University Notes
Network Address Translation
On completion of this course, you will be able to:
Understand the motivation behind NAT.
Master NAT classification and implementations.
Master NAT selection in different scenarios.
15 Pages
207 Views
0 Downloads
1.26 MB
Uploaded: 2025-01-31
Price: Ksh.50
AAA Principles and Configuration
On completion of this course, you will be able to:
Understand the fundamentals of AAA.
Describe the application scenarios of AAA.
Understand the fundamentals of RADIUS.
Get familiar with the basic configurations of AAA.
13 Pages
161 Views
0 Downloads
574.08 KB
Uploaded: 2025-01-31
Price: Ksh.50
ACL Principles and Configuration
On completion of this course, you will be able to:
Describe the basic principles and functions of ACLs.
Understand the types and characteristics of ACLs.
Describe the basic composition of ACLs and ACL rule ID matching order.
Understand how to use wildcards in ACLs.
Complete the basic configurations of ACLs.
20 Pages
168 Views
0 Downloads
972.72 KB
Uploaded: 2025-01-31
Price: Ksh.100
WLAN Overview
On completion of this course, you will be able to:
Understand basic concepts of WLAN and the history of the 802.11 protocol family.
Learn about different WLAN devices.
Distinguish between different WLAN networking architectures.
Understand the WLAN working process.
Complete basic WLAN configurations.
57 Pages
176 Views
0 Downloads
2.71 MB
Uploaded: 2025-01-31
Price: Ksh.200
Inter-VLAN Communication
On completion of this course, you will be able to:
Methods of implementing inter-VLAN communication.
How to use routers (physical interfaces or sub-interfaces) to implement inter-VLAN
communication.
How to use Layer 3 switches to implement inter-VLAN communication.
How Layer 3 packets are forwarded
17 Pages
149 Views
0 Downloads
1.42 MB
Uploaded: 2025-01-31
Price: Ksh.100
IPv6 Basics
On completion of this course, you will be able to:
Summarize the advantages of IPv6 over IPv4.
Describe the basic concepts of IPv6.
Describe the formats and functions of IPv6 packet headers.
Describe the IPv6 address format and address types.
Describe the method and basic procedure for configuring IPv6 addresses.
Configure IPv6 addresses and IPv6 static routes
26 Pages
184 Views
0 Downloads
2.31 MB
Uploaded: 2025-01-31
Price: Ksh.100
OSPF Basics
On completion of this course, you will be able to:
Describe the advantages and classification of dynamic routing protocols.
Describe basic OSPF concepts and usage scenarios.
Describe the working mechanism of OSPF.
Implement basic OSPF configurations.
24 Pages
195 Views
0 Downloads
1.22 MB
Uploaded: 2025-01-31
Price: Ksh.100
IP Routing Basics
On completion of this course, you will be able to:
Understand the basic principles of routers.
Know how routers select optimal routes.
Understand the contents of routing tables.
Master advanced routing features.
23 Pages
185 Views
0 Downloads
1018.85 KB
Uploaded: 2025-01-31
Price: Ksh.100
Network Layer Protocols and IP Addressing
on completion of this course, you will be able to:
Describe main protocols at the network layer.
Describe the concepts and classification of IPv4 addresses and special IPv4 addresses.
Calculate IP networks and subnets.
Use the IP network address planning method.
25 Pages
208 Views
0 Downloads
744.84 KB
Uploaded: 2025-01-31
Price: Ksh.100
Eth-Trunk iStack and CSS
Trending!
On completion of this course, you will be able to:
Understand the functions of link aggregation.
Understand the link aggregation types.
Understand the link aggregation negotiation process in Link Aggregation Control Protocol (LACP)
mode.
Understand the advantages and principles of iStack and CSS.
Understand the common applications and networking of link aggregation and stacking
technologies.
23 Pages
8663 Views
0 Downloads
866.7 KB
Uploaded: 2025-01-31
Price: Ksh.100
STP Principles and Configuration
On completion of this course, you will be able to:
Describe the causes and problems of Layer 2 loops on a campus switching network.
Describe basic concepts and working mechanism of STP.
Distinguish STP from RSTP and describe the improvement of RSTP on STP.
Complete basic STP configurations.
Understand other methods to eliminate Layer 2 loops on the switching network except STP.
36 Pages
185 Views
0 Downloads
816.84 KB
Uploaded: 2025-01-31
Price: Ksh.100
VLAN Principles and Configuration
On completion of this course, you will be able to:
Understand the background of the VLAN technology.
Identify the VLAN to which data belongs.
Master different VLAN assignment modes.
Describe how data communication is implemented through VLANs.
Master basic VLAN configuration methods
30 Pages
190 Views
0 Downloads
923.67 KB
Uploaded: 2025-01-31
Price: Ksh.100
Ethernet Switching Basics
On completion of this course, you will be able to:
Describe the basic concepts of an Ethernet network.
Distinguish MAC address types.
Get familiar with the working process of a Layer 2 switch.
Get familiar with the structure and generation process of a MAC address table.
23 Pages
184 Views
0 Downloads
899.27 KB
Uploaded: 2025-01-31
Price: Ksh.100
VRP Basics
On completion of this course, you will be able to:
Understand VRP basics.
Learn how to use CLI.
Master basic CLI commands.
24 Pages
152 Views
0 Downloads
661.22 KB
Uploaded: 2025-01-31
Price: Ksh.100
Network Reference Model
On completion of this course, you will be able to:
Understand the data definition and transmission process.
Understand the concepts and advantages of the network reference model.
Understand common standard protocols.
Understand the data encapsulation and decapsulation processes.
22 Pages
159 Views
0 Downloads
1.09 MB
Uploaded: 2025-01-31
Price: Ksh.100
Data Communication Network Basis
On completion of this course, you will be able to:
Understand the concepts related to communication and a data communication
network.
Be able to describe the information transfer process.
Differentiate network devices of different types and understand their basic functions.
Understand different network types and topology types.
Understand the concepts related to network engineering and network engineers.
17 Pages
178 Views
0 Downloads
756.22 KB
Uploaded: 2025-01-31
Price: Ksh.100
ALGORITHMS, FLOWCHARTS, DATA TYPES AND PSEUDOCODE
An algorithm is a representation of a solution to a problem. If a problem can be defined
as a difference between a desired situation and the current situation in which one is, then
a problem solution is a procedure, or method, for transforming the current situation to the
desired one. We solve many such trivial problems every day without even thinking about it, for example making breakfast, travelling to the workplace etc. But the solution to such problems requires little intellectual effort and is relatively unimportant. However, the solution of a more interesting problem of more importance usually involves stating the problem in an understandable form and communicating the solution to others. In the case where a computer is part of the means of solving the problem, a procedure, explicitly stating the steps leading to the solution, must be transmitted to the computer. This concept of problem solution and communication makes the study of algorithms important to computer science.
22 Pages
247 Views
0 Downloads
86.08 KB
Uploaded: 2025-01-31
Price: Ksh.50
CMT 304 :DATA STRUCTURES & ALGORITHMS
Trending!
Data Structures are the programmatic way of storing data so that data can be used efficiently.
Almost every enterprise application uses various types of data structures in one or the other way.
64 Pages
2093 Views
0 Downloads
3.57 MB
Uploaded: 2025-01-31
Price: Ksh.120
INTRODUCTION TO COMPUTER NETWORKS
Exchange of information through the use of speech, signs or symbols is called
communication. When early humans started speaking, some 5,00,000 years ago,
that was the first mode of communication. Before we dive into modern
technologies that drive communication in contemporary world, we need to know
how humans developed better communication techniques to share knowledge with
each other.
31 Pages
222 Views
0 Downloads
1.06 MB
Uploaded: 2025-01-31
Price: Ksh.60
2D GRAPICS USING HTML5 CANVAS
HTML5 canvas provides methods which allow modifications directly to the transformation
matrix. The transformation matrix must initially be the identity transform. It may then be adjusted using the transformation methods.
21 Pages
1672 Views
0 Downloads
311.32 KB
Uploaded: 2025-01-31
Price: Ksh.35