Search
Home Search Center IP Encyclopedia Online Courses Intelligent Model Selection
Top Searches Refresh
QAM
Quadrature amplitude modulation (QAM) is an advanced modulation scheme widely used in Wi-Fi communication systems. It combines phase modulation and amplitude modulation.
83.0k
IPoE is an access authentication technology that enables a user to access a network after dynamically obtaining an IP address through Dynamic Host Configuration Protocol (DHCP). It provides a flexible and efficient access control mode. User terminals can access the network without needing to install dedicated client software. IPoE is applicable to access of various network devices, such as smartphones, digital TVs, and PSPs. The simple and fast access provided by IPoE reduces the maintenance workload of clients and facilitates the expansion of carrier services on authentication pages, such as advertisement pushes, slogan promotions, and relevant announcements. IPoE access is widely used on networks of chain hotels, campuses, railway stations, and more.
76.6k
CRC
Cyclic redundancy check (CRC) is a common data transmission error detection technique commonly used in the data communication field. The transmit end calculates a check code for the data in a data frame based on a certain algorithm, appends the check code to the data frame, and sends the data frame to the receive end. The receive end verifies the correctness and integrity of the received data by repeating the calculation using the same algorithm.
75.7k
BFD
Bidirectional Forwarding Detection (BFD) is a fast fault detection mechanism based on RFC 5880. After a BFD session is established between two systems, BFD packets are periodically sent over the path between the two systems. If one system does not receive BFD packets within a specified period, a fault has occurred on the path. After detecting the link fault through BFD, the upper-layer protocol can take measures to promptly rectify the fault.
74.2k
WiFi 7 (Wi-Fi 7) is the next-generation Wi-Fi standard to be launched, also known as IEEE 802.11be — extremely high throughput (EHT). Based on Wi-Fi 6, Wi-Fi 7 introduces technologies such as 320 MHz bandwidth, 4096-quadrature amplitude modulation (QAM), multiple resource unit (MRU), and multi-link operation (MLO). Drawing on these cutting-edge technologies, Wi-Fi 7 delivers a higher data transmission rates and lower latency than Wi-Fi 6. Wi-Fi 7 is expected to support a throughput of up to 23 Gbps, about three times that of Wi-Fi 6.
69.9k
VXLAN, or Virtual Extensible LAN, is a network virtualization technology widely used on large Layer 2 networks. VXLAN establishes a logical tunnel between the source and destination network devices, through which it uses MAC-in-UDP encapsulation for packets. Specifically, it encapsulates original Ethernet frames sent by a VM into UDP packets. It then encapsulates the UDP packets with the IP header and Ethernet header of the physical network as outer headers, enabling these packets to be routed across the network like common IP packets. This frees VMs on the Layer 2 network from the structural limitations of the Layer 2 and Layer 3 networks.
69.4k
Segment Routing IPv6 (SRv6) is a next-generation IP bearer protocol that combines Segment Routing (SR) and IPv6. Utilizing existing IPv6 forwarding technology, SRv6 implements network programming through flexible IPv6 extension headers. SRv6 reduces the number of required protocol types, offers great extensibility and programmability, and meets the diversified requirements of more new services. It also provides high reliability and offers exciting cloud service application potential.
67.4k
Latest Updates Refresh
What is IPsec? How doe IPsec work?
Internet Protocol Security (IPsec) is a suite of protocols and services that provide security for IP networks. It is a widely used virtual private network (VPN) technology. IP packets lack effective security mechanisms and may be forged, stolen, or tampered with when being transmitted on a public network, such as the Internet. To solve this problem, the communicating parties establish an IPsec tunnel for encrypted transmission of IP packets. This ensures secure transmission of IP packets on an insecure network, such as the Internet.
What Is URL Filtering? How Does URL Filtering Work?
URL filtering technology controls the Internet access based on user URL requests. It allows or rejects users' access to certain web pages to regulate Internet access behaviors and reduce security risks. URL filtering restricts URL access based on URL categories and specific URLs. URL filtering provides the following functions: 1. Restricts access to business-irrelevant websites, improving enterprise employee productivity and reducing bandwidth abuse. 2. Restricts access to the websites that contain illegal or inappropriate content to ensure legal and compliant online behavior. 3. Restricts access to insecure websites containing malware and phishing to prevent network attacks.
What Is Web Filtering? What Is Web Filtering on a Firewall?
Web filtering technology controls users' web access, involving the control over which websites users can access, what content users can view, and which files users can download. For example, a system can prevent users' access to gambling websites, filter out web pages containing illegal content, and control search engines to filter out inappropriate search results. Web filtering can restrict access to work-irrelevant websites to improve productivity and regulate online behaviors of employees in enterprises. It also acts as the first line of defense against web threats to prevent users from accessing malicious websites or downloading malicious files. Web filtering is the most commonly used web access control measure for enterprises and organizations.
What Is DNS Filtering? Why Do We Need DNS Filtering?
DNS filtering implements access control based on domain names in DNS request packets to allow or prohibit users' access to certain websites, regulating users' online behaviors. DNS filtering classifies domain names based on the DNS blacklist/whitelist and DNS category to block access to unauthorized domain names and permit access to authorized domain names.
What Is ZTP? Why Do We Need ZTP?
ZTP
Zero Touch Provisioning (ZTP) allows newly delivered or unconfigured devices to automatically load deployment files upon power-on, including system software, patch files, and configuration files. ZTP also enables devices to automatically obtain and load deployment files, without requiring onsite manual intervention in device deployment and configuration. As such, ZTP reduces labor costs and improves deployment efficiency.
What Is Priority-based Flow Control (PFC)?
PFC
The meaning of PFC is Priority-based Flow Control. It is the most widely used flow control technology that can effectively prevent packet loss and serve as the basis for intelligent lossless networks. A PFC-enabled queue is a lossless queue. When congestion occurs in such a queue on a downstream device, the downstream device instructs the upstream device to stop sending traffic in the queue, implementing zero packet loss.
All Topics
Alphabetical By Category
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0-9
    Share link to