Print Friendly, PDF & Email

Whether you require a single course for a small group or an extensive training program for your entire workforce, on-site courses offer significant savings and convenience with the same quality hands-on instruction delivered in TONEX Training Education Centers around the world.

TONEX Training offers many training seminars in variety of subject areas including Telecom, Mobile and Cellular, Wireless, Engineering, Technology, IT, business, AI and Machine Learning, Systems Engineering, Defense, Tactical Data Links (TDL), Aerospace, Aviation, Space Engineering, Specification Writing, Power and Energy, Enterprise Architecture Management, Mini MBA, Finance, Logistics, Blockchain, Leadership, and Product/Project Management. We offer programs in our four state-of-the-art Executive Conference Centers and in 20 other cities in US and international locations including:

  • Atlanta, GA
  • Dallas, TX
  • Plano, TX
  • San Francisco, CA
  • Santa Clara, California
  • Santa Monica, California
  • Alexandria, Virginia
  • New York City, NY
  • Rome, Italy
  • Shanghai, China
  • London, UK
  • Munich, Germany
  • Stockholm, Sweden
  • Tokyo, Japan
  • Seoul, Korea
  • Hong Kong
  • Bangalore, India
  • Istanbul, Turkey
  • Dubai, UAE
Oct
3
Mon
Aerospace Systems Engineering Training @ TONEX Plano Office
Oct 3 @ 9:00 am – Oct 5 @ 4:00 pm
Print Friendly, PDF & Email

Aerospace systems engineering training covers the fundamentals of systems engineering and their applications in aerospace systems, emphasizing on commercial and military systems We will provide you with a practical knowledge of all components, technical and managerial, included in systems engineering as used in aerospace systems of variable complexity. This hands-on training will focus on the challenging parts in systems development including requirements definition, integration, distribution of requirements, risk management, verification and validation. We also will discuss the techniques and methods used on commercial systems, DoD, NATO and NASA programs.

Aerospace Systems Engineering Training<img class=”aligncenter wp-image-11793″ src=”https://i1.wp.com/www.tonex.com/wp-content/uploads/Aerospace-Systems-Engineering-Training.jpg?resize=325%2C221&ssl=1″ alt=”Aerospace Systems Engineering Training” data-recalc-dims=”1″ />

Learn About:

  • Systems engineering practices
  • Terms and methods
  • System life cycles used by INCOSE, DoD and NASA
  • Requirements generation
  • Trade studies
  • Architectural practices
  • Functional allocation
  • Verification/validation methods
  • Requirements Determination
  • Risk management
  • Evaluating specialty engineering contributions
  • Importance of integrated product and process teams

Aerospace systems engineering training is delivered in the form of hands-on training that includes labs, group activities, real-world case-studies, and hands-on workshops.

Audience

Aerospace systems engineering training is a 3-day course designed for:

  • Systems engineers
  • Aerospace engineers
  • Space program managers
  • Military avionic program managers
  • Space, military, and commercial product managers

Training Objectives

Upon the completion of Aerospace systems engineering training, the attendees are able to:

  • Understand the fundamentals of systems engineering
  • Describe avionic and aircraft systems
  • Define aerospace systems engineering processes
  • Describe the aerospace-associated programs life-cycle process
  • Identify aerospace systems components
  • Identify and provide systems requirements and management
  • Design the aerospace system
  • Integrate their aerospace specialty into systems engineering
  • Model aerospace system architecture
  • Apply verification and validation techniques
  • Apply the models and methods fit aerospace systems
  • Manage technical data
  • Manage and mitigate technical risks
  • Conducting crosscutting techniques
  • Manage and support required logistics
  • Understand data acquisition and control systems

Course Outline

Overview of Aerospace Systems Engineering

  • Systems engineering
  • Systems engineering components
  • System of systems engineering
  • Systems engineering objectives
  • Systems engineering discipline
  • Aerospace systems
  • NASA space systems
  • DoD System of Systems (SoS)

System Lifecycle Process

  • Researching
  • The V diagram
  • The project lifecycle process flow
  • Preliminary analysis
  • Definition
  • Development
  • Operations and maintenance
  • The budget cycle

Aerospace Systems Engineering Management Concerns

  • Coordinating balanced goals, work products, and organizations
  • The aerospace Systems Engineering Management Plan (SEMP)
  • The aerospace SEMP impact
  • The aerospace SEMP content
  • The aerospace SEMP development
  • The Work Breakdown Structure (WBS) vs. Product Breakdown Structure (PWBS)
  • WBS and PBS roles
  • WBS and PBS development tools
  • Common mistakes of WBS and PBS
  • Scheduling and scheduling impact
  • System schedule info and visual styles
  • Setting up a system schedule
  • Reporting methods
  • Resource leveling
  • Budgeting and resource management
  • Risk management
  • Various types of risks
  • Risk determination methods
  • Risk assessment methods
  • Risk reduction methods
  • Configuration Management
  • Baseline development
  • Configuration management strategies
  • Managing information
  • Reviews, audits, and control
  • Objectives
  • Overall rules
  • Main control accesses
  • Temporary review
  • Reporting the state and evaluation
  • Cost and schedule control measurement indices
  • Engineering performance evaluation
  • Aerospace systems engineering process metrics

Systems Assessment and Modeling Concerns in Aerospace

  • The trade study development
  • Regulating the trade study
  • Models and tools
  • Selecting the selection rule
  • Defining and modeling the budget
  • Life-Cycle expenses and other expenses evaluation
  • Monitoring life-cycle costs
  • Cost approximation
  • Defining and modeling the effectiveness
  • Measuring the system effectiveness methods
  • NASA system effectiveness evaluation
  • Accessibility and logistics supportability modeling
  • Probabilistic management of cost and effectiveness
  • Origins of uncertainty in models
  • Modeling methods for managing uncertainty

Integrating Aerospace Engineering Into the Systems Engineering Process

  • Aerospace engineering role
  • Reliability
  • Role of the reliability
  • Building consistent space-based systems
  • Reliability assessment tools and methods
  • Quality assurance
  • Role of the quality assurance engineer
  • Quality assurance tools and methods
  • Maintainability
  • Responsibility of the maintainability engineer
  • The system maintenance notion and maintenance plan
  • Designing maintainable space-based systems
  • Maintainability evaluation tools and methods
  • The avionic Integrated Logistics Support (ILS)
  • ILS components
  • Planning for ILS
  • ILS tools and methods
  • Continuous attainment and life-cycle support
  • Verification
  • Verification process
  • Verification planning
  • Qualification verification
  • Acceptance verification
  • Deployment verification
  • Functional and disposal verification
  • Production
  • Production engineer responsibilities
  • Tools and methods
  • Publicly accepted
  • Environmental impacts
  • Nuclear safety launch authorization
  • Planetary protection

Functional Assessment Methods

  • Functional methods
  • N2 diagrams
  • Timeline analysis

Functional Analysis

  • Boeing B-777: fly-by-wire flight control systems
  • Electrical flight control systems
  • Navigation and tracking Systems
  • Flight management systems
  • Synthetic vision
  • Communication systems
  • Satellite systems
  • Sensors systems

TONEX Case Study Sample: International Space Station (ISS)

  • Some background
  • ISS systems engineering elements
  • ISS systems engineering principals
  • ISS systems engineering accomplishments
  • ISS systems engineering challenges and failures
  • ISS systems engineering configuration management
  • ISS systems engineering quality assurance and maintenance
Oct
11
Tue
Requirements Writing Training Course – Specification Writing Training @ Plano, TX
Oct 11 @ 9:00 am – Oct 12 @ 4:00 pm
Print Friendly, PDF & Email

Requirements Writing Training, and Specifications Writing Training course addresses the techniques used to write, validate and verify requirements and convert them to technical design specifications. It gives attendees the basic tools necessary to write effective system design specifications.

Requirements are the foundation for building systems and software. They determine WHAT the system must do and drive the system development. Requirements are used to determine [verify] if the project team built the system correctly. The requirements development process identifies the activities needed to produce a set of complete and verifiable requirements.

Learn how to:

  • Write well-formed, validated requirements and specifications
  • Analyze, Verify and Validate requirements into a user requirements document
  • Create Project Plan/SEMP with  various plans, such as the review plans, configuration management plans, and risk plans. [Control the requirements development].
  • Establish Configuration management [CM] the process to control changes to the requirements and manage the baseline documentation.
  • Plan the Risk management to monitor, control, and mitigate high risk requirements.
  • Manage Technical reviews to identify defects, conflicts, missing, or unnecessary requirements.
  • Manage Stakeholder involvement which is  essential for validating the requirements. Are these the correct requirements?
  • Establish Elicitation techniques to enable the discovery and understanding of the needed requirements.
  • Manage Traceability of requirements to user needs & requirements, support documentation, and constraining policies [e.g., safety requirements].

Requirements Writing Training

Requirements define the functions, performance, and environment of the system under development to a level that can be built:Does the system do WHAT it is supposed to do? – These are Functional requirements.How well does the system do its functions? – These are Performance requirements.

TONEX Requirements Writing Training provides the foundation to produce requirements for the system and sub-systems with set of activities . The systems engineering standard [EIA 632] defines “requirement” as “something that governs what, how well, and under what conditions a product will achieve a given purpose.”

This course gives PEs 13 PDH (Professional Development Hours) approved by PIE.

Who Should Attend

SMEs, project stakeholders, users, Project and program managers, directors, project sponsors and anyone else involved in planning and writing specifications requirements for projects.

Objectives

Upon successful completion of the course, attendees will:

  • Describe the way the system is intended to operate from the user’s perspective
  • Describe Concept of Operations (ConOps) process where user needs, expectations, goals, and objectives are described
  • Understand how feasibility Study can produce the conceptual high-level design and requirements which can be used as a starting point for the project.
  • Demonstrate the ability to capture and validate requirements throughout the requirements analysis process.
  • Learn how to conduct technical reviews, manage stakeholder involvement, and elicit requirements
  • Understand traceability of requirements to user needs
  • Understand the relationships among all stages of the system life cycle.
  • Describe different levels of requirements
  • Learn how to develop requirements, write and document requirements, check completeness of requirements, analyze, refine, and decompose requirements, validate requirements and manage requirements
  • Describe communications techniques to elicit requirements
  • Classify requirements as functional or design
  • Demonstrate the ability to write functionally oriented and design oriented specifications
  • Understand how to convert requirements into valid design specifications
  • Learn how to separate System and Sub-system Requirements
  • Learn how to create a Verification Plan to verify each system requirement
  • Effectively produce design specification
  • Effectively perform Verification (Functional, Non-Functional, and Interface reqs.) and Validation (ConOps)

Outline

BASICS OF SYSTEMS ENGINEERING

  • Definition of Common Terms
  • System Definition and Design
  • Design Methodologies
  • Master Plan Scope
  • Concept of Operations (ConOps)
  • Preliminary Engineering
  • Final Engineering
  • RFP vs. Consultant Design vs. Design-Build

REQUIREMENTS ANALYSIS

  • Introduction to Requirements
  • The Quality of Requirements
  • Description of Requirements Writing (within the larger context of system development)
  • Overview of Requirements Development

Communication Techniques for Eliciting Requirements

  • Stakeholder involvement
  • Defining valid and meaningful needs
  • Technical reviews
  • Stakeholder feedback on the needs being collected
  • Prioritization of the needs
  • ConOps to System Requirements (generic)

REQUIREMENTS

  • Purpose of Requirements
  • Levels of Requirements
  • Understanding the different levels of requirements
  • Performance requirements
  • Conditions [e.g. environmental, reliability, and availability]
  • Environmental and Non-Functional requirements
  • System
  • Sub system
  • Component / task

Types of Requirements

  • Eight basic types
  • Differences between requirements for hardware, software, services
  • Functional
  • Non functional
  • Performance, etc.
  • Non-Requirements

STRUCTURE OF A WELL FORMED REQUIREMENT

  • Definition
  • Capabilities
  • Conditions
  • Constraints
  • Operational Policies & Constraints
  • Technical and Policy Constraints
  • Properties
  • Interface
  • Human
  • Hardware
  • Software
  • Communications
  • Functional analysis – needs analysis, operational analysis, use cases
  • Design requirements analysis
  • States & Modes analysis
  • Workshop – States and modes analysis
  • Requirements parsing
  • Writing requirements vs. defining a system proposed is critical

SPECIFICATIONS VS. REQUIREMENTS

  • Development of requirements
  • Description of the current environment
  • Stakeholders
  • Feedback to Stakeholders
  • Facilitation skills and techniques
  • Transforming Requirements into Requirements Specifications
  • How requirements specifications relate to requirements
  • Requirements Flowdown in Specifications
  • Specification Types and Formats
  • Types of requirements specification
  • Specification Writing
  • Review of requirements quality
  • Requirement structural template

SYSTEM TESTS (Verification and vALIDATION)

  • Test Plans
  • Test Procedures
  • User Acceptance Testing
  • Requirements Verification Matrix
  • Traceability to user requirements (Validation against ConOps)
  • Traceability to system requirements (Verification against System Specs.)
  • Verification (Functional, Non-Functional, and Interface reqs.)
  • Validation (ConOps)
  • System Integration
  • Standards and Policies

WORKSHOPS/EXERCISE

  • Workshop 1
  • Examples of good and poor requirements (group project)
  • Requirements constructs
  • Group presentations and discussions
  • Workshop 2- classifying requirements as functional or design
  • Workshop 3 – writing a functionally oriented specification vs. a design oriented specification
  • Analysis of Conops document
  • Analysis of Test plans/procedures
Oct
13
Thu
DFMEA Training | Design FMEA Training @ TONEX Plano Office
Oct 13 @ 9:00 am – Oct 14 @ 4:00 pm
Print Friendly, PDF & Email

What is DFMEA?

DFMEA, or Design Failure Mode and Effects Analysis, is typically used in the early stage of the product lifecycle and development as a troubleshooting and assurance process and tool.

What is FMEA?

Failure Mode and Effects Analysis (FMEA) is defined as a regular technique used to inhibit failure. Such action is conducted through the exploration of potential failure modes and the reasons can cause such failure. FMEA actions occur within a team activity by tackling high severity, high occurrence, and high detection rankings that is determined by the analysis. Only through the preventive process of FMEA we can assure the product performance is satisfactory and the chance of the product failure is reduced. The Design FMEA training course will help you explore these steps in detail and learn how to put them in action to prevent the system failure.

DFMEA training, Design FMEA training<img class=”aligncenter wp-image-9766 size-full” src=”https://i1.wp.com/www.tonex.com/wp-content/uploads/aaig-logo.jpg?resize=500%2C171″ alt=”DFMEA training, Design FMEA training” srcset=”https://i0.wp.com/www.tonex.com/wp-content/uploads/aaig-logo.jpg?w=500&ssl=1 500w, https://i0.wp.com/www.tonex.com/wp-content/uploads/aaig-logo.jpg?resize=300%2C103&ssl=1 300w” sizes=”(max-width: 500px) 100vw, 500px” data-recalc-dims=”1″ />

FMEA techniques are considered as a quality improvement tool. One of the reasons why FMEA has gained interests in recent years is because of automotive industry and implementing ISO/TS 16949. However, other industries such as aerospace, pharmaceutical, and electronics can benefit from such practice as a risk analysis tool and to increase the quality of their products. One of the beauties of this technique is its simplicity. Quality improvement tools are often made of complicated statistical analysis. Such simple yet sufficient and effective quality technique can save costs for the organization.

Learn about:

  • What Design Failure Mode and Effects Analysis (DFMEA) is
  • How Design Failure Mode and Effects Analysis (DFMEA) is related to Failure Mode and Effects Analysis (FMEA) and Process Failure Mode and Effects Analysis (PFMEA)
  • Benefits of Design FMEA
  • How to uncover opportunities to prevent failure proactively prior to the failures
  • How to collect data and information as part of DFMEA Pre-Work
  • How to use DFMEA to investigate and treat risk as actual failure including high severity Failure Modes
  • Design Failure Mode and Effects Analysis (DFMEA) process and tools
  • Learn about Design FMEA input and output including RPN, severity, occurrence, and detection rankings
  • Learn about Requirements, Potential Failure Modes, Effects of Failure and Severity Ranking, Causes, Prevention Controls, Occurrence and Class Column, Detection Controls, calculating the Risk Priority Number (RPN) and more
  • Select an Effective DFMEA Cross Functional Teams (CFTs) in your organization
  • Analyze your process and plan Cross Functional Teams (CFTs) activities and control
  • Plan Design Verification Plan & Report (DVP&R)
  • Map design reviews to FMEA Outputs
  • Use problem solving activities such as 8D to DFMEA input and output
  • Use Design of Experiments (DOE) in conjunction with DFMEA
  • Use other tools such as Why-Why, Fishbone Diagrams, Fault Tree Analysis (FTA), 8D, DOE to enhance your Design FMEA activities

Learn how to map Design FMEA Detection to the input into the Design Verification Plan & Report (DVP&R)

TONEX DFMEA Training Methodology

Design FMEA training includes many in-class activities including hands on exercises, case studies and workshops. During the Design FMEA workshops, students bring in their own design work and issues and through our coaching, develop their own Design FMEA.

The DFMEA training course will also address the relationship between FMEA process and FTA, DVP&R, and control plans. This course not only is conducted via lecture but also involves trainees in in-class activities. Students will experience designing and developing a mocking FMEA and risk analysis in the class.

Audience

The DFMEA training is a 2-day course designed for:

  • Engineers, scientists, and managers involved with manufacturing
  • Production and manufacturing team
  • Product design personnel
  • Reliability, testing, and quality team members
  • R&D personnel
  • Product and process assurance people
  • Assembly personnel

Objectives

Upon completion of this seminar, the attendees are able to:

  • Explain the concept and the purpose of Failure Mode and Effects Analysis (FMEA)
  • Discuss the benefits, requirements, and goals of FMEA
  • Decide when to use Design FMEA and when Process-FMEA
  • Discuss the steps and process of the FMEA
  • Gather up an FMEA team
  • Define the Design FMEA scope
  • Conduct all the steps of Design FMEA
  • Conduct the ranking scales for Severity, Occurrence, and Detection
  • Choose the appropriate technology methods to use as supplement to their DFMEA action plan
  • Make the Design FMEA into an active document
  • Develop a Control plan based on Design FMEA
  • Determine corrective actions in order to develop a more correct FMEA

Outline

Overview of FMEA and DFMEA/Design FMEA

  • Introduction to Failure Mode and Effects Analysis (FMEA)
  • Definition of FMEA
  • How FMEA works
  • Why and where using FMEA
  • System/Subsystem/component Design FMEA
  • Manufacturing and Assembly Process FMEA
  • Machinery and Equipment FMEA (Logistics Support)

Purpose of an FMEA

  • Identifying potential risks
  • Prioritizing the risks
  • Developing an action plan to reduce the risks

Design-FMEA vs. Process-FMEA

  • What is DFMEA?
  • What is PFMEA?
  • Difference between DFMEA and PFMEA?
  • When to use which?
  • Special features (critical and significant)
  • Cooperation on special features
  • Characteristics as inputs to PFMEA

Principles of DFMEA/Design-FMEA 

  • What Is A Design FMEA?
  • Identifying potential or known failure modes
  • Corrective and preventive actions
  • Disciplined analysis of the product/system design
  • Design-based failure modes
  • Design FMEA steps and flow
  • Examples
  • DFMEA Development Methodology
  •  Scope
  • Clarify your scope
  • How to use the DFMEA Scope Worksheet
  •  Procedure
  • Step-by-step directions of a Design FMEA
  • How to use the FMEA Analysis Worksheet
  • How to customize the Severity, Occurrence, and Detection Ranking Scales
  • Failure Mode Avoidance FMA /FPA Failure Prevention Analysis
  • Team structure and rules for efficiency – cross functional teams
  • Control Plan
  • Some tips on DFMEA

Design FMEA Relations to Process-FMEA

  • Scope
    • Clarify your scope
    • How to use the PFMEA Scope Worksheet
  • Procedure
    • Step-by-step directions of a PFMEA
    • How to use the FMEA Analysis Worksheet
    • How to customize the Severity, Occurrence, and Detection Ranking Scales
  • Control Plan
  • Some tips on PFMEA

Design FMEA Training Hands-on and In-Class Activities

  • 3 Labs
  • 2 Workshops
  • 1 Group Activity

Sample  Design FMEA Activity Workshop

  • How to complete the Design FMEA Template (TONEX’s DFMEA Template)
  • Tools to extract product functions
  • Disusing and analyzing potential Failure Modes
  • Brainstorming and identifying potential Failure Effects
  • Disusing and determining the Severity of the Effect
  • Analyzing and identifying Potential Cause(s) of the Failure Mode
  • Determining the Probability of Occurrence of the Failure Mode
  • Identifying Design Verifications techniques for the Causes
  • Determining the Probability of Non-Detection of the Failure Mode
  • Prioritizing risks based on Risk Priority Number (RPN)
  • Corrective and Preventive Actions
  • Techniques to prioritizing Actions Based on the RPN
Internet of Things Training, IoT @ TONEX Plano Training Site
Oct 13 @ 9:00 am – Oct 14 @ 4:00 pm
Print Friendly, PDF & Email

The Internet of Things Training, IoT Training by TONEX

The Internet of Things Training Course covers What the IoT is about, technology trends, deployments and convergence. Learn how to work with Building Connected Devices.

The Internet of Things Training Course attendees will learn about the dynamics of the IoT markets, technology, trends, planning, design and the convergence of platforms and services, with a special focus on the product design, architecture and implementation.

This is a fundamental IoT course covering the technologies behind the Internet of Things and connected devices.

Course Content

What is the Internet of Things (IoT)?

  • Concepts and Definitions of The Internet of Things (IoT)
  • History  of IoT
  • Applications
  • IoT standards
  • Requirements
  • Functionalists and structure
  • IoT enabling technologies
  • IoT Architecture
  • Major component of IoT
  • Hardware, sensors, Systems-on-a-Chip, firmware, device drivers, application software, connectivity, cloud, and security
  • Role of wired and wireless communication
  • IoT communication and networking protocols
  • IoT services and applications
  • Security
  • Cloud Computing and the Internet of Things
  • Semantic Web 3.0 Standard for M2M and IoT
  • IoT Platforms
  • Challenges of adapting the concepts

Overview of IoT  connectivity methods and technologies

  • wireless 101
  • RF 101
  • ZigBee
  • RFID
  • Bluetooth LE or Bluetooth Smart Technology
  • IEEE 802.15.4, IEEE 802.15.4e, 802.11ah
  • Relay Access Point (AP)
  • Grouping of stations
  • Target Wake Time (TWT)
  • Speed Frame Exchange
  • Sectorization
  • GSM, CDMA, GPRS,3G, LTE, small cells, SATCOM
  • Sensors and sensor networks
  • Serial communication
  • Power consumption and optimization
  • MIPI, M-PHY, UniPro, SPMI, BIF,  SuperSpeed USB Inter-Chip (SSIC), Mobile PCIe (M-PCIe) and SPI
  • Wired connectivity
  • IPv4/IPv6
  • Ethernet/GigE
  • Real-time systems  and embedded software
  • Cloud computing and storage
  • Augmented Reality

Evaluation of of The Internet of Things

  • Platforms
  • Mobile integration
  • Deployment
  • Data Visualization
  • Convergence with Social Networks
  • Value chain and Business models
  • User centric cloud based services
  • Analytical Hierarchy Process for technology selection
  • End-to-end security
  • Integration with IT systems
  • Cost/benefit constraints
  • End-to-end compatibility
  • Application Architecture
  • Lifecycle solution management
  • Real-time response and delay

the internet of things training

IEEE SA IoT: It is predicted that 50 to 100 billion things will be electronically connected by the year 2020. This Internet of Things (IoT) will fuel technology innovation by creating the means for machines to communicate many different types of information with one another. With all objects in the world connected, lives will be transformed. But the success of IoT depends strongly on standardization, which provides interoperability, compatibility, reliability, and effective operations on a global scale.

Recognizing the value of IoT to industry and the benefits this technology innovation brings to the public, the IEEE Standards Association (IEEE-SA) has a number of standards, projects and events that are directly related to creating the environment needed for a vibrant IoT.

Nov
21
Mon
MIL-1553 Training | MIL-STD-1553 Training @ TONEX Plano Site
Nov 21 @ 9:00 am – 4:00 pm
Print Friendly, PDF & Email

MIL-1553 Training Course Description

Why choose TONEX for your MIL-1553 (MIL-STD-1553) Training?

MIL-1553 training course by TONEX covers MIL-STD-1553 protocol architecture, functional characteristics, technical components, design, operations, products, testing and trends.

MIL-1553 Training<img class=”alignnone size-medium wp-image-3423″ src=”https://i0.wp.com/www.tonex.com/wp-content/uploads/f18_32-250×200.jpg?resize=250%2C200″ alt=”MIL-1553 Training” srcset=”https://i2.wp.com/www.tonex.com/wp-content/uploads/f18_32.jpg?resize=250%2C200&ssl=1 250w, https://i1.wp.com/www.tonex.com/wp-content/uploads/f18_32.jpg?w=550&ssl=1 550w” sizes=”(max-width: 250px) 100vw, 250px” data-recalc-dims=”1″ />

MIL-STD-1553, MIL-STD-1553, or AS15531 is a military standard, Digital Time Division Command/Response Multiplex Data Bus, published by DoD that defines the mechanical, electrical and functional characteristics of a serial data bus. It features a dual redundant balanced line physical layer, a (differential) network interface, time division multiplexing, half-duplex command/response protocol and up to 31 remote terminals (devices).

MIL-STD-1773 is a version of MIL-STD-1553 using optical cabling.

MIL-1553 Training

Learning Objectives

Upon completion of this course, the attendees are be able to:

  • Understand MIL-STD-1553 protocol, architecture and functional characteristics
  • Explain the architecture of MIL-STD-1553
  • Sketch the logical and physical architecture of MIL-STD-1553
  • Describe MIL-STD-1553 mechanical, electrical and functional characteristics
  • Explain technical components, design, operations and, testing aspects of MIL-STD-1553
  • Explore
  • Describe the key cyber security concepts in MIl-STD-1553
  • List the requirements and capabilities of MIL-STD-1553 security
  • Explore vulnerabilities and weaknesses of MIL-STD-1553 applied to aircrafts and weapons

Audience

Managers, applications developers, integrators, sales and marketing professionals involved in managing, marketing, selling, developing, testing or integrating MIL-STD-1553 applications and systems.

Course Content

Introduction to MIL-STD-1553

  • MIL-STD-1553A
  • MIL-STD-1553B
  • Notice 1 and Notice 2
  • MIL-STD-1553 General Requirements
  • MIL-STD-1553 Standards updated by SAE.org

MIL-STD-1553 Data bus Overview

  • Multiplexing in MIL-STD-1553
  • MIL-STD-1553 Hardware Components
  • Terminal Operation
    • Data Bus Controller (BC)
    • Remote Terminal (RT)
    • Data Bus Monitor (BM)

MIL-STD-1553 Hardware Platforms

  • Hardware Characteristics
    • Data Bus Cable
    • Data Bus Coupling
    • Terminal I/O Characteristics
    • Redundant Data Bus Requirements

MIL-STD-1553 Protocol

Command word, mode codes, mode command formats, data word, status word, message error bit.

    • Message Formats
    • Command Word
    • Data Word
    • Mode Codes
    • Status Word
    • Errors

Connecting the Bus

  • Terminal Electrical Characteristics
    • MIL-STD-1553 Cabling
    • MIL-STD-1553 Coupling
    • Direct Coupling
    • Transformer Coupling
  • MIL-STD- System Design
  • Data Bus Topology and Redundancy
  • Data Bus Control and Partitioning
  • Bus Loading

MIL-STD-1553 System and Software Design

  • MIL-STD-1553 Systems Engineering Principals
  • MIL-STD-1553 Requirement Analysis
  • System and Software Design
  • Data Bus Topology and Control
  • Robustness, Partitioning & Redundancy
  • Bus Loading and Bus Controller Software
  • Synchronous and Timing

MIL-STD-1553 Testing Procedures

  • Testing and Verification
  • Test and Operating Requirements
  • Developmental Testing
  • Design Verification
  • Production Testing
  • Systems Integration Testing
  • Field & Operational Testing
  • Integration Issues

MIL-STD-1553 Databus Specification Interpretation

  • MIL-STD-1553 Products and Vendors
  • MIL-STD-1553 Interface Hardware and Software
  • Advanced MIL-STD-1553 UHF/VHF Radio
  • High-Speed MIL-STD-1760 for the aircraft/weapon interface
  • MIL-STD-1760C
  • MIL-STD-1394b, a military version of Firewire
  • Enhanced Performance MIL-STD-1553

Introduction to MIL-STD-1773

  • Media Components and Design
  • Testing
  • Installation and Maintenance
  • Enhancements and Optimization

MIL-STD-1553 Security

  • MIL-STD-1553 Network and System Security
  • Security Definitions
  • Equipment originating or terminating classified plain text language
  • Wirelines, equipment, and the interconnecting lines
  • wirelines, components, equipment, and systems
  • Encrypted or unclassified signals
  • lectrical circuits components, equipment, systems
  • Classified plain language data in electrical form
  • nvestigations and studies of compromising emanations
  • TEMPEST
  • System Security Policy
  • MIL-STD-1553 design (system, hardware, and software)
  • Operational, maintenance, and logistic
  • Security policy of the aircraft, ship, or system

Labs, Project and Interactive Sessions

Dec
12
Mon
Integrated Logistics Support Training ILS @ Plano, TX
Dec 12 @ 9:00 am – Dec 15 @ 4:00 pm
Print Friendly, PDF & Email

Integrated Logistics Support Training

Integrated Logistics Support Training covers many aspects of unified and iterative approach to the management and technical activities for operational and materiel requirements and design specifications for logistics support.  Integrated Logistics Support (ILS) is the management and technical process to integrate needs for logistic  support  into the design of a system or equipment  throughout its life cycle.

Learn about the process by which all elements of logistic support are planned, acquired, tested, and provided in a timely and cost-effective manner. Learn how integrated logistics support define the support requirements related to system design and development and acquiring the required support.

Learn about Integrated Logistic Support services including:

  • Maintenance Planning
  • Manpower and Personnel
  • Early Consideration of Manpower Requirements
  • Technical Data
  • Supply Support
  • Training and Training Support
  • Facilities
  • System Configuration Identification & Validation
  • Configuration Item / Technical Information (CI-TI) Database Development
  • System Failure Analysis
  • Preventative Maintenance / Supportability Analysis
  • Troubleshooting and Repair
  • Business Process and Workflow Automation
  • Software/Database Development

Course Content:

Integrated Logistics Support (ILS) Framework

  • Integrated product support
  • Integrated product support elements
  • Integrated product support process
  • Integrated product support process in the acquisition strategy
  • Integrated Product Support development
  • Pre-materiel acquisition
  • Materiel Solutions and Analysis Phase
  • Technology Maturation and Risk Reduction Phase
  • Engineering and Manufacturing Development Phase
  • Production and Deployment Phase
  • Operations and Support Phase

Product Support Management

  • Strategic Approach and Risk Management,
  • Performance based product support strategies
  • Legacy materiel
  • Supportability risk management
  • Organization
  • Product support manager
  • Product support integrator
  • Product support provider
  • Product support management integrated product team
  • Army integrated product support executive committee
  • Integrated Product Support Management of Joint Programs
  • Joint programs and Joint logistics
  • Lead Service product support managers
  • Implementing Performance Based Product Support Strategies,
  • Metrics
  • Performance-based arrangements
  • Section V
  • Contract Performance-based Arrangements,
  • Requirements
  • Public-private partnerships
  • Contractor logistics support (nonpublic-private partnership support)
  • Contract management
  • Planning
  • Reprocurement

Design

  • Design interface
  • Design for energy efficiency
  • Maintenance task design parameters
  • Condition-based maintenance plus in the design
  • Design for manpower and personnel integration
  • Design for standardization and interoperability
  • Design for environment, safety, and occupational health
  • Design for corrosion resistance
  • Supply Management Army-Operations and Support Cost Reduction Program
  • Commercial and nondevelopmental items market investigation

The Impact of Maintenance Planning

  • Maintenance concepts and requirements for the life of the system
  • Levels of repair
  • Repair times
  • Testability requirements
  • Support equipment needs
  • Manpower and skills required
  • Facilities
  • Site activation

Integrated Product Support Analysis and Software Tools

  • Requirement
  • Product support analysis and logistics product data
  • Analysis of product support alternatives
  • Life cycle cost analysis
  • Reliability centered maintenance analyses, failure mode, effects, and criticality analysis, and fault tree analysis
  • Level of repair analysis
  • Modeling and simulation
  • Core logistics determination of applicability and core logistics analysis
  • Core depot assessment
  • Depot source of repair analysis
  • Provisioning analysis
  • Post-fielding support analysis
  • Integrated Product Support software tools

Technical Data and Configuration Management

  • Technical data
  • Configuration management
  • Logistics product data
  • Provisioning technical documentation
  • Equipment publications
  • Maintenance allocation chart
  • Operator manuals
  • Maintenance manuals
  • Repair parts and special tools list
  • Depot maintenance work requirements and national maintenance work requirements

Integrated Product Support Planning

  • Integrated product support planning considerations
  • Life Cycle Sustainment Plan
  • Life Cycle Sustainment Plan content
  • Maintenance support planning
  • Logistics footprint
  • Provisioning plan
  • Depot maintenance partnerships
  • Recapitalization program
  • Depot Maintenance Support Plan
  • Software support planning
  • Fielded software support
  • Computer Resources Life Cycle Management Plan
  • Resource planning
  • Operating and support cost
  • Affordability
  • Cost as an independent variable (cost consciousness)
  • Program cost estimate
  • Funding appropriations
  • Replaced System Sustainment Plan
  • System Demilitarization and Disposal Plan
  • Materiel fielding planning
  • Post-production support planning
  • Preservation and storage of tooling for Major Defense Acquisition Programs

Force Development Documentation and Training Systems

  • Equipment and Personnel
  • Force development documentation
  • Line item numbers
  • Basis of issue plan feeder data
  • Basis of issue plan
  • Manpower requirements criteria
  • Major item system map
  • Training Systems and Devices,
  • Pre-acquisition
  • Acquisition
  • Training system and training device fielding
  • Training system and training device support
  • Post-production software support
  • New equipment training

Environment, Safety, and Occupational Health

  • Environmental impact
  • Environment, safety, and occupational health considerations
  • Hazardous materials

Test and Evaluation

  • Supportability test and evaluation
  • Product support package
  • Logistics demonstration

Integrated Product Support Program Reviews and Reporting

  • Milestone Decision Review
  • Type Classification
  • Materiel Release
  • Supportability Assessment
  • Independent Logistics Assessment
  • Department of the Army Integrated Product Support Reviews
  • Sustainment reviews
  • Integrated Product Support reporting
  • Internal Control Evaluation for the Integrated Product Support Program
  • Life Cycle Sustainment Plan mandatory annexes
  • Life Cycle Sustainment Plan Development, Coordination, and Approval Process
Jan
9
Mon
ONF Certified SDN Associate Certification | OCSA Certification @ Plano Office
Jan 9 @ 9:00 am – Jan 10 @ 4:00 pm
Print Friendly, PDF & Email

ONF Certified SDN Associate certification (OCSA) Training

ONF Certified SDN Associate certification (OCSA) training course by TONEX is a preparation for ONF Certified SDN Associate (OCSA-110).

ONF Certified SDN Associate (OCSA) is awarded upon successful completion of the exam arranged by ONE.

TONEX ONF Certified SDN Associate (OCSA) certification exam preparation training course that attests and formally certifies  successful candidates with  vendor-neutral conceptual knowledge of the major domains of networking practices that support the theory and practice of Software Defined Networking (SDN).

ONF Certified SDN Associate certification<img class=”aligncenter wp-image-10361″ src=”https://i1.wp.com/www.tonex.com/wp-content/uploads/ONF-certified-associate.png?resize=192%2C140″ alt=”ONF Certified SDN Associate certification” srcset=”https://i1.wp.com/www.tonex.com/wp-content/uploads/ONF-certified-associate.png?w=861&ssl=1 861w, https://i0.wp.com/www.tonex.com/wp-content/uploads/ONF-certified-associate.png?resize=276%2C200&ssl=1 276w, https://i1.wp.com/www.tonex.com/wp-content/uploads/ONF-certified-associate.png?resize=768%2C557&ssl=1 768w, https://i1.wp.com/www.tonex.com/wp-content/uploads/ONF-certified-associate.png?resize=640%2C464&ssl=1 640w” sizes=”(max-width: 192px) 100vw, 192px” data-recalc-dims=”1″ />

Learn about ONE-Certified SDN Associate certification (OCSA)  Domains:

  • Basic SDN Concepts
  • OpenFlow Basics
  • SDN Architecture and Ecosystem
  • SDN Open Source

Who Should Attend ONE-Certified SDN Associate certification (OCSA) training course and Intended Exam Audience

  • SDN Sales Engineers
  • Business Development Managers
  • Product Managers
  • Product Marketing
  • Manager/Director for a Network/IT Group
  • Network Technicians (Entry Level)
  • IT Analysts (Entry Level)
  • System Administrators (Entry Level)
  • Consultant/Professional Services Engineer
  • Students and Researchers
  • Sales Representatives

Training Agenda

Overview of Networking Concepts

  • OSI and TCP/IP models
  • Fundamental elements of networking
  • Connection-oriented vs. connectionless protocols
  • Ethernet networks
  • Collision domains and broadcast domains
  • Routers vs. switches
  • Layer 3/2 addressing
  • Layer 2 addresses
  • Layer 3 / IP addressing, including subnet masks
  • Address resolution
  • Address Resolution Protocol (ARP)
  • Overview of Routing Protocols
  • RIP, OSPF, ISIS, BGP
  • Optical network fundamentals
  • SONET/SDH, DWDM and OTN
  • IP Network Services
  • DHCP, DNS, ARP, NAT, ICMP
  • IPv4 and IPv6 fundamentals
  • Packet Filtering

Fundamental characteristics of SDN

  • History of SDN
  • What is SDN?
  • SDN Value Proposition
  • Control and forwarding planes
  • SDN Use Cases
  • Data Center applications and use cases
  • Campus Networks applications and use cases
  • Service Providers applications and use cases
  • Enterprise applications and use cases
  • Mobile Networks applications and use cases

Characteristics of an SDN Network

  • Plane Separation
  • Simplified Forwarding Element
  • Centralized Control
  • Network Automation
  • Virtualization
  • Openness
  • Interoperability

SDN Devices

  • Controllers
  • Switches
  • Orchestration
  • API’s
  • Overlay Networking Abstractions

SDN Architecture

  • Traditional Network Architectures vs. SDN
  • SDN architectural components
  • Standards bodies
  • Controller design
  • API’s and applications.
  • SDN Layers
  • Northbound and Southbound API’s
  • East/West API’s
  • SDN Security and Availability
  • Packet and Optical Integration methods
  • SDN Migration Strategies
  • Hybrid Mode Switches

SDN Ecosystem

  • Standards Bodies and Industry alliances
  • Network Operators and Enterprises
  • Network Equipment Manufacturers
  • Software vendors
  • Academic and Industry research institutions and labs
  • Open Source Initiatives

Who is the ONF and what do they do?

  • Purpose of Open Networking Foundation (ONF)
  • Structure
  • Technical Working Groups
  • Open Source Software Development
  • Activities and Initiatives
  • Controller Placement and Redundancy
  • SDN Applications (service chaining, virtualized network functions, analytics)

What is OpenFlow® ?

  • OpenFlow® Protocol operations
  • Packet types and contents
  • Communications between controller/switch
  • Channel/communication/session establishment
  • Message Types
  • Basic Operation
  • Packet Matching
  • OpenFlow® versions
  • Proactive vs Reactive Flows
  • Statistics and Counters
  • Steps in setting up a flow
  • Policy Enforcement
  • OpenFlow® Management and Configuration Protocol
  • OF-Config, OAM, OFDPA, OVSDB
  • Flow Table Entry Format
  • Flow Timers
  • Pipeline Processing
  • Match Types
  • Match Actions

Open Source SDN

  • Identify key open source projects in the SDN Ecosystem.
  • OpenFlow® Agents
  • Indigo
  • Linc
  • OVS
  • CPqD/ONF Driver (aka “libFluid”)
  • OpenFlow® Controllers
  • NOX
  • POX
  • ONOS
  • ODL
  • Floodlight
  • RYU
  • Utilities and Tools
  • FlowSim
  • Mininet
  • Of DPA
  • OF Test
  • Wireshark
  • Avior
  • Open Source SDN Distributions (OSSDN Atrium, etc.)
  • Open vSwitch
  • Orchestration Systems
  • Open Source Initiatives (OPNFV, OCP, ODCA, Open Config)
Feb
13
Mon
Capacity Planning Training Boot Camp @ Dallas, TX
Feb 13 @ 9:00 am – Feb 16 @ 4:00 pm
Print Friendly, PDF & Email

What will you learn at the TONEX Capacity Planning Training Course Boot Camp?

Capacity planning training course bootcamp provides the details of capacity planning as a repeatable process for IT infrastructure, cloud computing, and data centers. It’s about understanding service levels and resource usage and aligning capacity requirements with business demands with trending and forecasting.

Feb
21
Tue
Software Engineering Training-Crash Course @ Zurich, Switzerland
Feb 21 @ 9:00 am – Feb 24 @ 4:00 pm
Print Friendly, PDF & Email

Software Engineering Training-Crash Course

Software engineering training teaches you the advanced software engineering topics and provides you with the discipline to apply engineering and computer science concepts in the development, maintenance, usability and dependability of the software.

Software Engineering<img class=”aligncenter wp-image-10227 ” src=”https://i0.wp.com/www.tonex.com/wp-content/uploads/Software-Reliability-Training-2.jpg?resize=367%2C367″ alt=”Software Engineering” srcset=”https://i1.wp.com/www.tonex.com/wp-content/uploads/Software-Reliability-Training-2.jpg?w=451&ssl=1 451w, https://i2.wp.com/www.tonex.com/wp-content/uploads/Software-Reliability-Training-2.jpg?resize=200%2C200&ssl=1 200w” sizes=”(max-width: 367px) 100vw, 367px” data-recalc-dims=”1″ />

TONEX as a leader in teaching industry for more than 15 years is now announcing the software engineering training which helps you to recognize the software design software development, software testing, software maintenance and software management.

TONEX has served the industry and academia with high quality conferences, seminars, workshops, and exclusively designed courses in systems engineering area and is pleased to inform professional fellows about the recent comprehensive training on software engineering.

This course covers variety of topics in software engineering area such as: introduction to software engineering, software investigation and analysis, software design, software implementation and management, requirement analysis and engineering, software development process life cycle, and software development processes. Furthermore, you will be introduced to socio-technical systems, software system architecture, dependability and security engineering, software project planning and management, dependability and security assurance, software system configuration management, software system quality management, agile software system engineering, software verification and validation, software construction and distributed software systems.

By taking the software engineering training by TONEX, you will learn about present software engineering concepts as well as principles in parallel with the software development life cycle.

This training will begin with an introduction to software engineering, giving you a definition of the body of knowledge, as well as a discussion of the main methodologies of software engineering. The next step is to introduce the software development life cycle (SDLC) followed by software modeling using unified modeling language (UML), a standardized general purpose languages used to create visual models of object oriented software. Moreover, you will learn about the main phases of SDLC; requirements gathering, requirement analysis, design, coding, and testing.

If you are an IT professional who specialize in software engineering, you will benefit the presentations, examples, case studies, discussions, and individual activities upon the completion of the software engineering training and will prepare yourself for your career.

Learn about artifacts and approaches to develop the software systems, software engineering metrics, distributed, configurable and object oriented software. Moreover, you will learn about alignment of software systems with overall system design, software unique aspects of planning, requirements, architecture analysis, implementation, testing and maintenance, important of software engineering constraints, security and technology trends in software engineering.

Our instructors at TONEX will help you to understand different software engineering and development processes. Furthermore, you will be introduced to the different examination methods and tools in software engineering.

Finally, the software engineering training will introduce a set of labs, workshops and group activities of real world case studies in order to prepare you to tackle all the related software engineering challenges.

Audience

Software engineering training is a 4-day course designed for:

  • Software developers want to acquire state of the art knowledge of software engineering
  • Software engineers need to know everything about software engineering
  • Business analysts having projects in software engineering
  • System engineers
  • Project managers of software projects
  • System safety managers
  • Software maintainers
  • Software configuration managers
  • Software programmers
  • Software Managers and lead technical staff
  • Any IT professionals need to improve their knowledge of software engineering

Training Objectives

Upon completion of the software engineering training course, the attendees are able to:

  • Understand the systems engineering principles applied to design, development and integration of software intensive systems
  • Learn about systems engineering, software engineering and software development with practical applications
  • Explain the basic structure of designing and implementing software systems from analysis, verifications and validations
  • Understand the software engineering life cycle models with their significance and objectives
  • Understand how to reduce the software faults and failures to an acceptable margin using rigorous testing and inspection
  • Conduct technical software performance measurements and defining deterministic factors in successful software system engineering
  • Learn how to make plans for software systems, control the changes and analyze to improve the process
  • Learn how to apply practical methods to improve software project performance in design process

Training Outline

Software engineering training course consists of the following lessons, which can be revised and tailored to the client’s need:

Introduction to Software Engineering

  • Role of Software Engineer
  • Definitions and Concepts
  • Information Level in the Organization
  • Software Life Cycle
  • Categories of Software
  • Alternate Software Acquisition Approaches
  • Software Engineering Paradigms
  • Desirable Features of Computer Software
  • Summary and Concluding Remarks
  • Software Development Life Cycle (SDLC)
  • Software Modeling; Unified Modeling Language (UML)

Software Investigation and Analysis

  • Project Selection and Initial System Requirements
  • Project Selection
  • Problem Definition
  • Proposed Solution
  • Scope and Objectives of the System
  • System Justification
  • Feasibility Analysis Report
  • Alternate Approach to Feasibility Analysis
  • Summary of System Inputs and Outputs
  • Initial Project Schedule
  • Project Team
  • Requirement Specification
  • Contents of the Requirement Specification
  • Documenting the Requirements
  • Requirement Validation
  • Proceeding
  • Presenting the Requirements Specification
  • Information gathering
  • Rationale for Information Gathering
  • Interviews
  • Questionnaires and Surveys
  • Observation and Document Review
  • Prototyping
  • Brainstorming and Mathematical Proof
  • Object Identification
  • Communicating via diagrams
  • Traditional System Flow Charts
  • Innovation; Topology Chart
  • Data Flow Diagrams
  • Object Flow Diagrams
  • Contemporary Diagramming Techniques
  • Program Flow Chart
  • decision models for system logic
  • Structured Language
  • Decision Tables
  • Decision Trees
  • Decision Techniques to Use
  • Decision Techniques versus Flowcharts
  • System Rules
  • Project management aids
  • PERT and CPM
  • The Gantt Chart
  • Project Management Software

Software Design

  • Software Design Process
  • Design Strategies
  • Architectural Design
  • Interface Design
  • Software Design and Development Standards
  • The Design Specification
  • Database Design
  • Approaches to Database Design
  • Overview of File Organization
  • User Interface Design
  • Types of User Interfaces
  • Steps in User Interface Design
  • Output Design
  • Output Methods versus Content and Technology
  • Input Design
  • Operation Design
  • Categorization of Operations
  • Essentials of Operation Design
  • Informal Operation Requirements
  • Formal Specifications

Software Implementation and Management

  • Software Implementation Issues
  • Software Operating Environment
  • Installation of the System
  • Code Conversion
  • Change Over
  • Software Marketing
  • Standards and Quality Assurance
  • Management of Targets and Financial Resources
  • Leadership and Motivation
  • Software Management
  • Management Responsibilities
  • Management Styles
  • Software Maintenance
  • Legacy Systems
  • Software Integration
  • Software Re-engineering
  • Developing the Job Description
  • Maintaining the Desired Environment
  • Preserving Accountability
  • Grooming and Succession Planning
  • Software Economics
  • Software Cost
  • Software Value
  • Assessing Software Productivity
  • Estimation Techniques for Engineering Cost
  • Organizing Effective Management
  • Functional Organization
    Parallel Organization
  • Hybrid Organization
  • Organization of Software Engineering Firms

Requirements Analysis and Engineering

  • Introduction to Requirements Analysis
  • Systems Engineering Process Inputs
  • Types of Requirements
  • Requirements in Waterfall Model
  • Software Requirement Specification (SRS)
  • Elicitation Techniques
  • Functional Requirements
  • Non-Functional Requirements
  • Domain Requirements
  • Structured Analysis
  • Entity-Relationship Approach
  • Object Oriented Analysis
  • Class and Object Identification
  • The Dynamic Model
  • Requirements Specifications
  • Requirements Documentations
  • Requirements Verification and Negotiation
  • Requirements Validation

Software Development Process Life Cycle

  • Waterfall Development
  • Prototyping
  • Incremental Development
  • Iterative and Incremental Development
  • Spiral Development
  • Rapid Application Development
  • Agile Development
  • Lightweight Methodologies
  • Code and Fix
  • Process Meta-Models
  • Formal Methods

Software System Development Processes

  • Unified Software Development Process (USDP)
  • Incremental Process
  • Iterative Process
  • Architecture Centric
  • Use-Case Driven and Risk Confronting
  • USDP Life Cycle
  • Process Workflows
  • Supporting workflows
  • Inception Phase
  • Elaboration Phase
  • Construction Phase
  • Transition Phase
  • Lifecycle Objectives
  • Lifecycle Architecture
  • Unified Modeling Language

Socio-Technical Systems

  • Socio-Technical System Stack
  • Socio-Technical System Layers
  • Equipment
  • Operating system
  • Communications and Data Management
  • Application Systems
  • Business Processes
  • Organizations
  • Society
  • Socio-Technical System Characteristics
  • Emergent Properties
  • Non-deterministic
  • Complex Relationships with Organizational Objectives
  • Socio-Technical System Design Approaches
  • Design Challenges
  • Socio-Technical Systems Engineering

Software System Architecture

  • Software Architecture Concepts
  • Architectural Elements
  • Stakeholders
  • Architectural Descriptions
  • Architectural Views
  • Architectural Perspectives
  • Role of Software Architects
  • Architecture Definition Process
  • Architectural Styles
  • Pipe and filter
  • Object Oriented
  • Event Based
  • Layered
  • Repositories
  • Process Control
  • Distributed Architectures
  • Architectural Analysis
  • Domain Specific Design
  • Middleware
  • Model Driven Architecture
  • Aspect Oriented Programming

Dependability and Security Engineering

  • Security Engineering
  • Usability and Psychology
  • Protocols
  • Access Control
  • Cryptography
  • Distributed Systems
  • Economics
  • Multilevel Security
  • Multilateral Security
  • Physical Protection
  • Monitoring and Metering
  • Security Printing
  • Biometrics
  • Emission Security
  • Network Attack and Defense
  • API Attacks
  • Physical Tamper Resistance
  • Telecom System Security
  • System Evaluation and Assurance
  • Managing the Development of Secure Systems

Software Project Planning and Management

  • Project Management Framework
  • Project Initiation
  • Project Planning
  • Project Monitoring
  • Software Development Plan
  • Project Management Plan and Software Development Management
  • Pitfalls in Software Development Management Plan and Project Management Plan
  • Scope Management
  • Software Time Management
  • Software Cost Management
  • Software Risk Management
  • Software configuration Management
  • Software Release and Deployment Management
  • Software Quality Management

Dependability and Security Assurance

  • Managing Risks from Vulnerable Software
  • Software Security Vulnerabilities
  • Sources of Source Code Security Vulnerabilities
  • Framework for Software Security Assurance
  • Risk Assessment
  • Vulnerability Management
  • Security Standards
  • Ongoing Assessment and Assurance
  • Roles and Responsibilities
  • Vulnerabilities in Web Applications
  • Security, Reliability and Practices
  • Roles and Responsibilities for Software Security Assurance

Software System Configuration Management

  • Software Configuration Management Definition
  • Software Configuration Item
  • Software Configuration Management Directory
  • Disciplines in Software Configuration Management
  • Software Configuration Management for Different Software Environment
  • Automated Tools for Software Configuration Management
  • Software Configuration Management Planning

 Software System Quality Management

  • Software Quality Management
  • Fundamentals of Software Quality
  • Quality control and Reliability
  • Quality Management System
  • Defect Analysis
  • Software Quality Assurance
  • Statistical Software Quality Assurance
  • Software Reliability
  • Software Safety

Agile Software Systems Engineering

  • Principles of Agile Methods
  • Agile Method Applicability
  • Agile Methods and Software Maintenance
  • Plan Driven and Agile Development
  • Extreme Programming
  • System Engineering for Agile Software Development
  • Agile System Engineering Processes
  • Systems Engineering Agile Systems

Agile Software Development

  • Agile Process Philosophy
  • Agile Software Development Methodologies
  • Extreme Programming
  • Dynamic System Development Method
  • Adaptive Software Development
  • Crystal Methods
  • Scrum
  • XP
  • Agile Unified Process
  • Lean Software Development
  • Feature Driven Development
  • Business Benefits of Software Agility
  • Rational Unified Process (RUM)

Verification and Validation

  • Software Inspections
  • Design Reviews
  • Formal and Informal Reviews
  • Software Testing
  • Software Test Techniques
  • Software Test Tools
  • Software Demonstration
  • Software Prototyping
  • Software Simulation
  • Independent Verification and Validation

Software Construction

  • Code Complexity
  • Coding Process
  • Requirements for Coding
  • Assessing Code Quality
  • Developing Code Standards

Distributed Software Systems

  • Concept of distributed software
  • Distributed system characteristic
  • Resource sharing
  • Concurrency
  • Scalability
  • Fault tolerance
  • Transparency
  • Disadvantages of distributed software systems
  • Distributed system architectures
  • Multiprocessor architecture
  • Client server architecture
  • Distributed object
  • COBRA
  • Object request broker

 Hands-on and In-Class Activities

  • Labs
  • Workshops
  • Group Activities

Sample Workshops and Labs for Introduction to Software Engineering

  • Role of Software Case Study
  • Waterfall Model Example
  • Software Crisis for a Given Scenario
  • Plan Driven Software Development versus Agile Driven Development
  • Personal Health monitoring
  • Software Development Model Case Study
  • Requirement Development Experiment
  • Parking Garage Automation
  • Traffic Monitoring
  • Requirement Elicitation Case Study
  • Software Design Example
  • Restaurant Automation Example
  • Multiprocessor Traffic Control System Example
  • A Client Server ATM System
  • Software Performance Testing Case
  • Internet Banking System
  • Workshop on How to Write a Software Project Proposal
Mar
6
Mon
Reliability Engineering Principles for Managers @ Plano Office
Mar 6 @ 9:00 am – Mar 8 @ 4:00 pm
Print Friendly, PDF & Email

Reliability Engineering Principles Training for Managers Course Description

Reliability Engineering Training for Managers, covers  the basic principles, concepts, practical problem solving techniques, and a brief review of statistical calculations. Because this training is designed for non-engineers who often don’t have a strong background in math, the focus of training is mostly on principals of reliability engineering and problem solving practices and less on statistics and mathematical models. Reliability Engineering Principles (REP) Training hands-on training will assist you to enhance your business performance by cutting the costs associated with unreliability. REF training will teach you how to apply reliability tools to identify and resolve cost issues rather than functioning as technical miracles.

Reliability Engineering Principles Training<img class=”aligncenter wp-image-10241″ src=”https://i2.wp.com/www.tonex.com/wp-content/uploads/Reliabilityengineeringfinal-280×200.png?resize=381%2C276″ alt=”Reliability Engineering Principles Training” srcset=”https://i0.wp.com/www.tonex.com/wp-content/uploads/Reliabilityengineeringfinal.png?zoom=2&resize=381%2C276&ssl=1 762w, https://i1.wp.com/www.tonex.com/wp-content/uploads/Reliabilityengineeringfinal.png?zoom=3&resize=381%2C276&ssl=1 1143w” sizes=”(max-width: 381px) 100vw, 381px” data-recalc-dims=”1″ />

Learn About:

  • Mean time frame between failures events
  • TPM relationship with reliability principles
  • Analyzing reliability data
  • Weibull failure
  • Monte Carlo simulations
  • Pareto distributions
  • Fault tree analysis
  • Design review
  • Load/strength interactions
  • Sudden death and simultaneous testing
  • Reliability growth models and displays
  • Reliability strategies and standards
  • Reliability audits
  • Bathtub curves
  • Effectiveness: availability, reliability, maintainability, and capability
  • Weibull, normal, & log-normal probability plots
  • Decision trees merging reliability and costs
  • Critical items highly impacting safety/costs
  • Failure rate
  • Prediction
  • Availability vs. Reliability
  • MTTF, MTBF, and MTTR
  • FMEA
  • FMECA
  • FTA
  • RBD
  • QFD
  • Reliability testing strategies
  • Accelerated testing
  • Failure recording, analysis, and corrective action
  • Contracting for reliability
  • Management’s role in reliability improvements

TONEX REP Training Framework

  • Long on concepts and problem solving techniques, short on math and statistics
  • Fun, interactive, dynamic class
  • Including labs, group activities, and hands-on workshop

Audience

Reliability Engineering Principles Training is a 3-day course designed for:

  • Project managers
  • Business owners
  • Safety managers
  • Quality managers
  • Reliability managers
  • Production/design managers
  • Warranty analysts
  • Problem-solving team personnel
  • Asset reliability managers
  • Capacity and predictive maintenance managers

Training Objectives

Upon the completion of Reliability Engineering Principles training for non-engineers, attendees are able to:

  • Describe the bases, rationale, and concepts of reliability engineering
  • Use the most relevant probability distribution to measure model times to failure
  • Articulate the relationship between the time to failure distribution, the reliability function, and the hazard rate
  • Estimate reliability values from test data and identify confidence limits on the results
  • Use required tools to ensure a reliable product
  • Explain the differences between assessing the reliability of a fixable and non-fixable systems
  • Derive and sustain a strategic reliability engineering
  • Derive control protocols to reduce risks and increase asset use
  • Develop predictive strategies
  • Construct an efficient predictive maintenance process
  • Establish a root cause analysis procedure to reduce the wasted time, increase productivity, and a culture of continuous improvement

Course Outline

Overview of Reliability Engineering Principals

  • What are the reliability engineering principals?
  • Why reliability is important?
  • Impact of reliability on the system
  • Reliability dictionary
  • Why would you want to enhance reliability?
  • Reliability is art as well as science
  • Predictive techniques
  • Reliability improved system features
  • Availability
  • Maintenance management policies

Reliability Risk Assessments

  • Engineering techniques
  • Reliability hazard analysis
  • Failure mode and effects analysis (FMEA)
  • Fault tree analysis (FTA)
  • Reliability Centered Maintenance (RCM)
  • Load and material stress
  • Fatigue and creep analysis
  • Human error analysis
  • Manufacturing defect analysis
  • Reliability testing

Measuring Reliability

  • Requirements
  • The bathtub curve
  • Life distributions
    • Distribution functions
    • Particular life distributions
  • Modeling system reliability
    • Series systems
    • Active redundancy
    • M-out-of-N redundancy
  • Reliability prediction

Design for Reliability (DoE)

  • Life cycle
  • Reliability approaches
  • Top-down methods
  • Bottom-up methods

Reliability Engineering Actions

  • Maintenance Prevention
  • LCC Assessment
  • Positive Maintenance
  • Capital Equipment Replacement
  • Cost/effective estimation

Working with Reliability Engineering Tools

  • Attaining reliability associated data
  • Reliability indices
  • Decision trees
  • Availability concepts, effectiveness equation and costs
  • Probability plots
  • Bathtub curves
  • Pareto distributions and critical items lists
  • Reliability block diagrams
  • FMEA
  • FMECA
  • FTA
  • Design reviews
  • Vendor and parts control
  • Thermal analysis (TA)
  • Environmental stress screening (ESS)
  • Crow/AMSAA reliability growth models
  • Reliability strategies
  • Benchmarking reliability

Essential Principles of Reliability Investigation

  • Non-Probabilistic Reliability Methods
  • Probabilistic Reliability Methods
  • Historical Frequencies
  • Manufacturers’ survivorship/mortality curves
  • Expert Opinion Elicitation (EOE)

Warranty and Maintenance

  • Product warranties review
  • A review of maintenance
  • Warranty and corrective maintenance
  • Warranty and preventive maintenance
  • Extended warranties and service contracts
  • Stochastic point processes
  • Perfect maintenance
  • Minimal repair
  • Imperfect or worse repaid
  • Complex maintenance policy
  • Reliability growth

Preventive Maintenance Models

  • Block replacement models
  • Age replacement models
  • Ordering models
  • Inspection models

Maintenance and Optimum Policy

  • Replacement policies
  • Preventive maintenance policies
  • Inspection policies

Accelerated Life Testing

  • Design of accelerated life testing plans
  • Accelerated life testing models
  • Extensions of the proportional hazards model

Human and Medical Device Reliability

  • Human and medical device reliability terms and definitions
  • Human stress—performance effectiveness, human error types, and causes of human error
  • Human reliability analysis methods
  • Human unreliability data sources
  • Medical device reliability related facts and figures
  • Medical device recalls and equipment classification
  • Human error in medical devices
  • Tools for medical device reliability assurance
  • Data sources for performing medical device reliability
  • Guidelines for reliability engineers with respect to medical devices

Probabilistic Risk Assessment

  • Probabilistic risk assessment methodology
  • Engineering risk vs environmental risk
  • Risk measures and public impact
  • Transition to risk-informed regulation
  • Some successful probabilistic risk assessment applications
  • Comments on uncertainty
  • Deterministic, probabilistic, prescriptive, performance-based

Random-Request Availability

  • System description and definition
  • Mathematical expression for the random-request availability
  • Numerical examples
  • Simulation results
  • Approximation

Failure Reporting and corrective action system (FRACAS)

  • Definition of FRACAS
  • Closed Loop Reporting System
  • FRACAS Procedure
  • Failure Identification
  • FRACAS Process
  • FRACAS Responsibilities
  • Keys players
  • How to prepare it
  • Role of Engineering Managers  and Program/ Project Managers
  • Role of Reliability and Maintainability Engineers
  • System Maintainers and Production/ QA Staff
  • Integration & Test Engineering

 Reliability Management

  • Key aspects of reliability management
  • Reliability plan elements
  • Best practices
Mar
15
Wed
DoDAF 2 Training- Hands-on Project Based DoDAF Training @ Dahlgren, VA
Mar 15 @ 9:00 am – Mar 17 @ 4:00 pm
Print Friendly, PDF & Email

DoDAF 2 training, DoD Architecture Framework Version 2.0, advanced course and workshop focuses on creating and building DoDAF 2.0 viewpoints based on a selected project. DoDAF 2.0 Training also focuses on teaching the students how  to create and model architecture data.

Through the selected projects, data will be collected, organized, and stored by a wide range of architecture tools developed by sources and organized using the DoDAF Meta-model (DM2).

Why DODAF 2 Training with TONEX?

TONEX Advanced DoDAF 2.0 training will help the students to create their own viewpoints based on a common denominator across their domain and boundaries. This is a 100% hands-on and project based.

Other Related DoDAF Training Courses

dodaf 2.0 training

 

DoDAF 2.0 Training Workshop

After extensively covering architecture development with DoDAF, the DoDAF Training will focus on DoDAF 2.0 viewpoints and models. After briefly introducing  the attendees to each model, the students will master how to create viewpoints and views using a real project (Scenario based) through various roles such as operators, PM and EA.

DoDAF six-step process recommended as best practice by enterprise architecture team. There are collaborative efforts were undertaken between:

  • Program Management Team
  • Enterprise Architecture Team
  • Operational Team
  • System and Engineering Team
  • Compliance Team

Using DoDAF Six-Step Development Process, the attendees will create DoDAF 2.0 Viewpoints.

Apr
6
Thu
Bluetooth Smart Technology Training, Bluetooth Low Energy (LE) Training @ TONEX Plano
Apr 6 @ 9:00 am – Apr 7 @ 4:00 pm
Print Friendly, PDF & Email

Bluetooth Smart Technology Training or Bluetooth Low Energy Training

Bluetooth® Smart (low energy) technology, also known as BTLE or Bluetooth Smart used in high-end smart-phones, smart mobile devices, sports devices, sensors, medical devices, IoT and other smart devices. Bluetooth® Smart technology allows users to connect their smartphones, tablets or other  to the future 50 billions of smart devices by 2020. Bluetooth Smart Technology Training is a technical course covering all aspects of Bluetooth Core and enhancements for Smart Technology (Low Energy).

Bluetooth Smart Training

Learning Objectives

Upon completing this course, the attendees will be able to:

  • Understand the link between Bluetooth and Bluetooth Smart or Low Energy standards
  • List the relevant features and technologies for Bluetooth Smart
  • Explain the different deployment scenarios for Bluetooth an Bluetooth Smart
  • Describe the underlying technologies and protocols related to Bluetooth Smart
  • Explain protocols used in Bluetooth Smart including: Physical Layer, Link Layer, Direct Test Mode, L2CAP for Low Energy, GAP for Low Energy, Generic Attribute Profile (GATT)
  • Security and AES Encryption  and Security Manager (SM)
  • Explain the security features and protection mechanisms relevant for Bluetooth Smart deployments
  • Explain the future technology and application trends in Bluetooth Smart
  • Bluetooth Smart training course is intended for Engineers and Non-Engineers looking to gain a technical understanding of Bluetooth Smart and its future trends

Course Content

Overview of Bluetooth Technology

  • Technology Overview
  • Bluetooth Core Specification​
  • Overview of Operations
  • Core System Architecture
  • Profiles Overview
  • What is Bluetooth Smart (Low Energy)?
  • Remote display profile
  • Sensor profile
  • Classic Bluetooth Technology Security
  • Bluetooth Smart Technology Security

Overview of Bluetooth Smart (Low Energy) features

  • Active slaves
  • Application throughput
  • Basic Rate and Low Energy
  • Regulatory aspects
  • Combined Core Configuration
  • Distance/Range
  • Electrostatic discharge
  • Ultra-low peak
  • Frequency band
  • Frequency tolerance
  • Immunity tests
  • Latency (from a non-connected state)
  • Cost
  • Maximum conducted output power
  • Modulation
  • Multi-vendor interoperability
  • Network topology
  • Over the air data rate
  • Peak current consumption
  • Power consumption
  • Power spectral density
  • Primary use cases
  • Profile concept
  • RF electromagnetic field
  • Robustness
  • Security
  • Service discovery
  • Spurious conducted emissions

Bluetooth Smart Protocols

  • Physical Layer
  • Link Layer
  • Enhancements to HCI for Low Energy
  • Direct Test Mode
  • Security and AES Encryption
  • Enhancements to L2CAP for Low Energy
  • Enhancements to GAP for Low Energy
  • Generic Attribute Profile (GATT)
  • Security Manager (SM)

Bluetooth Smart Link layer specification

  • Low power idle mode operation
  • Device discovery
  • Reliable point-to-multipoint data transfer
  • Advanced power-save
  • Advanced encryption functionalities
  • Single mode and dual mode

Bluetooth Configuration

  • Core Configurations
  • Basic Rate Core Configuration
  • Enhanced Data Rate Core Configurations
  • High Speed Core Configuration
  • Low Energy Core Configuration
  • Basic Rate and Low Energy Combined Core Configuration
  • Host Controller Interface Core Configuration

 Generic Attribute Profile (GATT)

  • Adopted GATT based Bluetooth Profiles and Services
  • Service-based architecture based on the attribute protocol (ATT)
  • GATT Architecture
  • Profiles
  • Applications
  • Generic Access Profile
  • Generic Attribute Profile
  • Attribute Protocol
  • Security Manager
  • Logical Link Control and Adaptation Protocol
  • Host Controller Interface
  • Link Layer
  • Direct Test Mode
  • Physical Layer

GATT-Based Specifications

  • Client
  • Server
  • Characteristic
  • Service
  • Descriptor
  • UUID discovery for all primary services
  • Find a services
  • ANP (Alert Notification Profile)
  • ANS (Alert Notification Service)
  • CTS (Current Time Service)
  • DIS (Device Information Service)
  • FMP (Find Me Profile)
  • HTP (Health Thermometer Profile)
  • HTS (Health Thermometer Service)
  • HRP (Heart Rate Profile)
  • HRS (Heart Rate Service)
  • IAS (Immediate Alert Service)
  • LLS (Link Loss Service)
  • NDCS (Next DST Change Service)
  • PASP (Phone Alert Status Profile)
  • PASS (Phone Alert Status Service)
  • PXP (Proximity Profile)
  • RTUS (Reference Time Update Service)
  • TIP (Time Profile)
  • TPS (Tx Power Service)

Mobile Bluetooth Development

  • Overview of iOS Bluetooth development
  • Overview of Bluetooth development on Android
May
23
Tue
Supply Support Logistics Course | SSLC | Supply Support Logistics Training @ Port Hueneme, CA
May 23 @ 9:00 am – May 25 @ 4:00 pm
Print Friendly, PDF & Email

Supply Support Logistics Course, SSLC Training Course

Supply Support Logistics Course provides an intensive training program designed to provide participants with an appreciation of the complexities and inter-relationships of efforts required to achieve and maintain supply support objectives for equipment/systems and alteration/modifications for Ships, Carriers, Submarines and Shore Sites.

Learn about:

  • Logistics & Supply Management
  • Acquisition Logistics Overview
  • Role of Defense Logistics Agency (DLA), Performance-Based Agreement Toolkit and OSD Supply Chain Integration
  • Principles of logistics as a multi-functional, technical management discipline
  • Design, development, test, production, fielding, sustainment, and improvement modifications of DoD systems
  • System’s life-cycle costs
  • Operations and support costs
  • Support considerations and system’s design requirements
  • Support throughout its life-cycle
  • Product Support elements
  • Initial fielding and operational support of the system
  • Role of Program Manager (PM) and Product Support Manager (PSM)
  • Operating & Support (O&S) phase
  • Employing Performance-Based Life-Cycle Product Support
  • Sustainment Metrics
  • Materiel Availability, Supportability and readiness to the user

The main elements of Acquisition Based Logistics are covered including

  • Contractor Logistics Support
  • Integrated Logistics Support (ILS)
  • Life-Cycle Sustainment
  • Performance-Based Logistics
  • Supply Chain Management
  • Supply Management
  • Standardization
  • Reliability
  • Data Management
  • Sustainment Metrics
  • Just-in-Time (JIT) Inventory
  • Life-Cycle Signature Support Plan (LSSP)
  • Life-Cycle Sustainment Plan (LCSP)
  • Product Support Strategy
  • Support Concept
  • Supportability

Learn about Defense Acquisition References including:

  • DoD Directive 5000.01 “Defense Acquisition System
  • MIL-Handbook 502 “DoD Handbook Acquisition Logistics
  • Product Support Managers Guidebook
  • DoD Logistics Assessment Guidebook
  • Integrated Product Support Element Guidebook
  • Naval Aviation Systems Team Acquisition Logistics Support Plan Guide
  • Life Cycle Sustainment Plan (LCSP) Content Guide
  • Flexibility Sustainment Guide
  • Performance Based Logistics: A Program Manager’s Product Support Guide
  • Performance Based Logistics (PBL) Guidebook
  • Performance-Based Agreement Toolkit
  • Introduction to Operational Availability
  • Air Force Life Cycle Logistics Workforce Guidebook
  • DoD Logistics Transformation Strategy “Achieving Knowledge-Enabled Logistics
  • DoD Directive 4140.1 “Supply Chain Management Policy
  • DoD 4140.1R “Supply Chain Materiel Management Regulation
  • OSD “A Guide to Increased Reliability and Reduced Logistics Footprint

Supply Support Logistics Course will help participants understand Navy and Department of Defense (DoD) supply support elements which include:

  • acquisition logistics;
  • maintenance planning;
  • provisioning;
  • alteration installation management;
  • equipment/ship configuration management;
  • ship/equipment alteration development;
  • allowance development;
  • General Fund (GF) and Capital Fund (CF) material asset management;
  • material handling/storage and material outfitting.

Supply Support Logistics Training will focus on Government Furnished Equipment/Systems (GFE) and their alterations / modifications and cover the above supply support elements for GFE equipment/systems and alteration/modifications being installed on Ships / Carriers / Submarines during new construction, Navy modernization periods, and pier side alteration installation team (AIT) installations. It will also include all shore based activity functions in obtaining supply support objectives and goals.
The course will cover policies, procedures, databases, and processes, which contribute to, or function within, the overall Product Support Management (PSM) of Carriers, Ships, Submarines, and Weapon Systems/Equipment in the Navy; and include:

  • design interface;
  • sustaining engineering;
  • supply support, maintenance planning and management;
  • Packaging, Handling, Storage, & Transportation (PHS&T);
  • technical data;
  • support equipment;
  • training and training support;
  • manpower and personnel;
  • facilities and infrastructure;
  • computer resources;
  • alteration installation management,
  • ship/equipment alteration development,
  • provisioning, equipment/ship configuration management;
  • allowance development;
  • and material outfitting process.

Additionally, training on Navy alteration installation management; ship/equipment alteration development; planning yard process; and the Navy Modernization Process Management and Operations manual will be covered.
The course will review policies, procedures, databases, and processes, which contribute to, or function within the overall supply support objectives of the Navy to include the goals and objectives for new equipment/system acquisitions; alteration/modifications; new ship construction; Navy modernization process and shore activity functions and policies for the Inventory Locator Service (ILS) certification goals for supply support for provisioning, equipment / ship configuration management; GF material asset management; and material outfitting process for Ships, Carriers and Submarines.

Other Topics covered:

  • DoD Supply Chain Materiel Management Procedures
  • DoD 4140.01
  • Operational Requirements
  • Demand and Supply Planning
  • Materiel Sourcing
  • Make and Maintain Materiel
  • Delivery of Materiel
  • Materiel Returns, Retention, and Disposition
  • Supporting Technologies
  • Materiel Data Management and Exchange
  • Materiel Programs
  • Metrics and Inventory Stratification Reporting
  • Management of Critical Safety Items, Controlled Inventory Items Including Nuclear Weapons-Related Materiel
  • Management of Bulk Petroleum Products, Storage, and Distribution Facilities
  • Defense Integrated Materiel Management for Consumable Items
  • Shelf-Life Item Management Manual: Program Administration
  • Shelf-Life Item Management Manual: Materiel Quality Control Storage Standards
  • DoD 4140.65-M Compliance For Defense Packaging: Phytosanitary Requirements for Wood Packaging Material (WPM)
  • Integrated Materiel Management of Nonconsumable Items
  • Defense Materiel Disposition Manual
  •  Defense Demilitarization: Program Administration (Incorporates and cancels DoD 4160.21-M-1)
  • Defense Transportation Regulation (DTR)
  • DODM 5100.76 Physical Security of Sensitive Conventional Arms, Ammunition, and Explosives
  • DoD 5105.38-M Security Assistance Management Manual
  • DoD 5160.65-M Single Manager for Conventional Ammunition (SMCA)
  • DoDM 5200.01 DoD 5200.01-R has been reissued as DoDM 5200.01
  • DOD INFORMATION SECURITY PROGRAM: OVERVIEW, CLASSIFICATION, AND DECLASSIFICATION
  • DOD INFORMATION SECURITY PROGRAM: MARKING OF CLASSIFIED INFORMATION
  • DOD INFORMATION SECURITY PROGRAM: PROTECTION OF CLASSIFIED INFORMATION
  • DOD INFORMATION SECURITY PROGRAM: CONTROLLED UNCLASSIFIED INFORMATION (CUI)
  • DoD 5200.02-R Personnel Security Program
  • DoD 5200.08-R Physical Security Program
  • DoD 7000.14-R Department of Defense Financial Management Regulation (FMR)

Logistic Support for Government Furnished

  • GFAE: Government-Furnished Aeronautical Equipment
  • GFE: Government-Furnished Equipment
  • GFF: Government-Furnished Facilities
  • GFI: Government-Furnished Information
  • GFM: Government-Furnished Material
  • GFP: Government-Furnished Property
  • GFS: Government-Furnished Software

TARGET AUDIENCE

Government Civilian, Military, and Navy support contractor personnel, Department of Defense Contractors (Equipment / System Contractors, Shipbuilders and Ship Repair Contractors)

Jun
5
Mon
Root Cause Analysis Training @ Plano TX TC
Jun 5 @ 9:00 am – Jun 8 @ 3:30 pm
Print Friendly, PDF & Email
Root cause analysis training covers this problem solving process for conducting an investigation into an identified incident, problem, concern or non-conformity in many fields.

Root Cause Analysis Training is in great demand in many diverse industries.  TONEX’s unique, highly personalized Root Cause Analysis training will enhance and accelerate your current understanding of Root Cause Analysis, will allow you to improve technical depth and greatly widen your technical effectiveness in the Root Cause Analysis and other relevant fields.

This updated and expanded Root Cause Analysis Training course covers the fundamentals and  many different tools and methods  for root cause analysis. The Root Cause Analysis Training Course is presented  as a general description of the root cause analysis , methods and tool, its purpose and typical industry domain and applications, the procedures, an example of its use, a checklist to help the attendees to make sure it is applied properly, and TONEX root cause analysis roadmaps, forms and templates.

root cause analysis training<img class=”aligncenter size-full wp-image-11292″ src=”https://i2.wp.com/www.tonex.com/wp-content/uploads/Business_Process_Management.jpg?resize=580%2C483″ alt=”root cause analysis training” srcset=”https://i1.wp.com/www.tonex.com/wp-content/uploads/Business_Process_Management.jpg?w=1000&ssl=1 1000w, https://i1.wp.com/www.tonex.com/wp-content/uploads/Business_Process_Management.jpg?resize=240%2C200&ssl=1 240w, https://i2.wp.com/www.tonex.com/wp-content/uploads/Business_Process_Management.jpg?resize=768%2C640&ssl=1 768w, https://i2.wp.com/www.tonex.com/wp-content/uploads/Business_Process_Management.jpg?resize=576%2C480&ssl=1 576w” sizes=”(max-width: 1000px) 100vw, 1000px” data-recalc-dims=”1″ />

Root Cause Analysis for Beginners, A great point to start
“Every defect is a treasure, if the organization can uncover its cause and work to prevent it across the enterprise.” Extracted from Kilchiro Toyoda, founder of Toyota.
Root Cause Analysis training,  RCA training, is a structured process that uncovers the physical, human, and latent causes of any undesirable event in the workplace.Root cause analysis (RCA) training identifies how the investigator(s) to look beyond the solution to the immediate problem and understand the fundamental or underlying cause(s) of the situation and put them right, thereby preventing re-occurrence of the same issue.
This may involve the identification and management of processes, procedures, activities, inactivity, behaviors or conditions.
Learn about Root cause analysis (RCA) as a structured method and technique to analyze serious adverse events that affect your organization.

What will Root Cause Analysis Training cover?

  • Understand what Root Cause Analysis is
  • Root Cause Analysis Methods and Techniques
  • How to Start and Complete Root Cause Analysis
  • Learn about Methods of Root Cause Analysis
  • Explains expressed RCA as a holistic approach and analytical and creative thinking tools
  • Techniques and tools to incorporate  elements of equipment, process, environment and human reliability
  • Enhance problem-solving and trouble-shooting effectiveness
  • Plan and create  model for in-depth analysis of problem situations.
  • Human-error reduction strategies and processes involved with decision making
  • Investigation techniques and  failure-scene investigation methods also known as evidence gathering
  • Use the tools available for analysis of problem situations

Topics Covered

  • Introduction to the Field of Root Cause Analysis
  • Principles of Root Cause Analysis (RCA)
  • Root Cause Analysis (RCA) Methodologies
  • Comparing Different Root Cause Analysis (RCA) Methodologies
  • Failure Classification
  • Root Cause Analysis as an Approach
  • Opportunity Analysis
  • The ‘5 Whys’
  • Fishbone Diagrams
  • Histograms
  • Pareto Charts
  • Cause and Effect Diagrams
  • Run Charts
  • Scatter Diagrams
  • Flow Charts
  • Control Charts
  • Common Mistakes
  • Unmanageable Conclusions
  • Preventative Action
  • Cause and Effect Principles
  • Cause and Effect Analysis
  • Charting Exercises
  • Solutions thru Critical Thinking and Creativity
  • Guidelines for Group Facilitation
  • Corrective and Preventive Action (CAPA)
  • CAPA in Site Management
  • Incident Investigation
  • Mapping & reporting software

Course Agenda

Introduction to Root Cause Analysis (RCA)

  • What is Root Cause Analysis?
  • When Do We Use It?
  • What happened?
  • How did it happen?
  • Why did it happen?
  • What can be done to prevent it from happening again?
  • Basic Steps of RCA
  • Gather the facts using a timeline and interviews
  • Understand what happened
  • Identify root causes
  • Develop a Risk Reduction Plan
  • Evaluate effectiveness of actions

Essentials of Root Cause Analysis (RCA) Process

  • Define the Problem
  • Collect Data
  • Walk-Through Task Analysis
  • Human Factors Engineering
  • Organizational Policy and Procedure
  • Preparing for the Root Cause Analysis Process
  • Root Cause Analysis Process
  • Implementing the Action Plan
  • Sharing Results of Improvement

Types of Root Cause Analysis (RCA)

  • Safety-based RCA
  • Production-based RCA
  • Process-based RCA
  • Systems-based RCA

Root Cause Analysis Methods

  • What Are the Types of Causes?
  • Causal Factor Category List
  • Determine Causes of Event
  • Problem detection challenges
  • Problem detection methods
  • Selecting the right tools
  • Improving your root-cause analysis
  • Step-method
  • Why-Why
  • 5-Why Method
  • FMEA
  • Process FMEA vs. Design FMEA
  • Bow-tie
  • Event Tree Analysis (ETA)
  • Failure Tree Analysis (FTA)
  • FMECA
  • Interview
  • Fishbone Diagram (Ishikawa)
  • Criteria for Event Description
  • Cause and Effect Analysis
  • Techniques for Conducting Interviews

Root Cause Analysis Workshops and Group Projects

  • Case studies
  • Introduction of TONEX Root Cause Analysis Framework
  • Identifying the questions to determine the root causes
  • Identifying and addressing the root causes of critical incidents
  • Initial Data Gathering Techniques
  • Interactive Activities
  • Identifying corrective and preventive actions
  • Bring your own problem into the class
Jun
19
Mon
Activity-Based Intelligence Training, Activity-Based Intelligence (ABI)  Training Boot Camp, Hands-on Workshop @ Plano, TX Training Center
Jun 19 @ 9:00 am – Jun 22 @ 4:00 pm
Print Friendly, PDF & Email

Activity-Based Intelligence Training, learn about Activity-Based Intelligence solution and gain the expertise that is changing how the Intelligence Community planning, reviewing, processing and analyzing critical intelligence data in real-time from sources such as ground, airborne, ocean, space-based electro-optical, infrared, hyper-spectral sensors and others. Activity-Based Intelligence (ABI) Training  bootcamp covers all aspects of intelligence-oriented data analysis approaches for efficient, real-time data analysis. Learn about Activity-Based Intelligence (ABI) tools, principles, processes and skills for data analysis and more.

Activity Based Intelligence (ABI) has been defined and sponsored by the U.S. Office of the Director for National Intelligence and has been embraced by the major U.S. intelligence agencies and their intelligence activities such as:

Computer-assisted problem solving techniques and methodologies such as as ABI can impact intelligence analysis and make ie more efficient and timeliness since too much big data being collected for human analyst and sometimes it is impossible to see the big picture. We need to understand and take action upon historical, current and anticipated activities involving national or global security.

The intelligence extracted from ABI make it easier for analysts to identify potential adversaries and their targets. By organizing and collecting large volumes of collected data, relevant patterns can be recognized and eventual suspicious behaviors can be acted on before a possible threat is imminent. The intelligence communities have a stunning  amount of critical data at their disposal collected and stored each second, however when analyzed correctly, this analytical data set can help accelerate mission outcomes to address emerging security threats, and  quality of the analysis in real time.

 

Activity Based Intelligence (ABI)<img class=”alignnone size-full wp-image-8465″ src=”https://i2.wp.com/www.tonex.com/wp-content/uploads/Activity-Based-Intelligence-training.jpg?resize=580%2C386″ alt=”Activity Based Intelligence (ABI)” srcset=”https://i0.wp.com/www.tonex.com/wp-content/uploads/Activity-Based-Intelligence-training.jpg?w=849&ssl=1 849w, https://i0.wp.com/www.tonex.com/wp-content/uploads/Activity-Based-Intelligence-training.jpg?resize=300%2C200&ssl=1 300w, https://i1.wp.com/www.tonex.com/wp-content/uploads/Activity-Based-Intelligence-training.jpg?resize=640%2C426&ssl=1 640w” sizes=”(max-width: 580px) 100vw, 580px” data-recalc-dims=”1″ />

Seeing the Big Picture Inside Activity Based Intelligence – Looking for the big picture

Inside Activity Based Intelligence, we as analysts are looking for any interesting connections, in any types of data that constantly being produced and updated.

Activity Based Intelligence (ABI) refers to a method that allows varied types of data, almost like searching for a needle in a haystack even when we don’t know that we are looking for a needle or that we will find it in a particular haystack, very interesting.

ABI, A paradigm shift in analyzing data, points to a multi-INT approach to activity and transactional data analysis to resolve unknown-unknowns, develop intelligence, and drive collection:

  • Analyze large, diverse, known and unknown data streams in real time
  • Understand principles behind Intelligence Gathering
  • What is Activity Based Intelligence?
  • How does Activity Based Intelligence work?
  • ABI Uniqueness
  • Analyze ABI tools and techniques
  • Learn about Patterns of Life (PoL) analysis and ABI techniques applied
  • Wide-area motion imagery (WAMI), Esri’s use of ArcGIS and MARINA
  • Targeted Approach based on the Analysis of an individual Target’s Movements and Communications
  • Collection of data of all sorts
  • Use of a continuous influx of data and understanding how unconventional adversary networks operate
  • Patterns of interaction and activity in a particular area or population
  • Events, movements, measurements and transactions
  • Audio, video, infrared, radar, multispectral imagery, and information from Signals, Human and Measurement and Signature Intelligence
  • Geotags and metadata classification
  • Geo-reference to Discover
  • Integrate before Exploitation
  • Sequence Neutrality
  • Data Neutrality
  • Why data is considered equally valuable, no matter its source
  • Why classified intelligence is not prioritized over open source data
  • Discovering Unknown
  • Behaviors & Signatures
  • Known Behaviors & Signatures
  • Object-Based Production
  • Activity-Based Intelligence
  • Signature-Based Search
  • Structured Observables
  • I&W, Monitoring, Targeting
  • Known Locations and Targets
  • Unknown Locations & Targets

ABI Training Course Objectives

Upon completion of this course, the attendees will be able to:

  • Define what ABI methodology and approach is
  • Identify the motivating factors behind ABI
  • Explain value proposition of ABI
  • Define the key features of ABI
  • List the functional requirements of ABI
  • List the four pillars of ABI
  • Compare and contrast ABI, big data, Patterns of Life (PoL) and data mining and analysis methods
  • Define Extracting, Transforming, and Loading (ETL) operations
  • List ABI technology capabilities
  • Describe the important scenarios for ABI applied to intelligence or defense mission
  • Practice using the ABI methodology

Who Should Attend

Project and Program Managers, Intelligence analysts, Business Developers, Defense Contractors, System Engineers,  Software Developers or anyone other U.S. citizen who is interested in gaining key concepts and principles involved in Activity-Based Intelligence and their applications and impact to intelligence and defense missions.

Course Outline

Introduction to Activity-Based Intelligence (ABI)

  • What is Activity-Based Intelligence (ABI)
  • Activity-Based Intelligence (ABI) value proposition
  • History of ABI
  • Why ABI
  • Pillars of the ABI Approach
  • What is Patterns of Life (PoL)
  • Multi-INT approach to activity and transactional data analysis
  • How to resolve unknown-unknowns develop intelligence
  • Data Discovery Patterns
  • Data Discovery Strategies
  • Integrated intelligence and information-sharing
  • Geo-spatial intelligence (GEOINT)
  • Human Domain Analytics (HDA)
  • Open-source information
  • HUMINT or classified intelligence
  • Intelligence Taxonomy and Ontology
  • Principals of Structured Observation Management (SOM)
  • Principals of Object Based Production (OBP)
  • Role of Flexible Content Management (FCMS)
  • The ABI multi-Intelligence (multi-INT) approach
  • TrueFoundation of ABI
  • Unknown-Unknow Location vs. Behavior
  • Value of knowledge management

Process Flow for Intelligence

  • Key Intelligence Questions
  • Understanding
  • Living Knowledge
  • Objects and Activities
  • Associations and Attributes
  • Foundation
  • Georeference to Discover
  • Advanced Analytics
  • Knowledge Capture

Why ABI?

  • ABI as an intelligence tool
  • Application to the vast wash of metadata and internet transactions Scaling with data
  • ABI came out of the realization that the
  • Scheduled, targeted, stove-piped analysis and collection paradigm
  • Discover entities without signatures.
  • Analyzing vs. discovering data
  • Improve collection efficiency & effectiveness.
  • Volume, Velocity, Variety, Veracity
  • Activity-­based GEOINT vs, target-based GEOINT
  • Monitor activity
  • Analyze entities
  • Anticipate behavior and patterns
  • ABI and “pattern of life” analysis

ABI Key Elements

  • Collect, characterize and locate activities and transactions
  • Identify and locate actors and entities conducting the activities and transactions
  • Identify and locate networks of actors
  • Understand the relationships between networks
  • Develop patterns of life
  • Geo-reference to discover
  • Sensor neutrality
  • Sequence neutrality

Activity-Based Intelligence Methodology

  • Intelligence collection cycle
  • Analysis, production and operations process cycle
  • Establishing the ABI Methodology
  • ABI as an analysis methodology
  • ABI vs. Big Data
  • Methodology in Action
  • ABI methodology
  • Analytic processes applied to situational analysis
  • Sequential and pillars
  • Georeference to discover
  • Spatially and temporally indexed data
  • Integrate before exploitation
  • Data (sensor) neutrality
  • Sequence neutrality

Intelligence Discipline of Activity-based Intelligence (ABI)

  • Focusing on the activity and transactions
  • Geospatial domain actions
  • Cyber, social, financial and commercial domains
  • Big data, across all domains, as the substance for ABI analysis
  • Focused intelligence analysis, within critical timelines
  • Data and Knowledge Management for ABI
  • Information about activities, transactions and entities
  • Using activity data (and its related metadata)
  • Why associating data is vital to ABI analytics

Activity-based Intelligence (ABI) Applied

  • ABI and intelligence analysis
  • Irregular warfare, counterterrorism, counterinsurgency and counter-weapons of mass destruction
  • Geospatial analysis
  • Human network analysis
  • GIS Visualization
  • Data forecasting and modeling
  • Spatiotemporal analysis
  • Tabular visualization
  • Pivot tables
  • Link analysis strategies
  • Quantitative estimation
  • Analytic modeling
  • Ontology design
  • Graph analytics

ABI and Effective Tactical Data Science

  • Intelligence production cycle
  • Core fundamentals of Gathering and Acquiring Data
  • Geospatial data
  • Extract, Transform and Load (ETL) Operations on data
  • Geospatial Transformations
  • Textual Transformations vs. Imagery Transformations
  • Big Data and Artificial Intelligence: Intelligence Matters
  • CRUD operations
  • Difference between REST and CRUD
  • Data objects vs. complex objects abstractions
  • Example of MongoDB CRUD Operations
  • Geospatial analysis methods
  • Human network analysis methods
  • Data forecasting and modeling
  • Spatiotemporal analysis
  • Tabular visualization
  • Pivot tables
  • Link analysis strategies
  • Quantitative estimation
  • Analytic modeling

Workshops and Hands-on Exercises

Jun
26
Mon
NERC CIP Training Bootcamp | Crash Course @ TONEX Plano Office
Jun 26 @ 9:12 pm – Jun 30 @ 10:12 pm
Print Friendly, PDF & Email

NERC CIP Training Bootcamp, a 5-Day Hands-on Cybersecurity Certificate

NERC CIP Training Bootcamp,   North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) training bootcamp is a crash course style training program designed and crated to meet the needs of the electric in regards to CIP compliance: Cyber Security for NERC CIP Versions 5 & 6 Compliance.

Security specialists, CIP Senior Manager, analysts, designer engineers, system operators, directors of CIP compliance, VPs of operations.

NERC Critical Infrastructure Protection (CIP) training bootcamp is a 5-day crash course empowers attendees with knowledge and skills covering version 5/6 standards. NERC Critical Infrastructure Protection training bootcamp addresses the role of FERC, NERC and the Regional Entities.

Learn approaches for identifying and categorizing BES Cyber Systems and requirements tio implement and comply the standards including strategies for the version 5/6 requirements.

TONEX is the industry leader in Cyber Security and NERC CIP. Our courses are planned, designed and developed by NERC CIP experts in CIP implementation and audits.

Learn how NERC Critical Infrastructure Protection (CIP) requirements address physical security and cybersecurity of the critical electricity infrastructure of North America including:

  • References to NERC CIP associated documents
  • References to Implementation Plan for Cyber Security Standards
  • References to Mandatory Reliability Standards for CIP
  • Guidance for Enforcement of CIP Standards
  • References to NERC CIP Rules
  • Best practices for managing NERC Compliance
  • Protecting: physical security, cybersecurity, emergency preparedness and response
  • Business continuity planning, and recovery from a catastrophic event with emphasis on deterring, preventing, limiting, and recovering from terrorist attacks
  • Sabotage Reporting
  • Critical Cyber Asset Identification
  • Security Management Controls
  • Personnel & Training
  • Electronic Security Perimeter(s)
  • Physical Security of Critical Cyber Assets
  • Systems Security Management
  • Incident Reporting and Response Planning
  • Recovery Plans for Critical Cyber Assets
  • Deterring to dissuade an entity from attempting an attack
  • Preventing  to cause an attempted attack to fail
  • Limiting  to constrain consequences of an attack in time and scope
  • Recovering – to return to normalcy quickly and without unacceptable consequences in the interim
  • Operating, Planning, and Critical Infrastructure Protection Committee
  • Security Guidelines
  • Control Systems Security
  • Cyber Security Analysis
  • Operating Security
  • Business Continuity Guideline
  • Physical Security
  • Protecting Sensitive Information
  • Security Policy
  • Bulk Electric System Security Metrics
  • Personnel Security Clearances
  • Compliance Enforcement and Input

Learn about:

NERC CIP Training<img class=”aligncenter size-full wp-image-12504″ src=”https://i2.wp.com/www.tonex.com/wp-content/uploads/NERC_CIP_Training_Bootcamp.jpg?resize=580%2C386&ssl=1″ sizes=”(max-width: 580px) 100vw, 580px” srcset=”https://i1.wp.com/www.tonex.com/wp-content/uploads/NERC_CIP_Training_Bootcamp.jpg?w=3000&ssl=1 3000w, https://i1.wp.com/www.tonex.com/wp-content/uploads/NERC_CIP_Training_Bootcamp.jpg?resize=300%2C200&ssl=1 300w, https://i2.wp.com/www.tonex.com/wp-content/uploads/NERC_CIP_Training_Bootcamp.jpg?resize=768%2C512&ssl=1 768w, https://i0.wp.com/www.tonex.com/wp-content/uploads/NERC_CIP_Training_Bootcamp.jpg?resize=640%2C426&ssl=1 640w, https://i0.wp.com/www.tonex.com/wp-content/uploads/NERC_CIP_Training_Bootcamp.jpg?w=1160&ssl=1 1160w, https://i1.wp.com/www.tonex.com/wp-content/uploads/NERC_CIP_Training_Bootcamp.jpg?w=1740&ssl=1 1740w” alt=”NERC CIP Training” data-recalc-dims=”1″ />

Who Should Attend:
  • CIP Compliance
  • IT  cybersecurity
  • ICS and SCAD cybersecurity
  • EMS cybersecurity
  • Field and security operations
  • Incident response
  • Project managers
  • CIP Auditors
  • Any other staff from electrical utilities who are  maintaining cyber security standards across their enterprise and substations
  • Generation, transmission and distribution staff working to meet NERC CIP standards
Program Learning Objectives:
  • Discuss requirements for reliable operation of the Bulk Electric System
  • List CIP categories of assets to which CIP requirements apply
  • Describe asset classification criteria and tiers: High/Medium/Low
  • List similarities and differences between CIP standards in version 5 and 6
  • Describe NERC filings and FERC rulings on these standards
  • Deep Dive into the CIP 5/6 requirements and obligations/expectations
  • Discuss sabotage reporting process
  • Describe identification and documentation requirements of the Critical Cyber Assets associated with the Critical Assets
  • Describe roles and responsibilities for minimum security management controls to protect Critical Cyber Assets
  • Discuss requirements for identification and protection of the Electronic Security Perimeters inside which all Critical Cyber Assets
  • Describe implementation of physical security programs for the protection of Critical Cyber Assets
  • Define methods, processes, and procedures for securing those systems determined to be Critical Cyber Assets
  • Ensure the identification, classification, response, and reporting of cybersecurity incidents related to Critical Cyber Assets
  • Ensure that recovery plans are put in place for Critical Cyber Assets and that these plans with established business continuity and disaster recovery techniques and practices
Program Coverage and Highlights of Enforcement:
  • NERC CIP requirements
  • HIghlights of NERC CIP 5 & 6
  • Overview of Cyber Security for NERC CIP Versions 5 & 6 Compliance
  • Asset Identification and Governance
  • Access Control and Monitoring
  • System Management
  • Information Protection and Response
  • CIP Process highlights
  • BES Cyber System Categorization
  • High and medium impact BES vs. low impact BES
  • Operational Technology (OT) security
  • Highlights of known ICS vulnerabilities
  • Configuration Change Management & Vulnerability Assessments
  • Cyber Security for NERC CIP Compliance
  • Electronic Security Perimeter(s)
  • Information Protection
  • Incident Reporting and Response Planning
  • Personnel & Training
  • Physical Security
  • Physical Security of BES Cyber Systems
  • Recovery Plans for BES Cyber Systems
  • Sabotage Reporting
  • Security Management Controls
  • System Security Management
  • Best Practice specifications
  • Reference Architecture
  • Gap and Cyber Vulnerability Assessments
  • Firewall/Network intrusion detection
  • Access Management
  • Centralized Patch Management
  • Security Information & Event Management
  • Automated Back-up & Recovery
  • Network Segmentation
  • Intrusion Prevention System (IPS)
  • Protocol Inspection
  • Security Factory Acceptance Testing (FAT)
  • Multi vendor testing
  • Cyber Asset Protection
  • System Design, Reliability and Configuration
  • Baseline Documentation
  • Change Control Services
  • Ports & services, applications & protocols
  • Equipment changes
  • Decommission plan
Aug
28
Mon
LTE Fundamentals Training @ Nashville, Training Center
Aug 28 @ 9:00 am – Aug 29 @ 4:00 pm
Print Friendly, PDF & Email

LTE Fundamentals Training, LTE Standards Training

LTE Fundamentals Training, LTE (long-term evolution) mobile communication system, standardized by 3rd Generation Partnership Project (3GPP), a united telecommunications standard development organizations (ARIB, ATIS, CCSA, ETSI, TSDSI, TTA, TTC).

TONEX  has developed comprehensive LTE Training Programs to satisfy the
competence needs of professionals exploring new LTE business opportunities to expertise
required for operating a LTE network.

Learn the fundamentals of the LTE services, features, network architecture, radio interface and the evolution of 4G telecommunication and LTE-Advanced.

LTE Fundamentals Training – Course Description

LTE Fundamentals Training course covers the fundamentals of LTE features and procedures. It gives an in-depth high-level understanding of the LTE Systems, radio access and core network architecture  as well as the EPS Bearer Service, End-to-End QoS, policy and security. Also covered in this course are the protocols used over LTE interfaces.

LTE Fundamentals Training course gives an overview of the fundamental technology of Long Term Evolution (LTE). Attendees  will learn the basics of the LTE, LTE radio interface, including multiple input, multiple output (MIMO), OFDM, uplink and downlink, SIMO, TDD, FDD, channel coding and GSA.

Learn about LTE standards, LTE services and network technologies, including radio access, the core transport network, and service capabilities, codecs, security, quality of service (QoS) and hooks for non-3GPP radio access to the core network, and for interworking with Wi-Fi networks. Topics included: LTE Radio Access Networks (RAN), LTE/EPC Service & Systems Aspects (SA), LTE Core Network & Terminals (CT) and interworking with UMTS and GSM EDGE Radio Access Networks (GERAN).

LTE Fundamentals Training discusses all aspects of high bitrates in IP communications with Fourth Generation Mobile Communications/LTE and various aspects of LTE including change of business and service paradigm, which it is bringing to mobile communications and M2M/IoT. LTE Fundamentals Training is a rich content training course developed and delivered by knowledgeable instructors and consultants focused on the entire mobile communication community.

LTE Fundamentals Training coverage also includes: LTE services,  standards and architecture, Radio access sub-system, Evolved Packet Core (EPC), Signaling on the radio path, Macrocells, microcells, femtocells, SIM card and security, location based driven applications, and much more more.

Target Audience

The target audience for LTE Fundamentals Training course is: Business and Operations Professionals, HR, Network Engineers, Systems Engineers, Service Engineers, Service Design Engineer, and Network Design Engineer

Learning Objectives

Upon completion of completing this course, attendees will:

  • Understand what LTE and EPC are
  • Explain the evolution of cellular networks GSM, WCDMA, CDMA, TD-SCDMA, LTE and LTE-Advanced
  • Compare and contrast Service functionalities of LTE and GSM, CDMA, 1xEV-DO and UMTS
  • Understand LTE standardization and the role of 3GPP
  •  Discuss LTE service and business environment
  • List LTE and EPC terminology, services and features
  • Identify the key goals, functions and requirements of LTE and EPC
  • List LTE Radio Fundamentals, Spectrum, Standards, Network Technologies, Architectures, Generations, Terminals & Devices
  • Identify Key LTE Carriers, Network Operators & Resellers
  • List necessary functions for LTE and EPC implementation
  • Describe the key technical components of LTE and EPC
  • Explore the role of LTE and EPC in future wireless deployments
  • Discover voice and video over LTE requirements and implementation
  • Compare and contrast Service functionalities of LTE and LTE-Advanced
  • Gain a high level understanding of Voice and Video over LTE profiles
  • Examine the future of LTE, LTE-Advanced, Voice over LTE (VoLTE) and Video over LTE (ViLTE)
  • Explore the role of LTE and EPC in future M2M and IoT deployments

Course Outlines

LTE Overview

  • What is LTE?
  • LTE Standardization
  • 3rd generation partnership project (3GPP)
  • 3GPP history
  • 3GPP, the current organization
  • 3GPP releases
  • GPP LTE release and beyond (LTE-advanced)
  • IMT-advanced process
  • LTE Market Trends
  • Key LTE Business Challenges
  • End User LTE Services and Applications

LTE Architecture Overview

  • Overall high level description of LTE
  • LTE performance
  • FDD, TDD, LTE advanced
  • Frequencies for LTE
  • Basic parameters of LTE
  • Radio access subsystem: E-UTRAN (also called EUTRA) E-UTRAN characteristics
  • E-UTRAN interfaces
  • Macrocells, microcells and femtocells
  • Core network
  • LTE network elements
  • Functional split between the E-UTRAN and the EPC
  • LTE – roaming architecture
  • LTE network mobility management
  • Role of IMS in LTE/EPC
  • Voice over LTE (VoLTE)
  • Video over LTE (ViLTE)
  • SIM, USIM and ISIM

LTE Network Deployment considerations

  • LTE Radio Network Considerations
  • Transport Network Considerations
  • LTE/EPC Core Network Considerations

LTE  Radio Technology

  • E-UTRAN (Evolved UTRAN)
  • What is OFDM/OFDMA?
  • OFDM (Orthogonal Frequency Division Multiplexing)
  • SC-FDMA (Single-Carrier Frequency Division Multiple Access)
  • FDD and TDD
  • OFDMA advantages
  • LTE channel: bandwidths and characteristics
  • OFDM applied to LTE
  • MIMO (Multiple Input Multiple Output)
  • General facts behind MIMO

LTE Flat IP Core Network

  • Fixed mobile convergence
  • IP multimedia subsystem (IMS)
  • General description of IMS
  • Session Initiation Protocol (SIP)
  • IMS components and interfaces
  • Evolved packet system in GPP standards
  • Policy and charging rules function (PCRF)
  • Enhanced voice quality
  • Circuit-switched fallback (CSFB)
  • Simultaneous voice and LTE (SVLTE)
  • Voice over LTE (VoLTE)
  • Over-The-Top (OTT) applications

LTE Protocols and Procedures

  • LTE RAN protocols and procedures
  • Mobility in LTE
  • LTE Systems radio access network architecture
  • QoS in LTE
  • Policy and charging
  • LTE security
  • Principles of LTE security
  • LTE EPC security
  • SIM card physical interface
LTE Training – LTE (Long Term Evolution) Training Bootcamp, Crash Course @ TONEX Nashville, TN
Aug 28 @ 9:00 am – Aug 31 @ 4:00 pm
Print Friendly, PDF & Email

Why should you choose TONEX LTE Training?

LTE Training by TONEX is an intensive learning experience that cover the essential elements of Long Term Evolution (LTE). LTE Training Crash Course covers the foundation of LTE, LTE RAN, concepts behind OFDMA/SC-FDMA, Overview of MIMO, LTE Cell Planning, LTE Capacity Planning, EPC, IMS, Diameter, EPC Signaling, Security, Voice over LTE, LTE-Advacned, LTE Backhaul (both Microwave and Metro Ethernet), PPE-TE, MPLS-TP and more.

TONEX Long Term Evolution (LTE) training crash course – bootcamp introduces LTE and related technologies required to plan, design, implement and manage the evolution route for wireless and cellular network operators towards 4G broadband mobile networks. These courses range from basics technological overview programs to detailed engineering and design LTE courses.

TONEX has been involved with over couple of dozens of LTE deployment worldwide, doing training for the engineers and non-engineers, LTE planning, architecture, systems engineering, design, implementation, security and OSS/network management.

LTE Training Boot Camp ® is the answer to your LTE-EPC/EPS technology needs. This innovative and intensive learning experience covers the essential elements of LTE and SAE/EPC/EPS in a nutshell by the industry experts.

Here is the schedule you can expect to follow during your boot camp:

Overview. We begin the seminar with an overview of LTE, its recent progression and what to expect during the seminar.

Body of Class. Throughout the seminar, we add a lot of detail to what we talked about in the overview. Expect comprehensive information that is current and relevant. Also expect to engage in hands-on activities and other interactive, real-world examples that make sense out of the information.

Wrap Up. The specialty course comes to a close, and clients receive their certificates. Tonex provides both Tonex certificates and industry certificates for clients to have on file to show their completion of the LTE training programs.

By choosing Tonex for your company’s technology, management and training seminars, you are getting the most up-to-date, highest quality boot camps possible. Our LTE courses are specifically designed by experts in the field, and they are continuously evaluated to ensure they are up to date. Contact Tonex to learn more about our innovative LTE training courses and the difference they can make for your employees.

LTE (Long Term Evolution) Training Bootcamp can combine the following training modules into a 4-days intense bootcamp based on the customer needs and requirements:

  • OFDM and MIMO
  • LTE Air Interface and Core Network
  • LTE Core Network Planning and Design
  • LTE RF Planning and Design
  • LTE Protocols and Signaling
  • LTE RAN Signaling and Operations
  • LTE RF Performance
  • LTE QoS
  • LTE Capacity Planning and Traffic Engineering
  • LTE Security
  • LTE GSM/UMTS and EV-DO (eHRPD) Interworking
  • IPv6 and MPLS
  • LTE-Advanced (R10)
  • IMS and Voice over IMS for LTE-EPC
  • Voice over LTE (VolTE)
  • SMS over LTE

LTE Training Crash Course Outline (base):

  •  Introduction to LTE (Long Term Evolution)
  • Overview of IP Convergence in the mobile networks
  • Introduction to LTE (Long Term Evolution) and SAE/ePC/EPS
  • LTE Network Architecture
  • LTE Interfaces and protocols
  • LTE Packet Core (SAE/EPC and EPS)
  • LTE/SAE/EPC Network Architecture
  • Evolved UTRAN and Evolved Packet Core
  • LTE/EPC Interworking
  • LTE Protocol Stacks
  • LTE Interfaces covered in details
  • LTE-EPC Signaling
  • IMS (IP Multimedia Subsystem) in LTE
  • Overview of Diameter Protocol
  • Diameter Applications in IMS
  • LTE Operations and Procedures
  • LTE Planning and Optimization
  • Ethernet Backhaul for LTE
  • QoS Applied to LTE-EPC
  • PCC (Policy and Charging Control
  • LTE and EPC Security
  • Overview of LTE Air Interface; Overview of OFDM and MIMO
  • LTE RF Planning and Design
  • LTE Backhaul Requirements
  • LTE Backhaul Aggregation Network Technology
  • Overview of LTE-Advanced

 

Who Should Attend

Engineers and Non-Engineers professionals who need a through understanding of LTE, EPC, Services, Protocols, RF and Core Planning and Design, Backhaul, Capacity Planning, QoS, Security, VoLTE and LTE-Advanced,

Objectives

Upon completion of this training, the attendees will be able to :

  • Understand HSPA/HSPA+ and Migration to LTE/EPC/EPS
  • Understand how Different End User Services are Performed in LTE/EPC/EPS
  • Understand and Comprehend the basics of LTE/EPC/EPS
  • Understand LTE Architecture, Protocols and Signaling
  • Understand LTE Network Architecture and Protocols (Radio and Core)
  • Understand the Main Functionality in the Evolved UMTS Radio Access Network, E-UTRA/E-UTRAN or LTE
  • Understand LTE Multiple Access Methods: OFDMA and SC-FDMA and MIMO
  • Describe Evolved Packet Core (EPC), SAE (System Architecture Evolution) and Evolved Packet System (EPS)
  • Describe UTRAN, All IP Network (AIPN) and E-UTRA/E-UTRAN architecture
  • Highlight E-UTRA Air Interface and physical layer (downlink and uplink) functionalities and procedures
  • Highlight E-UTRA Layer 2 and 3 Signaling Functionalities and Procedures
  • Highlight LTE Radio and Core Network Planning and Design Procedures
  • Highlight LTE Backhaul Requirements
  • Describe LTE Backhaul Aggregation Network Technology
  • Understand LTE Traffic Engineering
  • Identify LTE Interworking
  • Identify the following aspects of LTE networks: Quality of Service (QoS), Call setup procedures, Mobility support, LTE and EPC Security Architecture
  • Describe Call flows and operational scenarios in HSPA/HSPA+ and LTE

Outline

LTE Training Modules (Customizable based on attendee’s background, needs and objectives)

What is LTE (Long Term Evolution)?

  • Evolution from GSM/GPRS and UMTS/HSPA to LTE and LTE Advanced
  • GSM (Global System for Mobile Communications
  • GPRS (General Packet Radio Service)
  • EDGE and EDGE II
  • UMTS (Universal Mobile Telecommunication System)
  • HSPA/HSPA+
  • LTE and LTE Advanced

 

Overview of IP Convergence in the mobile networks

  • Wireless Internet Basics
  • GSM/EGPRS/UMTS/HSPA/HSPA+
  • Ethernet Backhaul for LTE
  • LTE Protocols and Signaling
  • Overview of LTE SAE, Evolved Packet Core (EPC) and EPS
  • Overview of LTE-EPC Networks and Signaling
  • LTE and 1x/1xEV-DO (eHRPD) Interworking
  • LTE and GSM/UMTS Interworking
  • IMS Architecture and Protocols Applied to LTE
  • LTE and EPC Security
  • QoS Applied to LTE-EPC

 

Introduction to LTE (Long Term Evolution) and EPC/EPS

  • Long Term Evolution (LTE) as a new radio platform technology
  • Support to achieve higher peak throughputs than HSPA+ in higher spectrum bandwidth
  • LTE for mobile, fixed and portable wireless broadband access
  • Optimized for IP-based traffic
  • Increasing capacity
  • Reducing network complexity
  • Lowering deployment and operational costs
  • Enhanced UMTS Air Interface (E-UTRA)
  • System Architecture Evolution (SAE) and Evolved Packet Core (EPC)
  • EUTRAN/LTE and the SAE/EPC as the Evolved Packet System (EPS)

 

LTE Network Architecture

  • LTE Interfaces and protocols
  • Introduction to E-UTRAN
  • E-UTRAN network architecture
  • E-UTRAN protocols
  • Orthogonal Frequency Division Multiplexing (OFDM)
  • Multiple Input/Multiple Output (MIMO)
  • Architecture and node functions
  • The LTE Evolved Packet System (EPS)
  • LTE SAE Evolved Packet Core (EPC)
  • LTE-EPC Network Architecture
  • Network nodes and roles of HSS, MME, S-GW, P-GW, and PCRF
  • Key interfaces: S1, S5, S6, S10 and S11
  • Key features and services

 

LTE Packet Core (SAE/EPC and EPS)

  • Mobility Management Entity (MME)
  • User Plane Entity (UPE)
  • Serving Gateway (S-GW), PDN-GW and enhanced Packet Data Gateway (ePDG)
  • DIAMETER, IPv6, SIP, SCTP and SIGTRAN
  • Role of IP Multimedia Subsystem (IMS)
  • Co-existence and Inter-working with 3GPP Radio Access Technology (RAT)
  • Architecture and migration

 

LTE/SAE/EPC Network Architecture

  • New enhanced base station, “Evolved NodeB (eNodeB)
  • LTE air interface and performs radio resource management for the evolved access system
  • Access GateWay (AGW) and termination of the LTE bearer
  • Key logical functions
  • MME (Mobility Management Entity) for the Control
  • SAE PDN GW (System Architecture Evolution Packet Data
  • Network GateWay for the User Plane
  • Comparing the functional breakdown with existing 3G architecture
  • Radio Network elements functions,
  • Radio Network Controller (RNC), the AGW and the enhanced BTS (eNodeB)
  • Core Network elements functions
  • SGSN and GGSN or PDSN (Packet Data Serving Node)
  • Routers and the AGW
  • Overview of E-UTRAN’s Logical, Transport and Physical channels UE protocol stack
  • Changes in MAC, RLC, RRC, NAS and PDCP

 

Evolved UTRAN and Evolved Packet Core

  • Basic Concepts: bearers, Quality of Service
  • NAS (Non Access Stratum) Protocols – EMM and ESM
  • EPS Mobility Management (EMM) Procedures
  • ESM Session Management (ESM) Procedures
  • GTP – the GPRS Tunneling Protocol
  • GTP-C and GTP-u
  • Main GTP Procedures for EPS
  • Mobility in EPS
  • Multimedia over IP and IMS Basics
  • EPS Security Mechanisms

 

LTE/EPC Interworking

  • Interworking with 3GPP IP-access
  • Interworking with Non-3GPP IP-access
  • PCC (Policy and Charging Control)
  • X2, S1 and S11-interface protocol stacks
  • E-UTRA Layer 3 Protocols (NAS and RRC)
  • Non Access Stratum protocols and procedures (EMM and ESM)
  • Idle mode mobility mechanisms
  • NAS security mechanisms
  • The S1 and S11-Interface
  • S1 Application Protocol (S1AP) procedures
  • The GTP version 2 protocol (eGTP)
  • X2 Application Protocol (X2AP) procedures
  • Data forwarding and in-order delivery of data PDUs at handover
  • Role of SCTP and IPv6 in LTE-EPC
  • End-to-end signaling and traffic flow

 

Overview of LTE and EPC Protocol Stacks

  • LTE-Uu Interface Protocols
  • MAC, RLC, PDCP and RRC
  • UE states and state transitions (NAS and RRC)
  • Radio Resource Control (RRC) procedures
  • Packet Data Convergence Protocol (PDCP)
  • Radio Link Control Protocol (RLC)
  • Medium Access Control Protocol (MAC)
  • E-UTRAN and NAS Protocols
  • S1 and X2 interfaces and protocol stack
  • NAS states and functions
  • NAS messaging
  • Network identities of UE and EPC
  • Connected Mode and UE States
  • Attach to the Network
  • Selection of MME, S-GW, and P-GW
  • Authentication and IP address allocation
  • Default bearer setup and registration
  • LTE-EPC Protocols
  • NAS protocol states
  • Role of EMM and ESM
  • GTPv2-C, GTP-U, Proxy-MIP (PMIPv6)

 

Overview of LTE and EPC  Interfaces

  • S1: S1-MME/S1AP (eNB – MME)
  • S1-U (eNB-SGW)
  • S2A, S2B
  • X2 (eNB – eNB)
  • X2AP (X2 Application Protocol)
  • S3 (S4 SGSN – MME)
  • S4 (S4 SGSN – SGW)
  • S5 (SGW-PGW)
  • S6A (HSS – MME)
  • S6B (PGW – 3GPP AAA)
  • S6D (HSS – S4 SGSN)
  • S8 (SGW – PGW)
  • S9 (PCRF – PCRF)
  • S10 (MME – MME)
  • S11 (MME – SGW)
  • S12 (UTRAN – SGW)
  • GX (PCRF – PGW)
  • GXC (PCRF-SGW)
  • RX (PCRF – IP APPLICATION [P-CSCF FOR IMS])
  • GR (SGSN – HSS)
  • GN (SGSN – MME / SGSN – PGW)
  • GP (SGSN – PGW)
  • SGi

 

LTE-EPC Signaling Principals

  • Network identities and UE identities
  • Signaling bearers
  • Data bearers, EPS bearers
  • PDN connections and APNs
  • Intra-LTE Mobility
  • X2-based handovers
  • Intra and inter MME handovers
  • Intra and inter S-GW handovers
  • Tracking area updates
  • IMS and Support for Voice
  • IMS and seamless mobility
  • Circuit-Switched Fallback (CSFB)
  • Voice Call Continuity (VCC)
  • Single Radio Voice Call Continuity (SRVCC)

 

IMS (IP Multimedia Subsystem) in LTE

  • IP Multimedia Subsystem (IMS) Architecture
  • P-CSCF (Proxy Call Session Control Function)
  • CSCF (Interrogating Call Session Control Function)
  • S-CSCF (Serving Call Session Control Function)
  • BGCF (Breakout Gateway Control Function)
  • MGCF (Media Gateway Control Function) / MGW (IMS-MGW)
  • IMS Signaling Protocols
  • IMS Scenarios & Operations
  • IMS Quality of Service

 

Overview of Diameter Protocol

  • Diameter and Related Interfaces
  • Diameter Protocol
  • Diameter Node
  • Diameter Peer
  • Client
  • Server
  • Agent
  • Relay Agent
  • Proxy Agent
  • Redirect Agent
  • Diameter Applications in EPS
  • Diameter in EPS
  • S6a between MME and HSS
  • S6d between S4-SGSN and HSS
  • S13 between MME and EIR
  • S13 ’ between S4-SGSN and EIR
  • S9 between Visited PCRF and Home PCRF
  • Gx between PDN-GW and PCRF
  • Gxx (Gxa, Gxb, Gxc) for policy control
  • Gy between PDN-GW and OCS
  • Gz between PDN-GW and OFCS
  • Rx between P-CSCF and PCRF
  • Sp between PCRF and SPR

 

Diameter Applications in IMS

  • LIA: Location-Info-Answer
  • LIR:Location-Info-Request
  • MAA: Multimedia-Authentication-Answer
  • MAR: Multimedia-Authentication-Request
  • PPA: Push-Profile-Answer
  • PPR: Push-Profile-Request
  • RTA: Registration-Termination-Request
  • RTR: Registration-Termination-Request
  • SAA: Server-Assignment-Answer
  • SAR: Server-Assignment-Request
  • UAA: User-Authorization-Answer
  • UAR: User-Authorization-Request

 

LTE Operations and Procedures

  • System acquisition
  • Idle mode operations
  • Synchronization
  • Cell search and random access
  • RRC connection establishment
  • Traffic operations in DL & UL
  • Bearer setup and handover
  • Power control
  • LTE/SAE signaling
  • EPC (MME) registration
  • Security procedures

 

LTE Planning and Optimization

  • Traffic and QoS considerations
  • Security considerations
  • Capacity planning considerations
  • Planning tools
  • Antenna selections
  • Site location and integration

 

Ethernet Backhaul for LTE

  • Wireless Networks Backhaul Overview
  • GigE and Metro Ethernet
  • IP and MPLS/GMPLS
  • Ethernet Backhaul for LTE
  • Carrier Ethernet in IP Backhaul
  • Circuit Emulation (CESoE) and Circuit Bonding
  • LTE Backhaul Evolution Scenario
  • LTE Backhaul Capacity Planning

 

QoS Applied to LTE-EPC

  • General Requirements for LTE QoS
  • End User Requirements for QoS
  • LTE End-to-End QoS Architecture
  • LTE Service Establishment and QoS
  • LTE QoS Parameters
  • The class of QoS
  • Guaranteed Bit Rate (GBR)
  • Level of latency (delays in packet transmission)
  • Jitter (variation in latency)
  • Dropped packets
  • EPS bearers, SDFs and TFTs
  • PCC Architecture
  • Service based Local Policy (SBLP)
  • Policy Control Function (PCF)
  • Technical Requirements for LTE QoS
  • LTE Bearer Service Attributes
  • Mapping QoS to LTE Services

 

PCC (Policy and Charging Control

  • PCC architecture
  • Policy and Charging Control Architecture
  • Policy and Charging Rules Function – PCRF
  • Subscriber Profile Repository (SPR)
  • Application Function (AF)
  • Policy and Charging Enforcement Function (PCEF)
  • Gx, Rx and Sp interfaces
  • Policy Control
  • QoS handling and authorization
  • Charging Control
  • Roaming Scenarios and the S9 interface

 

LTE and EPC Security

  • LTE Security Architecture
  • UMTS and HSPA/HSPA+ Security Features
  • Security in E-UTRAN
  • Security in EPC/EPS
  • Authentication and Key Management (AKA)
  • AKA Algorithms
  • LTE Security Procedures

 

Overview of LTE Air Interface; Overview of OFDM and MIMO

  • LTE Air Interface
  • Basics of OFDM and OFDMA
  • Basics of SC-OFDMA
  • LTE DL OFDMA
  • LTE UL SC-OFDMA
  • LTE Antenna Considerations
  • Principles of MIMO
  • Radio Resource Management requirements
  • The eNB host functions
  • Radio Resource Management
  • Radio Bearer Control
  • Radio Admission Control
  • Connection Mobility Control
  • Dynamic Resource Allocation (scheduling)

 

LTE RF Planning and Design

  • Overview of LTE Radio Network Design and Engineering
  • Link Budget for LTE
  • LTE Capacity Planning
  • LTE Design and Site Selection
  • LTE Configuration Parameters
  • LTE Operational Parameters
  • KPIs in LTE Radio Network

 

LTE Backhaul Requirements

  • LTE Services
  • LTE User Download Speeds
  • Estimated Net LTE User Data Peak Rates
  • LTE Cell Site Backhaul Requirements
  • Topologies for LTE Backhaul
  • Hub and Spoke
  • Tree/Tiered Networks
  • Mesh And Ring Networks
  • Ring Network Topology
  • LTE Capacity Planning Models
  • Statistical Traffic Distribution
  • Traffic Dimensioning
  • Traffic Asymmetry

 

LTE Backhaul Aggregation Network Technology

  • Technologies
  • RPR
  • IP/MPLS and TP-MPLS
  • VPWS/VPLS/H-VPLS
  • GMPLS
  • PBB-TE
  • EPON
  • Microwave wireless
  • QoS support
  • Backhaul migration
  • IP/Ethernet backhaul
  • Phased migration options
  • Backhaul Evolution Strategies for LTE Operators
  • Intelligent mobile core platform
  • Metro IP edge router platform and
  • Intelligent network management system
  • IP/MPLS-based backhaul platform
  • IP/GMPLS-based backhaul platform

 

Overview of LTE-Advanced

  • IMT-Advanced by the International Telecommunication Union (ITU)
  • LTE-Advanced in 3GPP in Release 10
  • LTE-Advanced to qualify as IMT-Advanced/4G
  • LTE-Advanced as a further evolution of LTE, an OFDMA-based technology, specified in Release 8 and 9
  • Evolution of current OFDMA approaches
  • High-order MIMO (e.g., 4X4)
  • Wider radio channels (e.g., 50 to 100 MHz)
  • Optimization in narrower bands (e.g., less than 20 MHz) due to spectrum constraints in some deployments
  • Multi-channel operation in either same or different frequency bands
  • Ability to share bands with other services
  • IMT-2000 and IMT-Advanced
  • 450 MHz band
  • UHF band (689-960 MHz)
  • 2.3 GHz band
  • C-band (3 400-4 200 MHz
LTE Training Long Term Evolution Training 101 @ Nashville Training Center
Aug 28 @ 2:00 pm – Aug 29 @ 9:00 pm
Print Friendly, PDF & Email

TONEX LTE Training 101 will give you an effective introduction to the technology and market needs.

Sep
11
Mon
Certified In-Building Wireless Network Design Training | In-Building Wireless Training @ TONEX Nashville, TN
Sep 11 @ 9:00 am – 4:00 pm
Print Friendly, PDF & Email

Certified In-Building Wireless Network Design Training, A Hands-on Certification Training by TONEX – Earn 26 CE (PDH – Professional Development Hours from PIE)

Certified In-Building Wireless Network Design Training provides knowledge and skills for in building RF Engineering and Design. In-Building Wireless Training course will cover all the essentials aspects of the wireless indoor network planning, design, implementation, and optimization.

In-Building Wireless Training Program is designed to give you knowledge and skills in  in-building wireless from concepts to optimization. The course modules are covering: indoor design concepts, planning, design, network deployment, installation and optimization process. Learn about indoor wireless planning, site surveys, design, project management, and commissioning of indoor systems including DAS (distributed antenna systems) and small cells.

Discover how to examine building layout, coverage and capacity requirements, and service objectives, to provide an affordable indoor design and solution.  Guidelines and technical, product selection, installation, commissioning, performance, GoS, QoS, QoE, optimization, and complete documentation are included in our training solution to assure cellular/PCS, two-way radios, and other mobile devices work reliably in buildings, tunnels, bridges, airports, concert halls and sport venues.

Master your knowledge and skills to plan, design, implement and optimize indoor wireless and small cell networks. Learn about RF, radio waves, propagation, antennas,  modulation, coding, services, architecture, design, capacity planning, verification, interference and various trends in-building technologies including DAS, WiFi, GSM, CDMA, 3G and LTE-Advanced.

Understand design and implementation of indoor wireless technologies, Distributed Antenna Systems (DAS) and small cell technologies. Discover methods and tools for indoor wireless planning, design, implementation, deployment and optimizations of indoor wireless and small cell networks.

During the training, we will work with real projects to evaluate the feasibility, coverage  and performance of the indoor wireless network, write system requirements and specifications, verify and validate design, implement and optimize the solution and produce as-built specs.

Learning Objectives

Upon completing this course, the attendees will be able to:

  • List the various types of indoor wireless systems and solutions including DAS and small cells
  • Discuss indoor wireless system solutions, DAS and small cells and their co-existence with micro and macro cells
  • Determine the types of indoor wireless for a given coverage, technologies such as WiFi and LTE and service capacity requirements
  • Determine how to effectively design an indoor wireless system in a cost effective manner with the highest performance as expected
  • Identify the key RF parameters and design targets of indoor wireless systems including mobile, WiFi and Public Safety
  • Discuss tools and methods to create as-built documentation
  • Identify the various components and equipments used in deploying indoor wireless systems
  • Prepare a indoor wireless systems engineering
  • Discuss indoor wireless system ConOps, requirements, design, testing and optimization processes
  • Prepare  indoor wireless link budgets using our free tools
  • Prepare link budgets for the optical links using our free tools
  • List the indoor wireless system configuration and design parameters
  • Identify best practices for the deployment of indoor wireless systems including project management site survey design, installation and optimizations.
  • Identify the factors that may impact indoor wireless system performance through hands-on exercises and workshops.

Who Should Attend

Become expert in  in-building wireless and perform service provisioning of cellular/PCS/LTE, Analog, VHF/UHF, Public Safety and WiFi (WLAN’s) inside buildings and other structures such as sport venues, concert halls, airports, tunnels and bridges.

Whether you work for a wireless service provider, system integrator, ISP, equipment manufacturer, building manager or business owner, this course will enhance your knowledge and skills to evaluate various wireless services in poor coverage areas and know-how on technologies to expand coverage into new areas. Our experienced and dedicated instructors will help you maximize your in building wireless communication capabilities in the most cost effective manner during this course.
This course is a comprehensive technical program to plan, design, implement, verify, validate, optimize indoor wireless systems including DAS and small cells and is intended for project managers, engineers, technicians and anyone else involved in planning, design,  deployment and optimization of indoor wireless systems.

Course Agenda

Indoor wireless System  Overview

  • What and Why?
  • Types of Indoor wireless systems
  • DAS (Distributed Antenna Systems)
  • Pico and Micro-cells
  • Small Cells
  • WiFi hotspots
  • Indoor wireless technology overview
  • Coverage requirements
  • Indoor wireless capacity planning
  • Indoor wireless system architecture
  • Active and passive solutions
  • Planning considerations
  • Indoor wireless system design considerations
  • Site surveys
  • Pico and macro cell site considerations
  • Mobile networks considerations
  • LTE small cell considerations
  • WiFi considerations
  • Public Safety considerations
  • Installation considerations
  • Optimization considerations

Indoor wireless System Planning and Design

  • Project deployment process
  • Project management and system requirements baselines
  • Scope of Work (SoW) for an In Building Wireless System
  • Analysis of services
  • Business and budgetary objectives
  • Facility and document the as-built configuration
  • RF environment in the design frequency
  • Building drawings
  • Design challenges
  • Network architecture and  topology
  • RF planning and design
  • Principles of sire survey
  • Radio waves and propagation
  • RF and optical Link Budget calculations
  • Materials and RF propagation
  • Refraction, Reflection, Diffraction and scattering
  • Noise and Noise Figure
  • Intermodulation and BER
  • In-Building components
  • Backhaul connection to the network
  • Distributed Antenna Systems (DAS)
  • Network management and operations
  • in-Building Wireless System Architecture
  • Passive DAS
  • Active DAS
  • Hybrid DAS
  • Repeaters vs. base station solutions
  • Technical considerations for various technologies
  • GSM, CDMA/CDMA2000, UMTS, HSPA/HSPA+, LTE and LTE-Advanced
  • OFDM/OFDMA/SC-FDMA and MIMO
  • 802.11a/b/g/n/ac/ad

Workshop: Designing an indoor wireless  project

  • System design and development
  • wireless voice/data needs
  • Software analysis to specify optimum placement of access points and cells
  • Large network “holes”
  • Radio resources for outside mobile users.
  • Macrocell
  • Capacity requirements and security measures
  • Design to architectural and operational constraints
  • System procurement management
  • Equipment specifications
  • Performance guarantees
  • Construction requirements
  •  Site-walks and pre-bid

Indoor wireless Site Survey

  • Environment, layout and network requirements
  • Antennas
  • RF propagation
  • RF measurements
  • Equipment location
  • Cable routing
  • Performance evaluation
  • Optimization

DAS and Small Cell Technology

  • What is DAS?
  • What is a small cell?
  • Types of DAS and small cells
  • Indoor vs. outdoor
  • Co-existence with macro-network
  • Coverage considerations
  • Capacity considerations
  • Small cell Connectivity
  • Small cell architectures
  •  Power consideration

Testing, optimization, and final acceptance

  • Installation and integration management
  • Project management of installation and testing with all systems
  • Integration with other systems and trades
  • Verify proper interconnect
  • Configuration of access points
  • Tests of system performance
  • System security demonstration
  • Operational verification tests through facility with client staff
  • As-built and test documentation for completeness

Workshop 2: Designing an Indoor Wireless System with PCS/Cellular/LTE and Public Safety Coverage Extension

  • Dedicated radio resources
  • General Technical Features
  • Frequency range 100 MHz to 100 GHz
  • Accurate propagation predictions
  • Propagation models
  • Conductivity, permittivity and transmission loss
  • Time dispersion/multipath (RMS delay spread) studies
  • Angle of arrival calculations
  • 2D and 3D ray-tracing models for outdoor microcell
  • Indoor wireless LAN/PBX/cell-extender studies.
  • Line-of-sight (LOS) and NLOS rays
  • Wall transmission
  • Corner diffraction
  • Attenuation due to partial Fresnel zone obstruction.
  • Hata propagation model
  • COST-231 propagation model
  • Walfisch-Ikegami propagation model
  • Simplified outdoor microcell studies
  • Multi-story indoor studies
  • Calculate attenuation between floors
  • Plot results in a 3D, multi-story projection.
  • Free-space propagation
  • Reflection
  • Diffraction
  • Diffuse wall scattering
  • Pico and microcells
  • High and low powered passive repeaters
  • Passive coax-based transport
  • Low and high powered active distributed antenna systems
  • Radio over Fiber (RoF)
  • Cable-distributed vs. Fiber-distributed

Workshop 3: In-Building Wireless, DAS and Small Cell System Design Case

  • Application and Design Principles
  • Using BDA devices and systems
  • Repeaters, Boosters, Cell Enhancers
  • HVAC ducting “waveguide” distributed
  • Over-the-air donors
  • Microcell and on-Site donors
  • Community and Multi-Operator
  • Public Cellular and PCS
  • Law Enforcement, Public Safety
  • 150, 450, 800-900 trunked
  • SCADA telemetry: 150, 450, 900 MHz.
  • Public Unlicensed Mobile
  • Basic Modulation Types
  • Law Enforcement, Public Safety: FM, QPSK
  • SCADA telemetry :  FM, QPSK, others
  • Public Unlicensed Mobile
  • Signal Quality Criteria
  • C/I, Linearity, Dynamic Range
  • Headroom and Noise Performance
  • Interference – External sources
  • Internal sources generated
  • Reflection-mode in cluttered environment
  • Obstructions and Diffraction
  • In-Building Propagation
  • Free-space in rooms, hallways
  • Attenuation through walls, floors, ceilings, doors, windows
  • Frequency variability (“tilt”) of losses
  • Loss, Tilt, and coupling in the use of HVAC ducts as waveguide
  • Gains and Losses of system components
  • Basic Design, Operational, and Troubleshooting discussions

Discussions and Solution Case Studies to focus on:

  • Challenges in designing and executing in-building wireless projects
  • Factors affect ROI and ongoing costs
  • Gain a holistic approach to RF planning and solution integration
  • Auditing In-building Wireless Deployment
  • Active Distributed Antenna System (DAS)
  • Passive DAS
  • Repeater
  • Pico or microcell
  • Facility and Installation Considerations
  • What is the type of facility?
  • Open/warehouse
  • Industrial/Manufacturing
  • Cubed office
  • Drywall office
  • Hi-rise building
  • Government building
  • Hospital building
  • Mall
  • Airport
  • Convention center
  • Stadium/Arena
  • Calculating number of subscribers within the venue
  • Single-mode fiber vs. multi-mode fiber
  • CAT3/5 cable
  • CATV
  • Coax
  • Installation of conduit/innerduct required
  • Plenum-rated cables
  • Leaky Coax
  • RF carriers per band

 Final Assessment, Project and Certification