Get started
Bring yourself up to speed with our introductory content.
Get started
Bring yourself up to speed with our introductory content.
near-end crosstalk (NEXT)
Near-end crosstalk (NEXT) is an error condition that can occur when connectors are attached to twisted pair cabling. Continue Reading
10 Gigabit Ethernet (10 GbE)
10 Gigabit Ethernet (10 GbE) is a telecommunication technology that offers data speeds up to 10 billion bits per second. Continue Reading
spectrum analyzer
A spectrum analyzer is a device that measures and displays signal amplitude (strength) as it varies by frequency within its frequency range (spectrum). Continue Reading
-
virtual routing and forwarding (VRF)
Virtual routing and forwarding (VRF) is a technology included in Internet Protocol (IP) network routers that enables multiple instances of a routing table to exist in a virtual router and work simultaneously. Continue Reading
Time Division Multiple Access (TDMA)
Time Division Multiple Access (TDMA) is a digital modulation technique used in digital cellular telephone and mobile radio communication. Continue Reading
-
Definitions to Get Started
- single-user multiple input, multiple output (SU-MIMO)
- Address Resolution Protocol (ARP)
- ternary content-addressable memory (TCAM)
- 5G standalone (5G SA)
- Cisco IOS (Cisco Internetwork Operating System)
- What is 6G? Overview of 6G networks & technology
- carrier cloud
- data link layer
HDLC (High-level Data Link Control)
HDLC (High-level Data Link Control) is a group of protocols or rules for transmitting data between network points (sometimes called nodes).Continue Reading
Signaling System 7 (SS7)
Signaling System 7 (SS7) is an international telecommunication protocol standard that defines how the network elements in a public switched telephone network (PSTN) exchange information and control signals.Continue Reading
shielded twisted pair (STP)
Shielded twisted pair (STP) is a special kind of copper telephone and local area network (LAN) wiring used in some business installations.Continue Reading
IEEE 802.3
802.3, or IEEE 802.3, is a working group of standard specifications for Ethernet, a method of packet-based physical communication in a local area network maintained by the Institute of Electrical and Electronics Engineers.Continue Reading
bits per second (bps or bit/sec)
In data communications, bits per second (bps or bit/sec) is a common measure of data speed for computer modems and transmission carriers.Continue Reading
-
CCNA certification
Cisco Certified Network Associate (CCNA) is a technical certification that Cisco offers for early-career networking professionals.Continue Reading
bandwidth (network bandwidth)
Network bandwidth is a measurement indicating the maximum capacity of a wired or wireless communications link to transmit data over a network connection in a given amount of time.Continue Reading
An introduction to Go network programming
This chapter excerpt from 'Network Programming with Go' dives into logging and metrics, while also providing Go code examples and best practices.Continue Reading
Best practices and strategies for logging in Go
Author Adam Woodbeck discusses how network teams can use the Go programming language for logging and metrics. One tip: Log prudently, and use metrics generously.Continue Reading
How to secure your home Wi-Fi network in 7 steps
When securing your home Wi-Fi, update devices regularly, change passwords consistently, turn off unused services and inspect outdoor network equipment.Continue Reading
Hybrid network vs. hybrid network infrastructure
Hybrid networks and hybrid network infrastructure blend different kinds of equipment, geographic locations, network ownership and technology disciplines.Continue Reading
FTP (File Transfer Protocol)
FTP (File Transfer Protocol) is a network protocol for transmitting files between computers over TCP/IP connections.Continue Reading
How to set up a home network -- a 7-step guide
From understanding hardware components to managing network performance and security, this guide teaches networking newbies how to set up a home network.Continue Reading
Ansible vs. Terraform vs. Vagrant: What's the difference?
Ansible, Terraform and Vagrant are common infrastructure automation platforms with specific use cases, benefits and drawbacks. But choosing a platform doesn't need to be confusing.Continue Reading
4 attributes key to network-as-a-service model
For a network-as-a-service model to work for the enterprise, it needs to offer four key attributes: an application-specific, elastic, secure and personalized VPN.Continue Reading
Wi-Fi 6 vs. Wi-Fi 6E: Spectrum, not hype, is key difference
The extended spectrum of Wi-Fi 6E sounds promising. But, when assessing Wi-Fi 6 vs. Wi-Fi 6E, organizations should pay close attention to radio frequency characteristics.Continue Reading
What does a network infrastructure upgrade project involve?
Explore the steps organizations must take to upgrade their network infrastructure, including how to tell if an upgrade is necessary and how to evaluate resources for the project.Continue Reading
Wi-Fi 6 rollout requires careful review of network devices
Wi-Fi 6 is just one part of the overall enterprise network. Organizations need to evaluate several network components to ensure a smooth Wi-Fi 6 deployment.Continue Reading
Network layer
Located at Layer 3 of the Open Systems Interconnection (OSI) communications model, the primary function of the network layer is to move data into and through other networks.Continue Reading
Understand top SD-WAN advantages and disadvantages
Cost, complexity, security, training, troubleshooting and software bugs are some top SD-WAN challenges. Discover more on the advantages that SD-WAN can usher into an enterprise.Continue Reading
3G (third generation of mobile telephony)
3G refers to the third generation of cellular technology that enables mobile telephony.Continue Reading
firewall as a service (FWaaS)
Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic inspection capabilities to customers seeking to decommission or augment their existing network firewall appliances.Continue Reading
CDMA (Code-Division Multiple Access)
CDMA (Code-Division Multiple Access) refers to any of several protocols used in second-generation (2G) and third-generation (3G) wireless communications.Continue Reading
ICMP (Internet Control Message Protocol)
ICMP (Internet Control Message Protocol) is an error-reporting protocol that network devices such as routers use to generate error messages to the source IP address when network problems prevent delivery of IP packets.Continue Reading
Test your knowledge of socket programming in Python
In this quiz, review the fundamentals of socket programming in Python, including port scanning, TCP and UDP, and how to enable different methods from the socket module.Continue Reading
Explore this ultimate socket programming guide for beginners
In this socket programming guide preview, learn how sockets work, the role of socket programming in enterprise networks and the ins and outs of socket programming in Python.Continue Reading
How to get started with socket programming for beginners
To understand socket programming for beginners, basic network and security concepts are critical -- and having Python skills won't hurt, either. Learn more in this expert Q&A.Continue Reading
orthogonal frequency-division multiplexing (OFDM)
Orthogonal frequency-division multiplexing (OFDM) is a method of data transmission where a single information stream is split among several closely spaced narrowband subchannel frequencies instead of a single wideband channel frequency.Continue Reading
5 steps to conduct network penetration testing
Enterprises that want to ensure competent network security strategies should look at how they can implement penetration testing, considering red teams and physical pen tests.Continue Reading
5 benefits of Wi-Fi 6 for enterprise networks
In a perfect world, Wi-Fi 6 could introduce several benefits to business networks. But real-world conditions could curb the wireless technology's true potential.Continue Reading
OSI model (Open Systems Interconnection)
OSI (Open Systems Interconnection) is a reference model for how applications communicate over a network.Continue Reading
Get started with network penetration testing for beginners
Authentication, patching and configuration are among the most common vulnerabilities found through network penetration testing. Learn more in this free chapter excerpt.Continue Reading
Advice on how to learn network penetration testing skills
As beginners learn network penetration testing skills, they should remember these expert tips: Pay attention to what the client wants, and stick to offense, not defense.Continue Reading
radio frequency (RF, rf)
Radio frequency (RF) is a measurement representing the oscillation rate of electromagnetic radiation spectrum, or electromagnetic radio waves, from frequencies ranging from 300 GHz to as low as 9 kHz.Continue Reading
metropolitan area network (MAN)
A metropolitan area network (MAN) is a computer network that is larger than a single building local area network (LAN) but is located in a single geographic area that is smaller than a wide area network (WAN).Continue Reading
How to build a private 5G business case
As you build a private 5G business case, be sure to include private 5G's benefits and challenges, as well as how to prove its ROI. Here's everything you need to know.Continue Reading
SASE vs. SD-WAN comparison: How are they related?
SASE and SD-WAN both connect geographically separate endpoints to each other and an organization's network resources, but the methods in which they do so differ in various ways.Continue Reading
DevNet vs. CCNA: What's the difference?
While CCNA certification concentrates on foundational network engineering knowledge, DevNet certification focuses on modern networking concepts, like automation and software.Continue Reading
local area network (LAN)
A local area network (LAN) is a group of computers and peripheral devices that share a common communications line or wireless link to a server within a distinct geographic area.Continue Reading
An overview of 3GPP 5G releases and what each one means
3GPP has standardized features and specifications for all cellular technology generations since 3G. Learn about 3GPP's 5G timeline and notable features each 5G release introduces.Continue Reading
How to monitor home network traffic for added security
When addressing home network monitoring, track all connected devices, and take advantage of open source tools, like packet capture, to sniff out malicious traffic.Continue Reading
How to understand networking and the internet for beginners
For beginners, learning how networking and the internet truly work can feel overwhelming. One expert encourages patience, practice and assurance that networking isn't unknowable.Continue Reading
How to learn networking fundamentals, from a software pro
Networking basics include protocols, network layers and processes that must happen for computers to communicate across a network. Here's how to start learning these basics.Continue Reading
VLAN vs. subnet: What's the difference?
While VLANs are a type of subnet, they have their own unique capabilities and characteristics that differentiate them from subnets. However, the OSI model plays a major role in both.Continue Reading
VPN vs. VLAN: What's the difference?
VPNs and VLANs are different technologies with some similarities. VPNs connect authorized users to corporate network resources, while VLANs connect geographically separate devices.Continue Reading
How to calculate SASE return on investment and costs
SASE return on investment will vary for each organization, depending on use cases and architecture requirements. But the metrics used to determine ROI and cost factors are the same.Continue Reading
Broadband vs. Wi-Fi: What's the difference?
Broadband and Wi-Fi are common technical terms often used interchangeably -- although they shouldn't be. Both provide connectivity, but they do so in different ways.Continue Reading
Top network attacks of 2020 that will influence the decade
You've heard of phishing, ransomware and viruses. Now, keep them in mind because one cybersecurity expert says these threats and more may cause IT headaches for the next decade.Continue Reading
Advice for an effective network security strategy
Security audits, evaluations of tools and looking realistically at trending technologies are some ways an organization can ensure its network security is the best it can be.Continue Reading
Test your network threats and attacks expertise in this quiz
Network security is an ever-changing subject, but many of its common threats have plagued IT pros for years -- and will likely continue to do so. See what you know in this quiz.Continue Reading
What are the differences between Wi-Fi and WiMax?
Wi-Fi is the wireless standard used to build wireless LANs, while carriers primarily used WiMax to build wireless metropolitan area networks before moving to LTE.Continue Reading
How to calculate a subnet mask from hosts and subnets
IP addressing and subnetting are important and basic elements of networks. In this article, learn how to calculate a subnet mask based on the required number of subnets and hosts.Continue Reading
Managed vs. unmanaged switches: What are the differences?
Managed and unmanaged network switches differ in various ways, including control and cost. Managed switches support more granular control, yet unmanaged switches have lower prices.Continue Reading
Network pros share Cisco DevNet certification advice
Cisco DevNet certifications require a lot of time investment, but network pros who pursue the certifications say the gained skills and knowledge are worth it.Continue Reading
A look inside the official Cisco DEVASC 200-901 guidebook
In this book excerpt, readers can explore the Cisco DEVASC 200-901 official guide and get a flavor of one of Cisco's newest exams and its blend of networking and software topics.Continue Reading
7 practice questions for Cisco 200-901 DevNet Associate exam
Ready for Cisco's introductory DevNet exam, DEVASC 200-901? Start your Cisco DevNet Associate training with this practice quiz directly from the official exam guidebook.Continue Reading
What is the difference between IP telephony and VoIP?
While many IT professionals use VoIP and IP telephony synonymously, some argue for keeping a couple of subtle distinctions between the two terms in mind.Continue Reading
Cisco Certified Entry Networking Technician (CCENT)
Cisco Certified Entry Networking Technician (CCENT) is a now-retired certification offered by Cisco, as part of their certification program.Continue Reading
How do VPN vs. cloud services compare for remote work?
As remote work becomes increasingly normal, IT teams must decide which remote access technologies will benefit employees more. VPN and cloud services are two top choices.Continue Reading
How and why to implement Wi-Fi QoS
Quality of service, as network pros know, prioritizes apps as they cross the network. But Wi-Fi QoS needs to be considered, too, in relation to the overall network.Continue Reading
The role of SD-WAN templates before and during deployment
SD-WAN deployments require knowledge of network design and trust in software to take over some network maintenance duties. This is where SD-WAN templates come into play.Continue Reading
Learn to onboard, provision devices in Cisco's SD-WAN book
Here's a look inside Cisco's SD-WAN book, which details design and deployment for network teams looking to deploy SD-WAN and insights for SD-WAN certification hopefuls.Continue Reading
6 practice questions for SD-WAN certification training
Before you start SD-WAN certification training, try this quiz from Cisco's official SD-WAN guidebook, which covers onboarding and provisioning devices, as well as SD-WAN templates.Continue Reading
What network automation certification options are available?
Network automation certifications and training include vendor-specific commercial credentials, as well as open source options. Which career path is right for you?Continue Reading
edge device
An edge device is any piece of hardware that controls data flow at the boundary between two networks.Continue Reading
How to build a resilient network design
Everything fails eventually, even in networking. Enterprises can prepare for network failure by building resilience and redundancy into their network infrastructure design.Continue Reading
What does a VPN concentrator do?
As more employees work remotely and VPN use rises, VPN concentrators have become trendy. But what does a VPN concentrator do exactly, and how do you deploy one?Continue Reading
millimeter wave (MM wave)
Millimeter wave (MM wave), also known as millimeter band, is the band of spectrum with wavelengths between 10 millimeters (30 GHz) and 1 millimeter (300 GHz).Continue Reading
How and when to establish enterprise 5G partnerships
Enterprises that buy 5G public services, procure network slices or build their own private 5G networks need to establish the right partnerships for mobile services, equipment and software.Continue Reading
Private LTE networks grow as 5G comes into view
Private LTE networks deliver secure cellular connectivity in localized enterprise or industrial spaces, with private 5G networks and newly available spectrum bands soon to follow.Continue Reading
What is the difference between SNMP and RMON?
While Simple Network Management Protocol tracks network devices, Remote Network Monitoring tracks traffic. As a team, SNMP and RMON are essential for network management.Continue Reading
The benefits of building a network automation lab
Network teams can build network automation labs to create a safe environment to test and validate automation tasks before running them in production networks.Continue Reading
Cloud security vs. network security: What's the difference?
While network security focuses on solely protecting networks, cloud security provides protection for networks, servers, containers, apps and more.Continue Reading
5 edge computing basics you need to know
Edge computing is forcing IT teams to rethink legacy architectures. In this guide, explore edge computing basics, including its pros and cons and its effect on enterprise networks.Continue Reading
How to select and set up SD-WAN and DIA
When evaluating different options for SD-WAN and direct internet access, IT teams can't forget to consider application performance, network uptime and support for each option.Continue Reading
Cisco Performance Routing (PfR)
Cisco Performance Routing (PfR) is a way of sending network packets based on intelligent path control.Continue Reading
What's the difference between GRE and IPsec tunnels?
IPsec provides more comprehensive security for IP tunneling, while GRE tunnels work well when network teams need to tunnel with multiple protocols or multicast.Continue Reading
How to set up a new business network
Building a new network can be complicated, but IT teams can ease the design process and future management by choosing the right architecture and documenting each decision.Continue Reading
What's the difference between a Layer 3 switch and a router?
Even though they have common traits, there is a difference between a Layer 3 switch and a router. Each plays a key role in making sure packets get sent to their proper destination.Continue Reading
What's the difference between OFDMA vs. MU-MIMO in Wi-Fi 6?
Is there a difference between OFDMA and MU-MIMO? The two important Wi-Fi 6 features are complementary but distinct. Here's why.Continue Reading
SD-branch devices promise network, security benefits
SD-branch technology integrates network and security functions in branch offices, thus promoting safer and more efficient connectivity for companies with multiple locations.Continue Reading
What to know about VPN termination
Network teams make several decisions when designing a secure VPN. One of those is where in the network, logically, they will terminate the VPN tunnels.Continue Reading
Is Wi-Fi 6 backward-compatible? Yes and no
With the advent of a new wireless standard, some users may wonder: Is Wi-Fi 6 backward-compatible? The answer is yes. But do you want full backward compatibility?Continue Reading
Wi-Fi vs. Ethernet: What's the difference and which is better?
When assessing Wi-Fi vs. Ethernet, each connection type has its benefits and drawbacks. Find out why one standard might be more reliable for your network.Continue Reading
A glossary of home network basics for the networking novice
A remote employee's home network requires basics such as routers, modems and VPN services. For the networking novice, this glossary explains and defines these terms and more.Continue Reading
5 things to know about MU-MIMO technology in Wi-Fi networks
'Multiuser multiple input, multiple output' might not roll off the tongue, but MU-MIMO technology is increasingly important in modern wireless networks. Here's what you should know.Continue Reading
Top 5 VPN myths and misconceptions for IT organizations
Although VPN technology has its challenges, various misconceptions exist that can muddle IT teams' understandings of VPNs. Here are five common VPN misconceptions debunked.Continue Reading
How to build a network monitoring business case
As network teams construct a business case for a new network monitoring tool, they should include a cost comparison of alternative tools and a strong defense for the selected tool.Continue Reading
Explore real-world edge computing examples for network teams
Developed out of a necessity to handle increasing amounts of data, edge computing will disrupt traditional computing and benefit various modern use cases.Continue Reading
Edge computing book introduces edge laws and techniques
In this book excerpt, discover the three laws of edge computing, as well as how to use edge computing techniques to solve common IT problems within organizations.Continue Reading
Network engineer career advice amid the COVID-19 pandemic
As COVID-19 dramatically affects the global economy, people may ask, 'What's next for my career?' No one is sure, but these tips can help network engineers feel and stay secure.Continue Reading
A guide on how to learn network automation
Being a network professional means being a lifelong learner. So learn what network automation skills are essential and how best to acquire them quickly.Continue Reading
What are the 5 different types of network management?
Security policies, optimal service levels, configuration changes and even cost control measures all encompass the different types of network management.Continue Reading
What are the differences between VPN and VDI services?
With a common denominator of 'virtual,' both VPNs and VDI are common in remote work strategies. However, the technologies differ in terms of cost, use cases and performance.Continue Reading
What is the difference between a socket and a port?
Sockets, ports and port numbers have functional overlap, but the terms are distinct. A socket is part of a port, while a port number is part of a socket. We explain.Continue Reading