Get started
Bring yourself up to speed with our introductory content.
Get started
Bring yourself up to speed with our introductory content.
What is the network edge and how is it different from edge computing?
The network edge is where an enterprise network connects to third-party network services. Edge computing is a distributed architecture that processes data closer to end users. Continue Reading
What does the 0.0.0.0 IP address mean and why is it used?
One of a few special-purpose addresses, IP address 0.0.0.0 has several applications in networking. It stands in as a placeholder address, identifies a default route and more. Continue Reading
A guide to network lifecycle management
Network pros should follow a network lifecycle to monitor, manage and implement changes in their networks, regardless of whether it's a plan, build and manage framework or PPDIOO. Continue Reading
-
How to use iPerf3 to test network bandwidth
In this in-depth tip, learn how to use iPerf3, a network testing tool to measure throughput and benchmark your WAN links to ensure effectivity. Continue Reading
extranet
An extranet is a private network that enterprises use to provide trusted third parties -- such as suppliers, vendors, partners, customers and other businesses -- secure, controlled access to business information or operations. Continue Reading
Network Address Translation (NAT)
A Network Address Translation (NAT) is the process of mapping an internet protocol (IP) address to another by changing the header of IP packets while in transit via a router.Continue Reading
customer premises equipment (CPE)
Customer premises equipment (CPE) is telecommunications and information technology equipment kept at the customer's physical location rather than on the service provider's premises.Continue Reading
encoding and decoding
Encoding and decoding are used in many forms of communications, including computing, data communications, programming, digital electronics and human communications.Continue Reading
The differences between PAP and CHAP
PAP uses a two-way handshake to authenticate client sessions, while CHAP uses a three-way handshake. Both authentication processes are common, but one is more secure.Continue Reading
optoisolator (optical coupler or optocoupler)
An optoisolator (also known as an optical coupler, photocoupler, optocoupler) is a semiconductor device that transfers an electrical signal between isolated circuits using light.Continue Reading
-
Snort
Snort is an open source network intrusion detection system (NIDS) created by Sourcefire founder and former CTO Martin Roesch.Continue Reading
token ring
A token ring is a data link for a local area network (LAN) in which all devices are connected in a ring or star topology and pass one or more tokens from host to host.Continue Reading
What's the difference between a MAC address and IP address?
A MAC address and an IP address each identify network devices, but they do the job at different levels. Explore the differences between the two and learn why both are necessary.Continue Reading
Static vs. dynamic routing: What is the difference?
Static routing uses preconfigured routes to send traffic to its destination, while dynamic routing uses algorithms to determine the best path. How else do the two methods differ?Continue Reading
poison reverse
In a computer network that uses the Routing Information Protocol (RIP) or other distance vector routing protocol, poison reverse is a loop avoidance process.Continue Reading
12 official practice questions for the CCNA 200-301 exam
These practice questions for CCNA 200-301 lay out what readers need to know about network security and IP routing in the LAN, from 'CCNA 200-301 Official Cert Guide, Volumes 1 and 2.'Continue Reading
Five-nines availability: What it really means
Learn what five-nines availability means and discover the steps enterprises should take to make sure network services are fully accessible.Continue Reading
How to calculate network bandwidth requirements
Figuring out how to calculate bandwidth requirements is vital to ensuring your network runs smoothly, and it's best to use the correct formula from the beginning.Continue Reading
bus network
A bus network is a local area network (LAN) topology in which each node -- a workstation or other device -- is connected to a main cable or link called a bus.Continue Reading
flooding (network)
In a computer network, flooding occurs when a router uses a non-adaptive routing algorithm to send an incoming packet to every outgoing link except the node on which the packet arrived.Continue Reading
ping sweep (ICMP sweep)
A ping sweep (also known as an ICMP sweep) is a basic network scanning technique used to determine which of a range of IP addresses map to live hosts (computers).Continue Reading
cognitive radio (CR)
Cognitive radio (CR) is a form of wireless communication in which a transceiver can intelligently detect which communication channels are in use and which ones are not.Continue Reading
CRC-4 (Cyclic Redundancy Check 4)
CRC-4 (Cyclic Redundancy Check 4) is a form of cyclic redundancy checking -- a method of checking for errors in transmitted data -- that is used on E1 trunk lines.Continue Reading
maximum transmission unit (MTU)
The maximum transmission unit (MTU) is the largest size frame or packet -- in bytes or octets (eight-bit bytes) -- that can be transmitted across a data link.Continue Reading
Uuencode (Uuencode/Uudecode)
Uuencode (also called Uuencode/Uudecode) is a popular utility for encoding and decoding files exchanged between users or systems in a network.Continue Reading
crosstalk
Crosstalk is a disturbance caused by the electric or magnetic fields of one telecommunication signal affecting a signal in an adjacent circuit.Continue Reading
NetBIOS (Network Basic Input/Output System)
NetBIOS (Network Basic Input/Output System) is a network service that enables applications on different computers to communicate with each other across a local area network (LAN).Continue Reading
phase-locked loop (PLL)
A phase-locked loop (PLL) is an electronic circuit with a voltage or voltage-driven oscillator that constantly adjusts to match the frequency of an input signal.Continue Reading
near-end crosstalk (NEXT)
Near-end crosstalk (NEXT) is an error condition that can occur when connectors are attached to twisted pair cabling.Continue Reading
10 Gigabit Ethernet (10 GbE)
10 Gigabit Ethernet (10 GbE) is a telecommunication technology that offers data speeds up to 10 billion bits per second.Continue Reading
spectrum analyzer
A spectrum analyzer is a device that measures and displays signal amplitude (strength) as it varies by frequency within its frequency range (spectrum).Continue Reading
virtual routing and forwarding (VRF)
Virtual routing and forwarding (VRF) is a technology included in Internet Protocol (IP) network routers that enables multiple instances of a routing table to exist in a virtual router and work simultaneously.Continue Reading
Time Division Multiple Access (TDMA)
Time Division Multiple Access (TDMA) is a digital modulation technique used in digital cellular telephone and mobile radio communication.Continue Reading
HDLC (High-level Data Link Control)
HDLC (High-level Data Link Control) is a group of protocols or rules for transmitting data between network points (sometimes called nodes).Continue Reading
shielded twisted pair (STP)
Shielded twisted pair (STP) is a special kind of copper telephone and local area network (LAN) wiring used in some business installations.Continue Reading
Signaling System 7 (SS7)
Signaling System 7 (SS7) is an international telecommunication protocol standard that defines how the network elements in a public switched telephone network (PSTN) exchange information and control signals.Continue Reading
IEEE 802.3
802.3, or IEEE 802.3, is a working group of standard specifications for Ethernet, a method of packet-based physical communication in a local area network maintained by the Institute of Electrical and Electronics Engineers.Continue Reading
bits per second (bps or bit/sec)
In data communications, bits per second (bps or bit/sec) is a common measure of data speed for computer modems and transmission carriers.Continue Reading
CCNA certification
Cisco Certified Network Associate (CCNA) is a technical certification that Cisco offers for early-career networking professionals.Continue Reading
bandwidth (network bandwidth)
Network bandwidth is a measurement indicating the maximum capacity of a wired or wireless communications link to transmit data over a network connection in a given amount of time.Continue Reading
An introduction to Go network programming
This chapter excerpt from 'Network Programming with Go' dives into logging and metrics, while also providing Go code examples and best practices.Continue Reading
Best practices and strategies for logging in Go
Author Adam Woodbeck discusses how network teams can use the Go programming language for logging and metrics. One tip: Log prudently, and use metrics generously.Continue Reading
How to secure your home Wi-Fi network in 7 steps
When securing your home Wi-Fi, update devices regularly, change passwords consistently, turn off unused services and inspect outdoor network equipment.Continue Reading
Hybrid network vs. hybrid network infrastructure
Hybrid networks and hybrid network infrastructure blend different kinds of equipment, geographic locations, network ownership and technology disciplines.Continue Reading
FTP (File Transfer Protocol)
FTP (File Transfer Protocol) is a network protocol for transmitting files between computers over TCP/IP connections.Continue Reading
How to set up a home network -- a 7-step guide
From understanding hardware components to managing network performance and security, this guide teaches networking newbies how to set up a home network.Continue Reading
Ansible vs. Terraform vs. Vagrant: What's the difference?
Ansible, Terraform and Vagrant are common infrastructure automation platforms with specific use cases, benefits and drawbacks. But choosing a platform doesn't need to be confusing.Continue Reading
4 attributes key to network-as-a-service model
For a network-as-a-service model to work for the enterprise, it needs to offer four key attributes: an application-specific, elastic, secure and personalized VPN.Continue Reading
Wi-Fi 6 vs. Wi-Fi 6E: Spectrum, not hype, is key difference
The extended spectrum of Wi-Fi 6E sounds promising. But, when assessing Wi-Fi 6 vs. Wi-Fi 6E, organizations should pay close attention to radio frequency characteristics.Continue Reading
What does a network infrastructure upgrade project involve?
Explore the steps organizations must take to upgrade their network infrastructure, including how to tell if an upgrade is necessary and how to evaluate resources for the project.Continue Reading
Wi-Fi 6 rollout requires careful review of network devices
Wi-Fi 6 is just one part of the overall enterprise network. Organizations need to evaluate several network components to ensure a smooth Wi-Fi 6 deployment.Continue Reading
Network layer
Located at Layer 3 of the Open Systems Interconnection (OSI) communications model, the primary function of the network layer is to move data into and through other networks.Continue Reading
Understand top SD-WAN advantages and disadvantages
Cost, complexity, security, training, troubleshooting and software bugs are some top SD-WAN challenges. Discover more on the advantages that SD-WAN can usher into an enterprise.Continue Reading
3G (third generation of mobile telephony)
3G refers to the third generation of cellular technology that enables mobile telephony.Continue Reading
CDMA (Code-Division Multiple Access)
CDMA (Code-Division Multiple Access) refers to any of several protocols used in second-generation (2G) and third-generation (3G) wireless communications.Continue Reading
ICMP (Internet Control Message Protocol)
ICMP (Internet Control Message Protocol) is an error-reporting protocol that network devices such as routers use to generate error messages to the source IP address when network problems prevent delivery of IP packets.Continue Reading
Test your knowledge of socket programming in Python
In this quiz, review the fundamentals of socket programming in Python, including port scanning, TCP and UDP, and how to enable different methods from the socket module.Continue Reading
Explore this ultimate socket programming guide for beginners
In this socket programming guide preview, learn how sockets work, the role of socket programming in enterprise networks and the ins and outs of socket programming in Python.Continue Reading
How to get started with socket programming for beginners
To understand socket programming for beginners, basic network and security concepts are critical -- and having Python skills won't hurt, either. Learn more in this expert Q&A.Continue Reading
orthogonal frequency-division multiplexing (OFDM)
Orthogonal frequency-division multiplexing (OFDM) is a method of data transmission where a single information stream is split among several closely spaced narrowband subchannel frequencies instead of a single wideband channel frequency.Continue Reading
5 steps to conduct network penetration testing
Enterprises that want to ensure competent network security strategies should look at how they can implement penetration testing, considering red teams and physical pen tests.Continue Reading
5 benefits of Wi-Fi 6 for enterprise networks
In a perfect world, Wi-Fi 6 could introduce several benefits to business networks. But real-world conditions could curb the wireless technology's true potential.Continue Reading
OSI model (Open Systems Interconnection)
OSI (Open Systems Interconnection) is a reference model for how applications communicate over a network.Continue Reading
Get started with network penetration testing for beginners
Authentication, patching and configuration are among the most common vulnerabilities found through network penetration testing. Learn more in this free chapter excerpt.Continue Reading
Advice on how to learn network penetration testing skills
As beginners learn network penetration testing skills, they should remember these expert tips: Pay attention to what the client wants, and stick to offense, not defense.Continue Reading
radio frequency (RF, rf)
Radio frequency (RF) is a measurement representing the oscillation rate of electromagnetic radiation spectrum, or electromagnetic radio waves, from frequencies ranging from 300 GHz to as low as 9 kHz.Continue Reading
metropolitan area network (MAN)
A metropolitan area network (MAN) is a computer network that is larger than a single building local area network (LAN) but is located in a single geographic area that is smaller than a wide area network (WAN).Continue Reading
How to build a private 5G business case
As you build a private 5G business case, be sure to include private 5G's benefits and challenges, as well as how to prove its ROI. Here's everything you need to know.Continue Reading
DevNet vs. CCNA: What's the difference?
While CCNA certification concentrates on foundational network engineering knowledge, DevNet certification focuses on modern networking concepts, like automation and software.Continue Reading
An overview of 3GPP 5G releases and what each one means
3GPP has standardized features and specifications for all cellular technology generations since 3G. Learn about 3GPP's 5G timeline and notable features each 5G release introduces.Continue Reading
How to monitor home network traffic for added security
When addressing home network monitoring, track all connected devices, and take advantage of open source tools, like packet capture, to sniff out malicious traffic.Continue Reading
How to understand networking and the internet for beginners
For beginners, learning how networking and the internet truly work can feel overwhelming. One expert encourages patience, practice and assurance that networking isn't unknowable.Continue Reading
How to learn networking fundamentals, from a software pro
Networking basics include protocols, network layers and processes that must happen for computers to communicate across a network. Here's how to start learning these basics.Continue Reading
VLAN vs. subnet: What's the difference?
While VLANs are a type of subnet, they have their own unique capabilities and characteristics that differentiate them from subnets. However, the OSI model plays a major role in both.Continue Reading
VPN vs. VLAN: What's the difference?
VPNs and VLANs are different technologies with some similarities. VPNs connect authorized users to corporate network resources, while VLANs connect geographically separate devices.Continue Reading
How to calculate SASE return on investment and costs
SASE return on investment will vary for each organization, depending on use cases and architecture requirements. But the metrics used to determine ROI and cost factors are the same.Continue Reading
Broadband vs. Wi-Fi: What's the difference?
Broadband and Wi-Fi are common technical terms often used interchangeably -- although they shouldn't be. Both provide connectivity, but they do so in different ways.Continue Reading
Top network attacks of 2020 that will influence the decade
You've heard of phishing, ransomware and viruses. Now, keep them in mind because one cybersecurity expert says these threats and more may cause IT headaches for the next decade.Continue Reading
Advice for an effective network security strategy
Security audits, evaluations of tools and looking realistically at trending technologies are some ways an organization can ensure its network security is the best it can be.Continue Reading
Test your network threats and attacks expertise in this quiz
Network security is an ever-changing subject, but many of its common threats have plagued IT pros for years -- and will likely continue to do so. See what you know in this quiz.Continue Reading
What are the differences between Wi-Fi and WiMax?
Wi-Fi is the wireless standard used to build wireless LANs, while carriers primarily used WiMax to build wireless metropolitan area networks before moving to LTE.Continue Reading
How to calculate a subnet mask from hosts and subnets
IP addressing and subnetting are important and basic elements of networks. In this article, learn how to calculate a subnet mask based on the required number of subnets and hosts.Continue Reading
Managed vs. unmanaged switches: What are the differences?
Managed and unmanaged network switches differ in various ways, including control and cost. Managed switches support more granular control, yet unmanaged switches have lower prices.Continue Reading
Network pros share Cisco DevNet certification advice
Cisco DevNet certifications require a lot of time investment, but network pros who pursue the certifications say the gained skills and knowledge are worth it.Continue Reading
A look inside the official Cisco DEVASC 200-901 guidebook
In this book excerpt, readers can explore the Cisco DEVASC 200-901 official guide and get a flavor of one of Cisco's newest exams and its blend of networking and software topics.Continue Reading
7 practice questions for Cisco 200-901 DevNet Associate exam
Ready for Cisco's introductory DevNet exam, DEVASC 200-901? Start your Cisco DevNet Associate training with this practice quiz directly from the official exam guidebook.Continue Reading
What is the difference between IP telephony and VoIP?
While many IT professionals use VoIP and IP telephony synonymously, some argue for keeping a couple of subtle distinctions between the two terms in mind.Continue Reading
Cisco Certified Entry Networking Technician (CCENT)
Cisco Certified Entry Networking Technician (CCENT) is a now-retired certification offered by Cisco, as part of their certification program.Continue Reading
How do VPN vs. cloud services compare for remote work?
As remote work becomes increasingly normal, IT teams must decide which remote access technologies will benefit employees more. VPN and cloud services are two top choices.Continue Reading
How and why to implement Wi-Fi QoS
Quality of service, as network pros know, prioritizes apps as they cross the network. But Wi-Fi QoS needs to be considered, too, in relation to the overall network.Continue Reading
The role of SD-WAN templates before and during deployment
SD-WAN deployments require knowledge of network design and trust in software to take over some network maintenance duties. This is where SD-WAN templates come into play.Continue Reading
Learn to onboard, provision devices in Cisco's SD-WAN book
Here's a look inside Cisco's SD-WAN book, which details design and deployment for network teams looking to deploy SD-WAN and insights for SD-WAN certification hopefuls.Continue Reading
6 practice questions for SD-WAN certification training
Before you start SD-WAN certification training, try this quiz from Cisco's official SD-WAN guidebook, which covers onboarding and provisioning devices, as well as SD-WAN templates.Continue Reading
What network automation certification options are available?
Network automation certifications and training include vendor-specific commercial credentials, as well as open source options. Which career path is right for you?Continue Reading
How to build a resilient network design
Everything fails eventually, even in networking. Enterprises can prepare for network failure by building resilience and redundancy into their network infrastructure design.Continue Reading
What does a VPN concentrator do?
As more employees work remotely and VPN use rises, VPN concentrators have become trendy. But what does a VPN concentrator do exactly, and how do you deploy one?Continue Reading
How and when to establish enterprise 5G partnerships
Enterprises that buy 5G public services, procure network slices or build their own private 5G networks need to establish the right partnerships for mobile services, equipment and software.Continue Reading
Private LTE networks grow as 5G comes into view
Private LTE networks deliver secure cellular connectivity in localized enterprise or industrial spaces, with private 5G networks and newly available spectrum bands soon to follow.Continue Reading
What is the difference between SNMP and RMON?
While Simple Network Management Protocol tracks network devices, Remote Network Monitoring tracks traffic. As a team, SNMP and RMON are essential for network management.Continue Reading
The benefits of building a network automation lab
Network teams can build network automation labs to create a safe environment to test and validate automation tasks before running them in production networks.Continue Reading