Search
Home Search Center IP Encyclopedia Online Courses Intelligent Model Selection
Top Searches Refresh
QAM
Quadrature amplitude modulation (QAM) is an advanced modulation scheme widely used in Wi-Fi communication systems. It combines phase modulation and amplitude modulation.
88.7k
IPoE is an access authentication technology that enables a user to access a network after dynamically obtaining an IP address through Dynamic Host Configuration Protocol (DHCP). It provides a flexible and efficient access control mode. User terminals can access the network without needing to install dedicated client software. IPoE is applicable to access of various network devices, such as smartphones, digital TVs, and PSPs. The simple and fast access provided by IPoE reduces the maintenance workload of clients and facilitates the expansion of carrier services on authentication pages, such as advertisement pushes, slogan promotions, and relevant announcements. IPoE access is widely used on networks of chain hotels, campuses, railway stations, and more.
84.1k
BFD
Bidirectional Forwarding Detection (BFD) is a fast fault detection mechanism based on RFC 5880. After a BFD session is established between two systems, BFD packets are periodically sent over the path between the two systems. If one system does not receive BFD packets within a specified period, a fault has occurred on the path. After detecting the link fault through BFD, the upper-layer protocol can take measures to promptly rectify the fault.
80.4k
CRC
Cyclic redundancy check (CRC) is a common data transmission error detection technique commonly used in the data communication field. The transmit end calculates a check code for the data in a data frame based on a certain algorithm, appends the check code to the data frame, and sends the data frame to the receive end. The receive end verifies the correctness and integrity of the received data by repeating the calculation using the same algorithm.
79.4k
Link Aggregation Control Protocol (LACP), as specified in IEEE 802.3ad, implements dynamic link aggregation and de-aggregation. LACP-enabled member interfaces in a link aggregation group (LAG) exchange Link Aggregation Control Protocol Data Units (LACPDUs) to reach an agreement on the interfaces that can transmit and receive packets and determine the links that carry service traffic. If a link aggregation condition of a LAG changes, for example, a member link fails, LACP is responsible for selecting another available member link to replace the faulty link to maintain load balancing. With no need for hardware upgrades, LACP provides higher link bandwidth and network reliability.
75.6k
VXLAN, or Virtual Extensible LAN, is a network virtualization technology widely used on large Layer 2 networks. VXLAN establishes a logical tunnel between the source and destination network devices, through which it uses MAC-in-UDP encapsulation for packets. Specifically, it encapsulates original Ethernet frames sent by a VM into UDP packets. It then encapsulates the UDP packets with the IP header and Ethernet header of the physical network as outer headers, enabling these packets to be routed across the network like common IP packets. This frees VMs on the Layer 2 network from the structural limitations of the Layer 2 and Layer 3 networks.
73.3k
WiFi 7 (Wi-Fi 7) is the next-generation Wi-Fi standard to be launched, also known as IEEE 802.11be — extremely high throughput (EHT). Based on Wi-Fi 6, Wi-Fi 7 introduces technologies such as 320 MHz bandwidth, 4096-quadrature amplitude modulation (QAM), multiple resource unit (MRU), and multi-link operation (MLO). Drawing on these cutting-edge technologies, Wi-Fi 7 delivers a higher data transmission rates and lower latency than Wi-Fi 6. Wi-Fi 7 is expected to support a throughput of up to 23 Gbps, about three times that of Wi-Fi 6.
73.1k
Latest Updates Refresh
What Is TACACS? TACACS vs. TACACS+ vs. HWTACACS
Terminal Access Controller Access Control System (TACACS) is used for communication with an identity authentication server on the Unix network to determine whether users have the permission to access the network. Vendors extended TACACS. For example, Cisco developed TACACS plus, whereas Huawei developed HWTACACS. Both TACACS+ and HWTACACS are proprietary protocols. They gradually replaced TACACS and are no longer compatible with TACACS.
What Is Financial WAN Data Redundancy Elimination?
Driven by booming smart finance, the traffic between financial DCs and branches is increasing sharply, leading to spiraling WAN private line bandwidth leasing costs: two to three times that of the investment made in actual network devices. The financial WAN data redundancy elimination solution compresses data at the transmit end and decompresses the data at the receive end. This reduces the line bandwidth resources consumed by WAN traffic transmitted between financial DCs and branches, saves line costs, and accelerates the deployment of distributed DCs.
What Is HSR? Why Do We Need HSR?
HSR
As a protocol for highly reliable industrial network transmission, High-availability Seamless Redundancy (HSR) not only reduces the network delay and packet loss rate, but also improves reliability in industrial IoT scenarios. This article describes why we need HSR and how it works.
What Is Keychain? Why Is Keychain Required?
A key in a keychain is not an algorithm or a key string; rather, it is a set of encryption and authentication rules. A keychain centrally controls and flexibly manages a series of its own keys to provide dynamic security authentication services for applications. This document describes why keychain is required, its components, how it works, and typical applications.
What Is Mirroring? How Does Port Mirroring Work?
Mirroring allows packets from a specified source to be copied to a destination port without affecting packet processing on a network device such as a switch or router. The destination port is directly or indirectly connected to a monitoring device on which analysis software is installed to analyze packets. When an attack or a fault occurs on the network, the network administrator can use the mirroring function to obtain and analyze packets to find out the attack source or fault cause. Mirroring can be classified into port mirroring, flow mirroring, VLAN mirroring, and MAC address mirroring based on the mirroring source. For example, port mirroring allows packets in the inbound, outbound, or both the inbound and outbound directions of a specified port to be copied to a destination port. Mirroring can be classified into local mirroring and remote mirroring based on the connection mode between the destination port and the monitoring device.
What Is STP Loop Protection? How Does It Work?
On a network running a spanning tree protocol, a switching device maintains the status of the root port and the blocked port by continually receiving Bridge Protocol Data Units (BPDUs) from the upstream switching device. If the ports cannot receive BPDUs from the upstream switching device due to link congestion or unidirectional link failures, the switching device will re-select a root port. The original root port becomes a designated port, and the original blocked port changes to the Forwarding state, which may cause loops on the network. STP loop protection is an enhanced function of STP. After loop protection is enabled, if the root port or alternate port does not receive BPDUs from the upstream device for a long time, the root port or alternate port does not change to the Forwarding state. This prevents loops on the network. After link congestion is eliminated or unidirectional link failures are rectified, the port receives BPDUs for negotiation and restores its original role and status.
All Topics
Alphabetical By Category
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0-9
    Share link to