Chapter eight of Cisco CCNA curriculum covering three protocols used to monitor the network which are Syslog, SNMP, and NetFlow.
This is a custom presentation created manually which is different from the regular presentations provided by Cisco.
One of the most basic networking courses is provided by Cisco Systems via the Cisco Networking Academy.
The academy provides a comprehensive program allowing students to get started in information technology and have multiple certifications.
Cisco created academies in 9,000 learning institutions spread across more than 170 countries that offer the Cisco Networking Academy curriculum.
The Associate level of Cisco Certifications can begin directly with CCNA for network installation, operations and troubleshooting or CCDA for network design. Think of the Associate Level as the foundation level of networking certification.
The Associate level of Cisco Certifications can begin directly with CCNA for network installation, operations and troubleshooting or CCDA for network design. Think of the Associate Level as the foundation level of networking certification.
Find me on:
AFCIT
http://www.afcit.xyz
YouTube
https://www.youtube.com/channel/UCuewOYbBXH5gwhfOrQOZOdw
Google Plus
https://plus.google.com/u/0/+AhmedGadIT
SlideShare
https://www.slideshare.net/AhmedGadFCIT
LinkedIn
https://www.linkedin.com/in/ahmedfgad/
ResearchGate
https://www.researchgate.net/profile/Ahmed_Gad13
Academia
https://www.academia.edu/
Google Scholar
https://scholar.google.com.eg/citations?user=r07tjocAAAAJ&hl=en
Mendelay
https://www.mendeley.com/profiles/ahmed-gad12/
ORCID
https://orcid.org/0000-0003-1978-8574
StackOverFlow
http://stackoverflow.com/users/5426539/ahmed-gad
Twitter
https://twitter.com/ahmedfgad
Facebook
https://www.facebook.com/ahmed.f.gadd
Pinterest
https://www.pinterest.com/ahmedfgad/
LinuxCon 2015 Linux Kernel Networking WalkthroughThomas Graf
This presentation features a walk through the Linux kernel networking stack for users and developers. It will cover insights into both, existing essential networking features and recent developments and will show how to use them properly. Our starting point is the network card driver as it feeds a packet into the stack. We will follow the packet as it traverses through various subsystems such as packet filtering, routing, protocol stacks, and the socket layer. We will pause here and there to look into concepts such as networking namespaces, segmentation offloading, TCP small queues, and low latency polling and will discuss how to configure them.
Monitor and manage everything Cisco using OpManagerManageEngine
Cisco, The leader in enterprise networking and communication technology exposes lot of proprietary and standard protocols/ technologies to monitor and manage its devices. To name few SNMP, CDP, NetFlow, NBAR, CBQoS, IP SLA, & much more… Know how to monitor and manage everything Cisco using ManageEngine OpManager.
Video: http://joyent.com/blog/linux-performance-analysis-and-tools-brendan-gregg-s-talk-at-scale-11x ; This talk for SCaLE11x covers system performance analysis methodologies and the Linux tools to support them, so that you can get the most out of your systems and solve performance issues quickly. This includes a wide variety of tools, including basics like top(1), advanced tools like perf, and new tools like the DTrace for Linux prototypes.
LinuxCon 2015 Linux Kernel Networking WalkthroughThomas Graf
This presentation features a walk through the Linux kernel networking stack for users and developers. It will cover insights into both, existing essential networking features and recent developments and will show how to use them properly. Our starting point is the network card driver as it feeds a packet into the stack. We will follow the packet as it traverses through various subsystems such as packet filtering, routing, protocol stacks, and the socket layer. We will pause here and there to look into concepts such as networking namespaces, segmentation offloading, TCP small queues, and low latency polling and will discuss how to configure them.
Monitor and manage everything Cisco using OpManagerManageEngine
Cisco, The leader in enterprise networking and communication technology exposes lot of proprietary and standard protocols/ technologies to monitor and manage its devices. To name few SNMP, CDP, NetFlow, NBAR, CBQoS, IP SLA, & much more… Know how to monitor and manage everything Cisco using ManageEngine OpManager.
Video: http://joyent.com/blog/linux-performance-analysis-and-tools-brendan-gregg-s-talk-at-scale-11x ; This talk for SCaLE11x covers system performance analysis methodologies and the Linux tools to support them, so that you can get the most out of your systems and solve performance issues quickly. This includes a wide variety of tools, including basics like top(1), advanced tools like perf, and new tools like the DTrace for Linux prototypes.
[CB21] NAS as Not As Secure by Ta-Lun Yen and Shirley KuoCODE BLUE
Recent ransomware attacks against QNAP devices had caused great mayhem among end-users. In our talk, we’ll share our insights gained from public information regarding the vulnerability used by QLocker, how we performed analysis in the QNAP NAS ecosystem. and how we ended up with another new RCE. We then did more analysis on QNAP's enterprise offering, QSAN, and found 30+ CVEs in the process, some of them allowing overtaking QSAN in a similar way as QNAP NAS. Throughout our presentation, not only we'll talk about getting shells on NAS and SAN, but we'll also share our insights on how the devices can be further secured, advice for vendors for building secure systems, and finally, advice for both enterprise and ordinary end-use rs to secure the device.
A quick overview of some basics going over network monitoring, why you should do it, what to look for and more...!
This is a presentation I made to our local network professionals group awhile back.
Linux offers an extensive selection of programmable and configurable networking components from traditional bridges, encryption, to container optimized layer 2/3 devices, link aggregation, tunneling, several classification and filtering languages all the way up to full SDN components. This talk will provide an overview of many Linux networking components covering the Linux bridge, IPVLAN, MACVLAN, MACVTAP, Bonding/Team, OVS, classification & queueing, tunnel types, hidden routing tricks, IPSec, VTI, VRF and many others.
1) Explain the advantages and disadvantages of static routing.
2) Explain the purpose of different types of static routes.
3) Configure IPv4 and IPv6 static routes by specifying a next-hop address.
4) Configure an IPv4 and IPv6 default routes.
5) Explain the use of legacy classful addressing in network implementation.
6) Explain the purpose of CIDR in replacing classful addressing.
7) Design and implement a hierarchical addressing scheme.
8) Configure an IPv4 and IPv6 summary network address to reduce the number of routing table updates.
9) Configure a floating static route to provide a backup connection.
10) Explain how a router processes packets when a static route is configured.
11) Troubleshoot common static and default route configuration issues.
Open vSwitch - Stateful Connection Tracking & Stateful NATThomas Graf
Update on status of connection tracking and stateful NAT addition to the Linux kernel datapath. Followed by a discussion on the topic to collect ideas and come up with next steps.
A
PROJECT REPORT
On
CISCO CERTIFIED NETWORK ASSOCIATE
A computer network, or simply a network, is a collection of computer and other hardware components interconnected by communication channels that allow sharing of resources and information. Where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. Simply, more than one computer interconnected through a communication medium for information interchange is called a computer network.
Hello!
Welcome to our CCNA Training (R&S) 200-125 series in Urdu.
CCNA stands for Cisco Certified Network Associate. R&S means Routing & Switching. The Exam Code of this course in 200-125. It's the basic course of CCNA track. If you want to start any certification like CCNA Security then you must pass the exam of CCNA R&S first. The exam time of this course is 90-120 mints. Here 90 mints time is for English Speaking Person & 120 mints time for non-native speakers. Total Marks of Exam is 1000 & Passing mark is 860. Number of Questions in Exam is 55 to 65.
You can book the exam from Pearson testing service.
Here is the link of Exam website.
https://home.pearsonvue.com
EZXPRT an IT Trainnig Institute offers CISCO , Microsoft, Vmware, Huawei, Trainings in Rawalpindi, Lahore, Mirpur and Wah Cant campuses,
We offer ONLINE Live and Recorded Training's on demand and we provide services of Career Counseling, Motivation etc.
For more details you may contact
WhatsApp/Call :+923-23-4699123
shafqaat@ezprt.com
www.ezxprt.com
www.facebook.com/ezxprt
www.youtube.com/c/ezxprt
[CB21] NAS as Not As Secure by Ta-Lun Yen and Shirley KuoCODE BLUE
Recent ransomware attacks against QNAP devices had caused great mayhem among end-users. In our talk, we’ll share our insights gained from public information regarding the vulnerability used by QLocker, how we performed analysis in the QNAP NAS ecosystem. and how we ended up with another new RCE. We then did more analysis on QNAP's enterprise offering, QSAN, and found 30+ CVEs in the process, some of them allowing overtaking QSAN in a similar way as QNAP NAS. Throughout our presentation, not only we'll talk about getting shells on NAS and SAN, but we'll also share our insights on how the devices can be further secured, advice for vendors for building secure systems, and finally, advice for both enterprise and ordinary end-use rs to secure the device.
A quick overview of some basics going over network monitoring, why you should do it, what to look for and more...!
This is a presentation I made to our local network professionals group awhile back.
Linux offers an extensive selection of programmable and configurable networking components from traditional bridges, encryption, to container optimized layer 2/3 devices, link aggregation, tunneling, several classification and filtering languages all the way up to full SDN components. This talk will provide an overview of many Linux networking components covering the Linux bridge, IPVLAN, MACVLAN, MACVTAP, Bonding/Team, OVS, classification & queueing, tunnel types, hidden routing tricks, IPSec, VTI, VRF and many others.
1) Explain the advantages and disadvantages of static routing.
2) Explain the purpose of different types of static routes.
3) Configure IPv4 and IPv6 static routes by specifying a next-hop address.
4) Configure an IPv4 and IPv6 default routes.
5) Explain the use of legacy classful addressing in network implementation.
6) Explain the purpose of CIDR in replacing classful addressing.
7) Design and implement a hierarchical addressing scheme.
8) Configure an IPv4 and IPv6 summary network address to reduce the number of routing table updates.
9) Configure a floating static route to provide a backup connection.
10) Explain how a router processes packets when a static route is configured.
11) Troubleshoot common static and default route configuration issues.
Open vSwitch - Stateful Connection Tracking & Stateful NATThomas Graf
Update on status of connection tracking and stateful NAT addition to the Linux kernel datapath. Followed by a discussion on the topic to collect ideas and come up with next steps.
A
PROJECT REPORT
On
CISCO CERTIFIED NETWORK ASSOCIATE
A computer network, or simply a network, is a collection of computer and other hardware components interconnected by communication channels that allow sharing of resources and information. Where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. Simply, more than one computer interconnected through a communication medium for information interchange is called a computer network.
Hello!
Welcome to our CCNA Training (R&S) 200-125 series in Urdu.
CCNA stands for Cisco Certified Network Associate. R&S means Routing & Switching. The Exam Code of this course in 200-125. It's the basic course of CCNA track. If you want to start any certification like CCNA Security then you must pass the exam of CCNA R&S first. The exam time of this course is 90-120 mints. Here 90 mints time is for English Speaking Person & 120 mints time for non-native speakers. Total Marks of Exam is 1000 & Passing mark is 860. Number of Questions in Exam is 55 to 65.
You can book the exam from Pearson testing service.
Here is the link of Exam website.
https://home.pearsonvue.com
EZXPRT an IT Trainnig Institute offers CISCO , Microsoft, Vmware, Huawei, Trainings in Rawalpindi, Lahore, Mirpur and Wah Cant campuses,
We offer ONLINE Live and Recorded Training's on demand and we provide services of Career Counseling, Motivation etc.
For more details you may contact
WhatsApp/Call :+923-23-4699123
shafqaat@ezprt.com
www.ezxprt.com
www.facebook.com/ezxprt
www.youtube.com/c/ezxprt
This paper addresses securing the Honeywell security and monitoring the network devices and computers/laptops.
We have discussed the improved, enhanced features of snmpv3.Shortcoming of the previous SNMP version are explained and solution to those are discussed along with the new capabilities of Snmpv3. SNMP User-based security model is explained, the encryption AES, DES is topically dealt with for the completeness. We have discussed the snmpv3 network configuration for the switch /router along with test tool to monitor the network and devices. Throughout the paper we emphasized the improvement with snmpv3 which provides a highly secure infrastructure for Honeywell.
SNMPv3 is a great way to secure and monitor the network devices. Previous versions of SNMP provide an insecure way to access the data.SNMPv3 addresses the security shortcomings with the access control based system, which properly authenticate users and a method for encrypting SNMP traffic between the agent and the host.
Network Management System and Protocol usibilityHamdamboy (함담보이)
The SNMP Version 1 RFC is:
RFC 1157. Simple Network Management Protocol
SMIv1 RFCs also apply to all SNMPv1 entities. MIB-II RFCs also apply to all SNMPv1 agent entities.
NetSim Technology Library - Software defined networksVishal Sharma
Software Defined Networking (SDN) module is featured from NetSim v11 onwards. This
module features an SDN controller which can be used to control packet forwarding of all Layer
3 devices in the Network.
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios PluginsNagios
William Leibzon's presentation on SNMP Protocol and Nagios Plugins.
The presentation was given during the Nagios World Conference North America held Sept 20-Oct 2nd, 2013 in Saint Paul, MN. For more information on the conference (including photos and videos), visit: http://go.nagios.com/nwcna
Similar to CCNA4v5 Chapter 8 - Monitoring the Netwok (20)
ICEIT'20 Cython for Speeding-up Genetic AlgorithmAhmed Gad
The presentation of the paper titled "Cython for Speeding-up Genetic Algorithm". Find it at IEEE Explore: https://ieeexplore.ieee.org/document/9113210
The abstract of the paper:
This paper proposes a library for implementing the genetic algorithm using Python mainly in NumPy and speeding-up its execution using Cython. The preliminary Python implementation is inspected for possible optimizations. The 4 main changes include statically defining data types for the NumPy arrays, specifying the data type of the array elements in addition to the number of dimensions, using indexing for looping through the arrays, and finally disabling some unnecessary features in Cython. Using Cython, the NumPy array processing is 1250 times faster than CPython. The Cythonized version of the genetic algorithm is 18 times faster than the Python version.
NumPyCNNAndroid: A Library for Straightforward Implementation of Convolutiona...Ahmed Gad
The presentation of my paper titled "#NumPyCNNAndroid: A Library for Straightforward Implementation of #ConvolutionalNeuralNetworks for #Android Devices" at the second International Conference of Innovative Trends in #ComputerEngineering (ITCE 2019).
The paper proposes a library for implementing convolutional neural networks (CNNs) in order to run on Android devices. The process of running the CNN on the mobile devices is straightforward and does not require an in-between step for model conversion as it uses #Kivy cross-platform library.
The CNN layers are implemented in #NumPy. You can find their implementation in my #GitHub project at this link: https://github.com/ahmedfgad/NumPyCNN
The library is also open source available here: https://github.com/ahmedfgad/NumPyCNNAndroid
There are 2 modes of operation for this work. The first one is training the CNN on the mobile device but it is very time-consuming at least in the current version. The second and preferred way is to train the CNN in a desktop computer and then use it on the mobile device.
Python for Computer Vision - Revision 2nd EditionAhmed Gad
Python is a powerful tool for computer vision applications. This presentation reviews the essential libraries required for image analysis using Python. These libraries include NumPy, SciPy, Matplotlib, Python Image Library (PIL), scikit-image, and scikit-learn.
Multi-Objective Optimization using Non-Dominated Sorting Genetic Algorithm wi...Ahmed Gad
When solving a problem, the goal is not only solving it but also optimizing such solution. There might be multiple solutions to a problem and the challenge is to find the best of them. The more metrics defining the solution goodness, the harder finding the best solution. This presentation discusses one of the multi-objective optimization techniques called non-dominated sorting genetic algorithm II (NSGA-II) explaining its steps including non-dominated sorting, crowding distance, tournament selection, and genetic algorithm. The presentation works through a numerical example step-by-step.
M.Sc. Thesis - Automatic People Counting in Crowded ScenesAhmed Gad
This thesis proposes a real-time automatic people crowd density estimation method for overcoming the non-linearity problem, working with different densities and scales, and enhancing the prediction error. To cover most of the properties of the crowded scene, a newly used combination of features is proposed that includes segmented region properties, texture, edge, and SIFT keypoints. Edge strength is a suggested for use.
Derivation of Convolutional Neural Network from Fully Connected Network Step-...Ahmed Gad
In image analysis, #convolutional neural networks (#CNNs or #ConvNets for short) are time and memory efficient than fully connected (#FC) networks. But why? What are the advantages of ConvNets over FC networks in image analysis? How is #ConvNet derived from FC networks? Where the term #convolution in CNNs came from? These questions are to be answered in this #presentation.
Image analysis has a number of challenges such as classification, object detection, recognition, description, etc. If an image classifier, for example, is to be created, it should be able to work with a high accuracy even with variations such as occlusion, illumination changes, viewing angles, and others. The traditional pipeline of image classification with its main step of feature engineering is not suitable for working in rich environments. Even experts in the field won’t be able to give a single or a group of features that are able to reach high accuracy under different variations. Motivated by this problem, the idea of feature learning came out. The suitable features to work with images are learned automatically. This is the reason why artificial neural networks (ANNs) are one of the robust ways of image analysis. Based on a learning algorithm such as gradient descent (GD), ANN learns the image features automatically. The raw image is applied to the ANN and ANN is responsible for generating the features describing it.
Introduction to Optimization with Genetic Algorithm (GA)Ahmed Gad
Selection of the optimal parameters for machine learning tasks is challenging. Some results may be bad not because the data is noisy or the used learning algorithm is weak, but due to the bad selection of the parameters values. This article gives a brief introduction about evolutionary algorithms (EAs) and describes genetic algorithm (GA) which is one of the simplest random-based EAs.
References:
Eiben, Agoston E., and James E. Smith. Introduction to evolutionary computing. Vol. 53. Heidelberg: springer, 2003.
https://www.linkedin.com/pulse/introduction-optimization-genetic-algorithm-ahmed-gad
https://www.kdnuggets.com/2018/03/introduction-optimization-with-genetic-algorithm.html
Derivation of Convolutional Neural Network (ConvNet) from Fully Connected Net...Ahmed Gad
In image analysis, convolutional neural networks (CNNs or ConvNets for short) are time and memory efficient than fully connected (FC) networks. But why? What are the advantages of ConvNets over FC networks in image analysis? How is ConvNet derived from FC networks? Where the term convolution in CNNs came from? These questions are to be answered in this article.
Image analysis has a number of challenges such as classification, object detection, recognition, description, etc. If an image classifier, for example, is to be created, it should be able to work with a high accuracy even with variations such as occlusion, illumination changes, viewing angles, and others. The traditional pipeline of image classification with its main step of feature engineering is not suitable for working in rich environments. Even experts in the field won’t be able to give a single or a group of features that are able to reach high accuracy under different variations. Motivated by this problem, the idea of feature learning came out. The suitable features to work with images are learned automatically. This is the reason why artificial neural networks (ANNs) are one of the robust ways of image analysis. Based on a learning algorithm such as gradient descent (GD), ANN learns the image features automatically. The raw image is applied to the ANN and ANN is responsible for generating the features describing it.
-Reference
Aghdam, Hamed Habibi, and Elnaz Jahani Heravi. Guide to Convolutional Neural Networks: A Practical Application to Traffic-Sign Detection and Classification. Springer, 2017.
Have you ever created a machine learning model that is perfect for the training samples but gives very bad predictions with unseen samples! Did you ever think why this happens? This article explains overfitting which is one of the reasons for poor predictions for unseen samples. Also, regularization technique based on regression is presented by simple steps to make it clear how to avoid overfitting.
Selection of the optimal parameters for machine learning tasks is challenging. Some results may be bad not because the data is noisy or the used learning algorithm is weak, but due to the bad selection of the parameters values. This presentation gives a brief introduction about evolutionary algorithms (EAs) and describes genetic algorithm (GA) which is one of the simplest random-based EAs. A step-by-step example is given in addition to its implementation in Python 3.5.
---------------------------------
Read more about GA:
Yu, Xinjie, and Mitsuo Gen. Introduction to evolutionary algorithms. Springer Science & Business Media, 2010.
https://www.kdnuggets.com/2018/03/introduction-optimization-with-genetic-algorithm.html
https://www.linkedin.com/pulse/introduction-optimization-genetic-algorithm-ahmed-gad
ICCES 2017 - Crowd Density Estimation Method using Regression AnalysisAhmed Gad
The oral presentation of the paper titled "Crowd Density Estimation Method using Multiple Feature Categories and Multiple Regression Models".
This paper was accepted for publication and oral presentation in the 12th IEEE International Conference on Computer Engineering and Systems (ICCES 2017) held from 19 to 20 December 2017 in Cairo, Egypt.
The paper proposed a new method to estimate the number of people within crowded scenes using regression analysis. The two challenges in crowd density estimation using regression analysis are perspective distortion and non-linearity. This paper solves the perspective distortion using perspective normalization which is the best way to deal with that problem based on recent works.
The second challenge is solved by creating a new combination of features collected from multiple already existing categories including segmented region, texture, edge, and keypoints. This paper created a feature vector of length 164.
Five regression models are used which are GPR, RF, RPF, LASSO, and KNN.
Based on the experimental results, our proposed method gives better results than previous works.
----------------------------------
أحمد فوزي جاد Ahmed Fawzy Gad
قسم تكنولوجيا المعلومات Information Technology (IT) Department
كلية الحاسبات والمعلومات Faculty of Computers and Information (FCI)
جامعة المنوفية, مصر Menoufia University, Egypt
Teaching Assistant/Demonstrator
ahmed.fawzy@ci.menofia.edu.eg
---------------------------------
Find me on:
Blog
(Arabic) https://aiage-ar.blogspot.com.eg/
(English) https://aiage.blogspot.com.eg/
YouTube
https://www.youtube.com/AhmedGadFCIT
Google Plus
https://plus.google.com/u/0/+AhmedGadIT
SlideShare
https://www.slideshare.net/AhmedGadFCIT
LinkedIn
https://www.linkedin.com/in/ahmedfgad
reddit
https://www.reddit.com/user/AhmedGadFCIT
ResearchGate
https://www.researchgate.net/profile/Ahmed_Gad13
Academia
https://menofia.academia.edu/Gad
Google Scholar
https://scholar.google.com.eg/citations?user=r07tjocAAAAJ&hl=en
Mendelay
https://www.mendeley.com/profiles/ahmed-gad12
ORCID
https://orcid.org/0000-0003-1978-8574
StackOverFlow
http://stackoverflow.com/users/5426539/ahmed-gad
Twitter
https://twitter.com/ahmedfgad
Facebook
https://www.facebook.com/ahmed.f.gadd
Pinterest
https://www.pinterest.com/ahmedfgad
Backpropagation: Understanding How to Update ANNs Weights Step-by-StepAhmed Gad
This presentation explains how the backpropagation algorithm is useful in updating the artificial neural networks (ANNs) weights using two examples step by step. Readers should have a basic understanding of how ANNs work, partial derivatives, and multivariate chain rule.
This presentation won`t dive directly into the details of the algorithm but will start by training a very simple network. This is because the backpropagation algorithm is meant to be applied over a network after training. So, we should train the network before applying it to catch the benefits of backpropagation algorithm and how to use it.
Computer Vision: Correlation, Convolution, and GradientAhmed Gad
Three important operations in computer vision are explained starting with each one got explained and implemented in Python.
Generally, all of these three operations have many similarities in as they follow the same general steps but there are some subtle changes. The main change is using different masks.
A brief review about Python for computer vision showing the different modules necessary to dive into computer vision.
The modules presented are NumPy, SciPy, and Matplotlib.
Anime Studio Pro 10 Tutorial as Part of Multimedia CourseAhmed Gad
There are different ways of presenting information to users. These ways are called medias because they similar to networking media that carry data from one place to another, they carry information from the source to the user. Examples of medias are text, image, sound, video, animation.
Because multiple types of medias can be used to carry the same piece of information, there is what is called multimedia (MM). This is a combined set of medias working together to present the information in a friendly way to the end-user. The use of one media depends on the type of audience and the type of information to be presented. One media may be powerful over another to present some types of information.
The primary goals of this course is to make you understand the different types of medias, use cases of one media over another, and combining different media types.
Also this course tells how to create such types of medias to create interactive media.
Brief Introduction to Deep Learning + Solving XOR using ANNsAhmed Gad
This presentation gives a very simple introduction to deep learning in addition to a step-by-step example showing how to solve the XOR non-linear problem using multi-layer artificial neural networks that has both input, hidden, and output layers.
Deep learning is based on artificial neural networks and it aims to analyze large amounts of data that are not easily analyzed using conventional models. It creates a large neural network with several hidden layers and several neurons within each layer and usually may take days for its learning.
Many beginners in artificial neural networks have a problem in understanding how hidden layers are useful and what is the best number of hidden layers and best number of neurons or nodes within each layer.
أحمد فوزي جاد Ahmed Fawzy Gad
قسم تكنولوجيا المعلومات Information Technology (IT) Department
كلية الحاسبات والمعلومات Faculty of Computers and Information (FCI)
جامعة المنوفية, مصر Menoufia University, Egypt
Teaching Assistant/Demonstrator
ahmed.fawzy@ci.menofia.edu.eg
:
AFCIT
http://www.afcit.xyz
YouTube
https://www.youtube.com/channel/UCuewOYbBXH5gwhfOrQOZOdw
Google Plus
https://plus.google.com/u/0/+AhmedGadIT
SlideShare
https://www.slideshare.net/AhmedGadFCIT
LinkedIn
https://www.linkedin.com/in/ahmedfgad/
ResearchGate
https://www.researchgate.net/profile/Ahmed_Gad13
Academia
https://menofia.academia.edu/Gad
Google Scholar
https://scholar.google.com.eg/citations?user=r07tjocAAAAJ&hl=en
Mendelay
https://www.mendeley.com/profiles/ahmed-gad12/
ORCID
https://orcid.org/0000-0003-1978-8574
StackOverFlow
http://stackoverflow.com/users/5426539/ahmed-gad
Twitter
https://twitter.com/ahmedfgad
Facebook
https://www.facebook.com/ahmed.f.gadd
Pinterest
https://www.pinterest.com/ahmedfgad/
Operations in Digital Image Processing + Convolution by ExampleAhmed Gad
Digital image processing operations can be either point or group.
This presentation explains both operations (point and group) and shows how convolution works by a numerical example.
Ahmed Fawzy Gad
ahmed.fawzy@ci.menofia.edu.eg
Information Technology Department
Faculty of Computers and Information (FCI)
Menoufia University
Egypt
Find me on:
AFCIT
http://www.afcit.xyz
YouTube
https://www.youtube.com/channel/UCuewOYbBXH5gwhfOrQOZOdw
Google Plus
https://plus.google.com/u/0/+AhmedGadIT
SlideShare
https://www.slideshare.net/AhmedGadFCIT
LinkedIn
https://www.linkedin.com/in/ahmedfgad/
ResearchGate
https://www.researchgate.net/profile/Ahmed_Gad13
Academia
https://www.academia.edu/
Google Scholar
https://scholar.google.com.eg/citations?user=r07tjocAAAAJ&hl=en
Mendelay
https://www.mendeley.com/profiles/ahmed-gad12/
ORCID
https://orcid.org/0000-0003-1978-8574
StackOverFlow
http://stackoverflow.com/users/5426539/ahmed-gad
Twitter
https://twitter.com/ahmedfgad
Facebook
https://www.facebook.com/ahmed.f.gadd
Pinterest
https://www.pinterest.com/ahmedfgad/
This file contains a simple description about what I have created about how to detect object motion and track whatever moving as a computer vision project when being undergraduate student at 2014.
The MATLAB code of the system is also available in the document.
Find me on:
AFCIT
http://www.afcit.xyz
YouTube
https://www.youtube.com/channel/UCuewOYbBXH5gwhfOrQOZOdw
Google Plus
https://plus.google.com/u/0/+AhmedGadIT
SlideShare
https://www.slideshare.net/AhmedGadFCIT
LinkedIn
https://www.linkedin.com/in/ahmedfgad/
ResearchGate
https://www.researchgate.net/profile/Ahmed_Gad13
Academia
https://www.academia.edu/
Google Scholar
https://scholar.google.com.eg/citations?user=r07tjocAAAAJ&hl=en
Mendelay
https://www.mendeley.com/profiles/ahmed-gad12/
ORCID
https://orcid.org/0000-0003-1978-8574
StackOverFlow
http://stackoverflow.com/users/5426539/ahmed-gad
Twitter
https://twitter.com/ahmedfgad
Facebook
https://www.facebook.com/ahmed.f.gadd
Pinterest
https://www.pinterest.com/ahmedfgad/
MATLAB Code + Description : Very Simple Automatic English Optical Character R...Ahmed Gad
This file contains a simple description about what I have created about how to recognize characters using feed forward back propagation neural network as a pattern recognition project when being undergraduate student at 2013.
The MATLAB code of the system is also available in the document.
Find me on:
AFCIT
http://www.afcit.xyz
YouTube
https://www.youtube.com/channel/UCuewOYbBXH5gwhfOrQOZOdw
Google Plus
https://plus.google.com/u/0/+AhmedGadIT
SlideShare
https://www.slideshare.net/AhmedGadFCIT
LinkedIn
https://www.linkedin.com/in/ahmedfgad/
ResearchGate
https://www.researchgate.net/profile/Ahmed_Gad13
Academia
https://www.academia.edu/
Google Scholar
https://scholar.google.com.eg/citations?user=r07tjocAAAAJ&hl=en
Mendelay
https://www.mendeley.com/profiles/ahmed-gad12/
ORCID
https://orcid.org/0000-0003-1978-8574
StackOverFlow
http://stackoverflow.com/users/5426539/ahmed-gad
Twitter
https://twitter.com/ahmedfgad
Facebook
https://www.facebook.com/ahmed.f.gadd
Pinterest
https://www.pinterest.com/ahmedfgad/
Graduation Project - Face Login : A Robust Face Identification System for Sec...Ahmed Gad
Face login is my 2015 graduation project started in 2014 and lasted 1.5 years of work.
Generally, it is an identification system using face images. It is a multi-use system but it was mainly created to authorize users to login into their system.
There is an IEEE paper published by the project algorithm used in ICCES 2014 http://ieeexplore.ieee.org/abstract/document/7030929/.
Here is its citation Semary, Noura A., and Ahmed Fawzi Gad. "A proposed framework for robust face identification system." Computer Engineering & Systems (ICCES), 2014 9th International Conference on. IEEE, 2014.
A YouTube video describing the project generally.
https://www.youtube.com/watch?v=OUvaPW70Eko
Find me on:
AFCIT
http://www.afcit.xyz
YouTube
https://www.youtube.com/channel/UCuewOYbBXH5gwhfOrQOZOdw
Google Plus
https://plus.google.com/u/0/+AhmedGadIT
SlideShare
https://www.slideshare.net/AhmedGadFCIT
LinkedIn
https://www.linkedin.com/in/ahmedfgad/
ResearchGate
https://www.researchgate.net/profile/Ahmed_Gad13
Academia
https://www.academia.edu/
Google Scholar
https://scholar.google.com.eg/citations?user=r07tjocAAAAJ&hl=en
Mendelay
https://www.mendeley.com/profiles/ahmed-gad12/
ORCID
https://orcid.org/0000-0003-1978-8574
StackOverFlow
http://stackoverflow.com/users/5426539/ahmed-gad
Twitter
https://twitter.com/ahmedfgad
Facebook
https://www.facebook.com/ahmed.f.gadd
Pinterest
https://www.pinterest.com/ahmedfgad/
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
1. CCNA 4 - CHAPTER 8
MONITORING THE NETWORK
Ahmed Fawzy Gad
ahmed.fawzy@ci.menofia.edu.eg
MENOUFIA UNIVERSITY
FACULTY OF COMPUTERS AND
INFORMATION
INFORMATION TECHNOLOGY DEPARTMENT
DIGITAL NETWORKS
المنوفية جامعة
والمعلومات الحاسبات كلية
المعلومات تكنولوجيا قسم
الرقمية الشبكات
المنوفية جامعة
2. INTRODUCTION
Monitoring an operational network can provide a network administrator with
information to manage the network and collect network usage statistics.
Monitoring is not meant to modify any node in the network. Network monitoring just
reports information to the administrator and then the administrator itself can decide
what to do.
Error Rates Link Status
Monitoring
Protocols
Syslog
SNMP
NetFlow
NTP
Network Time Protocol
4. MONITORING PROTOCOLS
SYSLOG VS. SNMP VS. NETFLOW
Cisco Device
Interface Up/Down
IP Change
Protocol Activated
Monitoring Options
5. MONITORING PROTOCOLS
SYSLOG VS. SNMP VS. NETFLOW
Cisco Device
Interface Up/Down
IP Address Confliction
Protocol Activated
Console
6. MONITORING PROTOCOLS
SYSLOG VS. SNMP VS. NETFLOW
Node
Node
Node
Node
Node
NodeSNMP
Server
CPU Usage
Interface Status
Objects
Set Get
Messages
7. MONITORING PROTOCOLS
SYSLOG VS. SNMP VS. NETFLOW
SNMP
Device
CPU - Memory
IP
Protocols
Interfaces
Modifications
NetFLow
Use NetFlow to focus only
on just IP traffic.
9. SYSLOG
Systlog is a standard protocol that uses UDP port 514.
Syslog uses client-server architecture.
Client sends system log messages to the Syslog server.
Syslog server is the message collector that receives
messages from different devices.
Many networking devices support the syslog protocol like
routers, switches, firewalls, and others.
Syslog allows networking devices to send their system
messages across an IP network.
10. SYSLOG
PRIMARY FUNCTIONS
The ability to gather logging information for
monitoring and troubleshooting.
The ability to select the type of logging
information that is captured.
The ability to specify the destinations of
captured syslog messages.
11. Popular destinations for syslog messages include:
1. Logging buffer (RAM inside a router or switch)
2. Console line
3. Terminal line
4. Syslog server
SYSLOG
PRIMARY FUNCTIONS
The ability to specify the destinations of
captured syslog messages.
12. SYSLOG
MESSAGE FORMAT
Every syslog message contains a severity level and a facility.
The smaller the numerical value of the severity level, the more critical syslog alarms.
The severity level of the messages can be set to control where each type of message
is displayed.
Severity Name/Facility = Category.
MNEMONIC => More Information.
Facility Severity Mnemonic Description
14. SYSLOG CONFIGURATION
DEFAULT LOGGING
By default, Cisco routers and switches
send log messages for all severity
levels to the console.
On some IOS versions, the device also
buffers log messages by default.
Use show logging user-privileged
executive mode command to show
destination of the log messages.
level debugging means that level 7
and all lower levels are activated.
R1(global)#logging console : Enable
console logging.
R1(global)#logging buffered :
Enable buffer logging.
16. SYSLOG CONFIGURATION
CLIENT CONFIGURATION
Step 1. Configure the destination hostname or IP address of the syslog server in global configuration
mode:
R1(config)#logging 10.0.0.1
Step 2. Control the messages that will be sent to the syslog server with the logging trap level global
configuration mode command. For example, to limit the messages to levels 4 and lower (0 to 4), use one of
the two equivalent commands:
R1(config)#logging trap 4
R1(config)#logging trap warning
Step 3. Optionally, configure the source interface with the logging source-interface interface-type
interface number global configuration mode command.
R1(config)#logging source-interface g0/0
17. SYSLOG
SERVER LOG INSPECTION
Change the status of another interface other than one used to connect the server or
create a loopback interface then change its state to create logging messages.
These messages will be received by the server.
19. SNMP
SNMP uses UDP, port number 162, to retrieve and send management information.
SNMP was developed to allow administrators to manage nodes, such as servers,
workstations, routers, switches, and security appliances, on an IP network.
SNMP is an application layer protocol that provides a message format for
communication between managers and agents. The SNMP system consists of three
elements:
1. SNMP manager
2. SNMP agents (managed node)
3. Management Information Base (MIB)
20. SNMP SYSTEM ELEMENTS
The SNMP manager is part of a network
management system (NMS).
The SNMP manager is part of a network management
system (NMS). The SNMP manager runs SNMP
management software.
The SNMP manager can collect information from an
SNMP agent using the “get” action and can change
configurations on an agent using the “set” action.
Network devices that must be managed, such as
switches, routers, servers, firewalls, and workstations,
are equipped with an SMNP agent software module
SNMP agents can forward information directly to an
NMS using “traps”.
21. SNMP SYSTEM ELEMENTS
MIBs store data about the device operation and
are meant to be available to authenticated
remote users. The SNMP agent is responsible for
providing access to the local MIB of objects that
reflects resources and activity.
The SNMP manager then uses the SNMP agent to
access information within the MIB.
22. SNMP SERVER REQUESTS
There are two primary SNMP manager
requests
1. Get: A get request is used by the NMS to
query the device for data.
2. Set: A set request is used by the NMS to
change configuration variables in the agent
device. A set request can also initiate
actions within a device. For example, a set
can cause a router to reboot, send a
configuration file, or receive a configuration
file.
23. SNMP AGENT RESPONSES TO SNMP
SERVER
The SNMP agent responds to SNMP manager requests as follows:
1. Get an MIB variable - The SNMP agent performs this function in response to a GetRequest-
PDU from the NMS. The agent retrieves the value of the requested MIB variable and
responds to the NMS with that value.
2. Set an MIB variable - The SNMP agent performs this function in response to a SetRequest-
PDU from the NMS. The SNMP agent changes the value of the MIB variable to the value
specified by the NMS. An SNMP agent reply to a set request includes the new settings in the
device.
24. COMMUNITY STRINGS
For SNMP to operate, the NMS must have access to the MIB. To ensure that access requests are valid,
some form of authentication must be in place.
SNMPv1 and SNMPv2c use community strings that control access to the MIB. Community strings are
plaintext passwords. SNMP community strings authenticate access to MIB objects.
There are two types of community strings:
1. Read-only (ro) - Provides access to the MIB variables, but does not allow these variables to be
changed, only read. Because security is minimal in version 2c, many organizations use SNMPv2c in
read-only mode.
2. Read-write (rw) - Provides read and write access to all objects in the MIB.
To view or set MIB variables, the user must specify the appropriate community string for read or write
access.
Note: Plaintext passwords are not considered a security mechanism. This is because plaintext
passwords are highly vulnerable to man-in-the-middle attacks, in which they are compromised through
the capture of packets.
25. MANAGEMENT INFORMATION BASE
OBJECT IDENTIFIER (MIBOID)
The MIB organizes variables hierarchically. MIB
variables enable the management software to monitor
and control the network device. Formally, the MIB
defines each variable as an object ID (OID). OIDs
uniquely identify managed objects in the MIB
hierarchy.
The MIB tree for any given device includes some
branches with variables common to many networking
devices and some branches with variables specific to
that device or vendor.
OIDs belonging to Cisco are numbered as follows: .iso
(1).org (3).dod (6).internet (1).private (4).enterprises
(1).cisco (9). This is displayed as 1.3.6.1.4.1.9.
26. SNMP SERVER CONFIGURATION
REQUIRED COMAMNDS
Step 1. Configure the community string and access level (read-only or read-write)
with this command:
R1(config)#snmp-server community string ro | rw
For example, two create a read-only community string:
R1(config)#snmp-server community ahmed ro
For example, two create a read-write community string:
R1(config)#snmp-server community ahmedd rw
29. 1. IP Address
2. Port Number
3. Read Community String
4. Write Community String
5. Version
SNMP CLIENT
SERVER DETAILS
30. SNMP CLIENT
OID
Example of valid OID:
.1.3.6.1.4.1.9.9.449.1.3.1.1.5
It tells if the route to the destination has
failed and an active search for
alternative path is in progress.
34. NETFLOW
NetFlow is a Cisco IOS technology that provides statistics on packets flowing through a Cisco
router or multilayer switch.
NetFlow technology was developed because networking professionals needed a simple and
efficient method for tracking TCP/IP flows in the network, and SNMP was not sufficient for
these purposes.
While SNMP attempts to provide a very wide range of network management features and
options, NetFlow is focused on providing statistics on IP packets flowing through network
devices.
Another difference between NetFlow and SNMP is that NetFlow only gathers traffic
statistics, whereas SNMP can also collect many other performance indicators, such as
interface errors, CPU usage, and memory usage.
On the other hand, the traffic statistics collected using NetFlow have a lot more granularity
than the traffic statistics that can be collected using SNMP.
35. NETFLOW USES
Organizations use NetFlow for some or all of the following important data collection
purposes:
1. Measuring who is using what network resources for what purpose.
2. Accounting and charging back according to the resource utilization level.
3. Using the measured information to do more effective network planning so that
resource allocation and deployment is well-aligned with customer requirements.
4. Using the information to better structure and customize the set of available
applications and services to meet user needs and customer service requirements.
36. NETFLOW PACKET FIELDS
Original NetFlow distinguished flows using a combination of seven fields:
1. Source IP address
2. Destination IP address
3. Source port number
4. Destination port number
5. Layer 3 protocol type (TCP/UDP)
6. Type of Service (ToS) marking: The ToS byte in the IPv4 header holds information
about how devices should apply quality of service (QoS) rules to the packets in
that flow.
7. Input logical interface
37. NETFLOW CONFIGURATION
A NetFlow flow is unidirectional. This means that one user
connection to an application exists as two NetFlow flows, one
for each direction. To define the data to be captured for
NetFlow in interface configuration mode:
Capture NetFlow data for monitoring incoming packets on the
interface using this command:
R1(config-if)#ip flow ingress
Capture NetFlow data for monitoring outgoing packets on the
interface using this command:
R1(config-if)#ip flow eggress
38. NETFLOW CONFIGURATION
To enable the NetFlow data to be sent to the NetFlow collector,
there are several items to configure on the router in global
configuration mode:
NetFlow collector’s IP address and UDP port number - Use
this command:
R1(config)#ip flow-export destination ip-address udp-port
The collector has one or more ports, by default, for NetFlow
data capture. The software allows the administrator to specify
which port or ports to accept for NetFlow capture. Some
common UDP ports allocated are 99, 2055, and 9996.
39. VERIFYING NETFLOW
R1#show ip cache flow
This command gives details about the following:
1. IP Packet Size Distribution
2. Protocol Statistics
3. Interface Statistics
For example, syslog messages may be sent across the network to an external syslog server. These messages can be retrieved without the need of accessing the actual device. Log messages and outputs stored on the external server can be pulled into various reports for easier reading.
Alternatively, syslog messages may be sent to an internal buffer. Messages sent to the internal buffer are only viewable through the CLI of the device.
The second highlighted line states that this router logs to an internal buffer. Because this router has enabled logging to an internal buffer, the show logging command also lists the messages in that buffer. You can view some of the system messages that have been logged at the end of the output.