Get started
Bring yourself up to speed with our introductory content.
Get started
Bring yourself up to speed with our introductory content.
CBRS (Citizens Broadband Radio Service)
Citizens Broadband Radio Service, or CBRS, is the set of operational rules given to a slice of the shared wireless spectrum and the technologies used in that spectrum. Continue Reading
private 5G
Private 5G is wireless network technology that delivers cellular connectivity for private network use cases, such as private businesses, third-party providers and municipalities. Continue Reading
Cloud networking vs. cloud computing: What's the difference?
Organizations might sometimes consider cloud computing and cloud networking as interchangeable due to their similarities. But the two strategies have different goals and processes. Continue Reading
-
Wireless access point vs. router: What's the difference?
The choice of a wireless access point vs. a router for wireless network connectivity depends on the physical size of the network, needs of the organization and the number of users. Continue Reading
What's the difference between 802.11ac vs. 802.11ax?
The difference between 802.11ac and 802.11ax is significant. The two wireless standards differ notably in features such as AP capacity, spatial streams and data rates. Continue Reading
wireless mesh network (WMN)
A wireless mesh network (WMN) is a mesh network created through the connection of wireless access point (WAP) nodes installed at each network user's locale.Continue Reading
CBRS vs. Wi-Fi: What's the difference?
Citizens Broadband Radio Service enables private LTE networks and supports enterprise WAN deployments. But that doesn't mean Wi-Fi is going away anytime soon.Continue Reading
VPN vs. zero trust vs. SDP: What's the difference?
For strong network security, many vendors say VPNs don't cut it anymore. Enter the zero-trust security model and SDPs.Continue Reading
Wi-Fi 7
Wi-Fi 7 is the pending 802.11be standard under development by IEEE.Continue Reading
What is zero-trust network access? ZTNA basics explained
Zero-trust network access is touted as the solution to replace the VPN. As the potential future of network security, learn more about ZTNA, including its benefits and challenges.Continue Reading
-
network security
Network security encompasses all the steps taken to protect the integrity of a computer network and the data within it.Continue Reading
How to build a zero-trust network in 4 steps
While network teams are responsible for deploying the elements of a zero-trust network, security teams should also be involved in developing the overall zero-trust framework.Continue Reading
cloud-native network function (CNF)
A cloud-native network function (CNF) is a service that performs network duties in software, as opposed to purpose-built hardware.Continue Reading
microsegmentation
Microsegmentation is a security technique that splits a network into definable zones and uses policies to dictate how data and applications within those zones can be accessed and controlled.Continue Reading
Wi-Fi 6E
Wi-Fi 6E is one variant of the 802.11ax standard.Continue Reading
Tips to prepare for a network disaster recovery audit
Enterprises can audit their network disaster recovery plans to ensure thorough protection and preparation. Consider factors like documentation, management support and audit type.Continue Reading
Network bandwidth vs. throughput: What's the difference?
Bandwidth and throughput both indicate network performance. The terms are often used together, but bandwidth refers to capacity, while throughput details how much data actually transmits.Continue Reading
How does SD-access work?
SD-access is a combination of two elements: SDN and the access edge. The result is a network with a centralized management system and improved security policies.Continue Reading
VXLAN vs. VLAN: What's the difference?
VLANs offer security and traffic management benefits but have limitations in routing and scale. VXLANs address those challenges by creating a Layer 3 network overlay.Continue Reading
Understanding the FTP PORT command
FTP uses control and data channels, each using a separate TCP port. Port 21 is for the control channel, and port 20 is for the data channel. Learn how these two channels are used.Continue Reading
What an AI-driven network looks like
Log analysis and wireless management are common AI use cases in networking. Future applications could include chatbot alerts, digital experience monitoring and traffic engineering.Continue Reading
Best practices for DIY network automation
Many network pros write their own automation scripts. These best practices help teams implement coding and tool set standardization, proper change management and immutability.Continue Reading
network packet
A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a packet-switched network, such as the internet.Continue Reading
BGP vs. EIGRP: What's the difference?
BGP is an exterior gateway protocol optimized for routing between large networks. EIGRP is an interior gateway protocol that is well suited for routing within smaller networks.Continue Reading
A guide to distributed network architectures
Distributed network architectures have become popular because of their adaptability, reliability and scalability. But every new technology also has its challenges.Continue Reading
The role of name resolution in networking
Name resolution is essential in converting hostnames and IP addresses for network communications. Here's how the process resolves hostnames, queries servers and finds IP addresses.Continue Reading
An introduction to neutral host networks using private 5G
Enterprises often use signal boosters and distributed antenna systems to improve carrier signal strength. Neutral host networks over private 5G could disrupt those methods.Continue Reading
How to convert binary to decimal
It's helpful for network admins to know how to convert binary to decimal, and vice versa, for IPv4 addressing, subnet masks, default gateways and network IDs.Continue Reading
virtual network functions (VNFs)
Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.Continue Reading
network functions virtualization (NFV)
Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have traditionally run on proprietary, dedicated network appliances.Continue Reading
overlay network
An overlay network is a virtual or logical network that is created on top of an existing physical network.Continue Reading
VLAN (virtual LAN)
A virtual LAN (VLAN) is a logical overlay network that groups together a subset of devices that share a physical LAN, isolating the traffic for each group.Continue Reading
virtual networking
Virtual networking is the abstraction of network resources from the underlying physical network infrastructure.Continue Reading
Understand the basics of 5G wireless networks
To build a 5G network, the deployment mode, spectrum band and services are all important factors to understand and consider. Here's what you should know about the basics of 5G.Continue Reading
protocol data unit (PDU)
In networking, a protocol data unit is the basic unit of exchange between entities that communicate using a specified networking protocol.Continue Reading
Ethernet vs. Carrier Ethernet: How do they differ?
Connectivity over longer distances and higher data rates are some of the major differences that separate Carrier Ethernet from traditional wired Ethernet.Continue Reading
5G NSA vs. SA: How does each deployment mode differ?
Non-standalone 5G uses a combination of existing 4G LTE architecture with a 5G RAN. Standalone 5G, on the other hand, uses a 5G RAN and a cloud-native 5G core.Continue Reading
software-defined networking (SDN)
Software-defined networking (SDN) is an architecture that abstracts different, distinguishable layers of a network to make networks agile and flexible.Continue Reading
How network virtualization works
Network virtualization uses abstraction to isolate applications and resources from the physical infrastructure. Benefits include faster provisioning, agility and operational efficiency.Continue Reading
6 types of network topologies
Network topology is essential to network configuration, as it determines the arrangement of a network and defines how nodes connect. Here are six common types of network topologies.Continue Reading
5 basic network commands for Linux and Windows
Linux and Windows use different network commands to run tasks that are common in both environments, such as network connectivity testing. But the commands often share similarities.Continue Reading
Common types of enterprise network connections
The goal of every network is to connect devices. The connections that form those links -- such as wired cabling and wireless technologies -- are crucial in network infrastructure.Continue Reading
Power over Ethernet basics for network architects
Power over Ethernet provides a way to supply electricity to low-power devices through a standard Ethernet cable. Learn about the different standards and PoE types.Continue Reading
What is 6G? Overview of 6G networks & technology
6G (sixth-generation wireless) is the successor to 5G cellular technology. 6G networks will be able to use higher frequencies than 5G networks and provide substantially higher capacity and much lower latency.Continue Reading
7 types of networks and their use cases
Networks differ based on size, connectivity, coverage and design. This guide explores seven common types of networks, including their benefits and use cases.Continue Reading
What are licensed and unlicensed wireless frequency bands?
Licensed frequency bands are reliable and offer better performance than unlicensed frequency bands, which are low cost and easy to deploy but interference is common.Continue Reading
An introduction to 8 types of network devices
This introduction explores eight network devices that are commonly used within enterprise network infrastructures, including access points, routers and switches.Continue Reading
OSGi (Open Service Gateway Initiative)
The OSGi (Open Service Gateway Initiative) specification is a Java framework for developing and deploying modular software programs and libraries.Continue Reading
What is the role of machine learning in networking?
Incorporating machine learning tools into a network can help teams predict traffic flows, generate smarter analytics, monitor network health, tighten security measures and more.Continue Reading
network analytics
Network analytics is the application of big data principles and tools to the data used to manage and secure data networks.Continue Reading
SecOps and cybersecurity basics for NetOps teams
To bridge the gap between NetOps and SecOps teams, network pros should know security fundamentals, including different types of attackers, attacks and available security services.Continue Reading
5G vs. 4G: Learn the key differences between them
4G and 5G network architectures have some significant differences. See how the two technologies differ and what the new capabilities could mean for business communications.Continue Reading
application layer
The application layer sits at Layer 7, the top of the Open Systems Interconnection (OSI) communications model. It ensures an application can effectively communicate with other applications on different computer systems and networks.Continue Reading
NetOps vs. DevOps vs. NetSecOps: What's the difference?
DevOps, NetOps and NetSecOps ... oh my! These IT concepts have their differences, but at the end of the day, they're family. Here's how they relate.Continue Reading
programmable network (network programmability)
A programmable network is one in which the behavior of network devices and flow control is handled by software that operates independently of network hardware.Continue Reading
Macrocell vs. small cell vs. femtocell: A 5G introduction
Small cells will provide new, fast connectivity speeds for 5G networks and capable devices, but 5G won't stop there. Macrocells and femtocells are also key to connect 5G networks.Continue Reading
The NetOps 2.0 era is here: A primer for networking pros
Experts say inflexible legacy networks impede critical DevOps initiatives. Enter NetOps 2.0. This primer explains how automation and virtualization can help networks evolve.Continue Reading
location-based service (LBS)
A location-based service (LBS) is a software service for mobile device applications that requires knowledge about where the mobile device is geographically located.Continue Reading
What is 5G?
Fifth-generation wireless (5G) is the latest iteration of cellular technology. Unlike 4G, which requires large, high-power cell towers to radiate signals over longer distances, 5G wireless signals are transmitted through large numbers of small cell ...Continue Reading
Configure DHCP failover for Windows Server
DHCP is a critical service, and network admins should take the time to create fault tolerance. Windows Server makes it easy to configure both failover and load balancing.Continue Reading
network automation
Network automation is a methodology in which software automatically configures, provisions, manages and tests network devices.Continue Reading
Try a network configuration quiz to study for Network+ exam
Use these sample questions from CompTIA's 'Official CompTIA Network+ Self-Paced Study Guide (Exam N10-008)' in preparation for your certification exam.Continue Reading
Study various network types, topologies for configuration
Those looking to earn a Network+ certification need to learn about network types, topologies, network design best practices and more. James Pengelly's book covers those topics.Continue Reading
Network design considerations for Network+ exam prep
One of the first things network pros should learn is how to design a network. In this Q&A, author James Pengelly discusses best practices for network configuration.Continue Reading
Network Time Protocol (NTP)
Network Time Protocol (NTP) is an internet protocol used to synchronize with computer clock time sources in a network.Continue Reading
CASB vs. SASE: What's the difference?
A cloud access security broker works within a Secure Access Service Edge architecture. Find out how CASB and SASE work together to improve network security.Continue Reading
How NetOps differs from traditional network operations
When comparing NetOps and conventional network operations, network teams focus on automating repeatable tasks that correct problems rather than introducing new ones manually.Continue Reading
Load sharing vs. load balancing: What's the difference?
Load sharing and load balancing are two techniques that work to distribute traffic across a network. However, their methods of balancing differ significantly. Here's how.Continue Reading
Why NetOps is a bridge to AIOps
As IT infrastructure grows more complex, NetOps teams should identify ways to ensure their networks remain operational and perform at peak levels. One option is AIOps.Continue Reading
Application vs. network load balancing: What's the difference?
Network load balancing and application load balancing both handle traffic requests. But they process and direct those requests with different levels of speed and efficiency.Continue Reading
10 basic network management interview questions and answers
Job interviews should be a two-way conversation. Here are some common network management interview questions for both hiring managers and job applicants.Continue Reading
access control list (ACL)
An access control list (ACL) is a list of rules that specifies which users or systems are granted or denied access to a particular object or system resource.Continue Reading
Point-to-Point Protocol (PPP)
Point-to-Point Protocol (PPP) refers to a suite of computer communication protocols that provide a standard way to transport multiprotocol data over point-to-point links.Continue Reading
Intro to encapsulation and decapsulation in networking
Encapsulation adds information to a packet as it travels to its destination. Decapsulation reverses the process by removing the info, so a destination device can read the original data.Continue Reading
What's happening with standalone 5G?
Standalone 5G is the next major update for 5G technology. Learn about the benefits SA 5G will bring and find out when operators will begin deploying it worldwide.Continue Reading
Network engineer vs. network administrator: What's the difference?
The difference between a network engineer and network administrator is an engineer is focused on network design, while an administrator is more focused on operations.Continue Reading
5 principles of the network change management process
Network change management includes five basic principles, including risk analysis and peer review. These best practices can help network teams limit failed network changes and outages.Continue Reading
What are the different types of network switches?
Some of the different types of network switches include managed, modular, unmanaged and stackable. Find out how different network switches dovetail and differ.Continue Reading
Reverse Address Resolution Protocol (RARP)
Reverse Address Resolution Protocol (RARP) is a protocol a physical machine in a local area network (LAN) can use to request its IP address.Continue Reading
MDI/MDIX (medium-dependent interface/MDI crossover)
MDI/MDIX is a type of Ethernet port connection that uses twisted-pair cabling to link two networked devices.Continue Reading
DHCP client configuration for Linux, Windows and macOS
Network and system admins can use command-line and GUI tools to configure DHCP clients in Linux, Windows and macOS. Here's a breakdown of which commands to use for each OS.Continue Reading
9 wireless questions for Cisco's CCT, CCNA exams
Those looking to pass the Cisco CCT and CCNA certification exams will need to understand how wireless networking works. This practice quiz covers the basics of wireless networking.Continue Reading
Guide on wireless networking concepts for CCT, CCNA exams
Cisco's CCT and CCNA exams include wireless networking questions. Use this excerpt from Glen Clarke's 'CCT/CCNA Routing and Switching All-in-One Exam Guide' as a tool to prepare.Continue Reading
Learn the basics of wireless networking for exam prep
In this Q&A, author Glen Clarke introduces readers to wireless networking and outlines what CCT and CCNA test-takers should study when prepping for their exams.Continue Reading
patch panel
A patch panel in a local area network (LAN) is a mounted hardware assembly that contains ports that are used to connect and manage incoming and outgoing LAN cables.Continue Reading
chatty protocol
A chatty protocol is an application or routing protocol requiring a client or server to wait for an acknowledgment before transmitting data again.Continue Reading
4 ideas for network cable management best practices
When organizing cable clutter, network engineers should follow some common best practices, including the use of cable labels, cable ties and proper documentation.Continue Reading
downloading
Downloading is the transmission of a file or data from one computer to another over a network, usually from a larger server to a user device.Continue Reading
IDSL
IDSL is a hybrid of a digital subscriber line (DSL) and integrated services digital network (ISDN) technology that transmits data slightly faster than ISDN but much slower than most DSL services.Continue Reading
ARPANET
The U.S. Advanced Research Projects Agency Network (ARPANET) was the first public packet-switched computer network.Continue Reading
HELLO packet
A HELLO packet is a special data packet (message) that is sent out periodically from a router to establish and confirm network adjacency relationships to other routers in the Open Shortest Path First (OSPF) communications protocol.Continue Reading
route summarization (route aggregation)
Route summarization -- also known as route aggregation -- is a method to minimize the number of routing tables in an Internet Protocol (IP) network.Continue Reading
full-duplex
Full-duplex data transmission means that data can be transmitted in both directions on a signal carrier at the same time.Continue Reading
What are the different types of network cables?
The main types of network cables are coax, fiber optics, and shielded and unshielded twisted pair. As enterprises deploy new technologies, it's critical to select the right cables.Continue Reading
Variable Length Subnet Mask (VLSM)
Variable Length Subnet Mask (VLSM) is a subnet -- a segmented piece of a larger network -- design strategy where all subnet masks can have varying sizes.Continue Reading
network node
A computer network is a system of computers and computing devices that are connected via communication links.Continue Reading
Seebeck effect
The Seebeck effect is a phenomenon in which a temperature difference between two dissimilar electrical conductors or semiconductors produces a voltage difference between the two substances.Continue Reading
dynamic multipoint VPN (DMVPN)
A dynamic multipoint virtual private network (DMVPN) is a secure network that exchanges data between sites/routers without passing traffic through an organization's virtual private network (VPN) server or router located at its headquarters.Continue Reading
delay-tolerant network (DTN)
A delay-tolerant network (DTN) is a network that's designed to operate effectively in extreme conditions and over very large distances, such as with space communications.Continue Reading
NBMA (non-broadcast multiple access)
Non-broadcast multiple access (NBMA) is one of four network types in the Open Shortest Path First (OSPF) communications protocol.Continue Reading