Print Friendly, PDF & Email

Whether you require a single course for a small group or an extensive training program for your entire workforce, on-site courses offer significant savings and convenience with the same quality hands-on instruction delivered in TONEX Training Education Centers around the world.

TONEX Training offers many training seminars in variety of subject areas including Telecom, Mobile and Cellular, Wireless, Engineering, Technology, IT, business, AI and Machine Learning, Systems Engineering, Defense, Tactical Data Links (TDL), Aerospace, Aviation, Space Engineering, Specification Writing, Power and Energy, Enterprise Architecture Management, Mini MBA, Finance, Logistics, Blockchain, Leadership, and Product/Project Management. We offer programs in our four state-of-the-art Executive Conference Centers and in 20 other cities in US and international locations including:

  • Atlanta, GA
  • Dallas, TX
  • Plano, TX
  • San Francisco, CA
  • Santa Clara, California
  • Santa Monica, California
  • Alexandria, Virginia
  • New York City, NY
  • Rome, Italy
  • Shanghai, China
  • London, UK
  • Munich, Germany
  • Stockholm, Sweden
  • Tokyo, Japan
  • Seoul, Korea
  • Hong Kong
  • Bangalore, India
  • Istanbul, Turkey
  • Dubai, UAE
Feb
13
Mon
Capacity Planning Training Boot Camp @ Dallas, TX
Feb 13 @ 9:00 am – Feb 16 @ 4:00 pm
Print Friendly, PDF & Email

What will you learn at the TONEX Capacity Planning Training Course Boot Camp?

Capacity planning training course bootcamp provides the details of capacity planning as a repeatable process for IT infrastructure, cloud computing, and data centers. It’s about understanding service levels and resource usage and aligning capacity requirements with business demands with trending and forecasting.

Feb
21
Tue
Software Engineering Training-Crash Course @ Zurich, Switzerland
Feb 21 @ 9:00 am – Feb 24 @ 4:00 pm
Print Friendly, PDF & Email

Software Engineering Training-Crash Course

Software engineering training teaches you the advanced software engineering topics and provides you with the discipline to apply engineering and computer science concepts in the development, maintenance, usability and dependability of the software.

Software Engineering<img class=”aligncenter wp-image-10227 ” src=”https://i0.wp.com/www.tonex.com/wp-content/uploads/Software-Reliability-Training-2.jpg?resize=367%2C367″ alt=”Software Engineering” srcset=”https://i1.wp.com/www.tonex.com/wp-content/uploads/Software-Reliability-Training-2.jpg?w=451&ssl=1 451w, https://i2.wp.com/www.tonex.com/wp-content/uploads/Software-Reliability-Training-2.jpg?resize=200%2C200&ssl=1 200w” sizes=”(max-width: 367px) 100vw, 367px” data-recalc-dims=”1″ />

TONEX as a leader in teaching industry for more than 15 years is now announcing the software engineering training which helps you to recognize the software design software development, software testing, software maintenance and software management.

TONEX has served the industry and academia with high quality conferences, seminars, workshops, and exclusively designed courses in systems engineering area and is pleased to inform professional fellows about the recent comprehensive training on software engineering.

This course covers variety of topics in software engineering area such as: introduction to software engineering, software investigation and analysis, software design, software implementation and management, requirement analysis and engineering, software development process life cycle, and software development processes. Furthermore, you will be introduced to socio-technical systems, software system architecture, dependability and security engineering, software project planning and management, dependability and security assurance, software system configuration management, software system quality management, agile software system engineering, software verification and validation, software construction and distributed software systems.

By taking the software engineering training by TONEX, you will learn about present software engineering concepts as well as principles in parallel with the software development life cycle.

This training will begin with an introduction to software engineering, giving you a definition of the body of knowledge, as well as a discussion of the main methodologies of software engineering. The next step is to introduce the software development life cycle (SDLC) followed by software modeling using unified modeling language (UML), a standardized general purpose languages used to create visual models of object oriented software. Moreover, you will learn about the main phases of SDLC; requirements gathering, requirement analysis, design, coding, and testing.

If you are an IT professional who specialize in software engineering, you will benefit the presentations, examples, case studies, discussions, and individual activities upon the completion of the software engineering training and will prepare yourself for your career.

Learn about artifacts and approaches to develop the software systems, software engineering metrics, distributed, configurable and object oriented software. Moreover, you will learn about alignment of software systems with overall system design, software unique aspects of planning, requirements, architecture analysis, implementation, testing and maintenance, important of software engineering constraints, security and technology trends in software engineering.

Our instructors at TONEX will help you to understand different software engineering and development processes. Furthermore, you will be introduced to the different examination methods and tools in software engineering.

Finally, the software engineering training will introduce a set of labs, workshops and group activities of real world case studies in order to prepare you to tackle all the related software engineering challenges.

Audience

Software engineering training is a 4-day course designed for:

  • Software developers want to acquire state of the art knowledge of software engineering
  • Software engineers need to know everything about software engineering
  • Business analysts having projects in software engineering
  • System engineers
  • Project managers of software projects
  • System safety managers
  • Software maintainers
  • Software configuration managers
  • Software programmers
  • Software Managers and lead technical staff
  • Any IT professionals need to improve their knowledge of software engineering

Training Objectives

Upon completion of the software engineering training course, the attendees are able to:

  • Understand the systems engineering principles applied to design, development and integration of software intensive systems
  • Learn about systems engineering, software engineering and software development with practical applications
  • Explain the basic structure of designing and implementing software systems from analysis, verifications and validations
  • Understand the software engineering life cycle models with their significance and objectives
  • Understand how to reduce the software faults and failures to an acceptable margin using rigorous testing and inspection
  • Conduct technical software performance measurements and defining deterministic factors in successful software system engineering
  • Learn how to make plans for software systems, control the changes and analyze to improve the process
  • Learn how to apply practical methods to improve software project performance in design process

Training Outline

Software engineering training course consists of the following lessons, which can be revised and tailored to the client’s need:

Introduction to Software Engineering

  • Role of Software Engineer
  • Definitions and Concepts
  • Information Level in the Organization
  • Software Life Cycle
  • Categories of Software
  • Alternate Software Acquisition Approaches
  • Software Engineering Paradigms
  • Desirable Features of Computer Software
  • Summary and Concluding Remarks
  • Software Development Life Cycle (SDLC)
  • Software Modeling; Unified Modeling Language (UML)

Software Investigation and Analysis

  • Project Selection and Initial System Requirements
  • Project Selection
  • Problem Definition
  • Proposed Solution
  • Scope and Objectives of the System
  • System Justification
  • Feasibility Analysis Report
  • Alternate Approach to Feasibility Analysis
  • Summary of System Inputs and Outputs
  • Initial Project Schedule
  • Project Team
  • Requirement Specification
  • Contents of the Requirement Specification
  • Documenting the Requirements
  • Requirement Validation
  • Proceeding
  • Presenting the Requirements Specification
  • Information gathering
  • Rationale for Information Gathering
  • Interviews
  • Questionnaires and Surveys
  • Observation and Document Review
  • Prototyping
  • Brainstorming and Mathematical Proof
  • Object Identification
  • Communicating via diagrams
  • Traditional System Flow Charts
  • Innovation; Topology Chart
  • Data Flow Diagrams
  • Object Flow Diagrams
  • Contemporary Diagramming Techniques
  • Program Flow Chart
  • decision models for system logic
  • Structured Language
  • Decision Tables
  • Decision Trees
  • Decision Techniques to Use
  • Decision Techniques versus Flowcharts
  • System Rules
  • Project management aids
  • PERT and CPM
  • The Gantt Chart
  • Project Management Software

Software Design

  • Software Design Process
  • Design Strategies
  • Architectural Design
  • Interface Design
  • Software Design and Development Standards
  • The Design Specification
  • Database Design
  • Approaches to Database Design
  • Overview of File Organization
  • User Interface Design
  • Types of User Interfaces
  • Steps in User Interface Design
  • Output Design
  • Output Methods versus Content and Technology
  • Input Design
  • Operation Design
  • Categorization of Operations
  • Essentials of Operation Design
  • Informal Operation Requirements
  • Formal Specifications

Software Implementation and Management

  • Software Implementation Issues
  • Software Operating Environment
  • Installation of the System
  • Code Conversion
  • Change Over
  • Software Marketing
  • Standards and Quality Assurance
  • Management of Targets and Financial Resources
  • Leadership and Motivation
  • Software Management
  • Management Responsibilities
  • Management Styles
  • Software Maintenance
  • Legacy Systems
  • Software Integration
  • Software Re-engineering
  • Developing the Job Description
  • Maintaining the Desired Environment
  • Preserving Accountability
  • Grooming and Succession Planning
  • Software Economics
  • Software Cost
  • Software Value
  • Assessing Software Productivity
  • Estimation Techniques for Engineering Cost
  • Organizing Effective Management
  • Functional Organization
    Parallel Organization
  • Hybrid Organization
  • Organization of Software Engineering Firms

Requirements Analysis and Engineering

  • Introduction to Requirements Analysis
  • Systems Engineering Process Inputs
  • Types of Requirements
  • Requirements in Waterfall Model
  • Software Requirement Specification (SRS)
  • Elicitation Techniques
  • Functional Requirements
  • Non-Functional Requirements
  • Domain Requirements
  • Structured Analysis
  • Entity-Relationship Approach
  • Object Oriented Analysis
  • Class and Object Identification
  • The Dynamic Model
  • Requirements Specifications
  • Requirements Documentations
  • Requirements Verification and Negotiation
  • Requirements Validation

Software Development Process Life Cycle

  • Waterfall Development
  • Prototyping
  • Incremental Development
  • Iterative and Incremental Development
  • Spiral Development
  • Rapid Application Development
  • Agile Development
  • Lightweight Methodologies
  • Code and Fix
  • Process Meta-Models
  • Formal Methods

Software System Development Processes

  • Unified Software Development Process (USDP)
  • Incremental Process
  • Iterative Process
  • Architecture Centric
  • Use-Case Driven and Risk Confronting
  • USDP Life Cycle
  • Process Workflows
  • Supporting workflows
  • Inception Phase
  • Elaboration Phase
  • Construction Phase
  • Transition Phase
  • Lifecycle Objectives
  • Lifecycle Architecture
  • Unified Modeling Language

Socio-Technical Systems

  • Socio-Technical System Stack
  • Socio-Technical System Layers
  • Equipment
  • Operating system
  • Communications and Data Management
  • Application Systems
  • Business Processes
  • Organizations
  • Society
  • Socio-Technical System Characteristics
  • Emergent Properties
  • Non-deterministic
  • Complex Relationships with Organizational Objectives
  • Socio-Technical System Design Approaches
  • Design Challenges
  • Socio-Technical Systems Engineering

Software System Architecture

  • Software Architecture Concepts
  • Architectural Elements
  • Stakeholders
  • Architectural Descriptions
  • Architectural Views
  • Architectural Perspectives
  • Role of Software Architects
  • Architecture Definition Process
  • Architectural Styles
  • Pipe and filter
  • Object Oriented
  • Event Based
  • Layered
  • Repositories
  • Process Control
  • Distributed Architectures
  • Architectural Analysis
  • Domain Specific Design
  • Middleware
  • Model Driven Architecture
  • Aspect Oriented Programming

Dependability and Security Engineering

  • Security Engineering
  • Usability and Psychology
  • Protocols
  • Access Control
  • Cryptography
  • Distributed Systems
  • Economics
  • Multilevel Security
  • Multilateral Security
  • Physical Protection
  • Monitoring and Metering
  • Security Printing
  • Biometrics
  • Emission Security
  • Network Attack and Defense
  • API Attacks
  • Physical Tamper Resistance
  • Telecom System Security
  • System Evaluation and Assurance
  • Managing the Development of Secure Systems

Software Project Planning and Management

  • Project Management Framework
  • Project Initiation
  • Project Planning
  • Project Monitoring
  • Software Development Plan
  • Project Management Plan and Software Development Management
  • Pitfalls in Software Development Management Plan and Project Management Plan
  • Scope Management
  • Software Time Management
  • Software Cost Management
  • Software Risk Management
  • Software configuration Management
  • Software Release and Deployment Management
  • Software Quality Management

Dependability and Security Assurance

  • Managing Risks from Vulnerable Software
  • Software Security Vulnerabilities
  • Sources of Source Code Security Vulnerabilities
  • Framework for Software Security Assurance
  • Risk Assessment
  • Vulnerability Management
  • Security Standards
  • Ongoing Assessment and Assurance
  • Roles and Responsibilities
  • Vulnerabilities in Web Applications
  • Security, Reliability and Practices
  • Roles and Responsibilities for Software Security Assurance

Software System Configuration Management

  • Software Configuration Management Definition
  • Software Configuration Item
  • Software Configuration Management Directory
  • Disciplines in Software Configuration Management
  • Software Configuration Management for Different Software Environment
  • Automated Tools for Software Configuration Management
  • Software Configuration Management Planning

 Software System Quality Management

  • Software Quality Management
  • Fundamentals of Software Quality
  • Quality control and Reliability
  • Quality Management System
  • Defect Analysis
  • Software Quality Assurance
  • Statistical Software Quality Assurance
  • Software Reliability
  • Software Safety

Agile Software Systems Engineering

  • Principles of Agile Methods
  • Agile Method Applicability
  • Agile Methods and Software Maintenance
  • Plan Driven and Agile Development
  • Extreme Programming
  • System Engineering for Agile Software Development
  • Agile System Engineering Processes
  • Systems Engineering Agile Systems

Agile Software Development

  • Agile Process Philosophy
  • Agile Software Development Methodologies
  • Extreme Programming
  • Dynamic System Development Method
  • Adaptive Software Development
  • Crystal Methods
  • Scrum
  • XP
  • Agile Unified Process
  • Lean Software Development
  • Feature Driven Development
  • Business Benefits of Software Agility
  • Rational Unified Process (RUM)

Verification and Validation

  • Software Inspections
  • Design Reviews
  • Formal and Informal Reviews
  • Software Testing
  • Software Test Techniques
  • Software Test Tools
  • Software Demonstration
  • Software Prototyping
  • Software Simulation
  • Independent Verification and Validation

Software Construction

  • Code Complexity
  • Coding Process
  • Requirements for Coding
  • Assessing Code Quality
  • Developing Code Standards

Distributed Software Systems

  • Concept of distributed software
  • Distributed system characteristic
  • Resource sharing
  • Concurrency
  • Scalability
  • Fault tolerance
  • Transparency
  • Disadvantages of distributed software systems
  • Distributed system architectures
  • Multiprocessor architecture
  • Client server architecture
  • Distributed object
  • COBRA
  • Object request broker

 Hands-on and In-Class Activities

  • Labs
  • Workshops
  • Group Activities

Sample Workshops and Labs for Introduction to Software Engineering

  • Role of Software Case Study
  • Waterfall Model Example
  • Software Crisis for a Given Scenario
  • Plan Driven Software Development versus Agile Driven Development
  • Personal Health monitoring
  • Software Development Model Case Study
  • Requirement Development Experiment
  • Parking Garage Automation
  • Traffic Monitoring
  • Requirement Elicitation Case Study
  • Software Design Example
  • Restaurant Automation Example
  • Multiprocessor Traffic Control System Example
  • A Client Server ATM System
  • Software Performance Testing Case
  • Internet Banking System
  • Workshop on How to Write a Software Project Proposal
Mar
6
Mon
Reliability Engineering Principles for Managers @ Plano Office
Mar 6 @ 9:00 am – Mar 8 @ 4:00 pm
Print Friendly, PDF & Email

Reliability Engineering Principles Training for Managers Course Description

Reliability Engineering Training for Managers, covers  the basic principles, concepts, practical problem solving techniques, and a brief review of statistical calculations. Because this training is designed for non-engineers who often don’t have a strong background in math, the focus of training is mostly on principals of reliability engineering and problem solving practices and less on statistics and mathematical models. Reliability Engineering Principles (REP) Training hands-on training will assist you to enhance your business performance by cutting the costs associated with unreliability. REF training will teach you how to apply reliability tools to identify and resolve cost issues rather than functioning as technical miracles.

Reliability Engineering Principles Training<img class=”aligncenter wp-image-10241″ src=”https://i2.wp.com/www.tonex.com/wp-content/uploads/Reliabilityengineeringfinal-280×200.png?resize=381%2C276″ alt=”Reliability Engineering Principles Training” srcset=”https://i0.wp.com/www.tonex.com/wp-content/uploads/Reliabilityengineeringfinal.png?zoom=2&resize=381%2C276&ssl=1 762w, https://i1.wp.com/www.tonex.com/wp-content/uploads/Reliabilityengineeringfinal.png?zoom=3&resize=381%2C276&ssl=1 1143w” sizes=”(max-width: 381px) 100vw, 381px” data-recalc-dims=”1″ />

Learn About:

  • Mean time frame between failures events
  • TPM relationship with reliability principles
  • Analyzing reliability data
  • Weibull failure
  • Monte Carlo simulations
  • Pareto distributions
  • Fault tree analysis
  • Design review
  • Load/strength interactions
  • Sudden death and simultaneous testing
  • Reliability growth models and displays
  • Reliability strategies and standards
  • Reliability audits
  • Bathtub curves
  • Effectiveness: availability, reliability, maintainability, and capability
  • Weibull, normal, & log-normal probability plots
  • Decision trees merging reliability and costs
  • Critical items highly impacting safety/costs
  • Failure rate
  • Prediction
  • Availability vs. Reliability
  • MTTF, MTBF, and MTTR
  • FMEA
  • FMECA
  • FTA
  • RBD
  • QFD
  • Reliability testing strategies
  • Accelerated testing
  • Failure recording, analysis, and corrective action
  • Contracting for reliability
  • Management’s role in reliability improvements

TONEX REP Training Framework

  • Long on concepts and problem solving techniques, short on math and statistics
  • Fun, interactive, dynamic class
  • Including labs, group activities, and hands-on workshop

Audience

Reliability Engineering Principles Training is a 3-day course designed for:

  • Project managers
  • Business owners
  • Safety managers
  • Quality managers
  • Reliability managers
  • Production/design managers
  • Warranty analysts
  • Problem-solving team personnel
  • Asset reliability managers
  • Capacity and predictive maintenance managers

Training Objectives

Upon the completion of Reliability Engineering Principles training for non-engineers, attendees are able to:

  • Describe the bases, rationale, and concepts of reliability engineering
  • Use the most relevant probability distribution to measure model times to failure
  • Articulate the relationship between the time to failure distribution, the reliability function, and the hazard rate
  • Estimate reliability values from test data and identify confidence limits on the results
  • Use required tools to ensure a reliable product
  • Explain the differences between assessing the reliability of a fixable and non-fixable systems
  • Derive and sustain a strategic reliability engineering
  • Derive control protocols to reduce risks and increase asset use
  • Develop predictive strategies
  • Construct an efficient predictive maintenance process
  • Establish a root cause analysis procedure to reduce the wasted time, increase productivity, and a culture of continuous improvement

Course Outline

Overview of Reliability Engineering Principals

  • What are the reliability engineering principals?
  • Why reliability is important?
  • Impact of reliability on the system
  • Reliability dictionary
  • Why would you want to enhance reliability?
  • Reliability is art as well as science
  • Predictive techniques
  • Reliability improved system features
  • Availability
  • Maintenance management policies

Reliability Risk Assessments

  • Engineering techniques
  • Reliability hazard analysis
  • Failure mode and effects analysis (FMEA)
  • Fault tree analysis (FTA)
  • Reliability Centered Maintenance (RCM)
  • Load and material stress
  • Fatigue and creep analysis
  • Human error analysis
  • Manufacturing defect analysis
  • Reliability testing

Measuring Reliability

  • Requirements
  • The bathtub curve
  • Life distributions
    • Distribution functions
    • Particular life distributions
  • Modeling system reliability
    • Series systems
    • Active redundancy
    • M-out-of-N redundancy
  • Reliability prediction

Design for Reliability (DoE)

  • Life cycle
  • Reliability approaches
  • Top-down methods
  • Bottom-up methods

Reliability Engineering Actions

  • Maintenance Prevention
  • LCC Assessment
  • Positive Maintenance
  • Capital Equipment Replacement
  • Cost/effective estimation

Working with Reliability Engineering Tools

  • Attaining reliability associated data
  • Reliability indices
  • Decision trees
  • Availability concepts, effectiveness equation and costs
  • Probability plots
  • Bathtub curves
  • Pareto distributions and critical items lists
  • Reliability block diagrams
  • FMEA
  • FMECA
  • FTA
  • Design reviews
  • Vendor and parts control
  • Thermal analysis (TA)
  • Environmental stress screening (ESS)
  • Crow/AMSAA reliability growth models
  • Reliability strategies
  • Benchmarking reliability

Essential Principles of Reliability Investigation

  • Non-Probabilistic Reliability Methods
  • Probabilistic Reliability Methods
  • Historical Frequencies
  • Manufacturers’ survivorship/mortality curves
  • Expert Opinion Elicitation (EOE)

Warranty and Maintenance

  • Product warranties review
  • A review of maintenance
  • Warranty and corrective maintenance
  • Warranty and preventive maintenance
  • Extended warranties and service contracts
  • Stochastic point processes
  • Perfect maintenance
  • Minimal repair
  • Imperfect or worse repaid
  • Complex maintenance policy
  • Reliability growth

Preventive Maintenance Models

  • Block replacement models
  • Age replacement models
  • Ordering models
  • Inspection models

Maintenance and Optimum Policy

  • Replacement policies
  • Preventive maintenance policies
  • Inspection policies

Accelerated Life Testing

  • Design of accelerated life testing plans
  • Accelerated life testing models
  • Extensions of the proportional hazards model

Human and Medical Device Reliability

  • Human and medical device reliability terms and definitions
  • Human stress—performance effectiveness, human error types, and causes of human error
  • Human reliability analysis methods
  • Human unreliability data sources
  • Medical device reliability related facts and figures
  • Medical device recalls and equipment classification
  • Human error in medical devices
  • Tools for medical device reliability assurance
  • Data sources for performing medical device reliability
  • Guidelines for reliability engineers with respect to medical devices

Probabilistic Risk Assessment

  • Probabilistic risk assessment methodology
  • Engineering risk vs environmental risk
  • Risk measures and public impact
  • Transition to risk-informed regulation
  • Some successful probabilistic risk assessment applications
  • Comments on uncertainty
  • Deterministic, probabilistic, prescriptive, performance-based

Random-Request Availability

  • System description and definition
  • Mathematical expression for the random-request availability
  • Numerical examples
  • Simulation results
  • Approximation

Failure Reporting and corrective action system (FRACAS)

  • Definition of FRACAS
  • Closed Loop Reporting System
  • FRACAS Procedure
  • Failure Identification
  • FRACAS Process
  • FRACAS Responsibilities
  • Keys players
  • How to prepare it
  • Role of Engineering Managers  and Program/ Project Managers
  • Role of Reliability and Maintainability Engineers
  • System Maintainers and Production/ QA Staff
  • Integration & Test Engineering

 Reliability Management

  • Key aspects of reliability management
  • Reliability plan elements
  • Best practices
Mar
15
Wed
DoDAF 2 Training- Hands-on Project Based DoDAF Training @ Dahlgren, VA
Mar 15 @ 9:00 am – Mar 17 @ 4:00 pm
Print Friendly, PDF & Email

DoDAF 2 training, DoD Architecture Framework Version 2.0, advanced course and workshop focuses on creating and building DoDAF 2.0 viewpoints based on a selected project. DoDAF 2.0 Training also focuses on teaching the students how  to create and model architecture data.

Through the selected projects, data will be collected, organized, and stored by a wide range of architecture tools developed by sources and organized using the DoDAF Meta-model (DM2).

Why DODAF 2 Training with TONEX?

TONEX Advanced DoDAF 2.0 training will help the students to create their own viewpoints based on a common denominator across their domain and boundaries. This is a 100% hands-on and project based.

Other Related DoDAF Training Courses

dodaf 2.0 training

 

DoDAF 2.0 Training Workshop

After extensively covering architecture development with DoDAF, the DoDAF Training will focus on DoDAF 2.0 viewpoints and models. After briefly introducing  the attendees to each model, the students will master how to create viewpoints and views using a real project (Scenario based) through various roles such as operators, PM and EA.

DoDAF six-step process recommended as best practice by enterprise architecture team. There are collaborative efforts were undertaken between:

  • Program Management Team
  • Enterprise Architecture Team
  • Operational Team
  • System and Engineering Team
  • Compliance Team

Using DoDAF Six-Step Development Process, the attendees will create DoDAF 2.0 Viewpoints.

Apr
6
Thu
Bluetooth Smart Technology Training, Bluetooth Low Energy (LE) Training @ TONEX Plano
Apr 6 @ 9:00 am – Apr 7 @ 4:00 pm
Print Friendly, PDF & Email

Bluetooth Smart Technology Training or Bluetooth Low Energy Training

Bluetooth® Smart (low energy) technology, also known as BTLE or Bluetooth Smart used in high-end smart-phones, smart mobile devices, sports devices, sensors, medical devices, IoT and other smart devices. Bluetooth® Smart technology allows users to connect their smartphones, tablets or other  to the future 50 billions of smart devices by 2020. Bluetooth Smart Technology Training is a technical course covering all aspects of Bluetooth Core and enhancements for Smart Technology (Low Energy).

Bluetooth Smart Training

Learning Objectives

Upon completing this course, the attendees will be able to:

  • Understand the link between Bluetooth and Bluetooth Smart or Low Energy standards
  • List the relevant features and technologies for Bluetooth Smart
  • Explain the different deployment scenarios for Bluetooth an Bluetooth Smart
  • Describe the underlying technologies and protocols related to Bluetooth Smart
  • Explain protocols used in Bluetooth Smart including: Physical Layer, Link Layer, Direct Test Mode, L2CAP for Low Energy, GAP for Low Energy, Generic Attribute Profile (GATT)
  • Security and AES Encryption  and Security Manager (SM)
  • Explain the security features and protection mechanisms relevant for Bluetooth Smart deployments
  • Explain the future technology and application trends in Bluetooth Smart
  • Bluetooth Smart training course is intended for Engineers and Non-Engineers looking to gain a technical understanding of Bluetooth Smart and its future trends

Course Content

Overview of Bluetooth Technology

  • Technology Overview
  • Bluetooth Core Specification​
  • Overview of Operations
  • Core System Architecture
  • Profiles Overview
  • What is Bluetooth Smart (Low Energy)?
  • Remote display profile
  • Sensor profile
  • Classic Bluetooth Technology Security
  • Bluetooth Smart Technology Security

Overview of Bluetooth Smart (Low Energy) features

  • Active slaves
  • Application throughput
  • Basic Rate and Low Energy
  • Regulatory aspects
  • Combined Core Configuration
  • Distance/Range
  • Electrostatic discharge
  • Ultra-low peak
  • Frequency band
  • Frequency tolerance
  • Immunity tests
  • Latency (from a non-connected state)
  • Cost
  • Maximum conducted output power
  • Modulation
  • Multi-vendor interoperability
  • Network topology
  • Over the air data rate
  • Peak current consumption
  • Power consumption
  • Power spectral density
  • Primary use cases
  • Profile concept
  • RF electromagnetic field
  • Robustness
  • Security
  • Service discovery
  • Spurious conducted emissions

Bluetooth Smart Protocols

  • Physical Layer
  • Link Layer
  • Enhancements to HCI for Low Energy
  • Direct Test Mode
  • Security and AES Encryption
  • Enhancements to L2CAP for Low Energy
  • Enhancements to GAP for Low Energy
  • Generic Attribute Profile (GATT)
  • Security Manager (SM)

Bluetooth Smart Link layer specification

  • Low power idle mode operation
  • Device discovery
  • Reliable point-to-multipoint data transfer
  • Advanced power-save
  • Advanced encryption functionalities
  • Single mode and dual mode

Bluetooth Configuration

  • Core Configurations
  • Basic Rate Core Configuration
  • Enhanced Data Rate Core Configurations
  • High Speed Core Configuration
  • Low Energy Core Configuration
  • Basic Rate and Low Energy Combined Core Configuration
  • Host Controller Interface Core Configuration

 Generic Attribute Profile (GATT)

  • Adopted GATT based Bluetooth Profiles and Services
  • Service-based architecture based on the attribute protocol (ATT)
  • GATT Architecture
  • Profiles
  • Applications
  • Generic Access Profile
  • Generic Attribute Profile
  • Attribute Protocol
  • Security Manager
  • Logical Link Control and Adaptation Protocol
  • Host Controller Interface
  • Link Layer
  • Direct Test Mode
  • Physical Layer

GATT-Based Specifications

  • Client
  • Server
  • Characteristic
  • Service
  • Descriptor
  • UUID discovery for all primary services
  • Find a services
  • ANP (Alert Notification Profile)
  • ANS (Alert Notification Service)
  • CTS (Current Time Service)
  • DIS (Device Information Service)
  • FMP (Find Me Profile)
  • HTP (Health Thermometer Profile)
  • HTS (Health Thermometer Service)
  • HRP (Heart Rate Profile)
  • HRS (Heart Rate Service)
  • IAS (Immediate Alert Service)
  • LLS (Link Loss Service)
  • NDCS (Next DST Change Service)
  • PASP (Phone Alert Status Profile)
  • PASS (Phone Alert Status Service)
  • PXP (Proximity Profile)
  • RTUS (Reference Time Update Service)
  • TIP (Time Profile)
  • TPS (Tx Power Service)

Mobile Bluetooth Development

  • Overview of iOS Bluetooth development
  • Overview of Bluetooth development on Android
May
23
Tue
Supply Support Logistics Course | SSLC | Supply Support Logistics Training @ Port Hueneme, CA
May 23 @ 9:00 am – May 25 @ 4:00 pm
Print Friendly, PDF & Email

Supply Support Logistics Course, SSLC Training Course

Supply Support Logistics Course provides an intensive training program designed to provide participants with an appreciation of the complexities and inter-relationships of efforts required to achieve and maintain supply support objectives for equipment/systems and alteration/modifications for Ships, Carriers, Submarines and Shore Sites.

Learn about:

  • Logistics & Supply Management
  • Acquisition Logistics Overview
  • Role of Defense Logistics Agency (DLA), Performance-Based Agreement Toolkit and OSD Supply Chain Integration
  • Principles of logistics as a multi-functional, technical management discipline
  • Design, development, test, production, fielding, sustainment, and improvement modifications of DoD systems
  • System’s life-cycle costs
  • Operations and support costs
  • Support considerations and system’s design requirements
  • Support throughout its life-cycle
  • Product Support elements
  • Initial fielding and operational support of the system
  • Role of Program Manager (PM) and Product Support Manager (PSM)
  • Operating & Support (O&S) phase
  • Employing Performance-Based Life-Cycle Product Support
  • Sustainment Metrics
  • Materiel Availability, Supportability and readiness to the user

The main elements of Acquisition Based Logistics are covered including

  • Contractor Logistics Support
  • Integrated Logistics Support (ILS)
  • Life-Cycle Sustainment
  • Performance-Based Logistics
  • Supply Chain Management
  • Supply Management
  • Standardization
  • Reliability
  • Data Management
  • Sustainment Metrics
  • Just-in-Time (JIT) Inventory
  • Life-Cycle Signature Support Plan (LSSP)
  • Life-Cycle Sustainment Plan (LCSP)
  • Product Support Strategy
  • Support Concept
  • Supportability

Learn about Defense Acquisition References including:

  • DoD Directive 5000.01 “Defense Acquisition System
  • MIL-Handbook 502 “DoD Handbook Acquisition Logistics
  • Product Support Managers Guidebook
  • DoD Logistics Assessment Guidebook
  • Integrated Product Support Element Guidebook
  • Naval Aviation Systems Team Acquisition Logistics Support Plan Guide
  • Life Cycle Sustainment Plan (LCSP) Content Guide
  • Flexibility Sustainment Guide
  • Performance Based Logistics: A Program Manager’s Product Support Guide
  • Performance Based Logistics (PBL) Guidebook
  • Performance-Based Agreement Toolkit
  • Introduction to Operational Availability
  • Air Force Life Cycle Logistics Workforce Guidebook
  • DoD Logistics Transformation Strategy “Achieving Knowledge-Enabled Logistics
  • DoD Directive 4140.1 “Supply Chain Management Policy
  • DoD 4140.1R “Supply Chain Materiel Management Regulation
  • OSD “A Guide to Increased Reliability and Reduced Logistics Footprint

Supply Support Logistics Course will help participants understand Navy and Department of Defense (DoD) supply support elements which include:

  • acquisition logistics;
  • maintenance planning;
  • provisioning;
  • alteration installation management;
  • equipment/ship configuration management;
  • ship/equipment alteration development;
  • allowance development;
  • General Fund (GF) and Capital Fund (CF) material asset management;
  • material handling/storage and material outfitting.

Supply Support Logistics Training will focus on Government Furnished Equipment/Systems (GFE) and their alterations / modifications and cover the above supply support elements for GFE equipment/systems and alteration/modifications being installed on Ships / Carriers / Submarines during new construction, Navy modernization periods, and pier side alteration installation team (AIT) installations. It will also include all shore based activity functions in obtaining supply support objectives and goals.
The course will cover policies, procedures, databases, and processes, which contribute to, or function within, the overall Product Support Management (PSM) of Carriers, Ships, Submarines, and Weapon Systems/Equipment in the Navy; and include:

  • design interface;
  • sustaining engineering;
  • supply support, maintenance planning and management;
  • Packaging, Handling, Storage, & Transportation (PHS&T);
  • technical data;
  • support equipment;
  • training and training support;
  • manpower and personnel;
  • facilities and infrastructure;
  • computer resources;
  • alteration installation management,
  • ship/equipment alteration development,
  • provisioning, equipment/ship configuration management;
  • allowance development;
  • and material outfitting process.

Additionally, training on Navy alteration installation management; ship/equipment alteration development; planning yard process; and the Navy Modernization Process Management and Operations manual will be covered.
The course will review policies, procedures, databases, and processes, which contribute to, or function within the overall supply support objectives of the Navy to include the goals and objectives for new equipment/system acquisitions; alteration/modifications; new ship construction; Navy modernization process and shore activity functions and policies for the Inventory Locator Service (ILS) certification goals for supply support for provisioning, equipment / ship configuration management; GF material asset management; and material outfitting process for Ships, Carriers and Submarines.

Other Topics covered:

  • DoD Supply Chain Materiel Management Procedures
  • DoD 4140.01
  • Operational Requirements
  • Demand and Supply Planning
  • Materiel Sourcing
  • Make and Maintain Materiel
  • Delivery of Materiel
  • Materiel Returns, Retention, and Disposition
  • Supporting Technologies
  • Materiel Data Management and Exchange
  • Materiel Programs
  • Metrics and Inventory Stratification Reporting
  • Management of Critical Safety Items, Controlled Inventory Items Including Nuclear Weapons-Related Materiel
  • Management of Bulk Petroleum Products, Storage, and Distribution Facilities
  • Defense Integrated Materiel Management for Consumable Items
  • Shelf-Life Item Management Manual: Program Administration
  • Shelf-Life Item Management Manual: Materiel Quality Control Storage Standards
  • DoD 4140.65-M Compliance For Defense Packaging: Phytosanitary Requirements for Wood Packaging Material (WPM)
  • Integrated Materiel Management of Nonconsumable Items
  • Defense Materiel Disposition Manual
  •  Defense Demilitarization: Program Administration (Incorporates and cancels DoD 4160.21-M-1)
  • Defense Transportation Regulation (DTR)
  • DODM 5100.76 Physical Security of Sensitive Conventional Arms, Ammunition, and Explosives
  • DoD 5105.38-M Security Assistance Management Manual
  • DoD 5160.65-M Single Manager for Conventional Ammunition (SMCA)
  • DoDM 5200.01 DoD 5200.01-R has been reissued as DoDM 5200.01
  • DOD INFORMATION SECURITY PROGRAM: OVERVIEW, CLASSIFICATION, AND DECLASSIFICATION
  • DOD INFORMATION SECURITY PROGRAM: MARKING OF CLASSIFIED INFORMATION
  • DOD INFORMATION SECURITY PROGRAM: PROTECTION OF CLASSIFIED INFORMATION
  • DOD INFORMATION SECURITY PROGRAM: CONTROLLED UNCLASSIFIED INFORMATION (CUI)
  • DoD 5200.02-R Personnel Security Program
  • DoD 5200.08-R Physical Security Program
  • DoD 7000.14-R Department of Defense Financial Management Regulation (FMR)

Logistic Support for Government Furnished

  • GFAE: Government-Furnished Aeronautical Equipment
  • GFE: Government-Furnished Equipment
  • GFF: Government-Furnished Facilities
  • GFI: Government-Furnished Information
  • GFM: Government-Furnished Material
  • GFP: Government-Furnished Property
  • GFS: Government-Furnished Software

TARGET AUDIENCE

Government Civilian, Military, and Navy support contractor personnel, Department of Defense Contractors (Equipment / System Contractors, Shipbuilders and Ship Repair Contractors)

Jun
5
Mon
Root Cause Analysis Training @ Plano TX TC
Jun 5 @ 9:00 am – Jun 8 @ 3:30 pm
Print Friendly, PDF & Email
Root cause analysis training covers this problem solving process for conducting an investigation into an identified incident, problem, concern or non-conformity in many fields.

Root Cause Analysis Training is in great demand in many diverse industries.  TONEX’s unique, highly personalized Root Cause Analysis training will enhance and accelerate your current understanding of Root Cause Analysis, will allow you to improve technical depth and greatly widen your technical effectiveness in the Root Cause Analysis and other relevant fields.

This updated and expanded Root Cause Analysis Training course covers the fundamentals and  many different tools and methods  for root cause analysis. The Root Cause Analysis Training Course is presented  as a general description of the root cause analysis , methods and tool, its purpose and typical industry domain and applications, the procedures, an example of its use, a checklist to help the attendees to make sure it is applied properly, and TONEX root cause analysis roadmaps, forms and templates.

root cause analysis training<img class=”aligncenter size-full wp-image-11292″ src=”https://i2.wp.com/www.tonex.com/wp-content/uploads/Business_Process_Management.jpg?resize=580%2C483″ alt=”root cause analysis training” srcset=”https://i1.wp.com/www.tonex.com/wp-content/uploads/Business_Process_Management.jpg?w=1000&ssl=1 1000w, https://i1.wp.com/www.tonex.com/wp-content/uploads/Business_Process_Management.jpg?resize=240%2C200&ssl=1 240w, https://i2.wp.com/www.tonex.com/wp-content/uploads/Business_Process_Management.jpg?resize=768%2C640&ssl=1 768w, https://i2.wp.com/www.tonex.com/wp-content/uploads/Business_Process_Management.jpg?resize=576%2C480&ssl=1 576w” sizes=”(max-width: 1000px) 100vw, 1000px” data-recalc-dims=”1″ />

Root Cause Analysis for Beginners, A great point to start
“Every defect is a treasure, if the organization can uncover its cause and work to prevent it across the enterprise.” Extracted from Kilchiro Toyoda, founder of Toyota.
Root Cause Analysis training,  RCA training, is a structured process that uncovers the physical, human, and latent causes of any undesirable event in the workplace.Root cause analysis (RCA) training identifies how the investigator(s) to look beyond the solution to the immediate problem and understand the fundamental or underlying cause(s) of the situation and put them right, thereby preventing re-occurrence of the same issue.
This may involve the identification and management of processes, procedures, activities, inactivity, behaviors or conditions.
Learn about Root cause analysis (RCA) as a structured method and technique to analyze serious adverse events that affect your organization.

What will Root Cause Analysis Training cover?

  • Understand what Root Cause Analysis is
  • Root Cause Analysis Methods and Techniques
  • How to Start and Complete Root Cause Analysis
  • Learn about Methods of Root Cause Analysis
  • Explains expressed RCA as a holistic approach and analytical and creative thinking tools
  • Techniques and tools to incorporate  elements of equipment, process, environment and human reliability
  • Enhance problem-solving and trouble-shooting effectiveness
  • Plan and create  model for in-depth analysis of problem situations.
  • Human-error reduction strategies and processes involved with decision making
  • Investigation techniques and  failure-scene investigation methods also known as evidence gathering
  • Use the tools available for analysis of problem situations

Topics Covered

  • Introduction to the Field of Root Cause Analysis
  • Principles of Root Cause Analysis (RCA)
  • Root Cause Analysis (RCA) Methodologies
  • Comparing Different Root Cause Analysis (RCA) Methodologies
  • Failure Classification
  • Root Cause Analysis as an Approach
  • Opportunity Analysis
  • The ‘5 Whys’
  • Fishbone Diagrams
  • Histograms
  • Pareto Charts
  • Cause and Effect Diagrams
  • Run Charts
  • Scatter Diagrams
  • Flow Charts
  • Control Charts
  • Common Mistakes
  • Unmanageable Conclusions
  • Preventative Action
  • Cause and Effect Principles
  • Cause and Effect Analysis
  • Charting Exercises
  • Solutions thru Critical Thinking and Creativity
  • Guidelines for Group Facilitation
  • Corrective and Preventive Action (CAPA)
  • CAPA in Site Management
  • Incident Investigation
  • Mapping & reporting software

Course Agenda

Introduction to Root Cause Analysis (RCA)

  • What is Root Cause Analysis?
  • When Do We Use It?
  • What happened?
  • How did it happen?
  • Why did it happen?
  • What can be done to prevent it from happening again?
  • Basic Steps of RCA
  • Gather the facts using a timeline and interviews
  • Understand what happened
  • Identify root causes
  • Develop a Risk Reduction Plan
  • Evaluate effectiveness of actions

Essentials of Root Cause Analysis (RCA) Process

  • Define the Problem
  • Collect Data
  • Walk-Through Task Analysis
  • Human Factors Engineering
  • Organizational Policy and Procedure
  • Preparing for the Root Cause Analysis Process
  • Root Cause Analysis Process
  • Implementing the Action Plan
  • Sharing Results of Improvement

Types of Root Cause Analysis (RCA)

  • Safety-based RCA
  • Production-based RCA
  • Process-based RCA
  • Systems-based RCA

Root Cause Analysis Methods

  • What Are the Types of Causes?
  • Causal Factor Category List
  • Determine Causes of Event
  • Problem detection challenges
  • Problem detection methods
  • Selecting the right tools
  • Improving your root-cause analysis
  • Step-method
  • Why-Why
  • 5-Why Method
  • FMEA
  • Process FMEA vs. Design FMEA
  • Bow-tie
  • Event Tree Analysis (ETA)
  • Failure Tree Analysis (FTA)
  • FMECA
  • Interview
  • Fishbone Diagram (Ishikawa)
  • Criteria for Event Description
  • Cause and Effect Analysis
  • Techniques for Conducting Interviews

Root Cause Analysis Workshops and Group Projects

  • Case studies
  • Introduction of TONEX Root Cause Analysis Framework
  • Identifying the questions to determine the root causes
  • Identifying and addressing the root causes of critical incidents
  • Initial Data Gathering Techniques
  • Interactive Activities
  • Identifying corrective and preventive actions
  • Bring your own problem into the class
Jun
19
Mon
Activity-Based Intelligence Training, Activity-Based Intelligence (ABI)  Training Boot Camp, Hands-on Workshop @ Plano, TX Training Center
Jun 19 @ 9:00 am – Jun 22 @ 4:00 pm
Print Friendly, PDF & Email

Activity-Based Intelligence Training, learn about Activity-Based Intelligence solution and gain the expertise that is changing how the Intelligence Community planning, reviewing, processing and analyzing critical intelligence data in real-time from sources such as ground, airborne, ocean, space-based electro-optical, infrared, hyper-spectral sensors and others. Activity-Based Intelligence (ABI) Training  bootcamp covers all aspects of intelligence-oriented data analysis approaches for efficient, real-time data analysis. Learn about Activity-Based Intelligence (ABI) tools, principles, processes and skills for data analysis and more.

Activity Based Intelligence (ABI) has been defined and sponsored by the U.S. Office of the Director for National Intelligence and has been embraced by the major U.S. intelligence agencies and their intelligence activities such as:

Computer-assisted problem solving techniques and methodologies such as as ABI can impact intelligence analysis and make ie more efficient and timeliness since too much big data being collected for human analyst and sometimes it is impossible to see the big picture. We need to understand and take action upon historical, current and anticipated activities involving national or global security.

The intelligence extracted from ABI make it easier for analysts to identify potential adversaries and their targets. By organizing and collecting large volumes of collected data, relevant patterns can be recognized and eventual suspicious behaviors can be acted on before a possible threat is imminent. The intelligence communities have a stunning  amount of critical data at their disposal collected and stored each second, however when analyzed correctly, this analytical data set can help accelerate mission outcomes to address emerging security threats, and  quality of the analysis in real time.

 

Activity Based Intelligence (ABI)<img class=”alignnone size-full wp-image-8465″ src=”https://i2.wp.com/www.tonex.com/wp-content/uploads/Activity-Based-Intelligence-training.jpg?resize=580%2C386″ alt=”Activity Based Intelligence (ABI)” srcset=”https://i0.wp.com/www.tonex.com/wp-content/uploads/Activity-Based-Intelligence-training.jpg?w=849&ssl=1 849w, https://i0.wp.com/www.tonex.com/wp-content/uploads/Activity-Based-Intelligence-training.jpg?resize=300%2C200&ssl=1 300w, https://i1.wp.com/www.tonex.com/wp-content/uploads/Activity-Based-Intelligence-training.jpg?resize=640%2C426&ssl=1 640w” sizes=”(max-width: 580px) 100vw, 580px” data-recalc-dims=”1″ />

Seeing the Big Picture Inside Activity Based Intelligence – Looking for the big picture

Inside Activity Based Intelligence, we as analysts are looking for any interesting connections, in any types of data that constantly being produced and updated.

Activity Based Intelligence (ABI) refers to a method that allows varied types of data, almost like searching for a needle in a haystack even when we don’t know that we are looking for a needle or that we will find it in a particular haystack, very interesting.

ABI, A paradigm shift in analyzing data, points to a multi-INT approach to activity and transactional data analysis to resolve unknown-unknowns, develop intelligence, and drive collection:

  • Analyze large, diverse, known and unknown data streams in real time
  • Understand principles behind Intelligence Gathering
  • What is Activity Based Intelligence?
  • How does Activity Based Intelligence work?
  • ABI Uniqueness
  • Analyze ABI tools and techniques
  • Learn about Patterns of Life (PoL) analysis and ABI techniques applied
  • Wide-area motion imagery (WAMI), Esri’s use of ArcGIS and MARINA
  • Targeted Approach based on the Analysis of an individual Target’s Movements and Communications
  • Collection of data of all sorts
  • Use of a continuous influx of data and understanding how unconventional adversary networks operate
  • Patterns of interaction and activity in a particular area or population
  • Events, movements, measurements and transactions
  • Audio, video, infrared, radar, multispectral imagery, and information from Signals, Human and Measurement and Signature Intelligence
  • Geotags and metadata classification
  • Geo-reference to Discover
  • Integrate before Exploitation
  • Sequence Neutrality
  • Data Neutrality
  • Why data is considered equally valuable, no matter its source
  • Why classified intelligence is not prioritized over open source data
  • Discovering Unknown
  • Behaviors & Signatures
  • Known Behaviors & Signatures
  • Object-Based Production
  • Activity-Based Intelligence
  • Signature-Based Search
  • Structured Observables
  • I&W, Monitoring, Targeting
  • Known Locations and Targets
  • Unknown Locations & Targets

ABI Training Course Objectives

Upon completion of this course, the attendees will be able to:

  • Define what ABI methodology and approach is
  • Identify the motivating factors behind ABI
  • Explain value proposition of ABI
  • Define the key features of ABI
  • List the functional requirements of ABI
  • List the four pillars of ABI
  • Compare and contrast ABI, big data, Patterns of Life (PoL) and data mining and analysis methods
  • Define Extracting, Transforming, and Loading (ETL) operations
  • List ABI technology capabilities
  • Describe the important scenarios for ABI applied to intelligence or defense mission
  • Practice using the ABI methodology

Who Should Attend

Project and Program Managers, Intelligence analysts, Business Developers, Defense Contractors, System Engineers,  Software Developers or anyone other U.S. citizen who is interested in gaining key concepts and principles involved in Activity-Based Intelligence and their applications and impact to intelligence and defense missions.

Course Outline

Introduction to Activity-Based Intelligence (ABI)

  • What is Activity-Based Intelligence (ABI)
  • Activity-Based Intelligence (ABI) value proposition
  • History of ABI
  • Why ABI
  • Pillars of the ABI Approach
  • What is Patterns of Life (PoL)
  • Multi-INT approach to activity and transactional data analysis
  • How to resolve unknown-unknowns develop intelligence
  • Data Discovery Patterns
  • Data Discovery Strategies
  • Integrated intelligence and information-sharing
  • Geo-spatial intelligence (GEOINT)
  • Human Domain Analytics (HDA)
  • Open-source information
  • HUMINT or classified intelligence
  • Intelligence Taxonomy and Ontology
  • Principals of Structured Observation Management (SOM)
  • Principals of Object Based Production (OBP)
  • Role of Flexible Content Management (FCMS)
  • The ABI multi-Intelligence (multi-INT) approach
  • TrueFoundation of ABI
  • Unknown-Unknow Location vs. Behavior
  • Value of knowledge management

Process Flow for Intelligence

  • Key Intelligence Questions
  • Understanding
  • Living Knowledge
  • Objects and Activities
  • Associations and Attributes
  • Foundation
  • Georeference to Discover
  • Advanced Analytics
  • Knowledge Capture

Why ABI?

  • ABI as an intelligence tool
  • Application to the vast wash of metadata and internet transactions Scaling with data
  • ABI came out of the realization that the
  • Scheduled, targeted, stove-piped analysis and collection paradigm
  • Discover entities without signatures.
  • Analyzing vs. discovering data
  • Improve collection efficiency & effectiveness.
  • Volume, Velocity, Variety, Veracity
  • Activity-­based GEOINT vs, target-based GEOINT
  • Monitor activity
  • Analyze entities
  • Anticipate behavior and patterns
  • ABI and “pattern of life” analysis

ABI Key Elements

  • Collect, characterize and locate activities and transactions
  • Identify and locate actors and entities conducting the activities and transactions
  • Identify and locate networks of actors
  • Understand the relationships between networks
  • Develop patterns of life
  • Geo-reference to discover
  • Sensor neutrality
  • Sequence neutrality

Activity-Based Intelligence Methodology

  • Intelligence collection cycle
  • Analysis, production and operations process cycle
  • Establishing the ABI Methodology
  • ABI as an analysis methodology
  • ABI vs. Big Data
  • Methodology in Action
  • ABI methodology
  • Analytic processes applied to situational analysis
  • Sequential and pillars
  • Georeference to discover
  • Spatially and temporally indexed data
  • Integrate before exploitation
  • Data (sensor) neutrality
  • Sequence neutrality

Intelligence Discipline of Activity-based Intelligence (ABI)

  • Focusing on the activity and transactions
  • Geospatial domain actions
  • Cyber, social, financial and commercial domains
  • Big data, across all domains, as the substance for ABI analysis
  • Focused intelligence analysis, within critical timelines
  • Data and Knowledge Management for ABI
  • Information about activities, transactions and entities
  • Using activity data (and its related metadata)
  • Why associating data is vital to ABI analytics

Activity-based Intelligence (ABI) Applied

  • ABI and intelligence analysis
  • Irregular warfare, counterterrorism, counterinsurgency and counter-weapons of mass destruction
  • Geospatial analysis
  • Human network analysis
  • GIS Visualization
  • Data forecasting and modeling
  • Spatiotemporal analysis
  • Tabular visualization
  • Pivot tables
  • Link analysis strategies
  • Quantitative estimation
  • Analytic modeling
  • Ontology design
  • Graph analytics

ABI and Effective Tactical Data Science

  • Intelligence production cycle
  • Core fundamentals of Gathering and Acquiring Data
  • Geospatial data
  • Extract, Transform and Load (ETL) Operations on data
  • Geospatial Transformations
  • Textual Transformations vs. Imagery Transformations
  • Big Data and Artificial Intelligence: Intelligence Matters
  • CRUD operations
  • Difference between REST and CRUD
  • Data objects vs. complex objects abstractions
  • Example of MongoDB CRUD Operations
  • Geospatial analysis methods
  • Human network analysis methods
  • Data forecasting and modeling
  • Spatiotemporal analysis
  • Tabular visualization
  • Pivot tables
  • Link analysis strategies
  • Quantitative estimation
  • Analytic modeling

Workshops and Hands-on Exercises

Jun
26
Mon
NERC CIP Training Bootcamp | Crash Course @ TONEX Plano Office
Jun 26 @ 9:12 pm – Jun 30 @ 10:12 pm
Print Friendly, PDF & Email

NERC CIP Training Bootcamp, a 5-Day Hands-on Cybersecurity Certificate

NERC CIP Training Bootcamp,   North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) training bootcamp is a crash course style training program designed and crated to meet the needs of the electric in regards to CIP compliance: Cyber Security for NERC CIP Versions 5 & 6 Compliance.

Security specialists, CIP Senior Manager, analysts, designer engineers, system operators, directors of CIP compliance, VPs of operations.

NERC Critical Infrastructure Protection (CIP) training bootcamp is a 5-day crash course empowers attendees with knowledge and skills covering version 5/6 standards. NERC Critical Infrastructure Protection training bootcamp addresses the role of FERC, NERC and the Regional Entities.

Learn approaches for identifying and categorizing BES Cyber Systems and requirements tio implement and comply the standards including strategies for the version 5/6 requirements.

TONEX is the industry leader in Cyber Security and NERC CIP. Our courses are planned, designed and developed by NERC CIP experts in CIP implementation and audits.

Learn how NERC Critical Infrastructure Protection (CIP) requirements address physical security and cybersecurity of the critical electricity infrastructure of North America including:

  • References to NERC CIP associated documents
  • References to Implementation Plan for Cyber Security Standards
  • References to Mandatory Reliability Standards for CIP
  • Guidance for Enforcement of CIP Standards
  • References to NERC CIP Rules
  • Best practices for managing NERC Compliance
  • Protecting: physical security, cybersecurity, emergency preparedness and response
  • Business continuity planning, and recovery from a catastrophic event with emphasis on deterring, preventing, limiting, and recovering from terrorist attacks
  • Sabotage Reporting
  • Critical Cyber Asset Identification
  • Security Management Controls
  • Personnel & Training
  • Electronic Security Perimeter(s)
  • Physical Security of Critical Cyber Assets
  • Systems Security Management
  • Incident Reporting and Response Planning
  • Recovery Plans for Critical Cyber Assets
  • Deterring to dissuade an entity from attempting an attack
  • Preventing  to cause an attempted attack to fail
  • Limiting  to constrain consequences of an attack in time and scope
  • Recovering – to return to normalcy quickly and without unacceptable consequences in the interim
  • Operating, Planning, and Critical Infrastructure Protection Committee
  • Security Guidelines
  • Control Systems Security
  • Cyber Security Analysis
  • Operating Security
  • Business Continuity Guideline
  • Physical Security
  • Protecting Sensitive Information
  • Security Policy
  • Bulk Electric System Security Metrics
  • Personnel Security Clearances
  • Compliance Enforcement and Input

Learn about:

NERC CIP Training<img class=”aligncenter size-full wp-image-12504″ src=”https://i2.wp.com/www.tonex.com/wp-content/uploads/NERC_CIP_Training_Bootcamp.jpg?resize=580%2C386&ssl=1″ sizes=”(max-width: 580px) 100vw, 580px” srcset=”https://i1.wp.com/www.tonex.com/wp-content/uploads/NERC_CIP_Training_Bootcamp.jpg?w=3000&ssl=1 3000w, https://i1.wp.com/www.tonex.com/wp-content/uploads/NERC_CIP_Training_Bootcamp.jpg?resize=300%2C200&ssl=1 300w, https://i2.wp.com/www.tonex.com/wp-content/uploads/NERC_CIP_Training_Bootcamp.jpg?resize=768%2C512&ssl=1 768w, https://i0.wp.com/www.tonex.com/wp-content/uploads/NERC_CIP_Training_Bootcamp.jpg?resize=640%2C426&ssl=1 640w, https://i0.wp.com/www.tonex.com/wp-content/uploads/NERC_CIP_Training_Bootcamp.jpg?w=1160&ssl=1 1160w, https://i1.wp.com/www.tonex.com/wp-content/uploads/NERC_CIP_Training_Bootcamp.jpg?w=1740&ssl=1 1740w” alt=”NERC CIP Training” data-recalc-dims=”1″ />

Who Should Attend:
  • CIP Compliance
  • IT  cybersecurity
  • ICS and SCAD cybersecurity
  • EMS cybersecurity
  • Field and security operations
  • Incident response
  • Project managers
  • CIP Auditors
  • Any other staff from electrical utilities who are  maintaining cyber security standards across their enterprise and substations
  • Generation, transmission and distribution staff working to meet NERC CIP standards
Program Learning Objectives:
  • Discuss requirements for reliable operation of the Bulk Electric System
  • List CIP categories of assets to which CIP requirements apply
  • Describe asset classification criteria and tiers: High/Medium/Low
  • List similarities and differences between CIP standards in version 5 and 6
  • Describe NERC filings and FERC rulings on these standards
  • Deep Dive into the CIP 5/6 requirements and obligations/expectations
  • Discuss sabotage reporting process
  • Describe identification and documentation requirements of the Critical Cyber Assets associated with the Critical Assets
  • Describe roles and responsibilities for minimum security management controls to protect Critical Cyber Assets
  • Discuss requirements for identification and protection of the Electronic Security Perimeters inside which all Critical Cyber Assets
  • Describe implementation of physical security programs for the protection of Critical Cyber Assets
  • Define methods, processes, and procedures for securing those systems determined to be Critical Cyber Assets
  • Ensure the identification, classification, response, and reporting of cybersecurity incidents related to Critical Cyber Assets
  • Ensure that recovery plans are put in place for Critical Cyber Assets and that these plans with established business continuity and disaster recovery techniques and practices
Program Coverage and Highlights of Enforcement:
  • NERC CIP requirements
  • HIghlights of NERC CIP 5 & 6
  • Overview of Cyber Security for NERC CIP Versions 5 & 6 Compliance
  • Asset Identification and Governance
  • Access Control and Monitoring
  • System Management
  • Information Protection and Response
  • CIP Process highlights
  • BES Cyber System Categorization
  • High and medium impact BES vs. low impact BES
  • Operational Technology (OT) security
  • Highlights of known ICS vulnerabilities
  • Configuration Change Management & Vulnerability Assessments
  • Cyber Security for NERC CIP Compliance
  • Electronic Security Perimeter(s)
  • Information Protection
  • Incident Reporting and Response Planning
  • Personnel & Training
  • Physical Security
  • Physical Security of BES Cyber Systems
  • Recovery Plans for BES Cyber Systems
  • Sabotage Reporting
  • Security Management Controls
  • System Security Management
  • Best Practice specifications
  • Reference Architecture
  • Gap and Cyber Vulnerability Assessments
  • Firewall/Network intrusion detection
  • Access Management
  • Centralized Patch Management
  • Security Information & Event Management
  • Automated Back-up & Recovery
  • Network Segmentation
  • Intrusion Prevention System (IPS)
  • Protocol Inspection
  • Security Factory Acceptance Testing (FAT)
  • Multi vendor testing
  • Cyber Asset Protection
  • System Design, Reliability and Configuration
  • Baseline Documentation
  • Change Control Services
  • Ports & services, applications & protocols
  • Equipment changes
  • Decommission plan
Aug
28
Mon
LTE Fundamentals Training @ Nashville, Training Center
Aug 28 @ 9:00 am – Aug 29 @ 4:00 pm
Print Friendly, PDF & Email

LTE Fundamentals Training, LTE Standards Training

LTE Fundamentals Training, LTE (long-term evolution) mobile communication system, standardized by 3rd Generation Partnership Project (3GPP), a united telecommunications standard development organizations (ARIB, ATIS, CCSA, ETSI, TSDSI, TTA, TTC).

TONEX  has developed comprehensive LTE Training Programs to satisfy the
competence needs of professionals exploring new LTE business opportunities to expertise
required for operating a LTE network.

Learn the fundamentals of the LTE services, features, network architecture, radio interface and the evolution of 4G telecommunication and LTE-Advanced.

LTE Fundamentals Training – Course Description

LTE Fundamentals Training course covers the fundamentals of LTE features and procedures. It gives an in-depth high-level understanding of the LTE Systems, radio access and core network architecture  as well as the EPS Bearer Service, End-to-End QoS, policy and security. Also covered in this course are the protocols used over LTE interfaces.

LTE Fundamentals Training course gives an overview of the fundamental technology of Long Term Evolution (LTE). Attendees  will learn the basics of the LTE, LTE radio interface, including multiple input, multiple output (MIMO), OFDM, uplink and downlink, SIMO, TDD, FDD, channel coding and GSA.

Learn about LTE standards, LTE services and network technologies, including radio access, the core transport network, and service capabilities, codecs, security, quality of service (QoS) and hooks for non-3GPP radio access to the core network, and for interworking with Wi-Fi networks. Topics included: LTE Radio Access Networks (RAN), LTE/EPC Service & Systems Aspects (SA), LTE Core Network & Terminals (CT) and interworking with UMTS and GSM EDGE Radio Access Networks (GERAN).

LTE Fundamentals Training discusses all aspects of high bitrates in IP communications with Fourth Generation Mobile Communications/LTE and various aspects of LTE including change of business and service paradigm, which it is bringing to mobile communications and M2M/IoT. LTE Fundamentals Training is a rich content training course developed and delivered by knowledgeable instructors and consultants focused on the entire mobile communication community.

LTE Fundamentals Training coverage also includes: LTE services,  standards and architecture, Radio access sub-system, Evolved Packet Core (EPC), Signaling on the radio path, Macrocells, microcells, femtocells, SIM card and security, location based driven applications, and much more more.

Target Audience

The target audience for LTE Fundamentals Training course is: Business and Operations Professionals, HR, Network Engineers, Systems Engineers, Service Engineers, Service Design Engineer, and Network Design Engineer

Learning Objectives

Upon completion of completing this course, attendees will:

  • Understand what LTE and EPC are
  • Explain the evolution of cellular networks GSM, WCDMA, CDMA, TD-SCDMA, LTE and LTE-Advanced
  • Compare and contrast Service functionalities of LTE and GSM, CDMA, 1xEV-DO and UMTS
  • Understand LTE standardization and the role of 3GPP
  •  Discuss LTE service and business environment
  • List LTE and EPC terminology, services and features
  • Identify the key goals, functions and requirements of LTE and EPC
  • List LTE Radio Fundamentals, Spectrum, Standards, Network Technologies, Architectures, Generations, Terminals & Devices
  • Identify Key LTE Carriers, Network Operators & Resellers
  • List necessary functions for LTE and EPC implementation
  • Describe the key technical components of LTE and EPC
  • Explore the role of LTE and EPC in future wireless deployments
  • Discover voice and video over LTE requirements and implementation
  • Compare and contrast Service functionalities of LTE and LTE-Advanced
  • Gain a high level understanding of Voice and Video over LTE profiles
  • Examine the future of LTE, LTE-Advanced, Voice over LTE (VoLTE) and Video over LTE (ViLTE)
  • Explore the role of LTE and EPC in future M2M and IoT deployments

Course Outlines

LTE Overview

  • What is LTE?
  • LTE Standardization
  • 3rd generation partnership project (3GPP)
  • 3GPP history
  • 3GPP, the current organization
  • 3GPP releases
  • GPP LTE release and beyond (LTE-advanced)
  • IMT-advanced process
  • LTE Market Trends
  • Key LTE Business Challenges
  • End User LTE Services and Applications

LTE Architecture Overview

  • Overall high level description of LTE
  • LTE performance
  • FDD, TDD, LTE advanced
  • Frequencies for LTE
  • Basic parameters of LTE
  • Radio access subsystem: E-UTRAN (also called EUTRA) E-UTRAN characteristics
  • E-UTRAN interfaces
  • Macrocells, microcells and femtocells
  • Core network
  • LTE network elements
  • Functional split between the E-UTRAN and the EPC
  • LTE – roaming architecture
  • LTE network mobility management
  • Role of IMS in LTE/EPC
  • Voice over LTE (VoLTE)
  • Video over LTE (ViLTE)
  • SIM, USIM and ISIM

LTE Network Deployment considerations

  • LTE Radio Network Considerations
  • Transport Network Considerations
  • LTE/EPC Core Network Considerations

LTE  Radio Technology

  • E-UTRAN (Evolved UTRAN)
  • What is OFDM/OFDMA?
  • OFDM (Orthogonal Frequency Division Multiplexing)
  • SC-FDMA (Single-Carrier Frequency Division Multiple Access)
  • FDD and TDD
  • OFDMA advantages
  • LTE channel: bandwidths and characteristics
  • OFDM applied to LTE
  • MIMO (Multiple Input Multiple Output)
  • General facts behind MIMO

LTE Flat IP Core Network

  • Fixed mobile convergence
  • IP multimedia subsystem (IMS)
  • General description of IMS
  • Session Initiation Protocol (SIP)
  • IMS components and interfaces
  • Evolved packet system in GPP standards
  • Policy and charging rules function (PCRF)
  • Enhanced voice quality
  • Circuit-switched fallback (CSFB)
  • Simultaneous voice and LTE (SVLTE)
  • Voice over LTE (VoLTE)
  • Over-The-Top (OTT) applications

LTE Protocols and Procedures

  • LTE RAN protocols and procedures
  • Mobility in LTE
  • LTE Systems radio access network architecture
  • QoS in LTE
  • Policy and charging
  • LTE security
  • Principles of LTE security
  • LTE EPC security
  • SIM card physical interface
LTE Training – LTE (Long Term Evolution) Training Bootcamp, Crash Course @ TONEX Nashville, TN
Aug 28 @ 9:00 am – Aug 31 @ 4:00 pm
Print Friendly, PDF & Email

Why should you choose TONEX LTE Training?

LTE Training by TONEX is an intensive learning experience that cover the essential elements of Long Term Evolution (LTE). LTE Training Crash Course covers the foundation of LTE, LTE RAN, concepts behind OFDMA/SC-FDMA, Overview of MIMO, LTE Cell Planning, LTE Capacity Planning, EPC, IMS, Diameter, EPC Signaling, Security, Voice over LTE, LTE-Advacned, LTE Backhaul (both Microwave and Metro Ethernet), PPE-TE, MPLS-TP and more.

TONEX Long Term Evolution (LTE) training crash course – bootcamp introduces LTE and related technologies required to plan, design, implement and manage the evolution route for wireless and cellular network operators towards 4G broadband mobile networks. These courses range from basics technological overview programs to detailed engineering and design LTE courses.

TONEX has been involved with over couple of dozens of LTE deployment worldwide, doing training for the engineers and non-engineers, LTE planning, architecture, systems engineering, design, implementation, security and OSS/network management.

LTE Training Boot Camp ® is the answer to your LTE-EPC/EPS technology needs. This innovative and intensive learning experience covers the essential elements of LTE and SAE/EPC/EPS in a nutshell by the industry experts.

Here is the schedule you can expect to follow during your boot camp:

Overview. We begin the seminar with an overview of LTE, its recent progression and what to expect during the seminar.

Body of Class. Throughout the seminar, we add a lot of detail to what we talked about in the overview. Expect comprehensive information that is current and relevant. Also expect to engage in hands-on activities and other interactive, real-world examples that make sense out of the information.

Wrap Up. The specialty course comes to a close, and clients receive their certificates. Tonex provides both Tonex certificates and industry certificates for clients to have on file to show their completion of the LTE training programs.

By choosing Tonex for your company’s technology, management and training seminars, you are getting the most up-to-date, highest quality boot camps possible. Our LTE courses are specifically designed by experts in the field, and they are continuously evaluated to ensure they are up to date. Contact Tonex to learn more about our innovative LTE training courses and the difference they can make for your employees.

LTE (Long Term Evolution) Training Bootcamp can combine the following training modules into a 4-days intense bootcamp based on the customer needs and requirements:

  • OFDM and MIMO
  • LTE Air Interface and Core Network
  • LTE Core Network Planning and Design
  • LTE RF Planning and Design
  • LTE Protocols and Signaling
  • LTE RAN Signaling and Operations
  • LTE RF Performance
  • LTE QoS
  • LTE Capacity Planning and Traffic Engineering
  • LTE Security
  • LTE GSM/UMTS and EV-DO (eHRPD) Interworking
  • IPv6 and MPLS
  • LTE-Advanced (R10)
  • IMS and Voice over IMS for LTE-EPC
  • Voice over LTE (VolTE)
  • SMS over LTE

LTE Training Crash Course Outline (base):

  •  Introduction to LTE (Long Term Evolution)
  • Overview of IP Convergence in the mobile networks
  • Introduction to LTE (Long Term Evolution) and SAE/ePC/EPS
  • LTE Network Architecture
  • LTE Interfaces and protocols
  • LTE Packet Core (SAE/EPC and EPS)
  • LTE/SAE/EPC Network Architecture
  • Evolved UTRAN and Evolved Packet Core
  • LTE/EPC Interworking
  • LTE Protocol Stacks
  • LTE Interfaces covered in details
  • LTE-EPC Signaling
  • IMS (IP Multimedia Subsystem) in LTE
  • Overview of Diameter Protocol
  • Diameter Applications in IMS
  • LTE Operations and Procedures
  • LTE Planning and Optimization
  • Ethernet Backhaul for LTE
  • QoS Applied to LTE-EPC
  • PCC (Policy and Charging Control
  • LTE and EPC Security
  • Overview of LTE Air Interface; Overview of OFDM and MIMO
  • LTE RF Planning and Design
  • LTE Backhaul Requirements
  • LTE Backhaul Aggregation Network Technology
  • Overview of LTE-Advanced

 

Who Should Attend

Engineers and Non-Engineers professionals who need a through understanding of LTE, EPC, Services, Protocols, RF and Core Planning and Design, Backhaul, Capacity Planning, QoS, Security, VoLTE and LTE-Advanced,

Objectives

Upon completion of this training, the attendees will be able to :

  • Understand HSPA/HSPA+ and Migration to LTE/EPC/EPS
  • Understand how Different End User Services are Performed in LTE/EPC/EPS
  • Understand and Comprehend the basics of LTE/EPC/EPS
  • Understand LTE Architecture, Protocols and Signaling
  • Understand LTE Network Architecture and Protocols (Radio and Core)
  • Understand the Main Functionality in the Evolved UMTS Radio Access Network, E-UTRA/E-UTRAN or LTE
  • Understand LTE Multiple Access Methods: OFDMA and SC-FDMA and MIMO
  • Describe Evolved Packet Core (EPC), SAE (System Architecture Evolution) and Evolved Packet System (EPS)
  • Describe UTRAN, All IP Network (AIPN) and E-UTRA/E-UTRAN architecture
  • Highlight E-UTRA Air Interface and physical layer (downlink and uplink) functionalities and procedures
  • Highlight E-UTRA Layer 2 and 3 Signaling Functionalities and Procedures
  • Highlight LTE Radio and Core Network Planning and Design Procedures
  • Highlight LTE Backhaul Requirements
  • Describe LTE Backhaul Aggregation Network Technology
  • Understand LTE Traffic Engineering
  • Identify LTE Interworking
  • Identify the following aspects of LTE networks: Quality of Service (QoS), Call setup procedures, Mobility support, LTE and EPC Security Architecture
  • Describe Call flows and operational scenarios in HSPA/HSPA+ and LTE

Outline

LTE Training Modules (Customizable based on attendee’s background, needs and objectives)

What is LTE (Long Term Evolution)?

  • Evolution from GSM/GPRS and UMTS/HSPA to LTE and LTE Advanced
  • GSM (Global System for Mobile Communications
  • GPRS (General Packet Radio Service)
  • EDGE and EDGE II
  • UMTS (Universal Mobile Telecommunication System)
  • HSPA/HSPA+
  • LTE and LTE Advanced

 

Overview of IP Convergence in the mobile networks

  • Wireless Internet Basics
  • GSM/EGPRS/UMTS/HSPA/HSPA+
  • Ethernet Backhaul for LTE
  • LTE Protocols and Signaling
  • Overview of LTE SAE, Evolved Packet Core (EPC) and EPS
  • Overview of LTE-EPC Networks and Signaling
  • LTE and 1x/1xEV-DO (eHRPD) Interworking
  • LTE and GSM/UMTS Interworking
  • IMS Architecture and Protocols Applied to LTE
  • LTE and EPC Security
  • QoS Applied to LTE-EPC

 

Introduction to LTE (Long Term Evolution) and EPC/EPS

  • Long Term Evolution (LTE) as a new radio platform technology
  • Support to achieve higher peak throughputs than HSPA+ in higher spectrum bandwidth
  • LTE for mobile, fixed and portable wireless broadband access
  • Optimized for IP-based traffic
  • Increasing capacity
  • Reducing network complexity
  • Lowering deployment and operational costs
  • Enhanced UMTS Air Interface (E-UTRA)
  • System Architecture Evolution (SAE) and Evolved Packet Core (EPC)
  • EUTRAN/LTE and the SAE/EPC as the Evolved Packet System (EPS)

 

LTE Network Architecture

  • LTE Interfaces and protocols
  • Introduction to E-UTRAN
  • E-UTRAN network architecture
  • E-UTRAN protocols
  • Orthogonal Frequency Division Multiplexing (OFDM)
  • Multiple Input/Multiple Output (MIMO)
  • Architecture and node functions
  • The LTE Evolved Packet System (EPS)
  • LTE SAE Evolved Packet Core (EPC)
  • LTE-EPC Network Architecture
  • Network nodes and roles of HSS, MME, S-GW, P-GW, and PCRF
  • Key interfaces: S1, S5, S6, S10 and S11
  • Key features and services

 

LTE Packet Core (SAE/EPC and EPS)

  • Mobility Management Entity (MME)
  • User Plane Entity (UPE)
  • Serving Gateway (S-GW), PDN-GW and enhanced Packet Data Gateway (ePDG)
  • DIAMETER, IPv6, SIP, SCTP and SIGTRAN
  • Role of IP Multimedia Subsystem (IMS)
  • Co-existence and Inter-working with 3GPP Radio Access Technology (RAT)
  • Architecture and migration

 

LTE/SAE/EPC Network Architecture

  • New enhanced base station, “Evolved NodeB (eNodeB)
  • LTE air interface and performs radio resource management for the evolved access system
  • Access GateWay (AGW) and termination of the LTE bearer
  • Key logical functions
  • MME (Mobility Management Entity) for the Control
  • SAE PDN GW (System Architecture Evolution Packet Data
  • Network GateWay for the User Plane
  • Comparing the functional breakdown with existing 3G architecture
  • Radio Network elements functions,
  • Radio Network Controller (RNC), the AGW and the enhanced BTS (eNodeB)
  • Core Network elements functions
  • SGSN and GGSN or PDSN (Packet Data Serving Node)
  • Routers and the AGW
  • Overview of E-UTRAN’s Logical, Transport and Physical channels UE protocol stack
  • Changes in MAC, RLC, RRC, NAS and PDCP

 

Evolved UTRAN and Evolved Packet Core

  • Basic Concepts: bearers, Quality of Service
  • NAS (Non Access Stratum) Protocols – EMM and ESM
  • EPS Mobility Management (EMM) Procedures
  • ESM Session Management (ESM) Procedures
  • GTP – the GPRS Tunneling Protocol
  • GTP-C and GTP-u
  • Main GTP Procedures for EPS
  • Mobility in EPS
  • Multimedia over IP and IMS Basics
  • EPS Security Mechanisms

 

LTE/EPC Interworking

  • Interworking with 3GPP IP-access
  • Interworking with Non-3GPP IP-access
  • PCC (Policy and Charging Control)
  • X2, S1 and S11-interface protocol stacks
  • E-UTRA Layer 3 Protocols (NAS and RRC)
  • Non Access Stratum protocols and procedures (EMM and ESM)
  • Idle mode mobility mechanisms
  • NAS security mechanisms
  • The S1 and S11-Interface
  • S1 Application Protocol (S1AP) procedures
  • The GTP version 2 protocol (eGTP)
  • X2 Application Protocol (X2AP) procedures
  • Data forwarding and in-order delivery of data PDUs at handover
  • Role of SCTP and IPv6 in LTE-EPC
  • End-to-end signaling and traffic flow

 

Overview of LTE and EPC Protocol Stacks

  • LTE-Uu Interface Protocols
  • MAC, RLC, PDCP and RRC
  • UE states and state transitions (NAS and RRC)
  • Radio Resource Control (RRC) procedures
  • Packet Data Convergence Protocol (PDCP)
  • Radio Link Control Protocol (RLC)
  • Medium Access Control Protocol (MAC)
  • E-UTRAN and NAS Protocols
  • S1 and X2 interfaces and protocol stack
  • NAS states and functions
  • NAS messaging
  • Network identities of UE and EPC
  • Connected Mode and UE States
  • Attach to the Network
  • Selection of MME, S-GW, and P-GW
  • Authentication and IP address allocation
  • Default bearer setup and registration
  • LTE-EPC Protocols
  • NAS protocol states
  • Role of EMM and ESM
  • GTPv2-C, GTP-U, Proxy-MIP (PMIPv6)

 

Overview of LTE and EPC  Interfaces

  • S1: S1-MME/S1AP (eNB – MME)
  • S1-U (eNB-SGW)
  • S2A, S2B
  • X2 (eNB – eNB)
  • X2AP (X2 Application Protocol)
  • S3 (S4 SGSN – MME)
  • S4 (S4 SGSN – SGW)
  • S5 (SGW-PGW)
  • S6A (HSS – MME)
  • S6B (PGW – 3GPP AAA)
  • S6D (HSS – S4 SGSN)
  • S8 (SGW – PGW)
  • S9 (PCRF – PCRF)
  • S10 (MME – MME)
  • S11 (MME – SGW)
  • S12 (UTRAN – SGW)
  • GX (PCRF – PGW)
  • GXC (PCRF-SGW)
  • RX (PCRF – IP APPLICATION [P-CSCF FOR IMS])
  • GR (SGSN – HSS)
  • GN (SGSN – MME / SGSN – PGW)
  • GP (SGSN – PGW)
  • SGi

 

LTE-EPC Signaling Principals

  • Network identities and UE identities
  • Signaling bearers
  • Data bearers, EPS bearers
  • PDN connections and APNs
  • Intra-LTE Mobility
  • X2-based handovers
  • Intra and inter MME handovers
  • Intra and inter S-GW handovers
  • Tracking area updates
  • IMS and Support for Voice
  • IMS and seamless mobility
  • Circuit-Switched Fallback (CSFB)
  • Voice Call Continuity (VCC)
  • Single Radio Voice Call Continuity (SRVCC)

 

IMS (IP Multimedia Subsystem) in LTE

  • IP Multimedia Subsystem (IMS) Architecture
  • P-CSCF (Proxy Call Session Control Function)
  • CSCF (Interrogating Call Session Control Function)
  • S-CSCF (Serving Call Session Control Function)
  • BGCF (Breakout Gateway Control Function)
  • MGCF (Media Gateway Control Function) / MGW (IMS-MGW)
  • IMS Signaling Protocols
  • IMS Scenarios & Operations
  • IMS Quality of Service

 

Overview of Diameter Protocol

  • Diameter and Related Interfaces
  • Diameter Protocol
  • Diameter Node
  • Diameter Peer
  • Client
  • Server
  • Agent
  • Relay Agent
  • Proxy Agent
  • Redirect Agent
  • Diameter Applications in EPS
  • Diameter in EPS
  • S6a between MME and HSS
  • S6d between S4-SGSN and HSS
  • S13 between MME and EIR
  • S13 ’ between S4-SGSN and EIR
  • S9 between Visited PCRF and Home PCRF
  • Gx between PDN-GW and PCRF
  • Gxx (Gxa, Gxb, Gxc) for policy control
  • Gy between PDN-GW and OCS
  • Gz between PDN-GW and OFCS
  • Rx between P-CSCF and PCRF
  • Sp between PCRF and SPR

 

Diameter Applications in IMS

  • LIA: Location-Info-Answer
  • LIR:Location-Info-Request
  • MAA: Multimedia-Authentication-Answer
  • MAR: Multimedia-Authentication-Request
  • PPA: Push-Profile-Answer
  • PPR: Push-Profile-Request
  • RTA: Registration-Termination-Request
  • RTR: Registration-Termination-Request
  • SAA: Server-Assignment-Answer
  • SAR: Server-Assignment-Request
  • UAA: User-Authorization-Answer
  • UAR: User-Authorization-Request

 

LTE Operations and Procedures

  • System acquisition
  • Idle mode operations
  • Synchronization
  • Cell search and random access
  • RRC connection establishment
  • Traffic operations in DL & UL
  • Bearer setup and handover
  • Power control
  • LTE/SAE signaling
  • EPC (MME) registration
  • Security procedures

 

LTE Planning and Optimization

  • Traffic and QoS considerations
  • Security considerations
  • Capacity planning considerations
  • Planning tools
  • Antenna selections
  • Site location and integration

 

Ethernet Backhaul for LTE

  • Wireless Networks Backhaul Overview
  • GigE and Metro Ethernet
  • IP and MPLS/GMPLS
  • Ethernet Backhaul for LTE
  • Carrier Ethernet in IP Backhaul
  • Circuit Emulation (CESoE) and Circuit Bonding
  • LTE Backhaul Evolution Scenario
  • LTE Backhaul Capacity Planning

 

QoS Applied to LTE-EPC

  • General Requirements for LTE QoS
  • End User Requirements for QoS
  • LTE End-to-End QoS Architecture
  • LTE Service Establishment and QoS
  • LTE QoS Parameters
  • The class of QoS
  • Guaranteed Bit Rate (GBR)
  • Level of latency (delays in packet transmission)
  • Jitter (variation in latency)
  • Dropped packets
  • EPS bearers, SDFs and TFTs
  • PCC Architecture
  • Service based Local Policy (SBLP)
  • Policy Control Function (PCF)
  • Technical Requirements for LTE QoS
  • LTE Bearer Service Attributes
  • Mapping QoS to LTE Services

 

PCC (Policy and Charging Control

  • PCC architecture
  • Policy and Charging Control Architecture
  • Policy and Charging Rules Function – PCRF
  • Subscriber Profile Repository (SPR)
  • Application Function (AF)
  • Policy and Charging Enforcement Function (PCEF)
  • Gx, Rx and Sp interfaces
  • Policy Control
  • QoS handling and authorization
  • Charging Control
  • Roaming Scenarios and the S9 interface

 

LTE and EPC Security

  • LTE Security Architecture
  • UMTS and HSPA/HSPA+ Security Features
  • Security in E-UTRAN
  • Security in EPC/EPS
  • Authentication and Key Management (AKA)
  • AKA Algorithms
  • LTE Security Procedures

 

Overview of LTE Air Interface; Overview of OFDM and MIMO

  • LTE Air Interface
  • Basics of OFDM and OFDMA
  • Basics of SC-OFDMA
  • LTE DL OFDMA
  • LTE UL SC-OFDMA
  • LTE Antenna Considerations
  • Principles of MIMO
  • Radio Resource Management requirements
  • The eNB host functions
  • Radio Resource Management
  • Radio Bearer Control
  • Radio Admission Control
  • Connection Mobility Control
  • Dynamic Resource Allocation (scheduling)

 

LTE RF Planning and Design

  • Overview of LTE Radio Network Design and Engineering
  • Link Budget for LTE
  • LTE Capacity Planning
  • LTE Design and Site Selection
  • LTE Configuration Parameters
  • LTE Operational Parameters
  • KPIs in LTE Radio Network

 

LTE Backhaul Requirements

  • LTE Services
  • LTE User Download Speeds
  • Estimated Net LTE User Data Peak Rates
  • LTE Cell Site Backhaul Requirements
  • Topologies for LTE Backhaul
  • Hub and Spoke
  • Tree/Tiered Networks
  • Mesh And Ring Networks
  • Ring Network Topology
  • LTE Capacity Planning Models
  • Statistical Traffic Distribution
  • Traffic Dimensioning
  • Traffic Asymmetry

 

LTE Backhaul Aggregation Network Technology

  • Technologies
  • RPR
  • IP/MPLS and TP-MPLS
  • VPWS/VPLS/H-VPLS
  • GMPLS
  • PBB-TE
  • EPON
  • Microwave wireless
  • QoS support
  • Backhaul migration
  • IP/Ethernet backhaul
  • Phased migration options
  • Backhaul Evolution Strategies for LTE Operators
  • Intelligent mobile core platform
  • Metro IP edge router platform and
  • Intelligent network management system
  • IP/MPLS-based backhaul platform
  • IP/GMPLS-based backhaul platform

 

Overview of LTE-Advanced

  • IMT-Advanced by the International Telecommunication Union (ITU)
  • LTE-Advanced in 3GPP in Release 10
  • LTE-Advanced to qualify as IMT-Advanced/4G
  • LTE-Advanced as a further evolution of LTE, an OFDMA-based technology, specified in Release 8 and 9
  • Evolution of current OFDMA approaches
  • High-order MIMO (e.g., 4X4)
  • Wider radio channels (e.g., 50 to 100 MHz)
  • Optimization in narrower bands (e.g., less than 20 MHz) due to spectrum constraints in some deployments
  • Multi-channel operation in either same or different frequency bands
  • Ability to share bands with other services
  • IMT-2000 and IMT-Advanced
  • 450 MHz band
  • UHF band (689-960 MHz)
  • 2.3 GHz band
  • C-band (3 400-4 200 MHz
LTE Training Long Term Evolution Training 101 @ Nashville Training Center
Aug 28 @ 2:00 pm – Aug 29 @ 9:00 pm
Print Friendly, PDF & Email

TONEX LTE Training 101 will give you an effective introduction to the technology and market needs.

Sep
11
Mon
Certified In-Building Wireless Network Design Training | In-Building Wireless Training @ TONEX Nashville, TN
Sep 11 @ 9:00 am – 4:00 pm
Print Friendly, PDF & Email

Certified In-Building Wireless Network Design Training, A Hands-on Certification Training by TONEX – Earn 26 CE (PDH – Professional Development Hours from PIE)

Certified In-Building Wireless Network Design Training provides knowledge and skills for in building RF Engineering and Design. In-Building Wireless Training course will cover all the essentials aspects of the wireless indoor network planning, design, implementation, and optimization.

In-Building Wireless Training Program is designed to give you knowledge and skills in  in-building wireless from concepts to optimization. The course modules are covering: indoor design concepts, planning, design, network deployment, installation and optimization process. Learn about indoor wireless planning, site surveys, design, project management, and commissioning of indoor systems including DAS (distributed antenna systems) and small cells.

Discover how to examine building layout, coverage and capacity requirements, and service objectives, to provide an affordable indoor design and solution.  Guidelines and technical, product selection, installation, commissioning, performance, GoS, QoS, QoE, optimization, and complete documentation are included in our training solution to assure cellular/PCS, two-way radios, and other mobile devices work reliably in buildings, tunnels, bridges, airports, concert halls and sport venues.

Master your knowledge and skills to plan, design, implement and optimize indoor wireless and small cell networks. Learn about RF, radio waves, propagation, antennas,  modulation, coding, services, architecture, design, capacity planning, verification, interference and various trends in-building technologies including DAS, WiFi, GSM, CDMA, 3G and LTE-Advanced.

Understand design and implementation of indoor wireless technologies, Distributed Antenna Systems (DAS) and small cell technologies. Discover methods and tools for indoor wireless planning, design, implementation, deployment and optimizations of indoor wireless and small cell networks.

During the training, we will work with real projects to evaluate the feasibility, coverage  and performance of the indoor wireless network, write system requirements and specifications, verify and validate design, implement and optimize the solution and produce as-built specs.

Learning Objectives

Upon completing this course, the attendees will be able to:

  • List the various types of indoor wireless systems and solutions including DAS and small cells
  • Discuss indoor wireless system solutions, DAS and small cells and their co-existence with micro and macro cells
  • Determine the types of indoor wireless for a given coverage, technologies such as WiFi and LTE and service capacity requirements
  • Determine how to effectively design an indoor wireless system in a cost effective manner with the highest performance as expected
  • Identify the key RF parameters and design targets of indoor wireless systems including mobile, WiFi and Public Safety
  • Discuss tools and methods to create as-built documentation
  • Identify the various components and equipments used in deploying indoor wireless systems
  • Prepare a indoor wireless systems engineering
  • Discuss indoor wireless system ConOps, requirements, design, testing and optimization processes
  • Prepare  indoor wireless link budgets using our free tools
  • Prepare link budgets for the optical links using our free tools
  • List the indoor wireless system configuration and design parameters
  • Identify best practices for the deployment of indoor wireless systems including project management site survey design, installation and optimizations.
  • Identify the factors that may impact indoor wireless system performance through hands-on exercises and workshops.

Who Should Attend

Become expert in  in-building wireless and perform service provisioning of cellular/PCS/LTE, Analog, VHF/UHF, Public Safety and WiFi (WLAN’s) inside buildings and other structures such as sport venues, concert halls, airports, tunnels and bridges.

Whether you work for a wireless service provider, system integrator, ISP, equipment manufacturer, building manager or business owner, this course will enhance your knowledge and skills to evaluate various wireless services in poor coverage areas and know-how on technologies to expand coverage into new areas. Our experienced and dedicated instructors will help you maximize your in building wireless communication capabilities in the most cost effective manner during this course.
This course is a comprehensive technical program to plan, design, implement, verify, validate, optimize indoor wireless systems including DAS and small cells and is intended for project managers, engineers, technicians and anyone else involved in planning, design,  deployment and optimization of indoor wireless systems.

Course Agenda

Indoor wireless System  Overview

  • What and Why?
  • Types of Indoor wireless systems
  • DAS (Distributed Antenna Systems)
  • Pico and Micro-cells
  • Small Cells
  • WiFi hotspots
  • Indoor wireless technology overview
  • Coverage requirements
  • Indoor wireless capacity planning
  • Indoor wireless system architecture
  • Active and passive solutions
  • Planning considerations
  • Indoor wireless system design considerations
  • Site surveys
  • Pico and macro cell site considerations
  • Mobile networks considerations
  • LTE small cell considerations
  • WiFi considerations
  • Public Safety considerations
  • Installation considerations
  • Optimization considerations

Indoor wireless System Planning and Design

  • Project deployment process
  • Project management and system requirements baselines
  • Scope of Work (SoW) for an In Building Wireless System
  • Analysis of services
  • Business and budgetary objectives
  • Facility and document the as-built configuration
  • RF environment in the design frequency
  • Building drawings
  • Design challenges
  • Network architecture and  topology
  • RF planning and design
  • Principles of sire survey
  • Radio waves and propagation
  • RF and optical Link Budget calculations
  • Materials and RF propagation
  • Refraction, Reflection, Diffraction and scattering
  • Noise and Noise Figure
  • Intermodulation and BER
  • In-Building components
  • Backhaul connection to the network
  • Distributed Antenna Systems (DAS)
  • Network management and operations
  • in-Building Wireless System Architecture
  • Passive DAS
  • Active DAS
  • Hybrid DAS
  • Repeaters vs. base station solutions
  • Technical considerations for various technologies
  • GSM, CDMA/CDMA2000, UMTS, HSPA/HSPA+, LTE and LTE-Advanced
  • OFDM/OFDMA/SC-FDMA and MIMO
  • 802.11a/b/g/n/ac/ad

Workshop: Designing an indoor wireless  project

  • System design and development
  • wireless voice/data needs
  • Software analysis to specify optimum placement of access points and cells
  • Large network “holes”
  • Radio resources for outside mobile users.
  • Macrocell
  • Capacity requirements and security measures
  • Design to architectural and operational constraints
  • System procurement management
  • Equipment specifications
  • Performance guarantees
  • Construction requirements
  •  Site-walks and pre-bid

Indoor wireless Site Survey

  • Environment, layout and network requirements
  • Antennas
  • RF propagation
  • RF measurements
  • Equipment location
  • Cable routing
  • Performance evaluation
  • Optimization

DAS and Small Cell Technology

  • What is DAS?
  • What is a small cell?
  • Types of DAS and small cells
  • Indoor vs. outdoor
  • Co-existence with macro-network
  • Coverage considerations
  • Capacity considerations
  • Small cell Connectivity
  • Small cell architectures
  •  Power consideration

Testing, optimization, and final acceptance

  • Installation and integration management
  • Project management of installation and testing with all systems
  • Integration with other systems and trades
  • Verify proper interconnect
  • Configuration of access points
  • Tests of system performance
  • System security demonstration
  • Operational verification tests through facility with client staff
  • As-built and test documentation for completeness

Workshop 2: Designing an Indoor Wireless System with PCS/Cellular/LTE and Public Safety Coverage Extension

  • Dedicated radio resources
  • General Technical Features
  • Frequency range 100 MHz to 100 GHz
  • Accurate propagation predictions
  • Propagation models
  • Conductivity, permittivity and transmission loss
  • Time dispersion/multipath (RMS delay spread) studies
  • Angle of arrival calculations
  • 2D and 3D ray-tracing models for outdoor microcell
  • Indoor wireless LAN/PBX/cell-extender studies.
  • Line-of-sight (LOS) and NLOS rays
  • Wall transmission
  • Corner diffraction
  • Attenuation due to partial Fresnel zone obstruction.
  • Hata propagation model
  • COST-231 propagation model
  • Walfisch-Ikegami propagation model
  • Simplified outdoor microcell studies
  • Multi-story indoor studies
  • Calculate attenuation between floors
  • Plot results in a 3D, multi-story projection.
  • Free-space propagation
  • Reflection
  • Diffraction
  • Diffuse wall scattering
  • Pico and microcells
  • High and low powered passive repeaters
  • Passive coax-based transport
  • Low and high powered active distributed antenna systems
  • Radio over Fiber (RoF)
  • Cable-distributed vs. Fiber-distributed

Workshop 3: In-Building Wireless, DAS and Small Cell System Design Case

  • Application and Design Principles
  • Using BDA devices and systems
  • Repeaters, Boosters, Cell Enhancers
  • HVAC ducting “waveguide” distributed
  • Over-the-air donors
  • Microcell and on-Site donors
  • Community and Multi-Operator
  • Public Cellular and PCS
  • Law Enforcement, Public Safety
  • 150, 450, 800-900 trunked
  • SCADA telemetry: 150, 450, 900 MHz.
  • Public Unlicensed Mobile
  • Basic Modulation Types
  • Law Enforcement, Public Safety: FM, QPSK
  • SCADA telemetry :  FM, QPSK, others
  • Public Unlicensed Mobile
  • Signal Quality Criteria
  • C/I, Linearity, Dynamic Range
  • Headroom and Noise Performance
  • Interference – External sources
  • Internal sources generated
  • Reflection-mode in cluttered environment
  • Obstructions and Diffraction
  • In-Building Propagation
  • Free-space in rooms, hallways
  • Attenuation through walls, floors, ceilings, doors, windows
  • Frequency variability (“tilt”) of losses
  • Loss, Tilt, and coupling in the use of HVAC ducts as waveguide
  • Gains and Losses of system components
  • Basic Design, Operational, and Troubleshooting discussions

Discussions and Solution Case Studies to focus on:

  • Challenges in designing and executing in-building wireless projects
  • Factors affect ROI and ongoing costs
  • Gain a holistic approach to RF planning and solution integration
  • Auditing In-building Wireless Deployment
  • Active Distributed Antenna System (DAS)
  • Passive DAS
  • Repeater
  • Pico or microcell
  • Facility and Installation Considerations
  • What is the type of facility?
  • Open/warehouse
  • Industrial/Manufacturing
  • Cubed office
  • Drywall office
  • Hi-rise building
  • Government building
  • Hospital building
  • Mall
  • Airport
  • Convention center
  • Stadium/Arena
  • Calculating number of subscribers within the venue
  • Single-mode fiber vs. multi-mode fiber
  • CAT3/5 cable
  • CATV
  • Coax
  • Installation of conduit/innerduct required
  • Plenum-rated cables
  • Leaky Coax
  • RF carriers per band

 Final Assessment, Project and Certification

Sep
28
Thu
PPAP Training | Production Part Approval Process @ TONEX PLano
Sep 28 @ 9:00 am – Sep 29 @ 4:00 pm
Print Friendly, PDF & Email

PPAP Training, Production Part Approval Process Training 

PPAP Training, Production Part Approval Process Training Course Description 

PPAP Training course, Production Part Approval Process Training discusses the requirements, procedures and protocols, and practices and activities specified by the PPAP manual.

PPAP training, Production Part Approval Process Training<img class=”alignnone wp-image-9845 size-full” src=”https://i0.wp.com/www.tonex.com/wp-content/uploads/PPAP.jpg?resize=580%2C386″ alt=”PPAP training, Production Part Approval Process Training” srcset=”https://i2.wp.com/www.tonex.com/wp-content/uploads/PPAP.jpg?w=800&ssl=1 800w, https://i0.wp.com/www.tonex.com/wp-content/uploads/PPAP.jpg?resize=300%2C200&ssl=1 300w, https://i1.wp.com/www.tonex.com/wp-content/uploads/PPAP.jpg?resize=768%2C512&ssl=1 768w, https://i2.wp.com/www.tonex.com/wp-content/uploads/PPAP.jpg?resize=640%2C426&ssl=1 640w” sizes=”(max-width: 580px) 100vw, 580px” data-recalc-dims=”1″ />

Through this PPAP training, students prepare a sample PPAP package for submission, from the beginning to the end.

What is PPAP?

Production Part Approval Process (PPAP) is an analysis management to measure the capability of the system. Once the PPAP protocol is obeyed, the number of dysfunctional parts will reduce down to below a handful per million parts produced. This conclusive process will evaluate the performance of all the processes and steps involved in producing parts and it will assure that all the specifications and requirements are met.

This process assesses how well the processes used to produce parts will meet the specifications. Participants who complete this course They also know how to conduct and evaluate the processes, and

Added Value of the PPAP Training:

  • Learn how to evaluate a PPAP report
  • Review and prepare PPAP forms
  • Learn how to submit PPAP reports
  • Discuss the specific needs for part approval records or sample retention
  • Know when/where PPAP submissions are required
  • Recognize various levels of PPAP submission
  • Understand where and how the PPAP submissions can be incorporated into the APQP
  • Understand the statistics of process capability, process capability index, performance capability, and performance capability index (Cp, Cpk, Pp, and Ppk.)
  • Learn how to present the outcomes to the customer in a high-qualified format align with the customer’s expectation.

TONEX PPAP Training Will Also Cover:

  • The concepts and principals of the PPAP
  • All the components of PPAP
  • Review all the required documentation for each submission level
  • Real-life examples and case studies

TONEX PPAP Training Methodology

TONEX PPAP training course is in the form of an interactive workshop. The seminar includes many in-class activities including hands on exercises, case studies and workshops. During the PPAP training course, students can bring in their own sample projects and through our coaching, develop their own PPAP.

Audience

Production Part Approval Process Training, PPAP Training is a 2-day course designed for:

  • Internal auditors
  • Second-party auditors
  • The ISO/TS 16949 implementation team
  • Cross-functional team members
  • Project Managers, Engineers and Quality Department Personnel
  • All individuals involved in submitting PPAP report
  • All individuals involved in product quality planning activities
  • All individuals interested in learning more about PPAP

Training Objectives

Upon the completion of PPAP training course, the attendees are able to:

  • Understand the goals and objectives of PPAP
  • Understand the phases of PPAP
  • Explain why PPAP is applied
  • Discuss all components of the PPAP
  • Understand the customer specific requirements for submitting PPAP
  • Discuss the evidence required by customers to submit PPAP
  • Complete all phases and steps of a PPAP
  • Define the scope and purposes of the PPAP
  • Follow all the PPAP submission levels
  • Evaluate all PPAP reports
  • Prepare and fill out PPAP forms
  • Understand how to incorporate the PPAP submissions into APQP
  • Articulate and discuss the results of the PPAP

Course Outline

Overview of PPAP

  • PPAP definition
  • The purpose of PPAP
  • When is a PPAP required?
  • Benefits of PPAP submission
  • What are the elements of a PPAP submission?
  • What are the levels of PPAP?
  • What is “Significant Production Run”?
  • Run @ Rate
  • Definition of risk
  • PPAP status
  • Authorized Engineering Change Documents

PPAP Requirements

  • AIAG requirements
  • Design Records
  • Engineering Change Documents
  • Customer Engineering Approval, if required
  • Design Failure Modes & Effects Analysis (DFMEA) Process Flow Diagram
  • Process Failure Modes & Effects Analysis (PFMEA) Control Plan
  • Measurement Systems Analysis (MSA) Dimensional Results
  • Qualified Laboratory Documentation
  • Appearance Approval Report (AAR)
  • Sample Product
  • Master Sample
  • Checking Aids
  • Customer-Specific Requirements
  • Part Submission Warrant (PSW)
  • Internal, costumed, requirements

PPAP Levels

  • Level 1 – Warrant only and Appearance Approval Report as requested submitted to the customer
  • Level 2 – Warrant with samples and limited supporting data submitted to the customer
  • Level 3 – Warrant with product samples and complete supporting data submitted to customer
  • Level 4 – Warrant and other requirements as defined by the customer
  • Level 5 – Warrant with product samples and complete supporting data reviewed at the supplier’s manufacturing location
  • PPAP level table
  • New parts levels
  • Part changes levels

Production Warrant

  • Definition
  • Purpose
  • When to use it
  • Reviews checklist

Process Flow Diagram (PFD)

  • What is PFD
  • Purpose
  • Symbols
  • PFD example
  • Reviewers checklist

Process FMEA (PFMEA)

  • Origin of FMEA
  • Definition
  • Objectives
  • When to use it
  • Steps of PFMEA procedure
  • Ratings
    • Severity
    • Occurrence
    • Detection
  • Analyzing the results
  • PFMEA exercise

Control Plan

  • Definition
  • Purposes
  • Application
  • Tool interaction
  • Phases
  • Process, tools, characteristics
  • Specifications, Measurement, Sample Size & Frequency
  • Control Method, Reaction Plan

Measurement Style Analysis (MSA)

  • Definition
  • Objective
  • Application
  • Who needs to be involved?
  • Attribute
  • Variable
  • Observed variation
  • Resolution
    • Error in resolution
    • Possible causes
  • Repeatability
  • Reproducibility
    • Error in resolution
    • Possible causes
  • Gage R&R study
  • Gage R&R steps
  1. Select 10 items that represent the full range of long-term process variation
  2. Identify the evaluators
  3. Calibrate the gage or verify that the last calibration date is valid
  4. Record data in the Gage R&R worksheet in the PPAP Playbook
  5. Have each appraiser assess each part 3 times (trials – first in order, second in reverse order, third random)
  6. Input data into the Gage R&R worksheet
  7. Enter the number of operators, trials, samples and specification limits
  8. Analyze data in the Gage R&R worksheet
  9. Assess MSA trust level
  10. Take actions for improvement if necessary
  • Gage R&R case study
  • Reviewer’s checklist

Dimensional Results

  • What is it?
  • Objectives
  • When is it applied?
  • Acceptance criteria
  • Reviewer’s checklist

Material & Performance Test Results

  • Material test results
  • Module test results
  • Performance test results

Initial Process Study

  • Definition
  • Purposes
  • Applications
  • Steps for Determining Process Capability
  1. Choose the product or process characteristic
  2. Validate the specification limits
  3. Validate the measurement system
  4. Collect data
  5. Analyze data characteristics
  6. Analyze process stability
  7. Calculate process capability
  • Variable data
  • Capability indices
    • CpK
    • PpK
    • Cp vs CpK
  • Reviewer’s checklist

Appearance Approval Report

  • Definition
  • Objective
  • Application
  • Sample report

Sample Production Parts

  • Definition
  • Purpose
  • Application
  • Labeling
  • Part label example

Completing the PPAP Submission

  • Electronic submission
  • Element 1 Part Submission Warrant
  • Element 2 Design Records and & Bubbled Part Prints
  • Element 3 Approved Engineering Change Documentation
  • Element 4 Customer Engineering Approvals
  • Element 5 Design FMEA (DFMEA)
  • Element 6 Process Flow Diagrams
  • Element 7 Process FMEA (PFMEA)
  • Element 8 Control Plan
  • Element 9 Measurement System Analysis (MSA)
  • Element 10 Dimensional Report
  • Element 11 Material, Performance Test Results
  • Element 12 Initial Process Study (Cpk/Ppk)
  • Element 13 Qualified Lab Documentation
  • Element 14 Appearance Approval report
  • Element 15 Sample Parts
  • Element 16 Master Sample
  • Element 17 Checking Aids
  • Element 18A Tooling Information Form
  • Element 18B Packaging Form 

Discussion for Successful Implementation

TONEX Hands-On Workshop Sample PPAP

  • Choose one case to conduct a PPAP on
  • Prepare all the elements of the report
  • Prepare required forms for submitting PPAP
  • Use data to provide specific requirements for part approval records and sample retention
  • Go through all the PPAP levels
  • Perform required statistics analysis including Cp, CpK, or PpK
  • Ensure the submission meet the customer’s specific requirements
  • Present your final report to an imaginary customer

Production Part Approval Process Training, PPAP Training

Nov
6
Mon
Bluetooth Training | Bluetooth Course @ Plano, TX
Nov 6 @ 9:00 am – Nov 8 @ 4:00 pm
Print Friendly, PDF & Email

Bluetooth Training Course Description: Bluetooth Courses and Bluetooth Technology Training Program; Topics can be customized based on the requirements.

Bluetooth training course explores core concepts of the Bluetooth. This course presents the fundamentals of Bluetooth for anyone who need to be grounded in the fundamentals and existing professionals who need to fill in any gaps they may have in their understanding of Bluetooth wireless technology.

Although Bluetooth has been around since 1994, it has made some of its greatest strides over the last decade. Workers in the field keep up with this changing information by taking Bluetooth training courses, which focus on the fundamentals of Bluetooth technology as well as the evolving market trends.

Tonex provides the highest quality Bluetooth technology training programs for small businesses, government agencies and Fortune 500 companies. Our skilled instructors and high level of information in the courses are not limited to large companies, and we enjoy the diverse group of clients that we serve year-round. In fact, our Bluetooth technology training program is flexible and adaptable, meeting the unique needs of your business.

While all of our Bluetooth courses do follow a particular format that we have found to be most successful, we can modify the details of the course so that they reflect the nature of your business. For instance, all Bluetooth training courses begin with an overview of the seminar. We then expand on these ideas by bringing in new information and using real-world examples to relate to this information.

Our seminars are known for incorporating interactive lesson plans and hands-on activities that make the material learned more memorable and fun. After all, this is the type of information that sticks with you; not the type that is written down on paper or taught through a monotone lecture. Clients then receive certificates upon successful completion of the course.

Why should you choose TONEX for your Bluetooth Training?

Bluetooth Training course illustrates and highlights the importance of several aspects of Bluetooth.

Bluetooth Training is an ideal course for Engineers and Non-engineers professionals to fill in their gaps in understanding the Bluetooth technology.

Bluetooth Training

Bluetooth Training covers the following topics:

  • Bluetooth 101
  • Bluetooth Applications
  • Bluetooth Services
  • Bluetooth Technology
  • Bluetooth Smart: Bluetooth LE, Bluetooth Low Energy
  • Bluetooth Core Specification
  • Bluetooth Profiles
  • Bluetooth Networking Architecture
  • Bluetooth Operations
  • Bluetooth implementations
  • The Bluetooth Protocols
  • Bluetooth Architecture
  • Bluetooth Physical layer (PHY)
  • Physical Channels
  • Physical Links
  • Spectrum
  • Interference
  • Class of radio
  • Power and range
  • Bluetooth Packets
  • Link Manager Protocol (LMP)
  • Host controller Interface (HCI)
  • Logical Link Control and Adaptation Protocol (LCAP)
  • Bluetooth Security
  • Bluetooth LE (Low Energy)
  • Bluetooth Smart
  • Configuring Bluetooth devices
  • Installing Bluetooth
  • Device discovery and Service discovery
  • Bluetooth standards
  • Conformance and compatibility testing

Bluetooth training Course is a unique high quality training designed for engineers and non-engineers considering Bluetooth, BLE, and Bluetooth Smart planning, architecture and design, product development,  testing, verification and validation or transforming plans into working systems.

Topics Include:

  • Bluetooth, Bluetooth Smart and BLE device types, design goals, terminology, and core concepts
  • Bluetooth Architecture : including controller, host, applications, and stack splits
  • Bluetooth Physical Layer: modulation, frequency band, radio channels, power, tolerance, and range
  • Bluetooth Link Layer: state machine, packets, channels, broadcasting, encryption, and optimization
  • Protocols such as HCI-physical/logical interfaces, controller setup, and connection management and L2CAP-channels and packet structure, and signaling channels
  • Attributes-grouping, services, characteristics, and protocols
  • Bluetooth Security considerations such as pairing, bonding, and data signing
  • Generic Access Profiles (GAP) including roles, modes, procedures, security modes, data advertising, and services
  • Bluetooth Applications, devices, services, profiles, and peripherals
  • Bluetooth Testing and qualification: planning, testing, verification, validation and compliance

Tonex offers the following types of training courses in addition to our innovative Bluetooth training program:

• Telecom Training
• IP Networking Training
• IT Training
• RF Training
• Wireless Training
• Systems Engineering Training
• Enterprise Architecture Training
• Leadership and Management Training

This list of topics is not complete, however. Since the field of information technology and telecommunications is constantly evolving, our course offerings evolve as well. As a company known for delivering the highest quality boot camps, overview classes and specialty courses, you can expect a comprehensive catalog of seminars that reflect the current market climate. To learn more about Bluetooth training courses, contact our team at Tonex today.

Jan
9
Tue
Computer Architecture Training @ NSWC
Jan 9 @ 9:00 am – Jan 11 @ 4:00 pm
Print Friendly, PDF & Email

Objective: The objective of this class is to increase NSWC PHD proficiency in the

Computer Architectures arena where it is frequently involved in; design architectures,

computer program development and documentation, computer program testing, and

configuration management. Computer systems are the driving force in the perpetual

evolution of automation in all modern-day weapon systems. They enable an unlimited

amount of access to information, weapons precision and speed-of-response, value

added command and control processes, high-speed automated assignment of

resources, integrated sensors with close coupling to weapons, and a list too long to

continue. DoD organizations across the globe continue to develop architectures that

represent great strides in innovation for advanced combat operations. However,

significant differences in these architectures exist that complicate the ability to maximize

interoperability when sharing technology across organizations. In the accomplishment

of its In-Service Engineering Agent role, NSWC PHD engineers are frequently called

upon to develop unique solutions to network-centric interoperability and integration

issues, particularly the sustainment of outdated computer equipment. Proficient

execution of this effort requires an intimate knowledge of basic computer architecture.

Topics of Discussion include:

Computer Design

o Terminology

o Operating principles

o Major components

Identification

Functionality

o Construction

o Performance benchmarking

Identification

Tools

Measurements

o Troubleshooting

Jan
16
Tue
LTE RF Planning Training – LTE RF Planning, Design, Optimization Training @ TONEX Nashville Taining Site
Jan 16 @ 9:00 am – Jan 18 @ 4:00 pm
Print Friendly, PDF & Email

Why should you choose TONEX for your LTE RF Planning Training?

LTE RF Planning Training is focused on carrying out RF planning and Design and capacity planning for Long Term Evolution (LTE) based networks. It provides a solid understanding of how to plan, design and optimize and a high quality LTE network. Learn how to plan and design LTE networks, techniques to boost LTE capacity, and how to lower interference and increase quality in the LTE network.

LTE RF Planning

LTE RF Planning Training Course will show the attendees how to plan, design and optimize LTE networks efficiently?

With the proliferation of smart devices, M2M, social networking and location-based services, operators are seeing LTE data usage expand rapidly to augment traditional GSM voice service revenues. With the increased data traffic delivered through LTE networks and  increasing of more bandwidth-intensive applications, operators are experiencing capacity issues on their LTE networks. Unfortunately adding more spectrum is more costly and is not always an option.

LTE networks promise to be more spectral-efficient however LTE many operators are planning  to target a series of non-traditional vertical markets and M2M (machine-to-machine) communications. So any additional LTE capacity could be quickly used up. The need for proactive  RF planning, design and optimization, is the purpose of LTE RF Planning Training Course.

Learn the theory and practical aspects of LTE RF Planning including:

  • High level overview of LTE
  • LTE Air Interface Overview
  • Basic Spectrum Planning
  • Radio Network Planning Basics
  • Initial LTE RF Link Budget
  • Detailed LTE RF Propagation
  • RF Link Budget Principals
  • LTE Capacity Planning
  • LTE RF Components, RF Propagation Theory and LTE Channels
  • Basics of RF designs
  • Planning a LTE Network
  • Planning the parameters of Network
  • Performance of Network (KPI Analysis)
  • LTE Cell Planning
  • Fine Tuning and Optimization
  • Continuous Optimization
  • RF Antenna Systems
  • Inter System Interference
  • Inter-Technology Antenna Sharing

Who Should Attend

RF Engineers, Radio Network Planning Engineers, project managers, operators,  Regulators. or anyone else responsible for RF planning or design will benefit from LTE RF Planning Training Course: Radio Network Planning, Design and Optimization.

 

Objectives

Upon completing this course, the attendees are able to to:

  • Understand LTE Air Interface and basic Spectrum Planning
  • List main LTE radio interface parameters
  • Describe LTE Air Interface applied to RF Planning, Design and Optimization
  • Understand the LTE RF planning, design and optimization principals
  • Understand basics of  Frequency Reuse for LTE
  • Describe the impact of  MIMO on LTE and its planning
  • Calculate Link Budgets for LTE using TONEX tools
  • List Timing and Synchronization for LTE
  • List LTE RF planning and design tools
  • Describe the impact of the LTE backhaul in the planning and design process

Outline

Introduction to the RF Planning, Design and Optimization Processes

  • What is RF Planning?
  • Planning for Capacity and/or Coverage
  • Nominal Cell Size
  • Radio Propagation 101
  • Propagation Models
  • Link Budgets 101
  • The Power Law
  • Using a Planning Tool
  • Site Acquisition and Selection
  • Mast Options
  • Nominal Areas for Sites
  • Feedback Loop
  • Detailed Site Design
  • Concrete Canyons
  • High Sites
  • Drive Testing
  • Flat Earth Modeling
  • RF Planning and Tools

LTE Air Interface Overview

  • S-OFDMA (LTE downlink)
  • SC-FDMA (LTE uplink)
  • Number of Subcarriers
  • Symbol Size
  • Subcarrier Types
  • Frames
  • Resource Blocks (RB)
  • UL Allocation
  • Modulation Techniques
  • Error Correction
  • Basic Spectrum Planning in LTE
  • Operating Bands
  • Channel Bandwidths
  • Channel Spacing
  • Guard Band Considerations

LTE RF Link Budget

  • Effective Radiated Power
  • Thermal Noise
  • Noise Figure
  • Ambient Noise
  • SNR
  • Implementation Margin
  • Fast Fading
  • Receive Diversity Gain
  • System Gain and Losses
  • Typical Parameter Values
  • Base Station Antenna Gain
  • Uplink Budget
  • Downlink Budget
  • Data rate (Mbps)
  • Receiver sensitivity (dBm)
  • Interference Margin (dB)
  • Control Channel Overhead (dB)
  • Maximum path loss
  • Propagation (Path Loss) Models
  • Environment : urban, rural, dense urban, suburban, open, forest, water
  • Estimated Number of Sites
  • Neighbor Cell Lists for each site
  • Detailed Coverage Predictions (e.g. Signal Strength (RSRP), Signal Quality (RSRQ) Best CINR, Best Server Areas, Uplink and Downlink Throughput)
  • Sites Coverage by Signal Strength
  • Fine Tuning and Optimization

RF Propagation Models

  • Free Space
  • HATA
  • Okumura Model
  • COST-HATA
  • COST-231 Walfisch-Ikegami Model
  • ERCEG-GREENSTEIN
  • Stanford University Interim (SUI) model
  • SEMI-DETERMINISTIC Models
  • Ray Tracing Model
  • Factors Impacting Propagation Models

Mapping of Path Losses to Cell Sizes

  • Okumura–Hata parameter
  • Urban Indoor
  • Suburban Indoor
  • Rural Indoor
  • Rural outdoor fixed
  • Base station antenna height (m)
  • Mobile antenna height (m)
  • Mobile antenna gain (dBi) 0
  • Slow fading standard deviation (dB)
  • Location probability (%)
  • Correction factor (dB)
  • Indoor loss (dB)
  • Slow fading margin (dB)
  • Cell Size in Km

LTE Capacity Planning

  • Uplink Throughput
  • Capacity and  MPR Distributions
  • CINR Distributions
  • MAC Scheduler
  • Antenna Schemas
  • LTE System Spectral Efficiency
  • TDD Capacity
  • Workload Modeling
  • LTE Traffic Planning and Calculations

Practical LTE Planning Considerations

  • Coverage vs. Capacity Planning
  • Coverage in Noise-Limited Cases
  • Definition of average SINR
  • Optimizing LTE system bandwidth for coverage
  • LTE in Interference-Limited Cases
  • Link budget with non-negligible interference: Interference Margin
  • Trade-off between cell range, network load and cell edge throughput
  • Cell range vs. network load, fixed cell edge throughput
  • Network load vs. cell edge throughput, fixed cell range
  • Antenna Systems MIMO Transmission Schemes in LTE
  • Frequency Reuse
  • Timing and Synchronization for LTE
  • Carrier to Interference
  • Noise ratio
  • Inter System Interference
  • Inter technology Antenna Sharing
  • Cell range versus cell edge throughput, fixed network load
  • Frequency-Aware UL/DL Scheduling
  • Example of Measured MIMO Radio Channel
  • Backhaul Capacity Planning

Case Studies, and Hands-on Workshops

  • Creating a brand new LTE network in Johannesburg
  • Planning a LTE network in Hawaii
  • Designing a LTE network in Dubai
  • Link-budget analysis of a LTE network in Frankfurt, Germany
  • Optimization a LTE network in Tokyo
Jan
22
Mon
Telecom Pricing, Cost and Financial Analysis Training @ Plano, TX
Jan 22 @ 9:00 am – Jan 25 @ 4:00 pm
Print Friendly, PDF & Email

Telecom Pricing, Cost and Financial Analysis Training by TONEX

Telecom Pricing, Cost and Financial Analysis Training, is a four-day Telecom training covering telecom pricing, cost and financial analysis. Learn the key concepts of practical telecom pricing, cost, financial analysis and management.

In Telecom Pricing, Cost and Financial Analysis Training course, participants will learn to perform  price analysis and cost analysis and financial modeling to determine price reasonableness in accordance with telecom authorities. This course is designed for personnel involved in establishing or modifying the price or cost of telecom services and products.

elecom Pricing, Cost and Financial Analysis Training course delves deep into telecom financial analysis and modeling. The participants will lean how to perform accurate financial analysis, how to use telecom financial indicators and benchmarks to allocate resources and evaluate potential projects for maximum ROI (return-on-investment).
Who Should Attend

Telecom financial analysts,cost accountants, cost analysts, budget analysts, systems analysts, auditors, accountants, accounting managers, and financial planners.

Learning Objectives

Upon completing of Telecom Pricing, Cost and Financial Analysis Training course, the attendees will be able to:

  • List financial terminology applied to telecom service providers
  • Explain telecom operators’ cost, financial models and pricing models
  • Determine how cost analysis shall be used and applied
  • Explain telecom financial analysis and performance measurement
  • Describe the role of telecommunications regulatory authorities, operating companies applied to cost and price Analysis
  • List telecom price and cost ratio analysis techniques
  • Describe best practices for telecom budgeting and forecasting
  • Summarize telecom project analysis and evaluation
  • List telecom cost and pricing Key performance indicators (KPIs)
  • Evaluate effective telecom financial management and cost control
  • Calculate new telecom service and product ROI
  • List cost related labor and support services
  • Negotiate telecom service cost analysis, financial techniques and contract audit
  • Calculate a telecom cost objective and a price/cost objective
  • List steps in financial analysis and modeling for project planning processes and financial projections
  • Review proven financial analytical tools and understand how and when to use them
  • Describe techniques to improve your organization’s profit picture by making sound business decisions
  • Determine pre-negotiation position applied to different stakeholders using cost and financial calculations
  • Use best practices in budgeting, forecasting, project evaluation and analysis
  • Master the processes of telecom pricing, financial management and cost
  • Control and strategies for telecom tariffing  and estimation of cost of network services
  • Describe financial analysis and modeling for services. infrastructure, network operations, IT, legal, competition, sales and marketing
  • Suggest modifications to telecom price or cost to assure reasonableness

Course Outline

Fundamentals of Telecom Cost and Pricing  

  • Principles of telecom products and services
  • Identifying telecom pricing and cost objectives
  • Identifying approaches to telecom pricing
  • Identifying target participants and stakeholders in the price, cost and financial analysis
  • Conducting market research for telecom price analysis
  • Techniques using market research to estimate probable telecom prices
  • Introduction to cost or managerial accounting
  • Principles of budgeting
  • Activity-Based Costing (ABC) for management control
  • Principles of standard costing and variance analysis
  • Cost-Volume-Profit analysis
  • Return on Investment analysis
  • Payback analysis
  • WACC and Hurdle Rates
  • NPV, IRR, ROI, ROIC, ROA RONA-ROCE
  • DuPont Formula and Residual Income (EVA) analysis
  • Internal cash management ratios analysis
  • Cash conversion cycle
  • Burn Rate
  • Turn and Earn
  • Exercise

Fundamentals of Telecom Financial Analysis

  • Ratios and metrics
  • Financial strategic planning and capital budgeting
  • Principles of financial forecasting and economic value-added models
  • Capital Investment proposals and projects
  • Income tax and capital investments
  • Balance sheet analysis
  • ROI, ROA, ROE
  • DuPont formula
  • Income statement analysis
  • Past performance and project outcomes
  • Benchmarking performance
  • Cash flow analysis applied to operations, investing, and financing
  • Cash flow performance indicators
  • Profitability vs. liquidity
  • Financial statement analysis
  • Managing capital
  • Debt and equity
  • Capital Asset Pricing Model (CAPM)
  • How to Calculate Present Value
  • Internal rate of return (IRR)
  • Net present value (NPV)
  • Analyze Financial Statements

Introduction to Telecom Cost Analysis

  • Cost of products and services
  • Cost analysis
  • General cost principles
  • Specific cost principles
  • Techniques to prepare cost analysis
  • Technical and audit support
  • OPEX vs. CAPEX
  • Direct labor costs
  • Indirect labor costs
  • Direct infrastructure and material costs
  • Profit calculation
  • Factors affecting profit analysis
  • Weighted guidelines
  • Trade-Off Analysis
  • Exercises

Applying Price-Related Factors to Telecom Products and Services

  • Telecom trend analysis
  • Telecom products and services cost factors
  • Price evaluation preferences
  • Comparing telecom services and product prices
  • Calculating consumers and businesses Should-Pay price
  • Techniques to calculate telecom Price Index Number
  • Price-Volume analysis and modeling
  • Cost Estimating Relationships
  • Calculating Ratio of price to estimated direct and indirect costs
  • Exercise and workshop

Advanced Techniques for Telecom Budgeting, Cost and Price Analysis

  • Operational budgeting and techniques
  • Time Value for Money
  • Compound interest and of present value
  • Capital budgeting
  • Telecom cost analysis, profit planning and volume/price risks
  • Cost analysis process
  • Cost analysis players, projects and initiatives
  • Pricing strategies
  • Cost accounting standards
  • Regulations to negotiated contracts and subcontracts
  • Contract cost principles and procedures.
  • Fundamental quantitative problems
  • Fundamental quantitative pricing skills
  • Telecom cost analysis techniques
  • Telecom cost accounting standards
  • Price Index Numbers
  • Net Present Value
  • Cost estimating relationships
  • Cost-volume analysis
  • Cost-volume-profit analysis
  • Contract Financing
  • Cost vs. price Analysis
  • Price analysis techniques
  • Price-related factors
  • Scenarios for price analysis
  • Exercise

Advanced Telecom Cost Modeling, Pricing and Financial Analysis – Methodologies

  • Telecom cost and pricing modeling techniques
  • Network costs
  • Interconnection costs
  • Installation and provisioning cost
  • Cost allocation techniques
  • Inventory costs
  • Statistics in pricing
  • Simplified regression analysis
  • Activity based costing/management (ABC/ABM)
  • Profitability and variance analysis
  • Non-financial performance measures (“Balanced Scorecard”)
  • Long Run Incremental Costs (LRIC)
  • Real world examples
  • Telecom Activity-Based Costing (ABC) case study
  • Macroeconomics and growth
  • Politics
  • International trade
  • Microeconomics, supply & demand
  • Big data, analytics and forecasting techniques
  • Pricing influences
  • Quality vs. competition
  • Elasticity of demand
  • Fixed and variable cost modeling
  • Cost Function and transfer pricing
  • Economies of Scale
  • Engineering & redesign
  • DFSS, DFMA, VE,
  • Benchmarking
  • Commercial decisions
  • Calculate mean ands deviation of a dataset
  • Modeling risk and uncertainty
  • Monte Carlo simulations applied to uncertainty
  • Option pricing models
  • Workshop and Group Project
  • Capstone Exercise
Feb
12
Mon
Link 16 Training | Courses | Tactical Data Link Training @ UMW Dahlgren, VA
Feb 12 @ 9:00 am – Feb 14 @ 4:00 pm
Print Friendly, PDF & Email

Link 16 and Tactical Digital Information Links (TADIL) Training Courses

Link 16 Training, TONEX is the world’s premier provider in Tactical Data Link (TDL) Courses including  Link 11 Training, Link 16 Training, Link 22 Training and JREAP Training.  TONEX is specialized in  specializes Tactical Data Link Training Courses including Link 11, Link 16, Link 22 and JREAP.

Tactical Data Link Training Courses including Link 16  Training Crash Course provides the concepts behind Link 16 tactical data Link system/ JTIDS / MIDS architecture, installation, integration, data processing and operation.

link 16 training<img class=”aligncenter size-full wp-image-11816″ src=”https://i2.wp.com/www.tonex.com/wp-content/uploads/link-16-training-course.jpg?resize=580%2C373&ssl=1″ alt=”link 16 training” srcset=”https://i1.wp.com/www.tonex.com/wp-content/uploads/link-16-training-course.jpg?w=700&ssl=1 700w, https://i2.wp.com/www.tonex.com/wp-content/uploads/link-16-training-course.jpg?resize=300%2C193&ssl=1 300w, https://i2.wp.com/www.tonex.com/wp-content/uploads/link-16-training-course.jpg?resize=640%2C411&ssl=1 640w” sizes=”(max-width: 580px) 100vw, 580px” data-recalc-dims=”1″ />

Link 16 Training covers all aspects of tactical data links  employed by the U.S Navy, the Joint Services, NATO and Japan.  Link 16 / JTIDS / MIDS training course covers all aspects of Link 16 / JTIDS (Joint Tactical Information Distribution System)/ MIDS (Multifunctional Information Distribution System).

Link 16 Training<img class=”alignnone size-full wp-image-2786″ src=”https://i2.wp.com/www.tonex.com/wp-content/uploads/link-16.gif?resize=197%2C154″ alt=”Link 16 Training” data-recalc-dims=”1″ />

Link 16 Training by TONEX

TONEX is an internationally recognized training company that  delivers customized Link 16 training solutions to DoD, NATO and defense contractors.

By choosing Tonex for your Link 16 training courses, you can expect that all the information learned in class is accurate, relevant and up to date. Our Link 16 courses are designed by Link 16 experts in the field, and this allows our workshops to excel in certain topics that only professionals in the field would understand. We also continually update our reading materials, teaching techniques and course offerings to reflect the latest trends in technology. Instead of following the trends, we stay ahead of them to be a frontrunner in the industry.

Our Link 16 training courses follow a specific format that includes the overview, the body of the class and the conclusion, which wraps up with Tonex and industry certifications. Our Link 16 training courses are flexible enough that they can be modified to fit the needs of your business so that your employees can focus on the core values of your organization. Browse our catalog of workshops or contact a Tonex representative to find the best boot camps to advance your career.

Link 16 Training crash course, Bootcamp style starts with an introduction to Tactical Data Links and covers concepts behind Network Centric Operations (NCO), Link 16  planning, network design, network management, operations and maintenance, and troubleshooting are discussed.

Other Tactical Data Link Training Programs

Link 16 Training for Managers3 days
Link 16 Training | Courses | Tactical Data Link Training3 days
Link 22 Training2 days

Check the new Advanced Link 16 Training:

Advanced Link 16 Training3 days

Link 16 Training Courses<img class=”alignnone size-full wp-image-2787″ src=”https://i1.wp.com/www.tonex.com/wp-content/uploads/Link-16-training.jpg?resize=320%2C209″ alt=”Link 16 Training Courses” srcset=”https://i0.wp.com/www.tonex.com/wp-content/uploads/Link-16-training.jpg?w=320&ssl=1 320w, https://i1.wp.com/www.tonex.com/wp-content/uploads/Link-16-training.jpg?resize=300%2C195&ssl=1 300w” sizes=”(max-width: 320px) 100vw, 320px” data-recalc-dims=”1″ />

Other Training Services

TONEX provides customized training to meet specific platform implementation goals Including:

  • Data link: SADL/EPLRS
  • Platform specific: Operator and Maintenance
  • COMSEC Workshop
  • Mission Planning Workshop
  • LINK 16 OPTASK Link Workshop
  • Advanced Link 16 

Learning Objectives

Upon completing of this course, the student will:

  • Discuss Tactical Digital Information Link (TADIL)
  • Understand the key concepts behind Link 16 / JTIDS / MIDS
  • List LINK 16/ JTIDS / MIDS Principals and Features
  • Explore Link 16 / JTIDS / MIDS architecture
  • Discuss Link 16 system characteristics
  • Explore network architecture, services, elements, protocols to support services
  • Identify the role of key network nodes, interfaces, protocols, control and related protocols
  • Discuss TDMA and CDMA and access mode
  • Describe Network Participation Groups (NGP) and J-Series Messages
  • Discuss various Link 16 terminals and message packing and pulses
  • Understand similarities and differences between Link 16 Networks and Nets
  • Describe Link 16 Network Access Modes, Network Time, Network Time Reference (NTR) and Terminal Synchronization
  • Understand Link 16 Network Roles, Relays and  Pulse Deconfliction
  • Calculate Link 16 capacity and Time Slot Duty Factor (TSDF)
  • Discuss Communications Security and Link 16 Cyber Security
  • Describe Link 16 MSEC/TSEC methods
  • Discuss JTIDS / MIDS Network Planning and Design
  • Discuss JTIDS / MIDS Management, Operation and Troubleshooting and Monitoring
  • Understand the role of Joint Range Extension Applications Protocol (JREAP)
  • Discuss Link 16 Network Enable Weapons
  • Discuss Link 16 troubleshooting techniques and procedures

Course Outline

Overview of Tactical Digital Information Link (TADIL)

  • What is TADIL?
  • TADIL Capabilities
  • Basic principles and purpose
  • Platforms and Development
  • Joint Tactical Information Distribution System (JTIDS)
  • Surveillance Control Data Link (SCDL)
  • Ground Station Modules (GSMs)
  • Joint Tactical Data Link Management Plan (JTDLMP)
  • Tactical data link for command, control, and intelligence
  • TADIL A/B [Link-11]
  • Link 16 as the prime data link for U.S. and NATO forces
  • TADIL C [Link-4A]
  • Conventional Link Eleven Waveform (CLEW)
  • Single Tone Link Eleven Waveform (SLEW)
  • Link 22 to replace Link 11 and to complement Link 16
  • Secure digital radio link in HF and UHF band

Overview of TADIL J (Link-16)/JTIDS/MIDS

  • Basic Link 16 principles and purpose
  • Link 16 capabilities
  • Link 16 protocol vs. terminals
  • MIL-STD-6016 – Tactical Data Link (TDL) 16 Message Standard
  • STANAG 5516 – Tactical Data Exchange – Link 16
  • MIDS System Segment Specification (SSS)
  • MIDS System Segment – Interface Control Document (Hardware ICD)
  • MIL-STD-6016E: Tactical Data Link (TDL) 16 Message Standard
  • Overview of  or Satellite TADIL J (S-TADIL J)
  • Real-time Beyond Line-of-Sight (BLOS)

Overview of Link 16 System Architecture, Protocols and Components 

  • Overview of Link 16 Operations
  • Link 16 Architecture
  • Link 16 Network Time and Network Roles
  • Link 16 Terminal Navigation and Network Relays
  • Link 16 Terminals and Platforms/Capabilities
  • Link 16 Configurations / Maintenance
  • Link 16 Data Terminals
  • Voice Transmission and Reception over Link 16
  • Principles of Multiple Access in Link 16
  • TDMA Principles in the Link 16
  • Link 16 Frequencies and Time Slots
  • Link 16 Interference Protection Features
  • Time Slot Duty Factor (TDSF)
  • Participation Groups
  • Network Operations, Roles and Responsibilities
  • Precise Participant Location and Identification (PLLI)
  • Link 16 Security
  • Multinetting
  • Range Extension Techniques

Purpose of Tactical Digital Information and Link 16 Systems

  • Purpose and Description
  • Data Link Advantages
  • Link 16 for anti-jam (AJ), secure, data and voice system
  • Standard waveforms and messages to promote interoperability
  • Joint Tactical Information Distribution System (JTIDS) and Multifunctional Information
  • Distribution System (MIDS)
  • Architecture and Network Design
  • Link 16 Parameters
  • Pulse Deconfliction
  • Frequency Assignments
  • Architecture Examples
  • Time Slot Blocks (TSBs)
  • Message Construction
  • Net synchronization
  • Frequencies and Interference Protection Feature (IPF)
  • Range Extension by Relay
  • Time Slot Reallocation (TSR)
  • Precise Participant Location and Identification (PPLI)
  • Link-16 Enhance Throughput (LET)
  • VMF Message Catalogue
  • Video on Link-16

Principles and Features of Link 16 Systems and Terminals

  • Link 16 System Characteristics
  • Air/Ground Situational Awareness
  • Link 16 Architecture
  • LINK 16 Features
  • LINK 16 Functions
  • Fully Functional Link 16 Terminal
  • MIDS LVT-1 (Ethernet)
  • MIDS LVT-2 (Ethernet)
  • MIDS LVT-2 (X.25)
  • MIDS LVT-11 IP
  • MIDS LVT-3 (1553)
  • USN E-2 (1553)
  • USAF E-8 (1553)
  • USAF F-15 (1553)
  • USAF MCE (1553)
  • USMC MCE (1553)
  • US Army 2M (X.25)
  • LINK 16 Terminals
  • Multifunctional information distribution system (MIDS) fighter data link
  • Low Volume Terminals (LVT)
  • Terminal Options: MIDS terminals, Class 2 terminals
  • MIDS Low-Volume Terminals (LVTs)
  • The MIDS-LVT (1) Family
  • LVT (1) TACAN Tactical Air Navigation System, and Voice
  • LVT (4) Voice, but eliminates TACAN
  • LVT (6) provides TACAN no Voice
  • LVT (7) bare-bones model, no TACAN or Voice
  • MIDS LVT (2) family ground terminal
  • Handheld Link 16 Radio, BATS-D
  • Handheld Form Factor

LINK 16 Network Management Operational Scenarios

  • LINK 16 Architecture and Management
  • LINK 16 Troubleshooting and Monitoring
  • LINK 16 Network Planning and Design
  • LINK 16 Operation and Troubleshooting and Monitoring
  • Related J series messages

LINK-16 Capabilities

  • LINK-16 Basic Capabilities
  • Tactical Data Link 16
  • Link 16 Architecture
  • Link 16 System Operation
  • Waveform
  • Time Slots
  • Exchange real-time tactical data
  • Architecture
  • Time Division Multiple Access (TDMA)
  • Synchronization
  • Acquisition & maintenance of system time
  • Network
  • Time Slot
  • Link 16 Division of Network Time
  • Epochs, Frames and Timeslots
  • Network Participation Groups (NPG)
  • Terminal variations
  • Class I, Class II, MIDS (LVT-1, LVT-2, LVT-3)
  • Host platform integration requirements
  • Link 16 Messages
  • Link 16 Security

Joint Range Extension Applications Protocol (JREAP)

  • What is JREAP?
  • Tactical data over digital media and networks
  • JREAP/TADIL Testing/Simulation
  • JREAP Application Block
  • Joint Range Extension (JRE) Gateway
  • JREAP A – UHF DAMA
  • JREAP B – Serial
  • JREAP C – Ethernet

Satellite TADILS

  • GEO  vs. LEO
  • Link-11 via satellite
  • Satellite TADIL-J (STJ)
  • Multicast TADIL-J (MTJ)

Link 16 Network Enabled Weapon (NEW)

  • Introduction to Link 16 Network Enable Weapons
  • Net Enabled Weapons  supporting  missions Use Cases
  • Network Enabled Weapons (NEW) Architecture
  • Network Enabled Weapon Messages (J11.X)
  • NEW Implementation Requirements
  • In-Flight Target Updates (IFTUs)
  • Targeting and engagement of Moving Targets
  • In-flight Retargeting/Reallocation
  • In-flight Abort
  • Sensor to Weapon 3PS Targeting (S2W 3PS)
  • Weapon to Weapon Coordination (Cooperative Attack)

Structured Link 16 Troubleshooting Approaches

  • Isolate and solve Link 16 network, terminals and design problems
  • Root Cause Analysis Techniques applied to Link 16
  • TONEX Link 16 DFMEA and PFMEA processes and templates
  • Systematic elimination of hypothetical causes
  • Narrowing down on the possible causes
  • The top-down approach
  • The bottom-up approach
  • The spot-the-differences approach
  • The move-the-problem approach
  • Failure at Upper Link 16 Layers
  • Application Layer Failure
  • Failure at Lower Link 16 Layers
  • Failure at network topology
  • Failure at security keys
  • The Divide-and-Conquer Troubleshooting Approach
  • Follow-the-Path Troubleshooting Approach
  • The Compare-Configurations Troubleshooting Approach
  • The Swap-Components Troubleshooting Approach

Link 16 Troubleshooting Procedures

  • Link 16 Verification and Validation Plans
  • Testing, Simulation and Analysis Techniques
  • Verification of Link 16 initial and mission plans
  • Testing Link 16 Hardware Platforms and Software Features
  • Link 16 Network Design Verification
  • Testing Link 16 RF Capabilities
  • Synchronization testing
  • Testing Link 16 Features
  • Testing C2 to C2 Battle Management
  • Testing C2 to Fighter mission assignments
  • Testing Fighter to Fighter information exchange
  • Testing Imagery and Voice communications
  • Testing Network Enable Weapons

TONEX Link 16 Verification and Validation (V&V) Plans and Procedures

  • Link 16 Network Integrity V&V
  • Link 16 NPG Status V&V
  • Cryptonet V&V
  • Frequency Planning and Management V&V
  • Time Slot Duty Factor (TSDF) Tests
  • OPTASK Link V&V
  • Multi-Link Network V&V
  • Roles / Responsibilities V&V

 

Who Should Attend

Operators, Engineers, Designers, Architect, Software and Hardware Developers, Project Managers, Product Managers, Sales and Support and anyone else who is interested to understand concepts behind Link 16 / JTIDS / MIDS.

Feb
20
Tue
Telecom Audit Training Workshop @ Plano
Feb 20 @ 9:00 am – Feb 21 @ 4:00 pm
Print Friendly, PDF & Email

Telecom Audit Training Workshop Description

Telecom Audit Training workshop is designed to give telecom and non-telecom professionals the nuts-and-bolts of telecom audit. This course provides an overview of today’s telecom auditing, bill processing and reporting.

telecom audit training

Telecom audit training workshop allows you to gain a better understanding of your telecommunications expenditures (CAPEX), processes (OPEX), reduce your current telecommunications expenses and provides key information to assist you with your future technology investments.

telecom audit training

Topics covered:

  • Overview of the Telecom Industry
  • Audit processes
  • Telecom auditing & optimization
  • Telecommunications in organization’s OPEX and CAPEX
  • Efficiency of your telecommunications expenditures
  • Overview of North American Telecom Providers and Services
  • Overview of European Telecom Providers and Services
  • Overview of other Telecom Providers
  • Analysis of Service Providers
  • Cable companies rates
  • Other providers rates
  • AT&T, Sprint, Verizon and CenturyTel Business rates
  • International rates
  • Telecom services
  • Voice, video and data services
  • Local, long distance, and wireless
  • Leased lines and trunks
  • Security and VPN services
  • Managed Services
  • Hosted VoIP
  • Cloud, Data, Voice and Managed Services
  • Metro Ethernet for LAN, MAN and WAN networks
  • Retroactive telecom audit
  • Analyze your telecom usage
  • Customer Service Records (CSRs)
  • Call details records (CDRs)
  • Billing errors
  • Telecommunications invoices and verification
  • Services not requested, but being billed
  • Discontinued phone and data services still being billed
  • Unused or underused circuits and services
  • Variations between contractual terms and actual billing rates
  • Improper long distance selection
  • Local and long distance, 800, cellular, pager and data services
  • Per-minute charges vs. contractual agreements
  • Access and capacity inventory
  • Monthly recurring fees and features
  • Charges for non-contracted services
  • Miscellaneous surcharges
  • Taxes, Fees, and Surcharges
  • Equipment rental and leasing charges
  • Directory and Advertising charges
  • New laws, taxes, tariffs and plans
  • Federal, state, local, and franchise taxes
  • Combination of rates and services
  • Audit of calling area and patterns
  • Analyzing your current rate plans and network infrastructure design,
  • Possible savings on all of your telecom charges
  • Consolidation of services
  • Renegotiation of current pricing contracts with existing vendors
  • Migration of services to more cost-effective vendors
  • Negotiation of better contracts with vendors, inventory management and data control
  • Principals of rating, billing and tariffing
  • Invoice processing and workflow
  • Cost center allocation
  • General ledger and accounts payable
  • Service and exception reporting
  • Cost center, location, service type, vendor, general ledger accounts
  • Inventory and contract management