Get started
Bring yourself up to speed with our introductory content.
Get started
Bring yourself up to speed with our introductory content.
CDN vs. cloud computing: What's the difference?
Content delivery networks and cloud computing architectures may appear to serve the same function. But each has a specific role to play when distributing content. Continue Reading
subnet (subnetwork)
A subnet, or subnetwork, is a segmented piece of a larger network. Continue Reading
URL (Uniform Resource Locator)
A URL (Uniform Resource Locator) is a unique identifier used to locate a resource on the Internet. Continue Reading
-
circuit switching
Circuit switching is a type of network configuration in which a physical path is obtained and dedicated to a single connection between two endpoints in the network for the duration of a dedicated connection. Continue Reading
thin client (lean client)
A thin client (or lean client) is a virtual desktop computing model that runs on the resources stores on a central server instead of a computer's resources. Continue Reading
frame relay
Frame relay is a packet-switching telecommunications service designed for cost-efficient data transmission for intermittent traffic between local area networks (LANs) and between endpoints in wide area networks (WANs).Continue Reading
Ways to speed up white box networking adoption
Most organizations are slow to deploy new techniques, white box networking included. Experts explain why and offer advice on how to speed up adoption across enterprises.Continue Reading
Universal Service Fund (USF)
The Universal Service Fund (USF) is a United States government program that supports telecommunications access and affordability in rural and low-income communities.Continue Reading
Next Hop Resolution Protocol (NHRP)
Next Hop Resolution Protocol (NHRP) is an automated configuration technology that routes data on a distributed network by discovering the best routing path between endpoints.Continue Reading
100 Gigabit Ethernet (100 GbE)
100 Gigabit Ethernet (100 GbE) is an Ethernet standard that supports data speeds of up to 100 billion bits (gigabits) per second (Gbps).Continue Reading
-
transceiver
A transceiver is a combination transmitter/receiver in a single package.Continue Reading
edge router
An edge router is a specialized router located at a network boundary that enables an internal network to connect to external networks.Continue Reading
PSTN (public switched telephone network)
The public switched telephone network, or PSTN, is the world's collection of interconnected voice-oriented public telephone networks.Continue Reading
cloud networking
Cloud networking is when some or all of an organization's networking resources are hosted in the cloud.Continue Reading
runbook
Runbooks are a set of standardized written procedures for completing repetitive IT processes within a company.Continue Reading
network visibility
Network visibility is an awareness of the components and data within an enterprise computer network.Continue Reading
Joint Academic Network (JANET)
The Joint Academic Network (JANET) is an internal, high-speed computer network that links the U.K. education and research community.Continue Reading
visitor-based networking (visitor-based network)
Visitor-based networking (VBN) is a computer network with high-speed internet access provided by an organization for temporary use by visitors, guests or other users in a public area.Continue Reading
wavelength
Wavelength is the distance between identical points (adjacent crests) in the adjacent cycles of a waveform signal propagated in space or along a wire.Continue Reading
VPN (virtual private network)
A virtual private network (VPN) is a service that creates a safe, encrypted online connection.Continue Reading
Service Profile Identifier (SPID)
In telecommunications, a Service Profile Identifier (SPID) is a number assigned by a phone company to a terminal on an Integrated Services Digital Network (ISDN) B-channel.Continue Reading
deep packet inspection (DPI)
Deep packet inspection (DPI) is an advanced method of examining and managing network traffic.Continue Reading
The role of smartNICs in modern enterprise networks
This chapter excerpt from 'Building a Future-Proof Cloud Infrastructure' looks at how smartNICs can support distributed services platforms for both cloud providers and enterprises.Continue Reading
How smartNIC architecture supports scalable infrastructure
In this Q&A, author Silvano Gai discusses how smartNICs can benefit enterprises by providing more granular telemetry and supporting distributed cloud infrastructure.Continue Reading
GVRP (GARP VLAN Registration Protocol or Generic VLAN Registration Protocol)
GVRP (GARP VLAN Registration Protocol or Generic VLAN Registration Protocol) is a standards-based protocol that facilitates control of virtual local area networks (VLANs) within a larger network.Continue Reading
Gigabit Ethernet (GbE)
Gigabit Ethernet (GbE), a transmission technology based on the Ethernet frame format and protocol used in local area networks (LANs), provides a data rate of 1 billion bits per second, or 1 gigabit (Gb).Continue Reading
trunk (trunking)
A network trunk is a communications line or link designed to carry multiple signals simultaneously to provide network access between two points.Continue Reading
serial digital interface (SDI)
Serial digital interface (SDI) is a standard for digital video and audio transmission over coaxial or fiber optic cabling.Continue Reading
Point-to-Point Protocol over Ethernet (PPPoE)
Point-to-Point Protocol over Ethernet (PPPoE) is a network protocol that facilitates communication between network endpoints.Continue Reading
1000BASE-T (Gigabit Ethernet)
1000BASE-T is Gigabit Ethernet -- 1 gigabit is 1,000 megabits per second (Mbps) on copper cables, using four pairs of Category 5 (Cat5) unshielded twisted pair (UTP) to achieve the gigabit data rate.Continue Reading
Server Message Block protocol (SMB protocol)
The Server Message Block protocol (SMB protocol) is a client-server communication protocol used for sharing access to files, printers, serial ports and other resources on a network.Continue Reading
customer proprietary network information (CPNI)
Customer proprietary network information (CPNI) in the United States is information that telecommunications services -- such as local, long-distance and wireless telephone companies -- acquire about their subscribers.Continue Reading
dynamic port numbers
Dynamic port numbers, also known as private port numbers, are the port numbers that are available for use by any application to use in communicating with any other application, using the internet's Transmission Control Protocol (TCP) or User ...Continue Reading
autonomous system (AS)
An autonomous system (AS) in networking is a collection of one or more associated Internet Protocol (IP) prefixes with a clearly defined routing policy that governs how the AS exchanges routing information with other autonomous systems.Continue Reading
CompTIA Cloud+ tips to troubleshoot cloud networks
The CompTIA Cloud+ exam covers a range of topics, including how to secure and troubleshoot cloud networks. Some of the first steps: Start simple, and isolate the problem.Continue Reading
stateful inspection
Stateful inspection, also known as dynamic packet filtering, is a firewall technology that monitors the state of active connections and uses this information to determine which network packets to allow through the firewall.Continue Reading
domain name system (DNS)
The domain name system (DNS) is a naming database in which internet domain names are located and translated into Internet Protocol (IP) addresses.Continue Reading
Real-time Transport Protocol (RTP)
Real-time Transport Protocol (RTP) is a network standard designed for transmitting audio or video data that is optimized for consistent delivery of live data.Continue Reading
NACK (NAK, negative acknowledgment, not acknowledged)
NACK, or NAK, an abbreviation for negative acknowledgment or not acknowledged, is a signal used by computers or other devices to indicate that data transmitted over a network was received with errors or was otherwise unreadable.Continue Reading
Synchronous Data Link Control (SDLC)
Synchronous Data Link Control (SDLC) is a transmission protocol used to synchronously transfer code-transparent, serial-by-bit data over a communications channel.Continue Reading
multiplexing
Multiplexing, or muxing, is a way of sending multiple signals or streams of information over a communications link at the same time in the form of a single, complex signal.Continue Reading
signal-to-noise ratio (S/N or SNR)
In analog and digital communications, a signal-to-noise ratio, often written S/N or SNR, is a measure of the strength of the desired signal relative to background noise (undesired signal).Continue Reading
Virtualization concepts to study for CCNP and CCIE exams
In this Q&A, author Patrick Gargano discusses the importance of virtualization in networking and offers studying advice for aspiring CCNPs and CCIEs in preparation for the exams.Continue Reading
Explore virtualization study topics for CCNP, CCIE exams
Aspiring CCNPs and CCIEs will need to grasp one of networking's most important topics: virtualization. 'Day 7' from Patrick Gargano's '31 Days' explains the subject in detail.Continue Reading
Synchronous Digital Hierarchy (SDH)
Synchronous Digital Hierarchy (SDH) is a group of fiber optic transmission rates that transport digital signals with different capacities.Continue Reading
bit stuffing
Bit stuffing refers to the insertion of one or more bits into a data transmission as a way to provide signaling information to a receiver.Continue Reading
Power over Ethernet (PoE)
Power over Ethernet (PoE) is a technology for implementing wired Ethernet local area networks (LANs) that enables the electrical current necessary for operating each device to be carried by Ethernet data cables instead of standard electrical power ...Continue Reading
Plain Old Telephone Service (POTS)
Plain Old Telephone Service (POTS) refers to the traditional, analog voice transmission phone system implemented over physical copper wires (twisted pair).Continue Reading
file server
A file server is a computer responsible for the storage and management of data files so that other computers on the same network can access the files.Continue Reading
net neutrality
Net neutrality is the concept of an open, equal internet for everyone, regardless of content consumed or the device, application or platform used.Continue Reading
How to set up a VLAN for enterprise networks
VLANs can secure and prioritize network traffic. To set up VLANs correctly, teams should understand concepts like VLAN tagging and subnets.Continue Reading
connectionless
In telecommunications, connectionless describes communication between two network endpoints in which a message can be sent from one endpoint to another without prior arrangement.Continue Reading
QAM (quadrature amplitude modulation)
QAM (quadrature amplitude modulation) is a method of combining two amplitude modulation (AM) signals into a single channel.Continue Reading
network operations center (NOC)
A network operations center (NOC) is a centralized place from which enterprise information technology (IT) administrators -- either internal or third party -- supervise, monitor and maintain a telecommunications network.Continue Reading
conductance
Conductance is an expression of the ease with which electric current flows through materials like metals and nonmetals.Continue Reading
session border controller (SBC)
A session border controller (SBC) is a dedicated hardware device or software application that governs the manner in which phone calls are initiated, conducted and terminated on a voice over Internet Protocol (VoIP) network.Continue Reading
dense wavelength-division multiplexing (DWDM)
Dense wavelength-division multiplexing (DWDM) is an optical fiber multiplexing technology that is used to increase the bandwidth of existing fiber networks.Continue Reading
IPTV (Internet Protocol television)
IPTV (Internet Protocol television) is a service that provides television programming and other video content using the Transmission Control Protocol/Internet Protocol (TCP/IP) suite, as opposed to broadcast TV, cable TV or satellite signals.Continue Reading
packet loss
Packet loss is when one or more transmitted data packets fail to arrive at their destination.Continue Reading
carrier-to-noise ratio
In communications, the carrier-to-noise ratio, often written as CNR or C/N, is a measure of the received carrier strength relative to the strength of the received noise.Continue Reading
split horizon
Split horizon is a method used by distance vector protocols to prevent network routing loops.Continue Reading
Enhanced Interior Gateway Routing Protocol (EIGRP)
Enhanced Interior Gateway Routing Protocol (EIGRP) is a network protocol that enables routers to exchange information more efficiently than earlier network protocols, such as Interior Gateway Routing Protocol (IGRP) or Border Gateway Protocol (BGP).Continue Reading
star network
A star network is a local area network (LAN) topology in which all nodes -- personal computers (PCs), workstations or other devices -- are directly connected to a common central computer that is often referred to as a hub.Continue Reading
Spanning Tree Protocol (STP)
Spanning Tree Protocol (STP) is a Layer 2 network protocol used to prevent looping within a network topology.Continue Reading
sliding window (windowing)
The sliding window (windowing) technique is used by Transmission Control Protocol (TCP) to manage the flow of packets between two computers or network hosts.Continue Reading
frequency-division multiplexing (FDM)
In frequency-division multiplexing (FDM), multiple signals are combined for transmission on a single communications line or channel, with each signal assigned to a different frequency (subchannel) within the main channel.Continue Reading
Network observability vs. monitoring: What's the difference?
Traditional network monitoring is useful for collecting data about network issues. But network observability can add further insights into network health and end-user experience.Continue Reading
international private leased circuit (IPLC)
An international private leased circuit (IPLC) is a point-to-point private line used by an organization to communicate between offices that are dispersed throughout the world.Continue Reading
system administrator (sysadmin)
A system administrator (sysadmin) is an information technolog professional who supports a multiuser computing environment and ensures continuous, optimal performance of IT services and support systems.Continue Reading
coded orthogonal frequency-division multiplexing (COFDM)
Coded orthogonal frequency-division multiplexing (COFDM) is a telecommunications modulation scheme that divides a single digital signal across 1,000 or more signal carriers simultaneously.Continue Reading
FCAPS (fault, configuration, accounting, performance and security)
FCAPS (fault, configuration, accounting, performance and security) is a network management framework created by the International Organization for Standardization (ISO).Continue Reading
ADSL (Asymmetric Digital Subscriber Line)
ADSL (Asymmetric Digital Subscriber Line) is a technology that facilitates fast data transmission at a high bandwidth on existing copper wire telephone lines to homes and businesses.Continue Reading
Link Control Protocol (LCP)
In computer networking, Point-to-Point Protocol (PPP) provides a standard way to transport multiprotocol data over point-to-point links; within PPP, Link Control Protocol (LCP) establishes, configures and tests data link internet connections.Continue Reading
beamforming
Beamforming is a type of radio frequency (RF) management in which a wireless signal is directed toward a specific receiving device.Continue Reading
File Transfer Access and Management (FTAM)
File Transfer Access and Management (FTAM) is an OSI application Layer 7 protocol that standardizes how files are accessed and managed in a distributed network file system.Continue Reading
5G core network functionality driven by SDN, NFV
To reap the full benefits of 5G, operators are using SDN, NFV and network slicing to build out core network functionality.Continue Reading
An introductory overview of 5G network capabilities
In this Q&A, author William Stallings discusses 5G services, such as network slicing and QoS, and other topics covered in his book, '5G Wireless: A Comprehensive Introduction.'Continue Reading
Test your knowledge in this 5G QoS quiz
In this quiz, test your knowledge of network slicing, QoS, and other technologies and practices related to 5G networking.Continue Reading
frequency-hopping spread spectrum (FHSS)
Frequency-hopping spread spectrum (FHSS) transmission is the repeated switching of the carrier frequency during radio transmission to reduce interference and avoid interception.Continue Reading
asymmetric communications
Asymmetric communications is a term pertaining to any system in which the data speed or quantity, when averaged over time, is different in one direction from the other.Continue Reading
network access control (NAC)
Network access control (NAC), also called network admission control, is a method to bolster the security, visibility and access management of a proprietary network.Continue Reading
preboot execution environment (PXE)
Preboot execution environment (PXE), pronounced pixie, is a set of standards that enables a computer to load an operating system (OS) over a network connection.Continue Reading
SYN scanning
SYN scanning is a tactic that a malicious hacker can use to determine the state of a communications port without establishing a full connection.Continue Reading
Stream Control Transmission Protocol (SCTP)
Stream Control Transmission Protocol (SCTP) is a connection-oriented network protocol for transmitting multiple streams of data simultaneously between two endpoints that have established a connection in a network.Continue Reading
port
A port in computing has three main uses, each as a type of receptacle in networking, computer hardware and software.Continue Reading
FDDI (Fiber Distributed Data Interface)
FDDI (Fiber Distributed Data Interface) is a network standard that uses fiber optic connections in a local area network (LAN) that can extend in range up to 200 kilometers (124 miles).Continue Reading
megabits per second (Mbps)
Megabits per second (Mbps) are units of measurement for network bandwidth and throughput. It is used to show how fast a network or internet connection is.Continue Reading
passive optical network (PON)
A passive optical network (PON) is a system commonly used by telecommunications network providers that brings fiber optic cabling and signals all or most of the way to the end user.Continue Reading
American Wire Gauge (AWG)
American Wire Gauge (AWG) is the standard way to denote wire size in North America.Continue Reading
port number
Port number is a way to identify a specific process to which an internet or other network message is to be forwarded when it arrives at a server.Continue Reading
committed information rate (CIR)
Committed information rate (CIR) is the guaranteed rate at which a Frame Relay network will transfer information under normal line conditions.Continue Reading
ping
A ping (Packet Internet or Inter-Network Groper) is a basic internet program that enables a user to test and verify if a particular destination Internet Protocol (IP) address exists and can accept requests in computer network administration.Continue Reading
BOOTP (Bootstrap Protocol)
BOOTP (Bootstrap Protocol) is an internet protocol that lets a network user automatically be configured to receive an IP address and have an operating system booted without user involvement.Continue Reading
anti-replay protocol
The anti-replay protocol provides Internet Protocol (IP) packet-level security by making it impossible for a hacker to intercept message packets and insert changed packets into the data stream between a source computer and a destination computer.Continue Reading
time-to-live (TTL)
Time-to-live (TTL) is a value for the period of time that a packet, or data, should exist on a computer or network before being discarded.Continue Reading
Switched Multimegabit Data Service (SMDS)
Switched Multimegabit Data Service (SMDS) is a public, packet-switched service aimed at enterprises that need to exchange large amounts of data with other enterprises over the wide area network on a nonconstant or bursty basis.Continue Reading
What is the network edge and how is it different from edge computing?
The network edge is where an enterprise network connects to third-party network services. Edge computing is a distributed architecture that processes data closer to end users.Continue Reading
What does the 0.0.0.0 IP address mean and why is it used?
One of a few special-purpose addresses, IP address 0.0.0.0 has several applications in networking. It stands in as a placeholder address, identifies a default route and more.Continue Reading
A guide to network lifecycle management
Network pros should follow a network lifecycle to monitor, manage and implement changes in their networks, regardless of whether it's a plan, build and manage framework or PPDIOO.Continue Reading
How to use iPerf3 to test network bandwidth
In this in-depth tip, learn how to use iPerf3, a network testing tool to measure throughput and benchmark your WAN links to ensure effectivity.Continue Reading