The Master of Business Administration (MBA) is a prestigious postgraduate qualification that is highly valued by leading employers. It can boost your salary, increase your professional reputation and expand your networking opportunities. If you're a graduate with some business experience and ambitions for a high-flying career, studying for an MBA could be just what you need to make the next step. Our 24 months MBA programme equips you to think logically, laterally and independently through 2 stage intensive, immersive, and challenging programme. With the advantage of studying on the job, anytime and anywhere, you get Cost Advantage and same degree which is given to full time students at the University Campus. This 24 months MBA programme is not just an academic course. By exploring and examining real-life business problems to work on and solve, you enhance your own understanding of how a business works. We take a strategic perspective on business and management that helps you develop the skills to contribute to the major business decisions organisations have to make about their future. Program Overview: Master of Business Administration (MBA) - 24 Months Key Highlights of Master of Business Administration (MBA) - 24 Months qualification are: Fully Recognized and Globally Accepted Degree Program Duration: 24 Months (12 months / 18 months duration programme also available) Program Credits: 180 Designed for working Professionals Format: Online Student to faculty ratio of just 15:1 No Written Exam. The Assessment is done via Submission of Assignment and University Dissertation Project Same Degree which is given to Full Time students at the University Campus. Study material: Comprehensive study material and e-library support available at no additional cost. Tutor Assist available Dedicated Student Success Manager Timely Doubt Resolution Regular Networking Events with Industry Professionals Become eligible to gain direct entry into relevant Doctorate / PhD programme. LSBR Alumni Status No Cost EMI Option Top Skills You Will Learn MBA 24 months is widely seen as a passport to a successful career. It demonstrates the breadth and depth of your functional competence, strategic knowledge and problem-solving ability. Course Structure: MBA 24 MonthsThis 24 months MBA programme consists of 2 Stages.Stage 1: This stage is delivered by London School of Business and Research. The programme involves delivery through on-line Learning Management System (LMS). This stage leads to award of Level 7 Diploma in Strategic Management and Leadership. Credits earned at this stage - 120 credits (60 ECTS). Mandatory units Strategic Management (20 Credits)Strategic Leadership (20 Credits)Strategic Human Resource Management (20 Credits)Advanced Business Research Methods (20 Credits) Optional units(Choose any 2units to make 120 credits) Strategic Financial Management (20 Credits)Supply Chain and Operations Management (20 Credits)Entrepreneurship and Innovation (20 Credits)Globalisation and Corporate Governance (20 Credits)Strategic Change Management (20 Credits)Strategic Marketing (20 Credits) Successful completion of Stage 1 leads to Progression to Stage 2Stage 2: Delivered by the University / awarding body. On completion of the diploma programme you progress / Top up with Degree through a UK University for progression to the MBA degree. The stage 2 is delivered via distance learning by faculties from the University / awarding body. Credits earned at this stage - 60 credits (30 ECTS). Completion of Stage 2 leads to award of MBA Degree Dissertation Project Successful completion of Stage 2 leads to award of Degree by the university. Who is this course for? MBA in 24 Months programme is ideal for working professionals, successful managers, executives and professionals who want to take their career to a new level and Ambitious people who want to fast track their chosen career or start a new enterprise
Microsoft security training course description A hands on training course focusing on security in the Microsoft environment. The course progresses from patch management onto the use of Microsoft security tools. Then server, desktop and network security are studied in the Microsoft environment. What will you learn Use Microsoft security tools. Secure Microsoft servers. Secure Microsoft desktops. Secure Microsoft networks. Microsoft security training course details Who will benefit: Technical server support staff. Technical desktop support staff. Technical network staff. Technical security staff. Prerequisites: Supporting Windows server 2016 Networking Microsoft systems. Duration 3 days Microsoft security training course contents Introduction Security threats, Microsoft defaults, admin accounts, security patches, patch management, patch tools. Hands on: Studying Microsoft defaults, applying security patches. Microsoft security tools Microsoft updates, WSUS, Inventory tool, baseline security analyser, URLscan, EventCombMT, Cipher security tool, Port reporter, PortQry. Tools hackers use. Hands on: Using Microsoft security tools. Server security Checklists, core server security, AD, Member server security, Domain controller security, Specific roles. Hands on Hardening Microsoft servers, security templates. Active Directory Admin authority in AD, group policy, trust and authentication. Desktop security Checklists, core client security, anti virus software, anti spyware software, firewalls, securing clients with AD, securing clients with group policy, software restriction policies. Hands on Securing Microsoft desktops. Network security Checklist, IP security, VPNs, PKI, certificate authorities, RAS, RRAS, IAS. Hands on: VPN configuration, IAS configuration. Monitoring Auditing, authorisation and logons, tracking, system monitoring, detecting attacks. Hands on: Monitoring Microsoft systems. Summary Microsoft security response centre, security advisories.
Network forensics training course description This course studies network forensics-monitoring and analysis of network traffic for information gathering, intrusion detection and legal evidence. We focus on the technical aspects of network forensics rather than other skills such as incident response procedures etc.. Hands on sessions follow all the major sections. What will you learn Recognise network forensic data sources. Perform network forensics using: Wireshark NetFlow Log analysis Describe issues such as encryption. Network forensics training course details Who will benefit: Technical network and/or security staff. Prerequisites: TCP/IP foundation for engineers. Duration 3 days Network forensics training course contents What is network forensics? What it is, host vs network forensics, purposes, legal implications, network devices, network data sources, investigation tools. Hands on whois, DNS queries. Host side network forensics Services, connections tools. Hands on Windows services, Linux daemons, netstat, ifoconfig/ipconfig, ps and Process explorer, ntop, arp, resource monitor. Packet capture and analysis Network forensics with Wireshark, Taps, NetworkMiner. Hands on Performing Network Traffic Analysis using NetworkMiner and Wireshark. Attacks DOS attacks, SYN floods, vulnerability exploits, ARP and DNS poisoning, application attacks, DNS ANY requests, buffer overflow attacks, SQL injection attack, attack evasion with fragmentation. Hands on Detecting scans, using nmap, identifying attack tools. Calculating location Timezones, whois, traceroute, geolocation. Wifi positioning. Hands on Wireshark with GeoIP lookup. Data collection NetFlow, sflow, logging, splunk, splunk patterns, GRR. HTTP proxies. Hands on NetFlow configuration, NetFlow analysis. The role of IDS, firewalls and logs Host based vs network based, IDS detection styles, IDS architectures, alerting. Snort. syslog-ng. Microsoft log parser. Hands on syslog, Windows Event viewer. Correlation Time synchronisation, capture times, log aggregation and management, timelines. Hands on Wireshark conversations. Other considerations Tunnelling, encryption, cloud computing, TOR. Hands on TLS handshake in Wireshark.
Application delivery training course description A concise hands on course covering section 1 of the F5 networks AD fundamentals exam. The course focuses on the technology and not any one manufacturers product. This will enable delegates to work with devices from any manufacturer. Practical hands on with Cisco and Microsoft systems follow the major sessions to reinforce the theory. What will you learn Explain, compare and contrast the OSI layers. Explain protocols and technologies specific to the data link layer. Explain protocols and apply technologies specific to the network layer. Explain the features and functionality of protocols and technologies specific to the Transport layer. Explain the features and functionality of protocols and technologies specific to the Application layer Application delivery training course details Who will benefit: Anyone taking the F5 networks AD fundamentals exam. Technical staff working in Application delivery. Prerequisites: None. Duration 3 days Application delivery training course contents What is TCP/IP? Protocols, services. The Internet, RFCs, The OSI 7 layer model. Layer 1 cables. Ping and addressing Host configuration of IP addresses, subnet masks, default gateways, ipconfig, ping. Hands on Configuring TCP/IP, ping. Ethernet and the data link layer 802.3, evolution, choosing cables, topologies, CSMA/CD, hubs, NICs, MAC addresses. Hands on Analysing MAC addresses. IP and Ethernet Relationship. Hands on ARP. What is a switch? Switches connect multiple devices, switches versus hubs, simultaneous conversations, switches work at layer 2, the forwarding database, how the forwarding database is built, broadcast and collision domains. Hands on Difference between hubs and switches. Link aggregation Loops, broadcast storms, STP, Architectures, modes, link aggregation, load sharing, resilience. Hands on fail over times. VLANs Virtual versus physical LANs, Why have VLANs? Broadcast domains. Hands on VLANs effect on traffic. IP IP datagram format, ICMP datagram format. Hands on Analysing IP and ICMP packets. IP addressing Format of addresses, registering, dotted decimal notation, choosing addresses, DHCP. Hands on impact of addressing errors. Routing What is a router? Reason for routing, network addressing, default gateways, how routing works, routing and addresses, routing tables, traceroute. Hands on Using a routed network. Routing protocols IGPs, EGPs, RIP & OSPF. Hands on Configuring routers for RIP and OSPF. Subnetting When to subnet, subnet masks, working with subnetting, CIDR notation. Hands on Changing the routed network to use subnetting. The transport layer UDP, Ports, TCP, acknowledgements, sliding windows. Hands on Analysing packets. Applications Clients, servers, web, Email SMTP, resource sharing, IM, VoIP, Video over IP, terminal emulation, FTP. Hands on FTP, SIP. Web pages URLs, DNS, names to IP addresses. HTTP, versions and status codes. Keepalives, cookies. Hands on Analysing HTTP headers.
Certificate in Business and Commercial Law (CBCL) Why Attend This course is designed for professionals with little or no prior legal background but who are required to make organizational decisions involving legal matters. It will provide participants with the fundamental principles of commercial law, including commercial contracts and negotiation, sale of goods, intellectual property rights and employee relations. It also covers all the legal aspects of setting up a business, running a business and closing a business Participants will gain an in-depth understanding of international commercial law with emphasis on the common law system. Participants will have the opportunity to learn and analyze key legal issues regarding contracts and the business as a whole which they are likely to encounter within their organization. Course Methodology In this interactive training course participants will frequently work in pairs as well as in larger groups to complete exercises as well as regional and international case studies. Course Objectives By the end of the course, participants will be able to: Apply legal rules and principles to speciï¬c commercial situations through consideration of relevant case law Negotiate commercial contracts complying with commercial and legal requirements Increase proï¬tability within their organization by selecting appropriate methods of distribution of goods Recognize and analyze how intellectual property rights aï¬ect their organization Evaluate and modify organizational employment practices complying with labor law requirements Target Audience This course is suitable for those with little or no formal training in commercial law yet would be required to understand the fundamentals of commercial law as it may directly impact their work. It will particularly beneï¬t directors and executives who have direct responsibility for legal decisions within the organization. In-house council new to the region, and those working within a legal department, will also ï¬nd this course highly beneï¬cial. Target Competencies Drafting Contracts Contract Negotiation Understanding Commercial Terms Understanding Employment Law Implementing Organizational Employment Practices Understanding Intellectual Property Understanding corporate restructuring Understanding the effect of breach of commercial contract terms Note The Dubai Government Legal Aï¬airs Department has introduced a Continuing Legal Professional Development (CLPD) programme to legal consultants authorised to practise through a licensed ï¬rm in the Emirate of Dubai. We are proud to announce that the Dubai Government Legal Aï¬airs Department has accredited EMG Associates as a CLPD provider. In addition, all our legal programmes have been approved. This PLUS Specialty Training Legal course qualiï¬es for 4 elective CLPD points. Overview of commercial & business law Areas of commercial and business law Types of commercial contracts Commercial contracts in the civil law and common law systems Sources of English law Civil law v Common law Civil law in the GCC Formalities for a binding contract Elements required for an enforceable contract Rules for contract interpretation implied terms v express terms identifying risks and how to minimise risks Structure of a commercial contract Preliminary documents in international transactions Memorandum of Understanding/ Heads of Terms. Are they legally binding? Commercial implications Boilerplate/ miscellaneous provisions- the important but forgotten clauses- beware! Force majeure v Frustration Notices Set oï¬ No waiver Entire Agreement/ non- reliance clause Times is of the essence Assignment v Novation Governing law Common mistakes in choice of law Jurisdiction clause Exclusive v Non-exclusive Factors in deciding the jurisdiction clause International dispute resolution Litigation Importance of Alternative Dispute Resolution (ADR) Arbitration Mediations Conciliation Negotiation Remedies for breach of contract Damages Specific performance Injunctions Advantages and disadvantages of different business forms Types of business vehicles Sole trader Partnerships Limited Liability Partnerships Companies Cross Border Transactions Distributorship Agency Joint Venture Acquisitions Share purchase v Business purchase Apportioning risks and liabilities through warranties and indemnities Negotiating warranties and indemnities Corporate insolvency Tests identifying insolvency Consequence for directors who fail to react to insolvency Types of insolvency Administration Receivership Creditor Voluntary Liquidation Compulsory Liquidation Commercial Tort Tort of negligence Defamation Libel Slander Recent case law on defamation Managing risk Prevention is better than cure: Eï¬ective risk management Intellectual Property Rights management Types of Intellectual Property copyright trademark patent design rights confidential information Assignment v Granting a license The law of passing off Intellectual Property in the GCC Employment law issues in the common law systems and the GCC Types of employment contracts Grounds for dismissal Wrongful dismissal Redundancy Unfair dismissal Commercial real estate in the GCC Leasehold Freehold
RESILIA™ Foundation: In-House Training AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial and government organizations around the world prevent, detect, and correct any impact cyber attacks will have on the information required to do business. Adding RESILIA to the existing AXELOS global best practice portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management, and business. Active cyber resilience is achieved through people, process, and technology. The RESILIA™ Foundation course starts with the purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions, and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities. What you will Learn At the end of this course, you will be able to: Demonstrate your knowledge of the purpose, benefits, and key terms of cyber resilience Demonstrate your knowledge of the risk management and the key activities needed to address risks and opportunities Demonstrate your knowledge of the purpose of a management system and how best practices and standards can contribute Demonstrate your knowledge of the cyber resilience strategy, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience design, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience transition, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience operation, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience continual improvement, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of the purpose and benefits of segregation of duties and dual controls Course Introduction Course Learning Objectives Course Agenda Activities Course Book Structure RESILIA Certification Introduction to Cyber Resilience What is Cyber Resilience? Defining Cyber Resilience Balancing in Cyber Resilience Characteristics of Cyber Resilience Risk Management Understanding Risk Management: Discussion Defining Risk Management Addressing Risks and Opportunities Managing Cyber Resilience Why and What of Management Systems? Management Systems Common Management Standards and Frameworks Cyber Resilience Strategy What is Strategy? Cyber Resilience Strategy and Activities Security Controls at Cyber Resilience Strategy Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Design Why Cyber Resilience Design? Cyber Resilience Design Activities Security Controls at Cyber Resilience Design Aligning ITSM Processes with Cyber Resilience Processes Cyber Resilience Transition Why Cyber Resilience Transition? Basics of Cyber Resilience Transition Cyber Resilience Transition: Controls Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Operation The Purpose of Cyber Resilience Operation Security Controls in Cyber Resilience Operation Interaction Between IT Processes and Cyber Resilience Interaction Between ITSM Functions and Cyber Resilience Cyber Resilience Continual Improvement Continual or Continuous Improvement Maturity Models Continual Improvement Controls The Seven-Step Improvement Process The ITIL CSI Approach Cyber Resilience Roles & Responsibilities Segregating Duties Dual Controls
Certificate in Company Law (CCL) Why Attend This course is designed for professionals seeking a comprehensive understanding of legal matters affecting companies in the GCC. The course covers the fundamental principles of company law, including the strategic selection and establishment of different types of companies, as well as the management and dissolution of companies throughout their life cycle. Additionally, participants gain valuable insights into legal issues specific to family businesses in the GCC and learn how to effectively address them in practice. Course Methodology In this interactive training course participants will frequently work in pairs as well as in larger groups to complete exercises as well as regional and international case studies. Course Objectives By the end of the course, participants will be able to: Apply legal rules and principles to speciï¬c commercial situations through consideration of relevant company law Increase proï¬tability within their organization by selecting the best company type and by adopting the best legal practices in management Recognize the rules that govern family businesses and how they affect the continuation and success of the business Understand the reasons for company termination and dissolution and the legal issues in this regard Target Audience This course is suitable for lawyers, company managers, management teams, business and law students and those who are interested to know more about company law and its implications. It also beneï¬ts directors and executives who have direct responsibility for legal decisions within the organization. In addition, in-house council new to the region, and those working within a legal department, ï¬nd this course highly beneï¬cial. Target Competencies General principles of company law Company management Corporate governance Problem solving Note The Dubai Government Legal Aï¬airs Department has introduced a Continuing Legal Professional Development (CLPD) programme to legal consultants authorised to practise through a licensed ï¬rm in the Emirate of Dubai. We are proud to announce that the Dubai Government Legal Aï¬airs Department has accredited EMG Associates as a CLPD provider. In addition, all our legal programmes have been approved. This PLUS Specialty Training legal course qualiï¬es for 4 elective CLPD points. Types of companies and company formation Types of companies Memorandum of Association (MoA) and the Articles of Association (AoA) related principles Alteration of clauses of the MoA and AoA Partnership and its formation Limited Liability Company (LLC) and its formation Public Shareholding Company and its formation Overview of other types of companies Choosing between various types of companies Company management and shareholders rights and duties Roles and types of directors Powers, duties and liabilities of directors Appointment and retirement Resignation and vacation of office Independent director Meeting of board of directors Auditors: appointment, removal, powers and duties Corporate governance Family businesses in the GCC and shareholders' liability issues UAE law of family companies The provisions related to family businesses in the new Saudi company law Legal organization of family businesses in the GCC Strategies for survival and growth within family businesses Company management and shareholders' liability General principles of corporate liability Liability of directors and Key Managerial Persons (KMP) Liability of shareholders Termination and dissolution of companies Winding up of companies Liquidator Authorities Striking off name Insolvency and bankruptcy Restructuring and re-organization Mergers and amalgamation Acquisition and take-over
About this training course Artificial lift systems are an important part of production operations for the entire lifecycle of an asset. Often, oil and gas wells require artificial lift for most of the life cycle. This 5-day training course offers a thorough treatment of artificial lift techniques including design and operation for production optimization. With the increasing need to optimize dynamic production in highly constrained cost environments, opportunities and issues related to real-time measurements and optimization techniques needs to be discussed and understood. Artificial lift selection and life cycle analysis are covered. These concepts are discussed and reinforced using case studies, quizzing tools, and exercises with software. Participants solve examples and class problems throughout the course. Animations and videos reinforce the concepts under discussion. Understanding of these important production concepts is a must have to exploit the existing assets profitably. Unique Features: Hands-on usage of SNAP Software to solve gas-lift exercises Discussion on digital oil field Machine learning applications in gas-lift optimization Training Objectives After the completion of this training course, participants will be able to: Understand the basics and advanced concepts of each form of artificial lift systems including application envelope, relative strengths, and weaknesses Easily recognize the different components from downhole to the surface and their basic structural and operational features Design and analyze different components using appropriate software tools Understand challenges facing artificial lift applications and the mitigation of these challenges during selection, design, and operation Learn about the role of digital oilfield tools and techniques and their applications in artificial lift and production optimization Learn about use cases of Machine learning and artificial intelligence in the artificial lift Target Audience This training course is suitable and will greatly benefit the following specific groups: Production, reservoir, completion, drilling and facilities engineers, analysts, and operators Anyone interested in learning about selection, design, analysis and optimum operation of artificial lift and related production systems will benefit from this course. Course Level Intermediate Advanced Training Methods The training instructor relies on a highly interactive training method to enhance the learning process. This method ensures that all participants gain a complete understanding of all the topics covered. The training environment is highly stimulating, challenging, and effective because the participants will learn by case studies which will allow them to apply the material taught in their own organization. Course Duration: 5 days in total (35 hours). Training Schedule 0830 - Registration 0900 - Start of training 1030 - Morning Break 1045 - Training recommences 1230 - Lunch Break 1330 - Training recommences 1515 - Evening break 1530 - Training recommences 1700 - End of Training The maximum number of participants allowed for this training course is 20. This course is also available through our Virtual Instructor Led Training (VILT) format. Prerequisites: Understanding of petroleum production concepts. Each participant needs a laptop/PC for solving class examples using software to be provided during class. Laptop/PC needs to have a current Windows operating system and at least 500 MB free disk space. Participants should have administrator rights to install software. Trainer Your expert course leader has over 35 years' work-experience in multiphase flow, artificial lift, real-time production optimization and software development/management. His current work is focused on a variety of use cases like failure prediction, virtual flow rate determination, wellhead integrity surveillance, corrosion, equipment maintenance, DTS/DAS interpretation. He has worked for national oil companies, majors, independents, and service providers globally. He has multiple patents and has delivered a multitude of industry presentations. Twice selected as an SPE distinguished lecturer, he also volunteers on SPE committees. He holds a Bachelor's and Master's in chemical engineering from the Gujarat University and IIT-Kanpur, India; and a Ph.D. in Petroleum Engineering from the University of Tulsa, USA. Highlighted Work Experience: At Weatherford, consulted with clients as well as directed teams on digital oilfield solutions including LOWIS - a solution that was underneath the production operations of Chevron and Occidental Petroleum across the globe. Worked with and consulted on equipment's like field controllers, VSDs, downhole permanent gauges, multiphase flow meters, fibre optics-based measurements. Shepherded an enterprise-class solution that is being deployed at a major oil and gas producer for production management including artificial lift optimization using real time data and deep-learning data analytics. Developed a workshop on digital oilfield approaches for production engineers. Patents: Principal inventor: 'Smarter Slug Flow Conditioning and Control' Co-inventor: 'Technique for Production Enhancement with Downhole Monitoring of Artificially Lifted Wells' Co-inventor: 'Wellbore real-time monitoring and analysis of fracture contribution' Worldwide Experience in Training / Seminar / Workshop Deliveries: Besides delivering several SPE webinars, ALRDC and SPE trainings globally, he has taught artificial lift at Texas Tech, Missouri S&T, Louisiana State, U of Southern California, and U of Houston. He has conducted seminars, bespoke trainings / workshops globally for practicing professionals: Companies: Basra Oil Company, ConocoPhillips, Chevron, EcoPetrol, Equinor, KOC, ONGC, LukOil, PDO, PDVSA, PEMEX, Petronas, Repsol, , Saudi Aramco, Shell, Sonatrech, QP, Tatneft, YPF, and others. Countries: USA, Algeria, Argentina, Bahrain, Brazil, Canada, China, Croatia, Congo, Ghana, India, Indonesia, Iraq, Kazakhstan, Kenya, Kuwait, Libya, Malaysia, Oman, Mexico, Norway, Qatar, Romania, Russia, Serbia, Saudi Arabia, S Korea, Tanzania, Thailand, Tunisia, Turkmenistan, UAE, Ukraine, Uzbekistan, Venezuela. Virtual training provided for PetroEdge, ALRDC, School of Mines, Repsol, UEP-Pakistan, and others since pandemic. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
UMTS training course description An in-depth study of the UMTS technologies and network structure. What will you learn Explain what 3G and UMTS are. Describe the migration path to UMTS. Describe the UMTS architecture. UMTS training course details Who will benefit: Anyone who needs to know more about UMTS. Prerequisites: Total GSM Duration 3 days UMTS training course contents Introduction 3G WCDMA 2G WCDMA comparison. European and international spectrum allocations. UMTS Services UMTS QoS classes, Conversational, Streaming, Interactive and Background. UMTS bearer services. Radio Access Network (RAN) Architecture System architecture. The Radio Network Controller (RNC) and Node B functionality. Protocol model. The Iu interface for Circuit and Packet switching. The Iur interface and RNSAP. RNC node B interface and NBAP. The Physical layer Spread spectrum coding and modulation. Logical and physical channels. User data rates and transmission. Power control. Signalling, synchronisation, common control, access and indicator channels. Procedures for transmit diversity, measurement, power control and handover. Radio Resource Management Fast and outer loop power control. Transmit power and power rise. Handover algorithms. Intra frequency and inter system handovers. Load, measurement on the air interface. Admission and load control. Packet Access Packet data traffic. Packet data transport channels. Packet scheduling algorithms. Handover, load and administration control. Packet data performance. UTRA TDD Mode Time Division Duplex (TDD). UTRA TDD modulation and spreading, transport channels, physical channels and their structure. Noise and interference limited network. Interference, FDD and TDD co-existence.
REXX training course description A hands on training course covering the Restructured EXtended eXecutor (REXX) language. A large number of exercises are used to reinforce and emphasise lecture sessions. What will you learn Write REXX programs. Debug REXX programs. Examine existing code and determine its function. REXX training course details Who will benefit: Anyone wishing to learn REXX. Prerequisites: None although experience in another high level language would be useful. Duration 3 days REXX training course contents Introduction to REXX What is REXX? REXX environments, invoking a REXX exec, a sample REXX exec, REXX clause types. REXX variables and data Literal data, variable data, assignment, simple variables, compound variables, stem variables, constant data, numeric data, arithmetic operations, character manipulation, hexadecimal data. The parse instruction Parse format, Parse examples, Parse arg, Parse pull, Parse value, special templates, place holders, literal templates, numeric templates, variable templates. Control structures Relational conditions, logical operators, simple selection, looping: uncontrolled and controlled loops, infinite loops, conditional loops, controlling loops, leave, iterate, multiple selection, instructions for subroutines, exit. Sub routines and functions Internal and external subroutines, call, ARG(), ARG(n)return, exit, scope of variables, procedure, functions, built in functions, overriding built in functions. Performing I/O Command conventions, preparing to read a file, execio, limitations, execio for reading, DISKR, DISKRU, DISKW, return codes. External functions listdsi, msg, outtrap, prompt, sysdsn, sysvar, storage Tracing Immediate commands, the trace facility, signal and call statements. Built in functions Text handling functions, string handling, word handling, arithmetic, data conversion, bit manipulation, environment. The data stack Data stack structure, REXX instructions for the data stack, REXX functions for the data stack, TSO/E commands for the data stack. REXX in batch TSO/E foreground. TSO/E background.