IS Management, Technologies, State of Art

Size: px
Start display at page:

Download "IS Management, Technologies, State of Art"

Transcription

1 IS Management, Technologies, State of Art Orsys, with 30 years of experience, is providing high quality, independant State of the Art seminars and hands-on courses corresponding to the needs of IT professionals. Orsys proposes a set of courses on the most important topics in IT technologies and management. Seminars IT Technologies, overview... Best ( p2 ) E-Information Systems, Architectures... Best ( p4 ) SaaS and Cloud Computing... Best ( p6 ) Performance and availibility of IS... Best ( p8 ) Networks, State of Art... Best ( p10 ) Networks and the future of Internet... Best ( p12 ) Wireless networks... Best ( p14 ) VOIP, Architectures and Processes... Best ( p16 ) Web Technologies, overview... Best ( p20 ) Portal and content management... ( p22 ) Web 2.0 enterprise social network, Synthesis... ( p23 ) Synthesis Courses XML state of Art... Best ( p18 ) ORSYS, La Grande Arche, Paroi Nord, Paris La Défense cedex. Tél : +33 (0) Fax : +33(0) page 1

2 Seminar, 3 day(s) Ref : TEC This seminar is aimed at IT managers and their immediate staff who wish to obtain the information needed to define IT strategies. Knowledge in computing. IT Technologies, overview Best A clear and precise overview covering the very latest IT and telecommunications advances, their foreseeable short and medium-term evolutions, their impact on companies and users. The main objectives of this seminar include: Analysing and comparing the main network solutions. Constructing multi-service networks. Making them secure. Mastering Internet technologies. Measuring the impact of digital media and e-commerce. Integrating the object approach in development methods. Putting in place rich-client and Web applications. Selecting a development process suited to the digital technologies. 1) Telecommunications: market, major solutions 2) Network architectures 3) Network technologies 4) Security 5) The IS infrastructure 6) Web technology and its applications 7) XML and Web services 8) Open Source software 9) EAI and Urbanisation 10) Application servers 11) Java and.net technologies 12) Data servers 1) Telecommunications: market, major solutions - The telecommunications market: voice, data, traffic. - The industry players and standardisation. - The impact of deregulation. The legal principles. 2) Network architectures Access networks - xdsl solutions and their evolutions. Voice and image flow rates, distances, and transport. - Cable-based techniques. The optical local loop. - The emergence of radio networks: WiFi, WiMax, Mesh. Company networks - Local network architecture. The extended family of Fast Ethernet, switched Ethernet and Gigabit Ethernet. Changing over to virtual networks (VLANs). Operators' networks - ATM for constructing the core of Frame Relay and multi-service networks. Changing over to IP architecture. IP signalling and controls. The service guarantee. The demand for virtual private networks (VPNs). Mobile telephone networks - Cellular networks: EDGE, UMTS, HSDPA. L4G. - The mass arrival of local mobile telephone networks Wifi ( a/b/e/g/n) and Bluetooth (802.15), ZigBee and UWB. Handover, roaming, mobility management. - WIMAX networks. 3) Network technologies ATM and frame relays - Frame switching. The protocols used. - ATM and service quality. Implementation. IP technology - Packet switching. Internet routing. - IP, UDP and TCP protocols. - SMTP, FTP applications, Peer-to-Peer. - Internet service quality: the DiffServ model. - Telephony over IP and video transport. The MPLS solution - Label switching. Utilizing explicit paths (LSPs). - LDP, RSVP-TE, CR-LDP protocols. QoS. Overview - The interaction between networks and applications. - Internet metrology, diagnostics. - Which technologies and services for tomorrow? - The social and economic aspect of networks. 4) Security - Issues: physical architecture, protocols, encoding, organisation. From the firewall to the IDS. ORSYS, La Grande Arche, Paroi Nord, Paris La Défense cedex. Tél : +33 (0) Fax : +33(0) page 2

3 - Secured VPNs: IPSEC or SSH/SSL. - Mechanisms for digital signatures. - The infrastructures for managing and distributing keys. 5) The IS infrastructure - The state of the art. From the thin client workstation to the centralised server. - The new operating systems, the new types of workstations, mobile phones and PDAs. 6) Web technology and its applications - Internet developments. Structure of applications. - The three-tier architecture. Application components. - The structuring of documents. PDF, XHTML, Web RIA Technologies (Flex, Flash, Silverlight, Java), RDA (Air, JavaFX), HTML5, xhtml. The trends. - What are the features of a company portal? Secured access, open connectors, profile management and parameter setting. The market offers. 7) XML and Web services - Presentation of XML, the XSLT transformation engines and the XML parsers (Xalan, Sabloton, etc). XML SGBDs Web services. - The principle defined by the W3C. SOAP, UDDI and WSDL. Access protocol, mode of operation. The products offer. 8) Open Source software - Genesis of the main Open Source Software. - The guarantees of security and long life. - Linux server or client? Apache. Development (PHP, Eclipse, etc.). Databases (MySQL, PostgresSQL). CMS. 9) EAI and Urbanisation - Enterprise Application Integration. The market offers. The components of an EAI solution. 10) Application servers - Application Intranet and application servers. Features. - Application server offers: IBM, Oracle... - Cloud Computing Architectures: Private et Public. 11) Java and.net technologies - The hardware platform portability concept. JavaBeans and RMI. Access to databases (JDBC). Java APIs. The JEE platform. Adopting SOAP. Design Patterns. Struts logical architecture. - Microsoft's.Net architecture. Framework, Enterprise Server, ASP.Net, Common Language Runtime, etc. Why Microsoft's middleware object approach is so successful. Windows 2008,.Net ) Data servers - The market and the offers, IBM, Oracle, Microsoft. - User-oriented systems.types of multi-dimensional storage (MOLAP, ROLAP, HOLAP). The client tool families. - DataWeb. The under-lying technologies. ORSYS, La Grande Arche, Paroi Nord, Paris La Défense cedex. Tél : +33 (0) Fax : +33(0) page 3

4 Seminar, 3 day(s) Ref : AEB IT management. Operational department managers. User project leader. Technical project leader/manager. Technical architect. Knowledge of the Internet and notions of technical architectures. Next sessions Brussels dec , mar jun Geneve dec , mar jun Luxembourg dec , mar jun E-Information Systems, Architectures Best This seminar explains the concepts and standards of the new technical / functional architectures, how they have evolved and matured. It presents an overview of the 3rd revolution in information systems, based on the idea of "services". Case studies based on large and significant projects, will show you how these technologies and platforms have been implemented. 1) Technical principles of Web applications 2) The principles of IS urbanism 3) Integration-oriented architectures: a concrete response to Urbanism 4) Web services 5) e-business infrastructures 6) Service-oriented architectures (SOA) 1) Technical principles of Web applications Web technologies - TCP/IP, HTTP/HTTPS, HTML, Internet browser, JavaScript, applets, ActiveX. The basics 7) Web Content Management (WCM), document management (GED, WDM) 8) The enterprise portal (EIP) 9) Data Warehouse 10) Security infrastructure 11) IS Governance and supervision - The different types of architecture: 1-tier, 2-tier, 3-tier, n-tier. - The client, application servers, connected mode and disconnected mode, the main notions: context, transaction, middleware, components and objects. - Dividing architectures into five layers. Overview of JEE architecture - Overview of the components of JEE architecture: JSP, Servlets, EJB, JMS, Grails... - Additional specifications (portlets and content management). The main JEE architecture types. Overview of.net architecture - Overview of the components of.net architecture: WebForms, WinForms, Enterprise Services and MSMQ. Comparison with JEE. The Open Source alternative - The PHP platform. The Open Source JEE offer with Geronimo,JBoss, ObjectWeb... - Benefits and risks. Web 2.0 and the new MMIs - Ajax technology and its consequences for Web applications. - Web 2.0: definition, impact on applications and user requests. - Changes to graphical interfaces, the new possibilities offered by the rich client. 2) The principles of IS urbanism - What is urbanism? Mapping the existing elements. Defining the target IS. - Who are the players in an urbanism project? What is the time scale? - What are the deliverables? What is the control structure? Which approach should you adopt? Analyses: maturity, integrations, costs and risks. Case studies. - Impact analyses: the cultural transition for the company and the ISD, the learning curve for the teams, organisation in relation to internal and external skills, project management. 3) Integration-oriented architectures: a concrete response to Urbanism - Enterprise Application Integration: EAI. Principles. Why are integration problems more concerned with organisational and functional issues than technical ones? An EAI architecture (ETL, workflow, BPM, messaging, connectors, etc.). "Traditional" integration application interfaces: CORBA/IIOP, EJB/RMI, DCOM, XML-RPC and JCA. 4) Web services - The Web services concept and the related standards (SOAP, WSDL, WS-*). - Developing and deploying Web Services. - The position of the main players in the market. 5) e-business infrastructures - Background. ORSYS, La Grande Arche, Paroi Nord, Paris La Défense cedex. Tél : +33 (0) Fax : +33(0) page 4

5 - Attempts at standardisation (BPSS, cxml, xcbl, BTP, etc.), market offers (Commerce One, Ariba, Rightworks, Biztalk). - ebxml v RosettaNet. - Architecture, standards, adoptions, feedback. Financial and accounting standards. - Orchestrating services (BPML, BPEL, BPEL4WS). 6) Service-oriented architectures (SOA) - What is a "service"? - Differences between managers and brokers. Orchestrating several services. Transactional aspects. - Security. Supervision and maintenance. - Concrete examples of applications for distributing contracts and insurance services. - ESB (Enterprise Service Bus) architectures: an SOA - EAI convergence? 7) Web Content Management (WCM), document management (GED, WDM) - Content management issues. - Why collaborative working? - Static sites v dynamic sites, using XML, managing roles. Description of content management and document management tools. Overview of some offers: Documentum, Vignette, Sharepoint, Alfresco... - The advantages of personalisation. - Knowledge Management. 8) The enterprise portal (EIP) - The functions that the company really needs. - Bringing all the data sources together and distributing them via one single application, the browser. Technical problems.ttechnical architecture. - Major tools: IBM WebSphere Portal, BEA Plumtree, MS Sharepoint Server... 9) Data Warehouse - Adjusting the information system to the business. Improving the monitoring, forecasting and optimisation of the economic and company activities. The Data Warehouse, an analysis repository, capitalises on the existing IT system by making use of operational data. - Description of the complete chain: from collecting data in the operational systems through to its presentation in decision-making applications, including the processes supplying and storing data in the analysis repository. 10) Security infrastructure - Making information exchanges secure: authentication, authorisation, integrity, confidentiality, nonrepudiation and legal aspects. Why has application security become as important as infrastructure security? The security infrastructure for service-oriented architectures. 11) IS Governance and supervision - Technical monitoring. Definitions. Protocoles (SNMP, JMX, WMI). APM tools (Quest PerformaSecure, CA Wily). Business Activity Monitoring. Overview of the major supervision solutions. Role of he major supervision solutions. Role of ITIL in production processes. ORSYS, La Grande Arche, Paroi Nord, Paris La Défense cedex. Tél : +33 (0) Fax : +33(0) page 5

6 Seminar, 2 day(s) Ref : AAS This seminar is aimed at IT managers and their immediate staff who wish to obtain the information needed to define cloud computing strategies. Knowledge of IT technical architectures. Next sessions Brussels mar , jun Geneve mar , jun Luxembourg mar , jun SaaS and Cloud Computing Best Cloud Computing which is a new way to outsource IT infrastructure with a short-term leasing model and to completely automate infrastructure creation and evolution, has a huge potential to transform both IT and business departments. This seminar describes the usage scenarios, regulatory aspects, and the human and technical resources needed to successfully move to the Cloud. 1) Introduction 2) SaaS and cloud computing 3) Market solutions - Overview 4) Usage scenarios for Cloud Computing 5) Security and Privacy 1) Introduction - Defining Cloud Computing and SaaS - History leading to the emergence of cloud computing and SaaS. - Positioning of cloud computing versus classical hosting providers. - Positioning of SaaS (Software as a Service) with regard to the concept of ASP. - Relationship between Virtualization and Cloud Computing. - Impact of SOA on the adoption of Cloud Computing solutions by company. 2) SaaS and cloud computing 6) Integration of Cloud and SaaS solutions with enterprise IT 7) Information system architecture integrating Cloud Computing solutions 8) Private Clouds 9) The technical solutions and NoSQL Cloud - SaaS vs Cloud Computing. - SaaS and Cloud Computing, what usages do they provide solutions for. - Align costs and usage. - Benefits of Cloud Computing: dynamic outsourced resource allocation, logical isolation... - Main Cloud computing drawbacks : Privacy, legislation... - Estimation and cost tracking challenges with Cloud and SaaS. - Issues and benefits of the proliferation of unofficial Cloud ussage (Shadow IT) - Managing backups. What's the impact on the backup strategy? - Reversibility. Various strategies. Which one to choose. - What are the main blocking factors for entreprise adoption of the Cloud, how to overcome the reluctance? 3) Market solutions - Overview - Public Cloud Computing. Private Cloud Computing. Hybrid cloud. Cloud Computing Communityoffering. - Public cloud services. Amazon AWS and EC2 services, S3, SQS, SimpleDB, RDS, SNS, ELB, mail,... - Google Cloud AppEngine and Compute Engine / BigQuery / CloudSQL / etc. Microsoft Windows Azure PaaS and IaaS. - OpenStack based clouds : HPCloud, Rackspace, IBM / Softlayer, etc. OVH "Public Cloud" and "Dedicated Cloud". - Offers VDC: VMware vcloud ServiceHybrid. - Other cloud offerings: DigitalOcean, Cloudwatt, Numergy Orange Flexible Computing SFR Cloud. - Private Cloud solutions. OpenStack, Eucalyptus and CloudStackCloudBees. VMware vcloud Director / vfabric. - Cloud Management solutions. RightScale, Scalr, Heroku,... 4) Usage scenarios for Cloud Computing - Technically oriented usage scenarios (IaaS, PaaS). - Usage oriented scenarios (automation, mobility, Web integration...). - Eligibility of applications for a cloud outsourcing: business, collaborative applications, human resources management... - Impact of SaaS and Cloud Computing on GreenIT. 5) Security and Privacy - Differentiation between Security and Privacy. - Levels where security can be implemented. - Key issues. - Main concerns. - Legal aspects. - Practical and technical aspects of data protection. - Supplier Selection and contracting. - Policy for password and keys management. ORSYS, La Grande Arche, Paroi Nord, Paris La Défense cedex. Tél : +33 (0) Fax : +33(0) page 6

7 - Authentication Delegation. 6) Integration of Cloud and SaaS solutions with enterprise IT - Technical aspects: communication between the IS and Cloud/SaaS solutions. - Issues of bandwidth and QoS the link between internal and external IF. - Software Licenses. - Single Sign On. - Internal management accounts and external access. - Choose the billing mode (credit cards, monthly bills,...) 7) Information system architecture integrating Cloud Computing solutions - IT Architecture and SOA. - Schematic of an globale IS with some internal and SaaS and Cloud resources. - Patterns of Cloud application architectures. - Integration between the internal IS and SaaS solutions. - Issues with the integration between the interal IS and Cloud. - Issues of integration between different Cloud services. - Migration internal IS services to the Cloud. - Manage the increased dependency toward the network. 8) Private Clouds - Private Cloud, what for? - Definition of private cloud computing. - Reminder about the basics of virtualization (para-virtualization,...). - Difference with regard to virtualization inside an internal or external Datacenter. - Difference with regard to classical datacenters or compute grids. - Pros and cons. The economic equation. The main virtualization technologies. - Open-source tools for the private cloud (OpenStack, CloudStack, KVM, libvirt,...). - Proprietary technologies. 9) The technical solutions and NoSQL Cloud - Databases for the Cloud. - Emergence of NoSQL databases. Differences with RDBMS. - Foundations for NoSQL database. - Features and limits of RDBMS. - Main opensource NoSQL databases (Cassandra, MongoDB, HBase,...). - Main integrated cloud NoSQL databases (Google Datastore / CloudSQL, Amazon DynamoDB / SimpleDB, Google BigQuery). ORSYS, La Grande Arche, Paroi Nord, Paris La Défense cedex. Tél : +33 (0) Fax : +33(0) page 7

8 Seminar, 3 day(s) Ref : PEF Head of IT department. Functional managers. User project leader. Technical project manager/director. Technical architect. Good knowledge of technical architectures Performance and availibility of IS Best Users are more and more demanding when it comes to application performance and this is reflected in very restrictive SLA contracts. It is therefore crucial to integrate performance management in computing projects as early as possible and not only for the development teams but also for the teams in charge of infrastructure and hosting. This seminar will show you how to implement an efficient management of your performance. 1) The basics of IT performance 2) Include performance in project management 3) Hardware infrastructures and performances 4) Software infrastructure and performances 5) Technical acceptance and transition to production phase 6) Monitoring and supervision 7) Anticipate needs Exercise Demonstrations. Discussions on various cases. 1) The basics of IT performance - The four pillars of performance : availability, robustness, response time, scalability. - From availability management to high availability : law of 9, MTBF, MTTR. - How to evaluate the availability of an application? - Contracting process of services levels (SLA). - What about Java,.NET and PHP platforms? - Comparison of levels of performance with «old platforms» : mainframe, AS Are Open-Source solutions compatible with high levels of performance? - What are the main problems one comes across on new IT architectures? 2) Include performance in project management - From a curative management of performance to a preventive approach. - When to make prototypes? On which parameters? - Carry out technical tests in the development phase : methods and tools. - estimate the costs of integration phases and the cost of transitions to the production phase. - The role of ITIL in the production process. - Applications designed for production. Facilitate configuration of applications. - Improve communication between applications and the production teams' tools - Architectural and development best practices : The impact of Java and.net virtual machines on performances. - The new programming constraints. - Patterns and good coding practices - Profiling tools. 3) Hardware infrastructures and performances - Servers and processors : The impact of multi-heart CPUs ; The new mainframes (Unix and Windows) - Storage : The impact of RAID technologies on performance ; What are SAN and NAS approaches? ; Distributed file systems (GFS, GPFS...) ; - Networks : Virtual IP addresses ; Solutions for load-distribution on networks. - Data-Centers : Choice of location. Power supply, ventilation, wiring. WAN links. - Server virtualisation : Operating principles ; Solutions : VMWare, Virtual Server, XEN ; Virtualisation and performance : what impact? 4) Software infrastructure and performances - Clustering, principles of «load balancing» and «session fail-over». - Active/Passive type clusters. Active /Active type clusters. Hybrid clusters. - The notion of session affinity. - Application server clusters - Data-base clusters. - Pros and cons of clustering. - Grids and on demand solutions : Principles, advantages. Offers (IBM, Oracle...) 5) Technical acceptance and transition to production phase - Technical tests : Specify technical tests : examples of deliverable ; How to estimate costs? ; High availability validation environment - Metrology of applications : Definition, goals and advantages. Methodology ; Load injection tools (Mercury, Compuware, Silk, Open-STA) ; Platforms and applications tuning. - Deployments management : Preparing platforms and applications ORSYS, La Grande Arche, Paroi Nord, Paris La Défense cedex. Tél : +33 (0) Fax : +33(0) page 8

9 - Development - Production : Managing incidents 6) Monitoring and supervision - Monitoring : Life cycle of a monitoring solution ; Key documents to produce and maintain ; Information gathering on availability and performance. Different sources of information; The 5 types of monitoring. - Application supervision : Defining indicators and their different states ; Defining thresholds, rules and alarms ; Composite indicators ; Reporting (scoreboards). - SNMP standard : Principles, MIB and basic orders ; SNMP support in Java 5 and Windows - JMX standard : Principles ; JVM monitoring with MXBeans ; Mbeans specific development ; Overview of available tools around JMX - WMI standard : Principles. Reading and writing data. Designing and developing a WMI provider, tools. - APM consoles and tools : Quest Foglight. Quest PerformaSure. BMC Patrol. IBM Tivoli. HP Openview. Microsoft Operation Manager. Monitoring and supervision of SOA with Amberpoint solutions. 7) Anticipate needs - Managing capacity : What is capacity planning? - Approach of capacity planning - Experience feedback. ORSYS, La Grande Arche, Paroi Nord, Paris La Défense cedex. Tél : +33 (0) Fax : +33(0) page 9

10 Seminar, 3 day(s) Ref : TER Project managers, architects networks, systems and networks engineers. Basic knowledge in networks and communications. Next sessions Brussels apr , jun Geneve apr , jun Luxembourg apr , jun Networks, State of Art Best This seminar presents an overview of the main protocols, the standardization, the voice quality and bandwith, the migration, the performance and the security of voip technologies, and introduces you to the major components of voice over IP networks. On all these topics, the main solutions are detailed and illustrated with case studies. 1) Main solutions for networks 2) Network architectures and access 3) Cellular and wireless networks 4) Businesses networks Presenter 5) Carriers networks 6) IP environments 7) Multimedia, video and voice over IP 8) Security, managment Xavier CARCELLE After Engineering studies in France and in the US, he worked on telecommunications engineering projects in France, US and Chile. He served as CTO for OpenPattern a french telecommunications company developing an OpenHardware FPGA-based router-board. He is currently working for a Linux-based VoIP company managing the development of the XiVO IPBX OpenHardware appliance. He is the author of numerous telecommunications books among them a reference book about PowerLineCommunications. 1) Main solutions for networks - Main categories of data networks: computers, telecommunications and cable carriers. Equipments. 2) Network architectures and access Physical-level architectures - SONET and SDH. WDM and DWDM techniques. Wavelength switching and burst switching. Link layer architectures - Ethernet frames. ATM architecture and exploitation. PPP frames and links for Internet. Switching techniques. Packet-level architectures - IP architectures. Routers and layer functionnalities. - Routing principles. IP controling and signaling. Link/packet layer architectures - Label switching techniques. MPLS standard. - Distribution. Quality of Service. GMPLS extensions. Local loop - Toward very high bandwidth. Optical technologies. - Solutions from the cable carriers. xdsl techniques. - Local loop. WiFi and WiMax. 3G. - Optical fiber to the business, to the CPE. - Voice (VoDSL) and television (TVoDSL). 3) Cellular and wireless networks Cellular networks - Wireless networks typologies: PAN, WLAN, WMAN, WRAN. Hot-spot, handover, roaming. - GSM. GPRS. 3G (UMTS, W-CDMA and CDMA-2000) and different flavors HSPDA, HSUPA. 4G. RFID tags. Wireless network technologies - Bluetooth 3.0 new products , WiFi products and WLAN. WiMAX. - QoS. Geolocalization techniques. 4) Businesses networks LAN Technologies - Principles. Cabling: Supports (UTP, STP, Optical Fiber, Wireless), topologies (rings, tree, star, cell). Standardisation and evolutions of the LANs - Evolution of the medium access methods: ISO (CSMA/CD), ISO (Token ring). Standardisation. Local Ethernet networks ORSYS, La Grande Arche, Paroi Nord, Paris La Défense cedex. Tél : +33 (0) Fax : +33(0) page 10

11 - Different solutions among the Ethernet family. - Protocols in the 802 family, management of the QoS. - Virtual networks VLAN and their implementations. Interconnections - Tools for interconnecting networks. Switching. - Overlays networks, CDN and P2P. Virtual private networks - Data filtering. Security and management. - VPN-IP- IPsec and VPN-IP-MPLS environments. 5) Carriers networks Functionalities - Quality of Service, control and managment. - Signalling. Convergence. Robustness. - Voice/Data/Video integration. Interconnecting sites. - Virtual private networks (VPNs). Internet solutions - Internet boom. ISP networks architectures. - IP VPNs, IPSec VPNs. VPLS solutions. Frame Relay and ATM networks - ATM and Frame Relays. - Voice/Data integration. Quality of Service. MPLS architecture - Label switching and MPLS architecture. - Quality of service ; MPLS-DiffServ ; VPN-MPLS. Policy-based architecture - COPS protocol (Commong Open Policy Service). - SLAs (Service Level Agreements). - PIBs (Policy Information Bases). 6) IP environments Internet-based environments - Goals. Fundamental principles of Internet. - TCP/IP and UDP/IP global architecture. - IPv4 protocol. IPv6 protocol. ICMP, the control protocol. - Diff-Serv and Int-Serv. RSVP. IP multicast. IP VPN. Applications layer - The basic applications: FTP, mail, Web... - Corporate multimedia. Voice over IP. Distributed video. 7) Multimedia, video and voice over IP Voice over IP or VoIP - From voice encoding to data transport. IETF standards.qos. VoIP applications and products. Video over IP, Video-on-demand (VoD) and IPTV - Encoding and compression techniques (MPEG and wavelets). IPTV performances. 8) Security, managment Networks managment - ISO proposals for network managment model. - SNMP protocol: features, proxies, MIB. Security - Main attacks: Viruses, Worms and DDoS. - Solutions: Firewall, authentication (MD5, RSA), IPSEC... Strategies for the future - The future of Internet and Mobility. Smart networks: adapting to the user demands. Autonomic networks. ORSYS, La Grande Arche, Paroi Nord, Paris La Défense cedex. Tél : +33 (0) Fax : +33(0) page 11

12 Seminar, 3 day(s) Ref : RNG This seminar targets network managers, architecture designers and system administrators who need to manage the evolution of their networks. Knowledge base in the network domain. Next sessions Brussels dec , apr jun Geneve dec , apr jun Luxembourg dec , apr jun Networks and the future of Internet Best This seminar will cover the state of the latest features and technologies in the world of networks and telecommunications, emerging technologies and their integraton in the current environments. The different solutions will be described under a technological and economical angle. This seminar targets network architects and engineers as well as IT heads who carry strong knowledge in telecommunications. 1) Internet and the upcoming generation of protocols 2) Mobility in networks 3) Prospective for the mobile Internet 4) Evolution of the technologies in the access networks 5) Controling the Quality of service (QoS) 1) Internet and the upcoming generation of protocols 6) Technologies and evolutions of the access networks 7) Local lopp 8) Wireless networks 9) Voice over IP 10) Security and the next generation of Internet - The Internet Society. Standardization. - The main features of IP : addressing, routing (BGP, RIP, OSPF)...Issues and solutions. - Local networks/public networks : NAT/PAT. IPv6. - The transport layer in TCP/IP : UDP, TCP. 2) Mobility in networks - The first generation of mobile networks. - GSM and its breakthroughs. Packet mode in GSM networks : GPRS/EDGE. GPRS networks routing. - 3G : UMTS, CDMA2000 ; architecture, throuputs, applications. Evolutions to 3G/3G+ : HSDPA, HSUPA, HSOPA, MIMO. - Next generations : throughputs, caracteristics (LTE and UMB). - Inter-netwoks mobility : vertical handover and cognitive radio. - IP mobile architecture in heteregeneous networks. 3) Prospective for the mobile Internet - Mobility, UMTS, 4G and wireless routers. - Contrôle. Content Distributed Networks. Signaling. Control. - Quality of Service for fixed and mobile networks. 4) Evolution of the technologies in the access networks - Switching : high throughputs, label and contents. - Content-based routing and XML routing. - Overlays networks, CDN and P2P networks. - Services-based architectures. 5) Controling the Quality of service (QoS) - Definition of the QoS : from design to state machines. - Traffic engineering. Source-to-destination boundaries. - Access control. Packets sequencing. - Queues handling : RED, RIO. - QoS reults for different technologies. - Application-based trafic shaping. The RTP/RTCP proposition. 6) Technologies and evolutions of the access networks - ATM, a possible universal network? - ATM for ISP and telcos. - Data control and services classifications. - Ethernet-for-all! - From 10Mbits/s to 10Gbits/s. - From LAN to long-distance core network Ethernet First Mile for FTTH. - IP for a new generation. - IPv4 and IPv6. Advantages of IPv6 for fast networks and multimedia. - IP multicast routing. IntServ and DiffServ models. - Different class of services : EF, AF and BE. - DiffServ and MPLS. DiffServ and IntServ : differences. - MPLS and the new generation of core networks for Internet. ORSYS, La Grande Arche, Paroi Nord, Paris La Défense cedex. Tél : +33 (0) Fax : +33(0) page 12

13 - Label switching. Origins and reasons. - LDP Protocols, CR-LDP, RSVP-TE, G-MPLS for new generation. - MPS vs IP. Déployments and key players. 7) Local lopp - Optical fibers access networks (FTTC, FTTH). - Cable-TV access networks. Cable-TV modems. - Twisted pairs access networks. DSL modems. Throughputs. Other solutions : xdsl, DSLAM. - Upcoming triple-play and quadruple-play. - Architectures. Home networking : The Wi-Fi and PLC (PowerLine Communications) technologies. 8) Wireless networks - WPAN networks - Newer generations and the standard. - UWB (Ultra Wide Band) and the very high troughput. - Bluetooth 3.0, WUSB products and WINET. ZigBee. - WLAN networks. - WiFi environment with IEEE a/b/g/n. - Handovers, Quality of service and security. - Fast handover and mesh-networks. - WMAN networks. - WiMAX. Metropolitan networks and IEEE WDSL, mobile ADSL and IEEE e. - WRAN networks. - Usage of the UHF/VHF bands for wireless regional networks and IEEE Smart antennas and cognitive radio. - Wi-xx solutions for networks. - Wireless networks and IEEE Wi-xx networks vs 4G. 9) Voice over IP - Convergence. - Voice over IP, ToIP and VoIP. - Towards a full-ip telephony network. - Standards, industrial key players. - H323 : close the original PSTN. - Architecture and deployment using compatible signalling with PSTN. - SIP approach and unified communications. - An open-system of signalization to build-up services. The SIP Forum. SIP within a 3G mobile network. - Comparison of SIP and H MGCP and gatekeepers. - Interconnexion of ToIP and PSTN devices. Integration of heterogeneous services. 10) Security and the next generation of Internet - Internet security model : still avalailable? Authentication, RADIUS and IEEE 802.1x. - Encryption and electronic signature. - Data Classification for security usage. - New generation of firewalls. Authentication with chips. - Certificates architectures (PKI). - Autonomous networks. Networks managment. Smart networks. Virtual networks. After IP. ORSYS, La Grande Arche, Paroi Nord, Paris La Défense cedex. Tél : +33 (0) Fax : +33(0) page 13

14 Seminar, 3 day(s) Ref : RSW This seminar is intended for IT professionals and network engineers wishing to specialize in cellular networks, mobile networks. Strong knowledge in corporate networks administrations. Next sessions Brussels apr , jun Geneve apr , jun Luxembourg apr , jun Wireless networks Best The domain of wireless networks grows rapidly with newer standards. Those networks allows us to interconnect corporates equipements transmitting voice, data, images. They are also the baseline for telcos «hot spots». The IEEE (Wi-Fi and all its variants), Bluetooth, UWB, ZigBee, IEEE , WiMAX, WiRAN, etc..will be described in depth during this seminar and their applications that can be used. The last day of this seminar will put the stress on the key topic of the wireless security to cover its aspects. 1) Principles of wireless networks 2) Bluetooth, UWB, ZigBee and IEEE networks. 3) Personal networks technologies 4) Mesh-networks and ad-hoc networks 5) IEEE standard and IEEE standard 1) Principles of wireless networks 6) The other solutions 7) Protocols and applications of wireless networks 8) 3G vs WLAN 9) Wi-Fi security 10) ILAN and WAN interconnexion - Introduction to wireless networks. - Fixed networks vs Wireless networks. Different generations. - WPAN, WLAN, WMAN, WRAN networks. - Caracteristics and theoretical performances. - Handover and integration of the different solutions. - Wireless networks for businesses. - Troughputs needed. Available applications. Home, Office and Business networks. - ISP Wi-Fi «Hot spots». - Wi-Fi. Advantages of wireless technologies. - The Wi-Fi issues for ISPs. - Handovers. - Mobility issues. Different types of handovers. - Integration within mobile networks. 2) Bluetooth, UWB, ZigBee and IEEE networks. - The IEEE standard, the UWB, ZigBee and Bluetooth technologies. - The standard and bluetooth. - IEEE Very high trhoughput technology UWB. - Wimedia consortium and WUSB. - IEEE and ZigBee products. - Personal networks technologies. 3) Personal networks technologies - WiFi (IEEE b/g). - A massive success. Specifications. - Wi-Fi devices : cards and access points. - MAC layer : CSMA/CA. Frequency bands. - Ethernet integration. Trhoughputs and performances. - Medium Access technologies. - Quality of Service and IEEE e. - Voice encoding and audio «streams». - Wireless controlers and switches. - Wi-Fi engineering and managment. - Future of IEEE b with n and MIMO. - Deployment of a Wi-Fi network. - Constraints. Devices. Cost. Configuration. 4) Mesh-networks and ad-hoc networks - Definition of a mesh-network and ad-hoc network. - Mesh-networks routing. - Different routing protocols : pro-actives (OLSR, DSDV) and reactives (AODV, DSR). - Security and QoS in ad-hoc networks. 5) IEEE standard and IEEE standard - Definition of the Wireless Local Lopp and WDSL access (Wireless DSL). - WDSL vs fixed networks. ORSYS, La Grande Arche, Paroi Nord, Paris La Défense cedex. Tél : +33 (0) Fax : +33(0) page 14

15 - Technologies and frequencies available. - WiMAX. Theoretical performances. - IEEE standard. Mobile WiMAX. 6) The other solutions - The new genration of regional wireless networks. - Usage of the UHF/VHF bands and IEEE Cognitive radio. Interactive radio. - A unified network with wireless networks. - IEEE and the vertical handover. - Continuity of service and a wireless Internet. 7) Protocols and applications of wireless networks - The IP environment. The slow-start and buffer-bloat issues. - MIMO technologies and the increase of the trhoughput. - Home networks : UPnP and DLNA. - Applications : voice, production, P2P... - Pervasive Internet - Developments. Internet city. Integration with the new IP generation. - Sensors networks. Dust networks. 8) 3G vs WLAN - 3GPP/3GPP2 vs Wi-xx. - Comparison with UMTS. - Fourth generation of mobile networks and UMA/IMS integration. 9) Wi-Fi security - Weaknesses by design of wireless networks. - Protection against Denial of Service possible? How to control the radio coverage? - SSID and security issue. - Attacks : Man-in-the-middle, ARP spoofing. - Weaknesses of the authentication solutions. - Elementary techniques based on SSID and MAC filtering. - Interests and limits. Risks of the beacon frame usage and ssid probe request. - Example of attacks : SSID brute forcing... - Wired Equivalent Privacy WEP - Features. Key exchange. Authentication and encryption. Popular attacks. Demonstrations. - WiFi Protected Access WPA. Features. Advantages of WPA over WEP. - Extensible Authentication Protocol EAP. Temporal Key Integrity Protocol TKIP. - Message Integrity Check MIC. WPA v2 and the i standard. 10) ILAN and WAN interconnexion - Radio coverage control. - Network separaton. - Firewall and DMZ. - End-user device protection. - Mobile users, VPN and wireless networks. ORSYS, La Grande Arche, Paroi Nord, Paris La Défense cedex. Tél : +33 (0) Fax : +33(0) page 15

16 Seminar, 2 day(s) Ref : VIP Project managers, networks architects, systems and networks engineers. Knowledge in networks. Next sessions Brussels apr , jun Geneve apr , jun Luxembourg apr , jun VOIP, Architectures and Processes Best This seminar presents the major components of voice over IP networks. It reviews the main protocols, standardization, voice quality and bandwidth, migration, performance and security of voip technologies. The main solutions will be studied and illustrated with case studies. 1) Networks and telecommunications review 2) Voice over IP 3) Protocols essential (H323, SIP...) 4) Migrating to Voice over IP 1) Networks and telecommunications review 5) Integration and administration 6) Performance and quality of service of Voip networks 7) Security 8) The future - Switched Telephone Network. - Enterprise Telephone Service. Architecture. Assets (PABX, Terminals). Available services. Constraints and limitations. - The Internet architecture, TCP / IP. - Enterprise data network. Architecture. 2) Voice over IP - Definition and concepts. The vocabulary of voip. - Enterprise networks and their evolutions: Voice / Data separation, single network convergence. Why migrate to voip? - How to integrate voip to enterprise information system? - How to interoperate with traditional telephone networks? - The user functionalities offered by voip. - The market and its players. 3) Protocols essential (H323, SIP...) - Roles and interests of each of the protocols. - H323 Presentation and architecture. Principles and definitions. H323 components roles: gatekeeper, MCU, gateway... The steps of a H323 communication: RAS, H225, H Examples of enterprise architecture. - SIP Presentation and architecture. Principles and definitions. SIP components roles: proxy, registrar, redirector, locator... The steps of a SIP communication: registration, localisation, call, roaming... Examples of enterprise architecture. - Other VoIP protocols. MGCP, MEGACO, H IAX protocol, from Asterisk Open Source. 4) Migrating to Voice over IP Key choice for voip - Cost: profit (communications, maintenance), loss (equipment, skills), etc. - New services: improving the productivity of employees (VisioConf, Mobility... etc.). - Scalability of the network and its applications. - The image of the company. Business scenarios and market solutions - Several solutions for various enterprises. - PABX-PABX interconnection. - Migration to IP PABX: examples of manufacturers solutions, advantages and constraints. - IP Centrex solution: examples of operators solutions, advantages and constraints. Peer-to-peer solutions: Skype and Wengo models. - Satisfaction and maturity of the solutions. The management of a Voip project - Different steps: needs analysis, data networks audit, comparison of available solutions, solution adaptation to the company, migration... - Success keys and brakes. 5) Integration and administration - Manufacturers administration tools. - Measures of QoS. - Integration with users databases : LDAP, SSO. - Use and update of network equipment : DHCP, TFTP, DNS... - The mobile phone terminals (VoIP over WiFi, DECT, dual-mode terminal...). - Links: xdsl, Ethernet, radio links, sizing. ORSYS, La Grande Arche, Paroi Nord, Paris La Défense cedex. Tél : +33 (0) Fax : +33(0) page 16

17 6) Performance and quality of service of Voip networks - Why data networks do not give reliability required by the transport of voice? - The reliability reference: the PSTN. - Strengths and weaknesses of data networks in terms of quality of service. Definition and concepts of the QoS Quality of Service. Delay, jitter, packet loss... impacts of the IP network QoS on Voip. - To compensate the unreliability of IP networks, use of specific protocols: RTP and RTCP. - Summary of flows in Voip. Signalling ( call setup). Media (voice, video...). - How to bring the performance to IP networks. Strengthen bandwidth. QoS management tools for IP networks (802.1P/Q, RSVP, DiffServ, MPLS...). VoIP quality referential: E-model, PESQ, PAMS, PSQM. 7) Security - The emerging issues related to the migration to Voip solutions. What should we protect, who, why can we be attacked? - The known threats. Confidentiality: protecting the media flow and the signalling exchanges. Integrity: control and prevent changes in data transmitted over the network. The availability and denial of service. - Identity spoofing. Fraud. The spam. The regulation: the legal obligations of security and brakes for technological development. - The issue of emergency services. 8) The future - Operators evolution: fixed / mobile convergence and abandonment of PSTN model for VoIP. - The convergence of technologies: WiMax, MPLS... - The new services and multimedia uses. - IMS, IP Multimedia Subsystem, tomorrow, the multimedia network. ORSYS, La Grande Arche, Paroi Nord, Paris La Défense cedex. Tél : +33 (0) Fax : +33(0) page 17

18 Synthesis Course, 2 day(s) Ref : XML This course is aimed at people wishing to understand XML and to discover its components related to information systems. A good Web based technical knowledge is required. Next sessions Brussels dec , apr jun Geneve dec , apr jun Luxembourg dec , apr jun XML state of Art Best XML has become an irreplaceable standard to exchange data over the Web. Strongly used in the industry of IT's, it's now one of the main components of Web applications, information systems, data integration, e- commerce (mainly B2B)... Through its many languages, XML can be used to define data structures and check data validity, to transform data and to expose it using different data formats (XML, CSV, SOAP). XML is also strongly used in services oriented architectures. This seminar gives you an XML overview so that you could better appreciate its use in your own information systems and web applications. 1) Knowledge base 2) XML data definition 3) XML data manipulation 4) Web Services Presenter 5) XML database 6) XML workflow 7) Web 2.0 and XML Cyril BALL He is a Professor of Information Technologies for both professionals and students. He has provided his knowledge for more than 18 years in many organizations such as Paris Dauphine University. He was project manager and database administrator in several services companies working for large groups such as Banque Populaire, BNP or CL where he acquired a good knowledge of various business problems, especially those managing huge quantities of data. 1) Knowledge base Origins and objectives - Markup languages. SGML, HTML and CSS. Strengths and weaknesses. Document structure, content and appearance. What's better with XML? XML standard - W3C and xml.org. The markups, elements and attributes, XML namespaces, xmlns. Hyperlinks with XLink. - XML galaxy, XML languages. Applications samples - EDI, data exchange, ETL. Data publication and exposure. 2) XML data definition DTD : document type definition - Wellformedness and validity. Native data types. How to create elements and attributes. The weakness of DTDs. XML Schema and data modeling - Simple and complex types. Creating collections. Inheritance. XSD libraries. Data design - Creating, documenting and maintaining DTDs and XSD. Rules and methods to construct schemas. - From UML to XML. Main tools. 3) XML data manipulation XSL Transformation - XPath to extract and aggregate data. - XSLT document creation. XSLT programming templates. The XSLT processor. - Binary transformation with XSL/FO. Working with XML - From XML documents to objects graphs with DOM API. - Event based programming with SAX API. Use in Java environment. Using XSL-T on client and server side - Client and server side transformations. XSLT processors and data exchange. - Content management systems (CMS). Syndication, push, RSS and ATOM feed. Data manipulation tools - XML tools (XMLSpy, Oxygen...). XSLT and XSLFO tools (Stylevision). - XML suites: Altova Studio, Adobe Studio. 4) Web Services ORSYS, La Grande Arche, Paroi Nord, Paris La Défense cedex. Tél : +33 (0) Fax : +33(0) page 18

19 Web services architectures - WS Client, WS server, WS directory. SOA. WSDL, UDDI et SOAP - Web service description with WSDL. WS inscription with UDDI. - XML-RPC. SOAP (Simple Object Access Protocol): comparison with REST. Web services creation - Workflows. Long data Transactions. - Web services standards: BPEL, WS-Transaction et WS-Coordination. Security - Authentication, XML Encryption, XML signature, XKMS. - PKI and WS-Security the raising standard. - Use in application servers. -.NET strategy. J2EE servers (Websphere, Weblogic, JBoss, etc.). 5) XML database XML data storage - XML as a data model. Relational mapping or native format? Indexation, structure or content search. How to integrate with the existent. Query languages - SQL/XML extends SQL. Microsoft LINQ. XQuery: W3C's standard. XUpdate to update data. Database tools - SGBDR extension: IBM, Oracle, Microsoft. Natives XML SGBD: Tamino, GoXML, TextML, NeoCore, X- Hive... What's about performances? - Use case: PCWorldOnLine. 6) XML workflow Data integration through XML EII - XML EII (Enterprise Information Integrators): imported schemas and integrated views. - Extracting data guides. Query splitting. Unifying results. - EII XML samples: BEA Liquid Data, IBM Information Integrator, Médience (BO). Applications integration through XML EAI - EAI functionality: connection, transformation, data exchange, process modeling, workflows management. EAI Bus. - EAI XML samples: MS BizTalk, BEA Weblogic Integration, IBM Websphere Business Integration, Oracle, Sun ONE, Tibco, etc. - Application integration through Web services : the Qwest sample with UDDI. XML and B2B - Why is it better to use XML in B2B solutions. Protocols and samples: cxml, xcbl, UBL, RosettaNet, OAGIS, FIX. - ebxml to replace the old EDI: process models, activities and dictionaries. - ebxml use case : the MTR's e-invoicing system. 7) Web 2.0 and XML Web For a more social and better fashioned Web. - Development tools and rich client. Semantic Web - Description and annotation of XHTML pages and resources. The RDF semantic model. ORSYS, La Grande Arche, Paroi Nord, Paris La Défense cedex. Tél : +33 (0) Fax : +33(0) page 19

20 Seminar, 3 day(s) Ref : IRT This seminar is aimed at project leaders, IT decision makers, developers, IT managers, and webmasters. Knowledge in computing. Next sessions Brussels apr , jun Geneve apr , jun Luxembourg apr , jun Web Technologies, overview Best This seminar presents a comprehensive overview of internet/intranet technologies. It will cover the following topics in a simple and practical way: the underlying techniques and infrastructures; the standards and tools available for developing efficient and secured applications; the impact of the introduction of new technologies such as mobility or e-commerce on applications and, more generally, on society. 1) The information system 2) Basic technologies 3) Basic services 1) The information system 4) Security 5) Application architectures 6) Mobility - Role of Intranet, Internet, Extranet applications. Evolution towards n-tier architectures. 2) Basic technologies - Internet architecture. IP, IPv6, ICMP, UDP, TCP protocols. Routing, ports, DNS. Domain name. - Networks. Service and access providers. Operators' offers. Evolution to high-speed access: FTTH. 3) Basic services Message services - Mime. POP3, IMAP4, SMTP protocols. Spamming. Message service clients and servers. Security flaws. Directories - Concept. User management, DNS, Whois, application directories, X.500. The LDAP protocol. Search engines and portals - The strategic role. Indexing and ranking. Search Engin Optimization. Google, Google adwords, bing... Collaborative work - The characteristics. What tools for what needs? For companies, for personal environment. Multimedia over IP - Images, sounds, video: GIF, JPEG, MP3, MPEG, VP8... TNT, VoD (DVB-T, TVHD). Streaming software. Video over IP. Multi-cast broadcasting. WebTV, WebRadio. SIP protocol. Skype, Jabber. RTP, H323 protocols. Web - Principles: URI, HTTP, HTML, HTML5. XML for the Web. The universal client: Internet Explorer, FireFox... PDA, thick/thin PC solutions. RSS and podcast services. Web Concept. Rich user interface (RIA/RDA). Ajax, Flex, XUL, XAML, etc. Blog, wiki, RSS, Atom, podcasting, videocasting... Social networks (Facebook, Twitter...). - HTML5: advantages on semantic, new functionalities for javascript development, 3D appearance, CSS-3. E-business - Content management system (CSM). Traffic analysis tools. Payment over the Net: paypal API, Google checkout... Merchandplatform: OS-Commerce, Prestashop... 4) Security Cybercriminology - Origin, Organization. Why Internet facilitate hacking and cracking. Tools and organization of pirats. Security services - Confidentiality, authentication, integrity, denial of service, non-repudiation. Authentication - Passwords, Active Card, Secure ID, biometrics... - PPP authentication. Radius, Kerberos authentication systems. Access security - Firewall, proxy. Architecture and localisation, DMZ. Packet filtering, filtering routers, ACL. Security of networks - Limit of WIFI WEP, WPA. HTTPS protocols. Threats of Public spot wifi. Attack methods over IP. VPN. Security of web applications ORSYS, La Grande Arche, Paroi Nord, Paris La Défense cedex. Tél : +33 (0) Fax : +33(0) page 20

Network / Security, Network, overview

Network / Security, Network, overview Network / Security, Network, overview Orsys, with 30 years of experience, is providing high quality, independant State of the Art seminars and hands-on courses corresponding to the needs of IT professionals.

More information

Network / Security, Network, overview

Network / Security, Network, overview Network / Security, Network, overview Orsys, with 30 years of experience, is providing high quality, independant State of the Art seminars and hands-on courses corresponding to the needs of IT professionals.

More information

Internet / XML / SOA, XML and Web Services

Internet / XML / SOA, XML and Web Services Internet / XML / SOA, XML and Web Services Orsys, with 30 years of experience, is providing high quality, independant State of the Art seminars and hands-on courses corresponding to the needs of IT professionals.

More information

SSVVP SIP School VVoIP Professional Certification

SSVVP SIP School VVoIP Professional Certification SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that

More information

Hands on VoIP. Content. Tel +44 (0) 845 057 0176 enquiries@protelsolutions.co.uk. Introduction

Hands on VoIP. Content. Tel +44 (0) 845 057 0176 enquiries@protelsolutions.co.uk. Introduction Introduction This 4-day course offers a practical introduction to 'hands on' VoIP engineering. Voice over IP promises to reduce your telephony costs and provides unique opportunities for integrating voice

More information

Chapter 4: Networking and the Internet

Chapter 4: Networking and the Internet Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Copyright 2012 Pearson Education, Inc. Chapter 4: Networking and the Internet 4.1 Network Fundamentals

More information

Networking 4 Voice and Video over IP (VVoIP)

Networking 4 Voice and Video over IP (VVoIP) Networking 4 Voice and Video over IP (VVoIP) Course Objectives This course will give delegates a good understanding of LANs, WANs and VVoIP (Voice and Video over IP). It is aimed at those who want to move

More information

SSVP SIP School VoIP Professional Certification

SSVP SIP School VoIP Professional Certification SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover

More information

IT4405 Computer Networks (Compulsory)

IT4405 Computer Networks (Compulsory) IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and

More information

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01 JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment

More information

EDA 1200 4.3 Training Programs. Catalog of Course Descriptions

EDA 1200 4.3 Training Programs. Catalog of Course Descriptions EDA 1200 4.3 Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION...3 ACCESS NETWORKS, AN OVERVIEW...4 CORE NETWORKS, AN OVERVIEW...6 EDA 1200 4.3 INSTALLATION AND

More information

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification

More information

Technology Training Limited Module Portfolio for Customised Courses

Technology Training Limited Module Portfolio for Customised Courses Technology Training Limited Module Portfolio for Customised Courses E-mail: info@technology-training.co.uk website: www.technology-training.co.uk Module Catalogue v1.3 Page 1 of 17 CONTENTS LIST 1 ACCESS

More information

Securely Managing and Exposing Web Services & Applications

Securely Managing and Exposing Web Services & Applications Securely Managing and Exposing Web Services & Applications Philip M Walston VP Product Management Layer 7 Technologies Layer 7 SecureSpan Products Suite of security and networking products to address the

More information

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles. Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described

More information

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb). 1 / 17 Network: several computers who can communicate. Bus topology: bus Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb). Hardware has globally unique MAC addresses (IDs).

More information

Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols

Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols E-Commerce Infrastructure II: the World Wide Web The Internet and the World Wide Web are two separate but related things Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 1 Outline The Internet and

More information

CompTIA Network+ (Exam N10-005)

CompTIA Network+ (Exam N10-005) CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate

More information

IS Careers. MIS 4133 Software Systems

IS Careers. MIS 4133 Software Systems IS Careers MIS 4133 Software Systems Outline CS and MIS Salaries Core competencies Hot technical skills IS job titles Employment outlook Careers in CS and MIS Computer Science Focuses on the development

More information

ICTTEN8195B Evaluate and apply network security

ICTTEN8195B Evaluate and apply network security ICTTEN8195B Evaluate and apply network security Release 1 ICTTEN8195B Evaluate and apply network security Modification History Release Release 2 Comments This version first released with ICT10 Integrated

More information

Network System Design Lesson Objectives

Network System Design Lesson Objectives Network System Design Lesson Unit 1: INTRODUCTION TO NETWORK DESIGN Assignment Customer Needs and Goals Identify the purpose and parts of a good customer needs report. Gather information to identify network

More information

Detailed Table of Contents

Detailed Table of Contents Detailed Table of Contents Foreword Preface 1. Networking Protocols and OSI Model 1 1.1 Protocols in Computer Communications 3 1.2 The OSI Model 7 1.3 OSI Layer Functions 11 Summary 19 Key Terms and Concepts

More information

Introduction Chapter 1. Uses of Computer Networks

Introduction Chapter 1. Uses of Computer Networks Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks

More information

Local Area Networks (LANs) Blueprint (May 2012 Release)

Local Area Networks (LANs) Blueprint (May 2012 Release) Local Area Networks (LANs) The CCNT Local Area Networks (LANs) Course April 2012 release blueprint lists the following information. Courseware Availability Date identifies the availability date for the

More information

COMPUTER NETWORK TECHNOLOGY (300)

COMPUTER NETWORK TECHNOLOGY (300) Page 1 of 10 Contestant Number: Time: Rank: COMPUTER NETWORK TECHNOLOGY (300) REGIONAL 2014 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant

More information

IT4504 - Data Communication and Networks (Optional)

IT4504 - Data Communication and Networks (Optional) - Data Communication and Networks (Optional) INTRODUCTION This is one of the optional courses designed for Semester 4 of the Bachelor of Information Technology Degree program. This course on Data Communication

More information

Networking: EC Council Network Security Administrator NSA

Networking: EC Council Network Security Administrator NSA coursemonster.com/uk Networking: EC Council Network Security Administrator NSA View training dates» Overview The EC-Council's NSA certification looks at network security from a defensive view. The NSA

More information

Colt IP VPN Services. 2010 Colt Technology Services Group Limited. All rights reserved.

Colt IP VPN Services. 2010 Colt Technology Services Group Limited. All rights reserved. Colt IP VPN Services 2010 Colt Technology Services Group Limited. All rights reserved. Agenda An introduction to IP VPN Colt IP VPN Hybrid Networking Workforce Mobility Summary 2 Drivers behind IP VPN

More information

Security Design. thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/

Security Design. thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/ Security Design thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/ Content Security Design Analysing Design Requirements Resource Separation a Security Zones VLANs Tuning Load Balancing

More information

10CS64: COMPUTER NETWORKS - II

10CS64: COMPUTER NETWORKS - II QUESTION BANK 10CS64: COMPUTER NETWORKS - II Part A Unit 1 & 2: Packet-Switching Networks 1 and Packet-Switching Networks 2 1. Mention different types of network services? Explain the same. 2. Difference

More information

IBM 000-281 EXAM QUESTIONS & ANSWERS

IBM 000-281 EXAM QUESTIONS & ANSWERS IBM 000-281 EXAM QUESTIONS & ANSWERS Number: 000-281 Passing Score: 800 Time Limit: 120 min File Version: 58.8 http://www.gratisexam.com/ IBM 000-281 EXAM QUESTIONS & ANSWERS Exam Name: Foundations of

More information

JOHN KNEILING APRIL 3-5, 2006 APRIL 6-7, 2006 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

JOHN KNEILING APRIL 3-5, 2006 APRIL 6-7, 2006 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) TECHNOLOGY TRANSFER PRESENTS JOHN KNEILING CREATING XML AND WEB SERVICES SOLUTIONS SECURING THE WEB SERVICES ENVIRONMENT APRIL 3-5, 2006 APRIL 6-7, 2006 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME

More information

Core Feature Comparison between. XML / SOA Gateways. and. Web Application Firewalls. Jason Macy jmacy@forumsys.com CTO, Forum Systems

Core Feature Comparison between. XML / SOA Gateways. and. Web Application Firewalls. Jason Macy jmacy@forumsys.com CTO, Forum Systems Core Feature Comparison between XML / SOA Gateways and Web Application Firewalls Jason Macy jmacy@forumsys.com CTO, Forum Systems XML Gateway vs Competitive XML Gateways or Complementary? and s are Complementary

More information

CompTIA Convergence+ 2006 Examination Objectives

CompTIA Convergence+ 2006 Examination Objectives CompTIA Convergence+ 2006 Examination Objectives Introduction The CompTIA Convergence+ examination covering the 2006 objectives certifies that the successful candidate has the necessary knowledge to perform

More information

Advanced Higher Computing. Computer Networks. Homework Sheets

Advanced Higher Computing. Computer Networks. Homework Sheets Advanced Higher Computing Computer Networks Homework Sheets Topic : Network Protocols and Standards. Name the organisation responsible for setting international standards and explain why network standards

More information

Cisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT)

Cisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT) Cisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT) Course Number: 642 845 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: Cisco CCNP Exam 642 845:

More information

Telecommunications, the Internet, and Wireless Technology

Telecommunications, the Internet, and Wireless Technology Chapter 6 Telecommunications, the Internet, and Wireless Technology 6.1 Copyright 2011 Pearson Education, Inc. STUDENT LEARNING OBJECTIVES What are the principal components of telecommunications networks

More information

Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards)

Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards) Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards) Michael P. Papazoglou (INFOLAB/CRISM, Tilburg University, The Netherlands)

More information

Study Guide CompTIA A+ Certification, Domain 2 Networking

Study Guide CompTIA A+ Certification, Domain 2 Networking Study Guide CompTIA A+ Certification, Domain 2 Networking Brought to you by RMRoberts.com Introduction to CSR Domain - 2 (220-801) The CompTIA A+ 220-801 Domain 2 Networking has expanded a lot since the

More information

ManageEngine (division of ZOHO Corporation) www.manageengine.com. Infrastructure Management Solution (IMS)

ManageEngine (division of ZOHO Corporation) www.manageengine.com. Infrastructure Management Solution (IMS) ManageEngine (division of ZOHO Corporation) www.manageengine.com Infrastructure Management Solution (IMS) Contents Primer on IM (Infrastructure Management)... 3 What is Infrastructure Management?... 3

More information

Level: 3 Credit value: 9 GLH: 80. QCF unit reference R/507/8351. This unit has 6 learning outcomes.

Level: 3 Credit value: 9 GLH: 80. QCF unit reference R/507/8351. This unit has 6 learning outcomes. This unit has 6 learning outcomes. 1. Know telephony principles. 1.1. Demonstrate application of traffic engineering concepts Prioritization of voice traffic Trunking requirements Traffic shaping. 1.2.

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

Course 4: IP Telephony and VoIP

Course 4: IP Telephony and VoIP Course 4: IP Telephony and VoIP Telecommunications Technical Curriculum Program 3: Voice Knowledge 6/9/2009 1 Telecommunications Technical Curriculum Program 1: General Industry Knowledge Course 1: General

More information

ENHWI-N3. 802.11n Wireless Router

ENHWI-N3. 802.11n Wireless Router ENHWI-N3 802.11n Wireless Router Product Description Encore s ENHWI-N3 802.11n Wireless Router s 1T1R Wireless single chip can deliver up to 3x faster speed than of 802.11g devices. ENHWI-N3 supports home

More information

Preparation Guide Content. EXIN Cloud. 1. Overview 4 2. Exam Requirements 6 3. List of Basic Concepts 9 4. Exam Literature 13. Computing Foundation

Preparation Guide Content. EXIN Cloud. 1. Overview 4 2. Exam Requirements 6 3. List of Basic Concepts 9 4. Exam Literature 13. Computing Foundation Preparation Guide Content EXIN Cloud 1. Overview 4 2. Exam Requirements 6 3. List of Basic Concepts 9 4. Exam Literature 13 Computing Foundation Edition December 2015 Copyright 2015 EXIN All rights reserved.

More information

Indepth Voice over IP and SIP Networking Course

Indepth Voice over IP and SIP Networking Course Introduction SIP is fast becoming the Voice over IP protocol of choice. During this 3-day course delegates will examine SIP technology and architecture and learn how a functioning VoIP service can be established.

More information

OCR LEVEL 3 CAMBRIDGE TECHNICAL

OCR LEVEL 3 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT COMPUTER NETWORKS R/601/7320 LEVEL 3 UNIT 7 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 COMPUTER NETWORKS R/601/7320 LEVEL

More information

ICTTEN5168A Design and implement an enterprise voice over internet protocol and a unified communications network

ICTTEN5168A Design and implement an enterprise voice over internet protocol and a unified communications network ICTTEN5168A Design and implement an enterprise voice over internet protocol and a unified communications network Release: 1 ICTTEN5168A Design and implement an enterprise voice over internet protocol and

More information

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer

More information

IPv6 Migration Challenges for Large Service Providers

IPv6 Migration Challenges for Large Service Providers IPv6 Migration Challenges for Large Service Providers Aruna P General manager Network Operation Agenda Airtel Overview Drivers of IPV6 Migration challenges Design Considerations Deployment plan Airtel

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

Spoilt for Choice Which Integration Framework to choose? Mule ESB. Integration. www.mwea.de. Kai Wähner

Spoilt for Choice Which Integration Framework to choose? Mule ESB. Integration. www.mwea.de. Kai Wähner Spoilt for Choice Which Integration Framework to choose? Integration vs. Mule ESB vs. Main Tasks Evaluation of Technologies and Products Requirements Engineering Enterprise Architecture Management Business

More information

1.264 Lecture 37. Telecom: Enterprise networks, VPN

1.264 Lecture 37. Telecom: Enterprise networks, VPN 1.264 Lecture 37 Telecom: Enterprise networks, VPN 1 Enterprise networks Connections within enterprise External connections Remote offices Employees Customers Business partners, supply chain partners Patients

More information

Discovering Computers 2008. Chapter 9 Communications and Networks

Discovering Computers 2008. Chapter 9 Communications and Networks Discovering Computers 2008 Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the the components required for for successful communications Identify various sending and receiving devices

More information

ZyXEL offer more than just a product, we offer a solution. The Prestige DSL router family benefits providers and resellers enabling them to offer:

ZyXEL offer more than just a product, we offer a solution. The Prestige DSL router family benefits providers and resellers enabling them to offer: DSL Access Guide DSL Access Routers ZyXEL is a leading manufacturer and supplier of DSL and Voice over IP routers. ZyXEL offer a complete portfolio of routers suited for Telecoms providers, Internet Service

More information

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server

More information

ICTTEN4215A Install and configure internet protocol TV in a service provider network

ICTTEN4215A Install and configure internet protocol TV in a service provider network ICTTEN4215A Install and configure internet protocol TV in a service provider network Release: 1 ICTTEN4215A Install and configure internet protocol TV in a service provider network Modification History

More information

Voice over IP Networks: Ensuring quality through proactive link management

Voice over IP Networks: Ensuring quality through proactive link management White Paper Voice over IP Networks: Ensuring quality through proactive link management Build Smarter Networks Table of Contents 1. Executive summary... 3 2. Overview of the problem... 3 3. Connectivity

More information

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006 Core Syllabus C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS Version 2.6 June 2006 EUCIP CORE Version 2.6 Syllabus. The following is the Syllabus for EUCIP CORE Version 2.6, which

More information

Redbook Overview Patterns: SOA Design with WebSphere Message Broker and WebSphere ESB

Redbook Overview Patterns: SOA Design with WebSphere Message Broker and WebSphere ESB IBM Software for WebSphere Redbook Overview Patterns: SOA Design with WebSphere Message Broker and WebSphere ESB Presenter: Kim Clark Email: kim.clark@uk.ibm.com Date: 27/02/2007 SOA Design with WebSphere

More information

Oracle SOA Suite: The Evaluation from 10g to 11g

Oracle SOA Suite: The Evaluation from 10g to 11g KATTA Durga Reddy TATA Consultancy Services. Oracle SOA Suite: The Evaluation from 10g to 11g Introduction Oracle SOA Suite is an essential middleware layer of Oracle Fusion Middleware. It provides a complete

More information

Computer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill

Computer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill Computer Networks A Top-Down Approach Behrouz A. Forouzan and Firouz Mosharraf \Connect Mc \ Learn Graw I Succeed* Hill Preface xvii Trademarks xxiii Chapter 1 Introduction 1 1.1 OVERVIEW OF THE INTERNET

More information

Review: Lecture 1 - Internet History

Review: Lecture 1 - Internet History Review: Lecture 1 - Internet History late 60's ARPANET, NCP 1977 first internet 1980's The Internet collection of networks communicating using the TCP/IP protocols 1 Review: Lecture 1 - Administration

More information

Corporate Network Services of Tomorrow Business-Aware VPNs

Corporate Network Services of Tomorrow Business-Aware VPNs Corporate Network Services of Tomorrow Business-Aware VPNs Authors: Daniel Kofman, CTO and Yuri Gittik, CSO Content Content...1 Introduction...2 Serving Business Customers: New VPN Requirements... 2 Evolution

More information

Oracle WebLogic Foundation of Oracle Fusion Middleware. Lawrence Manickam Toyork Systems Inc www.toyork.com http://ca.linkedin.

Oracle WebLogic Foundation of Oracle Fusion Middleware. Lawrence Manickam Toyork Systems Inc www.toyork.com http://ca.linkedin. Oracle WebLogic Foundation of Oracle Fusion Middleware Lawrence Manickam Toyork Systems Inc www.toyork.com http://ca.linkedin.com/in/lawrence143 History of WebLogic WebLogic Inc started in 1995 was a company

More information

Cisco RV 120W Wireless-N VPN Firewall

Cisco RV 120W Wireless-N VPN Firewall Cisco RV 120W Wireless-N VPN Firewall Take Basic Connectivity to a New Level The Cisco RV 120W Wireless-N VPN Firewall combines highly secure connectivity to the Internet as well as from other locations

More information

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria

More information

How To Understand Cloud Computing

How To Understand Cloud Computing Overview of Cloud Computing (ENCS 691K Chapter 1) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ Overview of Cloud Computing Towards a definition

More information

XML- New meta language in e-business

XML- New meta language in e-business 1 XML- New meta language in e-business XML (extensible Markup Language) has established itself as a new meta language in e-business. No matter what, text, pictures, video- or audio files - with the flexibility

More information

SCHOOL DISTRICT OF ESCAMBIA COUNTY

SCHOOL DISTRICT OF ESCAMBIA COUNTY SCHOOL DISTRICT OF ESCAMBIA COUNTY JOB DESCRIPTION Programmer Analyst I Web Technologies PROGRAMMER ANALYST I WEB TECHNOLOGIES QUALIFICATIONS: (1) Bachelor s Degree from an accredited educational institution

More information

FBLA: NETWORKING CONCEPTS. Competency: General Network Terminology and Concepts

FBLA: NETWORKING CONCEPTS. Competency: General Network Terminology and Concepts Competency: General Network Terminology and Concepts 1. Demonstrate knowledge of the purposes, benefits, and risks for installing a network. 2. Identify types of networks (e.g., LAN, WAN, MAN) and their

More information

TECHNICAL CHALLENGES OF VoIP BYPASS

TECHNICAL CHALLENGES OF VoIP BYPASS TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish

More information

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0 EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single

More information

Reporting component for templates, reports and documents. Formerly XML Publisher.

Reporting component for templates, reports and documents. Formerly XML Publisher. Fusion Middleware Product TLA Description Comments Access Manager OAM Offers single-sign on, access policy creation and enforcement, self-service, delegated administration, password management, reporting

More information

Advanced Internetworking

Advanced Internetworking Hands-On TCP-IP / IPv6 / VoIP Course Description In this Hands-On 3-day course, gives a deeper understanding of internetworking and routed network protocols. The focus of the course is the design, operation,

More information

Chapter 1 Personal Computer Hardware------------------------------------------------ 7 hours

Chapter 1 Personal Computer Hardware------------------------------------------------ 7 hours Essential Curriculum Networking Essentials Total Hours: 244 Cisco Discovery 1: Networking for Home and Small Businesses 81.5 hours teaching time Chapter 1 Personal Computer Hardware------------------------------------------------

More information

Kick starting science...

Kick starting science... Computer ing (TDDD63): Part 1 Kick starting science... Niklas Carlsson, Associate Professor http://www.ida.liu.se/~nikca/ What do you have in the future? What do you have in the future? How does it keep

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

Bachelor of Information Technology (Network Security)

Bachelor of Information Technology (Network Security) Bachelor of Information Technology (Network Security) Course Structure Year 1: Level 100 Foundation knowledge subjects SEMESTER 1 SEMESTER 2 ITICT101A Fundamentals of Computer Organisation ITICT104A Internetworking

More information

Web Foundations Series Internet Business Associate

Web Foundations Series Internet Business Associate Web Foundations Series Internet Business Associate Internet Business Associate prepares students to work effectively in today's business environment. In this course, you will learn about the tasks involved

More information

Photonix Communications pty. Ltd. Australia. Catalogue

Photonix Communications pty. Ltd. Australia. Catalogue s pty. Ltd. Catalogue 2016 Pty Ltd. Course Content Course Duration (Days) Page No. 01 Understanding IP (Basics) 2 3 02 Understanding IP 3 4 (Advanced) 03 Understanding WLAN (Wi-Fi) 2 5 04 Understanding

More information

Mobility and cellular networks

Mobility and cellular networks Mobility and cellular s Wireless WANs Cellular radio and PCS s Wireless data s Satellite links and s Mobility, etc.- 2 Cellular s First generation: initially debuted in Japan in 1979, analog transmission

More information

Recommended IP Telephony Architecture

Recommended IP Telephony Architecture Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 SNAC.Guides@nsa.gov This Page Intentionally Left Blank ii Warnings

More information

November 2013. Defining the Value of MPLS VPNs

November 2013. Defining the Value of MPLS VPNs November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do

More information

Networking Technology Online Course Outline

Networking Technology Online Course Outline Networking Technology Online Course Outline Introduction Networking Technology Introduction Welcome to InfoComm University About InfoComm International About Networking Technology Network Technology Course

More information

How To Use A Cisco Wvvvdns4400N Wireless-N Gigabit Security Router For Small Businesses

How To Use A Cisco Wvvvdns4400N Wireless-N Gigabit Security Router For Small Businesses Cisco WRVS4400N Wireless-N Gigabit Security Router Cisco Small Business Routers Highlights Secure, high-speed wireless network access for small business Gigabit Ethernet connections enable rapid transfer

More information

Voice over IP Basics for IT Technicians

Voice over IP Basics for IT Technicians Voice over IP Basics for IT Technicians White Paper Executive summary The IP phone is coming or has arrived on desk near you. The IP phone is not a PC, but does have a number of hardware and software elements

More information

Southern Methodist University. Department of Electrical Engineering. Telecommunications (EETS) Course Descriptions

Southern Methodist University. Department of Electrical Engineering. Telecommunications (EETS) Course Descriptions Southern Methodist University Department of Electrical Engineering Telecommunications (EETS) Course Descriptions 7301 Introduction to Telecommunications Overview of public and private telecommunications

More information

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1 Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3

More information

Introduction to WebSphere Process Server and WebSphere Enterprise Service Bus

Introduction to WebSphere Process Server and WebSphere Enterprise Service Bus Introduction to WebSphere Process Server and WebSphere Enterprise Service Bus Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 4.0.3 Unit objectives

More information

EAI OVERVIEW OF ENTERPRISE APPLICATION INTEGRATION CONCEPTS AND ARCHITECTURES. Enterprise Application Integration. Peter R. Egli INDIGOO.

EAI OVERVIEW OF ENTERPRISE APPLICATION INTEGRATION CONCEPTS AND ARCHITECTURES. Enterprise Application Integration. Peter R. Egli INDIGOO. EAI OVERVIEW OF ENTERPRISE APPLICATION INTEGRATION CONCEPTS AND ARCHITECTURES Peter R. Egli INDIGOO.COM 1/16 Contents 1. EAI versus SOA versus ESB 2. EAI 3. SOA 4. ESB 5. N-tier enterprise architecture

More information

FT networks, services and IS evolution perspectives towards convergence Patrice COLLET France Télécom Network, Carrier and IT Division

FT networks, services and IS evolution perspectives towards convergence Patrice COLLET France Télécom Network, Carrier and IT Division FT networks, services and IS evolution perspectives towards convergence Patrice COLLET France Télécom Network, Carrier and IT Division Networks, Carriers and IT France Télécom T vision Networks, Carriers

More information

Network Technology CMP-354-TE. TECEP Test Description

Network Technology CMP-354-TE. TECEP Test Description Network Technology CMP-354-TE This TECEP tests knowledge of the fundamental concepts of data communications. Topics covered include: network architectures, topologies, media and devices, protocols, types

More information

Jive Core: Platform, Infrastructure, and Installation

Jive Core: Platform, Infrastructure, and Installation Jive Core: Platform, Infrastructure, and Installation Jive Communications, Inc. 888-850-3009 www.getjive.com 1 Overview Jive hosted services are run on Jive Core, a proprietary, cloud-based platform. Jive

More information

Chapter 1: Introduction to Communications What is Data Communications? Data Communication Networks Basic Components of a communications system

Chapter 1: Introduction to Communications What is Data Communications? Data Communication Networks Basic Components of a communications system Dear Student Here is the list of chapter sections that we will be covering for this semester. For each chapter listed in pages below: Any Bold text is required (with all the details in that sections) Any

More information

Lecture 02b Cloud Computing II

Lecture 02b Cloud Computing II Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,

More information

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider INTRODUCTION Multiprotocol Label Switching (MPLS), once the sole domain of major corporations and telecom carriers, has gone mainstream

More information

Development of the FITELnet-G20 Metro Edge Router

Development of the FITELnet-G20 Metro Edge Router Development of the Metro Edge Router by Tomoyuki Fukunaga * With the increasing use of broadband Internet, it is to be expected that fiber-tothe-home (FTTH) service will expand as the means of providing

More information

Cisco WRVS4400N Wireless-N Gigabit Security Router: Cisco Small Business Routers

Cisco WRVS4400N Wireless-N Gigabit Security Router: Cisco Small Business Routers Cisco WRVS4400N Wireless-N Gigabit Security Router: Cisco Small Business Routers Highlights Secure, high-speed wireless network access for small business Gigabit Ethernet connections enable rapid transfer

More information