Our training programme will provide those involved at any stage of the process for procuring goods and/or services within their organisations with the knowledge and skillset to identify and mitigate the threat posed by the breadth and multi-layered complexity of procurement fraud and corruption.
Web development training course description This three-day course helps build a foundation in the development of Web applications. This is not a HTML course but covers the technologies needed to develop web applications. Technologies covered include: ASP.NET, XML, AJAX and HTTP error codes. What will you learn Program Web applications. Work with data and services. Troubleshoot and debug Web applications. Work with client side scripting. Configure and deploy web applications. Web development training course details Who will benefit: Anyone looking for an introduction to web development. Prerequisites: None. Duration 3 days Web development training course contents Programming web applications Customise the layout and appearance of a web page CSS; tables; embedding images; page layout for navigation. Understand ASP.NET intrinsic objects Request; Server; Application; Session; Response; HttpContext. Understand state information in web applications Understand how state is stored based on application design and hardware; understand different types such as session state, view state, control state and application state. Understand events and control page flow Application and page life cycle events; page events; control events; application events; session events; cross-page posting; Response.Redirect; Server.Transfer; IsPostBack; setting AutoEventWireup. Understand controls Understanding various types of controls, including user, server, web and validation controls; know which is the appropriate type of control for a scenario. Understand configuration files Understanding the usage of web.config and machine.config, and the settings that can be made. Working with data and services Read and write XML data Understanding XML, XML validation Does not include: Web services; XPath syntax; XmlDocument; XPathNavigator; XPathNodeIterator; XPathDocument; XmlReader; XmlWriter; XmlDataDocument; XmlNamespaceManager. Distinguish between DataSet & DataReader objects The ability to choose the proper data object to use based on application requirements/design. Call a service from a web page Creating a basic WCF service or web service so that it can be consumed; App_WebReferences; configuration. Understand DataSource controls LinqDataSource: ObjectDataSource; XmlDataSource; SqlDataSource. Bind controls to data by using data binding syntax Ensure that data is updated and displayed in data-aware controls. Manage data connections and databases Database connections; connection objects; connection pools; transaction objects. Troubleshooting and debugging web applications Debug a web application Use in conjunction with custom error pages to display appropriate error information to the appropriate user; implement tracing of a web application, Trace.axd, Trace=True on @Page directive. Handle web application errors HTTP error codes. Working with client-side scripting Understand client-side scripting Purpose of client-side scripting; various client-side scripting languages. LE/370 and Intrinsic Functions. Understand AJAX concepts ASP.NET AJAX implementation; working with client-side libraries, EnablePartialRendering, Triggers, ChildrenAsTriggers, Scripts, Services, UpdateProgress, Timer, ScriptManagerProxy, extender controls. Configuring and deploying web applications Configure authentication and authorisation Forms authentication, Windows authentication; authorisation; file authorisation; impersonation Does not include: Windows Cardspace authentication, Passport (Windows Live ID) authentication, Custom authentication. Configure projects, solutions and reference assemblies Local assemblies; shared assemblies (GAC); web application projects; solutions; configuration files; AppSettings. Publish web applications Choosing the appropriate method to deploy an application based on existing or intended environment; updatable vs. not updateable; MSI deployment; Internet Information Server (IIS) installation and configuration. Understand application pools Purpose of application pools; effect of application pools on web applications.
About this Training Course A few decades ago, the purchasing function in an Oil & Gas company was seen only as a procurement function in charge of supplying goods and services defined by the end user. Over the years, the purchasing function has won its letters of nobility and has proven to be a powerful leverage of savings and cost reduction. In the upstream Oil & Gas sector, where production sites are spread everywhere and sometimes in very isolated areas, purchasing & procurement performs an important mission to secure the supply of high-tech equipment which will travel all over the world before being installed offshore or in remote areas. These two objectives, cost saving and securing of supply, make the purchasing & procurement a strategic function and an essential segment of the supply chain as it drives the other steps in the chain. Training Objectives By the end of the course, the participants will feel confident in their understanding of: The supply chain functions in the upstream Oil & Gas industry and its objectives. The purchasing process from the identification of a need to its satisfaction within the specifications, planning and budget. The strategic tools of the buyer: The category management and market analysis, the definition of the frame agreement and contracts. The creation of value for their organization by using the leverages of the purchasing process from the selection of supplier, the cost analysis and the negotiation. Target Audience This course is primarily designed for purchasers or head of purchasing/procurement. It is also necessary for other stake holders in the supply chain, including expediters, stock controllers and cost controllers. This course is also recommended for the participants in the logistics function who want to enlarge their knowledge domain of the supply chain. Finally, the supply chain administrators from the technical departments may also find this course necessary in order to facilitate their interaction with the purchasing department. Course Level Basic or Foundation Trainer Your expert course leader has 25 years of experience in management positions in Contracting, Procurement and Logistics, mainly in the Oil & Gas Industry. He was a Lecturer for IFP Training for 5 years. During his Oil & Gas industry experience, he has worked on major Oil and Gas development projects like the Yadana project in Myanmar, Akpo project in Nigeria and YLNG in Yemen. His international experience allows him to adapt very easily and integrate the multicultural specificities of the Oil & Gas industry in his teaching. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
Voice over LTE training course description This course provides a basic understanding of the 3G LTE Air Interface, SAE, as well as Voice over LTE options and LTE Advanced features. Investigating the standards for the EPS , formulated by the 3GPP standards body, the course will set out to examine and explain the 4G environment from user equipment to border gateway and beyond. This course will ensure the delegate has a grasp of all aspects of the current global deployments, the next steps in upgrades and the promise of things to come. What will you learn Describe the complete EPC architecture. Explain the use of QoS within the air interface & core network. Explore the features of LTE advanced. Describe the various methods of supporting voice services with 3G LTE. Describe IMS structure and control entities. Explain an IMS session. Voice over LTE training course details Who will benefit: Any engineers who are assisting in the deployment of voice services within their LTE networks. Prerequisites: Intro to Data comms & networking Telecommunications Introduction Duration 3 days Voice over LTE training course contents 3GPP standards body Release 8 - Release 12, Supported and expected features. The EPC revisited EPC revisited 3G LTE & EPC Architecture, NB, MME, SGW, PDNGW, PCRF, Interworking capabilities, Protocol stack explored, NAS signalling, Default EPS bearer, Slot allocation algorithms, Scheduling algorithms, Quality of Service requirements, Dedicated EPS bearers. VoLTE deployment strategies Common networks everywhere, GSM/WCDMA view, CDMA view. VoLTE system architecture LTE radio, LTE Radio background, LTE radio architecture, Evolved packet core, EPC entities & functions, EPS mobility management, MS entities, Home subscriber server, Policy & charging rules function. VoLTE functionality Radio functionality, Bearers & schedulers, Mobility, Circuit switched fall back handover, Mobility from 2G/3G back to LTE, Power Saving Features, Positioning services, UE radio access capabilities for VoLTE users. EPC functionalities, LTE subscriber identification, PDN connectivity establishment, EPS dedicated bearer setup, IMS identification, IP multimedia identification module, Public user identity, Private user identity, Relationship between public & private identity, identification of users device, identification of network entities, identification of services, identification without ISIM. IMS service provisioning, Enforcement of allowed services, Service triggering information, Selection of the AS, AS behaviour, Service provisioning in action. VoLTE end-to-end & signalling VoLTE subscription & device configuration. EPS attach for CSFB/IMS VoIP & default bearer. IMS registration, Constructing the REGISTER request, From UE to P-CSCF, From P-CSCF to I-CSCF, From I-CSCF to S-CSCF, S-CSCF challenges the UE, UE's response to the challenge, Registration at the S-CSCF, The 200 OK response, Third-party registration to application servers, Subscription to registration event package, Re-registration & re-authentication, De-registration, Related standards. IMS VoIP session, Constructing the INVITE request, Routing, Media negotiation, Media resource reservation & policy control, Charging, Session release. Voice continuity, PS - PS intersystem handover, Single radio voice call continuity. IMS emergency session, PDN Connection setup for emergency session, Emergency registration, Emergency session. CS fallback for EPS call case, Architecture of CS fallback in EPS, Description of SGs interface, Idle mode signalling reduction, Idle mode vs active mode, CS fallback attachment, Mobile originating call using CSFB, Mobile terminating call using CSFB, Call unrelated CSFB procedures, Mobile terminating roaming retry & forwarding. VoLTE Messaging, Native IMS messages, SMS interworking, Multimedia messaging service. Unstructured supplementary services data simulation in IMS. IMS services VoLTE radio performance Coverage, Latency, Capacity. LTE advanced features Carrier aggregation, Coordinated mMulti-point Operation (CoMP), ICIC & eICIC, Relay node deployment & donor eNBs, Improved cell edge coverage, Reduced control plane latency, Heterogeneous networks, HeNB, security gateways, HeNB gateways.
About this Training Course This 3 full-day course will provide insights into many aspects of operating the modern refinery as a business. This will include technical information on refining processes, crude oils and processing options, the place of the refinery in the value chain, refinery cost structure and management, optimization and profit margin, energy and oil loss reduction. This course will also address important management tools and techniques used for economic evaluations in refineries including future trends. This course will include presentations, simulations, a trading game, and exercises. This is an interactive session where participants can propose relevant topics upfront to discuss during class. This course can be further tailored for inexperienced or experienced personnel. Further customization can also include addressing a specific refinery, plant or unit. The option for post-course consultancy or help-desk support is also available. This course can also be offered through Virtual Instructor Led Training (VILT) format. Training Objectives By participating in this highly intensive course, participants will be able to: Understand the main functions in refining processes, configurations and its operating characteristics Analyse the choice of crude, processing options and desired products and product quality parameters Closely review refinery economics and planning, margins, costing & valuation including trading Apply the methodology of refinery optimization and product improvement Gain an application of analytical tools to refinery management, supply chain and their economic drivers Appreciate the current challenges, opportunities and future trends impacting the refining industry Target Audience This course will benefit all refinery technical personnel, operations' process engineers and process managers, technical services engineers and managers, refinery planners, newly-hired refinery personnel and current semi-technical personnel who require introductory training to acquire the broader perspective of refinery economics and supply. Course Level Basic or Foundation Trainer Your expert course leader is a passionate world-class expert with 35 years of international experience in Crude Oil, Refinery Planning and Masterplanning, Process Modelling, LP Modelling and Optimization Best Practices. He has a sound understanding of refinery processes and economics. After retiring from Shell in 2020, he is now a principal consultant for Crude Oil & Refinery Modelling. He enjoys dealing with challenging technical problems and opportunities to deliver value through practical solutions. He has a hands-on mentality, is flexible and builds strong relationship with clients. During his career, he coached many engineers and delivered countless inhouse and external courses on crude oil, hydrocracking and general refinery processes and economics at the Shell Open University and many other client locations. He authored and co-authored several publications and presentations at international conferences and has three patents to his name. He understands how to deliver outstanding services in sometimes difficult cultural and commercial situations, having worked for clients around the world. He works effectively in multi-disciplinary teams, has strong analytical and problem-solving skills as well as excellent consulting, facilitation and interpersonal and multilingual skills. He has an MSc in Chemical & Agricultural Engineering (cum laude) and a BSc in Chemical & Agricultural Engineering from the University Ghent, Belgium. He is currently the Principal Consultant for Crude Oil & Refinery Modeling at Petrogenium, the international, independent, technical consultancy in oil refining, petrochemicals, oil & gas production & renewable resources. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
RESILIA™ Foundation AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial and government organizations around the world prevent, detect, and correct any impact cyber attacks will have on the information required to do business. Adding RESILIA to the existing AXELOS global best practice portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management, and business. Active cyber resilience is achieved through people, process, and technology. The RESILIA™ Foundation course starts with the purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions, and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities. What you will Learn At the end of this course, you will be able to: Demonstrate your knowledge of the purpose, benefits, and key terms of cyber resilience Demonstrate your knowledge of the risk management and the key activities needed to address risks and opportunities Demonstrate your knowledge of the purpose of a management system and how best practices and standards can contribute Demonstrate your knowledge of the cyber resilience strategy, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience design, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience transition, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience operation, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience continual improvement, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of the purpose and benefits of segregation of duties and dual controls Course Introduction Course Learning Objectives Course Agenda Activities Course Book Structure RESILIA Certification Introduction to Cyber Resilience What is Cyber Resilience? Defining Cyber Resilience Balancing in Cyber Resilience Characteristics of Cyber Resilience Risk Management Understanding Risk Management: Discussion Defining Risk Management Addressing Risks and Opportunities Managing Cyber Resilience Why and What of Management Systems? Management Systems Common Management Standards and Frameworks Cyber Resilience Strategy What is Strategy? Cyber Resilience Strategy and Activities Security Controls at Cyber Resilience Strategy Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Design Why Cyber Resilience Design? Cyber Resilience Design Activities Security Controls at Cyber Resilience Design Aligning ITSM Processes with Cyber Resilience Processes Cyber Resilience Transition Why Cyber Resilience Transition? Basics of Cyber Resilience Transition Cyber Resilience Transition: Controls Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Operation The Purpose of Cyber Resilience Operation Security Controls in Cyber Resilience Operation Interaction Between IT Processes and Cyber Resilience Interaction Between ITSM Functions and Cyber Resilience Cyber Resilience Continual Improvement Continual or Continuous Improvement Maturity Models Continual Improvement Controls The Seven-Step Improvement Process The ITIL CSI Approach Cyber Resilience Roles & Responsibilities Segregating Duties Dual Controls
RESILIA™ Foundation: In-House Training AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial and government organizations around the world prevent, detect, and correct any impact cyber attacks will have on the information required to do business. Adding RESILIA to the existing AXELOS global best practice portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management, and business. Active cyber resilience is achieved through people, process, and technology. The RESILIA™ Foundation course starts with the purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions, and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities. What you will Learn At the end of this course, you will be able to: Demonstrate your knowledge of the purpose, benefits, and key terms of cyber resilience Demonstrate your knowledge of the risk management and the key activities needed to address risks and opportunities Demonstrate your knowledge of the purpose of a management system and how best practices and standards can contribute Demonstrate your knowledge of the cyber resilience strategy, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience design, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience transition, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience operation, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience continual improvement, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of the purpose and benefits of segregation of duties and dual controls Course Introduction Course Learning Objectives Course Agenda Activities Course Book Structure RESILIA Certification Introduction to Cyber Resilience What is Cyber Resilience? Defining Cyber Resilience Balancing in Cyber Resilience Characteristics of Cyber Resilience Risk Management Understanding Risk Management: Discussion Defining Risk Management Addressing Risks and Opportunities Managing Cyber Resilience Why and What of Management Systems? Management Systems Common Management Standards and Frameworks Cyber Resilience Strategy What is Strategy? Cyber Resilience Strategy and Activities Security Controls at Cyber Resilience Strategy Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Design Why Cyber Resilience Design? Cyber Resilience Design Activities Security Controls at Cyber Resilience Design Aligning ITSM Processes with Cyber Resilience Processes Cyber Resilience Transition Why Cyber Resilience Transition? Basics of Cyber Resilience Transition Cyber Resilience Transition: Controls Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Operation The Purpose of Cyber Resilience Operation Security Controls in Cyber Resilience Operation Interaction Between IT Processes and Cyber Resilience Interaction Between ITSM Functions and Cyber Resilience Cyber Resilience Continual Improvement Continual or Continuous Improvement Maturity Models Continual Improvement Controls The Seven-Step Improvement Process The ITIL CSI Approach Cyber Resilience Roles & Responsibilities Segregating Duties Dual Controls
5G training course description This course is designed to give the delegate an understanding of the technologies and interworking requirements of the next generation of cellular communications. It is not a definitive set of descriptions but a possibility of the final deployment. During the course we will investigate the 10 pillars for 5G, which will include various Radio Access Technologies that are required to interwork smoothly. Hence we will look at the 4G Pro features and other RATs. What will you learn List the ten pillars of 5G deployment. Explain the 5G Internet and Software Distributed Networks (SDN). Explain carrier aggregation, the mobile cloud and RAT virtualisation. Explain an overall picture of 5G architecture. 5G training course details Who will benefit: Anyone who is looking to work with next generation networks. Prerequisites: Mobile communications demystified Duration 3 days 5G training course contents Drivers for 5G 5G Road Map, 10 Pillars of 5G, evolving RATs, small cell, o SON, MTCm, mm-wave, backhaul, EE, new spectrum, spectrum sharing, RAN virtualisation. 4G LTE advanced features *MIMO, Downlink & uplink MIMO R8, MIMO technology in LTE advanced, Downlink 8-layer SU-MIMO, Downlink MU-MIMO, Uplink MU-MIMO, Uplink transmit diversity, Coordinated multi-point operation (CoMP), Independent eNB & remote base station configurations, Downlink CoMP, * Uplink Multi-Cell Reception. ICIC & eICIC ICIC, Homogeneous to heterogeneous network, eICIC, Macro-pico scenario, Macro-femto scenario, Time orthogonal frequencies. Almost Blank Subframe (ABS). Carrier aggregation Component carriers (CC), * CC aggregation, Intra-band contiguous solutions, Intra-band non-contiguous solutions, Inter-band non-contiguous solutions, CA bandwidth classes, Aggregated transmission bandwidth configurations (ATBC), Possible carrier aggregation configurations (Rel 9, 10 & 12). Enhanced Interference Mitigation & Traffic Adaptation (eIMTA) TDD UL-DL reconfiguration for traffic adaptation, Reconfiguration mechanisms, Interference mitigation schemes, Dynamic & flexible resource allocation. 5G architectures 5G in Europe, horizon 2020 framework, 5G infrastructure PPP, METIS project, innovation centre, 5G in North America, research, company R & D, 5G specifications. The 5G internet Cloud services, IoT & context awareness, network reconfiguration & virtualization support, hypervisors, SDN, the controller, service-oriented API, OpenFlow switches, SDN operation, SDN control for traffic flow redirection, OpenFlow controllers, how SDN works, application, control and infrastructure layers, a programmable network, how SDN & NFV tie together, SDN's downside, SDN orchestration, Mobility, architectures for distributed mobility management, MEDIEVAL & MEDIVO projects, a clean slate approach, mobility first architecture, network virtualization (VNet), INM, NetInf, ForMux, MEEM, GP & AM, QoS support, network resource provisioning, IntServ, RSVP, DiffServ, CoS, aggregated resource provisioning, SICAP, MARA, Emerging approach for resource over-provisioning, example use case architecture for the 5G internet, integrating SDN/NFV for efficient resource control, control information repository, service admission control policies, network resource provisioning, control enforcement functions, network configurations, network operations. Small cells for 5G Average spectral efficiency evolution, What are small cells? WiFi & Femto cells as candidate small-cell technologies, Capacity limits & achievable gains with densifications, gains with multi-antenna techniques, gains with small cells, Mobile data demand, approach & methodology, subscriber density projections, traffic demand projections, global mobile data traffic increase modelling, country level backhaul traffic projections, 2020 average spectrum requirement, Small cell challenges, backhaul, spectrum, automation. Cooperation for next generation wireless networks Cooperative diversity & relaying strategies, Cooperative ARQ & MAC protocols, NCCARQ & PRCSMA packet exchange, Physical layer impact on MAC protocol, NCCARQ overview, PHY layer impact, Performance evaluation, simulation scenario and results. Mobile clouds; technology & services for future communications platforms Mobile cloud, software, hardware and networking resources, Mobile cloud enablers, mobile user domain, wireless technologies, WWAN WLAN and WPAN range, Bluetooth, IEEE.802.15.4, software stacks, infrared, near field communications (NFC), store & forward vs compute & forward, random/linear network coding. Security for 5G communications Potential 5G architectures, Security issues & challenges in 5G, user equipment, mobile malware attacks, 5G mobile botnets, attacks on 4G networks, C-RNTI & packet sequence numbers based UE location tracking, false buffer status reports attacks, message insertion attacks, HeNB attacks, physical attacks, attacks on mobile operator's network, user data & identity attacks, DDoS attacks, amplification, HSS saturation, external IP networks.
HTML5 development training course description This three-day MTA Training course helps you prepare for Microsoft Technology Associate Exam 98-375, and build an understanding of these topics: Manage the Application Life Cycle, Build the User Interface by Using HTML5, Format the User Interface by Using CSS, Code by Using JavaScript. This course leverages the same content as found in the Microsoft Official Academic Course (MOAC) for this exam. What will you learn Manage the Application Life Cycle. Build the User Interface by Using HTML5. Format the User Interface by Using CSS. Code by Using JavaScript. HTML5 development training course details Who will benefit: Anyone working with HTML5. Prerequisites: None. Duration 3 days HTML5 development training course contents Managing the Application Life Cycle Platform fundamentals Packaging and the runtime environment: app package, app container, credentials/permission sets, host process, leverage existing HTML5 skills and content for slate/tablet applications. Manage the state of an application Manage session state, app state and persist state information; understand states of an application; understand the differences between local and session storage. Debug and test a HTML5 touch-enabled application Touch gestures; gestures you test on a device. HTML5 UI: Text, Graphics, and Media HTML5 tags for text content and graphics. When, why and how to use Canvas; when, why and how to use scalable vector graphics (SVG). HTML5 tags to play media. Video and audio tags. HTML5 UI: Organization, Input, and Validation HTML5 tags to organise content and forms Tables, lists, sections; semantic HTML. HTML5 tags for input and validation CSS Essentials: Content Flow, Positioning, styling Core CSS concepts Separate presentation from content (create content with HTML and style content with CSS); manage content flow (inline versus block flow); manage positioning of individual elements( float versus absolute positioning); manage content overflow (scrolling, visible and hidden); basic CSS styling. CSS Essentials: Layouts Arrange UI content by using CSS Use flexible box and grid layouts to establish content alignment, direction and orientation; proportional scaling and use of "free scale" for elements within a flexible box or grid; order and arrange content; concepts for using flex box for simple layouts and grid for complex layouts; grid content properties for rows and columns; use application templates. Managing Text Flow by Using CSS Regions and using regions to flow text content between multiple sections (content source, content container, dynamic flow, flow-into, flow-from, msRegionUpdate, msRegionOverflow, msGetRegionContent); columns and hyphenation and using these CSS settings to optimise the readability of text; use "positioned floats" to create text flow around a floating object Managing the Graphical Interface by Using CSS Graphics effects (rounded edges, shadows, transparency, background gradients, typography and Web Open Font Format); 2-D 3-D transformations (translate, scale, rotate, skew and 3-D perspective transitions and animations); SVG filter effects; Canvas. JavaScript and coding essentials Manage and maintain JavaScript, Create and use functions; jQuery and other third-party libraries. Update the UI by using JavaScript Locate/access elements; listen and respond to events; show and hide elements; update the content of elements. Animations, Graphics, and Accessing Data Code animations with JavaScript animation; manipulate the canvas; work with images, shapes and other graphics. Access data access by using JavaScript Send and receive data; transmit complex objects and parsing; load and save files; App Cache; datatypes; forms; cookies; localStorage JavaScript coding for Touch Interface, Device and Operating System Resources, and More Respond to the touch interface, Gestures, how to capture and respond to gestures, Code additional HTML5 APIs, GeoLocation, Web Workers, WebSocket; File API, Access device and operating system resources, In- memory resources, such as contact lists and calendar; hardware capabilities, such as GPS, accelerometer and camera.
GPON and FTTx networks training course description Designed to benefit those requiring an in depth knowledge of the principles and applications of Ten Gigabit and Gigabit Passive Optical Networking and Fibre to the X in NG Networks applications and their associated equipment, its flexibility and function within a modern transmission network. Using an effective mix of 'hands on' equipment instruction and correlation to theory based learning the delegate will gain a complete understanding of the equipment and the tasks to be undertaken in a real life situation. What will you learn Compare PON/FTTx systems. Explain network elements and designs. Support applications and network interfaces. List circuit provisioning and bandwidth requirements. Understand upstream & downstream issues. Describe headend & network elements/OLT-ONT. Perform network testing with OTDR test sets. GPON and FTTx networks training course details Who will benefit: Anyone working with GPON and FTTx. Prerequisites: Introduction to data communications and networking. Duration 5 days GPON and FTTx training course contents FTTN, FTTC, FTTH SMF, MMF, Fibre safety and properties (dispersion/attenuation), Fibre reel cables and types, Fibre installation and air blown fibre, Transmitters and receivers - power budget/laser classes. Fibre to the home (FTTH), FTTC (Fibre to the Cabinet), FTTN (Fibre to the node) , FTTD (Fibre to the desk), FFTH topologies and wavelengths, Active or passive optical network. WDM equipment and GPON OSP design Wavelength considerations, WDM/DWDM/CWDM, EDFA optical amplification, AWG (Arrayed Waveguide Grating) splitters , Couplers (splitters) and losses, Optical splitters 1x2, 1x4, 1x8, 1x16, 1x32, 1x64, 2x64. PON variants Gigabit passive optical network (GPON), Gigabit Ethernet passive optical network (GEPON), Time division PON (TDM-PON), Wave Division Multiplexing PON (WDM-PON), 1Gbps, 10Gbps, 40Ggps, 100Gbps FSAN (Full Service Access Network) NGA (Next Generation Access), Strategies for TDM-PON to WDM-PON migration, Architecture of NG-PON (hybrid WDM/TDM PON), Additional services than triple play. GEPON design GPON OSP centralized and distributed design, GPON PON splitters x4 x8 x32, Fibre splice trays /cassette trays & enclosures, GPON field testing and installation verification, GPON physical layer testing, Optical time domain reflectometer (OTDR), Optical power source & meter, Optical return loss (ORL), APON/BPON/GPON/EPON comparisons. GPON ITU-T G.984.1 Reference model, terminology & architecture, Access network system management functions. ONT & OLT functional block examples. FTTx scenarios, 4 switching arrangements for external access network backup. GPON ITU-T G.984.2 Physical layer, Enhancement band, Bit rate and wavelengths, FEC and RAMAN. GPON ITU-T G.984.3 Frame structure, GPON encapsulation method (GEM), GTC adaptation and framing sublayer protocol stack, Status reporting & traffic monitoring DBA (SR-DBA & TM-DBA), Transmission container (T-CONT) types, Downstream & upstream multiplexing, GEM port identifier, Media access control and ONU registration, Extended bandwidth assignment model scheduling architecture, PLOAM & alarm messages, Downstream & Upstream FEC, Process order in a GTC transmit flow. GPON ITU-T G.984.4 and G.988 ONT management and control interface (OMCI) Management interface, Reference model, Typical ONT with SCTE 55-1 or SCTE 55-2 compliancy. GPON ITU-T G.984.5 enhancement band Band options, GPON NGA, Wavelength allocation. GPON ITU-T G.984.6 optical reach extension (G.984.re) Reach extension (RE), OA-based and OEO-based reach extenders, Protection, Reach extender with OTDR blocking filters (BF) and bypass (BYP) filters. GPON ITU-T G.984.7 long reach Quiet Window. 10-GPON ITU-T G.987.1 (XG-PON) Scenarios, reference access network architecture, XG-PON with G-PON through WDM1r, G-PON and XG-PON wavelength allocation, G-PON and XG-PON co-existence with video overlay option, RE migration scenarios. G.989 40Gbps XG-PON2 Functional reference architecture, NG-PON2 system coexistence with legacy systems, Definitions of legacy compatibility terminology. GPON issues and standards GPON components GPON OLT / GPON ONT, GPON management, Operational support systems (OSS), Network management systems (NMS), OMCI (ONT Management control interface), RG (Residential gateway), Data and prioritised voice channel product, GPON broadband-forum standards, Broadband-forum , TR-069 and TR-156, HPNA (home phone network alliance), Powerline carrier (PLC), GPON DLNI G.hn or G.9960, MOCA, FTTH council certification standard for network certification. Fibre-connected home badge, Ethernet in the first mile (EFM), GPON frame synchronization to network timing, Direct clock synchronization interface (BITS), Multiservice access platform (MSAP), Software planning tool, Superconnected cities / voucher scheme. Hands on practical assignments Single and multimode fibre recognition, Fibre Cleaning methods, Checking cleaning with an optical microscope, Optical light source and optical power meter referencing, PON splitter and fibre drum testing with an optical power meter, 6km classroom passive optical network testing with an OTDR at 1310/1550nm, Using decibels (dB's) and decibel milliwats (dBm's), Designing networks up to 20km long using vendor specifications (power budget), Fault finding with a visible fault locator.