Search
Home Search Center IP Encyclopedia Online Courses
Top Searches Refresh
QAM
Quadrature amplitude modulation (QAM) is an advanced modulation scheme widely used in Wi-Fi communication systems. It combines phase modulation and amplitude modulation.
107.6k
IPoE is an access authentication technology that enables a user to access a network after dynamically obtaining an IP address through Dynamic Host Configuration Protocol (DHCP). It provides a flexible and efficient access control mode. User terminals can access the network without needing to install dedicated client software. IPoE is applicable to access of various network devices, such as smartphones, digital TVs, and PSPs. The simple and fast access provided by IPoE reduces the maintenance workload of clients and facilitates the expansion of carrier services on authentication pages, such as advertisement pushes, slogan promotions, and relevant announcements. IPoE access is widely used on networks of chain hotels, campuses, railway stations, and more.
105.8k
Link Aggregation Control Protocol (LACP), as specified in IEEE 802.3ad, implements dynamic link aggregation and de-aggregation. LACP-enabled member interfaces in a link aggregation group (LAG) exchange Link Aggregation Control Protocol Data Units (LACPDUs) to reach an agreement on the interfaces that can transmit and receive packets and determine the links that carry service traffic. If a link aggregation condition of a LAG changes, for example, a member link fails, LACP is responsible for selecting another available member link to replace the faulty link to maintain load balancing. With no need for hardware upgrades, LACP provides higher link bandwidth and network reliability.
98.0k
BFD
Bidirectional Forwarding Detection (BFD) is a fast fault detection mechanism based on RFC 5880. After a BFD session is established between two systems, BFD packets are periodically sent over the path between the two systems. If one system does not receive BFD packets within a specified period, a fault has occurred on the path. After detecting the link fault through BFD, the upper-layer protocol can take measures to promptly rectify the fault.
94.5k
CRC
Cyclic redundancy check (CRC) is a common data transmission error detection technique commonly used in the data communication field. The transmit end calculates a check code for the data in a data frame based on a certain algorithm, appends the check code to the data frame, and sends the data frame to the receive end. The receive end verifies the correctness and integrity of the received data by repeating the calculation using the same algorithm.
92.3k
Segment Routing IPv6 (SRv6) is a next-generation IP bearer protocol that combines Segment Routing (SR) and IPv6. Utilizing existing IPv6 forwarding technology, SRv6 implements network programming through flexible IPv6 extension headers. SRv6 reduces the number of required protocol types, offers great extensibility and programmability, and meets the diversified requirements of more new services. It also provides high reliability and offers exciting cloud service application potential.
86.4k
WiFi 7 (Wi-Fi 7) is the next-generation Wi-Fi standard to be launched, also known as IEEE 802.11be — extremely high throughput (EHT). Based on Wi-Fi 6, Wi-Fi 7 introduces technologies such as 320 MHz bandwidth, 4096-quadrature amplitude modulation (QAM), multiple resource unit (MRU), and multi-link operation (MLO). Drawing on these cutting-edge technologies, Wi-Fi 7 delivers a higher data transmission rates and lower latency than Wi-Fi 6. Wi-Fi 7 is expected to support a throughput of up to 23 Gbps, about three times that of Wi-Fi 6.
82.5k
Latest Updates Refresh
What Is StarryLink Optical Module? Why Do We Need It?
In the AI era, data center network interconnection presents new challenges for optical modules, requiring significant improvements in transmission distance, O&M efficiency, and interconnection security. To address these demands, Huawei has launched the StarryLink optical module brand. And to keep up with the rapid growth of AI computing power, Huawei offers StarryLink optical modules that can be sold separately, compatible with various types of computing NICs and switches. Through rigorous quality control and end-to-end R&D and manufacturing, Huawei's StarryLink optical modules deliver high-quality interconnection that supports long-term business development.
What Is a Cloud Access Security Broker (CASB)? Why Do We Need CASBs?
The Cloud Access Security Broker (CASB) is a security solution designed to safeguard enterprises' Software as a Service (SaaS) applications. By serving as a monitoring and control point between users and cloud service providers, CASBs ensure secure data transmission and access control. CASBs provide full visibility into SaaS applications, enabling enterprises to monitor and manage access to these applications to prevent data leakage and non-compliance. CASBs enable fine-grained control of SaaS applications to prevent internal threats, shadow IT, and high-risk data sharing.
What Is a Firewall? What Are the Types of Firewalls?
As a type of network security device, a firewall monitors, filters, and controls incoming and outgoing network traffic based on preset security policies to protect a network zone against attacks and intrusions from another network zone. The firewall mentioned here does not actually refer to a physical wall used to isolate a fire source, a built-in Windows firewall, or the wall involved in wall-flipping software. Instead, it refers to a network firewall, which can be in the form of hardware, software, or software as a service (SaaS). As the first line of defense for security protection in network deployment, firewalls can be flexibly deployed at network perimeters and locations requiring subnet isolation. For example, they can be used on enterprise network egresses, or to segment internal subnets in large networks, or on data center perimeters.
What is IPsec? How doe IPsec work?
Internet Protocol Security (IPsec) is a suite of protocols and services that provide security for IP networks. It is a widely used virtual private network (VPN) technology. IP packets lack effective security mechanisms and may be forged, stolen, or tampered with when being transmitted on a public network, such as the Internet. To solve this problem, the communicating parties establish an IPsec tunnel for encrypted transmission of IP packets. This ensures secure transmission of IP packets on an insecure network, such as the Internet.
What Is Spyware? How to Defend Against Spyware?
Spyware is a kind of malware that enters a user's computer without their knowledge or permission, gathers personal data, and covertly sends it to third parties. Spyware usually spies on a user's computer—with access to applications, browsers, documents, cameras, or microphones—and collects personal information, including Internet usage, credit card, and bank account details. The information is then sent to advertisers, data collection firms, or malicious actors for a profit. As one of the most commonly used cyberattack methods, spyware may lead to data breaches and data misuse. Some spyware types may even make modifications to the user's system, resulting in slow network connection, application freezing, startup failure, or system breakdown.
What Is HSR? Why Do We Need HSR?
HSR
As a protocol for highly reliable industrial network transmission, High-availability Seamless Redundancy (HSR) not only reduces the network delay and packet loss rate, but also improves reliability in industrial IoT scenarios. This article describes why we need HSR and how it works.
All Topics
Alphabetical By Category
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0-9
    Share link to