Abstract:
A communication method includes generating a first sequence, where the first sequence is based on a complete complementary code set, the complete complementary code set is based on a Golay pair and a Hadamard matrix through a Kronecker product operation, and the first sequence is used for channel estimation; and sending the first sequence. In the method, use of a P-matrix is avoided in a process of constructing a plurality of streams of zero correlation sequences.
Abstract:
A loop avoidance method, device and system. The system includes a first network device and a second network device in an internal network, a first Ethernet port and a second Ethernet port of the two network devices are of a first type, and loop avoidance priorities of the Ethernet ports are different from each other; root media access control (MAC) addresses of the two network devices are the same, and are different from respective network bridge MAC addresses; the second network device receives a loop detection frame from the first Ethernet port through the second Ethernet port, where a source address of the loop detection frame is the root MAC address, and blocks the second Ethernet port according to the loop avoidance priority. A network device blocks, according to a loop avoidance priority, an Ethernet port connected to an external network to avoid changing a topology of an internal network.
Abstract:
A loop avoidance method, device and system. The system includes a first network device and a second network device in an internal network, a first Ethernet port and a second Ethernet port of the two network devices are of a first type, and loop avoidance priorities of the Ethernet ports are different from each other; root media access control (MAC) addresses of the two network devices are the same, and are different from respective network bridge MAC addresses; the second network device receives a loop detection frame from the first Ethernet port through the second Ethernet port, where a source address of the loop detection frame is the root MAC address, and blocks the second Ethernet port according to the loop avoidance priority. A network device blocks, according to a loop avoidance priority, an Ethernet port connected to an external network to avoid changing a topology of an internal network.
Abstract:
This application relates to the field of communications technologies, and discloses a data transmission method. The method includes: generating a PPDU; and transmitting the PPDU to at least one receive end. The PPDU includes a channel estimation field CEF, and the CEF includes a plurality of sub-sequences. For each of the plurality of sub-sequences, a part or all of elements in the sub-sequence are basic elements, and the basic elements are arranged into a Golay sequence or a ZC sequence in the sub-sequence. This application is used for data transmission.
Abstract:
A method includes sending, by a communication apparatus, configuration information. The configuration information includes a quantity of cyclic shift positions that corresponds to each device, the quantity of cyclic shift positions is used to cyclically shift a perfect sequence, and quantities that are of cyclic shift positions and that correspond to devices used for completing different services are different. The method is applied to an ultra-wideband (UWB)-based wireless personal local area network system, a sensing system, and the like, including 802.15 series protocols, such as an 802.15.4a protocol, an 802.15.4z protocol, or an 802.15.4ab protocol. The method is further applied to a wireless local area network system that can support a next-generation WI-FI protocol of 802.11ax, such as 802.11be, Wi-Fi 7, or extremely high-throughput (EHT), and 802.11 series protocols, such as a next generation of 802.11be or WI-FI 8.
Abstract:
This application discloses a method including a transmit end that generates and sends a physical layer protocol data unit (PPDU), and a receive end that receives the PPDU and parses the PPDU. An enhanced directional multi-gigabit (EDMG) modulation field in the PPDU includes a channel estimation field (CEF), the CEF includes a CEF sequence, and a length of the CEF sequence is m, where m is determined based on a quantity of bonding channels and a quantity of subcarriers included on a channel. When a discrete Fourier transform-spread-orthogonal frequency division multiplexing (DFT-S-OFDM) technology is introduced into a 60 GHz WLAN standard, an applied CEF sequence included in a CEF can be determined, and DFT-S-OFDM transmission is further performed by using the CEF sequence. In this way, a PAPR of a WLAN system can be reduced while frequency division multiplexing for a plurality of users is supported.
Abstract:
In this application, a manner of generating a modulated field STF is enriched, so that a manner of generating a PPDU is enriched, thereby improving data transmission flexibility. The method includes: After generating a PPDU, a transmit end sends the PPDU to at least one receive end, where the PPDU includes at least one modulated field STF, the modulated field STF includes a plurality of zero elements and a plurality of non-zero elements, m1 zero elements are included before a first non-zero element, m2 zero elements are included after a last non-zero element, m1+m2 zero elements are included between any two adjacent non-zero elements, m1 and m2 both are positive integers, and the modulated field STF is mapped to a plurality of consecutive subcarriers for transmission. This application is used for data transmission.
Abstract:
A processing method and apparatus for preventing a packet attack. A network protocol negotiation status of a port of a network device is monitored; a port that succeeds in network protocol negotiation is set to a trusted port, a protocol packet is selected, according to a first access control list (ACL), from packets received by the trusted port, and a rate at which the protocol packet is sent to a central processing unit (CPU) is limited to a first committed access rate (CAR); a port that fails in network protocol negotiation is set to an untrusted port, a protocol packet is selected, according to a second ACL, from packets received by the untrusted port, and a rate at which the protocol packet is sent to the CPU is limited to a second CAR. Configuration accuracy of the trusted port and the untrusted port is improved, and packet attack is prevented.
Abstract:
A network service configuration method and a network management device, where the method includes obtaining, by a network management device, a terminal access port and an access parameter that is configured for the terminal access port and that is of a network service, determining a to-be-configured port according to the access parameter that is configured for the terminal access port and that is of the network service; generating a configuration instruction of the to-be-configured port, and sending the configuration instruction of the to-be-configured port to a to-be-configured network device. Hence, intervention from an administrator is not required, an error probability of network operation and maintenance may be reduced, efficiency of configuring a parameter of the network service is improved, and administrator time is saved.
Abstract:
A network service configuration method and a network management device, where the method includes obtaining, by a network management device, a terminal access port and an access parameter that is configured for the terminal access port and that is of a network service, determining a to-be-configured port according to the access parameter that is configured for the terminal access port and that is of the network service; generating a configuration instruction of the to-be-configured port, and sending the configuration instruction of the to-be-configured port to a to-be-configured network device. Hence, intervention from an administrator is not required, an error probability of network operation and maintenance may be reduced, efficiency of configuring a parameter of the network service is improved, and administrator time is saved.