Technology Training Limited Module Portfolio for Customised Courses

Size: px
Start display at page:

Download "Technology Training Limited Module Portfolio for Customised Courses"

Transcription

1 Technology Training Limited Module Portfolio for Customised Courses website: Module Catalogue v1.3 Page 1 of 17

2 CONTENTS LIST 1 ACCESS TECHNOLOGIES DIGITAL SUBSCRIBER LINES (XDSL) WIRELESS LOCAL LOOP (WLL) GIGABIT ETHERNET ACCESS SERVICES VERY SMALL APERTURE TERMINAL (VSAT) MULTISERVICE ACCESS NETWORKS (MSAN) AND METRO NODES ROUTING AND SWITCHING INTRODUCTION TO NETWORKING INTRODUCTION TO ROUTING AND SWITCHING ADVANCED ROUTING IP VERSION 6 (IPV6) INTRODUCTION TO MULTIPROTOCOL LABEL SWITCHING ( MPLS) MPLS TRAFFIC ENGINEERING (MPLS TE) ETHERNET AND GIGABIT ETHERNET CARRIER ETHERNET GENERALISED MPLS AND T-MPLS INTRODUCTION TO VIRTUAL LOCAL AREA NETWORKS (VLANS) LAN EXTENSION SERVICES: ETHERNET OVER MPLS, VPLS, AND VPWS CORE NETWORK ROUTING PROTOCOLS INTERNET ARCHITECTURE AND PEERING ADVANCED BORDER GATEWAY PROTOCOL VERSION 4 (BGP-4) ADVANCED OPEN SHORTEST PATH FIRST (OSPF) AND IS-IS NETWORK SERVICES DOMAIN NAME SYSTEM (DNS) AND DHCP NETWORK AND PORT ADDRESS TRANSLATION (NAT/PAT) IP MOBILITY (MIP) IP QUALITY OF SERVICE (QOS) AND DIFFERENTIATED SERVICES (DIFFSERV) SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP) AND RMON LIGHTWEIGHT DIRECTORY ACCESS PROTOCOL (LDAP) VOICE OVER IP (VOIP) NETWORKS AND SERVICES INTRODUCTION TO VOIP ARCHITECTURES THE H.248 AND MEGACO PROTOCOLS THE SESSION INITIATION PROTOCOL (SIP) SIP FOR CORE NETWORKS (SIP-T/SIP-I) AND BICC SIGNALLING TRANSPORT (SIGTRAN) IPCENTREX APPLICATIONS...11 Page 2 of 17

3 4.7 IP MULTIMEDIA SUBSYSTEM (IMS) IP SECURITY INTRODUCTION TO NETWORK AND SYSTEM SECURITY PRACTICAL VULNERABILITY ASSESSMENT FIREWALL DESIGN AND DEPLOYMENT INTRUSION DETECTION AND PREVENTION SYSTEMS (IDS) MALICIOUS CONTENT SCANNING IP SECURITY PROTOCOL (IPSEC) AND INTERNET KEY EXCHANGE (IKE) PUBLIC KEY INFRASTRUCTURE (PKIX) SECURE SHELL (SSH) WEB SECURITY USING SSL/TLS UNIX AND LINUX SECURITY IP APPLICATIONS INTERNET INTRODUCTION TO LINUX AND UNIX SYSTEM ADMINISTRATION LINUX AND UNIX-BASED NETWORK APPLICATIONS INSTANT MESSAGING (IM) INTRODUCTION TO VIRTUAL PRIVATE NETWORKS IP SECURITY PROTOCOL (IPSEC) AND SECURE VPNS MPLS VIRTUAL PRIVATE NETWORKS (VPNS) IP TELEVISION (IPTV) AND TRIPLE PLAY SERVICES...16 Page 2 of 17

4 1 Access Technologies 1.1 Digital Subscriber Lines (xdsl) xdsl architecture and technology xdsl as a Multiservice access network for IP, data and voice Unbundling approaches and network integration SHDSL and other DSL technologies 1.2 Wireless Local Loop (WLL) Introduction to Wireless Local Loop Competing technologies for WLL Integrated voice and data over WLL Future Directions in WLL 1.3 Gigabit Ethernet Access Services Gigabit Ethernet Architecture and Protocols Metro networks using Gigabit Ethernet LAN Extension Services (LES)/EPLAN Pseudo-wire Emulation Services over Ethernet/EPL 1.4 Very Small Aperture terminal (VSAT) VSAT architecture and technology Design of VSAT Space Segment and Link Budgets Earth Segment design and optimisation Compression technology and DCME 1.5 Multiservice Access Networks (MSAN) and Metro Nodes Section 6 Traditional voice and data access networks MSAN and Metro Nodes Architectures Physical Layer Access to MSAN Layer 2 Switching, grooming and aggregation Service and Network Interworking in Metro Nodes Legacy Support and Network Migration Page 3 of 17

5 2 Routing and Switching 2.1 Introduction to Networking The Role of Networks Network Architectures in LANs and WANs Ethernet and WLAN Protocols and Operation The IP Protocol and Its Operation TCP and UDP Transport Protocols Integrating Networks and Network Security 2.2 Introduction to Routing and Switching Section 6 Introduction to Network Design using Switches and Routers Ethernet Switching using STP and its Variants VLAN technology in Large Switched Networks Enterprise Routing using RIP, EIGRP, VLSM and CIDR Routing using OSPF and BGP4 Routing Across Boundaries and Redistribution 2.3 Advanced Routing Section 6 IP Core Technology Review Routing using OSPF and BGP4 Routing Across Boundaries and Redistribution BGP-4 Policy Configuration and Peering Packet-filtering using Access Lists Network and Port Address Translation 2.4 IP Version 6 (IPv6) IPv6 addressing and Address Migration IPv6 and IPv4 Comparison Network Infrastructure and Application Protocols Inter-working IPv4 and IPv6 Planning the Deployment of IPv6 Page 4 of 17

6 2.5 Introduction to Multiprotocol Label Switching (MPLS) Native IP and IP over ATM MPLS Core Technology MPLS Virtual Private Network Services MPLS LAN Extension Services MPLS Traffic Engineering 2.6 MPLS Traffic Engineering (MPLS TE) MPLS Core Technology Review Traffic Engineering Using MPLS-TE MPLS Deployment in Next Generation Networks Future Directions in MPLS-TE and Generalised MPLS 2.7 Ethernet and Gigabit Ethernet Bridges, Hubs, Switches and Routers Switched 10/100 Ethernet technology Ethernet LANs, VLANs and QoS Tagging Gigabit and 10G Ethernet Extensions 2.8 Carrier Ethernet Gigabit Ethernet Core Technology Review Manageability, Scalability and OAM Additions for Carrier Ethernet Ethernet in Service Provider Access Networks Ethernet n Service Provider Core Networks Ethernet Interworking with MPLS 2.9 Generalised MPLS and T-MPLS MPLS Core Technology Review GMPLS and T-MPLS Control and Management MPLS and T-MPLS Interworking Future Directions in GMPLS and T-MPLS Page 5 of 17

7 2.10 Introduction to Virtual Local Area Networks (VLANs) VLANs versus LANs, VPNs 802.1p and 802.1q frame tagging and QoS techniques Integrating Switching, Routing and VLANs Public service VLANs including VPLS and VPWS 2.11 LAN Extension Services: Ethernet over MPLS, VPLS, and VPWS MPLS Core Technology Review Virtual Private LAN and Virtual Private Wire services Ethernet-based VLANs for Service Access RSTP and VRRP for scale and availability in VLAN Services 2.12 Core Network Routing Protocols The Requirements on and Role of Core Network Routing Protocols OSPF Architecture and Operation BGP-4 Architecture and Operation Integrating Multiple Routing Protocols and Instances Integrating Customers Routing into Service Provider Networks 2.13 Internet Architecture and Peering The Internet Architecture: Autonomous Systems and Peeing Internet Exchange Point (IXP) Services VoIP and AAA Peering Providers 2.14 Advanced Border Gateway Protocol version 4 (BGP-4) Architecture and Operation of BGP4 Designing Scaleable BGP4 Networks Using BGP4 Policy Controls Implementing BGP4 and Other Security Features Page 6 of 17

8 2.15 Advanced Open Shortest Path First (OSPF) and IS-IS Architecture and Operation of OSPF Designing Scaleable OSPF Networks The Use of Stubby, Totally Stubby, and Not So Stubby Areas OSPF in NBMA networks OSPF Extensions for IPv6 and MPLS Page 7 of 17

9 3 Network Services 3.1 Domain Name System (DNS) and DHCP Architecture and Operation of the Internet Domain Name System DNS Implementations for public/private networks DNS Vulnerabilities and Security DNS Operational Aspects 3.2 Network and Port Address Translation (NAT/PAT) Operation NAT/NAPT NAT Traversal Issues for Applications Remedies Based Upon ALGs, Tunnelling and Keepalives NAT Traversal using STUN, TURN and MIDCOM 3.3 IP Mobility (MIP) The Role of IP Mobility versus Dynamic Addressing Mobile IPv4 architecture and standards Mobile IP in 3GPP networks and IPv6 3.4 IP Quality of Service (QoS) and Differentiated Services (Diffserv) QoS Issues in Pure IP Networks The Integrated Services and RSVP Architecture The Differentiated Services Architecture Diffserv Integration into ATM, MPLS and L2TP networks 3.5 Simple Network Management Protocol (SNMP) and RMON SNMP Architecture and Operation MIB2 and Private Extensions to the Deployed MIBs RMON 2 Architecture and Operation Integration of SNMP and RMON into Network Management Systems Page 8 of 17

10 3.6 Lightweight Directory Access Protocol (LDAP) The Role of X.500 Directories and Access Protocols LDAP version 2 and 3 Architecture and Operation Enterprise directories based on LDAP Page 9 of 17

11 4 Voice over IP (VoIP) Networks and Services 4.1 Introduction to VoIP Architectures Section 6 Section 7 The Development of VoIP Networks Voice over IP (VoIP) Architectures Voice Quality Issues and QoS Engineering Techniques The H.248 Architecture for Fixed/Mobile Networks Session Initiation Protocol (SIP) Architecture and Operation VoIP Customer Premises Equipment Future Directions in VoIP Networks 4.2 The H.248 and MEGACO Protocols H.248 Architecture and Operation Packages and Gateway Functionality FAX, CODEC and DTMF support The Role of H.248/MEGACO in TIPSPAN and 3GPP Architectures 4.3 The Session Initiation Protocol (SIP) SIP Architecture and Operation SIP to PSTN Inter-working SIP Security Extensions Real-world SIP Platforms 4.4 SIP for Core Networks (SIP-T/SIP-I) and BICC SIP Core Technology Review PSTN Signalling Core Technology Review BICC Architecture and Operation SIP-T and SIP-I Architecture and Operation The Evolution Towards Native VoIP Interconnect 4.5 Signalling Transport (SIGTRAN) PSTN Signalling Core Technology Review Architecture and Operation of SIGTRAN SCTP Protocol Page 10 of 17

12 MTP Adaptation Layers Application Adaptation Layers 4.6 IPCentrex Applications SIP Core Technology Review IPCentrex versus POTS and Centrex Services Master/Slave Architectures to support IPCentrex Services CPE Requirements for IPCentrex QoS Techniques for IPCentrex services 4.7 IP Multimedia Subsystem (IMS) SIP Core Technology Review IP Multimedia System Architecture and Operation SIP Procedures in IMS IMS Applications Page 11 of 17

13 5 IP Security 5.1 Introduction to Network and System Security Section 6 Threats and Vulnerabilities The Role and Structure of Security Policies Authentication Systems Privilege Management Systems for Authorisation Network Security Devices: Firewalls and IDS Introduction to Security Protocols: IPSec, SSH and TLS 5.2 Practical Vulnerability Assessment Systems Security Core Technology Review Hacking Techniques and Tools Assessment Techniques and Tools Honey Traps and Active Measures Life-cycle Vulnerability Management 5.3 Firewall Design and Deployment Section 6 Security Core Technology Review The Role of Internet and Enterprise Firewalls Platform hardening and testing using third-party tools Implementation and Configuration of Enterprise Solutions Understanding and Acting on Firewall Logs Integration of VPNs with Firewalls 5.4 Intrusion Detection and Prevention Systems (IDS) The Role of Intrusion Detection Systems IDS and IPS Types and Capabilities Design and Deployment of Host and Network-based Sensors Tailoring and Testing IDS Operation Page 12 of 17

14 5.5 Malicious Content Scanning The Role of Virus Scanning Systems Virus Scanning System Types and Capabilities Design and Deployment of Host, Gateway and Server Solutions Integration of Scanning into and Web Proxy Systems 5.6 IP Security Protocol (IPSec) and Internet Key Exchange (IKE) Security Protocols Core Technology Review IPSec Architecture and Operation IKE and IPSec Policies and Security Associations Encryption and Authentication Algorithms Available in IPSec IPSec Applications and Design Approaches IPSec Limitations: NAT and Routing 5.7 Public Key Infrastructure (PKIX) Section 6 Security Protocols Core Technology Review Digital Signatures and Certificates Certificate Authorities PKIX Profiles and Extensions Implementation of Certificate Directories Life-cycle Management of Certificates: CRLs and OCSP 5.8 Secure Shell (SSH) Security Protocols Core Technology Review The basic operation of SSH SSH as a secure telnet replacement SSH port forwarding and X-forwarding SSH Implementation and Configuration 5.9 Web Security Using SSL/TLS Security Protocols Core Technology Review The use of SSL and TLS in secure HTTP applications Encryption, Authentication available in SSL/TLS Server Certificates and Key Management SSL-based VPNs Page 13 of 17

15 5.10 UNIX and Linux Security Section 6 Security Core Technology Review System Vulnerability Assessment User Accounts and Security Hardening System Services and the Core Security Protocols for Internet Services Use of Host IDS and Audit/Logging Page 14 of 17

16 6 IP Applications 6.1 Internet Introduction to SNMP Hardening of MTA implementations Integration into corporate services SNMP enhancements and SMTP/MMS Interworking 6.2 Introduction to Linux and UNIX System Administration Installing and Managing a UNIX/Linux System Networking Linux/UNIX Systems Installing and Managing Applications System Security and Hardening the Operating System UNIX and Linux Shells and Shell Programming 6.3 Linux and UNIX-based Network Applications Linux/UNIX Core Technology Review Internet Applications: Apache, Sendmail, Samba Network Security Tools: IPTables, NMAP, NESSUS and SNORT 6.4 Instant Messaging (IM) Introduction to Instant Messaging IM Protocols and Public Services IM security and Interoperability Enterprise IM and IM Integration Using GAIM Voice and Video over IM Services 6.5 Introduction to Virtual Private Networks Layer 2 versus Layer 3 VPNs: Frame Relay Services Simple Tunnelling VPNs: GRE and PPTP VPNs based upon MPLS: Cisco MPLS VPNs VPNs Based upon IPSec: Microsoft IPSec VPNs Based upon Hybrid Solutions: OpenVPN Page 15 of 17

17 6.6 IP Security Protocol (IPSec) and Secure VPNs Security Protocols Core Technology Review IPSec and IKE Architecture and Operation Policies, Databases and Security Associations IPSec Applications and Design Approaches IPSec Limitations: NAT and Routing 6.7 MPLS Virtual Private Networks (VPNs) Overview of IP addressing and routing MPLS Technology and Packet Forwarding MPLS Layer 3 VPNs 6.8 IP Television (IPTV) and Triple Play Services Introduction to Live TV, Video on Demand and Triple Play Services Architecture and Components of IPTV Technical Building Blocks and Protocols of IPTV Case Studies: Fastweb, Microsoft and Cisco Page 16 of 17

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles. Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described

More information

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0 COURSE OVERVIEW Implementing Secure Converged Wide Area Networks (ISCW) v1.0 is an advanced instructor-led course that introduces techniques and features that enable or enhance WAN and remote access solutions.

More information

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification

More information

Designing and Developing Scalable IP Networks

Designing and Developing Scalable IP Networks Designing and Developing Scalable IP Networks Guy Davies Telindus, UK John Wiley & Sons, Ltd Contents List of Figures List of Tables About the Author Acknowledgements Abbreviations Introduction xi xiii

More information

Networking Technology Online Course Outline

Networking Technology Online Course Outline Networking Technology Online Course Outline Introduction Networking Technology Introduction Welcome to InfoComm University About InfoComm International About Networking Technology Network Technology Course

More information

EDA 1200 4.3 Training Programs. Catalog of Course Descriptions

EDA 1200 4.3 Training Programs. Catalog of Course Descriptions EDA 1200 4.3 Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION...3 ACCESS NETWORKS, AN OVERVIEW...4 CORE NETWORKS, AN OVERVIEW...6 EDA 1200 4.3 INSTALLATION AND

More information

SSVVP SIP School VVoIP Professional Certification

SSVVP SIP School VVoIP Professional Certification SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that

More information

Advanced Internetworking

Advanced Internetworking Hands-On TCP-IP / IPv6 / VoIP Course Description In this Hands-On 3-day course, gives a deeper understanding of internetworking and routed network protocols. The focus of the course is the design, operation,

More information

COURSE AGENDA. Lessons - CCNA. CCNA & CCNP - Online Course Agenda. Lesson 1: Internetworking. Lesson 2: Fundamentals of Networking

COURSE AGENDA. Lessons - CCNA. CCNA & CCNP - Online Course Agenda. Lesson 1: Internetworking. Lesson 2: Fundamentals of Networking COURSE AGENDA CCNA & CCNP - Online Course Agenda Lessons - CCNA Lesson 1: Internetworking Internetworking models OSI Model Discuss the OSI Reference Model and its layers Purpose and function of different

More information

SSVP SIP School VoIP Professional Certification

SSVP SIP School VoIP Professional Certification SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover

More information

Network Access Security. Lesson 10

Network Access Security. Lesson 10 Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.

More information

Cisco Which VPN Solution is Right for You?

Cisco Which VPN Solution is Right for You? Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2

More information

Managed 4G LTE WAN: Provide Cost-Effective Wireless Broadband Service

Managed 4G LTE WAN: Provide Cost-Effective Wireless Broadband Service Solution Overview Managed 4G LTE WAN: Provide Cost-Effective Wireless Broadband Service What You Will Learn With the arrival of the fourth-generation (4G) or Long Term Evolution (LTE) cellular wireless

More information

Solutions Guide. Secure Remote Access. Allied Telesis provides comprehensive solutions for secure remote access.

Solutions Guide. Secure Remote Access. Allied Telesis provides comprehensive solutions for secure remote access. Solutions Guide Secure Remote Access Allied Telesis provides comprehensive solutions for secure remote access. Introduction The world is generating electronic data at an astonishing rate, and that data

More information

November 2013. Defining the Value of MPLS VPNs

November 2013. Defining the Value of MPLS VPNs November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do

More information

Cisco Networking Professional-6Months Project Based Training

Cisco Networking Professional-6Months Project Based Training Cisco Networking Professional-6Months Project Based Training Core Topics Cisco Certified Networking Associate (CCNA) 1. ICND1 2. ICND2 Cisco Certified Networking Professional (CCNP) 1. CCNP-ROUTE 2. CCNP-SWITCH

More information

Networking 4 Voice and Video over IP (VVoIP)

Networking 4 Voice and Video over IP (VVoIP) Networking 4 Voice and Video over IP (VVoIP) Course Objectives This course will give delegates a good understanding of LANs, WANs and VVoIP (Voice and Video over IP). It is aimed at those who want to move

More information

Sprint Global MPLS VPN IP Whitepaper

Sprint Global MPLS VPN IP Whitepaper Sprint Global MPLS VPN IP Whitepaper Sprint Product Marketing and Product Development January 2006 Revision 7.0 1.0 MPLS VPN Marketplace Demand for MPLS (Multiprotocol Label Switching) VPNs (standardized

More information

Hands on VoIP. Content. Tel +44 (0) 845 057 0176 enquiries@protelsolutions.co.uk. Introduction

Hands on VoIP. Content. Tel +44 (0) 845 057 0176 enquiries@protelsolutions.co.uk. Introduction Introduction This 4-day course offers a practical introduction to 'hands on' VoIP engineering. Voice over IP promises to reduce your telephony costs and provides unique opportunities for integrating voice

More information

ICTTEN4215A Install and configure internet protocol TV in a service provider network

ICTTEN4215A Install and configure internet protocol TV in a service provider network ICTTEN4215A Install and configure internet protocol TV in a service provider network Release: 1 ICTTEN4215A Install and configure internet protocol TV in a service provider network Modification History

More information

Gigabit SSL VPN Security Router

Gigabit SSL VPN Security Router As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is the ideal to help the SMBs increase the

More information

NETWORK SECURITY (W/LAB) Course Syllabus

NETWORK SECURITY (W/LAB) Course Syllabus 6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information

More information

IPv6 Migration Challenges for Large Service Providers

IPv6 Migration Challenges for Large Service Providers IPv6 Migration Challenges for Large Service Providers Aruna P General manager Network Operation Agenda Airtel Overview Drivers of IPV6 Migration challenges Design Considerations Deployment plan Airtel

More information

Recommended IP Telephony Architecture

Recommended IP Telephony Architecture Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 SNAC.Guides@nsa.gov This Page Intentionally Left Blank ii Warnings

More information

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs A Silicon Valley Insider MPLS VPN Services PW, VPLS and BGP MPLS/IP VPNs Technology White Paper Serge-Paul Carrasco Abstract Organizations have been demanding virtual private networks (VPNs) instead of

More information

Secure Network Foundation 1.1 Design Guide for Single Site Deployments

Secure Network Foundation 1.1 Design Guide for Single Site Deployments Secure Network Foundation 1.1 Design Guide for Single Site Deployments This document provides a simple vision for a smart and secure business where everyday communications are made easier, faster, and

More information

Training Proposal. Training Description for Enterprise Network COMMERCIAL IN CONFIDENCE 1

Training Proposal. Training Description for Enterprise Network COMMERCIAL IN CONFIDENCE 1 Training Proposal Training Description for Enterprise Network COMMERCIAL IN CONFIDENCE 1 Training Proposal CONTENTS CONTENTS... 2 1 Training Solution... 7 1.1 Routing and Switching Certification Training

More information

Cisco Certified Network Professional - Routing & Switching

Cisco Certified Network Professional - Routing & Switching Cisco Certified Network Professional - Routing & Switching Information Course Price 5,265 No. Vouchers: Course Code 0 Vouchers CCNP-RS No. Courses: 3 1/9 Implementing Cisco IP Routing Information Length:

More information

10CS64: COMPUTER NETWORKS - II

10CS64: COMPUTER NETWORKS - II QUESTION BANK 10CS64: COMPUTER NETWORKS - II Part A Unit 1 & 2: Packet-Switching Networks 1 and Packet-Switching Networks 2 1. Mention different types of network services? Explain the same. 2. Difference

More information

How To Use A Cisco Wvvvdns4400N Wireless-N Gigabit Security Router For Small Businesses

How To Use A Cisco Wvvvdns4400N Wireless-N Gigabit Security Router For Small Businesses Cisco WRVS4400N Wireless-N Gigabit Security Router Cisco Small Business Routers Highlights Secure, high-speed wireless network access for small business Gigabit Ethernet connections enable rapid transfer

More information

Magnum Network Software DX

Magnum Network Software DX Magnum Network Software DX Software Release Notes Software Revision 3.0.1 RC5, Inc. www..com www..com/techsupport email: support@.com This document contains Confidential information or Trade Secrets, or

More information

Enterprise Edge Communications Manager. Data Capabilities

Enterprise Edge Communications Manager. Data Capabilities Enterprise Edge Communications Manager Data Capabilities Data Module Objectives After the completion of this module you will be able to describe the following Data components of the Enterprise Edge Communications

More information

HP VSR1000 Virtual Services Router Series

HP VSR1000 Virtual Services Router Series Data sheet HP VSR1000 Virtual Services Router Series Key features Virtualized enterprise-class x86 routing software Firewall, IPSec, and MPLS VPN security Agile deployments across the branch office, data

More information

Addressing Inter Provider Connections With MPLS-ICI

Addressing Inter Provider Connections With MPLS-ICI Addressing Inter Provider Connections With MPLS-ICI Introduction Why migrate to packet switched MPLS? The migration away from traditional multiple packet overlay networks towards a converged packet-switched

More information

MED: Voice over IP systems

MED: Voice over IP systems www.ptt.co.uk Online course specification MED: Voice over IP systems Target audience: This online course is designed for those who will be responsible for the design or maintenance of Voice over IP (VoIP)

More information

Company Course Description: Course Objectives: Intended Audience

Company Course Description: Course Objectives: Intended Audience VoIP Basics Training Courses: Teracom Training Institute- VoIP Training Course 301: Understanding Voice over IP VoIP Training Course301: Teracom -How voice packetization works -To give a thorough overall

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

(d-5273) CCIE Security v3.0 Written Exam Topics

(d-5273) CCIE Security v3.0 Written Exam Topics (d-5273) CCIE Security v3.0 Written Exam Topics CCIE Security v3.0 Written Exam Topics The topic areas listed are general guidelines for the type of content that is likely to appear on the exam. Please

More information

Cisco Catalyst 3750 Metro Series Switches

Cisco Catalyst 3750 Metro Series Switches Cisco Catalyst 3750 Metro Series Switches Product Overview Q. What are Cisco Catalyst 3750 Metro Series Switches? A. The Cisco Catalyst 3750 Metro Series is a new line of premier, customer-located switches

More information

Voice over IP Basics for IT Technicians

Voice over IP Basics for IT Technicians Voice over IP Basics for IT Technicians White Paper Executive summary The IP phone is coming or has arrived on desk near you. The IP phone is not a PC, but does have a number of hardware and software elements

More information

Mobile Packet Backbone Network Training Programs. Catalog of Course Descriptions

Mobile Packet Backbone Network Training Programs. Catalog of Course Descriptions Mobile Packet Backbone Network Training Programs Catalog of Course Descriptions Page 2 Catalog of Course Descriptions INTRODUCTION... 6 MOBILE PACKET BACKBONE NETWORK (M-PBN) R5.1 DELTA... 7 MOBILE PACKET

More information

CompTIA Convergence+ 2006 Examination Objectives

CompTIA Convergence+ 2006 Examination Objectives CompTIA Convergence+ 2006 Examination Objectives Introduction The CompTIA Convergence+ examination covering the 2006 objectives certifies that the successful candidate has the necessary knowledge to perform

More information

WAN and VPN Solutions:

WAN and VPN Solutions: WAN and VPN Solutions: Choosing the Best Type for Your Organization xo.com WAN and VPN Solutions: Choosing the Best Type for Your Organization WAN and VPN Solutions: Choosing the Best Type for Your Organization

More information

Cisco WRVS4400N Wireless-N Gigabit Security Router: Cisco Small Business Routers

Cisco WRVS4400N Wireless-N Gigabit Security Router: Cisco Small Business Routers Cisco WRVS4400N Wireless-N Gigabit Security Router: Cisco Small Business Routers Highlights Secure, high-speed wireless network access for small business Gigabit Ethernet connections enable rapid transfer

More information

Cisco RV 120W Wireless-N VPN Firewall

Cisco RV 120W Wireless-N VPN Firewall Cisco RV 120W Wireless-N VPN Firewall Take Basic Connectivity to a New Level The Cisco RV 120W Wireless-N VPN Firewall combines highly secure connectivity to the Internet as well as from other locations

More information

MPLS/IP VPN Services Market Update, 2014. United States

MPLS/IP VPN Services Market Update, 2014. United States MPLS/IP VPN Services Market Update, 2014 United States August 2014 Contents Section Slide Numbers Executive Summary 4 Market Overview & Definitions 8 Drivers & Restraints 14 Market Trends & Revenue Forecasts

More information

APPLICATION NOTE. Benefits of MPLS in the Enterprise Network

APPLICATION NOTE. Benefits of MPLS in the Enterprise Network APPLICATION NOTE Benefits of MPLS in the Enterprise Network Abstract As enterprises evolve to keep pace with the ever-changing business climate, enterprises networking needs are becoming more dynamic.

More information

Chapter 4: Security of the architecture, and lower layer security (network security) 1

Chapter 4: Security of the architecture, and lower layer security (network security) 1 Chapter 4: Security of the architecture, and lower layer security (network security) 1 Outline Security of the architecture Access control Lower layer security Data link layer VPN access Wireless access

More information

Network System Design Lesson Objectives

Network System Design Lesson Objectives Network System Design Lesson Unit 1: INTRODUCTION TO NETWORK DESIGN Assignment Customer Needs and Goals Identify the purpose and parts of a good customer needs report. Gather information to identify network

More information

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Internet Protocol: IP packet headers. vendredi 18 octobre 13 Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)

More information

Cisco. A Beginner's Guide Fifth Edition ANTHONY T. VELTE TOBY J. VELTE. City Milan New Delhi Singapore Sydney Toronto. Mc Graw Hill Education

Cisco. A Beginner's Guide Fifth Edition ANTHONY T. VELTE TOBY J. VELTE. City Milan New Delhi Singapore Sydney Toronto. Mc Graw Hill Education Cisco A Beginner's Guide Fifth Edition ANTHONY T. VELTE TOBY J. VELTE Mc Graw Hill Education New York Chicago San Francisco Athens London Madrid Mexico City Milan New Delhi Singapore Sydney Toronto Contents

More information

CompTIA Network+ (Exam N10-005)

CompTIA Network+ (Exam N10-005) CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate

More information

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6) Cisco Certified Network Associate Exam Exam Number 200-120 CCNA Associated Certifications CCNA Routing and Switching Operation of IP Data Networks Operation of IP Data Networks Recognize the purpose and

More information

The Essential Guide to Deploying MPLS for Enterprise Networks

The Essential Guide to Deploying MPLS for Enterprise Networks White Paper The Essential Guide to Deploying MPLS for Enterprise Networks Daniel Backman Systems Engineer Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale,

More information

Application Note. Onsight Connect Network Requirements v6.3

Application Note. Onsight Connect Network Requirements v6.3 Application Note Onsight Connect Network Requirements v6.3 APPLICATION NOTE... 1 ONSIGHT CONNECT NETWORK REQUIREMENTS V6.3... 1 1 ONSIGHT CONNECT SERVICE NETWORK REQUIREMENTS... 3 1.1 Onsight Connect Overview...

More information

CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security

CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by

More information

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1 Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3

More information

Network Administrator Gateway Progression Plan

Network Administrator Gateway Progression Plan June 2014 Network Administrator Gateway Progression Plan Scope: Network Administrators (NA) are part of the IT Services infrastructure team and provide advanced network services such as designing solutions

More information

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Product Overview Cisco Dynamic Multipoint VPN (DMVPN) is a Cisco IOS Software-based security solution for building scalable

More information

HughesNet Broadband VPN End-to-End Security Using the Cisco 87x

HughesNet Broadband VPN End-to-End Security Using the Cisco 87x HughesNet Broadband VPN End-to-End Security Using the Cisco 87x HughesNet Managed Broadband Services includes a high level of end-to-end security features based on a robust architecture designed to meet

More information

LifeSize Video Communications Systems Administrator Guide

LifeSize Video Communications Systems Administrator Guide LifeSize Video Communications Systems Administrator Guide November 2009 Copyright Notice 2005-2009 LifeSize Communications Inc, and its licensors. All rights reserved. LifeSize Communications has made

More information

Cisco Certified Network Professional (CCNP Routing & Switching)

Cisco Certified Network Professional (CCNP Routing & Switching) 529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Cisco Certified Network Professional (CCNP Routing & Switching) Program Summary This instructor-led

More information

Quidway MPLS VPN Solution for Financial Networks

Quidway MPLS VPN Solution for Financial Networks Quidway MPLS VPN Solution for Financial Networks Using a uniform computer network to provide various value-added services is a new trend of the application systems of large banks. Transplanting traditional

More information

Virtual Private Networks. Juha Heinänen jh@song.fi Song Networks

Virtual Private Networks. Juha Heinänen jh@song.fi Song Networks Virtual Private Networks Juha Heinänen jh@song.fi Song Networks What is an IP VPN? an emulation of private (wide area) network facility using provider IP facilities provides permanent connectivity between

More information

EdgeRouter Lite 3-Port Router. Datasheet. Model: ERLite-3. Sophisticated Routing Features. Advanced Security, Monitoring, and Management

EdgeRouter Lite 3-Port Router. Datasheet. Model: ERLite-3. Sophisticated Routing Features. Advanced Security, Monitoring, and Management EdgeRouter Lite 3-Port Router Model: ERLite-3 Sophisticated Routing Features Advanced Security, Monitoring, and Management High-Performance Gigabit Ports Advanced 3-Port Router Introducing the EdgeRouter

More information

Course Contents CCNP (CISco certified network professional)

Course Contents CCNP (CISco certified network professional) Course Contents CCNP (CISco certified network professional) CCNP Route (642-902) EIGRP Chapter: EIGRP Overview and Neighbor Relationships EIGRP Neighborships Neighborship over WANs EIGRP Topology, Routes,

More information

Contents. Features Major Functions. Detailed Specifications. c SAMSUNG Electronics Co.,Ltd.

Contents. Features Major Functions. Detailed Specifications. c SAMSUNG Electronics Co.,Ltd. OfficeServ 7400 Contents Features Major Functions Detailed Specifications Features All in one Solution All in One = IP PBX + Router + Switch + Security PBX PSTN Data + Voice : UTP, PoE, VoIP Auto Config.

More information

Description: Objective: Upon completing this course, the learner will be able to meet these overall objectives:

Description: Objective: Upon completing this course, the learner will be able to meet these overall objectives: Course: Building Cisco Service Provider Next-Generation Networks, Part 2 Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,750.00 Learning Credits: 38 Description: The Building Cisco Service Provider

More information

IPv6 Opportunity and challenge

IPv6 Opportunity and challenge Juniper Networks Solution from enterprise to service provider Jean-Marc Uzé juze@juniper.net 10 May 2004 1 Opportunity and challenge More devices demanding more addresses 3G Mobile IP multimedia specifies

More information

Introduction to MPLS-based VPNs

Introduction to MPLS-based VPNs Introduction to MPLS-based VPNs Ferit Yegenoglu, Ph.D. ISOCORE ferit@isocore.com Outline Introduction BGP/MPLS VPNs Network Architecture Overview Main Features of BGP/MPLS VPNs Required Protocol Extensions

More information

Cisco RV220W Network Security Firewall

Cisco RV220W Network Security Firewall Cisco RV220W Network Security Firewall High-Performance, Highly Secure Connectivity for the Small Office The Cisco RV220W Network Security Firewall lets small offices enjoy secure, reliable, wired and

More information

Network Virtualization Network Admission Control Deployment Guide

Network Virtualization Network Admission Control Deployment Guide Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus

More information

Enterprise Network Simulation Using MPLS- BGP

Enterprise Network Simulation Using MPLS- BGP Enterprise Network Simulation Using MPLS- BGP Tina Satra 1 and Smita Jangale 2 1 Department of Computer Engineering, SAKEC, Chembur, Mumbai-88, India tinasatra@gmail.com 2 Department of Information Technolgy,

More information

"Charting the Course...

Charting the Course... Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content

More information

WHITE PAPER. Addressing Inter Provider Connections with MPLS-ICI CONTENTS: Introduction. IP/MPLS Forum White Paper. January 2008. Introduction...

WHITE PAPER. Addressing Inter Provider Connections with MPLS-ICI CONTENTS: Introduction. IP/MPLS Forum White Paper. January 2008. Introduction... Introduction WHITE PAPER Addressing Inter Provider Connections with MPLS-ICI The migration away from traditional multiple packet overlay networks towards a converged packet-switched MPLS system is now

More information

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer

More information

IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE)

IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE) IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE) COURSE OVERVIEW: Implementing Cisco IP Routing (ROUTE) v2.0 is an instructor-led five day training course developed to help students prepare for Cisco CCNP _

More information

IP Implementation in Private Branch Exchanges From 9:30 a.m until 4:30 p.m (7 hrs./day) 5 days / week

IP Implementation in Private Branch Exchanges From 9:30 a.m until 4:30 p.m (7 hrs./day) 5 days / week Course Title: No. of Hours: IP Implementation in Private Branch Exchanges From 9:30 a.m until 4:30 p.m (7 hrs./day) 5 days / week 1 Course Duration: 3 Months (12weeks) No. Of Hours: 7 Hrs./Day- 5 days/week.

More information

Networking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the

Networking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the Networking Systems Design and Development Lee Chao CRC Press Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Croup, an Informa business AN AUERBACH BOOK

More information

PARAMETERS TO BE MONITORED IN THE PROCESS OF OPERATION WHEN IMPLEMENTING NGN TECHNICAL MEANS IN PUBLIC TELECOMMUNICATION NETWORKS

PARAMETERS TO BE MONITORED IN THE PROCESS OF OPERATION WHEN IMPLEMENTING NGN TECHNICAL MEANS IN PUBLIC TELECOMMUNICATION NETWORKS Draft Recommendation Q.3902 PARAMETERS TO BE MONITORED IN THE PROCESS OF OPERATION WHEN IMPLEMENTING NGN TECHNICAL MEANS IN PUBLIC TELECOMMUNICATION NETWORKS Summary This Recommendation describes the main

More information

Session Border Controllers in Enterprise

Session Border Controllers in Enterprise A Light Reading Webinar Session Border Controllers in Enterprise Thursday, October 7, 2010 Hosted by Jim Hodges Senior Analyst Heavy Reading Sponsored by: Speakers Natasha Tamaskar VP Product Marketing

More information

Voice over IP (VoIP) Basics for IT Technicians

Voice over IP (VoIP) Basics for IT Technicians Voice over IP (VoIP) Basics for IT Technicians VoIP brings a new environment to the network technician that requires expanded knowledge and tools to deploy and troubleshoot IP phones. This paper provides

More information

The term Virtual Private Networks comes with a simple three-letter acronym VPN

The term Virtual Private Networks comes with a simple three-letter acronym VPN Application Brief Nortel Networks Virtual Private Networking solutions for service providers Service providers addressing the market for Virtual Private Networking (VPN) need solutions that effectively

More information

ICTTEN8195B Evaluate and apply network security

ICTTEN8195B Evaluate and apply network security ICTTEN8195B Evaluate and apply network security Release 1 ICTTEN8195B Evaluate and apply network security Modification History Release Release 2 Comments This version first released with ICT10 Integrated

More information

Implementing Cisco IOS Network Security v2.0 (IINS)

Implementing Cisco IOS Network Security v2.0 (IINS) Implementing Cisco IOS Network Security v2.0 (IINS) Course Overview: Implementing Cisco IOS Network Security (IINS) v2.0 is a five-day instructor-led course that is presented by Cisco Learning Partners

More information

Layer 3 Network + Dedicated Internet Connectivity

Layer 3 Network + Dedicated Internet Connectivity Layer 3 Network + Dedicated Internet Connectivity Client: One of the IT Departments in a Northern State Customer's requirement: The customer wanted to establish CAN connectivity (Campus Area Network) for

More information

Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture

Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture Deploying Cisco ASA VPN Solutions Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and Course Flow Additional Cisco Glossary of Terms Your Training Curriculum Evaluation of the Cisco

More information

SCOPE DOCUMENT. Trade Name IT- Network Systems Administration Post- Secondary DATE OF DISTRIBUTION VIA WEBSITE

SCOPE DOCUMENT. Trade Name IT- Network Systems Administration Post- Secondary DATE OF DISTRIBUTION VIA WEBSITE SCOPE DOCUMENT Competition Year Competition location Trade Number Trade Name Level 2013 Vancouver, BC 39 IT- Network Systems Administration Post- Secondary 1. INTRODUCTION 1.1 Purpose of the Challenge

More information

Cisco RV180 VPN Router

Cisco RV180 VPN Router Data Sheet Cisco RV180 VPN Router Secure, high-performance connectivity at a price you can afford. Figure 1. Cisco RV180 VPN Router (Front Panel) Highlights Affordable, high-performance Gigabit Ethernet

More information

GPRS / 3G Services: VPN solutions supported

GPRS / 3G Services: VPN solutions supported GPRS / 3G Services: VPN solutions supported GPRS / 3G VPN soluti An O2 White Paper An O2 White Paper Contents Page No. 3 4-6 4 5 6 6 7-10 7-8 9 9 9 10 11-14 11-12 13 13 13 14 15 16 Chapter No. 1. Executive

More information

Cisco Certified Network Expert (CCNE)

Cisco Certified Network Expert (CCNE) 529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Cisco Certified Network Expert (CCNE) Program Summary This instructor- led program with a combination

More information

Designing for Cisco Internetwork Solutions

Designing for Cisco Internetwork Solutions Designing for Cisco Internetwork Solutions Course DESGN v2.1; 5 Days, Instructor-led Course Description: Designing for Cisco Internetwork Solutions (DESGN) v2.1 is an instructor-led course presented by

More information

IINS Implementing Cisco Network Security 3.0 (IINS)

IINS Implementing Cisco Network Security 3.0 (IINS) IINS Implementing Cisco Network Security 3.0 (IINS) COURSE OVERVIEW: Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles and technologies, using

More information

How To Understand The Benefits Of An Mpls Network

How To Understand The Benefits Of An Mpls Network NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 Introduction MPLS in the Enterprise Multi-Protocol Label Switching (MPLS) as a technology has been around for over a decade

More information

How To Learn Cisco Cisco Ios And Cisco Vlan

How To Learn Cisco Cisco Ios And Cisco Vlan Interconnecting Cisco Networking Devices: Accelerated Course CCNAX v2.0; 5 Days, Instructor-led Course Description Interconnecting Cisco Networking Devices: Accelerated (CCNAX) v2.0 is a 60-hour instructor-led

More information

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer

More information

Breeze SERIES- HYBRID CLOUD INTEGRATED SERVICES GATEWAY PRODUCTS

Breeze SERIES- HYBRID CLOUD INTEGRATED SERVICES GATEWAY PRODUCTS The Breeze SOHO series of INTEGRATED SERVICES HYBRID CLOUD GATEWAYs (ISHCG) from Nuevo Network enables hybrid cloud-ready SOHO office-in-a-box / Telecommuter network making CIO s breathe easy by delivering

More information

Advanced VSAT Solutions Bridge Point-to-Multipoint (BPM) Overview

Advanced VSAT Solutions Bridge Point-to-Multipoint (BPM) Overview 2114 West 7 th Street Tempe, AZ 85281 USA Voice +1.480.333.2200 E-mail sales@comtechefdata.com Web www.comtechefdata.com Advanced VSAT Solutions Bridge Point-to-Multipoint (BPM) Overview January 2014 2014

More information

Optimizing Networks for NASPI

Optimizing Networks for NASPI Optimizing Networks for NASPI Scott Pelton, CISSP National Director AT&T Enterprise Network Architecture Center 2008 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks

More information

Computer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill

Computer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill Computer Networks A Top-Down Approach Behrouz A. Forouzan and Firouz Mosharraf \Connect Mc \ Learn Graw I Succeed* Hill Preface xvii Trademarks xxiii Chapter 1 Introduction 1 1.1 OVERVIEW OF THE INTERNET

More information