Get started
Bring yourself up to speed with our introductory content.
Get started
Bring yourself up to speed with our introductory content.
TCP/IP
TCP/IP stands for Transmission Control Protocol/Internet Protocol and is a suite of communication protocols used to interconnect network devices on the internet. Continue Reading
SASE vs. SD-WAN: What's the difference?
SASE and SD-WAN are two similar architectures administrators use to provide secure network access, but they differ in terms of deployment, security, connectivity and more. Continue Reading
Infrastructure requirements for Kubernetes cluster networking
A well-architected network infrastructure is vital for Kubernetes cluster networking, providing seamless communication and resource orchestration across containerized workloads. Continue Reading
-
How to use the LFTP client to download files
The open source LFTP client supports multiple file transport types, such as FTP and HTTPS, enabling administrators to use a single interface to upload and download files. Continue Reading
Cloud security vs. network security: What's the difference?
While network security focuses on solely protecting networks, cloud security provides protection for networks, servers, containers, apps and more. Continue Reading
How NetOps supports digital transformation
NetOps uses automation and intent-based networking tools to streamline digital transformation and ensure accurate and flexible network services.Continue Reading
Classical internet vs. quantum internet: How do they differ?
The quantum internet is a hypothetical secure network made of qubits. It differs from the classical internet with its use of quantum principles for enhanced security and computing.Continue Reading
A network compliance checklist for remote work
This network compliance checklist for remote work provides best practices on establishing remote policies and procedures, help desk support and data backup, among other steps.Continue Reading
firewall as a service (FWaaS)
Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis capabilities to customers as part of an overall cybersecurity program.Continue Reading
NetSecOps best practices for network engineers
Network engineers increasingly need to align their duties with security, such as implementing continuous monitoring, deploying threat intelligence and collaborating with security.Continue Reading
-
Private LTE vs. Wi-Fi: What's the difference?
Enterprises have a lot of options when designing networks for specialized uses. Wi-Fi supports high-volume environments, but private LTE also provides important benefits.Continue Reading
How to close the networking skills gap
The networking skills gap stems from tech shifts, generational turnover and hiring complexities. Bridge the gap with skills gained through study, training and employer support.Continue Reading
Effective soft skills for network engineers
Soft skills such as empathy, active listening and problem-solving can be valuable assets to network engineers who interact with nontechnical business stakeholders.Continue Reading
private 5G
Private 5G is a wireless network technology that delivers 5G cellular connectivity for private network use cases.Continue Reading
NFVi (network functions virtualization infrastructure)
NFVi (network functions virtualization infrastructure) encompasses all of the networking hardware and software needed to support and connect virtual network functions in carrier networks.Continue Reading
network orchestration
Network orchestration is the use of a software-defined network controller that facilitates the creation of network and network security services to achieve business goals.Continue Reading
millimeter wave (mmWave)
Millimeter wave (mmWave), also known as millimeter band, is a range of electromagnetic frequencies between microwaves and infrared.Continue Reading
5G
Fifth-generation wireless (5G) is the latest iteration of cellular technology.Continue Reading
How to use TFTP to transfer files across the network
Trivial File Transfer Protocol is one of the oldest and simplest TCP/IP file exchange protocols. Here are use cases and best practices for installation and security.Continue Reading
8 practice network hardware questions for CCST exam
Prepare for the CCST Networking exam with this network hardware quiz from Chapter 10 of 'Cisco Certified Support Technician CCST Networking 100-150 Official Cert Guide.'Continue Reading
Introduction to network hardware components
This excerpt from 'Cisco Certified Support Technician CCST Networking 100-150 Official Cert Guide' provides beginners with knowledge and best practices on network hardware.Continue Reading
tunneling or port forwarding
Tunneling or port forwarding is the transmission of data intended for use only within a private -- usually corporate -- network through a public network in such a way that the public network's routing nodes are unaware that the transmission is part ...Continue Reading
Evolved Packet Core (EPC)
Evolved Packet Core (EPC) is a framework for providing converged voice and data services on a 4G Long-Term Evolution (LTE) network.Continue Reading
baseboard management controller (BMC)
A baseboard management controller (BMC) is a specialized service processor that remotely monitors the physical state of a host system, such as a computer, network server or other hardware devices.Continue Reading
5G security: Everything you should know for a secure network
5G touts better security controls than 4G, including stronger encryption, privacy and authentication. But enterprises need to consider the challenges, too.Continue Reading
Introduction to IP addressing and subnetting
IP addresses and subnets are necessary for effective network communications. Learn how IP addresses and subnets work, and compare classful and classless IP addresses.Continue Reading
top-of-rack switching
Top-of-rack switching is a data center architecture design in which computing equipment like servers, appliances and other switches located within the same or adjacent rack connect to an in-rack network switch.Continue Reading
edge device
An edge device is any piece of hardware that controls data flow at the boundary between two networks.Continue Reading
6 types of quantum network topologies
Quantum networks require efficient architectures to optimize communication and enable large-scale quantum information processing. Learn about the main quantum network topologies.Continue Reading
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP) is a standard that defines how to establish and maintain a network conversation by which applications can exchange data.Continue Reading
Network simulation vs. emulation: What's the difference?
Network engineers use simulation and emulation to test changes, which ensures reliable post-change performance. Network simulators create models, while emulators mimic networks.Continue Reading
network interface card (NIC)
A network interface card (NIC) is a hardware component, typically a circuit board or chip, installed on a computer so it can connect to a network.Continue Reading
User Datagram Protocol (UDP)
User Datagram Protocol (UDP) is a communications protocol primarily used to establish low-latency and loss-tolerating connections between applications on the internet.Continue Reading
Telnet
Telnet is a network protocol used to virtually access a computer and provide a two-way, collaborative and text-based communication channel between two machines.Continue Reading
big-endian and little-endian
The term endianness describes the order in which computer memory stores a sequence of bytes.Continue Reading
Address Resolution Protocol (ARP)
Address Resolution Protocol (ARP) is a protocol that maps dynamic IP addresses to permanent physical machine addresses in a local area network (LAN).Continue Reading
single-user multiple input, multiple output (SU-MIMO)
Single-user multiple input, multiple output (SU-MIMO) is a multitransmitter and receiver technology that lets a wireless access point send multiple, simultaneous data streams to one compatible endpoint at a time.Continue Reading
ternary content-addressable memory (TCAM)
Ternary content-addressable memory (TCAM) is a specialized type of high-speed memory that searches its entire contents in a single clock cycle.Continue Reading
SASE vs. NaaS: What's the difference?
SASE and NaaS are network models with different goals. SASE combines SD-WAN with cloud-based security, while NaaS lets businesses outsource network management via a subscription model.Continue Reading
5G standalone (5G SA)
5G standalone (5G SA) is a cellular infrastructure built specifically for 5G services by implementing 5G standards and protocols in the radio network and controller core.Continue Reading
Cisco IOS (Cisco Internetwork Operating System)
Cisco IOS (Internetwork Operating System) is a collection of proprietary operating systems (OSes) that runs on Cisco hardware devices, including Cisco Systems network devices, routers and network switches.Continue Reading
What is 6G? Overview of 6G networks & technology
6G (sixth-generation wireless) is the successor to 5G cellular technology. 6G networks will be able to use higher frequencies than 5G networks and provide substantially higher capacity and much lower latency.Continue Reading
How to build a private 5G network architecture
A private 5G network could provide organizations with greater control over their wireless environments. But cost and complexity could be critical deterrents.Continue Reading
carrier cloud
A carrier cloud is a cloud computing environment that is owned and operated by a traditional telecommunications service provider.Continue Reading
data link layer
The data link layer is the protocol layer in a program that handles how data moves in and out of a physical link in a network.Continue Reading
CPRI (Common Public Radio Interface)
CPRI (Common Public Radio Interface) is a specification for wireless communication networks that defines the key criteria for interfacing transport, connectivity and control communications between baseband units (BBUs) and remote radio units (RRUs),...Continue Reading
network hub
A network hub is a node that broadcasts data to every computer or Ethernet-based device connected to it.Continue Reading
router
A router is a physical or virtual appliance that passes information between two or more packet-switched computer networks.Continue Reading
An introduction to cloud network architecture
Enterprises have three main options when it comes to cloud network architecture: Use built-in CSP tools, buy virtual networking appliances or use a multi-cloud management platform.Continue Reading
Generic Routing Encapsulation (GRE)
Generic Routing Encapsulation (GRE) is a protocol that encapsulates packets in order to route various protocols over Internet Protocol (IP) networks.Continue Reading
What are licensed and unlicensed wireless frequency bands?
Licensed frequency bands are reliable and offer better performance than unlicensed frequency bands, which are low cost and easy to deploy but interference is common.Continue Reading
network assurance
Network assurance is the method of validating whether services and policies configured on and across network appliances appropriately align with operational goals.Continue Reading
application delivery controller (ADC)
An application delivery controller (ADC) is a network component that manages and optimizes how client machines connect to web and enterprise application servers.Continue Reading
Open Shortest Path First (OSPF)
Open Shortest Path First, often shortened to OSPF, is an IP routing protocol used to find the best path to distribute packets as they pass through IP networks.Continue Reading
5G vs. 4G: Learn the key differences between them
5G and 4G network architectures have some significant differences. See how the two technologies differ and what the new capabilities mean for business communications.Continue Reading
Ethernet
Ethernet is the traditional technology for connecting devices in a wired local area network (LAN) or wide area network.Continue Reading
5G NSA vs. SA: How do the deployment modes differ?
Non-standalone 5G uses a combination of existing 4G LTE architecture with a 5G RAN. Standalone 5G, on the other hand, uses a 5G RAN and a cloud-native 5G core.Continue Reading
data plane
The data plane -- sometimes known as the user plane, forwarding plane, carrier plane or bearer plane -- is the part of a network that carries user traffic.Continue Reading
fiber optics (optical fiber)
Fiber optics, or optical fiber, refers to the technology that transmits information as light pulses along a glass or plastic fiber.Continue Reading
Macrocell vs. small cell vs. femtocell: A 5G introduction
Small cells provide fast connectivity speeds for 5G networks and capable devices, but 5G won't stop there. Macrocells and femtocells are also key to connect 5G networks.Continue Reading
The essential 5G glossary of key terms and phrases
To understand 5G, delve into the terminology that shapes the technology. This glossary of 14 5G keywords explains what 5G is and how its features work.Continue Reading
The 3 different types of 5G technology for enterprises
5G isn't a single flavor of cellular technology; it's three flavors, and each one can enable advanced capabilities, such as ultrareliable low latency and IoT connectivity.Continue Reading
Wi-Fi 6 vs. 5G: What's the difference?
Some of the major differences between Wi-Fi 6 and 5G include frequency, authentication, licensing and use cases. But the two technologies can also work well together.Continue Reading
network engineer
A network engineer is a technology professional who has the necessary skills to plan, implement and oversee the computer networks that support in-house voice, data, video and wireless network services.Continue Reading
mean time to innocence
Mean time to innocence is the average elapsed time between when a system problem is detected and any given team's ability to say the team or part of its system is not the root cause of the problem.Continue Reading
jumbo frames
A jumbo frame is an Ethernet frame, or data packet, with a payload greater than the standard size of 1,500 bytes.Continue Reading
OFDMA (orthogonal frequency-division multiple access)
Orthogonal frequency-division multiple access (OFDMA) is a technology of Wi-Fi 6 (802.11ax) that lets access points serve multiple clients at the same time.Continue Reading
Building data center networks for GenAI fabric enablement
Network scalability, throughput and orchestration are some of the key elements that enterprises need to consider as they build out generative AI data centers.Continue Reading
telecommunications (telecom)
Telecommunications, also known as telecom, is the exchange of information over significant distances by electronic means and refers to all types of voice, data and video transmission.Continue Reading
remote infrastructure management
Remote infrastructure management, or RIM, is a comprehensive approach to handling and overseeing an organization's IT infrastructure, systems and services from a remote location.Continue Reading
port address translation (PAT)
Port address translation (PAT) is a type of network address translation (NAT) that maps a network's private internal IPv4 addresses to a single public IP address.Continue Reading
Use Angry IP Scanner to audit the network
Angry IP Scanner provides a network scanner alternative to Nmap that is simple, user-friendly and versatile across OSes. Scan types include ping scans, UDP scans and TCP scans.Continue Reading
What's the difference between Wi-Fi and the internet?
The internet connects users to the outside world. Wi-Fi connects devices within a business, which then connect to other network devices and out to the internet.Continue Reading
An introduction to quantum networks and how they work
Quantum networks hold potential for faster and more secure communication. But true quantum networks are still experimental and require more engineering and scientific research.Continue Reading
Networking vs. telecom: What's the difference?
Networking describes how devices interconnect to share resources with each other. Telecom, which includes networking, broadly refers to the exchange of data across long distances.Continue Reading
An introduction to Git for network engineers
Git can be a useful tool for network engineers who manage complex infrastructure, especially as networking increasingly overlaps with software, automation and DevOps.Continue Reading
An introduction to smartNICs and their benefits
SmartNICs offload packet processing tasks from server CPUs, freeing up resources for application performance. They can run packet capture and load balancing, among other tasks.Continue Reading
Network engineer vs. software engineer: What's the difference?
Despite potential overlaps in software skills, the roles of network engineers and software engineers vary in terms of skill sets, salaries, certifications and more.Continue Reading
What are the elements of modern network security architecture?
Modern network security is a mix of several elements, including secure access service edge, virtualization technologies, segmentation and zero-trust models.Continue Reading
network fabric
'Network fabric' is a general term used to describe underlying data network infrastructure as a whole.Continue Reading
Traditional networks vs. IoT networks: What's the difference?
An enterprise network is a system of interconnected devices that share information, while IoT is a system of devices connected to the internet that provides key analytics.Continue Reading
10 edge computing quiz questions
Edge computing isn't new, but it has grown in popularity due to 5G and the influx of IoT devices. This quiz covers edge computing basics, such as pros, cons and differentiators.Continue Reading
loose coupling
Loose coupling is an approach to interconnecting the components in a system, network or software application so that those components, also called elements, depend on each other to the least extent practicable.Continue Reading
Nessus
Nessus is a platform developed by Tenable that scans for security vulnerabilities in devices, applications, operating systems, cloud services and other network resources.Continue Reading
logical network
A logical network is a software-defined network topology or routing that is often different than the physical network.Continue Reading
peer-to-peer (P2P)
Peer-to-peer (P2P) is a decentralized communications model in which each party has the same capabilities and either party can initiate a communication session.Continue Reading
Evaluate top 5G fixed wireless access benefits
Fixed wireless access, when enabled by 5G, makes wireless network connectivity accessible to users at affordable rates. Learn the benefits FWA brings to operators and enterprises.Continue Reading
Cisco Live 2023 conference coverage and analysis
Use this guide to Cisco Live 2023 -- a five-day in-person and online conference -- to learn about networking trends, including news from keynote speeches and education sessions.Continue Reading
CAPWAP (Control and Provisioning of Wireless Access Points)
CAPWAP (Control and Provisioning of Wireless Access Points) is a protocol that enables an access controller to manage a collection of wireless termination points.Continue Reading
network performance monitoring (NPM)
Network performance monitoring (NPM) is the process of measuring and monitoring the quality of service of a network.Continue Reading
infrared radiation (IR)
Infrared radiation (IR), sometimes referred to simply as infrared, is a region of the electromagnetic radiation spectrum where wavelengths range from about 700 nm to 1 mm.Continue Reading
BGP (Border Gateway Protocol)
BGP (Border Gateway Protocol) is the protocol that enables the global routing system of the internet.Continue Reading
How to interact with network APIs using cURL, Postman tools
Network engineers can use cURL and Postman tools to work with network APIs. Use cases include getting interface information and manipulating device configuration data.Continue Reading
Modular network design benefits and approaches
Modular network design is a strategic way for enterprises to group network building blocks in order to streamline network maintenance, additions and troubleshooting.Continue Reading
An overview of 802.1X authentication methods and EAP
Enterprises use 802.1X authentication to manage their wireless LANs, and that process relies on the Extensible Authentication Protocol and its various types.Continue Reading
CSU/DSU (Channel Service Unit/Data Service Unit)
A CSU/DSU (Channel Service Unit/Data Service Unit) is a hardware device about the size of a modem. It converts a digital data frame from local area network (LAN) communication technology into a frame appropriate for a wide area network (WAN) and ...Continue Reading
data streaming
Data streaming is the continuous transfer of data from one or more sources at a steady, high speed for processing into specific outputs.Continue Reading
secure access service edge (SASE)
Secure access service edge, also known as SASE and pronounced sassy, is a cloud architecture model that bundles network and cloud-native security technologies together and delivers them as a single cloud service.Continue Reading
Network Configuration Protocol (NETCONF)
The Network Configuration Protocol (NETCONF) is an Internet Engineering Task Force (IETF) network management protocol that provides a secure mechanism for installing, manipulating and deleting the configuration data on a network device such as a ...Continue Reading
geo-blocking
Geo-blocking is blocking something based on its location.Continue Reading