中文
  • 中文
  • English
What Others Searched for
Wi-Fi 6, also known as 802.11ax, is the latest Wi-Fi industry standard after Wi-Fi 5 (802.11ac). Before the release of Wi-Fi 6, Wi-Fi standards were identified by versions from 802.11b to 802.11ac. Later, the Wi-Fi Alliance decided to make the Wi-Fi standards easier to understand and remember, and therefore renamed them in a manner similar to the different generations like 3G, 4G, and 5G in mobile communications. Wi-Fi 6 introduces various new technologies, such as orthogonal frequency division multiple access (OFDMA), uplink/downlink multi-user multiple-input multiple-output (UL/DL MU-MIMO), BSS coloring, and Target Wake Time, significantly improving performance. In this manner, Wi-Fi 6 supports four times higher bandwidth and concurrency than Wi-Fi 5. Additionally, Wi-Fi 6 provides lower latency and better energy-saving capability than Wi-Fi 5.
Segment Routing IPv6 (SRv6) is a next-generation IP bearer protocol that combines Segment Routing (SR) and IPv6. Utilizing existing IPv6 forwarding technology, SRv6 implements network programming through flexible IPv6 extension headers. SRv6 reduces the number of required protocol types, offers great extensibility and programmability, and meets the diversified requirements of more new services. It also provides high reliability and offers exciting cloud service application potential.
An artificial intelligence (AI) firewall, a next-generation product of a next-generation firewall (NGFW), uses intelligent detection technologies to improve the capability of detecting advanced threats and unknown threats. The NGFW uses a static rule database to detect threats, which is difficult to cope with advanced threats of variants. The AI firewall uses the intelligent detection engine to train threat detection models based on massive samples and continuously optimize the models based on real-time traffic data, improving threat detection capabilities.
EVPN is a next-generation full-service bearer VPN solution. It unifies the control planes for various VPN services and uses BGP extensions to transmit Layer 2 or Layer 3 reachability information, separating the forwarding plane from the control plane. Traditional L2VPN lacks load balancing capabilities and consumes many network resources. EVPN overcomes these drawbacks and introduces IP VPN's advantages of traffic balancing and flexible deployment into the Ethernet. EVPN is widely used for interconnecting Layer 2 networks spanning large data centers. Furthermore, it can carry L3VPN services, thereby reducing protocol complexity.
VXLAN, or Virtual Extensible LAN, is a network virtualization technology widely used on large Layer 2 networks. VXLAN establishes a logical tunnel between the source and destination network devices, through which it uses MAC-in-UDP encapsulation for packets. Specifically, it encapsulates original Ethernet frames sent by a VM into UDP packets. It then encapsulates the UDP packets with the IP header and Ethernet header of the physical network as outer headers, enabling these packets to be routed across the network like common IP packets. This frees VMs on the Layer 2 network from the structural limitations of the Layer 2 and Layer 3 networks.
URL filtering technology controls the Internet access based on user URL requests. It allows or rejects users' access to certain web pages to regulate Internet access behaviors and reduce security risks. URL filtering restricts URL access based on URL categories and specific URLs. URL filtering provides the following functions: 1. Restricts access to business-irrelevant websites, improving enterprise employee productivity and reducing bandwidth abuse. 2. Restricts access to the websites that contain illegal or inappropriate content to ensure legal and compliant online behavior. 3. Restricts access to insecure websites containing malware and phishing to prevent network attacks.
NAT
NAT translates the IP address in the IP datagram header of a packet into another IP address and translates the port number to make the IP address reusable. As a transition technology that alleviates public IPv4 address exhaustion, NAT is easy to implement and therefore widely used.
Worth Reading
What Is VXLAN? A Mainstream Tunneling Technology
VXLAN, or Virtual Extensible LAN, is a network virtualization technology widely used on large Layer 2 networks. VXLAN establishes a logical tunnel between the source and destination network devices, through which it uses MAC-in-UDP encapsulation for packets. Specifically, it encapsulates original Ethernet frames sent by a VM into UDP packets. It then encapsulates the UDP packets with the IP header and Ethernet header of the physical network as outer headers, enabling these packets to be routed across the network like common IP packets. This frees VMs on the Layer 2 network from the structural limitations of the Layer 2 and Layer 3 networks.
What is NFV, what is its use, and how are NFV and SDN different?
NFV
Network functions virtualization (NFV) is a network architecture concept. Traditional network devices, such as routers, switches, firewalls, and load balancers, have their own hardware and software systems. Different from traditional devices, x86-based servers provide network functions after corresponding operating systems and software are installed. NFV uses the same architecture as that of x86-based servers. It decouples network functions from hardware, and instantiates them as independent software to run on general-purpose hardware.
What is IPsec? How doe IPsec work?
Internet Protocol Security (IPsec) is a suite of protocols and services that provide security for IP networks. It is a widely used virtual private network (VPN) technology. IP packets lack effective security mechanisms and may be forged, stolen, or tampered with when being transmitted on a public network, such as the Internet. To solve this problem, the communicating parties establish an IPsec tunnel for encrypted transmission of IP packets. This ensures secure transmission of IP packets on an insecure network, such as the Internet.
What Is Wi-Fi? What Is the Difference Between Wi-Fi and WLAN?
WiFi, also known as Wi-Fi, is a trademark owned by the Wi-Fi Alliance (WFA). It is a WLAN technology based on the IEEE 802.11 family of standards. Since the release of the first-generation IEEE 802.11 standard in 1997, it has been evolved to the latest 6th-generation 802.11ax standard (Wi-Fi 6). Before the release of Wi-Fi 6, Wi-Fi standards were identified by versions from 802.11b to 802.11ac. Later, the WFA decided to make the Wi-Fi standards easier to understand and remember for Wi-Fi users and device vendors, and therefore renamed the standards using generational numbering.
What Is Edge Computing IoT?
IoT is developing rapidly and advancing towards the Internet of Everything (IoE). In the fully connected era, the surge in the number of device connections and amount of IoT data has spurred the development of edge computing technology. Edge Computing IoT innovatively brings the edge computing architecture to the IoT field, and provides data processing, storage, and application at the edge close to things. It addresses the "last mile" issue of IoT communication and implements smart connection and efficient management of IoT devices.
What Is Cloud Managed Network? Why Cloud-based Network Management?
A cloud managed network is a network that is managed from the cloud. It represents an innovative network management mode that utilizes the cloud management platform to manage and monitor network devices and service experience based on emerging technologies such as big data, artificial intelligence, and cloud computing. Huawei Cloud Managed Network Solution is implemented based on the CloudCampus cloud management platform on the Huawei public cloud. With this solution, cloud managed devices such as APs, switches, routers, and firewalls are managed on the cloud, allowing for fast deployment and centralized management of networks for Small and Medium-Sized Businesses (SMBs) and multi-branch organizations. The entire lifecycle of the network can be managed on the cloud, encompassing procurement, planning, provisioning, deployment, O&M, and operation phases.
All Topics
Alphabetical By Category