Top Searches
Refresh
IPoE is an access authentication technology that enables a user to access a network after dynamically obtaining an IP address through Dynamic Host Configuration Protocol (DHCP). It provides a flexible and efficient access control mode. User terminals can access the network without needing to install dedicated client software. IPoE is applicable to access of various network devices, such as smartphones, digital TVs, and PSPs.
The simple and fast access provided by IPoE reduces the maintenance workload of clients and facilitates the expansion of carrier services on authentication pages, such as advertisement pushes, slogan promotions, and relevant announcements. IPoE access is widely used on networks of chain hotels, campuses, railway stations, and more.
118.7k
Link Aggregation Control Protocol (LACP), as specified in IEEE 802.3ad, implements dynamic link aggregation and de-aggregation. LACP-enabled member interfaces in a link aggregation group (LAG) exchange Link Aggregation Control Protocol Data Units (LACPDUs) to reach an agreement on the interfaces that can transmit and receive packets and determine the links that carry service traffic. If a link aggregation condition of a LAG changes, for example, a member link fails, LACP is responsible for selecting another available member link to replace the faulty link to maintain load balancing. With no need for hardware upgrades, LACP provides higher link bandwidth and network reliability.
113.6k
Bidirectional Forwarding Detection (BFD) is a fast fault detection mechanism based on RFC 5880. After a BFD session is established between two systems, BFD packets are periodically sent over the path between the two systems. If one system does not receive BFD packets within a specified period, a fault has occurred on the path. After detecting the link fault through BFD, the upper-layer protocol can take measures to promptly rectify the fault.
104.5k
Cyclic redundancy check (CRC) is a common data transmission error detection technique commonly used in the data communication field. The transmit end calculates a check code for the data in a data frame based on a certain algorithm, appends the check code to the data frame, and sends the data frame to the receive end. The receive end verifies the correctness and integrity of the received data by repeating the calculation using the same algorithm.
102.3k
Segment Routing IPv6 (SRv6) is a next-generation IP bearer protocol that combines Segment Routing (SR) and IPv6. Utilizing existing IPv6 forwarding technology, SRv6 implements network programming through flexible IPv6 extension headers.
SRv6 reduces the number of required protocol types, offers great extensibility and programmability, and meets the diversified requirements of more new services. It also provides high reliability and offers exciting cloud service application potential.
95.2k
WiFi 7 (Wi-Fi 7) is the next-generation Wi-Fi standard to be launched, also known as IEEE 802.11be — extremely high throughput (EHT).
Based on Wi-Fi 6, Wi-Fi 7 introduces technologies such as 320 MHz bandwidth, 4096-quadrature amplitude modulation (QAM), multiple resource unit (MRU), and multi-link operation (MLO). Drawing on these cutting-edge technologies, Wi-Fi 7 delivers a higher data transmission rates and lower latency than Wi-Fi 6. Wi-Fi 7 is expected to support a throughput of up to 23 Gbps, about three times that of Wi-Fi 6.
90.2k
Latest Updates
Refresh
Secure Sockets Layer (SSL) is a cryptographic protocol that protects communications over insecure networks, such as the Internet. SSL establishes a session between a client and a server through a handshake to authenticate the identities of the communicating parties and negotiate keys and cipher suites. This prevents the interception of communication between the client and server and secures data transmission on the network. SSL certificates are used to authenticate and establish a secure connection between a client and a server.
Cellular technology is used to build wireless communication networks, known as cellular networks. It divides a geographical area into small cells; each of these cells is served by a base station, which provides wireless signals to mobile devices in the cell. Widely used around the globe, cellular networks enable users to communicate anytime and anywhere, regardless of distance. The most common cellular networks around the world are 3G, 4G, and 5G networks.
If a network device such as a Huawei router supports the cellular function, you can equip it with a SIM card so that it can access a carrier network wirelessly, just like a mobile phone can access a 3G/4G/5G wireless network. This makes network deployment more flexible.
eNSP Pro is a device simulator launched by Huawei Data Communication Product Line. It mainly applies to data communication skill training and provides an environment for practicing command lines of Huawei data communication products.
Wi-Fi roaming allows stations (STAs) to move within the coverage areas of access points (APs) belonging to the same extended service set (ESS) with nonstop service transmission.
The most significant advantage of the WLAN is that a STA can move within a WLAN without physical media restrictions. WLAN roaming allows the STA to move within a WLAN without service interruption. If multiple APs in an area use the same service set identifier (SSID), users can find this SSID on their STAs even if the STAs are connected to different APs. When a STA moves from the coverage area of an AP to that of another AP, Wi-Fi roaming ensures seamless transition of STA services between APs.
802.1X is a port-based network access control protocol. 802.1X authentication refers to 802.1X-based user authentication, which has been widely used on networks that have high requirements on information security.
Ethernet Ring Protection Switching (ERPS) is a protocol defined by the International Telecommunication Union – Telecommunication Standardization Sector (ITU-T) to prevent loops at Layer 2. ERPS is also called G.8032 because its standard number is ITU-T G.8032/Y.1344. It defines the ring automatic protection switching (R-APS) messages and protection switching mechanism.
All Topics
Alphabetical
By Category
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
0-9
- AAA
- Access Point
- ACL
- Adaptive Forward Error Correction
- Adaptive Routing
- Advanced Persistent Threat
- AFR
- AI ECN
- AI Firewall
- AIOps
- Air Interface Slicing
- AI Roaming
- All-Optical Ethernet Switch
- Antivirus
- API Gateway
- APN6
- Application Identification
- APS Protection
- AQM
- ARP
- Autonomous Driving Network
- Campus energy-saving
- CASB
- Cellular
- Channelized Sub-interface
- Channel Utilization
- CloudCampus
- CloudFabric
- CloudFabric N1 Business Model
- Cloud Managed Network
- CloudWAN
- Combined RF Power
- Command and Control
- Computer Virus
- Computing efficiency
- Computing network
- Computing-network integration
- Converged Scheduling
- CoSR
- CPCAR
- CRC
- Cryptocurrency Mining
- CSC
- CSI Sensing
- CSRF
- CSS
- CVE
- Cybersecurity
- DAI
- Data center
- Data Center
- Data compression
- DCB
- DCI
- DDoS Attack
- Deception Technology
- DGA
- DHCP
- DHCP-based deployment
- DHCP Snooping
- Digital Transformation
- DLDP
- DLP
- DNS
- DNS Filtering
- Docker Container
- DPCF
- DPFR
- Dragonfly Adaptive Routing
- DSVPN
- Dual Fed and Selective Receiving
- EAI
- ECA
- Edge Computing
- Edge Computing IoT
- EDR
- Email-based deployment
- eMDI
- Endpoint Security
- eNSP Pro
- ERPS
- Ethernet
- Eth-Trunk
- EVA
- EVPN
- Experience assurance
- Feature software package
- File Blocking
- Financial WAN Data Redundancy Elimination
- Firewall
- Flex-Algo
- FlexE
- Free Mobility
- FWaaS
- HACA
- Hot swapping
- HQoS
- HSR
- HTTP/2
- HVPN
- Hybrid Cable
- Hybrid Cloud
- Hyper-Converged Data Center Network
- ICMP
- iConnect
- iCSSR
- IFIT
- iFlow
- IGMP
- IGMP Snooping
- IIoT
- Industrial Internet
- iNOF
- Intelligent Cloud-Network
- Intelligent Lossless Network
- Intelligent network O&M
- Intelligent Traffic Analysis
- Intelligent Traffic Policing
- Intelligent traffic steering
- Intelligent Wind Power Network
- Inter-AS Bandwidth Pooling
- Intra-AS bandwidth pooling
- IOAM
- IoT Aware Network
- IP-based production and broadcasting network
- iPCA2.0
- IPoE
- IP Private Line
- IPRAN
- IP routing
- IPS
- IPsec
- IPSG
- IPv4
- IPv6
- IPv6 Enhanced
- IPv6 Private Network
- IS-IS
- ISP link selection
- ISSU
- MACsec
- Malware
- MCE
- MD-CLI
- MFA
- Microsegmentation
- MIMO
- Mirroring
- MITM
- M-LAG
- MPLS
- MTN
- MTU
- Multicast
- Multi-fed and selective receiving
- Multi-Gigabit Ethernet
- MU-MIMO
- MUX-VPN
- NAC
- NAT
- NAT66
- NETCONF
- NetStream
- Network digital map
- Network Gateway
- Network Programming
- Network-Security Convergence
- Network Slicing
- NFV
- NGFW
- NoF
- NoF+
- NPCC
- NQA
- NSLB
- NSR
- NTA
- NTP
- OAS
- ODN
- OFDMA
- OLC
- OpenFlow
- OpenStack
- OPS
- Optical module channel loss resistance
- Orthogonal Architecture
- OSPF
- Overlay network
- OWE
- Packet Event
- PAM4
- Password security
- PCEP
- PFC
- Phishing
- PIM
- PKI
- PLC-IoT
- Plug-and-Play
- PoE
- Policy Association
- PON
- Port Security
- PPP
- PPPoE
- Private Cloud
- PROFINET
- Public Cloud
- SAC
- SafeSearch
- Sandboxing
- SASE
- SBFD
- SD-Branch
- SDN
- SD-WAN
- SD-WAN EVPN
- Secure Router
- Security Policy
- Segment Routing
- Service Telemetry
- SFC
- sFlow
- Simulation and verification
- Situational Awareness
- Smart Antenna
- Smart DNS
- Smart policy routing
- Smart Upgrade
- SNMP
- SNR
- SOAR
- SOC
- Social Engineering
- Solar System architecture
- SPFC
- SPN
- SPN FGU
- Spyware
- SQL Injection
- SR-MPLS
- SR-TP tunnel
- SRv6
- SSE
- SSH
- SSID
- SSL
- SSL-Encrypted Traffic Detection
- SSL Offloading
- SSL VPN
- SSO
- Stacking
- StarryLink optical module
- STP
- STP loop protection
- STUN
- Super VLAN
- SWG
- Switch
- SYN Flood
- SZTP
- TACACS
- Telemetry
- Terminal Anti-Spoofing
- Terminal Identification
- Traffic policy
- Transparent DNS proxy
- Trojan Horse
- TSN
- VCMP
- VDC
- VDSL
- VIP Lane
- Virtual router
- Virtual System
- VLAN
- VLAN Mapping
- Voice VLAN
- VPC
- VPN
- VRRP
- Vulnerability Scanning
- VXLAN