My Cisco Training Courses @ MFT.Info
in this chapter I focused on Routing protocols in CCNA Technologies , consider that this info has been presented @ Workshop Teaching , So if you wanna know more about this scenarios feedback me to give you LAB Scenarios,
good luck.
CCNA Routing Fundamentals - EIGRP, OSPF and RIPsushmil123
- Basics of Routing
- Static Routing/Dynamic Routing
- Classification of Dynamic Routing
- Administrative Distance and Metric
- Link State Routing and Distance Vector Routing
- Routing Information Protocol (RIP)
- Enhanced Interior Gateway Routing Protocol (EIGRP)
- Open Shortest Path First (OSPF)
CCNA Routing Fundamentals - EIGRP, OSPF and RIPsushmil123
- Basics of Routing
- Static Routing/Dynamic Routing
- Classification of Dynamic Routing
- Administrative Distance and Metric
- Link State Routing and Distance Vector Routing
- Routing Information Protocol (RIP)
- Enhanced Interior Gateway Routing Protocol (EIGRP)
- Open Shortest Path First (OSPF)
Cisco CCNA exam topics are added to a ppt and shard on this ppt. For more details about Networking Fresher jobs, Fresher Networking Jobs and careers visit www.jobvisions.blogspot.in
Presented at Seminar at Bahria University June 2007
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, Certification Authority, Secure Socket Layer (SSL), Secure Electronic Transaction (SET)
Cisco CCNA exam topics are added to a ppt and shard on this ppt. For more details about Networking Fresher jobs, Fresher Networking Jobs and careers visit www.jobvisions.blogspot.in
Presented at Seminar at Bahria University June 2007
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, Certification Authority, Secure Socket Layer (SSL), Secure Electronic Transaction (SET)
Fundamental of Secure Socket Layer (SSL) | Part - 2 Vishal Kumar
In this presentation we will learn about the Record Protocol, Alert Protocol, Closing and Resuming SSL Connections and Attacks on SSL.
The Part - 1 cab be founded at : https://www.slideshare.net/vishalkumar245/fundamental-of-secure-socket-layer-ssl-part-1
Introduction to Secure Socket Layer (SSL) and Tunnel Layer Security (TLS). Shows basic principle of SSL and also little bit of practical applicability.
One of the most basic networking courses is provided by Cisco Systems via the Cisco Networking Academy.
The academy provides a comprehensive program allowing students to get started in information technology and have multiple certifications.
Cisco created academies in 9,000 learning institutions spread across more than 170 countries that offer the Cisco Networking Academy curriculum.
The Associate level of Cisco Certifications can begin directly with CCNA for network installation, operations and troubleshooting or CCDA for network design. Think of the Associate Level as the foundation level of networking certification.
Find me on:
AFCIT
http://www.afcit.xyz
YouTube
https://www.youtube.com/channel/UCuewOYbBXH5gwhfOrQOZOdw
Google Plus
https://plus.google.com/u/0/+AhmedGadIT
SlideShare
https://www.slideshare.net/AhmedGadFCIT
LinkedIn
https://www.linkedin.com/in/ahmedfgad/
ResearchGate
https://www.researchgate.net/profile/Ahmed_Gad13
Academia
https://www.academia.edu/
Google Scholar
https://scholar.google.com.eg/citations?user=r07tjocAAAAJ&hl=en
Mendelay
https://www.mendeley.com/profiles/ahmed-gad12/
ORCID
https://orcid.org/0000-0003-1978-8574
StackOverFlow
http://stackoverflow.com/users/5426539/ahmed-gad
Twitter
https://twitter.com/ahmedfgad
Facebook
https://www.facebook.com/ahmed.f.gadd
Pinterest
https://www.pinterest.com/ahmedfgad/
This presentation provided for presenting on International Conference on Telecommunications 2017 (ICT2017) which has been held on Limassol, Cyprus in April 2017.
An introduction to Cellular communications Signaling, Specifically LTE Signaling.
Introducing 3GPP approach to handover and handoff mechanisms.
LTE architecture by alcatel-lucent included in this presentation.
This presentation focuses on mobility management protocols such as GTP-C and GTP-U.
Device to Device Communications will enable on cellular 4G/5G networks soon, There are many research aspects in D2D Communications,
Mode Selection
Network Coding
MIMO
Multi-Hop
the most complicated Interference scenarios are coming
Millimeter-Waves is a new spectrum range that operators should have a look on it, 5G is coming in 2020 and there is no spectrum in sweet spectrum range for this technology.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
2. Connection Methods
Back to Back
is a Design Digital
Content & Contents
mall developed by
Guild Design Inc.
Connection
Methods
Different
Geography
is a Design Digital
Content & Contents
mall developed by
Guild Design Inc.
Tehran Institute of Technology
Course name: Cisco CCNA
Instructor: Mansour.nch
Senior @ Tehran Institute of Technology
Copyright 2014
3. Back to Back Method
Configurations:
one Router act as DTE and another one act as a DCE.
first of all use Router#show Running-Config to see what the serial
port full name? if serial port doesn’t exist you must add it physically.
if exist follow these steps:
Router(config)#interface serial0/0/0
Router(config-if)#clock rate 64000
Router(config-if)#BandWidth 64 (Mbps ; too important in routing protocols)
Tehran Institute of Technology
Course name: Cisco CCNA
Instructor: Mansour.nch
Senior @ Tehran Institute of Technology
Copyright 2014
4. In a different Geography
This is Done by CSU/DSU Modem , when we are using
communication infrastructure in a country this device configure
parameters automatically for the best connectivity, so CSU/DSU
modem is the best solution for this scenario.
Tehran Institute of Technology
Course name: Cisco CCNA
Instructor: Mansour.nch
Senior @ Tehran Institute of Technology
Copyright 2014
6. An introduction to Routing
Connected
scenario
In this scenario router
connected to the
destination directly via
own interfaces.
Routing
Theory
Learned
scenario
in this scenario router
didn’t connected
directly to the
destination but can
learn destination via
other routers nearby.
Tehran Institute of Technology
Course name: Cisco CCNA
Instructor: Mansour.nch
Senior @ Tehran Institute of Technology
Copyright 2014
7. Learned VS Connected
Tehran Institute of Technology
Course name: Cisco CCNA
Instructor: Mansour.nch
Senior @ Tehran Institute of Technology
Copyright 2014
8. An introduction to Routing
Static
Routing
As an administrator of
network you know all
details about the
infrastructure of
network.
You Teach to the
router how to route!
Routing
Methods
Dynamic
Routing
In this scenario
Learning Process is
are Automatically Done
bye Router
Router Learn Routes
from neighbors
Tehran Institute of Technology
Course name: Cisco CCNA
Instructor: Mansour.nch
Senior @ Tehran Institute of Technology
Copyright 2014
9. Static Routing Example
Tehran Institute of Technology
Stub network is a Local Network
Network address of stub network is different
from destination , so simple ping command
will fail intentionally.
Stub network packets has only one way
(just one gateway) to access Internet
Left network has internet access
Router A act as a Gateway to respond
requests from Stub Network
Network address of this network is different
from B network , So ping command will fail
intentionally via one host on network A.
Course name: Cisco CCNA
Instructor: Mansour.nch
Senior @ Tehran Institute of Technology
Copyright 2014
10. Static Routing Example
Tehran Institute of Technology
The host want to access to
www.google.com
The respond for host request is
not here! , not found on this
network !!
So the request
must get out
here to find
answer
The solution is redirect all traffic from stub
network to outside
Via Router B , Interface: 172.16.2.1
Course name: Cisco CCNA
Instructor: Mansour.nch
Senior @ Tehran Institute of Technology
Copyright 2014
11. Static Routing Example
Tehran Institute of Technology
Geography Connection between Routers Via “Serial
Interface” , so redirected traffic will flow @ this line and will
accepted by Router A via interface: 172.16.2.2
Course name: Cisco CCNA
Instructor: Mansour.nch
Senior @ Tehran Institute of Technology
Copyright 2014
12. Static Routing Example
Tehran Institute of Technology
So we need to configure a static route right over here!
to tell this router, forward the packets to 172.16.2.1 if
the packet’s destination was Stub Network.
Course name: Cisco CCNA
Instructor: Mansour.nch
Senior @ Tehran Institute of Technology
Copyright 2014
13. Static Routing Example
Tehran Institute of Technology
What the Configuration on Router B?
Default Route
The answer to this question require a new
Topic Called. . .
Course name: Cisco CCNA
Instructor: Mansour.nch
Senior @ Tehran Institute of Technology
Copyright 2014
14. Default Route
What the purpose of this tiny program?
» For (i=0 ; i<9 ; i++)
» If num[i] == 0
» Cout<< “action Acknowledged!”;
» Else Cout << “action not acknowledged!”;
When the code visits “0” an action will be performed, else it can
not be Done! So the default route acts as same as this code!
If the host packets destination
don’t match the local address:
172.16.1.0 , it will be forwarded
out of the network Via Router B ,
interface: 172.16.2.1
if requests on this network don’t match
the 172.16.1.0 Network Address
Default Route Acknowledged
else
Default Route not Acknowledged
Tehran Institute of Technology
Course name: Cisco CCNA
Instructor: Mansour.nch
Senior @ Tehran Institute of Technology
Copyright 2014
15. Static Route VS Default Route
Tehran Institute of Technology
Course name: Cisco CCNA
Instructor: Mansour.nch
Senior @ Tehran Institute of Technology
Copyright 2014
16. CCNA Lab
Purpose: Ping 172.16.64.2/18 from 172.168.128.3/18 and get reply message!
Tehran Institute of Technology
Course name: Cisco CCNA
Instructor: Mansour.nch
Senior @ Tehran Institute of Technology
Copyright 2014
17. Static Route Configurations
IP Route Command Parameters
Network: nonlocal network that we want to specify a route to.
Mask: Netmask of nonlocal network
Address | Interface: IP address of neighbor Router (@ Point – to -
Point)
– We can use interface name instead of interface IP Address.
Distance: Default value is 1 (Administrative Distance)
Permanent: static route entry will not shown on routing table if router
suddenly disconnected, so if you want to show this static route on the
table use this switch!
Tehran Institute of Technology
Course name: Cisco CCNA
Instructor: Mansour.nch
Senior @ Tehran Institute of Technology
Copyright 2014
18. Problem Solution
First Step:
Define a Route to 172.16.128.0 /18 Via 172.16.63.254 /18
A(config)#Ip route 172.16.128.0 255.255.192.0 172.16.63.254
Tehran Institute of Technology
Course name: Cisco CCNA
Instructor: Mansour.nch
Senior @ Tehran Institute of Technology
Copyright 2014
19. Problem Solution
Second Step (Default Route) : Access all networks connected to Router “A”
B(config)#Ip Route 0.0.0.0 0.0.0.0 172.16.0.1
Tehran Institute of Technology
Course name: Cisco CCNA
Instructor: Mansour.nch
Senior @ Tehran Institute of Technology
Copyright 2014
20. Problem Solution
Test Results using command (A):
» A#show ip route
» Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
» D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
» N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
» E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
» i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
» * - candidate default, U - per-user static route, o - ODR
» P - periodic downloaded static route
» Gateway of last resort is not set
» 172.16.0.0/18 is subnetted, 3 subnets
» C 172.16.0.0 is directly connected, Serial0/0/0
» C 172.16.64.0 is directly connected, FastEthernet0/0
» S 172.16.128.0 [1/0] via 172.16.63.254
» A#
Tehran Institute of Technology
Course name: Cisco CCNA
Instructor: Mansour.nch
Senior @ Tehran Institute of Technology
Copyright 2014
21. Problem Solution
Test Results using command (B):
» Router#show ip route
» Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
» D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
» N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
» E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
» i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
» * - candidate default, U - per-user static route, o - ODR
» P - periodic downloaded static route
» Gateway of last resort is 172.16.0.1 to network 0.0.0.0
» 172.16.0.0/18 is subnetted, 2 subnets
» C 172.16.0.0 is directly connected, Serial0/0
» C 172.16.128.0 is directly connected, FastEthernet0/0
» S* 0.0.0.0/0 [1/0] via 172.16.0.1
Tehran Institute of Technology
Course name: Cisco CCNA
Instructor: Mansour.nch
Senior @ Tehran Institute of Technology
Copyright 2014
22. Autonomous System
The classic definition of an Autonomous System is a set of routers under a single
technical administration, using an interior gateway protocol (IGP) and common
metrics to determine how to route packets within the AS, and using an inter-AS
routing protocol to determine how to route packets to other Ases.
Tehran Institute of Technology
Course name: Cisco CCNA
Instructor: Mansour.nch
Senior @ Tehran Institute of Technology
Copyright 2014
23. Universal Categories for Protocols
IGPs
Interior Gateway
Protocols
All Protocols inside an
Autonomous System.
Routing
Protocol
Types
EGPs
Exterior Gateway
Protocols
All Protocols Between
Autonomous System.
Tehran Institute of Technology
Course name: Cisco CCNA
Instructor: Mansour.nch
Senior @ Tehran Institute of Technology
Copyright 2014
24. Administrative Distance (Ranking Routes)
Course name: Cisco CCNA
Instructor: Mansour.nch
Senior @ Tehran Institute of Technology
Copyright 2014
Tehran Institute of Technology
25. Administrative Distance (Ranking Routes)
The answer for this question is based on Default Administrative Distance
Minimum Value will considered as a best Route!
Course name: Cisco CCNA
Instructor: Mansour.nch
Senior @ Tehran Institute of Technology
Copyright 2014
Tehran Institute of Technology
26. Administrative Distance (Ranking Routes)
Based on AD Table Router will choose this Route
Course name: Cisco CCNA
Instructor: Mansour.nch
Senior @ Tehran Institute of Technology
Copyright 2014
Tehran Institute of Technology
27. IGP & EGP Summary
Tehran Institute of Technology
Course name: Cisco CCNA
Instructor: Mansour.nch
Senior @ Tehran Institute of Technology
Copyright 2014
29. Distance Vector
Routers using distance-vector protocol do not have knowledge of
the entire path to a destination. Instead they use two methods:
1. Direction in which router or exit interface a packet should be forwarded.
2. Distance from its destination
Course name: Cisco CCNA
Instructor: Mansour.nch
Senior @ Tehran Institute of Technology
Copyright 2014
Tehran Institute of Technology
30. Link State
A complex routing protocol that shares information with other routers in order to determine the best
path. IS-IS was the first comprehensive link state protocol, and OSPF and NLSP evolved from it. Link
state protocols use characteristics of the route such as speed and cost as well as current congestion
to determine the best path, which is typically computed by the Dijkstra algorithm.
Tehran Institute of Technology
Course name: Cisco CCNA
Instructor: Mansour.nch
Senior @ Tehran Institute of Technology
Copyright 2014
31. Distance Vector VS Link State
Distance Vector Link StateVS
Tell my neighbors who I
know about
How far they are
Use shortest route
Tell everyone who my
neighbors are
Build Map – Graph
Use Graph algorithms
to route
Course name: Cisco CCNA
Instructor: Mansour.nch
Senior @ Tehran Institute of Technology
Copyright 2014
Tehran Institute of Technology
32. Hybrid Routing
Has both characteristics of Distance Vector and link state Vector
Tehran Institute of Technology
Course name: Cisco CCNA
Instructor: Mansour.nch
Senior @ Tehran Institute of Technology
Copyright 2014