No-one in business will succeed if they are not financially literate - and no business will succeed without financially-literate people. This is the ideal programme for managers and others who don't have a financial qualification or background but who nonetheless need a greater understanding of the financial management disciplines essential to your organisation. This course will give the participants a sound understanding of financial reports, measures and techniques to make them even more effective in their roles. It will enable participants to: Overcome the barrier of the accountants' strange language Deal confidently with financial colleagues Improve their understanding of your organisation's finance function Radically improve their planning and budgeting skills Be much more aware of the impact of their decisions on the profitability of your organisation Enhance their role in the organisation Boost their confidence and career development 1 Review of the principal financial statements What each statement containsOutlineDetail Not just what the statements contain but what they mean Balance sheets and P&L accounts (income statements) Cash flow statements Detailed terminology and interpretation Types of fixed asset - tangible, etc. Working capital, equity, gearing 2 The 'rules' - Accounting Standards, concepts and conventions Fundamental or 'bedrock' accounting concepts Detailed accounting concepts and conventions What depreciation means The importance of stock, inventory and work in progress values Accounting policies that most affect reporting and results The importance of accounting standards and IFRS 3 Where the figures come from Accounting records Assets / liabilities, Income / expenditure General / nominal ledgers Need for internal controls 'Sarbox' and related issues 4 Managing the budget process Have clear objectives, remit, responsibilities and time schedule The business plan Links with corporate strategy The budget cycle Links with company culture Budgeting methods'New' budgetingZero-based budgets Reviewing budgets Responding to the figures The need for appropriate accounting and reporting systems 5 What are costs? How to account for them Cost definitions Full / absorption costing Overheads - overhead allocation or absorption Activity based costing Marginal costing / break-even - use in planning 6 Who does what? A review of what different types of accountant do Financial accounting Management accounting Treasury function Activities and terms 7 How the statements can be interpreted What published accounts contain Analytical review (ratio analysis) Return on capital employed, margins and profitability Making assets work - asset turnover Fixed assets, debtor, stock turnover Responding to figures EBIT, EBITEDIA, eps and other analysts' measure 8 Other key issues Creative accounting Accounting for groups Intangible assets - brand names Company valuations Fixed assets / leased assets / off-balance sheet finance
Where should management effort be directed? In controlling costs and ensuring proper engineering in live projects? - yes, of course, but true cost control comes by understanding, eliminating and minimising risk prior to a business committing any funds. This course studies the stages required for practical financial and business appraisals of projects and capital expenditure. This course has two primary objectives: To impart the knowledge and skills required to ensure as risk-free as possible expenditure of that scarce resource, cash - the investors', governments' or shareholders' money must not be squandered To improve the quality of the appraisal process in the widest sense - demonstrating how the process of project and capital expenditure appraisal can be used to dramatically improve cost control and deliver as risk-free as possible expenditure As a result of the course, participants will be able to: Understand the economics of appraisal Be in control of their projects from the start Understand the economics of their projects - and devise the most appropriate mode Carry out sensitivity analysis and identify risk Improve their methods of appraisal and approach Focus on the risk areas and take out risk and control costs before they over-run The benefits of attending this course will be demonstrable from day one. Thorough appraisals and risk assessment follow through to success in project management and detailed cost control and project management. 1 Introduction Why appraise? Taking risk out of investment The short- and long-term results of not appraising business expenditure 2 Developing an appraisal process The process - overall and stage-by-stage objectives Understand business and technical risks Manage resources and time Do you invest enough time and effort at this stage? Take out the risks - control costs before you are committed to contracts and action Checklists 3 Appraisal arithmetic Review of the arithmetic of appraisalThe time value of moneyThe effects of different interest or required ratesThe effects of inflation (or deflation) in prices and costs Understanding the economics of appraisal is essential 4 Appraisal measures Meaning and use of appraisal measures Identifying the most appropriate measures for your particular business Payback Discounted cash flow measures - NPV and IRR Other measures - FW, AW, Profitability Index The meaning of the measures and their application in practice 5 Cost benefit analysis The effect on decision-making of more intangible benefits Cost benefit analysis Ensuring costs are genuine Measuring intangible benefits Environmental issues Consideration of intangible benefits in the appraisal decision-making process 6 Developing appropriate models Developing models - examples of spreadsheet models and measures for many different situations Modelling investment opportunities - summarising outcomes Sensitivity analysis - identifying, quantifying and taking out risk 7 Developing an appraisal process The process - managing risk from the outset Using the process in risk management, negotiating and project management Take out risk by thoroughly knowing your project - developing your own process
The shortage of electricians has lead to an increased demand nationwide and in turn a sharp rise in salary. Our training solutions can help you gain nationally recognised qualifications such as City & Guilds and NVQ. Not only you will train in state-of-the-art training centres, but you can also have the opportunity to attain the Work Based Performance Units and complete a portfolio of diverse evidence of onsite work.
WCNA training course description Wireshark is a free network protocol analyser. This hands-on course provides a comprehensive tour of using Wireshark to troubleshoot networks. The course concentrates on the information needed in order to pass the WCNA exam. Students will gain the most from this course only if they already have a sound knowledge of the TCP/IP protocols. What will you learn Analyse packets and protocols in detail. Troubleshoot networks using Wireshark. Find performance problems using Wireshark. Perform network forensics. WCNA training course details Who will benefit: Technical staff looking after networks. Prerequisites: TCP/IP Foundation for engineers Duration 5 days WCNA training course contents What is Wireshark? Network analysis, troubleshooting, network traffic flows. Hands on Download/install Wireshark. Wireshark introduction Capturing packets, libpcap, winpcap, airpcap. Dissectors and plugins. The menus. Right click. Hands on Using Wireshark. Capturing traffic Wireshark and switches and routers. Remote traffic capture. Hands on Capturing packets. Capture filters Applying, identifiers, qualifiers, protocols, addresses, byte values. File sets, ring buffers. Hands on Capture filters. Preferences Configuration folders. Global and personal configurations. Capture preferences, name resolution, protocol settings. Colouring traffic. Profiles. Hands on Customising Wireshark. Time Packet time, timestamps, packet arrival times, delays, traffic rates, packets sizes, overall bytes. Hands on Measuring high latency. Trace file statistics Protocols and applications, conversations, packet lengths, destinations, protocol usages, strams, flows. Hands on Wireshark statistics. Display filters Applying, clearing, expressions, right click, conversations, endpoints, protocols, combining filters, specific bytes, regex filters. Hands on Display traffic. Streams Traffic reassembly, UDP and TCP conversations, SSL. Hands on Recreating streams. Saving Filtered, marked and ranges. Hands on Export. TCP/IP Analysis The expert system. DNS, ARP, IPv4, IPv6, ICMP, UDP, TCP. Hands on Analysing traffic. IO rates and trends Basic graphs, Advanced IO graphs. Round Trip Time, throughput rates. Hands on Graphs. Application analysis DHCP, HTTP, FTP, SMTP. Hands on Analysing application traffic. WiFi Signal strength and interference, monitor mode and promiscuous mode. Data, management and control frames. Hands on WLAN traffic. VoIP Call flows, Jitter, packet loss. RTP, SIP. Hands on Playing back calls. Performance problems Baselining. High latency, arrival times, delta times. Hands on Identifying poor performance. Network forensics Host vs network forensics, unusual traffic patterns, detecting scans and sweeps, suspect traffic. Hands on Signatures. Command line tools Tshark, capinfos, editcap, mergecap, text2pcap, dumpcap. Hands on Command tools.
Network design training course description This course provides you with the knowledge needed to perform the design of a network infrastructure that supports desired network solutions to achieve effective performance, scalability, and availability. We recognise that the role of design does not normally require hands on skills but hands on sessions are used to reinforce the theory not to teach configuration or troubleshooting. What will you learn Create HA enterprise network designs. Develop optimum Layer 3 designs. Design effective modern WAN and data center networks. Develop effective migration approaches to IPv6. Create effective network security designs. Network design training course details Who will benefit: Anyone involved with network design. Prerequisites: TCP/IP Foundation for engineers Duration 5 days Network design training course contents Part I Reliable, resilient enterprise L2/3 network designOptimal Enterprise Campus Design:Enterprise campus design principles, hierarchy, modularity, flexibility, resiliency.EIGRP design:EIGRP Design, Should you use EIGRP?OSPF design: OSPF scalability designs, OSPF area design, OSPF Full-Mesh Design, OSPF Hub-and-Spoke Design, OSPF convergence design and optimization techniques. IS-IS Design:The protocol, IS-IS hierarchical architecture, IS-IS vs OSPF, IS-IS Deep Dive, IS-IS Design Considerations. BGP design:BGP overview, Designing Scalable iBGP Networks, BGP Route Reflector Design, Enhancing the Design of BGP Policies with BGP Communities, Case Study: Designing Enterprise wide BGP Policies Using BGP Communities, BGP Load-Sharing Design.Part II Enterprise IPv6 Design ConsiderationsIPv6 Design Considerations in the Enterprise: IPv6 Deployment and Design Considerations, Considerations for Migration to IPv6 Design, IPv6 Transition Mechanisms, Final Thoughts on IPv6 Transition Mechanisms. Challenges of the Transition to IPv6: IPv6 Services, Link Layer Security Considerations. Part III Modern Enterprise Wide-Area Networks DesignService Provider-Managed VPNs:Choosing Your WAN Connection, Layer 3 MPLS VPNs, Case Study: MPLS VPN Routing Propagation, Layer 2 MPLS VPN Services. Enterprise-Managed WANs: Enterprise-Managed VPNs, GRE, Multipoint GRE, Point-to-Point and Multipoint GRE, IPsec, IPsec and dynamic VTI, DMVPN, Case Study: EIGRP DMVPN, DMVPN and Redundancy, Case Study: MPLS/VPN over GRE/DMVPN, SSL VPN. Enterprise WAN Resiliency Design: WAN Remote-Site Overview, MPLS L3 WAN Design Models, Common L2 WAN Design Models, Common VPN WAN Design Models, 3G/4G VPN Design Models, Remote Site Using Local Internet, Remote-Site LAN, Case Study: Redundancy and Connectivity, NGWAN, SDWAN, and IWAN Solution Overview, IWAN Design Overview, Enterprise WAN and Access Management. Part IV Enterprise Data Center DesignsMultitier Data Center Designs: Case Study: Small Data Centers (Connecting Servers to an Enterprise LAN), Case Study: Two-Tier Data Center Network Architecture, Case Study: Three-Tier Data Center Network Architecture.Trends and Techniques to Design Modern Data Centers: The Need for a New Network Architecture, Limitations of Current Networking Technology, Modern Data Center Design Techniques and Architectures, Multitenant Data Center. SDN:SDN characteristics, How SDN addresses current Networking Limitations, SDN Architecture Components, SDN Network Virtualization overlays. Data Center Connections:Data Center Traffic Flows, The Need for DCI, IP Address Mobility, Case Study: Dark Fiber DCI, Pseudowire DCI. Part V Design QoS for Optimized User ExperienceQoS Overview:QoS Overview, IntServ versus DiffServ, Classification and Marking, Policers and Shapers, Policing Tools: Single-Rate Three-Color Marker, Policing Tools: TwoRate Three-Color Marker, Queuing Tools, Dropping Tools. QoS design principles and best practices: QoS overview, classification and marking design principles, policing and remarking design principles, queuing design principles, dropping design principles, Per-Hop behavior queue design principles, RFC 4594 QoS Recommendation, QoS Strategy Models. Campus QoS, WAN QoS, Data Center QoS.MPLS VPN QoS Design: The Need for QoS in MPLS VPN, Layer 2 Private WAN QoS Administration, Fully Meshed MPLS VPN QoS Administration, MPLS DiffServ Tunneling Modes, Sample MPLS VPN QoS Roles. IPsec VPN QoS Design: The Need for QoS in IPsec VPN, VPN Use Cases and Their QoS Models, IPsec Refresher, Encryption and Classification: Order of Operations, MTU Considerations, DMVPN QoS Considerations. Part VI IP Multicast DesignEnterprise IP Multicast Design: How Does IP Multicast Work? Multicast Protocols, Multicast Forwarding and RPF Check, Multicast Protocol Basics, PIM-SM Overview, Multicast Routing Table, Basic SSM Concepts, Bidirectional PIM. RP discovery, Anycast RP Features, MSDP. Part VII Designing Optimum Enterprise Network SecurityDesigning Security Services and Infrastructure Protection Network Security Zoning, Designing Infrastructure Protection.Designing firewall & IPS solutions: Firewall architectures, virtualized firewalls. Case Study: Application Tier separation, Case Study: Firewalls in a Data Center, Case Study: Firewall High Availability, IPS Architectures, Case Study: Secure Campus Edge Design (Internet and Extranet Connectivity). IP Multicast Security: Multicast Security Challenges, Multicast Network Security Considerations. Designing Network Access Control Solutions:IEEE 802.1X, EAP, 802.1X supplicants, 802.1X phased deployment, Case Study: Authorization Options. Part VIII Design scenariosDesign Case Studies: 1: Enterprise Connectivity, 2: Enterprise BGP with Internet Connectivity, 3: IPv6, 4: Data Center Connectivity, 5: Resilient Enterprise WAN, 6: Secure Enterprise Network, 7: QoS in the Enterprise Network.
This is not a single course but a set of menu options from which you can 'pick and mix' to create a draft programme yourself, as a discussion document which we can then fine-tune with you. For a day's training course, simply consider your objectives, select six hours' worth of modules and let us do the fine-tuning so that you get the best possible training result. Consider your objectives carefully for maximum benefit from the course. Is the training for new or experienced credit control staff? Are there specific issues to be addressed within your particular sector (eg, housing, education, utilities, etc)? Do your staff need to know more about the legal issues? Or would a practical demonstration of effective telephone tactics be more useful to them? Menu Rather than a generic course outline, the expert trainer has prepared a training 'menu' from which you can select those topics of most relevance to your organisation. We can then work with you to tailor a programme that will meet your specific objectives. Advanced credit control skills for supervisors - 1â2 day Basic legal overview: do's and don'ts of debt recovery - 2 hours Body language in the credit and debt sphere - 1â2 day County Court suing and enforcement - 1â2 day Credit checking and assessment - 1 hour Customer visits and 'face to face' debt recovery skills - 1â2 day Data Protection Act explained - 1â2 day Dealing with 'Caring Agencies' and third parties - 1 hour Debt counselling skills - 2 hours Elementary credit control skills for new staff - 1â2 day Granting credit and collecting debt in Europe - 1â2 day Identifying debtors by 'type' to handle them accurately - 1 hour Insolvency: Understanding bankruptcy / receivership / administration / winding-up / liquidation / CVAs and IVAs - 2 hours Late Payment of Commercial Debts Interest Act explained - 2 hours Liaison with sales and other departments for maximum credit effectiveness - 1 hour Suing in Scottish Courts (Small Claims and Summary Cause) - 1â2 day Telephone techniques for successful debt collection - 11â2 hours Terms and conditions of business with regard to credit and debt - 2 hours Tracing 'gone away' debtors (both corporate and individual) - 11â2 hours What to do if you/your organisation are sued - 1â2 day Other topics you might wish to consider could include: Assessment of new customers as debtor risks Attachment of Earnings Orders Bailiffs and how to make them work for you Benefit overpayments and how to recover them Cash flow problems (business) Charging Orders over property/assets Credit policy: how to write one Council and Local Authority debt recovery Consumer Credit Act debt issues Using debt collection agencies Director's or personal guarantees Domestic debt collection by telephone Exports (world-wide) and payment for Emergency debt recovery measures Education Sector debt recovery Forms used in credit control Factoring of sales invoices Finance Sector debt recovery needs Third Party Debt Orders (Enforcement) Government departments (collection from) Harassment (what it is - and what it is not) Health sector debt recovery skills Hardship (members of the public) Insolvency and the Insolvency Act In-house collection agency (how to set up) Instalments: getting offers which are kept Judgment (explanation of types) Keeping customers while collecting the debt Late payment penalties and sanctions Letter writing for debt recovery Major companies as debtors Members of the public as debtors Monitoring of major debtors and risks Negotiation skills for debt recovery Old debts and how to collect them Out of hours telephone calls and visits Office of Fair Trading and collections Oral Examination (Enforcement) Pro-active telephone collection Parents of young debtors Partnerships as debtors Positive language in debt recovery Pre-litigation checking skills Power listening skills Questions to solicit information Retention of title and 'Romalpa' clauses Sale of Goods Act explained Salesmen and debt recovery Sheriffs to enforce your judgment Students as debtors Statutory demands for payment Small companies (collection from) Sundry debts (collection of) Terms and Conditions of Contract Tracing 'gone away' debtors The telephone bureau and credit control Taking away reasons not to pay Train the trainer skills Utility collection needs Visits for collection and recovery Warrant of execution (enforcement)
Definitive IP routing training course description An intensive hands on IP routing course leading to LINX Accredited Internet Technician stage 2 focusing on routing in an IP environment. The course concentrates on OSPF and IS-IS but also covers BGP and MPLS. Hands on sessions are used to reinforce the theory rather than teach specific manufacturer equipment. A multiple choice exam, leading to the LAIT II certification, is available after the course. The exam consists of 60 questions and lasts 2.0 hours. What will you learn Calculate subnet numbers in seconds. Configure and troubleshoot static routes. Explain how OSPF works. Build resilient networks with VRRP and OSPF. Implement and troubleshoot OSPF, IS-IS and VLANS. Evaluate and choose appropriate routing protocols for particular scenarios. An optional multiple choice exam, leading to the LAIT II certification, is included at the end of the course. The exam consists of 60 questions and lasts 2.0 hours. Definitive IP routing training course details Who will benefit: Network engineers Prerequisites: TCP/IP Foundation for engineers Duration 5 days Definitive IP routing training course contents Basic routing Review of LAIT I routing, reading routing tables. Hands on Setting up a routed network. Static routes Why use static routes? Default routes. Hands on Configuring static routes. First hop redundancy Default gateways, VRRP/HSRP/GLBP. Load sharing, critical IP addresses. Hands on VRRP. Basic OSPF What is OSPF? Process IDs, passive interfaces. Hands on Simple OSPF. Subnetting Bit boundary subnetting, calculating network numbers. Exercise: Subnetting. OSPF overview Metrics, convergence, DV vs. Link state, IGPs, classless, OSPF features, load sharing, OSPF authentication. Hands on OSPF features. OSPF within an area How OSPF works, LSAs, LSDB, router IDs, hellos, configuring hellos, exchange protocol. Hands on Investigating OSPF structures. OSPF areas Scalability, why areas? Area IDs, area 0, ABRs, ABR resilience, areas & LSDBs & LSAs, virtual links. Hands on Multi area OSPF. Redistribution Multiple routing protocols, common scenarios, routing distance, External LSAs, E1 and E2. Type 4 LSAs. OSPF and default routes. Hands on Configuring static route redistribution. Route aggregation Route summarisation. How to aggregate, CIDR, ASBR summarisation. Hands on OSPF address summarisation. OSPF packet formats OSPF packets, protocol stack, packet flows, OSPF headers, neighbours, neighbour states, DRs, adjacencies, BDRs, DR election. Hands on Analysing OSPF packets, troubleshooting. OSPF OSPF stub areas LSA types, area types, area architecture, stub areas, default routes, benefits & disadvantages of stub areas, TSSAs, NSSAs, Type 7 LSAs. Hands on Stub and TSSA configuration. IS-IS End systems, Intermediate systems, how IS-IS works, IS-IS router ID, Level 1, Level 2, IS-IS hierarchy. Hands on Configuring IS-IS, troubleshooting IS-IS. The Internet Autonomous systems, Peering, transit, looking glasses. Hands on Internet routing tables. Basic BGP IGPs, EGPs, What's BGP? BGP RIB, in/out process, tables peers, adding routes. Hands on Simple configuration and troubleshooting. Routing IPv6 Multi protocol routing, IPv6 addressing, IPv6 routing tables, IPv6 static routes, OSPFv3, IS-IS and IPv6. Hands on Routing IPv6. STP and L2 routing STP, RSTP, L2 IS-IS, Multi system link aggregation. Hands on RSTP. MPLS Core MPLS, MPLS and the 7 layer model, MPLS protocol, MPLS standard, MPLS runs on routers, MPLS history, Why MPLS?, LSRs, PE and P router roles, FEC, swapping labels, MPLS packet format. Hands on Enabling MPLS. Testing and troubleshooting of MPLS. Appendix EIGRP: How EIGRP works, DUAL.
LINX II training course description An intensive hands on IP routing course leading to LINX Accredited Internet Technician stage 2 focusing on routing in an IP environment. The course concentrates on OSPF and IS-IS but also covers BGP and MPLS. Hands on sessions are used to reinforce the theory rather than teach specific manufacturer equipment. A multiple choice exam, leading to the LAIT II certification, is available after the course. The exam consists of 60 questions and lasts 2.0 hours. What will you learn Calculate subnet numbers in seconds. Configure and troubleshoot static routes Explain how OSPF works. Build resilient networks with VRRP and OSPF. Implement and troubleshoot OSPF, IS-IS, simple BGP and simple MPLS. Evaluate and choose appropriate routing protocols for particular scenarios. LINX II training course details Who will benefit: Network engineers. Prerequisites: LAIT I attendance and 55%+ exam score OR LAIT I exam only and pass (70%+) OR CCNA and take LAIT I exam on this course. Duration 5 days LINX II training course contents Basic routing Review of LAIT I routing, reading routing tables. Hands on Setting up a routed network. Static routes Why use static routes? Default routes. Hands on Configuring static routes. First hop redundancy Default gateways, VRRP/HSRP/GLBP. Load sharing, critical IP addresses. Hands on VRRP. Basic OSPF What is OSPF? Process IDs, passive interfaces. Hands on Simple OSPF. Subnetting Bit boundary subnetting, calculating network numbers. Exercise: Subnetting. OSPF overview Metrics, convergence, DV vs. Link state, IGPs, classless, OSPF features, load sharing, OSPF authentication. Hands on OSPF features. OSPF within an area How OSPF works, LSAs, LSDB, router IDs, hellos, configuring hellos, exchange protocol. Hands on Investigating OSPF structures. OSPF areas Scalability, why areas? Area IDs, area 0, ABRs, ABR resilience, areas & LSDBs & LSAs, virtual links. Hands on Multi area OSPF. Redistribution Multiple routing protocols, common scenarios, routing distance, External LSAs, E1 and E2. Type 4 LSAs. OSPF and default routes. Hands on Configuring static route redistribution. Route aggregation Route summarisation. How to aggregate, CIDR, ASBR summarisation. Hands on OSPF address summarisation. OSPF packet formats OSPF packets, protocol stack, packet flows, OSPF headers, neighbours, neighbour states, DRs, adjacencies, BDRs, DR election. Hands on Analysing OSPF packets, troubleshooting. OSPF OSPF stub areas LSA types, area types, area architecture, stub areas, default routes, benefits & disadvantages of stub areas, TSSAs, NSSAs, Type 7 LSAs. Hands on Stub and TSSA configuration. IS-IS End systems, Intermediate systems, how IS-IS works, IS-IS router ID, Level 1, Level 2, IS-IS hierarchy. Hands on Configuring IS-IS, troubleshooting IS-IS. The Internet Autonomous systems, Peering, transit, looking glasses. Hands on Internet routing tables. Basic BGP IGPs, EGPs, What's BGP? BGP RIB, in/out process, tables peers, adding routes. Hands on Simple configuration and troubleshooting. Routing IPv6 Multi protocol routing, IPv6 addressing, IPv6 routing tables, IPv6 static routes, OSPFv3, IS-IS and IPv6. Hands on Routing IPv6. STP and L2 routing STP, RSTP, L2 IS-IS, Multi system link aggregation. Hands on RSTP. MPLS Core MPLS, MPLS and the 7 layer model, MPLS protocol, MPLS standard, MPLS runs on routers, MPLS history, Why MPLS?, LSRs, PE and P router roles, FEC, swapping labels, MPLS packet format. Hands on Enabling MPLS. Testing and troubleshooting of MPLS. Appendix EIGRP: How EIGRP works, DUAL.
Total H.248 training course description A course focusing purely on the H.248 protocol. Anyone working through the ITU standards documents can testify to the need of a training course to explain how H.248 really works. This course already assumes knowledge of other VoIP protocols and starts by positioning H.248 in relation to the other protocols. The course then looks at H.248 architectures and concepts before analysing H.248 messages and call flows. What will you learn Describe what H.248 is Recognise where H.248 fits in relation to other VoIP protocols. Explain how H.248 works. Analyse H.248 packets Total H.248 training course details Who will benefit: Technical staff working with H.248 Prerequisites: Voice Over IP. Duration 2 days Total H.248 training course contents What is H.248? Review of VoIP protocols: RTP, RTCP, SIP, SDP, H.323. The PSTN and SS7. Where H.248 fits into the picture. H.248 history. MGCP. The IETF. Megaco. ITU standards. H.248v1, v2, v3. H.248 architectures Media Gateways, Media Gateway Controllers, Gateway Control functions, Signalling Gateways. Reference architectures: IMS/TISPAN: IBCF, IWF, I-BGF, SPDF. MSF: S-SBG-NC, D-SBG-NC. GSMA: IPX Proxy. Softswitches. H.248 concepts The connection model, terminations, streams, contexts. Termination properties: descriptors, context properties. Events, signals, packages. H.248 messages Protocol stack, UDP, TCP. Message structure. Transactions, actions, commands. Requests, replies, acknowledgements. Sample message flows. Binary encoding, ASN syntax, Text encoding. H.248 commands Termination manipulation: Add, Subtract, Move, Modify. Event reporting: Notify. Management: AuditCapability, AuditValue, ServiceChange. H.248 Descriptors What are descriptors? Relationship with messages and commands. Basic descriptors, Descriptors composed of other descriptors. The 19 descriptors. Defaults. H.248 Transactions Groups of commands, transaction Ids, relationship with actions and commands. Requests and replies. H.248 wrap up What is a package? Basic packages. H.248 security. H.248 - SIP interoperation. H.248 interoperation with other protocols.
LTE Architecture and Protocols course description This course provides a comprehensive tour of the LTE architecture along with services provided and the protocols used. What will you learn Describe the overall architecture of LTE. Explain the information flows through LTE. Describe the LTE security. Describe LTE mobility management. Recognise the next steps for LTE. LTE Architecture and Protocols course details Who will benefit: Anyone working with LTE. Prerequisites: Mobile communications demystified Duration 3 days LTE Architecture and Protocols course contents Introduction History, LTE key features. The 4G ITU process. The LTE 3GPP specifications. Specifications. System Architecture LTE hardware architecture. UE architecture and capabilities. E-UTRAN and eNB. EPC, MME functions, SGW, PGW and PCRF. System interfaces and protocol stacks. Example information flows. Dedicated and default bearers. EMM, ECM, RRC state diagrams. Radio transmission and reception OFDMA, SC-FDMA, MIMO antennas. Air interface protocol stack. Logical, transport and physical channels. Frame and slot structure, the resource grid. Resource element mapping of the physical channels and signals. Cell acquisition, data transmission and random access. MAC, RLC, PDCP protocols. LTE spectrum allocation. Power-on procedures Network and cell selection. RRC connection establishment. Attach procedure, including IP address allocation and default bearer activation. LTE detach procedure. Security in LTE networks LTE security features, identity confidentiality, ciphering and integrity protection. Architecture of network access security in LTE. Secure key hierarchy. Authentication and key agreement procedure. Security mode command procedure. Network domain security architecture. Security associations using IKE and IPSec. Mobility management RRC_IDLE, RRC_CONNECTED. Cell reselection, tracking area updates. Measurement reporting. X2 and S1 based handovers. Interoperation with UMTS, GSM and non-3GPP technologies such as cdma2000. QoS, policy control and charging QoS in LTE, EPS bearers, service data flows and packet flows. The architecture and signalling procedures for policy and charging control. Data transport using GPRS, differentiated services and MPLS. Offline and online charging in LTE. Delivery of voice and text messages over LTE Difficulties and solutions for Voice over LTE. Architecture and call setup procedures for circuit switched fallback. Architecture, protocols and call setup procedures in IP multimedia subsystem. Enhancements in release 9 LTE location services. Multimedia broadcast / multicast service and MBSFN. Cell selection, commercial mobile alert service. LTE Advanced and release 10 Impact of carrier aggregation on LTE air interface. Enhanced MIMO processing on uplink and downlink. Relaying. Release 11 and beyond. OAM and self organising networks Operation, administration, maintenance and provisioning for LTE. Self-configuration of base station parameters. Fractional frequency re-use, inter-cell interference co-ordination. Self-optimisation of base station procedures. Self-healing to detect and recover from faults.