Get started
Bring yourself up to speed with our introductory content.
Get started
Bring yourself up to speed with our introductory content.
What is Cisco Performance Routing (PfR)?
Cisco Performance Routing (PfR) is a way of sending network packets based on intelligent path control. Continue Reading
5 principles of change management in networking
Network change management includes five principles, including risk analysis and peer review. These best practices can help network teams reduce failed network changes and outages. Continue Reading
Why does DNS use TCP Port 53 and UDP Port 53?
DNS uses both TCP and UDP ports to maintain consistent and reliable network performance. TCP provides zone transfers, while UDP handles name resolution queries and responses. Continue Reading
-
Logical vs. physical topology: What's the difference?
A complete network topology is a network map that provides a look into the network's hardware components and data flow using physical and logical topologies. Continue Reading
What is a MAC address and how do I find it?
A MAC address (media access control address) is a 12-digit hexadecimal number assigned to each device connected to the network. Continue Reading
-
Definitions to Get Started
- What is Cisco Performance Routing (PfR)?
- What is a MAC address and how do I find it?
- What is cloud networking?
- What is IPv6 (Internet Protocol version 6)?
- What is TCP/IP?
- What is ICMP (Internet Control Message Protocol)?
- What is asynchronous?
- What is a URL (Uniform Resource Locator)?
What is cloud networking?
Cloud networking is a type of IT infrastructure in which the cloud hosts some or all of an organization's networking resources.Continue Reading
Basic network management interview questions and answers
Job interviews should be a two-way conversation. Hiring managers and job applicants should review common network management interview questions before an interview.Continue Reading
A guide to network lifecycle management
Network pros should use a network lifecycle management process to monitor, manage and implement changes in their network, regardless of if they use PPIDOO or another framework.Continue Reading
Managed vs. unmanaged switches: What are the differences?
Managed and unmanaged network switches differ in various ways, including control and cost. Managed switches support more granular control, while unmanaged switches are easier to set up.Continue Reading
What AI capabilities do network tools need?
AI networking tools have many beneficial capabilities. When evaluating AI tools, engineers should prioritize the specific capabilities their networks need for successful AI use.Continue Reading
-
What is IPv6 (Internet Protocol version 6)?
Internet Protocol version 6 (IPv6) is a set of specifications from the Internet Engineering Task Force (IETF) that is responsible for identifying network devices and routing traffic across the internet.Continue Reading
The role of network sandboxing and testing
Network sandboxing provides network teams with a risk-free environment to test changes and run potential threat scenarios. This helps prevent outages and other unexpected issues.Continue Reading
What is TCP/IP?
TCP/IP stands for Transmission Control Protocol/Internet Protocol and is a suite of communication protocols used to interconnect network devices on the internet.Continue Reading
What is ICMP (Internet Control Message Protocol)?
ICMP (Internet Control Message Protocol) is a network layer error-reporting protocol that's used to communicate data transmission problems.Continue Reading
Network automation vs. orchestration: What's the difference?
Automation and orchestration take different approaches to achieve network efficiency. However, network engineers can use them together to create an efficient, centralized network.Continue Reading
Recursive vs. iterative DNS queries: What's the difference?
Name resolution translates human-readable hostnames to IP addresses for device configuration. DNS uses recursive or iterative methods to translate names into IP addresses.Continue Reading
HTTP vs. HTTPS: What's the difference?
HTTP and HTTPS are web communication protocols. HTTP lacks security, while HTTPS encrypts data to adhere to the security standards of confidentiality, integrity and authenticity.Continue Reading
How to implement CI/CD in network automation
CI/CD processes help deploy code changes to networks. Integrating a CI/CD pipeline into automation makes networks more reliable, reducing configuration errors and downtime.Continue Reading
What is asynchronous?
In general, asynchronous -- from Greek asyn- ('not with/together') and chronos ('time') -- describes objects or events not coordinated in time.Continue Reading
Best practices for Cisco pyATS test scripts
Test scripts are the heart of any job in pyATS. Best practices for test scripts include proper structure, API integration and the use of Python libraries to enhance testing.Continue Reading
How to subnet in cloud network environments
Cloud and on-premises subnets use IP ranges, subnet masks or prefixes, and security policies. But cloud subnets are simpler to set up, while on-prem configuration is still manual.Continue Reading
What is a URL (Uniform Resource Locator)?
A URL (Uniform Resource Locator) is a unique identifier used to locate a resource on the internet.Continue Reading
How to create subnets in IPv4 and IPv6 networks
Network administrators subnet networks into segments for improved control and efficiency. IPv4 uses subnet masks, while IPv6 uses prefixes, and each has its own unique steps.Continue Reading
What is FTP?
File Transfer Protocol (FTP) is a network protocol for transmitting files between computers over TCP/IP connections.Continue Reading
What is a VPN?
A virtual private network (VPN) is a service that creates a safe, encrypted online connection.Continue Reading
How to calculate a subnet mask from hosts and subnets
IP addressing and subnetting are important and basic elements of networks. Learn how to calculate a subnet mask based on the required number of subnets and hosts.Continue Reading
Examine a captured packet using Wireshark
Wireshark is a useful tool for capturing network traffic data. Network pros can make the most of the tool by analyzing captured packets to see what that data means for troubleshooting.Continue Reading
Wi-Fi 6 vs. Wi-Fi 5: What's the difference?
Wi-Fi 6 was introduced as the next-generation Wi-Fi standard after Wi-Fi 5. While similar in certain aspects, Wi-Fi 5 and Wi-Fi 6 differ in terms of features and capabilities.Continue Reading
9 types of networks and their use cases
Networks differ based on size, connectivity, coverage and design. This guide explores the most common types of networks, their benefits and use cases.Continue Reading
What is network scanning? How to, types and best practices
Network scanning is a procedure for identifying active devices on a network by employing a feature or features in the network protocol to signal to devices and await a response.Continue Reading
An introduction to SFP ports on a Gigabit switch
SFP ports enable Gigabit switches to connect to a variety of fiber and Ethernet cables and extend switching functionality throughout the network.Continue Reading
5G NSA vs. SA: How do the deployment modes differ?
Non-standalone 5G uses a combination of existing 4G LTE architecture with a 5G RAN. Standalone 5G, on the other hand, uses a 5G RAN and a cloud-native 5G core.Continue Reading
MAC address vs. IP address: What's the difference?
A MAC address and an IP address each identify network devices, but they do the jobs at different levels. Explore the differences between the two and learn why both are necessary.Continue Reading
What is wavelength?
Wavelength is the distance between identical points, or adjacent crests, in the adjacent cycles of a waveform signal propagated in space or along a wire.Continue Reading
How network data models work with automation
Network data models can help network engineers with their automation strategies, thanks to the essential data they store about physical components, security and QoS.Continue Reading
CASB vs. SASE: What's the difference?
CASB and SASE enhance network and SaaS application security. CASB acts as a security layer for cloud services, while SASE integrates networking and security into one framework.Continue Reading
7 steps to set up a home network
This guide teaches networking newbies how to set up a home network, from understanding hardware components to managing network performance and security.Continue Reading
A guide on how to learn network automation
Networks are always evolving, and network automation is the next step forward. From soft skills to AI, these skills are essential to understanding network automation.Continue Reading
5G vs. 4G: Learn the key differences between them
5G and 4G network architectures have some significant differences. See how the two technologies differ and what the new capabilities mean for business communications.Continue Reading
Common types of networking devices explained
This introduction explores eight network devices that are commonly used within enterprise network infrastructures, including access points, routers and switches.Continue Reading
Wireshark vs. tcpdump: What's the difference?
Wireshark and tcpdump both aid network administrators in packet analysis. Wireshark's simple GUI contrasts with tcpdump's speed and scripting abilities, which enhances management.Continue Reading
subnet (subnetwork)
A subnet, or subnetwork, is a segmented piece of a larger network. More specifically, subnets are a logical partition of an IP network broken into multiple, smaller network segments.Continue Reading
secure access service edge (SASE)
Secure access service edge (SASE), pronounced sassy, is a cloud architecture model that bundles together network and cloud-native security technologies and delivers them as a single cloud service.Continue Reading
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP) is a standard protocol on the internet that ensures the reliable transmission of data between devices on a network.Continue Reading
CIDR (Classless Inter-Domain Routing or supernetting)
CIDR (Classless Inter-Domain Routing or supernetting) is a method of assigning IP addresses that improves the efficiency of address distribution and replaces the previous system based on Class A, Class B and Class C networks.Continue Reading
Cisco Live 2024 conference coverage and analysis
Cisco Live 2024 will focus largely on AI and its potential to transform enterprise networking and IT. Use this guide to follow along with conference news and analysis.Continue Reading
ARP vs. RARP: What's the difference?
Network devices use ARP to map IP addresses to MAC addresses. RARP, which is less common, accomplishes the reverse and enables network devices to map MAC addresses to IP addresses.Continue Reading
NBASE-T Ethernet
NBASE-T Ethernet is an IEEE standard and Ethernet-signaling technology that enables existing twisted-pair copper cabling to exceed the cable's specified limit of 1 gigabit per second (Gbps) for distances of up to 100 meters.Continue Reading
Cloud networking vs. cloud computing: What's the difference?
Organizations might sometimes consider cloud computing and cloud networking as interchangeable due to their similarities. But the two strategies have different goals and processes.Continue Reading
SD-WAN vs. load balancing: How are they different?
Load balancing is beneficial for network traffic distribution. SD-WAN can use load balancing for WAN connections, but it doesn't require load balancing to reap other benefits.Continue Reading
SD-WAN security
SD-WAN security refers to the practices, protocols and technologies protecting data and resources transmitted across software-defined wide area network infrastructure.Continue Reading
net neutrality
Net neutrality is the concept of an open, equal internet for everyone, regardless of content consumed or the device, application or platform used.Continue Reading
networking (computer)
Networking, also known as computer networking, is the practice of transporting and exchanging data between nodes over a shared medium in an information system.Continue Reading
local area network (LAN)
A local area network (LAN) is a group of computers and peripheral devices that are connected together within a distinct geographic area, such as an office building or campus.Continue Reading
SASE vs. SD-WAN: What's the difference?
SASE and SD-WAN are two similar architectures administrators use to provide secure network access, but they differ in terms of deployment, security, connectivity and more.Continue Reading
Infrastructure requirements for Kubernetes cluster networking
A well-architected network infrastructure is vital for Kubernetes cluster networking, providing seamless communication and resource orchestration across containerized workloads.Continue Reading
How to use the LFTP client to download files
The open source LFTP client supports multiple file transport types, such as FTP and HTTPS, enabling administrators to use a single interface to upload and download files.Continue Reading
Cloud security vs. network security: What's the difference?
While network security focuses on solely protecting networks, cloud security provides protection for networks, servers, containers, apps and more.Continue Reading
How NetOps supports digital transformation
NetOps uses automation and intent-based networking tools to streamline digital transformation and ensure accurate and flexible network services.Continue Reading
Classical internet vs. quantum internet: How do they differ?
The quantum internet is a hypothetical secure network made of qubits. It differs from the classical internet with its use of quantum principles for enhanced security and computing.Continue Reading
A network compliance checklist for remote work
This network compliance checklist for remote work provides best practices on establishing remote policies and procedures, help desk support and data backup, among other steps.Continue Reading
firewall as a service (FWaaS)
Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis capabilities to customers as part of an overall cybersecurity program.Continue Reading
NetSecOps best practices for network engineers
Network engineers increasingly need to align their duties with security, such as implementing continuous monitoring, deploying threat intelligence and collaborating with security.Continue Reading
Private LTE vs. Wi-Fi: What's the difference?
Enterprises have a lot of options when designing networks for specialized uses. Wi-Fi supports high-volume environments, but private LTE also provides important benefits.Continue Reading
How to close the networking skills gap
The networking skills gap stems from tech shifts, generational turnover and hiring complexities. Bridge the gap with skills gained through study, training and employer support.Continue Reading
Effective soft skills for network engineers
Soft skills such as empathy, active listening and problem-solving can be valuable assets to network engineers who interact with nontechnical business stakeholders.Continue Reading
private 5G
Private 5G is a wireless network technology that delivers 5G cellular connectivity for private network use cases.Continue Reading
NFVi (network functions virtualization infrastructure)
NFVi (network functions virtualization infrastructure) encompasses all of the networking hardware and software needed to support and connect virtual network functions in carrier networks.Continue Reading
network orchestration
Network orchestration is the use of a software-defined network controller that facilitates the creation of network and network security services to achieve business goals.Continue Reading
millimeter wave (mmWave)
Millimeter wave (mmWave), also known as millimeter band, is a range of electromagnetic frequencies between microwaves and infrared.Continue Reading
5G
Fifth-generation wireless (5G) is the latest iteration of cellular technology.Continue Reading
How to use TFTP to transfer files across the network
Trivial File Transfer Protocol is one of the oldest and simplest TCP/IP file exchange protocols. Here are use cases and best practices for installation and security.Continue Reading
8 practice network hardware questions for CCST exam
Prepare for the CCST Networking exam with this network hardware quiz from Chapter 10 of 'Cisco Certified Support Technician CCST Networking 100-150 Official Cert Guide.'Continue Reading
Introduction to network hardware components
This excerpt from 'Cisco Certified Support Technician CCST Networking 100-150 Official Cert Guide' provides beginners with knowledge and best practices on network hardware.Continue Reading
Evolved Packet Core (EPC)
Evolved Packet Core (EPC) is a framework for providing converged voice and data services on a 4G Long-Term Evolution (LTE) network.Continue Reading
tunneling or port forwarding
Tunneling or port forwarding is the transmission of data intended for use only within a private -- usually corporate -- network through a public network in such a way that the public network's routing nodes are unaware that the transmission is part ...Continue Reading
baseboard management controller (BMC)
A baseboard management controller (BMC) is a specialized service processor that remotely monitors the physical state of a host system, such as a computer, network server or other hardware devices.Continue Reading
5G security: Everything you should know for a secure network
5G touts better security controls than 4G, including stronger encryption, privacy and authentication. But enterprises need to consider the challenges, too.Continue Reading
Introduction to IP addressing and subnetting
IP addresses and subnets are necessary for effective network communications. Learn how IP addresses and subnets work, and compare classful and classless IP addresses.Continue Reading
top-of-rack switching
Top-of-rack switching is a data center architecture design in which computing equipment like servers, appliances and other switches located within the same or adjacent rack connect to an in-rack network switch.Continue Reading
edge device
An edge device is any piece of hardware that controls data flow at the boundary between two networks.Continue Reading
6 types of quantum network topologies
Quantum networks require efficient architectures to optimize communication and enable large-scale quantum information processing. Learn about the main quantum network topologies.Continue Reading
Network simulation vs. emulation: What's the difference?
Network engineers use simulation and emulation to test changes, which ensures reliable post-change performance. Network simulators create models, while emulators mimic networks.Continue Reading
network interface card (NIC)
A network interface card (NIC) is a hardware component, typically a circuit board or chip, installed on a computer so it can connect to a network.Continue Reading
User Datagram Protocol (UDP)
User Datagram Protocol (UDP) is a communications protocol primarily used to establish low-latency and loss-tolerating connections between applications on the internet.Continue Reading
Telnet
Telnet is a network protocol used to virtually access a computer and provide a two-way, collaborative and text-based communication channel between two machines.Continue Reading
big-endian and little-endian
The term endianness describes the order in which computer memory stores a sequence of bytes.Continue Reading
Address Resolution Protocol (ARP)
Address Resolution Protocol (ARP) is a protocol that maps dynamic IP addresses to permanent physical machine addresses in a local area network (LAN).Continue Reading
single-user multiple input, multiple output (SU-MIMO)
Single-user multiple input, multiple output (SU-MIMO) is a multitransmitter and receiver technology that lets a wireless access point send multiple, simultaneous data streams to one compatible endpoint at a time.Continue Reading
ternary content-addressable memory (TCAM)
Ternary content-addressable memory (TCAM) is a specialized type of high-speed memory that searches its entire contents in a single clock cycle.Continue Reading
SASE vs. NaaS: What's the difference?
SASE and NaaS are network models with different goals. SASE combines SD-WAN with cloud-based security, while NaaS lets businesses outsource network management via a subscription model.Continue Reading
5G standalone (5G SA)
5G standalone (5G SA) is a cellular infrastructure built specifically for 5G services by implementing 5G standards and protocols in the radio network and controller core.Continue Reading
Cisco IOS (Cisco Internetwork Operating System)
Cisco IOS (Internetwork Operating System) is a collection of proprietary operating systems (OSes) that runs on Cisco hardware devices, including Cisco Systems network devices, routers and network switches.Continue Reading
What is 6G? Overview of 6G networks & technology
6G (sixth-generation wireless) is the successor to 5G cellular technology. 6G networks will be able to use higher frequencies than 5G networks and provide substantially higher capacity and much lower latency.Continue Reading
data link layer
The data link layer is the protocol layer in a program that handles how data moves in and out of a physical link in a network.Continue Reading
carrier cloud
A carrier cloud is a cloud computing environment that is owned and operated by a traditional telecommunications service provider.Continue Reading
How to build a private 5G network architecture
A private 5G network could provide organizations with greater control over their wireless environments. But cost and complexity could be critical deterrents.Continue Reading
CPRI (Common Public Radio Interface)
CPRI (Common Public Radio Interface) is a specification for wireless communication networks that defines the key criteria for interfacing transport, connectivity and control communications between baseband units (BBUs) and remote radio units (RRUs),...Continue Reading
network hub
A network hub is a node that broadcasts data to every computer or Ethernet-based device connected to it.Continue Reading
router
A router is a physical or virtual appliance that passes information between two or more packet-switched computer networks.Continue Reading