Get started
Bring yourself up to speed with our introductory content.
Get started
Bring yourself up to speed with our introductory content.
local area network (LAN)
A local area network (LAN) is a group of computers and peripheral devices that share a common communications line or wireless link to a server within a distinct geographic area. Continue Reading
An overview of 3GPP 5G releases and what each one means
3GPP has standardized features and specifications for all cellular technology generations since 3G. Learn about 3GPP's 5G timeline and notable features each 5G release introduces. Continue Reading
How to monitor home network traffic for added security
When addressing home network monitoring, track all connected devices, and take advantage of open source tools, like packet capture, to sniff out malicious traffic. Continue Reading
-
How to understand networking and the internet for beginners
For beginners, learning how networking and the internet truly work can feel overwhelming. One expert encourages patience, practice and assurance that networking isn't unknowable. Continue Reading
How to learn networking fundamentals, from a software pro
Networking basics include protocols, network layers and processes that must happen for computers to communicate across a network. Here's how to start learning these basics. Continue Reading
VLAN vs. subnet: What's the difference?
While VLANs are a type of subnet, they have their own unique capabilities and characteristics that differentiate them from subnets. However, the OSI model plays a major role in both.Continue Reading
VPN vs. VLAN: What's the difference?
VPNs and VLANs are different technologies with some similarities. VPNs connect authorized users to corporate network resources, while VLANs connect geographically separate devices.Continue Reading
How to calculate SASE return on investment and costs
SASE return on investment will vary for each organization, depending on use cases and architecture requirements. But the metrics used to determine ROI and cost factors are the same.Continue Reading
Broadband vs. Wi-Fi: What's the difference?
Broadband and Wi-Fi are common technical terms often used interchangeably -- although they shouldn't be. Both provide connectivity, but they do so in different ways.Continue Reading
network performance monitoring
Network performance monitoring is a process of measuring and monitoring the quality of service of a network to understand if it is properly operating.Continue Reading
-
Top network attacks of 2020 that will influence the decade
You've heard of phishing, ransomware and viruses. Now, keep them in mind because one cybersecurity expert says these threats and more may cause IT headaches for the next decade.Continue Reading
Advice for an effective network security strategy
Security audits, evaluations of tools and looking realistically at trending technologies are some ways an organization can ensure its network security is the best it can be.Continue Reading
Test your network threats and attacks expertise in this quiz
Network security is an ever-changing subject, but many of its common threats have plagued IT pros for years -- and will likely continue to do so. See what you know in this quiz.Continue Reading
What are the differences between Wi-Fi and WiMax?
Wi-Fi is the wireless standard used to build wireless LANs, while carriers primarily used WiMax to build wireless metropolitan area networks before moving to LTE.Continue Reading
How to calculate a subnet mask from hosts and subnets
IP addressing and subnetting are important and basic elements of networks. In this article, learn how to calculate a subnet mask based on the required number of subnets and hosts.Continue Reading
Managed vs. unmanaged switches: What are the differences?
Managed and unmanaged network switches differ in various ways, including control and cost. Managed switches support more granular control, yet unmanaged switches have lower prices.Continue Reading
Cisco IOS (Cisco Internetwork Operating System)
Cisco IOS (Internetwork Operating System) is a proprietary operating system that runs on Cisco Systems routers and switches.Continue Reading
Network pros share Cisco DevNet certification advice
Cisco DevNet certifications require a lot of time investment, but network pros who pursue the certifications say the gained skills and knowledge are worth it.Continue Reading
A look inside the official Cisco DEVASC 200-901 guidebook
In this book excerpt, readers can explore the Cisco DEVASC 200-901 official guide and get a flavor of one of Cisco's newest exams and its blend of networking and software topics.Continue Reading
7 practice questions for Cisco 200-901 DevNet Associate exam
Ready for Cisco's introductory DevNet exam, DEVASC 200-901? Start your Cisco DevNet Associate training with this practice quiz directly from the official exam guidebook.Continue Reading
What is the difference between IP telephony and VoIP?
While many IT professionals use VoIP and IP telephony synonymously, some argue for keeping a couple of subtle distinctions between the two terms in mind.Continue Reading
Cisco Certified Entry Networking Technician (CCENT)
Cisco Certified Entry Networking Technician (CCENT) is a now-retired certification offered by Cisco, as part of their certification program.Continue Reading
How do VPN vs. cloud services compare for remote work?
As remote work becomes increasingly normal, IT teams must decide which remote access technologies will benefit employees more. VPN and cloud services are two top choices.Continue Reading
Network engineer vs. software engineer: What’s the difference?
Network and software engineering are two different fields, and the roles of network engineers vs. software engineers vary, despite potential overlaps in software skills.Continue Reading
How and why to implement Wi-Fi QoS
Quality of service, as network pros know, prioritizes apps as they cross the network. But Wi-Fi QoS needs to be considered, too, in relation to the overall network.Continue Reading
The role of SD-WAN templates before and during deployment
SD-WAN deployments require knowledge of network design and trust in software to take over some network maintenance duties. This is where SD-WAN templates come into play.Continue Reading
Learn to onboard, provision devices in Cisco's SD-WAN book
Here's a look inside Cisco's SD-WAN book, which details design and deployment for network teams looking to deploy SD-WAN and insights for SD-WAN certification hopefuls.Continue Reading
6 practice questions for SD-WAN certification training
Before you start SD-WAN certification training, try this quiz from Cisco's official SD-WAN guidebook, which covers onboarding and provisioning devices, as well as SD-WAN templates.Continue Reading
What network automation certification options are available?
Network automation certifications and training include vendor-specific commercial credentials, as well as open source options. Which career path is right for you?Continue Reading
edge device
An edge device is any piece of hardware that controls data flow at the boundary between two networks.Continue Reading
How to build a resilient network design
Everything fails eventually, even in networking. Enterprises can prepare for network failure by building resilience and redundancy into their network infrastructure design.Continue Reading
What does a VPN concentrator do?
As more employees work remotely and VPN use rises, VPN concentrators have become trendy. But what does a VPN concentrator do exactly, and how do you deploy one?Continue Reading
The 3 different types of 5G technology for enterprises
5G isn't a single flavor of cellular technology; it's three flavors, and each one can enable advanced capabilities, such as ultrareliable low latency and IoT connectivity.Continue Reading
millimeter wave (MM wave)
Millimeter wave (MM wave), also known as millimeter band, is the band of spectrum with wavelengths between 10 millimeters (30 GHz) and 1 millimeter (300 GHz).Continue Reading
How and when to establish enterprise 5G partnerships
Enterprises that buy 5G public services, procure network slices or build their own private 5G networks need to establish the right partnerships for mobile services, equipment and software.Continue Reading
How to build a private 5G network architecture
A private 5G network could provide organizations with greater control over their wireless environments. But cost and complexity could be critical deterrents.Continue Reading
Private LTE networks grow as 5G comes into view
Private LTE networks deliver secure cellular connectivity in localized enterprise or industrial spaces, with private 5G networks and newly available spectrum bands soon to follow.Continue Reading
What is the difference between SNMP and RMON?
While Simple Network Management Protocol tracks network devices, Remote Network Monitoring tracks traffic. As a team, SNMP and RMON are essential for network management.Continue Reading
The benefits of building a network automation lab
Network teams can build network automation labs to create a safe environment to test and validate automation tasks before running them in production networks.Continue Reading
Cloud security vs. network security: What's the difference?
While network security focuses on solely protecting networks, cloud security provides protection for networks, servers, containers, apps and more.Continue Reading
5 edge computing basics you need to know
Edge computing is forcing IT teams to rethink legacy architectures. In this guide, explore edge computing basics, including its pros and cons and its effect on enterprise networks.Continue Reading
How to select and set up SD-WAN and DIA
When evaluating different options for SD-WAN and direct internet access, IT teams can't forget to consider application performance, network uptime and support for each option.Continue Reading
Cisco Performance Routing (PfR)
Cisco Performance Routing (PfR) is a way of sending network packets based on intelligent path control.Continue Reading
What's the difference between GRE and IPsec tunnels?
IPsec provides more comprehensive security for IP tunneling, while GRE tunnels work well when network teams need to tunnel with multiple protocols or multicast.Continue Reading
How to set up a new business network
Building a new network can be complicated, but IT teams can ease the design process and future management by choosing the right architecture and documenting each decision.Continue Reading
What's the difference between a Layer 3 switch and a router?
Even though they have common traits, there is a difference between a Layer 3 switch and a router. Each plays a key role in making sure packets get sent to their proper destination.Continue Reading
What's the difference between OFDMA vs. MU-MIMO in Wi-Fi 6?
Is there a difference between OFDMA and MU-MIMO? The two important Wi-Fi 6 features are complementary but distinct. Here's why.Continue Reading
SD-branch devices promise network, security benefits
SD-branch technology integrates network and security functions in branch offices, thus promoting safer and more efficient connectivity for companies with multiple locations.Continue Reading
What to know about VPN termination
Network teams make several decisions when designing a secure VPN. One of those is where in the network, logically, they will terminate the VPN tunnels.Continue Reading
Is Wi-Fi 6 backward-compatible? Yes and no
With the advent of a new wireless standard, some users may wonder: Is Wi-Fi 6 backward-compatible? The answer is yes. But do you want full backward compatibility?Continue Reading
Wi-Fi vs. Ethernet: What's the difference and which is better?
When assessing Wi-Fi vs. Ethernet, each connection type has its benefits and drawbacks. Find out why one standard might be more reliable for your network.Continue Reading
What's the difference between Wi-Fi and the internet?
The distinction between Wi-Fi and the internet is important, especially as more people work from home and try to troubleshoot their network connectivity problems.Continue Reading
A glossary of home network basics for the networking novice
A remote employee's home network requires basics such as routers, modems and VPN services. For the networking novice, this glossary explains and defines these terms and more.Continue Reading
5 things to know about MU-MIMO technology in Wi-Fi networks
'Multiuser multiple input, multiple output' might not roll off the tongue, but MU-MIMO technology is increasingly important in modern wireless networks. Here's what you should know.Continue Reading
Top 5 VPN myths and misconceptions for IT organizations
Although VPN technology has its challenges, various misconceptions exist that can muddle IT teams' understandings of VPNs. Here are five common VPN misconceptions debunked.Continue Reading
How to build a network monitoring business case
As network teams construct a business case for a new network monitoring tool, they should include a cost comparison of alternative tools and a strong defense for the selected tool.Continue Reading
Explore real-world edge computing examples for network teams
Developed out of a necessity to handle increasing amounts of data, edge computing will disrupt traditional computing and benefit various modern use cases.Continue Reading
Edge computing book introduces edge laws and techniques
In this book excerpt, discover the three laws of edge computing, as well as how to use edge computing techniques to solve common IT problems within organizations.Continue Reading
Network engineer career advice amid the COVID-19 pandemic
As COVID-19 dramatically affects the global economy, people may ask, 'What's next for my career?' No one is sure, but these tips can help network engineers feel and stay secure.Continue Reading
A guide on how to learn network automation
Being a network professional means being a lifelong learner. So learn what network automation skills are essential and how best to acquire them quickly.Continue Reading
What are the 5 different types of network management?
Security policies, optimal service levels, configuration changes and even cost control measures all encompass the different types of network management.Continue Reading
What are the differences between VPN and VDI services?
With a common denominator of 'virtual,' both VPNs and VDI are common in remote work strategies. However, the technologies differ in terms of cost, use cases and performance.Continue Reading
What is the difference between a socket and a port?
Sockets, ports and port numbers have functional overlap, but the terms are distinct. A socket is part of a port, while a port number is part of a socket. We explain.Continue Reading
A glossary of the VPN terminology you need to know
For organizations with remote workforces, VPNs can be an essential part of daily life. This VPN glossary explores the essential terms and phrases that constitute VPN services.Continue Reading
Wi-Fi 6 explained: Speed, range, latency, frequency and security
Wi-Fi 6 is more than just another wireless upgrade, boasting substantial gains over Wi-Fi 5. Learn how frequency, speed, range, latency and security change with the new standard.Continue Reading
SASE model aims to boost network security, performance
Secure Access Service Edge is the new approach to improving network performance in enterprises powered by cloud and mobile. Here's what you must know about SASE.Continue Reading
SNMP vs. CMIP: What's the difference?
While SNMP and CMIP originally competed as network management protocols in the 1980s, SNMP has emerged as the more relevant protocol, largely due to its simplicity.Continue Reading
How is SD-WAN as a service different from managed SD-WAN?
SD-WAN technology is available in a variety of business models, including SD-WAN as a service and managed SD-WAN. But how do the different consumption models compare?Continue Reading
What does 'network on demand' mean for enterprises?
Following the on-demand trend, network on-demand options provide enterprises with more flexible consumption models, such as managed network services and cloud-based networking.Continue Reading
What is the difference between LoRa and LoRaWAN?
LoRa is a modulation technique for specific wireless spectrum, while LoRaWAN is an open protocol that enables IoT devices to use LoRa for communication.Continue Reading
What is network verification and do enterprises need it?
Network verification can help organizations gain critical network performance insight and alleviate network complexity. But aspects of the concept are new and not yet mainstream.Continue Reading
USSD (Unstructured Supplementary Service Data)
USSD (Unstructured Supplementary Service Data) is a GSM (Global System for Mobile) communications protocol that is used to send text messages.Continue Reading
Try 10 practice questions for the CCNP, CCIE ENCOR 350-401
This practice quiz for CCNP and CCIE ENCOR 350-401 explores what readers must know about IP routing essentials -- including BGP and OSPF -- from the new certification guidebook.Continue Reading
How Cisco certification changes alter CCNP and CCIE tracks
Here's what to expect from the colossal Cisco certification changes to the CCNP and CCIE tracks that aim to increase material relevance and benefit network engineers' daily lives.Continue Reading
Prepare for CCNP, CCIE ENCOR 350-401 with this guide preview
Here's an excerpt from the new 'CCNP and CCIE ENCOR 350-401 Official Cert Guide' that provides the key IP routing essentials network engineers require for their job roles.Continue Reading
An introduction to network automation with Ansible
Ansible is one of the most popular open source network automation tools. Network pros can use it to perform basic network automation tasks, like collecting ARP table data.Continue Reading
How do I build a cloud-ready network?
IT teams can prepare their networks for cloud migrations by planning around their applications, security strategies, remote users and WAN performance.Continue Reading
A glossary of network terms for management and monitoring
This glossary of network terms specifically highlights network management and monitoring processes. Explore these 12 key terms and concise definitions.Continue Reading
Understand business value to advance your networking career
Network pros can use the CAR mindset -- challenge, action and result -- to better match their networking initiatives with business goals and advance their career opportunities.Continue Reading
What's the difference between SD-branch vs. SD-WAN?
As networking pros evaluate SD-branch vs. SD-WAN, they'll notice a key distinction between the two technologies, namely how network functions are managed and orchestrated.Continue Reading
A look inside 'CCNA 200-301 Official Cert Guide, Volume 2'
Network security is a crucial skills area for network engineers, and the CCNA 200-301 reflects this. Here's a chapter excerpt on network security from the new guide.Continue Reading
Traditional, emerging topics unite in the new CCNA exam
As of Feb. 24, all eyes are on the CCNA 200-301 exam -- Cisco's latest update to the CCNA track. Here's a look at what's on the exam and how it compares to previous CCNA exams.Continue Reading
What's the difference between thin and thick SD-WAN branch offices?
When rolling out software-defined WAN, you'll need to consider the current makeup of your branch offices. For instance, are applications on-site or in the cloud?Continue Reading
Compare Paramiko, Netmiko and NAPALM network automation
Python is a useful language, but it can't do everything. Explore some basic network automation scripts that use Python with three automation libraries: Paramiko, Netmiko and NAPALM.Continue Reading
Analyze the differences between Wi-Fi 6 vs. Wi-Fi 5
While Wi-Fi 5 is still sufficient for many organizations, Wi-Fi 6 is worth learning about. Check out the major differences between the two and what that means for your organization.Continue Reading
Wi-Fi 6 glossary of 12 important terms and phrases
This Wi-Fi 6 glossary delves into various features and capabilities the new generation of Wi-Fi technology offers, as well as what organizations can expect from Wi-Fi 6 devices.Continue Reading
SD-WAN vs. load balancing: How are they different?
SD-WAN can use load balancing for WAN connections, but it doesn't require load balancing to work. Compare some of the similarities and differences between the two.Continue Reading
SD-WAN vs. DMVPN vs. IPsec tunnels: How do I choose?
Software-defined WAN, DMVPN and IPsec tunnels each have a place among enterprises. Our network expert compares each one and explains where they can be most beneficial.Continue Reading
Test your knowledge of SD-WAN deployments and testing
As SD-WAN becomes more mainstream, organizations must learn what to expect during all phases of deployment. Try your knowledge of SD-WAN testing, deployments and troubleshooting.Continue Reading
Asynchronous
In general, asynchronous -- pronounced ay-SIHN-kro-nuhs, from Greek asyn-, meaning "not with," and chronos, meaning "time" -- is an adjective describing objects or events that are not coordinated in time.Continue Reading
How do I build the right cloud network design?
Networks look different now than they did a decade ago, and that continuous change isn't slowing down. Cloud networking plays a large role in the transformation of legacy networks.Continue Reading
What SD-WAN devices do I need in an SD-WAN deployment?
Despite the software-centric nature of software-defined WAN, certain SD-WAN devices are still required to help transport traffic and complete network connections.Continue Reading
Test your cloud networking knowledge with these 10 questions
As cloud networks become more common, IT teams must understand how cloud architectures can benefit -- or impede -- business requirements. Take this quiz to see how much you know.Continue Reading
Understanding the evolution of Ethernet
First developed by Xerox PARC in the 1970s and ratified by IEEE as a standard in 1983, the evolution of Ethernet has taken this LAN technology through dozens of specifications.Continue Reading
SD-WAN explained in 15 key terms and phrases
This SD-WAN glossary delves into the various capabilities, technologies and components that encompass SD-WAN, explained with 15 concise definitions.Continue Reading
What is the difference between a bridge and a router?
While a bridge and router share some similarities, the difference between a bridge and router is significant, including how the devices interpret network connections.Continue Reading
What's the difference between half-duplex and full-duplex?
A half-duplex transmission could be considered a one-way street between sender and receiver. Full-duplex, on the other hand, enables two-way traffic at the same time.Continue Reading
Network security vs. application security: What's the difference?
Different tools protect different assets at the network and application layers. But both network and application security need to support the larger security plan.Continue Reading
Learn how to master network traffic analysis with Python
In this book excerpt, explore key components of network security and network traffic analysis with Python scripting from Packt Publishing author José Manuel Ortega.Continue Reading
An overview of how BGP works
Border Gateway Protocol makes the internet work, but how does BGP work? This animated video explains the basics of BGP and discusses its role in the internet.Continue Reading