Full Version of Issue 5 - Lebanese French University

Transcription

Full Version of Issue 5 - Lebanese French University
IT e-Magazine
Issue 5, March 2015
The growth of Information Technology has been phenomenal since the middle of the 21 century. It has
affected all aspects of life in one way or another. So the objective of this magazine, which released by the
department of Information Technology – Lebanese French University (LFU), is to disseminate information on
the application of IT and to be a platform for discussing its benefits and its impact on society.
We welcome articles that cover and analyze the benefits and impacts of IT applications on the society and
which elaborate on their implementation issues. The criteria for selecting articles for the magazine include: the
subject area of the article; new ideas about applications and implementation techniques; how well the
information is presented; level of interest to other readers; and, the importance to the IT community. All articles
will be subject to a reviewing procedure.
Hopefully, contributions to this magazine will 'enhance readability for the general IT reader' and 'help direct
society towards a more beneficial use of IT'.
Editorial Committee
item @ lfu-erbil . net
1975, Microsoft ® was began as a software company
Million+ Apps
by 'Bill Gates' and 'Paul Allen' in Albuquerque.
The current best-selling products for Microsoft are the
Microsoft Windows operating system, Microsoft Office
suite of productivity software, Xbox a line of
entertainment of games, music and video and Bing, a
line of search engine.
The name "Microsoft" is a portmanteau of words
microcomputer and software.
To date, Over 1300000 apps
officially available on the
Google Play Store
Facebook’s First User
The first user at the Facebook was Mark Zuckerberg.
Facebook’s first user actually holds the user ID number
four (the first three accounts having been blocked off
for testing).
Within
twenty-four
hours, Facebook has
more than hundred and
fifteen
hundred
registrants. You can
check the other first
facebook's users by
replace # with a number in the following address
(www.facebook.com/#).
People who changed the Internet
Father of the Web
The Father of Web (WWW) 'Tim Berners-Lee' invented the World Wide Web. He wrote the first web
client and server and designed a way to create links, or hypertext, amid different pieces of online
information.
He now maintains standards for the web and continues to refine its design as a director of the W3C.
ITeM Website: http://www.lfu-erbil.net/item
2
INSIDE THIS ISSUE
Page 4
Academic Plagiarism
Mazin S AlHakeem
The issue of plagiarism is becoming more and more prevalent, and some fields,
particularly in academia. Plagiarism is the "wrongful appropriation" of an ideas,
thoughts, expressions or works from another author(s) and represent it as one's own
original work. In simply it’s a "stealing and publication". Plagiarism “is not a crime per
se”, but the plagiarism by students, reporters, professors, or researchers “is considered
academic dishonesty and serious ethical offense”, and it is a subject to sanctions (for
examples: penalties, suspension, and even expulsion).
Who can read this article: Researcher, Reporter, Educators and Students
Page 5
Drupal Content Management System
Ahmed
Abduladheem
Abdulwahid
Drupal is one of the most popular Content Management Systems (CMS) these days. It is
an open source Content Management System, and it is free. Drupal system is used for
several kinds of purpose of contents, and it presents a service for the people and the
companies to publish, organize, and manage their work without higher knowledge of
the programming (Douglass, Little, & Smith, 2006).
Who can read this article: Web Designers, Web Developers, & CS lecturers
Page 6
E-learning, Online Learning and Distance Learning: Are they the same?
Harith Abdullah
E-learning, Web-based learning, online learning, and distance learning are widely used
as interchangeable terms. However, these terms represent concepts with subtle, yet
consequential differences. In this article, we reveal the differences, review the meanings
of these terms, and suggest definitions.
Who can read this article: Educational and Training Communities
Page 7
Ethical Hackers
Mohammad
Salim
Undoubtedly, since you know about hackers, you also want to know about ethical
hackers. For making you aware of ethical hacking concept, this article will answer three
important questions, "who is an ethical hacker?", "what the importance of ethical
hacking is?", and finally "how to become an ethical hacker?".
Who can read this article: IT Lecturers, IT Students and anyone interested in IT field
ITeM | Issue 5, March – 2015
3
Page 9
NFC and its Applications
Yahya Tariq
Hussaen
Near Field Communication (NFC) system is designed from the collaboration of many
technologies like wireless communications, mobile devices, mobile applications, and
smart card technology and cloud services. NFC is a short-range wireless connectivity
standard that uses magnetic field induction to enable smartphones and other devices
to establish radio communication with each other when they're touched together, or
bringing them into proximity, typically a distance of 4 cm or less. Based on RFID
technology, NFC provides a medium for the identification protocols that validate secure
data transfer. Developed by Philips and Sony.
Who can read this article: General Smartphone Users
Page 10
OneNote in Education: An Effective Way to Enhance Approaches of Teaching
Ihsan Sayyid
Salman
and Learning in Classroom
Last year, Microsoft Company has been developed a new powerful teaching and
learning tool which known as OneNote Class Notebook Creator. It can be defined as a
digital platform that enable educators to build electronic classroom through creating
notebooks to share their training materials effectively with the rest of their classmates.
Additionally, it helps teachers to monitor interaction of each student through using
various activities in the class such as sharing digital handouts, take notes easily and fast
synchronisation on pages. This essay will highlight the ways and benefits of using
OneNote in education.
Who can read this article: IT, Educational
Page 12
Port Channel Technology: Advantages and Uses
Ali Rabee
A trunk is a physical path or link in a communications system that is designed to handle
many transmissions simultaneously and that interconnects major switching centers or
nodes. Depending on the system, a trunk may carry transmissions in analog or digital
form. Transmission content may include voice (as in the conventional telephone
system), text, computer programs, images, and video or control signals.
Who can read this article: Network Administrator , IT
ITeM | Issue 5, March – 2015
4
Academic Plagiarism
Mazin S. Al-Hakeem (Ph.D)
Department of Information Technology, Lebanese French University - Erbil
[email protected]
Introduction
The issue of plagiarism is becoming more
and more prevalent, and some fields,
particularly in academia.
Plagiarism is the "wrongful appropriation"
of an ideas, thoughts, expressions or
works from another author(s) and
represent it as one's own original work. In
simply it’s a "stealing and publication".
Plagiarism “is not a crime per se”, but the
plagiarism
by
students,
reporters,
professors, or researchers “is considered
academic dishonesty and serious ethical
offense”, and it is a subject to sanctions
(for examples: penalties, suspension, and
even expulsion).
"The use of ideas, concepts, words, or
structures without include quotations or
appropriately acknowledging or citation
to the sources or the references
unintentionally" is also plagiarism.
“One form of academic plagiarism involves
appropriating a published article and
modifying it slightly to avoid suspicion”.
Preventing Plagiarism
In academia, we have to come up with
original ideas and at the same time
making reference to other works.
If change some of what an author said
("restatement in own words of someone
else's ideas"), do we still have to cite that
author?
The confusion about the answers to these
questions often leads to plagiarism.
And actually, the other sources support
own ideas.
“Not all sources are worth citing-- in fact,
many of them are just plain wrong”.
Plagiarism Detection
Lots of people have impressions about
detection tools like (Turnitin, writecheck,
etc.). Unfortunately, many of these
impressions
are
based
on
misconceptions, because they are not
for plagiarism detector?
These tools does not detect plagiarism
per se; It is a first step to plagiarism
detection … The originality reports of
these tools are simply tools to help us to
find sources that contain similar to base
on them databases. The originality report
do not reflect the assessment of whether
a work has or has not been plagiarized.
It is important to realize that the similarity
is not a plagiarism – there is no score that
is inherently "good” or "bad”. So, the
important next step for plagiarism
detection is depth examination of both
the work and suspect sources in
accordance with the standards of the
university or institute.
Conclusion
If we make the effort to not plagiarize, we
will be safe, we’ll learn more, and we will
be following the ethical path.
References
1. Bela Gipp, Citation-based Plagiarism
Detection: Detecting Disguised and
Cross-language
Plagiarism
using
ITeM | Issue 5, March – 2015
5
Citation Pattern Analysis, Springer,
ISBN 978-3-658-06393-1, 2014.
2. en.writecheck.com .
3. Oxford English Dictionary.
4. www.turnitin.com .
5. www.ithenticate.com .
6. www.plagiarism.org
Drupal Content Management System
Ahmed Abduladheem Abdulwahid (MSc)
Department of Computer Science, University of Central Missouri – USA
[email protected]
Introduction
Drupal is one of the most popular
Content Management Systems (CMS)
these days. It is an open source Content
Management System, and it is free.
Drupal system is used for several kinds of
purpose of contents, and it presents a
service for the people and the
companies to publish, organize, and
manage their work without higher
knowledge
of
the
programming
(Douglass, Little, & Smith, 2006).
Moreover, the concept of Drupal is a
deeper concept than simply software.
Drupal is a content management system
that has great features that allow for
each developer or programmer to use it
with less time, money, and effort (Byron,
& Berry, 2012).





The Reasons for Choosing Drupal
There are several reasons that make the
developer choose Drupal system:
Drupal can operate with ease or
complex websites with a variety of
contents .
It works with a variety of operating
system such as Windows، Linux، and
Mac (Quadri, 2011).
Drupal has a big community that
provides some important services
such as the security and testing
documentation for the system, as well
as support for different kinds of
languages (Patel, Rathod, & Parikh,
2011).
It has a huge number of themes and
modules that allow any developer to
feel very comfortable choosing an
appropriate theme or module.
According to the official website of
Drupal: https://drupal.org/, there are
more than 26,359 modules and 1,978
themes.
The ability of updating the content
with Drupal system is very flexible,
easy, and reliable .
The Drupal System Requirements
Drupal content management system
contains four parts: language, database,
webserver,
and
operating
system
(Quadri, 2011) as shown in the next
Figure.
ITeM | Issue 5, March – 2015
6
References
1. Douglass, R. T., Little, M., & Smith, J. W.
(2006). Building online communities
with Drupal ,phpBB, and WordPress.
Apress.
2. Byron, A., Berry, A., Haug, N., Eaton, J.,
Walker, J., & Robbins, J. (2012).Using
Drupal .‘O’Reilly Media, Inc.
3. Quadri, S. A. (2011). Developing,
Managing and Maintaining Web
Applications
with
Content
Management Systems: Drupal and
Joomla as case study.
4. Patel, S. K., Rathod, V. R., & Parikh, S.
(2011, December). Joomla, Drupal
and
WordPress-a
statistical
comparison of open source CMS. In
Trends in Information Sciences and
Computing
(TISC),
2011
3rd
International Conference on (pp.
182-187). IEEE.
E-learning, Online Learning and Distance Learning:
Are they the same?
Harith A. Hussein (MSc)
Department of Information Technology, Lebanese French University - Erbil
[email protected]
Introduction
E-learning, Web-based learning, online
learning, and distance learning are
widely used as interchangeable terms.
However,
these
terms
represent
concepts with subtle, yet consequential
differences. In this article, we reveal the
differences, review the meanings of
these terms, and suggest definitions. [1]
A clear understanding of these concepts
and their fundamental differences is
important for both the educational and
training
communities.
A thorough
familiarity with each concept and its
distinctive characteristics is a critical
factor
in
establishing
adequate
specifications, evaluating alternative
options, selecting best solutions, and
enabling and promoting effective
learning practices. [2]
Definitions of terms
E-learning is mostly associated with
activities involving computers and
interactive networks simultaneously. The
computer does not need to be the
central element of the activity or provide
learning
content.
However,
the
computer and the network must hold a
significant involvement in the learning
activity. To apply e-learning normally, we
use Learning Management System (LMS)
for distributing online or blended/hybrid
college courses over the Internet with
features for online collaboration.
Learning management system (LMS) is
a
software
application
for
the
administration, documentation, tracking,
reporting
and
delivery
of
electronic educational technology education
courses or training programs. The most
ITeM | Issue 5, March – 2015
7
popular used software's are moodel as
an open-source system and Blackbord as
commercial product. [3]
Online learning is associated with
content readily accessible on a
computer. The content may be on the
Web or the Internet, or simply installed on
a CD-ROM or the computer hard disk.[2]
Distance learning involves interaction at
a distance between instructor and
learners, and enables timely instructor
reaction to learners. Simply posting or
broadcasting learning materials to
learners is not distance learning.
Instructors must be involved in receiving
feedback from learners.[1]
Though e-learning, Web-based learning,
and distance learning are all related to
each other, they have significant
differences. Failing to recognize the fine
differences between these concepts
limits the pace of development of
expertise,
precludes
precise
communication with team members and
stakeholders, and often reflects a poor
understanding of available alternative
solutions.
References
1. Joi L. Moore a., Camille DicksonDeane b. and Krista, G. (2011), eLearning, online learning, and
distance learning environments.
2. Susanna, T. and Paulo. (2013) Elearning, Online Learning, Webbased
Learning,
or
Distance
Learning.
3. Ellis, Ryann K. (2009), Field Guide to
Learning Management Systems, ASTD
Learning Circuits
Ethical Hackers
Mohammad Salim Abdulrahman (MSc)
Department of Information Technology, Lebanese French University - Erbil
[email protected]
Introduction
Undoubtedly, since you know about
hackers, you also want to know about
ethical hackers. For making you aware of
ethical hacking concept, this article will
answer three important questions, "who is
an
ethical
hacker?",
"what
the
importance of ethical hacking is?", and
finally "how to become an ethical
hacker?".
Ethical Hacker
An ethical hacker is a professional person
in computers and networks who run
many attacks on a network system with
the knowledge of its owners, looking for
vulnerabilities that a criminal hacker
might use to check a network security
system; ethical hackers practice similar
techniques to that used by criminal
hackers, but report weaknesses instead
of misuse them. Ethical hacking
expressed by different terms such as
penetration attack, intrusion testing,
penetration testing and red teaming [1].
In a simple word, ethical hacker works as
good people who "hack a system to
discover vulnerabilities for the purpose of
protecting computers against illicit entry,
abuse, and misuse [2].
Importance of Ethical Hacking
Ethical hacking considered as useful
because of the following reasons [3] :
ITeM | Issue 5, March – 2015
8
Protection
from
any
potential
outsiders attacks such as social
engineering, automated attacks,
organizational attacks, unplanned
gaps in security, Trojan horses, viruses,
and worms and Denial of Service.
Testing of networks
Supports both of saving money and
reputation in the end
To preserve information assets.
Ethical Hacking method includes several
phases: preparations, foot printing,
enumeration
and
finger
printing,
identification of vulnerabilities, and
attack-exploit the gaps. These processes
will presented in issue 5 of IT e-Magazine.
Become an Ethical Hacker
Ethical hackers should stay a step in
advance of bad hackers; they must be
networks systems specialists and very
familiar with computer networking,
programming, and operating systems.
Comprehensive awareness regarding
most under attack systems such as
Windows, Unix, and Linux is considered as
necessity. “Patience, persistence, and
immense perseverance are important
qualities for ethical hackers because of
the length of time and level of
concentration required for most attacks
to
pay
off.
Networking,
web
programming, and database skills are all
useful in performing ethical hacking and
vulnerability testing” [4].
According to [5] , to start your steps and
become as an ethical hacker this relies
on your current location in the field of IT.
As a beginner, you must begin with the
fundamentals: get your A+ Certification
then become in a tech support position.
After getting experience and more
certifications (Network+ or CCNA), go up
to a network support or admin role
positions, then move to network engineer
after a few years. Afterward, spend part
of your time in getting additional security
qualifications (Security+, CISSP, or TICSA)
then look for a computer security
position. Whereas you are there, make
your focus on penetration testing to
acquire some
of
the necessary
experience with the tools of the trade. At
that time, try to get the Certified Ethical
Hacker (CEH) certificate, which given by
the International Council of Electronic
Commerce Consultants (EC-Council).
After
done
of
the
previous
accomplishments, you will probably be
able to find your job and working an
ethical hacker.
For a hacker, networking knowledge is
crucial; however, ensure that you get
experience in related areas also. Learn
and engage with Unix/Linux commands.
Take care of learning some programming
languages such as C, LISP, Perl, or Java.
In addition, try to learn databases such as
SQL.
References
[1] A. A. Farsole, A. G. Kashikar and a. A.
Zunzunwala,
"Ethical
Hacking,"
International Journal of Computer
Applications, vol. 1, no. 10, pp. 14-20,
2010.
[2] K. Beaver, Hacking for Dummies.,
Wiley, 2004.
[3] P.
Sheoran
and
S.
Singh,
"Applications of Ethical Hacking,"
International Journal of Enhanced
Research in Science Technology &
Engineering, vol. 3, no. 5, pp. 112114, 2014.
[4] K. Graves, Official Certified Ethical
Hacker Review Guide: Exam, John
Wiley & Sons, 2007.
[5]
ITeM | Issue 5, March – 2015
E. Geier, "How to Become an Ethical
Hacker," PCWorld, 2012.
9
Near Field Communication NFC and its Applications
Yahya Tareq Hussein (PhD)
Department of Information Technology, Lebanese French University - Erbil
[email protected]
Introduction
Near Field Communication (NFC) system
is designed from the collaboration of
many
technologies
like
wireless
communications, mobile devices, mobile
applications, and smart card technology
and cloud services. NFC is a short-range
wireless connectivity standard that uses
magnetic field induction to enable
smartphones and other devices to
establish radio communication with each
other when they're touched together, or
bringing them into proximity, typically a
distance of 4 cm or less. Based on RFID
technology, NFC provides a medium for
the identification protocols that validate
secure data transfer. Developed by
Philips and Sony.
How it works
NFC allows for a simple data exchange
between two devices by a way of
physical touch. NFC requires an initiator
and a target, the initiator produces a
radio frequency (RF) field within a range
of 4cm. The target picks up the RF field
and receives the data it contains.
NFC can operate in three modes



The reader/writer mode enables NFC
enabled devices to exchange data
with NFC tags.
The Peer-to-Peer mode enables two
NFC enabled mobile devices to
exchange data.
The card emulation mode, the NFC
enabled mobile device acts as a
smart card or contactless card.
There are three smart devices use NFC
technology
 NFC Tags
NFC tags are a small device which is
cheap and require no power. They can
store up to 4KB of data which can be
read by active NFC devices. They share
information interactively, similar to QR
code.
 NFC in Mobile Device
The smartphone are able to make
payment transfer data between tow
phones. Credit card, bus pass and train
ticket have gone digital. All will be
accessible through your phone. Google
Wallet released in 2011, it was NFC's
biggest push, allowing Android users to
pay using NFC technology. Apple Pay
released in October 2014, allowing
iPhone 6 and iPhone 6 Plus users to pay
using NFC at participating retailers.
 NFC Reader
This is capable of transferring data to
another component. The example for this
is contactless point of sale (POS) terminal.
ITeM | Issue 5, March – 2015
01
performed by the NFC enabled mobile
phones. NFC can be well adapted for all
kinds of situations ranging from bank
cards to transit passes, movie passes,
reward systems and even keys. NFC will
also impact a wide spectrum of
enterprises
like
transportation,
healthcare, telecom and etc.
References
Applications of NFC
Mobile and contactless payment: Make
payment using NFC credit card or use
smart phone. To do so, just touch your
card or phone on the reader at the
checkout.
Advertising: Get all the information you
need by tapping on advertising board.
File sharing: User can share contact
details or sending file using NFC.
Device pairing: User is able to pair with
the device just by touching them.
Conclusion
1. Durga Priya, E.Ramakotaiah, a Short
Range
Wireless
Communication
Using Android NFC API, (IOSR-JCE),
Issue 2, Ver. V (Mar-Apr. 2014).
2. Jamie Carter, Cameron Faulkner,
What is NFC and why is it in your
phone?
Available
at:
http://www.techradar.com/news/ph
one-and-communications/what-isnfc-and-why-is-it-in-your-phone948410 (Accessed: November 20,
2014).
3. Technology Reporter: What Is NFC,
and Why Does It Matter for the iPhone
6?.
Available
at:
https://www.yahoo.com/tech/whatis-nfc-and-why-does-it-matter-forthe-iphone-6-96456683964.html.
(Accessed: September 3, 2014).
Many services today like ticketing,
payment, tracking and etc. can be
OneNote in Education: An Effective Way to Enhance Approaches
of Teaching and Learning in Classroom
Ihsan Sayyid Salman
Department of Computer Science and Digital Technologies,
Northumbria University, Newcastle – UK
[email protected]
Introduction
Last year, Microsoft Company has been
developed a new powerful teaching
and learning tool which known as
OneNote Class Notebook Creator. It can
be defined as a digital platform that
enable educators to build electronic
classroom through creating notebooks to
share their training materials effectively
with the rest of their classmates.
Additionally, it helps teachers to monitor
interaction of each student through using
various activities in the class such as
sharing digital handouts, take notes
easily and fast synchronisation on pages.
This essay will highlight the ways and
benefits of using OneNote in education.
ITeM | Issue 5, March – 2015
00
The ways of using OneNote in education
OneNote Class Notebook Creator is a
flexible framework that includes three
sections as shown in a below figure. The
first one is student notebooks that allow
educators for creating private student
notebooks.
Conclusion
In conclusion, OneNote Class Notebook
Creator is becoming one of powerful
tools for helping teachers or students to
enhance their traditional approaches of
teaching or learning in terms of flexibility
to use on any devices, observe the
engagement
of
students
and
collaborate creatively with each other.
References
 Moxon, S. (2014) OneNote Class
Notebook
Creator:
Making
Collaboration between Students and
The second one is content library which
helps educators to upload or updated
their course materials and deliver them to
the learners and the last one is
collaboration space which enables both
educators and learners to organize,
share and collaborate in one place.
The
benefits
of
using
OneNote
Teachers




at:
/2014/10/16/onenote-class-notebookcreator-available-today.aspx
(Accessed: 07 March 2015).

Frank, B. H. (2014) New OneNote Tool
lets Teachers Manage Microsoft's
in
OneNote is a convenient way for
studying and learning on any device
anywhere at any time.
OneNote is an interactive way for
accessing to a digital repository of
knowledge and information such as
academic materials, libraries and
assignments or exams.
OneNote is a collaborative way for
encouraging students to study and
work as group.
OneNote helps students to edits their
notes together in real time wherever
they are in the same class or in
different place.
OneNote enable both students and
teachers
to
exchange
their
feedback automatically in one place
virtually anytime, anywhere.
Available
http://blogs.technet.com/b/nzedu/archive
Note
Education

Easy.
Taking
Classroom.
Software
in
Available
the
at:
http://www.geekwire.com/2014/newonenote-tool-lets-teachers-managemicrosofts-note-taking-softwareclassroom/
(Accessed:
07
March
2015).

ITeM | Issue 5, March – 2015
OneNote
(2014)
Introduction
OneNote Class Notebooks: A Flexible
Digital Framework for Teaching and
Learning.
Available
at:
http://blogs.office.com/2014/10/07/introd
ucing-onenote-class-notebooks-flexibledigital-framework-teaching-learning/
(Accessed: 07 March 2015).
02
Port Channel Technology: Advantages and Uses
Ali R. Hashim (MSc)
Department of Information Technology, Lebanese French University - Erbil
[email protected]
Introduction
A trunk is a physical path or link in a
communications system that is designed
to
handle
many
transmissions
simultaneously and that interconnects
major switching centers or nodes.
Depending on the system, a trunk may
carry transmissions in analog or digital
form. Transmission content may include
voice (as in the conventional telephone
system), text, computer programs,
images, and video or control signals. [1]
Trunk Technology
In Cisco networks, trunking is a special
function that can be assigned to a port,
making that port capable of carrying
traffic for any or all of the virtual LANs
(VLANs) accessible by a particular switch.
Such a port is called a trunk port, in
contrast to an access port, which carries
traffic only to and from the specific VLAN
assigned to it. A trunk port marks frames
with special identifying tags as they pass
between switches, so each frame can be
routed to its intended VLAN. An access
port does not provide such tags,
because the VLAN for it is pre-assigned,
and identifying markers are therefore
unnecessary.[2]
Trunking, also known as VLAN trunking,
enables interconnected ports to transmit
and receive frames in more than one
VLAN, over the same physical link.
Trunking and port channels function as
follows:


Port channels enable several
physical links to be combined into
one aggregated logical link.
Trunking enables a link to carry (trunk)
multiple VLAN traffic.[1]
Ether-Channel (Port- channel)
Ether-Channel or (port- channel) is a port
link aggregation technology used
primarily on Cisco switches. It allows
grouping of several physical Ethernet links
to create one logical Ethernet link for the
purpose of providing fault tolerance and
high speed links between switches,
routers and servers. An Ether-Channel
can be Ether-Channel between a switch
and a server. Created from between two
to eight active Fast, Gigabit or 10-Gigabit
Ethernet ports. Ether-Channel is primarily
used in the backbone network, but can
also be used to connect end user
machines. [1]
A port channel performs the following
functions:
 Increases the aggregate bandwidth
on a link by distributing traffic among
all functional links in the channel.
ITeM | Issue 5, March – 2015
03


Load balances across multiple links
and maintains optimum bandwidth
usage.
Provides high availability. If one link
fails, traffic previously carried on this
link is switched to the remaining links.
If a link goes down in a port channel,
the upper protocol is not aware of it.
To the upper protocol, the link is still
there, although the bandwidth is
diminished. The MAC address tables
are not affected by link failure.[2]
References
1. The free encyclopedia Wikipedia,
"Ether-Channel"
http://en.wikipedia.org/wiki/EtherCh
annel.
2. Cisco
Systems,
Inc.,
Americas
Headquarters, "Cisco Nexus 1000V
Troubleshooting Guide", Release
4.0(4) SV1 (3), October 30, 2010.
ITeM | Issue 5, March – 2015
Readers of IT e-magazine are invited to submit their articles that are consistent with the
objective of this magazine for publishing in the future issues, to ITeM’s editorial
committee at : [email protected] .
Deadlines:
- Submissions due: 8th of the Month
- Author notification: 10th of the Month
- Publish date: 15th of the Month
This issue powered by Turnitin to enforce the high level of
originality.
www.lfu-erbil.net/item
[email protected]
+964 751 020 5916