Dans ce blog, nous discuterons du SD-WAN pour essayer de comprendre son enjeu et avantage pour l’entreprise. Nous commençons par explorer l’offre du marché, définir la technologie et son p...
In this post, we present the work on radio coverage in Wlans, accessible at this address: A novel beamforming based model of coverage and transmission costing in IEEE 802.11 WLAN networks, about how t...
In this post we present the work available at this link: Cognitive directional cost-based transmit power control in IEEE 802.11 WLAN, about the how to model the radio coverage area in enterprise Wlans...
In this blog, we study RPF operation. Introduction This blog is a part of a serie of blogs about multicast routing: Test network In our test network RPF in action At R2 A “show ip interface brief” sho...
In this post let’s detail the operation of PIM (Protocol Independent Multicast) in sparse mode. Previous posts tackled the operation of PIM dense mode. Let’s recall that PIM is the multica...
In this blog, we discuss when a gateway decides that it’s not a good gateway any more and proposes a new gateway to the host by setting redirection. Introduction We explore how a gateway (a rout...
4/5g (1) analytical (1) approach (1) architecte (1) artificial intelligence (1) aws (1) azure (1) bgp (1) casb (1) cfs (1) channel (1) chd (2) chef de projet (1) client (1) cloudwan (1) conception (1) contexte (1) contrat (1) dca (1) demande (1) discours (1) dlp (1) drrm (1) dtls (2) ekinops (1) enterprise (1) entreprise (1) ergonome (1) exploitant (1) exploitation (1) fabric (1) fabric-path (1) fonctionnel (1) fortinet (2) frequency (1) gestion (1) hsrp (1) information technology (1) intégration (1) keepalive (1) l2 (1) l3 (1) lacp (1) livrable (1) lmp (1) machine learning (3) manager (1) mc-lag (1) mec (1) microsoft (1) moa (1) modèle (1) moe (1) nacxwan (1) nfv (1) objet (1) objet-intermédiaire (1) omp (1) overlay (1) palo alto (1) peer-link (1) performance (1) physique (1) policy (3) port-channel (1) power (1) produit (1) protocole (1) routage (1) rrp (1) réalisation (1) rôle (1) sase (1) sateful (1) sd-wan (1) software defined (1) solution (2) spof (1) sso (1) stacking (1) standard (1) stratégie (1) swg (1) switchover (1) technique (1) top-down (1) tpc (1) transmission (1) underlay (1) velocloud (1) viptelia (1) vmware (1) vpc (1) vrrp (1) vsl (1) vss (1) wan (1) wireless (1) wlan (7) étude (1)
- Protected: An Example Network From Scratch… Internet AccessThis content is password protected.
- Protected: An Example Network from Scratch… Build the Wifi NetworkThis content is password protected.
- Protected: An Example Network From Scratch… On-Premise Network Automation With AnsibleThis content is password protected.
- Protected: An Example Network From Scratch… Build your Network SecurityThis content is password protected.
- Travailler Son CVLe CV est une étape importante de toute recherche d’emploi, au moins pour initier le processus (répondre à une offre, candidature spontanée, etc.)… plus encore, c’est une occasion de se poser, de réfléchir son développement, son expérience et de se projeter dans une nouvelle opportunité! Une approche classique du CV Pour nombre de “demandeurs d’emploi”,
| M | T | W | T | F | S | S |
|---|---|---|---|---|---|---|
| 1 | 2 | |||||
| 3 | 4 | 5 | 6 | 7 | 8 | 9 |
| 10 | 11 | 12 | 13 | 14 | 15 | 16 |
| 17 | 18 | 19 | 20 | 21 | 22 | 23 |
| 24 | 25 | 26 | 27 | 28 | 29 | 30 |






