Home Search Center Intelligent Model Selection IP Encyclopedia
Top Searches Refresh
CRC
Cyclic redundancy check (CRC) is a common data transmission error detection technique commonly used in the data communication field. The transmit end calculates a check code for the data in a data frame based on a certain algorithm, appends the check code to the data frame, and sends the data frame to the receive end. The receive end verifies the correctness and integrity of the received data by repeating the calculation using the same algorithm.
51.8k
WiFi 7 (Wi-Fi 7) is the next-generation Wi-Fi standard to be launched, also known as IEEE 802.11be — extremely high throughput (EHT). Based on Wi-Fi 6, Wi-Fi 7 introduces technologies such as 320 MHz bandwidth, 4096-quadrature amplitude modulation (QAM), multiple resource unit (MRU), multi-link operation (MLO), and multi-access point (AP) coordination. Drawing on these cutting-edge technologies, Wi-Fi 7 delivers a higher data transmission rates and lower latency than Wi-Fi 6. Wi-Fi 7 is expected to support a throughput of up to 23 Gbps, about three times that of Wi-Fi 6.
51.1k
QAM
Quadrature amplitude modulation (QAM) is an advanced modulation scheme widely used in Wi-Fi communication systems. It combines phase modulation and amplitude modulation.
49.4k
Segment Routing IPv6 (SRv6) is a next-generation IP bearer protocol that combines Segment Routing (SR) and IPv6. Utilizing existing IPv6 forwarding technology, SRv6 implements network programming through flexible IPv6 extension headers. SRv6 reduces the number of required protocol types, offers great extensibility and programmability, and meets the diversified requirements of more new services. It also provides high reliability and offers exciting cloud service application potential.
39.2k
VXLAN, or Virtual Extensible LAN, is a network virtualization technology widely used on large Layer 2 networks. VXLAN establishes a logical tunnel between the source and destination network devices, through which it uses MAC-in-UDP encapsulation for packets. Specifically, it encapsulates original Ethernet frames sent by a VM into UDP packets. It then encapsulates the UDP packets with the IP header and Ethernet header of the physical network as outer headers, enabling these packets to be routed across the network like common IP packets. This frees VMs on the Layer 2 network from the structural limitations of the Layer 2 and Layer 3 networks.
39.1k
Internet Protocol Security (IPsec) is a suite of protocols and services that provide security for IP networks. It is a widely used virtual private network (VPN) technology. IP packets lack effective security mechanisms and may be forged, stolen, or tampered with when being transmitted on a public network, such as the Internet. To solve this problem, the communicating parties establish an IPsec tunnel for encrypted transmission of IP packets. This ensures secure transmission of IP packets on an insecure network, such as the Internet.
38.4k
Telemetry is a next-generation network monitoring technology used to remotely collect data from devices at high speed. Devices periodically push device information to a collector, providing real-time, high-speed, and accurate network monitoring. To be specific, telemetry organizes data based on YANG models, encodes data in the Google Protocol Buffers (GPB) format, and transmits data through the Google Remote Procedure Call (gRPC) protocol. This improves data collection efficiency and facilitates intelligent interconnection. In traditional technologies, a collector and devices interact in pull mode by alternatively sending requests and responses. In contrast to these technologies, telemetry works in push mode and has the following advantages: - Proactively pushes data, reducing the pressure on devices. - Pushes data periodically in subseconds to avoid data inaccuracy caused by network delay. - Is capable to monitor a large number of network devices, improving network monitoring efficiency.
38.2k
Latest Updates Refresh
What Is EVPN?
EVPN is a next-generation full-service bearer VPN solution. It unifies the control planes for various VPN services and uses BGP extensions to transmit Layer 2 or Layer 3 reachability information, separating the forwarding plane from the control plane. Traditional L2VPN lacks load balancing capabilities and consumes many network resources. EVPN overcomes these drawbacks and introduces IP VPN's advantages of traffic balancing and flexible deployment into the Ethernet. EVPN is widely used for interconnecting Layer 2 networks spanning large data centers. Furthermore, it can carry L3VPN services, thereby reducing protocol complexity.
What Is a Public Cloud? Public Cloud vs. Private Cloud
A public cloud is a cloud service provided by a third-party provider for users through the Internet. Users can access the cloud and enjoy various services, including but not limited to computing, storage, and network services. Public cloud services can be free of charge or charged by usage.
What Is an Access Control List (ACL)? How Is It Used?
ACL
An ACL is a collection of one or more rules. A rule refers to a judgment statement that describes a packet matching condition, which may be a source address, destination address, or port number. An ACL is essentially a rule-based packet filter. Packets matching an ACL are processed based on the policy defined in the ACL.
What is ADN?
Since the birth of Ethernet in 1970s, the network has gone through half a century of development. Now, network has become an inseparable part of our life and work. If we compare a network to a road, information is the car, and car driving relies on various types of guidance information alongside the road. Such guidance information needs to be planned and configured manually. As digital transformation speeds up, service volumes increase explosively, raising higher requirements on network experience, which, however, has gone beyond the limits of manual decision-making and processing capabilities. The question is: Can the network work like an autonomous vehicle to free people's hands?
What Is Intelligent Traffic Steering?
Intelligent traffic steering is a technology that uses intelligent algorithms to dynamically select the optimal path for network traffic. It can dynamically adjust network traffic paths based on the network topology and quality information, reduce network costs, improve network performance and reliability, and improve user experience. It is of great significance for enterprises to build SD-WAN networks.
What Is an NGFW? NGFWs vs. Traditional Firewalls vs. UTMs
The Next Generation Firewall (NGFW) is the next-generation product of traditional stateful firewalls and unified threat management (UTM) devices. In addition to all functions (such as basic packet filtering, stateful inspection, NAT, and VPN) of traditional firewalls, it integrates more advanced security capabilities, such as application and user identification and control and intrusion prevention (IPS). Compared with UTMs, NGFWs have faster processing efficiency and stronger external expansion and association capabilities.
All Topics
Alphabetical By Category
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0-9
    Share link to