Essential EVPN training course description Ethernet VPN (E-VPN) and Provider Backbone Bridging E-VPN (PBB-EVPN) are emerging technologies providing Ethernet services over MPLS. This course studies the technologies in E-VPN/PBB-EVPN providing multi-homing, multi pathing, auto discovery, multicast, forwarding and fast convergence. What will you learn Differentiate between E-VPN and PBB-EVPN. Explain how E-VPN operates. Explain how PBB-EVPN operates. Explain how E-VPN provides: Multi homing Multi pathing Auto discovery. Essential EVPN training course details Who will benefit: Network engineers. Staff working for carriers. Prerequisites: Definitive Ethernet switching for engineers Concise MPLS for engineers Duration 2 days Essential EVPN training course contents Introduction to EVPN Network virtualization What Is network virtualization? types of virtual networks, network tunnelling, the consequences of tunnelling, packet load balancing, network interface card behaviour. maximum transmission unit, lack of visibility, VXLAN, protocols to implement the control plane, support for network virtualization technologies, merchant silicon Software, standards. The building blocks of Ethernet VPN A brief history of EVPN, architecture and protocols for traditional EVPN deployment, EVPN in the data center BGP constructs for Virtual networks, address family indicator/subsequent address family indicator, route distinguisher, route target, RD, RT, and BGP processing, route types, modifications to support EVPN over eBGP, keeping the NEXT HOP unmodified, retaining route targets, FRR support for EVPN, automatic propagation of NEXT HOP, RT/RD derivation, what Is not supported in FRR. Bridging with Ethernet VPN An overview of traditional bridging, overview of bridging with EVPN, what Ifs, why does NVE L3 get an advertisement for MACA? handling BUM packets, handling MAC moves, support for dual-attached hosts, the host-switch Interconnect, VXLAN model for dual-attached hosts, switch peering solutions, handling Link failures, duplicate multi-destination frames, ARP/ND suppression. Routing with Ethernet VPN The case for routing in EVPN, routing use cases in the data center, routing models, where is the routing performed? centralized routing, distributed routing, how routing works in EVPN, asymmetric routing, symmetric routing, VRFs in EVPN routing, summarized route announcements, BGP support for EVPN routing, comparing asymmetric and symmetric models, vendor support for EVPN routing. Configuring and administering Ethernet VPN The sample topology, configuration cases, configuring the MTU, the end first: complete FRR configurations, the Invariants: configuration for the spines, firewall, and servers, centralized routing, asymmetric distributed routing, symmetric routing, dissecting the configuration, configuring the underlay, configuring the overlay: FRR configuring the overlay: interfaces, examining an EVPN network, show running configuration, show BGP summary, show EVPN VNIs and VTEPs, identify which VTEP advertised a MAC address, comparing FRR and Cisco EVPN configurations, considerations for deploying EVPN in large networks.
LOOKING FOR: PICTURE BOOK TEXTS / ILLUSTRATIONS Lucy Brownridge is a Commissioning Editor at Wide Eyed Editions and Frances Lincoln Children’s Books, and formerly Thames & Hudson where she helped to establish the Children’s list. She has developed and edited books for children with Alan Ahlberg, Quentin Blake, Bruce Ingman, Sandra Dieckmann, Yuval Zommer and Joe Coelho among others. She is the author of Illuminightmare as well as the Portrait of an Artist and Art Masterclass series. She is interested in the history of picture books and is always looking for innovative ways to use the book format. Her favourite books are funny, deceptively simple, thoughtfully written, distinctively illustrated and encourage a love for reading both words and pictures. Lucy would like you to submit the following depending on whether you are a picture book writer / illustrator or both. ABOUT YOU Include a covering letter, in a word document, telling Lucy about yourself and your sources of inspiration. If you have one, include a link to your website. She is keen to read stories she hasn't seen before or see artwork with a distinctive style rather than something that fits with trends. She has particular experience with picture books and illustrated narrative non-fiction. AUTHORS Please send a full manuscript (or 3), in a word document, starting with a short summary/blurb. Make the summary punchy and engaging. Remember that the best picture book stories are simple and every word should count. Do you see this book as part of a series? ILLUSTRATORS If you have a picture book idea please send a story board and a summary of the story. Please send a diverse selection of artworks from your portfolio. It is useful to see examples of the following: people of different ages and ethnicities, character studies showing a range of clothes and expressions, animals, a selection of everyday objects, wide-angle vistas, an example of a book cover (i.e. a classic book reimagined). Please send these in PDF where possible. (In addition to the paid sessions, Lucy is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print). By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Monday 27th January 2025
LOOKING FOR: ADULT FICTION, NON-FICTION Liza represents a range of fiction and non-fiction. On the fiction side, she is looking for historical fiction that is well researched, immerses readers in the era, and looks at overlooked characters from the past, or perhaps gives a new spin on someone we think we know. On the literary and upmarket side, she is looking for novels infused with emotions that capture the human experience and make readers think. If your literary novel is something at A24 productions might turn into a movie, this is Liza’s taste. When it comes to fantasy, she loves urban and grounded fantasy (no sci-fi please!), and is always happy to look at anything with a vampire, werewolf, witches, warlocks, fairies, and perhaps a sinister selkie or two. She is also very much looking for romantasy and is the best person at the agency to submit that too. For thrillers, send her anything set in an exotic location, high-concept, or things with a speculative twist. She loves when characters are put in situations she would never want to be in, and then they have to get out of it. Her recent favourite fiction includes: Notes on an Execution, Lady Macbethad, Hamnet, A Discovery of Witches, House of Earth and Blood, The Starless Sea, Piranesi, Our Wives Under the Sea, The Pisces, Such A Fun Age. When it comes to non fiction, she is looking for books that teach her something new or reframe a topic from an alternative point of view. This can include cookery, pop science, and social history. Liza’s recent favourite non-fiction include: The Five, A History of Art Without Men, Messalina, The Authority Gap, Finding The Mother Tree, Cook This Book, Dessert Person. Liza would like you to submit a covering letter, 1 - 2 page synopsis and the first 5000 words of your manuscript in a single word document. (In addition to the paid sessions, Liza is kindly offering one free session for low income/underrepresented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print). By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Monday 27th January 2025
Mikrotik routers training course description A fast paced practical hands on introduction to Mikrotik routers concentrating on basic product knowledge needed for the real world. Starts with the basics of accessing the routers through configuring static routes, RIP and OSPF, ending with firewalls. Hands on sessions follow all the major chapters. What will you learn Use Winbox. Use the Mikrotik command line. Perform basic troubleshooting. Configure Interfaces, RIP and OSPF. Perform housekeeping tasks such as: - save and load configurations - upgrade the OS - recover lost passwords Mikrotik routers training course details Who will benefit: Anyone who will be working with Mikrotik routers. Prerequisites: TCP/IP foundation for engineers Duration 2 days Mikrotik routers training course content Mikrotik routers RouterOS, RouterBoard. System resources. Getting started Accessing the router, Winbox, Webfig, Quickset. telnet. The command line interface Contexts, online help, basic troubleshooting. Configuring Interfaces Basics, Enabling interfaces. Ethernet, loopback interfaces. Adding IP addresses. Static routes Why use static routes? Configuring static routes, default routes. Configuring RIP How RIP works, configuration, troubleshooting. OSPF Configuration and troubleshooting. Housekeeping Configuration management, offline editing and FTP usage. RouterOS upgrades. Packages. Bypassing passwords. Other functions DHCP server. Firewall Connections, chains, actions, filters.
Hardening Cisco devices training course description A hands on course focusing on how to lock down Cisco IOS routers and switches. What will you learn Harden Cisco devices. Hardening Cisco devices training course details Who will benefit: Technical network staff. Technical security staff. Prerequisites: TCP/IP foundation for engineers. Duration 5 days Hardening Cisco devices training course content Introduction Router security, Switch security, Cisco IOS, IOS versions, Cisco advisories, the management plane, control plane, data plane. Hands on Checking IOS versions and advisories. Access control Infrastructure ACLs, Transit ACLs. Hands on Restricting access to the device, Filtering data traffic. Management plane: Securing operations Passwords, privilege levels, AAA, TACACS+, RADIUS. Hands on Password management. Management plane: Other general hardening Logging best practices, secure protocols, encrypting management sessions, configuration management. Hands on Hardening the management plane. Control plane Disabling reception and transmission of certain messages, Limiting CPU impact of control plane traffic, securing routing protocols. Hands on Hardening the control plane. Data plane Transit ACLs, disabling unused services, disabling unnecessary protocols, anti spoofing, limiting CPU impact of data plane traffic, identifying and tracing traffic, Netflow, VLANs, port security. Hands on hardening the data plane.
Sockets programming training course description A hands on course for programmers using Sockets. It is important to recognise that the course assumes that delegates are already familiar with TCP/IP and Python. Practical exercises follow all the major theory sessions. What will you learn Read Python programs which use Sockets. Write Python programs which use Sockets. Debug Python programs which use Sockets. Sockets programming training course details Who will benefit: Programmers working with network applications. Prerequisites: TCP/IP foundation for engineers Python for network engineers Duration 2 days Sockets programming training course contents What is a socket? Review of IP, ICMP, UDP vs TCP, IP addresses, protocol numbers, ports. API's, UNIX I/O, sockets. SOCK_STREAM, SOCK_DGRAM. Hands on Compile and run code. The systems calls Clients and servers, structs, socket(), bind(), connect(), listen(), accept(), send(), recv(), sendto (), recvfrom(), close(), shutdown(), getpeername(), gethostname(). Hands on Walk through of example client and server code. First code TCP connections, passive opens, active opens. Hands on Write a simple 'hello world' server and client. Application protocols User character stream, ASCII turn taking, binary protocols. Hands on Raw SMTP, Writing a mail client. Clients Concurrency, polling, threads, event driven programming. Hands on Conferencing application. Servers Concurrency, stateful, stateless. Forks and execs. inetd. Hands on Running servers with and without inetd, chroot jails, conferencing server modifications. Advanced techniques Blocking, select(), partial send(s). Raw sockets, example sockets using Java, Perl and PHP. Hands on A broadcast application.
Carrier Ethernet training course description Ethernet is now the interface of choice for nearly all networking. This comprehensive course looks at the ways carriers can provide this Ethernet interface for their WANs and MANs. The course assumes delegates already have a solid foundation in Ethernet switching and so concentrates on just the Ethernet technologies for Carrier Ethernet. What will you learn Describe the main Carrier Ethernet services. Evaluate transports for Carrier Ethernet. Explain how Ethernet can work over MPLS and SDH. Explain the Ethernet technologies used to enable Carrier Ethernet. Carrier Ethernet training course details Who will benefit: Network engineers. Staff working for carriers. Prerequisites: Definitive Ethernet switching for engineers. Duration 2 days Carrier Ethernet training course contents Introduction What is Ethernet? LANs, MANs, WANs, Ethernet and switches in the LAN. Traditional LAN/WAN integration, routers. The Ethernet interface for the WAN. Standards: IEEE, MEF, OIF, Ethernet Alliance. Carrier Ethernet Services E-line: EPL, EVPL. E-LAN: EP-LAN, EVP-LAN. E-Tree: EP-Tree, EVP-Tree. Ethernet Services attributes. Applications: Carrier Ethernet for businesses, Mobile backhaul. Multicasting. Service attributes Bandwidth profiles, bandwidth parameters, Class of Service, QoS, MTU, Protection mechanisms: STP, RSTP, MSTP, Link aggregation, G.8031, G.8032. Transporting Carrier Ethernet The main options. 'Pure' Ethernet, Ethernet over SDH, Ethernet over WDM, Ethernet over MPLS. Ethernet switching, addresses and MAC address tables. Carrier Ethernet access technologies. EFM. Ethernet over MPLS What is MPLS, MPLS-TE, MPLS-VPN, L2 VPNs, VPLS, VPWS. MPLS Fast Reroute. CET 'Pure' Ethernet, Provider bridging 802.1d, Provider Backbone Bridges 802.1ah. Traffic engineering 802.1Qay. Carrier Ethernet technologies 802.1ad VLAN stacking, 802.1AX Link aggregation. 802.1Q QoS. OAM Standards, layers, interworking
Junos Service Provider Switching training course description This course provides students with an overview of switching concepts such as LANs, Layer 2 address learning, bridging, virtual LANs (VLANs), provider bridging, VLAN translation, spanning-tree protocols, and Ethernet Operation, Administration, and Maintenance (OAM). This course also covers Junos operating system-specific implementations. Junos Service Provider Switching is an intermediatelevel course. What will you learn Describe carrier Ethernet. Describe the function of an Ethernet LAN. Implement VLAN tagging. Describe the components of provider bridging. Identify and use available tools to resolve network issues. Configure and monitor Ethernet OAM, ERP, LAG, STP, the RSTP, the MSTP, and the VSTP. Junos Service Provider Switching training course details Who will benefit: Individuals responsible for configuring and monitoring devices running the Junos OS. Prerequisites: Junos Intermediate Routing Duration 2 days Junos Service Provider Switching training course contents Ethernet Switching and Virtual LANs Ethernet LANs Bridging Configuring and Monitoring VLANs Automating VLAN Administration Configuring and Monitoring IRB Layer 2 Address Learning and Forwarding Layer 2 Firewall Filtering Ethernet Switching and VLANs Lab Virtual Switches Routing Instances Overview Configuring and Monitoring Virtual Switches Interconnecting Routing Instances Logical Systems Virtual Switches Lab Provider Bridging Expanding the Bridged Network Provider Bridging Configuring and Monitoring Provider Bridging Provider Bridging Lab Spanning-Tree Protocols Overview of STP Overview of RSTP Overview of MSTP Overview of VSTP Configuring and Monitoring Spanning-Tree Protocols Understanding BPDU, Loop, and Root Protection MSTP Lab Ethernet OAM OAM Overview LFM CFM Configuring and Monitoring Ethernet OAM Ethernet OAM Lab High Availability and Network Optimization ERP Overview Configuring and Monitoring ERP Link Aggregation Group Overview Configuring and Monitoring a LAG MC-LAG Overview Configuring and Monitoring an MC-LAG High Availability and Network Optimization Lab Troubleshooting and Monitoring Introduction to Troubleshooting and Monitoring Troubleshooting and Monitoring Tools Troubleshooting Case Study: Network Congestion Troubleshooting and Monitoring Lab Appendix A: Carrier Ethernet Ethernet in the WAN Ethernet Standards Organizations MX Series Layer 2 Features Appendix B: Deprecated Syntaxes Appendix C: MX Series Overview
ZigBee training course description A hands on course covering the entire ZigBee protocol stack. ZigBee operation, primitives and frame formats are covered in detail using software tools to test and analyse ZigBee commands and demonstrate how these affect the 802.15.4 MAC. Analysers are used to decode packet formats. What will you learn Describe the ZigBee architecture and applications. Explain the workings of ZigBee protocol stack including the 802.15.4, NWK, APS and ZDO sub layers. Describe in detail the ZigBee primitives and how they are used to pass data; make networks; join networks and repair networks. Secure ZigBee networks. ZigBee training course details Who will benefit: Technical staff requiring grounding in ZigBee including application engineers. Prerequisites: RF fundamentals. Duration 2 days ZigBee training course contents Wireless data overview What is 802.15.4 and ZigBee? WLAN, WPAN, Bluetooth vs. ZigBee. Markets. Applications and architecture. ZigBee demonstration. ZigBee Standards and technology The 7-layer model, IEEE WPAN standards overview, 802.15.4 & ZigBee, ZigBee alliance. ZigBee Protocol stack The ZigBee 5 layer model, The network (NWK) sub layer, Application support sub layer (APS), the ZigBee Device Object (ZDO). 802.15.4 Radio Frequencies, modulation, power, DSSS, BPSK/ O-QPSK, channels, symbols, chips and bit rate. 802.15.4 PHY PHY data transfer primitives. The PHY packet. PHY PIB management. 802.15.4 MAC layer The MAC layer overview, CSMA/CA, addresses, frame types, super frames, MAC layer: Data, Data control, Scan and join, PAN maintenance, MAC PIB. Hands on 802.15.4 frame analysis. ZigBee Topologies Point to point topology, star topology, cluster tree, wired integration. Hands on Building a ZigBee network. ZigBee frame formats General frame format, data frames, command frames. Hands on Analysing ZigBee frames. ZigBee NWK NWK data primitives: Request. Confirm. Indication. NWK management primitives: Network discovery, network formation. Permit joining. Start router. Join. Direct join. Leave. Reset. Sync. NWK database management. Hands on NWK analysis ZigBee APS Address mapping, matching devices, binding devices, binding tables. Hands on APS analysis. ZigBee ZDO Device roles, binding requests, initiating and responding, device discovery, service discovery, network management. ZDO Endpoint 0. ZigBee Security Security issues, security modes, MAC security, NWK security, APS security. Applications Writing ZigBee applications, application profiles, End points, Endpoint addressing, clusters of attributes, broadcasts. Hands on Sample ZigBee application.
HOW DANCING CAN IMPROVE YOUR MENTAL AND PHYSICAL HEALTH Move your body to your favourite tunes – it’s the ultimate feel-good exercise and has some surprising effects on both the body and mind Music and dance have been fundamental parts of the human experience for thousands of years. No matter what your favourite tune may be, music can have a huge effect on your wellbeing – Charles Darwin even thought that our ability to make and understand rhythmic beats worked as an early form of communication. Whether or not we still share messages through music, we all know that it can change our mood and studies have shown that we share a natural sense of rhythm (no matter how much you might protest). Dance is therefore a natural outlet, and one which can do a lot to make us feel good. Club Azucar offers corporate dance packages for the workplace in order for your organisation (Companies, Institutions & Schools) not only function at its best, but to be happy and healthy in life. These are the expected benefits for the individual employee which have been also confirmed by the participants: Physical Health: Salsa/Zumba or any Latin Dance Classes improves mobility, coordination / motor skills and fitness level.while being a low-impact exercise which includes people of all ages, abilities and fitness levels Mental Health: Dancing requires full concentration so for one hour away from their desk ,participants will experience reduced stress levels, , feel refreshed and more alert and able to concentrate better following the lesson Music in combination with physical exercise has an uplifting effect through the release of endorphins and dopamine in the body & brain Learning a new skill is proven to train your brain, contribute to prevention of dementia and give the confidence to face new tasks and challenges in other areas of work and life The patience and encouragement of the teachers has furthered this new confidence and sense of achievement and contributed to participants’ belief in themselves and their ability to take themselves out of their “comfort zones” and take on new challenges Getting to know each other in a social rather than work context and learning a new skill together, dancing and laughing together, gives participants a sense of belonging and furthers team buildingDo you want more proof? Get involved and hire us!!! Booking Terms & Conditions 1. The above prices are only for Greater London 2. Fees are non refundable 3. Courses are subject to availability from both parties 4. Train, plane. petrol, or any sort of transport fares are to be refunded. 5. Cancellation must be before 24 hours every class