Get started
Bring yourself up to speed with our introductory content.
Get started
Bring yourself up to speed with our introductory content.
An introduction to twisted-pair cable wiring
This excerpt from 'Networking Essentials: A CompTIA Network+ N10-008 Textbook' provides an overview of twisted-pair network cables and acts as a study tool for the exam. Continue Reading
coaxial cable
Coaxial cable is a type of copper cable specially built with a metal shield and other components engineered to block signal interference. Continue Reading
megahertz (MHz)
Megahertz (MHz) is a unit multiplier that represents one million hertz (106 Hz). Hertz is the standard unit of frequency in the International System of Units (SI). Continue Reading
-
IEEE 802 wireless standards
IEEE 802 is a collection of networking standards that cover the physical and data link layer specifications for technologies such as Ethernet and wireless. Continue Reading
gigabit (Gb)
In data communications, a gigabit (Gb) is 1 billion bits, or 1,000,000,000 (that is, 10^9) bits. It's commonly used for measuring the amount of data that is transferred in a second between two telecommunication points. Continue Reading
-
Definitions to Get Started
- What is Cisco Certified Internetwork Expert (CCIE) certification?
- What is Cisco Performance Routing (PfR)?
- What is a MAC address and how do I find it?
- What is cloud networking?
- What is IPv6 (Internet Protocol version 6)?
- What is TCP/IP?
- What is ICMP (Internet Control Message Protocol)?
- What is asynchronous?
ingress filtering
Ingress filtering is a method used by enterprises and internet service providers to prevent suspicious traffic from entering a network.Continue Reading
multi-user MIMO
Multi-user MIMO, or MU-MIMO, is a wireless communication technology that uses multiple antennas to improve communication by creating multiple connections to the same device at the same time.Continue Reading
bogon
A bogon is an illegitimate Internet Protocol address that falls into a set of IP addresses that have not been officially assigned to an entity by an internet registration institute, such as the IANA.Continue Reading
network management system
A network management system, or NMS, is an application or set of applications that lets network engineers manage a network's independent components inside a bigger network management framework and performs several key functions.Continue Reading
host (in computing)
A host is a computer or other device that communicates with other hosts on a network.Continue Reading
-
Network as a Service (NaaS)
Network as a service, or NaaS, is a business model for delivering enterprise WAN services virtually on a subscription basis.Continue Reading
network configuration management (NCM)
Network configuration management is the process of organizing and maintaining information about all of the components in a computer network.Continue Reading
presentation layer
The presentation layer resides at Layer 6 of the Open Systems Interconnection (OSI) communications model and ensures that communications that pass through it are in the appropriate form for the recipient application.Continue Reading
campus network
A campus network is a proprietary local area network (LAN) or set of interconnected LANs serving a corporation, government agency, university or similar organization.Continue Reading
point-of-presence (POP)
A point-of-presence (POP) is a point or physical location where two or more networks or communication devices build a connection from one place to the rest of the internet.Continue Reading
green networking
Green networking is the practice of selecting energy-efficient networking technologies and products and minimizing resource use whenever possible.Continue Reading
attenuation
Attenuation is a general term that refers to any reduction in the strength of a signal.Continue Reading
cloud radio access network (C-RAN)
Cloud radio access network (C-RAN) is a centralized, cloud computing-based architecture for radio access networks.Continue Reading
DHCP (Dynamic Host Configuration Protocol)
DHCP (Dynamic Host Configuration Protocol) is a network management protocol used to dynamically assign an IP address to any device, or node, on a network so it can communicate using IP.Continue Reading
load balancing
Load balancing is a technique used to distribute network traffic across a pool of servers known as a server farm.Continue Reading
data center interconnect (DCI)
Data center interconnect (DCI) technology links two or more data centers together to share resources.Continue Reading
Routing Information Protocol (RIP)
Routing Information Protocol (RIP) is a distance vector protocol that uses hop count as its primary metric.Continue Reading
NOC vs. data center: What's the difference?
Network operations centers and data centers are two facilities organizations use to store IT devices and manage operations. But they differ significantly in terms of purpose and operations.Continue Reading
network availability
Network availability is the amount of uptime in a network system over a specific time interval.Continue Reading
How to use Nmap to scan a network for documentation
Nmap might be more common for security tasks, but it's also useful for network documentation and inventory. Follow these best practices to make the most of Nmap scan results.Continue Reading
NFV MANO (network functions virtualization management and orchestration)
NFV MANO (network functions virtualization management and orchestration), also called MANO, is an architectural framework for managing and orchestrating virtualized network functions (VNFs) and other software components.Continue Reading
How to set up a business Wi-Fi network
A Wi-Fi network is a business necessity, but setting it up takes skill and effective troubleshooting. Learn how to make Wi-Fi work and keep it running smoothly.Continue Reading
Wireless security: WEP, WPA, WPA2 and WPA3 differences
As wireless networks have evolved, so have the protocols for securing them. Get an overview of WLAN security standards, and learn the differences among WEP, WPA, WPA2 and WPA3.Continue Reading
network traffic
Network traffic is the amount of data that moves across a network during any given time.Continue Reading
dynamic and static
In general, dynamic means 'energetic, capable of action and/or change, or forceful,' while static means 'stationary or fixed.'Continue Reading
routing table
A routing table is a set of rules, often viewed in table format, that's used to determine where data packets traveling over an Internet Protocol (IP) network will be directed.Continue Reading
traffic shaping
Traffic shaping, also known as packet shaping, is a congestion management method that regulates network data transfer by delaying the flow of less important or less desired packets.Continue Reading
throughput
Throughput is a measure of how many units of information a system can process in a given amount of time.Continue Reading
How to set up backup internet connections for home offices
Reliable connectivity and secure access are must-haves for employees working from home. Here are ideas to consider when designing backup internet connections for home offices.Continue Reading
open networking
Open networking describes a network that uses open standards and commodity hardware.Continue Reading
managed network services
Managed network services are networking applications, functions and services that enterprises outsource to be remotely operated, monitored and maintained by a managed service provider (MSP).Continue Reading
control plane (CP)
The control plane is the part of a network that carries signaling traffic and is responsible for network routing.Continue Reading
3 types of wireless site surveys and how to conduct them
Network teams can avoid signal coverage issues by performing different wireless site surveys as they evaluate new spaces, set up sites and operate the network.Continue Reading
What is the difference between WLAN and Wi-Fi?
Although the terms WLAN and Wi-Fi are used interchangeably, the two wireless technologies differ. Wireless LAN uses radio technology to connect nodes, while Wi-Fi is a type of WLAN.Continue Reading
IPv4 vs. IPv6: What's the difference?
IPv4 and IPv6 are two forms of IP addresses, but they differ in length and style. Compare the two, and find out why organizations might implement one over the other.Continue Reading
east-west traffic
East-west traffic, in a networking context, is the transfer of data packets from server to server within a data center.Continue Reading
CBRS (Citizens Broadband Radio Service)
Citizens Broadband Radio Service, or CBRS, is the set of operational rules given to a slice of the shared wireless spectrum and the technologies used in that spectrum.Continue Reading
Wireless access point vs. router: What's the difference?
The choice of a wireless access point vs. a router for wireless network connectivity depends on the physical size of the network, needs of the organization and the number of users.Continue Reading
What's the difference between 802.11ac vs. 802.11ax?
The difference between 802.11ac and 802.11ax is significant. The two wireless standards differ notably in features such as AP capacity, spatial streams and data rates.Continue Reading
wireless mesh network (WMN)
A wireless mesh network (WMN) is a mesh network created through the connection of wireless access point (WAP) nodes installed at each network user's locale.Continue Reading
CBRS vs. Wi-Fi: What's the difference?
Citizens Broadband Radio Service enables private LTE networks and supports enterprise WAN deployments. But that doesn't mean Wi-Fi is going away anytime soon.Continue Reading
VPN vs. zero trust vs. SDP: What's the difference?
For strong network security, many vendors say VPNs don't cut it anymore. Enter the zero-trust security model and SDPs.Continue Reading
Wi-Fi 7
Wi-Fi 7 is the pending 802.11be standard under development by IEEE.Continue Reading
What is zero-trust network access? ZTNA basics explained
Zero-trust network access is touted as the solution to replace the VPN. As the potential future of network security, learn more about ZTNA, including its benefits and challenges.Continue Reading
network security
Network security encompasses all the steps taken to protect the integrity of a computer network and the data within it.Continue Reading
How to build a zero-trust network in 4 steps
While network teams are responsible for deploying the elements of a zero-trust network, security teams should also be involved in developing the overall zero-trust framework.Continue Reading
What is a cloud-native network function (CNF)?
A cloud-native network function (CNF) is a service that performs network duties in software, as opposed to purpose-built hardware.Continue Reading
Wi-Fi 6E
Wi-Fi 6E is one variant of the 802.11ax standard.Continue Reading
microsegmentation
Microsegmentation is a security technique that splits a network into definable zones and uses policies to dictate how data and applications within those zones can be accessed and controlled.Continue Reading
Tips to prepare for a network disaster recovery audit
Enterprises can audit their network disaster recovery plans to ensure thorough protection and preparation. Consider factors like documentation, management support and audit type.Continue Reading
Network bandwidth vs. throughput: What's the difference?
Bandwidth and throughput both indicate network performance. The terms are often used together, but bandwidth refers to capacity, while throughput details how much data actually transmits.Continue Reading
How does SD-access work?
SD-access is a combination of two elements: SDN and the access edge. The result is a network with a centralized management system and improved security policies.Continue Reading
VXLAN vs. VLAN: What's the difference?
VLANs offer security and traffic management benefits but have limitations in routing and scale. VXLANs address those challenges by creating a Layer 3 network overlay.Continue Reading
Understanding the FTP PORT command
FTP uses control and data channels, each using a separate TCP port. Port 21 is for the control channel, and port 20 is for the data channel. Learn how these two channels are used.Continue Reading
What an AI-driven network looks like
Log analysis and wireless management are common AI use cases in networking. Future applications could include chatbot alerts, digital experience monitoring and traffic engineering.Continue Reading
Best practices for DIY network automation
Many network pros write their own automation scripts. These best practices help teams implement coding and tool set standardization, proper change management and immutability.Continue Reading
network packet
A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a packet-switched network, such as the internet.Continue Reading
BGP vs. EIGRP: What's the difference?
BGP is an exterior gateway protocol optimized for routing between large networks. EIGRP is an interior gateway protocol that is well suited for routing within smaller networks.Continue Reading
A guide to distributed network architectures
Distributed network architectures have become popular because of their adaptability, reliability and scalability. But every new technology also has its challenges.Continue Reading
The role of name resolution in networking
Name resolution is essential in converting hostnames and IP addresses for network communications. Here's how the process resolves hostnames, queries servers and finds IP addresses.Continue Reading
An introduction to neutral host networks using private 5G
Enterprises often use signal boosters and distributed antenna systems to improve carrier signal strength. Neutral host networks over private 5G could disrupt those methods.Continue Reading
How to convert binary to decimal
It's helpful for network admins to know how to convert binary to decimal, and vice versa, for IPv4 addressing, subnet masks, default gateways and network IDs.Continue Reading
virtual network functions (VNFs)
Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.Continue Reading
network functions virtualization (NFV)
Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have traditionally run on proprietary, dedicated network appliances.Continue Reading
overlay network
An overlay network is a virtual or logical network that is created on top of an existing physical network.Continue Reading
VLAN (virtual LAN)
A virtual LAN (VLAN) is a logical overlay network that groups together a subset of devices that share a physical LAN, isolating the traffic for each group.Continue Reading
Understand the basics of 5G wireless networks
To build a 5G network, the deployment mode, spectrum band and services are all important factors to understand and consider. Here's what you should know about the basics of 5G.Continue Reading
virtual networking
Virtual networking is the abstraction of network resources from the underlying physical network infrastructure.Continue Reading
What is a protocol data unit (PDU)?
In networking, a protocol data unit is the basic unit of exchange between entities that communicate using a specified networking protocol.Continue Reading
Ethernet vs. Carrier Ethernet: How do they differ?
Connectivity over longer distances and higher data rates are some of the major differences that separate Carrier Ethernet from traditional wired Ethernet.Continue Reading
software-defined networking (SDN)
Software-defined networking (SDN) is an architecture that abstracts different, distinguishable layers of a network to make networks agile and flexible.Continue Reading
How network virtualization works
Network virtualization uses abstraction to isolate applications and resources from the physical infrastructure. Benefits include faster provisioning, agility and operational efficiency.Continue Reading
6 types of network topologies
Network topology is essential to network configuration, as it determines the arrangement of a network and defines how nodes connect. Here are six common types of network topologies.Continue Reading
5 basic network commands for Linux and Windows
Linux and Windows use different network commands to run tasks that are common in both environments, such as network connectivity testing. But the commands often share similarities.Continue Reading
Common types of enterprise network connections
The goal of every network is to connect devices. The connections that form those links -- such as wired cabling and wireless technologies -- are crucial in network infrastructure.Continue Reading
Power over Ethernet basics for network architects
Power over Ethernet provides a way to supply electricity to low-power devices through a standard Ethernet cable. Learn about the different standards and PoE types.Continue Reading
OSGi (Open Service Gateway Initiative)
The OSGi (Open Service Gateway Initiative) specification is a Java framework for developing and deploying modular software programs and libraries.Continue Reading
What is the role of machine learning in networking?
Incorporating machine learning tools into a network can help teams predict traffic flows, generate smarter analytics, monitor network health, tighten security measures and more.Continue Reading
network analytics
Network analytics is the application of big data principles and tools to the data used to manage and secure data networks.Continue Reading
SecOps and cybersecurity basics for NetOps teams
To bridge the gap between NetOps and SecOps teams, network pros should know security fundamentals, including different types of attackers, attacks and available security services.Continue Reading
application layer
The application layer sits at Layer 7, the top of the Open Systems Interconnection (OSI) communications model. It ensures an application can effectively communicate with other applications on different computer systems and networks.Continue Reading
NetOps vs. DevOps vs. NetSecOps: What's the difference?
DevOps, NetOps and NetSecOps ... oh my! These IT concepts have their differences, but at the end of the day, they're family. Here's how they relate.Continue Reading
programmable network (network programmability)
A programmable network is one in which the behavior of network devices and flow control is handled by software that operates independently of network hardware.Continue Reading
The NetOps 2.0 era is here: A primer for networking pros
Experts say inflexible legacy networks impede critical DevOps initiatives. Enter NetOps 2.0. This primer explains how automation and virtualization can help networks evolve.Continue Reading
location-based service (LBS)
A location-based service (LBS) is a software service for mobile device applications that requires knowledge about where the mobile device is geographically located.Continue Reading
Configure DHCP failover for Windows Server
DHCP is a critical service, and network admins should take the time to create fault tolerance. Windows Server makes it easy to configure both failover and load balancing.Continue Reading
network automation
Network automation is a methodology in which software automatically configures, provisions, manages and tests network devices.Continue Reading
Try a network configuration quiz to study for Network+ exam
Use these sample questions from CompTIA's 'Official CompTIA Network+ Self-Paced Study Guide (Exam N10-008)' in preparation for your certification exam.Continue Reading
Study various network types, topologies for configuration
Those looking to earn a Network+ certification need to learn about network types, topologies, network design best practices and more. James Pengelly's book covers those topics.Continue Reading
Network design considerations for Network+ exam prep
One of the first things network pros should learn is how to design a network. In this Q&A, author James Pengelly discusses best practices for network configuration.Continue Reading
Network Time Protocol (NTP)
Network Time Protocol (NTP) is an internet protocol used to synchronize with computer clock time sources in a network.Continue Reading
How NetOps differs from traditional network operations
When comparing NetOps and conventional network operations, network teams focus on automating repeatable tasks that correct problems rather than introducing new ones manually.Continue Reading
Load sharing vs. load balancing: What's the difference?
Load sharing and load balancing are two techniques that work to distribute traffic across a network. However, their methods of balancing differ significantly. Here's how.Continue Reading
Why NetOps is a bridge to AIOps
As IT infrastructure grows more complex, NetOps teams should identify ways to ensure their networks remain operational and perform at peak levels. One option is AIOps.Continue Reading
Application vs. network load balancing: What's the difference?
Network load balancing and application load balancing both handle traffic requests. But they process and direct those requests with different levels of speed and efficiency.Continue Reading