Get started
Bring yourself up to speed with our introductory content.
Get started
Bring yourself up to speed with our introductory content.
A glossary of the VPN terminology you need to know
For organizations with remote workforces, VPNs can be an essential part of daily life. This VPN glossary explores the essential terms and phrases that constitute VPN services. Continue Reading
Wi-Fi 6 explained: Speed, range, latency, frequency and security
Wi-Fi 6 is more than just another wireless upgrade, boasting substantial gains over Wi-Fi 5. Learn how frequency, speed, range, latency and security change with the new standard. Continue Reading
SASE model aims to boost network security, performance
Secure Access Service Edge is the new approach to improving network performance in enterprises powered by cloud and mobile. Here's what you must know about SASE. Continue Reading
-
SNMP vs. CMIP: What's the difference?
While SNMP and CMIP originally competed as network management protocols in the 1980s, SNMP has emerged as the more relevant protocol, largely due to its simplicity. Continue Reading
How is SD-WAN as a service different from managed SD-WAN?
SD-WAN technology is available in a variety of business models, including SD-WAN as a service and managed SD-WAN. But how do the different consumption models compare? Continue Reading
-
Definitions to Get Started
- single-user multiple input, multiple output (SU-MIMO)
- Address Resolution Protocol (ARP)
- ternary content-addressable memory (TCAM)
- 5G standalone (5G SA)
- Cisco IOS (Cisco Internetwork Operating System)
- What is 6G? Overview of 6G networks & technology
- data link layer
- carrier cloud
What does 'network on demand' mean for enterprises?
Following the on-demand trend, network on-demand options provide enterprises with more flexible consumption models, such as managed network services and cloud-based networking.Continue Reading
What is the difference between LoRa and LoRaWAN?
LoRa is a modulation technique for specific wireless spectrum, while LoRaWAN is an open protocol that enables IoT devices to use LoRa for communication.Continue Reading
What is network verification and do enterprises need it?
Network verification can help organizations gain critical network performance insight and alleviate network complexity. But aspects of the concept are new and not yet mainstream.Continue Reading
USSD (Unstructured Supplementary Service Data)
USSD (Unstructured Supplementary Service Data) is a GSM (Global System for Mobile) communications protocol that is used to send text messages.Continue Reading
Try 10 practice questions for the CCNP, CCIE ENCOR 350-401
This practice quiz for CCNP and CCIE ENCOR 350-401 explores what readers must know about IP routing essentials -- including BGP and OSPF -- from the new certification guidebook.Continue Reading
-
How Cisco certification changes alter CCNP and CCIE tracks
Here's what to expect from the colossal Cisco certification changes to the CCNP and CCIE tracks that aim to increase material relevance and benefit network engineers' daily lives.Continue Reading
Prepare for CCNP, CCIE ENCOR 350-401 with this guide preview
Here's an excerpt from the new 'CCNP and CCIE ENCOR 350-401 Official Cert Guide' that provides the key IP routing essentials network engineers require for their job roles.Continue Reading
An introduction to network automation with Ansible
Ansible is one of the most popular open source network automation tools. Network pros can use it to perform basic network automation tasks, like collecting ARP table data.Continue Reading
How do I build a cloud-ready network?
IT teams can prepare their networks for cloud migrations by planning around their applications, security strategies, remote users and WAN performance.Continue Reading
A glossary of network terms for management and monitoring
This glossary of network terms specifically highlights network management and monitoring processes. Explore these 12 key terms and concise definitions.Continue Reading
Understand business value to advance your networking career
Network pros can use the CAR mindset -- challenge, action and result -- to better match their networking initiatives with business goals and advance their career opportunities.Continue Reading
What's the difference between SD-branch vs. SD-WAN?
As networking pros evaluate SD-branch vs. SD-WAN, they'll notice a key distinction between the two technologies, namely how network functions are managed and orchestrated.Continue Reading
A look inside 'CCNA 200-301 Official Cert Guide, Volume 2'
Network security is a crucial skills area for network engineers, and the CCNA 200-301 reflects this. Here's a chapter excerpt on network security from the new guide.Continue Reading
Traditional, emerging topics unite in the new CCNA exam
As of Feb. 24, all eyes are on the CCNA 200-301 exam -- Cisco's latest update to the CCNA track. Here's a look at what's on the exam and how it compares to previous CCNA exams.Continue Reading
What's the difference between thin and thick SD-WAN branch offices?
When rolling out software-defined WAN, you'll need to consider the current makeup of your branch offices. For instance, are applications on-site or in the cloud?Continue Reading
Compare Paramiko, Netmiko and NAPALM network automation
Python is a useful language, but it can't do everything. Explore some basic network automation scripts that use Python with three automation libraries: Paramiko, Netmiko and NAPALM.Continue Reading
Analyze the differences between Wi-Fi 6 vs. Wi-Fi 5
While Wi-Fi 5 is still sufficient for many organizations, Wi-Fi 6 is worth learning about. Check out the major differences between the two and what that means for your organization.Continue Reading
Wi-Fi 6 glossary of 12 important terms and phrases
This Wi-Fi 6 glossary delves into various features and capabilities the new generation of Wi-Fi technology offers, as well as what organizations can expect from Wi-Fi 6 devices.Continue Reading
SD-WAN vs. load balancing: How are they different?
SD-WAN can use load balancing for WAN connections, but it doesn't require load balancing to work. Compare some of the similarities and differences between the two.Continue Reading
SD-WAN vs. DMVPN vs. IPsec tunnels: How do I choose?
Software-defined WAN, DMVPN and IPsec tunnels each have a place among enterprises. Our network expert compares each one and explains where they can be most beneficial.Continue Reading
Test your knowledge of SD-WAN deployments and testing
As SD-WAN becomes more mainstream, organizations must learn what to expect during all phases of deployment. Try your knowledge of SD-WAN testing, deployments and troubleshooting.Continue Reading
Asynchronous
In general, asynchronous -- pronounced ay-SIHN-kro-nuhs, from Greek asyn-, meaning "not with," and chronos, meaning "time" -- is an adjective describing objects or events that are not coordinated in time.Continue Reading
How do I build the right cloud network design?
Networks look different now than they did a decade ago, and that continuous change isn't slowing down. Cloud networking plays a large role in the transformation of legacy networks.Continue Reading
What SD-WAN devices do I need in an SD-WAN deployment?
Despite the software-centric nature of software-defined WAN, certain SD-WAN devices are still required to help transport traffic and complete network connections.Continue Reading
Test your cloud networking knowledge with these 10 questions
As cloud networks become more common, IT teams must understand how cloud architectures can benefit -- or impede -- business requirements. Take this quiz to see how much you know.Continue Reading
Understanding the evolution of Ethernet
First developed by Xerox PARC in the 1970s and ratified by IEEE as a standard in 1983, the evolution of Ethernet has taken this LAN technology through dozens of specifications.Continue Reading
SD-WAN explained in 15 key terms and phrases
This SD-WAN glossary delves into the various capabilities, technologies and components that encompass SD-WAN, explained with 15 concise definitions.Continue Reading
What is the difference between a bridge and a router?
While a bridge and router share some similarities, the difference between a bridge and router is significant, including how the devices interpret network connections.Continue Reading
What's the difference between half-duplex and full-duplex?
A half-duplex transmission could be considered a one-way street between sender and receiver. Full-duplex, on the other hand, enables two-way traffic at the same time.Continue Reading
Network security vs. application security: What's the difference?
Different tools protect different assets at the network and application layers. But both network and application security need to support the larger security plan.Continue Reading
Learn how to master network traffic analysis with Python
In this book excerpt, explore key components of network security and network traffic analysis with Python scripting from Packt Publishing author José Manuel Ortega.Continue Reading
An overview of how BGP works
Border Gateway Protocol makes the internet work, but how does BGP work? This animated video explains the basics of BGP and discusses its role in the internet.Continue Reading
What SD-WAN certifications and courses are available?
A few SD-WAN certifications do exist, but they're heavily focused on specific vendors and their respective products. Find out why market-wide certs are unlikely.Continue Reading
Discover 5 key cloud networking basics for your organization
Clear away the fog, and explore these five key cloud networking fundamentals -- such as models, challenges and tools -- you need to know before you adopt a cloud network strategy.Continue Reading
Prep for SD-WAN challenges, and you'll reap its rewards
Reap SD-WAN's multiple benefits by knowing ahead of time what the likely issues will be and the options available at the implementation and management stages.Continue Reading
SD-WAN deployment in the works? Consider these 3 things
SD-WAN can simplify the deployment and management of new branch WANs, but there are some key configuration and technical choices you must make to get started.Continue Reading
How to develop and implement a network security plan
When formulating a focused network security plan, you'll need to address specific questions about outbound traffic, user logins and government regulations.Continue Reading
A glossary of key edge computing architecture terms
Bolster your networking vocabulary and get to know the various features and technologies that constitute edge computing in this comprehensive glossary of key terms and phrases.Continue Reading
Data center transformation drives the ADC security use case
Application delivery controllers play many roles, but the ADC security use case might be most important. Learn about ADC features and how they boost data center security.Continue Reading
5G explained: A deep dive into the features and facts
In this 5G guide, learn about key features, challenges and deployment tips. This 5G explanation goes beyond the fundamentals and explores 5G's relationship to other technologies.Continue Reading
Cisco CCNA practice test: Try these 20 exam questions
Use this CCNA practice test as study material to prepare for the Cisco CCNA Routing and Switching 200-125 exam. With 20 questions on a range of topics, we're not playing around.Continue Reading
Try a CCNA 200-301 practice quiz from the official cert guide
This practice quiz provides a sneak peek into the new 'CCNA 200-301 Official Cert Guide, Volume 1,' which reflects Cisco's CCNA certification and exam redesigns.Continue Reading
Prepare for the CCNA 200-301 exam with this guide preview
Here's a sneak peek at what to expect from Cisco's redesigned CCNA exam directly from 'CCNA 200-301 Official Cert Guide, Volume 1' by author Wendell Odom.Continue Reading
Bridge vs. switch comparison: What's the difference?
A network bridge connects two local area networks. A network switch, on the other hand, connects multiple clients to a network. Learn more about these two network components.Continue Reading
IPv6 (Internet Protocol Version 6)
IPv6 is a set of specifications from the Internet Engineering Task Force that improves IPv4 by extending IP addresses from 32 bits to 128 bits.Continue Reading
Learn how to get started with your networking career
Wherever you are on your networking career path, these expert insights can help you decide where to go and give advice about job requirements, certifications and industry changes.Continue Reading
Network pros on new Cisco DevNet certification: 'Finally!'
Want to learn infrastructure as code? Now, there's a Cisco cert for that. Learn more about the new network automation certification suite, plus changes to the CCNA, CCNP and CCIE.Continue Reading
What is data center networking, and how can you get started?
This feature explores the basics of data center networks, such as how to plan for data center consolidation, the effects of cloud services and how to handle data center interconnects.Continue Reading
The top 5 capabilities your edge infrastructure should have
The network edge plays a vital role in the future of networking and digital transformation. Make sure your infrastructure has these five components to help it on its way.Continue Reading
What are network firewalls? Test your network security IQ
Network firewalls have been an essential part of network security since the internet began. This quiz covers what network firewalls are and tests your security expertise.Continue Reading
What are the steps I should take for network transformation?
The path to digital transformation has three points that all organizations should reach to ensure their network is ready for digital transformation.Continue Reading
What is 5G massive MIMO and how can it boost bandwidth?
With a large array of small antennas and time division duplex communication, 5G massive MIMO is expected to support more bandwidth and users with lower latency.Continue Reading
How does SD-WAN analytics monitor network performance?
With SD-WAN analytics, administrators can fine-tune their WAN connections and determine how well their network is performing.Continue Reading
Better security through software-defined perimeter know-how
Network attacks keep changing, which means your strategy for protecting the network must too. Learn one advancement that's replacing traditional network architectures.Continue Reading
What is network automation, and what can it do for you?
This feature explores what network automation is and its influence on organizations. It also discusses assumptions about its effect on network engineers and similarities with SDN.Continue Reading
Learn about the top telecom certifications
Use this expert advice to wade through myriad telecom certifications and pinpoint the top certifications for the industry, like TCO, iNARTE and BICSI certifications.Continue Reading
What does stateful vs. stateless mean in a networking context?
When it comes to understanding state from a networking perspective, knowing the difference between stateful vs. stateless firewalls is a crucial starting point.Continue Reading
BGP tutorial: How the routing protocol works
Border Gateway Protocol is the complex routing protocol that literally makes the internet work. This tutorial walks you through how BGP functions and offers troubleshooting options.Continue Reading
A glossary of 10 essential network security terms
This network security glossary covers both old and new key terms -- such as zero trust networks and microsegmentation -- that can bolster anyone's security vocabulary.Continue Reading
What is NetOps? Start with these 5 common questions
This compilation is an essential starting point for NetOps novices. These five common questions explore what NetOps is, how it can benefit networks and its effect on network teams.Continue Reading
An 802.11ax survival guide: Expectations for the Wi-Fi standard
This 802.11ax survival guide has the information you need for the newest Wi-Fi standard, including various expectations, device advice and available features.Continue Reading
4 criteria to consider in your cloud migration strategy
Organizations that are evaluating a workload migration to the cloud should use this workload placement process to build a consistent cloud migration strategy.Continue Reading
What do you know about the history of Wi-Fi?
If you ever wonder how Wi-Fi got to where it is today, this quiz takes you through the vast history of Wi-Fi, from the first generation through 802.11ax's impending ratification.Continue Reading
How is service mesh architecture different from SDN and NFV?
Service mesh separates itself from SDN and NFV approaches with its clear focus on managing the communication and forwarding between multiple microservices.Continue Reading
What's the difference between an edge router vs. core router?
Clearly, an edge router and core router are placed in different parts of the network, but their routing roles are more complex than their physical locations.Continue Reading
What are private 5G networks and could they emerge as a major trend?
In some network environments, businesses may need broader connection options for devices and automation. Private 5G networks, at some point, might be the answer.Continue Reading
A glossary for the terms and types of WAN technologies
This introduction to WAN technologies defines several different terms -- such as VPN and SD-WAN -- that are essential in anybody's networking vocabulary.Continue Reading
Wireless capacity more important than fast Wi-Fi 6 speed
Wi-Fi 6 speed may be getting all the attention, but the most compelling advantages of the new standard are techniques engineered to increase wireless capacity.Continue Reading
SD-WAN with IoT enables the enhanced network edge
In a world teeming with IoT devices -- and the resulting data -- SD-WAN and SD-branch can provide the security, visibility and connectivity the IoT edge requires.Continue Reading
What are the 5 types of network firewalls and how are they different?
As they monitor and filter network traffic, some firewalls can provide some pretty advanced security controls. But added packet inspection can slow network performance.Continue Reading
network scanning
Network scanning is a procedure for identifying active devices on a network by employing a feature or features in the network protocol to signal devices and await a response.Continue Reading
What is a programmable data plane and where does P4 fit in?
A programmable data plane presents a versatile way to forward packets and supports various formats and protocols. The P4 language is used to configure the forwarding actions.Continue Reading
What you need to know about edge computing architecture
Edge computing makes network operations more responsive, but there are challenges that must be addressed to get this latest network architecture working for you.Continue Reading
What happens when edge computing hits enterprise networks?
Is it time to take your network to the edge? Learn what edge networking can do to improve traffic flows, ease demand for high-performing connectivity and more.Continue Reading
A review of SD-branch and its progression from SD-WAN
The goal of software-defined branch is to merge network functions and management into a single platform, but the branch architecture still lacks maturity, despite some early deployments.Continue Reading
A brief glossary of network service provider types
For network novices and experts alike, this glossary of basic terms covers essential keywords related to network services and the various providers that sell them.Continue Reading
How are automated network configuration and management changing?
Could a new generation of network testing and verification tools combine with automated network configuration to mimic intent-based networking systems?Continue Reading
How to strategize for WAN and SD-WAN performance monitoring
The importance of WAN performance monitoring hasn't decreased with the introduction of SD-WAN and other technologies. Enterprises still need to enforce proper monitoring strategies.Continue Reading
Cloud connectivity tests the bond between enterprises, WAN providers
Collaborating on cloud connections can strengthen or strain relationships between enterprises and service providers. Service-level agreements, in particular, can be tested.Continue Reading
How do cloud data centers affect network bandwidth requirements?
When deciding which applications to move to a cloud data center, enterprises should consider network bandwidth requirements and latency, among other factors.Continue Reading
Take steps now to ready your network for 802.11ax specification
The 802.11ax specification promises higher speeds and lower latency. Preparing now will help you make the transition easier. Here's what you need to know.Continue Reading
Network operating system advantages extend to white box switching
The network operating system is changing, moving toward software acceleration, open APIs and white box switching. Learn more about the advantages and disadvantages of the new NOS.Continue Reading
AI in networking presents opportunities for service providers
Network installers and managed service providers can reap key benefits with AI in networking, including better productivity, staff management and customer response.Continue Reading
How do SDN protocols compare to those used in SD-WAN?
Traditional SDN controllers use northbound and southbound APIs to communicate. But software-defined WAN controllers don't rely on those same SDN protocols.Continue Reading
Wireless network configuration basics: 5 steps to follow
Different wireless networks have different requirements. However, some common principles exist for strategizing your wireless network configuration steps.Continue Reading
Why would an organization move to intent-based networking?
Intent-based networking doesn't use any magical commands. But it does use a heavy dose of automation, which might cause some network teams to be wary of the new approach.Continue Reading
How to improve your networking career path in 3 steps
Network technology is always changing. As a result, your IT network skills need to evolve, as well. Take a look at three steps you can take on your networking career path.Continue Reading
What is intent-based networking and how does it work?
Intent-based networking might be the future of networking, but it needs to be more than just another networking strategy that offers advanced automation and simplified provisioning.Continue Reading
How do network virtualization and network abstraction compare?
Network virtualization and network abstraction share similarities, like supporting the creation of virtual resources, but the two approaches vary in complexity and outcome.Continue Reading
A brief index of network configuration basics
This glossary of terms provides a brief overview of network configuration and some of the crucial components involved -- many of which remain as necessary as ever.Continue Reading
Network configuration basics: Focus on users and software tools
When configuring a network, keep a detailed and updated document to track user needs and network changes. And, of course, take advantage of network configuration software.Continue Reading
What is a software-defined perimeter, and do I need it?
An evolving network world requires evolving network security. Learn how software-defined perimeter offers a compelling answer to network vulnerabilities.Continue Reading
Which core network functions are being virtualized?
Network functions virtualization can virtualize both data center and branch office network services. But a couple of special cases, like virtual switches, require clarification.Continue Reading
What is a service mesh, and how does it relate to networking?
A service mesh can ease the deployment of microservices and container-based applications, while supporting the delivery of network services, like load balancing and authentication.Continue Reading
10 metrics to drive a NetOps 2.0 culture shift
If an object at rest tends to stay at rest, how can IT leaders get the network moving at the speed of DevOps? Start with performance review metrics that reflect NetOps goals, experts suggest.Continue Reading