Get started
Bring yourself up to speed with our introductory content.
Get started
Bring yourself up to speed with our introductory content.
10 edge computing quiz questions
Edge computing isn't new, but it has grown in popularity due to 5G and the influx of IoT devices. This quiz covers edge computing basics, such as pros, cons and differentiators. Continue Reading
loose coupling
Loose coupling is an approach to interconnecting the components in a system, network or software application so that those components, also called elements, depend on each other to the least extent practicable. Continue Reading
Nessus
Nessus is a platform developed by Tenable that scans for security vulnerabilities in devices, applications, operating systems, cloud services and other network resources. Continue Reading
-
logical network
A logical network is a software-defined network topology or routing that is often different than the physical network. Continue Reading
peer-to-peer (P2P)
Peer-to-peer (P2P) is a decentralized communications model in which each party has the same capabilities and either party can initiate a communication session. Continue Reading
Evaluate top 5G fixed wireless access benefits
Fixed wireless access, when enabled by 5G, makes wireless network connectivity accessible to users at affordable rates. Learn the benefits FWA brings to operators and enterprises.Continue Reading
Cisco Live 2023 conference coverage and analysis
Use this guide to Cisco Live 2023 -- a five-day in-person and online conference -- to learn about networking trends, including news from keynote speeches and education sessions.Continue Reading
CAPWAP (Control and Provisioning of Wireless Access Points)
CAPWAP (Control and Provisioning of Wireless Access Points) is a protocol that enables an access controller to manage a collection of wireless termination points.Continue Reading
network performance monitoring (NPM)
Network performance monitoring (NPM) is the process of measuring and monitoring the quality of service of a network.Continue Reading
infrared radiation (IR)
Infrared radiation (IR), sometimes referred to simply as infrared, is a region of the electromagnetic radiation spectrum where wavelengths range from about 700 nm to 1 mm.Continue Reading
-
BGP (Border Gateway Protocol)
BGP (Border Gateway Protocol) is the protocol that enables the global routing system of the internet.Continue Reading
How to interact with network APIs using cURL, Postman tools
Network engineers can use cURL and Postman tools to work with network APIs. Use cases include getting interface information and manipulating device configuration data.Continue Reading
Modular network design benefits and approaches
Modular network design is a strategic way for enterprises to group network building blocks in order to streamline network maintenance, additions and troubleshooting.Continue Reading
An overview of 802.1X authentication methods and EAP
Enterprises use 802.1X authentication to manage their wireless LANs, and that process relies on the Extensible Authentication Protocol and its various types.Continue Reading
CSU/DSU (Channel Service Unit/Data Service Unit)
A CSU/DSU (Channel Service Unit/Data Service Unit) is a hardware device about the size of a modem. It converts a digital data frame from local area network (LAN) communication technology into a frame appropriate for a wide area network (WAN) and ...Continue Reading
data streaming
Data streaming is the continuous transfer of data from one or more sources at a steady, high speed for processing into specific outputs.Continue Reading
secure access service edge (SASE)
Secure access service edge, also known as SASE and pronounced sassy, is a cloud architecture model that bundles network and cloud-native security technologies together and delivers them as a single cloud service.Continue Reading
Network Configuration Protocol (NETCONF)
The Network Configuration Protocol (NETCONF) is an Internet Engineering Task Force (IETF) network management protocol that provides a secure mechanism for installing, manipulating and deleting the configuration data on a network device such as a ...Continue Reading
geo-blocking
Geo-blocking is blocking something based on its location.Continue Reading
12 common network protocols and their functions explained
Networking makes the internet work, but neither can succeed without protocols. Common network protocols and their functions are key for communication and connection across the internet.Continue Reading
RS-232C
RS-232C is one of the earlier versions of the long-established standard RS-232, which defines a physical interface for relatively low-speed serial data communication between computers and related devices.Continue Reading
frequency band
In telecommunications, a frequency band -- sometimes called a band -- refers to a specific range of frequencies in the electromagnetic frequency spectrum assigned to certain applications.Continue Reading
operational support system (OSS)
An operational support system (OSS) is a set of programs that helps a communications service provider monitor, control, analyze and manage a telephone or computer network.Continue Reading
Python interpreter vs. IDE: What network engineers should know
When using Python for network automation, network engineers often work with interpreters and integrated development environment tools to test modules and debug code.Continue Reading
mutual exclusion (mutex)
In computer programming, a mutual exclusion (mutex) is a program object that prevents multiple threads from accessing the same shared resource simultaneously.Continue Reading
fault management
Fault management is the component of network management that detects, isolates and fixes problems.Continue Reading
graceful degradation
Graceful degradation is the ability of a computer, machine, electronic system or network to maintain limited functionality even when a large portion of it has been destroyed or rendered inoperative.Continue Reading
7 characteristics of next-generation networking
Network modernization has become important for many organizations. Discover which technologies -- such as SASE, AI, automation and more -- can help build next-generation networks.Continue Reading
Synchronous Optical Network (SONET)
Synchronous Optical Network (SONET) is a North American standard for synchronous data transmission over optical fibers.Continue Reading
SDN controller (software-defined networking controller)
A software-defined networking controller is an application in SDN architecture that manages flow control for improved network management and application performance.Continue Reading
fax
A fax -- short for 'facsimile' and sometimes called 'telecopying' -- is the telephonic transmission of scanned-in printed material, including text or images.Continue Reading
Clos network
A Clos network is a type of nonblocking, multistage switching network used today in large-scale data center switching fabrics.Continue Reading
collision in networking
In a half-duplex Ethernet network, a collision is the result of two devices on the same Ethernet network attempting to transmit data at the same time.Continue Reading
keystone jack
A keystone jack is a female connector used in audio, video and data communications. It serves as a receptacle for a matching plug, which is a male connector of the same type as the jack.Continue Reading
encapsulation (object-orientated programming)
In object-oriented programming (OOP), encapsulation is the practice of bundling related data into a structured unit, along with the methods used to work with that data.Continue Reading
baseband
Baseband in the transmission of communications signals means only one path is available to send and receive digital signals between devices.Continue Reading
broadband
Broadband refers to telecommunications in which a wide band of frequencies is available to transmit information.Continue Reading
fiber to the home (FTTH)
Fiber to the home (FTTH), also called fiber to the premises (FTTP), is the installation and use of optical fiber from a central point to individual buildings to provide high-speed internet access.Continue Reading
Manchester encoding
In data transmission, Manchester encoding is a form of digital encoding in which a data bit's state -- 0 or 1 -- is represented by the transition from one voltage level to another.Continue Reading
nslookup
Nslookup is the name of a program that lets users enter a host name and find out the corresponding IP address or domain name system (DNS) record.Continue Reading
Examine a captured packet using Wireshark
Wireshark is a useful tool for capturing network traffic data. Network pros can make the most of the tool by analyzing captured packets to see what that data means for troubleshooting.Continue Reading
CDN (content delivery network)
A CDN (content delivery network), also called a content distribution network, is a group of geographically distributed and interconnected servers.Continue Reading
session layer
The session layer is Layer 5 of the OSI communications model. It is the long-lived logical connection that persists between endpoints over time.Continue Reading
transport layer
The transport layer is Layer 4 of the Open Systems Interconnection (OSI) communications model. It is responsible for ensuring that the data packets arrive accurately and reliably between sender and receiver.Continue Reading
HAProxy
HAProxy is a high-performance, open source load balancer and reverse proxy for TCP and HTTP applications.Continue Reading
ACK (acknowledgement)
In some digital communication protocols, ACK -- short for 'acknowledgement' -- refers to a signal that a device sends to indicate that data has been received successfully.Continue Reading
network service provider (NSP)
A network service provider (NSP) is a company that owns, operates and sells access to internet backbone infrastructure and services.Continue Reading
Self-healing networks goals, benefits and how they work
With help from automation and AI, self-healing networks promise to detect, remediate and even predict network problems. But can these systems be trusted?Continue Reading
unshielded twisted pair (UTP)
Unshielded twisted pair (UTP) is a ubiquitous type of copper cabling used in telephone wiring and local area networks (LANs).Continue Reading
Multiprotocol Label Switching (MPLS)
Multiprotocol Label Switching (MPLS) is a switching mechanism used in wide area networks (WANs).Continue Reading
WAN optimization (WAN acceleration)
WAN optimization -- also known as WAN acceleration -- is a collection of technologies and techniques used to improve the efficiency of data transfer across a wide area network (WAN) between organizations' centralized data centers and their remote ...Continue Reading
computer network
A computer network is a group of interconnected nodes or computing devices that exchange data and resources with each other.Continue Reading
client-server
Client-server is a relationship in which one program, the client, requests a service or resource from another program, the server.Continue Reading
voice over LTE (VoLTE)
Voice over LTE (VoLTE) is a digital packet technology that uses 4G LTE networks to route voice traffic and transmit data.Continue Reading
ONOS (Open Network Operating System)
Open Network Operating System (ONOS) is an OS designed to help network service providers build carrier-grade software-defined networks architected for high scalability, availability and performance.Continue Reading
How to build an SD-WAN RFP to evaluate vendors
There are key questions that belong in your SD-WAN request for proposal. Use them to better assess vendor features and capabilities, architecture, cost savings and PoCs.Continue Reading
How network perimeters secure enterprise networks
Network perimeters serve as essential network security to block unwanted traffic. Find out how they differ from the network edge and how they help secure enterprise networks.Continue Reading
telematics
Telematics is a term that combines the words telecommunications and informatics to describe the use of communications and IT to transmit, store and receive information from devices to remote objects over a network.Continue Reading
Configure NIC teaming in Windows Server
NIC teaming maximizes network bandwidth and provides redundancy benefits. These steps guide users through NIC teaming configuration in Windows Server with GUI and PowerShell.Continue Reading
packet filtering
Packet filtering is the process of passing or blocking data packets at a network interface by a firewall based on source and destination addresses, ports or protocols.Continue Reading
WAN (wide area network)
A wide area network (WAN) is a geographically distributed private telecommunications network that interconnects multiple local area networks (LANs).Continue Reading
White box networking use cases and how to get started
Rising cloud costs have prompted organizations to consider white box switches to lower costs and simplify network management. Here's what to know about white box networking.Continue Reading
network operating system (NOS)
A network operating system (NOS) is a computer operating system (OS) that's designed primarily to support workstations, PCs and, in some instances, older terminals that are connected on a local area network (LAN).Continue Reading
SD-branch
SD-branch is a single, automated, centrally managed software-centric platform that replaces or supplements an existing branch network architecture.Continue Reading
network protocol
A network protocol is a set of established rules that specify how to format, send and receive data so that computer network endpoints, including computers, servers, routers and virtual machines, can communicate despite differences in their ...Continue Reading
physical layer
The physical layer is the first and lowest layer of the Open Systems Interconnection (OSI) communications model.Continue Reading
virtual server
A virtual server, also known as a virtual machine (VM), is a partitioned space inside a real server and is transparent to users, replicating the functionality of a dedicated physical server.Continue Reading
network switch
A network switch connects devices in a network to each other, enabling them to talk by exchanging data packets. Switches can be hardware devices that manage physical networks or software-based virtual devices.Continue Reading
9 practice questions on twisted-pair network cables
Take this practice quiz on twisted-pair cables, sampled from 'Networking Essentials: A CompTIA Network+ N10-008 Textbook,' to test your understanding for the certification exam.Continue Reading
An introduction to twisted-pair cable wiring
This excerpt from 'Networking Essentials: A CompTIA Network+ N10-008 Textbook' provides an overview of twisted-pair network cables and acts as a study tool for the exam.Continue Reading
coaxial cable
Coaxial cable is a type of copper cable specially built with a metal shield and other components engineered to block signal interference.Continue Reading
megahertz (MHz)
Megahertz (MHz) is a unit multiplier that represents one million hertz (106 Hz). Hertz is the standard unit of frequency in the International System of Units (SI).Continue Reading
IEEE 802 wireless standards
IEEE 802 is a collection of networking standards that cover the physical and data link layer specifications for technologies such as Ethernet and wireless.Continue Reading
gigabit (Gb)
In data communications, a gigabit (Gb) is 1 billion bits, or 1,000,000,000 (that is, 10^9) bits. It's commonly used for measuring the amount of data that is transferred in a second between two telecommunication points.Continue Reading
ingress filtering
Ingress filtering is a method used by enterprises and internet service providers to prevent suspicious traffic from entering a network.Continue Reading
multi-user MIMO
Multi-user MIMO, or MU-MIMO, is a wireless communication technology that uses multiple antennas to improve communication by creating multiple connections to the same device at the same time.Continue Reading
bogon
A bogon is an illegitimate Internet Protocol address that falls into a set of IP addresses that have not been officially assigned to an entity by an internet registration institute, such as the IANA.Continue Reading
network management system
A network management system, or NMS, is an application or set of applications that lets network engineers manage a network's independent components inside a bigger network management framework and performs several key functions.Continue Reading
host (in computing)
A host is a computer or other device that communicates with other hosts on a network.Continue Reading
Network as a Service (NaaS)
Network as a service, or NaaS, is a business model for delivering enterprise WAN services virtually on a subscription basis.Continue Reading
network configuration management (NCM)
Network configuration management is the process of organizing and maintaining information about all of the components in a computer network.Continue Reading
presentation layer
The presentation layer resides at Layer 6 of the Open Systems Interconnection (OSI) communications model and ensures that communications that pass through it are in the appropriate form for the recipient application.Continue Reading
campus network
A campus network is a proprietary local area network (LAN) or set of interconnected LANs serving a corporation, government agency, university or similar organization.Continue Reading
point-of-presence (POP)
A point-of-presence (POP) is a point or physical location where two or more networks or communication devices build a connection from one place to the rest of the internet.Continue Reading
green networking
Green networking is the practice of selecting energy-efficient networking technologies and products and minimizing resource use whenever possible.Continue Reading
attenuation
Attenuation is a general term that refers to any reduction in the strength of a signal.Continue Reading
cloud radio access network (C-RAN)
Cloud radio access network (C-RAN) is a centralized, cloud computing-based architecture for radio access networks.Continue Reading
DHCP (Dynamic Host Configuration Protocol)
DHCP (Dynamic Host Configuration Protocol) is a network management protocol used to dynamically assign an IP address to any device, or node, on a network so it can communicate using IP.Continue Reading
load balancing
Load balancing is a technique used to distribute network traffic across a pool of servers known as a server farm.Continue Reading
data center interconnect (DCI)
Data center interconnect (DCI) technology links two or more data centers together to share resources.Continue Reading
Routing Information Protocol (RIP)
Routing Information Protocol (RIP) is a distance vector protocol that uses hop count as its primary metric.Continue Reading
NOC vs. data center: What's the difference?
Network operations centers and data centers are two facilities organizations use to store IT devices and manage operations. But they differ significantly in terms of purpose and operations.Continue Reading
network availability
Network availability is the amount of uptime in a network system over a specific time interval.Continue Reading
How to use Nmap to scan a network for documentation
Nmap might be more common for security tasks, but it's also useful for network documentation and inventory. Follow these best practices to make the most of Nmap scan results.Continue Reading
NFV MANO (network functions virtualization management and orchestration)
NFV MANO (network functions virtualization management and orchestration), also called MANO, is an architectural framework for managing and orchestrating virtualized network functions (VNFs) and other software components.Continue Reading
How to set up a business Wi-Fi network
A Wi-Fi network is a business necessity, but setting it up takes skill and effective troubleshooting. Learn how to make Wi-Fi work and keep it running smoothly.Continue Reading
Wireless security: WEP, WPA, WPA2 and WPA3 differences
As wireless networks have evolved, so have the protocols for securing them. Get an overview of WLAN security standards, and learn the differences among WEP, WPA, WPA2 and WPA3.Continue Reading
network traffic
Network traffic is the amount of data that moves across a network during any given time.Continue Reading
dynamic and static
In general, dynamic means 'energetic, capable of action and/or change, or forceful,' while static means 'stationary or fixed.'Continue Reading
MAC address (media access control address)
A MAC address (media access control address) is a 12-digit hexadecimal number assigned to each device connected to the network.Continue Reading