<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-6168572102412770513</id><updated>2024-12-18T19:26:36.202-08:00</updated><category term="NETWORK"/><category term="مقالات"/><category term="صيانة وبرامج"/><category term="حصريات"/><category term="مجانيات"/><category term="اسلاميات"/><category term="بلوجر"/><category term="فايسبوك"/><title type='text'>عالم الابداع</title><subtitle type='html'></subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://ibda3four.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6168572102412770513/posts/default'/><link rel='alternate' type='text/html' href='http://ibda3four.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/6168572102412770513/posts/default?start-index=26&amp;max-results=25'/><author><name>ibda3four</name><uri>http://www.blogger.com/profile/12166158855015146950</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>31</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-6168572102412770513.post-6596115211082446922</id><published>2014-07-25T05:42:00.003-07:00</published><updated>2014-07-25T05:42:56.700-07:00</updated><title type='text'>Router CISCO 1 </title><content type='html'>&lt;div dir=&quot;rtl&quot; style=&quot;text-align: right;&quot; trbidi=&quot;on&quot;&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;h2 class=&quot;post-title entry-title&quot; dir=&quot;ltr&quot; itemprop=&quot;name&quot; style=&quot;text-align: left;&quot;&gt;
Router CISCO 1
&lt;/h2&gt;
&lt;/blockquote&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUEE51JmXxteeo6RJt507hEZu7VENHpLULP-rjK3hQjnwFIv5VgL6SpMINinist1JPhdKZ6OcIFWlbOIHiMSkViHIpur08n7v96fYvXniifOOkpsa-Jbk3dlFiZlf3W4HOmAjLgXthYAdR/s1600/dc975_WRT54G_v2_Linksys_Router_Digon3.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUEE51JmXxteeo6RJt507hEZu7VENHpLULP-rjK3hQjnwFIv5VgL6SpMINinist1JPhdKZ6OcIFWlbOIHiMSkViHIpur08n7v96fYvXniifOOkpsa-Jbk3dlFiZlf3W4HOmAjLgXthYAdR/s1600/dc975_WRT54G_v2_Linksys_Router_Digon3.jpg&quot; height=&quot;180&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;h3&gt;
&lt;ol style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&amp;nbsp;Hardware&lt;/li&gt;
&lt;/ol&gt;
&lt;/h3&gt;
&lt;h4&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&amp;nbsp;Structure&lt;/li&gt;
&lt;/ul&gt;
&lt;/h4&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;b&gt;Unité centrale&lt;/b&gt; (CPU) L’unité centrale, ou le 
microprocesseur, est responsable de l’exé- cution du système 
d’exploitation (chez Cisco, c’est IOS) du routeur. Le système 
d’exploita- tion prend aussi bien en charge les protocoles que 
l’interface de commande via une session telnet. La puissance du 
microprocesseur est directement liée à la puissance de traitement du 
routeur .&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;b&gt;&amp;nbsp;Mémoire Flash La ﬂash&lt;/b&gt; représente une sorte de ROM 
effaçable et programmable. Sur beaucoup de routeurs, la ﬂash est utilisé
 pour maintenir une image d’un ou plusieurs sys- tèmes d’exploitation. 
Il est tout à fait possible de maintenir plusieurs images sur la même 
ﬂash (suivant la taille de la ﬂash). La mémoire ﬂash est pratique car 
elle permet une mise à jour de la mémoire sans changer des “chips”. La 
ﬂash peut se présenter sous forme de barette mais aussi sous forme de 
carte.&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;b&gt; ROM La ROM&lt;/b&gt; contient le code pour réaliser les diagnostics
 de démarrage (POST : Po- wer On Self Test). En plus, la ROM permet le 
démarrage et le chargement du système d’exploitation contenu sur la 
ﬂash. On change rarement la ROM. Si on la change, on doit souvent 
enlever des “chips” et les remplacer.&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;b&gt; RAM La RAM&lt;/b&gt; est utilisé par le système d’exploitation pour
 maintenir les informations durant le fonctionnement. Elle peut contenir
 les tampons (buffer), les tables de routage, la table ARP, la 
conﬁguration mémoire et un nombre important d’autres choses. Et comme 
c’est de la RAM, lors de la coupure de l’alimentation, elle est effacée.&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;b&gt;NVRAM (RAM non volatile)&lt;/b&gt; Le problème de la RAM est la 
non-conservation des don- nées après la coupure de l’alimentation. La 
NVRAM solutionne le problème, puisque les données sont conservées même 
après la coupure de l’alimentation. L’utilisation de la NVRAM permet de 
ne pas avoir de mémoire de masse (Disques Durs, Floppy). Cela évite donc
 les pannes dues à une partie mécanique. La conﬁguration est maintenue 
dans la NVRAM.&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;b&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Portes I/O&lt;/b&gt; La structure même d’un routeur est l’ouverture
 donc l’interfaçage vers le monde extérieur est important. Il existe un 
nombre impressionant d’interfaces possibles pour un routeur (Liaison 
série asynchrone, synchrone, ethernet, tokenring, ATM, Sonet, FO, ...). 
La vitesse du bus qui interconnecte les I/O avec les différents 
composants du routeur marque aussi la puissance de traitement du 
routeur.&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;ul dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;
Processus de démarrage&lt;/h4&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/blockquote&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&amp;nbsp;&lt;img class=&quot;CSS_LIGHTBOX_SCALED_IMAGE_IMG&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbK7hoe8JjDE7BvxC32CCYUB-8k1EZX_ZzsTNKxuWu_dtWrPDgy8Ou1WU95AFVG1ugd16PfkhlIo8u53teDhx-iCUGZxiRWCdL-HF-mJ12Qtck-drQZ3oNBVKHHrFUjXqepuoix-iDrij2/s1600/DDDDDD.png&quot; style=&quot;height: 585px; width: 600px;&quot; /&gt;&lt;/div&gt;
&lt;/blockquote&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&amp;nbsp;&lt;b&gt;2.&lt;span style=&quot;text-align: left;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;text-align: right;&quot;&gt;Software (IOS)&lt;/span&gt;&lt;/b&gt;
&lt;/div&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&lt;b&gt;Porte console&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
La conﬁguration de base d’un routeur Cisco (et des autres aussi) se fait
 en général via la porte console. La porte console, sur un routeur, est 
conﬁgurée comme une interface DTE (Data Terminal Equipment). Mais la 
porte RS232 d’un PC est aussi une interface&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
DTE, c’est pour cela que vous ne pouvez connecter un cable série 
directement sur la porte console. La solution est d’utiliser un cable 
croisé (entre le ﬁl 2 &amp;amp; 3) avec les différents ﬁls de signaux. Le 
cable de console est souvent fourni en standard avec les routeurs Cisco.
 La connexion s’effectue, en standard, à 9600bauds avec 8 bits de data, 1
 bit stop et pas de parité. Vous pouvez utiliser votre émulateur de 
terminal favori&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&amp;nbsp;Interpreteur de commande (CLI exec)&lt;/li&gt;
&lt;/ul&gt;
&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
L’interpreteur de commande, comme son nom l’indique, est responsable de 
l’interpré- tation des commandes que vous tapez. La commande 
interprétée, si elle est correcte, réalise l’opération demandée&amp;nbsp;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
Si lors de la conﬁguration initiale un (ou des) password a été conﬁguré,
 vous devez intro- duire ce password pour accéder à l’interpreteur de 
commande. Il y a 2 modes d’execution sur un routeur Cisco :&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
1. Le mode utilisateur (prompt : &amp;gt;)&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
2. Le mode privilégié (prompt : #)&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
Lors de la connexion initiale avec le routeur, vous arrivez dans le mode
 utilisateur. Pour passer au mode privilégié, vous devez introduire la 
commande enable et ensuite introduire un mot de passe. Le mode 
utilisateur sert uniquement à la visualisation des paramètres (pas de la
 conﬁguration) et des différents status du routeur.Par contre, le mode 
privilégié permet, en plus de la visualisation des paramètres, la 
conﬁguration du routeur et le changement de paramètres dans la 
conﬁguration. L’interpreteur de commande des routeurs Cisco est très 
souple et vous permet de de- mander les commandes disponibles. Vous 
désirez savoir les commandes qui commencent par “ho”, rien de plus 
simple, ho ? &amp;lt;enter&amp;gt;. Il est aussi possible d’utiliser l’expansion
 de commande comme sous Unix (avec la touche de tabulation). Si il n’y 
pas de confu- sions possibles, vous pouvez utiliser les abbréviations de
 commande. Par exemple, sh ip int brie au lieux de show ip interface 
brief. Cela permet de gagner du temps et de rendre la vie un peu plus 
facile.&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&lt;b&gt;&amp;nbsp;Les ﬁchiers de conﬁguration&lt;/b&gt;&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
Dans un routeur cisco (en général), il existe différents ﬁchiers de 
conﬁguration. Il y a un ﬁchier de conﬁguration dans la nvram 
(startup-conﬁg), qui est lu au démarrage du routeur et copié en mémoire.
 Il y a un autre ﬁchier de conﬁguration dans la mémoire vive 
(running-conﬁg). La “startup-conﬁg” est conservée dans la nvram sous 
forme ASCII. Tandis que la “running-conﬁg” est dans la ram sous forme 
binaire.&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;/blockquote&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://ibda3four.blogspot.com/feeds/6596115211082446922/comments/default' title='تعليقات الرسالة'/><link rel='replies' type='text/html' href='http://ibda3four.blogspot.com/2014/07/router-cisco-1_25.html#comment-form' title='0 تعليقات'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6168572102412770513/posts/default/6596115211082446922'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6168572102412770513/posts/default/6596115211082446922'/><link rel='alternate' type='text/html' href='http://ibda3four.blogspot.com/2014/07/router-cisco-1_25.html' title='Router CISCO 1 '/><author><name>ibda3four</name><uri>http://www.blogger.com/profile/09723967657009037807</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUEE51JmXxteeo6RJt507hEZu7VENHpLULP-rjK3hQjnwFIv5VgL6SpMINinist1JPhdKZ6OcIFWlbOIHiMSkViHIpur08n7v96fYvXniifOOkpsa-Jbk3dlFiZlf3W4HOmAjLgXthYAdR/s72-c/dc975_WRT54G_v2_Linksys_Router_Digon3.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6168572102412770513.post-8082025817499723841</id><published>2014-07-21T15:52:00.001-07:00</published><updated>2014-07-21T15:52:42.273-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="NETWORK"/><category scheme="http://www.blogger.com/atom/ns#" term="حصريات"/><category scheme="http://www.blogger.com/atom/ns#" term="مقالات"/><title type='text'>Médias de cuivres cisco CCNA</title><content type='html'>&lt;div dir=&quot;rtl&quot; style=&quot;text-align: right;&quot; trbidi=&quot;on&quot;&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;h2 style=&quot;text-align: center;&quot;&gt;
&amp;nbsp;Médias de cuivres &amp;nbsp;&lt;/h2&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot;&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&lt;span style=&quot;background-color: cyan;&quot;&gt;&amp;nbsp;&lt;b&gt;Le câble à paires torsadées non blindées &amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot;&gt;
Le câble UTP est composé de 4 paires de fils torsadées 2 à 2, chacune de ses paires étant isolées des autres. Ce câble compte uniquement sur l&#39;effet d&#39;annulation produit par les paires torsadées pour limiter la dégradation du signal causée par une perturbation électromagnétique et une interférence radioélectrique. &amp;nbsp;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot;&gt;
Annulation : Afin de réduire au maximum la diaphonie entre les paires d&#39;un câble à paires torsadées non blindées, le nombre de torsades des paires de fils doit respecter exactement le nombre de torsades permises par mètre de câble.&amp;nbsp;&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; Lorsque le câble à paires torsadées non blindées est utilisé comme média de réseau, il comporte quatre paires de fils de cuivre. La paire torsadée non blindée utilisée comme média de réseau a une impédance de 100 ohms. Ceci la différencie des autres types de câblage à paires torsadées comme ceux utilisés pour le câblage téléphonique. &amp;nbsp;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
Comme le câble à paires torsadées non blindées à un diamètre extérieur de 0,43 mm et un coût relativement faible, sa petite taille peut s&#39;avérer avantageuse lors d&#39;une installation. &amp;nbsp;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;u&gt;&lt;span style=&quot;color: red;&quot;&gt;Avantages :&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
• Simple à installer&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
• Peu coûteux&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
• Petit diamètre (pour installation dans des conduits existants) &amp;nbsp;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;u&gt;&lt;span style=&quot;color: red;&quot;&gt;Inconvénient :&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
 • Sensible aux interférences&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&amp;nbsp;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&amp;nbsp;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzoSfDiYYDBmuAswZQ2S72xC3ipCrbM9D01a_s0VR7lVaEH0IGpjhbfVfBU_sikDRgBEhA_kWlyz0iTZyQNyFwOPtYK5aK-huE5CnOawKtNW9NAlEGuRcw803NK4e4xHW1BYZTSTVfhO_z/s1600/444444.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzoSfDiYYDBmuAswZQ2S72xC3ipCrbM9D01a_s0VR7lVaEH0IGpjhbfVfBU_sikDRgBEhA_kWlyz0iTZyQNyFwOPtYK5aK-huE5CnOawKtNW9NAlEGuRcw803NK4e4xHW1BYZTSTVfhO_z/s1600/444444.png&quot; height=&quot;150&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&lt;span style=&quot;background-color: cyan;&quot;&gt;&amp;nbsp;&lt;b&gt;Le câble à paires torsadées &amp;nbsp;blindées &amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&amp;nbsp; &amp;nbsp; Le câble à paires torsadées et blindées, ou STP, ajoute aux spécifications de l’UTP une méthode de blindage, d&#39;annulation et de torsion de câbles. Comme le précise les spécifications pour les installations de réseau Ethernet, des câbles à paires torsadées blindées de 100 ohms correctement installés offrent une résistance à l&#39;interférence électromagnétique, ainsi qu’à l&#39;interférence de radiofréquences, sans toutefois augmenter sensiblement la taille ou le poids du câble. &amp;nbsp;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&amp;nbsp; &amp;nbsp;Le câble à paires torsadées blindées présente tous les avantages et désavantages du câble à paires torsadées non blindées en assurant cependant une plus grande protection contre toute interférence externe au prix certes d’un diamètre plus élevé. &amp;nbsp;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&amp;nbsp; &amp;nbsp; Le blindage de ce type de câble doit être mis à la terre lors de son installation, si cela n’est pas effectué correctement, de nombreux problèmes peuvent survenir, car le blindage agit comme une antenne en absorbant les signaux électriques des autres fils du câble et des parasites électriques externes au câble. &amp;nbsp;&lt;/blockquote&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2dEGaMUT4gNlCRTd0CGU3-QojKMQ7ggpS34EGmmDK4nuIXw9iDobgApvw1zDmS5O5AzhSYG7m4pY2EAMVDpIcSKz8S-JHtd2KIR2aktTp8vnb3HoOceLE0eaCGdoctPeyWaDptVvOiTwj/s1600/3333.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2dEGaMUT4gNlCRTd0CGU3-QojKMQ7ggpS34EGmmDK4nuIXw9iDobgApvw1zDmS5O5AzhSYG7m4pY2EAMVDpIcSKz8S-JHtd2KIR2aktTp8vnb3HoOceLE0eaCGdoctPeyWaDptVvOiTwj/s1600/3333.png&quot; height=&quot;157&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&amp;nbsp;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&lt;b style=&quot;background-color: cyan;&quot;&gt;&amp;nbsp;Le câble coaxial &amp;nbsp;&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&amp;nbsp; &amp;nbsp;Un câble coaxial est constitué d’un fil de cuivre entouré d’un isolant flexible, lui-même entouré d’une torsade de cuivre ou d’un ruban métallique qui agit comme le second fil du circuit et comme protecteur du conducteur intérieur. Cette deuxième couche ou protection peut aider à réduire les interférences externes. Une gaine de câble enveloppe ce blindage. &amp;nbsp;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&amp;nbsp; &amp;nbsp; Le câble coaxial offre de nombreux avantages du fait de sa capacité à s’étendre sur une plus grande distance et de son coût parmi les plus faibles. C’est une technologie utilisée depuis de nombreuses années pour tous les types de communications de données. &amp;nbsp;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
Le câble coaxial existe en plusieurs variantes :&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;background-color: red;&quot;&gt;•&lt;u&gt; Thicknet&lt;/u&gt;&lt;/span&gt; : Epais et raide à cause de son blindage, il est recommandé pour l&#39;installation de câble fédérateur. Sa gaine est jaune.&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
 • &lt;u&gt;&lt;span style=&quot;color: red;&quot;&gt;Thinnet&lt;/span&gt;&lt;/u&gt; : D’un diamètre plus réduit, il est plus pratique dans des installations comprenant des courbes. De plus, il est plus économique, mais dispose d’un blindage moins conséquent.&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
• &lt;span style=&quot;color: red;&quot;&gt;&lt;u&gt;Cheapernet&lt;/u&gt; :&lt;/span&gt; Version économique et de faible diamètre du câble coaxial&lt;/blockquote&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPEmFR1Lgi0b48W0dhrCyRiIhnA6wbARjmrTVpCfyJrWgQizgNe9E8rD7Ob_D5hyphenhyphen4MGQW_Enb35N692OwsRd9GfFGP9E3BUExMaSxdGXaWeLmdYThj3Qi4FktSt16LfdMzKgBzynz4-8ey/s1600/2222.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPEmFR1Lgi0b48W0dhrCyRiIhnA6wbARjmrTVpCfyJrWgQizgNe9E8rD7Ob_D5hyphenhyphen4MGQW_Enb35N692OwsRd9GfFGP9E3BUExMaSxdGXaWeLmdYThj3Qi4FktSt16LfdMzKgBzynz4-8ey/s1600/2222.png&quot; height=&quot;270&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&amp;nbsp;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp;Il importe d&#39;apporter une attention particulière à la mise à la terre. On doit assurer une solide connexion électrique aux deux extrémités du câble. Manquer à ce principe entraîne des parasites électriques qui causent une interférence au niveau de la transmission du signal du média réseau. &amp;nbsp;&amp;nbsp;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&lt;b style=&quot;background-color: cyan;&quot;&gt;&amp;nbsp;Les connecteurs RJ-45 &amp;nbsp;&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&amp;nbsp; &amp;nbsp;Le raccordement 10BaseT standard (le connecteur de point d&#39;extrémité sans prise) est le RJ-45. Il réduit les parasites, la réflexion et les problèmes de stabilité mécanique et ressemble à une prise téléphonique, sauf qu&#39;il compte huit conducteurs au lieu de quatre. &amp;nbsp;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp;Il s&#39;agit d&#39;un composant réseau passif, car il sert uniquement au passage du courant entre les quatre paires torsadées de câbles torsadés de catégorie 5 et les broches du connecteur RJ-45. &amp;nbsp;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp;Les connecteurs RJ-45 s&#39;insèrent dans les réceptacles ou les prises RJ-45. Les prises mâles RJ-45 ont huit connecteurs qui s&#39;enclenchent avec la prise RJ-45.De l&#39;autre côté de la prise RJ-45, il y a un bloc où les fils sont séparés et fixés dans des fentes avec l&#39;aide d&#39;un outil semblable à une fourche. Ceci offre un passage de courant en cuivre aux bits.&amp;nbsp;&lt;/blockquote&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRPALl96nX32Kgjl7s_xsLQPP4ugBsnFv_iSrQNqQdEC93dE3iLgc77Xur-JRxzK9AYdoHttwY3A6p0X8sFUs5dhdKJK7n4Xx_lTjGfepgAOEdY5Xcg_s-0QbqxZVSWlpjrTwR0D8XCcco/s1600/1111.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRPALl96nX32Kgjl7s_xsLQPP4ugBsnFv_iSrQNqQdEC93dE3iLgc77Xur-JRxzK9AYdoHttwY3A6p0X8sFUs5dhdKJK7n4Xx_lTjGfepgAOEdY5Xcg_s-0QbqxZVSWlpjrTwR0D8XCcco/s1600/1111.png&quot; height=&quot;255&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://ibda3four.blogspot.com/feeds/8082025817499723841/comments/default' title='تعليقات الرسالة'/><link rel='replies' type='text/html' href='http://ibda3four.blogspot.com/2014/07/medias-de-cuivres-cisco-ccna.html#comment-form' title='0 تعليقات'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6168572102412770513/posts/default/8082025817499723841'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6168572102412770513/posts/default/8082025817499723841'/><link rel='alternate' type='text/html' href='http://ibda3four.blogspot.com/2014/07/medias-de-cuivres-cisco-ccna.html' title='Médias de cuivres cisco CCNA'/><author><name>ibda3four</name><uri>http://www.blogger.com/profile/12166158855015146950</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzoSfDiYYDBmuAswZQ2S72xC3ipCrbM9D01a_s0VR7lVaEH0IGpjhbfVfBU_sikDRgBEhA_kWlyz0iTZyQNyFwOPtYK5aK-huE5CnOawKtNW9NAlEGuRcw803NK4e4xHW1BYZTSTVfhO_z/s72-c/444444.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6168572102412770513.post-556987996755550730</id><published>2014-07-20T15:42:00.003-07:00</published><updated>2014-07-20T15:42:25.495-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="NETWORK"/><category scheme="http://www.blogger.com/atom/ns#" term="حصريات"/><category scheme="http://www.blogger.com/atom/ns#" term="مقالات"/><title type='text'>Couche 1 : Médias et équipements réseau  </title><content type='html'>&lt;div dir=&quot;rtl&quot; style=&quot;text-align: right;&quot; trbidi=&quot;on&quot;&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;h2 style=&quot;text-align: center;&quot;&gt;
Couche 1 : Médias et équipements réseau &amp;nbsp;&lt;/h2&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
1. &lt;span style=&quot;color: blue;&quot;&gt;Les notions de base sur les signaux et le bruit dans les systèmes de communication &amp;nbsp;&lt;/span&gt;&lt;/h3&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&amp;nbsp;&lt;b style=&quot;background-color: yellow;&quot;&gt;Comparaison des signaux analogique et numériques &amp;nbsp;&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&amp;nbsp; &amp;nbsp; Lors de l’envoi de données sur un réseau, celles-ci transitent par des liaisons physiques, il convient donc d’observer comment sont-elles représentés dans ces liaisons.&amp;nbsp;&lt;/blockquote&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3WVQKUg-0PSdeGlK2kLW4Tx78VQuWk8KAboljC5CAe-td-4n3uDTqxZWf3CYXsqSag21mVP_6wmRefWiQ59rPjEuJxldOvrQ_vtHeKvrt2IwydLR1dqF0JTvx-yl_RxDFfuGu6o8GwXBG/s1600/01.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3WVQKUg-0PSdeGlK2kLW4Tx78VQuWk8KAboljC5CAe-td-4n3uDTqxZWf3CYXsqSag21mVP_6wmRefWiQ59rPjEuJxldOvrQ_vtHeKvrt2IwydLR1dqF0JTvx-yl_RxDFfuGu6o8GwXBG/s1600/01.png&quot; height=&quot;151&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;background-color: cyan;&quot;&gt;&amp;nbsp;Signal&lt;/span&gt; : &lt;/b&gt;tension électrique souhaitée, modèle d’impulsions lumineuses ou encore onde électromagnétique modulée. Il permet d’acheminer les données dans le média. &amp;nbsp;&amp;nbsp;&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp;Le signal numérique dispose d’un graphique de tension que l’on va définir comme « sautillant », il se rapproche d’une onde carrée ou la tension passe quasi instantanément d’un état de basse tension à un état de haute tension. &amp;nbsp;&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&amp;nbsp; &amp;nbsp; Le signal analogique présente les caractéristiques suivantes :&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
 • Il oscille&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
• Son graphique de tension varie constamment en fonction du temps et peut être représenté par une sinusoïde&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
• Il est utilisé pour les télécommunications depuis le début o Exemple : téléphone et radio &lt;br /&gt;Les deux caractéristiques importantes d’une onde sont son amplitude (A), c’est-à-dire sa hauteur et sa longueur, ainsi que sa période. La fréquence de l’onde peut être calculée avec cette formule : f = 1/T.&lt;br /&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&lt;span style=&quot;background-color: yellow;&quot;&gt;&amp;nbsp;&lt;b&gt;La représentation d&#39;un bit dans un média physique &amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&amp;nbsp; &amp;nbsp; Un bloc d&#39;information est un élément binaire, connu sous le nom de bit ou impulsion. Un bit, dans un milieu électrique, est un signal correspondant à un 0 binaire ou à un 1 binaire. Cela peut être aussi simple que 0 (zéro) volts pour un 0 en binaire, et +5 volts pour un 1 binaire, ou un codage plus complexe. &amp;nbsp;&amp;nbsp;&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&amp;nbsp; &amp;nbsp; La mise à la terre de référence est un concept important concernant tous les médias de gestion réseau qui emploient des tensions pour diffuser des messages. C’est une masse électrique permettant d’établir une tension zéro dans un graphique de signalisation &amp;nbsp;&lt;br /&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&lt;span style=&quot;background-color: yellow;&quot;&gt;&amp;nbsp;&lt;b&gt;Les facteurs pouvant affecter un bit &amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&amp;nbsp; Il existe différents facteurs pouvant affecter le signal et de ce fait les bits transportés sur le média : &amp;nbsp;&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhNNS_Ediv_oPKkMjw46UAqO4DWhnKR8QjhSms6YOQUZtcwRcHGLRUrpww_TU06aYwOOeeV1zhtWrnaVAQCQX5WvvMRHr78Z6hdSgiLXECaffrYXDPiGEqeEwkgDPJ8P1e5yEjDhmxiikjV/s1600/02.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhNNS_Ediv_oPKkMjw46UAqO4DWhnKR8QjhSms6YOQUZtcwRcHGLRUrpww_TU06aYwOOeeV1zhtWrnaVAQCQX5WvvMRHr78Z6hdSgiLXECaffrYXDPiGEqeEwkgDPJ8P1e5yEjDhmxiikjV/s1600/02.png&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;background-color: cyan;&quot;&gt;&lt;u&gt;&lt;b&gt;La propagation de signaux réseau :&lt;/b&gt;&lt;/u&gt;&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;Le terme de propagation fait référence au temps&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
que met un bit, c&#39;est-à-dire une impulsion,&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
à se déplacer dans le média. Il est impératif&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
que la propagation soit homogène dans le réseau.&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
 &lt;br /&gt;&lt;u style=&quot;background-color: cyan;&quot;&gt;&lt;b&gt;L’atténuation du signal réseau : &lt;/b&gt;&amp;nbsp;&lt;/u&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
Perte de la force du signal. Ce problème est limitable par un bon choix des médias réseau utilisés&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;background-color: cyan;&quot;&gt;&lt;b&gt;&lt;u&gt;La réflexion réseau : &lt;/u&gt;&lt;/b&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;Retour d’énergie causée par le passage des impulsions dans le média. Si ce retour est trop fort, il peut perturber le signal des impulsions suivantes. Le système binaire, et donc à 2 états, peut être perturbé par ces énergies supplémentaires se déplaçant dans le média. &amp;nbsp;&lt;/blockquote&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;background-color: cyan;&quot;&gt;&lt;b&gt;&lt;u&gt;Le bruit :&lt;/u&gt;&lt;/b&gt; &lt;/span&gt;Ajout indésirable à un signal.&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
Des sources d’énergie situées à proximité&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCtqRDZmSGviuX3Cvm47l_mUXRQOKJvjK21rXRTzEoZo6tBKLzAlDs472cS8tfsrdP81rlerFvqRV8A6QCuZ6v_3dmnfoMz5hGUvQ9C8SH2ZmkOJByM_VXAsIYZixkzcYKHxUDDAKa7BjR/s1600/03.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCtqRDZmSGviuX3Cvm47l_mUXRQOKJvjK21rXRTzEoZo6tBKLzAlDs472cS8tfsrdP81rlerFvqRV8A6QCuZ6v_3dmnfoMz5hGUvQ9C8SH2ZmkOJByM_VXAsIYZixkzcYKHxUDDAKa7BjR/s1600/03.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
 du média fournissent un supplément d’énergie venant perturber le signal.&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;b&gt;--&lt;span style=&quot;color: red;&quot;&gt;Diaphonie&lt;/span&gt;&lt;/b&gt; : bruit ajouté au signal d’origine&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
d’un conducteur par l’action du champ&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
magnétique provenant d’un autre conducteur &lt;br /&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;--Paradiaphonie&lt;/span&gt;&lt;/b&gt; : diaphonie causée par un&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
conducteur interne au câble &lt;br /&gt;Le bruit peut être causé par des sources&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
 d’alimentations externes, des variations thermiques,&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
des interférences électromagnétiques ou encore&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
 des interférences de radio fréquences&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;background-color: cyan;&quot;&gt;&lt;b&gt;&lt;u&gt;La dispersion&lt;/u&gt;&lt;/b&gt; :&lt;/span&gt; Étalement des impulsions dans le temps.&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
 Si la dispersion est trop forte, le signal&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjAYmb2be2HlNO6FYBJFoKQ0v7MMGa4P3Dh0IAhFX9sUAGb1hOkC0XM532koWHiAWUvX4igmmcI08jjGNMreBCcLok-oQTKTtGmimweqlvqeh9lyVqGl08HTdYGqvWy5I1fjzy2Ory8hDYX/s1600/04.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjAYmb2be2HlNO6FYBJFoKQ0v7MMGa4P3Dh0IAhFX9sUAGb1hOkC0XM532koWHiAWUvX4igmmcI08jjGNMreBCcLok-oQTKTtGmimweqlvqeh9lyVqGl08HTdYGqvWy5I1fjzy2Ory8hDYX/s1600/04.png&quot; height=&quot;320&quot; width=&quot;268&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
 d’un bit peut recouper le signal du précédent ou du suivant.&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
La durée d’une impulsion est fixe, la dispersion correspond&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
à une modification de cette durée au fur et à mesure&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
 que le signal se propage dans le média. &amp;nbsp;&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;b&gt;&lt;u&gt;&lt;span style=&quot;background-color: cyan;&quot;&gt;La gigue &lt;/span&gt;:&lt;/u&gt;&lt;/b&gt; Les systèmes numériques sont synchronisés,&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
tout est réglé par des impulsions d’horloge.&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
Si les horloges de la source et du destinataire&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
 ne sont pas synchronisées, on obtient alors&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
« une gigue de synchronisation ».&amp;nbsp;&lt;/blockquote&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;background-color: cyan;&quot;&gt;&lt;b&gt;&lt;u&gt;La latence&lt;/u&gt;&lt;/b&gt; &lt;/span&gt;: Retard de transmission.&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCYve0STC_fHB-Amoj8G_JrAhaBHhS2Fypl6uwylovOVVfGpqL0JFM5vzQpPJvuf8O4Qgh0WtbVvO0aRbWt7Dtg0KhsNtuLfordbkzi2Asxilel2MaycL44bFzqvmvklbh3oJc_o-jQf5n/s1600/05.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCYve0STC_fHB-Amoj8G_JrAhaBHhS2Fypl6uwylovOVVfGpqL0JFM5vzQpPJvuf8O4Qgh0WtbVvO0aRbWt7Dtg0KhsNtuLfordbkzi2Asxilel2MaycL44bFzqvmvklbh3oJc_o-jQf5n/s1600/05.png&quot; height=&quot;320&quot; width=&quot;245&quot; /&gt;&lt;/a&gt; Principalement du au déplacement du signal dans le média&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
et à la présence de composants électroniques entre la source et la destination.&amp;nbsp;&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;b&gt;&lt;u&gt;&lt;span style=&quot;background-color: cyan;&quot;&gt;Les collisions&lt;/span&gt; &lt;/u&gt;&lt;/b&gt;: Se produit lorsque 2 ordinateurs&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
utilisant le même segment de réseau émettent en même temps.&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
 Les impulsions se mélangent, détruisant alors les données.&lt;/blockquote&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp;Dès qu’un bit accède au média, il est sujet à tous ces paramètres pouvant perturber la transmission. Dans la mesure où le but n’est pas de transmettre un bit, mais des quantités gigantesques (parfois 1 milliard de bits à la seconde) ; ces paramètres ne sont pas à négliger, car le moindre défaut peut avoir des conséquences importantes sur la qualité de la transmission. &lt;br /&gt;Il faut aussi savoir qu’une liaison entre 2 équipements A et B peut être :&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;• Simple (unidirectionnelle) : A est toujours l&#39;émetteur et B le récepteur. C&#39;est ce que l&#39;on trouve par exemple entre un banc de mesure et un ordinateur recueillant les données mesurées. &amp;nbsp; &amp;nbsp; &amp;nbsp; • Half-duplex (bidirectionnelle à l&#39;alternat) : Le rôle de A et B peut changer, la communication change de sens à tour de rôle (principe talkies-walkies).&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;• Full-duplex (bidirectionnelle simultanée) : A et B peuvent émettre et recevoir en même temps (comme dans le cas du téléphone).&amp;nbsp;&lt;/blockquote&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://ibda3four.blogspot.com/feeds/556987996755550730/comments/default' title='تعليقات الرسالة'/><link rel='replies' type='text/html' href='http://ibda3four.blogspot.com/2014/07/couche-1-medias-et-equipements-reseau.html#comment-form' title='0 تعليقات'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6168572102412770513/posts/default/556987996755550730'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6168572102412770513/posts/default/556987996755550730'/><link rel='alternate' type='text/html' href='http://ibda3four.blogspot.com/2014/07/couche-1-medias-et-equipements-reseau.html' title='Couche 1 : Médias et équipements réseau  '/><author><name>ibda3four</name><uri>http://www.blogger.com/profile/12166158855015146950</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3WVQKUg-0PSdeGlK2kLW4Tx78VQuWk8KAboljC5CAe-td-4n3uDTqxZWf3CYXsqSag21mVP_6wmRefWiQ59rPjEuJxldOvrQ_vtHeKvrt2IwydLR1dqF0JTvx-yl_RxDFfuGu6o8GwXBG/s72-c/01.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6168572102412770513.post-8839664172354798220</id><published>2014-07-19T09:32:00.003-07:00</published><updated>2014-07-19T09:49:17.751-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="NETWORK"/><category scheme="http://www.blogger.com/atom/ns#" term="حصريات"/><category scheme="http://www.blogger.com/atom/ns#" term="مجانيات"/><category scheme="http://www.blogger.com/atom/ns#" term="مقالات"/><title type='text'>كيف تكشف من يستعمل معك شبكتك اللاسلكية وكيف تحميها من التطفل والإستغلال</title><content type='html'>&lt;div dir=&quot;rtl&quot; style=&quot;text-align: right;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;background-color: white; font-family: Tahoma; font-size: 14px; line-height: 26px;&quot;&gt;السلام عليكم .&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; font-family: Tahoma; font-size: 14px; line-height: 26px;&quot;&gt;قد تشعر&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;-webkit-transition: all 0.3s ease-in-out; background-color: white; font-family: Tahoma; font-size: 14px; line-height: 26px; transition: all 0.3s ease-in-out;&quot;&gt;&lt;b style=&quot;-webkit-transition: all 0.3s ease-in-out; transition: all 0.3s ease-in-out;&quot;&gt;ببطئ النت&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; font-family: Tahoma; font-size: 14px; line-height: 26px;&quot;&gt;ولا تدري ما المشكلة ؟ ربما من مزود الخدمة ؟ آو ربما يتم تحديث بعض&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;-webkit-transition: all 0.3s ease-in-out; background-color: white; font-family: Tahoma; font-size: 14px; line-height: 26px; transition: all 0.3s ease-in-out;&quot;&gt;&lt;b style=&quot;-webkit-transition: all 0.3s ease-in-out; transition: all 0.3s ease-in-out;&quot;&gt;البرامج&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; font-family: Tahoma; font-size: 14px; line-height: 26px;&quot;&gt;المثبة في جهازك ( راجع هذا الموضوع قد يهمك&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://informatics-portal.blogspot.com/2013/12/Update-Freezer.html&quot; style=&quot;-webkit-transition: all 0.3s ease-in-out; background-color: white; font-family: Tahoma; font-size: 14px; line-height: 26px; text-decoration: none; transition: all 0.3s ease-in-out;&quot; target=&quot;_blank&quot;&gt;كيف أتحكم في تحديثات البرامج المثبتة على الجهاز حتى لا أتعرض لضعف التصفح&amp;nbsp;&lt;/a&gt;&lt;span style=&quot;background-color: white; font-family: Tahoma; font-size: 14px; line-height: 26px;&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; font-family: Tahoma; font-size: 14px; line-height: 26px;&quot;&gt;وقد يكون السبب في أن هناك من يستعمل&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;-webkit-transition: all 0.3s ease-in-out; background-color: white; font-family: Tahoma; font-size: 14px; line-height: 26px; transition: all 0.3s ease-in-out;&quot;&gt;&lt;b style=&quot;-webkit-transition: all 0.3s ease-in-out; transition: all 0.3s ease-in-out;&quot;&gt;الوايرلس الخاص بك&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; font-family: Tahoma; font-size: 14px; line-height: 26px;&quot;&gt;دون علم منك ؟&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; font-family: Tahoma; font-size: 14px; line-height: 26px;&quot;&gt;اذا كيف نقوم بالكشف عن عدد الأجهزة المتصلة بشبكتي ؟&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; font-family: Tahoma; font-size: 14px; line-height: 26px;&quot;&gt;هناك طرق يدوية وهناك الكثير من البرامج التي تسهل علينا هذا واخترت لكم أبسطها وهو برنامج&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #989898; font-family: Tahoma; font-size: 14px; line-height: 26px;&quot;&gt;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;h4 class=&quot;utilsubject&quot; style=&quot;-webkit-transition: all 0.3s ease-in-out; background-color: white; font-family: Tahoma; font-size: 14px; line-height: 26px; margin: 0px; position: relative; transition: all 0.3s ease-in-out;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;a href=&quot;http://www.nirsoft.net/utils/wnetwatcher_setup.exe&quot; target=&quot;_blank&quot;&gt;Wireless Network Watcher&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/h4&gt;
&lt;div&gt;
&lt;span style=&quot;-webkit-transition: all 0.3s ease-in-out; transition: all 0.3s ease-in-out;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;h4 class=&quot;utilsubject&quot; style=&quot;-webkit-transition: all 0.3s ease-in-out initial; background-color: white; font-family: Tahoma; font-size: 14px; font-weight: bold; line-height: 26px; margin: 0px; position: relative; transition: all 0.3s ease-in-out initial;&quot;&gt;
&lt;span style=&quot;-webkit-transition: all 0.3s ease-in-out; transition: all 0.3s ease-in-out;&quot;&gt;
&lt;span style=&quot;font-weight: normal;&quot;&gt;بعد تحميله وتثبيته وتشغيله تظهر أمامنا نافذة بها قائمة الأجهزة المتصلة بشبكتنا&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;span style=&quot;-webkit-transition: all 0.3s ease-in-out; transition: all 0.3s ease-in-out;&quot;&gt;
&lt;/span&gt;
&lt;br /&gt;
&lt;div style=&quot;font-weight: bold;&quot;&gt;
&lt;span style=&quot;-webkit-transition: all 0.3s ease-in-out; transition: all 0.3s ease-in-out;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;-webkit-transition: all 0.3s ease-in-out; transition: all 0.3s ease-in-out;&quot;&gt;
&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; font-weight: bold; text-align: center;&quot;&gt;
&lt;span style=&quot;-webkit-transition: all 0.3s ease-in-out; transition: all 0.3s ease-in-out;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYgbVQTgVXozQVUJTy7fXjVBgzTUmP4zwJOPynV7M_rvr52YQpkqPv_DhLCWRBay_eu8uTMleGDLdbOPsatzwZX1kSWH4UG80hTuEFr2Cergf24QESw4wKI6BVTYLh7p-MUvfXfX-7FsCJ/s1600/222.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYgbVQTgVXozQVUJTy7fXjVBgzTUmP4zwJOPynV7M_rvr52YQpkqPv_DhLCWRBay_eu8uTMleGDLdbOPsatzwZX1kSWH4UG80hTuEFr2Cergf24QESw4wKI6BVTYLh7p-MUvfXfX-7FsCJ/s1600/222.png&quot; height=&quot;210&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;-webkit-transition: all 0.3s ease-in-out; transition: all 0.3s ease-in-out;&quot;&gt;
&lt;/span&gt;
&lt;div style=&quot;font-weight: bold;&quot;&gt;
&lt;h4 class=&quot;utilsubject&quot; style=&quot;-webkit-transition: all 0.3s ease-in-out; background-color: white; font-family: Tahoma; font-size: 14px; line-height: 26px; margin: 0px; position: relative; transition: all 0.3s ease-in-out;&quot;&gt;
&lt;span style=&quot;-webkit-transition: all 0.3s ease-in-out; transition: all 0.3s ease-in-out;&quot;&gt;
&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;كما نلاحظ في النافذة قوائم من اليسار إلى اليمين أذكر منها ما نحتاجه&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;h4 class=&quot;utilsubject&quot; style=&quot;-webkit-transition: all 0.3s ease-in-out; background-color: white; font-family: Tahoma; font-size: 14px; line-height: 26px; margin: 0px; position: relative; transition: all 0.3s ease-in-out;&quot;&gt;
&lt;span style=&quot;-webkit-transition: all 0.3s ease-in-out; transition: all 0.3s ease-in-out;&quot;&gt;
&lt;span style=&quot;-webkit-transition: all 0.3s ease-in-out; transition: all 0.3s ease-in-out;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;i&lt;b&gt;p adress&amp;nbsp;&lt;/b&gt;: وهي عناوين أيبيهات الأجهزة المتصلة بشبكتنا&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;h4 class=&quot;utilsubject&quot; style=&quot;-webkit-transition: all 0.3s ease-in-out; background-color: white; font-family: Tahoma; font-size: 14px; line-height: 26px; margin: 0px; position: relative; transition: all 0.3s ease-in-out;&quot;&gt;
&lt;span style=&quot;-webkit-transition: all 0.3s ease-in-out; transition: all 0.3s ease-in-out;&quot;&gt;
&lt;span style=&quot;-webkit-transition: all 0.3s ease-in-out; transition: all 0.3s ease-in-out;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;b&gt;device name&lt;/b&gt;&amp;nbsp;: وهي أسماء الأجهزة المتصلة بشبكتنا .&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;h4 class=&quot;utilsubject&quot; style=&quot;-webkit-transition: all 0.3s ease-in-out; background-color: white; font-family: Tahoma; font-size: 14px; line-height: 26px; margin: 0px; position: relative; transition: all 0.3s ease-in-out;&quot;&gt;
&lt;span style=&quot;-webkit-transition: all 0.3s ease-in-out; transition: all 0.3s ease-in-out;&quot;&gt;
&lt;span style=&quot;-webkit-transition: all 0.3s ease-in-out; font-weight: normal; transition: all 0.3s ease-in-out;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;وما سنحتاجه (بعد قليل) بالضبط هو ال&amp;nbsp;&lt;span style=&quot;-webkit-transition: all 0.3s ease-in-out; transition: all 0.3s ease-in-out;&quot;&gt;Mac adress&amp;nbsp;&lt;/span&gt;.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;h4 class=&quot;utilsubject&quot; style=&quot;-webkit-transition: all 0.3s ease-in-out; background-color: white; font-family: Tahoma; font-size: 14px; line-height: 26px; margin: 0px; position: relative; transition: all 0.3s ease-in-out;&quot;&gt;
&lt;span style=&quot;-webkit-transition: all 0.3s ease-in-out; transition: all 0.3s ease-in-out;&quot;&gt;
&lt;span style=&quot;-webkit-transition: all 0.3s ease-in-out; font-weight: normal; transition: all 0.3s ease-in-out;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;بعد ان كشفنا عن&amp;nbsp;&lt;span style=&quot;-webkit-transition: all 0.3s ease-in-out; transition: all 0.3s ease-in-out;&quot;&gt;&lt;b style=&quot;-webkit-transition: all 0.3s ease-in-out; transition: all 0.3s ease-in-out;&quot;&gt;الأجهزة المتصلة بشبكتنا&amp;nbsp;&lt;/b&gt;&lt;/span&gt;لدينا خياران&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;h4 class=&quot;utilsubject&quot; style=&quot;-webkit-transition: all 0.3s ease-in-out; background-color: white; font-family: Tahoma; font-size: 14px; line-height: 26px; margin: 0px; position: relative; transition: all 0.3s ease-in-out;&quot;&gt;
&lt;span style=&quot;-webkit-transition: all 0.3s ease-in-out; transition: all 0.3s ease-in-out;&quot;&gt;
&lt;span style=&quot;-webkit-transition: all 0.3s ease-in-out; font-weight: normal; transition: all 0.3s ease-in-out;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;الأول : ان نقوم بتحديد الأجهزة الممنوعة من الإتصال بشبكتنا&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;h4 class=&quot;utilsubject&quot; style=&quot;-webkit-transition: all 0.3s ease-in-out; background-color: white; font-family: Tahoma; font-size: 14px; line-height: 26px; margin: 0px; position: relative; transition: all 0.3s ease-in-out;&quot;&gt;
&lt;span style=&quot;-webkit-transition: all 0.3s ease-in-out; transition: all 0.3s ease-in-out;&quot;&gt;
&lt;span style=&quot;-webkit-transition: all 0.3s ease-in-out; font-weight: normal; transition: all 0.3s ease-in-out;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;الثاني :&amp;nbsp; أن نقوم بتحديد الأجهزة المسموح لها بالإتصال بشبكتنا&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;h4 class=&quot;utilsubject&quot; style=&quot;-webkit-transition: all 0.3s ease-in-out; background-color: white; font-family: Tahoma; font-size: 14px; line-height: 26px; margin: 0px; position: relative; transition: all 0.3s ease-in-out;&quot;&gt;
&lt;span style=&quot;-webkit-transition: all 0.3s ease-in-out; transition: all 0.3s ease-in-out;&quot;&gt;
&lt;span style=&quot;-webkit-transition: all 0.3s ease-in-out; font-weight: normal; transition: all 0.3s ease-in-out;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;وفي كلتا الحالتين النتيجة واحدة&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;h4 class=&quot;utilsubject&quot; style=&quot;-webkit-transition: all 0.3s ease-in-out; background-color: white; font-family: Tahoma; font-size: 14px; line-height: 26px; margin: 0px; position: relative; transition: all 0.3s ease-in-out;&quot;&gt;
&lt;span style=&quot;-webkit-transition: all 0.3s ease-in-out; transition: all 0.3s ease-in-out;&quot;&gt;
&lt;span style=&quot;-webkit-transition: all 0.3s ease-in-out; font-weight: normal; transition: all 0.3s ease-in-out;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;كيف نطبق هذا الكلام ؟ تابع معي&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;h4 class=&quot;utilsubject&quot; style=&quot;-webkit-transition: all 0.3s ease-in-out; background-color: white; font-family: Tahoma; font-size: 14px; line-height: 26px; margin: 0px; position: relative; transition: all 0.3s ease-in-out;&quot;&gt;
&lt;span style=&quot;-webkit-transition: all 0.3s ease-in-out; transition: all 0.3s ease-in-out;&quot;&gt;
&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;• نقوم بالدخول إلى&amp;nbsp;&lt;b style=&quot;-webkit-transition: all 0.3s ease-in-out; transition: all 0.3s ease-in-out;&quot;&gt;الرواتر&amp;nbsp;&lt;/b&gt;الخاص بنا ( المودم ) عن طريق فتح أحد برامج التصفح كالموزيلا وغيره ونكتب الأيبي الخاص بالرواتر 192.168.1.1 ومن ثم ندخل معلومات الدخول الى الرواتر كما في الصورة&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;/div&gt;
&lt;span style=&quot;-webkit-transition: all 0.3s ease-in-out; transition: all 0.3s ease-in-out;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; font-weight: bold; text-align: right;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJWC5N06LH4tSz8qD-mldC3ir27wwxce1qjopZjZWMtG4xshm0cu3YMpfp449CUknmIJycoykhet_8fDxkvHfwPM-SzgHY6wc1wdjV8HpPoXnsSqELXxrRSISQX_L5j31WvfVtwJDo7p-u/s1600/14-01-2014+18-52-33.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJWC5N06LH4tSz8qD-mldC3ir27wwxce1qjopZjZWMtG4xshm0cu3YMpfp449CUknmIJycoykhet_8fDxkvHfwPM-SzgHY6wc1wdjV8HpPoXnsSqELXxrRSISQX_L5j31WvfVtwJDo7p-u/s1600/14-01-2014+18-52-33.png&quot; height=&quot;110&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;font-weight: bold;&quot;&gt;
&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; font-weight: bold; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div&gt;
وبعد:&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHsGXO7i2oK5iWrBcwHU6bXPzlV5cGrwBxymMonAOh9kI5Qev23uDSkm66yc45R1ZvK5gyOVTNrcUKuDupnhah5n7QOTvQFM_xZEKOwXW0sz2azHsZfos89NPrCZBmFzv19vRKkeiINXHJ/s1600/14-01-2014+18-59-56.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHsGXO7i2oK5iWrBcwHU6bXPzlV5cGrwBxymMonAOh9kI5Qev23uDSkm66yc45R1ZvK5gyOVTNrcUKuDupnhah5n7QOTvQFM_xZEKOwXW0sz2azHsZfos89NPrCZBmFzv19vRKkeiINXHJ/s1600/14-01-2014+18-59-56.png&quot; height=&quot;110&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;h4 class=&quot;utilsubject&quot; style=&quot;-webkit-transition: all 0.3s ease-in-out; background-color: white; font-family: Tahoma; font-size: 14px; line-height: 26px; margin: 0px; position: relative; transition: all 0.3s ease-in-out;&quot;&gt;
&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;بعد دخولنا إلى إعدادات&amp;nbsp;&lt;span style=&quot;-webkit-transition: all 0.3s ease-in-out; transition: all 0.3s ease-in-out;&quot;&gt;&lt;b style=&quot;-webkit-transition: all 0.3s ease-in-out; transition: all 0.3s ease-in-out;&quot;&gt;الشبكة اللاسلكية&amp;nbsp;&lt;/b&gt;&lt;/span&gt;( الوايرلس )&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;h4 class=&quot;utilsubject&quot; style=&quot;-webkit-transition: all 0.3s ease-in-out; background-color: white; font-family: Tahoma; font-size: 14px; line-height: 26px; margin: 0px; position: relative; transition: all 0.3s ease-in-out;&quot;&gt;
&lt;span style=&quot;-webkit-transition: all 0.3s ease-in-out; font-weight: normal; transition: all 0.3s ease-in-out;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;نقوم أولا بإختيار التشفير العالي لشبكتنا كما نختار باسورد يحتوي على أرقام وحروف ورموز ليصعب فكه&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;h4 class=&quot;utilsubject&quot; style=&quot;-webkit-transition: all 0.3s ease-in-out; background-color: white; font-family: Tahoma; font-size: 14px; line-height: 26px; margin: 0px; position: relative; transition: all 0.3s ease-in-out;&quot;&gt;
&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;شاهد الصورة&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzSTEApzfwhMJxto8MfVFm7azdyw3oR1PAcWksutGUPIXw6PXhHJek22CZji5XxQPzIQb-BwznS5VnBx3OubYrQ8-mgKix6ZNaPGmuGMuAuIXF1zxHT9VoeuWW4qQLuEXhRIMULCYb5Z6a/s1600/14-01-2014+19-07-20.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzSTEApzfwhMJxto8MfVFm7azdyw3oR1PAcWksutGUPIXw6PXhHJek22CZji5XxQPzIQb-BwznS5VnBx3OubYrQ8-mgKix6ZNaPGmuGMuAuIXF1zxHT9VoeuWW4qQLuEXhRIMULCYb5Z6a/s1600/14-01-2014+19-07-20.png&quot; height=&quot;87&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;h4 class=&quot;utilsubject&quot; style=&quot;-webkit-transition: all 0.3s ease-in-out; background-color: white; font-family: Tahoma; font-size: 14px; line-height: 26px; margin: 0px; position: relative; transition: all 0.3s ease-in-out;&quot;&gt;
&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;ومن ثم نصل مرحلة تحديد الأجهزة المسموح لها بالإتصال بشبكتنا&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;h4 class=&quot;utilsubject&quot; style=&quot;-webkit-transition: all 0.3s ease-in-out; background-color: white; font-family: Tahoma; font-size: 14px; line-height: 26px; margin: 0px; position: relative; transition: all 0.3s ease-in-out;&quot;&gt;
&lt;span style=&quot;-webkit-transition: all 0.3s ease-in-out; font-weight: normal; transition: all 0.3s ease-in-out;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;نرجع لبرنامج&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;h4 class=&quot;utilsubject&quot; style=&quot;-webkit-transition: all 0.3s ease-in-out; background-color: white; font-family: Tahoma; font-size: 14px; line-height: 26px; margin: 0px; position: relative; transition: all 0.3s ease-in-out;&quot;&gt;
&lt;span style=&quot;-webkit-transition: all 0.3s ease-in-out; font-weight: normal; transition: all 0.3s ease-in-out;&quot;&gt;&lt;a href=&quot;http://www.nirsoft.net/utils/wnetwatcher_setup.exe&quot; style=&quot;-webkit-transition: all 0.3s ease-in-out; text-decoration: none; transition: all 0.3s ease-in-out;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;Wireless Network Watcher&amp;nbsp;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;h4 class=&quot;utilsubject&quot; style=&quot;-webkit-transition: all 0.3s ease-in-out; background-color: white; font-family: Tahoma; font-size: 14px; line-height: 26px; margin: 0px; position: relative; transition: all 0.3s ease-in-out;&quot;&gt;
&lt;span style=&quot;-webkit-transition: all 0.3s ease-in-out; font-weight: normal; transition: all 0.3s ease-in-out;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;ونأخذ عنوان ال&amp;nbsp;&lt;span style=&quot;-webkit-transition: all 0.3s ease-in-out; transition: all 0.3s ease-in-out;&quot;&gt;&lt;b style=&quot;-webkit-transition: all 0.3s ease-in-out; transition: all 0.3s ease-in-out;&quot;&gt;Mac adress&amp;nbsp;&lt;/b&gt;&lt;/span&gt;( كما شاهدنا قبل قليل ) الخاص بالجهاز الذي نريد له الإتصال بشبكتنا&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;h4 class=&quot;utilsubject&quot; style=&quot;-webkit-transition: all 0.3s ease-in-out; background-color: white; font-family: Tahoma; font-size: 14px; line-height: 26px; margin: 0px; position: relative; transition: all 0.3s ease-in-out;&quot;&gt;
&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;ومن ثم شاهد الصورة&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKnJ4tr-WB2OWZ4KWSteK3tdnkivNdd-J07mS2XTr7yVygM53rUkW39oxOOyN50BG-i5a_8jG7i_7sarXsv8ToCLhPBwzyYHq92qiydE9X_KduAf-rStKjAghQX8iHd7xI-DCDJaseqfc5/s1600/14-01-2014+19-16-25.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKnJ4tr-WB2OWZ4KWSteK3tdnkivNdd-J07mS2XTr7yVygM53rUkW39oxOOyN50BG-i5a_8jG7i_7sarXsv8ToCLhPBwzyYHq92qiydE9X_KduAf-rStKjAghQX8iHd7xI-DCDJaseqfc5/s1600/14-01-2014+19-16-25.png&quot; height=&quot;165&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;h4 class=&quot;utilsubject&quot; style=&quot;-webkit-transition: all 0.3s ease-in-out; background-color: white; font-family: Tahoma; font-size: 14px; line-height: 26px; margin: 0px; position: relative; transition: all 0.3s ease-in-out;&quot;&gt;
&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;1- نقوم بتفعيل خاصية إستخدام&amp;nbsp;Mac adress&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;h4 class=&quot;utilsubject&quot; style=&quot;-webkit-transition: all 0.3s ease-in-out; background-color: white; font-family: Tahoma; font-size: 14px; line-height: 26px; margin: 0px; position: relative; transition: all 0.3s ease-in-out;&quot;&gt;
&lt;span style=&quot;-webkit-transition: all 0.3s ease-in-out; font-weight: normal; transition: all 0.3s ease-in-out;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;2- نقوم بإختيار&amp;nbsp;&lt;span style=&quot;-webkit-transition: all 0.3s ease-in-out; transition: all 0.3s ease-in-out;&quot;&gt;Allow association&amp;nbsp;&lt;/span&gt;. ( أي الاجهزة المسموح لها بالإتصال فقط )&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;h4 class=&quot;utilsubject&quot; style=&quot;-webkit-transition: all 0.3s ease-in-out; background-color: white; font-family: Tahoma; font-size: 14px; line-height: 26px; margin: 0px; position: relative; transition: all 0.3s ease-in-out;&quot;&gt;
&lt;span style=&quot;-webkit-transition: all 0.3s ease-in-out; font-weight: normal; transition: all 0.3s ease-in-out;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;3- نقوم بإدخال&amp;nbsp;&lt;span style=&quot;-webkit-transition: all 0.3s ease-in-out; transition: all 0.3s ease-in-out;&quot;&gt;mac adress&amp;nbsp;&lt;/span&gt;الخاص بكل جهاز .&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;h4 class=&quot;utilsubject&quot; style=&quot;-webkit-transition: all 0.3s ease-in-out; background-color: white; font-family: Tahoma; line-height: 26px; margin: 0px; position: relative; transition: all 0.3s ease-in-out;&quot;&gt;
&lt;span style=&quot;font-weight: normal;&quot;&gt;ومن ثم نضغط &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;span style=&quot;color: red; font-size: large;&quot;&gt;SAUVEGARDER&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://ibda3four.blogspot.com/feeds/8839664172354798220/comments/default' title='تعليقات الرسالة'/><link rel='replies' type='text/html' href='http://ibda3four.blogspot.com/2014/07/blog-post_19.html#comment-form' title='0 تعليقات'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6168572102412770513/posts/default/8839664172354798220'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6168572102412770513/posts/default/8839664172354798220'/><link rel='alternate' type='text/html' href='http://ibda3four.blogspot.com/2014/07/blog-post_19.html' title='كيف تكشف من يستعمل معك شبكتك اللاسلكية وكيف تحميها من التطفل والإستغلال'/><author><name>ibda3four</name><uri>http://www.blogger.com/profile/12166158855015146950</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYgbVQTgVXozQVUJTy7fXjVBgzTUmP4zwJOPynV7M_rvr52YQpkqPv_DhLCWRBay_eu8uTMleGDLdbOPsatzwZX1kSWH4UG80hTuEFr2Cergf24QESw4wKI6BVTYLh7p-MUvfXfX-7FsCJ/s72-c/222.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6168572102412770513.post-1426578868738728432</id><published>2014-07-18T09:04:00.003-07:00</published><updated>2014-07-18T10:01:45.012-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="حصريات"/><category scheme="http://www.blogger.com/atom/ns#" term="صيانة وبرامج"/><category scheme="http://www.blogger.com/atom/ns#" term="مجانيات"/><title type='text'>طريقة للحصول على احسن DNS لتسريع تصفحك عبر الانترنات  Domain Name Speed</title><content type='html'>&lt;div dir=&quot;rtl&quot; style=&quot;text-align: right;&quot; trbidi=&quot;on&quot;&gt;
&lt;blockquote class=&quot;tr_bq&quot; style=&quot;text-align: left;&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;span style=&quot;background-color: white; font-family: verdana, tahoma, arial, helvetica, sans-serif, &#39;MS Sans Serif&#39;; font-size: large; text-align: -webkit-center;&quot;&gt;&lt;b&gt;Domain Name Speed Benchmark&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; style=&quot;text-align: left;&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;span style=&quot;background-color: white; font-family: verdana, tahoma, arial, helvetica, sans-serif, &#39;MS Sans Serif&#39;; font-size: larger; text-align: -webkit-center;&quot;&gt;Are your DNS nameservers impeding your Internet experience?&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/blockquote&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;color: red; font-size: large;&quot;&gt;1-go to site web : &lt;u&gt;&lt;a href=&quot;https://www.grc.com/dns/benchmark.htm&quot; target=&quot;_blank&quot;&gt;&amp;nbsp;DNS BENCHMARK&lt;/a&gt;&lt;/u&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikJCF0PhajOvW5VxaGn0uJiJVVqKZ1G3UGI3dCsAbHK7uIuKrDdlZ_5mZ8nG96MsdVsebcTljyQilIITkURYsnTV1wJgSRZoi-S3PSY-Y7E3yl8GV5nqbOSduqrgaY1snBvbsG2PnfHAAi/s1600/DNSBench.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikJCF0PhajOvW5VxaGn0uJiJVVqKZ1G3UGI3dCsAbHK7uIuKrDdlZ_5mZ8nG96MsdVsebcTljyQilIITkURYsnTV1wJgSRZoi-S3PSY-Y7E3yl8GV5nqbOSduqrgaY1snBvbsG2PnfHAAi/s1600/DNSBench.png&quot; height=&quot;400&quot; width=&quot;351&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiynBaZqmOQgxcH6g_-psBml5fW0MdAc3q4nSIWE2PxJO4UQZ6_CKqrWQxSu7w5-Z6EaMdAuFFbMNK6h1uL60rYB_quByAxAxbj0SrYFF5NsN-9FPnEvMWsPIA-jzcqUy2untaiy78l9Vgt/s1600/dnsb-123.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiynBaZqmOQgxcH6g_-psBml5fW0MdAc3q4nSIWE2PxJO4UQZ6_CKqrWQxSu7w5-Z6EaMdAuFFbMNK6h1uL60rYB_quByAxAxbj0SrYFF5NsN-9FPnEvMWsPIA-jzcqUy2untaiy78l9Vgt/s1600/dnsb-123.png&quot; height=&quot;72&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;background-color: #eeeeff; font-family: verdana, tahoma, arial, helvetica, sans-serif, &#39;MS Sans Serif&#39;; font-size: 16px;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;Why a DNS Benchmark?&lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote dir=&quot;ltr&quot; style=&quot;background: rgb(238, 238, 255); border-top-color: rgb(187, 0, 0); border-top-style: solid; border-top-width: 3px; font-size: 12pt; margin: 1.5em 0px 0.75em 0em; padding: 0.1em 0px 0.2em 0.4em; text-align: left;&quot;&gt;
&amp;nbsp;&lt;span style=&quot;background-color: white; font-family: verdana, tahoma, arial, helvetica, sans-serif, &#39;MS Sans Serif&#39;; font-size: 13px;&quot;&gt;People use alphabetic domain names (www.grc.com), but Internet data packets require numerical Internet IP addresses (4.79.142.202). So the first step required before anything can be done on the Internet is to lookup the site&#39;s or service&#39;s domain name to determine its associated Internet IP address.&lt;/span&gt;www.grc.com&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;img alt=&quot;arrow-r&quot; height=&quot;18&quot; src=&quot;https://www.grc.com/image/arrow-r.gif&quot; style=&quot;border: 0px; margin: 0px; padding: 0px;&quot; width=&quot;20&quot; /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;[4.79.142.202]&lt;br /&gt;
Since nothing can happen until IP addresses are known, the use of slow, overloaded or unreliable DNS servers will get in the way, noticeably slowing down virtually all of your use of the Internet.&lt;br /&gt;
Unless you have taken over manual control of the DNS servers your system is using (which, as you&#39;ll see, is not difficult to do), your system will be using the DNS servers that were automatically assigned by your Internet connection provider (your ISP). Since they are likely located close to you on the Internet (since they are provided by your own ISP) they may already be the fastest DNS servers available to you. But they might be in the wrong order (the second one being faster than the first one, and that matters) or, who knows? Many people have discovered that their own ISP&#39;s DNS servers are slower than other publicly available alternatives on the Internet, which are faster and/or more reliable.&lt;br /&gt;
This DNS Benchmark will give you visibility into what&#39;s going on with your system&#39;s currently assigned DNS servers by automatically comparing their performance with many well known publicly available alternatives.&lt;/blockquote&gt;
&lt;br /&gt;
&lt;blockquote dir=&quot;ltr&quot; style=&quot;background: rgb(238, 238, 255); border-top-color: rgb(187, 0, 0); border-top-style: solid; border-top-width: 3px; font-size: 12pt; margin: 1.5em 0px 0.75em 0em; padding: 0.1em 0px 0.2em 0.4em; text-align: left;&quot;&gt;
&lt;span style=&quot;color: red;&quot;&gt;What is GRC&#39;s DNS Benchmark?&lt;/span&gt;&lt;span style=&quot;background-color: transparent; text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote dir=&quot;ltr&quot; style=&quot;background: rgb(238, 238, 255); border-top-color: rgb(187, 0, 0); border-top-style: solid; border-top-width: 3px; font-size: 12pt; margin: 1.5em 0px 0.75em 0em; padding: 0.1em 0px 0.2em 0.4em; text-align: left;&quot;&gt;
&lt;br /&gt;
GRC&#39;s DNS Benchmark performs a detailed analysis and comparison of the operational performance and reliability of any set of up to 200 DNS&amp;nbsp;&lt;b&gt;nameservers&lt;/b&gt;&amp;nbsp;(sometimes also called&amp;nbsp;&lt;b&gt;resolvers&lt;/b&gt;) at once. When the Benchmark is started in its default configuration, it identifies all DNS nameservers the user&#39;s system is currently configured to use and adds them to its built-in list of publicly available “alternative” nameservers. Each DNS nameserver in the benchmark list is carefully “characterized” to determine its suitability — to you — for your use as a DNS resolver. This characterization includes testing each nameserver for its “redirection” behavior: whether it returns an error for a bad domain request, or redirects a user&#39;s web browser to a commercial marketing-oriented page. While such behavior may be acceptable to some users, others may find this objectionable.&lt;br /&gt;
The point made above about the suitability —&amp;nbsp;&lt;i&gt;to you&lt;/i&gt;&amp;nbsp;— of candidate nameservers is a crucial one, since everything is about where&amp;nbsp;&lt;i&gt;you&lt;/i&gt;&amp;nbsp;are located relative to the nameservers being tested. You might see someone talking about how fast some specific DNS nameservers are for them, but unless you share their location there&#39;s absolutely no guarantee that the same nameservers would perform as well for you. ONLY by benchmarking DNS resolvers from your own location, as this DNS Benchmark does, can you compare nameserver performance where it matters&lt;b&gt;&amp;nbsp;.&amp;nbsp;.&amp;nbsp;.&lt;/b&gt;&amp;nbsp;right where you&#39;re computer is.&lt;br /&gt;
When the benchmark is run, the performance and apparent reliability of the DNS nameservers the system is currently using, plus all of the working nameservers on the Benchmark&#39;s built-in list of alternative nameservers are compared with each other.&lt;br /&gt;
Results are continuously displayed and updated while the benchmark is underway, with a dynamically sorted and scaled bar chart, and a tabular chart display showing the cached, uncached and “dotcom” DNS lookup performance of each nameserver. These values are determined by carefully querying each nameserver for the IP addresses of the top 50 most popular domain names on the Internet and also by querying for nonexistent domains.&lt;br /&gt;
Once the benchmark finishes, the results are heuristically and statistically analyzed to present a comprehensive yet simplified and understandable English-language summary of all important findings and conclusions. Based upon these results, users may choose to change the usage order of their system&#39;s own resolvers, or, if alternative public nameservers offer superior performance or features compared with the nameservers currently being used, to switch to one or more alternative nameservers.&lt;br /&gt;
DNS Benchmark Feature List:&lt;span style=&quot;background-color: transparent; text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote dir=&quot;ltr&quot; style=&quot;background: rgb(238, 238, 255); border-top-color: rgb(187, 0, 0); border-top-style: solid; border-top-width: 3px; font-size: 12pt; margin: 1.5em 0px 0.75em 0em; padding: 0.1em 0px 0.2em 0.4em; text-align: left;&quot;&gt;
&lt;span class=&quot;bold_red_arial&quot; style=&quot;font-family: Arial; font-weight: bold;&quot;&gt;The Executable Environment:&lt;/span&gt;&lt;span style=&quot;background-color: transparent; text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote dir=&quot;ltr&quot; style=&quot;background: rgb(238, 238, 255); border-top-color: rgb(187, 0, 0); border-top-style: solid; border-top-width: 3px; font-size: 12pt; margin: 1.5em 0px 0.75em 0em; padding: 0.1em 0px 0.2em 0.4em; text-align: left;&quot;&gt;
&lt;ul class=&quot;tightlist&quot; style=&quot;border: 0px; margin: 0.75em 0px 1em 20px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px 0px 0.5em; padding: 0px;&quot;&gt;&lt;b&gt;Compatible with all versions of Windows&lt;/b&gt;&amp;nbsp;from Windows 95 through Windows 7.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul class=&quot;tightlist&quot; style=&quot;border: 0px; margin: 0.75em 0px 1em 20px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px 0px 0.5em; padding: 0px;&quot;&gt;&lt;b&gt;Compatible with Wine&lt;/b&gt;&amp;nbsp;(Windows emulation) running on Linux and Macintosh.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul class=&quot;tightlist&quot; style=&quot;border: 0px; margin: 0.75em 0px 1em 20px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px 0px 0.5em; padding: 0px;&quot;&gt;Hand-coded in 100% pure assembly language for highest precision and smallest size:&amp;nbsp;163&amp;nbsp;KBytes.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul class=&quot;tightlist&quot; style=&quot;border: 0px; margin: 0.75em 0px 1em 20px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px 0px 0.5em; padding: 0px;&quot;&gt;Installation-free — nothing to install — just run the small executable file.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul class=&quot;tightlist&quot; style=&quot;border: 0px; margin: 0.75em 0px 1em 20px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px 0px 0.5em; padding: 0px;&quot;&gt;(Won&#39;t change anything or mess up your system.)&lt;/li&gt;
&lt;/ul&gt;
&lt;ul class=&quot;tightlist&quot; style=&quot;border: 0px; margin: 0.75em 0px 1em 20px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px 0px 0.5em; padding: 0px;&quot;&gt;Lightweight (single packet), optional automatic and/or manual version checking.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul class=&quot;tightlist&quot; style=&quot;border: 0px; margin: 0.75em 0px 1em 20px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px 0px 0.5em; padding: 0px;&quot;&gt;Task Scheduler-compatible for non-UI non-interactive background operation.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul class=&quot;tightlist&quot; style=&quot;border: 0px; margin: 0.75em 0px 1em 20px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px 0px 0.5em; padding: 0px;&quot;&gt;Optional, automatic results logging for fully unattended operation.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul class=&quot;tightlist&quot; style=&quot;border: 0px; margin: 0.75em 0px 1em 20px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px 0px 0.5em; padding: 0px;&quot;&gt;Comprehensive error return codes to support full automation.&lt;span style=&quot;background-color: transparent; text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/blockquote&gt;
&lt;blockquote dir=&quot;ltr&quot; style=&quot;background: rgb(238, 238, 255); border-top-color: rgb(187, 0, 0); border-top-style: solid; border-top-width: 3px; font-size: 12pt; margin: 1.5em 0px 0.75em 0em; padding: 0.1em 0px 0.2em 0.4em; text-align: left;&quot;&gt;
&lt;span class=&quot;bold_red_arial&quot; style=&quot;font-family: Arial; font-weight: bold;&quot;&gt;Primary Benchmark Features:&lt;/span&gt;&lt;span style=&quot;background-color: transparent; text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote dir=&quot;ltr&quot; style=&quot;background: rgb(238, 238, 255); border-top-color: rgb(187, 0, 0); border-top-style: solid; border-top-width: 3px; font-size: 12pt; margin: 1.5em 0px 0.75em 0em; padding: 0.1em 0px 0.2em 0.4em; text-align: left;&quot;&gt;
&lt;ul class=&quot;tightlist&quot; style=&quot;border: 0px; margin: 0.75em 0px 1em 20px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px 0px 0.5em; padding: 0px;&quot;&gt;For each of up to 200 DNS nameservers, using the Internet&#39;s most popular top-50 domain names, independently measures, charts, statistically analyzes, reports (and optionally exports):&lt;/li&gt;
&lt;/ul&gt;
&lt;ul class=&quot;tighterlist&quot; style=&quot;border: 0px; margin: 0.75em 0px 1em 20px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px 0px 0.1em; padding: 0px;&quot;&gt;Cached lookups – the time to return a domain name that is already in the resolver&#39;s name cache.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul class=&quot;tighterlist&quot; style=&quot;border: 0px; margin: 0.75em 0px 1em 20px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px 0px 0.1em; padding: 0px;&quot;&gt;Uncached lookups – the time to return a sub-domain name that is not already in the resolver&#39;s name cache.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul class=&quot;tighterlist&quot; style=&quot;border: 0px; margin: 0.75em 0px 1em 20px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px 0px 0.1em; padding: 0px;&quot;&gt;Dotcom lookups – the time to consult the nameserver&#39;s chosen dotcom resolver(s) for a dotcom name.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul class=&quot;tighterlist&quot; style=&quot;border: 0px; margin: 0.75em 0px 1em 20px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px 0px 0.1em; padding: 0px;&quot;&gt;Reliability – the number of queries not replied to (lost) during the benchmark.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul class=&quot;tighterlist&quot; style=&quot;border: 0px; margin: 0.75em 0px 1em 20px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px 0px 0.1em; padding: 0px;&quot;&gt;Rebinding protection – whether the resolver blocks non-routable private IP addresses.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul class=&quot;tightlist&quot; style=&quot;border: 0px; margin: 0.75em 0px 1em 20px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px 0px 0.5em; padding: 0px;&quot;&gt;Optionally verifies whether nameservers provide DNS security (DNSSEC) record authentication.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul class=&quot;tightlist&quot; style=&quot;border: 0px; margin: 0.75em 0px 1em 20px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px 0px 0.5em; padding: 0px;&quot;&gt;When using a list of (provided) DNSSEC-signed domains, benchmarks DNSSEC authentication performance.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul class=&quot;tightlist&quot; style=&quot;border: 0px; margin: 0.75em 0px 1em 20px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px 0px 0.5em; padding: 0px;&quot;&gt;Graphs and compares all four benchmark parameters with an easy-to-read bar chart.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul class=&quot;tightlist&quot; style=&quot;border: 0px; margin: 0.75em 0px 1em 20px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px 0px 0.5em; padding: 0px;&quot;&gt;Builds a customized list of the fastest performing (for you) top 50 resolvers, located anywhere in the world, selected from a master list of more than 4,800 possible known resolvers.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul class=&quot;tightlist&quot; style=&quot;border: 0px; margin: 0.75em 0px 1em 20px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px 0px 0.5em; padding: 0px;&quot;&gt;On-the-fly hierarchical sorting of performance results by cached (default) or uncached performance.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul class=&quot;tightlist&quot; style=&quot;border: 0px; margin: 0.75em 0px 1em 20px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px 0px 0.5em; padding: 0px;&quot;&gt;(Sorting is “hierarchical” because cached (or uncached) performance is sorted first, followed by uncached (or cached), then by dotcom last.)&lt;/li&gt;
&lt;/ul&gt;
&lt;ul class=&quot;tightlist&quot; style=&quot;border: 0px; margin: 0.75em 0px 1em 20px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px 0px 0.5em; padding: 0px;&quot;&gt;Auto-scaled bar chart that can be manually overridden for chart-to-chart comparison.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul class=&quot;tightlist&quot; style=&quot;border: 0px; margin: 0.75em 0px 1em 20px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px 0px 0.5em; padding: 0px;&quot;&gt;Pop-up value “inspector” (left click in nameserver list) displays precise values on bar chart.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul class=&quot;tightlist&quot; style=&quot;border: 0px; margin: 0.75em 0px 1em 20px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px 0px 0.5em; padding: 0px;&quot;&gt;Detailed tabular results report.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul class=&quot;tightlist&quot; style=&quot;border: 0px; margin: 0.75em 0px 1em 20px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px 0px 0.5em; padding: 0px;&quot;&gt;Fully detailed, locale-aware (internationalized), CSV results export.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul class=&quot;tightlist&quot; style=&quot;border: 0px; margin: 0.75em 0px 1em 20px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px 0px 0.5em; padding: 0px;&quot;&gt;Automatic logging to a CSV file for long-term background results monitoring and collection.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul class=&quot;tightlist&quot; style=&quot;border: 0px; margin: 0.75em 0px 1em 20px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px 0px 0.5em; padding: 0px;&quot;&gt;Simultaneously compares the performance and reliability of up to 200 DNS nameservers.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul class=&quot;tightlist&quot; style=&quot;border: 0px; margin: 0.75em 0px 1em 20px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px 0px 0.5em; padding: 0px;&quot;&gt;Determines network name (reverse DNS), ownership, and operational status for each nameserver.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul class=&quot;tightlist&quot; style=&quot;border: 0px; margin: 0.75em 0px 1em 20px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px 0px 0.5em; padding: 0px;&quot;&gt;Determines whether nameservers intercept and redirect bad domain names.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul class=&quot;tightlist&quot; style=&quot;border: 0px; margin: 0.75em 0px 1em 20px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px 0px 0.5em; padding: 0px;&quot;&gt;Comprehensive, heuristic “Conclusions” generation summarizes all results and suggests useful system changes, if any, in easily readable English.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul class=&quot;tightlist&quot; style=&quot;border: 0px; margin: 0.75em 0px 1em 20px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px 0px 0.5em; padding: 0px;&quot;&gt;All results are analyzed for statistical significance with a 95% confidence threshold.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul class=&quot;tightlist&quot; style=&quot;border: 0px; margin: 0.75em 0px 1em 20px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px 0px 0.5em; padding: 0px;&quot;&gt;Bottom of tabular data page contains built-in quick-reference “reminder” help.&lt;span style=&quot;background-color: transparent; text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/blockquote&gt;
&lt;blockquote dir=&quot;ltr&quot; style=&quot;background: rgb(238, 238, 255); border-top-color: rgb(187, 0, 0); border-top-style: solid; border-top-width: 3px; font-size: 12pt; margin: 1.5em 0px 0.75em 0em; padding: 0.1em 0px 0.2em 0.4em; text-align: left;&quot;&gt;
&lt;span class=&quot;bold_red_arial&quot; style=&quot;font-family: Arial; font-weight: bold;&quot;&gt;Additional Power-User &amp;amp; Convenience Features:&lt;/span&gt;&lt;span style=&quot;background-color: transparent; text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote dir=&quot;ltr&quot; style=&quot;background: rgb(238, 238, 255); border-top-color: rgb(187, 0, 0); border-top-style: solid; border-top-width: 3px; font-size: 12pt; margin: 1.5em 0px 0.75em 0em; padding: 0.1em 0px 0.2em 0.4em; text-align: left;&quot;&gt;
&lt;ul class=&quot;tightlist&quot; style=&quot;border: 0px; margin: 0.75em 0px 1em 20px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px 0px 0.5em; padding: 0px;&quot;&gt;The built-in top-50 domains list is user-replaceable to allow more/less statistical significance, and for support of DNSSEC record authentication.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul class=&quot;tightlist&quot; style=&quot;border: 0px; margin: 0.75em 0px 1em 20px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px 0px 0.5em; padding: 0px;&quot;&gt;.INI files containing sets and subsets of nameservers to benchmark can be added, removed, and saved.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul class=&quot;tightlist&quot; style=&quot;border: 0px; margin: 0.75em 0px 1em 20px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px 0px 0.5em; padding: 0px;&quot;&gt;Special “dnsbench.ini” file is auto-loaded, if present, to always override built-in nameserver list.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul class=&quot;tightlist&quot; style=&quot;border: 0px; margin: 0.75em 0px 1em 20px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px 0px 0.5em; padding: 0px;&quot;&gt;(This supports the use of customizable personal nameserver lists for special applications.)&lt;/li&gt;
&lt;/ul&gt;
&lt;ul class=&quot;tightlist&quot; style=&quot;border: 0px; margin: 0.75em 0px 1em 20px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px 0px 0.5em; padding: 0px;&quot;&gt;At start-up, tests for the presence of, and deliberately “triggers”, any outbound-blocking personal firewalls to allow Internet access exceptions to be provided before testing begins.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul class=&quot;tightlist&quot; style=&quot;border: 0px; margin: 0.75em 0px 1em 20px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px 0px 0.5em; padding: 0px;&quot;&gt;Internet connectivity aware – verifies unimpeded Internet connectivity before testing and gracefully handles possible loss of Internet connectivity during testing.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul class=&quot;tightlist&quot; style=&quot;border: 0px; margin: 0.75em 0px 1em 20px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px 0px 0.5em; padding: 0px;&quot;&gt;Bar chart results can be copied to the system clipboard or saved in BMP or compressed PNG format for storage or sharing.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul class=&quot;tightlist&quot; style=&quot;border: 0px; margin: 0.75em 0px 1em 20px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px 0px 0.5em; padding: 0px;&quot;&gt;Built-in self-screen capture to BMP or compressed PNG file.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul class=&quot;tightlist&quot; style=&quot;border: 0px; margin: 0.75em 0px 1em 20px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px 0px 0.5em; padding: 0px;&quot;&gt;All benchmark pages and tabs can be copied to the system clipboard or saved to files as text, rich-text, or images as appropriate.&lt;span style=&quot;background-color: transparent; text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/blockquote&gt;
&lt;blockquote dir=&quot;ltr&quot; style=&quot;background: rgb(238, 238, 255); border-top-color: rgb(187, 0, 0); border-top-style: solid; border-top-width: 3px; font-size: 12pt; margin: 1.5em 0px 0.75em 0em; padding: 0.1em 0px 0.2em 0.4em; text-align: left;&quot;&gt;
Where to go from here?&lt;span style=&quot;background-color: transparent; text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote dir=&quot;ltr&quot; style=&quot;background: rgb(238, 238, 255); border-top-color: rgb(187, 0, 0); border-top-style: solid; border-top-width: 3px; font-size: 12pt; margin: 1.5em 0px 0.75em 0em; padding: 0.1em 0px 0.2em 0.4em; text-align: left;&quot;&gt;
The best way to familiarize yourself with the DNS Benchmark&#39;s operation is to&amp;nbsp;&lt;a href=&quot;https://www.grc.com/files/DNSBench.exe&quot;&gt;download a copy to your computer&lt;/a&gt;. Note that it&#39;s not very large (only&amp;nbsp;163&amp;nbsp;KB) so it won&#39;t take long. And also note that there&#39;s nothing to “install” — you just run the executable file. So fire it up and poke around at its many features.&lt;br /&gt;
The “&lt;a href=&quot;https://www.grc.com/dns/operation.htm&quot;&gt;Features / Operations Walkthrough&lt;/a&gt;” page provides a visual quick-reference guide to the program. You are invited to refer to that page while exploring the program, or check-out the&amp;nbsp;&lt;a href=&quot;https://www.grc.com/dns/operation.htm&quot;&gt;&lt;b&gt;Features / Operations Walkthrough&lt;/b&gt;&lt;/a&gt;&amp;nbsp;page first.&lt;/blockquote&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;iframe allowfullscreen=&#39;allowfullscreen&#39; webkitallowfullscreen=&#39;webkitallowfullscreen&#39; mozallowfullscreen=&#39;mozallowfullscreen&#39; width=&#39;320&#39; height=&#39;266&#39; src=&#39;https://www.youtube.com/embed/U1ZsSM9XuKE?feature=player_embedded&#39; frameborder=&#39;0&#39;&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://ibda3four.blogspot.com/feeds/1426578868738728432/comments/default' title='تعليقات الرسالة'/><link rel='replies' type='text/html' href='http://ibda3four.blogspot.com/2014/07/dns.html#comment-form' title='0 تعليقات'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6168572102412770513/posts/default/1426578868738728432'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6168572102412770513/posts/default/1426578868738728432'/><link rel='alternate' type='text/html' href='http://ibda3four.blogspot.com/2014/07/dns.html' title='طريقة للحصول على احسن DNS لتسريع تصفحك عبر الانترنات  Domain Name Speed'/><author><name>ibda3four</name><uri>http://www.blogger.com/profile/12166158855015146950</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikJCF0PhajOvW5VxaGn0uJiJVVqKZ1G3UGI3dCsAbHK7uIuKrDdlZ_5mZ8nG96MsdVsebcTljyQilIITkURYsnTV1wJgSRZoi-S3PSY-Y7E3yl8GV5nqbOSduqrgaY1snBvbsG2PnfHAAi/s72-c/DNSBench.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6168572102412770513.post-8230428657257953110</id><published>2014-07-17T17:15:00.003-07:00</published><updated>2014-07-17T17:15:50.745-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="اسلاميات"/><title type='text'> أحاديث في فضل العشر الأواخر وليلة القدر</title><content type='html'>&lt;div dir=&quot;rtl&quot; style=&quot;text-align: right;&quot; trbidi=&quot;on&quot;&gt;
&lt;div id=&quot;himgb&quot; style=&quot;color: #0d2f61; font-family: &#39;simplified Arabic&#39;; font-size: 20px; font-weight: bold; margin-top: 20px; text-align: center;&quot;&gt;
&lt;b style=&quot;color: black; font-family: &#39;Traditional Arabic&#39;; font-size: medium; text-align: justify; text-indent: 25px;&quot;&gt;&lt;span lang=&quot;AR-SA&quot;&gt;&lt;span style=&quot;color: maroon; font-size: large;&quot;&gt;&amp;nbsp;أحاديث في فضل العشر الأواخر وليلة القدر:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglqStA-qwzPcOg1v-wkyhR9uWwGBItSrMrlfJagpX6ik5LZb4FQoip6yhE20FgjkTKCIxTOZdRRy1TOr42CwQZSJcDFvN5sjfjEIpcCPIRqZ4rTfwdUdXNp5ZesIEQT1qjfoAr5ic2UJ3e/s1600/1252305306.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglqStA-qwzPcOg1v-wkyhR9uWwGBItSrMrlfJagpX6ik5LZb4FQoip6yhE20FgjkTKCIxTOZdRRy1TOr42CwQZSJcDFvN5sjfjEIpcCPIRqZ4rTfwdUdXNp5ZesIEQT1qjfoAr5ic2UJ3e/s1600/1252305306.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKOzExeuy_nt6wy3sqOY_WOfE_t4OtG-_P8cSWLTJwM7IVwkHzmqJTxyBfnFtMP7w421YjzcYKN3wMPfo8UgR3irA9m5y2pz0yaTXhEE5dQFcaRfdjgehllG5Y5dcrZEXqPMHczqSWF9nN/s1600/1252305566.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKOzExeuy_nt6wy3sqOY_WOfE_t4OtG-_P8cSWLTJwM7IVwkHzmqJTxyBfnFtMP7w421YjzcYKN3wMPfo8UgR3irA9m5y2pz0yaTXhEE5dQFcaRfdjgehllG5Y5dcrZEXqPMHczqSWF9nN/s1600/1252305566.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYfPfqHE2WiBgCYiSLS_2fCWPxEhpvdtkhfbcBqmUbLiEsRf-PIlMTeYxaqvJVjBDvxM9Tg9KJbvLwCb56LylWQDKk8j8JmBiO3JMlCjCOwVjxyXeZMGFBuMEsSKXAZ2aoSZZadrGEDiMM/s1600/13443442464.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYfPfqHE2WiBgCYiSLS_2fCWPxEhpvdtkhfbcBqmUbLiEsRf-PIlMTeYxaqvJVjBDvxM9Tg9KJbvLwCb56LylWQDKk8j8JmBiO3JMlCjCOwVjxyXeZMGFBuMEsSKXAZ2aoSZZadrGEDiMM/s1600/13443442464.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div id=&quot;himgb&quot; style=&quot;color: #0d2f61; font-family: &#39;simplified Arabic&#39;; font-size: 20px; font-weight: bold; margin-top: 20px; text-align: center;&quot;&gt;
&lt;b style=&quot;color: black; font-family: &#39;Traditional Arabic&#39;; font-size: medium; text-align: justify; text-indent: 25px;&quot;&gt;&lt;span lang=&quot;AR-SA&quot;&gt;&lt;span style=&quot;color: maroon; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div id=&quot;himgb&quot; style=&quot;color: #0d2f61; font-family: &#39;simplified Arabic&#39;; font-size: 20px; font-weight: bold; margin-top: 20px; text-align: center;&quot;&gt;
&lt;div class=&quot;MsoNormal&quot; dir=&quot;RTL&quot; style=&quot;color: black; direction: rtl; font-family: &#39;Traditional Arabic&#39;; font-size: medium; font-weight: normal; margin-bottom: 6px; margin-top: 6px; text-align: justify; text-indent: 25px; unicode-bidi: embed;&quot;&gt;
&lt;span lang=&quot;AR-SA&quot; style=&quot;font-weight: 700;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;- عن أبي هريرة رضي الله عنه، عن النبي صلى الله عليه وسلم قال:&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span lang=&quot;AR-SA&quot; style=&quot;color: green;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;((من قام ليلة القدر إيمانا واحتسابا غفر له ما تقدم من ذنبه))&lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;AR-SA&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&amp;nbsp;متفق عليه&lt;/span&gt;&lt;/span&gt;&lt;sup&gt;&lt;span lang=&quot;AR-SA&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;(&lt;/span&gt;&lt;/span&gt;&lt;/sup&gt;&lt;/b&gt;&lt;span class=&quot;MsoFootnoteReference&quot; style=&quot;vertical-align: super;&quot;&gt;&lt;span dir=&quot;LTR&quot; lang=&quot;AR-SA&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;a href=&quot;http://www.alminbar.net/malafilmy/ramadan/malaf29/3.HTM#1&quot; name=&quot;_ftnref1&quot;&gt;[1]&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;sup&gt;&lt;span lang=&quot;AR-SA&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;)&lt;/span&gt;&lt;/span&gt;&lt;/sup&gt;&lt;span lang=&quot;AR-SA&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; dir=&quot;RTL&quot; style=&quot;color: black; direction: rtl; font-family: &#39;Traditional Arabic&#39;; font-size: medium; font-weight: normal; margin-bottom: 6px; margin-top: 6px; text-align: justify; text-indent: 25px; unicode-bidi: embed;&quot;&gt;
&lt;b&gt;&lt;span lang=&quot;AR-SA&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;- عن عائشة رضي الله عنها قالت: كان النبي صلى الله عليه وسلم إذا دخل العشر شدَّ مئزره&lt;/span&gt;&lt;/span&gt;&lt;sup&gt;&lt;span lang=&quot;AR-SA&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;(&lt;/span&gt;&lt;/span&gt;&lt;/sup&gt;&lt;/b&gt;&lt;span class=&quot;MsoFootnoteReference&quot; style=&quot;vertical-align: super;&quot;&gt;&lt;span dir=&quot;LTR&quot; lang=&quot;AR-SA&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;a href=&quot;http://www.alminbar.net/malafilmy/ramadan/malaf29/3.HTM#2&quot; name=&quot;_ftnref2&quot;&gt;[2]&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;sup&gt;&lt;span lang=&quot;AR-SA&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;)&lt;/span&gt;&lt;/span&gt;&lt;/sup&gt;&lt;span lang=&quot;AR-SA&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;، وأحيا ليله، وأيقظ أهله. متفق عليه واللفظ للبخاري&lt;/span&gt;&lt;/span&gt;&lt;sup&gt;&lt;span lang=&quot;AR-SA&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;(&lt;/span&gt;&lt;/span&gt;&lt;/sup&gt;&lt;/b&gt;&lt;span class=&quot;MsoFootnoteReference&quot; style=&quot;vertical-align: super;&quot;&gt;&lt;span dir=&quot;LTR&quot; lang=&quot;AR-SA&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;a href=&quot;http://www.alminbar.net/malafilmy/ramadan/malaf29/3.HTM#3&quot; name=&quot;_ftnref3&quot;&gt;[3]&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;sup&gt;&lt;span lang=&quot;AR-SA&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;)&lt;/span&gt;&lt;/span&gt;&lt;/sup&gt;&lt;span lang=&quot;AR-SA&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; dir=&quot;RTL&quot; style=&quot;color: black; direction: rtl; font-family: &#39;Traditional Arabic&#39;; font-size: medium; font-weight: normal; margin-bottom: 6px; margin-top: 6px; text-align: justify; text-indent: 25px; unicode-bidi: embed;&quot;&gt;
&lt;b&gt;&lt;span lang=&quot;AR-SA&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;- عن عائشة رضي الله عنها قالت: كان رسول الله صلى الله عليه وسلم يجتهد في العشر الأواخر ما لا يجتهد في غيره. رواه مسلم&lt;/span&gt;&lt;/span&gt;&lt;sup&gt;&lt;span lang=&quot;AR-SA&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;(&lt;/span&gt;&lt;/span&gt;&lt;/sup&gt;&lt;/b&gt;&lt;span class=&quot;MsoFootnoteReference&quot; style=&quot;vertical-align: super;&quot;&gt;&lt;span dir=&quot;LTR&quot; lang=&quot;AR-SA&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;a href=&quot;http://www.alminbar.net/malafilmy/ramadan/malaf29/3.HTM#4&quot; name=&quot;_ftnref4&quot;&gt;[4]&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;sup&gt;&lt;span lang=&quot;AR-SA&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;)&lt;/span&gt;&lt;/span&gt;&lt;/sup&gt;&lt;span lang=&quot;AR-SA&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; dir=&quot;RTL&quot; style=&quot;color: black; direction: rtl; font-family: &#39;Traditional Arabic&#39;; font-size: medium; font-weight: normal; margin-bottom: 6px; margin-top: 6px; text-align: justify; text-indent: 25px; unicode-bidi: embed;&quot;&gt;
&lt;span lang=&quot;AR-SA&quot; style=&quot;font-weight: 700;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;- عن أبي سعيد الخدري رضي الله عنه قال: إن رسول الله صلى الله عليه وسلم اعتكف العشر الأول من رمضان، ثم اعتكف العشر الأوسط في قُبَّة تركية على سُدَّتها حصير، قال: فأخذ الحصير بيده، فنحاها في ناحية القبَّة، ثم أطلع رأسه فكلَّم الناس، فدنوا منه فقال:&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span lang=&quot;AR-SA&quot; style=&quot;color: green;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;((إني اعتكفتُ العشرَ الأول ألتمس هذه الليلة، ثم اعتكفتُ العشر الأوسط، ثم أتيت فقيل لي: إنها في العشر الأواخر، فمن أحبَّ منكم أن يعتكف فليعتكف))&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span lang=&quot;AR-SA&quot; style=&quot;font-weight: 700;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;، فاعتكف الناس معه، قال:&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span lang=&quot;AR-SA&quot; style=&quot;color: green;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;((وإني أُريتها ليلةَ وتر، وإني أسجد صبيحتها في طين وماء))&lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;AR-SA&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;، فأصبح من ليلة إحدى وعشرين وقد قام إلى الصبح، فمطرت السماء فوكف المسجد&lt;/span&gt;&lt;/span&gt;&lt;sup&gt;&lt;span lang=&quot;AR-SA&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;(&lt;/span&gt;&lt;/span&gt;&lt;/sup&gt;&lt;/b&gt;&lt;span class=&quot;MsoFootnoteReference&quot; style=&quot;vertical-align: super;&quot;&gt;&lt;span dir=&quot;LTR&quot; lang=&quot;AR-SA&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;a href=&quot;http://www.alminbar.net/malafilmy/ramadan/malaf29/3.HTM#5&quot; name=&quot;_ftnref5&quot;&gt;[5]&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;sup&gt;&lt;span lang=&quot;AR-SA&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;)&lt;/span&gt;&lt;/span&gt;&lt;/sup&gt;&lt;span lang=&quot;AR-SA&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;، فأبصرت الطين والماء، فخرج حين فرغ من صلاة الصبح وجبينه وروثة أنفه&lt;/span&gt;&lt;/span&gt;&lt;sup&gt;&lt;span lang=&quot;AR-SA&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;(&lt;/span&gt;&lt;/span&gt;&lt;/sup&gt;&lt;/b&gt;&lt;span class=&quot;MsoFootnoteReference&quot; style=&quot;vertical-align: super;&quot;&gt;&lt;span dir=&quot;LTR&quot; lang=&quot;AR-SA&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;a href=&quot;http://www.alminbar.net/malafilmy/ramadan/malaf29/3.HTM#6&quot; name=&quot;_ftnref6&quot;&gt;[6]&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;sup&gt;&lt;span lang=&quot;AR-SA&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;)&lt;/span&gt;&lt;/span&gt;&lt;/sup&gt;&lt;span lang=&quot;AR-SA&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&amp;nbsp;فيهما الطين والماء، وإذا هي ليلة إحدى وعشرين من العشر الأواخر. متفق عليه واللفظ لمسلم&lt;/span&gt;&lt;/span&gt;&lt;sup&gt;&lt;span lang=&quot;AR-SA&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;(&lt;/span&gt;&lt;/span&gt;&lt;/sup&gt;&lt;/b&gt;&lt;span class=&quot;MsoFootnoteReference&quot; style=&quot;vertical-align: super;&quot;&gt;&lt;span dir=&quot;LTR&quot; lang=&quot;AR-SA&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;a href=&quot;http://www.alminbar.net/malafilmy/ramadan/malaf29/3.HTM#7&quot; name=&quot;_ftnref7&quot;&gt;[7]&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;sup&gt;&lt;span lang=&quot;AR-SA&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;)&lt;/span&gt;&lt;/span&gt;&lt;/sup&gt;&lt;span lang=&quot;AR-SA&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; dir=&quot;RTL&quot; style=&quot;color: black; direction: rtl; font-family: &#39;Traditional Arabic&#39;; font-size: medium; font-weight: normal; margin-bottom: 6px; margin-top: 6px; text-align: justify; text-indent: 25px; unicode-bidi: embed;&quot;&gt;
&lt;span lang=&quot;AR-SA&quot; style=&quot;font-weight: 700;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;16- عن ابن عمر رضي الله عنهما أن رجالا من أصحاب النبي صلى الله عليه وسلم أُروا ليلة القدر في المنام في السبع الأواخر، فقال رسول الله صلى الله عليه وسلم:&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span lang=&quot;AR-SA&quot; style=&quot;color: green;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;((أرى رؤياكم قد تواطأت في السبع الأواخر، فمن كان متحرِّيَها فليتحرَّها في السبع الأواخر))&lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;AR-SA&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&amp;nbsp;متفق عليه&lt;/span&gt;&lt;/span&gt;&lt;sup&gt;&lt;span lang=&quot;AR-SA&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;(&lt;/span&gt;&lt;/span&gt;&lt;/sup&gt;&lt;/b&gt;&lt;span class=&quot;MsoFootnoteReference&quot; style=&quot;vertical-align: super;&quot;&gt;&lt;span dir=&quot;LTR&quot; lang=&quot;AR-SA&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;a href=&quot;http://www.alminbar.net/malafilmy/ramadan/malaf29/3.HTM#8&quot; name=&quot;_ftnref8&quot;&gt;[8]&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;sup&gt;&lt;span lang=&quot;AR-SA&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;)&lt;/span&gt;&lt;/span&gt;&lt;/sup&gt;&lt;span lang=&quot;AR-SA&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; dir=&quot;RTL&quot; style=&quot;color: black; direction: rtl; font-family: &#39;Traditional Arabic&#39;; font-size: medium; font-weight: normal; margin-bottom: 6px; margin-top: 6px; text-align: justify; text-indent: 25px; unicode-bidi: embed;&quot;&gt;
&lt;span lang=&quot;AR-SA&quot; style=&quot;font-weight: 700;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;17- عن عائشة رضي الله عنها أن رسول الله صلى الله عليه وسلم قال:&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span lang=&quot;AR-SA&quot; style=&quot;color: green;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;((تحروا ليلة القدر في الوتر من العشر الأواخر من رمضان))&lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;AR-SA&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&amp;nbsp;متفق عليه واللفظ للبخاري&lt;/span&gt;&lt;/span&gt;&lt;sup&gt;&lt;span lang=&quot;AR-SA&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;(&lt;/span&gt;&lt;/span&gt;&lt;/sup&gt;&lt;/b&gt;&lt;span class=&quot;MsoFootnoteReference&quot; style=&quot;vertical-align: super;&quot;&gt;&lt;span dir=&quot;LTR&quot; lang=&quot;AR-SA&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;a href=&quot;http://www.alminbar.net/malafilmy/ramadan/malaf29/3.HTM#9&quot; name=&quot;_ftnref9&quot;&gt;[9]&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;sup&gt;&lt;span lang=&quot;AR-SA&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;)&lt;/span&gt;&lt;/span&gt;&lt;/sup&gt;&lt;span lang=&quot;AR-SA&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; dir=&quot;RTL&quot; style=&quot;color: black; direction: rtl; font-family: &#39;Traditional Arabic&#39;; font-size: medium; font-weight: normal; margin-bottom: 6px; margin-top: 6px; text-align: justify; text-indent: 25px; unicode-bidi: embed;&quot;&gt;
&lt;span lang=&quot;AR-SA&quot; style=&quot;font-weight: 700;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;18- عن عائشة رضي الله عنها قالت: قلت: يا رسول الله، أرأيتَ إن علمتُ أي ليلةٍ ليلةُ القدر ما أقول فيها؟ قال:&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span lang=&quot;AR-SA&quot; style=&quot;color: green;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;((قولي: اللهم إنك عفو كريم، تحب العفو، فاعف عني))&lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;AR-SA&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&amp;nbsp;رواه أحمد وأصحاب السنن واللفظ للترمذي&lt;/span&gt;&lt;/span&gt;&lt;sup&gt;&lt;span lang=&quot;AR-SA&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;(&lt;/span&gt;&lt;/span&gt;&lt;/sup&gt;&lt;/b&gt;&lt;span class=&quot;MsoFootnoteReference&quot; style=&quot;vertical-align: super;&quot;&gt;&lt;span dir=&quot;LTR&quot; lang=&quot;AR-SA&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;a href=&quot;http://www.alminbar.net/malafilmy/ramadan/malaf29/3.HTM#10&quot; name=&quot;_ftnref10&quot;&gt;[10]&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;sup&gt;&lt;span lang=&quot;AR-SA&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;)&lt;/span&gt;&lt;/span&gt;&lt;/sup&gt;&lt;span lang=&quot;AR-SA&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;color: black; font-family: &#39;Traditional Arabic&#39;; font-size: medium; font-weight: normal; text-align: start;&quot;&gt;
&lt;div style=&quot;margin-bottom: 6px; margin-top: 6px; text-indent: 25px;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br clear=&quot;all&quot; /&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;hr align=&quot;right&quot; size=&quot;1&quot; width=&quot;33%&quot; /&gt;
&lt;div id=&quot;ftn1&quot;&gt;
&lt;div class=&quot;MsoFootnoteText&quot; dir=&quot;rtl&quot; style=&quot;direction: rtl; margin-bottom: 6px; margin-top: 6px; text-align: justify; unicode-bidi: embed;&quot;&gt;
&lt;b&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;1&quot;&gt;&lt;span lang=&quot;AR-SA&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;MsoFootnoteReference&quot; style=&quot;vertical-align: super;&quot;&gt;&lt;span dir=&quot;LTR&quot; style=&quot;vertical-align: baseline;&quot;&gt;&lt;span style=&quot;vertical-align: baseline;&quot;&gt;[1]&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;AR-SA&quot;&gt;)&lt;/span&gt;&lt;/a&gt;&lt;span lang=&quot;AR-SA&quot;&gt;&amp;nbsp;أخرجه البخاري في الصوم (1901)، ومسلم في صلاة المسافرين (760).&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div id=&quot;ftn2&quot;&gt;
&lt;div class=&quot;MsoFootnoteText&quot; dir=&quot;rtl&quot; style=&quot;direction: rtl; margin-bottom: 6px; margin-top: 6px; text-align: justify; unicode-bidi: embed;&quot;&gt;
&lt;b&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;2&quot;&gt;&lt;span lang=&quot;AR-SA&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;MsoFootnoteReference&quot; style=&quot;vertical-align: super;&quot;&gt;&lt;span dir=&quot;LTR&quot; style=&quot;vertical-align: baseline;&quot;&gt;&lt;span style=&quot;vertical-align: baseline;&quot;&gt;[2]&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;AR-SA&quot;&gt;)&lt;/span&gt;&lt;/a&gt;&lt;span lang=&quot;AR-SA&quot;&gt;&amp;nbsp;أي: اعتزل نساءه، وقال: المراد الجد والاجتهاد في العبادة.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div id=&quot;ftn3&quot;&gt;
&lt;div class=&quot;MsoFootnoteText&quot; dir=&quot;rtl&quot; style=&quot;direction: rtl; margin-bottom: 6px; margin-top: 6px; text-align: justify; unicode-bidi: embed;&quot;&gt;
&lt;b&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;3&quot;&gt;&lt;span lang=&quot;AR-SA&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;MsoFootnoteReference&quot; style=&quot;vertical-align: super;&quot;&gt;&lt;span dir=&quot;LTR&quot; style=&quot;vertical-align: baseline;&quot;&gt;&lt;span style=&quot;vertical-align: baseline;&quot;&gt;[3]&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;AR-SA&quot;&gt;)&lt;/span&gt;&lt;/a&gt;&lt;span lang=&quot;AR-SA&quot;&gt;&amp;nbsp;أخرجه البخاري في الاعتكاف (2024)، ومسلم في الاعتكاف (1174).&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div id=&quot;ftn4&quot;&gt;
&lt;div class=&quot;MsoFootnoteText&quot; dir=&quot;rtl&quot; style=&quot;direction: rtl; margin-bottom: 6px; margin-top: 6px; text-align: justify; unicode-bidi: embed;&quot;&gt;
&lt;b&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;4&quot;&gt;&lt;span lang=&quot;AR-SA&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;MsoFootnoteReference&quot; style=&quot;vertical-align: super;&quot;&gt;&lt;span dir=&quot;LTR&quot; style=&quot;vertical-align: baseline;&quot;&gt;&lt;span style=&quot;vertical-align: baseline;&quot;&gt;[4]&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;AR-SA&quot;&gt;)&lt;/span&gt;&lt;/a&gt;&lt;span lang=&quot;AR-SA&quot;&gt;&amp;nbsp;أخرجه مسلم في الاعتكاف (1175).&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div id=&quot;ftn5&quot;&gt;
&lt;div class=&quot;MsoFootnoteText&quot; dir=&quot;rtl&quot; style=&quot;direction: rtl; margin-bottom: 6px; margin-top: 6px; text-align: justify; unicode-bidi: embed;&quot;&gt;
&lt;b&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;5&quot;&gt;&lt;span lang=&quot;AR-SA&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;MsoFootnoteReference&quot; style=&quot;vertical-align: super;&quot;&gt;&lt;span dir=&quot;LTR&quot; style=&quot;vertical-align: baseline;&quot;&gt;&lt;span style=&quot;vertical-align: baseline;&quot;&gt;[5]&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;AR-SA&quot;&gt;)&lt;/span&gt;&lt;/a&gt;&lt;span lang=&quot;AR-SA&quot;&gt;&amp;nbsp;أي: سال من سقفه المطر.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div id=&quot;ftn6&quot;&gt;
&lt;div class=&quot;MsoFootnoteText&quot; dir=&quot;rtl&quot; style=&quot;direction: rtl; margin-bottom: 6px; margin-top: 6px; text-align: justify; unicode-bidi: embed;&quot;&gt;
&lt;b&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;6&quot;&gt;&lt;span lang=&quot;AR-SA&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;MsoFootnoteReference&quot; style=&quot;vertical-align: super;&quot;&gt;&lt;span dir=&quot;LTR&quot; style=&quot;vertical-align: baseline;&quot;&gt;&lt;span style=&quot;vertical-align: baseline;&quot;&gt;[6]&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;AR-SA&quot;&gt;)&lt;/span&gt;&lt;/a&gt;&lt;span lang=&quot;AR-SA&quot;&gt;&amp;nbsp;أي: طرفه، ويقال لها أيضا: أرنبة.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div id=&quot;ftn7&quot;&gt;
&lt;div class=&quot;MsoFootnoteText&quot; dir=&quot;rtl&quot; style=&quot;direction: rtl; margin-bottom: 6px; margin-top: 6px; text-align: justify; unicode-bidi: embed;&quot;&gt;
&lt;b&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;7&quot;&gt;&lt;span lang=&quot;AR-SA&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;MsoFootnoteReference&quot; style=&quot;vertical-align: super;&quot;&gt;&lt;span dir=&quot;LTR&quot; style=&quot;vertical-align: baseline;&quot;&gt;&lt;span style=&quot;vertical-align: baseline;&quot;&gt;[7]&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;AR-SA&quot;&gt;)&lt;/span&gt;&lt;/a&gt;&lt;span lang=&quot;AR-SA&quot;&gt;&amp;nbsp;أخرجه البخاري في الاعتكاف (2027)، ومسلم في الاعتكاف (1167).&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div id=&quot;ftn8&quot;&gt;
&lt;div class=&quot;MsoFootnoteText&quot; dir=&quot;rtl&quot; style=&quot;direction: rtl; margin-bottom: 6px; margin-top: 6px; text-align: justify; unicode-bidi: embed;&quot;&gt;
&lt;b&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;8&quot;&gt;&lt;span lang=&quot;AR-SA&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;MsoFootnoteReference&quot; style=&quot;vertical-align: super;&quot;&gt;&lt;span dir=&quot;LTR&quot; style=&quot;vertical-align: baseline;&quot;&gt;&lt;span style=&quot;vertical-align: baseline;&quot;&gt;[8]&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;AR-SA&quot;&gt;)&lt;/span&gt;&lt;/a&gt;&lt;span lang=&quot;AR-SA&quot;&gt;&amp;nbsp;أخرجه البخاري في صلاة التراويح (2015)، ومسلم في الصيام (1165).&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div id=&quot;ftn9&quot;&gt;
&lt;div class=&quot;MsoFootnoteText&quot; dir=&quot;rtl&quot; style=&quot;direction: rtl; margin-bottom: 6px; margin-top: 6px; text-align: justify; unicode-bidi: embed;&quot;&gt;
&lt;b&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;9&quot;&gt;&lt;span lang=&quot;AR-SA&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;MsoFootnoteReference&quot; style=&quot;vertical-align: super;&quot;&gt;&lt;span dir=&quot;LTR&quot; style=&quot;vertical-align: baseline;&quot;&gt;&lt;span style=&quot;vertical-align: baseline;&quot;&gt;[9]&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;AR-SA&quot;&gt;)&lt;/span&gt;&lt;/a&gt;&lt;span lang=&quot;AR-SA&quot;&gt;&amp;nbsp;أخرجه البخاري في صلاة التراويح (2017)، ومسلم في الصيام (1169).&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div id=&quot;ftn10&quot;&gt;
&lt;div class=&quot;MsoFootnoteText&quot; dir=&quot;rtl&quot; style=&quot;direction: rtl; margin-bottom: 6px; margin-top: 6px; text-align: justify; unicode-bidi: embed;&quot;&gt;
&lt;b&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;10&quot;&gt;&lt;span lang=&quot;AR-SA&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;MsoFootnoteReference&quot; style=&quot;vertical-align: super;&quot;&gt;&lt;span dir=&quot;LTR&quot; style=&quot;vertical-align: baseline;&quot;&gt;&lt;span style=&quot;vertical-align: baseline;&quot;&gt;[10]&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;AR-SA&quot;&gt;)&lt;/span&gt;&lt;/a&gt;&lt;span lang=&quot;AR-SA&quot;&gt;&amp;nbsp;أخرجه أحمد (6/182)، والترمذي في الدعوات (3580)، والنسائي في الكبرى (3130)، وابن ماجه في الدعاء (3850)، قال الترمذي: &quot;هذا حديث حسن صحيح&quot;، وصححه الحاكم (1/530)، ووافقه الذهبي، وصححه الألباني في صحيح الترمذي (2789).&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;MsoSubtitle&quot; dir=&quot;RTL&quot; style=&quot;color: black; font-family: &#39;Traditional Arabic&#39;; font-size: medium; font-weight: normal; margin-bottom: 6px; margin-top: 6px; text-align: start; text-indent: 25px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://ibda3four.blogspot.com/feeds/8230428657257953110/comments/default' title='تعليقات الرسالة'/><link rel='replies' type='text/html' href='http://ibda3four.blogspot.com/2014/07/1.html#comment-form' title='0 تعليقات'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6168572102412770513/posts/default/8230428657257953110'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6168572102412770513/posts/default/8230428657257953110'/><link rel='alternate' type='text/html' href='http://ibda3four.blogspot.com/2014/07/1.html' title=' أحاديث في فضل العشر الأواخر وليلة القدر'/><author><name>ibda3four</name><uri>http://www.blogger.com/profile/12166158855015146950</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglqStA-qwzPcOg1v-wkyhR9uWwGBItSrMrlfJagpX6ik5LZb4FQoip6yhE20FgjkTKCIxTOZdRRy1TOr42CwQZSJcDFvN5sjfjEIpcCPIRqZ4rTfwdUdXNp5ZesIEQT1qjfoAr5ic2UJ3e/s72-c/1252305306.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6168572102412770513.post-7300008334052840241</id><published>2014-07-17T11:13:00.001-07:00</published><updated>2014-07-17T15:45:55.565-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="صيانة وبرامج"/><category scheme="http://www.blogger.com/atom/ns#" term="مجانيات"/><title type='text'>capteur d&#39;ecran--faststone capture --   لتصوير سطح المكتب وعمل الشروحات + keygen</title><content type='html'>&lt;div dir=&quot;rtl&quot; style=&quot;text-align: right;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;font-family: Helvetica, Arial; font-size: 16px; font-weight: bold; text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Helvetica, Arial; font-size: 16px; font-weight: bold; text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLYDVnUH6gD7AIp5LWdBl4rSgaq-DvWGQh-as1VNY71c6924rnVyR_6Hu1XSUlRjmq0cCXM6wl0HoAivw3jdW_ukaMdv6_WHs22Wsm-DNk2O2SGZTg7XlYkRAiY8l2GgPpMOm7DcNKyw_k/s1600/images+(1).jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLYDVnUH6gD7AIp5LWdBl4rSgaq-DvWGQh-as1VNY71c6924rnVyR_6Hu1XSUlRjmq0cCXM6wl0HoAivw3jdW_ukaMdv6_WHs22Wsm-DNk2O2SGZTg7XlYkRAiY8l2GgPpMOm7DcNKyw_k/s1600/images+(1).jpg&quot; height=&quot;400&quot; width=&quot;289&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;برنامج&amp;nbsp;يعتبر من افضل البرامج لالتقاط الصور من سطح المكتب والفيديو للشاشة كاملة&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Helvetica, Arial; font-size: 16px; font-weight: bold; text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&amp;nbsp;يمكنكم بواسطة هذا البرنامج التقاط صورة و&lt;span style=&quot;text-align: right;&quot;&gt;تسجيل فيديو لما يحدث على شاشة الكمبيوتر&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Helvetica, Arial; font-size: 16px; font-weight: bold; text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: medium; text-align: right;&quot;&gt;وأيضا يمكنك عمل شروحاتك من فيديو و صور&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Helvetica, Arial; font-size: 16px; font-weight: bold; text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: medium; text-align: right;&quot;&gt;و الكتابة على الصور و حفظها بصيغ مختفلة و تكبير و تصغير الصور&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: medium; text-align: right;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: medium; text-align: right;&quot;&gt;&lt;a href=&quot;http://www.mediafire.com/download/lblt98ly64t1e05/FastStone+Capture+6.7+Final.rar&quot; target=&quot;_blank&quot;&gt;DOWNLOAD&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: #007700; font-size: medium; text-align: right;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://ibda3four.blogspot.com/feeds/7300008334052840241/comments/default' title='تعليقات الرسالة'/><link rel='replies' type='text/html' href='http://ibda3four.blogspot.com/2014/07/capteur-decran-faststone-capture-keygen.html#comment-form' title='0 تعليقات'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6168572102412770513/posts/default/7300008334052840241'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6168572102412770513/posts/default/7300008334052840241'/><link rel='alternate' type='text/html' href='http://ibda3four.blogspot.com/2014/07/capteur-decran-faststone-capture-keygen.html' title='capteur d&#39;ecran--faststone capture --   لتصوير سطح المكتب وعمل الشروحات + keygen'/><author><name>ibda3four</name><uri>http://www.blogger.com/profile/12166158855015146950</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLYDVnUH6gD7AIp5LWdBl4rSgaq-DvWGQh-as1VNY71c6924rnVyR_6Hu1XSUlRjmq0cCXM6wl0HoAivw3jdW_ukaMdv6_WHs22Wsm-DNk2O2SGZTg7XlYkRAiY8l2GgPpMOm7DcNKyw_k/s72-c/images+(1).jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6168572102412770513.post-3846639899419044759</id><published>2014-07-17T09:21:00.000-07:00</published><updated>2014-07-17T11:23:14.568-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="NETWORK"/><category scheme="http://www.blogger.com/atom/ns#" term="مقالات"/><title type='text'>Modèle TCP/IP</title><content type='html'>&lt;div dir=&quot;rtl&quot; style=&quot;text-align: right;&quot; trbidi=&quot;on&quot;&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;h2 style=&quot;text-align: center;&quot;&gt;
&amp;nbsp;Modèle TCP/IP &amp;nbsp;&lt;/h2&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&amp;nbsp; &amp;nbsp;La forme actuelle de TCP/IP résulte du rôle historique que ce système de protocoles a joué dans le parachèvement de ce qui allait devenir Internet. À l&#39;instar des nombreux développements de ces dernières années, Internet est issu des recherches lancées par le DOD (Department Of Defense), département de la défense américaine. &amp;nbsp;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&amp;nbsp; &amp;nbsp;À la fin des années 60, les officiels du DOD se rendirent compte que les militaires du département de la défense possédaient une grande quantité de matériel informatique très divers, mais ces machines travaillaient pour la plupart de manière isolée ou encore en réseaux de taille très modeste avec des protocoles incompatibles entre eux, ceci rendant une interconnexion impossible. &amp;nbsp;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&amp;nbsp; &amp;nbsp; Les autorités militaires se sont alors demandées s&#39;il était possible, pour ces machines aux profils très différents, de traiter des informations mises en commun. Habitués aux problèmes de sécurité, les responsables de la défense ont immédiatement réalisés qu&#39;un réseau de grande ampleur deviendrait une cible idéale en cas de conflit. La caractéristique principale de ce réseau, s&#39;il devait exister, était d&#39;être non centralisée. &amp;nbsp;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; style=&quot;text-align: left;&quot;&gt;
&amp;nbsp; &amp;nbsp; Ses fonctions essentielles ne devaient en aucun cas se trouver en un seul point, ce qui le rendrait trop vulnérable. C&#39;est alors que fut mis en place le projet ARPANet (Advanced Research Projects Agency Network du DOD), qui allait devenir par la suite le système d&#39;interconnexion de réseau qui régit ce que l&#39;on appelle aujourd&#39;hui Internet : TCP/IP&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;blockquote dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;b&gt;TCP/IP est un modèle comprenant 4 couches : &amp;nbsp;&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjsG4F04YKws8-W8yxgyDimnd6Z2Sbxuoodagunrc6n9WU4Pug0vXYT4e-RdNyhKkqSxNAqLoszVyfQvgQPhY-l0L3yBhOz1l0TRueQl958T2uj4739UrGhAwj_mtn4rq1p1h3LdpAfGl5q/s1600/1.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjsG4F04YKws8-W8yxgyDimnd6Z2Sbxuoodagunrc6n9WU4Pug0vXYT4e-RdNyhKkqSxNAqLoszVyfQvgQPhY-l0L3yBhOz1l0TRueQl958T2uj4739UrGhAwj_mtn4rq1p1h3LdpAfGl5q/s1600/1.png&quot; height=&quot;190&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/blockquote&gt;
&lt;h2 dir=&quot;ltr&quot; style=&quot;text-align: center;&quot;&gt;
Comparaison entre le modèle TCP/IP et le modèle OSI &amp;nbsp;&lt;/h2&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;blockquote dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
Ces deux modèles sont très similaires, dans la mesure où les 2 sont des modèles de communication à couche et utilisent l’encapsulation de données. &lt;br /&gt;
On remarque cependant deux différences majeures :&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
• TCP/IP regroupe certaines couches du modèle OSI dans des couches plus générales&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
• TCP/IP est plus qu’un modèle de conception théorique, c’est sur lui que repose le réseau&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYOlUMfd_-478r0H0mnsThOwDBBtmGtNPSLBKR-eOlQGLsqk3CcZAOXXHF035Oo5DwhdPeehzCSLS-7hgl4V5oWS7cgtpCqsj8OXj8FaIflEYMHXXsR19Isye6esm927l9JCGAAtgFJKjh/s1600/2.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYOlUMfd_-478r0H0mnsThOwDBBtmGtNPSLBKR-eOlQGLsqk3CcZAOXXHF035Oo5DwhdPeehzCSLS-7hgl4V5oWS7cgtpCqsj8OXj8FaIflEYMHXXsR19Isye6esm927l9JCGAAtgFJKjh/s1600/2.png&quot; height=&quot;155&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;/blockquote&gt;
&lt;h2 dir=&quot;ltr&quot; style=&quot;text-align: center;&quot;&gt;
&lt;/h2&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://ibda3four.blogspot.com/feeds/3846639899419044759/comments/default' title='تعليقات الرسالة'/><link rel='replies' type='text/html' href='http://ibda3four.blogspot.com/2014/07/ModeleTCP.html#comment-form' title='0 تعليقات'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6168572102412770513/posts/default/3846639899419044759'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6168572102412770513/posts/default/3846639899419044759'/><link rel='alternate' type='text/html' href='http://ibda3four.blogspot.com/2014/07/ModeleTCP.html' title='Modèle TCP/IP'/><author><name>ibda3four</name><uri>http://www.blogger.com/profile/12166158855015146950</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjsG4F04YKws8-W8yxgyDimnd6Z2Sbxuoodagunrc6n9WU4Pug0vXYT4e-RdNyhKkqSxNAqLoszVyfQvgQPhY-l0L3yBhOz1l0TRueQl958T2uj4739UrGhAwj_mtn4rq1p1h3LdpAfGl5q/s72-c/1.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6168572102412770513.post-3493795191594955572</id><published>2014-07-16T11:35:00.000-07:00</published><updated>2014-07-16T16:00:06.338-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="حصريات"/><category scheme="http://www.blogger.com/atom/ns#" term="صيانة وبرامج"/><category scheme="http://www.blogger.com/atom/ns#" term="مجانيات"/><category scheme="http://www.blogger.com/atom/ns#" term="مقالات"/><title type='text'>احسن موقع للكشف عن الاعدادات الناقصة الخاصة بالحاسوب ومجانا tous les driver</title><content type='html'>&lt;div dir=&quot;rtl&quot; style=&quot;text-align: right;&quot; trbidi=&quot;on&quot;&gt;
&lt;h1 class=&quot;barretitreemp&quot; style=&quot;background-color: #cedeee; border: 0px; color: white; font-family: Arimo, arial, helvetica, verdana, tahoma, sans-serif; font-size: 18px; line-height: 41px; margin: 0px; outline: none; padding: 0px; text-align: start; text-indent: 24px; text-shadow: rgba(0, 0, 0, 0.4) 0px 1px 3px; vertical-align: baseline;&quot;&gt;
الكشف عن ضبط الاعدادات الخاص بك والبحث عن برامج التشغيل الملائمة :&lt;/h1&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style=&quot;background-color: white; font-family: Arimo, arial, helvetica, verdana, tahoma, sans-serif; line-height: 16.799999237060547px; text-align: justify;&quot;&gt;خلال هذه العملية، سوف يقوم Ma-Config بتحليل محتويات جهاز الكمبيوتر الخاص بك. في معظم الحالات، سيتم العثور على جميع الأجهزة وسيتم بعد ذلك عرض قائمة النتائج. لمزيد من الوضوح، سوف يتم نشر أهم العناصر مع توزيعها ضمن فئات محددة. بطبيعة الحال، يمكن الاطلاع على معلومات أكثر تفصيلا في القائمة على يمين الصفحة. نلفت انتباهكم أنه من الممكن، و في مناسبات نادرة، أن لا يتم التعرف على عنصر من المعدات بشكل صحيح.&lt;/span&gt;&lt;br style=&quot;background-color: white; font-family: Arimo, arial, helvetica, verdana, tahoma, sans-serif; line-height: 16.799999237060547px; outline: none; text-align: justify;&quot; /&gt;&lt;br style=&quot;background-color: white; font-family: Arimo, arial, helvetica, verdana, tahoma, sans-serif; line-height: 16.799999237060547px; outline: none; text-align: justify;&quot; /&gt;&lt;span style=&quot;background-color: white; font-family: Arimo, arial, helvetica, verdana, tahoma, sans-serif; line-height: 16.799999237060547px; text-align: justify;&quot;&gt;بعد انتهاء عملية الكشف، سيكون لديك الامكانية للتعرف على الخدمات الأخرى، بما في ذلك البحث عن برامج التشغيل الجديدة المتاحة ومركز المشاركة.&lt;/span&gt;&lt;br style=&quot;background-color: white; font-family: Arimo, arial, helvetica, verdana, tahoma, sans-serif; line-height: 16.799999237060547px; outline: none; text-align: justify;&quot; /&gt;&lt;br style=&quot;background-color: white; font-family: Arimo, arial, helvetica, verdana, tahoma, sans-serif; line-height: 16.799999237060547px; outline: none; text-align: justify;&quot; /&gt;&lt;span style=&quot;background-color: white; font-family: Arimo, arial, helvetica, verdana, tahoma, sans-serif; line-height: 16.799999237060547px; text-align: justify;&quot;&gt;إذا كنت ترغب في اعادة عملية الكشف وذلك في وقت لاحق، فإنه لن يكون من الضروري الرجوع إلى الموقع. يمكن استعمال الأيقونة المتوفرة على سطح المكتب.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style=&quot;background-color: white; font-family: Arimo, arial, helvetica, verdana, tahoma, sans-serif; line-height: 16.799999237060547px; text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;h1 class=&quot;barretitreemp&quot; style=&quot;background-color: #cedeee; border: 0px; color: white; font-family: Arimo, arial, helvetica, verdana, tahoma, sans-serif; font-size: 18px; line-height: 41px; margin: 0px; outline: none; padding: 0px; text-align: start; text-indent: 24px; text-shadow: rgba(0, 0, 0, 0.4) 0px 1px 3px; vertical-align: baseline;&quot;&gt;
اليكم الطريقة&amp;nbsp;&lt;/h1&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
1- نقوم بالدخول للموقع التالي : &amp;nbsp; &lt;a href=&quot;http://www.ma-config.com/ar&quot; target=&quot;_blank&quot;&gt;ma-config&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMh2imgaoeVxqed0UoGuMdxBiNNjPgwbY-V4AiwEZt09b1_B0HBGx-l_NmPGlq0XKwwCcR5ZXl5-xxxd8_ISLRzcQ0E-nW7pqTVF-p-sDc48nu7q5MTT2mjKgy-m5z9jnOKZ0SlfNz1j_8/s1600/1.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMh2imgaoeVxqed0UoGuMdxBiNNjPgwbY-V4AiwEZt09b1_B0HBGx-l_NmPGlq0XKwwCcR5ZXl5-xxxd8_ISLRzcQ0E-nW7pqTVF-p-sDc48nu7q5MTT2mjKgy-m5z9jnOKZ0SlfNz1j_8/s1600/1.png&quot; height=&quot;173&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
2 - نقوم بالضغط على&lt;span style=&quot;color: red;&quot;&gt; بدا الكشف&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: red;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
3- نقوم بالضغط على &lt;span style=&quot;color: red;&quot;&gt;تثبيت العميل&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;color: red;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyHYYVnfvRBIuO9t0u4f4oWCYydqXT18w-8CMvtYf9QlGF3M8uLTu-svRs3VCb8mwceJcGobUMzPIpcOyuYaMkujRiEqwKmiSpiqQgrEAmLtL4fPpWhl5sN9rnbqm6o9QnPnZzvizPwFB5/s1600/2.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyHYYVnfvRBIuO9t0u4f4oWCYydqXT18w-8CMvtYf9QlGF3M8uLTu-svRs3VCb8mwceJcGobUMzPIpcOyuYaMkujRiEqwKmiSpiqQgrEAmLtL4fPpWhl5sN9rnbqm6o9QnPnZzvizPwFB5/s1600/2.png&quot; height=&quot;198&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
4- نقوم بتنزيل البرنامج على اساس الونداوز او تحميله اوتوماتيكي&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7iA5-Z3Q-CJhFVa0V-PbVwJYezPg_kM1vCRpqwAOx_HmrIoOUVeC_JiH9WeB_XmE2Aca6ZXdsdzscLOie_PJct3ROpI7GPDfFnVEtSYNVrEkFHnB1NRc_N8_J_Zv3OkcsvxFOaNW7LZrk/s1600/4.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7iA5-Z3Q-CJhFVa0V-PbVwJYezPg_kM1vCRpqwAOx_HmrIoOUVeC_JiH9WeB_XmE2Aca6ZXdsdzscLOie_PJct3ROpI7GPDfFnVEtSYNVrEkFHnB1NRc_N8_J_Zv3OkcsvxFOaNW7LZrk/s1600/4.png&quot; height=&quot;177&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
5- بعد تثبيت البرنامج نفتح الايقونة وبعدها يقوم البر نامج بفحص الجهاز وبعدها تفتح صفحة ويب فيها الموقع ma config&lt;/div&gt;
&lt;div&gt;
6- ;وبعدها نذهب الى اخر الصفحة حيث نجد&lt;span style=&quot;color: red;&quot;&gt; البحث عن المشغلات&lt;/span&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXQFtDBH72L6pjg2dN-f9DsTulEWdOOoNsyqatZzbIi8dqzIGhhm59-1RITir8mIyPfXYHeT2069tG1dYix0ito00xQ5YYALJzoKhfHFJ6oG9QxIoSPuUTP8RS7iyCyjx6jdqr3ria5NFw/s1600/5.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXQFtDBH72L6pjg2dN-f9DsTulEWdOOoNsyqatZzbIi8dqzIGhhm59-1RITir8mIyPfXYHeT2069tG1dYix0ito00xQ5YYALJzoKhfHFJ6oG9QxIoSPuUTP8RS7iyCyjx6jdqr3ria5NFw/s1600/5.png&quot; height=&quot;137&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
7- وبعدها تضهر هذه الصفحة الموجود فيه كل ما يخص الجهاز&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzL7qkhtk_EZ7byWdtpWROwIbGQ4jiCseDklT7gowPIb5AzlbEsrXSAjmwIPLWhAip39aB5cA4TYnc6f6GlzNbitP564y4a9QUsoTECPpgUTE3lsWps3xYuQTjaoYtgSB2scyKaDKaQip4/s1600/6.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzL7qkhtk_EZ7byWdtpWROwIbGQ4jiCseDklT7gowPIb5AzlbEsrXSAjmwIPLWhAip39aB5cA4TYnc6f6GlzNbitP564y4a9QUsoTECPpgUTE3lsWps3xYuQTjaoYtgSB2scyKaDKaQip4/s1600/6.png&quot; height=&quot;179&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
اليكم الفيديوا :&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;iframe allowfullscreen=&#39;allowfullscreen&#39; webkitallowfullscreen=&#39;webkitallowfullscreen&#39; mozallowfullscreen=&#39;mozallowfullscreen&#39; width=&#39;320&#39; height=&#39;266&#39; src=&#39;https://www.youtube.com/embed/zDpaZ7jBImU?feature=player_embedded&#39; frameborder=&#39;0&#39;&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://ibda3four.blogspot.com/feeds/3493795191594955572/comments/default' title='تعليقات الرسالة'/><link rel='replies' type='text/html' href='http://ibda3four.blogspot.com/2014/07/drivermaconfig.html#comment-form' title='0 تعليقات'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6168572102412770513/posts/default/3493795191594955572'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6168572102412770513/posts/default/3493795191594955572'/><link rel='alternate' type='text/html' href='http://ibda3four.blogspot.com/2014/07/drivermaconfig.html' title='احسن موقع للكشف عن الاعدادات الناقصة الخاصة بالحاسوب ومجانا tous les driver'/><author><name>ibda3four</name><uri>http://www.blogger.com/profile/12166158855015146950</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMh2imgaoeVxqed0UoGuMdxBiNNjPgwbY-V4AiwEZt09b1_B0HBGx-l_NmPGlq0XKwwCcR5ZXl5-xxxd8_ISLRzcQ0E-nW7pqTVF-p-sDc48nu7q5MTT2mjKgy-m5z9jnOKZ0SlfNz1j_8/s72-c/1.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6168572102412770513.post-4561703692643663768</id><published>2014-07-16T10:35:00.000-07:00</published><updated>2014-07-16T10:35:34.176-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="صيانة وبرامج"/><category scheme="http://www.blogger.com/atom/ns#" term="مجانيات"/><title type='text'>تحميل برنامج Prezi لتقديم العروض مجانا ولمدة 3 سنوات</title><content type='html'>&lt;div dir=&quot;rtl&quot; style=&quot;text-align: right;&quot; trbidi=&quot;on&quot;&gt;
&lt;h2 style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: tahoma; line-height: 24px; text-align: start;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red; font-size: large;&quot;&gt;تحميل برنامج Prezi&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgesHxnSxR9OMzpgkGcrBwAk4FLaj-45BcqrylBpdwTzNABIuTGvm8EZljv7Lu1Oq4eBYerCnPRAfwNoLbh0OXOW0mfaemszT06SWw_qEHBxIqndVeUjePWR5yXB5DlIwe_-ZsabUo0YaSP/s1600/ibcRa7keSFtWgz.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgesHxnSxR9OMzpgkGcrBwAk4FLaj-45BcqrylBpdwTzNABIuTGvm8EZljv7Lu1Oq4eBYerCnPRAfwNoLbh0OXOW0mfaemszT06SWw_qEHBxIqndVeUjePWR5yXB5DlIwe_-ZsabUo0YaSP/s1600/ibcRa7keSFtWgz.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: tahoma; line-height: 24px; text-align: start;&quot;&gt;Prezi عبارة عن برنامج مجاني لعمل و إنشاء عروض تقديمية احترافية بدون الحاجة الى وجود برنامج باوربوينت و يتميز بأنك لا تحتاج إلى جهد في إعداد العروض التقديمية و كذلك الحصول على عرض تقديمي رائع .&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: tahoma; line-height: 24px; text-align: start;&quot;&gt;يتيح لك برنامج بريزي امكانية عمل عروض تقديمية مثل المحترفين و كما تريده ، و تنظيمها بطريقة منطقية و اضافة الأصوات و الفيديو و مشاركتها مع الآخرين . يوفر أيضا مجموعة من القوالب في البرنامج و قوالب أخرى يمكن تنزيلها من الموقع الرسمي المرفق جوار رابط التحميل&amp;nbsp; - و يمتاز أيضا بإمكانية عمل عروض تقديمية معقدة بخطوات بسيطة و سهلة .&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: tahoma; line-height: 24px; text-align: start;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: tahoma; line-height: 24px; text-align: start;&quot;&gt;الاصدار الاخير مجانا من موقع بريزي :&lt;a href=&quot;http://prezi.com/windows/&quot; target=&quot;_blank&quot;&gt; للتحميل&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://ibda3four.blogspot.com/feeds/4561703692643663768/comments/default' title='تعليقات الرسالة'/><link rel='replies' type='text/html' href='http://ibda3four.blogspot.com/2014/07/Prezi5.2.4.html#comment-form' title='1 تعليقات'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6168572102412770513/posts/default/4561703692643663768'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6168572102412770513/posts/default/4561703692643663768'/><link rel='alternate' type='text/html' href='http://ibda3four.blogspot.com/2014/07/Prezi5.2.4.html' title='تحميل برنامج Prezi لتقديم العروض مجانا ولمدة 3 سنوات'/><author><name>ibda3four</name><uri>http://www.blogger.com/profile/12166158855015146950</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgesHxnSxR9OMzpgkGcrBwAk4FLaj-45BcqrylBpdwTzNABIuTGvm8EZljv7Lu1Oq4eBYerCnPRAfwNoLbh0OXOW0mfaemszT06SWw_qEHBxIqndVeUjePWR5yXB5DlIwe_-ZsabUo0YaSP/s72-c/ibcRa7keSFtWgz.png" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6168572102412770513.post-4692858499471477119</id><published>2014-07-16T09:23:00.001-07:00</published><updated>2014-07-16T09:28:19.993-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="صيانة وبرامج"/><category scheme="http://www.blogger.com/atom/ns#" term="مجانيات"/><title type='text'>اخر نسخة من برنامج الحماية AVG Internet Security 2014  مجانا لمدة عام</title><content type='html'>&lt;div dir=&quot;rtl&quot; style=&quot;text-align: right;&quot; trbidi=&quot;on&quot;&gt;
&lt;h2 style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;border: 0px; font-family: Arial, Helvetica, sans-serif; font-weight: normal; line-height: 20.798612594604492px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;u&gt;شركة&amp;nbsp; AVG تعطيكم امكانية الحصول على AVG Internet Security 201&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1OCAqmpvgwLjPt0WBOCsSRLevhliE42IRz3Ev9jrth-J_jHvqPBh-wIA7jSWRy8GCxauCSwndU_O0EUa3xMrhf0dBxbPVegf23_iOa57ePHVCKZxbshwcz0369wI8bIhBaYLcm6WH3yL0/s1600/AVG-Internet-Security-2014.png&quot; height=&quot;400&quot; width=&quot;268&quot; /&gt;&lt;/div&gt;
&lt;div dir=&quot;rtl&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Droid Arabic Kufi&#39;, tahoma; font-size: 13.333333969116211px; line-height: 20.798612594604492px; margin: 0px; outline: 0px; padding: 0px; text-align: center; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Arial, Helvetica, sans-serif; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;background-color: transparent; border: 0px; font-size: small; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;b style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;color: lime;&quot;&gt;مالجديد في نسخة AVG Internet Security 201&lt;/span&gt;&lt;span style=&quot;color: #351c75;&quot;&gt;4&amp;nbsp;؟&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; color: #555555; font-family: &#39;Droid Arabic Kufi&#39;, tahoma; font-size: 13.333333969116211px; line-height: 20.798612594604492px; margin: 0px; outline: 0px; padding: 0px; text-align: center; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Arial, Helvetica, sans-serif; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;background-color: transparent; border: 0px; font-size: small; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;b style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;rtl&quot; style=&quot;background-color: white; border: 0px; color: #555555; font-family: &#39;Droid Arabic Kufi&#39;, tahoma; font-size: 13.333333969116211px; line-height: 20.798612594604492px; margin: 0px; outline: 0px; padding: 0px; text-align: center; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Arial, Helvetica, sans-serif; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;background-color: transparent; border: 0px; font-size: small; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;b style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;br style=&quot;margin: 0px; outline: 0px; padding: 0px;&quot; /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; color: #555555; font-family: &#39;Droid Arabic Kufi&#39;, tahoma; font-size: 13.333333969116211px; line-height: 20.798612594604492px; margin: 0px; outline: 0px; padding: 0px; text-align: center; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Arial, Helvetica, sans-serif; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;background-color: transparent; border: 0px; font-size: small; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;b style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;blockquote class=&quot;tr_bq &quot; style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Arial, Helvetica, sans-serif; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;background-color: transparent; border: 0px; font-size: small; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;b style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;هذه النسخة من برنامج AVG Internet Security 2014 &amp;nbsp;وفي إصدارها الجديد تستطيع حمايتك منا لتهديدات الامنية الاتية :&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Arial, Helvetica, sans-serif; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;background-color: transparent; border: 0px; font-size: small; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;b style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;br style=&quot;margin: 0px; outline: 0px; padding: 0px;&quot; /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Arial, Helvetica, sans-serif; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;background-color: transparent; border: 0px; font-size: small; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;b style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li&gt;&lt;b style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&amp;nbsp;قادر على حمايتك من برامج الإختراق وكذلك الڤيروسات المخربة &amp;nbsp;للحاسوب بإضافة تقنيات جديدة من اجل رصد البرامج الضارة خصوصا مع تطور تقنيات التشفير .&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&amp;nbsp;حذف ملفاتك من الحاسوب سيكون اكثر امان مع AVG Internet Security 2014 وذلك لمنع إسترجاعها مرة اخرى&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&amp;nbsp;يحميك من تحميل البرامج الضارة &amp;nbsp;اثناء تحميلها لحاسوبك وقبل إكمال عملية التحميل في حالة الكشف عنها يقوم بإيقافها .&lt;/b&gt;&lt;/li&gt;
&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/ul&gt;
&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Arial, Helvetica, sans-serif; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;background-color: transparent; border: 0px; font-size: small; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;b style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Arial, Helvetica, sans-serif; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;background-color: transparent; border: 0px; font-size: small; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;b style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;. يقوم بتشفير باسورداتك المحفظة على الحاسوب كما يقوم بتشفير ملفاتك .&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Arial, Helvetica, sans-serif; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;background-color: transparent; border: 0px; font-size: small; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;b style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;يقوم بحمايتك من ان تقع ضحية السبام او السكيمرز وذلك عن طريق حمايتك من بعض طرق الهندسة الإجتماعية المتقدمة وكذلك الصفحات المزورة .&lt;br /&gt;&lt;ul&gt;
&lt;li&gt;&lt;b style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&amp;nbsp;جذار ناري قوي قادر على منع الهاكرز من الوصول إلى حاسوبك .&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;color: #cc0000;&quot;&gt;&lt;a href=&quot;http://aa-download.avg.com/filedir/inst/avg_isct_x86_all_2014_4714a7694_huawei.exe&quot;&gt;&lt;b style=&quot;border: 0px; font-family: Arial, Helvetica, sans-serif; line-height: 20.798612594604492px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;direction: rtl; font-size: 12px; font-weight: normal;&quot;&gt;AVG Internet Security 2014 32bit&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&amp;nbsp;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq &quot; style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;color: red;&quot;&gt;&lt;a href=&quot;http://af-download.avg.com/filedir/inst/avg_isct_x64_all_2014_4714a7694_huawei.exe&quot;&gt;&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Arial, Helvetica, sans-serif; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;background-color: transparent; border: 0px; font-size: small; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;b style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;b style=&quot;border: 0px; font-family: Arial, Helvetica, sans-serif; line-height: 20.798612594604492px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-size: 12px; font-weight: normal;&quot;&gt;AVG Internet Security 2014 64bit​&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/span&gt;&lt;/blockquote&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: &#39;Droid Arabic Kufi&#39;, tahoma; font-size: 13.333333969116211px; line-height: 20.798612594604492px; margin: 0px; outline: 0px; padding: 0px; text-align: center; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Arial, Helvetica, sans-serif; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;background-color: transparent; border: 0px; font-size: small; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;b style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://ibda3four.blogspot.com/feeds/4692858499471477119/comments/default' title='تعليقات الرسالة'/><link rel='replies' type='text/html' href='http://ibda3four.blogspot.com/2014/07/avg-internet-security-2014.html#comment-form' title='0 تعليقات'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6168572102412770513/posts/default/4692858499471477119'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6168572102412770513/posts/default/4692858499471477119'/><link rel='alternate' type='text/html' href='http://ibda3four.blogspot.com/2014/07/avg-internet-security-2014.html' title='اخر نسخة من برنامج الحماية AVG Internet Security 2014  مجانا لمدة عام'/><author><name>ibda3four</name><uri>http://www.blogger.com/profile/12166158855015146950</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1OCAqmpvgwLjPt0WBOCsSRLevhliE42IRz3Ev9jrth-J_jHvqPBh-wIA7jSWRy8GCxauCSwndU_O0EUa3xMrhf0dBxbPVegf23_iOa57ePHVCKZxbshwcz0369wI8bIhBaYLcm6WH3yL0/s72-c/AVG-Internet-Security-2014.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6168572102412770513.post-5851846213035309160</id><published>2014-07-15T16:49:00.001-07:00</published><updated>2014-07-15T16:49:31.983-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="NETWORK"/><category scheme="http://www.blogger.com/atom/ns#" term="مقالات"/><title type='text'>Modèles OSI et TCP/IP </title><content type='html'>&lt;div dir=&quot;rtl&quot; style=&quot;text-align: right;&quot; trbidi=&quot;on&quot;&gt;
&lt;h2 dir=&quot;ltr&quot; style=&quot;text-align: center;&quot;&gt;
&amp;nbsp;&lt;b&gt;Modèles OSI et TCP/IP&amp;nbsp;&lt;/b&gt;&lt;/h2&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&lt;b&gt;Modèle OSI &amp;nbsp;&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
La première évolution des réseaux informatiques a été des plus anarchiques, chaque constructeur développant sa propre technologie. Le résultat fut une quasi-impossibilité de connecter différents réseaux entre eux. &amp;nbsp;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
Pour palier à ce problème d’interconnections, l’ISO (International Standards Organisation) décida de mettre en place un modèle de référence théorique décrivant le fonctionnement des communications réseaux. &amp;nbsp;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
Ainsi fût créé le modèle OSI, à partir des structures réseau prédominantes de l’époque : DECNet (Digital Equipment Corporation&#39;s Networking développé par digital) et SNA (System Network Architecture développé par IBM).Ce modèle a permis aux différents constructeurs de concevoir des réseaux interconnectables. &amp;nbsp;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
Le modèle OSI est un modèle conceptuel. Il a pour but d’analyser la communication en découpant les différentes étapes en 7 couches, chacune de ces couches remplissant une tâche bien spécifique :&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
 • Quelles sont les informations qui circulent ?&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
• Sous quelle forme circulent-elles ?&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
• Quels chemins empruntent-elles ?&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
• Quelles règles s’appliquent aux flux d’informations ? &amp;nbsp;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
Les 7 couches du modèle OSI sont les suivantes :&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
 • &lt;b&gt;Couche 1&lt;/b&gt; : Couche physique La couche physique définit les spécifications du média (câblage, connecteur, voltage, bande passante…).&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;b&gt; • Couche 2&lt;/b&gt; : Couche liaison de donnée La couche liaison de donnée s’occupe de l’envoi de la donnée sur le média. Cette couche est divisée en deux sous-couches : o La sous-couche MAC (Média Access Control) est chargée du contrôle de l’accès au média. C’est au niveau de cette couche que l’on retrouve les adresses de liaison de donnée (MAC, DLCI). o La sous-couche LLC (Layer Link Control) s’occupe de la gestion des communications entre les stations et interagit avec la couche réseau. &amp;nbsp;• Couche 3 : Couche réseau Cette couche gère l’adressage de niveau trois, la sélection du chemin et l’acheminement des paquets au travers du réseau.&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
 • &lt;b&gt;Couche 4 &lt;/b&gt;: Couche transport La couche transport assure la qualité de la transmission en permettant la retransmission des segments en cas d’erreurs éventuelles de transmission. Elle assure également le contrôle du flux d’envoi des données.&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;b&gt;• Couche 5&lt;/b&gt; : Couche session La couche session établit, gère et ferme les sessions de communications entre les applications.&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
 • &lt;b&gt;Couche 6&lt;/b&gt; : Couche présentation La couche présentation spécifie compression, encryptions).&amp;nbsp;les formats des données des applications (encodage&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;MIME,&amp;nbsp;&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; • Couche 7 : Couche application Cette couche assure l’interface avec les applications, &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; c’est la couche la plus proche de l’utilisateur.&amp;nbsp;&amp;nbsp;&lt;/blockquote&gt;
&lt;div class=&quot;separator&quot; dir=&quot;ltr&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWMR60HZiwogUUSv4KntzD4HWngH6iBR6PcymPZHfmOI8uBjSONow_h2iZQN0ED2VH6tVFCpyIYcUl7ULNQtxf2PhiKalOAvOKVTEVNC72JueGVSFRkRV1Q-n8mhgTUocxpbF0eDRFgdwS/s1600/Untitledjjjj.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWMR60HZiwogUUSv4KntzD4HWngH6iBR6PcymPZHfmOI8uBjSONow_h2iZQN0ED2VH6tVFCpyIYcUl7ULNQtxf2PhiKalOAvOKVTEVNC72JueGVSFRkRV1Q-n8mhgTUocxpbF0eDRFgdwS/s1600/Untitledjjjj.png&quot; height=&quot;258&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&amp;nbsp;Les avantages de ce modèle sont :&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
• Une division de la communication réseau en éléments plus petits et plus simples pour une meilleure compréhension&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
 • L’uniformisation des éléments afin de permettre le développement multi constructeur&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
 • La possibilité de modifier un aspect de la communication réseau sans modifier le reste (Exemple : un nouveau média) &amp;nbsp;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
Pour communiquer entre les couches et entre les hôtes d’un réseau, OSI a recourt au principe d’encapsulation. &amp;nbsp;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
Encapsulation : processus de conditionnement des données consistant à ajouter un en-tête de protocole déterminé avant que les données ne soient transmises à la couche inférieure : &amp;nbsp;&lt;/blockquote&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgktkiojJP1mR8bXwEbEttTC_P1OmDdXTfU137nEyuU9G_ps8upEMLuLhFgfHNwdIflpFVDHLC4Z9qFZLrbSorU4pqdwQ8a1j9gSDUDcmU1mBQ9vYw8KI38rhenUWNs_jIwEkSmQd3r_InM/s1600/Untitledkkkkk.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgktkiojJP1mR8bXwEbEttTC_P1OmDdXTfU137nEyuU9G_ps8upEMLuLhFgfHNwdIflpFVDHLC4Z9qFZLrbSorU4pqdwQ8a1j9gSDUDcmU1mBQ9vYw8KI38rhenUWNs_jIwEkSmQd3r_InM/s1600/Untitledkkkkk.png&quot; height=&quot;201&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
Lorsque 2 hôtes communiquent, on parle de communication d’égal à égal, c&#39;est-à-dire que la couche N de la source communique avec la couche N du destinataire. &amp;nbsp;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
Lorsqu’une couche de l’émetteur construit des données, elle encapsule ces dernières avec ses informations puis les passe à la couche inférieure. Le mécanisme inverse a lieu au niveau du destinataire ou une couche réceptionne les données de la couche inférieure, enlève les informations la concernant, puis transmet les informations restantes à la couche supérieure. Les données transitant à la couche N de la source sont donc les mêmes que les données transitant à la couche N du destinataire. &amp;nbsp;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
Pour identifier les données lors de leur passage au travers d’une couche, l’appellation PDU (Unité de données de protocole) est utilisée.&amp;nbsp;&lt;/blockquote&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRulRySLizlDabCcb0-Ir9ijXfgifY31CAiylIMl111Haq9R6jVz5YutsWo4UTRxztTkUar2Q4pGQrcLNEl1ILVFGvlOy7rZUI_5SGS0BX7TSbFi9Ehy3YZT-ZpJ-E23SPJE5-pykHxW14/s1600/Untitledlkk.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRulRySLizlDabCcb0-Ir9ijXfgifY31CAiylIMl111Haq9R6jVz5YutsWo4UTRxztTkUar2Q4pGQrcLNEl1ILVFGvlOy7rZUI_5SGS0BX7TSbFi9Ehy3YZT-ZpJ-E23SPJE5-pykHxW14/s1600/Untitledlkk.png&quot; height=&quot;368&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&amp;nbsp;&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://ibda3four.blogspot.com/feeds/5851846213035309160/comments/default' title='تعليقات الرسالة'/><link rel='replies' type='text/html' href='http://ibda3four.blogspot.com/2014/07/modeles-osi-et-tcpip.html#comment-form' title='0 تعليقات'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6168572102412770513/posts/default/5851846213035309160'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6168572102412770513/posts/default/5851846213035309160'/><link rel='alternate' type='text/html' href='http://ibda3four.blogspot.com/2014/07/modeles-osi-et-tcpip.html' title='Modèles OSI et TCP/IP '/><author><name>ibda3four</name><uri>http://www.blogger.com/profile/12166158855015146950</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWMR60HZiwogUUSv4KntzD4HWngH6iBR6PcymPZHfmOI8uBjSONow_h2iZQN0ED2VH6tVFCpyIYcUl7ULNQtxf2PhiKalOAvOKVTEVNC72JueGVSFRkRV1Q-n8mhgTUocxpbF0eDRFgdwS/s72-c/Untitledjjjj.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6168572102412770513.post-2729024799851578365</id><published>2014-07-14T15:15:00.002-07:00</published><updated>2014-07-14T15:42:16.876-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="NETWORK"/><category scheme="http://www.blogger.com/atom/ns#" term="مقالات"/><title type='text'> Example de conﬁguration - NAT - SUITE</title><content type='html'>&lt;div dir=&quot;rtl&quot; style=&quot;text-align: right;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: right;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi37ZKqp56xu6SExqyKr9A4mgCOHfjMafLU0NItyaKdLB53x3de5kjeQ2wrhPN1hpYJ1MyY2XnTH9NQhyphenhyphenpyFXumTusue4QW4sTVuwT8p5STSzFfbs6PYdYktSHppgVw7ayPkAn6ZLDKVm8n/s1600/nat_cone_plein.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi37ZKqp56xu6SExqyKr9A4mgCOHfjMafLU0NItyaKdLB53x3de5kjeQ2wrhPN1hpYJ1MyY2XnTH9NQhyphenhyphenpyFXumTusue4QW4sTVuwT8p5STSzFfbs6PYdYktSHppgVw7ayPkAn6ZLDKVm8n/s1600/nat_cone_plein.jpg&quot; height=&quot;212&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&lt;b&gt;&amp;nbsp;Dialup vers Internet (avec NAT/Easy IP)&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;u&gt;Current configuration :&lt;/u&gt;&lt;br /&gt;
!&lt;br /&gt;
version 12.0&lt;br /&gt;
no service pad&lt;br /&gt;
service timestamps debug uptime&lt;br /&gt;
service timestamps log uptime&lt;br /&gt;
no service password-encryption&lt;br /&gt;
!&lt;br /&gt;
hostname Router&lt;br /&gt;
!&lt;br /&gt;
enable password ibt&lt;br /&gt;
!&lt;br /&gt;
ip subnet-zero&lt;br /&gt;
!&lt;br /&gt;
ip name-server 195.238.2.21&lt;br /&gt;
ip name-server 195.238.2.22&lt;br /&gt;
isdn switch-type basic-net3&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
interface Ethernet0&lt;br /&gt;
ip address 10.0.1.1 255.255.255.0&lt;br /&gt;
no ip directed-broadcast&lt;br /&gt;
ip nat inside&lt;br /&gt;
!&lt;br /&gt;
interface BRI0&lt;br /&gt;
description Skynet&lt;br /&gt;
ip address negotiated&lt;br /&gt;
no ip directed-broadcast&lt;br /&gt;
ip nat outside&lt;br /&gt;
encapsulation ppp&lt;br /&gt;
dialer idle-timeout 180&lt;br /&gt;
dialer string 2261111&lt;br /&gt;
dialer-group 1&lt;br /&gt;
isdn switch-type basic-net3&lt;br /&gt;
ppp authentication chap callin&lt;br /&gt;
ppp chap hostname XXXXXXXXXX&lt;br /&gt;
ppp chap password 7 XXXXXXXXXXXXXXX&lt;br /&gt;
hold-queue 75 in&lt;br /&gt;
!&lt;br /&gt;
ip nat inside source list 100 interface BRI0 overload&lt;br /&gt;
ip nat inside source static tcp 10.0.1.2 25 194.78.223.58 25 extendable&lt;br /&gt;
ip classless&lt;br /&gt;
ip route 0.0.0.0 0.0.0.0 BRI0&lt;br /&gt;
!&lt;br /&gt;
access-list 100 permit ip any any&lt;br /&gt;
dialer-list 1 protocol ip list 100&lt;br /&gt;
!&lt;br /&gt;
line con 0&lt;br /&gt;
password XXXX&lt;br /&gt;
transport input none&lt;br /&gt;
stopbits 1&lt;br /&gt;
line vty 0 4&lt;br /&gt;
password XXXX&lt;br /&gt;
login&lt;br /&gt;
!&lt;br /&gt;
end&lt;br /&gt;
&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&amp;nbsp;&lt;b&gt;Ligne louée (Frame Relay)&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;u&gt;Current configuration :&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
!&lt;br /&gt;
version 11.3&lt;br /&gt;
service timestamps debug uptime&lt;br /&gt;
service timestamps log uptime&lt;br /&gt;
no service password-encryption&lt;br /&gt;
!&lt;br /&gt;
hostname Router&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
interface Ethernet0&lt;br /&gt;
ip address 172.16.30.1 255.255.0.0&lt;br /&gt;
!&lt;br /&gt;
interface Serial0&lt;br /&gt;
ip address 192.168.1.2 255.255.255.0&lt;br /&gt;
encapsulation frame-relay&lt;br /&gt;
frame-relay interface-dlci 17&lt;br /&gt;
!&lt;br /&gt;
interface Serial1&lt;br /&gt;
no ip address&lt;br /&gt;
shutdown&lt;br /&gt;
router rip&lt;br /&gt;
network 172.16.0.0&lt;br /&gt;
network 192.168.1.0&lt;br /&gt;
!&lt;br /&gt;
ip classless&lt;br /&gt;
ip default-network 0.0.0.0&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
line con 0&lt;br /&gt;
password ibt&lt;br /&gt;
line vty 0&lt;br /&gt;
password ibt&lt;br /&gt;
login&lt;br /&gt;
line vty 1 4&lt;br /&gt;
login&lt;br /&gt;
!&lt;br /&gt;
end&lt;br /&gt;
&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&amp;nbsp;&lt;b&gt;Dial On Demand (entre site)&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;u&gt;Current configuration :&lt;/u&gt;&lt;br /&gt;
!&lt;br /&gt;
version 11.2&lt;br /&gt;
no service udp-small-servers&lt;br /&gt;
no service tcp-small-servers&lt;br /&gt;
20&lt;br /&gt;
!&lt;br /&gt;
hostname 3620alleur&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
username 3620alleur password 7 151B0918&lt;br /&gt;
username 1603liege password 7 151B0918&lt;br /&gt;
username 1603gent password 7 141E101F&lt;br /&gt;
username jl password 7 130A191E020201&lt;br /&gt;
username tw password 7 082E584F07&lt;br /&gt;
isdn switch-type basic-net3&lt;br /&gt;
!&lt;br /&gt;
interface BRI0/0&lt;br /&gt;
ip unnumbered Ethernet1/0&lt;br /&gt;
encapsulation ppp&lt;br /&gt;
dialer map ip 205.1.1.254 name 1603liege 2471543&lt;br /&gt;
dialer-group 1&lt;br /&gt;
ppp authentication chap&lt;br /&gt;
!&lt;br /&gt;
interface BRI0/1&lt;br /&gt;
ip unnumbered Ethernet1/0&lt;br /&gt;
encapsulation ppp&lt;br /&gt;
dialer map ip 220.1.1.254 name 1603gent 2471543&lt;br /&gt;
dialer-group 1&lt;br /&gt;
ppp authentication chap&lt;br /&gt;
!&lt;br /&gt;
interface BRI0/2&lt;br /&gt;
no ip address&lt;br /&gt;
shutdown&lt;br /&gt;
!&lt;br /&gt;
interface BRI0/3&lt;br /&gt;
no ip address&lt;br /&gt;
shutdown&lt;br /&gt;
!&lt;br /&gt;
interface Ethernet1/0&lt;br /&gt;
ip address 200.0.0.254 255.255.255.0&lt;br /&gt;
!&lt;br /&gt;
no ip classless&lt;br /&gt;
ip route 205.1.1.0 255.255.255.0 205.1.1.1&lt;br /&gt;
ip route 205.1.1.1 255.255.255.255 BRI0/0&lt;br /&gt;
ip route 220.1.1.0 255.255.255.0 220.1.1.254&lt;br /&gt;
ip route 220.1.1.254 255.255.255.255 BRI0/1&lt;br /&gt;
access-list 100 deny ip any host 255.255.255.255&lt;br /&gt;
access-list 100 permit ip any any&lt;br /&gt;
dialer-list 1 protocol ip list 100&lt;br /&gt;
!&lt;br /&gt;
line con 0&lt;br /&gt;
password ibt&lt;br /&gt;
&lt;br /&gt;
line aux 0 line vty 0 4 password ibt login ! end --- autre site&lt;br /&gt;
&lt;u&gt;Current configuration&lt;/u&gt; : ! version 11.3 no service password-encryption service udp-small-servers service tcp-small-servers ! hostname 1603liege ! boot system flash 1 :80269401.bin ! username 1603liege password 0 ibt username 1603gent password 0 ibt username 3620alleur password 0 ibt isdn switch-type basic-net3 ! ! interface Ethernet0 ip address 205.1.1.254 255.255.255.0 ! interface BRI0 ip unnumbered Ethernet0 encapsulation ppp dialer map ip 200.0.0.254 name 3620alleur 02475428 dialer-group 1 isdn switch-type basic-net3 ppp authentication chap hold-queue 75 in ! no ip classless ip route 0.0.0.0 0.0.0.0 200.0.0.4 ip route 200.0.0.0 255.255.255.0 200.0.0.254 ip route 200.0.0.254 255.255.255.255 BRI0 access-list 100 permit ip any any dialer-list 1 protocol ip list 100 ! line con 0 exec-timeout 0 0 line vty 0 4 login ! end&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&lt;b&gt;Liaison LL (support SNA)&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;u&gt;Current configuration :&lt;/u&gt;&lt;br /&gt;
!&lt;br /&gt;
version 11.2&lt;br /&gt;
service udp-small-servers&lt;br /&gt;
service tcp-small-servers&lt;br /&gt;
!&lt;br /&gt;
hostname Haironville&lt;br /&gt;
!&lt;br /&gt;
enable secret 5 $1$.Z0Z$QbdOQluHjLFqSMlDBi6R0/&lt;br /&gt;
enable password cisco&lt;br /&gt;
!&lt;br /&gt;
username Galvameuse password 0 cisco&lt;br /&gt;
username nerac password 0 cisco&lt;br /&gt;
username thouare password 0 cisco&lt;br /&gt;
username diemoz password 0 cisco&lt;br /&gt;
username MPB password 0 cisco&lt;br /&gt;
username PFF password 0 cisco&lt;br /&gt;
username Lyon password 0 cisco&lt;br /&gt;
username Agen password 0 cisco&lt;br /&gt;
username Nantes password 0 cisco&lt;br /&gt;
memory-size iomem 30&lt;br /&gt;
ip host Galvameuse 131.12.1.2&lt;br /&gt;
ip host Diemoz 131.14.1.2&lt;br /&gt;
ip host Thouare 131.15.1.2&lt;br /&gt;
ip host Nerac 131.16.1.2&lt;br /&gt;
ip host MPB 141.13.1.2&lt;br /&gt;
ip host PFF 131.18.1.2&lt;br /&gt;
ip host Lyon 151.14.1.2&lt;br /&gt;
ip host Agen 151.16.1.2&lt;br /&gt;
ip host Nantes 151.15.1.2&lt;br /&gt;
ipx routing 0060.8338.75c1&lt;br /&gt;
isdn switch-type vn3&lt;br /&gt;
buffers small permanent 400&lt;br /&gt;
buffers middle permanent 200&lt;br /&gt;
buffers big permanent 150&lt;br /&gt;
buffers verybig permanent 30&lt;br /&gt;
buffers large permanent 20&lt;br /&gt;
buffers huge permanent 20&lt;br /&gt;
!&lt;br /&gt;
interface Ethernet0/0&lt;br /&gt;
ip address 130.10.1.1 255.255.0.0&lt;br /&gt;
ipx network 8202 encapsulation SAP&lt;br /&gt;
bridge-group 1&lt;br /&gt;
!&lt;br /&gt;
interface Serial0/0&lt;br /&gt;
&lt;br /&gt;
ip address 131.12.1.1 255.255.0.0&lt;br /&gt;
ipx network 13112&lt;br /&gt;
bridge-group 1&lt;br /&gt;
!&lt;br /&gt;
interface Serial1/0&lt;br /&gt;
ip address 141.13.1.1 255.255.0.0&lt;br /&gt;
ipx network 14113&lt;br /&gt;
bridge-group 1&lt;br /&gt;
!&lt;br /&gt;
interface Serial1/1&lt;br /&gt;
ip address 131.18.1.1 255.255.0.0&lt;br /&gt;
ipx network 13118&lt;br /&gt;
bridge-group 1&lt;br /&gt;
!&lt;br /&gt;
interface Serial1/2&lt;br /&gt;
no ip address&lt;br /&gt;
bridge-group 1&lt;br /&gt;
!&lt;br /&gt;
interface Serial1/3&lt;br /&gt;
ip address 131.16.1.1 255.255.0.0&lt;br /&gt;
ipx network 13116&lt;br /&gt;
bridge-group 1&lt;br /&gt;
!&lt;br /&gt;
interface BRI2/0&lt;br /&gt;
description SECOURS GALVAMEUSE&lt;br /&gt;
ip address 133.10.2.1 255.255.0.0&lt;br /&gt;
encapsulation ppp&lt;br /&gt;
ipx network 13312&lt;br /&gt;
dialer idle-timeout 200&lt;br /&gt;
dialer wait-for-carrier-time 10&lt;br /&gt;
dialer map bridge name Galvameuse broadcast&lt;br /&gt;
dialer map ip 133.10.1.2 name Galvameuse broadcast&lt;br /&gt;
dialer map ipx 13312.0060.8338.b881 name Galvameuse broadcast&lt;br /&gt;
dialer load-threshold 1 either&lt;br /&gt;
dialer-group 1&lt;br /&gt;
ppp authentication chap&lt;br /&gt;
bridge-group 1&lt;br /&gt;
!&lt;br /&gt;
interface BRI2/1&lt;br /&gt;
description SECOURS DIEMOZ&lt;br /&gt;
ip address 133.10.4.1 255.255.0.0&lt;br /&gt;
encapsulation ppp&lt;br /&gt;
ipx network 13314&lt;br /&gt;
dialer idle-timeout 200&lt;br /&gt;
dialer wait-for-carrier-time 10&lt;br /&gt;
dialer map bridge name diemoz broadcast&lt;br /&gt;
dialer map ip 133.10.1.4 name diemoz broadcast&lt;br /&gt;
&lt;br /&gt;
dialer map ipx 13314.0000.0c3e.bb4b name diemoz broadcast&lt;br /&gt;
dialer load-threshold 1 either&lt;br /&gt;
dialer-group 1&lt;br /&gt;
ppp authentication chap&lt;br /&gt;
bridge-group 1&lt;br /&gt;
!&lt;br /&gt;
interface BRI2/2&lt;br /&gt;
description SECOURS NERAC&lt;br /&gt;
ip address 133.10.6.1 255.255.0.0&lt;br /&gt;
encapsulation ppp&lt;br /&gt;
ipx network 13316&lt;br /&gt;
dialer idle-timeout 200&lt;br /&gt;
dialer wait-for-carrier-time 10&lt;br /&gt;
dialer map bridge name nerac broadcast&lt;br /&gt;
dialer map ip 133.10.1.6 name nerac broadcast&lt;br /&gt;
dialer map ipx 13316.0060.5cf4.c7a7 name nerac broadcast&lt;br /&gt;
dialer load-threshold 1 either&lt;br /&gt;
dialer-group 1&lt;br /&gt;
ppp authentication chap&lt;br /&gt;
bridge-group 1&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
interface BRI2/3&lt;br /&gt;
description SECOURS THOUARE&lt;br /&gt;
ip address 133.10.5.1 255.255.0.0&lt;br /&gt;
encapsulation ppp&lt;br /&gt;
ipx network 13315&lt;br /&gt;
dialer idle-timeout 200&lt;br /&gt;
dialer wait-for-carrier-time 10&lt;br /&gt;
dialer map bridge name thouare broadcast&lt;br /&gt;
dialer map ip 133.10.1.5 name thouare broadcast&lt;br /&gt;
dialer map ipx 13315.0060.5cf4.ca36 name thouare broadcast&lt;br /&gt;
dialer load-threshold 1 either&lt;br /&gt;
dialer-group 1&lt;br /&gt;
ppp authentication chap&lt;br /&gt;
bridge-group 1&lt;br /&gt;
!&lt;br /&gt;
interface Serial3/0&lt;br /&gt;
ip address 131.15.1.1 255.255.0.0&lt;br /&gt;
ipx network 13115&lt;br /&gt;
bridge-group 1&lt;br /&gt;
!&lt;br /&gt;
interface Serial3/1&lt;br /&gt;
ip address 151.15.1.1 255.255.0.0&lt;br /&gt;
bridge-group 1&lt;br /&gt;
!&lt;br /&gt;
interface Serial3/2&lt;br /&gt;
&lt;br /&gt;
ip address 131.14.1.1 255.255.0.0&lt;br /&gt;
ipx network 13114&lt;br /&gt;
bridge-group 1&lt;br /&gt;
!&lt;br /&gt;
interface Serial3/3&lt;br /&gt;
no ip address&lt;br /&gt;
ipx network 15114&lt;br /&gt;
bridge-group 1&lt;br /&gt;
!&lt;br /&gt;
router eigrp 1&lt;br /&gt;
network 131.12.0.0&lt;br /&gt;
network 131.14.0.0&lt;br /&gt;
network 131.15.0.0&lt;br /&gt;
network 131.16.0.0&lt;br /&gt;
network 130.10.0.0&lt;br /&gt;
network 141.13.0.0&lt;br /&gt;
network 131.18.0.0&lt;br /&gt;
network 151.14.0.0&lt;br /&gt;
network 151.15.0.0&lt;br /&gt;
network 151.16.0.0&lt;br /&gt;
!&lt;br /&gt;
no ip classless&lt;br /&gt;
ip route 130.20.0.0 255.255.0.0 133.10.1.2 200&lt;br /&gt;
ip route 130.40.0.0 255.255.0.0 133.10.1.4 200&lt;br /&gt;
ip route 130.50.0.0 255.255.0.0 133.10.1.5 200&lt;br /&gt;
ip route 130.60.0.0 255.255.0.0 133.10.1.6 200&lt;br /&gt;
ip route 130.80.0.0 255.255.0.0 133.10.1.8 200&lt;br /&gt;
ip route 140.10.0.0 255.255.0.0 143.10.1.3 200&lt;br /&gt;
ip route 150.40.0.0 255.255.0.0 153.10.1.4 200&lt;br /&gt;
ip route 150.50.0.0 255.255.0.0 153.10.1.5 200&lt;br /&gt;
ip route 150.60.0.0 255.255.0.0 153.10.1.6 200&lt;br /&gt;
ip route 195.0.0.0 255.255.0.0 130.10.1.3 200&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
ipx router eigrp 1&lt;br /&gt;
network 13112&lt;br /&gt;
network 13114&lt;br /&gt;
network 13115&lt;br /&gt;
network 13116&lt;br /&gt;
network 13118&lt;br /&gt;
network 14113&lt;br /&gt;
network 8202&lt;br /&gt;
network 15114&lt;br /&gt;
!snmp-server community public RO&lt;br /&gt;
snmp-server chassis-id Haironville&lt;br /&gt;
dialer-list 1 protocol ip permit&lt;br /&gt;
&lt;br /&gt;
dialer-list 1 protocol ipx permit&lt;br /&gt;
dialer-list 1 protocol bridge permit&lt;br /&gt;
bridge 1 protocol ieee&lt;br /&gt;
banner motd ^C&lt;br /&gt;
Routeur d’HAIRONVILLE&lt;br /&gt;
^C&lt;br /&gt;
!&lt;br /&gt;
line con 0&lt;br /&gt;
exec-timeout 0 0&lt;br /&gt;
line aux 0&lt;br /&gt;
line vty 0 4&lt;br /&gt;
password cisco&lt;br /&gt;
login&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&amp;nbsp;&lt;b&gt;Liaison Internet LL (+Backup ISDN)&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;b&gt;Current configuration :&lt;/b&gt;&lt;br /&gt;
!&lt;br /&gt;
version 11.2&lt;br /&gt;
no service password-encryption&lt;br /&gt;
service udp-small-servers&lt;br /&gt;
service tcp-small-servers&lt;br /&gt;
!&lt;br /&gt;
hostname di100174&lt;br /&gt;
!&lt;br /&gt;
enable secret 5 $1$h7NB$kbLrXApUBxyIp8ounEJq/.&lt;br /&gt;
enable password dFyP311&lt;br /&gt;
!&lt;br /&gt;
username di100174 password 0 F37kGS8D&lt;br /&gt;
ip name-server 193.121.171.135&lt;br /&gt;
ip name-server 193.74.208.135&lt;br /&gt;
ip name-server 193.74.208.65&lt;br /&gt;
isdn switch-type basic-net3&lt;br /&gt;
isdn tei-negotiation first-call&lt;br /&gt;
!&lt;br /&gt;
interface Ethernet0&lt;br /&gt;
ip address 193.121.102.14 255.255.255.248&lt;br /&gt;
!&lt;br /&gt;
interface Serial0&lt;br /&gt;
backup delay 10 10&lt;br /&gt;
backup interface BRI0&lt;br /&gt;
&lt;br /&gt;
ip unnumbered Ethernet0&lt;br /&gt;
encapsulation ppp&lt;br /&gt;
!&lt;br /&gt;
interface BRI0&lt;br /&gt;
ip unnumbered Ethernet0&lt;br /&gt;
encapsulation ppp&lt;br /&gt;
dialer idle-timeout 180&lt;br /&gt;
dialer string 3001111&lt;br /&gt;
dialer load-threshold 100 outbound&lt;br /&gt;
dialer-group 1&lt;br /&gt;
no fair-queue&lt;br /&gt;
ppp authentication pap callin&lt;br /&gt;
ppp pap sent-username diXXXXXX password 7 XXXXXXXXX&lt;br /&gt;
ppp multilink&lt;br /&gt;
!&lt;br /&gt;
ip classless&lt;br /&gt;
ip route 0.0.0.0 0.0.0.0 Serial0 50&lt;br /&gt;
ip route 0.0.0.0 0.0.0.0 BRI0 100&lt;br /&gt;
access-list 101 deny udp any any eq netbios-ns&lt;br /&gt;
access-list 101 deny udp any any eq netbios-dgm&lt;br /&gt;
access-list 101 permit ip any any&lt;br /&gt;
dialer-list 1 protocol ip list 101&lt;br /&gt;
!&lt;br /&gt;
line con 0&lt;br /&gt;
line vty 0 4&lt;br /&gt;
password dFyP311&lt;br /&gt;
login&lt;br /&gt;
!&lt;br /&gt;
end&lt;br /&gt;
&lt;br /&gt;&lt;/blockquote&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://ibda3four.blogspot.com/feeds/2729024799851578365/comments/default' title='تعليقات الرسالة'/><link rel='replies' type='text/html' href='http://ibda3four.blogspot.com/2014/07/example-de-conguration-nat-suite.html#comment-form' title='0 تعليقات'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6168572102412770513/posts/default/2729024799851578365'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6168572102412770513/posts/default/2729024799851578365'/><link rel='alternate' type='text/html' href='http://ibda3four.blogspot.com/2014/07/example-de-conguration-nat-suite.html' title=' Example de conﬁguration - NAT - SUITE'/><author><name>ibda3four</name><uri>http://www.blogger.com/profile/12166158855015146950</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi37ZKqp56xu6SExqyKr9A4mgCOHfjMafLU0NItyaKdLB53x3de5kjeQ2wrhPN1hpYJ1MyY2XnTH9NQhyphenhyphenpyFXumTusue4QW4sTVuwT8p5STSzFfbs6PYdYktSHppgVw7ayPkAn6ZLDKVm8n/s72-c/nat_cone_plein.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6168572102412770513.post-4742658644979191180</id><published>2014-07-13T15:29:00.000-07:00</published><updated>2014-07-13T15:31:20.597-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="NETWORK"/><category scheme="http://www.blogger.com/atom/ns#" term="مقالات"/><title type='text'> Example de conﬁguration - NAT -</title><content type='html'>&lt;div dir=&quot;rtl&quot; style=&quot;text-align: right;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVIoYvJ6p_7Hk61CSeJEqIAgqVMMGMdvOVIyFsaIfFnRHykBIHRFBC6NS-9vnq0eXEVCXCQFejX5lGrvGgAKW9SDCnFF4vuTWMUZ9AueKcSh6DrSdaW8rKJTBiUgR0Gq6UlU0_sV_lW4bk/s1600/nat_cone_plein.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;br /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;margin-left: 1em; margin-right: 1em; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKV4n7AXJF6OptUVGVo1-t2QSczWXzQAFZSvhxw51q_pKtu_ymilb5ytZEk9BmCQDr2E7sne2AkrHhdqTYf8wMBDyZtPuTBLnuRUD-EhoazG-tCCyHPg95vNdMrnmUtBynVl66QJchCLmf/s1600/tel_specialist_isdn3_image3-1.gif&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;/a&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKV4n7AXJF6OptUVGVo1-t2QSczWXzQAFZSvhxw51q_pKtu_ymilb5ytZEk9BmCQDr2E7sne2AkrHhdqTYf8wMBDyZtPuTBLnuRUD-EhoazG-tCCyHPg95vNdMrnmUtBynVl66QJchCLmf/s1600/tel_specialist_isdn3_image3-1.gif&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKV4n7AXJF6OptUVGVo1-t2QSczWXzQAFZSvhxw51q_pKtu_ymilb5ytZEk9BmCQDr2E7sne2AkrHhdqTYf8wMBDyZtPuTBLnuRUD-EhoazG-tCCyHPg95vNdMrnmUtBynVl66QJchCLmf/s1600/tel_specialist_isdn3_image3-1.gif&quot; height=&quot;299&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;
&lt;/h2&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&amp;nbsp;&lt;b&gt;ISDN&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&amp;nbsp; ISDN utilise un nombre important de protocoles.&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;b&gt;1 ISDN couche 1&lt;/b&gt;&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp;Le layer 1 est la couche physique responsable pour la connexion au switch. Il supporte la conn exion à un TA/NT1 ou à des “devices” multiples. Les canaux B et D partagent le même interface physique.&lt;/blockquote&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfnes4gnKhJ0avwzmA7kvd8zhft9S5mWWCG7QFE-AF7zNxWHO0EzaLk7OQmbxwpIbP46gkwNnDJZO4__TxJsr1OZW-vibr5BUG1N3XsKvQVkQLEOZ2kTYrYnrJcojkIq9OJPJisi5737ZF/s1600/UntitledDDD.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfnes4gnKhJ0avwzmA7kvd8zhft9S5mWWCG7QFE-AF7zNxWHO0EzaLk7OQmbxwpIbP46gkwNnDJZO4__TxJsr1OZW-vibr5BUG1N3XsKvQVkQLEOZ2kTYrYnrJcojkIq9OJPJisi5737ZF/s1600/UntitledDDD.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&amp;nbsp; &amp;nbsp; Le canal D est gouverné par DDR (Dial on Demand Routing). DDR est le mécanisme pour réaliser des connexions “Dial On Demand”. Le canal B est utilisé pour la transmission des données (IP,IPX...).&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;b&gt;&amp;nbsp;2 ISDN couche 2 (Q.921)&lt;/b&gt;&lt;br /&gt;
Un numéro de TEI est assigné par le switch ISDN. Cela permet de donner une identiﬁ- cation à votre connexion sur le NT1/TA.&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;b&gt; 3 ISDN couche 3 (Q.931)&lt;/b&gt;&lt;br /&gt;
Un protocole DSS1 (Digital Subscriber Signalling System N&lt;br /&gt;
1) est utilisé pour la ges-tion des appels, des connexions &amp;amp; des alertes. Suivant le pays, les techniques de “signalling” ne sont pas les mêmes entre le switch &amp;amp; le NT1. Lors de l’utilisation d’ISDN, vous devez spéciﬁer le type de switch :&lt;br /&gt;
isdn switch-type basic-net3&lt;br /&gt;
! Attention lors de la modiﬁcation du switch-type, dans la majorité des cas, vous devez redémarrer le router!&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVIoYvJ6p_7Hk61CSeJEqIAgqVMMGMdvOVIyFsaIfFnRHykBIHRFBC6NS-9vnq0eXEVCXCQFejX5lGrvGgAKW9SDCnFF4vuTWMUZ9AueKcSh6DrSdaW8rKJTBiUgR0Gq6UlU0_sV_lW4bk/s1600/nat_cone_plein.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVIoYvJ6p_7Hk61CSeJEqIAgqVMMGMdvOVIyFsaIfFnRHykBIHRFBC6NS-9vnq0eXEVCXCQFejX5lGrvGgAKW9SDCnFF4vuTWMUZ9AueKcSh6DrSdaW8rKJTBiUgR0Gq6UlU0_sV_lW4bk/s1600/nat_cone_plein.jpg&quot; height=&quot;169&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;
&lt;li&gt;&lt;b&gt;&amp;nbsp;NAT&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&amp;nbsp;Gestion des problèmes&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;b&gt;&amp;nbsp;1 Commande Debug&lt;/b&gt;&lt;br /&gt;
ISDN et Dial on Demand&lt;br /&gt;
show interface bri 0&lt;br /&gt;
show isdn status&lt;br /&gt;
show ppp multilink&lt;br /&gt;
debug dialer&lt;br /&gt;
debug isdn q921&lt;br /&gt;
debug isdn q931&lt;br /&gt;
debug isdn events&lt;br /&gt;
debug isdn active&lt;br /&gt;
debug isdn history&lt;br /&gt;
PPP&lt;br /&gt;
debug ppp negotiation&lt;br /&gt;
debug ppp authentification&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&lt;b&gt;&amp;nbsp;Example de conﬁguration&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;b&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 1 Dialup vers Internet (sans NAT)&lt;/b&gt;&lt;br /&gt;
Current configuration :&lt;br /&gt;
!&lt;br /&gt;
version 11.2&lt;br /&gt;
no service finger&lt;br /&gt;
service password-encryption&lt;br /&gt;
no service udp-small-servers&lt;br /&gt;
no service tcp-small-servers&lt;br /&gt;
!&lt;br /&gt;
hostname di100334&lt;br /&gt;
!&lt;br /&gt;
enable secret 5 $1$wWjV$iTqcdHeE/iTkwNF.IIKrE1&lt;br /&gt;
enable password 7 1420230805172924&lt;br /&gt;
!&lt;br /&gt;
ip subnet-zero&lt;br /&gt;
no ip source-route&lt;br /&gt;
ip name-server 193.74.208.135&lt;br /&gt;
ip name-server 193.74.208.65&lt;br /&gt;
ip name-server 193.121.171.135&lt;br /&gt;
isdn switch-type basic-net3&lt;br /&gt;
isdn tei-negotiation first-call&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
interface Ethernet0&lt;br /&gt;
ip address 193.74.140.254 255.255.255.0&lt;br /&gt;
no ip directed-broadcast&lt;br /&gt;
no ip route-cache&lt;br /&gt;
no ip mroute-cache&lt;br /&gt;
!&lt;br /&gt;
interface BRI0&lt;br /&gt;
ip unnumbered Ethernet0&lt;br /&gt;
ip access-group 111 in&lt;br /&gt;
ip access-group 112 out&lt;br /&gt;
no ip redirects&lt;br /&gt;
encapsulation ppp&lt;br /&gt;
bandwidth 64&lt;br /&gt;
dialer idle-timeout 300&lt;br /&gt;
dialer string 042246011&lt;br /&gt;
dialer hold-queue 5&lt;br /&gt;
dialer-group 1&lt;br /&gt;
ppp chap hostname diXXXXXX&lt;br /&gt;
ppp chap password 7 XXXXXXXXXXXXXXXXXX&lt;br /&gt;
!&lt;br /&gt;
ip classless&lt;br /&gt;
ip default-network 0.0.0.0&lt;br /&gt;
ip route 0.0.0.0 0.0.0.0 BRI0&lt;br /&gt;
ip route 10.0.0.0 255.0.0.0 Null0&lt;br /&gt;
ip route 172.16.0.0 255.240.0.0 Null0&lt;br /&gt;
ip route 192.168.0.0 255.255.0.0 Null0&lt;br /&gt;
ip route 193.74.147.0 255.255.255.0 BRI0&lt;br /&gt;
access-list 10 permit 192.92.130.4&lt;br /&gt;
access-list 10 permit 193.74.208.188&lt;br /&gt;
access-list 10 permit 193.74.140.0 0.0.0.255&lt;br /&gt;
access-list 10 deny any&lt;br /&gt;
access-list 11 deny any&lt;br /&gt;
access-list 101 deny ip any host 255.255.255.255&lt;br /&gt;
access-list 101 deny udp any any range netbios-ns 139&lt;br /&gt;
access-list 101 permit ip 193.74.140.0 0.0.0.255 any&lt;br /&gt;
access-list 101 deny ip any any&lt;br /&gt;
access-list 111 deny ip 193.74.140.0 0.0.0.255 any&lt;br /&gt;
access-list 111 deny ip any host 193.74.140.255&lt;br /&gt;
access-list 111 deny udp any 193.74.140.0 0.0.0.255 eq 135&lt;br /&gt;
access-list 111 deny tcp any 193.74.140.0 0.0.0.255 eq 12345&lt;br /&gt;
access-list 111 deny tcp any 193.74.140.0 0.0.0.255 eq 12346&lt;br /&gt;
access-list 111 deny udp any 193.74.140.0 0.0.0.255 eq 31337&lt;br /&gt;
access-list 111 deny tcp any 193.74.140.0 0.0.0.255 eq 31337&lt;br /&gt;
access-list 111 permit ip any 193.74.140.0 0.0.0.255&lt;br /&gt;
access-list 111 deny ip any any&lt;br /&gt;
access-list 112 deny tcp 193.74.140.0 0.0.0.255 any eq 12345&lt;br /&gt;
access-list 112 deny tcp 193.74.140.0 0.0.0.255 any eq 12346&lt;br /&gt;
access-list 112 deny udp 193.74.140.0 0.0.0.255 any eq 31337&lt;br /&gt;
dialer-list 1 protocol ip list 101&lt;br /&gt;
!&lt;br /&gt;
line con 0&lt;br /&gt;
login&lt;br /&gt;
transport preferred none&lt;br /&gt;
line vty 0 4&lt;br /&gt;
access-class 10 in&lt;br /&gt;
access-class 11 out&lt;br /&gt;
password 7 110A1016141D&lt;br /&gt;
login&lt;br /&gt;
length 23&lt;br /&gt;
transport preferred none&lt;br /&gt;
!&lt;br /&gt;
end&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;b&gt;&amp;nbsp;2 Dialup vers Internet (avec NAT / sans easy IP)&lt;/b&gt;&lt;br /&gt;
Current configuration :&lt;br /&gt;
!&lt;br /&gt;
version 11.2&lt;br /&gt;
service timestamps debug uptime&lt;br /&gt;
service timestamps log uptime&lt;br /&gt;
service password-encryption&lt;br /&gt;
no service udp-small-servers&lt;br /&gt;
no service tcp-small-servers&lt;br /&gt;
!&lt;br /&gt;
hostname lanburodep&lt;br /&gt;
!&lt;br /&gt;
enable password 7 12100703&lt;br /&gt;
!&lt;br /&gt;
username lieg-cs1 password 7 XXXXXXXXXX&lt;br /&gt;
username bru-cs1 password 7 XXXXXXXXXX&lt;br /&gt;
username lanburodep password 7 XXXXXXXXXXX&lt;br /&gt;
ip subnet-zero&lt;br /&gt;
ip nat pool lanburodep-natpool-0 194.78.144.163 194.78.144.165 netmask 255.255.8&lt;br /&gt;
ip nat inside source list 2 pool lanburodep-natpool-0 overload&lt;br /&gt;
ip nat inside source static 200.0.0.100 194.78.144.162&lt;br /&gt;
no ip domain-lookup&lt;br /&gt;
isdn switch-type basic-net3&lt;br /&gt;
isdn tei-negotiation first-call&lt;br /&gt;
!&lt;br /&gt;
interface Ethernet0&lt;br /&gt;
description connected to Internet&lt;br /&gt;
ip address 200.0.0.4 255.255.255.0 secondary&lt;br /&gt;
ip address 194.78.144.161 255.255.255.248&lt;br /&gt;
ip nat inside&lt;br /&gt;
!&lt;br /&gt;
interface BRI0&lt;br /&gt;
description connected to Internet&lt;br /&gt;
no ip address&lt;br /&gt;
encapsulation ppp&lt;br /&gt;
dialer pool-member 1&lt;br /&gt;
!&lt;br /&gt;
interface Dialer1&lt;br /&gt;
ip address 192.168.3.68 255.255.255.0&lt;br /&gt;
ip nat outside&lt;br /&gt;
encapsulation ppp&lt;br /&gt;
no ip split-horizon&lt;br /&gt;
bandwidth 64&lt;br /&gt;
dialer remote-name lieg-cs1&lt;br /&gt;
dialer string 2302911&lt;br /&gt;
dialer hold-queue 10&lt;br /&gt;
dialer pool 1&lt;br /&gt;
dialer-group 1&lt;br /&gt;
no cdp enable&lt;br /&gt;
ppp authentication pap callin&lt;br /&gt;
ppp pap sent-username XXXXXX password 7 XXXXX&lt;br /&gt;
!&lt;br /&gt;
ip classless&lt;br /&gt;
ip route 0.0.0.0 0.0.0.0 Dialer1&lt;br /&gt;
ip route 10.0.0.0 255.0.0.0 200.0.0.3&lt;br /&gt;
ip route 137.0.0.0 255.255.0.0 200.0.0.254&lt;br /&gt;
ip route 192.0.0.0 255.255.255.0 200.0.0.3&lt;br /&gt;
ip route 220.1.1.0 255.255.255.0 200.0.0.254&lt;br /&gt;
access-list 2 permit 200.0.0.0 0.0.0.255&lt;br /&gt;
access-list 2 permit 192.0.0.0 0.0.0.255&lt;br /&gt;
access-list 2 permit 10.0.0.0 0.255.255.255&lt;br /&gt;
access-list 2 permit 137.0.0.0 0.0.255.255&lt;br /&gt;
access-list 2 permit 205.1.1.0 0.0.0.255&lt;br /&gt;
snmp-server community public RO&lt;br /&gt;
dialer-list 1 protocol ip permit&lt;br /&gt;
!&lt;br /&gt;
line con 0&lt;br /&gt;
exec-timeout 0 0&lt;br /&gt;
login&lt;br /&gt;
line vty 0 3&lt;br /&gt;
password 7 XXXXXXX&lt;br /&gt;
login&lt;br /&gt;
line vty 4&lt;br /&gt;
login&lt;br /&gt;
!&lt;br /&gt;
end&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;b&gt; &amp;nbsp; 3 Dialup vers Internet (avec NAT/Easy IP)&lt;/b&gt;&lt;br /&gt;
Current configuration :&lt;br /&gt;
!&lt;br /&gt;
version 12.0&lt;br /&gt;
no service pad&lt;br /&gt;
service timestamps debug uptime&lt;br /&gt;
service timestamps log uptime&lt;br /&gt;
no service password-encryption&lt;br /&gt;
!&lt;br /&gt;
hostname Router&lt;br /&gt;
!&lt;br /&gt;
enable password ibt&lt;br /&gt;
!&lt;br /&gt;
ip subnet-zero&lt;br /&gt;
!ip name-server 195.238.2.21&lt;br /&gt;
ip name-server 195.238.2.22&lt;br /&gt;
isdn switch-type basic-net3&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
interface Ethernet0&lt;br /&gt;
ip address 10.0.1.1 255.255.255.0&lt;br /&gt;
no ip directed-broadcast&lt;br /&gt;
ip nat inside&lt;br /&gt;
!&lt;br /&gt;
interface BRI0&lt;br /&gt;
description Skynet&lt;br /&gt;
ip address negotiated&lt;br /&gt;
no ip directed-broadcast&lt;br /&gt;
ip nat outside&lt;br /&gt;
encapsulation ppp&lt;br /&gt;
dialer idle-timeout 180&lt;br /&gt;
dialer string 2261111&lt;br /&gt;
dialer-group 1&lt;br /&gt;
isdn switch-type basic-net3&lt;br /&gt;
ppp authentication chap callin&lt;br /&gt;
ppp chap hostname XXXXXXXXXX&lt;br /&gt;
ppp chap password 7 XXXXXXXXXXXXXXX&lt;br /&gt;
hold-queue 75 in&lt;br /&gt;
!&lt;br /&gt;
ip nat inside source list 100 interface BRI0 overload&lt;br /&gt;
ip nat inside source static tcp 10.0.1.2 25 194.78.223.58 25 extendable&lt;br /&gt;
ip classless&lt;br /&gt;
ip route 0.0.0.0 0.0.0.0 BRI0&lt;br /&gt;
!&lt;br /&gt;
access-list 100 permit ip any any&lt;br /&gt;
dialer-list 1 protocol ip list 100&lt;br /&gt;
!&lt;br /&gt;
line con 0&lt;br /&gt;
password XXXX&lt;br /&gt;
transport input none&lt;br /&gt;
stopbits 1&lt;br /&gt;
line vty 0 4&lt;br /&gt;
password XXXX&lt;br /&gt;
login&lt;br /&gt;
!&lt;br /&gt;
end&lt;br /&gt;
2.8.4 Ligne louée (Frame Relay)&lt;br /&gt;
Current configuration :&lt;br /&gt;
!&lt;br /&gt;
version 11.3&lt;br /&gt;
service timestamps debug uptime&lt;br /&gt;
service timestamps log uptime&lt;br /&gt;
no service password-encryption&lt;br /&gt;
!&lt;br /&gt;
hostname Router&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
interface Ethernet0&lt;br /&gt;
ip address 172.16.30.1 255.255.0.0&lt;br /&gt;
!&lt;br /&gt;
interface Serial0&lt;br /&gt;
ip address 192.168.1.2 255.255.255.0&lt;br /&gt;
encapsulation frame-relay&lt;br /&gt;
frame-relay interface-dlci 17&lt;br /&gt;
!&lt;br /&gt;
interface Serial1&lt;br /&gt;
no ip address&lt;br /&gt;
shutdown&lt;br /&gt;
router rip&lt;br /&gt;
network 172.16.0.0&lt;br /&gt;
network 192.168.1.0&lt;br /&gt;
!&lt;br /&gt;
ip classless&lt;br /&gt;
ip default-network 0.0.0.0&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
line con 0&lt;br /&gt;
password ibt&lt;br /&gt;
line vty 0&lt;br /&gt;
password ibt&lt;br /&gt;
login&lt;br /&gt;
line vty 1 4&lt;br /&gt;
login&lt;br /&gt;
!&lt;br /&gt;
end&lt;/blockquote&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&amp;nbsp;SUITE.............&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://ibda3four.blogspot.com/feeds/4742658644979191180/comments/default' title='تعليقات الرسالة'/><link rel='replies' type='text/html' href='http://ibda3four.blogspot.com/2014/07/isdn-isdn-utilise-un-nombre-important.html#comment-form' title='0 تعليقات'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6168572102412770513/posts/default/4742658644979191180'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6168572102412770513/posts/default/4742658644979191180'/><link rel='alternate' type='text/html' href='http://ibda3four.blogspot.com/2014/07/isdn-isdn-utilise-un-nombre-important.html' title=' Example de conﬁguration - NAT -'/><author><name>ibda3four</name><uri>http://www.blogger.com/profile/12166158855015146950</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKV4n7AXJF6OptUVGVo1-t2QSczWXzQAFZSvhxw51q_pKtu_ymilb5ytZEk9BmCQDr2E7sne2AkrHhdqTYf8wMBDyZtPuTBLnuRUD-EhoazG-tCCyHPg95vNdMrnmUtBynVl66QJchCLmf/s72-c/tel_specialist_isdn3_image3-1.gif" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6168572102412770513.post-1253149568222708242</id><published>2014-07-12T15:26:00.001-07:00</published><updated>2014-07-12T15:26:44.159-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="NETWORK"/><category scheme="http://www.blogger.com/atom/ns#" term="مقالات"/><title type='text'>Router CISCO 3 - access lists -</title><content type='html'>&lt;div dir=&quot;rtl&quot; style=&quot;text-align: right;&quot; trbidi=&quot;on&quot;&gt;
&lt;h2 dir=&quot;ltr&quot; style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/h2&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiq9qgxcImrb9WvXns9p6tfyVZNMzthaxUmYTZsH-ZHT1GhdTZ8kaJOlh1p8dLAOYhr5H5PINdGhpNAtyeUuZ84LYwxqiFxLlr6aLWVwNpfx2Gx764BPYO9brD88N7qnp9SuUhvwXqc8RBa/s1600/EXAMPLE.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiq9qgxcImrb9WvXns9p6tfyVZNMzthaxUmYTZsH-ZHT1GhdTZ8kaJOlh1p8dLAOYhr5H5PINdGhpNAtyeUuZ84LYwxqiFxLlr6aLWVwNpfx2Gx764BPYO9brD88N7qnp9SuUhvwXqc8RBa/s1600/EXAMPLE.JPG&quot; height=&quot;181&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;h2 dir=&quot;ltr&quot; style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/h2&gt;
&lt;h2 dir=&quot;ltr&quot; style=&quot;text-align: center;&quot;&gt;
&amp;nbsp;Les “access lists”&lt;/h2&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&amp;nbsp; &amp;nbsp; Les routeurs Cisco fournissent la possibilité de faire du ﬁltering. Les “access lists” peuvent être conﬁgurées pour tous les protocoles routables (IP, IPX, AppleTalk, ...). Vous pouvez conﬁgurer les “access lists” sur chaque routeur de façon indépendante. Les “access lists” permettent de prévenir l’accès sur votre réseau. Les “access lists” ne sont pas uniquement destinées à la sécurité mais peuvent être utilisées dans le cadre de contrôles d’ouverture de ligne (DDR, ...).&lt;br /&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&lt;b&gt;Utilisation des “access lists”&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp;Les “access list” ﬁltrent le trafﬁc réseau en contrôlant si des paquets routés sont transfé- rés ou bloqués sur le(les) interface(s) du routeur. Un routeur peut examiner chaque paquet suivant ce que vous avez spéciﬁé dans les “access lists”. Il est à noter que la sécurité est minimum, un utilisateur averti pourrait contourner les “access lists”. Les critères d’une “access list” sont l’adresse de source du trafﬁc, la destination du trafﬁc, le niveau de protocole ou d’autres informations.&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;Pourquoi utiliser des “access lists” Il y a beaucoup de raisons pour conﬁgurer des “ac- cess lists” : – Restreindre la mise à jour des tables de routage – Contrôler le ﬂux du réseau (pour les route-map par exemple) – Et bien sûr limiter les accès aux réseaux ou à des services spéﬁciques du routeur Vous pouvez utiliser les “access lists” pour fournir un niveau minimum de sécurité. Si aucune “acess lists” n’est conﬁgurée, le trafﬁc passe sans aucune restriction à travers le routeur.&lt;br /&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&amp;nbsp;&lt;b&gt;Création d’”access lists”&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&amp;nbsp; &amp;nbsp; Il y a 2 étapes pour la création de listes de contrôle. La première est de créer l’access list et la seconde étape est de l’appliquer sur l’interface. Lors de la création de l’”acess list”, il faut lui assigner un identiﬁcateur unique. Dans la majorité des cas, vous devrez utiliser un numéro (suivant le type de protocole à ﬁltrer). Il est aussi possible d’utiliser une “access list” basée un nom mais uniquement avec certains protocoles&lt;/blockquote&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEin1chtrXGYlG0V0jq-Ph6Oc1-TzNxy62yi6izKWp_4Jaaa7hDKcNNevY0rSNLvzdRVHxkbL5oJ-KoYX8pXK7wBMbmmatdnRh8adfSuAAcNADBte9VZE1Ov2EyYTGF6NWeLU0aaDr0imFcG/s1600/ppp.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEin1chtrXGYlG0V0jq-Ph6Oc1-TzNxy62yi6izKWp_4Jaaa7hDKcNNevY0rSNLvzdRVHxkbL5oJ-KoYX8pXK7wBMbmmatdnRh8adfSuAAcNADBte9VZE1Ov2EyYTGF6NWeLU0aaDr0imFcG/s1600/ppp.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp;La création d’une “access list” est une suite de critères avec les paramètres sources, destinations, ou types de protocole. Pour une “access list” donnée (un numéro unique ou un nom unique) vous pouvez avoir plusieurs entrées. Vous n’êtes pas limité dans la taille de la liste (juste par la mémoire) . Par contre, plus la liste est longue, plus elle prend du temps à être parcourue (!!). exemple :&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;interface serial 0/4&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; ip addresse 192.168.1.254 255.255.255.0&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; ip access-group 1 in&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; !&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; !&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;access-list 1 permit 192.168.1.1&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;access-list 1 deny 192.168.2.0 0.0.0.255&lt;br /&gt;&amp;nbsp; &amp;nbsp;A la ﬁn de chaque “access lists”, il y a la règle implicite “deny all trafﬁc”. Ce qui signiﬁe que ce qui n’est pas spéciﬁé est interdit. L’ordre des entrées dans l’”access-list” est important et c’est la première règle qui sa- tisfait qui est prise en compte. Lors de la modiﬁcation d’une “access list”, il est difﬁcile de la modiﬁer. Il vous est impossible d’insérer une règle dans l’”acces list”. La seule solution est d’effacer la liste et de la recréer (même si vous avez 300 entrées 8-). Vous pouvez aussi copier la liste en TFTP et ensuite la recharger en TFTP.&lt;/blockquote&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://ibda3four.blogspot.com/feeds/1253149568222708242/comments/default' title='تعليقات الرسالة'/><link rel='replies' type='text/html' href='http://ibda3four.blogspot.com/2014/07/router-cisco-3-access-lists.html#comment-form' title='0 تعليقات'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6168572102412770513/posts/default/1253149568222708242'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6168572102412770513/posts/default/1253149568222708242'/><link rel='alternate' type='text/html' href='http://ibda3four.blogspot.com/2014/07/router-cisco-3-access-lists.html' title='Router CISCO 3 - access lists -'/><author><name>ibda3four</name><uri>http://www.blogger.com/profile/12166158855015146950</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiq9qgxcImrb9WvXns9p6tfyVZNMzthaxUmYTZsH-ZHT1GhdTZ8kaJOlh1p8dLAOYhr5H5PINdGhpNAtyeUuZ84LYwxqiFxLlr6aLWVwNpfx2Gx764BPYO9brD88N7qnp9SuUhvwXqc8RBa/s72-c/EXAMPLE.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6168572102412770513.post-7257980573607121836</id><published>2014-07-11T16:20:00.001-07:00</published><updated>2014-07-12T03:38:28.368-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="NETWORK"/><category scheme="http://www.blogger.com/atom/ns#" term="مقالات"/><title type='text'> Router CISCO 2</title><content type='html'>&lt;div dir=&quot;rtl&quot; style=&quot;text-align: right;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRzoWFwpGkRNZE0pz4A9WUGTS4vpI98dCitT-WvGBGsiU3QKagA9OVZvA-XW7sNt8zfLa373nfvyz_Zo3XoRpYeqFSg9YIZYSRLDxYW-5QTGqjeDhtXBkVE5BlYHyKv0o_lIYK_Qi6QFUG/s1600/images+(3).jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRzoWFwpGkRNZE0pz4A9WUGTS4vpI98dCitT-WvGBGsiU3QKagA9OVZvA-XW7sNt8zfLa373nfvyz_Zo3XoRpYeqFSg9YIZYSRLDxYW-5QTGqjeDhtXBkVE5BlYHyKv0o_lIYK_Qi6QFUG/s1600/images+(3).jpg&quot; height=&quot;200&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLn4Sm7fgZLwWo1KB6HKkRYrnS3ggfzwGzi35nxsupB_GPGkCnwcc9U1H3m6Tz-XWV008Y6dKbFYbMU372ZjNuPF4QPcb20dmFoXW5yMDq2JkbT2h_yqxKJEMlB3ovW8KP6Q_YqymIrqcO/s1600/images+(4).jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLn4Sm7fgZLwWo1KB6HKkRYrnS3ggfzwGzi35nxsupB_GPGkCnwcc9U1H3m6Tz-XWV008Y6dKbFYbMU372ZjNuPF4QPcb20dmFoXW5yMDq2JkbT2h_yqxKJEMlB3ovW8KP6Q_YqymIrqcO/s1600/images+(4).jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; dir=&quot;ltr&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;b style=&quot;text-align: left;&quot;&gt;Images IOS&lt;/b&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot; style=&quot;text-align: left;&quot;&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;ul dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&lt;b&gt;Conﬁguration générale&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&amp;nbsp; &amp;nbsp;Lorsque vous désirez passer en mode conﬁguration, vous devez taper (en mode enable) :&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
conf terminal &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
Cela siginiﬁe que vous conﬁgurer le routeur en mode terminal. Il est tout à fait possible de conﬁgurer via TFTP par exemple. A ce moment le prompt change en :&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
router(config)#&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&amp;nbsp; &amp;nbsp;Donc vous êtes dans la racine de la conﬁguration du routeur et vous pouvez conﬁgurer les paramètres généraux.&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&lt;b&gt;&amp;nbsp;Conﬁguration des interfaces&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&amp;nbsp; &amp;nbsp;Mais lors de la conﬁguration d’un routeur, vous conﬁgurez souvent des interfaces. Il est donc nécessaire de passer du mode conﬁguration générale vers le conﬁguration de l’in- terface. Voici un exemple :&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
router&amp;gt; enable&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
password :&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
router#configure terminal&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
router(config)#interface ethernet 0&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
router(config-if)#ip address 10.1.1.1 255.255.255.0&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
router(config-if)#exit&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
router(config)#exit&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&amp;nbsp; &amp;nbsp;router#copy running-config startup-config Dans cet exemple, on peut voir la conﬁguration de l’interface ethernet 09 avec son addresse IP et son masque réseau. Lors de ce genre de conﬁguration, nous modiﬁons la conﬁgura- tion “running” et donc nous réalisons un copy running-config startup-config pour sauver la conﬁguration dans la nvram.&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&amp;nbsp;&lt;b&gt;Conﬁguration des lignes VTY&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&amp;nbsp; &amp;nbsp;Il existe aussi différent types d’interfaces à conﬁgurer. Par exemple, la conﬁguration des interfaces vituelles (pour l’accès via telnet du cli-exec) se fait de la même manière que les interfaces.&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
gw-int&amp;gt;enable&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
password :&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
gw-int#configure terminal&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
gw-int(config)#line vty 0 6&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
gw-int(config-line)#password MonSuperPasswordd&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
gw-int(config-line)#exec-timeout 15 0&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
gw-int(config-line)#exit&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
gw-int(config)#exit&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
gw-int#&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&amp;nbsp; &amp;nbsp; Dans ce cas, on conﬁgure le password pour 7 sessions possibles via telnet sur le routeur. On spéciﬁe le password (sinon on ne sait pas se connecter à distance) ainsi que le timeout d’utilisation pour fermer les sessions quand elles ne sont plus utilisées.&lt;/blockquote&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&lt;b&gt;Conﬁguration des interfaces routages&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/blockquote&gt;
&lt;/div&gt;
&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq &quot; style=&quot;text-align: left;&quot;&gt;
La conﬁguration des protocoles de routage est réalisé de la même manière que les interfaces.&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq &quot; style=&quot;text-align: left;&quot;&gt;
&lt;u&gt;le protocole de routage&amp;nbsp;&lt;/u&gt;&lt;/blockquote&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKtmXDMeeeMu74_Nd_iQ8rpJT13_sc-YQyF-Fj1J_ungAK6XrqH8G0445UIgIIQsXnqLmWykQhQ0xho9IjL2CnNx_rhUH9Dk13-M066RHBpUJwDS2ofLsPqicCnOoG7AHarOnZ-ROiq_pk/s1600/CCC.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKtmXDMeeeMu74_Nd_iQ8rpJT13_sc-YQyF-Fj1J_ungAK6XrqH8G0445UIgIIQsXnqLmWykQhQ0xho9IjL2CnNx_rhUH9Dk13-M066RHBpUJwDS2ofLsPqicCnOoG7AHarOnZ-ROiq_pk/s1600/CCC.png&quot; height=&quot;157&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;blockquote class=&quot;tr_bq &quot; style=&quot;text-align: left;&quot;&gt;
ip-int-gw&amp;gt;enable&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq &quot; style=&quot;text-align: left;&quot;&gt;
password :&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq &quot; style=&quot;text-align: left;&quot;&gt;
ip-int-gw#configure terminal&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq &quot; style=&quot;text-align: left;&quot;&gt;
ip-int-gw(config)#router ospf 303&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq &quot; style=&quot;text-align: left;&quot;&gt;
ip-int-gw(config-router)#network 145.30.6.0&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq &quot; style=&quot;text-align: left;&quot;&gt;
ip-int-gw(config-router)#exit&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq &quot; style=&quot;text-align: left;&quot;&gt;
ip-int-gw(config)#exit&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq &quot; style=&quot;text-align: left;&quot;&gt;
ip-int-gw#&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq &quot; style=&quot;text-align: left;&quot;&gt;
&lt;/blockquote&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://ibda3four.blogspot.com/feeds/7257980573607121836/comments/default' title='تعليقات الرسالة'/><link rel='replies' type='text/html' href='http://ibda3four.blogspot.com/2014/07/router-cisco-2.html#comment-form' title='0 تعليقات'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6168572102412770513/posts/default/7257980573607121836'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6168572102412770513/posts/default/7257980573607121836'/><link rel='alternate' type='text/html' href='http://ibda3four.blogspot.com/2014/07/router-cisco-2.html' title=' Router CISCO 2'/><author><name>ibda3four</name><uri>http://www.blogger.com/profile/12166158855015146950</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRzoWFwpGkRNZE0pz4A9WUGTS4vpI98dCitT-WvGBGsiU3QKagA9OVZvA-XW7sNt8zfLa373nfvyz_Zo3XoRpYeqFSg9YIZYSRLDxYW-5QTGqjeDhtXBkVE5BlYHyKv0o_lIYK_Qi6QFUG/s72-c/images+(3).jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6168572102412770513.post-8586616654813257376</id><published>2014-07-11T10:28:00.001-07:00</published><updated>2014-07-11T10:30:41.438-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="اسلاميات"/><title type='text'>اعضم شيئ ممكن ان تفوز بيه صالح المغامسي</title><content type='html'>&lt;div dir=&quot;rtl&quot; style=&quot;text-align: right;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZ7Szb8u-eOemZaimRxvCNDDzp_1h2tzCVttSZwzjLbc6DlGdg8cp75hdNbr1wQGqoH6GCe4NE4vezvu80LPyS7wrHVFihGFK38RCdZuvczzu7g5ttmizOuv8uEGH3Y4PDmSENL82gCk6V/s1600/rrrr.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZ7Szb8u-eOemZaimRxvCNDDzp_1h2tzCVttSZwzjLbc6DlGdg8cp75hdNbr1wQGqoH6GCe4NE4vezvu80LPyS7wrHVFihGFK38RCdZuvczzu7g5ttmizOuv8uEGH3Y4PDmSENL82gCk6V/s1600/rrrr.png&quot; height=&quot;223&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;344&quot; src=&quot;//www.youtube.com/embed/aoaGYAAJKaM&quot; width=&quot;459&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://ibda3four.blogspot.com/feeds/8586616654813257376/comments/default' title='تعليقات الرسالة'/><link rel='replies' type='text/html' href='http://ibda3four.blogspot.com/2014/07/blog-post_11.html#comment-form' title='0 تعليقات'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6168572102412770513/posts/default/8586616654813257376'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6168572102412770513/posts/default/8586616654813257376'/><link rel='alternate' type='text/html' href='http://ibda3four.blogspot.com/2014/07/blog-post_11.html' title='اعضم شيئ ممكن ان تفوز بيه صالح المغامسي'/><author><name>ibda3four</name><uri>http://www.blogger.com/profile/12166158855015146950</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZ7Szb8u-eOemZaimRxvCNDDzp_1h2tzCVttSZwzjLbc6DlGdg8cp75hdNbr1wQGqoH6GCe4NE4vezvu80LPyS7wrHVFihGFK38RCdZuvczzu7g5ttmizOuv8uEGH3Y4PDmSENL82gCk6V/s72-c/rrrr.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6168572102412770513.post-5485020034246197556</id><published>2014-07-11T04:17:00.000-07:00</published><updated>2014-07-11T04:17:06.349-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="اسلاميات"/><category scheme="http://www.blogger.com/atom/ns#" term="فايسبوك"/><category scheme="http://www.blogger.com/atom/ns#" term="مقالات"/><title type='text'>آداب الصيام</title><content type='html'>&lt;div dir=&quot;rtl&quot; style=&quot;text-align: right;&quot; trbidi=&quot;on&quot;&gt;
&lt;b style=&quot;text-align: justify;&quot;&gt;&lt;/b&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgX6aTCJpQ_qtcxS5Y4rTz_g61CuUqDpb1QIGDou7T8rfBmT7FAYZc41VGgTuyhc0NOgctfNRarWQPMN86iDRNnefXWl6pDoBaAa2k9tZlRPsFeF8pJf9nulIdubOIhqhyphenhyphenre4BY-Xgk4UYi/s1600/6177_4172_6599.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgX6aTCJpQ_qtcxS5Y4rTz_g61CuUqDpb1QIGDou7T8rfBmT7FAYZc41VGgTuyhc0NOgctfNRarWQPMN86iDRNnefXWl6pDoBaAa2k9tZlRPsFeF8pJf9nulIdubOIhqhyphenhyphenre4BY-Xgk4UYi/s1600/6177_4172_6599.jpg&quot; height=&quot;240&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
الأدب عنوان فلاح المرء، ومناط سعادته في الدنيا والآخرة, وأكمل الأدب وأعظمه هو الأدب مع الله جل وعلا بتعظيم أمره ونهيه والقيام بحقه، ولذا فإن لكل عبادة أدب, فالصلاة لها أدب, والحج له أدب, والصوم كذلك له آداب عظيمة لا يتم إلا بها, ولا يكمل إلا بأدائها.&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;br /&gt;وآداب الصيام منها ما هو واجب يلزم العبد أن يحافظ عليها ويلتزم بها, ومنها ما هو مستحب يزداد العبد بفعله أجرا وثواباً.&lt;/blockquote&gt;
&lt;br /&gt;
&lt;blockquote&gt;
&lt;b&gt;فمن الآداب الواجبة&lt;/b&gt;: أن يقوم الصائم بما أوجب الله عليه من العبادات القولية والفعلية, ومن أهمها الصلاة المفروضة, التي هي آكد أركان الإسلام بعد الشهادتين, فيجب على الصائم المحافظة عليها, والقيام بأركانها وشروطها, وأدائها مع جماعة المسلمين, وكل ذلك من التقوى التي شُرع الصيامُ من أجلها.&lt;br /&gt;ومن الآداب الواجبة: أن يجتنب الصائم جميع ما حرم الله عليه من الأقوال والأفعال, فيحفظ لسانه عن الكذب والغيبة والنميمة والسب والشتم وفحش القول, ويحفظ بصره عن النظر إلى المحرمات, ويحفظ أذنه عن الاستماع للحرام, ويحفظ بطنه عن كل مكسب خبيث محرم.&lt;br /&gt;وليس من العقل والحكمة أن يتقرب العبد إلى ربه بترك المباح كالطعام والشراب, ولا يتقرب إليه بترك ما حُرِّم عليه في كل حال, ولهذا يقول صلى الله عليه وسلم كما في الصحيح: (&lt;span style=&quot;color: green;&quot;&gt;من لم يدع قول الزور والعمل به، فليس لله حاجة في أن يدع طعامه وشرابه&lt;/span&gt;).&lt;br /&gt;وأُمِر الصائم بحفظ لسانه عن اللغو وفحش القول والجهل على الناس حتى وإن تعرض للأذى من غيره، يقول صلى الله عليه وسلم: (&lt;span style=&quot;color: green;&quot;&gt;الصيام جُنَّة، وإذا كان يوم صوم أحدكم، فلا يرفُث، ولا يصخب, فإن سابَّه أحد، أو قاتله فليقل إني امرؤ صائم&lt;/span&gt;) متفق عليه.&lt;br /&gt;فحقيقة الصيام إذن ليست مجرد الإمساك عن المفطرات الحسية فحسب, فإن ذلك أهون ما في الأمر, كما قال بعضهم: &quot;أهون الصيام ترك الشراب والطعام&quot;, وقال عليه الصلاة والسلام: (&lt;span style=&quot;color: green;&quot;&gt;ربَّ صائم حظه من صيامه الجوع والعطش&lt;/span&gt;) رواه الإمام&amp;nbsp;&lt;span style=&quot;color: maroon;&quot;&gt;أحمد&amp;nbsp;&lt;/span&gt;و&lt;span style=&quot;color: maroon;&quot;&gt;ابن ماجه&amp;nbsp;&lt;/span&gt;بسند صحيح، بل لا بد مع ذلك من حفظ الجوارح، واستعمالها فيما يرضي الله:&lt;br /&gt;&lt;span style=&quot;color: brown;&quot;&gt;إذا لم يكن في السمع مني تصاونٌ&lt;/span&gt;&lt;span style=&quot;color: brown;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;color: brown;&quot;&gt;وفي بصري غضٌّ وفي منطقي صَمتُ&lt;/span&gt;&lt;span style=&quot;color: brown;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;color: brown;&quot;&gt;فحظي إذن من صوميَ الجوع والظما&lt;/span&gt;&lt;span style=&quot;color: brown;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;color: brown;&quot;&gt;فإن قلتُ: إني صمت يومي فما صُمت&lt;/span&gt;&lt;span style=&quot;color: brown;&quot;&gt;&lt;br /&gt;&lt;/span&gt;يقول&amp;nbsp;&lt;span style=&quot;color: maroon;&quot;&gt;جابر&amp;nbsp;&lt;/span&gt;رضي الله عنه مبيناً حقيقة الصيام: &quot;إذا صمت فليصم سمعك وبصرك ولسانك عن الكذب والمآثم, ودع أذى الجار, وليكن عليك وقار وسكينة يوم صومك, ولا تجعل يوم صومك ويوم فطرك سواء&quot;.&lt;br /&gt;وأما الآداب المستحبة فمنها: السُّحور وهو الأكل آخر الليل, وسمي بذلك؛ لأنه يقع في وقت السَّحَر, وقد أمر به صلى الله عليه وسلم، فقال: (&lt;span style=&quot;color: green;&quot;&gt;تسحروا فإن في السُّحور بركة&lt;/span&gt;). متفق عليه, وهو الفاصل بين صيامنا وصيام أهل الكتاب, والسنة تأخيره, ويتحقق السُّحور ولو بشربة ماء.&lt;br /&gt;ومن الآداب المستحبة: تعجيل الفطر، قال صلى الله عليه وسلم: (&lt;span style=&quot;color: green;&quot;&gt;لا يزال الناس بخير ما عجلوا الفطر&lt;/span&gt;). متفق عليه.وينبغي للصائم أن يحرص على الدعاء عند فطره، فإن للصائم عند فطره دعوة لا تُرَدُّ, ويسن له أن يقول: (&lt;span style=&quot;color: green;&quot;&gt;ذهب الظمأ، وابتلت العروق، وثبت الأجر إن شاء الله&lt;/span&gt;) رواه&amp;nbsp;&lt;span style=&quot;color: maroon;&quot;&gt;أبو داود&lt;/span&gt;.&lt;br /&gt;ومن آداب الصيام المستحبة: كثرة قراءة القرآن والذكر والدعاء والصدقة, والاستكثار من أنواع الخير والعمل الصالح.&lt;br /&gt;هذه بعض آداب الصيام, فلتحرص -أخي الصائم- على التأدب بها, وأن تحفظ صومك من كل ما يجرحه، أو ينقص أجره، نسأل الله أن يرزقنا حسن الأدب معه, وأن يتقبل منا صيامنا وقيامنا، إنه جواد كريم.&lt;/blockquote&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://ibda3four.blogspot.com/feeds/5485020034246197556/comments/default' title='تعليقات الرسالة'/><link rel='replies' type='text/html' href='http://ibda3four.blogspot.com/2014/07/facebook.html#comment-form' title='0 تعليقات'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6168572102412770513/posts/default/5485020034246197556'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6168572102412770513/posts/default/5485020034246197556'/><link rel='alternate' type='text/html' href='http://ibda3four.blogspot.com/2014/07/facebook.html' title='آداب الصيام'/><author><name>ibda3four</name><uri>http://www.blogger.com/profile/12166158855015146950</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgX6aTCJpQ_qtcxS5Y4rTz_g61CuUqDpb1QIGDou7T8rfBmT7FAYZc41VGgTuyhc0NOgctfNRarWQPMN86iDRNnefXWl6pDoBaAa2k9tZlRPsFeF8pJf9nulIdubOIhqhyphenhyphenre4BY-Xgk4UYi/s72-c/6177_4172_6599.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6168572102412770513.post-5369161238046678600</id><published>2014-07-11T03:52:00.000-07:00</published><updated>2014-07-11T04:21:49.690-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="NETWORK"/><category scheme="http://www.blogger.com/atom/ns#" term="حصريات"/><category scheme="http://www.blogger.com/atom/ns#" term="مقالات"/><title type='text'> Router CISCO 1</title><content type='html'>&lt;div dir=&quot;rtl&quot; style=&quot;text-align: right;&quot; trbidi=&quot;on&quot;&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;h2 style=&quot;text-align: center;&quot;&gt;
&amp;nbsp;Router CISCO&lt;/h2&gt;
&lt;/blockquote&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEicimO9RZPz4vNifvIB6jZavElLVDrx_Lc85nnHFDQWOX5L-ezzXscPHgzJMgfcJJzF18iWCZRt9-AKc-j1Mm81rghRF0RNiWJzDM0-kFKEU9C4GaFHfZ036TCPtGNBSuy6YGEL7vT3yigV/s1600/dc975_WRT54G_v2_Linksys_Router_Digon3.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEicimO9RZPz4vNifvIB6jZavElLVDrx_Lc85nnHFDQWOX5L-ezzXscPHgzJMgfcJJzF18iWCZRt9-AKc-j1Mm81rghRF0RNiWJzDM0-kFKEU9C4GaFHfZ036TCPtGNBSuy6YGEL7vT3yigV/s1600/dc975_WRT54G_v2_Linksys_Router_Digon3.jpg&quot; height=&quot;180&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;h3&gt;
&lt;ol style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&amp;nbsp;Hardware&lt;/li&gt;
&lt;/ol&gt;
&lt;/h3&gt;
&lt;h4&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&amp;nbsp;Structure&lt;/li&gt;
&lt;/ul&gt;
&lt;/h4&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;b&gt;Unité centrale&lt;/b&gt; (CPU) L’unité centrale, ou le microprocesseur, est responsable de l’exé- cution du système d’exploitation (chez Cisco, c’est IOS) du routeur. Le système d’exploita- tion prend aussi bien en charge les protocoles que l’interface de commande via une session telnet. La puissance du microprocesseur est directement liée à la puissance de traitement du routeur .&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;b&gt;&amp;nbsp;Mémoire Flash La ﬂash&lt;/b&gt; représente une sorte de ROM effaçable et programmable. Sur beaucoup de routeurs, la ﬂash est utilisé pour maintenir une image d’un ou plusieurs sys- tèmes d’exploitation. Il est tout à fait possible de maintenir plusieurs images sur la même ﬂash (suivant la taille de la ﬂash). La mémoire ﬂash est pratique car elle permet une mise à jour de la mémoire sans changer des “chips”. La ﬂash peut se présenter sous forme de barette mais aussi sous forme de carte.&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;b&gt; ROM La ROM&lt;/b&gt; contient le code pour réaliser les diagnostics de démarrage (POST : Po- wer On Self Test). En plus, la ROM permet le démarrage et le chargement du système d’exploitation contenu sur la ﬂash. On change rarement la ROM. Si on la change, on doit souvent enlever des “chips” et les remplacer.&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;b&gt; RAM La RAM&lt;/b&gt; est utilisé par le système d’exploitation pour maintenir les informations durant le fonctionnement. Elle peut contenir les tampons (buffer), les tables de routage, la table ARP, la conﬁguration mémoire et un nombre important d’autres choses. Et comme c’est de la RAM, lors de la coupure de l’alimentation, elle est effacée.&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;b&gt;NVRAM (RAM non volatile)&lt;/b&gt; Le problème de la RAM est la non-conservation des don- nées après la coupure de l’alimentation. La NVRAM solutionne le problème, puisque les données sont conservées même après la coupure de l’alimentation. L’utilisation de la NVRAM permet de ne pas avoir de mémoire de masse (Disques Durs, Floppy). Cela évite donc les pannes dues à une partie mécanique. La conﬁguration est maintenue dans la NVRAM.&lt;span style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;b&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Portes I/O&lt;/b&gt; La structure même d’un routeur est l’ouverture donc l’interfaçage vers le monde extérieur est important. Il existe un nombre impressionant d’interfaces possibles pour un routeur (Liaison série asynchrone, synchrone, ethernet, tokenring, ATM, Sonet, FO, ...). La vitesse du bus qui interconnecte les I/O avec les différents composants du routeur marque aussi la puissance de traitement du routeur.&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;
&lt;h4&gt;
&lt;ul dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&lt;/li&gt;
&lt;li&gt;Processus de démarrage&lt;/li&gt;
&lt;/ul&gt;
&lt;/h4&gt;
&lt;/blockquote&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbK7hoe8JjDE7BvxC32CCYUB-8k1EZX_ZzsTNKxuWu_dtWrPDgy8Ou1WU95AFVG1ugd16PfkhlIo8u53teDhx-iCUGZxiRWCdL-HF-mJ12Qtck-drQZ3oNBVKHHrFUjXqepuoix-iDrij2/s1600/DDDDDD.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbK7hoe8JjDE7BvxC32CCYUB-8k1EZX_ZzsTNKxuWu_dtWrPDgy8Ou1WU95AFVG1ugd16PfkhlIo8u53teDhx-iCUGZxiRWCdL-HF-mJ12Qtck-drQZ3oNBVKHHrFUjXqepuoix-iDrij2/s1600/DDDDDD.png&quot; height=&quot;390&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;b&gt;&amp;nbsp;2.&lt;span style=&quot;text-align: left;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;text-align: right;&quot;&gt;Software (IOS)&lt;/span&gt;&lt;/b&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&lt;b&gt;Porte console&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
La conﬁguration de base d’un routeur Cisco (et des autres aussi) se fait en général via la porte console. La porte console, sur un routeur, est conﬁgurée comme une interface DTE (Data Terminal Equipment). Mais la porte RS232 d’un PC est aussi une interface&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
DTE, c’est pour cela que vous ne pouvez connecter un cable série directement sur la porte console. La solution est d’utiliser un cable croisé (entre le ﬁl 2 &amp;amp; 3) avec les différents ﬁls de signaux. Le cable de console est souvent fourni en standard avec les routeurs Cisco. La connexion s’effectue, en standard, à 9600bauds avec 8 bits de data, 1 bit stop et pas de parité. Vous pouvez utiliser votre émulateur de terminal favori&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&lt;/li&gt;
&lt;li&gt;&amp;nbsp;Interpreteur de commande (CLI exec)&lt;/li&gt;
&lt;/ul&gt;
&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
L’interpreteur de commande, comme son nom l’indique, est responsable de l’interpré- tation des commandes que vous tapez. La commande interprétée, si elle est correcte, réalise l’opération demandée&amp;nbsp;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
Si lors de la conﬁguration initiale un (ou des) password a été conﬁguré, vous devez intro- duire ce password pour accéder à l’interpreteur de commande. Il y a 2 modes d’execution sur un routeur Cisco :&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
1. Le mode utilisateur (prompt : &amp;gt;)&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
2. Le mode privilégié (prompt : #)&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
Lors de la connexion initiale avec le routeur, vous arrivez dans le mode utilisateur. Pour passer au mode privilégié, vous devez introduire la commande enable et ensuite introduire un mot de passe. Le mode utilisateur sert uniquement à la visualisation des paramètres (pas de la conﬁguration) et des différents status du routeur.Par contre, le mode privilégié permet, en plus de la visualisation des paramètres, la conﬁguration du routeur et le changement de paramètres dans la conﬁguration. L’interpreteur de commande des routeurs Cisco est très souple et vous permet de de- mander les commandes disponibles. Vous désirez savoir les commandes qui commencent par “ho”, rien de plus simple, ho ? &amp;lt;enter&amp;gt;. Il est aussi possible d’utiliser l’expansion de commande comme sous Unix (avec la touche de tabulation). Si il n’y pas de confu- sions possibles, vous pouvez utiliser les abbréviations de commande. Par exemple, sh ip int brie au lieux de show ip interface brief. Cela permet de gagner du temps et de rendre la vie un peu plus facile.&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; style=&quot;text-align: left;&quot;&gt;
&lt;ul dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&lt;b&gt;&amp;nbsp;Les ﬁchiers de conﬁguration&lt;/b&gt;&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; style=&quot;text-align: left;&quot;&gt;
Dans un routeur cisco (en général), il existe différents ﬁchiers de conﬁguration. Il y a un ﬁchier de conﬁguration dans la nvram (startup-conﬁg), qui est lu au démarrage du routeur et copié en mémoire. Il y a un autre ﬁchier de conﬁguration dans la mémoire vive (running-conﬁg). La “startup-conﬁg” est conservée dans la nvram sous forme ASCII. Tandis que la “running-conﬁg” est dans la ram sous forme binaire.&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; style=&quot;text-align: left;&quot;&gt;
&lt;/blockquote&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://ibda3four.blogspot.com/feeds/5369161238046678600/comments/default' title='تعليقات الرسالة'/><link rel='replies' type='text/html' href='http://ibda3four.blogspot.com/2014/07/router-cisco-1.html#comment-form' title='0 تعليقات'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6168572102412770513/posts/default/5369161238046678600'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6168572102412770513/posts/default/5369161238046678600'/><link rel='alternate' type='text/html' href='http://ibda3four.blogspot.com/2014/07/router-cisco-1.html' title=' Router CISCO 1'/><author><name>ibda3four</name><uri>http://www.blogger.com/profile/12166158855015146950</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEicimO9RZPz4vNifvIB6jZavElLVDrx_Lc85nnHFDQWOX5L-ezzXscPHgzJMgfcJJzF18iWCZRt9-AKc-j1Mm81rghRF0RNiWJzDM0-kFKEU9C4GaFHfZ036TCPtGNBSuy6YGEL7vT3yigV/s72-c/dc975_WRT54G_v2_Linksys_Router_Digon3.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6168572102412770513.post-3663453508257015128</id><published>2014-07-09T10:47:00.002-07:00</published><updated>2014-07-09T10:53:11.408-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="اسلاميات"/><title type='text'>بادروا الى الاعمال الصالحة </title><content type='html'>&lt;div dir=&quot;rtl&quot; style=&quot;text-align: right;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEioV4R36-ATTW5JsHRDDpCIoojp1x2ljRziyp3B0T9sZCEviAlpXHUXOFbJBfH4Tt5ydrXDhCi6Ula75zikCtxURnDLsdjUJ4PGS9OwS7wrLDm4b4PQoD5cPx0L0U3ZiB2CpTHFhAJeJvz6/s1600/Untitled.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEioV4R36-ATTW5JsHRDDpCIoojp1x2ljRziyp3B0T9sZCEviAlpXHUXOFbJBfH4Tt5ydrXDhCi6Ula75zikCtxURnDLsdjUJ4PGS9OwS7wrLDm4b4PQoD5cPx0L0U3ZiB2CpTHFhAJeJvz6/s1600/Untitled.png&quot; height=&quot;220&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;iframe allowfullscreen=&#39;allowfullscreen&#39; webkitallowfullscreen=&#39;webkitallowfullscreen&#39; mozallowfullscreen=&#39;mozallowfullscreen&#39; width=&#39;320&#39; height=&#39;266&#39; src=&#39;https://www.youtube.com/embed/9FERg3bSziQ?feature=player_embedded&#39; frameborder=&#39;0&#39;&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://ibda3four.blogspot.com/feeds/3663453508257015128/comments/default' title='تعليقات الرسالة'/><link rel='replies' type='text/html' href='http://ibda3four.blogspot.com/2014/07/blog-post_163.html#comment-form' title='0 تعليقات'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6168572102412770513/posts/default/3663453508257015128'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6168572102412770513/posts/default/3663453508257015128'/><link rel='alternate' type='text/html' href='http://ibda3four.blogspot.com/2014/07/blog-post_163.html' title='بادروا الى الاعمال الصالحة '/><author><name>ibda3four</name><uri>http://www.blogger.com/profile/12166158855015146950</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEioV4R36-ATTW5JsHRDDpCIoojp1x2ljRziyp3B0T9sZCEviAlpXHUXOFbJBfH4Tt5ydrXDhCi6Ula75zikCtxURnDLsdjUJ4PGS9OwS7wrLDm4b4PQoD5cPx0L0U3ZiB2CpTHFhAJeJvz6/s72-c/Untitled.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6168572102412770513.post-6888129049601068672</id><published>2014-07-09T02:17:00.001-07:00</published><updated>2014-07-09T04:29:44.245-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="اسلاميات"/><title type='text'>السبيل الى الجنة مع الشيخ صالح المغامسي </title><content type='html'>&lt;div dir=&quot;rtl&quot; style=&quot;text-align: right;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjoCtym5AQsUkdbc23hRNrs-i_-xYi6KrXOV1bjeRM3pHu4loYQZGdFyRY3xXnUa2jF9j-M-HO0eQlJu7a5vRA8IYXANdIER4x8icMra0zIoVvEXwZAdq4Ocf4jClH7pkT35oX7OCR75nu/s1600/1333921110225.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjoCtym5AQsUkdbc23hRNrs-i_-xYi6KrXOV1bjeRM3pHu4loYQZGdFyRY3xXnUa2jF9j-M-HO0eQlJu7a5vRA8IYXANdIER4x8icMra0zIoVvEXwZAdq4Ocf4jClH7pkT35oX7OCR75nu/s1600/1333921110225.png&quot; height=&quot;160&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;object class=&quot;BLOGGER-youtube-video&quot; classid=&quot;clsid:D27CDB6E-AE6D-11cf-96B8-444553540000&quot; codebase=&quot;http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0&quot; data-thumbnail-src=&quot;https://i1.ytimg.com/vi/P4OE_lHGSBA/0.jpg&quot; height=&quot;266&quot; width=&quot;320&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;https://www.youtube.com/v/P4OE_lHGSBA?version=3&amp;f=user_uploads&amp;c=google-webdrive-0&amp;app=youtube_gdata&quot; /&gt;&lt;param name=&quot;bgcolor&quot; value=&quot;#FFFFFF&quot; /&gt;&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot; /&gt;&lt;embed width=&quot;320&quot; height=&quot;266&quot;  src=&quot;https://www.youtube.com/v/P4OE_lHGSBA?version=3&amp;f=user_uploads&amp;c=google-webdrive-0&amp;app=youtube_gdata&quot; type=&quot;application/x-shockwave-flash&quot; allowfullscreen=&quot;true&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://ibda3four.blogspot.com/feeds/6888129049601068672/comments/default' title='تعليقات الرسالة'/><link rel='replies' type='text/html' href='http://ibda3four.blogspot.com/2014/07/blog-post_9.html#comment-form' title='0 تعليقات'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6168572102412770513/posts/default/6888129049601068672'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6168572102412770513/posts/default/6888129049601068672'/><link rel='alternate' type='text/html' href='http://ibda3four.blogspot.com/2014/07/blog-post_9.html' title='السبيل الى الجنة مع الشيخ صالح المغامسي '/><author><name>ibda3four</name><uri>http://www.blogger.com/profile/12166158855015146950</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjoCtym5AQsUkdbc23hRNrs-i_-xYi6KrXOV1bjeRM3pHu4loYQZGdFyRY3xXnUa2jF9j-M-HO0eQlJu7a5vRA8IYXANdIER4x8icMra0zIoVvEXwZAdq4Ocf4jClH7pkT35oX7OCR75nu/s72-c/1333921110225.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6168572102412770513.post-5871031479916340151</id><published>2014-07-08T03:59:00.001-07:00</published><updated>2014-07-09T04:30:10.294-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="NETWORK"/><title type='text'>protocole OSPF</title><content type='html'>&lt;div dir=&quot;rtl&quot; style=&quot;text-align: right;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-GwVwZ9OO2vwhB4BuV1-hRLX-2jn_V8vHz9upHA1GXiz7EJKdVxhO_qi4w6z2cgugsytUlRlnCya-KCEuIfeBSqdz58nzUxy20MhEVEPPsQ-ngn7OuFGtorMkpnY8JzzS-EsPJth7NaX4/s1600/OSPF_message.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-GwVwZ9OO2vwhB4BuV1-hRLX-2jn_V8vHz9upHA1GXiz7EJKdVxhO_qi4w6z2cgugsytUlRlnCya-KCEuIfeBSqdz58nzUxy20MhEVEPPsQ-ngn7OuFGtorMkpnY8JzzS-EsPJth7NaX4/s1600/OSPF_message.jpg&quot; height=&quot;186&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
OSPF:&amp;nbsp;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&amp;nbsp; &amp;nbsp; Le protocole Open Shortest Path First (OSPF) est un protocole de routage d’état des liaisons qui a été développé pour remplacer le protocole de routage à vecteur de distance RIP. RIP était acceptable au début des réseaux et de l’Internet, mais le fait qu’il choisisse la meilleure route en prenant en compte uniquement le nombre de sauts est rapidement devenu inacceptable dans des réseaux plus grands nécessitant une solution de routage plus fiable. OSPF est un protocole de routage sans classe qui utilise le concept de zones pour son évolutivité. Le document RFC 2328 définit la mesure OSPF comme une valeur arbitraire nommée coût. Le système d’exploitation Internet (IOS) de Cisco utilise la bande passante comme mesure de coût du protocole OSPF.&amp;nbsp;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
Les principaux avantages d’OSPF sur RIP sont une convergence rapide, et une évolutivité vers la mise en œuvre de réseaux bien plus importants. Dans ce dernier chapitre de Protocoles et concepts de routage, vous allez étudier l’implémentation et les configurations d’un protocole OSPF à zone unique. Les configurations et les concepts OSPF plus complexes sont réservés à des cours de niveau CCNP.&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.mediafire.com/view/bdq57mglmc36hb4/PROTOCOLE_OSPF_RESUME.pdf&quot;&gt;OSPF.PDF&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://ibda3four.blogspot.com/feeds/5871031479916340151/comments/default' title='تعليقات الرسالة'/><link rel='replies' type='text/html' href='http://ibda3four.blogspot.com/2014/07/protocole-ospf.html#comment-form' title='0 تعليقات'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6168572102412770513/posts/default/5871031479916340151'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6168572102412770513/posts/default/5871031479916340151'/><link rel='alternate' type='text/html' href='http://ibda3four.blogspot.com/2014/07/protocole-ospf.html' title='protocole OSPF'/><author><name>ibda3four</name><uri>http://www.blogger.com/profile/12166158855015146950</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-GwVwZ9OO2vwhB4BuV1-hRLX-2jn_V8vHz9upHA1GXiz7EJKdVxhO_qi4w6z2cgugsytUlRlnCya-KCEuIfeBSqdz58nzUxy20MhEVEPPsQ-ngn7OuFGtorMkpnY8JzzS-EsPJth7NaX4/s72-c/OSPF_message.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6168572102412770513.post-5001760511795499857</id><published>2014-07-07T04:21:00.000-07:00</published><updated>2014-07-10T01:09:15.553-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="NETWORK"/><category scheme="http://www.blogger.com/atom/ns#" term="صيانة وبرامج"/><title type='text'>Xshell 4</title><content type='html'>&lt;div dir=&quot;rtl&quot; style=&quot;text-align: right;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgIM-ICbBoMrdV7csGwzEfSRO7kmYvbFsUPru7COGNkQvXebOyI2gzCZDVL4NC62KMtFAfkHSjQ9cdcXjPjMmt8M8IfIU6tSoKFUqBK2W81bOmV6VsAJrONPSVYVHuh00NpBsZPbHuFcNc/s1600/images+(2).jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgIM-ICbBoMrdV7csGwzEfSRO7kmYvbFsUPru7COGNkQvXebOyI2gzCZDVL4NC62KMtFAfkHSjQ9cdcXjPjMmt8M8IfIU6tSoKFUqBK2W81bOmV6VsAJrONPSVYVHuh00NpBsZPbHuFcNc/s1600/images+(2).jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;-webkit-font-smoothing: subpixel-antialiased; background-color: white; border: 0px; font-family: Helvetica, Arial, sans-serif; font-size: 15px; line-height: 19.9950008392334px; margin-bottom: 10px; padding: 0px; text-align: left; vertical-align: baseline;&quot;&gt;
&lt;span class=&quot;fr-x-mtfrom-en&quot; style=&quot;border: 0px; font-family: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Xshell est un émulateur de terminal SSH, Telnet et rlogin pour les plates-formes Windows.&lt;/span&gt;&amp;nbsp;&lt;span class=&quot;fr-x-mtfrom-en&quot; style=&quot;border: 0px; font-family: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Il permet aux utilisateurs d&#39;accéder aux environnements UNIX ou Linux facilement et en toute sécurité sur un poste de travail Windows.&lt;/span&gt;&amp;nbsp;&lt;span class=&quot;fr-x-mtfrom-en&quot; style=&quot;border: 0px; font-family: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Le Protocole SSH supporte le cryptage et l&#39;authentification des utilisateurs pour des connexions sécurisées sur Internet, et il remplace les protocoles traditionnels, tels que Telnet et rlogin.&lt;/span&gt;&amp;nbsp;&lt;span class=&quot;fr-x-mtfrom-en&quot; style=&quot;border: 0px; font-family: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Il est conçu pour satisfaire à la fois les débutants et les utilisateurs avancés.&lt;/span&gt;&amp;nbsp;&lt;span class=&quot;fr-x-mtfrom-en&quot; style=&quot;border: 0px; font-family: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Son interface utilisateur est intuitive et il met à disposition des utilisateurs avancés, des fonctionnalités puissantes telles que les commandes locales, la recherche avec des expressions régulières, le transfert de port dynamique, et les langues internationales.&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;-webkit-font-smoothing: subpixel-antialiased; background-color: white; border: 0px; font-family: Helvetica, Arial, sans-serif; font-size: 15px; line-height: 19.9950008392334px; margin-bottom: 10px; padding: 0px; text-align: left; vertical-align: baseline;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;whatsnew&quot; dir=&quot;ltr&quot; style=&quot;background-color: white; border: 0px; font-family: Helvetica, Arial, sans-serif; font-size: 15px; line-height: 19.9950008392334px; margin: 0px; padding: 0px; text-align: left; vertical-align: baseline;&quot;&gt;
&lt;div class=&quot;noNumLocalize&quot; style=&quot;-webkit-font-smoothing: subpixel-antialiased; border: 0px; font-family: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 10px; padding: 0px; vertical-align: baseline;&quot;&gt;
Nouveautés de cette version&amp;nbsp;:&lt;/div&gt;
&lt;div style=&quot;-webkit-font-smoothing: subpixel-antialiased; border: 0px; font-family: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 10px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span class=&quot;fr-x-mtfrom-en&quot; style=&quot;border: 0px; font-family: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;La version 4,0 Build 0126 corrige le renommage du bouton de réglage rapide actuel crée involontairement.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-font-smoothing: subpixel-antialiased; border: 0px; font-family: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 10px; padding: 0px; text-align: center; vertical-align: baseline;&quot;&gt;
&lt;span class=&quot;fr-x-mtfrom-en&quot; style=&quot;border: 0px; font-family: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;a href=&quot;http://www.mediafire.com/download/hwwrv11pjgwulza/Xshell4.exe&quot; target=&quot;_blank&quot;&gt;DOWNLOAD&amp;nbsp;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://ibda3four.blogspot.com/feeds/5001760511795499857/comments/default' title='تعليقات الرسالة'/><link rel='replies' type='text/html' href='http://ibda3four.blogspot.com/2014/07/xshell-4.html#comment-form' title='0 تعليقات'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6168572102412770513/posts/default/5001760511795499857'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6168572102412770513/posts/default/5001760511795499857'/><link rel='alternate' type='text/html' href='http://ibda3four.blogspot.com/2014/07/xshell-4.html' title='Xshell 4'/><author><name>ibda3four</name><uri>http://www.blogger.com/profile/12166158855015146950</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgIM-ICbBoMrdV7csGwzEfSRO7kmYvbFsUPru7COGNkQvXebOyI2gzCZDVL4NC62KMtFAfkHSjQ9cdcXjPjMmt8M8IfIU6tSoKFUqBK2W81bOmV6VsAJrONPSVYVHuh00NpBsZPbHuFcNc/s72-c/images+(2).jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6168572102412770513.post-3243822589438405321</id><published>2014-07-06T15:37:00.001-07:00</published><updated>2014-07-09T04:30:55.773-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="NETWORK"/><title type='text'>CCNA V 5</title><content type='html'>&lt;div dir=&quot;rtl&quot; style=&quot;text-align: right;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhD_ZEFP7qI4fCEu4KaQB4qCkcl6MFkKHL8vGyg9yhEV5fC98SkYn3hPEzb5HKYuYru98riW0uD-op6BzGlnUEtMReJL6GAVeJbNU9G4PzfYCpV2KZw6FipWXqrwkTxovt259NuY1Xn-MCO/s1600/ccna.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhD_ZEFP7qI4fCEu4KaQB4qCkcl6MFkKHL8vGyg9yhEV5fC98SkYn3hPEzb5HKYuYru98riW0uD-op6BzGlnUEtMReJL6GAVeJbNU9G4PzfYCpV2KZw6FipWXqrwkTxovt259NuY1Xn-MCO/s1600/ccna.png&quot; height=&quot;320&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h2 dir=&quot;ltr&quot; style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;a href=&quot;http://www.mediafire.com/download/5zp6rot1j4wkxcb/CCNV5-1.rar&quot; target=&quot;_blank&quot;&gt;CCNV5-1&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://www.mediafire.com/download/7vz4ysd7rl86pld/CCNV5-2.rar&quot; target=&quot;_blank&quot;&gt;CCNV5-2&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://www.mediafire.com/download/ovyho18gmgdv36x/CCNv5-3.rar&quot; target=&quot;_blank&quot;&gt;CCNV5-3&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://www.mediafire.com/download/4zn8iuilslxfr80/CCNv5-4.rar&quot; target=&quot;_blank&quot;&gt;CCNV5-5&lt;/a&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://ibda3four.blogspot.com/feeds/3243822589438405321/comments/default' title='تعليقات الرسالة'/><link rel='replies' type='text/html' href='http://ibda3four.blogspot.com/2014/07/ccna-v-5.html#comment-form' title='0 تعليقات'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6168572102412770513/posts/default/3243822589438405321'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6168572102412770513/posts/default/3243822589438405321'/><link rel='alternate' type='text/html' href='http://ibda3four.blogspot.com/2014/07/ccna-v-5.html' title='CCNA V 5'/><author><name>ibda3four</name><uri>http://www.blogger.com/profile/12166158855015146950</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhD_ZEFP7qI4fCEu4KaQB4qCkcl6MFkKHL8vGyg9yhEV5fC98SkYn3hPEzb5HKYuYru98riW0uD-op6BzGlnUEtMReJL6GAVeJbNU9G4PzfYCpV2KZw6FipWXqrwkTxovt259NuY1Xn-MCO/s72-c/ccna.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6168572102412770513.post-3138389666813592615</id><published>2014-07-06T15:26:00.000-07:00</published><updated>2014-07-10T01:09:39.056-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="NETWORK"/><category scheme="http://www.blogger.com/atom/ns#" term="صيانة وبرامج"/><title type='text'>cisco-config-pro 2.8</title><content type='html'>&lt;div dir=&quot;rtl&quot; style=&quot;text-align: right;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhpSGA7gKw9iCSjM3QwkPsVt2CdttnyMp_sLXRGD33ahLagFkFftVGXemAI8u2bjw2XUfLYLpvJyADKFWMXBzAQS57NWF30IIWV-g_p9TIIX3n0JHRaMztUbTjbAv1T82GSJ_ogEzbmJMe/s1600/LK.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhpSGA7gKw9iCSjM3QwkPsVt2CdttnyMp_sLXRGD33ahLagFkFftVGXemAI8u2bjw2XUfLYLpvJyADKFWMXBzAQS57NWF30IIWV-g_p9TIIX3n0JHRaMztUbTjbAv1T82GSJ_ogEzbmJMe/s1600/LK.png&quot; height=&quot;240&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: center;&quot;&gt;
&lt;a href=&quot;https://www.dropbox.com/s/6zlcy2gov5uh3qf/cisco-config-pro-k9-pkg-2_8-en.zip&quot; target=&quot;_blank&quot;&gt;download&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://ibda3four.blogspot.com/feeds/3138389666813592615/comments/default' title='تعليقات الرسالة'/><link rel='replies' type='text/html' href='http://ibda3four.blogspot.com/2014/07/cisco-config-pro-28.html#comment-form' title='0 تعليقات'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6168572102412770513/posts/default/3138389666813592615'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6168572102412770513/posts/default/3138389666813592615'/><link rel='alternate' type='text/html' href='http://ibda3four.blogspot.com/2014/07/cisco-config-pro-28.html' title='cisco-config-pro 2.8'/><author><name>ibda3four</name><uri>http://www.blogger.com/profile/12166158855015146950</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhpSGA7gKw9iCSjM3QwkPsVt2CdttnyMp_sLXRGD33ahLagFkFftVGXemAI8u2bjw2XUfLYLpvJyADKFWMXBzAQS57NWF30IIWV-g_p9TIIX3n0JHRaMztUbTjbAv1T82GSJ_ogEzbmJMe/s72-c/LK.png" height="72" width="72"/><thr:total>0</thr:total></entry></feed>