Top Searches
Refresh
IPoE is an access authentication technology that enables a user to access a network after dynamically obtaining an IP address through Dynamic Host Configuration Protocol (DHCP). It provides a flexible and efficient access control mode. User terminals can access the network without needing to install dedicated client software. IPoE is applicable to access of various network devices, such as smartphones, digital TVs, and PSPs.
The simple and fast access provided by IPoE reduces the maintenance workload of clients and facilitates the expansion of carrier services on authentication pages, such as advertisement pushes, slogan promotions, and relevant announcements. IPoE access is widely used on networks of chain hotels, campuses, railway stations, and more.
127.5k
Link Aggregation Control Protocol (LACP), as specified in IEEE 802.3ad, implements dynamic link aggregation and de-aggregation. LACP-enabled member interfaces in a link aggregation group (LAG) exchange Link Aggregation Control Protocol Data Units (LACPDUs) to reach an agreement on the interfaces that can transmit and receive packets and determine the links that carry service traffic. If a link aggregation condition of a LAG changes, for example, a member link fails, LACP is responsible for selecting another available member link to replace the faulty link to maintain load balancing. With no need for hardware upgrades, LACP provides higher link bandwidth and network reliability.
124.1k
Bidirectional Forwarding Detection (BFD) is a fast fault detection mechanism based on RFC 5880. After a BFD session is established between two systems, BFD packets are periodically sent over the path between the two systems. If one system does not receive BFD packets within a specified period, a fault has occurred on the path. After detecting the link fault through BFD, the upper-layer protocol can take measures to promptly rectify the fault.
111.6k
Cyclic redundancy check (CRC) is a common data transmission error detection technique commonly used in the data communication field. The transmit end calculates a check code for the data in a data frame based on a certain algorithm, appends the check code to the data frame, and sends the data frame to the receive end. The receive end verifies the correctness and integrity of the received data by repeating the calculation using the same algorithm.
110.4k
A WLAN is a wireless computer network that links two or more devices using wireless communication to form a LAN within a limited area such as a home, school, campus, or office building. A WLAN is a network system wherein Wi-Fi is one of the most common technologies in this system. Therefore, WLAN includes Wi-Fi.
101.7k
Segment Routing IPv6 (SRv6) is a next-generation IP bearer protocol that combines Segment Routing (SR) and IPv6. Utilizing existing IPv6 forwarding technology, SRv6 implements network programming through flexible IPv6 extension headers.
SRv6 reduces the number of required protocol types, offers great extensibility and programmability, and meets the diversified requirements of more new services. It also provides high reliability and offers exciting cloud service application potential.
100.1k
Latest Updates
Refresh
Intelligent traffic analysis is a network traffic monitoring and analysis technology. It allows the device to perform in-depth analysis on a specified service flow to obtain data about high-precision performance indicators such as the packet loss rate and delay (nanosecond-level) of the service flow. The analysis result can be exported to iMaster NCE-FabricInsight for display or further analysis. It helps O&M personnel monitor the network running status or quickly locate network faults, and provides support for network-wide traffic visualization.
Intelligent traffic policing (ITP) is a technology that dynamically adjusts the rate limit. It is implemented based on hierarchical CAR HQoS. By dynamically monitoring interface bandwidth and packet loss, the device configured with intelligent traffic policing automatically adjusts the rate limiting policies for high-priority and low-priority services, implementing dynamic on-demand allocation of bandwidth resources.
Packet Event enables devices to report flow entries to a collector when packet loss or high-latency packets are detected. It also supports self-healing for packet loss caused by specific factors and statistics collection on packets across different latency segments. The analyzer reads and analyzes the data from the collector to quickly identify causes and the locations of exceptions. This helps administrators locate faults and adjust services promptly to prevent network congestion. This article explains why Packet Event is needed and how it works.
Adaptive Routing Tuning (ART) is a technology that optimizes load balancing based on link quality. It detects local link quality (for example, congestion status) and preferentially selects high-quality links as packet forwarding paths to achieve better load balancing.
Credit-based Flow Control (CFC) is a technology that implements flow control based on proactive credit authorization. CFC establishes a credit authorization mechanism between the sender and receiver to ensure that the sender does not send data that exceeds the buffer capability of the receiver, preventing buffer overflow on the receiver.
Compute-network collaboration is a technology that synchronizes QoS configurations on the server side with those on the network side to simplify configurations and ensure QoS configuration consistency across the entire network.
All Topics
Alphabetical
By Category
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
0-9
- AAA
- Access Point
- ACL
- Adaptive Forward Error Correction
- Adaptive Routing
- Adaptive Routing Tuning
- Advanced Persistent Threat
- AFR
- AI ECN
- AI Firewall
- AIOps
- Air Interface Slicing
- AI Roaming
- All-Optical Ethernet Switch
- Antivirus
- API Gateway
- APN6
- Application Identification
- APS Protection
- AQM
- ARP
- Autonomous Driving Network
- Campus energy-saving
- CASB
- Cellular
- CFC
- Channelized Sub-interface
- Channel Utilization
- CloudCampus
- CloudFabric
- CloudFabric N1 Business Model
- Cloud Managed Network
- CloudWAN
- Combined RF Power
- Command and Control
- Compute-Network Collaboration
- Computer Virus
- Computing efficiency
- Computing network
- Computing-network integration
- Converged Scheduling
- CoSR
- CPCAR
- CPOS
- CRC
- Cryptocurrency Mining
- CSC
- CSI Sensing
- CSRF
- CSS
- CVE
- Cybersecurity
- DAI
- Data center
- Data Center
- Data compression
- DCB
- DCI
- DDoS Attack
- Deception Technology
- DGA
- DHCP
- DHCP-based deployment
- DHCP Snooping
- Digital Transformation
- DLDP
- DLP
- DNS
- DNS Filtering
- Docker Container
- DPCF
- DPFR
- Dragonfly Adaptive Routing
- DSVPN
- Dual Fed and Selective Receiving
- EAI
- ECA
- Edge Computing
- Edge Computing IoT
- EDR
- Email-based deployment
- eMDI
- Endpoint Security
- eNSP Pro
- ERPS
- Ethernet
- Eth-Trunk
- EVA
- EVPN
- Experience assurance
- Feature software package
- FHC
- File Blocking
- Financial WAN Data Redundancy Elimination
- Firewall
- Flex-Algo
- FlexE
- Free Mobility
- FWaaS
- HACA
- Hot swapping
- HQoS
- HSR
- HTTP/2
- HVPN
- Hybrid Cable
- Hybrid Cloud
- Hyper-Converged Data Center Network
- ICMP
- iConnect
- iCSSR
- IFIT
- iFlow
- IGMP
- IGMP Snooping
- IIoT
- Industrial Internet
- iNOF
- Intelligent Cloud-Network
- Intelligent Lossless Network
- Intelligent network O&M
- Intelligent Traffic Analysis
- Intelligent Traffic Policing
- Intelligent traffic steering
- Intelligent Wind Power Network
- Inter-AS Bandwidth Pooling
- Intra-AS bandwidth pooling
- IOAM
- IoT Aware Network
- IP-based production and broadcasting network
- iPCA2.0
- IPoE
- IP Private Line
- IPRAN
- IP routing
- IPS
- IPsec
- IPSG
- IPv4
- IPv6
- IPv6 Enhanced
- IPv6 Private Network
- iReliable
- IS-IS
- ISP link selection
- ISSU
- MACsec
- Malware
- MCE
- MD-CLI
- MFA
- Microsegmentation
- MIMO
- Mirroring
- MITM
- M-LAG
- MPLS
- MTN
- MTU
- Multicast
- Multi-fed and selective receiving
- Multi-Gigabit Ethernet
- MU-MIMO
- MUX-VPN
- NAC
- NAT
- NAT66
- NETCONF
- NetStream
- Network digital map
- Network Gateway
- Network Programming
- Network-Security Convergence
- Network Slicing
- NFV
- NGFW
- NoF
- NoF+
- NPCC
- NQA
- NSLB
- NSR
- NTA
- NTP
- OAS
- ODN
- OFDMA
- OLC
- OpenFlow
- OpenStack
- OPS
- Optical module channel loss resistance
- Orthogonal Architecture
- OSPF
- Overlay network
- OWE
- Packet Event
- PAM4
- Password security
- PCEP
- PFC
- Phishing
- PIM
- PKI
- PLC-IoT
- Plug-and-Play
- PoE
- Policy Association
- PON
- Port Security
- PPP
- PPPoE
- Private Cloud
- PROFINET
- Public Cloud
- SAC
- SafeSearch
- Sandboxing
- SASE
- SBFD
- SD-Branch
- SDN
- SD-WAN
- SD-WAN EVPN
- Secure Router
- Security Policy
- Segment Routing
- Service Telemetry
- SFC
- sFlow
- Simulation and verification
- Situational Awareness
- Smart access
- Smart Antenna
- Smart DNS
- Smart policy routing
- Smart Upgrade
- SNMP
- SNR
- SOAR
- SOC
- Social Engineering
- Solar System architecture
- SPFC
- SPN
- SPN FGU
- Spyware
- SQL Injection
- SR-MPLS
- SR-TP tunnel
- SRv6
- SSE
- SSH
- SSID
- SSL
- SSL-Encrypted Traffic Detection
- SSL Offloading
- SSL VPN
- SSO
- Stacking
- StarryLink optical module
- STP
- STP loop protection
- STUN
- Super VLAN
- SWG
- Switch
- SYN Flood
- SZTP
- TACACS
- Telemetry
- Terminal Anti-Spoofing
- Terminal Identification
- Traffic policy
- Transparent DNS proxy
- Trojan Horse
- TSN
- VCMP
- VDC
- VDSL
- VIP Lane
- Virtual router
- Virtual System
- VLAN
- VLAN Mapping
- Voice VLAN
- VPC
- VPN
- VRRP
- Vulnerability Scanning
- VXLAN