Ask the Experts
Ask the Experts
-
What's the difference between a router, switch and hub?
Although a router, switch and hub all help direct network traffic, the devices transmit packets in different ways. Discover the differences among these network devices. Continue Reading
-
What's the difference between an edge router vs. core router?
Clearly, an edge router and core router are placed in different parts of the network, but their routing roles are more complex than their physical locations. Continue Reading
-
Will 5G networks require new network engineer skills?
The 5G network will likely affect network engineer skills in areas such as security, physical appliances and software. But enterprise teams won't see too much change, for now. Continue Reading
-
What are private 5G networks and could they emerge as a major trend?
In some network environments, businesses may need broader connection options for devices and automation. Private 5G networks, at some point, might be the answer. Continue Reading
-
What is network traffic analytics and how does it enhance security?
Network traffic analysis has evolved to incorporate machine learning techniques that help identify network security threats in real time and expedite a response. Continue Reading
-
What are the advantages and disadvantages of CLI and GUI?
An old-fashioned command-line interface still has some advantages over its counterpart, the graphical user interface, when managing network devices. See how CLI and GUI stack up. Continue Reading
-
Fog computing vs. edge computing: What's the difference?
Fog computing vs. edge computing -- while many IT professionals use the terms synonymously, others make subtle but important distinctions between them. Continue Reading
-
SD-WAN with IoT enables the enhanced network edge
In a world teeming with IoT devices -- and the resulting data -- SD-WAN and SD-branch can provide the security, visibility and connectivity the IoT edge requires. Continue Reading
-
What are the 5 types of network firewalls and how are they different?
As they monitor and filter network traffic, some firewalls can provide some pretty advanced security controls. But added packet inspection can slow network performance. Continue Reading
-
What is a programmable data plane and where does P4 fit in?
A programmable data plane presents a versatile way to forward packets and supports various formats and protocols. The P4 language is used to configure the forwarding actions. Continue Reading
-
What is Cisco Smart Licensing and how might it benefit my business?
Cisco Smart Licensing, the networking vendor's fairly new approach to software licensing, aims to provide customers with more visibility and control over their licenses. Continue Reading
-
When will enterprises adopt the new Wi-Fi 6 standard?
Networking vendors have unveiled Wi-Fi 6 devices, yet the wireless standard is not ratified. Don't expect Wi-Fi 6 to flow into the mainstream anytime soon. Continue Reading
-
What is the purpose of an SD-WAN gateway?
Software-defined WAN architecture has adapted with the growth of cloud services, resulting in a cloud-based model that uses SD-WAN gateways to handle traffic and control. Continue Reading
-
Which 802.11ax features support IoT adoption?
A handful of key 802.11ax features could help accelerate widespread internet-of-things adoption, according to networking experts familiar with the new standard. Continue Reading
-
How are automated network configuration and management changing?
Could a new generation of network testing and verification tools combine with automated network configuration to mimic intent-based networking systems? Continue Reading
-
What tools can reinforce network edge security?
Firewalls, intrusion prevention systems and cloud-based threat intelligence are just a few of the many ways that organizations can bolster network edge security. Continue Reading
-
What is the network edge and how is it different from edge computing?
The network edge, also known as the WAN edge, is where an enterprise network connects to third-party network services. Edge computing, however, is something different. Continue Reading
-
What does a zero-trust model mean for network security?
A zero-trust model limits access and permissions according to a defined set of parameters that enterprises specify for each application. Learn what this means for network security. Continue Reading
-
What 5 items should be on your network monitoring checklist?
Device monitoring, visual performance tools and a deep understanding of network data are just a few of the items that should be on your network monitoring checklist. Continue Reading
-
What are the benefits of ADCs with per-application functionality?
DevOps development has driven the need for application delivery controllers to adapt. The result is per-application functionality, which enables customization for each application. Continue Reading
-
How does a WAN-cloud exchange work?
WAN-cloud exchanges provide private and secure connectivity to cloud environments, making them beneficial for software-defined WAN and SaaS platforms. Continue Reading
-
How do cloud data centers affect network bandwidth requirements?
When deciding which applications to move to a cloud data center, enterprises should consider network bandwidth requirements and latency, among other factors. Continue Reading
-
Wi-Fi 6: How does OFDMA work?
The new Wi-Fi 6 standard works harder but also smarter, thanks to a game-changing feature called orthogonal frequency-division multiple access. Continue Reading
-
How does security for intent-based networking work?
Monitoring plays an essential role when it comes to security in intent-based networking environments, as it ensures policies are met and detects network anomalies. Continue Reading
-
How do SDN protocols compare to those used in SD-WAN?
Traditional SDN controllers use northbound and southbound APIs to communicate. But software-defined WAN controllers don't rely on those same SDN protocols. Continue Reading
-
Why would an organization move to intent-based networking?
Intent-based networking doesn't use any magical commands. But it does use a heavy dose of automation, which might cause some network teams to be wary of the new approach. Continue Reading
-
How do network virtualization and network abstraction compare?
Network virtualization and network abstraction share similarities, like supporting the creation of virtual resources, but the two approaches vary in complexity and outcome. Continue Reading
-
What are the pros and cons of machine learning in network security?
The predictive nature of machine learning can benefit network security strategies. But it can also benefit those looking to break through secure network barriers. Continue Reading
-
What 4 questions can help prepare your network for IoT?
Increasingly, organizations are seeing a marriage of IoT and networking for more efficiency and enhanced services. Here's what you need to know to prepare your networks for IoT. Continue Reading
-
What network tools are available for hybrid cloud monitoring?
As hybrid cloud adoption ramps up, businesses should consider hybrid cloud monitoring tools that provide network performance insight across the entire environment. Continue Reading
-
What are the pros and cons of open source network monitoring tools?
They're usually free and customizable, but can lack customer support. Take a look at the best and worst features of open source network monitoring tools. Continue Reading
-
What is the role of machine learning in networking?
Analytics tools that incorporate machine learning can monitor network behavior, highlight anomalies, and improve performance management and security. Continue Reading
-
What are the 3 most common network issues to troubleshoot?
Slow network speeds, weak Wi-Fi signals and damaged cabling are perhaps the three most common network problems that IT departments need to troubleshoot. Continue Reading
-
What's the difference between network availability and reliability?
Network availability provides a glimpse into infrastructure accessibility, while network reliability highlights how well the infrastructure runs to support functional processes. Continue Reading
-
Intent-based networking vs. SDN: How do they differ?
When it comes to the primary differentiators between intent-based networking and SDN, abstraction and administrator commands are at the top of the list. Continue Reading
-
What is a software-defined perimeter, and do I need it?
An evolving network world requires evolving network security. Learn how software-defined perimeter offers a compelling answer to network vulnerabilities. Continue Reading
-
Which core network functions are being virtualized?
Network functions virtualization can virtualize both data center and branch office network services. But a couple of special cases, like virtual switches, require clarification. Continue Reading
-
What roles do vCPE and uCPE have at the network edge?
As service providers look to virtualize the edge and deliver network services faster, they're turning to vCPE and uCPE that run services as software on generic hardware. Continue Reading
-
What are the top benefits of CDN services for enterprises?
You might be asking yourself, 'Do I need a CDN?' According to one network analyst, the answer is most likely yes, as CDNs provide faster access to internet content. Continue Reading
-
Which KPIs should I measure for security in SDN?
KPIs provide useful guidelines to measure how network performance and security align with business objectives. Here are some KPIs to help keep track of an SDN environment. Continue Reading
-
How might NFV in IoT enhance network edge security?
The emergence of IoT devices has considerable network security implications. An NFV architecture, however, could add another layer of network defense. Continue Reading
-
What is a service mesh, and how does it relate to networking?
A service mesh can ease the deployment of microservices and container-based applications, while supporting the delivery of network services, like load balancing and authentication. Continue Reading
-
What are the top 3 benefits of NFV technology?
The use of standard hardware, consolidation of network functions and machines, and flexible system upgrades are some of the key benefits of NFV technology. Continue Reading
-
How can organizations improve their network change management?
Organizations can optimize their network change management processes with dedicated change management services for improved planning, monitoring and communication capabilities. Continue Reading
-
What are the differences between network security vs. cybersecurity?
IT groups need to consider varying layers of security. For instance, the similarities and differences between cybersecurity and network security are closely entwined. Continue Reading
-
What is the difference between circuit switching and packet switching?
In this Ask the Expert, John Burke explains the difference between packet switching and circuit switching and compares the two models. Continue Reading
-
What are the pros and cons of deploying containers?
Containers can reduce a company's OS licensing costs and required CPU usage, while acting as a bridge to serverless computing. But IT teams need to evaluate the potential drawbacks. Continue Reading
-
Where does SDN fit in edge computing architecture?
SDN and edge computing can work together to apply data processing decisions that make better use of network links and bandwidth, especially when it comes to edge versus cloud. Continue Reading
-
What are the pros and cons of blockchain in networking?
While blockchain could be a valuable network management tool, enterprises don't exactly have a driving need for the ledger technology in the networking arena. Continue Reading
-
What are today's top 3 network security challenges?
A significant shortage of cybersecurity staff, poorly configured firewalls and unmanaged end-user mobile devices are some of the top network security threats. Continue Reading
-
How does software-defined access work?
Service providers and enterprises use software-defined access to extend SDN beyond the data center and WAN to the edge of the network. Learn about its developments and benefits. Continue Reading
-
How do last-mile connections work for SD-WAN deployments?
SD-WAN technology plays well with existing last-mile connections, and it allows enterprises to use more than one type of transport link. But beware of provider sprawl. Continue Reading
-
What is the status of VNF deployments among service providers?
Although service providers are undertaking VNF deployments in the network core, they're hard-pressed to deploy them at the network edge due to complexity and cost. Continue Reading
-
How to perform packet loss tests and how they work
Network engineers have two standard systems utilities that help them check for packet loss. Learn how this is done and, should a problem prove persistent, the best next steps for troubleshooting packet loss. Continue Reading
-
What is a long-tail DoS threat, and how does it target web apps?
Fine-grained application monitoring can defend against a long-tail DoS threat. This new kind of vulnerability manipulates service queues within a web application. Continue Reading
-
How do virtual ADCs benefit enterprise data centers?
Virtual ADCs bring another level of flexibility, authentication and performance monitoring, moving application delivery controllers beyond load balancing and application acceleration. Continue Reading
-
What effect does NetOps have on enterprise networking teams?
Similar to the DevOps framework, a NetOps approach provides networking teams with a way to use automation and virtualization to create more agile networks and deploy applications faster. Continue Reading
-
Does software-defined networking architecture use segment routing?
Segment routing steers packets using a list of instructions, and it can be used in MPLS and IPv6 architecture. But does software-defined networking architecture support it? Continue Reading
-
How do I begin network infrastructure planning for SD-WAN?
When gearing up for SD-WAN upgrades, enterprises should take their time with network infrastructure planning. These three steps can help get them started. Continue Reading
-
What metrics and tools can accurately measure network performance?
Several methods and metrics measure network performance and throughput. But IT needs to gauge these measurements on a consistent basis to avoid major service issues. Continue Reading
-
What is multi-access edge computing, and how has it evolved?
Multi-access edge computing provides the processing capacity needed to support the increase of 'things' at the network edge. But for all its promise, MEC has challenges to face. Continue Reading
-
Does software networking fit modern data center requirements?
Software networking can support modern data center requirements, private clouds and accompanying applications. But IT teams need to wade through components and suppliers to get there. Continue Reading
-
How do I troubleshoot network performance with traffic monitoring?
When undertaking network performance troubleshooting, organizations can benefit from a mix of passive and active network traffic monitoring to identify issues. Continue Reading
-
What key network performance issues spark service disruptions?
From cabling to capacity issues, IT professionals need to consider all possibilities when rooting out the underlying cause of network performance problems. Continue Reading
-
Which SD-WAN security concerns should I tackle first?
IT teams thinking about software-defined WAN technology should assess a few SD-WAN security concerns before deployment to make sure it's worth the investment. Continue Reading
-
How can network analytics tools benefit IT staff?
Network analytics tools can help IT managers proactively pinpoint network performance issues and trends -- even before the underlying problem is revealed. Continue Reading
-
Does software-defined networking architecture need network overlays?
Network overlays and software-defined networking architecture share a history. But while overlays offer flexibility, they also bring extra overhead and troubleshooting complications. Continue Reading
-
Can hyper-converged systems benefit from SDN architecture?
Hyper-convergence combined with software-defined networking architecture might seem like hyper-hype, but SDN offers many network capabilities required of hyper-converged systems. Continue Reading
-
How do I improve my network programming knowledge?
When it comes to SDN and programmable network skills, combining training with practice and hands-on experience can help advance your programming knowledge. Continue Reading
-
How can network analytics tools be used to improve performance?
With pressure and expectations for network and enterprise performance rising, IT professionals are turning to network analytics tools that use machine learning to remain ahead of the game. Continue Reading
-
How do the benefits of SDN improve network automation?
The ability to automate networks isn't new, and while the benefits of SDN reach out to encompass aspects of automation, SDN and network automation don't mean the same thing. Continue Reading
-
How do I choose between open source and commercial SDN?
Commercial SDN offers vendor-backed support, while open source platforms can be upgraded more quickly. Whether an enterprise chooses one over the other depends on its preferences. Continue Reading
-
What tools are needed to build a DevOps management model?
Amy Larsen DeCarlo answers why so many businesses are combining their development and operations teams and what tools are needed to make effective DevOps management happen. Continue Reading
-
How can I prevent a DDoS attack program?
DDoS programs overwhelm networks with a torrent of requests. How can you prevent a DDoS attack, and what are the steps you can take to keep your networking environment secure? Continue Reading
-
Despite WLAN speed growth, do we really need mGig?
Networking vendors introduced mGig to support 802.11ac Wave 2 devices within enterprise networks. But do you really need to upgrade to accommodate the new WLAN speed? Continue Reading
-
Which is better for WLAN support: Mac or Windows?
Choosing the right laptop for WLAN support usually boils down to Macintosh versus Windows. But of the two, there is only one OS clearly up to the task, our expert maintains. Continue Reading
-
Where do mobile users fit in with SD-WAN as a service?
SD-WAN as a service can act as a bridge between mobile users who want to access business apps on the go and network managers who want to manage and secure those users. Continue Reading
-
What exactly is a digital business transformation strategy?
What do you need for a digital business transformation strategy that will actually work to boost business value and change the enterprise operations model? Continue Reading
-
Can cable be reused when upgrading 802.11ac wireless LAN?
Is it better to repurpose legacy cabling when planning an 802.11ac wireless LAN upgrade, or does it make sense to buy new? Like many things networking, it depends. Continue Reading
-
What security is needed for digital assistant devices?
How should cybersecurity-enforcement efforts adapt as digital assistant devices become more pervasive in business enterprise networking to safeguard corporate data? Continue Reading
-
How do IoT sensors intersect with SD-WAN?
Most traditional WANs can't handle the increasing number of IoT sensors -- and the data they collect. But SD-WAN can help improve IoT performance and analysis. Continue Reading
-
How can IT asset management tools aid in virtualization era?
IT asset management tools allow businesses to track resources effectively. Platform organization is increasingly necessary in a virtualized enterprise. Continue Reading
-
What's automation's role in network provisioning resources?
IT is embracing network automation, but complications with integration disrupt the process. Using automation for provisioning resources can improve efficiency, but reduce the need for IT personnel. Continue Reading
-
How can cloud management apps organize data across clouds?
If you need to pull together different data sets, cloud management apps can track information workloads across multiple clouds and present the data in a simplified way. Continue Reading
-
How can you use perfect forward secrecy for mobile security?
How can companies increase data protection in mobile communications environments and enhance perfect forward secrecy to safeguard user activity? Continue Reading
-
Where does NFV deployment stand today?
Network expert Lee Doyle explains the status of NFV deployment in 2018 and how open source, 5G and the internet of things can drive future changes. Continue Reading
-
IBN: Enablement for a configuration management process?
How realistic are claims about intent-based networking helping organizations to enhance the network configuration management process? Continue Reading
-
How does SD-WAN manage real-time network traffic performance?
Most people have experienced poor quality when it comes to real-time network traffic, like VoIP and video. But SD-WAN can help prioritize traffic and improve reliability. Continue Reading
-
How can network management systems boost troubleshooting?
What can IT teams do to combine network management systems and application performance management tools to boost troubleshooting in enterprise infrastructure? Continue Reading
-
What is the relationship between intent-based networking and SDN?
SDN and intent-based networking share more in common than hype about their promises and potential. Our expert weighs in on how the two technologies aim to improve automation. Continue Reading
-
How does a managed SD-WAN service work?
Networking analyst John Burke explains managed software-defined WAN, and he discusses why providers are starting to offer the service to their customers. Continue Reading
-
What does modern SMB cybersecurity entail?
Modern SMB cybersecurity increasingly involves managed detection and response services, improved zero-day attack spotting and better management of connected devices. Continue Reading
-
How can professionals boost public hotspot security?
Public hotspot security needs to be carefully considered by IT departments and traveling professionals to prevent breaches of sensitive corporate data. Continue Reading
-
Are managed detection and response services a good idea for SMBs?
If you're a small business with limited IT resources, the emerging managed detection and response services market can help with cybersecurity breach prevention and threat detection. Continue Reading
-
How can zero-day attack prevention be improved?
Cognitive technology can aid IT teams in zero-day attack prevention and vulnerability detection -- if you know the right way to deploy it. Continue Reading
-
How should IT manage connected devices?
As IT teams become tasked to manage connected devices more often, what steps need to be taken to avoid performance and security-related problems? Continue Reading
-
What are the differences between SDN open source and vendor products?
Choosing between SDN open source and vendor-provided options is easier when you know some of the available choices. Industry analyst Lee Doyle lists some of the options. Continue Reading
-
Why some Wi-Fi jobs are best for WLAN professionals to avoid
Some Wi-Fi jobs can become nearly impossible to complete. When engineers contend with inflated expectations or bad designs, it may be best to walk away. Continue Reading
-
When will networking embrace the 802.11ax standard?
The pending 802.11ax standard offers 10 Gbps speeds up to 40% faster than Wave 2 802.11ac. Continue Reading
-
Who's doing what with NFV orchestration platforms?
It might come as little surprise, but the two primary options for NFV orchestration platforms are open source or vendor-supplied options. See who's doing what in these areas. Continue Reading