The document provides an inventory of icon library assets as of January 6, 2005, including icons representing:
- Cisco products like routers, switches, firewalls, optical equipment, security products, etc.
- WAN infrastructure like DSU/CSUs, PBXs, network clouds
- LAN components like workstations, servers, printers
- Media types like token rings, FDDI, Ethernet
- Buildings and locations
- People
- Multimedia, voice, and telephony equipment
- Miscellaneous items
The icons are available in different colors, orientations, and varying levels of technical detail.
This slide deck presents a user case by Microsoft (Mark Filer) for a 100G DWDM alternative to Coherent systems <80km using the PAM-4 approach. Fujitsu (Muhammed Sarwar) and Finisar (Gert Sarlet) present the case for Coherent. Inphi (Radha Nagarajan) and ADVA (Joerg-Peter Elbers) present the case for the PAM-4 approach. IEEE (John D'Ambrosia) weighs in from the standards perspective.
Presentation of the ESP8266 WiFi module created for the course Pervasive Systems 2016 of the Master Degree in Engineering in Computer Science (DIAG, University of Rome "La Sapienza")
Pervasive Systems 2016 Web Site: http://ichatz.me/index.php/Site/PervasiveSystems2016
LinkedIn Profile: https://www.linkedin.com/in/biagio-botticelli-444b87105?trk=hp-identity-name
GitHub Repository: https://github.com/biagiobotticelli/ESP8266
La bibliothèque et la mise en réseau en milieu ruralDominique Lahary
Intervention à la journée départementale de l'Aveyron organisée le 5 octobre 2017 sous le titre La mise en réseau des bibliothèques : Tout le monde y gagne !
A brief summary of the LPWAN wireless protocols and a more technical overview of LoRa (Long-Range) starting from PHY and throughout the rest of the LoRaWAN stack emphasizing its implications on IoT platforms.
Talk held at:
Winter School 2017 on "Internet of Things: Security, Communication & Application Challenges" organized by the Computing Systems, Security and Networks (CSSN) Research Lab of the Alexander TEI of Thessaloniki (ATEITHE) and the IEEE ATEITHE Student Branch
TWAMP NOKIA. to give more information about Two way activeTWAMP Light, also called Simple Two-way Activation Monitoring Protocol (STAMP), is the test packet used
to gather IP link measurement delay. The link measurement request source is the session-sender.
TWAMP Light requires the explicit configuration of a reflector on the peer. For SR OS, TWAMP Light
reflectors are configured in the config>router>twamp-light> reflector context. The reflector is referred to
as the session-reflector, the responder to the request.
The session-sender and the session-reflector must agree on the UDP port used to identify TWAMP
Light test packets. The SR OS configuration of the session-sender (configured using the dest-udp-port
command) and session-reflector (configured using the udp-port command) must match.
The TWAMP Light test packet was first introduced to support the Network Time Protocol (NTP) encoding
of the timestamp in the packet. Updates since the initial standardization of TWAMP Light supports the use
of the truncated Precision Time Protocol (PTP) timestamp format. A bit in the TWAMP Light test packet
header is repurposed to indicate the timestamp format encoded by the session-sender and the sessionreflector.
This change leads to some interoperability considerations. The timestamp format should be
consistent with the session-sender and session-reflector behavior. The link measurement session-sender
can be configured to encode NTP (default) or PTP and set the ‟z-bit” in the Error Estimate field accordingly.
This bit indicates the timestamp format carried in the packet. If the session-reflector sets the ‟z-bit” in the
Error Estimate field to indicate the timestamp format of the reply, the link measurement session-sender
can perform the necessary conversion (format and epoch) to produce the correct results. However, if the
session-reflector only reflects the original ‟z-bit” it received from the session-sender and uses a different
timestamp format in the packet, the delay calculations are not reliable because of the misinterpretation of
This slide deck presents a user case by Microsoft (Mark Filer) for a 100G DWDM alternative to Coherent systems <80km using the PAM-4 approach. Fujitsu (Muhammed Sarwar) and Finisar (Gert Sarlet) present the case for Coherent. Inphi (Radha Nagarajan) and ADVA (Joerg-Peter Elbers) present the case for the PAM-4 approach. IEEE (John D'Ambrosia) weighs in from the standards perspective.
Presentation of the ESP8266 WiFi module created for the course Pervasive Systems 2016 of the Master Degree in Engineering in Computer Science (DIAG, University of Rome "La Sapienza")
Pervasive Systems 2016 Web Site: http://ichatz.me/index.php/Site/PervasiveSystems2016
LinkedIn Profile: https://www.linkedin.com/in/biagio-botticelli-444b87105?trk=hp-identity-name
GitHub Repository: https://github.com/biagiobotticelli/ESP8266
La bibliothèque et la mise en réseau en milieu ruralDominique Lahary
Intervention à la journée départementale de l'Aveyron organisée le 5 octobre 2017 sous le titre La mise en réseau des bibliothèques : Tout le monde y gagne !
A brief summary of the LPWAN wireless protocols and a more technical overview of LoRa (Long-Range) starting from PHY and throughout the rest of the LoRaWAN stack emphasizing its implications on IoT platforms.
Talk held at:
Winter School 2017 on "Internet of Things: Security, Communication & Application Challenges" organized by the Computing Systems, Security and Networks (CSSN) Research Lab of the Alexander TEI of Thessaloniki (ATEITHE) and the IEEE ATEITHE Student Branch
TWAMP NOKIA. to give more information about Two way activeTWAMP Light, also called Simple Two-way Activation Monitoring Protocol (STAMP), is the test packet used
to gather IP link measurement delay. The link measurement request source is the session-sender.
TWAMP Light requires the explicit configuration of a reflector on the peer. For SR OS, TWAMP Light
reflectors are configured in the config>router>twamp-light> reflector context. The reflector is referred to
as the session-reflector, the responder to the request.
The session-sender and the session-reflector must agree on the UDP port used to identify TWAMP
Light test packets. The SR OS configuration of the session-sender (configured using the dest-udp-port
command) and session-reflector (configured using the udp-port command) must match.
The TWAMP Light test packet was first introduced to support the Network Time Protocol (NTP) encoding
of the timestamp in the packet. Updates since the initial standardization of TWAMP Light supports the use
of the truncated Precision Time Protocol (PTP) timestamp format. A bit in the TWAMP Light test packet
header is repurposed to indicate the timestamp format encoded by the session-sender and the sessionreflector.
This change leads to some interoperability considerations. The timestamp format should be
consistent with the session-sender and session-reflector behavior. The link measurement session-sender
can be configured to encode NTP (default) or PTP and set the ‟z-bit” in the Error Estimate field accordingly.
This bit indicates the timestamp format carried in the packet. If the session-reflector sets the ‟z-bit” in the
Error Estimate field to indicate the timestamp format of the reply, the link measurement session-sender
can perform the necessary conversion (format and epoch) to produce the correct results. However, if the
session-reflector only reflects the original ‟z-bit” it received from the session-sender and uses a different
timestamp format in the packet, the delay calculations are not reliable because of the misinterpretation of
The purpose of the patent for the optical system is to display information, icons, picture directly on the lens with a transparent background, in other words through the same lens you can see the reality around you and the digital information received from external source in overlay mode.
Enhance your Collaboration Experience by Enabling Pervasive Video on your Cis...Cisco Canada
Shawn Cardinal, Cisco Collaboration CSE discusses enhancing your collaboration experience by enabling pervasive video on your Cisco Unified Communications Manager at Cisco Connect Toronto 2015.
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Cisco Security
Cognitive Threat Analytics is a technology that analyzes web requests to identify Command & Control traffic, identifying threats that are currently present in a network. It is currently available across the entire Cisco Web Security portfolio, including Cloud Web Security (CWS) and the Web Security Appliance (WSA). To learn more, watch this webinar: http://cs.co/9000BuggO
Cisco Ironport WSA- Introduction and Guide in ShortPriyank Sharma
This is a presentation made by me for IRONPORT users, admins or new users who want to understand the terminology of Cisco IRONPORT and its usage. However this is not very elaborate but yes will give you a nice and clear understanding of IRONPORT.
Founded in 1983, Advantech is a leader in providing trusted innovative embedded & automation products and solutions. Advantech offers comprehensive system integration, hardware, software, customer-centric design services, and global logistics support; all backed by industry-leading front and back office e-business solutions. We cooperate closely with our partners to help provide complete solutions for a wide array of applications across a diverse range of industries. Advantech has always been an innovator in the development and manufacturing of high-quality, high-performance computing platforms, and our mission is to empower these innovations by offering trustworthy ePlatform products and services. With Advantech, there is no limit to the applications and innovations our products make possible.
World-class Recognition
Advantech is an authorized alliance partner of both Intel® and Microsoft®. Our customers will find the technologies we use inside our products to be widely compatible with other products in the global marketplace. In 2008, Interbrand, the world renowned brand consulting firm, once again recognized Advantech as one of the Top 10 Taiwanese Global Brands. Advantech appreciates this recognition of our efforts to build a trusted, global brand; it also symbolizes a promise we gave to our business partners, which was to do our best to keep building a trustworthy brand that is recognized everywhere in the world.
Telephone System, Phone System, Business Phone System, VoIP Phone System, Hos...Rob Bliss
Zultys has been recognized as one of the leaders in the IP Telephone System Industry. Selected as the "2009 Internet Telephony" for it's Recognition as a leader in IP Telephone Systems. This is not handed out to any manufacturer, but the ones who like Zultys have continuiously shown consecutive improvement year after year.
2. Icons: Cisco Products Router- Color and subdued Router w/Silicon Switch Protocol Translator CiscoWorks Workstation Terminal Server Access Server NetFlow Router Workgroup Director Network Management Appliance PC Router Card Cisco Hub Server with PC Router Software- Based Router on File Server Bridge Workgroup Switch Color/Subdued Small Hub (10BaseT Hub) 100BaseT Hub CDDI/ FDDI Concentrator PC Adapter Card Wavelength Router TransPath uBR910 Cable DSU Workgroup Switch Voice-Enabled Storage Solution Engine (SSE) IOS SLB Wireless Router
3. Icons: Cisco Products (Cont.) Route/Switch Processor with and without Si VIP PC with Software PC with Router-Based Software Switch Processor ATM Switch LAN2LAN Switch MicroWeb Server ISDN Switch MGX 8000 Multiservice Switch Multi- Switch Device Broadband Router Content Engine Cisco CA Cisco 5500 Family PXF Management Engine (ME 1100) ASIC Processor General Processor IP Transport Concentrator BBSM ITP ATA SIP Proxy Server Voice Gateway
4. Icons: Cisco Products (Cont.) Cisco 4310 End Office System NetRanger NetSonar Cisco 7507 Cisco 7505 Cisco 7500 (7513) Edge Label Switch Router with NetFlow System Controller Cisco Directory Server IP Standard and Old (Some Prefer) Multilayer Switch, with and without Text and Subdued Edge Label Switch Router Cisco 1000 Voice-Enabled Access Server (or Voice Enabled Communications Server) Voice- Enabled Router Program Switch Router with TDM ADM Cisco 6920 RateMux Firewall Services Module Cisco Unity Express
5. Icons: Cisco Products (Cont.) Cisco Security Manager Data Switch Processor, AKA Data Center Switch Data Center Switch, Reversed DSLAM IOS Firewall Cisco CallManager Cisco 6705 Access Server Cisco 6732 Access Server MGX 8220 MGX 8240 MGX 8260 Voice-Enabled ATM Switch Optical Transport Cisco 6701 IP Telephony Router PIX Firewall Right and Left Router with Firewall Centri Firewall
11. Icons: Cisco Products, Optical (Cont.) Unprotected Optical Protected Optical Metro 1500 ONS 15540
12. Icons: Security Secure Switch (Cisco and Subdued Color Schemes) Secure Router (Cisco and Subdued Color Schemes) Secure Catalyst Switch (Cisco and Subdued Color Schemes) Secure Server Security Management (Cisco and Generic Color Schemes) Secure Endpoints (PC and Laptop)
13. Icons: IBM IBM Mainframe IBM Mainframe with FEP FEP (Front End Processor) Cluster Controller/ 3274 or 3174 (Most Common Type) Cluster Controller/3174 (Desktop Model, Not Used Much) IBM Mini (AS400)
14. Icons: WAN DSU/CSU (Add Text in PowerPoint) WAN MUX PBX/ Switch Network Cloud, Standard Color Network Cloud, Dark Network Cloud, Gold Network Cloud, White Hub Gray and Blue Distributed Director Local Director NAT PBX (Small) DPT Ring
15. Icons: LAN Workstation (Sun) PC Mac Terminal ATM/FastGb Etherswitch HP Mini Super- computer LAN2LAN Web Cluster Web Server Printer File Server Mini or VAX/VMS with DECnet Laptop Monitor Newton Web Browser Repeater Intelligence Engine 2100 Series
16. Icons: Media Token Rings, with and without Text and Subdued FDDI Rings, with and without Text, Vertical and Horizontal Line: Serial (Use Thicker where There Is Space) Line: Circuit-Switched (Use Thicker where There Is Space) Line: Ethernet (Use Thicker where There Is Space)
17. Icons: Buildings Government University Small Business Branch Office, Regular, Subdued, and Blue Headquarters, Regular, Subdued, and Blue House, Regular and Blue Telecommuter House (Color and Subdued) Home Office Medium Building, Regular, Subdued, and Blue MDU
18. Icons: People Man Woman Symbol Woman, Various Colors Symbol Man, Various Colors Running Man (Color and Subdued) Running Woman End User, CiscoWorks End User Female, Left and Right End User Male, Left and Right Androgynous Person
19. Icons: Multimedia/Voice/Phone Phone Phone Ethernet Phone Polycom Phone-Appliance Phone Feature Fax/ Phone Cell Phone Camera PC/Video Camera PC/Video Headphones Microphone Speaker Pager Fax Phone 2 Class 4/5 Switch Hoot and Holler Phone Turret BBFW BBFW Media Set Top Box (STB) Television IP Phone Mobile Access Phone
20. Icons: Miscellaneous Firewall, Horizontal and Vertical, Subdued Lock Key Lock and Key Diskette (3.5" Floppy) Breakout Box Host Database, Relational Modem BBS (Bulletin Board System) Satellite Dish Satellite MAU PAD UPS, RPS Car Truck File Cabinet