Tips
Tips
-
A guide to distributed network architectures
Distributed network architectures have become popular because of their adaptability, reliability and scalability. But every new technology also has its challenges. Continue Reading
-
The role of name resolution in networking
Name resolution is essential in converting hostnames and IP addresses for network communications. Here's how the process resolves hostnames, queries servers and finds IP addresses. Continue Reading
-
An introduction to neutral host networks using private 5G
Enterprises often use signal boosters and distributed antenna systems to improve carrier signal strength. Neutral host networks over private 5G could disrupt those methods. Continue Reading
-
How to convert binary to decimal
It's helpful for network admins to know how to convert binary to decimal, and vice versa, for IPv4 addressing, subnet masks, default gateways and network IDs. Continue Reading
-
5 network virtualization challenges and how to solve them
The challenges of network virtualization include an overhaul of network architecture, thorough staff training and breaking down knowledge silos among IT departments. Continue Reading
-
How zero trust unifies network virtualization
The combination of zero trust and network virtualization creates opportunities to strengthen security policies, increase cross-domain collaboration and improve overall visibility. Continue Reading
-
What software-defined LAN means for campus virtualization
LAN virtualization has long encompassed VLANs to segment network traffic. But software-defined LAN is emerging with zero-trust strategies to provide more comprehensive security. Continue Reading
-
20 systemctl commands for system and service management
System and service management are vital to ensure customer satisfaction and service delivery. These systemctl commands can help ease those management tasks for admins. Continue Reading
-
How enterprise networks use WAN virtualization
SD-WAN is the most common form of WAN virtualization. But virtual WAN strategies are evolving to include software-defined perimeter and cloud concepts. Continue Reading
-
Network virtualization benefits in the LAN, WAN and data center
Better traffic performance, scalability and security are some of the network virtualization benefits that enterprises can realize across their network infrastructure. Continue Reading
-
The role of network virtualization and SDN in data centers
SDN, zero trust and infrastructure as code are popular forms of network virtualization within the data center, moving away from manual VLANs toward policy-driven virtualization. Continue Reading
-
Carrier network virtualization leads to enterprise services
Starting with MPLS VPNs and SD-WAN, new carrier network virtualization options, like 5G network slicing, are becoming virtual enterprise network services, and more will follow. Continue Reading
-
How network virtualization works
Network virtualization uses abstraction to isolate applications and resources from the physical infrastructure. Benefits include faster provisioning, agility and operational efficiency. Continue Reading
-
6 types of network topologies
Network topology is essential to network configuration, as it determines the arrangement of a network and defines how nodes connect. Here are six common types of network topologies. Continue Reading
-
5 basic network commands for Linux and Windows
Linux and Windows use different network commands to run tasks that are common in both environments, such as network connectivity testing. But the commands often share similarities. Continue Reading
-
Common types of enterprise network connections
The goal of every network is to connect devices. The connections that form those links -- such as wired cabling and wireless technologies -- are crucial in network infrastructure. Continue Reading
-
Power over Ethernet basics for network architects
Power over Ethernet provides a way to supply electricity to low-power devices through a standard Ethernet cable. Learn about the different standards and PoE types. Continue Reading
-
Top 5G limitations and challenges for businesses
While 5G has advanced in recent years, the fifth generation of cellular technology still has some shortcomings, such as smaller coverage ranges and a lack of rural rollouts. Continue Reading
-
An introduction to 8 types of network devices
This introduction explores eight network devices that are commonly used within enterprise network infrastructures, including access points, routers and switches. Continue Reading
-
Zero trust, wireless WAN affect the future of IoT networking
Zero-trust security models, wireless WAN evolution and the emergence of pop-up businesses are all helping to fuel innovation in IoT networking capabilities. Continue Reading
-
What are the features and benefits of 5G technology?
In addition to high speeds and low latency, the emergence of 5G cellular technology could put some pressure on the market prices of incumbent WAN connectivity. Continue Reading
-
The pros and cons of Netskope SASE
Netskope is undoubtedly a leader in the CASB market, but its limited security capabilities and lack of SD-WAN make Netskope an incomplete SASE offering. Continue Reading
-
Is it time to ditch the WAN for other connectivity options?
With the prevalence of remote work, cloud applications and internet connectivity, will enterprises ditch the WAN to save money and time? Maybe not everyone. Continue Reading
-
Private 5G deployments to advance in 2022
As commercial private 5G deployments begin to advance in 2022, private cellular networks will become a reality for many organizations in the U.S. and around the world. Continue Reading
-
NetOps automation ideas and examples
NetOps teams can hone their automation experience using these automation ideas that range from simple read/write tasks to complex automated processes. Continue Reading
-
The benefits of network infrastructure as code
Network infrastructure as code uses DevOps methodology to create structured practices for configuration changes and establish pre- and post-change testing and validation. Continue Reading
-
How to secure NetOps initiatives using Agile methodology
As more NetOps teams implement Agile methods, network and security testing must be part of a holistic approach that involves developers, networking and security teams working together. Continue Reading
-
NetOps meets DevOps concepts to tackle network problems
NetOps and DevOps are converging, due to increased use of infrastructure as code to automate enterprise networks. Shared concepts include structured coding practices and automated testing. Continue Reading
-
Configure DHCP failover for Windows Server
DHCP is a critical service, and network admins should take the time to create fault tolerance. Windows Server makes it easy to configure both failover and load balancing. Continue Reading
-
The rise of the NetOps engineer
The need for NetOps engineers with network automation and software development skills is rising with the continued drive to create more flexible networks. Find out what it takes. Continue Reading
-
Business benefits of an Agile networking approach
Enterprises that embed an Agile approach in their networking strategies could see benefits like better network performance, enhanced data security and faster rollouts of network services. Continue Reading
-
A review of Zscaler SASE architecture
Zscaler has a strong cloud-native architecture for secure internet access. But it doesn't deliver SD-WAN or converge internet access and WAN security, leaving it with only part of a SASE platform. Continue Reading
-
How NetOps differs from traditional network operations
When comparing NetOps and conventional network operations, network teams focus on automating repeatable tasks that correct problems rather than introducing new ones manually. Continue Reading
-
Why NetOps is a bridge to AIOps
As IT infrastructure grows more complex, NetOps teams should identify ways to ensure their networks remain operational and perform at peak levels. One option is AIOps. Continue Reading
-
7 steps of an SD-WAN implementation
Organizations interested in implementing SD-WAN need to collect site profiles and requirements, analyze their options, perform tests and evaluate the results. Continue Reading
-
10 basic network management interview questions and answers
Job interviews should be a two-way conversation. Here are some common network management interview questions for both hiring managers and job applicants. Continue Reading
-
Integrating zero-trust practices into private 5G networks
One of the first steps in deploying a technology is protecting it from potential security threats. Learn how to secure a private 5G network with zero-trust security practices. Continue Reading
-
Intro to encapsulation and decapsulation in networking
Encapsulation adds information to a packet as it travels to its destination. Decapsulation reverses the process by removing the info, so a destination device can read the original data. Continue Reading
-
Will 5G replace Wi-Fi? No, but maybe in some use cases
Geographically remote locations, large public venues and manufacturing sites are a few of the key areas in which business 5G technology could provide real benefits. Continue Reading
-
How to implement network segmentation for better security
For a network segmentation strategy to be effective and improve security, network teams need to create detailed security policies, identify each resource and use allowlists. Continue Reading
-
What's happening with standalone 5G?
Standalone 5G is the next major update for 5G technology. Learn about the benefits SA 5G will bring and find out when operators will begin deploying it worldwide. Continue Reading
-
5 principles of the network change management process
Network change management includes five basic principles, including risk analysis and peer review. These best practices can help network teams limit failed network changes and outages. Continue Reading
-
How IT can provide home Wi-Fi help for remote workers
When assisting home-based workers with their Wi-Fi woes, be sure to assess their internet connectivity and even consider deploying access points to their homes. Continue Reading
-
Explore 9 essential elements of network security
Network security isn't a one-size-fits-all strategy. Dive into the various segments of network security, and learn how they overlap and interact with each other. Continue Reading
-
5 trends in enterprise networking that defined 2021
In 2020, enterprises shifted to remote work due to the pandemic. The trend continued in 2021, along with four other networking trends that defined the year and will extend into 2022. Continue Reading
-
DHCP client configuration for Linux, Windows and macOS
Network and system admins can use command-line and GUI tools to configure DHCP clients in Linux, Windows and macOS. Here's a breakdown of which commands to use for each OS. Continue Reading
-
Automation, cloud lead as influential data center trends
Recent data center trends, such as AIOps and automation, have been geared toward simplifying network management. Here are the trends and challenges teams faced over the past year. Continue Reading
-
Cable management software enhances documentation, visibility
Even a timeworn networking discipline like cabling can undergo a renaissance. See how cable management software helps organizations visualize network connectivity. Continue Reading
-
How zero-trust SDP can work with a VPN for remote work
Implementing software-defined perimeter and zero-trust security models with a corporate VPN adds significant layers of user and device verification and authentication. Continue Reading
-
4 ideas for network cable management best practices
When organizing cable clutter, network engineers should follow some common best practices, including the use of cable labels, cable ties and proper documentation. Continue Reading
-
Midband 5G spectrum auctions come to the fore
Midband has become the premier spectrum for 5G use. The FCC's 3.45 GHz auction began in October, following the massive C-band sell-off that ended in January 2021. Continue Reading
-
A guide to Windows DHCP server configuration
The main steps to configure DHCP on Windows Server are installation, Active Directory authorization, creating a scope and DNS registration. Learn about other tasks and best practices. Continue Reading
-
Evaluate the components of Cisco SASE
Cisco's SASE platform, Umbrella, has all the components of a SASE architecture, but it has a lot of integration complexity and a reliance on appliances. Continue Reading
-
Use network standardization to facilitate automation
Network teams can automate and standardize network designs to improve configurations, simplify operations and more easily implement changes within their networks. Continue Reading
-
Get up to speed with enhanced content delivery networks
With enhanced features and new delivery options, CDNs are poised to make greater inroads with enterprises to improve UX across the board. Continue Reading
-
What digital experience monitoring means for network teams
Digital experience monitoring integrates several monitoring tools to provide a comprehensive view into the performance of endpoints, applications and the network. Continue Reading
-
A quick guide to BGP best practices
The use of Border Gateway Protocol is prevalent among ISPs and enterprises. While BGP best practices change for specific use cases, some recommendations are helpful in all scenarios. Continue Reading
-
Static IP vs. dynamic IP addresses: What's the difference?
Static IP addresses are typically used for servers, routers and switches. Dynamic IP addresses, however, are commonly used for workstations, phones and tablets. Continue Reading
-
4 categories of network monitoring
Network teams should routinely monitor the states of their networks. The type of network monitoring strategy used depends on the needs of the organization. Continue Reading
-
Automate network validation for smoother changes
Teams can verify network state before and after network changes to ensure smooth deployment of the changes. Automating those pre- and post-change checks can reduce errors and outages. Continue Reading
-
A review of Cato Networks' SASE Cloud platform
Cato's SASE Cloud lacks some features and may require customers to replace point products to fully benefit from the platform. But Cato aligns with SASE’s cloud-native vision and is a strong contender in the market. Continue Reading
-
How remote work changes the future of network management
The pandemic ushered in a new normal of hybrid workplaces. What's also new is how network teams manage these remote networks, like using zero-trust security models. Continue Reading
-
How to set up a VLAN for enterprise networks
VLANs can secure and prioritize network traffic. To set up VLANs correctly, teams should understand concepts like VLAN tagging and subnets. Continue Reading
-
A deep dive into Fortinet's SASE platform
Despite its strong security foundation, Fortinet's SASE platform lacks a cloud-native strategy and requires teams to stitch the architecture together. Continue Reading
-
Troubleshooting a DHCP server failure
DHCP errors often result from DHCP server failure, a lack of available IP addresses and network failure. But troubleshooting steps vary depending on the error symptoms and causes. Continue Reading
-
Network observability vs. monitoring: What's the difference?
Traditional network monitoring is useful for collecting data about network issues. But network observability can add further insights into network health and end-user experience. Continue Reading
-
BGP vs. OSPF: When to use each protocol
BGP and OSPF are two of the most common routing protocols. While BGP excels with dynamic routing for large networks, OSPF offers more efficient path choice and convergence speed. Continue Reading
-
A guide to network lifecycle management
Network pros should follow a network lifecycle to monitor, manage and implement changes in their networks, regardless of whether it's a plan, build and manage framework or PPDIOO. Continue Reading
-
How to use iPerf3 to test network bandwidth
In this in-depth tip, learn how to use iPerf3, a network testing tool to measure throughput and benchmark your WAN links to ensure effectivity. Continue Reading
-
How to calculate network bandwidth requirements
Figuring out how to calculate bandwidth requirements is vital to ensuring your network runs smoothly, and it's best to use the correct formula from the beginning. Continue Reading
-
The pros and cons of Palo Alto Networks' SASE platform
Palo Alto Networks is commonly mentioned in SASE discussions. While the vendor has strong security capabilities, it also brings integration complexities and PoP limitations. Continue Reading
-
How to pick the best network security service provider
Managed security service providers have different levels of expertise. Be sure to match your organization's security needs with the right network security provider. Continue Reading
-
5 steps to achieve network infrastructure modernization
All networks may be different, but companies have similar goals when they look to upgrade their network infrastructures. Assessing current designs is just the first step. Continue Reading
-
The migration to enterprise network as a service
Enterprise network as a service is becoming a popular consumption model for networking functions. But, as with any emerging technology, it's important to weigh the options carefully. Continue Reading
-
Enterprise RF spectrum management best practices
Effective spectrum management requires coordination from company departments to follow certain policies before introducing wireless devices to the enterprise. Continue Reading
-
How to secure your home Wi-Fi network in 7 steps
When securing your home Wi-Fi, update devices regularly, change passwords consistently, turn off unused services and inspect outdoor network equipment. Continue Reading
-
Hybrid network vs. hybrid network infrastructure
Hybrid networks and hybrid network infrastructure blend different kinds of equipment, geographic locations, network ownership and technology disciplines. Continue Reading
-
Routed optical networking tactic could be game changer
A new routing architecture could help eliminate management and service headaches stemming from routing IP traffic on optical networks. Continue Reading
-
How to prepare networks for the return to office
Network teams should evaluate their UC strategies, VPN capacity and even air conditioning requirements as employees start to return to office environments. Continue Reading
-
How to set up a home network -- a 7-step guide
From understanding hardware components to managing network performance and security, this guide teaches networking newbies how to set up a home network. Continue Reading
-
Network-as-a-service business model options take shape
As network as a service gains traction, enterprises and service providers must consider multiple deployment models. SD-WAN, SASE, SDN and policy management could all play a role. Continue Reading
-
Ansible vs. Terraform vs. Vagrant: What's the difference?
Ansible, Terraform and Vagrant are common infrastructure automation platforms with specific use cases, benefits and drawbacks. But choosing a platform doesn't need to be confusing. Continue Reading
-
8 remote access security risks and how to prevent them
Enterprises face myriad remote access security concerns, but training and clear communication can help them bolster their security programs for the long term. Continue Reading
-
4 attributes key to network-as-a-service model
For a network-as-a-service model to work for the enterprise, it needs to offer four key attributes: an application-specific, elastic, secure and personalized VPN. Continue Reading
-
Wi-Fi 6 vs. Wi-Fi 6E: Spectrum, not hype, is key difference
The extended spectrum of Wi-Fi 6E sounds promising. But, when assessing Wi-Fi 6 vs. Wi-Fi 6E, organizations should pay close attention to radio frequency characteristics. Continue Reading
-
Network capacity planning best practices for return to office
As workers grow comfortable enough to return to the office, network teams will need to plan in advance to make sure the network is ready and ensure proper performance. Continue Reading
-
Wi-Fi 6 rollout requires careful review of network devices
Wi-Fi 6 is just one part of the overall enterprise network. Organizations need to evaluate several network components to ensure a smooth Wi-Fi 6 deployment. Continue Reading
-
Common network vulnerabilities and how to prevent them
It's not possible to eliminate all network vulnerabilities, but network teams can implement best practices to limit potential attacks and protect their networks. Continue Reading
-
SASE options for the branch of one -- work from anywhere
More than ever, enterprises need to support individual employees that make up a branch of one. These setups require reliable connectivity, application performance and security. Continue Reading
-
Modern network infrastructure design taps security, flexibility
As workers return to office settings, organizations may have to update their on-premises network infrastructure design to improve scalability and connectivity. Continue Reading
-
How cloud-based network monitoring tools expand visibility
Organizations have become even more distributed and virtual in the wake of COVID-19. Cloud-based network monitoring is well suited to keep tabs on network performance. Continue Reading
-
Best practices for VPN traffic monitoring
VPNs are still a critical part of many enterprise remote access strategies. Networks teams that monitor VPN traffic should look at factors like application usage and overhead. Continue Reading
-
5 basic steps for effective cloud network security
In hybrid infrastructures, old network security systems won't work. Enterprises must adopt effective cloud network security strategies to keep their assets safe. Continue Reading
-
Perform a network health check with network testing
Network engineers can use myriad network testing approaches to ensure their networks are efficient and reliable. The key is incorporating them into a regular maintenance cycle. Continue Reading
-
Why 5G will redefine WWAN and SD-WAN
The nexus of 5G, WWAN and SD-WAN promises to usher in an array of custom tools and services for enterprises. Continue Reading
-
Key tasks in a network maintenance checklist
Network technologies and devices might change over time, but certain maintenance tasks, such as data backup and device inventory, will always be essential for network teams. Continue Reading
-
NOC performance metrics for optimal operation
NOC best practices include using standardized network designs and automation. But don't forget to identify performance metrics that help track and measure operational success. Continue Reading
-
5 steps to conduct network penetration testing
Enterprises that want to ensure competent network security strategies should look at how they can implement penetration testing, considering red teams and physical pen tests. Continue Reading
-
5 benefits of Wi-Fi 6 for enterprise networks
In a perfect world, Wi-Fi 6 could introduce several benefits to business networks. But real-world conditions could curb the wireless technology's true potential. Continue Reading
-
Open RAN architecture gives operators options, challenges
Open RAN architecture could give telecom operators more flexibility as they deliver enterprise-grade 5G services. But making the RAN a virtual function takes careful planning. Continue Reading