Home Search Center Intelligent Model Selection IP Encyclopedia
Top Searches Refresh
WiFi 7 (Wi-Fi 7) is the next-generation Wi-Fi standard to be launched, also known as IEEE 802.11be or extremely high throughput (EHT). Based on Wi-Fi 6, Wi-Fi 7 introduces technologies such as 320 MHz bandwidth, 4096-quadrature amplitude modulation (QAM), multi-resource unit (RU), multi-link operation (MLO), enhanced multi-user multiple-input multiple-output (MU-MIMO), and multi-access point (AP) coordination. Drawing on these cutting-edge technologies, Wi-Fi 7 delivers a higher data transmission rate and lower latency than Wi-Fi 6. Wi-Fi 7 is expected to support a throughput of up to 30 Gbps, about three times that of Wi-Fi 6.
Cyclic redundancy check (CRC) is a common data transmission error detection technique commonly used in the data communication field. The transmit end calculates a check code for the data in a data frame based on a certain algorithm, appends the check code to the data frame, and sends the data frame to the receive end. The receive end verifies the correctness and integrity of the received data by repeating the calculation using the same algorithm.
Telemetry is a next-generation network monitoring technology used to remotely collect data from devices at high speed. Devices periodically push device information to a collector, providing real-time, high-speed, and accurate network monitoring. To be specific, telemetry organizes data based on YANG models, encodes data in the Google Protocol Buffers (GPB) format, and transmits data through the Google Remote Procedure Call (gRPC) protocol. This improves data collection efficiency and facilitates intelligent interconnection. In traditional technologies, a collector and devices interact in pull mode by alternatively sending requests and responses. In contrast to these technologies, telemetry works in push mode and has the following advantages: - Proactively pushes data, reducing the pressure on devices. - Pushes data periodically in subseconds to avoid data inaccuracy caused by network delay. - Is capable to monitor a large number of network devices, improving network monitoring efficiency.
Quadrature amplitude modulation (QAM) is an advanced modulation scheme widely used in Wi-Fi communication systems. It combines phase modulation and amplitude modulation.
PPPoE is the point-to-point protocol running over the Ethernet at the link layer. It provides PPPoE connections on the Ethernet, sets up PPP sessions, and encapsulates PPP frames into PPPoE frames. PPPoE connects users to a remote access device, providing cost-effective user access and excellent user access control. PPPoE supports remote access to multiple user hosts over an Ethernet and provides accounting data for transmission to resolve application issues, such as Internet access charging issues. PPPoE is therefore widely used for carrier network access.
Internet Protocol Security (IPsec) is a suite of protocols and services that provide security for IP networks. It is a widely used virtual private network (VPN) technology. IP packets lack effective security mechanisms and may be forged, stolen, or tampered with when being transmitted on a public network, such as the Internet. To solve this problem, the communicating parties establish an IPsec tunnel for encrypted transmission of IP packets. This ensures secure transmission of IP packets on an insecure network, such as the Internet.
Segment Routing IPv6 (SRv6) is a next-generation IP bearer protocol that combines Segment Routing (SR) and IPv6. Utilizing existing IPv6 forwarding technology, SRv6 implements network programming through flexible IPv6 extension headers. SRv6 reduces the number of required protocol types, offers great extensibility and programmability, and meets the diversified requirements of more new services. It also provides high reliability and offers exciting cloud service application potential.
Latest Updates Refresh
What is 2FA? Why is 2FA required?
2FA is a security method whereby users are required to verify their identities using two forms of identification. Such forms, including the password, fingerprint, SMS verification code, smart card, and biometric recognition, can be combined in different ways. This can improve the security and reliability of user accounts.
What Is 3D radio calibration?
Optimized based on traditional radio calibration, 3D radio calibration algorithm can identify complex installation scenarios such as high or blocked AP positions based on RSSI measurement results reported by STAs, and adjust the transmit power and channels accordingly to provide better wireless service experience at these special positions.
What Is a 5G Transport Network? What Are the Key Technologies of a 5G Transport Network?
A 5G transport network connects a 5G RAN and core network. To provide the ultra-high bandwidth, ultra-low latency, and flexible and intelligent connection services necessary in 5G application scenarios, the 5G transport network uses a new network architecture and key technologies.
What Is 6PE? How Does 6PE Work?
IPv6 Provider Edge (6PE) is a technology that facilitates IPv4-to-IPv6 transition based on Multiprotocol Label Switching (MPLS). 6PE enables isolated IPv6 networks to communicate using MPLS LSPs on an IPv4 MPLS backbone network. It improves the utilization of MPLS network resources without affecting existing services.
What Is 6VPE? How Does 6VPE Work?
6VPE uses IPv4 and MPLS to connect isolated IPv6 networks and provide BGP MPLS VPN services for them. In a 6VPE scenario, customer edges (CEs) use the IPv6 address family, whereas the backbone network devices use the IPv4 address family. The network where 6VPE is deployed uses VPN to logically isolate IPv6 networks connected to it, improving IPv6 network security.
What Is 802.11ac? 802.11ac vs. 802.11n
802.11ac is the fifth-generation 802.11 standard and is also known as Wi-Fi 5 (or WiFi 5). Through various technological innovations, 802.11ac achieves a qualitative leap in the wireless transmission rate — from 600 Mbit/s supported in 802.11n to 6.93 Gbit/s, bringing infinite possibilities for more application scenarios that depend on heavy-traffic wireless transmission. Currently, 802.11ac has been widely used in wireless network communication for enterprises and homes, which greatly changes the way we work and live.
All Topics
Alphabetical By Category
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
      Share link to