Software development training course description This three-day MTA Training course helps you prepare for Microsoft Technology Associate Exam 98-361, and build an understanding of these topics: Core programming, Object-Oriented programming, general software development, web applications, desktop applications, and databases. This course leverages the same content as found in the Microsoft Official Academic Course (MOAC) for this exam. What will you learn Describe core programming. Explain Object Oriented programming. Describe general software development. Describe Web applications. Describe desktop applications. Explain how databases work. Software development training course details Who will benefit: Anyone looking to learn the fundamentals of software. Prerequisites: None. Duration 3 days Software development training course contents Core programming Computer storage and data types How a computer stores programs and the instructions in computer memory, memory stacks and heaps, memory size requirements for the various data storage types, numeric data and textual data. Computer decision structures Various decision structures used in all computer programming languages; If decision structures; multiple decision structures, such as Ifâ¦Else and switch/Select Case; reading flowcharts; decision tables; evaluating expressions. Handling repetition For loops, While loops, Do...While loops and recursion. Understand error handling Structured exception handling. Object-oriented programming Classes Properties, methods, events and constructors; how to create a class; how to use classes in code. Inheritance Inheriting the functionality of a base class into a derived class. Polymorphism Extending the functionality in a class after inheriting from a base class, overriding methods in the derived class. Encapsulation Creating classes that hide their implementation details while still allowing access to the required functionality through the interface, access modifiers. General software development Application life cycle management Phases of application life cycle management, software testing. Interpret application specifications Application specifications, translating them into prototypes, code, select appropriate application type and components. Algorithms and data structures Arrays, stacks, queues, linked lists and sorting algorithms; performance implications of various data structures; choosing the right data structure. Web applications Web page development HTML, CSS, JavaScript. ASP.NET web application development Page life cycle, event model, state management, client-side versus server-side programming. Web hosting Creating virtual directories and websites, deploying web applications, understanding the role of Internet Information Services. Web services Web services that will be consumed by client applications, accessing web services from a client application, SOAP, WSDL. Desktop applications Windows apps UI design guideline categories, characteristics and capabilities of Store Apps, identify gestures. Console-based applications Characteristics and capabilities of console- based applications. Windows Services Characteristics and capabilities of Windows Services. Databases Relational database management systems Characteristics and capabilities of database products, database design, ERDs, normalisation concepts. Database query methods SQL, creating and accessing stored procedures, updating and selecting data. Database connection methods Connecting to various types of data stores, such as flat file; XML file; in-memory object; resource optimisation.
Complete Ruby programming training course description This course starts with a quick-start session and then explains the language in detail from the bottom up. Hands on sessions follow all the major sessions to reinforce the theory. What will you learn Read Ruby programs. Write Ruby programs. Debug Ruby programs. Complete Ruby programming training course details Who will benefit: Anyone wishing to program in Ruby. Prerequisites: Software development fundamentals Duration 3 days Complete Ruby programming training course contents Introduction A tour of Ruby, Try Ruby, A suduko solver in Ruby. The Structure and execution of Ruby Lexical structure, Syntactic structure, Files structure, Program encoding, Program execution. Datatypes and objects Numbers, text, Arrays, Hashes, Ranges, Symbols, True, false, and nil, Objects. Expressions and operators Literals and keyword literals, Variable references, Constant references, Method invocations, Assignments, Operators. Statements and control structures Conditionals, loops, Iterators and enumerable objects, Blocks, Altering flow control, Exceptions and exception handling, BEGIN and END, Threads, fibres and continuations. Methods, Procs, Lambdas and closures Defining simple methods, Method names, Methods and parentheses, Method arguments, Procs and lambdas, Closures, Method objects, Functional programming. Classes and modules Defining a simple class, Method visibility: public, protected, privates, Subclassing and inheritance, Object creation and initialization, Modules, Loading and requiring modules, Singleton methods and Eigenclass, Method lookup, Constant lookup. Reflection and metaprogramming Types, classes and modules, Evaluating strings and blocks, Variables and constants, Methods, Hooks, Tracing, ObjectSpace and GV, Custom control structures, Missing methods and missing constants, Dynamically creating methods, Alias chaining. The Ruby platform Strings, Regular expressions, Numbers and Math, Dates and times, Collections, Files and directories, Input/output, Networking, Threads and concurrency. The Ruby environment Invoking the Ruby interpreter, The Top-level environment, Practical extraction and reporting shortcuts, Calling the OS, Security.
IPsec training course description This hands on course focuses on IPsec VPNs. Rather than focusing on one implementation this course concentrates on the technologies and protocols of IPsec. Starting with an overview of the complete IPsec architecture the course then moves onto ESP packet analysis along with encryption and authentication provided. IKEv1 and IKEv2 are both covered in detail. Having covered IPsec with pre shared keys the course then moves onto IPsec with certificates followed by IPsec issues. The course is vendor neutral with hands on with both Cisco and Microsoft implementations. What will you learn Explain how IPsec works. Explain the role of AH, ESP and IKE. Configure IPsec. Troubleshoot IPsec. IPsec training course details Who will benefit: Technical staff working with IPsec. Prerequisites: Definitive IP VPNs for engineers. Duration 3 days IPsec training course contents What is IPsec? How to spell IPsec, IPsec is IP security, confidentiality, integrity, authenticity, replay protection, what is a VPN? Network layer security, IPsec and IPv4, IPsec and IPv6, the suite of protocols, the standard, IPsec RFCs, IPsec history. Hands on Analysis of 'normal' IP packets. IPsec architecture The IPsec protocols, AH vs ESP, Why two headers? transport mode, tunnel mode, Remote access VPNs, site to site VPNs, security associations, SA database, Security Parameters Index, implementations: Host tack, Bump in the Stack, Bump in the Wire. Hands on Configuring IPsec. AH What AH does, the stack, The AH header, What is authenticated? Device authentication. AH in transport mode, AH in tunnel mode. Hands on AH packet analysis. ESP What ESP does, the ESP header, ESP in transport mode, ESP in tunnel mode, ESP and SA, ESP and SPI. Hands on ESP packet analysis, policy configuration. IPsec encryption IPsec is a framework, standard algorithms, ESP keys, the role of IKE, key lifetimes, how IKE generates the keys, DES, 3DES, AES, cipher block chaining, counter mode, other encryption. Hands on Encryption configuration. IPsec authentication Authentication types, IPsec authentication, Authentication algorithms: MD5, keyed SHA-1, HMAC-MD5, HMAC-SHA-1, HMAC-RIPEMD, other authentication algorithms. Hands on Authentication configuration. IKE Internet Key Exchange, IKE and the SAD, the two phase negotiation, ISAKMP, ISAKMP header, pre shared keys, digital signatures, public key encryption, Diffie Hellman, proposals, counter proposals, nonces, identities, phase 1 negotiation: main mode, aggressive mode, base mode. Phase 2 negotiation: quick mode, new group mode. Hands on IKE packet analysis. More IKE PFS, IKE and dynamic addresses, XAUTH, hybrid authentication, CRACK, ULA, PIC. User level authentication. IKE renegotiation, heartbeats. Hands on Troubleshooting IPsec. IKEv2 The IKEv2 exchange, IKE_SA_INIT, IKE_AUTH, CREATE_CHILD_SA, IKEv2 packets, the informational exchange. Comparing IKev1 vs IKE v2. Hands on IKEv2 configuration and analysis. PKI What is PKI?, Digital certificates, Certificate authorities, CA servers, RA, VA, certificates, CA hierarchy, CRLs, certificate formats. Hands on installing and configuring certificate servers. IPsec issues NAT, IPsec overhead and fragmentation. Summary IPsec strengths and weaknesses. Where to get further information.
5G training course description This course is designed to give the delegate an understanding of the technologies and interworking requirements of the next generation of cellular communications. It is not a definitive set of descriptions but a possibility of the final deployment. During the course we will investigate the 10 pillars for 5G, which will include various Radio Access Technologies that are required to interwork smoothly. Hence we will look at the 4G Pro features and other RATs. What will you learn List the ten pillars of 5G deployment. Explain the 5G Internet and Software Distributed Networks (SDN). Explain carrier aggregation, the mobile cloud and RAT virtualisation. Explain an overall picture of 5G architecture. 5G training course details Who will benefit: Anyone who is looking to work with next generation networks. Prerequisites: Mobile communications demystified Duration 3 days 5G training course contents Drivers for 5G 5G Road Map, 10 Pillars of 5G, evolving RATs, small cell, o SON, MTCm, mm-wave, backhaul, EE, new spectrum, spectrum sharing, RAN virtualisation. 4G LTE advanced features *MIMO, Downlink & uplink MIMO R8, MIMO technology in LTE advanced, Downlink 8-layer SU-MIMO, Downlink MU-MIMO, Uplink MU-MIMO, Uplink transmit diversity, Coordinated multi-point operation (CoMP), Independent eNB & remote base station configurations, Downlink CoMP, * Uplink Multi-Cell Reception. ICIC & eICIC ICIC, Homogeneous to heterogeneous network, eICIC, Macro-pico scenario, Macro-femto scenario, Time orthogonal frequencies. Almost Blank Subframe (ABS). Carrier aggregation Component carriers (CC), * CC aggregation, Intra-band contiguous solutions, Intra-band non-contiguous solutions, Inter-band non-contiguous solutions, CA bandwidth classes, Aggregated transmission bandwidth configurations (ATBC), Possible carrier aggregation configurations (Rel 9, 10 & 12). Enhanced Interference Mitigation & Traffic Adaptation (eIMTA) TDD UL-DL reconfiguration for traffic adaptation, Reconfiguration mechanisms, Interference mitigation schemes, Dynamic & flexible resource allocation. 5G architectures 5G in Europe, horizon 2020 framework, 5G infrastructure PPP, METIS project, innovation centre, 5G in North America, research, company R & D, 5G specifications. The 5G internet Cloud services, IoT & context awareness, network reconfiguration & virtualization support, hypervisors, SDN, the controller, service-oriented API, OpenFlow switches, SDN operation, SDN control for traffic flow redirection, OpenFlow controllers, how SDN works, application, control and infrastructure layers, a programmable network, how SDN & NFV tie together, SDN's downside, SDN orchestration, Mobility, architectures for distributed mobility management, MEDIEVAL & MEDIVO projects, a clean slate approach, mobility first architecture, network virtualization (VNet), INM, NetInf, ForMux, MEEM, GP & AM, QoS support, network resource provisioning, IntServ, RSVP, DiffServ, CoS, aggregated resource provisioning, SICAP, MARA, Emerging approach for resource over-provisioning, example use case architecture for the 5G internet, integrating SDN/NFV for efficient resource control, control information repository, service admission control policies, network resource provisioning, control enforcement functions, network configurations, network operations. Small cells for 5G Average spectral efficiency evolution, What are small cells? WiFi & Femto cells as candidate small-cell technologies, Capacity limits & achievable gains with densifications, gains with multi-antenna techniques, gains with small cells, Mobile data demand, approach & methodology, subscriber density projections, traffic demand projections, global mobile data traffic increase modelling, country level backhaul traffic projections, 2020 average spectrum requirement, Small cell challenges, backhaul, spectrum, automation. Cooperation for next generation wireless networks Cooperative diversity & relaying strategies, Cooperative ARQ & MAC protocols, NCCARQ & PRCSMA packet exchange, Physical layer impact on MAC protocol, NCCARQ overview, PHY layer impact, Performance evaluation, simulation scenario and results. Mobile clouds; technology & services for future communications platforms Mobile cloud, software, hardware and networking resources, Mobile cloud enablers, mobile user domain, wireless technologies, WWAN WLAN and WPAN range, Bluetooth, IEEE.802.15.4, software stacks, infrared, near field communications (NFC), store & forward vs compute & forward, random/linear network coding. Security for 5G communications Potential 5G architectures, Security issues & challenges in 5G, user equipment, mobile malware attacks, 5G mobile botnets, attacks on 4G networks, C-RNTI & packet sequence numbers based UE location tracking, false buffer status reports attacks, message insertion attacks, HeNB attacks, physical attacks, attacks on mobile operator's network, user data & identity attacks, DDoS attacks, amplification, HSS saturation, external IP networks.
4G & 5G Roaming Scenarios & Procedures course description This course is designed to explain the roaming procedures of modern mobile networks, based on the GSMA roaming specification the course explains all scenarios where a mobile subscriber may find themselves whilst visiting a preferred mobile network partner. Interconnection between MNOs and the use of GRX & IPX as an interworking process. The course will work through the registration & authentication procedure, download of the user profile, the APN configuration & DIAMETER process to verify user authenticity. VoLTE roaming and IMS registration procedures for voice support & SMS delivery will be discussed and explained. What will you learn Architecture Models Technical requirements for interfaces - 4G Roaming Scenarios Technical requirements & recommendations for services Other Technical Requirements & Recommendations Technical Requirements for QoS support Technical Requirements & Recommendations for Interfaces - 5G Scenarios Technical Requirements & Recommendations for Interworking & Coexistence with E-UTRAN & EPC Technical Requirements & Recommendations for Services Other Technical Requirements & Recommendations 4G & 5G Roaming Scenarios & Procedures course details Who will benefit: Those working in mobile networks. Prerequisites: None. Duration 3 days 4G & 5G Roaming Scenarios & Procedures course contents Architecture Models 4G Evolved Packet System 5G Core Network SGs Interface for CSFB& SMS over SGs Technical Requirements for Interfaces - 4G Roaming Scenarios General requirements for inter-PLMN interfaces Stream Control Transmission Protocol (SCTP) IAMETER S8 Interface SGW selection PGW selection GTP Transport Layer engineering S9 interface Implementation requirements Guidelines for DIAMETER over S9 S6a & S6d interface Gy interface Guidelines for DIAMETER over Gy Legacy interworking scenarios VPLMN has not implemented LTE HPLMN has not implemented LTE Co-existence scenarios Possible scenarios 2G/3G roaming agreement only 2G/3G LTE roaming agreement LTE roaming registrations Consequences of different APN approaches when roaming Guidance regarding the APN approach when roaming Inter-RAT handover Handover & access restrictions to/from 2G/3G & LTE (Active mode) Access restriction for 2G/3G and/or LTE (Idle mode) Handover of PDN Connections between GERAN/UTRAN & LTE Handover to/from non-3GPP accesses & LTE Bandwidth considerations ARP considerations at handover from LTE to 2G/3G Tech requirements & recommendations for Services SMS SMS over SGs Voice CSFB Roaming retry for CSFB Roaming Forwarding for CSFB Coexistence of Roaming Forwarding & Roaming Retry Recommended procedures IMS Voice Roaming Architecture Other Technical Requirements & Recommendations Access Control Addressing APN for IMS based services IMS Well Known APN APN for Home Operator Services Gateway Selection Inter-PLMN roaming handover Data off related functionality Emergency Services Emergency PDN connectivity Emergency Call indicator Security GTP Security DIAMETER Security DIAMTER Roaming hubbing Default APN E-UTRA NR Dual Connectivity with EPC GW Selection for E-UTRA-NR Dual Connectivity TAC/LAC Restriction Guidelines Technical Requirements for QoS support QoS parameters definition QoS Management in the Home Routed architecture QoS control for IMS APN in the S8HR architecture Support of QoS in GRX/IPX QoS Control in Local Breakout architecture Technical Requirements & Recommendations for Interfaces - 5G Scenarios General requirements for inter-PLMN interfaces Transport protocol - TCP/IP Serialisation protocol - JSON Interface Definition language - OpenAPI Application Protocol - HTTP2 Inter-PLMN (N32) Interface N32c N32f ALS & IPX HTTP Proxy SMF & UPF in HPLMN & VPLMN Requirements related to Service Based Architecture Naming, addressing & routing for 5G SA roaming SEPP load distribution SEPP administration, naming convention & routing SEPP HTTP redirections Technical Requirements & Recommendations for Interworking & Coexistence with E-UTRAN & EPC Interworking scenarios Coexistence scenarios Inter-RAT Handover Handover & Access restriction between 5GC & EPC Technical Requirements & Recommendations for Services Network slicing Voice, Video & Messaging Location support UE Route Selection Policy Other Technical Requirements & Recommendations Access control IP Addressing DNN for IMS based services Emergency PDU Session Emergency Services Fallback Security Steering of Roaming in 5GS Technical Requirements for QoS support 5G QoS model 5G QoS profile QoS Control
Dreamweaver training course description Dreamweaver is a web authoring program that allows you to build professional quality websites. This course starts with a tour of Dreamweaver and customising your workspaces, moving onto HTML and CSS basics. Page layouts, templates and interactive pages are also covered. The final session covers how to use Dreamweaver as a HTML editor. Hands on session follow all the major theory chapters. What will you learn Use Dreamweaver to create websites. Customise Dreamweaver. Use templates. Add interactivity to web pages. Use Dreamweaver to edit HTML code. Dreamweaver training course details Who will benefit: Anyone wishing to create or edit websites. Prerequisites: None. Duration 3 days Dreamweaver training course contents Getting started Installing the programme, Updating to the latest version,, Online content, On first launch, Choosing the program colour theme, Setting up the workspace, Defining a Dreamweaver site, Checking for updates, Additional resources. Customizing your workspace Touring the workspace, Using the start screen, Exploring new feature guides, Setting interface preferences, Switching and splitting views, Selecting a workspace layout, Personalising Dreamweaver, Working with extract, Creating custom keyboard shortcuts, Using the Property inspector, Using the Related Files interface, Using tag selectors, Using the CSS Designer, Using the Visual Media Query (VMQ) interface, Using the DOM viewer, Using Element dialogs, displays and inspectors, Setting up version control in Dreamweaver, Exploring experimenting and learning. HTML Basics What is HTML? Where did HTML begin? Frequently used HTML elements, What's new in HTML5. CSS Basics What is CSS? HTML vs. CSS formatting, HTML defaults, CSS box model, Applying CSS styling, Multiples, classes and ids. Web design basics Developing a new website, Scenario, Working with thumbnails and wireframes, Creating a page layout Evaluating page design options, Working with predefined layouts, Styling an existing layout, Styling elements using the Extract panel, Extracting text from a Photoshop mockup, Troubleshooting CSS styling, Extracting text styling from a Photoshop mockup, Creating a gradient background using Extract, Extracting image assets from a mockup, Adding CSS background effects in code, Finishing up the layout. Working with templates Creating a template from an existing layout, Inserting editable regions, Inserting editable regions, Inserting HTML entities, Inserting metadata, Validating HTML code, Producing child pages, Moving CSS styles to linked file, Updating a template. Working with text, lists and tables Previewing the completed file, Creating and styling text, Creating lists, Creating and styling tables, Spell-checking webpages, Finding and replacing text. Working with images Web image basics, Previewing completed files, Inserting an image, Controlling image positions with CSS classes, Working with the Insert panel, Using the Insert menu, Inserting non-web file types, Working with Photoshop Smart Objects, Copying and pasting images from Photoshop, Inserting images by drag and drop, Optimizing images with the Property inspector. Working with navigation Hyperlinks, previewing the completed file, creating internal and external hyperlinks, setting up email links, Creating image-based links, Targeting page elements, Locking an element on the screen, Styling a navigation menu, Checking your page, Adding destination links. Adding interactivity Dreamweaver behaviours, Previewing the completed file, Working with Dreamweaver behaviours, Working with jQuery Accordion widgets, Inserting a jQuery Accordion widget, Styling a jQuery Accordion. Publishing to the web Defining a remote site, Cloaking folders and files, Wrapping things up, Putting your site online, Synchronizing local and remote sites. Working with code Creating HTML code, multicursor support, commenting your code, Working with CSS preprocessors, Selecting code, Collapsing code, Expanding code, Accessing Split code view, Previewing assets in Code View.
Definitive VPNs training course description A hands on course covering VPNs from the basics of benefits and Internet vs. Intranet VPNs through to detailed analysis of the technologies involved in VPNs. All the major VPN protocols are covered including PPPoE, L2TP, SSL, IPsec and dynamic VPNs. MPLS L3 VPNs are also covered. What will you learn Describe what a VPN is and explain the difference between different VPN types. Recognise the design and implementation issues involved in implementing a VPN. Explain how the various technologies involved in a VPN work. Describe and implement: L2TP, IPsec, SSL, MPLS L3 VPNs. Evaluate VPN technologies. Definitive VPNs training course details Who will benefit: Network personnel. Prerequisites: IP Security foundation for engineers. Duration 3 days Definitive VPNs training course contents VPN overview What is a VPN? What is an IP VPN? VPNs vs. Private Data Networks, Internet VPNs, Intranet VPNs, Remote access VPNs, Site to site VPNs, VPN benefits and disadvantages. VPN Tunnelling VPN components, VPN tunnels, tunnel sources, tunnel end points, hardware based VPNs, Firewall based VPNs, software based VPNs, tunnelling topologies, tunnelling protocols, which tunnelling protocol should you use? requirements of tunnels. VPN security components Critical VPN security requirements, Encryption and authentication, Diffie Hellman, DES, 3DES, RSA, PKI, Ca server types, pre shared keys versus certificates, Enrolling with a CA, RADIUS in VPNs. PPP Encapsulation, operation, authentication. Hands on Setting up PPPoE and analysing PPP packets. PPTP Overview, Components, How it works, control and data connections, GRE. Hands on Building a PPTP VPN. L2TP Overview, components, how it works, security, packet authentication, L2TP/IPSec, L2TP/PPP, Layer 2 versus layer 3 tunnelling. Hands on Implementing a L2TP tunnel. IPSec AH, HMAC, ESP, transport and tunnel modes, Security Association, use of encryption and authentication algorithms, manual vs automated key exchange, NAT and other issues. Hands on Implementing an IPSec VPN. Intranet VPNs Headers, architecture, label switching, LDP, MPLS VPNs. VPN products and services PE and CPE, management, various VPN products. VPN issues and architectures VPN architectures: terminate VPN before/on/ after/in parallel with firewall, resilience issues, VRRP, performance issues, QoS and VPNs. documentation.
Essential 5G training course description This course is designed to give delegates an explanation of the technologies and interworking requirements of the next generation of cellular communications. It is not a definitive set of descriptions but a possibility of the final deployment. we will investigate the 10 pillars for 5G which will include various Radio Access Technologies that are required to interwork smoothly. We will look at the 4G Pro features and other RATs. What will you learn List the ten pillars of 5G deployment. Describe the 5G Internet. Explain virtualization and RAT virtulization. Describe Software Defined Networks (SDN). Explain carrier aggregation. Describe the mobile cloud. Explain an overall picture of 5G architecture. Essential 5G training course details Who will benefit: Anyone looking for an understanding of the technologies and interworking requirements of the next generation of cellular communications. Prerequisites: None. Duration 3 days Essential 5G training course contents Drivers for 5G 5G Road Map, 10 Pillars of 5G, evolving RATs, oSON, MTCm, mm-wave, backhaul, EE, new spectrum, spectrum sharing, RAN virtualisation. 4G LTE Advanced MIMO technology in release 8, Downlink & uplink MIMO R8, MIMO technology in LTE advanced, Downlink 8-layer SU-MIMO, Downlink MU-MIMO, Uplink MU-MIMO, Uplink transmit diversity, Coordinated multi-point operation (CoMP), Independent eNB & remote base station configurations, Downlink CoMP. ICIC & eICIC ICIC, Homogeneous to heterogeneous network evolution, Introduction to eICIC, Macro-pico scenario, Macro-femto scenario, Time orthogonal frequencies. Almost Blank Subframe (ABS). Carrier aggregation Component carriers (CC), CC aggregation deployments, Intra-band contiguous solutions, Intra-band non-contiguous solutions, Inter-band non-contiguous solutions, CA bandwidth classes, Aggregated transmission bandwidth configurations (ATBC), Possible carrier aggregation configs. eIMTA TDD UL-DL reconfig. for traffic adaptation, Reconfig. mechanisms, Interference mitigation schemes, Dynamic & flexible resource allocation. 5G architectures 5G in Europe, horizon 2020 framework, 5G infrastructure PPP, METIS project, 5G in North America, academy research, company R&D, 5G specifications. The 5G internet High-level view of Cloud Services, The Internet of Things & context awareness, Network reconfiguration & virtualization support, server proliferation, how VMs fix underutilised server problem, enter the hypervisor, why are VM such a big deal? SDN, evolution of the data centre network, high availability, low latency, scalability, security, cost model explodes, service-oriented API. OpenFlow switches, OpenFlow controllers, how SDN works. The big picture, pulling it all together, why the network had to change, how SDN & NFV tie together. Evolutionary approach to the internet, architectures for distributed mobility management, MEDIEVAL & MEDIVO projects, a clean slate approach, mobility first architecture. VNet, INM, NetInf, ForMux, MEEM. Generic Path (GP) & anchorless mobility (AM), Quality of Service support, network resource provisioning, resourcing inside a network. IntServ, RSVP, DiffServ, CoS. Emerging approach for resource over- provisioning, example use case architecture for scalable resource control scenarios in the 5G internet. Integrating SDN/NFV for efficient resource over-reservation control, control information repository, service admission control policies, network resource provisioning, control enforcement functions, network configurations & operations. Small cells for 5G Average spectral efficiency evolution, WiFi & Femto cells, Capacity limits. Achievable gains with densifications, multi-antenna techniques, small cells. Mobile data demand, approach & methodology, subscriber density and traffic demand projections to 2020. Demand versus capacity, global mobile data traffic increase modelling, country level backhaul traffic projections, Small cell challenges, backhaul, spectrum, automation. Cooperation for next gen wireless networks Diversity & relaying strategies, cooperation & network coding, ARQ & MAC protocols, NCCARQ & PRCSMA packet exchange, Physical layer impact on MAC protocol analysis, NCCARQ overview, PHY layer impact, Case study on NCCARQ. Mobile clouds Mobile cloud, Mobile cloud enablers, mobile user domain, wireless technologies, WWAN WLAN and WPAN range, Bluetooth, IEEE.802.15.4 & software stacks, infrared, near field communications (NFC). Network coding, store & forward vs compute & forward, linear network coding, random linear coding. Security for 5G communications Potential 5G communication systems architectures, Security issues & challenges. Mobile malware attacks targeting the UE, 5G mobile botnets, access networks, attacks on 4G networks, C-RNTI & packet sequence number based UE location tracking, false buffer status reports attacks, message insertion attacks, HeNB attacks, physical attacks, credential attacks, configuration and protocol attacks, attacks on MON, user data & identity attacks, mobile operator's core network, DDoS attacks targeting MON, signalling amplification, HSS saturation, external IP networks.
Junos Operating System training course description This course provides students with the foundational knowledge required to work with the Junos OS and to configure Junos devices. The course provides a brief overview of the Junos device families and discusses the key architectural components of the software. The course then delves into foundational routing knowledge and configuration examples including general routing concepts, routing policy, and firewall filters. Delegates will gain experience in configuring and monitoring the Junos OS and monitoring basic device operations. This course is based on Junos OS Release 15.1X49. What will you learn Describe the design architecture of the Junos OS. Navigate within the Junos CLI and perform tasks within the CLI operational and configuration modes. Configure and monitor network interfaces. Navigate within the Junos J-Web interface. Identify where you might use firewall filters. Explain basic routing operations and concepts. Identify key factors in Juniper Networks' security. Junos Operating System training course details Who will benefit: This course benefits individuals responsible for configuring and monitoring devices running the Junos OS. Prerequisites: TCP/IP foundation for engineers Duration 3 days Junos Operating System training course contents Junos Operating System Fundamentals The Junos OS Traffic Processing Overview of Junos Devices User Interface Options-The Junos CLI User Interface Options The Junos CLI: CLI Basics The Junos CLI: Operational Mode The Junos CLI: Configuration Mode User Interface Options-The J-Web Interface The J-Web GUI Configuration Lab 1: User Interface Options Initial Configuration Factory-Default Configuration Initial Configuration Interface Configuration Lab 2: Initial System Configuration Secondary System Configuration User Configuration and Authentication System Logging and Tracing Network Time Protocol Archiving Configurations SNMP Lab 3: Secondary System Configuration Operational Monitoring and Maintenance Monitoring Platform and Interface Operation Network Utilities Maintaining the Junos OS Password Recovery System Clean-Up Lab 4: Operational Monitoring and Maintenance Interface Configuration Examples Review of the Interface Configuration Hierarchy Interface Configuration Examples Using Configuration Groups Routing Fundamentals Routing Concepts: Overview of Routing Routing Concepts: The Routing Table Routing Concepts: Routing Instances Static Routing Dynamic Routing Lab 5: Routing Fundamentals Routing Policy Routing Policy Overview Case Study: Routing Policy Lab 6: Routing Policy Firewall Filters Firewall Filters Overview Case Study: Firewall Filters Unicast Reverse-Path-Forwarding Checks Lab 7: Firewall Filters Class of Service CoS Overview Traffic Classification Traffic Queueing Traffic Scheduling Case Study: CoS Lab 8: Class of Service JTAC Procedures Opening a Support Case Customer Support Tools Transferring Files to JTAC Juniper Security Concepts Security Challenges Juniper's Security Focus Appendix A: IPv6 Fundamentals IPv6 Addressing Protocols and Services Configuration
IP broadcast training course description A current hot topic in recent years has been the provision of multimedia services over IP networks aka triple or quadruple play. This course investigates the characteristics of video transmission and then studies the impact on IP networks. What will you learn Use Wireshark to analyse and troubleshoot TV streams. Describe techniques, which can be used in IP to provide low uniform delay. Evaluate IPTV technologies. Design data networks, which will support IPTV. IP broadcast training course details Who will benefit: Anyone working in broadcast. Prerequisites: TCP/IP foundation for engineers Duration 3 days IP broadcast training course contents What is IPTV? What is IP? What is TV? Pixels, frames, colour, digital modulation, digital video broadcasting. SDTV, HDTV, 4K. IPTV architectures, Contribution, distribution, delivery. IPTV standards. Hands on Base IP connectivity, VLC. IPTV protocol stacks IP, TCP, UDP, RTP. IPv6. HTTP. Bandwidth requirements. Hands on IPTV bandwidth calculations. Video codecs What is a CODEC, pictures and audio, digitisation, sampling, quantisation, encoding, compressing. MPEG, bit rates, resolution. I, B, P frames, GOP. MPEG 2, MPEG 4, H.264, H.265, VP9, AV1. Hands on Analysing MPEG frames. IP issues Quality vs. bandwidth. Bandwidth, delay, latency, jitter, signalling. Routers. Hands on Analysing jitter and other performance issues. IPTV performance and QoS IP DSCP field, queuing strategies; FIFO, WFQ, custom, priority, RED. Differentiated services, Diffserv. 802.1Q. Traffic shaping. QoE. Hands on best effort versus prioritisation. UDP versus TCP Reliable, unreliable, connection oriented, connectionless. Broadcasts, multicasts and unicasts. TCP flow control, TCP and performance. Hands on TCP window sizes. RTP RTP, ports, mixers, translators, RTCP, SMPTE, FEC. Hands on RTP analysis with Wireshark. Multicasting Multicasting compared to unicasting and broadcasting, when to use and when not to use multicasting. IGMP, PIM-SM, SSM. MLD. Hands on Analysing multicast streams. OTT TV HTTP, HTTPS, Chunked HTTP. Adaptive streaming. HTML5. DASH vs HLS. Hands on Analysing HTTP streams. Security Firewalls, TLS, DRM, watermarking. Encryption. Geolocation. VPNs. IPTV architecture and other protocols Content providers, Service providers, delivery networks, home networks. Caching, Service discovery. RTSP. SAP, SDP. DHCP, DNS, NTP