Top Searches
Refresh
Cyclic redundancy check (CRC) is a common data transmission error detection technique commonly used in the data communication field. The transmit end calculates a check code for the data in a data frame based on a certain algorithm, appends the check code to the data frame, and sends the data frame to the receive end. The receive end verifies the correctness and integrity of the received data by repeating the calculation using the same algorithm.
67.7k
WiFi 7 (Wi-Fi 7) is the next-generation Wi-Fi standard to be launched, also known as IEEE 802.11be — extremely high throughput (EHT).
Based on Wi-Fi 6, Wi-Fi 7 introduces technologies such as 320 MHz bandwidth, 4096-quadrature amplitude modulation (QAM), multiple resource unit (MRU), and multi-link operation (MLO). Drawing on these cutting-edge technologies, Wi-Fi 7 delivers a higher data transmission rates and lower latency than Wi-Fi 6. Wi-Fi 7 is expected to support a throughput of up to 23 Gbps, about three times that of Wi-Fi 6.
64.1k
Bidirectional Forwarding Detection (BFD) is a fast fault detection mechanism based on RFC 5880. After a BFD session is established between two systems, BFD packets are periodically sent over the path between the two systems. If one system does not receive BFD packets within a specified period, a fault has occurred on the path. After detecting the link fault through BFD, the upper-layer protocol can take measures to promptly rectify the fault.
61.4k
VXLAN, or Virtual Extensible LAN, is a network virtualization technology widely used on large Layer 2 networks. VXLAN establishes a logical tunnel between the source and destination network devices, through which it uses MAC-in-UDP encapsulation for packets. Specifically, it encapsulates original Ethernet frames sent by a VM into UDP packets. It then encapsulates the UDP packets with the IP header and Ethernet header of the physical network as outer headers, enabling these packets to be routed across the network like common IP packets. This frees VMs on the Layer 2 network from the structural limitations of the Layer 2 and Layer 3 networks.
60.3k
IPoE is an access authentication technology that enables a user to access a network after dynamically obtaining an IP address through Dynamic Host Configuration Protocol (DHCP). It provides a flexible and efficient access control mode. User terminals can access the network without needing to install dedicated client software. IPoE is applicable to access of various network devices, such as smartphones, digital TVs, and PSPs.
The simple and fast access provided by IPoE reduces the maintenance workload of clients and facilitates the expansion of carrier services on authentication pages, such as advertisement pushes, slogan promotions, and relevant announcements. IPoE access is widely used on networks of chain hotels, campuses, railway stations, and more.
60.3k
Segment Routing IPv6 (SRv6) is a next-generation IP bearer protocol that combines Segment Routing (SR) and IPv6. Utilizing existing IPv6 forwarding technology, SRv6 implements network programming through flexible IPv6 extension headers.
SRv6 reduces the number of required protocol types, offers great extensibility and programmability, and meets the diversified requirements of more new services. It also provides high reliability and offers exciting cloud service application potential.
57.8k
Latest Updates
Refresh
A channelized sub-interface is a sub-interface of an Ethernet physical interface with channelization enabled. Different channelized sub-interfaces are used to carry different types of services, and bandwidths are configured based on channelized sub-interfaces to implement strict bandwidth isolation between different channelized sub-interfaces on the same physical interface. This prevents services on different sub-interfaces from preempting each other's bandwidths. Channelized sub-interfaces are used to reserve resources in a network slicing solution. An independent "lane" is planned for each network slice, and "lanes" cannot be changed during transmission of different network slices' service traffic. This ensures strict isolation of services on different slices, and effectively prevents resource preemption between services when traffic bursts occur.
In AI cluster training, optical module failure is one of the major causes of training interruptions. To address this issue, Huawei launches the optical module channel loss resistance technology. When a single channel of an optical module is faulty, the computing network collaborates to reduce the rate, ensuring uninterrupted AI training.
PPPoE is the point-to-point protocol running over the Ethernet at the link layer. It provides PPPoE connections on the Ethernet, sets up PPP sessions, and encapsulates PPP frames into PPPoE frames. PPPoE connects users to a remote access device, providing cost-effective user access and excellent user access control.
PPPoE supports remote access to multiple user hosts over an Ethernet and provides accounting data (such as the number of incoming and outgoing packets, number of bytes, start time, and end time of a connection) for transmission. This helps resolve issues, such as Internet access charging. PPPoE is widely applied for carrier network access.
IPv4, as the fourth version of the Internet Protocol (IP), serves as one of the widely used Internet protocols to provide the foundational framework for Internet communication.
IPv4 uses 32-bit IPv4 addresses to uniquely identify and locate devices, ensuring that data packets are correctly forwarded from one device to another. It provides basic network connection and communication capabilities for devices. However, the limited IPv4 address space has become a serious issue due to the rapid development of the Internet, leading to the emergence and growth of IPv6.
Secure Access Service Edge (SASE) is a cloud architecture model that integrates software-defined wide area network (SD-WAN) with security functions such as secure web gateway (SWG), cloud access security broker (CASB), firewall as a service (FWaaS), and zero trust network access (ZTNA) into one holistic service. The core principle of SASE is to deliver this service to connection sources such as users, systems, endpoints, and remote networks over an integrated cloud platform, instead of relying on the traditional data center architecture.
The SASE architecture implements seamless network-security integration and provides a more flexible, efficient, and secure network access solution for enterprises. It enables enterprises to manage distributed network resources and security policies more effectively so that users can enjoy secure and efficient network access wherever they are.
Firewall as a Service (FWaaS) is a new application mode in the cloud computing and cyber security field. Compared with the conventional firewall, which is deployed locally, FWaaS signifies a shift towards cloud-based firewall services. Leveraging FWaaS, users can easily create, manage, and use firewalls on the cloud service provider's platform without having to deploy and maintain hardware locally. Users can configure and monitor firewalls through the web UI or application programming interfaces (APIs). This service mode provides a more flexible, scalable, and easy-to-manage cybersecurity solution for organizations to effectively cope with the ever-changing cyber threats and service requirements.
All Topics
Alphabetical
By Category
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
0-9
- AAA
- Access Point
- ACL
- Adaptive Forward Error Correction
- Adaptive Routing
- Advanced Persistent Threat
- AI ECN
- AI Firewall
- AIOps
- Air Interface Slicing
- AI Roaming
- Antivirus
- API Gateway
- APN6
- Application Identification
- APS Protection
- AQM
- ARP
- Autonomous Driving Network
- Channelized Sub-interface
- Channel Utilization
- CloudFabric
- CloudFabric N1 Business Model
- Cloud Managed Network
- CloudWAN
- Combined RF Power
- Command and Control
- Computer Virus
- Computing efficiency
- Computing network
- Computing-network integration
- Converged Scheduling
- CoSR
- CPCAR
- CRC
- Cryptocurrency Mining
- CSC
- CSRF
- CSS
- CVE
- Cybersecurity
- Data center
- DCI
- DDoS Attack
- Deception Technology
- DGA
- DHCP
- DHCP-based deployment
- DHCP Snooping
- Digital Transformation
- DLP
- DNS
- DNS Filtering
- Docker Container
- DPCF
- DPFR
- Dragonfly Adaptive Routing
- DSVPN
- Dual Fed and Selective Receiving
- EAI
- ECA
- Edge Computing
- Edge Computing IoT
- EDR
- Email-based deployment
- eMDI
- Endpoint Security
- Ethernet
- Eth-Trunk
- EVA
- EVPN
- Feature software package
- File Blocking
- Financial WAN Data Redundancy Elimination
- Firewall
- Flex-Algo
- FlexE
- Free Mobility
- FWaaS
- HACA
- Hot swapping
- HQoS
- HSR
- HTTP/2
- HVPN
- Hybrid Cable
- Hybrid Cloud
- Hyper-Converged Data Center Network
- ICMP
- iConnect
- IFIT
- IIoT
- Industrial Internet
- iNOF
- Intelligent Cloud-Network
- Intelligent Lossless Network
- Intelligent network O&M
- Intelligent Traffic Analysis
- Intelligent traffic steering
- Intelligent Wind Power Network
- Intent-driven Deployment
- IOAM
- IoT Aware Network
- IP-based production and broadcasting network
- iPCA2.0
- IPoE
- IP Private Line
- IPRAN
- IP routing
- IPS
- IPsec
- IPSG
- IPv4
- IPv6
- IPv6 Enhanced
- IPv6 Private Network
- IS-IS
- ISP link selection
- ISSU
- MACsec
- Malware
- MCE
- MD-CLI
- MFA
- Microsegmentation
- MIMO
- Mirroring
- MITM
- M-LAG
- MPLS
- MTN
- MTU
- Multicast
- Multi-fed and selective receiving
- Multi-Gigabit Ethernet
- MU-MIMO
- MUX-VPN
- NAC
- NAT
- NAT66
- NETCONF
- NetStream
- Network digital map
- Network Gateway
- Network Programming
- Network Slicing
- NFV
- NGFW
- NoF
- NoF+
- NPCC
- NQA
- NSLB
- NSR
- NTA
- NTP
- OAS
- ODN
- OFDMA
- OLC
- OpenFlow
- OpenStack
- OPS
- Optical module channel loss resistance
- Orthogonal Architecture
- OSPF
- Overlay network
- OWE
- PAM4
- Password security
- PCEP
- PFC
- Phishing
- PLC-IoT
- Plug-and-Play
- PoE
- Policy Association
- Port Security
- PPPoE
- Private Cloud
- PROFINET
- Public Cloud
- SAC
- SafeSearch
- Sandboxing
- SASE
- SBFD
- SD-Branch
- SDN
- SD-WAN
- SD-WAN EVPN
- Security Policy
- Segment Routing
- Service Telemetry
- SFC
- sFlow
- Simulation and verification
- Situational Awareness
- Smart Antenna
- Smart DNS
- Smart policy routing
- Smart Upgrade
- SNMP
- SNR
- SOAR
- SOC
- Social Engineering
- Solar System architecture
- SPN
- SPN FGU
- Spyware
- SQL Injection
- SR-MPLS
- SR-TP tunnel
- SRv6
- SSE
- SSH
- SSID
- SSL
- SSL-Encrypted Traffic Detection
- SSL Offloading
- SSL VPN
- SSO
- Stacking
- STP
- STP loop protection
- STUN
- Super VLAN
- SWG
- Switch
- SYN Flood
- SZTP