Get started
Bring yourself up to speed with our introductory content.
Get started
Bring yourself up to speed with our introductory content.
VLAN vs. subnet: What's the difference?
While VLANs are a type of subnet, they have their own unique capabilities and characteristics that differentiate them from subnets. However, the OSI model plays a major role in both. Continue Reading
VPN vs. VLAN: What's the difference?
VPNs and VLANs are different technologies with some similarities. VPNs connect authorized users to corporate network resources, while VLANs connect geographically separate devices. Continue Reading
How to calculate SASE return on investment and costs
SASE return on investment will vary for each organization, depending on use cases and architecture requirements. But the metrics used to determine ROI and cost factors are the same. Continue Reading
-
Broadband vs. Wi-Fi: What's the difference?
Broadband and Wi-Fi are common technical terms often used interchangeably -- although they shouldn't be. Both provide connectivity, but they do so in different ways. Continue Reading
Top network attacks of 2020 that will influence the decade
You've heard of phishing, ransomware and viruses. Now, keep them in mind because one cybersecurity expert says these threats and more may cause IT headaches for the next decade. Continue Reading
-
Definitions to Get Started
- What is Cisco Performance Routing (PfR)?
- What is a MAC address and how do I find it?
- What is cloud networking?
- What is IPv6 (Internet Protocol version 6)?
- What is TCP/IP?
- What is ICMP (Internet Control Message Protocol)?
- What is asynchronous?
- What is a URL (Uniform Resource Locator)?
Advice for an effective network security strategy
Security audits, evaluations of tools and looking realistically at trending technologies are some ways an organization can ensure its network security is the best it can be.Continue Reading
Test your network threats and attacks expertise in this quiz
Network security is an ever-changing subject, but many of its common threats have plagued IT pros for years -- and will likely continue to do so. See what you know in this quiz.Continue Reading
What are the differences between Wi-Fi and WiMax?
Wi-Fi is the wireless standard used to build wireless LANs, while carriers primarily used WiMax to build wireless metropolitan area networks before moving to LTE.Continue Reading
Network pros share Cisco DevNet certification advice
Cisco DevNet certifications require a lot of time investment, but network pros who pursue the certifications say the gained skills and knowledge are worth it.Continue Reading
A look inside the official Cisco DEVASC 200-901 guidebook
In this book excerpt, readers can explore the Cisco DEVASC 200-901 official guide and get a flavor of one of Cisco's newest exams and its blend of networking and software topics.Continue Reading
-
7 practice questions for Cisco 200-901 DevNet Associate exam
Ready for Cisco's introductory DevNet exam, DEVASC 200-901? Start your Cisco DevNet Associate training with this practice quiz directly from the official exam guidebook.Continue Reading
What is the difference between IP telephony and VoIP?
While many IT professionals use VoIP and IP telephony synonymously, some argue for keeping a couple of subtle distinctions between the two terms in mind.Continue Reading
Cisco Certified Entry Networking Technician (CCENT)
Cisco Certified Entry Networking Technician (CCENT) is a now-retired certification offered by Cisco, as part of their certification program.Continue Reading
How do VPN vs. cloud services compare for remote work?
As remote work becomes increasingly normal, IT teams must decide which remote access technologies will benefit employees more. VPN and cloud services are two top choices.Continue Reading
How and why to implement Wi-Fi QoS
Quality of service, as network pros know, prioritizes apps as they cross the network. But Wi-Fi QoS needs to be considered, too, in relation to the overall network.Continue Reading
The role of SD-WAN templates before and during deployment
SD-WAN deployments require knowledge of network design and trust in software to take over some network maintenance duties. This is where SD-WAN templates come into play.Continue Reading
Learn to onboard, provision devices in Cisco's SD-WAN book
Here's a look inside Cisco's SD-WAN book, which details design and deployment for network teams looking to deploy SD-WAN and insights for SD-WAN certification hopefuls.Continue Reading
6 practice questions for SD-WAN certification training
Before you start SD-WAN certification training, try this quiz from Cisco's official SD-WAN guidebook, which covers onboarding and provisioning devices, as well as SD-WAN templates.Continue Reading
What network automation certification options are available?
Network automation certifications and training include vendor-specific commercial credentials, as well as open source options. Which career path is right for you?Continue Reading
How to build a resilient network design
Everything fails eventually, even in networking. Enterprises can prepare for network failure by building resilience and redundancy into their network infrastructure design.Continue Reading
What does a VPN concentrator do?
As more employees work remotely and VPN use rises, VPN concentrators have become trendy. But what does a VPN concentrator do exactly, and how do you deploy one?Continue Reading
How and when to establish enterprise 5G partnerships
Enterprises that buy 5G public services, procure network slices or build their own private 5G networks need to establish the right partnerships for mobile services, equipment and software.Continue Reading
Private LTE networks grow as 5G comes into view
Private LTE networks deliver secure cellular connectivity in localized enterprise or industrial spaces, with private 5G networks and newly available spectrum bands soon to follow.Continue Reading
What is the difference between SNMP and RMON?
While Simple Network Management Protocol tracks network devices, Remote Network Monitoring tracks traffic. As a team, SNMP and RMON are essential for network management.Continue Reading
The benefits of building a network automation lab
Network teams can build network automation labs to create a safe environment to test and validate automation tasks before running them in production networks.Continue Reading
5 edge computing basics you need to know
Edge computing is forcing IT teams to rethink legacy architectures. In this guide, explore edge computing basics, including its pros and cons and its effect on enterprise networks.Continue Reading
How to select and set up SD-WAN and DIA
When evaluating different options for SD-WAN and direct internet access, IT teams can't forget to consider application performance, network uptime and support for each option.Continue Reading
What's the difference between GRE and IPsec tunnels?
IPsec provides more comprehensive security for IP tunneling, while GRE tunnels work well when network teams need to tunnel with multiple protocols or multicast.Continue Reading
How to set up a new business network
Building a new network can be complicated, but IT teams can ease the design process and future management by choosing the right architecture and documenting each decision.Continue Reading
What's the difference between a Layer 3 switch and a router?
Even though they have common traits, there is a difference between a Layer 3 switch and a router. Each plays a key role in making sure packets get sent to their proper destination.Continue Reading
What's the difference between OFDMA vs. MU-MIMO in Wi-Fi 6?
Is there a difference between OFDMA and MU-MIMO? The two important Wi-Fi 6 features are complementary but distinct. Here's why.Continue Reading
SD-branch devices promise network, security benefits
SD-branch technology integrates network and security functions in branch offices, thus promoting safer and more efficient connectivity for companies with multiple locations.Continue Reading
What to know about VPN termination
Network teams make several decisions when designing a secure VPN. One of those is where in the network, logically, they will terminate the VPN tunnels.Continue Reading
Is Wi-Fi 6 backward-compatible? Yes and no
With the advent of a new wireless standard, some users may wonder: Is Wi-Fi 6 backward-compatible? The answer is yes. But do you want full backward compatibility?Continue Reading
Wi-Fi vs. Ethernet: What's the difference and which is better?
When assessing Wi-Fi vs. Ethernet, each connection type has its benefits and drawbacks. Find out why one standard might be more reliable for your network.Continue Reading
A glossary of home network basics for the networking novice
A remote employee's home network requires basics such as routers, modems and VPN services. For the networking novice, this glossary explains and defines these terms and more.Continue Reading
5 things to know about MU-MIMO technology in Wi-Fi networks
'Multiuser multiple input, multiple output' might not roll off the tongue, but MU-MIMO technology is increasingly important in modern wireless networks. Here's what you should know.Continue Reading
Top 5 VPN myths and misconceptions for IT organizations
Although VPN technology has its challenges, various misconceptions exist that can muddle IT teams' understandings of VPNs. Here are five common VPN misconceptions debunked.Continue Reading
How to build a network monitoring business case
As network teams construct a business case for a new network monitoring tool, they should include a cost comparison of alternative tools and a strong defense for the selected tool.Continue Reading
Explore real-world edge computing examples for network teams
Developed out of a necessity to handle increasing amounts of data, edge computing will disrupt traditional computing and benefit various modern use cases.Continue Reading
Edge computing book introduces edge laws and techniques
In this book excerpt, discover the three laws of edge computing, as well as how to use edge computing techniques to solve common IT problems within organizations.Continue Reading
Network engineer career advice amid the COVID-19 pandemic
As COVID-19 dramatically affects the global economy, people may ask, 'What's next for my career?' No one is sure, but these tips can help network engineers feel and stay secure.Continue Reading
What are the 5 different types of network management?
Security policies, optimal service levels, configuration changes and even cost control measures all encompass the different types of network management.Continue Reading
What are the differences between VPN and VDI services?
With a common denominator of 'virtual,' both VPNs and VDI are common in remote work strategies. However, the technologies differ in terms of cost, use cases and performance.Continue Reading
What is the difference between a socket and a port?
Sockets, ports and port numbers have functional overlap, but the terms are distinct. A socket is part of a port, while a port number is part of a socket. We explain.Continue Reading
A glossary of the VPN terminology you need to know
For organizations with remote workforces, VPNs can be an essential part of daily life. This VPN glossary explores the essential terms and phrases that constitute VPN services.Continue Reading
Wi-Fi 6 explained: Speed, range, latency, frequency and security
Wi-Fi 6 is more than just another wireless upgrade, boasting substantial gains over Wi-Fi 5. Learn how frequency, speed, range, latency and security change with the new standard.Continue Reading
SASE model aims to boost network security, performance
Secure Access Service Edge is the new approach to improving network performance in enterprises powered by cloud and mobile. Here's what you must know about SASE.Continue Reading
SNMP vs. CMIP: What's the difference?
While SNMP and CMIP originally competed as network management protocols in the 1980s, SNMP has emerged as the more relevant protocol, largely due to its simplicity.Continue Reading
How is SD-WAN as a service different from managed SD-WAN?
SD-WAN technology is available in a variety of business models, including SD-WAN as a service and managed SD-WAN. But how do the different consumption models compare?Continue Reading
What does 'network on demand' mean for enterprises?
Following the on-demand trend, network on-demand options provide enterprises with more flexible consumption models, such as managed network services and cloud-based networking.Continue Reading
What is the difference between LoRa and LoRaWAN?
LoRa is a modulation technique for specific wireless spectrum, while LoRaWAN is an open protocol that enables IoT devices to use LoRa for communication.Continue Reading
What is network verification and do enterprises need it?
Network verification can help organizations gain critical network performance insight and alleviate network complexity. But aspects of the concept are new and not yet mainstream.Continue Reading
What is USSD (Unstructured Supplementary Service Data)?
USSD (Unstructured Supplementary Service Data) is a GSM (Global System for Mobile) communications protocol that is used to send text messages.Continue Reading
Try 10 practice questions for the CCNP, CCIE ENCOR 350-401
This practice quiz for CCNP and CCIE ENCOR 350-401 explores what readers must know about IP routing essentials -- including BGP and OSPF -- from the new certification guidebook.Continue Reading
How Cisco certification changes alter CCNP and CCIE tracks
Here's what to expect from the colossal Cisco certification changes to the CCNP and CCIE tracks that aim to increase material relevance and benefit network engineers' daily lives.Continue Reading
Prepare for CCNP, CCIE ENCOR 350-401 with this guide preview
Here's an excerpt from the new 'CCNP and CCIE ENCOR 350-401 Official Cert Guide' that provides the key IP routing essentials network engineers require for their job roles.Continue Reading
An introduction to network automation with Ansible
Ansible is one of the most popular open source network automation tools. Network pros can use it to perform basic network automation tasks, like collecting ARP table data.Continue Reading
How do I build a cloud-ready network?
IT teams can prepare their networks for cloud migrations by planning around their applications, security strategies, remote users and WAN performance.Continue Reading
A glossary of network terms for management and monitoring
This glossary of network terms specifically highlights network management and monitoring processes. Explore these 12 key terms and concise definitions.Continue Reading
Understand business value to advance your networking career
Network pros can use the CAR mindset -- challenge, action and result -- to better match their networking initiatives with business goals and advance their career opportunities.Continue Reading
What's the difference between SD-branch vs. SD-WAN?
As networking pros evaluate SD-branch vs. SD-WAN, they'll notice a key distinction between the two technologies, namely how network functions are managed and orchestrated.Continue Reading
A look inside 'CCNA 200-301 Official Cert Guide, Volume 2'
Network security is a crucial skills area for network engineers, and the CCNA 200-301 reflects this. Here's a chapter excerpt on network security from the new guide.Continue Reading
Traditional, emerging topics unite in the new CCNA exam
As of Feb. 24, all eyes are on the CCNA 200-301 exam -- Cisco's latest update to the CCNA track. Here's a look at what's on the exam and how it compares to previous CCNA exams.Continue Reading
What's the difference between thin and thick SD-WAN branch offices?
When rolling out software-defined WAN, you'll need to consider the current makeup of your branch offices. For instance, are applications on-site or in the cloud?Continue Reading
Compare Paramiko, Netmiko and NAPALM network automation
Python is a useful language, but it can't do everything. Explore some basic network automation scripts that use Python with three automation libraries: Paramiko, Netmiko and NAPALM.Continue Reading
Wi-Fi 6 glossary of 12 important terms and phrases
This Wi-Fi 6 glossary delves into various features and capabilities the new generation of Wi-Fi technology offers, as well as what organizations can expect from Wi-Fi 6 devices.Continue Reading
SD-WAN vs. DMVPN vs. IPsec tunnels: How do I choose?
Software-defined WAN, DMVPN and IPsec tunnels each have a place among enterprises. Our network expert compares each one and explains where they can be most beneficial.Continue Reading
Test your knowledge of SD-WAN deployments and testing
As SD-WAN becomes more mainstream, organizations must learn what to expect during all phases of deployment. Try your knowledge of SD-WAN testing, deployments and troubleshooting.Continue Reading
How do I build the right cloud network design?
Networks look different now than they did a decade ago, and that continuous change isn't slowing down. Cloud networking plays a large role in the transformation of legacy networks.Continue Reading
What SD-WAN devices do I need in an SD-WAN deployment?
Despite the software-centric nature of software-defined WAN, certain SD-WAN devices are still required to help transport traffic and complete network connections.Continue Reading
Test your cloud networking knowledge with these 10 questions
As cloud networks become more common, IT teams must understand how cloud architectures can benefit -- or impede -- business requirements. Take this quiz to see how much you know.Continue Reading
Understanding the evolution of Ethernet
First developed by Xerox PARC in the 1970s and ratified by IEEE as a standard in 1983, the evolution of Ethernet has taken this LAN technology through dozens of specifications.Continue Reading
SD-WAN explained in 15 key terms and phrases
This SD-WAN glossary delves into the various capabilities, technologies and components that encompass SD-WAN, explained with 15 concise definitions.Continue Reading
What is the difference between a bridge and a router?
While a bridge and router share some similarities, the difference between a bridge and router is significant, including how the devices interpret network connections.Continue Reading
What's the difference between half-duplex and full-duplex?
A half-duplex transmission could be considered a one-way street between sender and receiver. Full-duplex, on the other hand, enables two-way traffic at the same time.Continue Reading
Network security vs. application security: What's the difference?
Different tools protect different assets at the network and application layers. But both network and application security need to support the larger security plan.Continue Reading
Learn how to master network traffic analysis with Python
In this book excerpt, explore key components of network security and network traffic analysis with Python scripting from Packt Publishing author José Manuel Ortega.Continue Reading
An overview of how BGP works
Border Gateway Protocol makes the internet work, but how does BGP work? This animated video explains the basics of BGP and discusses its role in the internet.Continue Reading
What SD-WAN certifications and courses are available?
A few SD-WAN certifications do exist, but they're heavily focused on specific vendors and their respective products. Find out why market-wide certs are unlikely.Continue Reading
Discover 5 key cloud networking basics for your organization
Clear away the fog, and explore these five key cloud networking fundamentals -- such as models, challenges and tools -- you need to know before you adopt a cloud network strategy.Continue Reading
Prep for SD-WAN challenges, and you'll reap its rewards
Reap SD-WAN's multiple benefits by knowing ahead of time what the likely issues will be and the options available at the implementation and management stages.Continue Reading
SD-WAN deployment in the works? Consider these 3 things
SD-WAN can simplify the deployment and management of new branch WANs, but there are some key configuration and technical choices you must make to get started.Continue Reading
How to develop and implement a network security plan
When formulating a focused network security plan, you'll need to address specific questions about outbound traffic, user logins and government regulations.Continue Reading
A glossary of key edge computing architecture terms
Bolster your networking vocabulary and get to know the various features and technologies that constitute edge computing in this comprehensive glossary of key terms and phrases.Continue Reading
Data center transformation drives the ADC security use case
Application delivery controllers play many roles, but the ADC security use case might be most important. Learn about ADC features and how they boost data center security.Continue Reading
5G explained: A deep dive into the features and facts
In this 5G guide, learn about key features, challenges and deployment tips. This 5G explanation goes beyond the fundamentals and explores 5G's relationship to other technologies.Continue Reading
Cisco CCNA practice test: Try these 20 exam questions
Use this CCNA practice test as study material to prepare for the Cisco CCNA Routing and Switching 200-125 exam. With 20 questions on a range of topics, we're not playing around.Continue Reading
Try a CCNA 200-301 practice quiz from the official cert guide
This practice quiz provides a sneak peek into the new 'CCNA 200-301 Official Cert Guide, Volume 1,' which reflects Cisco's CCNA certification and exam redesigns.Continue Reading
Prepare for the CCNA 200-301 exam with this guide preview
Here's a sneak peek at what to expect from Cisco's redesigned CCNA exam directly from 'CCNA 200-301 Official Cert Guide, Volume 1' by author Wendell Odom.Continue Reading
Bridge vs. switch comparison: What's the difference?
A network bridge connects two local area networks. A network switch, on the other hand, connects multiple clients to a network. Learn more about these two network components.Continue Reading
Learn how to get started with your networking career
Wherever you are on your networking career path, these expert insights can help you decide where to go and give advice about job requirements, certifications and industry changes.Continue Reading
Network pros on new Cisco DevNet certification: 'Finally!'
Want to learn infrastructure as code? Now, there's a Cisco cert for that. Learn more about the new network automation certification suite, plus changes to the CCNA, CCNP and CCIE.Continue Reading
What is data center networking, and how can you get started?
This feature explores the basics of data center networks, such as how to plan for data center consolidation, the effects of cloud services and how to handle data center interconnects.Continue Reading
The top 5 capabilities your edge infrastructure should have
The network edge plays a vital role in the future of networking and digital transformation. Make sure your infrastructure has these five components to help it on its way.Continue Reading
What are network firewalls? Test your network security IQ
Network firewalls have been an essential part of network security since the internet began. This quiz covers what network firewalls are and tests your security expertise.Continue Reading
What are the steps I should take for network transformation?
The path to digital transformation has three points that all organizations should reach to ensure their network is ready for digital transformation.Continue Reading
What is 5G massive MIMO and how can it boost bandwidth?
With a large array of small antennas and time division duplex communication, 5G massive MIMO is expected to support more bandwidth and users with lower latency.Continue Reading
How does SD-WAN analytics monitor network performance?
With SD-WAN analytics, administrators can fine-tune their WAN connections and determine how well their network is performing.Continue Reading
Better security through software-defined perimeter know-how
Network attacks keep changing, which means your strategy for protecting the network must too. Learn one advancement that's replacing traditional network architectures.Continue Reading