Essential OTN training course description An In-depth introduction to the terminology and technology that will comprise tomorrow's Optical Transport Networks. What will you learn Describe the problems with old technologies. Identify the purpose of new technologies. Describe the functionality of the various transmission mediums available Identify OTN features and functionality. Define the issues involved in equipment and application rollout. Essential OTN training course details Who will benefit: Anyone wishing to learn OTN. Prerequisites: SDH foundation or Essential DWDM Duration 2 days Essential OTN training course contents Scope, References Terms and definitions, Abbreviations and Conventions Optical transport network interface structure Multiplexing/mapping principles and bit rates Optical transport module (OTM-n.m, OTM-nr.m, OTM-0.m and OTN 0.mvn) Physical specification of the ONNI Optical channel (OCh) Optical channel transport unit (OTU) Optical channel data unit (ODU) Optical channel payload unit (OPU) OTM overhead signal (OOS) Overhead description and maintenance signals Mapping of client signals and concatenation Mapping ODUk signals into the ODTUjk signal Forward error correction using 16-byte interleaved RS (255,239) codecs ODUk tandem connection monitoring (TCM) overhead OPUk Multiplex Overhead Amendment 2 including: OTN Multiplexing and Mapping, Basic signal structure, ODTU12, ODTU13, ODTU23, OPUk Multiplex Overhead, OPUk Multiplex Structure Identifier (MSI). OPU2 Multiplex Structure Identifier (MSI), OPU3 Multiplex Structure Identifier (MSI), OPUk Payload Structure Identifier Reserved overhead (RES), ODU1 into ODU2 multiplexing, ODU2 into ODU3 multiplexing, ODU1 into ODU3 multiplexing Amendment 3 including: 40 Gbit/s ODU3/OTU3 and 100 Gbit/s ODU4/OTU4, Support of gigabit Ethernet services via ODU0, ODU2e, ODU3 and ODU4, ODU0 and ODUFlex, Multi-lane OTU3 and OTU4 interfaces, Support for InfiniBand Amendment 4 including: OTSn OTN synchronization messaging channel (OSMC) overhead, FC-1600 Amendment 5 Including: ODUk.ts, OTU0LL (OTU0 low latency), OTSiA (optical tributary signal assembly). OTSiG (optical tributary signal group), OTSiG-O (optical tributary signal overhead), CMEP (connection monitoring end- point), CMOH (connection monitoring overhead), MOTU (Multi-OUT), MOTUm (Multi-OTU with management), OTUCn-M (Optical Transport Unit-Cn, with n OxUC overhead instances and 5G tributary slots). SOTU (Single-OUT). SOTUm (Single-OTU with management). Modified bit rates and capacity for OTU1/2/3/4 OTM.nr.m, OTM.n.m, OTM.0.3v4, OTM 0.4v4 Mapping of CBR2G5, CBR10G, CBR10G3 and CBR40G signals into OPUk 64B/66B and 513B block code format PCS lane alignment marker for 40GBASE-R and 100GBASE-R PT=20/PT=21 and AMP/GMP options OTL 4.10 to OTL 4.4 gearbox ODU switching and Line protection Schemes 10 x 10 MSA Overview of current and future coherent and noncoherent technologies 40Gbit and 100Gbit compliant ROADM's Implementers Guide including replacement terms. Differing vendor's equipment and their implementations Individual and group planning exercises: Upgrade a customer STM-64/10G network to a 40G/ OTN network. Upgrade a customer old 16 Wavelength WDM network to be OTN compliant. Implement a new customer 40 wavelength OTU3 OTN compliant MSPP (DWDM) network. Design a cost-effective solution where we can hand over circuits using 'Optical Transport Lanes'.
Project Risk Management: In-House Training Have you been surprised by unplanned events during your projects? Are you and your project team frequently fighting fires? Well, you are not alone. Uncertainty exists in any project environment. While it's impossible to predict project outcomes with 100% certainty, you can influence the outcome, avoid potential risks, and be ready to respond to challenges that arise. In this course, you'll gain the proper knowledge needed to identify, assess, plan for, and monitor risk in your projects. You'll learn how to set up and implement risk management processes, helping you to minimize uncertainty and achieve more consistent, predictable outcomes as a result. What You Will Learn You'll learn how to: Demonstrate to others how the risk management processes in A Guide to the Project Management Body of Knowledge (PMBOK® Guide) apply to your project's environment, especially for high-risk projects Adapt these processes for a particular high-risk project team's operating principles Explain the importance of using risk management best practices at single and enterprise project levels Lead an initiative to implement risk management best practices in your project environment Foundation Concepts Risk-related definitions The risk management process High-risk projects and project failures Classical failures in implementing risk management Plan Risk Management Project risk management and governance Risk management planning for high-risk projects High-risk variations on a risk management plan Identify Risk Adapting the risk identification process for high-risk projects Recognizing risks spontaneously Confirming and structuring risk events for treatment Wrapping up risk identification for high-risk projects Perform Qualitative Risk Analysis Adapting qualitative risk analysis for high-risk projects Accelerating risk analysis Clearing risk action Wrapping up qualitative risk analysis for the next level Perform Quantitative Risk Analysis Adapting quantitative risk analysis for high-risk projects Ensuring effective risk analyses with data quality assessments Building a foundation for quantitative risk analysis Using discrete quantitative tools Using continuous quantitative tools Wrapping up quantitative risk analysis for high-risk projects Plan Risk Responses Adapting risk response planning for high-risk projects Optimizing active risk response strategies Leveraging contingencies for high project performance Wrapping up risk response planning for high-risk projects Implement Risk Responses Implementing Risk Responses Process Executing Risk Response Plans Tools and Techniques Best Practices Continuous Risk Management Monitor Risks Adapting risk monitoring for high-risk projects Optimizing risk plan maintenance Weaving risk reassessment into the project's progress Maintaining a continuous 'vigil' in high-risk project environments
MEF Carrier Ethernet training course description The course progresses from a overview of the Carrier Ethernet service and how it works onto looking at the concepts in depth. Service attributes and management follow with the course finishing with studies of practical Carrier Ethernet. What will you learn Discuss and understand key Carrier Ethernet Concepts. Understand tasks related to designing, deploying and maintaining a Carrier Ethernet network. Offer effective solutions to implementing a Carrier Ethernet enterprise network given available customer resources and requirements. Carry out informed discussions using industry Carrier Ethernet 'vocabulary. Pass the MEF CECP 2.0 professional accreditation exam. MEF Carrier Ethernet training course details Who will benefit: Anyone working with Carrier Ethernet Prerequisites: The course attendees need to be conversant with data networks, as well as Ethernet and IP technologies. Duration 5 days MEF Carrier Ethernet training course contents Section One: Introduction to Carrier Ethernet Introduction to Carrier Ethernet: What is Carrier Ethernet? Evolution, advantages, The MEF, MEF specifications; UNI, EVC, OVC, EPL/EVPL, EP-LAN/ EVP-LAN, EP-Tree/EVP-Tree, etc, overview. How Carrier Ethernet Works: Service Frame Handling. Carrier Ethernet at Customer Premises, metro and core. Carrier Ethernet Workings, UNI attributes, Service Attributes (EVC and EVC per UNI attributes), Bandwidth Profiles, service multiplexing, L2 protocol processing; Carrier Ethernet equipment, CPE, aggregation and homing nodes, core equipment; management systems. The Setting Up of a Carrier Ethernet Service: Step 1: Choose service type, EPL/EVPL, EP-LAN/EVP-LAN, EPTree/EVP-Tree, EVLine...; Step 2: CPE tasks, UNI-C tasks (UNI attributes, service attributes (EVC and EVC per UNI) and bandwidth profiles), UNI-N tasks (L2 protocol handling). Step 3: Non-CPE tasks, Access, metro and core connections set up. Section Two: Carrier Ethernet Concepts in depth Carrier Ethernet Definitions in Depth: UNI, UNI I & II, UNI-N and UNI-C, etc.; NNI/ENNI; EVC; OVC, OVC type (P2P, M2M, Rooted MP), OVC end point (root, leaf, trunk), OVC end point map, OVC end point bundling; Service types in detail, EPL/EVPL, EP-LAN/EVP-LAN, EP-Tree/EVP-Tree, EVLine, Access EPL, Access EVPL . Carrier Ethernet Service Frame Handling: Unicast, multicast and broadcast frame delivery, Tagged, untagged and priority; Tagging, C and S-Tags, 802.3, 802.1d, 802.1q, 802.1ad, 802.1ah evolution, VLAN ID translation/preservation. CoS preservation. Other Key Carrier Ethernet Concepts: MTU, MTU at UNI, MTU at ENNI; Physical Layer Attributes, FE, GbE and 10GbE, Service Multiplexing and Bundling Concept and detail, rules and implications; Hairpin Switching Managing Bandwidth in a Carrier Ethernet Network: Token Bucket Algorithm, EIR, CIR, CBS, EBS, Coupling Flag; Frame Colors, recoloring, Color Awareness attribute, Color Forwarding; Bandwidth Profiles, rules and concepts. MEF CoS identifiers, DEI bit (in S-Tag), PCP bit (in C-Tag or S-Tag), or DSCP (in IP header), Multiflow bandwidth concepts; CoS Label/Color Identification. Section Three: Carrier Ethernet Service Attributes Overview: Carrier Ethernet 2.0; Blueprint C Service Attributes: Per UNI, Physical interfaces, Frame format, Ingress/egress Bandwidth Profiles, CEVLAN ID/EVC Map, UNI protection. EVC per UNI, Ingress/egress Bandwidth Profiles, etc.; Per EVC, CEVLAN ID Preservation, CoS ID Preservation, Relationship between SLA and SLP, Class of Service, etc. OVC, ENNI, OVC End Point per UNI and OVC End Point per ENNI, Ingress/egress bandwidth profiles, etc. Section Four: Managing Carrier Ethernet Networks Overview: MEF Service Lifecycle.Carrier Ethernet maintenance: Port, Link & NE failure, Service Protection Technologies, Fault Identification and Recovery, LAG, Active/Standby EVC, Single EVC with transport protection, G.8031, G.8032, MPLS FRR. SOAMs: Connectivity fault management, connectivity Monitoring, Loopback, Linktrace; Performance Management, Frame Delay, Inter Frame Delay Variation, Availability, Frame Loss Ratio, Resiliency, HLI, DMM, DMR, SLM, SLR; Key Concepts, Single vs dual ended, ordered UNI pair calculations. LOAMs: Link discovery, link monitoring, etc. Terminology and Concepts: MEG levels, MIPs. Section Five: Practical Carrier Ethernet Carrier Ethernet Transport Technologies:Layer 1: SDH. Layer 2: Bridging, provider bridging, PBB, PBBTE. Layer 2.5: MPLS VPWS, MPLS VPLS, MPLS-TP. Carrier Ethernet Access Technologies: fiber, SDH, active fiber, PON, GPON, 10G PON, OTN, WDM; copper, PDH, G-SDSL, 10Pass-TS, HFC; packet radio. Optimising mobile backhaul with Carrier Ethernet Key challenges solutions: Market pressure, LTE evolution, elements and architecture (RAN BS, NC, GWIF.), synchronization, bandwidth management. Circuit Emulation over Ethernet: Purpose, needs and applications. Synchronization: Phased, ToD, External Reference source, SynchE ,NTP, IEEE-1588 v2/ PTP, ACR; MEF Service Definitions for emulated circuits. Applying what you know: Practical examples and scenarios, Carrier Ethernet solutions; Practice Scenarios, Given a scenario, determine appropriate Ethernet services
Gain the knowledge and skills for safe and effective intravenous therapy with our "Intravenous Administration of Fluid and Medication" course. Ideal for healthcare professionals administering IV fluids and medications.
This course provides the basic requirements for auditing I&HAS to PD 6662, EN 50131, BS 8243, and access control / CCTV systems to certification bodies' standards. The course enables certified contractors to conduct objective auditing of their own systems.
Gain comprehensive knowledge and practical skills for safe and effective fine-bore nasogastric tube insertion, care, and use with our healthcare professional course.
About this Virtual Instructor Led Training (VILT) This 3 half-day Virtual Instructor Led Training (VILT) course will help participants grasp the idea of real-world risk management and how this relates to the cyber world. The VILT course will cover topics surrounding identifying cyber risks and vulnerabilities, guidance on applying administrative actions, and comprehensive solutions to ensure your organization is adequately secure and protected. The VILT course will guide participants on how to conduct a security risk assessment for their organization, and equip them with the skills to develop a risk compliance assessment plan as well as methods to develop risk management strategies which can improve their organization's security posture. The VILT course has at least a 30% hands-on approach through the use of Table Top Exercises. The VILT course will cover the following modules: Introduction to Risk Assessments (RA) Threat Actors and Their Motivations Threat and Risk Assessment Critical Controls Identification Maturity Assessment Treated Cyber Risk Profile Target Cyber Risk Profile and Strategy Target Audience The VILT course is intended for professionals responsible for organizational information and security system and those involved in operating and maintenance of critical information and IT network & sotware systems. Professionals who are designated as the Single Point of Accountability (SPoA) as well as system auditors will find this course useful. Course Level Basic or Foundation Training Methods The VILT course will be delivered online in 3 half-day sessions comprising 4 hours per day, with 2 x 10 minutes break per day, including time for lectures, discussion, quizzes and short classroom exercises. Course Duration: 3 half-day sessions, 4 hours per session (12 hours in total). This VILT course is delivered in partnership with ENGIE Laborelec. Trainer Your expert course leader is a is specialized in cybersecurity risk management. Before joining ENGIE, she worked for The National Cybersecurity Agency of France (ANSSI) based in Paris (France) and for Deloitte Belgium located in Zaventem (Belgium). She has been involved in cybersecurity projects focusing on the principle of protecting critical infrastructures. Her different experiences in Cyber Security, Anti-Money Laundering and Global Trade Compliance (including Export Control and Customs) gave her the opportunity to use methodologies tackling strategic, operational and financial control issues at all levels of an organization: people, business processes, IT applications and infrastructure, legal and regulatory compliance. She was an EBIOS Risk Manager (RM) trainer while she worked for the French government; EBIOS RM is the French method for assessing and treating digital risks. She also had the opportunity to represent France towards European institutions and other relevant stakeholders for topics related to cybersecurity risk management. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations
If you want to start installing independently or with an electrical contractor look no further as this course will give you the skills and knowledge required. This package which will allow you to become a fully qualified domestic installer and enable you to join a Competent Person Self-Certification Scheme and certify your own domestic work.
About this Virtual Instructor Led Training (VILT) This 2-half-day Virtual Instructor Led Training (VILT) course will discuss the chemical aspects of the water-steam cycle in a power plant. The VILT course will examine the different types of chemicals used in boilers, potential issues in a water-steam cycle as well as aspects of monitoring and specifications regarding target values and alarm levels. Participants will also be equipped on what to do or key action steps to take in the event of chemistry-related incidents. This course is delivered in partnership with ENGIE Laborelec. Training Objectives The VILT course will cover the following: Detailed aspects of chemistry in a water steam cycle, including types of chemicals used in boilers depending on the treatment and type of boiler Potential issues in a water-steam cycle such as corrosion and deposition Monitoring & analytical programmes and knowledge of specifications for the water steam cycle (normal values targets - alarm levels) Chemistry aspects during transition periods: start-up, shutdown and preservation Actions to be taken in the event of an alarm Examples of incidents or deviations compared to normal chemistry Target Audience The VILT course is intended for: Power plant chemists Plant operation or maintenance engineers Consultants and technical project managers Boiler engineers Course Level Basic or Foundation Training Methods The VILT course will be delivered online in 2 half-day sessions comprising 4 hours per day, with 2 x 10 minutes break per day, including time for lectures, discussion, quizzes and short classroom exercises. Course Duration: 2 half-day sessions, 4 hours per session (8 hours in total). Trainer Your expert course leader is a chemistry consultant in the energy sector. He works with operators of power plants and industrial facilities. He is active in water-steam cycle chemistry, where he provides support to increase chemistry maturity through audits, trainings or development of key performance indicators. His role also includes operational assistance in the field of chemical cleaning and troubleshooting. More recently, he expanded his field of competence towards electrical storage. In this regard, he specializes in electrochemistry and is in charge of different tests on batteries and their components within the ENGIE Batteries Lab. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations