Network / Security, Network, overview

Size: px
Start display at page:

Download "Network / Security, Network, overview"

Transcription

1 Network / Security, Network, overview Orsys, with 30 years of experience, is providing high quality, independant State of the Art seminars and hands-on courses corresponding to the needs of IT professionals. Orsys proposes a set of courses on the most important topics in IT technologies and management. Seminars Networks, State of Art... Best ( p2 ) Networks and the future of Internet... Best ( p4 ) Wireless networks... Best ( p6 ) VOIP, Architectures and Processes... Best ( p8 ) Hands-on courses Unix/Linux Open LDAP Directory Service... ( p10 ) ORSYS, La Grande Arche, Paroi Nord, Paris La Défense cedex. Tél : +33 (0) Fax : +33(0) page 1

2 Seminar, 3 day(s) Ref : TER Participants Project managers, architects networks, systems and networks engineers. Pre-requisites Basic knowledge in networks and communications. Next sessions Brussels sep , nov Geneve sep , nov Luxembourg sep , nov Networks, State of Art Best > Network / Security > Network, overview OBJECTIVES This seminar presents an overview of the main protocols, the standardization, the voice quality and bandwith, the migration, the performance and the security of voip technologies, and introduces you to the major components of voice over IP networks. On all these topics, the main solutions are detailed and illustrated with case studies. 1) Main solutions for networks 2) Network architectures and access 3) Cellular and wireless networks 4) Businesses networks Presenter 5) Carriers networks 6) IP environments 7) Multimedia, video and voice over IP 8) Security, managment Xavier CARCELLE After Engineering studies in France and in the US, he worked on telecommunications engineering projects in France, US and Chile. He served as CTO for OpenPattern a french telecommunications company developing an OpenHardware FPGA-based router-board. He is currently working for a Linux-based VoIP company managing the development of the XiVO IPBX OpenHardware appliance. He is the author of numerous telecommunications books among them a reference book about PowerLineCommunications. 1) Main solutions for networks - Main categories of data networks: computers, telecommunications and cable carriers. Equipments. 2) Network architectures and access Physical-level architectures - SONET and SDH. WDM and DWDM techniques. Wavelength switching and burst switching. Link layer architectures - Ethernet frames. ATM architecture and exploitation. PPP frames and links for Internet. Switching techniques. Packet-level architectures - IP architectures. Routers and layer functionnalities. - Routing principles. IP controling and signaling. Link/packet layer architectures - Label switching techniques. MPLS standard. - Distribution. Quality of Service. GMPLS extensions. Local loop - Toward very high bandwidth. Optical technologies. - Solutions from the cable carriers. xdsl techniques. - Local loop. WiFi and WiMax. 3G. - Optical fiber to the business, to the CPE. - Voice (VoDSL) and television (TVoDSL). 3) Cellular and wireless networks Cellular networks - Wireless networks typologies: PAN, WLAN, WMAN, WRAN. Hot-spot, handover, roaming. - GSM. GPRS. 3G (UMTS, W-CDMA and CDMA-2000) and different flavors HSPDA, HSUPA. 4G. RFID tags. Wireless network technologies - Bluetooth 3.0 new products , WiFi products and WLAN. WiMAX. - QoS. Geolocalization techniques. 4) Businesses networks LAN Technologies - Principles. Cabling: Supports (UTP, STP, Optical Fiber, Wireless), topologies (rings, tree, star, cell). Standardisation and evolutions of the LANs - Evolution of the medium access methods: ISO (CSMA/CD), ISO (Token ring). Standardisation. Local Ethernet networks ORSYS, La Grande Arche, Paroi Nord, Paris La Défense cedex. Tél : +33 (0) Fax : +33(0) page 2

3 - Different solutions among the Ethernet family. - Protocols in the 802 family, management of the QoS. - Virtual networks VLAN and their implementations. Interconnections - Tools for interconnecting networks. Switching. - Overlays networks, CDN and P2P. Virtual private networks - Data filtering. Security and management. - VPN-IP- IPsec and VPN-IP-MPLS environments. 5) Carriers networks Functionalities - Quality of Service, control and managment. - Signalling. Convergence. Robustness. - Voice/Data/Video integration. Interconnecting sites. - Virtual private networks (VPNs). Internet solutions - Internet boom. ISP networks architectures. - IP VPNs, IPSec VPNs. VPLS solutions. Frame Relay and ATM networks - ATM and Frame Relays. - Voice/Data integration. Quality of Service. MPLS architecture - Label switching and MPLS architecture. - Quality of service ; MPLS-DiffServ ; VPN-MPLS. Policy-based architecture - COPS protocol (Commong Open Policy Service). - SLAs (Service Level Agreements). - PIBs (Policy Information Bases). 6) IP environments Internet-based environments - Goals. Fundamental principles of Internet. - TCP/IP and UDP/IP global architecture. - IPv4 protocol. IPv6 protocol. ICMP, the control protocol. - Diff-Serv and Int-Serv. RSVP. IP multicast. IP VPN. Applications layer - The basic applications: FTP, mail, Web... - Corporate multimedia. Voice over IP. Distributed video. 7) Multimedia, video and voice over IP Voice over IP or VoIP - From voice encoding to data transport. IETF standards.qos. VoIP applications and products. Video over IP, Video-on-demand (VoD) and IPTV - Encoding and compression techniques (MPEG and wavelets). IPTV performances. 8) Security, managment Networks managment - ISO proposals for network managment model. - SNMP protocol: features, proxies, MIB. Security - Main attacks: Viruses, Worms and DDoS. - Solutions: Firewall, authentication (MD5, RSA), IPSEC... Strategies for the future - The future of Internet and Mobility. Smart networks: adapting to the user demands. Autonomic networks. ORSYS, La Grande Arche, Paroi Nord, Paris La Défense cedex. Tél : +33 (0) Fax : +33(0) page 3

4 Seminar, 3 day(s) Ref : RNG Participants This seminar targets network managers, architecture designers and system administrators who need to manage the evolution of their networks. Pre-requisites Knowledge base in the network domain. Next sessions Brussels Geneve Luxembourg Networks and the future of Internet Best > Network / Security > Network, overview OBJECTIVES This seminar will cover the state of the latest features and technologies in the world of networks and telecommunications, emerging technologies and their integraton in the current environments. The different solutions will be described under a technological and economical angle. This seminar targets network architects and engineers as well as IT heads who carry strong knowledge in telecommunications. 1) Internet and the upcoming generation of protocols 2) Mobility in networks 3) Prospective for the mobile Internet 4) Evolution of the technologies in the access networks 5) Controling the Quality of service (QoS) 1) Internet and the upcoming generation of protocols 6) Technologies and evolutions of the access networks 7) Local lopp 8) Wireless networks 9) Voice over IP 10) Security and the next generation of Internet - The Internet Society. Standardization. - The main features of IP : addressing, routing (BGP, RIP, OSPF)...Issues and solutions. - Local networks/public networks : NAT/PAT. IPv6. - The transport layer in TCP/IP : UDP, TCP. 2) Mobility in networks - The first generation of mobile networks. - GSM and its breakthroughs. Packet mode in GSM networks : GPRS/EDGE. GPRS networks routing. - 3G : UMTS, CDMA2000 ; architecture, throuputs, applications. Evolutions to 3G/3G+ : HSDPA, HSUPA, HSOPA, MIMO. - Next generations : throughputs, caracteristics (LTE and UMB). - Inter-netwoks mobility : vertical handover and cognitive radio. - IP mobile architecture in heteregeneous networks. 3) Prospective for the mobile Internet - Mobility, UMTS, 4G and wireless routers. - Contrôle. Content Distributed Networks. Signaling. Control. - Quality of Service for fixed and mobile networks. 4) Evolution of the technologies in the access networks - Switching : high throughputs, label and contents. - Content-based routing and XML routing. - Overlays networks, CDN and P2P networks. - Services-based architectures. 5) Controling the Quality of service (QoS) - Definition of the QoS : from design to state machines. - Traffic engineering. Source-to-destination boundaries. - Access control. Packets sequencing. - Queues handling : RED, RIO. - QoS reults for different technologies. - Application-based trafic shaping. The RTP/RTCP proposition. 6) Technologies and evolutions of the access networks - ATM, a possible universal network? - ATM for ISP and telcos. - Data control and services classifications. - Ethernet-for-all! - From 10Mbits/s to 10Gbits/s. - From LAN to long-distance core network Ethernet First Mile for FTTH. - IP for a new generation. - IPv4 and IPv6. Advantages of IPv6 for fast networks and multimedia. - IP multicast routing. IntServ and DiffServ models. - Different class of services : EF, AF and BE. - DiffServ and MPLS. DiffServ and IntServ : differences. - MPLS and the new generation of core networks for Internet. ORSYS, La Grande Arche, Paroi Nord, Paris La Défense cedex. Tél : +33 (0) Fax : +33(0) page 4

5 - Label switching. Origins and reasons. - LDP Protocols, CR-LDP, RSVP-TE, G-MPLS for new generation. - MPS vs IP. Déployments and key players. 7) Local lopp - Optical fibers access networks (FTTC, FTTH). - Cable-TV access networks. Cable-TV modems. - Twisted pairs access networks. DSL modems. Throughputs. Other solutions : xdsl, DSLAM. - Upcoming triple-play and quadruple-play. - Architectures. Home networking : The Wi-Fi and PLC (PowerLine Communications) technologies. 8) Wireless networks - WPAN networks - Newer generations and the standard. - UWB (Ultra Wide Band) and the very high troughput. - Bluetooth 3.0, WUSB products and WINET. ZigBee. - WLAN networks. - WiFi environment with IEEE a/b/g/n. - Handovers, Quality of service and security. - Fast handover and mesh-networks. - WMAN networks. - WiMAX. Metropolitan networks and IEEE WDSL, mobile ADSL and IEEE e. - WRAN networks. - Usage of the UHF/VHF bands for wireless regional networks and IEEE Smart antennas and cognitive radio. - Wi-xx solutions for networks. - Wireless networks and IEEE Wi-xx networks vs 4G. 9) Voice over IP - Convergence. - Voice over IP, ToIP and VoIP. - Towards a full-ip telephony network. - Standards, industrial key players. - H323 : close the original PSTN. - Architecture and deployment using compatible signalling with PSTN. - SIP approach and unified communications. - An open-system of signalization to build-up services. The SIP Forum. SIP within a 3G mobile network. - Comparison of SIP and H MGCP and gatekeepers. - Interconnexion of ToIP and PSTN devices. Integration of heterogeneous services. 10) Security and the next generation of Internet - Internet security model : still avalailable? Authentication, RADIUS and IEEE 802.1x. - Encryption and electronic signature. - Data Classification for security usage. - New generation of firewalls. Authentication with chips. - Certificates architectures (PKI). - Autonomous networks. Networks managment. Smart networks. Virtual networks. After IP. ORSYS, La Grande Arche, Paroi Nord, Paris La Défense cedex. Tél : +33 (0) Fax : +33(0) page 5

6 Seminar, 3 day(s) Ref : RSW Participants This seminar is intended for IT professionals and network engineers wishing to specialize in cellular networks, mobile networks. Pre-requisites Strong knowledge in corporate networks administrations. Next sessions Brussels sep , nov Geneve sep , nov Luxembourg sep , nov Wireless networks Best > Network / Security > Network, overview OBJECTIVES The domain of wireless networks grows rapidly with newer standards. Those networks allows us to interconnect corporates equipements transmitting voice, data, images. They are also the baseline for telcos «hot spots». The IEEE (Wi-Fi and all its variants), Bluetooth, UWB, ZigBee, IEEE , WiMAX, WiRAN, etc..will be described in depth during this seminar and their applications that can be used. The last day of this seminar will put the stress on the key topic of the wireless security to cover its aspects. 1) Principles of wireless networks 2) Bluetooth, UWB, ZigBee and IEEE networks. 3) Personal networks technologies 4) Mesh-networks and ad-hoc networks 5) IEEE standard and IEEE standard 1) Principles of wireless networks 6) The other solutions 7) Protocols and applications of wireless networks 8) 3G vs WLAN 9) Wi-Fi security 10) ILAN and WAN interconnexion - Introduction to wireless networks. - Fixed networks vs Wireless networks. Different generations. - WPAN, WLAN, WMAN, WRAN networks. - Caracteristics and theoretical performances. - Handover and integration of the different solutions. - Wireless networks for businesses. - Troughputs needed. Available applications. Home, Office and Business networks. - ISP Wi-Fi «Hot spots». - Wi-Fi. Advantages of wireless technologies. - The Wi-Fi issues for ISPs. - Handovers. - Mobility issues. Different types of handovers. - Integration within mobile networks. 2) Bluetooth, UWB, ZigBee and IEEE networks. - The IEEE standard, the UWB, ZigBee and Bluetooth technologies. - The standard and bluetooth. - IEEE Very high trhoughput technology UWB. - Wimedia consortium and WUSB. - IEEE and ZigBee products. - Personal networks technologies. 3) Personal networks technologies - WiFi (IEEE b/g). - A massive success. Specifications. - Wi-Fi devices : cards and access points. - MAC layer : CSMA/CA. Frequency bands. - Ethernet integration. Trhoughputs and performances. - Medium Access technologies. - Quality of Service and IEEE e. - Voice encoding and audio «streams». - Wireless controlers and switches. - Wi-Fi engineering and managment. - Future of IEEE b with n and MIMO. - Deployment of a Wi-Fi network. - Constraints. Devices. Cost. Configuration. 4) Mesh-networks and ad-hoc networks - Definition of a mesh-network and ad-hoc network. - Mesh-networks routing. - Different routing protocols : pro-actives (OLSR, DSDV) and reactives (AODV, DSR). - Security and QoS in ad-hoc networks. 5) IEEE standard and IEEE standard - Definition of the Wireless Local Lopp and WDSL access (Wireless DSL). - WDSL vs fixed networks. ORSYS, La Grande Arche, Paroi Nord, Paris La Défense cedex. Tél : +33 (0) Fax : +33(0) page 6

7 - Technologies and frequencies available. - WiMAX. Theoretical performances. - IEEE standard. Mobile WiMAX. 6) The other solutions - The new genration of regional wireless networks. - Usage of the UHF/VHF bands and IEEE Cognitive radio. Interactive radio. - A unified network with wireless networks. - IEEE and the vertical handover. - Continuity of service and a wireless Internet. 7) Protocols and applications of wireless networks - The IP environment. The slow-start and buffer-bloat issues. - MIMO technologies and the increase of the trhoughput. - Home networks : UPnP and DLNA. - Applications : voice, production, P2P... - Pervasive Internet - Developments. Internet city. Integration with the new IP generation. - Sensors networks. Dust networks. 8) 3G vs WLAN - 3GPP/3GPP2 vs Wi-xx. - Comparison with UMTS. - Fourth generation of mobile networks and UMA/IMS integration. 9) Wi-Fi security - Weaknesses by design of wireless networks. - Protection against Denial of Service possible? How to control the radio coverage? - SSID and security issue. - Attacks : Man-in-the-middle, ARP spoofing. - Weaknesses of the authentication solutions. - Elementary techniques based on SSID and MAC filtering. - Interests and limits. Risks of the beacon frame usage and ssid probe request. - Example of attacks : SSID brute forcing... - Wired Equivalent Privacy WEP - Features. Key exchange. Authentication and encryption. Popular attacks. Demonstrations. - WiFi Protected Access WPA. Features. Advantages of WPA over WEP. - Extensible Authentication Protocol EAP. Temporal Key Integrity Protocol TKIP. - Message Integrity Check MIC. WPA v2 and the i standard. 10) ILAN and WAN interconnexion - Radio coverage control. - Network separaton. - Firewall and DMZ. - End-user device protection. - Mobile users, VPN and wireless networks. ORSYS, La Grande Arche, Paroi Nord, Paris La Défense cedex. Tél : +33 (0) Fax : +33(0) page 7

8 Seminar, 2 day(s) Ref : VIP Participants Project managers, networks architects, systems and networks engineers. Pre-requisites Knowledge in networks. Next sessions Brussels nov Geneve nov Luxembourg nov VOIP, Architectures and Processes Best > Network / Security > Network, overview OBJECTIVES This seminar presents the major components of voice over IP networks. It reviews the main protocols, standardization, voice quality and bandwidth, migration, performance and security of voip technologies. The main solutions will be studied and illustrated with case studies. 1) Networks and telecommunications review 2) Voice over IP 3) Protocols essential (H323, SIP...) 4) Migrating to Voice over IP 1) Networks and telecommunications review 5) Integration and administration 6) Performance and quality of service of Voip networks 7) Security 8) The future - Switched Telephone Network. - Enterprise Telephone Service. Architecture. Assets (PABX, Terminals). Available services. Constraints and limitations. - The Internet architecture, TCP / IP. - Enterprise data network. Architecture. 2) Voice over IP - Definition and concepts. The vocabulary of voip. - Enterprise networks and their evolutions: Voice / Data separation, single network convergence. Why migrate to voip? - How to integrate voip to enterprise information system? - How to interoperate with traditional telephone networks? - The user functionalities offered by voip. - The market and its players. 3) Protocols essential (H323, SIP...) - Roles and interests of each of the protocols. - H323 Presentation and architecture. Principles and definitions. H323 components roles: gatekeeper, MCU, gateway... The steps of a H323 communication: RAS, H225, H Examples of enterprise architecture. - SIP Presentation and architecture. Principles and definitions. SIP components roles: proxy, registrar, redirector, locator... The steps of a SIP communication: registration, localisation, call, roaming... Examples of enterprise architecture. - Other VoIP protocols. MGCP, MEGACO, H IAX protocol, from Asterisk Open Source. 4) Migrating to Voice over IP Key choice for voip - Cost: profit (communications, maintenance), loss (equipment, skills), etc. - New services: improving the productivity of employees (VisioConf, Mobility... etc.). - Scalability of the network and its applications. - The image of the company. Business scenarios and market solutions - Several solutions for various enterprises. - PABX-PABX interconnection. - Migration to IP PABX: examples of manufacturers solutions, advantages and constraints. - IP Centrex solution: examples of operators solutions, advantages and constraints. Peer-to-peer solutions: Skype and Wengo models. - Satisfaction and maturity of the solutions. The management of a Voip project - Different steps: needs analysis, data networks audit, comparison of available solutions, solution adaptation to the company, migration... - Success keys and brakes. 5) Integration and administration - Manufacturers administration tools. - Measures of QoS. - Integration with users databases : LDAP, SSO. - Use and update of network equipment : DHCP, TFTP, DNS... - The mobile phone terminals (VoIP over WiFi, DECT, dual-mode terminal...). - Links: xdsl, Ethernet, radio links, sizing. ORSYS, La Grande Arche, Paroi Nord, Paris La Défense cedex. Tél : +33 (0) Fax : +33(0) page 8

9 6) Performance and quality of service of Voip networks - Why data networks do not give reliability required by the transport of voice? - The reliability reference: the PSTN. - Strengths and weaknesses of data networks in terms of quality of service. Definition and concepts of the QoS Quality of Service. Delay, jitter, packet loss... impacts of the IP network QoS on Voip. - To compensate the unreliability of IP networks, use of specific protocols: RTP and RTCP. - Summary of flows in Voip. Signalling ( call setup). Media (voice, video...). - How to bring the performance to IP networks. Strengthen bandwidth. QoS management tools for IP networks (802.1P/Q, RSVP, DiffServ, MPLS...). VoIP quality referential: E-model, PESQ, PAMS, PSQM. 7) Security - The emerging issues related to the migration to Voip solutions. What should we protect, who, why can we be attacked? - The known threats. Confidentiality: protecting the media flow and the signalling exchanges. Integrity: control and prevent changes in data transmitted over the network. The availability and denial of service. - Identity spoofing. Fraud. The spam. The regulation: the legal obligations of security and brakes for technological development. - The issue of emergency services. 8) The future - Operators evolution: fixed / mobile convergence and abandonment of PSTN model for VoIP. - The convergence of technologies: WiMax, MPLS... - The new services and multimedia uses. - IMS, IP Multimedia Subsystem, tomorrow, the multimedia network. ORSYS, La Grande Arche, Paroi Nord, Paris La Défense cedex. Tél : +33 (0) Fax : +33(0) page 9

10 Hands-on course, 3 day(s) Ref : LDX Pre-requisites The students should have basic system administration knowledge of a Unix/Linux system. Next sessions Brussels Geneve Luxembourg Unix/Linux Open LDAP Directory Service > Network / Security > Network, overview OBJECTIVES At the end of this training, students will master the directory concepts as well as the LDAP protocol. This training will cover security features while deploying an enterprise directory service. Labs will be using the Unix/Linux OpenLDAP public domain implementation. 1) Introduction 2) LDAP Framework and setup 3) Name directory security strategy 1) Introduction - What is a name directory? - Distributed directory principle. - Directory Framework. - LDAP Standards : OSI, X OpenLDAP Directories. Workshop Installing LDAP on a Linux System. Configuration files and customization. 2) LDAP Framework and setup 4) Developing applications using LDAP 5) Conclusion - LDAP models. - Managing data and model. - Managing LDAP Scheme. - Naming and designing your LDAP service. - LDAP access. - Distribution model. Workshop Designing an LDAP directory. Extending the LDAP scheme. Using authentication. Making LDAP requests. Using fetch requests. Setting up SLURP. Using referrals to other name services. 3) Name directory security strategy - Authentication. - LDAP and secure LDAP. - Security protocols and communications. - Integrating security frameworks in LDAP (RSA, DES, etc.). Workshop Integrating SSL module in OpenLDAP. Securing data access. User authentication. 4) Developing applications using LDAP - LDAP Development interfaces. - Using directory features in scripts. - Web access : LDAP access URL. - Interface between LDAP and JAVA. Workshop Programming OpenLDAP Access. C APIs for LDAP. Windows client accessing an OpenLDAP server on a Unix system. 5) Conclusion - Other directory products on Unix/Linux : Netscape, Netware Directory Service, Sun/Oracle Solutions. - Tools to help building directories. Meta-directories. - Designing an Enterprise Directory solution. ORSYS, La Grande Arche, Paroi Nord, Paris La Défense cedex. Tél : +33 (0) Fax : +33(0) page 10

Network / Security, Network, overview

Network / Security, Network, overview Network / Security, Network, overview Orsys, with 30 years of experience, is providing high quality, independant State of the Art seminars and hands-on courses corresponding to the needs of IT professionals.

More information

Hands on VoIP. Content. Tel +44 (0) 845 057 0176 enquiries@protelsolutions.co.uk. Introduction

Hands on VoIP. Content. Tel +44 (0) 845 057 0176 enquiries@protelsolutions.co.uk. Introduction Introduction This 4-day course offers a practical introduction to 'hands on' VoIP engineering. Voice over IP promises to reduce your telephony costs and provides unique opportunities for integrating voice

More information

SSVVP SIP School VVoIP Professional Certification

SSVVP SIP School VVoIP Professional Certification SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that

More information

SSVP SIP School VoIP Professional Certification

SSVP SIP School VoIP Professional Certification SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover

More information

EDA 1200 4.3 Training Programs. Catalog of Course Descriptions

EDA 1200 4.3 Training Programs. Catalog of Course Descriptions EDA 1200 4.3 Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION...3 ACCESS NETWORKS, AN OVERVIEW...4 CORE NETWORKS, AN OVERVIEW...6 EDA 1200 4.3 INSTALLATION AND

More information

Networking 4 Voice and Video over IP (VVoIP)

Networking 4 Voice and Video over IP (VVoIP) Networking 4 Voice and Video over IP (VVoIP) Course Objectives This course will give delegates a good understanding of LANs, WANs and VVoIP (Voice and Video over IP). It is aimed at those who want to move

More information

IT4405 Computer Networks (Compulsory)

IT4405 Computer Networks (Compulsory) IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and

More information

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification

More information

Technology Training Limited Module Portfolio for Customised Courses

Technology Training Limited Module Portfolio for Customised Courses Technology Training Limited Module Portfolio for Customised Courses E-mail: info@technology-training.co.uk website: www.technology-training.co.uk Module Catalogue v1.3 Page 1 of 17 CONTENTS LIST 1 ACCESS

More information

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles. Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described

More information

CompTIA Convergence+ 2006 Examination Objectives

CompTIA Convergence+ 2006 Examination Objectives CompTIA Convergence+ 2006 Examination Objectives Introduction The CompTIA Convergence+ examination covering the 2006 objectives certifies that the successful candidate has the necessary knowledge to perform

More information

IS Management, Technologies, State of Art

IS Management, Technologies, State of Art IS Management, Technologies, State of Art Orsys, with 30 years of experience, is providing high quality, independant State of the Art seminars and hands-on courses corresponding to the needs of IT professionals.

More information

Convergence Technologies Professional (CTP) Course 1: Data Networking

Convergence Technologies Professional (CTP) Course 1: Data Networking Convergence Technologies Professional (CTP) Course 1: Data Networking The Data Networking course teaches you the fundamentals of networking. Through hands-on training, you will learn the vendor-independent

More information

10CS64: COMPUTER NETWORKS - II

10CS64: COMPUTER NETWORKS - II QUESTION BANK 10CS64: COMPUTER NETWORKS - II Part A Unit 1 & 2: Packet-Switching Networks 1 and Packet-Switching Networks 2 1. Mention different types of network services? Explain the same. 2. Difference

More information

Indepth Voice over IP and SIP Networking Course

Indepth Voice over IP and SIP Networking Course Introduction SIP is fast becoming the Voice over IP protocol of choice. During this 3-day course delegates will examine SIP technology and architecture and learn how a functioning VoIP service can be established.

More information

IT4504 - Data Communication and Networks (Optional)

IT4504 - Data Communication and Networks (Optional) - Data Communication and Networks (Optional) INTRODUCTION This is one of the optional courses designed for Semester 4 of the Bachelor of Information Technology Degree program. This course on Data Communication

More information

Introduction Chapter 1. Uses of Computer Networks

Introduction Chapter 1. Uses of Computer Networks Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks

More information

Advanced Internetworking

Advanced Internetworking Hands-On TCP-IP / IPv6 / VoIP Course Description In this Hands-On 3-day course, gives a deeper understanding of internetworking and routed network protocols. The focus of the course is the design, operation,

More information

Network System Design Lesson Objectives

Network System Design Lesson Objectives Network System Design Lesson Unit 1: INTRODUCTION TO NETWORK DESIGN Assignment Customer Needs and Goals Identify the purpose and parts of a good customer needs report. Gather information to identify network

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

Course 4: IP Telephony and VoIP

Course 4: IP Telephony and VoIP Course 4: IP Telephony and VoIP Telecommunications Technical Curriculum Program 3: Voice Knowledge 6/9/2009 1 Telecommunications Technical Curriculum Program 1: General Industry Knowledge Course 1: General

More information

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01 JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment

More information

Voice over IP Networks: Ensuring quality through proactive link management

Voice over IP Networks: Ensuring quality through proactive link management White Paper Voice over IP Networks: Ensuring quality through proactive link management Build Smarter Networks Table of Contents 1. Executive summary... 3 2. Overview of the problem... 3 3. Connectivity

More information

CompTIA Network+ (Exam N10-005)

CompTIA Network+ (Exam N10-005) CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate

More information

ENHWI-N3. 802.11n Wireless Router

ENHWI-N3. 802.11n Wireless Router ENHWI-N3 802.11n Wireless Router Product Description Encore s ENHWI-N3 802.11n Wireless Router s 1T1R Wireless single chip can deliver up to 3x faster speed than of 802.11g devices. ENHWI-N3 supports home

More information

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols 2011-11-22. ETSF10 Internet Protocols 2011

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols 2011-11-22. ETSF10 Internet Protocols 2011 Internet Security Voice over IP ETSF10 Internet Protocols 2011 Kaan Bür & Jens Andersson Department of Electrical and Information Technology Internet Security IPSec 32.1 SSL/TLS 32.2 Firewalls 32.4 + Voice

More information

Cisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT)

Cisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT) Cisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT) Course Number: 642 845 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: Cisco CCNP Exam 642 845:

More information

ICTTEN8195B Evaluate and apply network security

ICTTEN8195B Evaluate and apply network security ICTTEN8195B Evaluate and apply network security Release 1 ICTTEN8195B Evaluate and apply network security Modification History Release Release 2 Comments This version first released with ICT10 Integrated

More information

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1 Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3

More information

Study Guide CompTIA A+ Certification, Domain 2 Networking

Study Guide CompTIA A+ Certification, Domain 2 Networking Study Guide CompTIA A+ Certification, Domain 2 Networking Brought to you by RMRoberts.com Introduction to CSR Domain - 2 (220-801) The CompTIA A+ 220-801 Domain 2 Networking has expanded a lot since the

More information

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server

More information

Southern Methodist University. Department of Electrical Engineering. Telecommunications (EETS) Course Descriptions

Southern Methodist University. Department of Electrical Engineering. Telecommunications (EETS) Course Descriptions Southern Methodist University Department of Electrical Engineering Telecommunications (EETS) Course Descriptions 7301 Introduction to Telecommunications Overview of public and private telecommunications

More information

Chapter 4: Networking and the Internet

Chapter 4: Networking and the Internet Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Copyright 2012 Pearson Education, Inc. Chapter 4: Networking and the Internet 4.1 Network Fundamentals

More information

Cisco RV 120W Wireless-N VPN Firewall

Cisco RV 120W Wireless-N VPN Firewall Cisco RV 120W Wireless-N VPN Firewall Take Basic Connectivity to a New Level The Cisco RV 120W Wireless-N VPN Firewall combines highly secure connectivity to the Internet as well as from other locations

More information

Computer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill

Computer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill Computer Networks A Top-Down Approach Behrouz A. Forouzan and Firouz Mosharraf \Connect Mc \ Learn Graw I Succeed* Hill Preface xvii Trademarks xxiii Chapter 1 Introduction 1 1.1 OVERVIEW OF THE INTERNET

More information

This course has been retired. View the schedule of current <a href=http://www.ptr.co.uk/networkingcourses.htm>networking

This course has been retired. View the schedule of current <a href=http://www.ptr.co.uk/networkingcourses.htm>networking Introduction to Data Communications & Networking Course Description: This course has been retired. View the schedule of current networking Courses

More information

White Paper ON Dual Mode Phone (GSM & Wi-Fi)

White Paper ON Dual Mode Phone (GSM & Wi-Fi) White Paper ON Dual Mode Phone (GSM & Wi-Fi) Author: N Group 1.0 Abstract Dual Mode Handset is in demand for converged Network, Access, Billing, and Operation environment. Dual mode handsets provide cost

More information

Troubleshooting Voice Over IP with WireShark

Troubleshooting Voice Over IP with WireShark Hands-On Course Description Voice over IP is being widely implemented both within companies and across the Internet. The key problems with IP voice services are maintaining the quality of the voice service

More information

Level: 3 Credit value: 9 GLH: 80. QCF unit reference R/507/8351. This unit has 6 learning outcomes.

Level: 3 Credit value: 9 GLH: 80. QCF unit reference R/507/8351. This unit has 6 learning outcomes. This unit has 6 learning outcomes. 1. Know telephony principles. 1.1. Demonstrate application of traffic engineering concepts Prioritization of voice traffic Trunking requirements Traffic shaping. 1.2.

More information

ICTTEN5168A Design and implement an enterprise voice over internet protocol and a unified communications network

ICTTEN5168A Design and implement an enterprise voice over internet protocol and a unified communications network ICTTEN5168A Design and implement an enterprise voice over internet protocol and a unified communications network Release: 1 ICTTEN5168A Design and implement an enterprise voice over internet protocol and

More information

ZyXEL offer more than just a product, we offer a solution. The Prestige DSL router family benefits providers and resellers enabling them to offer:

ZyXEL offer more than just a product, we offer a solution. The Prestige DSL router family benefits providers and resellers enabling them to offer: DSL Access Guide DSL Access Routers ZyXEL is a leading manufacturer and supplier of DSL and Voice over IP routers. ZyXEL offer a complete portfolio of routers suited for Telecoms providers, Internet Service

More information

Networking: EC Council Network Security Administrator NSA

Networking: EC Council Network Security Administrator NSA coursemonster.com/uk Networking: EC Council Network Security Administrator NSA View training dates» Overview The EC-Council's NSA certification looks at network security from a defensive view. The NSA

More information

Local Area Networks (LANs) Blueprint (May 2012 Release)

Local Area Networks (LANs) Blueprint (May 2012 Release) Local Area Networks (LANs) The CCNT Local Area Networks (LANs) Course April 2012 release blueprint lists the following information. Courseware Availability Date identifies the availability date for the

More information

Company Course Description: Course Objectives: Intended Audience

Company Course Description: Course Objectives: Intended Audience VoIP Basics Training Courses: Teracom Training Institute- VoIP Training Course 301: Understanding Voice over IP VoIP Training Course301: Teracom -How voice packetization works -To give a thorough overall

More information

Mobility and cellular networks

Mobility and cellular networks Mobility and cellular s Wireless WANs Cellular radio and PCS s Wireless data s Satellite links and s Mobility, etc.- 2 Cellular s First generation: initially debuted in Japan in 1979, analog transmission

More information

Voice over IP Basics for IT Technicians

Voice over IP Basics for IT Technicians Voice over IP Basics for IT Technicians White Paper Executive summary The IP phone is coming or has arrived on desk near you. The IP phone is not a PC, but does have a number of hardware and software elements

More information

OCR LEVEL 3 CAMBRIDGE TECHNICAL

OCR LEVEL 3 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT COMPUTER NETWORKS R/601/7320 LEVEL 3 UNIT 7 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 COMPUTER NETWORKS R/601/7320 LEVEL

More information

ICTTEN4215A Install and configure internet protocol TV in a service provider network

ICTTEN4215A Install and configure internet protocol TV in a service provider network ICTTEN4215A Install and configure internet protocol TV in a service provider network Release: 1 ICTTEN4215A Install and configure internet protocol TV in a service provider network Modification History

More information

VRGIII-31412-N Series Triple Play Gateway

VRGIII-31412-N Series Triple Play Gateway Series Gateway 4 Ports 10/100/1000Mbps RJ-45, 2 Ports VoIP FXS, and 1 Port 10/100/1000Mbps RJ-45 or 100/1000Mbps Fiber Optics Uplink VoIP Residential Gateway with IEEE802.11n WiFi and Optional CATV RF

More information

Review: Lecture 1 - Internet History

Review: Lecture 1 - Internet History Review: Lecture 1 - Internet History late 60's ARPANET, NCP 1977 first internet 1980's The Internet collection of networks communicating using the TCP/IP protocols 1 Review: Lecture 1 - Administration

More information

Cisco RV215W Wireless-N VPN Router

Cisco RV215W Wireless-N VPN Router Data Sheet Cisco RV215W Wireless-N VPN Router Simple, Secure Connectivity for the Small Office and Home Office Figure 1. Cisco RV215W Wireless-N VPN Router The Cisco RV215W Wireless-N VPN Router provides

More information

November 2013. Defining the Value of MPLS VPNs

November 2013. Defining the Value of MPLS VPNs November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do

More information

Security Design. thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/

Security Design. thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/ Security Design thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/ Content Security Design Analysing Design Requirements Resource Separation a Security Zones VLANs Tuning Load Balancing

More information

Lucent VPN Firewall Security in 802.11x Wireless Networks

Lucent VPN Firewall Security in 802.11x Wireless Networks Lucent VPN Firewall Security in 802.11x Wireless Networks Corporate Wireless Deployment is Increasing, But Security is a Major Concern The Lucent Security Products can Secure Your Networks This white paper

More information

Objectives. Remote Connection Options. Teleworking. Connecting Teleworkers to the Corporate WAN. Providing Teleworker Services

Objectives. Remote Connection Options. Teleworking. Connecting Teleworkers to the Corporate WAN. Providing Teleworker Services ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Providing Teleworker Services Describe the enterprise requirements for providing teleworker services Explain how

More information

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method. A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money

More information

How To Understand And Understand Network Theory

How To Understand And Understand Network Theory University of Southern California Course Title: EE450: Computer Networks Semester: Fall Semester 2014 Instructor: Professor A. Zahid, azahid@usc.edu Office: PHE 418, 213-740-9058 Office Hours: TTH 9:00

More information

How To Set Up A Cisco Rv110W Wireless N Vpn Network Device With A Wireless Network (Wired) And A Wireless Nvv (Wireless) Network (Wireline) For A Small Business (Small Business) Or Remote Worker

How To Set Up A Cisco Rv110W Wireless N Vpn Network Device With A Wireless Network (Wired) And A Wireless Nvv (Wireless) Network (Wireline) For A Small Business (Small Business) Or Remote Worker Cisco RV110W Wireless-N VPN Firewall Simple, Secure Connectivity for the Small Office/Home Office Figure 1 Cisco RV110W Wireless-N VPN Firewall The Cisco RV110W Wireless-N VPN Firewall provides simple,

More information

Photonix Communications pty. Ltd. Australia. Catalogue

Photonix Communications pty. Ltd. Australia. Catalogue s pty. Ltd. Catalogue 2016 Pty Ltd. Course Content Course Duration (Days) Page No. 01 Understanding IP (Basics) 2 3 02 Understanding IP 3 4 (Advanced) 03 Understanding WLAN (Wi-Fi) 2 5 04 Understanding

More information

Cisco RV110W Wireless-N VPN Firewall

Cisco RV110W Wireless-N VPN Firewall Data Sheet Cisco RV110W Wireless-N VPN Firewall Simple, Secure Connectivity for the Small Office/Home Office Figure 1. Cisco RV110W Wireless-N VPN Firewall The Cisco RV110W Wireless-N VPN Firewall provides

More information

Voice over IP (VoIP) Basics for IT Technicians

Voice over IP (VoIP) Basics for IT Technicians Voice over IP (VoIP) Basics for IT Technicians VoIP brings a new environment to the network technician that requires expanded knowledge and tools to deploy and troubleshoot IP phones. This paper provides

More information

Unified Services Routers

Unified Services Routers High-Performance VPN Protocols IPSec PPTP L2TP SSL VPN Tunnels Up to 25 (DSR-250N) Up to 35 (DSR-500/500N) Up to 70 (DSR-1000/1000N) SSL VPN tunnels Up to 5 (DSR-250N) Up to 10 (DSR-500/500N) Up to 20

More information

Cisco Virtual Office Express

Cisco Virtual Office Express . Q&A Cisco Virtual Office Express Overview Q. What is Cisco Virtual Office Express? A. Cisco Virtual Office Express is a solution that provides secure, rich network services to workers at locations outside

More information

ECB1220R. Wireless SOHO Router/Client Bridge

ECB1220R. Wireless SOHO Router/Client Bridge Wireless SOHO Router/Client Bridge 2.4GH 802.11 b/g 54Mbps PRODUCT DESCRIPTION ECB-1220R is a 2.4GHz 802.11b/g broadband Wi-Fi Router with advanced AP/Client Bridge/Repeater functions. So you could implement

More information

Cisco WRVS4400N Wireless-N Gigabit Security Router: Cisco Small Business Routers

Cisco WRVS4400N Wireless-N Gigabit Security Router: Cisco Small Business Routers Cisco WRVS4400N Wireless-N Gigabit Security Router: Cisco Small Business Routers Highlights Secure, high-speed wireless network access for small business Gigabit Ethernet connections enable rapid transfer

More information

Evolving Telecommunications to Triple Play:

Evolving Telecommunications to Triple Play: Hands-On IPTV, VoIP, 3D TV and Delivery Systems for System Engineers Course Description With the introduction of Next Generation Networks to telecommunications carrier infrastructures, customers expect

More information

Broadband Network Architecture

Broadband Network Architecture Broadband Network Architecture Jan Martijn Metselaar May 24, 2012 Winitu Consulting Klipperaak 2d 2411 ND Bodegraven The Netherlands slide Broadband Services! Dual play, Triple play, Multi play! But what

More information

VIDEOCONFERENCING. Video class

VIDEOCONFERENCING. Video class VIDEOCONFERENCING Video class Introduction What is videoconferencing? Real time voice and video communications among multiple participants The past Channelized, Expensive H.320 suite and earlier schemes

More information

Telecommunications, Networks, and Wireless Computing

Telecommunications, Networks, and Wireless Computing Objectives Telecommunications, Networks, and Wireless Computing 1. What are the features of a contemporary corporate telecommunications system? On what major technology developments are they based? 2.

More information

Certified Telecommunications & Network Professional (CTNP) Syllabus. Version 1.0

Certified Telecommunications & Network Professional (CTNP) Syllabus. Version 1.0 (CTNP) Syllabus Copyright This is intellectual property of ACTA S.A. and it is protected by Greek and European legislation concerning copyright. The creation of a copy of part, or of the whole, without

More information

Networking Technology Online Course Outline

Networking Technology Online Course Outline Networking Technology Online Course Outline Introduction Networking Technology Introduction Welcome to InfoComm University About InfoComm International About Networking Technology Network Technology Course

More information

300Mbps Wireless N VoIP VDSL/ADSL Modem Router

300Mbps Wireless N VoIP VDSL/ADSL Modem Router 300Mbps Wireless N VoIP VDSL/ADSL Modem Router TD-VG5612 Highlights Fast Broadband Speeds Up to 100Mbps broadband speeds, ideal for smooth streaming media and online gaming Cost-Effective VoIP Supports

More information

How To Use A Cisco Wvvvdns4400N Wireless-N Gigabit Security Router For Small Businesses

How To Use A Cisco Wvvvdns4400N Wireless-N Gigabit Security Router For Small Businesses Cisco WRVS4400N Wireless-N Gigabit Security Router Cisco Small Business Routers Highlights Secure, high-speed wireless network access for small business Gigabit Ethernet connections enable rapid transfer

More information

Cisco RV110W Wireless-N VPN Firewall

Cisco RV110W Wireless-N VPN Firewall Data Sheet Cisco RV110W Wireless-N VPN Firewall Simple, Secure Connectivity for the Small Office/Home Office Figure 1. Cisco RV110W Wireless-N VPN Firewall The Cisco RV110W Wireless-N VPN Firewall provides

More information

Network and Telecommunications Courses

Network and Telecommunications Courses Network and Telecommunications Courses Detailed syllabi available at http://www.cdm.depaul.edu/ IT 263 - Applied Networks and Security This course introduces the networking and security technologies required

More information

Contents. Specialty Answering Service. All rights reserved.

Contents. Specialty Answering Service. All rights reserved. Contents 1 Introduction... 2 2 PBX... 3 3 IP PBX... 4 3.1 How It Works... 4 3.2 Functions of IP PBX... 5 3.3 Benefits of IP PBX... 5 4 Evolution of IP PBX... 6 4.1 Fuelling Factors... 6 4.1.1 Demands from

More information

IP Implementation in Private Branch Exchanges From 9:30 a.m until 4:30 p.m (7 hrs./day) 5 days / week

IP Implementation in Private Branch Exchanges From 9:30 a.m until 4:30 p.m (7 hrs./day) 5 days / week Course Title: No. of Hours: IP Implementation in Private Branch Exchanges From 9:30 a.m until 4:30 p.m (7 hrs./day) 5 days / week 1 Course Duration: 3 Months (12weeks) No. Of Hours: 7 Hrs./Day- 5 days/week.

More information

Enterprise VoIP Services over Mobile Ad-Hoc Technologies

Enterprise VoIP Services over Mobile Ad-Hoc Technologies Enterprise VoIP Services over Mobile Ad-Hoc Technologies 1 System Architecture Figure 1 illustrates the system architecture. We can divide it into 2 parts. One is the Mobile VoIP Box (MVB) node and the

More information

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0 COURSE OVERVIEW Implementing Secure Converged Wide Area Networks (ISCW) v1.0 is an advanced instructor-led course that introduces techniques and features that enable or enhance WAN and remote access solutions.

More information

Alcatel-Lucent Technology Training

Alcatel-Lucent Technology Training Global Training offer Enterprise Educational Services November the 20th, 2009 1 Alcatel-Lucent Technology Training Global Training Offer November the 20th, 2009 All Rights Reserved Alcatel-Lucent 2009

More information

Appendix A: Basic network architecture

Appendix A: Basic network architecture Appendix A: Basic network architecture TELECOMMUNICATIONS LOCAL ACCESS NETWORKS Traditionally, telecommunications networks are classified as either fixed or mobile, based on the degree of mobility afforded

More information

The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center

The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center The entire cost of the program is funded by the textbook, ebook or ecourse purchase by your

More information

Date: December 19, 2007 [R7] [ The VoIP Technology Expert ] WellGate 3512 Wi Fi VoIP Gateway Broadband Router 2 port FXS + 1 PSTN VoIP Gateway Wi Fi 802.11 b/g Access Point Mode Wi Fi 802.11 b/g Client

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

Cisco RV220W Network Security Firewall

Cisco RV220W Network Security Firewall Cisco RV220W Network Security Firewall High-Performance, Highly Secure Connectivity for the Small Office The Cisco RV220W Network Security Firewall lets small offices enjoy secure, reliable, wired and

More information

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer

More information

Link Layer and Network Layer Security for Wireless Networks

Link Layer and Network Layer Security for Wireless Networks Link Layer and Network Layer Security for Wireless Networks Interlink Networks, Inc. May 15, 2003 1 LINK LAYER AND NETWORK LAYER SECURITY FOR WIRELESS NETWORKS... 3 Abstract... 3 1. INTRODUCTION... 3 2.

More information

EXPLOITING SIMILARITIES BETWEEN SIP AND RAS: THE ROLE OF THE RAS PROVIDER IN INTERNET TELEPHONY. Nick Marly, Dominique Chantrain, Jurgen Hofkens

EXPLOITING SIMILARITIES BETWEEN SIP AND RAS: THE ROLE OF THE RAS PROVIDER IN INTERNET TELEPHONY. Nick Marly, Dominique Chantrain, Jurgen Hofkens Nick Marly, Dominique Chantrain, Jurgen Hofkens Alcatel Francis Wellesplein 1 B-2018 Antwerp Belgium Key Theme T3 Tel : (+32) 3 240 7767 Fax : (+32) 3 240 8485 E-mail : Nick.Marly@alcatel.be Tel : (+32)

More information

CSCI 362 Computer and Network Security

CSCI 362 Computer and Network Security The Purpose of ing CSCI 362 Computer and Security Introduction to ing Goals: Remote exchange and remote process control. A few desirable properties: Interoperability, Flexibility, Geographical range, Scalability,

More information

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria

More information

Chapter 1: Introduction

Chapter 1: Introduction Course Summary What have we learned: a huge amount! principles practice.. using Internet to motivate examples 1 Chapter 1: Introduction Our goal: get feel and terminology more depth, detail later in course

More information

COMPUTER NETWORK TECHNOLOGY (300)

COMPUTER NETWORK TECHNOLOGY (300) Page 1 of 10 Contestant Number: Time: Rank: COMPUTER NETWORK TECHNOLOGY (300) REGIONAL 2014 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant

More information

Discovering Computers 2008. Chapter 9 Communications and Networks

Discovering Computers 2008. Chapter 9 Communications and Networks Discovering Computers 2008 Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the the components required for for successful communications Identify various sending and receiving devices

More information

Chapter 1: Introduction

Chapter 1: Introduction Course Summary What have we learned: a huge amount! principles practice.. using Internet to motivate examples 1 Chapter 1: Introduction Our goal: get feel and terminology more depth, detail later in course

More information

;. ' ;. - ' Computer Networking. ^4 Top-Down Approach. James F. Kurose. Keith W. Ross. Polytechnic University, Brooklyn PEARSON.

;. ' ;. - ' Computer Networking. ^4 Top-Down Approach. James F. Kurose. Keith W. Ross. Polytechnic University, Brooklyn PEARSON. ;. ' ;. - ' Computer Networking ^4 Top-Down Approach James F. Kurose University of Massachusetts, Amherst Keith W. Ross Polytechnic University, Brooklyn PEARSON Addison Weslev Boston San Francisco N e

More information

Unified Services Routers

Unified Services Routers High VPN Performance Protocols IPSec PPTP LTP SSL Up to 5 (DSR-500/500N) or 70 (DSR-1000/1000N) VPN tunnels Up to 10 (DSR-500/500N) or 0 (DSR-1000/1000N) SSL VPN tunnels DES, DES, AES Encryption Main/

More information

Foreword... 2 Introduction to VoIP... 3 SIP:... 3 H.323:... 4 SER:... 4 Cellular network... 4 GSM... 5 GPRS... 6 3G... 6 Wimax... 7 Introduction...

Foreword... 2 Introduction to VoIP... 3 SIP:... 3 H.323:... 4 SER:... 4 Cellular network... 4 GSM... 5 GPRS... 6 3G... 6 Wimax... 7 Introduction... Foreword... 2 Introduction to VoIP... 3 SIP:... 3 H.323:... 4 SER:... 4 Cellular network... 4 GSM... 5 GPRS... 6 3G... 6 Wimax... 7 Introduction... 7 Fixed-WiMAX based on the IEEE 802.16-2004... 8 Mobile

More information

Small, Medium and Large Businesses

Small, Medium and Large Businesses Providing Productivity and Security for Small, Medium and Large Businesses Series Series Super Fast broadband technology High Availability with Multi-WAN Load Balancing Enterprise-level Firewall security

More information

TECHNICAL CHALLENGES OF VoIP BYPASS

TECHNICAL CHALLENGES OF VoIP BYPASS TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish

More information