Top Searches
Refresh
WiFi 7 (Wi-Fi 7) is the next-generation Wi-Fi standard to be launched, also known as IEEE 802.11be or extremely high throughput (EHT).
Based on Wi-Fi 6, Wi-Fi 7 introduces technologies such as 320 MHz bandwidth, 4096-quadrature amplitude modulation (QAM), multi-resource unit (RU), multi-link operation (MLO), enhanced multi-user multiple-input multiple-output (MU-MIMO), and multi-access point (AP) coordination. Drawing on these cutting-edge technologies, Wi-Fi 7 delivers a higher data transmission rate and lower latency than Wi-Fi 6. Wi-Fi 7 is expected to support a throughput of up to 30 Gbps, about three times that of Wi-Fi 6.
39.3k
Cyclic redundancy check (CRC) is a common data transmission error detection technique commonly used in the data communication field. The transmit end calculates a check code for the data in a data frame based on a certain algorithm, appends the check code to the data frame, and sends the data frame to the receive end. The receive end verifies the correctness and integrity of the received data by repeating the calculation using the same algorithm.
30.8k
Telemetry is a next-generation network monitoring technology used to remotely collect data from devices at high speed. Devices periodically push device information to a collector, providing real-time, high-speed, and accurate network monitoring. To be specific, telemetry organizes data based on YANG models, encodes data in the Google Protocol Buffers (GPB) format, and transmits data through the Google Remote Procedure Call (gRPC) protocol. This improves data collection efficiency and facilitates intelligent interconnection.
In traditional technologies, a collector and devices interact in pull mode by alternatively sending requests and responses. In contrast to these technologies, telemetry works in push mode and has the following advantages:
- Proactively pushes data, reducing the pressure on devices.
- Pushes data periodically in subseconds to avoid data inaccuracy caused by network delay.
- Is capable to monitor a large number of network devices, improving network monitoring efficiency.
29.6k
PPPoE is the point-to-point protocol running over the Ethernet at the link layer. It provides PPPoE connections on the Ethernet, sets up PPP sessions, and encapsulates PPP frames into PPPoE frames. PPPoE connects users to a remote access device, providing cost-effective user access and excellent user access control.
PPPoE supports remote access to multiple user hosts over an Ethernet and provides accounting data for transmission to resolve application issues, such as Internet access charging issues. PPPoE is therefore widely used for carrier network access.
28.1k
Internet Protocol Security (IPsec) is a suite of protocols and services that provide security for IP networks. It is a widely used virtual private network (VPN) technology. IP packets lack effective security mechanisms and may be forged, stolen, or tampered with when being transmitted on a public network, such as the Internet. To solve this problem, the communicating parties establish an IPsec tunnel for encrypted transmission of IP packets. This ensures secure transmission of IP packets on an insecure network, such as the Internet.
27.9k
Segment Routing IPv6 (SRv6) is a next-generation IP bearer protocol that combines Segment Routing (SR) and IPv6. Utilizing existing IPv6 forwarding technology, SRv6 implements network programming through flexible IPv6 extension headers.
SRv6 reduces the number of required protocol types, offers great extensibility and programmability, and meets the diversified requirements of more new services. It also provides high reliability and offers exciting cloud service application potential.
26.7k
Latest Updates
Refresh
2FA is a security method whereby users are required to verify their identities using two forms of identification. Such forms, including the password, fingerprint, SMS verification code, smart card, and biometric recognition, can be combined in different ways. This can improve the security and reliability of user accounts.
Optimized based on traditional radio calibration, 3D radio calibration algorithm can identify complex installation scenarios such as high or blocked AP positions based on RSSI measurement results reported by STAs, and adjust the transmit power and channels accordingly to provide better wireless service experience at these special positions.
A 5G transport network connects a 5G RAN and core network.
To provide the ultra-high bandwidth, ultra-low latency, and flexible and intelligent connection services necessary in 5G application scenarios, the 5G transport network uses a new network architecture and key technologies.
IPv6 Provider Edge (6PE) is a technology that facilitates IPv4-to-IPv6 transition based on Multiprotocol Label Switching (MPLS). 6PE enables isolated IPv6 networks to communicate using MPLS LSPs on an IPv4 MPLS backbone network. It improves the utilization of MPLS network resources without affecting existing services.
6VPE uses IPv4 and MPLS to connect isolated IPv6 networks and provide BGP MPLS VPN services for them. In a 6VPE scenario, customer edges (CEs) use the IPv6 address family, whereas the backbone network devices use the IPv4 address family. The network where 6VPE is deployed uses VPN to logically isolate IPv6 networks connected to it, improving IPv6 network security.
802.11ac is the fifth-generation 802.11 standard and is also known as Wi-Fi 5 (or WiFi 5). Through various technological innovations, 802.11ac achieves a qualitative leap in the wireless transmission rate — from 600 Mbit/s supported in 802.11n to 6.93 Gbit/s, bringing infinite possibilities for more application scenarios that depend on heavy-traffic wireless transmission. Currently, 802.11ac has been widely used in wireless network communication for enterprises and homes, which greatly changes the way we work and live.
All Topics
Alphabetical
By Category
0-9
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
- AAA
- ACL
- Adaptive Forward Error Correction
- Advanced Persistent Threat
- AI ECN
- AI Firewall
- Air Interface Slicing
- AI Roaming
- Antivirus
- API Gateway
- APN6
- Application Identification
- APS Protection
- ARP
- Autonomous Driving Network
- Channelized Sub-interface
- CloudFabric
- CloudFabric N1 Business Model
- Cloud Managed Network
- CloudWAN
- Combined RF Power
- Command and Control
- Computing efficiency
- Computing network
- Computing-network integration
- CoSR
- CPCAR
- CRC
- Cryptocurrency Mining
- CSC
- CSRF
- CSS
- CVE
- DCI
- DDoS Attack
- DHCP
- DHCP-based deployment
- DHCP Snooping
- DLP
- DNS
- Docker Container
- Dual Fed and Selective Receiving
- ICMP
- iConnect
- IFIT
- IIoT
- Industrial Internet
- iNOF
- Intelligent Cloud-Network
- Intelligent Lossless Network
- Intelligent network O&M
- Intelligent Traffic Analysis
- Intelligent traffic steering
- Intent-driven Deployment
- IOAM
- IoT Aware Network
- IP-based production and broadcasting network
- iPCA2.0
- IPoE
- IP Private Line
- IPRAN
- IPS
- IPsec
- IPSG
- IPv6
- IPv6 Enhanced
- IS-IS
- ISSU
- MACsec
- Malware
- MCE
- MD-CLI
- Microsegmentation
- MIMO
- Mirroring
- M-LAG
- MPLS
- MTN
- MTU
- Multicast
- Multi-fed and selective receiving
- MU-MIMO
- MUX-VPN
- NAC
- NAT
- NETCONF
- NetStream
- Network digital map
- Network Programming
- Network Slicing
- NFV
- NGFW
- NoF
- NoF+
- NPCC
- NQA
- NSR
- NTA
- NTP
- PAM4
- PCEP
- PFC
- Phishing
- PLC-IoT
- Plug-and-Play
- PoE
- Policy Association
- PPPoE
- Private Cloud
- Private Line + Managed DCN
- Private Line + Managed LAN
- Private Line + Managed Services
- Private Line + Managed WAN
- Private Line Upgrade
- Public Cloud
- SAC
- SBFD
- SDN
- SD-WAN
- SD-WAN EVPN
- Security Policy
- Segment Routing
- SFC
- sFlow
- Simulation and verification
- Situational Awareness
- Smart Antenna
- Smart policy routing
- Smart Upgrade
- SNMP
- SNR
- SOAR
- SOC
- Social Engineering
- Solar System architecture
- SPN
- SPN FGU
- SR-MPLS
- SR-TP tunnel
- SRv6
- SSH
- SSID
- SSL
- SSL-Encrypted Traffic Detection
- SSL Offloading
- SSL VPN
- SSO
- Stacking
- STP
- STP loop protection
- STUN
- Super VLAN
- SWG
- SYN Flood
- SZTP
- TACACS
- Telemetry
- Terminal Anti-Spoofing
- Terminal Identification
- Traffic policy
- Trojan horse
- Trojan Horse
- WAN Data Redundancy Elimination
- Watering Hole Attack
- Web Filtering
- WiFi
- WiFi 6
- WiFi 6 Advanced
- WiFi 6E
- WiFi 7
- WiFi Roaming
- Wired and Wireless Convergence
- WLAN
- Worm Virus
- WPA3