MySQL for developers training course description This MySQL Developers training course is designed for MySQL Developers who have a good understanding of a MySQL database and experience of using SQL commands. The course provides further practical experience in more advanced MySQL commands and SQL statements including Stored Routines, Triggers and Event Scheduling. What will you learn Provide the skills needed to write more advanced queries and database maintenance statements on a MySQL database. Use advanced features of the MySQL Client. Use advanced data types. Manage the structure of databases and tables. Manage and using indexes. Write complex SQL query statements. Use advanced SQL expressions. Use advanced SQL functions. Perform advanced Insert, Update, Delete, Replace and Truncate Operations. Use user variable syntax and properties. Import and export data from within MySQL. Import and export data from the command line. Perform complex joins to access multiple tables. Perform complex subqueries. Create, manage and us views. Use prepared statements. Create and use stored routines. Create and use triggers. Obtain database metadata. Optimize queries. Work with the main storage engines. Debug MySQL applications. MySQL for developers training course details Who will benefit: MySQL Developers who have a basic understanding of a MySQL database and SQL commands as covered on the Introduction to MySQL course. Prerequisites: MySQL foundation Duration 5 days MySQL for developers training course contents Introduction Administration and Course Materials, Course Structure and Agenda, Delegate and Trainer Introductions. Client/server concepts MySQL client/server architecture, Server modes, Using client programs, Logging in options, Configuration files, Precedence of logging in options Hands on Using client/server The MySQL client program Using MySQL interactively, The MySQL prompts, Client commands and SQL statements, Editing, Selecting a database, Help, Safe updates, Using script files, Using a source file, Redirecting output into a file, Command line execution, Mysql output formats, Overriding the defaults, Html and xml output, MySQL Utilities. Hands on Using the MySQL client program Data types Bit data type, Numeric data types, Auto_increment, Character string data types, Character sets and collation, Binary string data types, Enum and Set data types, Temporal data types, Timezone support, Handling Missing Or Invalid Data Values, SQL_MODE options. Hands on Using data types Identifiers Using Quotes with identifier naming, Case sensitivity in Identifier naming, Qualifying columns with table and database names, Using reserved words as identifiers, Function names Hands on Using identifiers Databases Database properties, Creating a database, Selecting a database, Altering databases, Dropping databases, Obtaining database metadata, The SHOW command, The INFORMATION_SCHEMA database, The SHOW CREATE command Hands on Using databases Tables and indexes Table properties, Creating tables, Create table using Select or Like, Temporary tables and memory tables, Altering tables, Adding columns, Changing column widths and types, Renaming columns, Dropping columns, Adding constraints, Dropping constraints, Renaming tables, Change the table storage engine, Multiple alterations, Dropping tables, Emptying tables, Obtaining table metadata, Show create table, The information_schema, Index introduction, Structure of a mysql index, Creating and dropping indexes, Creating an index, Altering a table to add an index, Specifying index type, Dropping indexes, Obtaining Index Metadata. Hands on Creating, altering and dropping tables/indexes Querying for data The SQL select statement and MySQL differences, Advanced order by, Order by and collation, Order by with enum datatype, Order by with Set datatype, Ordering with distinct and group by Special features of union, Limit and order by clauses, Group By clause, Group_concat, Using Rollup in a Group By clause. Hands on Querying for data SQL Expressions and functions Components of expressions, Nulls, Numeric expressions, String expressions, Temporal expressions, Comparison functions, Flow control functions, Numeric functions, String functions, Temporal functions. Hands on Using expressions and functions Updating data Update operations and privileges, Inserting rows, Insert using a set clause, Inserting duplicate values, Replacing rows, Updating rows, Update using the order by and limit clauses, Deleting rows, The delete and truncate statements. Exercise: Inserting, updating, replacing and deleting data Connectors MySQL client interfaces, MySQL connectors, Oracle and community conectors, Connecting to MySQL server using Java and PHP connectors, MySQL and NoSQL, Innodb integration with memcached. Obtaining database metadata What is metadata?, The mysqlshow utility, The show and describe commands, Describing tables, The information_schema, Listing tables, Listing columns, Listing views, Listing key_columns_usage. Hands on Obtaining database metadata Debugging Mysql error messages, The show statement, Show errors, Show count(*) errors, Show warnings, Show count(*) warnings, Note messages, The perror utility. Hands on Debugging Joins Overview of inner joins, Cartesian product, Inner joins with original syntax, Non equi-join, Using table aliases to avoid name clashes, Inner Joins With ISO/ANSI Syntax, Outer Joins, Left outer joins, Right outer joins, Full outer joins, Updating multiple tables simultaneously, Updating rows in one table based on a condition in another, Updating rows in one table reading data from another, Deleting from multiple tables simultaneously, Deleting rows in one table based on a condition in another. Hands on Coding joins Subqueries Types of subquery, Multiple-column subqueries, Correlated subqueries, Using the ANY, ALL and SOME operators, Using the EXISTS operator, Subqueries as scalar expressions, Inline views, Converting subqueries to joins, Using subqueries in updates and deletes. Hands on Coding subqueries Views Why views are used, Creating views, View creation restrictions, View algorithms, Updateable views, Altering and dropping views, Displaying information about views, Privileges for views. Hands on Using views Import and Export Exporting using SQL, Privileges required to export data, Importing using SQL, Messages when loading data, Privileges required to load data, Exporting from the command line, Mysqldump main options, Importing from the command line, Mysqlimport main options. Hands on Importing and exporting User variables and prepared statements Creating User variables, User variables in a select, Prepared statements, The prepare statement, The execute statement, The deallocate statement, Using prepared statements in code, with connectors. Hands on Using variables and prepared statements Introduction to stored routines Types of stored routines, Benefits of stored routines, Stored routine features, Differences between procedures and functions, Introduction to the Block, Declaring variables and constants, Assigning values to variables, Definer rights and invoker rights, Using SELECT in stored routines, Altering and dropping stored routines, Obtaining stored routine metadata, Stored routine privileges and execution security. Hands on Writing simple stored routines Stored routines - program logic The IF .. THEN .. ELSEIF construct, The CASE statement, The basic loop, The while loop, The repeat loop, The iterate statement, Nested loops. Hands on Writing stored routines with program logic Stored routines - exception handlers and cursors Dealing with errors using Exception handlers, Cursors, What is a cursor?, Cursor operations, Declaring cursors, Opening and closing cursors, Fetching rows, Status checking. Hands on Writing stored routines with program logic Procedures with parameters Creating procedures with parameters, Calling Procedures With Parameters. Hands on Writing stored routines with parameters Functions What is a function?, The create function statement, Executing functions, Executing functions from code, Executing functions from SQL statements, The deterministic and SQL clauses. Hands on Writing functions Triggers Trigger creation, Restrictions on triggers, The create trigger statement, Using the old and new qualifiers, Managing triggers, Destroying triggers, Required privileges. Hands on Writing triggers Basic optimizations Normalisation of data to third normal form, Using indexes for optimization, General query enhancement, Using Explain to analyze queries, Choosing an INNODB or MYISAM storage engine, Using MySQL Enterprise Monitor in query optimization. Hands on Making use of basic optimizations More about indexes Indexes and joins Hands on Investigating indexes and joins
Enhancing Performance with Productive Conflict: In-House Training Most organizations have typically held the belief that workplace conflict is something that needs to be prevented, resolved, and/or mitigated. After all, conflict creates stress and leads to a variety of performance problems and very real costs. However, what savvy organizations have come to embrace is the understanding that when conflict is truly understood and harnessed, it can be utilized to not only add value to teams, but also enhance workplace performance. Conflict can be productive and make organizations better! Learners will explore the results of a formal, personalized, conflict-related assessment, uncovering targeted nuances of their conflict responses in action. Participants will learn to use basic strategies which allow them to transform destructive conflict responses into more productive ones, especially in the moment when they are happening. What you will Learn At the end of this program, you will be able to: Apply different models for understanding the lifecycle and dynamics of conflict Describe a physiological response to conflict and its impact on communication Recognize the correlation between a person's conflict style and how they respond to conflict Identify your own default responses to conflict and catch them in action Reframe automatic negative thoughts to create more positive interpersonal outcomes Utilize various tactics and strategies to transform destructive conflict responses into productive ones Getting Started Introductions and social agreements Course goal and objectives Opening activities Module 1: The Dynamics and Anatomy of Conflict Conflict basics Dynamics of conflict The anatomy of conflict Module 2: Conflict Styles and Conflict Conflict through the conflict style lens Exploring your style in conflict Destructive responses to conflict Module 3: Changing Your Response to Conflict Changing your conflict response Three steps to productive conflict Choosing a productive conflict response
Face to face One to one.
This training gives an opportunity to focus on how to embed effective approaches to meeting emotional needs in schools. We explore a range of ways into meeting emotional needs of pupils across a school. We focus on including pupils with extreme emotional needs. Course Category Meeting emotional needs Description This training gives an opportunity to focus on how to embed relevant ideas and materials in schools. We explore how to make these materials really come to life as we explore a range of ways into meeting emotional needs of pupils across a school. We focus on including pupils with extreme emotional needs. There are lots of opportunities for personal and professional reflection on engagement with challenging pupils as we provide processes to support reflection, visioning and problem solving. Testimonials ‘Thank you so much for the work you did with us yesterday – I have since been in 2 schools today and have spoken to an number of other colleagues who were present – all were totally overwhelmed by the session – they loved it.”NOTTINGHAM SEAL COORDINATOR “I was totally blown away, when I realised how passionate people were about SEAL” “So nice to reflect and realise what a long way we have come” “That was so powerful and motivational”.’ Learning Objectives Shared vision of a school that is truly meeting all social and emotional needs Access to a wider range of practical strategies to impact on meeting emotional and behaviour problems Deeper understanding of how to embed positive Mental Health approaches in a school Opportunity to reflect on professional attitudes and behaviour towards children with emotional challenge Who Is It For? All practitioners who are leading on Mental Health work in schools or on behalf of a Local Authority Full range of agencies committed to meeting social and emotional needs in schools Course Content The training explores the questions: What would a school look like when Mental Health was truly part of everything that was happening, a shared vision? How can we truly embed Mental Health approaches and materials in our school? What can we do to meet complex and challenging emotional needs in schools? Can we learn a process to understand at a deeper level highly complex social and emotional needs? This training will cover: Bringing positive Mental Health approaches to life in schools: creating a shared vision and a set of grounded goals together Circle of Adults process for self-reflection and understanding emotional needs of high profile pupils. We will model and teach how this process links in and strengthens PSHE work in schools. If you liked this try: FRESH APPROACHES TO BEHAVIOUR AND RELATIONSHIPS or: RESTORATIVE INTERVENTIONS
RF fundamentals training course description Radio Frequency engineering is an important yet often overlooked area in today's wireless world. This course provides a grounding in RF theory and practice for wireless, cellular and microwave systems. What will you learn Explain the basics of RF. Describe RF propagation and antenna principles. Calculate propagation losses and link budgets. Test RF systems. RF fundamentals training course details Who will benefit: Those working with wireless, cellular and microwave systems. Prerequisites: None. Duration 2 days RF fundamentals training course contents What is RF? Definition of RF, RF wave characteristics: Frequency, wavelength, power, phase, impedance, RF history, radio signals, frequency bands, safety issues, legal issues. RF systems Microwaves, cellular/mobile RF, WLANs, other fixed wireless networks, basic RF components. Hands on Building a basic WLAN network. RF system components Transmitters: Antennas: Isotropic, Dipole, how antennas achieve gain. Modulation Schemes, bandwidth, AM, FM, FSK, PSK, QAM, QPSK, interference, performance. Hands on Interference and performance. Multiple access schemes FDMA, CDMA, TDMA, CSMA/CA. Wireless systems Cellular (GSM, UMTS), Wifi, WiMax, others: GPS, DBS, RFID, radar, Bluetooth. Hands on cellular. Spread Spectrum technologies Spread spectrum benefits and disadvantages, how it works, Direct Sequence, Frequency Hopping, hybrids. RF propagation Models, link budget, Smith chart, RF matching with the Smith chart. cell capacity, tradeoffs: power vs. bandwidth, free space, reflection, diffraction, multipath cancellation, propagation prediction and measurement tools. Hands on Smith charts. RF testing Why power rather than voltage/current, units of power, dB and dBm power conversions. Test equipment: signal generators, power meters, network analysers, spectrum analysers. RF test setups: return loss, insertion loss. Hands on RF testing.
Duration 3 Days 18 CPD hours This course is intended for Participants must possess a valid data centre training certificate such as CDCP or any other approved equivalent. Please submit a copy of your certificate for verification upon registration for the CTDC course. Overview After completion of the course the participant will be able to:1. Learn to properly comprehend and apply the ANSI/TIA-942 Standard requirements and guidelines2. Understand the proper intent of the ANSI/TIA-942 Standard to avoid both over- and/or under-investment3. Align the selection of redundancy levels and infrastructure investments to the business requirements.4. Understand the criteria and requirements for a high-availability data centre design and how to effectively establish the data centre from the perspective of the ANSI/TIA-942 Standard5. Understand how the ANSI/TIA-942 Standard relates to various worldwide standards This course, the participant will learn how to design an ANSI/TIA-942 compliant data centre. It will provide a clear understanding of the requirements of the ANSI/TIA-942 Standard and possible implementation variations. Introduction to Data Centre Facilities About the ANSI/TIA-942 Life of the ANSI/TIA-942 Standard Relation to other standards Architectural Electrical Mechanical Telecommunication Areas under scope High level redundancy definitions Redundancy options (N, N+1 etc.) Fault tolerant Concurrent maintainability Compartmentalisation Examples of redundancy levels Data Centre Space PlanningData Centre TopologiesRecommendations for Energy EfficiencyArchitectural Site selection Parking Multi-tenant building Building construction Vapor barrier Roofing Floor loading Raised flooring Suspended/drop ceiling Hanging load Seismic Building Security & Safety Security CCTV Staffing Bullet/ballistic proofing Lighting Safety - Signage Building and Room Access Security checkpoints Entry lobby Doors and windows Exit corridors Shipping and receiving areas Room/Area Design Requirements Administrative offices Security offce Operations centre Restroom and break room UPS/Battery rooms Generator and fuel storage area Computer room Electrical Utility power - Substation - Feed requirements - Self-generation HT/HV switch gear Generator and fuel supply LT/LV switch gear - ATS - Alternatives to ATS UPS and batteries PDU STS Grounding Surge protection EPO Central power monitoring Load banks Testing Equipment maintenance - Preventive maintenance - Facility training programs Mechanical Environmental design - Temperature and humidity requirements - Contamination - Sources - Clean air - Pressurisation - Radio sources - Vibration - Water ingress Water cooled systems - Heat rejection - Chilled water system - Condenser water? - Make up water Air cooled systems HVAC control systems Plumbing - Pipe routing Fire suppression Water leak detection Telecommunications Network topology Redundancy level design Media and connectors Cabling pathways Detailed cabling design considerations Administration and labeling Cable testing Data centre fabrics Exam: Certified TIA-942 Design Consultant Actual course outline may vary depending on offering center. Contact your sales representative for more information.
Securing UNIX systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure UNIX accounts. Secure UNIX file systems. Secure UNIX access through the network. Securing UNIX systems course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing UNIX systems course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.
Whio is this Course for? Essential to Intermediate Adobe Illustrator Training Ideal for beginners, this course covers vector graphics, logos, icons, and illustrations. Learn typography, color theory, and compositions. Our certified tutors offer personalized guidance, and flexible scheduling options are available to accommodate your needs. Click here for more info: Website Duration: 6 hours Approach: 1-on-1 sessions and custom-tailored content. Schedule: Available Mon to Sat from 9 am to 7 pm, designed to fit your convenience. Course Title: Essential Adobe Illustrator Training Duration: 6 Hours Session 1: Introduction to Adobe Illustrator (1 hour) Overview of Illustrator interface and tools Understanding vector graphics and their advantages Creating and managing artboards Basic shape creation and editing techniques Session 2: Mastering Shapes and Paths (1 hour) Advanced shape manipulation: Pathfinder and Shape Builder tools Working with the Pen tool: curves, anchor points, and handles Creating complex shapes and compound paths Understanding the Appearance panel for object styling Session 3: Typography and Text Effects (1 hour) Text formatting: fonts, styles, and spacing Working with text on paths and shapes Applying text effects and blending modes Creating stylized typography and lettering Session 4: Image Tracing and Live Paint (1 hour) Image tracing techniques: converting raster to vector Live Paint feature for intuitive coloring of objects Creating detailed illustrations using traced images Incorporating images into your vector artwork Session 5: Advanced Illustration Techniques (1 hour) Gradient and pattern fills: customization and application Advanced brush techniques for artistic effects Using the Appearance panel for intricate object styling Incorporating 3D effects and perspective tools Session 6: Project-Based Learning and Q&A (1 hour) Guided hands-on project incorporating learned techniques Instructor-led review and feedback on projects Open Q&A session to address participant queries and challenges Upon completing this course, participants will have gained proficiency in essential and advanced Illustrator techniques, empowering them to create intricate vector graphics, logos, icons, and illustrations efficiently and creatively. Learning Outcomes: Upon completing the course, participants will: Master Illustrator Tools: Proficiency in essential Illustrator tools for vector graphic creation. Creative Expertise: Advanced skills in typography, image tracing, coloring, and intricate illustration techniques. Problem-Solving: Develop problem-solving abilities for complex design challenges. Job Opportunities: Graphic Designer: Create branding materials, logos, and marketing collateral. Illustrator Artist: Produce detailed digital artwork and illustrations for various media. UI/UX Designer: Design user interfaces for websites and mobile applications. Freelance Illustrator: Offer custom vector illustrations for clients and projects. Logo Design Specialist: Craft unique and memorable logos for businesses and brands. Skills Acquired: Participants in the Essential to Intermediate Adobe Illustrator Training will acquire fundamental to intermediate skills in vector graphic design, drawing, and illustration using Adobe Illustrator. Key skills include: Basic to Intermediate Vector Graphic Design Drawing and Illustration Techniques Precision Path Editing and Typography Skills Job Opportunities: Upon completion, individuals can pursue roles such as: Junior Graphic Designer Illustrator Assistant Layout Designer Marketing Material Creator This training lays the foundation for a career in graphic design, enabling participants to contribute effectively to design teams, advertising agencies, and creative projects. Featuring certified instructors with extensive professional expertise in the application. Attend in-person sessions at our center or join live online classes. The training is interactive and practical, blending theory with step-by-step demonstrations on Illustrator software. Delegates practice techniques on both Windows and Mac computers, ensuring universal compatibility. Upon completion, receive a comprehensive Illustrator training guide in your preferred format: printed or PDF. Earn an e-certificate as proof of completing the accredited course. Enjoy lifelong email support for any post-training queries. No prior Illustrator knowledge is needed. Our commitment includes delivering exceptional value, ensuring comprehensive learning, and accommodating both the 2023 version and recent releases of Illustrator.
5G training course description This course is designed to give the delegate an understanding of the technologies and interworking requirements of the next generation of cellular communications. It is not a definitive set of descriptions but a possibility of the final deployment. During the course we will investigate the 10 pillars for 5G, which will include various Radio Access Technologies that are required to interwork smoothly. Hence we will look at the 4G Pro features and other RATs. What will you learn List the ten pillars of 5G deployment. Explain the 5G Internet and Software Distributed Networks (SDN). Explain carrier aggregation, the mobile cloud and RAT virtualisation. Explain an overall picture of 5G architecture. 5G training course details Who will benefit: Anyone who is looking to work with next generation networks. Prerequisites: Mobile communications demystified Duration 3 days 5G training course contents Drivers for 5G 5G Road Map, 10 Pillars of 5G, evolving RATs, small cell, o SON, MTCm, mm-wave, backhaul, EE, new spectrum, spectrum sharing, RAN virtualisation. 4G LTE advanced features *MIMO, Downlink & uplink MIMO R8, MIMO technology in LTE advanced, Downlink 8-layer SU-MIMO, Downlink MU-MIMO, Uplink MU-MIMO, Uplink transmit diversity, Coordinated multi-point operation (CoMP), Independent eNB & remote base station configurations, Downlink CoMP, * Uplink Multi-Cell Reception. ICIC & eICIC ICIC, Homogeneous to heterogeneous network, eICIC, Macro-pico scenario, Macro-femto scenario, Time orthogonal frequencies. Almost Blank Subframe (ABS). Carrier aggregation Component carriers (CC), * CC aggregation, Intra-band contiguous solutions, Intra-band non-contiguous solutions, Inter-band non-contiguous solutions, CA bandwidth classes, Aggregated transmission bandwidth configurations (ATBC), Possible carrier aggregation configurations (Rel 9, 10 & 12). Enhanced Interference Mitigation & Traffic Adaptation (eIMTA) TDD UL-DL reconfiguration for traffic adaptation, Reconfiguration mechanisms, Interference mitigation schemes, Dynamic & flexible resource allocation. 5G architectures 5G in Europe, horizon 2020 framework, 5G infrastructure PPP, METIS project, innovation centre, 5G in North America, research, company R & D, 5G specifications. The 5G internet Cloud services, IoT & context awareness, network reconfiguration & virtualization support, hypervisors, SDN, the controller, service-oriented API, OpenFlow switches, SDN operation, SDN control for traffic flow redirection, OpenFlow controllers, how SDN works, application, control and infrastructure layers, a programmable network, how SDN & NFV tie together, SDN's downside, SDN orchestration, Mobility, architectures for distributed mobility management, MEDIEVAL & MEDIVO projects, a clean slate approach, mobility first architecture, network virtualization (VNet), INM, NetInf, ForMux, MEEM, GP & AM, QoS support, network resource provisioning, IntServ, RSVP, DiffServ, CoS, aggregated resource provisioning, SICAP, MARA, Emerging approach for resource over-provisioning, example use case architecture for the 5G internet, integrating SDN/NFV for efficient resource control, control information repository, service admission control policies, network resource provisioning, control enforcement functions, network configurations, network operations. Small cells for 5G Average spectral efficiency evolution, What are small cells? WiFi & Femto cells as candidate small-cell technologies, Capacity limits & achievable gains with densifications, gains with multi-antenna techniques, gains with small cells, Mobile data demand, approach & methodology, subscriber density projections, traffic demand projections, global mobile data traffic increase modelling, country level backhaul traffic projections, 2020 average spectrum requirement, Small cell challenges, backhaul, spectrum, automation. Cooperation for next generation wireless networks Cooperative diversity & relaying strategies, Cooperative ARQ & MAC protocols, NCCARQ & PRCSMA packet exchange, Physical layer impact on MAC protocol, NCCARQ overview, PHY layer impact, Performance evaluation, simulation scenario and results. Mobile clouds; technology & services for future communications platforms Mobile cloud, software, hardware and networking resources, Mobile cloud enablers, mobile user domain, wireless technologies, WWAN WLAN and WPAN range, Bluetooth, IEEE.802.15.4, software stacks, infrared, near field communications (NFC), store & forward vs compute & forward, random/linear network coding. Security for 5G communications Potential 5G architectures, Security issues & challenges in 5G, user equipment, mobile malware attacks, 5G mobile botnets, attacks on 4G networks, C-RNTI & packet sequence numbers based UE location tracking, false buffer status reports attacks, message insertion attacks, HeNB attacks, physical attacks, attacks on mobile operator's network, user data & identity attacks, DDoS attacks, amplification, HSS saturation, external IP networks.
Driver CPC Training