• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

162 Architecture courses in Leicester

Internet of Things demystified

5.0(3)

By Systems & Network Training

INTERNET OF THINGS TRAINING COURSE DESCRIPTION A concise overview course covering The Internet of Things and the technologies involved. Particular emphasis is placed on the high level architecture of IoT and the benefits achievable. WHAT WILL YOU LEARN * Describe the structure of the IoT * List the technologies involved in IoT. * Explain how IoT works. INTERNET OF THINGS TRAINING COURSE DETAILS * Who will benefit: Non-technical staff working with IoT. * Prerequisites: None. * Duration 1 day INTERNET OF THINGS TRAINING COURSE CONTENTS * What is IoT The Internet, what is IoT? IoT and M2M, IoT technologies, IoT architecture. Wired and wireless communication. IoT applications; Smart houses, smart cities, smart cars, wearable, environment, other domain specific IoTs. * IoT architecture Physical objects, virtual objects, cloud computing, data capture, communications. Big data. * Components Hardware, sensors, actuators, chips, firmware, embedded systems. Open source platforms. Power options: Battery, solar, PoE. * IoT communication RF, ZigBee, Bluetooth, Bluetooth LE, RFID, WiFi, 802.11ah, mobile technologies. Wired. * Arduino (as an example) Microcontrollers, the platform, development, Arduino software, reading from sensors, I2C, SPI. Arduino and the Internet, HTTP, WiFi, GSM. The cloud and IoT: Pachube, nimbits, ThingSpeak * Security in IoT Authentication, Encryption, secure booting, firewalls.

Internet of Things demystified
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£967

Essential GEPON

5.0(3)

By Systems & Network Training

ESSENTIAL GEPON TRAINING COURSE DESCRIPTION Designed to benefit those requiring an in depth knowledge of the principles and applications of the IEEE Ten Gigabit Ethernet and Gigabit Ethernet Passive Optical Networking and Fibre to the X in NG network applications and their associated equipment, its flexibility and function within a modern transmission network. Using an effective mix of instruction and correlation to theory based learning the delegate will gain a complete understanding of the equipment and the tasks to be undertaken in a real life situation. WHAT WILL YOU LEARN * Compare FTTx networks. * Compare PON variants. * Recognise the GEPON architecture. * Explain how GEPON works. * Recognise GEPON issues. ESSENTIAL GEPON TRAINING COURSE DETAILS * Who will benefit: Anyone requiring GEPON knowledge. * Prerequisites: Introduction to data communications and networking. * Duration 2 days ESSENTIAL GEPON TRAINING COURSE CONTENTS * FTTN, FTTC, FTTH Single Mode Fibre (SMF) and various types, Multimode Fibre (MMF), Fibre Safety and properties (Dispersion/attenuation), Fibre Reel cables and types, Fibre installation and air blown fibre, Transmitters and receivers - power budget/laser classes, Fibre to the home (FTTH), FTTC (Fibre to the Cabinet), FTTN (Fibre to the node), FTTD (Fibre to the Desk), FFTH Topologies and wavelengths, Active or Passive Optical Network (PON). * WDM equipment and GPON OSP design Wavelength considerations, WDM/DWDM/CWDM EDFA optical amplification, AWG (Arrayed Waveguide Grating) splitters, Couplers (splitters) and losses, Optical splitters 1x2, 1x4, 1x8, 1x16, 1x32, 1x64, 2x64. * IEEE PON variants Gigabit Ethernet Passive Optical Network (GEPON), Time Division PON (TDM-PON), Wave Division Multiplexing PON (WDM-PON), 1Gbps, 10Gbps, 40Ggps, 100Gbps, Strategies for TDM-PON to WDM-PON migration, Architecture of NG-PON (hybrid WDM/TDM PON), Additional services than triple play. * GEPON design GEPON OSP centralized design, GEPON OSP distributed design, GEPON PON splitters x4 x8 x32, Fibre splice trays / fibre cassette trays / fibre enclosures, GEPON field testing /GEPON field installation verification, GEPON physical layer testing, Optical Time Domain Reflectometer (OTDR), Optical power source /Optical power meter, Optical Return Loss (ORL), APON/BPON/GPON/EPON/GEPON/10-GEPON comparison. * IEEE 802.3ah GEPON: Ethernet in the first mile IEEE 802.3 options, Optical Ethernet options, Ethernet in the first mile, 1000BASE-LX, 1000BASE-SX, IEEE 802.1Q VLANs, Q-in-Q and MAC-in-MAC. QofS Ethernet TOS and priority methods PCP and DiffServe, Reference model / terminology / architecture, Example of ONT functional blocks, Example of OLT functional blocks, FTTx scenarios, The four switching arrangements for external access network backup. * IEEE 802.3av 10-GEPON Physical layer, 10GBASE-SR, 10GBASE-LX4, 10GBASE-ER, 10GBASE-LR, 10GBASESW, 10GBASE-LW, 10GBASE-EW, Enhancement band, Bit rate and wavelengths, Compatibility, Forward error correction. * IEEE 802.3ca 25G, 50G and 100G NG-EPON MAC frame structure, Downstream multiplexing / Upstream multiplexing, Media access control and ONU registration, Alarm messages. * IEEE 802.3bk extended EPON Laser Types PRX40 and PR40, Reference model. * GEPON issues and standards GEPON components OLT / GEPON ONT and examples GEPON management, RG (Residential Gateway), HPNA (Home Phone Network Alliance), Power Line Carrier (PLC), GPON DLNI, G.hn or G.9960 MOCA, FTTH Council certification, Standard for network certification, Qualify for use of the fibre-connected home badge, GEPON frame synchronization to network timing, Direct clock synchronization interface (BITS), Multiservice Access Platform (MSAP), Software planning tool. Superconnected cities / voucher scheme. * Ethernet OAM Link monitoring, remote failure indication, Remote loopback.

Essential GEPON
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1727

Definitive Asterisk for engineers

5.0(3)

By Systems & Network Training

ASTERISK TRAINING COURSE DESCRIPTION This 3 day hands on Asterisk training course covers all the ground for you to get an Asterisk PBX installed and configured. After installation the course progresses from a simple first configuration onto VoIP and PSTN integration along with the provision of PBX features such as ACD and IVR. Practical sessions follow each major section to reinforce the theory. WHAT WILL YOU LEARN * Install and configure Asterisk. * Connect Asterisk to the Internet and PSTN. * Integrate VoIP and the PSTN. * Configure Asterisk for PBX features such as voicemail, ACD and IVR. ASTERISK TRAINING COURSE DETAILS * Who will benefit: Technical staff working with or evaluating Asterisk. * Prerequisites: None although hands on experience of UNIX systems would be beneficial, as would knowledge of VoIP. * Duration 3 days ASTERISK TRAINING COURSE CONTENTS * What is Asterisk? PBXs, what Asterisk does, Asterisk features, Asterisk VoIP support, Asterisk and the Internet, Asterisk and the PSTN, hosted VoIP systems. * Asterisk installation Linux installation, Asterisk package compilation and installation. Timing sources. Hands on Installing Asterisk * Managing Asterisk Starting/stopping Asterisk, command arguments, Asterisk commands, log files, logger.conf, remote management. Hands on Controlling Asterisk. * First Asterisk configuration The role of SIP, IP phones, DHCP, IP addressing, sip.conf, extensions.conf. Hands on Simple SIP configuration * Asterisk architecture Server hardware, interfaces, channels, Zaptel, Digium, Asterisk filesystem, connections. The configuration files, syntax, asterisk.conf. Hands on Adding hardware for Asterisk, exploring the configuration files. * DAHDI configuration Digium hardware, DAHDI architecture, DAHDI installation, DAHDI configuration, system.conf, FXS, FXO, E1, chan_dahdi.conf, dahdi_cfg, DAHDI tools. Hands on Connecting Asterisk to the PSTN. * Dial plans extensions.conf detail, contexts, priorities. Hands on Configuring dial plans. * SIP configuration sip.conf in detail, defining SIP channels, incoming SIP channels, outgoing SIP channels, SIP variables, Asterisk as a SIP client and SIP server. Hands on SIP configuration. * IAX configuration What is IAX, IAX server, IAX client, IAX channels, iax.conf, IAX syntax in extensions.conf, IAX trunking. Hands on Linking Asterisk systems. * Implementing PBX functions Voicemail, voicemail trees, voicemail passwords, Music on hold, meetme conferencing, call parking. ACD, IVR, fax. Hands on Configuring PBX features.

Definitive Asterisk for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2367

Essential ZigBee for engineers

5.0(3)

By Systems & Network Training

ZIGBEE TRAINING COURSE DESCRIPTION A hands on course covering the entire ZigBee protocol stack. ZigBee operation, primitives and frame formats are covered in detail using software tools to test and analyse ZigBee commands and demonstrate how these affect the 802.15.4 MAC. Analysers are used to decode packet formats. WHAT WILL YOU LEARN * Describe the ZigBee architecture and applications. * Explain the workings of ZigBee protocol stack including the 802.15.4, NWK, APS and ZDO sub layers. * Describe in detail the ZigBee primitives and how they are used to pass data; make networks; join networks and repair networks. * Secure ZigBee networks. ZIGBEE TRAINING COURSE DETAILS * Who will benefit: Technical staff requiring grounding in ZigBee including application engineers. * Prerequisites: RF fundamentals. * Duration 2 days ZIGBEE TRAINING COURSE CONTENTS * Wireless data overview What is 802.15.4 and ZigBee? WLAN, WPAN, Bluetooth vs. ZigBee. Markets. Applications and architecture. ZigBee demonstration. * ZigBee Standards and technology The 7-layer model, IEEE WPAN standards overview, 802.15.4 & ZigBee, ZigBee alliance. * ZigBee Protocol stack The ZigBee 5 layer model, The network (NWK) sub layer, Application support sub layer (APS), the ZigBee Device Object (ZDO). * 802.15.4 Radio Frequencies, modulation, power, DSSS, BPSK/ O-QPSK, channels, symbols, chips and bit rate. * 802.15.4 PHY PHY data transfer primitives. The PHY packet. PHY PIB management. * 802.15.4 MAC layer The MAC layer overview, CSMA/CA, addresses, frame types, super frames, MAC layer: Data, Data control, Scan and join, PAN maintenance, MAC PIB. Hands on 802.15.4 frame analysis. * ZigBee Topologies Point to point topology, star topology, cluster tree, wired integration. Hands on Building a ZigBee network. * ZigBee frame formats General frame format, data frames, command frames. Hands on Analysing ZigBee frames. * ZigBee NWK NWK data primitives: Request. Confirm. Indication. NWK management primitives: Network discovery, network formation. Permit joining. Start router. Join. Direct join. Leave. Reset. Sync. NWK database management. Hands on NWK analysis * ZigBee APS Address mapping, matching devices, binding devices, binding tables. Hands on APS analysis. * ZigBee ZDO Device roles, binding requests, initiating and responding, device discovery, service discovery, network management. ZDO Endpoint 0. * ZigBee Security Security issues, security modes, MAC security, NWK security, APS security. * Applications Writing ZigBee applications, application profiles, End points, Endpoint addressing, clusters of attributes, broadcasts. Hands on Sample ZigBee application.

Essential ZigBee for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2477

Cyber security for engineers

5.0(3)

By Systems & Network Training

CYBER SECURITY TRAINING COURSE DESCRIPTION This cyber security course focusses on the network side of security. Technologies rather than specific products are studied focussing around the protection of networks using firewalls and VPNs. WHAT WILL YOU LEARN * Describe: - Basic security attacks - RADIUS - SSL - VPNs * Deploy firewalls and secure networks * Explain how the various technologies involved in an IP VPN work. * Describe and implement: - L2TP - IPsec - SSL - MPLS, L3, VPNs. CYBER SECURITY TRAINING COURSE DETAILS * Who will benefit: Anyone working in the security field. * Prerequisites: TCP/IP foundation for engineers * Duration 5 days CYBER SECURITY TRAINING COURSE CONTENTS * Security review Denial of service, DDOS, data manipulation, data theft, data destruction, security checklists, incident response. * Security exploits IP spoofing, SYN attacks, hijacking, reflectors and amplification, keeping up to date with new threats. Hands on port scanning, use a 'hacking' tool. * Client and Server security Windows, Linux, Log files, syslogd, accounts, data security. Hands on Server hardening. * Firewall introduction What is a firewall? Firewall benefits, concepts. HAnds on launching various attacks on a target. * Firewall types Packet filtering, SPI, Proxy, Personal. Software firewalls, hardware firewalls. Firewall products. Hands on Simple personal firewall configuration. * Packet filtering firewalls Things to filter in the IP header, stateless vs. stateful filtering. ACLs. Advantages of packet filtering. Hands on Configuring packet filtering firewalls. * Stateful packet filtering Stateful algorithms, packet-by-packet inspection, application content filtering, tracks, special handling (fragments, IP options), sessions with TCP and UDP. Firewall hacking detection: SYN attacks, SSL, SSH interception. Hands on SPI firewalls. * Proxy firewalls Circuit level, application level, SOCKS. Proxy firewall plusses and minuses. Hands on Proxy firewalls. * Firewall architectures Small office, enterprise, service provider, what is a DMZ? DMZ architectures, bastion hosts, multi DMZ. Virtual firewalls, transparent firewalls. Dual firewall design, high availability, load balancing, VRRP. Hands on Resilient firewall architecture. * Testing firewalls Configuration checklist, testing procedure, monitoring firewalls, logging, syslog. Hands on Testing firewalls. * Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Password cracking. * Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, RADIUS. Hands on Using certificates. * VPN overview What is a VPN? What is an IP VPN? VPNs vs. Private Data Networks, Internet VPNs, Intranet VPNs, Remote access VPNs, Site to site VPNs, VPN benefits and disadvantages. * VPN Tunnelling VPN components, VPN tunnels, tunnel sources, tunnel end points, tunnelling topologies, tunnelling protocols, which tunnelling protocol? Requirements of tunnels. * L2TP Overview, components, how it works, security, packet authentication, L2TP/IPsec, L2TP/PPP, L2 vs L3 tunnelling. Hands on Implementing a L2TP tunnel. * IPsec AH, HMAC, ESP, transport and tunnel modes, Security Association, encryption and authentication algorithms, manual vs automated key exchange, NAT and other issues. Hands on Implementing an IPsec VPN. * SSL VPNs Layer 4 VPNs, advantages, disadvantages. SSL. TLS. TLS negotiation, TLS authentication. TLS and certificates. Hands on Implementing a SSL VPN. * MPLS VPNs Introduction to MPLS, why use MPLS, Headers, architecture, label switching, LDP, MPLS VPNs, L2 versus L3 VPNs. Point to point versus multipoint MPLS VPNs. MBGP and VRFs and their use in MPLS VPNs. Hands on Implementing a MPLS L3 VPN. * Penetration testing Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology. Hands on Hacking tools and countermeasures.

Cyber security for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697

Definitive VoIP for engineers

5.0(3)

By Systems & Network Training

VOIP TRAINING COURSE DESCRIPTION Convergence of voice and data is now a common place mainstream technology. Our Voice Over IP course investigates the characteristics of voice transmission and then studies the impact on IP networks. Practical sessions with soft phones, hard phones and gateways allow the students to see all aspects of VoIP. Network analysers are used to study packets on the wire. WHAT WILL YOU LEARN * Describe the issues of voice and data convergence. * Describe techniques, which can be used in IP to provide low uniform delay. * Evaluate VoIP technologies. * Design data networks, which will support voice. VOIP TRAINING COURSE DETAILS * Who will benefit: Anyone working in the field of networking or telecommunications. * Prerequisites: TCP/IP foundation for engineers Intro to data communications & networking * Duration 3 days VOIP TRAINING COURSE CONTENTS * What is VoIP Voice over IP, brief review of IP, brief review of telephones and voice. * Configuring IP softphones What are softphones? Downloading, installing. Hands on Building the base IP network, a simple VoIP call with softphones, Internet telephony. * Addressing E164, FQDN, IP addresses, URIs, DNS, SIP addressing, H.323 addressing. * VoIP issues Bandwidth, Delay, Jitter, digitising voice, digitisation steps, coding, quality issues, MOS, voice compression, silence suppression, packetising voice, prioritising voice, jitter buffers. Hands on Simple packet analysis. * Architectures Desktop, backbone, gateway, hard phones, PoE, integrating phones and PCs, carriers, Softswitches. Hands on Integrating Softphones, hard phones and analog phones. * IP performance and QoS ITU delay recommendations, IP DSCP field, DiffServ, IP precedence, queuing strategies; FIFO, WFQ, custom, priority, RED, LLQ. * VoIP protocol stack RTP, RTCP, mixers and translators, RSVP. Bandwidth, Erlang models, link layer overhead. Hands on Calculating VoIP bandwidth, analysing RTP packets. * ITU Recommendation H.323 Architecture, protocols, terminals, Call setup, Gatekeepers, gateway discovery, H.323 registration with a gatekeeper. Hands on PC to PC using H.323. * IETF - Session Initiation Protocol What is SIP? SIP protocol stack, SDP, Sip architecture, SIP messages, Initial SIP phone startup, SIP servers, proxy server, redirect server. Hands on PC to PC using SIP. * Carrier networks Signalling systems, SS7, media gateways, Media gateway controllers, signalling gateways, MGCP, Megaco, SIGTRAN. Hands on PSTN interworking. * Video over IP Video components, digital video, pictures and audio, video codecs, issues and solutions, video conferencing, multipoint video conferencing, video protocol stack. * Appendix 1: Multicasting. * Appendix 2: Voice/data integration without IP.

Definitive VoIP for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2367

Total sFlow for engineers

5.0(3)

By Systems & Network Training

TOTAL SFLOW TRAINING COURSE DESCRIPTION A comprehensive hands on course covering sFlow. The course starts with the basics of flows moving swiftly onto configuring sFlow and studying the information it provides. WHAT WILL YOU LEARN * Describe sFlow. * Use Nmap. * Recognise how sFlow can be used. * Describe the issues in using sFlow. * Compare SFlow with SNMP and NetFlow. TOTAL SFLOW TRAINING COURSE DETAILS * Who will benefit: Technical staff working with sFlow. * Prerequisites: TCP/IP foundation for engineers. * Duration 1 day TOTAL SFLOW TRAINING COURSE CONTENT * What is SFlow? Where to monitor traffic. Packet based sampling, Time based sampling. Adaptive sampling. Flow samples, Counter samples. Hands on Wireshark flow analysis. * Getting started with sFlow sFlow configuration. Enabling sFlow. Per interface. Hands on Accessing sFlow data using the CLI. * sFlow architecture SFlow agents and collectors. When flows are exported. Distributed sFlow architecture, subagents. sFlow reporting products. SolarWinds. Hands on Collector software. * sFlow features and benefits Troubleshooting with sFlow, controlling congestion, security and audit trail analysis. Hands on Using sFlow. * sFlow versus other technologies Flows. sFlow impact and scalability. sFlow versus SNMP and RMON, SFlow versus NetFlow/IPFIX. Hands on Advanced sFlow configuration.

Total sFlow for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1397

Definitive Segment Routing for engineers

5.0(3)

By Systems & Network Training

DEFINITIVE SEGMENT ROUTING COURSE DESCRIPTION This Segment Routing (SR) training course is a comprehensive program designed to equip network professionals with the knowledge and skills needed to implement and manage SR in modern networking environments. Segment Routing is a cutting-edge network architecture that enhances network flexibility, scalability, and efficiency. This course offers in-depth coverage of SR principles, protocols, and practical implementation techniques. Hands on sessions are used to reinforce the theory rather than teach specific manufacturer equipment. WHAT WILL YOU LEARN * Explain packet paths when implementing SLB. * Explain how Segment Routing works. * Explain the relationship between SR and MPLS. * Use SR for Traffic Engineering. * Troubleshoot Segment Routing. * Implement TI-LFA using Segment Routing DEFINITIVE SEGMENT ROUTING COURSE DETAILS * Who will benefit: This course is ideal for network engineers, architects, and administrators who want to stay up-to-date with the latest networking technologies and enhance their expertise in Segment Routing. * Prerequisites: Concise MPLS for engineers * Duration 3 days DEFINITIVE SEGMENT ROUTING COURSE CONTENTS * Introduction to Segment Routing (SR) What is SR? Source based routing, SPRING, history, segments, why SR? SR benefits.SR usage: Traffic Engineering, Shortest path, local protection. Relationship between SR and MPLS, SRv6. Hands on Investigating the base network. * Segment Routing architecture SR domains, SR paths, SR segments. Segment types. Segment IDs, combining segments, IGP extensions, control plane components. Hands on Configuring SR, exploring how SR works, * Segment Routing protocols SR-MPLS. MPLS label stack operations. Segment Routing Global Block (SRGB). SRLB. IS-IS and OSPF extensions for SR. Prefix segments, adjacency segments. SRGB/IGP interactions. Multidomain SR policies. SPF, Strict SPF. Hands on Analysing IGP SR extension operation. Investigating the SRGB. * Segment Routing Traffic Engineering RSVP-TE versus SR-TE. SR policies. Anycast and binding SIDs. SR flexible algorithm flex-algo, Performance measurement delay. Hands on Optimising network paths for various applications. * SR integration with 'older' technologies MPLS and LDP integration with SR. Hands on Integration. * Topology Independent Loop Free Alternative Classic LFA and IP/MPLS protection mechanisms. TI-LFA protection options. Hands on TI-LFA operation with SR and LDP traffic. * Scenarios SDN. Managing SR with SR controllers. Analyse, optimise, automate. Network slicing. * BGP peering segments Path Computation Elements, BGP Link State. BGP prefix segments, BGP peer segments. Egress peer engineering. SR enabled VPNs. Hands onBGP segment routing. * Troubleshooting Segment Routing IP toolkit: ping and traceroute. MPLS toolkit: MPLS ping, MPLS echo request/reply, MPLS ping, MPLS traceroute and path discovery. Router show commands. Hands on Used throughout the course during exercises. * SRv6 Note this is an optional extra day. See our one day SRv6 course for details. IPv6 headers review, routing headers, IPv6 segment, SRv6 segment Identifiers. IPv6 Segment Routing Header. SRH procedures. Hands on Configuring SRv6, Analysing SRv6 operation.

Definitive Segment Routing for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2367

HTTP streaming methods

5.0(3)

By Systems & Network Training

HTTP STREAMING TRAINING COURSE DESCRIPTION This course looks at the delivery of video streams using HTTP adaptive streaming. Both MPEG DASH and HLS are investigated. Hands on sessions primarily involve using Wireshark to analyse streams. WHAT WILL YOU LEARN * Use Wireshark to analyse and troubleshoot HTTP video streams. * Explain HTTP adaptive streaming works. * Evaluate and compare MPEG DASH and HLS. * Use tools to create HTTP adaptive streams. HTTP STREAMING TRAINING COURSE DETAILS * Who will benefit: Anyone working in the broadcast industry. * Prerequisites: TCP/IP foundation for engineers * Duration 2 days HTTP STREAMING TRAINING COURSE CONTENTS * What is HTTP streaming? The old way. Progressive downloads versus streaming. Why not UDP and RTP for delivery? Adaptive bit rate streaming. Standards. Hands on Base network setup. Using WireShark for HTTP streams. * HTTP protocol stack IP, TCP, IPv6. HTTP. HTTP 1.0, HTTP 1.1, HTTP 2.0, HTTP header fields. HTML 5. Hands on Analysing HTTP. * Adaptive bitrate streaming principles Chunks, fragments, segments. Manifest files. Encoding, resolution, bitrates. Addressing, relative and absolute URLs, redirection. When does the client switch streams? Switch points. Hands on Walk through of client behaviours on a stream. * HTTP streaming architecture Server components, distribution components, client software. CDN, caching, multiple servers. Hands on Analysing CDN and Internet delivery. * TCP and HTTP streaming interactions TCP ACK, TCP connections, unicast only. TCP flow control, TCP and performance. Hands on TCP window sizes. * MPEG DASH Stakeholders, DASH architecture and model, codec agnostic, XML, Media Presentation Description, Media Presentation, segment formats. Hands on MPEG DASH analysis. * HTTP Live Streaming and others Stakeholders. Media segments, media playlists, master playlists. Adobe HTTP dynamic streaming, Microsoft smooth streaming. Hands on Analysing HLS. * Tools mp4dash, mp4fragment, libdash. Apple developer tools for HLS. Hands on Creating segmented content. * Security HTTPS, encryption, content protection. Hands on Encryption analysis. * Summary Choosing a streaming method. Impact of live versus VoD. Web sockets.

HTTP streaming methods
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1727

Essential Lawful Intercept

5.0(3)

By Systems & Network Training

LAWFUL INTERCEPT TRAINING COURSE DESCRIPTION Packet based networks require a different approach to Lawful Intercept (LI) than that used in circuit switched networks. This course focuses on what Lawful Interception and Data Retention (DR) means to communications service providers in the IP and NGN areas. The course assumes a basic knowledge of IP networking (i.e. DNS, TCP/UDP, IP, RTP) and the building of services on an IP platform (e.g. SIP, SDP, FTP, HTTP). The course first looks at the regulatory context for LI and DR and how this is translated to a practical architecture. WHAT WILL YOU LEARN * Recognise the legal and regulatory obligations to provide LI and DR. * Identify the components of the handover architecture for each of LI and DR. * Identify the preferred location of points of interception and points of retention in the IP network. * Map intercepted material to handover protocols. * Understand the data mapping defined in the available standards for both LI and DR. LAWFUL INTERCEPT TRAINING COURSE DETAILS * Who will benefit: Technical and managerial staff needing to implement public networks. * Prerequisites: TCP/IP Foundation * Duration 1 day LAWFUL INTERCEPT TRAINING COURSE CONTENTS * What is meant by LI and DR? Review of regulation: Data protection Directive; Data Retention Directive; RIPA. * LI architectures Handover and Interception: ETSI standards ES 201 671 and TS 102 232. * LI handover protocol IRI and CC handover; correlation; manual interfaces. * DR architectures Handover of query results; points of retention. * DR query command set Retrieval of retained records. * Security concerns Operation privacy; target privacy; storage and transmission integrity. * Implementation Identifying PoI and PoR for provided services. * LI and DR wrap up Interaction with other services, storage obligations (volume, time, availability).

Essential Lawful Intercept
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1397
1...45678...17