دورات هندسية

 

 

دورة سيسكو(ccna)

صفحة 8 من 11 الأولىالأولى ... 4 5 6 7 89 10 11 الأخيرةالأخيرة
النتائج 71 إلى 80 من 109
  1. [71]
    هيفا
    هيفا غير متواجد حالياً
    عضو فعال


    تاريخ التسجيل: May 2006
    المشاركات: 119
    Thumbs Up
    Received: 0
    Given: 0
    Keep in mind that the objective of any network design is the delicate balance of meeting business and application requirements while minimizing the cost to meet the objective.
      1. Network Devices and Capabilities
    The phenomenal growth of internetworks has predicated the move from bridges to routers and now switches. There are four basic devices used in building an internetwork. Understanding the functions of each is important in determining the network design. These four devices are: Hubs, bridges, routers and switches.
    Hubs are often called concentrators and made possible centralized LAN topologies. All the LAN devices are connected to the hub. The hub essentially regenerates the signal received form one port to another acting as a repeater. These devices operate at the physical layer (Layer 1) of the OSI Reference Model.
    Bridges connect autonomous LAN segments together as a single network and operate at the data link layer (Layer 2) of the OSI Reference Model. These devices use the Media Access Control (MAC) address of the end station for making a decision forwarding the packet. Bridges are protocol independent.
    Routers performing a routing function operate at the network layer (Layer 3) of the OSI Reference Model. These devices connect different networks and separate broadcast domains. Routers are protocol dependent.
    Switches were first advanced multiport bridges with the ability to separate collision domains. Layer 2 switches enhancing performance and functionality through virtual LANs have replaced hubs. The second incarnation of switches, enable them to perform Layer 3 routing decisions thereby performing the function of a router.
        1. Bridging and Routing
    Bridging for this discussion is concerned with transparent bridging. This is opposed to Source-Route Bridging (SRB) which is closer to routing than bridging. Bridging occurs at the MAC sublayer of IEEE 802.3/802.5 standard applied to the data link layer of the OSI Reference Model. Routing takes place at the Network layer of the OSI Reference Model. Bridging views the network as a single logical network with one hop to reach the destination. Routing enables multiple hops to and between multiple networks. This leads to four distinct differences between the routing and bridging:
    Data-link packet header does not contain the same information fields as network layer packets.
    Bridges do not use handshaking protocols to establish connections. Network layer devices utilize handshaking protocols.
    Bridges do not reorder packets from the same source while network layer protocols expect reordering due to fragmentation.
    Bridges use MAC addresses for end node identification. Network layer devices such as routers, use a network layer address associated with the wire connecting to which the device is attached.
    While there are these differences between bridging and routing there are times where bridging may be required or preferred over routing and vice-a-versa.
    Advantageous of bridging over routing:
    Transparent bridges are self-learning therefore require minimal, if any, configuration. Routing requires definitions for each interface for the assignment of a network address. These network addresses must be unique with in the network.
    Bridging has less overhead for handling packets than does routing.
    Bridging is protocol independent while routing is protocol dependent.
    Bridging will forward all LAN protocols. Routing only uses network layer information and therefore can only route packets.
    In contrast routing has the following advantageous over bridging:
    Routing allows the best path to be chosen between source and destination. Bridging is limited to a specific path.
    Routing is a result of keeping updated complete network topology information in routing tables on every routing node. Bridging maintains a table of devices found off its interfaces. This causes bridges to learn the network slower than routing thereby enabling routing to provide a higher level of service.
    Routing uses network layer addressing which enables a routing device to group the addresses into areas or domains creating a hierarchical address structure. This leads to an unlimited amount of supported end nodes. Bridging devices maintain data link layer MAC addresses, therefore they can not be grouped, and hence results in a limited number of supported end nodes.
    Routing devices will block broadcast storms from being propagated to all interfaces. Bridging spans the physical LAN segment to multiple segments and therefore forward a broadcast to all attached LAN segments.
    Routing devices will fragment large packets to the smallest packet size for the selected route and then reassemble the packet to the original size for delivery to the end device. Bridges drop packets that are too large to send on the LAN segment without notification to the sending device.

    0 Not allowed!





    YOU CAN'T FLY WITHOUT IMAGINATION


    drawGradient()


  2. [72]
    هيفا
    هيفا غير متواجد حالياً
    عضو فعال


    تاريخ التسجيل: May 2006
    المشاركات: 119
    Thumbs Up
    Received: 0
    Given: 0
    Routing devices will notify transmitting end stations to slow down (congestion feedback) the transmission of data when the network itself becomes congested. Bridging devices do not possess that capability.
    The general rule of thumb in deciding to route or bridge is to bridge only when needed. Route when ever possible.
        1. Switching
    The process of witching is the movement of packets from the receiving interface to a destination interface. Layer 2 switching uses the MAC address found with in the frame. Layer 3 switching uses the network address found within the frame.
    Layer 2 switching is essentially transparent bridging. A table is kept within the switching device for mapping the MAC address to the associated interface. The table is built by examining the source MAC address of each frame as it enters the interface. The switching function occurs when the destination MAC address is examined and compared against the switching table. If a match is found the frame is sent out the corresponding interface. A frame that contains a destination MAC address not found in the switching table is broadcast out all interfaces on the switching device. The returned frame will allow the switching device to learn the interface and therefore place the MAC address in the switching table. MAC addresses are predetermined by the manufacturers of the network interface cards (NICs). These cards have unique manufacturer codes assigned by the IEEE with a unique identifier assigned by the manufacturer. This method virtually insures unique MAC addresses. These manufacturer addresses are often referred to as burned-in-addresses (BIA) or Universally Administered Addresses (UAA). Some vendors however, allow the UAA to be overridden with a Locally Administered Address (LAA). Layer 2 switched networks are inherently considered a flat network.
    In contrast, Layer 3 switching is essentially the function of a router. Layer 3 switching devices build a table similar to the Layer 2 switching table. Except in the case of the Layer 3 switching table the entries are mapping network-layer addresses to interfaces. Since the network-layer addresses are based on, assigning a logical connection to the physical network a hierarchical topology is created with Layer 3 switching. As packets enter an interface on a Layer 3 switch, the source network-layer address is stored in a table that cross-references the network-layer address with the interface. Layer 3 switches carry with them the function of separating broadcast domains and network topology tables for determining optimal paths.
    Combining Layer 2 and Layer 3 switching, as shown in Figure 3.5, within a single device reduces the burden on a router to route the packet from one location to another. Switching therefore increases throughput due to the decisions being done in silicon, reduces CPU overhead on the router, and eliminates hops between the source and destination device.(newidb2-2)
        1. Backbone Considerations
    The network backbone is the core of the three layer hierarchical model. Many factors affect the performance of the backbone. These factors are:
    • Path optimization
    • Traffic prioritization
    • Load balancing
    • Alternate paths
    • Switched access
    • Encapsulation (Tunneling)
    Path optimization is generally a function of a router that occurs using the routing table created by the network layer protocols. Cisco routers support all of the widely implemented IP routing protocols. These include: Open Shortest Path First (OSPF), RIP, IGRP, EIGRP, Border Gateway Protocol (BGP), Exterior Gateway Protocol (EGP), and HELLO. Each of these routing protocols calculates the optimal path from the information provided within the routing tables. The calculation is based on metrics such as, bandwidth, delay, load, and hops. When changes occur in the network, the routing tables are updated throughout all the routers within the network. The process of all the routers updating their tables and recalculating the optimal paths is called convergence. With each new generation of IP routing protocols, the convergence time is reduced. Currently the IP routing calls with the smallest convergence times are Cisco proprietary routing protocols IGRP and EIGRP.
    Traffic prioritization is a form of policy-based routing that prioritizes the network traffic. This allows time sensitive and mission critical traffic to take precedence over throughput-sensitive type traffic. Cisco routers employ three types of traffic prioritization. These are priority queuing, custom queuing and weighted-fair queuing.
    Priority queuing is the simplest form of traffic prioritization. It is designed primary for low speed links. The traffic under priority queuing is classified based on criteria among which are protocol and subprotocol types. The criteria profile is then assigned to a one of four output queuing. These queues are high, medium, normal and low. In IP based networks, the IP type-of-service (TOS) feature and Cisco IOS software ability to prioritize IBM logical unit traffic, enable priority queuing for intraprotocol prioritization.
    Custom queuing answers a fairness problem that arises with priority queuing. With priority queuing, low priority queues may receive minimal service, if any service. Custom queuing takes the addresses this problem by reserving bandwidth for a particular type of traffic. Cisco custom queuing therefore allows the prioritization of multiprotocol traffic over a single link. For example, the greater the reserved bandwidth for a particular protocol, the more service received. This provides a minimal level of service to all over a shared media. The exception to this is under utilization of the reserved bandwidth. If traffic is not consuming the reserved bandwidth percentage then the remaining percentage of reserved bandwidth will be shared by the other protocols. Custom queuing may use up to 16 queues. The queues are serviced sequentially until the configured byte count has been sent or the queue is empty.

    0 Not allowed!





    YOU CAN'T FLY WITHOUT IMAGINATION


    drawGradient()


  3. [73]
    هيفا
    هيفا غير متواجد حالياً
    عضو فعال


    تاريخ التسجيل: May 2006
    المشاركات: 119
    Thumbs Up
    Received: 0
    Given: 0
    Weighted fair queuing uses an algorithm similar to time-division multiplexing. Each session over an interface is placed into a queue and allocated a slice of time for transmitting over the shared media. The process occurs in a round robin fashion. Allowing each session to default to the same weighting parameters ensure that each session will receive a fair share of the bandwidth. This use of weighting protects time-sensitive traffic by ensuring available bandwidth and therefore consistent response times during heavy traffic loads. The weighted fair algorithm identifies the data streams over an interface dynamically. Because the algorithm is based on separating the data streams into logical queues, it cannot discern the requirements of different conversations that may occur over the session. This is an important point when considering queuing methods for protecting IBM SNA traffic. Weighted fair queuing becomes a disadvantage for SNA traffic when the SNA traffic is encapsulated in DLSw+ or RSRB.
    The differences between the three queuing methods are dependent on the needs of the network. However, for administrative point of view weighted fair queuing is far easier due to it being a dynamically built queue versus priority and custom queuing which both required the definitions of access lists, pre-allocated bandwidth and predefined priorities.
    Load balancing for IP traffic occurs with two to four paths to the destination network. It is not necessary for these paths to be of equal cost. The load balancing of IP traffic may occur on a per-packet basis and or a per-destination basis. Bridged traffic over multiple serial links becomes balanced by employing a Cisco IOS software feature called circuit groups. This feature logically groups the multiple links as a single link.
    Redundancy is a major design criterion for mission critical processes. The use of alternate paths not only requires alternate links but requires terminating these links in different routers. Alternate paths are only valuable when single point of failure is avoided.
    Recovery of dedicated leased connections is mandatory for ensuring availability and service. This function is often termed switch access or switched connection however, it does not relate to the Layer 2 or Layer 3 switching function. Switched access calls for the instantaneous recovery of WAN connectivity due to an outage on the dedicated leased line. It is also used to supplement bandwidth requirements using a Cisco IOS software feature called bandwidth-on-demand (BOD) which uses Dial-on-demand routing (DDR). Using DDR along with the dedicated leased WAN connection, a remote location can send large mounts of traffic in a smaller time frame.
    Encapsulation techniques are used for transporting non-routable protocols. IBM's SDLC or SNA is a non-routable protocol. They are also used when the design calls for a single protocol backbone. These techniques are also referred to as tunneling.
        1. Distributed Services
    Within the router network, services may be distributed for maximizing bandwidth utilization, routing domains and policy networking. The Cisco IOS software supports these distributed services through:
    • Effective backbone bandwidth management
    • Area and service filtering
    • Policy-based distribution
    • Gateway services
    • Route redistribution
    • Media translation
    Preserving valuable backbone bandwidth is accomplished using the following features of Cisco IOS software:
    • Adjusting priority output queue lengths so overflows are minimized.
    • Adjust routing metrics such as bandwidth and delay to facilitate control over path selection.
    • Terminate local polling, acknowledgement and discovery frames at the router using proxy services to minimize high volume small-packet traffic over the WAN.
    Traffic filtering provides policy-based access control into the backbone form the distribution layer. The access control is based on area or service. Typically, we see the use of service access controls as a means for limiting an application service to a particular segment on the router. Traffic filtering is based on Cisco IOS software access control lists. These access control lists can affect inbound and outbound traffic of a specific interface or interfaces. On both inbound and outbound the traffic may be permitted or denied.
    Policy-based networking is a set of rules that determine the end-to-end distribution of traffic to the backbone. Policies may be defined to affect a specific department, protocol, or corporate policy for bandwidth management. The CiscoAssure initiative is a policy-based direction that enables the various network equipment to work together to ensure end-to-end policies.
    Gateway functions of the router enable different versions of the same networking protocol to internetwork. An example of this is connecting a DECnet Phase V network with a DECnet Phase IV network. These DECnet versions have implemented different addressing schemes. Cisco IOS within the router performs as an address translation gateway (ATG) for transporting the traffic between the two networks. Another example is AppleTalk translational routing between different versions of AppleTalk.
    Route Redistribution enables multiple IP routing protocols to interoperate through the redistribution of routing tables between the two IP routing protocols within the same router.
    There are times in corporate networks that communications between different media is a requirement. This is seen more and more with the expansion of networks and newer technologies. For the most part media translation occurs between Ethernet frames and token-ring frames. The translation is not a one for one since an Ethernet frame does not use many of the fields used in a token-ring frame. An additional translation that is observed is that form IBM SDLC to Logical Link Control 2 (LLC2) frames. This enables serial attached IBM SDLC connections to access LAN attached devices.
        1. Local Services
    At the local access layer of the three layer model features provided by the Cisco IOS within the router, provide added management and control over access to the distribution layer. These features are:
    • Value-added Network Addressing
    • Network Segmentation
    • Broadcast and Multicast Capabilities
    • Naming, Proxy, and Local Cache Capabilities
    • Media Access Security
    • Router Discovery
    The discovery of servers and other services may sometimes cause broadcasts within the local area network. A feature on Cisco IOS software directs these requests to specific network-layer addresses. This feature is called helper addressing. Using this feature limits the broadcast to only segments of the helper addresses defined for that service. This is best used when protocols such as Novell IPX or DHCP typically search the entire network for a server using broadcast messages. Helper addresses thereby preserve bandwidth on segments that do not connect the server requested.
    Network congestion is typically a result of a poorly designed network. Congestion is manageable by segmenting networks into smaller more manageable pieces. Using multiple IP subnets, DECnet areas and AppleTalk zones further segments the network so that traffic belonging to the segment remains on the segments. Virtual LANs further enhance this concept by spanning the segmentation between network equipment.

    0 Not allowed!





    YOU CAN'T FLY WITHOUT IMAGINATION


    drawGradient()


  4. [74]
    هيفا
    هيفا غير متواجد حالياً
    عضو فعال


    تاريخ التسجيل: May 2006
    المشاركات: 119
    Thumbs Up
    Received: 0
    Given: 0
    While routers control data link (MAC address) broadcasts they allow network layer (Layer 3) broadcasts. Layer 3 broadcasts are often used for locating servers, and services required by the host. The advent of video broadcasts has proliferated the use of multicast packets over a network. Cisco IOS does its best in reducing broadcast packets over IP networks through directed broadcasts to specific networks rather than the entire network. In addition, the Cisco IOS will employ a spanning-tree technique when flooded broadcasts are recognized minimizing excessive traffic but enabling the delivery of the broadcast to all networks. IP multicast traffic moves form a single source to multiple destinations. IP multicast is supported by a router running Cisco IOS with the Internet Group Management protocol (IGMP) implemented. Using IGMP the router can serve as a multicast distribution point delivering packets to only segments that are members of the multicast group and ensuring loop-free paths eliminating duplicate multicast packets.
    The Cisco IOS software contains many features for further reducing bandwidth utilization using naming, proxy and local cache functions. The function drastically reduces discovery, polling and searching characteristics of many of the popular protocols from the backbone. The following is a list of the features available with Cisco IOS that limits these types of traffic from the backbone:
    Name services - NetBIOS, DNS, and AppleTalk Name Binding Protocol
    Proxy services - NetBIOS, SNA XID/Test, polling, IP ARP, Novell ARP, AppleTalk NBP
    Local Caching - SRB RIF, IP ARP, DECnet, Novell IPX
      1. Selecting Routing Protocol
    Routing protocols are the transport of IP based networks. Examples of routing protocols are:
    Routing Information Protocol (RIP)
    Routing Information Protocol 2 (RIP2)
    Interior Gateway Routing Protocol (IGRP)
    Enhanced Interior Gateway Routing Protocol (EIGRP)
    Open Shortest Path First (OSPF)
    Intermediate System - Intermediate System (IS-IS)
    In selecting a routing protocol for the network, the characteristics of the application protocols and services must be taken into consideration. Network designs enabling a single routing protocol are best for network performance, maintenance and troubleshooting. There are six characteristics of a network to consider when selecting a routing protocol. These are:
    • Network Topology
    • Addressing and Route Summarization
    • Route Selection
    • Convergence
    • Network Scalability
    • Security
        1. Network Topology
    Routing protocols view the network topology in two ways. These are flat or hierarchical. The physical network topology is the connections of all the routers within the network. Flat routing topologies use network addressing to segregate the physical network into smaller interconnected flat networks. Examples of routing protocols that use a non-hierarchical flat logical topology are RIP, RIP2, IGRP and EIGRP.
    OSPF and IS-IS routing networks are hierarchical in design. As shown in Figure 3.6, hierarchical routing networks assign routers to a routing area or domain. The common area is considered the top of the hierarchy off which the other routing areas communicate through. Hierarchy routing topologies assign routers to areas. These areas are the routing network addresses used for delivering data from one subnet to another. The areas are a logical grouping of contiguous networks and hosts. Each router maintains a topology map of its own area but not of the whole network.
        1. Addressing and Route Summarization
    Some of the IP routing protocols have the ability to automatically summarize the routing information. Using summarization, the route table updates that flow between routers is greatly reduced thereby saving bandwidth, router memory and router CPU utilization. As shown in 3.7 a network of 1000 subnets must have a 1000 routes. Each of the routers within the network must therefore maintain a 1000 route table. If we assume that the network is using a Class B addressing scheme with a subnet mask of 255.255.255.0, summarization reduces the number of routes within each router to 253. There are three routes in each of the routers describing the path to the other subnets on the other routers and 250 routes describing the subnets connected to each router.
        1. Route Selection
    In networks where high availability and redundancy are a requirement, the route selection algorithm of the routing protocol becomes an important factor in maintaining acceptable availability. Each of the routing protocols uses some type of metric to determine the best path between the source and the destination of a packet. The available metrics are combined to produce a "weight" or "cost" on the efficiency of the route.
    Depending on the routing protocol in use multiple paths of equal cost may provide load balancing between the source and destination thereby spreading the load across the network. some protocols like EIGRP can use unequal cost paths to load balance. This ability to load balance further improves the management of network bandwidth.
    Load balancing over multiple paths is performed on a per-packet or per-destination basis. Per--packet distributes the load across the possible paths in proportion to the routing metrics of the paths. For equal cost paths this results in a round-robin distribution. There is however, the potential of a per-packet load balancing technique that the packets are received out of order. Per-destination load balancing distributes the packets based on the destination over the multiple paths to the destination. For instance, as shown in Figure 3.8, packets destined for subnets attached to router R2 from router R1 use a round-robin technique based on the destination. Packets destined for subnet 1 flow over link 20, while packets destined for subnet 2 flow over link 21 versus the per packet basis of alternating the packets for subnet 1 and subnet 2 over the two links.

    0 Not allowed!





    YOU CAN'T FLY WITHOUT IMAGINATION


    drawGradient()


  5. [75]
    هيفا
    هيفا غير متواجد حالياً
    عضو فعال


    تاريخ التسجيل: May 2006
    المشاركات: 119
    Thumbs Up
    Received: 0
    Given: 0
        1. The concept of convergence
    Convergence is the time it takes a router to recognize a network topology change, calculate the change within its own table and then distribute the table to adjacent routers. The adjacent routers then perform the same functions. The total time it takes for the routers to begin using the new calculated route is called the convergence time. The time for convergence is critical for time-sensitive traffic. If a router takes too long to detect, recalculate and then distribute the new route, the time-sensitive traffic may experience poor performance or the end nodes of the connection may then drop.
    In general, the concern with convergence is no the addition of new links or subnet s in the network. The concern is the failure of connectivity to the network. Routers recognize physical connection losses rapidly. The issue for long convergence time is the failure to detect poor connections within a reasonable amount of time. Poor connections such as line errors, high collision rates and others, require some customization on the router for detecting these types of problems faster.
        1. Network Scalability
    The ability of routing protocols to scale to a growing network is not so much a weakness of the protocol but the critical resources of the router hardware. Routers require memory, CPU and adequate bandwidth to properly service the network.
    Routing tables and network topology are stored in router memory. Using a route summarization technique as described earlier reduces the memory requirement. In addition, routing protocols that use areas or domains in a hierarchical topology requires the network design to use small areas rather than large areas to help in reducing the memory consumption.
    Calculation of the routes is a CPU intensive process. Through route summarization and the use of link-state routing protocols the CPU utilization is greatly reduced since the number of routes needing re-computing is reduced.
    Bandwidth on the connections to each router becomes a factor in not only scaling the network but in convergence time. Routing protocols learn of neighbor routers for the purpose of receiving and sending routing table updates. The type of routing protocol in use will determine its affect on the bandwidth.
    Distance-vector routing protocols such as RIP and IGRP send their routing tables at regular intervals. The distance-vector routing protocol waits for the time interval before sending its update even when a network change has occurred. In stable networks this type of updating mechanism wastes bandwidth, however, protects the bandwidth from an excessive routing update load when a change has occurred. However, due to the periodic update mechanism, distance vector protocols tend to have a slow convergence time.
    Link-state IP routing protocols such as OSPF and IS-IS address bandwidth wastefulness of distance-vector routing protocols and slow time to converge. However, due to the complexity of providing this enhancement link-state protocols are CPU intensive, require higher memory utilization and bandwidth during convergence. During network stability, link-state protocols use minimal network bandwidth. After start-up and initial convergence, updates are sent to neighbors only when the network topology changes. During a recognized topology change, the router will flood its neighbors with the updates. This may cause excessive load on the bandwidth, CPU and memory of each router. However, convergence time is lower than that of distance-vector protocol.
    Cisco's proprietary routing protocol EIGRP is an advanced version of distance-vector protocols with properties of link-state protocols. From distance-vector protocols, EIGRP has taken many of the metrics for route calculation. The advantageous of link-state protocols are used for sending routing updates only when changes occur. While EIGRP preserves CPU, memory and bandwidth during a stable network environment, it does have high CPU, memory and bandwidth requirements during convergence.
    The convergence ability of the routing protocols and their affect on CPU, memory and bandwidth has resulted in guidelines form Cisco on the number of neighbors that can be effectively supported. Table 3.x lists the suggested neighbors for each protocol.
    Routing Protocol /Neighbors per Router
    Distance vector (RIP, IGRP) / 50
    Link state (OSPF, IS-IS) / 30

    Advanced distance vector (EIGRP) /30


    0 Not allowed!





    YOU CAN'T FLY WITHOUT IMAGINATION


    drawGradient()


  6. [76]
    هيفا
    هيفا غير متواجد حالياً
    عضو فعال


    تاريخ التسجيل: May 2006
    المشاركات: 119
    Thumbs Up
    Received: 0
    Given: 0
        1. Security
    Routing protocols can be used to provide a minimal level of security. Some of the security functions available on routing protocols are:
    • Filtering route advertisements
    • Authentication
    Using filtering, routing protocols can prohibit the advertisements of routes to neighbors thereby protecting certain parts of the network. Some of the routing protocols authenticate their neighbor prior to engaging in routing table updates. Though this is protocol specific and generally a weak form of security, it does protect unwanted connectivity from other networks using the same routing protocol.

    0 Not allowed!





    YOU CAN'T FLY WITHOUT IMAGINATION


    drawGradient()


  7. [77]
    ccie
    ccie غير متواجد حالياً
    جديد


    تاريخ التسجيل: Jun 2006
    المشاركات: 1
    Thumbs Up
    Received: 0
    Given: 0
    great job Hayfa

    thanks

    CCIE

    0 Not allowed!



  8. [78]
    هيفا
    هيفا غير متواجد حالياً
    عضو فعال


    تاريخ التسجيل: May 2006
    المشاركات: 119
    Thumbs Up
    Received: 0
    Given: 0
    هذا رابط لموقع يحتوي على تجربتن opnet و غيره مما يمكن أن يفيدفي الحاسوب
    http://www.bus.iastate.edu/mis/opnet

    0 Not allowed!





    YOU CAN'T FLY WITHOUT IMAGINATION


    drawGradient()


  9. [79]
    م.العراقي
    م.العراقي غير متواجد حالياً
    عضو تحرير المجلة
    الصورة الرمزية م.العراقي


    تاريخ التسجيل: Jan 2004
    المشاركات: 1,766
    Thumbs Up
    Received: 13
    Given: 0
    ما شاء الله ما شاء الله ...

    شكراً اختي هيفا ... مع فائق التقدير والاحترام .

    سلام عليكم

    0 Not allowed!


    لا يكفي أن تعرف ... بل يجب أن تعرف كيف تطبق ما تعرف

  10. [80]
    ياسين2999
    ياسين2999 غير متواجد حالياً
    عضو فعال جداً


    تاريخ التسجيل: Apr 2006
    المشاركات: 344
    Thumbs Up
    Received: 0
    Given: 0
    السلام عليكم ,
    أخت هيفا ,لقد قمت بتثبيت البرنامج لكن وجدت صعوبة في إستخدامه ؟
    أرجو التوضيح و المساعدة,

    0 Not allowed!



  
صفحة 8 من 11 الأولىالأولى ... 4 5 6 7 89 10 11 الأخيرةالأخيرة
الكلمات الدلالية لهذا الموضوع

عرض سحابة الكلمة الدلالية

RSS RSS 2.0 XML MAP HTML