“Zakaria has shown great interest in his work: always dedicated and eager to learn and improve his skills, as well as working hard to optimize his engineering solution. He was a real pleasure to work with.”
Zakaria Aberchane
Paris et périphérie
1 k abonnés
+ de 500 relations
Voir les relations en commun avec Zakaria
Bon retour parmi nous
En cliquant sur Continuer pour vous inscrire ou vous identifier, vous acceptez les Conditions d’utilisation, la Politique de confidentialité et la Politique relative aux cookies de LinkedIn.
Nouveau sur LinkedIn ? Inscrivez-vous maintenant
ou
En cliquant sur Continuer pour vous inscrire ou vous identifier, vous acceptez les Conditions d’utilisation, la Politique de confidentialité et la Politique relative aux cookies de LinkedIn.
Nouveau sur LinkedIn ? Inscrivez-vous maintenant
Voir les relations en commun avec Zakaria
Bon retour parmi nous
En cliquant sur Continuer pour vous inscrire ou vous identifier, vous acceptez les Conditions d’utilisation, la Politique de confidentialité et la Politique relative aux cookies de LinkedIn.
Nouveau sur LinkedIn ? Inscrivez-vous maintenant
ou
En cliquant sur Continuer pour vous inscrire ou vous identifier, vous acceptez les Conditions d’utilisation, la Politique de confidentialité et la Politique relative aux cookies de LinkedIn.
Nouveau sur LinkedIn ? Inscrivez-vous maintenant
Expérience
Langues
-
French
Bilingue ou langue natale
-
English
Capacité professionnelle générale
-
Arabic
Bilingue ou langue natale
Recommandations reçues
2 personnes ont recommandé Zakaria
Inscrivez-vous pour y accéderVoir le profil complet de Zakaria
Autres profils similaires
-
Hulin Emmanuel
Rennes et périphérieSe connecter -
Lionel Boulant
Paris et périphérieSe connecter -
Cyril Dutilleul
Telecom Engineer - Orange
Paris et périphérieSe connecter -
Nidhal Taleb
IP System Engineer at Nokia
ParisSe connecter -
Guilhem Grousset
Paris et périphérieSe connecter -
Christophe Gerard
Saint-Brieuc et périphérieSe connecter -
Sarah Nataf
RennesSe connecter -
Bui Dinh Thai
Network Architect at Nokia Bell Labs
Paris et périphérieSe connecter -
Karine Sevilla
Senior Network and Cloud Infrastructure Architect at Orange
FranceSe connecter -
Grégory TOLEDE
NanterreSe connecter -
Dominique Fillon
Network Architect at DXC Technology
FranceSe connecter -
André Bolloré
Network Architect at Orange
LannionSe connecter -
Anis GHARBI
Rueil-MalmaisonSe connecter -
Patrick Fleming
Network Architect at Orange Labs
Saint-Brieuc et périphérieSe connecter -
Gérald Lécaillier
Network Architect at NXO France
LilleSe connecter -
Erwann Thoraval
Brest et périphérieSe connecter -
Frederic Spenatto
SeniorArchitect at Orange Cyberdefense
Vinon-sur-VerdonSe connecter -
Khadija Daoud Triki
Mobile Networks Architect at Orange Labs - France Telecom Group
Paris et périphérieSe connecter -
Laurent Jacquemin
Network Architect & VPN owner at Orange Business Services
MouginsSe connecter -
PAGES Vincent
Network Architect @Infogair and Flight Instructor @Ailes Lyonnaises
CivrieuxSe connecter
Découvrir plus de posts
-
Ivan Pepelnjak
RFC 8326 defines the GRACEFUL SHUTDOWN BGP community. Some vendors built well-thought-out BGP maintenance mode around it, while others let you sweat configuring route maps and community lists. Want to know what your vendor is doing? You can try it out in this lab exercise.
1825 commentaires -
Ratnesh K
🤖12-Minutes video about CI-CD Pipeline direct from my CCNA DevNet course🤖 Automation 🤖: Automates repetitive tasks, reducing manual errors and freeing up developer time. Efficiency ⚡: Speeds up the development process by integrating and testing code continuously. Quality 📈: Ensures high code quality through automated testing and feedback loops. Deployment 🚀: Simplifies and accelerates the deployment process, enabling faster releases. Consistency 🛠️: Provides a consistent environment for building, testing, and deploying applications. Scalability 📊: Easily scales with your development team and project needs. Collaboration 🤝: Enhances collaboration among team members by integrating changes seamlessly. Feedback 🔄: Offers quick feedback on code changes, allowing for rapid iteration. Security 🔒: Integrates security checks throughout the pipeline, ensuring safer deployments. Market Competitiveness 🌍: Helps you stay competitive by enabling faster and more reliable delivery of features and updates. CCIE Enterprise Infrastructure (v1.0) - Technical Classes Rating: ⭐️⭐️⭐️⭐️⭐️ Coupon: TRENDING Course Link- https://lnkd.in/gT7w5C5w CCIE Data Center (v3.0) - Technical Classes Rating: ⭐️⭐️⭐️⭐️⭐️ Coupon: TRENDING Course Link- https://lnkd.in/gs7Azc89 Job Oriented Internetworking Training - TRENDING Rating: ⭐️⭐️⭐️⭐️⭐️ Coupon: TRENDING Course Link- https://lnkd.in/g5vDNpQv SD-WAN Zero to Hero Training Rating: ⭐️⭐️⭐️⭐️⭐️ Coupon: TRENDING Course Link- https://lnkd.in/gg-hha7B Cisco DNAC & SDA Zero to Hero - Training Rating: ⭐️⭐️⭐️⭐️⭐️ Coupon: TRENDING Course Link- https://lnkd.in/gCaD_tqz CCNP Enterprise -300-415 ENSDWI : Implementing Cisco SD-WAN Rating: ⭐️⭐️⭐️⭐️⭐️ Coupon: TRENDING Course Link- https://lnkd.in/gadKUYYw CCNP Data Center -350-601 DCCOR Implementing and Operating Rating: ⭐️⭐️⭐️⭐️⭐️ Coupon: TRENDING Course Link- https://lnkd.in/gTpcm6yh 200-901 DEVASC : Cisco DevNet Associate Rating: ⭐️⭐️⭐️⭐️⭐️ Coupon: TRENDING Course Link- https://lnkd.in/gSTwjDhE 350-901 DEVCOR - Developing Applications using Cisco Core Rating: ⭐️⭐️⭐️⭐️⭐️ Coupon: TRENDING Course Link- https://lnkd.in/gVveyhZ8 CCNP ENAUTO 300-435 Automating Cisco Enterprise Solution Rating: ⭐️⭐️⭐️⭐️⭐️ Coupon: TRENDING Course Link- https://lnkd.in/gTwJim4T BR, Ratnesh K CCIE x3
13 -
Toni Pasanen
AI for Network Engineers: Chapter 1 - Deep Learning Basics This chapter starts with a brief introduction to Deep Neural Networks (DNN) and explains how an artificial neuron operates. It describes how the neuron calculates the weighted sum (pre-activation value) of input values and then generates the output (post-activation value) by applying an activation function. Key activation functions such as ReLU, tanh, and sigmoid are introduced. Finally, the chapter briefly touches on network utilization. https://lnkd.in/dchbACFZ
30622 commentaires -
Edgar C Francis
What is MPLS L3 VPN ? How to configure? In MPLS Layer 3 the service provider will participate in routing with the customers. The customers will run static, OSPF, EIGRP, BGP, or any other routing protocol with the service provider; these routes can be shared with other sites of the customers. In VPN routing information from one customer is completely separated from other customers and tunneled over the service provider MPLS network. What is VRF (virtual routing forwarding)? Virtual routing forwarding VRF provides a way for us to configure multiple routing instances on our router. We use multiple routing tables. Each customer of the service provider will use a different VRF. VRF keeps customer traffic and routing separate utilizes the same hardware. Without VRF we need to use ACL filtering to keep traffic segregated. https://lnkd.in/dpzJ9F5
-
Tanue Quddus
Importance of the load balancer in the data center. A load balancer acts as the “traffic cop” sitting in front of your servers and routing client requests across all servers capable of fulfilling those requests in a manner that maximizes speed and capacity utilization and ensures that no one server is overworked, which could degrade performance.
-
Arash Deljoo
✔ VXLAN BGP EVPN Udemy Course 😊 I explained about : ( Update in future ) Section 1 VXLAN Foundations 1 East–West Communication Flow 2 Network virtualization overlays 3 Spine-and-Leaf Architecture 4 Introduction to VXLAN Part-1 5 VXLAN Functions 6 Introduction to VXLAN Part-2 7 VXLAN Flood and Learn (F&L) 8 Introduction to BGP EVPN with VXLAN 9 MP-BGP Features and Common Practices Section 2 VXLAN Underlay 1 VXLAN Underlay Consideration 2 VXLAN MTU Consideration 3 VXLAN Underlay IP Addressing 4 VXLAN Lab Time - Lab1 Underlay Configuration Step 1-2 5 VXLAN Underlay IP Unicast Routing 6 VXLAN Lab Time - Lab1 Underlay Configuration Step 3 7 VXLAN Multidestination Traffic Unicast Mode 8 VXLAN Multidestination Traffic Multicast Mode 9 VXLAN PIM Any Source Multicast (ASM) Considerations 10 VXLAN Lab Time - Lab1 Underlay Configuration Step 4 11 VXLAN BiDirectional PIM (PIM BiDir) Considerations 12 VXLAN Lab Time - Lab1 Underlay Configuration Step 5 Section 3 VXLAN Multitenancy 1 Bridge Domain 2 VLANs in VXLAN 3 VXLAN Lab Time - Lab1 Overlay Configuration Step 1 4 Layer 2 Multitenancy , Mode of Operation 5 VRF in VXLAN BGP EVPN 6 VXLAN Fabric Anycast Gateways 7 VXLAN Lab Time - Lab1 Overlay Configuration Step 2 8 Layer 3 Multitenancy , Mode of Operation 9 VXLAN Integrated Route and Bridge (IRB) 10 VXLAN Lab Time - Lab1 Overlay Configuration Step 3-4 11 BGP EVPN Route Type 2 NLRI 12 VXLAN BGP EVPN Review Section 4 VXLAN BGP EVPN Enhancements 1 ARP Suppression Section 5 VXLAN Labs 1 Lab1 - Underlay Configuration Step 1 - IP addressing 2 Lab1 - Underlay Configuration Step 2 - MTU 3 Lab1 - Underlay Configuration Step 3 - Routing Protocol 4 Lab1 - Underlay Configuration Step 4 - Multi Destination Traffic 5 Lab1 - Underlay Configuration Step 5 - BGP IPv4 Address Family 6 Lab1 - Overlay Configuration Step 1 - L2 Multitenancy 7 Lab1 - Overlay Configuration Step 2 - L3 Multitenancy 8 Lab1 - Overlay Configuration Step 3 - VXLAN Tunnel 9 Lab1 - Overlay Configuration Step 4 - BGP EVPN Address Family 10 Lab2 - Underlay Configuration 11 Lab2 - Overlay Configuration https://lnkd.in/dXChDG82
777 commentaires -
Nahar Major
Understanding Zero Trust Architecture "𝑵𝒆𝒗𝒆𝒓 𝑻𝒓𝒖𝒔𝒕, 𝑨𝒍𝒘𝒂𝒚𝒔 𝑽𝒆𝒓𝒊𝒇𝒚". Thales reported that 39% of businesses were affected by data breaches last year. What’s more alarming is that the threat is increasing. And the rate is rising…Threat loading‼️ What will happen in 2024? How will you protect your network from internal and external threats? Validating outsiders is not enough, It's also important to verify insiders. No one knows who will slide in and get access to steal your sensitive data. Have you ever heard about Zero Trust Architecture (ZTA)? ZTA says, 𝘵𝘳𝘶𝘴𝘵 𝘪𝘴 𝘱𝘳𝘪𝘤𝘦𝘺, 𝘷𝘦𝘳𝘪𝘧𝘺 𝘧𝘪𝘳𝘴𝘵. It follows a multiple-verification approach and requires authentication and verification to access the private networks, like a cautious guard at the gate. But what if there is any access threat in the network? Zero trust architecture also verifies the insiders to avoid such situations. Here's how it works: 𝐌𝐮𝐥𝐭𝐢-𝐟𝐚𝐜𝐭𝐨𝐫 𝐀𝐮𝐭𝐡𝐞𝐧𝐭𝐢𝐜𝐚𝐭𝐢𝐨𝐧 (𝐌𝐅𝐀): ⤷Extra layers of verification beyond just a password are used to ensure a user's identity. 𝐋𝐞𝐚𝐬𝐭 𝐏𝐫𝐢𝐯𝐢𝐥𝐞𝐠𝐞 𝐀𝐜𝐜𝐞𝐬𝐬: ⤷Limited access is granted to users on a need-to-know basis. 𝐌𝐢𝐜𝐫𝐨-𝐬𝐞𝐠𝐦𝐞𝐧𝐭𝐚𝐭𝐢𝐨𝐧: ⤷Divide the network into smaller zones, limiting damage from a breach and establishing more control points. What benefits do organizations gain from implementing ZTA? • 𝐅𝐨𝐫𝐭 𝐊𝐧𝐨𝐱 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲: →Zero Trust protects data like a vault. →Preventing breaches & saving millions. • 24-𝐡𝐨𝐮𝐫 𝐚𝐬𝐬𝐞𝐭 𝐯𝐢𝐬𝐢𝐛𝐢𝐥𝐢𝐭𝐲: →Track every access attempt -who, what, when, and why. →Secure your network 24/7. • 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐟𝐨𝐫 𝐫𝐞𝐦𝐨𝐭𝐞 𝐝𝐞𝐯𝐢𝐜𝐞𝐬: → Secure access for remote workers & devices. →Only approved apps get in, keeping your data safe. What do you like the most about it?
8 -
François Duthilleul
I always preferred sessions providing customer's feedback than supplier's own explanations on the numerous advantages of its solution (and this also includes solutions from my current employer 😇 ). This is a way to hear what is great about the product but also to get inspirations for future improvements. This is even better in user groups where customers are exchanging between themselves. This is really a nice way to fuel the product evolution if you can listen, consolidate and execute on that feedback. So if you are interested to know how a customer is using OpenShift Virtualization to support virtual machines on a container platform (as you were thinking to do the same) then you may consider passing by Paris on Oct 8th for the Red Hat Summit Connect. And the customer is dear to my heart since it is a Telco customer and the incumbent operator in France: Orange #orange #redhatsummitconnect #redhat #openshift #virtualisation #feedback #retex
17 -
Arash Deljoo
😊 In the MPLS TE Dynamic Tunnel video, I extensively covered the functionality and configuration of MPLS-TE Dynamic tunnels. 📣 MPLS TE (Traffic Engineering) Dynamic Tunnel is a feature in MPLS networks that allows for the dynamic establishment of Label Switched Paths (LSPs) based on traffic engineering requirements. Unlike static LSPs, which are manually configured, dynamic tunnels are set up dynamically by the network based on real-time traffic conditions and network policies. These tunnels can adapt to changes in network topology or traffic patterns, providing more flexible and efficient use of network resources. Dynamic tunnels are commonly used in scenarios where traffic patterns are unpredictable or where rapid rerouting is required to optimize network performance. Additionally, I delved into the concept of max-reservable-bandwidth, particularly in newer IOS versions. 👉 Scenario and Text file: https://lnkd.in/dFS5dWjQ 🤗 Happy learning!
47 -
Abdullah Alasad
Segment Routing comapred with traditional MPLS network : SR uses a source routing approach, where the source node (ingress router) determines the entire path a packet will take through the network. Instead of relying on a signaling protocol like LDP, SR uses IGP protocols (OSPF or IS-IS) to distribute Segment Identifiers (SIDs), which represent paths, nodes, or links. SR eliminates the need for hop-by-hop label signaling, as the path is encoded at the ingress node using a segment list. Segment Routing has built-in support for Traffic Engineering (TE). The source node can specify a precise path by encoding a segment list (a sequence of SIDs) into the packet. This allows SR to define custom paths for traffic, even without using any additional signaling protocols. The source routing nature of SR means that only the ingress router maintains full path information, while the intermediate routers only need to understand how to forward packets based on the SIDs in the segment list.
503 commentaires -
Mohamed Saeed
Important points in Transmission DCN planning 1- IP address assignment 2- Static route 3- Default Gateway setting 4- Vlan 5- Subnetting 6- Eline and ELAN service creation 7- MPLS 8- O&M local and Global 9- Sync design I will explain the above mentioned topics if you are interested to understand the concept and how to design DCN network for Transmission nodes
34365 commentaires -
Zghibarta Petrea
🚀 Excited to Share My Latest Project: A User-Friendly TFTP Server and Client! 🌐 I’ve developed a comprehensive TFTP (Trivial File Transfer Protocol) application in python that simplifies file transfers across networks. Here’s a quick overview of its key features: TFTP Server Start/Stop Server: Effortlessly control the server with simple start and stop functionalities. Select IP Address: Choose the specific IP address for the server to listen on. Change Working Directory: Easily modify the current working directory for file transfers through a straightforward interface. View Directory Contents: Quickly access and view files in the current working directory. Logging: Track server activity with real-time logging displayed in the application and stored in a log file. TFTP Client Upload Files: Seamlessly upload files to a TFTP server using an intuitive interface. Download Files: Effortlessly download files from a TFTP server with progress monitoring. File Browsing: Utilize an integrated file dialog for easy file selection for upload to server. Status Updates: Receive real-time status updates during upload and download processes. 💡 invite fellow developers and network enthusiasts to check out the project and share your thoughts! https://lnkd.in/d_AmYkpt #TFTP #Networking #FileTransfer #Python #Programming #SoftwareDevelopment
1 -
Loubna SMAIL
Reminder to All IT Professionals and Organizations in Morocco As previously mentioned, the hacking group known as "Night Hunters" has announced their intention to target Moroccan digital infrastructure on August 10th. 🔒 Security Recommendations Recap: Update Systems Regularly: Make sure all software, including operating systems and applications, are current with the latest security patches. Implement Multi-Factor Authentication (MFA): Adding an extra layer of security can greatly reduce the risk of unauthorized access. Backup Critical Data: Regularly backup your data and store it securely to prevent data loss in the event of an attack. Monitor Networks Continuously: Utilize advanced monitoring tools to detect and respond to unusual activities promptly. Educate Employees: Conduct regular training sessions to raise awareness of phishing attacks and other social engineering tactics. Deploy Advanced Security Solutions: Invest in comprehensive security solutions such as firewalls, intrusion detection systems, and endpoint protection platforms. Let's remain vigilant and proactive in safeguarding our digital landscape. #CyberSecurity #NightHunters #Morocco #InformationSecurity CMR - Caisse Marocaine des Retraites #COM_CMR
19 -
Toni Pasanen
AI for Network Engineers book is slowly progressing. Chapter 2: Backpropagation Algorithm is now complete (15 pages). In this chapter, I introduce the Backpropagation algorithm. As a visual person, I prefer to present functionalities through images rather than writing long text (chapter is no exception). Despite its 15 pages, you can read through it quickly. However, fully grasping the content may require a couple of read-throughs. Here are some of the topics of the chapter: Forward Pass: Computing the weighted sum for each neuron. Applying the activation function to get the neuron’s output. Calculating the error function to measure the difference between the predicted and actual values. Backward Pass Computation: Calculating the Gradient (Output Error) of the error function. Computing the Gradient (Error Term) for each neuron’s activation function. Determining the Weight Adjustment Value based on the gradients. Updating weight parameters. Gradient Synchronization: Describing the GPU-to-GPU Synchronization process, including how gradients are shared and averaged across multiple GPUs to ensure accurate learning. https://lnkd.in/grfi4XkS
39916 commentaires