LTE training course description This course is designed to give the delegate an understanding of the technologies used within a 3G UMTS mobile network. During the course we will investigate the UMTS air interface and the use of Wideband-Code Division Multiple Access (WCDMA) to facilitate high speed data access, together with HSPA to offer mobile broadband services. We will describe the use of soft handover rather than hard handover procedures and soft capacity sharing. The course includes a brief exploration of the UMTS protocol stack and the use of PDP Context and QoS support features. What will you learn Explain the 3G UMTS architecture. Describe the role of a Drifting & Serving RNC. Explain the use of ARQ & HARQ for mobile broadband. Describe how IMS integrates into the architecture. Describe the use of Media Gateway Controllers. Identify the temporary identities used within 3G UMTS. LTE training course details Who will benefit: Anyone working within the telecommunications area, especially within the mobile environment. Prerequisites: Mobile communications demystified Telecommunications Introduction Duration 2 days LTE training course contents LTE Introduction The path to LTE, 3GPP. LTE to LTE advanced. LTE Architecture The core, Access, roaming. Protocols: User plane, Control plane. Example information flows. Bearer management. Spectrum allocation. LTE technologies Transmission, reception, OFDMA, multiple antenna, MIMO. LTE Air interface Air interface protocol stack. Channels, Resource Grid, cell acquisition. Up and downlink controls. Layer 2 protocols. Cell acquisition Power on, selecting networks and cells. RRC connection. Attach procedure. Mobility management Roaming, RRC_IDLE, RRC_CONNECTED, cell reselection, handover, interoperation with UMTS and GSM networks. Voice and text IMS, QoS, policy and charging.
Layer 3 switching training course description A hands on switching course for those already familiar with the basics of Ethernet switching. The course focuses on L3 switching along with the QoS and security features that layer 3 switches can add to the network. What will you learn Explain how layer 3 switches work. Troubleshoot layer 3 switching. Implement QoS on switches. Secure networks with L3 switches. Layer 3 switching training course details Who will benefit: Technical staff working with Ethernet switches. Prerequisites: Definitive Ethernet switching for engineers Duration 2 days Layer 3 switching training course contents Switches Switch review, VLANs, inter VLAN routing. Hands on VLANs and tagging, separating networks with routers. VLANs and IP addressing IP addresses, subnet masks, default gateways. Hands on L3 switches and VLANs What are layer 3 switches Routers in switches, configuring a switch to route, switch ports, router ports, when to switch, when to route. What is the difference between a router and a L3 switch? Hands on Analysing packet flows through a L3 switch. L3 switches and static routes Why use static routes? Default routes. Hands on Configuring static routes. L3 switches and routing protocols RIP, OSPF. Hands on RIP, OSPF. First hop redundancy Default gateways, VRRP/HSRP/GBLP. Load sharing, critical IP addresses. Interaction between STP and L3 redundancy Hands on VRRP. Multicasting and L3 switches IGMP, IGMP snooping, multicasts and routers, PIM. Hands on Multicasts between VLANs. IPv6 IPv6 and L2 switches, IPv6 and L3 switches. Hands on Adding IPv6 into the network. QoS DSCP, 802.1Q, 802.1p, mapping, classification, policy, Ingress queues, Egress queues. Dropping frames, limiting bandwidth. Hands on Voice through switches. Security Layer 2 security, filtering at layer 3. Hands on Controlling inter VLAN traffic.
Join EnergyEdge's VILT course on Carbon Capture Utilization & Storage projects to gain valuable insights into Techno-Economic Modelling.
Mobile comms training course description A complete overview of mobile communications covering all the major technologies in a 2-day format. What will you learn GSM GPRS UMTS LTE Alternative mobile strategies Mobile comms training course details Who will benefit: Anyone involved in mobile communications. Prerequisites: None. Duration 2 days Mobile comms training course contents Introduction Telephony, RF, mobile and wireless technologies, distances, mobile phone generations, base stations, cells, frequencies, cell types, MSC, handoffs, channels, internetworking, the Internet, wireless Internet access. UK operators, worldwide operators. GSM What is it? Timeline, digitising voice, channels, GSM architecture, Abis, A, Um, MS, BTS, BSC, MSC, HLR, VLR, EIR, AuC. Radio link aspects, GSM signalling overview, signalling protocols, roaming, GSM call flows, authentication. IMEI. SIM cards. GPRS What it is, 2G to 3G, GPRS user features, GPRS network features, GPRS elements, GPRS architecture, overlay, SGSN, GGSN, GPRS ATTACH, GPRS protocol stack, GPRS timeslots, EDGE, GPRS classes, GPRS routing, GPRS packet format. UMTS and 3G What is 3G? IMT-2000, 3G proposals, what is UMTS? Speed comparison, evolution to 3G, CDMA, CDMA 2000, W-CDMA, UMTS components, UMTS infrastructure, RNC, Node B, network architecture, packet switched attach, mobility in 3G, HSDPA. LTE and 4G LTE architecture and principles, Physical layer, Air interface, E-UTRAN, Evolved packet core, service provision. Other wireless solutions Integration of services, Bluetooth, Blackberry, VoIP, Mobile IP, 802.11, WiFi, 802.16, WiMax, What is 5G?
Wireshark 101 training course description Wireshark is a free network protocol analyser. This hands-on course focuses on troubleshooting networks using the Wireshark protocol analyser. The course concentrates on the product and students will gain from the most from this course only if they already have a sound knowledge of the TCP/IP protocols What will you learn Download and install Wireshark. Capture and analyse packets with Wireshark. Configure capture and display filters. Customise Wireshark. Troubleshoot networks using Wireshark. Wireshark 101 training course details Who will benefit: Technical staff looking after networks. Prerequisites: TCP/IP Foundation for engineers Duration 2 days Wireshark 101 training course contents What is Wireshark? Protocol analysers, Wireshark features, versions, troubleshooting techniques with Wireshark. Installing Wireshark Downloading Wireshark, UNIX issues, Microsoft issues, the role of winpcap, promiscuous mode, installing Wireshark. Wireshark documentation and help. Hands on Downloading and installing Wireshark. Capturing traffic Starting and stopping basic packet captures, the packet list pane, packet details pane, packet bytes pane, interfaces, using Wireshark in a switched architecture. Hands on Capturing packets with Wireshark. Troubleshooting networks with Wireshark Common packet flows. Hands on Analysing a variety of problems with Wireshark. Capture filters Capture filter expressions, capture filter examples (host, port, network, protocol), primitives, combining primitives, payload matching. Hands on Configuring capture filters. Working with captured packets Live packet capture, saving to a file, capture file formats, reading capture files from other analysers, merging capture files, finding packets, going to a specific packet, display filters, display filter expressions. Hands on Saving captured data, configuring display filters. Analysis and statistics with Wireshark Enabling/disabling protocols, user specified decodes, following TCP streams, protocol statistics, conversation lists, endpoint lists, I/O graphs, protocol specific statistics. Hands on Using the analysis and statistics menus. Command line tools Tshark, capinfos, editcap, mergecap, text2pcap, idl2eth. Hands on Using tshark. Advanced issues 802.11 issues, management frames, monitor mode, packet reassembling, name resolution, customising Wireshark. Hands on Customising name resolution.
NETCONF and YANG training course description An introduction to NETCONF and YANG. The course progresses from what they are, why they are needed, and how to configure them onto a more detailed analysis of how NETCONF works and how to read YANG models. What will you learn Recognise the limits and problems of SNMP and the CLI. Describe the relationship between NETCONF and YANG. Configure NETCONF on network devices. Use NETCONF to configure devices. Read YANG models. NETCONF and YANG training course details Who will benefit: Network engineers. Prerequisites: Network management technologies Duration 1 day NETCONF and YANG training course content What are NETCONF and YANG? Network management and configuration issues. What is NETCONF? What is YANG? Protocols, data models, architecture. Hands on Configuring NETCONF on network devices, using NETCONF. NETCONF NETCONF layers, Secure transport: SSH, Messages: rpc, Operations, Content. Base operations: <get>, <get-config>, <edit-config>, <copy-config>, <delete-config>, <lock>,<unlock>, <close-session>, <kill-session> NETCONF datastores: :candidate, :startup, running. Hands on Retrieving a configuration with NETCONF, Editing a configuration with NETCONF. NETCONF more details NETCONF traffic flows, NETCONF capabilities, hello, capabilities exchange., Filtering data, atomic transactions, validating configurations. Hands on Using NETCONF. YANG YANG models, IETF standard YANG models, tree diagrams, an example: YANG interface management, Module header, Imports and includes, Containers, Lists, leaves, Data types, typedef, Instance data, XML. Hands on Reading YANG data models, creating a configuration instance.
This two-day course will introduce you to different methods and techniques used within the metal industry, and you will come away with a finished product at the end (Example: ornamental garden flower, weather vane or a wall mounted coat rack).
Use Cases for Business Analysis The use case is a method for documenting the interactions between the user of a system and the system itself. Use cases have been in the software development lexicon for over twenty years, ever since it was introduced by Ivar Jacobson in the late 1980s. They were originally intended as aids to software design in object-oriented approaches. However, the method is now used throughout the Solution Development Life Cycle from elicitation through to specifying test cases, and is even applied to software development that is not object oriented. This course identifies how business analysts can apply use cases to the processes of defining the problem domain through elicitation, analyzing the problem, defining the solution, and confirming the validity and usability of the solution. What you will Learn You'll learn how to: Apply the use case method to define the problem domain and discover the conditions that need improvement in a business process Employ use cases in the analysis of requirements and information to create a solution to the business problem Translate use cases into requirements Getting Started Introductions Course structure Course goals and objectives Foundation Concepts Overview of use case modeling What is a use case model? The 'how and why' of use cases When to perform use case modeling Where use cases fit into the solution life cycle Use cases in the problem domain Use cases in the solution domain Use case strengths and weaknesses Use case variations Use case driven development Use case lexicon Use cases Actors and roles Associations Goals Boundaries Use cases though the life cycle Use cases in the life cycle Managing requirements with use cases The life cycle is use case driven Elicitation with Use Cases Overview of the basic mechanics and vocabulary of use cases Apply methods of use case elicitation to define the problem domain, or 'as is' process Use case diagrams Why diagram? Partitioning the domain Use case diagramming guidelines How to employ use case diagrams in elicitation Guidelines for use case elicitation sessions Eliciting the problem domain Use case descriptions Use case generic description template Alternative templates Elements Pre and post conditions Main Success Scenario The conversation Alternate paths Exception paths Writing good use case descriptions Eliciting the detailed workflow with use case descriptions Additional information about use cases Analyzing Requirements with Use Cases Use case analysis on existing requirements Confirming and validating requirements with use cases Confirming and validating information with use cases Defining the actors and use cases in a set of requirements Creating the scenarios Essential (requirements) use case Use case level of detail Use Case Analysis Techniques Generalization and Specialization When to use generalization or specialization Generalization and specialization of actors Generalization and specialization of use cases Examples Associating generalizations Subtleties and guidelines Use Case Extensions The <> association The <> association Applying the extensions Incorporating extension points into use case descriptions Why use these extensions? Extensions or separate use cases Guidelines for extensions Applying use case extensions Patterns and anomalies o Redundant actors Linking hierarchies Granularity issues Non-user interface use cases Quality considerations Use case modeling errors to avoid Evaluating use case descriptions Use case quality checklist Relationship between Use Cases and Business Requirements Creating a Requirements Specification from Use Cases Flowing the conversation into requirements Mapping to functional specifications Adding non-functional requirements Relating use cases to other artifacts Wire diagrams and user interface specifications Tying use cases to test cases and scenarios Project plans and project schedules Relationship between Use Cases and Functional Specifications System use cases Reviewing business use cases Balancing use cases Use case realizations Expanding and explaining complexity Activity diagrams State Machine diagrams Sequence diagrams Activity Diagrams Applying what we know Extension points Use case chaining Identifying decision points Use Case Good Practices The documentation trail for use cases Use case re-use Use case checklist Summary What did we learn, and how can we implement this in our work environment?
Use Cases for Business Analysis: In-House Training The use case is a method for documenting the interactions between the user of a system and the system itself. Use cases have been in the software development lexicon for over twenty years, ever since it was introduced by Ivar Jacobson in the late 1980s. They were originally intended as aids to software design in object-oriented approaches. However, the method is now used throughout the Solution Development Life Cycle from elicitation through to specifying test cases, and is even applied to software development that is not object oriented. This course identifies how business analysts can apply use cases to the processes of defining the problem domain through elicitation, analyzing the problem, defining the solution, and confirming the validity and usability of the solution. What you will Learn You'll learn how to: Apply the use case method to define the problem domain and discover the conditions that need improvement in a business process Employ use cases in the analysis of requirements and information to create a solution to the business problem Translate use cases into requirements Getting Started Introductions Course structure Course goals and objectives Foundation Concepts Overview of use case modeling What is a use case model? The 'how and why' of use cases When to perform use case modeling Where use cases fit into the solution life cycle Use cases in the problem domain Use cases in the solution domain Use case strengths and weaknesses Use case variations Use case driven development Use case lexicon Use cases Actors and roles Associations Goals Boundaries Use cases though the life cycle Use cases in the life cycle Managing requirements with use cases The life cycle is use case driven Elicitation with Use Cases Overview of the basic mechanics and vocabulary of use cases Apply methods of use case elicitation to define the problem domain, or 'as is' process Use case diagrams Why diagram? Partitioning the domain Use case diagramming guidelines How to employ use case diagrams in elicitation Guidelines for use case elicitation sessions Eliciting the problem domain Use case descriptions Use case generic description template Alternative templates Elements Pre and post conditions Main Success Scenario The conversation Alternate paths Exception paths Writing good use case descriptions Eliciting the detailed workflow with use case descriptions Additional information about use cases Analyzing Requirements with Use Cases Use case analysis on existing requirements Confirming and validating requirements with use cases Confirming and validating information with use cases Defining the actors and use cases in a set of requirements Creating the scenarios Essential (requirements) use case Use case level of detail Use Case Analysis Techniques Generalization and Specialization When to use generalization or specialization Generalization and specialization of actors Generalization and specialization of use cases Examples Associating generalizations Subtleties and guidelines Use Case Extensions The <> association The <> association Applying the extensions Incorporating extension points into use case descriptions Why use these extensions? Extensions or separate use cases Guidelines for extensions Applying use case extensions Patterns and anomalies o Redundant actors Linking hierarchies Granularity issues Non-user interface use cases Quality considerations Use case modeling errors to avoid Evaluating use case descriptions Use case quality checklist Relationship between Use Cases and Business Requirements Creating a Requirements Specification from Use Cases Flowing the conversation into requirements Mapping to functional specifications Adding non-functional requirements Relating use cases to other artifacts Wire diagrams and user interface specifications Tying use cases to test cases and scenarios Project plans and project schedules Relationship between Use Cases and Functional Specifications System use cases Reviewing business use cases Balancing use cases Use case realizations Expanding and explaining complexity Activity diagrams State Machine diagrams Sequence diagrams Activity Diagrams Applying what we know Extension points Use case chaining Identifying decision points Use Case Good Practices The documentation trail for use cases Use case re-use Use case checklist Summary What did we learn, and how can we implement this in our work environment?