In this post we present the work available at this link: Cognitive directional cost-based transmit power control in IEEE 802.11 WLAN, about the how to model the radio coverage area in enterprise Wlans...
In our test network At R2 A “show ip interface brief” shows Digging into the interface tunnel0 details The tunnel was created by PIM process to join the RP which is R3 The tunnel protocol/transport is...
in this post let’s detail the operation of PIM (Protocol Independent Multicast) in sparse mode. Previous posts tackled the operation of PIM dense mode. Let’s recall that PIM is the multica...
In this blog we explore how a gateway (a router) present in a LAN handles routing to the outside of this network and use redirection to enhance this operation. lab setup Our lab setup is 3 routers: R1...
In this blog let’s try to connect to a home network from outside (internet) in a secure manner using SSL. NAT and PAT NAT and PAT is what allowed local IP addresses translation or mapping to som...
In this post, let’s recall what is subnetting (for routing and switching purposes) and how it is done. introduction and motivation Network subnetting is very important subject that maybe referre...
802.11 (4) application (2) architecture (4) asm (4) automatisation (2) cagd (3) chd (2) cisco (6) command (5) controller (1) cost (6) coverage (5) debug (10) distance (6) dtls (2) dynamic rrm (5) firewall (2) fortinet (2) ieee (4) igmp (5) igp (8) interference (2) internet (3) ip (2) logique (2) loop (5) mac (3) machine learning (3) meraki (1) model (2) mpls (3) mroute (4) multicast (5) nat (2) ndp (2) network (3) next-hop (5) nurbs (3) osi (6) pat (2) pim (4) poisoning (6) projet (2) qos (2) radio (5) rib (5) rip (5) route (6) router (6) routing (15) rpf (4) rrm (10) security (3) show (5) simulation (2) sla (2) snr (2) solution (2) split-horizon (5) sql (1) ssl (2) ssm (4) static (6) stp (2) summarization (5) tcp (2) translation (1) travail (2) udp (2) vpn (3) vrf (3) wifi (11) wireshark (2) wlan (7) wlc (5)
- Protected: An example network from scratch: Internet accessThis content is password protected.
- Protected: An example network from scratch: Build the Wifi NetworkThis content is password protected.
- Protected: An example network from scratch: On-premise Network Automation with AnsibleThis content is password protected.
- Protected: An example network from scratch: Build your security networkThis content is password protected.
- Travailler son CVle CV est une étape importante de toute recherche d’emploi, au moins pour initier le processus (répondre à une offre, candidature spontanée, etc.)… plus encore, c’est une occasion de se poser, de réfléchir son développement, son expérience et de se projeter dans une nouvelle opportunité! une approche classique du CV pour nombre de “demandeurs d’emploi”,
M | T | W | T | F | S | S |
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 | ||
6 | 7 | 8 | 9 | 10 | 11 | 12 |
13 | 14 | 15 | 16 | 17 | 18 | 19 |
20 | 21 | 22 | 23 | 24 | 25 | 26 |
27 | 28 | 29 | 30 | 31 |