Submit Search
Upload
Including Your Modules into NS 2
•
Download as PPT, PDF
•
3 likes
•
8,172 views
T
Teerawat Issariyakul
Follow
Education
Technology
Report
Share
Report
Share
1 of 10
Download now
Recommended
NS2: Binding C++ and OTcl variables
NS2: Binding C++ and OTcl variables
Teerawat Issariyakul
Ns2
Ns2
Zainab Albayati
Ns2programs
Ns2programs
Meenakshi Devi
Implementation of various networking protocol on NS2
Protocol implementation on NS2
Protocol implementation on NS2
amreshrai02
NS2 Working
Working with NS2
Working with NS2
chanchal214
Simulation and Performance Analysis of AODV using NS-2.34
Simulation and Performance Analysis of AODV using NS-2.34
Shaikhul Islam Chowdhury
Orchestration-track talk at CfgMgmtCamp 2016
Orchestration? You Don't Need Orchestration. What You Want is Choreography.
Orchestration? You Don't Need Orchestration. What You Want is Choreography.
Julian Dunn
20111107 ns2-required cygwinpkg
20111107 ns2-required cygwinpkg
Teerawat Issariyakul
Recommended
NS2: Binding C++ and OTcl variables
NS2: Binding C++ and OTcl variables
Teerawat Issariyakul
Ns2
Ns2
Zainab Albayati
Ns2programs
Ns2programs
Meenakshi Devi
Implementation of various networking protocol on NS2
Protocol implementation on NS2
Protocol implementation on NS2
amreshrai02
NS2 Working
Working with NS2
Working with NS2
chanchal214
Simulation and Performance Analysis of AODV using NS-2.34
Simulation and Performance Analysis of AODV using NS-2.34
Shaikhul Islam Chowdhury
Orchestration-track talk at CfgMgmtCamp 2016
Orchestration? You Don't Need Orchestration. What You Want is Choreography.
Orchestration? You Don't Need Orchestration. What You Want is Choreography.
Julian Dunn
20111107 ns2-required cygwinpkg
20111107 ns2-required cygwinpkg
Teerawat Issariyakul
NS2: Events and Handlers
NS2: Events and Handlers
Teerawat Issariyakul
Dynamic UID
Dynamic UID
Teerawat Issariyakul
NS2--Event Scheduler
NS2--Event Scheduler
Teerawat Issariyakul
Basic Packet Forwarding in NS2
Basic Packet Forwarding in NS2
Teerawat Issariyakul
Trump-Style Negotiation: Powerful Strategies and Tactics for Mastering Every ...
Trump-Style Negotiation: Powerful Strategies and Tactics for Mastering Every ...
Teerawat Issariyakul
Kubernetes can run application containers on clusters of physical or virtual machines. It can also do much more than that. Kubernetes satisfies a number of common needs of applications running in production, such as co-locating helper processes, mounting storage systems, distributing secrets, application health checking, replicating application instances, horizontal auto-scaling, load balancing, rolling updates, and resource monitoring. However, even though Kubernetes provides a lot of functionality, there are always new scenarios that would benefit from new features. Ad hoc orchestration that is acceptable initially often requires robust automation at scale. Application-specific workflows can be streamlined to accelerate developer velocity. This is why Kubernetes was also designed to serve as a platform for building an ecosystem of components and tools to make it easier to deploy, scale, and manage applications. The Kubernetes control plane is built upon the same APIs that are available to developers and users, implementing resilient control loops that continuously drive the current state towards the desired state. This design has enabled Apache Stratos and a number of other Platform as a Service and Continuous Integration and Deployment systems to build atop Kubernetes. This presentation introduces Kubernetes’s core primitives, shows how some of its better known features are built on them, and introduces some of the new capabilities that are being added.
WSO2Con US 2015 Kubernetes: a platform for automating deployment, scaling, an...
WSO2Con US 2015 Kubernetes: a platform for automating deployment, scaling, an...
Brian Grant
TOSCA is a new standard facilitating platform independent description of Cloud applications. OpenTOSCA is an open source TOSCA ecosystem including the modeling tool "Winery", the TOSCA runtime "OpenTOSCA", and the self-service portal "Vinothek".
TOSCA and OpenTOSCA: TOSCA Introduction and OpenTOSCA Ecosystem Overview
TOSCA and OpenTOSCA: TOSCA Introduction and OpenTOSCA Ecosystem Overview
OpenTOSCA
The Performance Analysis of Selected Routing Protocols for Mobile Ad hoc Netw...
The Performance Analysis of Selected Routing Protocols for Mobile Ad hoc Netw...
Oluwatomi Ajayi
20100712-OTcl Command -- Getting Started
20100712-OTcl Command -- Getting Started
Teerawat Issariyakul
Classifier is a multi-target packet forwarder in NS2. This slide show explains what it is, how it works, and how it is used.
NS2 Classifiers
NS2 Classifiers
Teerawat Issariyakul
NS2 Shadow Object Construction
NS2 Shadow Object Construction
Teerawat Issariyakul
NS2 Object Construction
NS2 Object Construction
Teerawat Issariyakul
packet destruction in NS2
packet destruction in NS2
Teerawat Issariyakul
This is a summary of the book "The Intelligent Entrepreneur: How Three Harvard Business School Graduates Learned the 10 Rules of Successful Entrepreneurship" by Bill Murphy Jr.
Intelligent entrepreneurs by Bill Murphy Jr.
Intelligent entrepreneurs by Bill Murphy Jr.
Teerawat Issariyakul
Ns-2.35 Installation
Ns-2.35 Installation
Teerawat Issariyakul
Projects for Engineering Students on Network Simulator, VANET, MANET, 3G, 4G, 5G, Ad-Hoc NEtworks, WSN, Wireless Sensor Networks
NS2 Projects for Final Year Students, MANET, VANET, Ad-Hoc Networks...
NS2 Projects for Final Year Students, MANET, VANET, Ad-Hoc Networks...
Manoj Subramanian
Network simulator 2
Network simulator 2
Pradeep Kumar TS
MBA Sem 4 | Business Analytics [BA 4] | Previous Year Question Paper | Summer 2023 | Web and Social Media Analytics | Solved PYQ | By Jayanti Pande | ProNotesJRP
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
Jayanti Pande
The recently published educational policy document under the title ‘National Education Policy Reform’ (NEPF for short) has been the subject of much criticism. Various parties have expressed their grave concerns about this proposed NEPF on many platforms. This document attempts to cover some angles which the author deems less covered in other criticisms. This critique is by no means complete or exhaustive; rather, the author prefers that it be read in conjunction with other such criticisms.
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
Chameera Dedduwage
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
Maestría en Comunicación Digital Interactiva - UNR
Educational slides for students.
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
nomboosow
The Apostle Paul offers his friends in Corinth a description of God's love that offers hope for reconciliation to a divided group. This most excellent way found in 1 Corinthians 13:1-3 is what our world needs today. view commentary at https://cartoonistbible.com/visuals/1-corinthians-131-8-what-is-love/
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
Steve Thomason
More Related Content
Viewers also liked
NS2: Events and Handlers
NS2: Events and Handlers
Teerawat Issariyakul
Dynamic UID
Dynamic UID
Teerawat Issariyakul
NS2--Event Scheduler
NS2--Event Scheduler
Teerawat Issariyakul
Basic Packet Forwarding in NS2
Basic Packet Forwarding in NS2
Teerawat Issariyakul
Trump-Style Negotiation: Powerful Strategies and Tactics for Mastering Every ...
Trump-Style Negotiation: Powerful Strategies and Tactics for Mastering Every ...
Teerawat Issariyakul
Kubernetes can run application containers on clusters of physical or virtual machines. It can also do much more than that. Kubernetes satisfies a number of common needs of applications running in production, such as co-locating helper processes, mounting storage systems, distributing secrets, application health checking, replicating application instances, horizontal auto-scaling, load balancing, rolling updates, and resource monitoring. However, even though Kubernetes provides a lot of functionality, there are always new scenarios that would benefit from new features. Ad hoc orchestration that is acceptable initially often requires robust automation at scale. Application-specific workflows can be streamlined to accelerate developer velocity. This is why Kubernetes was also designed to serve as a platform for building an ecosystem of components and tools to make it easier to deploy, scale, and manage applications. The Kubernetes control plane is built upon the same APIs that are available to developers and users, implementing resilient control loops that continuously drive the current state towards the desired state. This design has enabled Apache Stratos and a number of other Platform as a Service and Continuous Integration and Deployment systems to build atop Kubernetes. This presentation introduces Kubernetes’s core primitives, shows how some of its better known features are built on them, and introduces some of the new capabilities that are being added.
WSO2Con US 2015 Kubernetes: a platform for automating deployment, scaling, an...
WSO2Con US 2015 Kubernetes: a platform for automating deployment, scaling, an...
Brian Grant
TOSCA is a new standard facilitating platform independent description of Cloud applications. OpenTOSCA is an open source TOSCA ecosystem including the modeling tool "Winery", the TOSCA runtime "OpenTOSCA", and the self-service portal "Vinothek".
TOSCA and OpenTOSCA: TOSCA Introduction and OpenTOSCA Ecosystem Overview
TOSCA and OpenTOSCA: TOSCA Introduction and OpenTOSCA Ecosystem Overview
OpenTOSCA
The Performance Analysis of Selected Routing Protocols for Mobile Ad hoc Netw...
The Performance Analysis of Selected Routing Protocols for Mobile Ad hoc Netw...
Oluwatomi Ajayi
20100712-OTcl Command -- Getting Started
20100712-OTcl Command -- Getting Started
Teerawat Issariyakul
Classifier is a multi-target packet forwarder in NS2. This slide show explains what it is, how it works, and how it is used.
NS2 Classifiers
NS2 Classifiers
Teerawat Issariyakul
NS2 Shadow Object Construction
NS2 Shadow Object Construction
Teerawat Issariyakul
NS2 Object Construction
NS2 Object Construction
Teerawat Issariyakul
packet destruction in NS2
packet destruction in NS2
Teerawat Issariyakul
This is a summary of the book "The Intelligent Entrepreneur: How Three Harvard Business School Graduates Learned the 10 Rules of Successful Entrepreneurship" by Bill Murphy Jr.
Intelligent entrepreneurs by Bill Murphy Jr.
Intelligent entrepreneurs by Bill Murphy Jr.
Teerawat Issariyakul
Ns-2.35 Installation
Ns-2.35 Installation
Teerawat Issariyakul
Projects for Engineering Students on Network Simulator, VANET, MANET, 3G, 4G, 5G, Ad-Hoc NEtworks, WSN, Wireless Sensor Networks
NS2 Projects for Final Year Students, MANET, VANET, Ad-Hoc Networks...
NS2 Projects for Final Year Students, MANET, VANET, Ad-Hoc Networks...
Manoj Subramanian
Network simulator 2
Network simulator 2
Pradeep Kumar TS
Viewers also liked
(17)
NS2: Events and Handlers
NS2: Events and Handlers
Dynamic UID
Dynamic UID
NS2--Event Scheduler
NS2--Event Scheduler
Basic Packet Forwarding in NS2
Basic Packet Forwarding in NS2
Trump-Style Negotiation: Powerful Strategies and Tactics for Mastering Every ...
Trump-Style Negotiation: Powerful Strategies and Tactics for Mastering Every ...
WSO2Con US 2015 Kubernetes: a platform for automating deployment, scaling, an...
WSO2Con US 2015 Kubernetes: a platform for automating deployment, scaling, an...
TOSCA and OpenTOSCA: TOSCA Introduction and OpenTOSCA Ecosystem Overview
TOSCA and OpenTOSCA: TOSCA Introduction and OpenTOSCA Ecosystem Overview
The Performance Analysis of Selected Routing Protocols for Mobile Ad hoc Netw...
The Performance Analysis of Selected Routing Protocols for Mobile Ad hoc Netw...
20100712-OTcl Command -- Getting Started
20100712-OTcl Command -- Getting Started
NS2 Classifiers
NS2 Classifiers
NS2 Shadow Object Construction
NS2 Shadow Object Construction
NS2 Object Construction
NS2 Object Construction
packet destruction in NS2
packet destruction in NS2
Intelligent entrepreneurs by Bill Murphy Jr.
Intelligent entrepreneurs by Bill Murphy Jr.
Ns-2.35 Installation
Ns-2.35 Installation
NS2 Projects for Final Year Students, MANET, VANET, Ad-Hoc Networks...
NS2 Projects for Final Year Students, MANET, VANET, Ad-Hoc Networks...
Network simulator 2
Network simulator 2
Recently uploaded
MBA Sem 4 | Business Analytics [BA 4] | Previous Year Question Paper | Summer 2023 | Web and Social Media Analytics | Solved PYQ | By Jayanti Pande | ProNotesJRP
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
Jayanti Pande
The recently published educational policy document under the title ‘National Education Policy Reform’ (NEPF for short) has been the subject of much criticism. Various parties have expressed their grave concerns about this proposed NEPF on many platforms. This document attempts to cover some angles which the author deems less covered in other criticisms. This critique is by no means complete or exhaustive; rather, the author prefers that it be read in conjunction with other such criticisms.
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
Chameera Dedduwage
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
Maestría en Comunicación Digital Interactiva - UNR
Educational slides for students.
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
nomboosow
The Apostle Paul offers his friends in Corinth a description of God's love that offers hope for reconciliation to a divided group. This most excellent way found in 1 Corinthians 13:1-3 is what our world needs today. view commentary at https://cartoonistbible.com/visuals/1-corinthians-131-8-what-is-love/
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
Steve Thomason
Kallidus experts, Lucinda Hensley and Justine Swain, share their insights about the do's and don'ts of accessible design.
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
dawncurless
SGK
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
INDIA THAT IS BHARAT IN 2024 The preliminary round of Swadesh, The india quiz conducted on 30th April, 2024.
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
RAM LAL ANAND COLLEGE, DELHI UNIVERSITY.
Advance Mobile application development -(firebase Auth) for faculty of computers stuents seiyun University , yemen class - 07
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
Dr. Mazin Mohamed alkathiri
My CV as of the end of April 2024
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
agholdier
social pharmacy
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
pragatimahajan3
In this webinar, nonprofits learned how to delve into the minds of funders, unveiling what they truly seek in qualified grant applicants, and tools for success. Learn more about the Grant Readiness Review service by Remy Consulting at TechSoup to help you gather, organize, and assess the strength of documents required for grant applications.
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
TechSoup
The global implications of DORA and NIS 2 Directive are significant, extending beyond the European Union. Amongst others, the webinar covers: • DORA and its Implications • Nis 2 Directive and its Implications • How to leverage directive and regulation as a marketing tool and competitive advantage • How to use new compliance framework to request additional budget Presenters: Christophe Mazzola - Senior Cyber Governance Consultant Armed with endless Excel files, a meme catalog worthy of the best X'os (formerly twittos), and a risk register to make your favorite risk manager jealous, I swapped my computer scientist cape a few years ago for that of a (cyber) threat hunter with the honorary title of CISO. Ah, and I am also a quadruple senior certified ISO27001/2/5, Pas mal non ? C'est francais. Malcolm Xavier Malcolm Xavier has been working in the Digital Industry for over 18 Years now. He has worked with Global Clients in South Africa, United States and United Kingdom. He has achieved Many Professional Certifications Like CISSP, Google Cloud Practitioner, TOGAF, Azure Cloud, ITIL v3 etc. His core competencies include IT strategy, cybersecurity, IT infrastructure management, data center migration and consolidation, data protection and compliance, risk management and governance, and IS program development and management. Date: April 25, 2024 Tags: Information Security, Digital Operational Resilience Act (DORA) ------------------------------------------------------------------------------- Find out more about ISO training and certification services Training: Digital Operational Resilience Act (DORA) - EN | PECB NIS 2 Directive - EN | PECB Webinars: https://pecb.com/webinars Article: https://pecb.com/article Whitepaper: https://pecb.com/whitepaper ------------------------------------------------------------------------------- For more information about PECB: Website: https://pecb.com/ LinkedIn: https://www.linkedin.com/company/pecb/ Facebook: https://www.facebook.com/PECBInternational/ Slideshare: http://www.slideshare.net/PECBCERTIFICATION
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
Nutritional Needs and Food Safety
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
misteraugie
animals
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
fonyou31
As Odoo is a comprehensive business management software suite, the Calendar view is a powerful tool used to visualize and manage events, tasks, meetings, deadlines and other time-sensitive activities across various modules such as CRM, Project management, HR modules and more. In this slide, we can just go through the the steps of creating a calendar view for a module in Odoo 17.
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
Celine George
How Bosna and Herzegovina prepares for CBAM
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
Admir Softic
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi Welcome to VIP Call Girl In Delhi Hello! Delhi Call Girls is one of the most popular cities in India. Girls who call in Delhi frequently Advertise their services in small promgons in magazines, as well as on the Internet but We do not act as a direct-promoter. We will do everything we can to make sure that you're safe to the max to the best of our abilities and making sure of our ability and ensuring that you're obtained to the best of our abilities and making sure that you get what you want. Sexuality of our females is recognized by our Business proposals. Top-of-the-line, fully-featured Delhi girl call number and we offer To be aware of it is a major reason in deciding to use our services to ensure that our customers realize the worth of their lives swiftly and in a pleasant manner by engaging with web series performers for a cost of 10000.Here you are able to be Relax knowing that personal information is stored in the business proposals, giving an appearance of like you're as if you are a full affirmation. Call Girls Service Now Delhi +91-9899900591 *********** N.M.************* 01/04/2024 ▬█⓿▀█▀ 𝐈𝐍𝐃𝐄𝐏𝐄𝐍𝐃𝐄𝐍𝐓 CALL 𝐆𝐈𝐑𝐋 𝐕𝐈𝐏 𝐄𝐒𝐂𝐎𝐑𝐓 SERVICE ✅ ❣️ ⭐➡️HOT & SEXY MODELS // COLLEGE GIRLS AVAILABLE FOR COMPLETE ENJOYMENT WITH HIGH PROFILE INDIAN MODEL AVAILABLE HOTEL & HOME ★ SAFE AND SECURE HIGH CLASS SERVICE AFFORDABLE RATE ★ SATISFACTION,UNLIMITED ENJOYMENT. ★ All Meetings are confidential and no information is provided to any one at any cost. ★ EXCLUSIVE PROFILes Are Safe and Consensual with Most Limits Respected ★ Service Available In: - HOME & HOTEL Star Hotel Service .In Call & Out call SeRvIcEs : ★ A-Level (star escort) ★ Strip-tease ★ BBBJ (Bareback Blowjob)Receive advanced sexual techniques in different mode make their life more pleasurable. ★ Spending time in hotel rooms ★ BJ (Blowjob Without a Condom) ★ Completion (Oral to completion) ★ Covered (Covered blowjob Without condom SAFE AND SECURE
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
As per the New Education Policy Value Added Course Sports & Fitness theory
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
Disha Kariya
Class 11th formulas physics
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
AyushMahapatra5
Recently uploaded
(20)
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
Including Your Modules into NS 2
1.
Including Your Modules
into NS 2 by Teerawat Issariyakul http://www.ns2ultimate.com March 2010 http://www.ns2ultimate.com
2.
3.
4.
5.
6.
1. C++ Modules:
Example http://www.ns2ultimate.com
7.
8.
9.
10.
For more information
about NS 2 Please see chapter 2 in this book from Springer T. Issaraiyakul and E. Hossain, “Introduction to Network Simulator NS2”, Springer 2009 http://www.ns2ultimate.com
Editor's Notes
Tip: Add your own speaker notes here.
Tip: Add your own speaker notes here.
Tip: Add your own speaker notes here.
Tip: Add your own speaker notes here.
Tip: Add your own speaker notes here.
Tip: Add your own speaker notes here.
Tip: Add your own speaker notes here.
Tip: Add your own speaker notes here.
Download now