This document discusses networking techniques including Frame Relay and OSPF. It begins with an introduction to Frame Relay, describing its components and operation at the data link layer. It then explains OSPF, including its use of the Dijkstra algorithm for routing, key terms like links and routers, and how it is configured on Cisco devices. The presentation provides an overview of these common wide area network protocols.
This slide contains the basic and advanced concept of OSPF routing protocol, according to the latest version of Cisco books, and I presented it at IRAN TIC company. In the next slide, I will upload an attractive advanced feature about OSPF.
ospf is routing protocol.The OSPF protocol is a link state Protocol that handles routing for IP traffic.The two important concepts in case of OSPF are Autonomous Systems and Areas.
This slide contains the basic and advanced concept of OSPF routing protocol, according to the latest version of Cisco books, and I presented it at IRAN TIC company. In the next slide, I will upload an attractive advanced feature about OSPF.
ospf is routing protocol.The OSPF protocol is a link state Protocol that handles routing for IP traffic.The two important concepts in case of OSPF are Autonomous Systems and Areas.
Presentation about interior gateway routing protocol EIGRP which covers most of the concepts and features of the protocol.
Delivered by Dmitry Figol, CCIE R&S #53592.
Presentation about interior gateway routing protocol EIGRP which covers most of the concepts and features of the protocol.
Delivered by Dmitry Figol, CCIE R&S #53592.
PHP is a server-side web programming language that is broadly used for website/web development. Hence, PHP is productive with good security, reliable and fast to customise for developing web applications. We have shared some of the good points bases on that. We hope it will be helpful to you work with it.
Internet Routing Protocols: Fundamental Concepts of Distance-Vector and Link-...Vishal Sharma, Ph.D.
An easy to follow basic presentation designed to explain the core operating principles of link-state and distance-vector routing protocols, which form the basis of OSPF/IS-IS and BGP routing protocols for the Internet, respectively. Adapted and summarized from Christian Huitema's "Routing in the Internet," bringing some of his examples "to life" as it were.
This talk/presentation is useful for...
he Associate level of Cisco Certifications can begin directly with CCNA for network installation, operations and troubleshooting or CCDA for network design. Think of the Associate Level as the foundation level of networking certification.
A PROJECT REPORT
On
CISCO CERTIFIED NETWORK ASSOCIATE
A computer network, or simply a network, is a collection of computer and other hardware components interconnected by communication channels that allow sharing of resources and information. Where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. Simply, more than one computer interconnected through a communication medium for information interchange is called a computer network.
(1) What is the purpose of a VLAN trunkAns) A trunk is a line or .pdfapnashop1
(1) What is the purpose of a VLAN trunk?
Ans) A trunk is a line or link designed to handle many signals simultaneously, and that connects
major switching centers or nodes in communication system. The transmitted data can be voice(as
in the conventinal telephone system) data, computer programs, images, video or control signals.
Trunks are used to interconnect switches to form nerwors, and to interconnect local area
nerworks(LAN) to form wide area networks (WAN) or virtual LAN (VLANs). A trunk often
consists of multiple wires, cables, or fiber opric strands to maximize the available bandwidth and
the number of channels that can be accommodated. A trunk can also be a broadband wireless
link. The use and management of trunks in a communications system is known as trunking. It
minimizes the number of physical signal paths, and thus the total amount of cable hardware,
required to serve a given number of suscribers in a nerwork.
In Cisco networks, trunking is special function can be assigned to a port, making thar port
capable of carrying traffic for any or all of the VLANs accessible by particular switch. such a
port is called a trunk port, in contrast to an access port, which carries traffic only to and from the
specific VLAN assigned to it. A trunk port marks frames with special identifying tags (either ISL
tags or 802.1Q tags) as they pass between switches, so easch frame can be routed to its intended
VLAN. An access port does nor provide such tags, because the VLAN for it is pre-assigned, and
identiying markers are therefore unnecessary.
Trunking:-
1)VLANs are local to each swithc\'s database, and VLAN infromation is not passed between
switches.
2)Trunk linksprovies VLAN identification for frames travelling between switches.
3)Cisco seitches have two Ethernet trunking mechanisms: ISL and IEEE 802.1Q
4)certain types of switches can negotiate trunk links.
5)Trunks carry trafic from all VLANs to and from the switch by default but can be configured to
carry only specified VLAN traffic.
6)Trunk links must be configured to allow trunking on each end of the link
2)Will a router always choose a static route over an OSPF route?
Ans) OSPF is an interior gatway routing protocaol that uses link states rather than distance
vectors for path selecation. OSPF propagates link-state advertisments rather than table updates.
Because only LSAs are exchnged, rather than entire routing table, OSPF nerwork converge more
quickly than RIP nerworks. OSPF supports MD5 and clear text neighbor authentication.
Authentiction should be used with all routing protocols when possible because route
redistribution between OSPF and other protocols when possible because route redistribution
between OSPF and other protocols (like RIP) can potentially be used by attackers to subvert
routing information. If NAT is used, if OSPF is operating on public and private areas, and if
address filtering is required, then you need to run two OSPF processes—one process for the
public areas and one .
Ensure that only reliable networks are set up in your systems by listening to our short Webinar teaching you all about the basics of industrial ethernet communications and computer networking. Starting from the ground up, this presentation covers the basics of how network connections work, and how one computer talks to another.
This presentation by Westermo’s Technical Lead Engineers Dakota Diehl and Benjamin Campbell, is an integral part of the Westermo webinar on January 30th 2020, covering the basics of industrial networking. https://www.westermo.com/news-and-events/webinars/learn-the-basics-of-industrial-ethernet-communications
The webinar, including this presentation, aimed to teach the basics of industrial ethernet communications and computer networking. Starting from the ground up, it covered the basics of how network connections work, and how one computer talks to another.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
5. Network Switches..
A network switch is a small hardware device that joins
multiple computers together within one Local Area
Network(LAN). Technically switches operate at Data-link
Layer. These are almost like HUBS. But unlike HUBS
network switches are capable of inspecting data as it is
recieved, determining the source and destination device of
each packet, and forwarding them appropriately.
6. OSI Model
OSI model consists of seven layers and provides
standards for computer communication
Physical layer is responsible for actual transmission of
bits over the medium
Data Link layer is responsible for node to node delivery
of frames
Network layer is responsible for end to end delivery of
packets, and routing
7. OSI Model
Transport layer is responsible for end to end delivery of
the entire message
Session layer is responsible for establishing, managing
and terminating sessions
Presentation layer is responsible for
translation, encryption and data compression
Application layer is responsible for providing access to
the network
8. FRAMEisRELAY
Frame relay a packet switched connection oriented
WAN service .It operates at the Data link layer of OSI
Model.
Frame carry data between user devices called
Data terminal equipment (DTE) and Data
communication equipment ( DCE) at the edge of the
WAN.
10. Frame relay is a Scalable WAN solution that is often
used as an alternative to leased line when leased line
prove to be cost prohibitive.
Frame relay is a non broadcast multi access
(
NBMA) medium which means that broadcast traffic is
not allowed to traverse Frame relay traffic.
12. Frame Relay Components - II
The basic terms associated with the Frame Relay
network are as follows:
Data Terminal Equipment (DTE)
Data Communications Equipment (DCE)
Access link
Local access rate
DLCI
LMI
Committed Information (CIR)
16. Open Shortest Path First (OSPF)
OSPF is an open standards routing protocol
This works by using the Dijkstra algorithm
OSPF provides the following features:
Minimizes routing update traffic
Allows scalability (e.g. RIP is limited to 15 hops)
Has unlimited hop count
Supports VLSM/CIDR
Allows multi-vendor deployment (open standard)
16
17. OSPF Terms
Link
Backbone area
Router ID
Internal routers
Neighbours
Area Border Router
Adjacency
OSPF Area
(ABR)
Autonomous System
Boundary Router
(ASBR)
17
18. Link
A network or router interface assigned to a given
network
Link (interface) will have "state" information
associated with it
Status (up or down)
IP Address
Network type (e.g. Fast Ethernet)
Bandwidth
Addresses of other routers attached to this interface
18
19. OSPF Term: Link
A link is a network or router interface assigned to any given
network
This link, or interface, will have state information associated
with it (up or down) as well as one or more IP addresses
19
20. OSPF Term: Link State
Status of a link between two routers
Information is shared between directly connected routers.
This information propagates throughout the network unchanged and
is also used to create a shortest path first (SPF) tree.
20
21. Router ID
The Router ID (RID) is an IP address used to identify the router
Cisco chooses the Router ID by using the highest IP address of all
configured loopback interfaces
If no loopback interfaces are configured with addresses, OSPF will
choose the highest IP address of all active physical interfaces.
You can manually assign the router ID.
The RID interface MUST always be up, therefore loopbacks are
preferred
21
22. Neighbours
Neighbours are two or more routers that have an
interface on a common network
E.g. two routers connected on a serial link
E.g. several routers connected on a common Ethernet
or Frame relay network
Communication
takes place between / among
neighbours
neighbours form "adjacencies"
22
23. Adjacency
A relationship between two routers that permits the
direct exchange of route updates
Not all neighbours will form adjacencies
This is done for reasons of efficiency – more later
23
24. OSPF Design
Each router connects to the backbone called area 0, or the backbone area.
Routers that connect other areas to the backbone within an AS are called Area Border Routers (ABRs). One
interface must be in area 0.
OSPF runs inside an autonomous system, but can also connect multiple autonomous systems together. The
router that connects these ASes together is called an Autonomous System Boundary Router (ASBR).
24
26. OSPF Configuration
OSPF Process ID number is irrelevant. It can be the same on every
router on the network
The arguments of the network command are the network number
(10.0.0.0) and the wildcard mask (0.255.255.255)
Wildcards - A 0 octet in the wildcard mask indicates that the
corresponding octet in the network must match exactly
A 255 indicates that you don’t care what the corresponding octet is
in the network number
A network and wildcard mask combination of 1.1.1.1 0.0.0.0 would
match 1.1.1.1 only, and nothing else.
The network and wildcard mask combination of 1.1.0.0 0.0.255.255
would match anything in the range 1.1.0.0–1.1.255.255
26