• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2 Educators providing Architecture courses in Stirling

Courses matching "Architecture"

Show all 171

Diploma in Architecture and Interior Design Diploma 1-2-1

By Real Animation Works

Face to face One to one.

Diploma in Architecture and Interior Design Diploma 1-2-1
Delivered in Internationally or OnlineFlexible Dates
£4,000

LTE Architecture and Protocols

5.0(3)

By Systems & Network Training

LTE Architecture and Protocols course description This course provides a comprehensive tour of the LTE architecture along with services provided and the protocols used. What will you learn Describe the overall architecture of LTE. Explain the information flows through LTE. Describe the LTE security. Describe LTE mobility management. Recognise the next steps for LTE. LTE Architecture and Protocols course details Who will benefit: Anyone working with LTE. Prerequisites: Mobile communications demystified Duration 3 days LTE Architecture and Protocols course contents Introduction History, LTE key features. The 4G ITU process. The LTE 3GPP specifications. Specifications. System Architecture LTE hardware architecture. UE architecture and capabilities. E-UTRAN and eNB. EPC, MME functions, SGW, PGW and PCRF. System interfaces and protocol stacks. Example information flows. Dedicated and default bearers. EMM, ECM, RRC state diagrams. Radio transmission and reception OFDMA, SC-FDMA, MIMO antennas. Air interface protocol stack. Logical, transport and physical channels. Frame and slot structure, the resource grid. Resource element mapping of the physical channels and signals. Cell acquisition, data transmission and random access. MAC, RLC, PDCP protocols. LTE spectrum allocation. Power-on procedures Network and cell selection. RRC connection establishment. Attach procedure, including IP address allocation and default bearer activation. LTE detach procedure. Security in LTE networks LTE security features, identity confidentiality, ciphering and integrity protection. Architecture of network access security in LTE. Secure key hierarchy. Authentication and key agreement procedure. Security mode command procedure. Network domain security architecture. Security associations using IKE and IPSec. Mobility management RRC_IDLE, RRC_CONNECTED. Cell reselection, tracking area updates. Measurement reporting. X2 and S1 based handovers. Interoperation with UMTS, GSM and non-3GPP technologies such as cdma2000. QoS, policy control and charging QoS in LTE, EPS bearers, service data flows and packet flows. The architecture and signalling procedures for policy and charging control. Data transport using GPRS, differentiated services and MPLS. Offline and online charging in LTE. Delivery of voice and text messages over LTE Difficulties and solutions for Voice over LTE. Architecture and call setup procedures for circuit switched fallback. Architecture, protocols and call setup procedures in IP multimedia subsystem. Enhancements in release 9 LTE location services. Multimedia broadcast / multicast service and MBSFN. Cell selection, commercial mobile alert service. LTE Advanced and release 10 Impact of carrier aggregation on LTE air interface. Enhanced MIMO processing on uplink and downlink. Relaying. Release 11 and beyond. OAM and self organising networks Operation, administration, maintenance and provisioning for LTE. Self-configuration of base station parameters. Fractional frequency re-use, inter-cell interference co-ordination. Self-optimisation of base station procedures. Self-healing to detect and recover from faults.

LTE Architecture and Protocols
Delivered in Internationally or OnlineFlexible Dates
£2,367

SAFe for Architects: In-House Training

By IIL Europe Ltd

SAFe® for Architects: In-House Training Enable continuous value flow by aligning technical strategy with business goals, communicating that strategy to development teams, and applying Agile architecture practices. Attendees can improve collaboration and alignment in a SAFe® Lean-Agile enterprise when they become a SAFe® 5 Architect. The SAFe® for Architects course prepares System, Solution, and Enterprise Architects to engage across the organization as effective leaders and change agents who collaboratively deliver architectural solutions. During this course, attendees will explore the roles, responsibilities, and mindset of Agile Architects, and appreciate how to align architecture with business value and drive continuous flow to large systems of systems while supporting SAFe® program execution. What you will Learn To perform the role of a SAFe® Architect, you should be able to: Architect using SAFe® principles Align architecture with business value Develop and communicate architecture vision and intent Plan architectural runway to enable delivery success Architect for continuous delivery and Release on Demand Lead and coach architects and team members during Program Increment (PI) Planning and execution Provide leadership during a Lean-Agile transformation Exemplifying Lean-Agile architecture Architecting for DevOps and Release on Demand Aligning architecture with business value Developing Solution Vision, Solution Intent, and Roadmaps Preparing architecture for Program Increment (PI) Planning Coordinating architecture throughout PI Planning Supporting Continuous Delivery during PI execution Supporting new Strategic Themes and Value Streams Leading as an architect during a Lean-Agile transformation

SAFe for Architects: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£2,995

LTE backhaul

5.0(3)

By Systems & Network Training

LTE Backhaul training course description This course provides a concise insight into the LTE backhaul. Key parts of the course are detailed looks at the transport of messages and the S1 and X2 protocols. What will you learn Describe the overall architecture of LTE. Explain how data and signalling messages are transported in LTE. Describe the S1 protocol. Describe the X2 protocol. LTE Backhaul training course details Who will benefit: Anyone working with LTE. Prerequisites: Mobile communications demystified Duration 2 days LTE Backhaul training course contents Introduction In the first section of the course, we review LTE and its hardware and software architecture. Requirements and key features of LTE. LTE Architecture and capabilities of the UE. Architecture of the E-UTRAN, functions of the eNB. EPC architecture, and functions of the MME, SGW, PGW and PCRF. System interfaces and protocol stacks. Example information flows. Dedicated and default bearers. EMM, ECM and RRC state diagrams. Architecture of the radio access network In this section, we look in more detail at the architecture of the evolved UMTS terrestrial radio access network (E-UTRAN). Logical and physical architecture of the E-UTRAN. Numbering, addressing and identification. E-UTRAN functions. E-UTRAN protocol stacks. Timing and frequency synchronisation in LTE. Transport of data and signalling in LTE Here, we look in more detail at the techniques and protocols that are used to transport data and signalling messages across the evolved UMTS terrestrial radio access network and the evolved packet core. Quality of service in LTE. The GPRS tunnelling protocol. Differentiated services Multi-protocol label switching (MPLS). The stream control transmission protocol (SCTP). The S1 application protocol This section gives a detailed account of the signalling procedures in the S1 application protocol, which the MME uses to control the operation of the eNB. The material looks at the procedures, messages and information elements, and relates them to the system-level procedures in which they are used. S1 setup procedure. UE context management procedures. Non access stratum information transport. Procedures for managing the evolved radio access bearer (E-RAB). Paging procedures. Mobility management procedures for S1-based handovers. Procedures in support of self-optimising networks. The X2 application protocol This section gives a detailed account of the signalling procedures in the X2 application protocol, which is used for peer-to-peer communication between eNBs. The material looks at the procedures, messages and information elements, and relates them to the system-level procedures in which they are used. X2 setup procedure. Mobility management procedures for X2-based handovers Procedures in support of self-optimising networks. High level system operation In the final section, we bring our discussions of the S1 and X2 application protocols together by reviewing the system-level operation of LTE. Attach procedure. Transitions between the states of RRC Idle and RRC Connected. Tracking area updates in RRC Idle. Handover procedures in RRC Connected.

LTE backhaul
Delivered in Internationally or OnlineFlexible Dates
£2,477

3G demystified

5.0(3)

By Systems & Network Training

3G training course description This course is designed to give the delegate an understanding of the technologies used within a 3G UMTS mobile network. During the course we will investigate the UMTS air interface and the use of Wideband-Code Division Multiple Access (WCDMA) to facilitate high speed data access, together with HSPA to offer mobile broadband services. We will describe the use of soft handover rather than hard handover procedures and soft capacity sharing. The course includes a brief exploration of the UMTS protocol stack and the use of PDP Context and QoS support features. What will you learn Explain the 3G UMTS architecture. Describe the role of a Drifting & Serving RNC. Explain the use of ARQ & HARQ for mobile broadband. Describe how IMS integrates into the architecture. Describe the use of Media Gateway Controllers. Identify the temporary identities used within 3G UMTS. 3G training course details Who will benefit: Anyone working within the telecommunications area, especially within the mobile environment. Prerequisites: Mobile communications demystified Telecommunications Introduction Duration 2 days 3G training course contents D3GPP specifications 3GPP standards body, Evolution path, Frequency and bandwidth, Conceptual model, UMTS general architecture, UTRAN architecture & radio access bearer. CDMA principles CDMA principle, Code characteristics, Code requirements. CDMA requirements Synchronization, Power control, Soft handover, Rake receiver, Antenna consideration, Multi-user detection. Radio interface protocol architecture Access stratum & non-access stratum, Overall protocol structure, Logical and transport channels, Physical channels, Protocol termination. Layer 2 Protocols Medium Access Control (MAC) Protocol, Radio Link Control (RLC) Protocol, Packet Data Convergence Protocol (PDCP) protocol, Radio Interface for Broadcast/Multicast Services. Radio Resource Control (RRC) Protocol RRC Architecture, RRC Protocol State, Broadcast of information, RRC connection management, Radio bearer management, RRC connection mobility functions, Power control, Ciphering and Integrity. Mobile procedures Mobility management states and transitions, UMTS identities, Procedures in Idle mode (location updates, cell selection/ re-selection), Circuit-switched call set-up, Packet-switched context activation and context preservation, Data transfer initialization, Soft-handover procedure. Introduction to HSPA The need for high speed data, Fast HARQ, Improved scheduling, Additional channels, Soft combining, HS-DSCH codes, Uplink HSPA vs downlink HSPA, Full HSPA, Use of MIMO, Enhanced CELL_FACH.

3G demystified
Delivered in Internationally or OnlineFlexible Dates
£2,477

Network management technologies

5.0(3)

By Systems & Network Training

Network management technologies course description A comprehensive tour of the available network management technologies available for todays networks. The course starts with basic tools such as syslog along with Python network automation. SNMP is then covered with the *flow technologies and streaming telemetry. Configuration management with ansible, Python, NETCONF and RESTCONF is then studied. The final part of the course looks at SDN. Hands on sessions are used throughout to reinforce the theory rather than teach specific manufacturer equipment. Note that sections are available as individual courses. What will you learn Evaluate network management technologies. Evaluate network management technologies. Recognise the weaknesses of SNMP versus NETCONF and streaming telemetry. Explain the role of NETCONF and RESTCONF. Compare & contrast *flow and streaming telemetry. Explain the role of SDN in network management. Automate network configuration with ansible and Python. Network management technologies course details Who will benefit: Those wishing to manage networks. (Previous Python experience is NOT needed) Prerequisites: Intro to data comms Duration 5 days Network management technologies course content Basic network management Network management What is network management? Benefits, issues. FCAPS model. Fault management, Configuration management, accounting, performance, security. What to manage, what not to manage. Managing network devices, managing servers. Monitoring networks Traditional network tools Ping..., SSH, syslog, TFTP for configurations. nmap. Wireshark. CLI. Web based management. Splunk. Nessus, snort, Kali. Hands on syslog, network inventories. Network automation using the CLI Programming and automating networks, netOps. Python, Git. Python network modules, SSH, paramiko, netmiko. EVE-NG. Hands onPython network modules. Structured versus unstructured data Problems with automation and unstructured data. XML, JSON, YAML. The role of YANG. Hands on Parsing data. SNMP SNMP architecture, SNMP MIBs, SMI, the SNMP protocol, polling security. Configuring SNMP. SNMPv1, v2, v3, SNMP security. Which version should you use? MIBs and MIB structure. mib-2, extra parts of mib-2, Private enterprise MIBs. Summary: What SNMP is good/bad at. Hands on Configuring agents and a NMS. MIB browsing. Server management Microsoft, Linux, application polling. WMI vs SNMP. Hands on: Application polling. Performance management *flow Polling, push vs pull, netflow, sflow, IPFIX, *flow. Flows. Where to monitor traffic. Comparing *flow with SNMP. Architecture: Generators and collectors. When flows are exported. NetFlow reporting products. SolarWinds. Hands on Netflow configuration. Collectors. Streaming telemetry Model driven telemetry, periodic/on change. Structured data. Telemetry protocol stack. gRPC and gNMI. Protobuf. gNMI operations. Telemetry architecture. Telegraf, databases, Grafana. Hands on Telemetry example. Configuration management Configuration management tools Chef, puppet, ansible, saltstack. Ansible architecture, controlling machines, nodes, agentless, SSH, modules. Inventories, playbooks, modules, network modules, jinja2 templates. Hands on Network configuration with ansible. NETCONF What is NETCONF? Protocol stack, Data stores, traffic flows, validating configurations, rollback. YANG data models and how YANG is used by NETCONF. XML. Explorers and other tools. Hands on anx, Python and NETCONF. RESTCONF The REST API, HTTP, What is RESTCONF? Tools including Postman. Comparison with NETCONF. Hands on Configuration with RESTCONF. Python network automation: configuration SSH issues. Using structured data. Jinja2. ncclient, requests, NAPALM, Nornir. Automated testing. Hands on Python network device configuration with nornir. Software Defined Networks and orchestration Classic SDN What is SDN? benefits. SDN architecture. SDN applications, SDN switches, SDN controllers, Network Operating Systems. Control plane, data plane. Northbound interfaces. SDN components. Southbound interfaces. OpenFlow. ONF, OpenFlow ports, Flow tables. Network virtualization Virtual networks, virtual switches, NfV. Service chaining. NfV and SDN. SDN implementations Classic SDN, Hybrid SDN, SDN via APIs, SDN via overlays. Data centre SDN, VXLAN, Service Provider SDN, SD WAN, Enterprise SDN, WiFi. SDN and open source OpenDaylight, OpenVSwitch, Open Networking Forum, Open Network Operating System. Hands onOpenStack. SD-WAN What is SD-WAN? Architecture: Edge, gateway, orchestrator, controller. Overlay and underlay. Use of MPLS, 4G/5G. Benefits and features. Secure Access Service Edge (SASE).

Network management technologies
Delivered in Internationally or OnlineFlexible Dates
£3,697

UNIX Virtualization and High Availability

5.0(3)

By Systems & Network Training

UNIX Virtualization and High Availability course description This course covers administering UNIX enterprise-wide with an emphasis on virtualization and high availability. What will you learn Manage Virtual Machines. Manage containers. Manage HA clusters. Manage HA cluster storage. UNIX Virtualization and High Availability course details Who will benefit: Enterprise-level UNIX professional. UNIX professionals working with virtualization and/or High availability. Prerequisites: Linux network administration 2 (LPIC-2) Duration 5 days UNIX Virtualization and High Availability course contents VIRTUALIZATION Virtualization concepts and theory Terminology, Pros and Cons of virtualization, variations of Virtual Machine monitors, migration of physical to VMs, migration of VMs between host systems, cloud computing. Xen Xen architecture, networking and storage, Xen configuration, Xen utilities, troubleshooting Xen installations, XAPI, XenStore, Xen Boot Parameters, the xm utility. KVM KVM architecture, networking and storage, KVM configuration, KVM utilities, troubleshooting KVM installations. Other virtualization solutions OpenVZ and LXC, other virtualization technologies, virtualization provisioning tools. Libvirt and Related Tools libvirt architecture, networking and storage, basic technical knowledge of libvirt and virsh, oVirt. Cloud Management Tools Basic feature knowledge of OpenStack and CloudStack, awareness of Eucalyptus and OpenNebula. Containers Containers versus VMs, Docker, Kubernetes. Load balanced clusters of LVS/IPVS, VRRP, configuration of keepalived, configuration of ldirectord, backend server network configuration. HAProxy, configuration of HAProxy. Failover clusters Pacemaker architecture and components (CIB, CRMd, PEngine, LRMd, DC, STONITHd), Pacemaker cluster configuration, Resource classes (OCF, LSB, Systemd, Upstart, Service, STONITH, Nagios), Resource rules and constraints (location, order, colocation), Advanced resource features (templates, groups, clone resources, multi-state resources), Pacemaker management using pcs, Pacemaker management using crmsh, configuration and management of corosync in conjunction with Pacemaker, other cluster engines (OpenAIS, Heartbeat, CMAN). HIGH AVAILABILITY CLUSTER STORAGE DRBD/cLVM DRBD resources, states and replication modes, configuration of DRBD resources, networking, disks and devices, configuration of DRBD automatic recovery and error handling, management of DRBD using drbdadm. drbdsetup and drbdmeta, Integration of DRBD with Pacemaker, cLVM, integration of cLVM with Pacemaker. Clustered File Systems Principles of cluster file systems. Create, maintain and troubleshoot GFS2 file systems in a cluster, create, maintain and troubleshoot OCFS2 file systems in a cluster, Integration of GFS2 and OCFS2 with Pacemaker, the O2CB cluster stack, other commonly used clustered file systems.

UNIX Virtualization and High Availability
Delivered in Internationally or OnlineFlexible Dates
£3,697

Essential NFV

5.0(3)

By Systems & Network Training

NFV training course description Network Functions Virtualization (NFV) brings many benefits, this training course cuts through the hype and looks at the technology, architecture and products available for NFV. What will you learn Explain how NFV works. Describe the architecture of NFV. Explain the relationship between NFV and SDN. Recognise the impact NFV will have on existing networks. NFV training course details Who will benefit: Anyone wishing to know more about NFV. Prerequisites: Introduction to Virtualization. Duration 2 days NFV training course content Introduction What is NfV? What are network Functions? NfV benefits, NfV market drivers. ETSI NfV framework. Virtualization review Server, storage and network virtualization and NfV. Virtual machines, containers and docker. Data centres, clouds, SaaS, IaaS, PaaS. Virtualization of Network Functions Network virtualization versus Network Function virtualization. ETSI NfV architecture ETSI documents, Architecture overview, compute domain, hypervisor domain, infrastructure network domain. IETF and NfV Creating services, Service Functions, Service Function Chaining. SPRING and source packet routing. YANG and NetConf. RESTCONF. VLANs, VPNs, VXLAN. MANO Management and Orchestration. OpenStack, OpenDaylight PaaS and NfV. The VNF domain. Service graphs, MANO descriptors, Open orchestration. The virtualization layer VM centric model, containers versus hypervisors, FD.io. Summary Deploying NfV, performance, testing. Futures.

Essential NFV
Delivered in Internationally or OnlineFlexible Dates
£1,727

4G & 5G Roaming Scenarios & Procedures

5.0(3)

By Systems & Network Training

4G & 5G Roaming Scenarios & Procedures course description This course is designed to explain the roaming procedures of modern mobile networks, based on the GSMA roaming specification the course explains all scenarios where a mobile subscriber may find themselves whilst visiting a preferred mobile network partner. Interconnection between MNOs and the use of GRX & IPX as an interworking process. The course will work through the registration & authentication procedure, download of the user profile, the APN configuration & DIAMETER process to verify user authenticity. VoLTE roaming and IMS registration procedures for voice support & SMS delivery will be discussed and explained. What will you learn Architecture Models Technical requirements for interfaces - 4G Roaming Scenarios Technical requirements & recommendations for services Other Technical Requirements & Recommendations Technical Requirements for QoS support Technical Requirements & Recommendations for Interfaces - 5G Scenarios Technical Requirements & Recommendations for Interworking & Coexistence with E-UTRAN & EPC Technical Requirements & Recommendations for Services Other Technical Requirements & Recommendations 4G & 5G Roaming Scenarios & Procedures course details Who will benefit: Those working in mobile networks. Prerequisites: None. Duration 3 days 4G & 5G Roaming Scenarios & Procedures course contents Architecture Models 4G Evolved Packet System 5G Core Network SGs Interface for CSFB& SMS over SGs Technical Requirements for Interfaces - 4G Roaming Scenarios General requirements for inter-PLMN interfaces Stream Control Transmission Protocol (SCTP) IAMETER S8 Interface SGW selection PGW selection GTP Transport Layer engineering S9 interface Implementation requirements Guidelines for DIAMETER over S9 S6a & S6d interface Gy interface Guidelines for DIAMETER over Gy Legacy interworking scenarios VPLMN has not implemented LTE HPLMN has not implemented LTE Co-existence scenarios Possible scenarios 2G/3G roaming agreement only 2G/3G LTE roaming agreement LTE roaming registrations Consequences of different APN approaches when roaming Guidance regarding the APN approach when roaming Inter-RAT handover Handover & access restrictions to/from 2G/3G & LTE (Active mode) Access restriction for 2G/3G and/or LTE (Idle mode) Handover of PDN Connections between GERAN/UTRAN & LTE Handover to/from non-3GPP accesses & LTE Bandwidth considerations ARP considerations at handover from LTE to 2G/3G Tech requirements & recommendations for Services SMS SMS over SGs Voice CSFB Roaming retry for CSFB Roaming Forwarding for CSFB Coexistence of Roaming Forwarding & Roaming Retry Recommended procedures IMS Voice Roaming Architecture Other Technical Requirements & Recommendations Access Control Addressing APN for IMS based services IMS Well Known APN APN for Home Operator Services Gateway Selection Inter-PLMN roaming handover Data off related functionality Emergency Services Emergency PDN connectivity Emergency Call indicator Security GTP Security DIAMETER Security DIAMTER Roaming hubbing Default APN E-UTRA NR Dual Connectivity with EPC GW Selection for E-UTRA-NR Dual Connectivity TAC/LAC Restriction Guidelines Technical Requirements for QoS support QoS parameters definition QoS Management in the Home Routed architecture QoS control for IMS APN in the S8HR architecture Support of QoS in GRX/IPX QoS Control in Local Breakout architecture Technical Requirements & Recommendations for Interfaces - 5G Scenarios General requirements for inter-PLMN interfaces Transport protocol - TCP/IP Serialisation protocol - JSON Interface Definition language - OpenAPI Application Protocol - HTTP2 Inter-PLMN (N32) Interface N32c N32f ALS & IPX HTTP Proxy SMF & UPF in HPLMN & VPLMN Requirements related to Service Based Architecture Naming, addressing & routing for 5G SA roaming SEPP load distribution SEPP administration, naming convention & routing SEPP HTTP redirections Technical Requirements & Recommendations for Interworking & Coexistence with E-UTRAN & EPC Interworking scenarios Coexistence scenarios Inter-RAT Handover Handover & Access restriction between 5GC & EPC Technical Requirements & Recommendations for Services Network slicing Voice, Video & Messaging Location support UE Route Selection Policy Other Technical Requirements & Recommendations Access control IP Addressing DNN for IMS based services Emergency PDU Session Emergency Services Fallback Security Steering of Roaming in 5GS Technical Requirements for QoS support 5G QoS model 5G QoS profile QoS Control

4G & 5G Roaming Scenarios & Procedures
Delivered in Internationally or OnlineFlexible Dates
£2,367

Essential SDN for engineers

5.0(3)

By Systems & Network Training

Essential SDN training course description Software Defined Networking (SDN) has become one of the industries most talked technologies. This training course cuts through the hype and looks at the technology, architecture and products available for SDN along with looking at the impact it may have on your network. What will you learn Explain how SDN works. Describe the architecture of SDN. Explain the relationship between SDN and OpenFlow. Recognise the impact SDN will have on existing networks. Essential SDN training course details Who will benefit: Anyone wishing to know more about SDN. Prerequisites: None. Duration 2 days Essential SDN training course contents Introduction What is SDN? What is OpenFlow? SDN benefits. The SDN stack and architecture. SDN architecture SDN applications, SDN switches, SDN controllers, Network Operating Systems. Control plane, data plane. Control to Data Plane Interface (CDPI), Northbound interfaces. SDN components, control and data plane abstractions. Network Operating Systems Finding the topology, Global view, control program, configuration based on views, graph algorithm. OpenFlow Just one part of SDN. Open Networking Foundation, OpenFlow ports, Flow tables, OpenFlow Channels. The OpenFlow protocol, OpenFlow header, OpenFlow operations. OpenFlow versus OpFlex. SDN and open source OpenDaylight, OpenVSwitch, Open Networking Forum, Open Network Operating System. OpenStack Neutron. SDN implications Separation of control and data plane, NOS running on servers, Emphasis on edge complexity, core simplicity, OpenvSwitch, Incremental migration, importance of software. SDN vs NVF.

Essential SDN for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,727