Browse Definitions:

Networking Learning Guides


We've gathered a collection of our learning guides and tutorials on networking topics. You'll find learning guides for network design and infrastructure, specifications, cabling information, network administration and more. Then see, below, our quizzes and our larger collection of learning resources.

Need more information before you get started? See our definitions for network, network topology and network convergence.

  • Bandwidth measurement and management guide -- Today's enterprise applications are demanding more and more network bandwidth. Learn how to handle bandwidth measurement and management with these resources.

  • Concepts in IP addressing -- The section excerpted here from "CCNA Exam Cram 2, Second Edition" discusses binary and hexadecimal numbering systems as compared with the more familiar decimal system. It also gives you helpful subnetting charts and teaches you how to construct them for yourself.

  • Download a computer networks pdf – Study this 70 page chapter excerpt from "Computer Networks" in its 5th revision.

  • DSL -- Our Fast Guide to DSL explains what digital subscriber line is, how it works and who's using it. You'll also see related terms explained.

  • Hardening your router: Increasing security with ACLs -- Learn how to harden your router in this step-by-step, automated, ten-minute demo. Expert David Davis walks you through the steps you'll need to take to use Cisco IOS access control lists (ACLs) to define and filter traffic for better network security.

  • Integration of Networking and Security School -- In this guide, we offer you an in-depth look at how network and security teams are converging. Learn how products like application-layer firewalls and endpoint security devices are affecting enterprise network security.

  • IP Network Design and Management -- Network design underlies the performance of your enterprise IP network. This four-part IP network design guide by expert Cormac Long offers you a comprehensive roadmap to designing IP-based networks, from the basic principles involved to the more complex finishing touches.

  • LAN Administration Guide -- Our guide for the LAN admin will help you with planning for network capacity, technology and capabilities, maintenance, backup and storage, technical documentation, troubleshooting, security and virus prevention as well as managing users.

  • MPLS Essentials for Service Providers -- This guide teaches you the basics of Multiprotocol Label Switching (MPLS) over IP, which has become the backbone network technology of choice for tier one carriers consolidating their network environments.

  • Network Access Control Crash Course -- This Crash Course provides an overview of network access control technologies, their role in network security and where the market stands, with a focus on the three big players -- Cisco, Microsoft and Trusted Computing Group.

  • VLAN guide for networking professionals -- Check out this virtual LAN guide for configuration tips and troubleshooting advice.

  • Network User Management -- End users -- from un-savvy Internet novices to toxic bosses -- can be a problem. Use this network user management guide to keep your network secure.

  • Network Change and Configuration Management -- Network change and configuration management enables enterprises to update and troubleshoot networks without downtime.

  • 10 Gigabit Ethernet tutorial: Connecting data centers, storage, LAN and beyond -- Learn how to choose 10 Gigabit Ethernet cabling and components, why new Gigabit Ethernet protocols will improve performance, and how it can all result in data center optimization.

  • 802.11 protocols -- Learn about 802.11n, 802.11a, 802.11b and 802.11g, as well as how to evaluate which protocol is best for your environment.

  • Networking Certification Guide -- This networking certification guide covers the majority of networking-related certifications available to IT professionals.

  • Network management frameworks: FCAPS and ITIL -- Network management is a complex topic. Thus far, two frameworks exist that can be of some use for understanding and taming network management: FCAPS and ITIL.

  • Firewall implementation: Perimeter security placement and management -- For enterprise firewall implementation, understand placement of where perimeter security goes, how many firewalls you need -- and know how to manage and maintain your firewall.

  • How to choose the best firewall for your enterprise -- Learn how to choose the best firewall to purchase for your enterprise as well as who is responsible for the implementation of your perimeter security solution.

  • Introduction to firewalls: Types of firewalls -- This guide explains firewalls and shows you what types to look for.

  • Wireless Troubleshooting -- Wireless network troubleshooting basics are discussed in this guide.

  • Wireless Security -- Wireless security and polices are covered in this guide.

  • Wireless network deployment and management -- This learning resource offers guidance for deploying and managing a wireless network.

  • Wireless protocols learning guide -- Wireless protocols, technologies and deployment issues such as access points, security and troubleshooting are found in this basic intro to wireless protocols and technologies.

  • Wireless access points -- The basics of wireless access point (AP) as well as configuration and placement are covered in this guide.

  • Network Management Planning -- In this e-Guide, check out what's driving radical change in traditional network management (think consumer rather than enterprise use), how Web 2.0, SOA, IMS and other application-heavy delivery platforms are changing the management requirements, how to troubleshoot a multimedia tnetwork o ensure capacity and performance, and the need for "systemic" network monitoring.

  • Network Technologies Resource Library -- Whether you're a network architect, engineer, or on the operations team, you'll easily find the information you need on topics like network management, network security, routing and switching, VPNs, wireless networking and network design.

  • Open Source Networking Tools -- In this guide, we present advice and resources for more information on the most popular open source tools for network administration, monitoring and security. You'll also find out how open source has made major inroads to the VoIP arena.

  • IP Addressing Project Guide -- This IP Addressing Project Guide offers channel professionals tips, methods and strategies for ensuring that their customers' networks function efficiently. Value-added resellers (VARs), networking consultants and systems integrators will be able to use this information to create better organized, more open-ended and more manageable networks for their customers.

  • Network Administration Services Project Guide -- This Project Guide offers value-added resellers (VARs) and systems integrators technical tips and best practices for administering a customer's local area network (LAN), from firewall and router configuration to network documentation and troubleshooting.

  • VPN Project Guide -- These resources will assist you through the various stages of a VPN project, from choosing the appropriate technology and vendor, to troubleshooting and securing a deployed virtual private network.

  • Wireless LAN Security Project Guide -- This Wireless LAN Security Project Guide is designed to help value-added resellers, systems integrators and consultants strengthen their customer's WLAN whether they've been called in to clean up after a breach or to help build a secure WLAN from the ground up.

  • VoIP: The Business Case -- All in one Guide: Locking down VoIP ROI will help you build a pragmatic business case for VoIP that will sell itself to business execs.

 We've got lots more information for you! Check out the full collection of Learning Guides and Tutorials to learn essential information on a wide range of subjects. You'll find guides and tutorials about data centers, storage and storage management, backup and recovery, and a wide range of other topics, including databases, business intelligence, programming and much more.

Want more information about networking? See our dedicated sister site,, or browse through our full collection of definitions of networking terms. Then, if you'd like to test your knowledge, see our networking quiz collection.

This was last updated in March 2010

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.


File Extensions and File Formats


  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...


  • email spam

    Email spam, or junk email, is unsolicited bulk messages sent through email with commercial, fraudulent or malicious intent.

  • distributed denial of service (DDoS) attack

    A distributed denial-of-service attack occurs when an attack originates from multiple computers or devices, usually from multiple...

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...


  • athenahealth Inc.

    Based in Watertown, Mass., athenahealth Inc. is a leading vendor of cloud-based EHRs for small to medium-sized physician ...

  • Affordable Care Act (ACA or Obamacare)

    The Affordable Care Act (ACA) is legislation passed in 2010 that changed how uninsured Americans enroll in and receive healthcare...

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...


  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...


  • yottabyte (YB)

    A yottabyte is a measure of theoretical storage capacity and is 2 to the 80th power bytes, or, in decimal, approximately 1,000 ...

  • Kilo, mega, giga, tera, peta, exa, zetta and all that

    Kilo, mega, giga, tera, peta, exa, zetta are among the list of prefixes used to denote the quantity of something, such as a byte ...

  • brontobyte

    A brontobyte is a measure of memory or data storage that is equal to 10 to the 27th power of bytes.


  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

  • NVDIMM (Non-Volatile Dual In-line Memory Module)

    An NVDIMM (non-volatile dual in-line memory module) is hybrid computer memory that retains data during a service outage.


  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...