Get started
Bring yourself up to speed with our introductory content.
Get started
Bring yourself up to speed with our introductory content.
What is a network packet?
A network packet is a basic unit of data that is transferred over a computer network, typically a packet-switched network, such as the internet. Continue Reading
What is network visibility?
Network visibility is an awareness of the components and data within an enterprise computer network. Continue Reading
What is Simple Network Management Protocol (SNMP)?
Simple Network Management Protocol (SNMP) is an application-layer protocol for monitoring and managing network devices on a local area network or wide area network. Continue Reading
-
What is a cloud-native network function (CNF)?
A cloud-native network function (CNF) is a service that performs network duties in software, as opposed to purpose-built hardware. Continue Reading
What is a wireless mesh network (mesh WiFi)?
A wireless mesh network (WMN) is a mesh network created through the connection of wireless access point (wireless AP) nodes installed at each network user's location. Continue Reading
-
Definitions to Get Started
- What is a network packet?
- What is network visibility?
- What is a cloud-native network function (CNF)?
- What is a wireless mesh network (mesh WiFi)?
- What is Simple Network Management Protocol (SNMP)?
- What is the Nessus vulnerability scanning platform?
- What is a protocol data unit (PDU)?
- What is throughput?
What is a protocol data unit (PDU)?
A protocol data unit (PDU) is the basic unit of exchange between entities that communicate with a specified networking protocol.Continue Reading
What is the Nessus vulnerability scanning platform?
Nessus is a platform developed by Tenable that scans for security vulnerabilities in devices, applications, operating systems, cloud services and other network resources.Continue Reading
What is throughput?
Throughput is a measure of how many units of information a system can process in a given amount of time.Continue Reading
What's the difference between internet and Ethernet?
Internet and Ethernet both enable connectivity and communication, but they differ in scope, purpose, reliability and medium. Use this guide to learn about the concepts.Continue Reading
What is network configuration management (NCM)?
Network configuration management (NCM) is the process of organizing and maintaining information about all the components in a computer network.Continue Reading
-
5G vs. 4G: Learn the key differences between them
5G and 4G network architectures have some significant differences. See how the two technologies differ and what the new capabilities mean for business communications.Continue Reading
What is a thin client (lean client)?
A thin client (lean client) is a virtual desktop computing model that runs on the resources stored on a central server instead of a computer's resources.Continue Reading
What is network monitoring?
Network monitoring, also frequently called network management, is the practice of consistently overseeing a computer network for any failures or deficiencies to ensure continued network performance.Continue Reading
What is network automation?
Network automation is a process that uses intelligent software to automate the management, configuration, deployment, testing and operation of both physical and virtual devices.Continue Reading
Cloud networking vs. cloud computing: What's the difference?
Businesses might see cloud computing and cloud networking as interchangeable due to similarities, but the two strategies dictate different processes and fulfill different goals.Continue Reading
What is the Universal Service Fund (USF)?
The Universal Service Fund (USF) is a United States government program that supports telecommunications access and affordability in rural and low-income communities.Continue Reading
Evaluate 7 cloud monitoring tools for networks
Organizations use cloud monitoring tools to manage on-premises, hybrid and cloud networks. Discover the features of seven cloud monitoring tools that can enhance performance.Continue Reading
The role of container networking in DevOps
Containerization isn't just for DevOps teams. Network engineers often set up container networks, ensure connectivity between containers and work with container networking tools.Continue Reading
What is network downtime?
Network downtime refers to inaccessibility to part or all of a network due to the failure of hardware, software or some combination of both.Continue Reading
What is PSTN (public switched telephone network)?
PSTN (public switched telephone network) is the world's collection of interconnected voice-oriented public telephone networks via traditional circuit-switched networks.Continue Reading
What are the 5 types of network management?
Despite the changes in how organizations optimize network performance, the five foundational elements of network management -- also known as FCAPS -- remain the same.Continue Reading
What is Cisco Certified Internetwork Expert (CCIE) certification?
Cisco Certified Internetwork Expert (CCIE) certification is a series of technical certifications for senior networking professionals who design, build, implement, maintain and troubleshoot complex enterprise networking infrastructures.Continue Reading
The purpose of route poisoning in networking
Route poisoning is an effective way of stopping routers from sending data packets across bad links and stop routing loops. This limits delays and creates a more stable network.Continue Reading
14 common network protocols and their functions explained
Networking makes the internet work, but neither can succeed without protocols. Common network protocols and their functions are key for communication and connection across the internet.Continue Reading
What is Cisco Performance Routing (PfR)?
Cisco Performance Routing (PfR) is a way of sending network packets based on intelligent path control.Continue Reading
5 principles of change management in networking
Network change management includes five principles, including risk analysis and peer review. These best practices can help network teams reduce failed network changes and outages.Continue Reading
Why does DNS use TCP Port 53 and UDP Port 53?
DNS uses both TCP and UDP ports to maintain consistent and reliable network performance. TCP provides zone transfers, while UDP handles name resolution queries and responses.Continue Reading
Logical vs. physical topology: What's the difference?
A complete network topology is a network map that provides a look into the network's hardware components and data flow using physical and logical topologies.Continue Reading
What is a MAC address and how do I find it?
A MAC address (media access control address) is a 12-digit hexadecimal number assigned to each device connected to the network.Continue Reading
What is cloud networking?
Cloud networking is a type of IT infrastructure in which the cloud hosts some or all of an organization's networking resources.Continue Reading
Basic network management interview questions and answers
Job interviews should be a two-way conversation. Hiring managers and job applicants should review common network management interview questions before an interview.Continue Reading
A guide to network lifecycle management
Network pros should use a network lifecycle management process to monitor, manage and implement changes in their network, regardless of if they use PPIDOO or another framework.Continue Reading
Managed vs. unmanaged switches: What are the differences?
Managed and unmanaged network switches differ in various ways, including control and cost. Managed switches support more granular control, while unmanaged switches are easier to set up.Continue Reading
What AI capabilities do network tools need?
AI networking tools have many beneficial capabilities. When evaluating AI tools, engineers should prioritize the specific capabilities their networks need for successful AI use.Continue Reading
What is IPv6 (Internet Protocol version 6)?
Internet Protocol version 6 (IPv6) is a set of specifications from the Internet Engineering Task Force (IETF) that is responsible for identifying network devices and routing traffic across the internet.Continue Reading
The role of network sandboxing and testing
Network sandboxing provides network teams with a risk-free environment to test changes and run potential threat scenarios. This helps prevent outages and other unexpected issues.Continue Reading
What is TCP/IP?
TCP/IP stands for Transmission Control Protocol/Internet Protocol and is a suite of communication protocols used to interconnect network devices on the internet.Continue Reading
What is ICMP (Internet Control Message Protocol)?
ICMP (Internet Control Message Protocol) is a network layer error-reporting protocol that's used to communicate data transmission problems.Continue Reading
Network automation vs. orchestration: What's the difference?
Automation and orchestration take different approaches to achieve network efficiency. However, network engineers can use them together to create an efficient, centralized network.Continue Reading
Recursive vs. iterative DNS queries: What's the difference?
Name resolution translates human-readable hostnames to IP addresses for device configuration. DNS uses recursive or iterative methods to translate names into IP addresses.Continue Reading
HTTP vs. HTTPS: What's the difference?
HTTP and HTTPS are web communication protocols. HTTP lacks security, while HTTPS encrypts data to adhere to the security standards of confidentiality, integrity and authenticity.Continue Reading
How to implement CI/CD in network automation
CI/CD processes help deploy code changes to networks. Integrating a CI/CD pipeline into automation makes networks more reliable, reducing configuration errors and downtime.Continue Reading
What is asynchronous?
In general, asynchronous -- from Greek asyn- ('not with/together') and chronos ('time') -- describes objects or events not coordinated in time.Continue Reading
Best practices for Cisco pyATS test scripts
Test scripts are the heart of any job in pyATS. Best practices for test scripts include proper structure, API integration and the use of Python libraries to enhance testing.Continue Reading
How to subnet in cloud network environments
Cloud and on-premises subnets use IP ranges, subnet masks or prefixes, and security policies. But cloud subnets are simpler to set up, while on-prem configuration is still manual.Continue Reading
What is a URL (Uniform Resource Locator)?
A URL (Uniform Resource Locator) is a unique identifier used to locate a resource on the internet.Continue Reading
How to create subnets in IPv4 and IPv6 networks
Network administrators subnet networks into segments for improved control and efficiency. IPv4 uses subnet masks, while IPv6 uses prefixes, and each has its own unique steps.Continue Reading
What is FTP?
File Transfer Protocol (FTP) is a network protocol for transmitting files between computers over TCP/IP connections.Continue Reading
What is a VPN?
A virtual private network (VPN) is a service that creates a safe, encrypted online connection.Continue Reading
How to calculate a subnet mask from hosts and subnets
IP addressing and subnetting are important and basic elements of networks. Learn how to calculate a subnet mask based on the required number of subnets and hosts.Continue Reading
Examine a captured packet using Wireshark
Wireshark is a useful tool for capturing network traffic data. Network pros can make the most of the tool by analyzing captured packets to see what that data means for troubleshooting.Continue Reading
Wi-Fi 6 vs. Wi-Fi 5: What's the difference?
Wi-Fi 6 was introduced as the next-generation Wi-Fi standard after Wi-Fi 5. While similar in certain aspects, Wi-Fi 5 and Wi-Fi 6 differ in terms of features and capabilities.Continue Reading
9 types of networks and their use cases
Networks differ based on size, connectivity, coverage and design. This guide explores the most common types of networks, their benefits and use cases.Continue Reading
What is network scanning? How to, types and best practices
Network scanning is a procedure for identifying active devices on a network by employing a feature or features in the network protocol to signal to devices and await a response.Continue Reading
An introduction to SFP ports on a Gigabit switch
SFP ports enable Gigabit switches to connect to a variety of fiber and Ethernet cables and extend switching functionality throughout the network.Continue Reading
5G NSA vs. SA: How do the deployment modes differ?
Non-standalone 5G uses a combination of existing 4G LTE architecture with a 5G RAN. Standalone 5G, on the other hand, uses a 5G RAN and a cloud-native 5G core.Continue Reading
MAC address vs. IP address: What's the difference?
A MAC address and an IP address each identify network devices, but they do the jobs at different levels. Explore the differences between the two and learn why both are necessary.Continue Reading
What is wavelength?
Wavelength is the distance between identical points, or adjacent crests, in the adjacent cycles of a waveform signal propagated in space or along a wire.Continue Reading
How network data models work with automation
Network data models can help network engineers with their automation strategies, thanks to the essential data they store about physical components, security and QoS.Continue Reading
CASB vs. SASE: What's the difference?
CASB and SASE enhance network and SaaS application security. CASB acts as a security layer for cloud services, while SASE integrates networking and security into one framework.Continue Reading
7 steps to set up a home network
This guide teaches networking newbies how to set up a home network, from understanding hardware components to managing network performance and security.Continue Reading
A guide on how to learn network automation
Networks are always evolving, and network automation is the next step forward. From soft skills to AI, these skills are essential to understanding network automation.Continue Reading
Common types of networking devices explained
This introduction explores eight network devices that are commonly used within enterprise network infrastructures, including access points, routers and switches.Continue Reading
Wireshark vs. tcpdump: What's the difference?
Wireshark and tcpdump both aid network administrators in packet analysis. Wireshark's simple GUI contrasts with tcpdump's speed and scripting abilities, which enhances management.Continue Reading
subnet (subnetwork)
A subnet, or subnetwork, is a segmented piece of a larger network. More specifically, subnets are a logical partition of an IP network broken into multiple, smaller network segments.Continue Reading
CIDR (Classless Inter-Domain Routing or supernetting)
CIDR (Classless Inter-Domain Routing or supernetting) is a method of assigning IP addresses that improves the efficiency of address distribution and replaces the previous system based on Class A, Class B and Class C networks.Continue Reading
secure access service edge (SASE)
Secure access service edge (SASE), pronounced sassy, is a cloud architecture model that bundles together network and cloud-native security technologies and delivers them as a single cloud service.Continue Reading
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP) is a standard protocol on the internet that ensures the reliable transmission of data between devices on a network.Continue Reading
Cisco Live 2024 conference coverage and analysis
Cisco Live 2024 will focus largely on AI and its potential to transform enterprise networking and IT. Use this guide to follow along with conference news and analysis.Continue Reading
ARP vs. RARP: What's the difference?
Network devices use ARP to map IP addresses to MAC addresses. RARP, which is less common, accomplishes the reverse and enables network devices to map MAC addresses to IP addresses.Continue Reading
NBASE-T Ethernet
NBASE-T Ethernet is an IEEE standard and Ethernet-signaling technology that enables existing twisted-pair copper cabling to exceed the cable's specified limit of 1 gigabit per second (Gbps) for distances of up to 100 meters.Continue Reading
SD-WAN vs. load balancing: How are they different?
Load balancing is beneficial for network traffic distribution. SD-WAN can use load balancing for WAN connections, but it doesn't require load balancing to reap other benefits.Continue Reading
SD-WAN security
SD-WAN security refers to the practices, protocols and technologies protecting data and resources transmitted across software-defined wide area network infrastructure.Continue Reading
net neutrality
Net neutrality is the concept of an open, equal internet for everyone, regardless of content consumed or the device, application or platform used.Continue Reading
networking (computer)
Networking, also known as computer networking, is the practice of transporting and exchanging data between nodes over a shared medium in an information system.Continue Reading
local area network (LAN)
A local area network (LAN) is a group of computers and peripheral devices that are connected together within a distinct geographic area, such as an office building or campus.Continue Reading
SASE vs. SD-WAN: What's the difference?
SASE and SD-WAN are two similar architectures administrators use to provide secure network access, but they differ in terms of deployment, security, connectivity and more.Continue Reading
Infrastructure requirements for Kubernetes cluster networking
A well-architected network infrastructure is vital for Kubernetes cluster networking, providing seamless communication and resource orchestration across containerized workloads.Continue Reading
How to use the LFTP client to download files
The open source LFTP client supports multiple file transport types, such as FTP and HTTPS, enabling administrators to use a single interface to upload and download files.Continue Reading
Cloud security vs. network security: What's the difference?
While network security focuses on solely protecting networks, cloud security provides protection for networks, servers, containers, apps and more.Continue Reading
How NetOps supports digital transformation
NetOps uses automation and intent-based networking tools to streamline digital transformation and ensure accurate and flexible network services.Continue Reading
Classical internet vs. quantum internet: How do they differ?
The quantum internet is a hypothetical secure network made of qubits. It differs from the classical internet with its use of quantum principles for enhanced security and computing.Continue Reading
A network compliance checklist for remote work
This network compliance checklist for remote work provides best practices on establishing remote policies and procedures, help desk support and data backup, among other steps.Continue Reading
firewall as a service (FWaaS)
Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis capabilities to customers as part of an overall cybersecurity program.Continue Reading
NetSecOps best practices for network engineers
Network engineers increasingly need to align their duties with security, such as implementing continuous monitoring, deploying threat intelligence and collaborating with security.Continue Reading
Private LTE vs. Wi-Fi: What's the difference?
Enterprises have a lot of options when designing networks for specialized uses. Wi-Fi supports high-volume environments, but private LTE also provides important benefits.Continue Reading
How to close the networking skills gap
The networking skills gap stems from tech shifts, generational turnover and hiring complexities. Bridge the gap with skills gained through study, training and employer support.Continue Reading
Effective soft skills for network engineers
Soft skills such as empathy, active listening and problem-solving can be valuable assets to network engineers who interact with nontechnical business stakeholders.Continue Reading
private 5G
Private 5G is a wireless network technology that delivers 5G cellular connectivity for private network use cases.Continue Reading
NFVi (network functions virtualization infrastructure)
NFVi (network functions virtualization infrastructure) encompasses all of the networking hardware and software needed to support and connect virtual network functions in carrier networks.Continue Reading
network orchestration
Network orchestration is the use of a software-defined network controller that facilitates the creation of network and network security services to achieve business goals.Continue Reading
millimeter wave (mmWave)
Millimeter wave (mmWave), also known as millimeter band, is a range of electromagnetic frequencies between microwaves and infrared.Continue Reading
5G
Fifth-generation wireless (5G) is the latest iteration of cellular technology.Continue Reading
How to use TFTP to transfer files across the network
Trivial File Transfer Protocol is one of the oldest and simplest TCP/IP file exchange protocols. Here are use cases and best practices for installation and security.Continue Reading
8 practice network hardware questions for CCST exam
Prepare for the CCST Networking exam with this network hardware quiz from Chapter 10 of 'Cisco Certified Support Technician CCST Networking 100-150 Official Cert Guide.'Continue Reading
Introduction to network hardware components
This excerpt from 'Cisco Certified Support Technician CCST Networking 100-150 Official Cert Guide' provides beginners with knowledge and best practices on network hardware.Continue Reading
Evolved Packet Core (EPC)
Evolved Packet Core (EPC) is a framework for providing converged voice and data services on a 4G Long-Term Evolution (LTE) network.Continue Reading
tunneling or port forwarding
Tunneling or port forwarding is the transmission of data intended for use only within a private -- usually corporate -- network through a public network in such a way that the public network's routing nodes are unaware that the transmission is part ...Continue Reading
baseboard management controller (BMC)
A baseboard management controller (BMC) is a specialized service processor that remotely monitors the physical state of a host system, such as a computer, network server or other hardware devices.Continue Reading
5G security: Everything you should know for a secure network
5G touts better security controls than 4G, including stronger encryption, privacy and authentication. But enterprises need to consider the challenges, too.Continue Reading