Search
Home Search Center IP Encyclopedia Online Courses Intelligent Model Selection
Top Searches Refresh
QAM
Quadrature amplitude modulation (QAM) is an advanced modulation scheme widely used in Wi-Fi communication systems. It combines phase modulation and amplitude modulation.
69.4k
CRC
Cyclic redundancy check (CRC) is a common data transmission error detection technique commonly used in the data communication field. The transmit end calculates a check code for the data in a data frame based on a certain algorithm, appends the check code to the data frame, and sends the data frame to the receive end. The receive end verifies the correctness and integrity of the received data by repeating the calculation using the same algorithm.
64.9k
WiFi 7 (Wi-Fi 7) is the next-generation Wi-Fi standard to be launched, also known as IEEE 802.11be — extremely high throughput (EHT). Based on Wi-Fi 6, Wi-Fi 7 introduces technologies such as 320 MHz bandwidth, 4096-quadrature amplitude modulation (QAM), multiple resource unit (MRU), and multi-link operation (MLO). Drawing on these cutting-edge technologies, Wi-Fi 7 delivers a higher data transmission rates and lower latency than Wi-Fi 6. Wi-Fi 7 is expected to support a throughput of up to 23 Gbps, about three times that of Wi-Fi 6.
61.8k
VXLAN, or Virtual Extensible LAN, is a network virtualization technology widely used on large Layer 2 networks. VXLAN establishes a logical tunnel between the source and destination network devices, through which it uses MAC-in-UDP encapsulation for packets. Specifically, it encapsulates original Ethernet frames sent by a VM into UDP packets. It then encapsulates the UDP packets with the IP header and Ethernet header of the physical network as outer headers, enabling these packets to be routed across the network like common IP packets. This frees VMs on the Layer 2 network from the structural limitations of the Layer 2 and Layer 3 networks.
56.5k
BFD
Bidirectional Forwarding Detection (BFD) is a fast fault detection mechanism based on RFC 5880. After a BFD session is established between two systems, BFD packets are periodically sent over the path between the two systems. If one system does not receive BFD packets within a specified period, a fault has occurred on the path. After detecting the link fault through BFD, the upper-layer protocol can take measures to promptly rectify the fault.
55.8k
Segment Routing IPv6 (SRv6) is a next-generation IP bearer protocol that combines Segment Routing (SR) and IPv6. Utilizing existing IPv6 forwarding technology, SRv6 implements network programming through flexible IPv6 extension headers. SRv6 reduces the number of required protocol types, offers great extensibility and programmability, and meets the diversified requirements of more new services. It also provides high reliability and offers exciting cloud service application potential.
54.3k
IPoE is an access authentication technology that enables a user to access a network after dynamically obtaining an IP address through Dynamic Host Configuration Protocol (DHCP). It provides a flexible and efficient access control mode. User terminals can access the network without needing to install dedicated client software. IPoE is applicable to access of various network devices, such as smartphones, digital TVs, and PSPs. The simple and fast access provided by IPoE reduces the maintenance workload of clients and facilitates the expansion of carrier services on authentication pages, such as advertisement pushes, slogan promotions, and relevant announcements. IPoE access is widely used on networks of chain hotels, campuses, railway stations, and more.
54.1k
Latest Updates Refresh
What Is a 5G Transport Network? What Are the Key Technologies of a 5G Transport Network?
A 5G transport network connects a 5G RAN and core network. To provide the ultra-high bandwidth, ultra-low latency, and flexible and intelligent connection services necessary in 5G application scenarios, the 5G transport network uses a new network architecture and key technologies.
What Is 6PE? How Does 6PE Work?
6PE
IPv6 Provider Edge (6PE) is a technology that facilitates IPv4-to-IPv6 transition based on Multiprotocol Label Switching (MPLS). 6PE enables isolated IPv6 networks to communicate using MPLS LSPs on an IPv4 MPLS backbone network. It improves the utilization of MPLS network resources without affecting existing services.
What Is 6VPE? How Does 6VPE Work?
6VPE uses IPv4 and MPLS to connect isolated IPv6 networks and provide BGP MPLS VPN services for them. In a 6VPE scenario, customer edges (CEs) use the IPv6 address family, whereas the backbone network devices use the IPv4 address family. The network where 6VPE is deployed uses VPN to logically isolate IPv6 networks connected to it, improving IPv6 network security.
What Is BIERv6? Why Do We Need BIERv6?
Bit Index Explicit Replication IPv6 encapsulation (BIERv6) is a new multicast technology. With BIERv6, the ingress encapsulates into packet headers a set of nodes to which multicast packets are destined as a BitString before sending the packets to transit nodes. In this way, the transit nodes do not need to establish an MDT for each multicast flow, nor do they need to maintain per-flow states. Instead, the transit nodes replicate and forward packets based on the BitString. Combining Bit Index Explicit Replication (BIER) with native IPv6 packet forwarding, BIERv6 can efficiently carry multicast services such as IPTV, video conferencing, remote education, telemedicine, and online live telecasting.
What Is a BRAS? How Does a BRAS Work?
A BRAS is an access gateway oriented to broadband network applications. It bridges broadband access and backbone networks, providing basic access methods and management functions for broadband access networks. It usually functions as a core node on an Internet service provider (ISP) network, allowing users to connect to a network through different access modes (such as DSL, optical fiber, and satellite). Furthermore, it provides a wide range of functions, such as authentication, authorization, accounting, and traffic control, to ensure the quality and security of network connections.
What Is a Channelized Sub-interface? What Are the Differences Between Channelized and Common Sub-interfaces?
A channelized sub-interface is a sub-interface of an Ethernet physical interface with channelization enabled. Different channelized sub-interfaces are used to carry different types of services, and bandwidths are configured based on channelized sub-interfaces to implement strict bandwidth isolation between different channelized sub-interfaces on the same physical interface. This prevents services on different sub-interfaces from preempting each other's bandwidths. Channelized sub-interfaces are used to reserve resources in a network slicing solution. An independent "lane" is planned for each network slice, and "lanes" cannot be changed during transmission of different network slices' service traffic. This ensures strict isolation of services on different slices, and effectively prevents resource preemption between services when traffic bursts occur.
All Topics
Alphabetical By Category
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0-9
    Share link to