, payload data, and
checksums.
Depending on the Ethernet standard, Ethernet frames are structured differently and may contain
more or fewer data fields, depending on the network protocols
Definition: Ethernet frame

When transmitting data over Ethernet, the Ethernet frame is primarily responsible for the correct
rulemaking and successful transmission of data packets. Essentially, data sent over Ethernet is
carried by the frame. An Ethernet frame is between 64 bytes and 1,518 bytes big, depending on
the size of the data to be transported.
Building block Size Function

PreambleStart frame 8 bytes Synchronization of the receiversBit sequence


delimiter (SFD) that initiates the frame

Destination address 6 bytes Hardware address of the destination network


(MAC) adapter

Source address 6 bytes Hardware address of the source network adapter


(MAC)

Tag 4 bytes Optional VLAN tag for integration in VLAN


networks (IEEE 802.1q)

Type 2 bytes Ethernet II: labeling of layer 3 protocols

Length 2 bytes Length information about the record

Destination service 1 byte Individual address of the addressed service


access point (DSAP) access point

Source service 1 byte Source address of the sending device


access point (SSAP)

Control 1 byte Defines the LLC frame (logical link)

SNAP 5 bytes Field for the definition of the organizationally


unique identifier (OUI) of the manufacturer and
the protocol number (like "Type")

Data 44-1,500 bytes (limit The data to be transmitted


depending on frame
structure)

Frame check 4 bytes Checksum that computes the entire frame


sequence (FCS)

Inter frame gap (IFS) - Transmission break of 9.6 μs


TOPIC 1D IP ADDRESSING

An IP address is a unique address that identifies a device on the internet or a local network. IP stands for
"Internet Protocol," which is the set of rules governing the format of data sent via the internet or local
network.

In essence, IP addresses are the identifier that allows information to be sent between devices on a network:
they contain location information and make devices accessible for communication. The internet needs a
way to differentiate between different

computers, routers, and websites. IP addresses provide a way of doing so and form an essential part of how
the internet works.

What is an IP?

An IP address is a string of numbers separated by periods. IP addresses are expressed as a set of four
numbers — an example address might be 192.158.1.38. Each number in the set can range from 0 to 255.
So, the full IP addressing range goes from 0.0.0.0 to 255.255.255.255.

IP addresses are not random. They are mathematically produced and allocated by the Internet Assigned
Numbers Authority (IANA), a division of the Internet Corporation for Assigned Names and
Numbers (ICANN). ICANN is a non-profit organization that was established in the United States in 1998
to help maintain the security of the internet and allow it to be usable by all. Each time anyone registers a
domain on the internet, they go through a domain name registrar, who pays a small fee to ICANN to register
the domain.
How do IP addresses work

If you want to understand why a particular device is not connecting in the way you would expect or you
want to troubleshoot why your network may not be working, it helps understand how IP addresses work.

Internet Protocol works the same way as any other language, by communicating using set guidelines to pass
information. All devices find, send, and exchange information with other connected devices using this
protocol. By speaking the same language, any computer in any location can talk to one another.

The use of IP addresses typically happens behind the scenes. The process works like this:

1. Your device indirectly connects to the internet by connecting at first to a network connected to the internet,
which then grants your device access to the internet.
2. When you are at home, that network will probably be your Internet Service Provider (ISP). At work, it will
be your company network.
3. Your IP address is assigned to your device by your ISP.
4. Your internet activity goes through the ISP, and they route it back to you, using your IP address. Since they
are giving you access to the internet, it is their role to assign an IP address to your device.
5. However, your IP address can change. For example, turning your modem or router on or off can change it.
Or you can contact your ISP, and they can change it for you.
6. When you are out and about – for example, traveling – and you take your device with you, your home IP
address does not come with you. This is because you will be using another network (Wi-Fi at a hotel,
airport, or coffee shop, etc.) to access the internet and will be using a different (and temporary) IP address,
assigned to you by the ISP of the hotel, airport or coffee shop.
As the process implies, there are different types of IP addresses, which we explore below.

Types of IP addresses

There are different categories of IP addresses, and within each category, different types.

Consumer IP addresses

Every individual or business with an internet service plan will have two types of IP addresses: their private
IP addresses and their public IP address. The terms public and private relate to the network location — that
is, a private IP address is used inside a network, while a public one is used outside a network.

Private IP addresses

Every device that connects to your internet network has a private IP address. This includes computers,
smartphones, and tablets but also any Bluetooth-enabled devices like speakers, printers, or smart TVs. With
the growing internet of things, the number of private IP addresses you have at home is probably growing.
Your router needs a way to identify these items separately, and many items need a way to recognize each
other. Therefore, your router generates private IP addresses that are unique identifiers for each device that
differentiate them on the network.
Public IP addresses

A public IP address is the primary address associated with your whole network. While each connected
device has its own IP address, they are also included within the main IP address for your network. As
described above, your public IP address is provided to your router by your ISP. Typically, ISPs have a large
pool of IP addresses that they distribute to their customers. Your public IP address is the address that all the
devices outside your internet network will use to recognize your network.

Public IP addresses

Public IP addresses come in two forms – dynamic and static.

Dynamic IP addresses

Dynamic IP addresses change automatically and regularly. ISPs buy a large pool of IP addresses and assign
them automatically to their customers. Periodically, they re-assign them and put the older IP addresses back
into the pool to be used for other customers. The rationale for this approach is to generate cost savings for
the ISP. Automating the regular movement of IP addresses means they don’t have to carry out specific
actions to re-establish a customer's IP address if they move home, for example. There are security benefits,
too, because a changing IP address makes it harder for criminals to hack into your network interface.

Static IP addresses

In contrast to dynamic IP addresses, static addresses remain consistent. Once the network assigns an IP
address, it remains the same. Most individuals and businesses do not need a static IP address, but for
businesses that plan to host their own server, it is crucial to have one. This is because a static IP address
ensures that websites and email addresses tied to it will have a consistent IP address — vital if you want
other devices to be able to find them consistently on the web.
TOPIC 1E Internet control message protocols

The Internet Control Message Protocol (ICMP) is a network protocol used by network devices to
diagnose network communication issues. ICMP is mainly used to determine whether or not data is
reaching its intended destination in a timely manner. Commonly, the ICMP protocol is used on network
devices, such as routers. ICMP is crucial for error reporting and testing, but it can also be used
in distributed denial of service attack.

What is ICMP used for?

The primary purpose of ICMP is for error reporting. When two devices connect over the Internet, the
ICMP generates errors to share with the sending device in the event that any of the data did not get to its
intended destination. For example, if a packet of data is too large for a router, the router will drop the
packet and send an ICMP message back to the original source for the data.

A secondary use of ICMP protocol is to perform network diagnostics; the commonly used terminal
utilities traceroute and ping both operate using ICMP. The traceroute utility is used to display the routing
path between two Internet devices. The routing path is the actual physical path of connected routers that a
request must pass through before it reaches its destination. The journey between one router and another is
known as a ‘hop,’ and a traceroute also reports the time required for each hop along the way. This can be
useful for determining sources of network delay.

TOPIC 1F Address resolution protocols

Address Resolution Protocol (ARP) is a protocol or procedure that connects an ever-changing Internet
Protocol (IP) address to a fixed physical machine address, also known as a media access control (MAC)
address, in a local-area network (LAN).

This mapping procedure is important because the lengths of the IP and MAC addresses differ, and a
translation is needed so that the systems can recognize one another. The most used IP today is IP version
4 (IPv4). An IP address is 32 bits long. However, MAC addresses are 48 bits long. ARP translates the 32-
bit address to 48 and vice versa.

There is a networking model known as the Open system and interconnection model First developed in the
late 1970s, the OSI model uses layers to give IT teams a visualization of what is going on with a
particular networking system. This can be helpful in determining which layer affects which application,
device, or software installed on the network, and further, which IT or engineering professional is
responsible for managing that layer.
The MAC address is also known as the data link layer, which establishes and terminates a connection
between two physically connected devices so that data transfer can take place. The IP address is also
referred to as the network layer or the layer responsible for forwarding packets of data through different
routers. ARP works between these layers.

What Does ARP Do and How Does It Work?

When a new computer joins a local area network (LAN), it will receive a unique IP address to use for
identification and communication.

Packets of data arrive at a gateway, destined for a particular host machine. The gateway, or the piece of
hardware on a network that allows data to flow from one network to another, asks the ARP program to
find a MAC address that matches the IP address. The ARP cache keeps a list of each IP address and its
matching MAC address. The ARP cache is dynamic, but users on a network can also configure a
static ARP table containing IP addresses and MAC addresses.

ARP caches are kept on all operating systems in an IPv4 Ethernet network. Every time a device requests a
MAC address to send data to another device connected to the LAN, the device verifies its ARP cache to
see if the IP-to-MAC-address connection has already been completed. If it exists, then a new request is
unnecessary. However, if the translation has not yet been carried out, then the request for network
addresses is sent, and ARP is performed.

An ARP cache size is limited by design, and addresses tend to stay in the cache for only a few minutes. It
is purged regularly to free up space. This design is also intended for privacy and security to prevent IP
addresses from being stolen or spoofed by cyberattackers. While MAC addresses are fixed, IP addresses
are constantly updated.

In the purging process, unutilized addresses are deleted; so is any data related to unsuccessful attempts to
communicate with computers not connected to the network or that are not even powered on.

TOPIC 1G Transport layer protocols

o The transport layer is represented by two protocols: TCP and UDP.


o The IP protocol in the network layer delivers a datagram from a source host to the destination host.
o Nowadays, the operating system supports multiuser and multiprocessing environments, an
executing program is called a process. When a host sends a message to other host means that source
process is sending a process to a destination process. The transport layer protocols define some
connections to individual ports known as protocol ports.
o An IP protocol is a host-to-host protocol used to deliver a packet from source host to the destination
host while transport layer protocols are port-to-port protocols that work on the top of the IP
protocols to deliver the packet from the originating port to the IP services, and from IP services to
the destination port.
o Each port is defined by a positive integer address, and it is of 16 bits.

UDP
o UDP stands for User Datagram Protocol.
o UDP is a simple protocol and it provides nonsequenced transport functionality.
o UDP is a connectionless protocol.
o This type of protocol is used when reliability and security are less important than speed and size.
o UDP is an end-to-end transport level protocol that adds transport-level addresses, checksum error
control, and length information to the data from the upper layer.
o The packet produced by the UDP protocol is known as a user datagram.

User Datagram Format

The user datagram has a 16-byte header which is shown below:

Where,
o Source port address: It defines the address of the application process that has delivered a message.
The source port address is of 16 bits address.
o Destination port address: It defines the address of the application process that will receive the
message. The destination port address is of a 16-bit address.
o Total length: It defines the total length of the user datagram in bytes. It is a 16-bit field.
o Checksum: The checksum is a 16-bit field which is used in error detection.

Disadvantages of UDP protocol

o UDP provides basic functions needed for the end-to-end delivery of a transmission.
o It does not provide any sequencing or reordering functions and does not specify the damaged packet
when reporting an error.
o UDP can discover that an error has occurred, but it does not specify which packet has been lost as
it does not contain an ID or sequencing number of a particular data segment.

TCP
o TCP stands for Transmission Control Protocol.
o It provides full transport layer services to applications.
o It is a connection-oriented protocol means the connection established between both the ends of the
transmission. For creating the connection, TCP generates a virtual circuit between sender and
receiver for the duration of a transmission.

Features Of TCP protocol


o Stream data transfer: TCP protocol transfers the data in the form of contiguous stream of bytes.
TCP group the bytes in the form of TCP segments and then passed it to the IP layer for transmission
to the destination. TCP itself segments the data and forward to the IP.
o Reliability: TCP assigns a sequence number to each byte transmitted and expects a positive
acknowledgement from the receiving TCP. If ACK is not received within a timeout interval, then
the data is retransmitted to the destination.
The receiving TCP uses the sequence number to reassemble the segments if they arrive out of order
or to eliminate the duplicate segments.
o Flow Control: When receiving TCP sends an acknowledgement back to the sender indicating the
number the bytes it can receive without overflowing its internal buffer. The number of bytes is sent
in ACK in the form of the highest sequence number that it can receive without any problem. This
mechanism is also referred to as a window mechanism.
o Multiplexing: Multiplexing is a process of accepting the data from different applications and
forwarding to the different applications on different computers. At the receiving end, the data is
forwarded to the correct application. This process is known as demultiplexing. TCP transmits the
packet to the correct application by using the logical channels known as ports.
o Logical Connections: The combination of sockets, sequence numbers, and window sizes, is called
a logical connection. Each connection is identified by the pair of sockets used by sending and
receiving processes.
o Full Duplex: TCP provides Full Duplex service, i.e., the data flow in both the directions at the
same time. To achieve Full Duplex service, each TCP should have sending and receiving buffers
so that the segments can flow in both the directions. TCP is a connection-oriented protocol. Suppose
the process A wants to send and receive the data from process B. The following steps occur:
o Establish a connection between two TCPs.
o Data is exchanged in both the directions.
o The Connection is terminated.

TCP Segment Format

Where,

o Source port address: It is used to define the address of the application program in a source
computer. It is a 16-bit field.
o Destination port address: It is used to define the address of the application program in a
destination computer. It is a 16-bit field.
o Sequence number: A stream of data is divided into two or more TCP segments. The 32-bit
sequence number field represents the position of the data in an original data stream.
o Acknowledgement number: A 32-field acknowledgement number acknowledge the data from
other communicating devices. If ACK field is set to 1, then it specifies the sequence number that
the receiver is expecting to receive.
o Header Length (HLEN): It specifies the size of the TCP header in 32-bit words. The minimum
size of the header is 5 words, and the maximum size of the header is 15 words. Therefore, the
maximum size of the TCP header is 60 bytes, and the minimum size of the TCP header is 20 bytes.
o Reserved: It is a six-bit field which is reserved for future use.
o Control bits: Each bit of a control field functions individually and independently. A control bit
defines the use of a segment or serves as a validity check for other fields.

There are total six types of flags in control field:

o URG: The URG field indicates that the data in a segment is urgent.
o ACK: When ACK field is set, then it validates the acknowledgement number.
o PSH: The PSH field is used to inform the sender that higher throughput is needed so if possible,
data must be pushed with higher throughput.
o RST: The reset bit is used to reset the TCP connection when there is any confusion occurs in the
sequence numbers.
o SYN: The SYN field is used to synchronize the sequence numbers in three types of segments:
connection request, connection confirmation ( with the ACK bit set ), and confirmation
acknowledgement.
o FIN: The FIN field is used to inform the receiving TCP module that the sender has finished sending
data. It is used in connection termination in three types of segments: termination request,
termination confirmation, and acknowledgement of termination confirmation.
o Window Size: The window is a 16-bit field that defines the size of the window.
o Checksum: The checksum is a 16-bit field used in error detection.
o Urgent pointer: If URG flag is set to 1, then this 16-bit field is an offset from the sequence
number indicating that it is a last urgent data byte.
o Options and padding: It defines the optional fields that convey the additional information
to the receiver.

TOPIC 1H DATA FORWARDING ACROSS COMPUTER NETWORK

Data Forwarding Across Computer Networks. In this session we will understand how data is forwarded across computer
networks, configure default and static routes on Cisco routers, set up dynamic routing using OSPF routing protocol, and
verify and trace network routes.
Learn step-by-step

1. Data forwarding on Local Area Networks.


2. Sending Data Across Multiple Networks.
3. Configuring Static Routing.
4. Configuring Dynamic Routing with the OSPF protocol.
5. Verifying and Tracing Network Routes.
TOPIC 1I Navigating the CLI

LI commands are organized in a hierarchical structure. To display a segment of the current hierarchy, use
the
show
command. Entering
show
displays the complete hierarchy, while entering
show
with keywords displays a segment of the hierarchy.
For example, the following command displays the configuration hierarchy for the Ethernet interface
segment of the hierarchy:
username@hostname>
configure

Entering configuration mode


[edit]
username@hostname#
show network interface ethernet

ethernet {
ethernet1/1 {
virtual-wire;
}
ethernet1/2 {
virtual-wire;
}
ethernet1/3 {
layer2 {
units {
ethernet1/3.1;
}
}
}
ethernet1/4;
}
[edit]
username@hostname#

TOPIC 1 J FILE SYSTEM MANAGEMENT AND NAVIGATION

The SR OS file system is used to store files used and generated by the system, for example, image files,
configuration files, logging files and accounting files.

The file commands allow you to copy, create, move, and delete files and directories, navigate to a
different directory, display file or directory contents and the image version.

File Management Tasks


The following sections are basic system tasks that can be performed.
Note that when a file system operation is performed with the copy, delete, move, rd, or scp commands
that can potentially delete or overwrite a file system entry, a prompt appears to confirm the action.
The force keyword performs the copy, delete, move, rd, and scp actions without displaying the
confirmation prompt.

Modifying File Attributes


The system administrator can change the read-only attribute in the local file. Enter the attrib command
with no options to display the contents of the directory and the file attributes.
Use the CLI syntax displayed below to modify file attributes:

CLI Syntax: file>


attrib [+r | -r] file-url

Creating Directories
Use the md command to create a new directory in the local file system, one level at a time.

Enter the cd command to navigate to different directories.

Use the CLI syntax displayed below to modify file attributes:

CLI Syntax: file>


md file-url

Copying Files
Use the copy command to upload or download an image file, configuration file, or other file types to or
from a flash card or a TFTP server.

The scp command copies files between hosts on a network. It uses SSH for data transfer, and uses the
same authentication and provides the same security as SSH.

The source file for the scp command must be local. The file must reside on the 7750 SR-Series router.
The destination file has to be of the format: user@host:file-name. The destination does not need to be
local.

Use the CLI syntax displayed below to copy files:

CLI Syntax: file>


copy source-file-url dest-file-url [force]
scp local-file-url destination-file-url [router router name | service-id] [force]

Moving Files
Use the move command to move a file or directory from one location to another.

Use the CLI syntax displayed below to move files:

CLI Syntax: file>


move old-file-url new-file-url [force]

Removing Files and Deleting Directories


Use the delete and rd commands to delete files and remove directories. Directories must be empty in order
to delete them. When file or directories are deleted they cannot be recovered.
Use the CLI syntax displayed below to delete files and remove directories:

CLI Syntax: file>


delete file-url [force]
rd file-url [force]

Repairing the File System


Use the repair command to check a compact flash device for errors and repair any errors found.

Use the CLI syntax displayed below to check and repair a compact flash device:

CLI Syntax: file


repair [cflash-id]

TOPIC 1 K VRP Operating System Image Management.

Effective network administration and management within an enterprise network relies on all devices
maintaining backup files in the event if system failures or other events that may result in loss of important
system files and data. Remote servers that use the files transfer protocol (ftp) service are often used to
ensure files are maintained for backup and retrieval purposes as and when needed. The means for
establishing communication with such application serves is introduced in this section.

Features of VRP

The main features of VRP are as follows:

• Comprehensively protecting user resources, and guaranteeing reliability, high

efficiency, and security of user networks.

Huawei’s VRP provides a large number of security and backup protocols, including access

control, authentication, firewall, encapsulation encryption, log function, backup center function,

route backup, and load balancing. The powerful security encryption function can effectively

control user authority and monitor the activities of users. Its simple and practical backup

functions ensure the smoothness of communications on the network and the uninterrupted

transmission of data. In addition, the load balancing function can optimize your use of network

resources by providing the maximum bandwidth available.


• Providing simple, diverse, and highly efficient configuration, management, and

monitoring means.

By these means, an individual can easily configure and effectively control network equipment

to stay ahead of potential network issues and gather information in suitable timeframes. With

the network management function, individuals can monitor and manage the running of the

whole network simply and effectively. With the command lines configured in a popular

worldwide style, users can feel confident in their applications. In addition, the platform

provides remote configuration functionality so that individuals can remotely configure the

router by logging in through TELNET or dialing up via a modem.

• Providing a highly effective forward engine

Through advanced technologies such as high-speed switching and buffer, the VRP platform

improves the packet transfer rate. Its numerous management policies enable you to manage

the routing topology of the whole network. Supporting multicast forward, it enables you to

adapt to the future requirements for new services, and prepares you for applications such as

voice and IP conferencing applications.

• Providing voice over IP unit

Huawei’s VRP provides a VOIP unit to introduce enterprise voice capabilities via existing

network infrastructures at extremely-low increment cost with a variety of interface types

available, (FXS, FXO, E&M, E1VI, and T1VI).

You might also like