Print Friendly, PDF & Email

Whether you require a single course for a small group or an extensive training program for your entire workforce, on-site courses offer significant savings and convenience with the same quality hands-on instruction delivered in TONEX Training Education Centers around the world.

TONEX Training offers many training seminars in variety of subject areas including Telecom, Mobile and Cellular, Wireless, Engineering, Technology, IT, business, AI and Machine Learning, Systems Engineering, Defense, Tactical Data Links (TDL), Aerospace, Aviation, Space Engineering, Specification Writing, Power and Energy, Enterprise Architecture Management, Mini MBA, Finance, Logistics, Blockchain, Leadership, and Product/Project Management. We offer programs in our four state-of-the-art Executive Conference Centers and in 20 other cities in US and international locations including:

  • Atlanta, GA
  • Dallas, TX
  • Plano, TX
  • San Francisco, CA
  • Santa Clara, California
  • Santa Monica, California
  • Alexandria, Virginia
  • New York City, NY
  • Rome, Italy
  • Shanghai, China
  • London, UK
  • Munich, Germany
  • Stockholm, Sweden
  • Tokyo, Japan
  • Seoul, Korea
  • Hong Kong
  • Bangalore, India
  • Istanbul, Turkey
  • Dubai, UAE
Apr
15
Mon
DO-178 And DO-254 Avionic Training Bootcamp @ Atlanta, GA
Apr 15 @ 9:00 am – Apr 18 @ 4:00 pm
Print Friendly, PDF & Email

Price: $3,999.00
Length: 4 Days

DO-178 And DO-254 Avionic Training Bootcamp

DO-178 And DO-254 Avionic Training Bootcamp Description

DO-178 And DO-254 Avionic Training Bootcamp covers the software and hardware aspects of avionic certification. You will learn the fundamental concepts, principals, tools, and methods associated with these two standards. You also will understand the differences and similarities of DO-178 and DO-254. In this bootcamp, we will discuss the background of these certifications, how they have evolved over the past years, and what would be the current application of them.

DO-178 And DO-254 Avionic Training Bootcamp<img class=”aligncenter wp-image-11474 size-large” src=”https://tonex.wpenginepowered.com/wp-content/uploads/DO-178DO-254-640×314.jpg” alt=”DO-178 And DO-254 Avionic Training Bootcamp” width=”580″ height=”285″ srcset=”https://tonex.wpenginepowered.com/wp-content/uploads/DO-178DO-254-640×314.jpg 640w, https://tonex.wpenginepowered.com/wp-content/uploads/DO-178DO-254-300×147.jpg 300w, https://tonex.wpenginepowered.com/wp-content/uploads/DO-178DO-254-768×377.jpg 768w” sizes=”(max-width: 580px) 100vw, 580px” />

Learn About:

  • DO-178 & DO-254 background and evolution path
  • DO-178C/254 rules
  • Document hierarchy
  • DO-178C Certification Plans
  • DO-254 Certification Plans
  • 
PSAC/PHAC
  • 
System & requirements
  • 
DO178/254 design process
  • 
DO178/254 execution, coding and reviews
  • 
DO178/254 verification process
  • DO-178C structures, tools and plans
  • 
Traceability
  • 
DO-178/254 errors and prevention action plans
  • 
Gap analysis
  • 
Design, data & control flow
  • 
Hardware and software verification
  • 
COTS Usage in DO-178/254

TONEX Bootcamp Format

DO-178 and DO-254 Training bootcamp is mostly a hands-on course. More than 70% of the class will be spent on practical exercises including labs, group class activities, and hands-on workshops. We have tried to encompass all the required material associated with DO-178/DO-254 when we designed the course, but we are also flexible to tailor the course agenda based on the needs of your organization.

Audience

DO-178 and DO-254 Training bootcamp is a 4-day course designed for:

  • Software Engineers
  • Hardware Engineers
  • Systems Engineers
  • Test Engineers
  • Quality and Process Assurance engineers and managers
  • Project managers
  • Process engineers
  • All individuals involved in DO-178 and DO-245 projects

Training Objectives

Upon the completion of DO-178 and DO-254 Training bootcamp, the attendees are able to:

  • Understand both DO-178 and DO-254 components and they work
  • Recognize the differences and similarities between these two
  • Recognize the exact application of each DO-178 and DO-254 to various elements inside the system
  • 
Understand the actual intent of DO-178 industrial effective strategies
  • 
Explain the history behind the DO-254 and DO-178C standards
  • Comprehend the DO-178/254 evolution path resulting in the present’s interpretation.
  • Identify what exactly is required to initiate a project in regards to safety, tools, quality assurance, and configuration management.
  • Provide DO-178/254 compliant requirements
  • Conduct DO-178/254 design, execution, and verification
  • Apply best practices of DO-178/254
  • Prevent usual errors
  • Analyze DO-254/DO-178 gaps in their organization
  • Estimate the associated costs and benefits of applying DO-178/254.

Course Outline

Overview of DO-254 and DO-178

  • DO-178 certification description
  • DO-254 certification description
  • DO-178/DO-254 history and evolution path
  • DO-178/DO-254 applications
  • DO-178/DO-254 terminology and definitions
  • DO-178/DO-254 part number and nomenclature
  • DO-178/DO-254 team personnel
  • DO-178/DO-254 organizational responsibilities
  • DO-178/DO-254 acronyms and abbreviations
  • Applicable internal and external documents

Hardware System Synopsis

  • Mechanical systems top level chart
  • Electrical systems top level block diagram
  • System functional definition
  • System failure states
  • Safety and partitioning

Hardware Synopsis

  • Hardware operations
  • Hardware safety and partitioning
  • Single incident upset planning
  • Hardware elements

DO-254 Hardware Certification Contemplations

  • Certification fundamentals and tools of compliance
  • Issue paper sheets
  • Certification Review Items (CRIs)
  • Hardware level identification
  • Compliance measures
  • Certification authority engagement

Lifecycle of DO-254 Hardware Design

  • V-Model technique
  • DO-254 team personnel roles
  • Interactions among the processes and activities
  • Development sequencing
  • Relationship between processes
  • Flow diagram of the system lifecycle
  • Flow diagram of hardware lifecycle
  • Methods to give feedback
  • Feedback procedure
  • Iterative development model
  • Overview of problem reporting techniques
  • Traceability of evaluations
  • Assessment results
  • Planning process
  • Development flow diagrams
  • Requirements capture development
  • Conceptual design development
  • Detail design development
  • Execution process
  • Verification process
  • Production transition process

DO-254 Hardware Design Planning Process

  • Objectives
  • Inputs
  • Outputs
  • Actions
  • Technical boundaries
  • Tools
  • Transition requirements
  • Essential processes
    • Validation & verification process
    • Configuration management
    • Process assurance
    • Certification liaison

DO-254 Hardware Process Assurance

  • Process assurance audits
  • Hardware transition requirements approval review
  • Process assurance corrective Action
  • Certification liaison goals and actions
  • Compliance and criteria tools
  • Compliance substantiation process

Data Associated with Hardware Design Lifecycle

  • Introduction
  • Traceable data
  • Objective criteria of compliance
  • Generating and regulating the hardware lifecycle data
  • Submitting hardware lifecycle data
  • Hardware control classifications

DO-254 Supplemental Considerations

  • Taking advantage of the formerly developed hardware
  • Applying Commercial-Off-The-Shelf (COTS) elements
  • SH-1 Issue paper compliance
  • Safety concerns
  • Tool evaluation and qualification
  • Design assurance concerns
  • Applying contractors, sub-tier providers and off-shore facilities
  • Nonconformities and changes to plans

DO-254 Certification Timetable

  • Master project timetable
  • Certification authority web interface
  • Management system

Software Synopsis

  • Software configuration block diagram
  • Processor #1
  • Processor #2
  • COTS software determination
  • Disabled code partitioning
  • Safety and partitioning considerations
  • Resource allocation
  • Redundancy
  • Fault tolerance
  • Task timing

DO-178 Software Certification Considerations

  • Certification fundamentals and compliance tools
  • Certification Review Items (CRI)
  • Development assurance levels (DALs)
  • Software level identification
  • DO-178C objectives By DAL
  • Software conformity matrix
  • Certification authority involvement

DO-178 Software Lifecycle

  • V-Model approach
  • Expansion of several DAL’s inside a single lifecycle procedure
  • DO-178 team personnel roles and responsibilities
  • Interactions of processes and actions
  • Relationships between processes
  • Delivering feedback methods
  • Traceability of appraisals and assessment outcomes
  • Overview of problem reporting
  • Software planning process
  • Integral procedures
  • Software criteria process
  • Software design development
  • Software coding procedure
  • Integration process
  • Software testing procedure

DO-178 Software Lifecycle Data

  • Introduction
  • Lifecycle data interactions with other data describing the system
  • Trace information
  • Creating and regulating the software lifecycle data
  • Presenting the software lifecycle data to the certification authority
  • Software control classification
  • DER delegation plan

DO-178 Software Supplemental Considerations

  • Taking advantage of formerly developed software
  • Tool qualification
  • Alternate techniques
  • In-situ loadable software
  • Preference selectable software
  • User adaptable software
  • Various version software
  • Software COTS
  • Applying suppliers, sub-tier providers and off-shore facilities
  • Nonconformities and alterations to plans

TONEX Workshop Sample

  • Apply V-model for both software and hardware
  • Develop conceptual design according to DO-178 and DO-254
  • Estimate the costs associated with DO-178 and DO-254 implementation
  • Perform COTS for both DO-178 and DO-254
  • Develop process planning for DO-178 and DO-254
  • Develop the DO-178 and DO-254 lifecycle step by step
May
9
Thu
GPON Training | Gigabit Passive Optical Networking @ Atlanta, GA
May 9 @ 9:00 am – May 10 @ 4:00 pm
Print Friendly, PDF & Email

Price: $1,899.00
Length: 2 Days

Print Friendly, PDF & Email

GPON Training, Gigabit Passive Optical Networking Training

GPON Training, Gigabit Passive Optical Networking Training.  A 2-day GPON training course including GPON, XGPON 10 Gigabit systems. and NG-PON2.

Gigabit Passive Optical Networking course covers the fundamentals of FTTx GPON,  XGPON and NG-PON2  technologies.

gpon training

GPON is defined by ITU-T recommendation series G.984.1 – G.984.6. GPON can transport  Ethernet, and TDM (PSTN, ISDN, E1 and E3) traffic and consists of Optical Line Termination (OLT) and Optical Network Unit (ONU) or Optical Network Termination (ONT)  transmission equipments.

XGPON’s Capable passive optical networks (GPON) maximum rate is 10 Gbits/s (9.95328) downstream and 2.5 Gbits/s (2.48832) upstream using different WDM wavelengths such as 1577 nm downstream and 1270 nm upstream:

  • XGPON optical split is 1:128
  • Data formatting is the same as GPON
  • Maximum range is 20 km

Learn about:

  • The basics FTTx technologies
  • Principles behind Passive optical networks (PONs)
  • Architectural principles of access networks
  • Analysis and planning, topologies, site types, and Fiber Termination Points
  • GPON general characteristics
  • GPON FTTH platforms
  • Capable passive optical networks (GPON); XPON

Learning Objectives

Upon completion of GPON training course, the attendees will be able to:

  • Describe what PON/FTTx is
  • Describe what GPON networking is
  • Describe GPON Network Architecture
  • Outline GPON Basic Concepts
  • Outline GPON Applications
  • List the advantages, requirements and capabilities of GPON and XGPON
  • Describe GPON typical application scenarios
  • Describe the use of GPON and supported applications and network interfaces
  • Describe the key concepts in GPON and XGPON
  • Sketch the architecture of GPON. Network Elements and designs
  • Explain the network architecture of GPON and XGPON
  • List GPON subsystems and interfaces
  • Describe the functions and specifications of GPON components
  • Explain GPON operational procedures
  • Describe GPON capacity planning, upstream and downstream technologies
  • Describe GPON  key performance parameters
  • Describe the QoS, security, protection, and OAM solutions in GPON
  • Describe ONT management concepts applied to GPON
  • List GPON service implementation process steps
  • Describe 10-Gigabit-capable passive optical network (XG-PON) systems, services, architecture, protocols and Reach Extension
  • Describe 40-Gigabit-capable passive optical networks (NG-PON2) systems, services, architecture and protocols

Course Agenda

FTTx Access Networks

  • Elements of an Access Network
  • Access Network Infrastructures
  • Principles behind FTTX Access Networks
  • FTTx networks architecture
  • FTTC, FTTN, FTTD, FTTP, FTTH
  • Principles behind FTTH
  • FTTH topology, technology and network layers
  • What is Passive Optical Networks (PON)?
  • BPON architecture and components
  • BPON and EPON
  • What is GPON?
  • Fundamentals of GPON
  • GPON Infrastructure
  • Similarities and differences between BPON, EPON  and GPON

Technical Introduction to GPON

  • GPON Standards
  • GPON ITU-T G.984.1
  • GPON ITU-T G.984.2
  • Physical Media Dependent (PMD)
  • GPON ITU-T G.984.3
  • Transmission Convergence
  • GPON ITU-T G.984.4
  • 988 ONT Management and Control Interface (OMCI)
  • GPON ITU-T G.984.5 Enhancement Band
  • GPON ITU-T G.984.6
  • Optical Reach Extension (G.984.re)
  • XG-PON ITU-T G.987.1
  • 10 Gigabit Passive Optical Network XG-PON
  • XG-PON2
  • 40Gbps
  • GPON Network Elements
  • Optical Line Termination (OLT)
  • Optical Network Unit (ONU)
  • SFU, SBU, MDU, and MTU
  • GPON Fiber Termination
  • Fiber Connectors
  • Fiber Splice Trays
  • Fiber Cassette Trays and Enclosures
  • Optical Splitter
  • Optical Distributions Frame (ODF)

GPON Power Budget Calculation

  • GPON Infrastructure Examples
  • Optical Power Budgets
  • Dispersion Calculation
  • In-Building wiring
  • GPON Multiplexing
  • PMD
  • Channel Insertion Loss,
  • Optical Distribution Network (ODN)
  • GPON power budgets
  • XGPON power budgets

GPON Architecture, Interfaces and Protocols

  • GPON Services
  • Downstream and Upstream TDM Architectures
  • GPON Stack
  • Network Protocol Support
  • OLT PMD and ONU PMD
  • Frame Structure
  • GPON Encapsulation Method (GEM)
  • GTC adaptation sublayer
  • GTC framing sublayer protocol stack
  • Transmission container (T-CONT)
  • Physical Parameters
  • Reliability and FEC Encoding
  • Channel model and Ports
  • GTC Layer
  • OAM at GTC layer
  • User Planes in GPON
  • ONU Management and Control Interface (OMCI)
  • GPON System Management Mode: SNMP, TR-069
  • Security
  • Protection

GPON OSS/NMS/EMS

  • GPON Service Management
  • GPON Network Management
  • GPON OSS, NMS and EMS
  • Best Practices

10-Gigabit-capable passive optical network (XG-PON): G.987

  • XG-PON Definitions, abbreviations and acronyms
  • XG-PON General requirements
  • XG-PON Physical media dependent (PMD) layer specification
  • XG-PON XG-PON Transmission convergence (TC) layer specification
  • Reach extension

40-Gigabit-capable passive optical networks (NG-PON2): G.989

  • NG-PON2 Definitions, abbreviations and acronyms
  • NG-PON2 General requirements
  • NG-PON2 Physical media dependent (PMD) layer specification
  • NG-PON2 Transmission convergence (TC) layer specification
May
13
Mon
Mobile Application Development Workshop @ TONEX LA Office
May 13 @ 9:00 am – May 14 @ 4:00 pm
Print Friendly, PDF & Email

Mobile Application Development Workshop

Mobile Application Development Workshop Description

Mobile Application Development workshop is designed by TONEX to examine the principles of mobile application (app) design and development. It is a project-oriented course which includes app design for different mobile platforms such as iOS, Android and Windows based on the latest versions and trends available.

Mobile Application Development workshop

TONEX as a leader in teaching industry for more than 15 years and having a lot of experience in mobile app development industry is now announcing the Mobile Application Development workshop which helps you to understand the advanced technology behind the mobile application development and design advanced applications for distribution or individual need.

Mobile Application Development workshop contains real-world application implementation for different platforms using Java, Swift and Objective-C (for iOS), HTML5, JavaScript and XML, and C# and XAML (for Windows).

Our Company, TONEX, has established a complete mobile application development program with different variety of courses, workshops, seminars, and comprehensive courses designed by professionals from academia and industry in mobile application development. We are pleased to announce the mobile application development workshop for those professional fellows interested in developing mobile applications for iPhone, iPad, Android, or Windows devices.

This course covers a variety of topics in mobile app development such as: Introduction to mobile app development, application development for Android systems using Java and XML, Android environment setup and architecture, Android User Interface (UI) layouts and control, iOS mobile application development using Objective-C and Swift programming, UI design in iOS, and Windows mobile application development using C# and XAML programming languages.

By taking the Mobile Application Development workshop, you will understand the basics of iOS, iOS Xcode app development interface, benefits of newly designed Swift programming over Objective-C and Cocoa, delegates and UI elements in iOS and object creation for iOS.

Learn about fundamentals of JavaScript and XML programming for android, android software development kit (SDK), event handling, hardware sensors, UI controls, fragments, and content providers in android operating system.

Learn about basics of Objective C, Swift, Java, C# and CAML which are vital parts of mobile app development in windows phones, XAML layout and events, video/audio control, maps, Bluetooth and database for windows phones.

All the materials and topics in this course are being updated in a timely manner to ensure the trend is followed and it has been proven that many clients learn about upcoming technologies from TONEX first. For example, the programming part covers the recent advancements in iOS 9, Android 6, and Windows 10 application developments.

Finally, the Mobile Application Development workshop will introduce a set of labs, workshops and group activities of real world case studies in order to prepare you to develop sophisticated mobile apps and to be able to tackle all the related mobile app development challenges.

Audience

The Mobile Application Development workshop is a 2-day course designed for:

  • Mobile app developers and software engineers
  • Project managers and business analysts working with mobile application development
  • Team members or stakeholders involved in mobile application design and development
  • Business analysts, functional managers, project managers, developers and testers
  • System administrators, engineers who want to learn mobile app development
  • Vendors who will develop mobile apps
  • Investors and contractors who plan to make investments in mobile app industry.

Training Objectives

Upon completion of the Mobile Application Development workshop, the attendees are able to:

  • Describe all aspects of mobile programming which make mobile programming unique compared to other platforms
  • Design mobile applications for a company or individual profit
  • Implement and apply prototyping approaches in order to develop complicated mobile interfaces
  • Program iOS using basic and advanced phone features
  • Implement an Android application using advanced phone features
  • Understand design principles to program windows phone applications
  • Implement mobile apps for Android, iOS, or Windows phones in marketplace for distribution
  • Get a profound understanding of the ideas and philosophy behind the mobile app development.
  • Have a thorough understanding of the motivation, requirements, functionality, possibilities, and limitations mobile app development and design

Training Outline

The Mobile Application Development workshop consists of the following lessons, which can be revised and tailored to the client’s need:

Introduction to Mobile App Development

  • History and Background of Mobile Apps
  • Smart Phones
  • Tablets
  • Mobile Computing
  • Mobile Business Landscape
  • Native Mobile Applications
  • Mobile Web Applications
  • Different Mobile Platforms
  • iOS
  • Android
  • Windows Phone
  • BlackBerry OS
  • Tablet Platforms
  • Hardware Sensors
  • Security Consideration in Mobile App Design
  • Data Integration and Database
  • Programming Languages
  • Web Designer and Developer Role

App Development for Android

  • Features of Android
  • Software Development Kit (SDK) for Android
  • Android Applications
  • Environment Setup
  • Android Architecture
  • Application Components
  • Organizing Resources and Accessibility
  • Broadcast Receivers and Intents
  • Content Providers
  • Fragments
  • Intents and Filters
  • User Interface (UI) Layouts
  • UI Controls
  • Event Handling
  • Styles and Themes
  • Custom Components
  • Database and Content Providers
  • Hardware Sensors
  • Maps, Geocoding, and Location Services
  • Audio, Video, and Camera
  • Bluetooth, Bluetooth LE, NFC, Networks and Wi-Fi
  • Telephony and SMS

Android Environment Setup and Architecture

  • Tools
  • Java Development Kit (JDK)
  • Android JDK
  • Android Development Tools (ADT) Plug-in
  • Android Virtual Device
  • Eclipse IDE
  • Linux Kernel
  • Android Libraries
  • Android Runtime
  • Application Framework
  • Applications

 Android User Interface (UI) Layouts and Control

  • Relative Layout Attributes
  • GridView Attributes
  • Sub-Activity Attributes
  • Layout Attributes
  • View Identification
  • Android UI Control
  • TextView Attributes
  • EditText Attributes
  • AutoComplete TextView
  • Button Attributes
  • ImageButton Attributes
  • CheckBox Attribute
  • ToggleButton
  • RadioButton Attrubutes
  • RadioGroup Attribute

 iOS Mobile Application Development Using Objective-C and Swift (iOS 9 and Below)

  • General Background about iOS
  • iOS Xcode
  • Improvement from Cocoa Framework to Objective-C and Swift
  • Benefits of Swift Development
  • Combination of Objective-C and Swift
  • Swift Interface and Implementation
  • Object Creation
  • Data Types in Swift
  • Printing Logs
  • Arrays, Dictionary and Categories in Swift
  • Creating an App
  • Actions and Outlets
  • Delegates
  • User Interface (UI) Elements
  • Designing UI for iOS
  • Accelerometer
  • Universal Applications
  • Camera Management
  • Location Handling
  • SQLITE Database
  • Audio and Video
  • File Handling
  • Map and Location
  • In-App Purchases, Storyboards, and Audio Layouts
  • Game, Twitter, and Facebook
  • Memory Management in iOS
  • Application Development Debugging Techniques

 User Interface Design in iOS

  • Main Elements of UI
  • UI Focus and Approaches
  • Text Files
  • Input Types
  • Buttons
  • Labels and Toolbars
  • Status Bars and Navigation Bars
  • Tab Bar
  • Image View
  • Scroll view
  • Table view
  • Split View
  • Text View
  • Pickers
  • Icons and Switchers
  • Sliders and Alerts

 C# and XAML for Windows Mobile Application Development (Windows 10 and Below)

  • Introduction to Windows Phone Platform
  • User Interface Design for Windows Phone
  • Application Interface
  • Windows Phone Developer and Designer Tools
  • Coding Tools
  • Designing Tools
  • Application Development Tools
  • C# Programming for Windows Phone App Development
  • Windows Application Life Cycle
  • Storage and Network Access
  • API Mapping Tools
  • Navigation Model
  • XAML Layout and Events
  • Windows Phone Emulator
  • HTML Apps in WebView
  • Maps and Animations
  • Video/Audio Control
  • Controls and File Handling
  • Bluetooth and Connectivity
  • Web Services and Database

 Hands On, Workshops, and Group Activities

  • Labs
  • Workshops
  • Group Activities

 Sample Workshops and Labs for Mobile App Development Workshop

  • UI Design for Android Systems, Case Study
  • Hello World Example for Android with Java
  • Add Button to UI in Android Sample Code
  • Designing an Image Capturing Event for Android
  • Using XML for Slide Out Animation in Android
  • Xcode Hands on Training for iOS
  • Creating Button and Label for iOS App Development Case Study
  • Example on Creating Delegate for iOS
  • UI Design for iOS using Objective-C
  • Create the Project for Windows Phone App in C#
  • Creating the UI for Windows Phone
  • Hello Word Example for Windows Phones
May
16
Thu
Design Verification Plan & Report Training | DVP&R Training @ Tonex Atlanta
May 16 @ 9:00 am – May 17 @ 4:00 pm
Print Friendly, PDF & Email

Design Verification Plan & Report (DVP&R) training course covers the theories, concepts, and methods required for DVP&R. Design verification, in general, is a crucial part of any product development. It is a key step in qualification testing, ensuring that the final product is the same as the product was supposed to design and develop. Failing to complete this step can lead to produce and manufacture a product that doesn’t meet the characteristics of the designed product or the prototype.

As you might know, many clients take the testing and design verification of products very seriously, as though in the same importance as the actual design. Even so, many contracts require design verification as a major phase, in which the clients often send their own people to witness testing and to ensure they are conducted to their satisfaction. Therefore, if you are the manager of or a member of the quality, R&D, and design team, you need to know how to conduct design verification and how to prepare the report. The TONEX Design Verification Plan and Report training course will help you gain sufficient knowledge and develop necessary skills to be able to complete DVP&R for your products.

TONEX Design Verification Plan and Report training includes many in-class activities including hands on exercises, case studies and workshops. During the DVP&R workshops, attendees can bring in their own design work and products and through our coaching, develop their own Design Verification Plan and Report (DVP&R).

While testing might seem costly at first, the price of not having it done can be way higher plus it can negatively affect the reputation of the company in the client’s view if the final product doesn’t meet the promised characteristics.

Testing should be included in the design process at many points, from the very beginning when the concept is developed to the end when the final product is produced. Although type of the tests and the methods vary from one point to another, the general guidelines are applied to all. During the DVP&R training course, we will teach you these guidelines and also teach you how to tailor them based on where, where, and the type of product for which you are conducting the tests.

Historically, DVP&R processes have been practiced by the automotive industry. However, currently such processes are being used in almost all manufacturing industries including mechanical, electrical, chemical, and even pharmaceutical and that’s because a proper Design Verification/Product Validation (DV/PV) can significantly eliminate failure modes and increase the reliability of the product. In this seminar, we will walk you through all the steps of a good, effective DV/PV that is appropriate for your industry.

Audience

The TONEX Design Verification Plan and Report (DVP&R) training is a 2-day course designed for:

  • Engineers, scientists, and managers involved with manufacturing
  • Production and manufacturing team
  • Product design personnel
  • Reliability, testing, and quality team members
  • R&D personnel
  • Product and process assurance people
  • Assembly personnel

Training Objectives

Upon completion of this course, attendees are able to:

  • Understand and explain the importance of Design Verification Plan and Report
  • Discuss the theory of Design Verification Plan and Report
  • Design an appropriate DVP for the product they are testing
  • Design and conduct necessary and relevant testing at various points during the design process
  • Interpreted the results of the testing to find if and where the problem is and where the product deviates from standards
  • Prepare the Design verification Report
  • Test the prototype
  • Identify the best method to conduct the verifications
  • Developing measurement methods
  • Determine opportunities to combine all verification activities
  • Determine required equipment, software, facilities, etc. to conduct verifications
  • Determine a high-level verification schedule

Course Outline

Overview and Background

  • Definition of Design Verification
  • What is a Design Verification Plan and Report
  • Why is it crucial in the designing and manufacturing process?
  • How does it impact the quality of the product, cost of production, and customer satisfaction?
  • When DVP&R is needed?

Introduction to Design Verification

  • Tests development
  • Prototype testing
  • Proof testing
  • Acceptance testing

The Verification Process

  • Basics of verification
  • Design scenarios and verification action plan
  • Verification; a risk-based process
  • Different types of risks
  • How to incorporate risk to affect the verification practice
  • Model of risk-based verification design

Verification Methods

  • Demonstration
  • Inspection
  • Analysis
  • Similarity
  • Testing
  • How to select the most appropriate method

The Verification Activities

  • Identifying verification activities
  • Preparing for verification activities
    • Best approach identification
    • Measurement methods definition
    • Verification activities combination
    • High-level verification schedule identification
    • Developing a detailed Design Verification Plan
  • Conducting verification activities
    • Performing the Design Verification Plan
    • Logging the results
    • Highlighting the non-conformance

Implementing A DVP&R

  • Setting out the verification testing method
  • Outline your Verification Plan
    • Review all the requirements and protocols
    • Analyze the potential risks
    • Draft you Verification Plan
  • Refine your Verification Plan
    • Identify the verification demand
    • Review all the possible verification methods
    • Analyze all the advantages/disadvantages of each method
    • Select the best approach
    • Validate the selected method(s)
  • Perform protocols
    • Complete protocols
    • Implement protocols

Complementary Checklist

  • Verification methods development
    • Draft the methods
    • Check the methods
  • Documentation
    • Documenting all the plans and protocols
  • Implement and manage changes in the design based on the DVP&R

Design Verification Plan & Report Hands-on and In-Class Activities

  • 3 Labs
  • 2 Workshops
  • 1 Group Activity

Sample DVP&R Activity Workshop

  • How to develop a DVP&R Template (TONEX’s DVP&R Template)
  • How to develop proper methods
  • How many testings (testing points) would you need?
  • Analyzing the potential risks
  • How to read the raw data and analyze them?
  • How to use data to decide whether (or not) the prototype or sample has deviated from its specifications?
  • How to prepare the report
  • How to use the report to make adjustments?
May
20
Mon
Pipeline Leak Detection Training | Pipeline Leak Monitoring Training @ TONEX Plano, TX
May 20 @ 9:00 am – May 23 @ 4:00 pm
Print Friendly, PDF & Email

Pipeline Leak Detection Training Course Description

Pipeline Leak Detection Course is a 4-day training boot camp covers all aspects of pipeline leak detection system. Pipeline leak detection systems can help minimize the liability of pipeline operating companies. The early identification and accurate location of a pipeline incident are essential for protecting a company’s reputation.

Leak detection is a good tool for quickly raising alarms for theft, identifying product loss due to wear and corrosion to the pipe, and/or preventing environmental events caused by spills. Whether driven by safety and production concerns or regulatory requirements, the method chosen for leak detection has a significant impact on its effectiveness.

Although moving crude oil, gas, liquid and hazardous materials in pipelines is the safest means of transport, a number of incidents have been associated with this method. Statistics from the Office of Pipeline Safety within the U.S. Department of Transportation, Pipeline and Hazardous Materials Safety Administration show that over the twenty year period from 1991 to 2010 there were 5,636 significant incidents involving 378 fatalities, US$ 440,652,471 property damage and 2,566,699 gross barrels spilled in the USA alone.
Pipeline incidents incur liabilities to pipeline operators, pipeline shareholders and owner of the volume lost. Such liabilities can range from cleaning up cost and damage compensation to criminal offences.

Major liabilities are usually associated with major leak events without a reliable pipeline leak detection system. Therefore investing in a proven and reliable leak detection system can help pipeline companies minimize the consequences of a pipeline incident.

To maintain the above performance standard, it is necessary for the pipeline operating companies and leak detection system to insure that:

  • The field instruments are working correctly.
  • The SCADA and telecommunication system are available.
  • The leak detection system is optimized to current operating and instrument conditions.
  • Alarms and anomalies are addressed timely.
  • Operators have confidence in the leak detection system at all times.

After completing this course, students will be able to:

  • Explain the basic architecture and components of a Pipeline and Pipeline Leak Detection System
  • (LDS)
  • Describe the component technologies behind an LDS system
  • Describe the component technologies behind a SCADA system
  • Apply potential benefits of LDS and SCADA applied to Aramco
  • Understand the base standards that apply to LDS
  • Understand the terms used in describing the technology
  • Discuss the technical aspects of LDS, SCADA and communications methods
  • Review LDS and SCADA System Design Considerations
  • Review integration of LDS with SCADA
  • Explain LDS and SCADA performance and Optimization considerations
  • Explore project planning process of LDS
  • Discuss successful and unsuccessful LDS deployments
  • Step through a practical process for managing LDS Systems
  • Explore the current and future LDS market trends

Topics Discussed

  • Pipeline Leak Detection techniques
  • Leak detection system optimizations to current operating and instrument conditions
  • Pipeline leak detection techniques by a SCADA system that controls and monitors the pipeline
  • Integrating leak detection into existing SCADA systems to provide alarm management of a leak
  • event as well as record keeping and trending before and after the event
  • Techniques to locating the leak with a precise location for quicker response and repairs

Pre-Requisites

Pipeline Leak Detection Training | Pipeline Leak Monitoring Training

Outline

Basic Fundamental and Concepts of Leak Detection

  • General Types of Energy Pipelines
  • Crude oil
  • Multi-products with varying batch sizes
  • Natural gas including wet gas
  • Carbon Monoxide (CO)
  • Hydrogen (H2), Ethylene, Chlorine, Propylene, LPG, and Water
  • Pipeline Components
  • Structural Design of Pipeline
  • Planning and Construction of Pipeline
  • Instrumentation and Pigging
  • Maintenance, Reliability and Failure Analysis
  • Pipe defects
  • Corrosion on Pipeline
  • Pipeline Rehabilitation and Repair Techniques
  • Flaws in Pipeline Leak Detection Systems
  • Leak Detection Systems (LDS)
  • Leak Detection and SCADA Systems
  • Integration of a LDS with SCADA
  • Multiphase pipeline leak detection
  • Pipeline Risk Assessment
  • Pipeline Maintenance and Repair
  • Classification of Leak Detection Technologies
  • Evaluation of Leak Detection Systems
  • Standards for Leak Detection Systems

Overview of Leak Detection Systems (LDS)

  • LDS technologies / methods
  • LDS technologies / methods
  • LDS components
  • Hydraulics theories pertaining to LDS
  • Communication infrastructure
  • Operations & maintenance
  • Troubleshooting and Diagnostics
  • Pipeline Leak Detection Best Practices
  • Statistical Pipeline Leak Detection
  • Rarefaction Wave Leak Detection
  • Multiphase Pipeline Leak Detection
  • Internally based LDS
  • Pressure/Flow monitoring
  • Acoustic Pressure Waves
  • Balancing methods
  • Statistical methods
  • RTTM methods
  • E-RTTM methods
  • Bubble Emission Method

Types of LDS

  • Externally based LDS
  • Infrared radiometric pipeline testing
  • Acoustic emission detectors
  • Vapour-sensing tubes
  • Fibre-optic leak detection
  • Visual Inspection Procedures
  • Visual Leak Detection Capability
  • Manual Over/Short Calculation
  • Pressure Monitoring
  • Discrete Sensor based Technologies
  • Liquid Sensing
  • Vapor Sensing
  • Acoustic Emissions
  • Factors that can affect External Methods

LDS Technique Selection

  • Pipeline Service Types
  • Types by Transport Function
  • Pipe Leakage Evaluation
  • Components and Definitions
  • LDS Technique Selection
  • LDS Selection Methodology
  • Methods Used
  • Burst & leak history
  • Pipeline Audits
  • DMA/Flow
  • Measurement (flow into less flow out of network)
  • Hydrostatic testing (pressure testing)
  • Pipeline Asset Management
  • Infrastructure Leakage Index (ILI)
  • Pressure Control
  • District Meter Areas (DMA’s)
  • Leak Noise Surveys
  • Leak Correlation Survey’s
  • Noise Logger Survey’s
  • Acoustic emission
  • Acoustic with Correlation
  • Ultrasonic
  • Ultrasonic flow measurement
  • Transit time and Doppler
  • Clamp-on ultrasonic flowmeters
  • Transducers
  • Measuring fluid flow velocity
  • Nonintrusive clamp-on transducers
  • Distance Measurement
  • Advanced Correlation
  • Infrared Thermography
  • Chemical
  • Mechanical
  • Ground Penetrating Radar
  • Volume or mass balance
  • Rate of change in flow or pressure
  • Hydraulic modelling
  • Pressure point analysis
  • Limitations of Leak Detection Methods
  • Method
  • Application
  • Limitations

Leak Classification and Action Criteria

  • Multiphase flow
  • Hydrates
  • Monitoring Techniques
  • Computational Methods
  • Over/Short Comparison
  • Volume Balance with Line Pack Correction
  • Pattern of Discrepancy Between Modeled and Measured Pressure and/or Flow
  • Rate of Pressure/Flow Change
  • Statistical Methods
  • System Identification with Digital Signal Analysis
  • Rupture Detection
  • Comparison of Computational Methods
  • Field Instrumentation Requirements
Jun
3
Mon
Bluetooth Training Bootcamp | Hands-on Bluetooth Classic and Bluetooth LE @ Tonex Plano Office
Jun 3 @ 9:00 am – Jun 5 @ 4:00 pm
Print Friendly, PDF & Email

Bluetooth Training Bootcamp, Hands-on Bluetooth Classic and Bluetooth LE (BLE) Training

Bluetooth Training Bootcamp, is a 3-days Hands-on Bluetooth Classic and Bluetooth LE (ble) Training Bootcamp with workshops, and exercises. This is a  practical Classic Bluetooth and BLE Training with hands-on activities.

Learn about Bluetooth Classic and Bluetooth Low Energy (BLE) wireless technology standards. Both Classic Bluetooth and BLE operate in the 2400-2483.5 MHz range within the ISM 2.4 GHz frequency band. In Classic Bluetooth, data is split into packets and exchanged through Bluetooth channels (79 designated channels, 1 MHz in bandwidth).

Bluetooth Classic is a good fit for consumer products vs. BLE with lower power consumption for Machine to Machine (M2M) and Internet of Things (IoT).

BLE also operates in the 2.4 GHz ISM band and unlike classic Bluetooth it remains in sleep mode most of the time (low duty cycle).

Learning Objectives

Upon completion of this course, the participants will be able to:

  • List the requirements and capabilities of Classic Bluetooth
  • List the requirements of Bluetooth Low Energy (BLE) including Bluetooth 4.2 (BLE) and Bluetooth 5
  • Compare Classic Bluetooth vs. Bluetooth Low Energy (BLE)
  • Explain the simplified architecture of both Classic Bluetooth and Bluetooth Low Energy (BLE)
  • Describe enhanced features in LTE Bluetooth Low Energy (BLE)
  • Describe Profile and Services in Classic Bluetooth and Bluetooth Low Energy (BLE)
  • Describe implementation models for both Classic Bluetooth and Bluetooth Low Energy (BLE)
  • Describe the concept of GAP/GATT in Bluetooth Low Energy (BLE)
  • Explain the security features in both Classic Bluetooth and Bluetooth Low Energy (BLE)
  • Sniff L2 and L3 packets in both Classic Bluetooth and Bluetooth Low Energy (BLE) using sniffers and devices
  • Analyze L2/L3 packets in both Classic Bluetooth and Bluetooth Low Energy (BLE)
  • Analyze and compare Physical Layer of Classic Bluetooth and Bluetooth Low Energy (BLE) using spectrum analyzers

Topics Include Details of Classic Bluetooth and BLE Profiles and Protocols

  • Profiles and Services
  • Classic Bluetooth Physical Layer Classic Bluetooth Controller stack
    • Classic Bluetooth Link layer
    • Asynchronous Connection-Less (ACL)
    • Synchronous Connection-Oriented (SCO)
    • Active Slave Broadcast (ASB)
    • Parked Slave Broadcast (PSB)
    • Link control protocol (LC)
    • Link manager protocol (LMP)
    • Low-energy link layer (LELL)
    • Host controller interface (HCI
  • Classic Bluetooth Host stack
    • Logical link control and adaptation protocol (LCAP)
    • Bluetooth network encapsulation protocol (BNEP)
    • Radio frequency communication (RFCOMM)
    • Service discovery protocol (SDP)
    • Telephony Control Protocol Specification (TCS)
    • Audio/video control transport protocol (AVCTP)
    • Audio/video distribution transport protocol (AVDTP)
    • Object exchange (OBEX)
    • Low Energy Attribute Protocol (ATT)
  • BLE Profiles and Services
  • Bluetooth Low Energy (BLE) Controller and Host stack
  • Generic Access Profile (GAP)
  • Generic Attribute Profile (GATT)
  • LE Privacy
  • BLE HCI Commands
  • Privacy and White List
  • Logical Link Control and Adaptation Layer Protocol (LCAP)
  • Host Controller Interface (HCI)
  • BLE Link Layer
  • BLE Physical Layer

 

Bluetooth Classic and BLE Combo Training Bootcamp Agenda

Introduction to Bluetooth Classic

  • What is Bluetooth technology?
  • Bluetooth Standards
  • IEEE Related Standards
  • The Bluetooth Special Interest Group (SIG)
  • Conformance and Compatibility Testing
  • Applications for Bluetooth
  • Classic Bluetooth
  • Bluetooth Services
  • Basic Bluetooth Operation
  • Configuring Bluetooth Devices
  • Device Discovery and Service Discovery
  • Data Throughput and Range
  • Spectrum
  • Frequency Hopping Spread Spectrum
  • Interference
  • Class of Radio
  • Power and Range

Classic Bluetooth Protocols       

  • PHY characteristics
  • Adaptive Frequency Hopping (AFH)
  • Link management protocol (LMP)
  • Packet structure, signaling, discover and connection procedures
  • Logical link control and adaptation protocol (L2CAP)
  • Host/controller interface (HCI)
  • Bluetooth network encapsulation protocol (BNEP)
  • Radio frequency communication (RFCOMM)
  • Service discovery protocol (SDP)
  • Audio/video control transport protocol (AVCTP)
  • Audio/video data transport protocol (AVDTP)
  • Asynchronous Connection-oriented (ACL)
  • Synchronous connection-oriented (SCO)

Classic Bluetooth Operation

  • Bluetooth Operations
  • Classic Bluetooth packet structure and connection procedures
  • Device Discoverability
  • Device Connectability
  • Bluetooth Classic Architecture
  • Masters and Slaves
  • Piconets and Scatternets
  • Device Addressing
  • Pairing and Bonding
  • Inquiry and Paging
  • Security
  • Link Keys
  • Authentication
  • L2 Packet Exchange
  • Bluetooth Packets
  • Packet structure, signaling, discover and connection procedures
  • Advertising Packets, and Scan Response Data
  • Data exchange

Working with Classic Bluetooth Profiles

  • Advanced Audio Distribution Profile (A2DP)
  • Hands-Free Profile (HFP)
  • Human Interface Device Profile (HID)
  • Synchronous Connection-Oriented (SCO)
  • Headset Profile (HSP)
  • Audio/Video Remote Control Profile (AVRCP)

Introduction to Bluetooth Low Energy (BLE)

  • BLE Background theory
  • BLE vs. Bluetooth Classic
  • BLE features
  • BLE Profiles and Services
  • The lowest power consumption
  • Robustness, security, and reliability
  • Wireless co-existence
  • Connection range and data rates
  • Ease of use and integration

Overview of BLE Protocols

  • Generic Access Profile (GAP)
  • Generic Attribute Profile (GATT)
  • Attribute Protocol (ATT)
  • Security Manager (SM)
  • Security and AES Encryption (NIST and NSA versions)
  • Logical Link Control and Adaptation Protocol (L2CAP)
  • Enhancements to L2CAP for Low Energy
  • Host Controller Interface (HCI), Host side
  • Host Controller Interface (HCI), Controller side
  • Enhancements to HCI Protocol
  • Direct Test Mode (DTM)
  • BLE Link Layer
  • BLE PHY Characteristics

BLE Operation

  • Bluetooth Configuration
  • Core Configurations
  • Basic operations (GAP)
  • Device roles
  • Connections in BLE
  • Event flow and handling
  • Scanning
  • Connecting
  • Service Discovery
  • Device discovery
  • Connection management
  • Pairing
  • Bonding
  • Sending and receiving data
  • Low power idle mode operation
  • Device discovery
  • Reliable point-to-multipoint data transfer
  • Advanced power-save
  • Advanced encryption functionalities
  • Single mode and dual mode
  • BLE Device Roles
  • Central and peripheral roles
  • Server and client roles
  • Advertising and Scan Response Data
  • Establishing a connection
  • Connected Network Topology
  • GATT Transactions
  • Services and Characteristics
  • Profiles vs. Services
  • Characteristics

Introduction to Bluetooth 5

  • Bluetooth Core 5.0
  • Bluetooth 5.0 Architecture
  • Changes from v4.2 to v5.0
  • Bluetooth 5.0 Features Added
  • Integrated in v5.0
  • Deprecated Features
  • Slot Availability Mask (SAM)
  • 2 Msym/s PHY for LE
  • LE Long Range
  • High Duty Cycle Non-Connectable Advertising
  • LE Advertising Extensions

Practical Activities

  • Quizzes and homework
  • Hands-on labs and demos
  • Hands-on Activities: Working with Classic and BLE Profiles
  • Hands-on Activities: Introduction, Setup, Pairing and Bonding Bluetooth Devices (classic and BLE)
  • Hands-on Activities: Sniffing Bluetooth L2 packets
  • Hands-on Activities: Sniffing BLE Bluetooth
  • Hands-on Activities: Analyzing Bluetooth and BLE L1 (Physical Layer)
  • Hands-on Activities: Capturing Bluetooth and BLE L2/L3 Packets
  • Hands-on Activities: Working with Profiles
  • Hands-on Activities: Create your own Profile
Jun
6
Thu
Requirements Writing Training Course – Specification Writing Training @ Tonex Dallas
Jun 6 @ 9:00 am – Jun 7 @ 4:00 pm
Print Friendly, PDF & Email

Requirements Writing Training Course, and Specifications Writing Training course addresses the techniques used to write, validate and verify requirements and convert them to technical design specifications. It gives attendees the basic tools necessary to write effective system design specifications. Requirements are the foundation for building systems and software. They determine WHAT the system must do and drive the system development. Requirements are used to determine [verify] if the project team built the system correctly. The requirements development process identifies the activities needed to produce a set of complete and verifiable requirements.

Participants will learn how to:

  • Write well-formed, validated requirements and specifications
  • Analyze, Verify and Validate requirements into a user requirements document
  • Create Project Plan/SEMP with  various plans, such as the review plans, configuration management plans, and risk plans. [Control the requirements development].
  • Establish Configuration management [CM] the process to control changes to the requirements and manage the baseline documentation.
  • Plan the Risk management to monitor, control, and mitigate high risk requirements.
  • Manage Technical reviews to identify defects, conflicts, missing, or unnecessary requirements.
  • Manage Stakeholder involvement which is  essential for validating the requirements. Are these the correct requirements?
  • Establish Elicitation techniques to enable the discovery and understanding of the needed requirements.
  • Manage Traceability of requirements to user needs & requirements, support documentation, and constraining policies [e.g., safety requirements].

Requirements Writing Training Requirements define the functions, performance, and environment of the system under development to a level that can be built: Does the system do WHAT it is supposed to do? – These are Functional requirements. How well does the system do its functions? – These are Performance requirements. TONEX Requirements Writing Training provides the foundation to produce requirements for the system and sub-systems with set of activities . The systems engineering standard [EIA 632] defines “requirement” as “something that governs what, how well, and under what conditions a product will achieve a given purpose.” This course gives PEs 13 PDH (Professional Development Hours) approved by PIE.

 

Learning Objectives:

Upon successful completion of the course, attendees will:

  • Describe the way the system is intended to operate from the user’s perspective
  • Describe Concept of Operations (ConOps) process where user needs, expectations, goals, and objectives are described
  • Understand how feasibility Study can produce the conceptual high-level design and requirements which can be used as a starting point for the project.
  • Demonstrate the ability to capture and validate requirements throughout the requirements analysis process.
  • Learn how to conduct technical reviews, manage stakeholder involvement, and elicit requirements
  • Understand traceability of requirements to user needs
  • Understand the relationships among all stages of the system life cycle.
  • Describe different levels of requirements
  • Learn how to develop requirements, write and document requirements, check completeness of requirements, analyze, refine, and decompose requirements, validate requirements and manage requirements
  • Describe communications techniques to elicit requirements
  • Classify requirements as functional or design
  • Demonstrate the ability to write functionally oriented and design oriented specifications
  • Understand how to convert requirements into valid design specifications
  • Learn how to separate System and Sub-system Requirements
  • Learn how to create a Verification Plan to verify each system requirement
  • Effectively produce design specification
  • Effectively perform Verification (Functional, Non-Functional, and Interface reqs.) and Validation (ConOps)

Course Topics

BASICS OF SYSTEMS ENGINEERING

  • Definition of Common Terms
  • System Definition and Design
  • Design Methodologies
  • Master Plan Scope
  • Concept of Operations (ConOps)
  • Preliminary Engineering
  • Final Engineering
  • RFP vs. Consultant Design vs. Design-Build

REQUIREMENTS ANALYSIS

  • Introduction to Requirements
  • The Quality of Requirements
  • Description of Requirements Writing (within the larger context of system development)
  • Overview of Requirements Development

Communication Techniques for Eliciting Requirements

  • Stakeholder involvement
  • Defining valid and meaningful needs
  • Technical reviews
  • Stakeholder feedback on the needs being collected
  • Prioritization of the needs
  • ConOps to System Requirements (generic)

REQUIREMENTS SOURCES

  • Purpose of Requirements
  • Levels of Requirements
  • Understanding the different levels of requirements
  • Performance requirements
  • Conditions [e.g. environmental, reliability, and availability]
  • Environmental and Non-Functional requirements
  • System
  • Sub system
  • Component / task

Types of Requirements

  • Eight basic types
  • Differences between requirements for hardware, software, services
  • Functional
  • Non functional
  • Performance, etc.
  • Non-Requirements

STRUCTURE OF A WELL FORMED REQUIREMENT

  • Definition
  • Capabilities
  • Conditions
  • Constraints
  • Operational Policies & Constraints
  • Technical and Policy Constraints
  • Properties
  • Interface
  • Human
  • Hardware
  • Software
  • Communications
  • Functional analysis – needs analysis, operational analysis, use cases
  • Design requirements analysis
  • States & Modes analysis
  • Workshop – States and modes analysis
  • Requirements parsing
  • Writing requirements vs. defining a system proposed is critical

SPECIFICATIONS VS. REQUIREMENTS

  • Development of requirements
  • Description of the current environment
  • Stakeholders
  • Feedback to Stakeholders
  • Facilitation skills and techniques
  • Transforming Requirements into Requirements Specifications
  • How requirements specifications relate to requirements
  • Requirements Flowdown in Specifications
  • Specification Types and Formats
  • Types of requirements specification
  • Specification Writing
  • Review of requirements quality
  • Requirement structural template

SYSTEM TESTS (Verification and Validation)

  • Test Plans
  • Test Procedures
  • User Acceptance Testing
  • Requirements Verification Matrix
  • Traceability to user requirements (Validation against ConOps)
  • Traceability to system requirements (Verification against System Specs.)
  • Verification (Functional, Non-Functional, and Interface reqs.)
  • Validation (ConOps)
  • System Integration
  • Standards and Policies

WORKSHOPS/EXERCISE

  • Workshop 1
  • Examples of good and poor requirements (group project)
  • Requirements constructs
  • Group presentations and discussions
  • Workshop 2- classifying requirements as functional or design
  • Workshop 3 – writing a functionally oriented specification vs. a design oriented specification
  • Analysis of Conops document
  • Analysis of Test plans/procedures

Who Should Attend

SMEs, project stakeholders, users, Project and program managers, directors, project sponsors and anyone else involved in planning and writing specifications requirements for projects.

Jun
10
Mon
NERC CIP Training Bootcamp | Crash Course @ TONEX Atlanta, GA
Jun 10 @ 9:00 am – Jun 14 @ 4:00 pm
Print Friendly, PDF & Email

NERC CIP Training Bootcamp, a 5-Day Hands-on Cybersecurity Certificate

NERC CIP Training Bootcamp,   North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) training bootcamp is a crash course style training program designed and crated to meet the needs of the electric in regards to CIP compliance: Cyber Security for NERC CIP Versions 5 & 6 Compliance.

Security specialists, CIP Senior Manager, analysts, designer engineers, system operators, directors of CIP compliance, VPs of operations.

NERC Critical Infrastructure Protection (CIP) training bootcamp is a 5-day crash course empowers attendees with knowledge and skills covering version 5/6 standards. NERC Critical Infrastructure Protection training bootcamp addresses the role of FERC, NERC and the Regional Entities.

Learn approaches for identifying and categorizing BES Cyber Systems and requirements tio implement and comply the standards including strategies for the version 5/6 requirements.

TONEX is the industry leader in Cyber Security and NERC CIP. Our courses are planned, designed and developed by NERC CIP experts in CIP implementation and audits.

Learn how NERC Critical Infrastructure Protection (CIP) requirements address physical security and cybersecurity of the critical electricity infrastructure of North America including:

  • References to NERC CIP associated documents
  • References to Implementation Plan for Cyber Security Standards
  • References to Mandatory Reliability Standards for CIP
  • Guidance for Enforcement of CIP Standards
  • References to NERC CIP Rules
  • Best practices for managing NERC Compliance
  • Protecting: physical security, cybersecurity, emergency preparedness and response
  • Business continuity planning, and recovery from a catastrophic event with emphasis on deterring, preventing, limiting, and recovering from terrorist attacks
  • Sabotage Reporting
  • Critical Cyber Asset Identification
  • Security Management Controls
  • Personnel & Training
  • Electronic Security Perimeter(s)
  • Physical Security of Critical Cyber Assets
  • Systems Security Management
  • Incident Reporting and Response Planning
  • Recovery Plans for Critical Cyber Assets
  • Deterring to dissuade an entity from attempting an attack
  • Preventing  to cause an attempted attack to fail
  • Limiting  to constrain consequences of an attack in time and scope
  • Recovering – to return to normalcy quickly and without unacceptable consequences in the interim
  • Operating, Planning, and Critical Infrastructure Protection Committee
  • Security Guidelines
  • Control Systems Security
  • Cyber Security Analysis
  • Operating Security
  • Business Continuity Guideline
  • Physical Security
  • Protecting Sensitive Information
  • Security Policy
  • Bulk Electric System Security Metrics
  • Personnel Security Clearances
  • Compliance Enforcement and Input

Learn about:

NERC CIP Training

Who Should Attend:
  • CIP Compliance
  • IT  cybersecurity
  • ICS and SCAD cybersecurity
  • EMS cybersecurity
  • Field and security operations
  • Incident response
  • Project managers
  • CIP Auditors
  • Any other staff from electrical utilities who are  maintaining cyber security standards across their enterprise and substations
  • Generation, transmission and distribution staff working to meet NERC CIP standards
Program Learning Objectives:
  • Discuss requirements for reliable operation of the Bulk Electric System
  • List CIP categories of assets to which CIP requirements apply
  • Describe asset classification criteria and tiers: High/Medium/Low
  • List similarities and differences between CIP standards in version 5 and 6
  • Describe NERC filings and FERC rulings on these standards
  • Deep Dive into the CIP 5/6 requirements and obligations/expectations
  • Discuss sabotage reporting process
  • Describe identification and documentation requirements of the Critical Cyber Assets associated with the Critical Assets
  • Describe roles and responsibilities for minimum security management controls to protect Critical Cyber Assets
  • Discuss requirements for identification and protection of the Electronic Security Perimeters inside which all Critical Cyber Assets
  • Describe implementation of physical security programs for the protection of Critical Cyber Assets
  • Define methods, processes, and procedures for securing those systems determined to be Critical Cyber Assets
  • Ensure the identification, classification, response, and reporting of cybersecurity incidents related to Critical Cyber Assets
  • Ensure that recovery plans are put in place for Critical Cyber Assets and that these plans with established business continuity and disaster recovery techniques and practices
Program Coverage and Highlights of Enforcement:
  • NERC CIP requirements
  • HIghlights of NERC CIP 5 & 6
  • Overview of Cyber Security for NERC CIP Versions 5 & 6 Compliance
  • Asset Identification and Governance
  • Access Control and Monitoring
  • System Management
  • Information Protection and Response
  • CIP Process highlights
  • BES Cyber System Categorization
  • High and medium impact BES vs. low impact BES
  • Operational Technology (OT) security
  • Highlights of known ICS vulnerabilities
  • Configuration Change Management & Vulnerability Assessments
  • Cyber Security for NERC CIP Compliance
  • Electronic Security Perimeter(s)
  • Information Protection
  • Incident Reporting and Response Planning
  • Personnel & Training
  • Physical Security
  • Physical Security of BES Cyber Systems
  • Recovery Plans for BES Cyber Systems
  • Sabotage Reporting
  • Security Management Controls
  • System Security Management
  • Best Practice specifications
  • Reference Architecture
  • Gap and Cyber Vulnerability Assessments
  • Firewall/Network intrusion detection
  • Access Management
  • Centralized Patch Management
  • Security Information & Event Management
  • Automated Back-up & Recovery
  • Network Segmentation
  • Intrusion Prevention System (IPS)
  • Protocol Inspection
  • Security Factory Acceptance Testing (FAT)
  • Multi vendor testing
  • Cyber Asset Protection
  • System Design, Reliability and Configuration
  • Baseline Documentation
  • Change Control Services
  • Ports & services, applications & protocols
  • Equipment changes
  • Decommission plan
RF Safety Training @ Nashville, TN
Jun 10 @ 9:00 am – Jun 11 @ 4:00 pm
Print Friendly, PDF & Email

Why choose TONEX for your RF Safety Training?

RF Safety Training covers RF theory of operations, regulations and RF standards, types of radiation and field effect, Maximum Permissible Exposure (MPE) at RF sites, RF safety signs, hazard assessment, Lock out – Tag out procedures and Personal Protective equipment.

RF Safety training is for anyone who may encounter RF fields or RF exposure, and is required training for employees and sub-contractors in the telecommunications industry.

RF Safety Training

RF safety training highlights: Radiofrequency (RF) and microwave (MW) radiation are electromagnetic radiation in the frequency ranges 3 kilohertz (kHz) – 300 Megahertz (MHz), and 300 MHz – 300 gigahertz (GHz), respectively. Research continues on possible biological effects of exposure to RF/MW radiation from radios, cellular phones, the processing and cooking of foods, heat sealers, vinyl welders, high frequency welders, induction heaters, flow solder machines, communications transmitters, radar transmitters, ion implant equipment, microwave drying equipment, sputtering equipment and glue curing.

WHAT ARE “RADIOFREQUENCY” AND MICROWAVE RADIATION?

Electromagnetic radiation consists of waves of electric and magnetic energy moving together (i.e., radiating) through space at the speed of light.  Taken together, all forms of electromagnetic energy are referred to as the electromagnetic “spectrum.”  Radio waves and microwaves emitted by transmitting antennas are one form of electromagnetic energy.  They are collectively referred to as “radiofrequency” or “RF” energy or radiation.  Note that the term “radiation” does not mean “radioactive.”  Often, the terms “electromagnetic field” or “radiofrequency field” may be used to indicate the presence of electromagnetic or RF energy.

The RF waves emanating from an antenna are generated by the movement of electrical charges in the antenna.  Electromagnetic waves can be characterized by a wavelength and a frequency.  The wavelength is the distance covered by one complete cycle of the electromagnetic wave, while the frequency is the number of electromagnetic waves passing a given point in one second.  The frequency of an RF signal is usually expressed in terms of a unit called the “hertz” (abbreviated “Hz”).  One Hz equals one cycle per second.  One megahertz (“MHz”) equals one million cycles per second.

Different forms of electromagnetic energy are categorized by their wavelengths and frequencies.  The RF part of the electromagnetic spectrum is generally defined as that part of the spectrum where electromagnetic waves have frequencies in the range of about 3 kilohertz (3 kHz) to 300 gigahertz (300 GHz).  Microwaves are a specific category of radio waves that can be loosely defined as radiofrequency energy at frequencies ranging from about 1 GHz upward.

WHAT IS NON-IONIZING RADIATION?

“Ionization” is a process by which electrons are stripped from atoms and molecules.  This process can produce molecular changes that can lead to damage in biological tissue, including effects on DNA, the genetic material of living organisms.  This process requires interaction with high levels of electromagnetic energy.  Those types of electromagnetic radiation with enough energy to ionize biological material include X-radiation and gamma radiation.  Therefore, X-rays and gamma rays are examples of ionizing radiation.

The energy levels associated with RF and microwave radiation, on the other hand, are not great enough to cause the ionization of atoms and molecules, and RF energy is, therefore, is a type of non-ionizing radiation.  Other types of non-ionizing radiation include visible and infrared light.  Often the term “radiation” is used, colloquially, to imply that ionizing radiation (radioactivity), such as that associated with nuclear power plants, is present.  Ionizing radiation should not be confused with the lower-energy, non-ionizing radiation with respect to possible biological effects, since the mechanisms of action are quite different.

Attendees attending this class will receive a completion certificate and card complying with OSHA reporting requirements in 29 CFR1910.268.

Some Interesting FCC Links on RF Safety

Anyone who may be at risk to RF exposure RF Site operators and managers Managers and supervisors Building and land owners, managers, engineers and technicians of telecommunication sites

 

Upon completion of the RF safety training course, the attendees will learn about:

  • RF Theory of Operation
  • RF Site Safety and the Law
  • Type of RF Radiation
  • Introduction to Antennas and RF sources
  • Analyzing Maximum Permissible Exposure – MPE
  • How to begin Hazard assessment
  • Available Personal Protective Equipment – PPE
  • RF Safety Models

RF Theory of RF Operations

  • Radiofrequency Energy
  • Radiofrequency and Microwave
  • Radiation Standards
  • Health Effects
  • Hazard Locations and Solutions
  • Evaluating RF and Microwave Exposure
  • RF and Microwave Safety Programs
  • Electromagnetic Fields
  • RF fields and their application
  • Cell Phones
  • Wireless Devices and Health Concerns
  • Towers
  • Cellular and PCS sites
  • Human Exposure from Vehicle Mounted Antennas
  • Cellular Telephone Specific Absorption Rate (SAR)
  • RF Biological Hazard Issues
  • Public Exposure (“Uncontrolled”)
  • Occupational Exposure (“Controlled”)
  • Tonex 10 RF Safety Rules
  • RF Exposure Surveys Perform on-site survey characterize area with multiple RF sources
  • Measurement equipment and probes Microwave to 28 or 38 GHz
  • Low Band Land Mobile to 30 MHz
  • AM Broadcast around 1.0 MHz
  • Exposure as Percentage of MPE Exposure as Percentage of MPE
  • How to read Site-Specific RF Compliance Guidelines
  • Tips on Using Personal Safety Monitors
  • Tips on using RF Protective Suits

RF Safety Regulations and Standards

  • Notice of Proposed Rulemaking dated June 6, 2003, proposing amendments to FCC rules governing Exposure to Radiofrequency Electromagnetic Fields, 47 CFR parts 1, 2, and 95.
  • FCC’s Office of Engineering Technology (OET) Bulletin 65, Evaluating Compliance with FCC Guidelines for Human Exposure to Radiofrequency Electromagnetic Fields.
  • FCC’s Docket File ET93-62, information on FCC Rules
  • FCC RF Exposure Regulations First Memorandum Opinion
  • FCC RF Exposure Regulations Second Memorandum Order and Opinion 97-303
  • NEPA, FCC and OSHA RF Compliance
  • The 1997 FCC Regulation, IEEE C95.1-2005/ANSI C95.1-1992
  • Standard
  • FCC RF/NEPA Rules
  • FCC RF Environmental Rules
  • OSHA RF Compliance
  • FCC RF Exposure Regulations overview
  • FCC Frequently Asked RF Exposure
  • Observe RF Exposure Guidelines The Electromagnetic Spectrum Non-Ionizing and Ionizing Radiation
  • Cumulative and Non-Cumulative Radiation
  • Effects FCC Rules and FCC OET Bulletin 65 FCC Rules and FCC OET Bulletin 65
  • Commission for Non-Ionizing Radiation Protection (ICNIRP)
  • Non-Ionizing Radiation Survey
  • PCS, cellular, SMR, paging, Part 15, WiFi, in-building
  • RF Compliance Documentation
  • Electromagnetic shielding
  • EME site audits, evaluations and reports
  • Site specific safety guidelines
  • Software modeling and analysis
  • Field survey and RF measurement
  • Safety policy evaluation and development
  • Complete exposure mitigation
  • RF Radiation (RFR) Safety
  • Non-Ionizing Radiation

RF Field Measurements for Antenna

  • Instrument Overview
  • Detector Designs
  • Effects and Definitions
  • Standards Overview
  • Antenna Designs and Calculations
  • Performing Surveys
  • Documenting a Survey
  • Units of Measure
  • Shaped Frequency Response Probes versus
  • Traditional Flat Frequency Response Probes
  • Measurement Uncertainty and
  • Correction Factors
  • Analog versus Digital Meters
  • Connecting and Zeroing the Probe
  • Checking Probe Functionality
  • Beginning to Make Measurements
  • Identifying High Level Areas First
  • Spatial Averaging Techniques
  • Using the Maximum Hold Feature
  • Impact of the Human Body on
  • Field Measurements
Jun
17
Mon
SysML Training | Systems Modeling Language Training @ Atlanta, GA
Jun 17 @ 9:00 am – Jun 19 @ 4:00 pm
Print Friendly, PDF & Email

Price: $2,199.00
Course Number: 11501
Length: 3 Days
College Credits: 24

SysML Training, SysML Course Description

SysML Training, SysML Course  by TONEX, – Systems Modeling Language Training Course,  is an extension to Systems Engineering Training providing a comprehensive and practical resource for modeling systems with SysML.

SysML Training

The Systems Modeling Language (SysML) is a visual modeling language useful for Systems Engineering applications supporting the specification, analysis, design, verification and validation of a broad range of systems and systems-of-systems (SoS).

These systems may include hardware, software, information, processes, personnel, and facilities. SysML is a dialect of UML 2, and is defined as a UML 2 Profile (Profile = UML customization that uses Stereotypes, Tagged Values, and Constraints.)
SysML is an enabling technology for Model-Based Systems Engineering (MBSE)

SysML for Systems Engineering includes Systems modelling, System Analysis and System Design as essential enabling techniques for systems engineering processes Systems Modeling Language (SysML) a subset of UML for Systems Engineering).

SysML Training Course provides technical details of SysM Las a systems engineering modeling language. The syntax of SysML is covered and each concept is explained through a number of hands-on practical application workshops and a complete SysML v1.3 Reference Guide.

Learn about:

  • UML and SysML
  • Model-based systems engineering (MBSE) approach
  • SysML diagrams and language
  • Look at SysML from the systems engineering process viewpoint
  • Develop a system conceptual model and architecture using SysML.
  • System architecture, modeling and design with SysML

The SysML training course covers the following:

  • Provides  a comprehensive overview of the SysML concepts, terminology and modeling notation
  • Shows attendees how to create analysis and design models with SysML
  • Covers the complete system-modeling lifecycle from requirements to Validation of the system
  • Presents many practical case studies
  • 50% lectures and 50 % practical (hands on exercises).

Learning Objectives

Upon completion of this course, the attendees will be able to:

  • Describe UML
  • Describe SysML
  • Describe model-based systems engineering approach
  • List SysML diagrams and language concepts
  • Apply SysML as part of a model based SE process
  • Explore transitioning to SysML
  • Synthesize and analyze existing architecting approaches to enhancing creativity while reducing ambiguity and complexity.
  • Utilize out-of-the-box holistic system thinking
  • Develop a system conceptual model and architecture using SysML.
  • Define system architecture, modeling, form, function, structure and behavior with SysML
  • Describe how a system’s function emerges from its form and behavior
  • Describe the notions of system, product, service, and project with SysML
  • Model a combined Project-Product Lifecycle Management system and study the benefits of the project-product synergies with SysML
  • Work with real life projects using SysML

Course Agenda

Overview of Systems Engineering (SE)

  • Systems Engineering Overview
  • Model-Based Systems Engineering
  • SysML Language Overview
  • SE Practices for Describing Systems
  • Specifications
  • Interface requirements
  • System design
  • Analysis & Trade-off
  • Test plans
  • Stakeholders Involved in System Acquisition

What is Model-based systems engineering (MBSE) ?

  • What is a model?
  • principles behind MBSE
  • Formalized application of modeling to support system requirements, design, analysis, verification and validation activities
  • SE Artifacts and transitions to MBSE
  • MBSE Across the
  • System Life Cycle Specifications
  • Interface requirements
  • System design
  • Analysis & Trade-off
  • Test plans
  • MBSE benefits
  • Modeling at multiple levels of the System
  • Operational model
  • System model
  • Component model
  • MBSE to support complex predictive and affects-based modeling
  • Relationship between SySML and MBE/MBSE

Overview of UML and SysML

  • Diagram Overview and Language Concepts
  • What is SysML?
  • UML for Systems Engineering R
  • SysML Diagram Taxonomy
  • A subset of UML with extensions
  • SysML as a UML Profile
  • Systems including hardware, software, data, personnel, procedures, and facilities
  • SysML in specification, analysis, design, verification, and validation of systems

Overview of System Modeling with SysML

  • Functional/Behavioral Model
  • Performance Model
  • System model
  • Structural/Component Model
  • Other Engineering Analysis Model
  • Model Based Systems Engineering Benefits
  • Shared understanding of system requirements and design
  • Assists in managing complex system development
  • Improved design quality

The Structure of an element or system

  • System
  • Hardware
  • Software
  • Data
  • Procedure
  • Facility
  • Person

SysML Diagram Techniques

  • Use Case
  • Requirement
  • Activity
  • Block Definition
  • Internal Block
  • Sequence
  • State Machine
  • Parametric
  • Package
  • Allocation Tables

SysML Modeling Elements

  • Allocations
  • Rationales
  • Diagram Frames
  • Model Views and Viewpoints
  • Problems

SysML Diagram Taxonomy

  • Behavioral Diagram
  • Activity Diagram
  • Sequence Diagram
  • State Machine Diagram
  • Use Case Diagram
  • Requirement Diagram
  • Structural Diagram
  • Block Definition Diagram
  • Internal Block Diagram
  • Package Diagram

Working with SysML

  • Structure: Definition and Use
  • Behavior: Interaction, State Machine and activity/functions
  • Requirements
  • Parametrics
  • SysML Diagram Frames
  • Package Diagram
  • Views
  • Internal Block Diagram
  • Allocations
  • Basic Structural elements

Workshops

  • Working with a SCADA System Modeling Example and Functional Analysis using SysML
  • Systems Engineering of a Sustainable Energy System Example Using SysML
  • Modeling MQ-8 Fire Scout Project using SysML
  • Structure and Concepts
    • The Requirement Diagram
    • Allocation
    • Block Diagrams
    • The Parametric Diagram
    • The Use Case Diagram
    • The Activity Diagram
    • The State Machine Diagram
    • Interaction Diagrams
    • General Modeling Elements
    • Actor Categories
    • Discipline-Specific Elements
    • Extended Requirement
    • Essential Activity
    • Domain Block
    • Weighted Requirement Relationships
    • Continuous and Secondary Use Cases
    • Stakeholders
    • Systems and Subsystems
    • System Context Elements
    • System Processes
    • SysML Language Architecture
    • Model with Packages
    • Structure with Blocks
    • Constraints with Parametrics
    • Flow-Based Behavior with Activities
    • Message-Based Behavior with Interactions
    • Event-Based Behavior with State Machines
    • Functionality with Use Cases
    • Cross-Cutting Relationships with Allocations

SysML Reference Guide

SysML Language Architecture

  • Design Principles
  • Architecture
  • Extension Mechanisms
  • SysML Diagrams

Structural Constructs

  • Model Elements
    • Overview
    • Diagram Elements
    • UML Extensions
    • Usage Examples
  • Blocks
    • Overview
    • Diagram Elements
    • UML Extensions
    • Diagram Extensions
    • Stereotypes
    • Model Libraries
    • Usage Examples
  • Ports and Flows
    • Standard Ports
    • Flow Ports
    • Item Flows
    • Diagram Elements
    • UML Extensions
  • Diagram Extensions
    • FlowPort
    • FlowProperty
    • FlowSpecification
    • ItemFlow
    • StandardPort
    • Stereotypes
    • Block
    • FlowDirection
    • FlowPort
    • FlowProperty
    • FlowSpecification
    • ItemFlow
  • Constraint Blocks
    • Overview
    • Diagram Elements
    • UML Extensions
    • Diagram Extensions
  • Stereotypes

 

Behavioral Constructs

  • Activities
  • Diagram Elements
  • UML Extensions
  • Interactions
  • Overview
  • Diagram Elements
  • State Machines
  • Use Cases

Crosscutting Constructs

  • Allocations
  • Requirements
  • Diagram Elements
  • Profiles & Model Libraries
Jun
24
Mon
MIL-STD-810G Training @ Tonex Atlanta
Jun 24 @ 9:00 am – Jun 26 @ 4:00 pm
Print Friendly, PDF & Email

MIL-STD-810G Training,  MIL-810G training, Military Standard 810G Testing Course, TEST METHOD STANDARD FOR ENVIRONMENTAL ENGINEERING CONSIDERATIONS AND LABORATORY TESTS

MIL-STD-810G Training course, MIL-810G training provides technical understanding and guidance about the objectives and application of MIL-STD-810G, environmental design and test considerations and standards.

MIL-STD-810G training covers materiel acquisition program planning and engineering direction for considering the influences that environmental stresses have on materiel throughout all phases of its service life.

TONEX’s MIL-STD-810G training does also recommends design or test specifications based on environmental processes resulting in realistic materiel designs and test methods (based on materiel system performance requirements)

MIL-STD-810G training covers all the tests, the required equipment to perform each test, along with  the methodology to apply.

MIL-810G Training Learning Objectives

Upon completion of MIL-810G training, the attendees will:

  • Describe the objectives of MIL-STD-810G
  • Explain the benefits of MIL-STD-810G standard
  • Describe the major MIL-STD-810G test cases
  • List types of vibration, shock and climatic tests
  • Tailor materiel item’s environmental design and test limits to the conditions
  • Establish laboratory test methods that replicate the effects of environments on materiel
  • Describe Sine and Random Vibration, classical waveform shock testing and drop testing
  • Explain procedures behind Shock Response Spectrum Testing
  • Describe and select equipment and instrumentation to perform each test
  • List climatic test requirements, origination, equipment required, test methodology and understanding of results

 Course Content

Introduction and Course Overview

  • Introduction, History and Scope of MIL-STD-810G –
  • Environmental Engineering Programs
  • Environmental Management
  • Engineering Tasks and Engineering Management
  • Guidance for Program Management and Environmental Tailoring
  • Environmental Test Procedures
  • Typical Format for Environmental Test Procedures
  • Testing methods’ Introduction and Limitations
  • History and Rationale
  • Effects of the Environment
  • Test Sequence and Procedures
  • Analysis of Results
  • Equipment Needed
  • Sinusoidal vs. random vibration testing systems
  • Testing specifications, standards and procedures.
  • Vibration and shock test fixture design, fabrication, experimental evaluation and usage
  • Shock measurement, shock response spectrum (SRS) and shock testing

General Program Guidelines

  • Roles and Guidelines
  • Tailoring Procedures
  • Program Managers
  • Operational Requirements Document (ORD)
  • System Engineering Management Plan (SEMP)
  • Test and Evaluation Master Plan (TEMP)
  • Environmental Engineering Specialists (EES)
  • Preparing an Environmental Engineering Management Plan (EEMP)
  • Developing an Environmental Test and Evaluation Master Plan (ETEMP)
  • Defining a Life Cycle Environmental Profile (LCEP)
  • Developing Operational Environment Documentation (OED)
  • Developing an Environmental Issues/Criteria List (EICL)
  • Preparing a Detailed Environmental Test Plan (DETP)
  • Preparing an Environmental Test Report (ETR)
  • Design and Test Engineers and Facility Operators
  • Roles of design engineers
  • Roles of test engineers/facility operators
  • Guidance for design and test engineers and test facility operators
  • Natural environment (field/fleet) testing
  • Laboratory testing
  • Classical sinusoidal vibration
  • Resonance effects
  • Acceleration & force measurement
  • Electrohydraulic shaker systems
  • Electrodynamic shaker systems
  • Sine vibration testing
  • Random vibration testing

MIL-STD-810G Testing Methods

  • Military Standard testing
  • Climatics
  • Climatic Conditions and Daily Cycles of Temperature, Solar Radiation, and Relative Humidity
  • Temperature testing
  • Temperature shock
  • Humidity
  • Altitude
  • Low Pressure (Altitude)
  • High Temperature
  • Low Temperature
  • Temperature Shock
  • Contamination by Fluids
  • Solar Radiation (Sunshine)
  • Rain
  • Humidity
  • Fungus
  • Salt Fog
  • Sand and Dust
  • Explosive Atmosphere
  • Immersion
  • Acceleration
  • Vibration
  • Acoustic Noise
  • Shock
  • Pyroshock
  • Acidic Atmosphere
  • Gunfire Shock
  • Temperature, Humidity, Vibration and Altitude
  • Icing/Freezing Rain
  • Ballistic Shock
  • Vibro-Acoustic/Temperature
  •  Freeze /Thaw
  • Time Waveform Replication
  • Rail Impact
  • Multi-Exciter Testing (MET)
  • Mechanical Vibrations of Shipboard Equipment

General Laboratory test Method Guidelines

  • Test Conditions
  • Tolerances for Test Conditions
  • Test Instrumentation
  • Suitability for environment
  • Calibration
  • Stabilizing Test Temperature
  • Test item operating
  • Test item non-operating
  • Test Sequence
  • Test Level Derivation
  • Test Setup
  • Test item operation
  • Interrupted Tests
  • In-tolerance interruptions
  • Out-of-tolerance interruptions
  • Interruption due to test item operation failure
  • Combined Tests
  • Post-test Data
  • Environmental Effects and Failure Criteria
  • Environmental Test Reports
  • Water Purity
  • Analysis of Results
  • Monitoring
  • Monitoring test chamber parameters
  • Monitoring the item under test
  • Total High Temperature Exposure Duration

Environmental Management and Engineering Tasks 

  • Task 401 – Environmental Engineering Management Plan (EEMP)
  • Task 402 – Life Cycle Environmental Profile (LCEP)
  • Task 403 – Operational Environment Documentation (OED)
  • Task 404 – Environmental Issues/Criteria List (EICL)
  • Task 405 – Detailed Environmental Test Plans (DETP)
  • Task 406 – Environmental Test Reports (ETR)
  • Detailed Program Management Guidance
  • Environmental Tailoring Guidelines for Environmental Engineering Specialists (EES)
  • C-1 Areas of occurrence of climatic categories A1, A2, & A3 C-5
  • C-2 Areas of occurrence of climatic categories B1, B2, & B3 C-6
  • C-3 Areas of occurrence of climatic categories C1, C2, & C3 C
  • C-1 Areas of occurrence of climatic categories A1, A2, & A3 C-5
  • C-2 Areas of occurrence of climatic categories B1, B2, & B3 C-6
  • C-3 Areas of occurrence of climatic categories C1, C2, & C3 C-7
Jul
15
Mon
Advanced Satellite Communications Systems Training | Advanced SATCOM Training @ Tonex Plano, TX
Jul 15 @ 9:00 am – Jul 17 @ 4:00 pm
Print Friendly, PDF & Email

Advanced Satellite Communications Systems Training, Advanced SATCOM Training

Advanced Satellite Communications Systems Training, Advanced SATCOM Training, is a 3-day comprehensive technical training covering all aspects of satellite technology, system survey,  systems engineering as applied to satellite communications, hardware, software, applications, digital communications and processing in modern satellite networks, IP convergence, optimization and management.

Participants will learn about the fundamentals of satellites, advanced planning, analysis, architecture and  design, reliability, ground control systems, earth stations, operation and maintenance, logistics of the satellite systems and their major segments and components. Participants will also gain practical understanding of the basic design, construction and usage of commercial satellite networks, satellite system functional architecture and more.

Image result for satellite communications

Learn about:

  • The current state-of-the-art satellite communications systems, segments, equipment and components
  • Advanced communications and network principles, topologies and architecture, IP technology and networking convergence,  Voice ad Video over IP over satellite
  • Communications link details and specifications
  • Best Design and Implementation Practices
  • Design Lessons Learned from Failures
  • Communication Link budget theory and system and component Design
  • Using Tools to analysis and design major components

Methods of Learning: The methods of learning consist of visual presentations on Advanced SATCOM, textbook, discussions, activities and involvement of all participants in practical exercises to demonstrate application of knowledge learned.

Who Should Attend

  • Analysts
  • Engineers and Technicians
  • Product support analysts
  • Project managers
  • Reliability managers and engineers
  • Supportability representatives
  • Technical managers
  • Product managers
  • Software developers
  • Testers

Highlights of Advanced SATCOM Training:

  • Satellite Communications Applications
  • Overview SATCOM Systems
  • Overview SATCOM Military and Commercial Systems
  • Overview of next-gen communications satellites, payloads, wideband payload and platform control assets, and earth terminals operations
  • Overview of next-gen battlespace communications
  • Satellite Systems Engineering and Economics
  • Satellite Orbits and Transponder
  • Differences between GEO, MEO, LEO and HEO communications systems, segments, and systems engineering
  • Role of IP Convergence in modern military and commercial satellite systems
  • Satellite Architecture: Broadcast, Mesh, Hub-Spoke, Point-to-Point
  • Multiple Access Techniques: FDMA, DAMA, TDMA, CDMA, OFDM, OFDMA, Random Access. and Bandwidth-on-Demand
  • Satellite RF and Microwave Engineering
  • Digital Modulation Techniques
  • Satellite Communications Link Budget Calculations
  • Emerging Technology Developments
  • Future SATCOM trends

Learning Objectives

Upon completion of the advanced SATCOM training, the participants will be able to:

  • Explain the basic principles and concepts of satellite systems
  • List related satellite communications standards and their benefits
  • List the key Satellite system features and their benefits
  • Discuss the rationale for advanced commercial and military satellite communications and key deployment topologies
  • Describe features supporting advanced commercial and military deployments
  • Describe the guidance on commercial and military satellite systems engineering
  • Illustrate satellite system analysis, architecture, design and implementation scenarios
  • Define needs, goals, objectives and ConOps for a Satellite mission to satisfy the requirements
  • Apply Model-based Systems Engineering (MBSE) to each phase of a Satellite project lifecycle
  • Avoid the pitfalls in designing satellite and ground resources
  • List benefits of phased arrays, cancellation and adaptive coding and modulation
  • Explore best design and implementation practices and lessons learned

Course Agenda

Fundamentals of Satellite Systems 

  • Basic Definitions
  • Satellite Core Elements and Functionality
  • Basic Characteristics of Satellites
  • Microwave Frequencies and Satellite Communications Bands
  • Commercial vs. Military and Defense Bands
  • Digital Transmission, Compression, and Routing
  • Satellite Integration with Terrestrial Wired and Wireless Networks
  • Satellite System Elements
  • Space Segment
  • Ground Segment
  • Gateways
  • Satellite Orbit Configurations
  • Geosynchronous Satellites
  • Medium Earth Orbit (MEO) and Lower Earth Orbit (LEO) satellite constellations
  • Frequency Spectrum Allocations
  • ITU-R Spectrum Allocations and Regions
  • VHF, UHF, SHF and EHF Frequency Ranges
  • Example Microwave Bands: L, S, C, X, and Ku
  • Millimeter Wave Bands: Ka-, Q-, and V-Bands
  • Guided and Unguided Optical Properties
  • Satellite and C4ISR
  • Systems and Sensors

Space Systems Engineering

  • Spacecraft Systems
  • The Space Environment
  • Fundamentals of Engineering Space Systems
  • Systems Engineering for Space
  • Applications of Space Systems Engineering
  • Small Satellite Development and Experimentation
  • Using MIL-STD-810G
  • Environmental Engineering Considerations and Laboratory Tests
  • Celestial Mechanics
  • Launching Vehicles
  • Attitude Determination and Control
  • Propulsion
  • Electrical Power Systems
  • Thermal Control
  • Spacecraft Mechanical Structures
  • On-board Data Handling
  • Telecommunication
  • Ground Segment and Control
  • Product Assurance and Reliability
  • Mechanisms
  • Hardware and Software Design
  • Telemetry
  • On-Board Data Handling
  • Electrical Power System
  • Communication
  • Attitude and Orbit Control System
  • Assembly, Integration and Verification
  • Operations and Testing

Satellite Communications Network Architecture

  • Features of Satellite Networks
  • Emerging Applications
  • Network Architectures, Technologies and Protocols
  • Satellite Communications Network Configuration
  • Satellite Shared and Dedicated Bandwidth Services
  • Voice, Data, and Video over Satellite
  • Circuit-Switched vs. Packet-Switched Services
  • Satellite Communications Network Design and Analysis
  • Satellite Network Architectural Considerations
  • Satellite Communications, TCP/IP and MPLS
  • IPv6 Features
  • Satellites and Links Reliability
  • Quality of Service (QoS) Features and Issues
  • Point-to-Multipoint (Broadcast) Networks
  • Multicasting and Video Distribution
  • Point-to-Point Networks
  • VSAT Networks
  • VPN Networks

Advanced Military Satellite Systems

  • Evolution of Satellite Communication
  • Military Satellite Communications
  • Satellite and Intelligence, Surveillance & Reconnaissance
  • Introduction to Satellite Tactical Data Operations
  • C4ISR & Remote Sensing
  • Full Motion Video (FMV) Exploitation
  • Imagery Intelligence (IMINT) Fundamentals
  • Intelligence Analysis & Fusion
  • Coding, Modulation, Spread Spectrum Techniques and Encryption
  • Types of Satellite Communications Capabilities and Limitations
  • Voice, Video, Data, IP, Software Defined Radios
  • Communications Planning
  • Network Topologies
  • Typical Scenarios and Environments
  • Antenna Characteristics
  • Antenna Planning Considerations
  • Missile Warning Satellite Systems
  • CubeSAT

Microwave Link Engineering 

  • Propagation on the Earth-Space Link
  • Basic Microwave Propagation
  • Environmental Effects of Higher Frequency Bands
  • Directional Properties of Antennas
  • Polarization (Linear and Circular)
  • Satellite Link Budget Calculations (Hands-on)
  • Propagation Losses
  • Transmitters and Receivers
  • Overall Link Quality
  • Link Margin
  • Noise and Interference
  • Carrier-to-Noise Ratio
  • Link Budget Analysis and Margin

Satellite RF Modeling, Simulation and Engineering

  • Modulation, Multiple Access, and Impairments
  • Digital Baseband Signals and Hierarchies
  • Error Detection and Correction
  • Digital Modulation
  • Frequency Shift Keying (FSK)
  • Phase Shift Keying (PSK)
  • Amplitude and Phase Shift Keying
  • QAM
  • Multiple Access Methods
  • FDMA, DAMA, TDMA, CDMA, WCDMA and OFDM/OFDMA
  • ALOHA Packet Multiple Access
  • Bandwidth Utilization in Multiple Access
  • Distortion and Impairments
  • Transponders
  • Intermodulation Impairment
  • Uplink and Downlink RF Interference
  • Transmit Effective Isotropic Radiated Power (EIRP)
  • Receive Gain-to-Noise Temperature Ratio (G/T)

Overview of Communications Spacecraft

  • Spacecraft and Repeater
  • Overall Payload Requirements
  • Bent-Pipe Transponder Filtering
  • Linearity
  • Analog Bent-Pipe Repeaters
  • Wideband Receiver
  • Solid-State Power Amplifiers
  • Transponder Gain Control and Linearization
  • Spacecraft Antennas
  • Horn Antennas
  • Reflector Antennas
  • Center-Fed Parabolic Reflectors
  • Offset-Fed Parabolic Reflectors 249
  • Satellite Antenna Patterns
  • Direct Radiating Array Antennas
  • Phased Array

Satellite Antenna System Engineering

  • Satellite communication antennas
  • Airborne terminals
  • Antenna controller
  • Earth Observation Applications
  • Gateways
  • Geo Gateway Systems
  • High Dynamic Systems Tracking
  • High-Rate Modems
  • High-speed modems
  • Ka-Band Gateways
  • Ka-band gateways va-13.5m va-91 ka-9.1m va-135 ka-13.5m
  • Low-profile, high-frequency radomes
  • Motion Systems for Ku- and C-band Applications
  • Motors and controllers
  • Panels and mechanical structures
  • Radio frequency transmit/receive electronics
  • Reflectors
  • Reliable and Precision Tracking
  • Remote Sensing Systems
  • Software systems
  • Telemetry
  • Tracking Antennas for LEO, MEO, and GEO from UHF to Ka-band

Satellite Link Budget Modeling and Calculation

  • Adjacent channel interference C/ACI
  • Adjacent satellite Interference C/ASI
  • Altitude
  • Antenna aperture
  • Antenna efficiency (or gain)
  • Antenna ground noise temperature
  • Antenna mispointing loss
  • Availability
  • Bit Error Rate (BER)
  • Coupling Loss
  • Cross polarization interference C/XPI
  • Forward error correction (FEC) code
  • Frequency
  • HPA intermodulation interference C/I
  • Information rate
  • Link availability
  • LNB noise temperature
  • Modulation
  • Overhead (% information rate)
  • Polarization
  • Rain-climatic zone
  • Rate
  • Required Overall Eb/No
  • Roll off factor
  • Satellite EIRP (saturation)
  • Satellite gain setting
  • Satellite longitude
  • Satellite receive G/T
  • Satellite saturation flux density SFD
  • Site latitude and longitude
  • System margin
  • Transponder bandwidth
  • Transponder input back-off (IBO)
  • Transponder intermodulation interference C/IM
  • Transponder output back-off (OBO)

Satellite Operations and Organization

  • Satellite Systems Engineering and Economics
  • Satellite Systems Engineering Principles
  • System Development Methodology
  • Spacecraft Mission and Bus Subsystems
  • Mission Summary
  • Spacecraft Configuration
  • Spacecraft Bus Subsystems
  • Earth Stations and Network Technology
  • Basic Earth Station Configuration
  • Performance Requirements
  • Radio Frequency Equipment
  • Intermediate Frequency and Baseband Equipment
  • Modulators, Demodulators, and Modems
  • Multiplexing and Packet Processing
  • Tail Links and Terrestrial Interface
  • Earth Station Facility Design
  • Major Classes of Earth Stations
  • Launch Vehicles and Services
  • The Launch Mission
  • Launch Technology and Systems
  • Typical Launch Vehicles
  • Launch Interfaces
  • The Satellite Control System
  • Intercommunication Networks
  • Network Operations
  • Space Segment Economics
  • Earth Station Economics
  • Analysis of Network Economics
  • Satellite Communications: Instant Infrastructure
  • Conclusions for the Next Generation
Jul
18
Thu
USB 3.0 Training | USB 3.2 Updates @ Tonex Palo Alto
Jul 18 @ 9:00 am – Jul 19 @ 4:00 pm
Print Friendly, PDF & Email

USB 3.0 Training by TONEX, USB 3.2 Updates

The third generation of USB increases transfer rates to 5.0Gbits/s (SuperSpeed) and is backward compatible with all earlier USB 1.1/2.0 Low-Speed, Full-Speed, and High-Speed peripherals and hubs.

USB 3.2 doubles the maximum speed of a USB connection to 20Gb/s.  A USB 3.0 connection runs at 5Gb/s, and slower connections were USB 2 or even USB 1.1.

USB 3.2  5Gb/s devices are now called “USB 3.2 Gen 1.” 10Gb/s USB devices will become “USB 3.2 Gen 2.” And all 20Gb/s devices will be  “USB 3.2 Gen 2×2.”

USB 3.2 means 5, 10, or 20Gbps.

Updates on USB 3.2

USB 32 doubles the maximum speed of a USB connection to 20Gb/s. A USB 3.0 connection tuns at 5Gb/s, and slower connections were USB 2 or even USB 1.1. The new 3.2 version  5Gb/s data rate was branded “SuperSpeed USB,” following USB 2’s 480Mb/s “High Speed” and USB 1.1’s 12Mb/s “Full Speed.”

5Gb/s devices are now called “USB 3.2 Gen 1.” 10Gb/s devices become “USB 3.2 Gen 2.” And 20Gb/s devices will be “USB 3.2 Gen 2×2.”

SuperSpeed USB brings significant performance enhancements to the USB standard. It will deliver 10x the data transfer rate of Hi-Speed USB, as well as improved power efficiency.

  • SuperSpeed USB 3.0 has a 5 Gbps signaling rate offering 10x performance increase over Hi-Speed USB.
  • SuperSpeed USB 3.0 is a Sync-N-Go technology that minimizes user wait-time.
  • SuperSpeed USB will provide Optimized Power Efficiency.No device polling and lower active and idle power requirements.
  • SuperSpeed USB 3.0 is backwards compatible with USB 2.0. Devices interoperate with USB 2.0 platforms. Hosts support USB 2.0 legacy devices.
  • SuperSpeed USB 3.0 significant enhancements in the areas of device and system power conservation, error handling, and data flow control.
  • SuperSpeed USB 3.0 bus instances replace the USB broadcast bus model with directed (unicast) packets
  • Dual-simplex signaling enables asynchronous device notifications and simplifies link partner communication used in link flow control, packet acknowledgement and retry, and power management transitions.
  • USB 3.2 Gen 1: originally known as USB 3.0, and previously renamed to USB 3.1 Gen 1. It’s the original USB 3.0 specification, and it can transfer data at up to 5Gbps.
  • USB 3.2 Gen 2: Previously known as USB 3.1, and then later as USB 3.1 Gen 2. It offers speeds at up to 10Gbps.
  • USB 3.2 Gen 2×2: formally known as USB 3.2, it’s the newest and fastest spec, promising speeds at up to 20Gbps (by using two lanes of 10Gbps at once).

USB 3.0 Training

Course Topics

  • Motivation behind USB 3.0, 3.1 and USB 3.2
  • USB 3.2 Overview
  • USB 3.2 System Description
  • USB 3.2 Gen 1: ‘SuperSpeed USB’
  • USB 3.2 Gen 2: ‘SuperSpeed USB 10Gbps’
  • USB 3.2 Gen 2×2: ‘SuperSpeed USB 20Gbps’
  • USB 3.2 Physical Interface
  • USB 3.2 Mechanical
  • USB 3.2 Power
  • USB 3.2 System Configuration
  • SuperSpeed End-To-End Protocols (Protocol Layer)
  • SuperSpeed Port-To-Port Protocols (Link-Level Protocols)
  • SuperSpeed Link Power Management
  • USB 3.2 Hubs
  • USB 3.2 Reset, Initialization, and Configuration
  • SuperSpeed Physical Layer Electrical
  • Introduction to eXtensible Host Controller Interface (xHCI)
  • Type A, USB-C
  • USB-C and Power Delivery (PD)
  • USB-C and PD Procedures, Roles and Negotiations
  • USB-PD Port
  • Power Delivery (PD) specification
  • handling higher power
  • Power Delivery at the 5V setting and is configurable up to 20V
  • Using a standard USB-C cable up to 60W
  • 100W using a designated EMCA cable.
  • Choosing the Right Charger
  • Universal Charging Solution
  • USB 3.2 certification testing
  • The USB Platform Interoperability Lab (PIL) for USB 3.2 Gen 2 product development.
  • USB 3.2 Electrical Compliance Test Specification
  • xHCI Interoperability Test Procedures
  • xHCI Backwards Compatibility Test Procedures
  • Link Test Specification
  • Cable and Connector Compliance
  • Electrical Compliance Test Specifications
  • The Electrical Compliance Test Specification for SuperSpeed USB 10 Gbps Rev. 1.0
Jul
22
Mon
DoDAF, UPDM and SysML Workshop | MBSE Using DoDAF, UPDM and SysML Workshop @ TONEX DC Office
Jul 22 @ 9:00 am – Jul 26 @ 4:00 pm
Print Friendly, PDF & Email

DoDAF, UPDM and SysML Workshop, A 5-Day Hands-on Training Course

DoDAF, UPDM  and SysML Workshop covers DoDAF 2, UPDM 2 and SysML  topics. It introduces migration of DoDAF 2.0 to UPDM 2.0 using Model-Based Systems Engineering (MBSE) with Systems Modeling Language (SysML), the OMG SysML, the industry standard for MBSE applications.

DoDAF, UPDM  and SysML Workshop: DoD Architecture Framework 2 (DoDAF 2), the Unified Profile for DoDAF/MODAF (UPDM) and Systems Modeling Language (SysML) Workshop provides participants with a solid foundation and tools for Integrating DoDAF, UPDM with SysML and UML on a DoD acquisition program applying Model-Based Systems Engineering (MBSE) principles and best practices including SysML the industry standard visual modeling language for systems engineering applications provided by OMG.

DoDAF, UPDM and SysML Workshop uses practical problems using DoDAF. UDDM and SysML viewpoints, artifacts and diagram types.

Learning Objectives

Upon completion of DoDAF, UPDM and SysML Workshop, participants are able to:

  • Learn about DoDAF 2, UPDM 2 and SysML
  • Give examples of integration of DoDAF 2, UPDM 2 and SysML and applicable use cases and scenarios
  • Differentiate between DoDAF, UPDM and SysML
  • Explain the role of DoDAF 2, UPDM 2 and SysML and integrating them with DoDAF-compliant system architectures, capabilities and acquisition
  • Specify specific characteristics of the capabilities and utilization of DoDAF, UPDM and SysML
  • Give examples of DoDAF, UPDM and SysML artifacts and full system lifecycle development
  • Work with compliant DoDAF, UPDM and SysML tools and processes
  • Distinguish among tools to integrate DoDAF, UPDM and SysML
  • Explore DoDAF-compliant system using DoDAF2-UML2-UPDM2 compliant tools and visual modeling tools supporting DoDAF 2, UPDM 2 and SysML
  • Finalize a simple acquisition case study with DoDAF 2, SysML and UPDM 2 modeling

Who Should Attend

DoDAF , UPDM  and SysML Workshop is recommended for Enterprise and Solution Architects, Software Architects and Engineers, Developers, Analysts, Systems Engineers, System Modelers, System Architects, Project Managers, and anyone else who is interested to learn about DoDAF 2, UPDM 2 and SysML integration.

Topics Covered

Motivation behind integration of DoDAF , UPDM  and SysML 

  • DoDAF, UPDM, SysML and UML on a DoD Acquisition Program
  • Model Based Systems Engineering and Systems Modeling Language (SysML)
  • Model Based Systems Engineering (MBSE) Overview
  • Architecting With Model Based  Systems Engineering (MBSE)
    and Systems Modeling Language
  • DoDAF 2 Viewpoints and Views
  • DoDAF Specific Features
  • DoDAF 2.0 viewpoints and views
  • All Views viewpoint
  • Capability viewpoint
  • Project viewpoint
  • Operational viewpoint
  • Data and Information viewpoint
  • Services viewpoint
  • Systems viewpoint
  • Representation of DoDAF/UPDM in Commercial Tools
  • Systems Engineering with SysML
  • System Design Model, Including Traceability to OpsCon
  • Stakeholder Requirements Definition
  • Requirements Analysis
  • Architetutal Design

Unified Profile for DoDAF and MODAF™ (UPDM™) Framework

  • UPDM Value Proposition
  • UPDM as a domain specific variant of SysML
  • UPDM capabilities for defense applications
  • Language Architecture, UPDM Profile
  • Core Principles
  • Representing Stereotype Constraints
  • UML Constraint Representation
  • Important Areas of the Architecture
  • Using UPDM Profile
  • DoDAF Class Library
  • UPDM L1
  • UPDM L1::UPDM L0
  • UPDM L1::UPDM L0::Core
  • UPDM L1::UPDM L0::Core::AllElements
  • UPDM L1::UPDM L0::Core::ExternalTypes
  • UPDM L1::UPDM L0::Core::OperationalElements
  • UPDM L1::UPDM L0::Core::ServiceElements
  • UPDM L1::UPDM L0::Core::StrategicElements
  • UPDM L1::UPDM L0::Core::SystemsElements
  • UPDM L1::UPDM L0::Core::TechnicalStandardsElements
  • UPDM L1::UPDM L0::DoDAF
  • UPDM L1::UPDM L0::DoDAF::AcquisitionElements
  • UPDM L1::UPDM L0::DoDAF::AllElements
  • UPDM L1::UPDM L0::DoDAF::OperationalElements
  • UPDM L1::UPDM L0::DoDAF::ServiceElements
  • UPDM L1::UPDM L0::DoDAF::StrategicElements
  • UPDM L1::UPDM L0::DoDAF::SystemElements
  • UPDM L1::UPDM L0::DoDAF::TechnicalStandardsElements
  • UPDM L1::UPDM L0::MODAF
  • UPDM L1::UPDM L0::MODAF::AcquisitionElements
  • UPDM L1::UPDM L0::MODAF::AllElements
  • UPDM L1::UPDM L0::MODAF::OperationalElements
  • UPDM L1::UPDM L0::MODAF::StrategicElements
  • UPDM L1::UPDM L0::MODAF::TechnicalStandardsElements
  • UPDM L1::UPDM L0::SwAF
  • UPDM Views (Profile)
  • UPDM Elements Traceability
  • Sample Problem

MBSE, DoDAF, UPDM and SysML

  • Systems Modeling Language (SysML) relationship to the DoD Architecture Framework (DoDAF) and the Unified Profile for DoDAF/MODAF (UPDM)
  • transition to DoDAF/UPDM with MBSE & SysML
    SysML Relationship to DoDAF and UPDM
  • DoDAF models map directly to the  SysML diagram types
    DoDAF matrix artifacts
  • SysML models
  • DoDAF Data Elements
    DoDAF MetaModel (DM2)
  • DoDAF data elements and the relationships among them
  • The Unified Profile for DoDAF/MODAF (UPDM) asa SysML profile
  • Tools to develop SysML models using DoDAF or MODAF terminology
  • UPDM Domain Metamodel (DMM) and UPDM elements
  • Relationships between DMM and UPDM
  • DoDAF/UPDM and SysML Integration using SPARX Enterprise Architect edition and MagicDraw edition
Aug
12
Mon
Antenna Training – Engineering, Theory, Analysis and Design @ Nashville, TN
Aug 12 @ 9:00 am – Aug 14 @ 4:00 pm
Print Friendly, PDF & Email

Why should you choose TONEX for your Antenna Training?

Antenna Training Course by TONEX covers all aspects of Engineering, Theory, Analysis and Design covers all the necessary topics related to antenna theory and antenna array theory.

Learn about a wide variety of antenna concepts and propagation topics. Antenna Training Course is both a theory course and a hands-on course where all the attendees will make their own antennas (TONEX will provide all the material and equipments for testing). Attendees will learn about the basic RF and antenna theory, propagation, antenna design technical considerations, antenna types and RF safety fundamentals.

In Antenna Training Course, the students will learn how to apply the leaned topics in practice. Antenna Training Course discusses electromagnetic radiation and antenna characteristics such as impedance, VSWR, radiation pattern, polarization, gain, and efficiency.

New topics includes smart antennas, Multiple Input Multiple Output (MIMO), Software Defined Radio (SDR), Cognitive Radio (CR), and fractal antennas, along with the latest applications in Wireless and Mobile communications along with Java animations, applets, and MATLAB features.

 

antenna training course

 

antenna Training

Learn the theory and practice of antenna engineering including the basic operation of antenna, antenna types, applications, and physical properties from basic to state-of-the-art.

Antenna training topics also include radomes, materials, modeling and simulation, and measurement techniques are discussed.  In addition, Antenna Training Course also provides the necessary tools for analyzing complex antennas and for designing new ones in the hands-on sessions. There is also a session on vector algebra, including gradient, divergence and curl operation.

Antenna Training covers spectrum of frequencies from 550 kHz to 550 GHz, including  VHF, UHF, and microwave regions: communications and radar, commercial, and military applications.

Course Book: Antenna Theory: Analysis and Design, 3rd Edition by Constantine A. Balanis (Arizona State Univ.)

antenna training

Learning Objectives

Upon completion of Antenna Engineering training course, the attendees will

  • Understand the basics theory behind antennas and antenna theory
  • Discuss the mathematical and physical background that is needed to understand electromagnetic radiation and antennas
  • Describe antenna radiation and antenna parameters
  • Master basic definitions of antenna including radiation, gain, bandwidth, directivity, efficiency, effective area, pattern, impedance, antenna noise temperature, and polarization of antennas for wireless communications
  • Understand the operation of a wide range of antenna types
  • Carry out planning, calculation and design of a wide range of antenna types
  • Select antenna types for specific applications and systems
  • Learn to measure antenna performance on a variety of antenna measurement facility types
  • Explore new antenna concepts such as smart antenna, Phased-Array, MIMO and MU-MIMO

Sep
19
Thu
SOW Writing Training | Statement of Work Training @ Tonex DC
Sep 19 @ 9:00 am – Sep 20 @ 4:00 pm
Print Friendly, PDF & Email

SOW Writing Training, Statement of Work Training

SOW Writing Training Course Description, Statement of Work Training

SOW writing training provides you with concepts, tools, approaches, and configuration of Statement of Work (SOW). Statement of Work is the basis of the correlation between buyers and sellers.

The sale of goods and services can only be implemented by competently generating the SOW document. SOW writing training is intended for hands-on usage by requirements developers, in-house SOW team people and other project managers and contract managers whose roles contained appropriately determining needs and converting them into quality contracts. It delivers the knowledge you need, comprising of fundamental contract management notions, to reliably develop and administer effective SOWs.

SOW writing training applies challenging team practices and scenarios that will take you across the process of building a strong statement of work. You will comprehend how the Master Agreement is related with the SOW. Then, you will become familiar with the evolution of the SOW, (needs, objectives, requirements) and, varying with your situation, how a Statement of Object (SOO) and/or a SOW outline should be prepared in the SOW. You also will learn about the poorly written and designed SOWs and/or parts of SOWs and re-writing them applying best practices and standards.

SOW Writing Training

Participants of this intensive, hands-on seminar will exercise to write each section of the SOW. Participants will also examine SOWs from a contractor’s view, the questions a contractor might have upon reading the SOW, and the inconsistencies that cause confusion. You will learn best practices for making sure your SOWs communicate to your intended readers in order to accomplish the best value for your acquisitions.

Learn About:

  • Acquisition Planning
  • Market Research
  • Performance Documents
  • Developing Statements of Work
  • Importance of Language
  • Developing Evaluation Factors
  • Quality Assurance Surveillance Plans
  • Performance Incentives
  • The value of SOW
  • The application of SOW
  • SOW construction
  • Writing SOW
  • Contract SOW vs a project SOW
  • Developing your own SOW style

SOW writing training is a hands-on course including group activities, templates, and hands-on workshop.

Audience

SOW writing training is a 2-day course designed for:

  • Federal employees
  • Contractors
  • PMP-certified project managers
  • IT project managers
  • Project coordinators
  • Project analysts
  • Project leaders
  • Senior project managers
  • Team leaders
  • Product managers
  • Program managers
  • Project sponsors
  • Project team members
  • All individuals who need to write a SOW

Training Objectives

Upon the completion of SOW writing training, the attendees are able to:

  • Recognize the usual mistakes of incorrect, confusing or misconstructed narratives
  • Use simple approaches and “best practice” methods that will secure high quality in their SOW documents
  • Identify what a “breach of contract” requires
  • Help others to evaluate SOWs for quality, clarity and unity
  • Use data on how the courts historically understand arguments in contract language based on long-standing rules
  • Identify the actual requirements
  • Choose a proper SOW type that fulfills the government requirements
  • Explain all features of the work to be performed in a way that will be comprehended
  • Write a clear SOW that will lead to responsive, competitive proposals
  • Assess the effect of a SOW on accomplishing best value across the acquisition process

Course Outline

Overview of SOW Writing

  • The contract fundamental components
  • Contract law concepts
  • Categories of contracts
  • Contracts potential risks
  • Managing conflicts
  • Contract guidelines
  • The goal of the SOW
  • Master contracts
  • Master agreement usual components
  • Master Agreement vs SOW
  • Differences in the view of the SOW between buyer and seller
  • SOW value
  • Relationship of the SOW to the solicitation
  • SOW process and results
  • Requirement description

The SOW Background

  • Identifying the needs from expectations
  • Empowering objectives into requirements
  • Background of the SOW
  • The Statement of Objective purpose
  • How the WBS (Work Breakout Structure) relates to requirements and the SOW
  • Getting ready for a SOW
  • SOW glossary
  • The SOW approaches
  • Goals in writing a SOW
  • How does a well-written SOW look like?

Describing the Work

  • Simplifying the work
  • Determining the necessary skills and resources
  • Analyzing risk
  • Identifying deliverables

Generating the Narrative

  • The questions to begin a SOW
  • Purpose of the SOW template
  • Issues related with poor writing and bad construction
  • Principals for writing the SOW
  • Quality Assurance across the Use of the Master list
  • The logic behind the SOW master list
  • The usage of the master list by the SOW writer

Signed SOW Modifications

  • Managing the contract
  • Monitoring modifications to the SOW
  • Positive SOW changes
  • Keeping issues and disputes under control
  • SOW tools
  • SOW outline
  • SOW template
  • General list for the SOW writer

Developing the SOW

  • Various forms of SOW
  • SOW style
  • Be to the point and clear
  • Writing tips

Dealing with Your SOW

  • SOW Effectiveness
  • How to react to the contractor questions
  • Managing the contract through the SOW

TONEX Case Study and Templates Samples

  • How to Write a Statement of Work
  • Human Capital
  • Operations Support
  • Organizational Support
  • Technology Solutions
  • Statements of Work Review

SOW Writing Workshop

  • How to Write a Statement of Work
  • What Makes Up a Statement of Work?
  • Introduction
  • Scope of Work
  • Overview of Tasks
  • Milestones
  • Deliverables
  • Schedule
  • Standards and Testing (Verification and Validation)
  • Define Success Criteria
  • Success KPIs
  • Requirements
  • Payments/Cost
  • Others
  • Closure
Oct
21
Mon
MIL-1553 Training | MIL-STD-1553 Training @ Tonex Plano
Oct 21 @ 9:00 am – Oct 22 @ 4:00 pm
Print Friendly, PDF & Email

MIL-1553 Training Course Description, Why choose TONEX for your MIL-1553 (MIL-STD-1553) Training?

MIL-1553 training course by TONEX covers key MIL-STD-1553 principles, features, protocol architecture, functional characteristics, technical components, design, operations, products, testing, cyber security and trends.  Learn about MIL-STD-1553, the high reliable and high available  communications standard used by NASA, DoD including: Air Force, Navy, Army, and Marine.

Systems engineer, project managers, system analysts, Electronic warfare systems engineer, avionics engineers, design engineers, software and hardware engineers, cyber security specialists, cyber war analysts, project managers and anyone else who wants t understand what MIL-STD-1553 is and how it works.

Learn about MIL-STD-1553 systems, analysis and design, architecture, protocols, applications and cyber security:

  • Understand how MIL-STD-1553 bus works and its applications in military avinoics
  • Physical properties of the MIL-STD-1553 bus
  • MIL-STD-1553  mechanical, electrical, and functional characteristics as a serial data bus
  • Keys design process steps of a MIL-STD-1553 system
  • MIL-STD-1553 protocols and data architecture
  • MIL-STD-1553 system overview and overview of architectural components such as:  Bus Controller (BC), Remote Terminal (RT) and Bus Monitor (BM)
  • MIL-STD-1553 development toolkit
  • MIL-STD-1553 implementation, testing, verification and validation
  • MIL-STD-1553 cyber security

MIL-1553 Training

MIL-STD-1553, MIL-STD-1553, or AS15531 is a military standard, Digital Time Division Command/Response Multiplex Data Bus, published by DoD that defines the mechanical, electrical and functional characteristics of a serial data bus. It features a dual redundant balanced line physical layer, a (differential) network interface, time division multiplexing, half-duplex command/response protocol and up to 31 remote terminals (devices).

MIL-STD-1773 is a version of MIL-STD-1553 using optical cabling.

MIL-1553 Training

Learning Objectives

Upon completion of this course, the attendees are be able to:

  • Understand MIL-STD-1553 protocol, architecture and functional characteristics
  • Explain the architecture of MIL-STD-1553
  • Sketch the logical and physical architecture of MIL-STD-1553
  • Describe MIL-STD-1553 mechanical, electrical and functional characteristics
  • Explain technical components, design, operations and, testing aspects of MIL-STD-1553
  • Explore
  • Describe the key cyber security concepts in MIl-STD-1553
  • List the requirements and capabilities of MIL-STD-1553 security
  • Explore vulnerabilities and weaknesses of MIL-STD-1553 applied to aircrafts and weapons

Audience

Managers, applications developers, integrators, sales and marketing professionals involved in managing, marketing, selling, developing, testing or integrating MIL-STD-1553 applications and systems.

Course Content

Introduction to MIL-STD-1553

  • MIL-STD-1553A
  • MIL-STD-1553B
  • Notice 1 and Notice 2
  • MIL-STD-1553 General Requirements
  • MIL-STD-1553 Standards updated by SAE.org

MIL-STD-1553 Data bus Overview

  • Multiplexing in MIL-STD-1553
  • MIL-STD-1553 Hardware Components
  • Terminal Operation
    • Data Bus Controller (BC)
    • Remote Terminal (RT)
    • Data Bus Monitor (BM)

MIL-STD-1553 Hardware Platforms

  • Hardware Characteristics
    • Data Bus Cable
    • Data Bus Coupling
    • Terminal I/O Characteristics
    • Redundant Data Bus Requirements

MIL-STD-1553 Protocol

Command word, mode codes, mode command formats, data word, status word, message error bit.

    • Message Formats
    • Command Word
    • Data Word
    • Mode Codes
    • Status Word
    • Errors

Connecting the Bus

  • Terminal Electrical Characteristics
    • MIL-STD-1553 Cabling
    • MIL-STD-1553 Coupling
    • Direct Coupling
    • Transformer Coupling
  • MIL-STD- System Design
  • Data Bus Topology and Redundancy
  • Data Bus Control and Partitioning
  • Bus Loading

MIL-STD-1553 System and Software Design

  • MIL-STD-1553 Systems Engineering Principals
  • MIL-STD-1553 Requirement Analysis
  • System and Software Design
  • Data Bus Topology and Control
  • Robustness, Partitioning & Redundancy
  • Bus Loading and Bus Controller Software
  • Synchronous and Timing

MIL-STD-1553 Testing Procedures

  • Testing and Verification
  • Test and Operating Requirements
  • Developmental Testing
  • Design Verification
  • Production Testing
  • Systems Integration Testing
  • Field & Operational Testing
  • Integration Issues

MIL-STD-1553 Databus Specification Interpretation

  • MIL-STD-1553 Products and Vendors
  • MIL-STD-1553 Interface Hardware and Software
  • Advanced MIL-STD-1553 UHF/VHF Radio
  • High-Speed MIL-STD-1760 for the aircraft/weapon interface
  • MIL-STD-1760C
  • MIL-STD-1394b, a military version of Firewire
  • Enhanced Performance MIL-STD-1553

Introduction to MIL-STD-1773

  • Media Components and Design
  • Testing
  • Installation and Maintenance
  • Enhancements and Optimization

MIL-STD-1553 Security

  • MIL-STD-1553 Network and System Security
  • Security Definitions
  • Equipment originating or terminating classified plain text language
  • Wirelines, equipment, and the interconnecting lines
  • wirelines, components, equipment, and systems
  • Encrypted or unclassified signals
  • lectrical circuits components, equipment, systems
  • Classified plain language data in electrical form
  • nvestigations and studies of compromising emanations
  • TEMPEST
  • System Security Policy
  • MIL-STD-1553 design (system, hardware, and software)
  • Operational, maintenance, and logistic
  • Security policy of the aircraft, ship, or system

MIL-STD-1553 Advanced Network System Security (Updated)

  • Cyber security and cyber war analysis of multiplex data bus networks to military aircraft systems, aircraft carriers and smart weapons
  • Classification of data across MIL-STD-1553
  • Maintenance of data security within this integrated MIL-1553-STD avionics system for both flight and ground operations
  • RED, BLACK, and RED/BLACK designation of MIL-STD-1553
  • TEMPEST tests, TEMPEST inspections and TEMPEST control plan
  • MIL-STD-1553 System Security Policy
  • MIL-STD-1553 System Security Architecture
  • Compromising emanations (i.e., TEMPEST)
  • Encryption and Ciphering
  • Trusted message routing and control across MIL-STD-1553 bus
  • All BLACK bus – No RED data or RED data processor
  • ALL RED bus
  • RED/BLACK Gateway
  • RED/BLACK Composite
  • TEMPEST Design
  • Hybrid MIL-STD-1553 and Link 16 Cyber Security Analysis
  • MIL-STD-1760B Interconnect Standard for Aircraft Stores
  • MIL-1553-B Signals in MIL-1760A/B
  • MIL-STD-1553 and MIL-1760 Analysis
  • Application of NACSIM-5100 and NACSIM-5112 for U.S. Military Systems
  • Encryption Designs
  • Cryptographic key management, coordination, distribution, and zeroize techniques, circuitry and software
  • Synchronization and timing protocols
  • Encryption alarm and alarm check techniques
  • Trusted Message Routing and Control Design
  • Store Station Utilizing Primary Signal Set
Nov
7
Thu
ARP-4761 Training | Safety Assessment Guidelines @ Tonex Dallas
Nov 7 @ 9:00 am – Nov 8 @ 4:00 pm
Print Friendly, PDF & Email

ARP-4761 Training, Guidelines and Methods for Conducting the Safety Assessment Process on Civil Airborne Systems and Equipment

ARP-4761 Training Course Description

ARP-4761 training provides you with the strategies and techniques to execute safety analysis. Such strategy is relevant with demonstrating compliance with certification criteria (14CFR/CS Parts 23 and 25, section 1309) and helping an organization to fulfill their own unique safety guidelines. The safety procedures explained are mainly relevant with civil avionic gear but the procedures and techniques might be used in several cases.

ARP-4761 training covers the standard data to perform the industry approved safety analysis including Functional Hazard Assessment (FHA), Preliminary System Safety Assessment (PSSA), and System Safety Assessment (SSA). We will discuss different safety evaluation techniques required to implement and perform the safety analysis. We also will teach you various safety evaluation techniques consisting of Fault Tree Analysis (FTA), Dependence Diagram (DD), Markov Analysis (MA), Failure Modes and Effect Analysis (FMEA) and Common Cause Analysis (CCA). CCA is comprised of Zonal Safety Analysis (ZSA), Particular Risks Analysis (PRA), and Common Mode Analysis (CMA).

ARP-4761 training

ARP-4761 training teaches you the Safety Assessment Process in avionic systems, as well as incorporating it with other execution procedures. We will discuss the essence of the Reliability Theory and its relevance to airborne systems, equipment specifications and that how they are applied during both the initial and final system safety assessment process.

ARP-4761 training course also considers each of the tools and techniques for performing the Safety Assessment Process, containing real-world scenarios for each of the fundamental methods. We will elaborate precisely how the regulatory structure works and how ARP-4761 fits in. We also explain how ARP-4761 corresponds to other standards for civil airborne systems and equipment, in particular with ARP-4754A.

ARP-4761 training course is mostly dedicated to the practical activities including labs, individual/group activities, and hands-on workshops.

Learn about:

  • The real basis and logic of safety analysis for civil avionic systems and parts
  • The systems safety evaluation associated with the general airplane or system development procedures
  • The safety analysis methods to provide the airplane or system safety analysis
  • The theory of reliability and its correlation to system safety
  • Functional Hazard Analysis (FHA)
  • Fault Tree Analysis (FTA)
  • Dependency Diagrams (DD)
  • Markov Analysis
  • Failure Modes and Effects Analysis (FMEA)
  • Common Cause Analysis (CCA)

Audience

ARP-4761 training is a 2-day course designed for:

  • Engineers and professionals
  • Safety officers and managers
  • Quality managers
  • Project engineers
  • Safety engineers
  • Software/hardware engineers
  • Quality assurance or certification personnel

Training Objectives

Upon the completion of ARP-4761 training, the attendees are able to:

  • Recognize several safety analysis techniques
  • Relate the main participants of ARP-4761 FHA, PSSA, SSA, FTA, DD, MA, CCA
  • Recognize the use of safety methods
  • Determine the communication among the safety procedures and the development procedures
  • Use several safety tools in implementation of a PSSA or SSA
  • Analyze potential methods for presence in ARP-4761
  • Comprehend the procedures necessary for the development of civil aerial systems and technology
  • Deliver comprehensive goals that must be fulfilled by the systems development procedure
  • Explain the overall rules and that how they are used to identify DALs
  • Employ the verification and validation methods as part of the system development procedure
  • Employ the new standard material inside their own organizational framework
  • Describe the avionic systems development procedure and its association with the safety analysis procedure
  • Determine the main avionic systems development procedures and their interrelationships

Course Outline

Overview of ARP-4761

  • ARP-4761 description
  • Terminology
  • History and background
  • Methods and tools
  • Best practices
  • Life cycle
  • System Safety Assessment Process
  • Faults, Errors, and Failures
  • Basic definitions
  • Development & certification process

Model-Based Safety Analysis Process

  • Model-based development
  • Model-based safety assessment
  • Nominal system modeling
    • Validating consequent safety criteria
    • Fault modeling
    • Model extension
    • Safety assessment simulation
    • Proofs of safety specifications
    • Fault trees

ARP-4761 Methods

  • Functional Hazard Assessment (FHA)
  • Preliminary System Safety Analysis (PSSA)
  • Fault Tree Analysis (FTA)
  • Dependency Diagram (DD)
  • Markov Analysis (MA)
  • Failure Modes & Effects Analysis (FMEA)
  • Common Cause Analysis (CCA)
  • Particular Risks Analysis (PRA)
  • Zonal Safety Analysis (ZSA)
  • Common Mode Analysis (CMA)
  • System Safety Analysis (SSA)

Safety Life Cycle

  • Executing the aircraft level FHA while developing the aircraft level criteria
  • Implementing the system level FHA along with with distribution of aircraft operations to system operations, and begin the CCA
  • Conducting the PSSA align with system structure development, and renew the CCA
  • Repeating the CCA and PSSA as the system is apportioned into hardware and software elements
  • Conducting the SSA in line with system execution, and completing the CCA
  • Supplying the outcomes of the previous steps into the certification process

Development Assurance Levels

  • Level A
    • Extremely Improbable
  • Level B
    • Extremely Remote
  • Level C
    • Remote
  • Level D
    • Reasonably Probable, frequent

TONEX Workshop Sample: The Wheel Brake System

The Wheel Brake System is installed on the two primary landing tools. Braking on the major apparatus wheels is applied to give support to safe impedance of the airplane during the taxi and landing phases, and also in the case of a rejected take-off. A secondary role of the wheel brake system is to stop the main gear wheel rotation upon gear withdrawal.

Such braking system can be conducted both commanded manually, via brake pedals, or automatically (auto-brake) with no need for pedal use. The auto-brake operation helps the pilot to pre-equip the braking rate before takeoff or landing. When the wheels have traction, the auto-brake operation will regulate the pressure necessary for brake to smooth the deceleration.

Based on the ARP-4761 guideline, discuss:

  • Nominal system modeling
    • Braking System Control Unit (BSCU)
    • Hydraulic pressure pumps
    • Isolation valves
    • Selector valve
    • Accumulator valve
    • Meter valves
  • Validating the derived safety criteria
  • Fault modeling and extension
    • Digital fault modeling
    • Mechanical fault modeling
    • Fault modeling and extension issues
  • Official safety assessment
    • Fault tolerance verification via model-checkers
    • Official safety assessment issues
    • Projected method for fault tree initiation by PVS
Nov
12
Tue
Telecom Pricing, Cost Analysis, Fraud and Audit Workshop @ Tonex Plano, TX
Nov 12 @ 9:00 am – Nov 15 @ 4:00 pm
Print Friendly, PDF & Email

Telecom Pricing, Cost Analysis, Fraud and Audit Workshop

Telecom Pricing, Cost Analysis, Fraud and Audit Workshop is a 4 day special program covering he key concepts of practical telecom pricing, cost, financial analysis, fraud, audit and management. Participants will learn to perform price and cost analysis, financial modeling, fraud detection and prevention, and audit to determine price reasonableness in accordance with telecom authorities. This course is designed for personnel involved in establishing or modifying the price or cost of telecom services and products.

Who Should Attend?

Telecom financial analysts, cost accountants, cost analysts, budget analysts, systems analysts, auditors, fraud specialists, accounting managers, and financial planners.

Learning Objectives

Upon completion of this workshop, the participant will:

  • List financial terminology applied to telecom service providers
  • Explain telecom operators’ cost, financial and pricing models, fraud and audit principles
  • Determine how cost analysis shall be used and applied
  • Explain telecom financial analysis and performance measurement
  • Describe the role of telecommunications regulatory authorities, operating companies applied to cost and price Analysis
  • List telecom price and cost ratio analysis techniques
  • Describe best practices for telecom budgeting and forecasting
  • Summarize telecom project analysis and evaluation
  • List telecom cost and pricing Key performance indicators (KPIs)
  • Evaluate effective telecom financial management and cost control
  • Calculate new telecom service and product ROI
  • List cost related labor and support services
  • Negotiate telecom service cost analysis, financial techniques and contract audit
  • Calculate a telecom cost objective and a price/cost objective
  • List steps in financial analysis and modeling for project planning processes and financial projections
  • Review proven financial analytical tools and understand how and when to use them
  • Describe techniques to improve your organization’s profit picture by making sound business decisions
  • Determine pre-negotiation position applied to different stakeholders using cost and financial calculations
  • Use best practices in budgeting, forecasting, project evaluation and analysis
  • Master the processes of telecom pricing, financial management and cost
  • Control and strategies for telecom tariffing and estimation of cost of network services
  • Describe financial analysis and modeling for services. infrastructure, network operations, IT, legal, competition, sales and marketing
  • Suggest modifications to telecom price or cost to assure reasonableness
  • Describe fraud detection and prevention principles
  • Review telecom audit guidelines

Workshop Topics and Sessions

  • Fundamentals of Telecom Cost and Pricing
  • Fundamentals of Telecom Financial Analysis
  • Introduction to Telecom Cost Analysis
  • Applying Price-Related Factors to Telecom Products and Services
  • Advanced Techniques for Telecom Budgeting, Cost and Price Analysis
  • Advanced Telecom Cost Modeling, Pricing and Financial Analysis – Methodologies
  • Telecom Fraud
  • The Evolution of Fraud
  • Subscription Fraud
  • Internal Fraud
  • Partnership and B2B Fraud
  • Fixed Network Fraud
  • Mobile Network Fraud
  • Prepaid Fraud
  • Roaming Fraud
  • IP Fraud
  • Fraud Detection and Prevention
  • Data Mining, AI and Deep Learning Applied to Fraud Detection and Prevention
  • Telecom Accounting and Auditing Review
  • Financial Statements
  • Business Processes and Accounting
  • Technology and Accounting Audit processes
  • Telecom Auditing & Optimization
  • Voice, video and Data Service Adult
  • Analyze Telecom Usage
  • Customer Service Records (CSRs)
  • Call details records (CDRs)
  • Telecom Service Verification Workshop
Dec
9
Mon
Link 16 Training | Courses | Tactical Data Link Training @ Tonex DC Office
Dec 9 @ 9:00 am – Dec 11 @ 4:00 pm
Print Friendly, PDF & Email

Link 16 and Tactical Digital Information Links (TADIL) Training Courses

Link 16 Training ,is a 3-day technical and operational program covers Link 16 AKA as TADIL-J or Joint Tactical Information Distribution System. (J messages are the key to Link 16 TDL information exchange capabilities)

TONEX is an internationally recognized training company that  delivers customized Link 16 training solutions to DoD, NATO and defense contractors. By choosing Tonex for your Link 16 training courses, you can expect that all the information learned in class is accurate, relevant and up to date. Our Link 16 courses are designed by Link 16 experts in the field, and this allows our workshops to excel in certain topics that only professionals in the field would understand.

Next Public Training Session

December 9, 2019 @ 9:00 am – December 11, 2019 @ 4:00 pm
Tonex Location in Washington, DC
1025 Connecticut Ave, NW Suite 1000
Washington, DC 20036

 

We continually update our reading materials, teaching techniques and course offerings to reflect the latest trends in technology. Instead of following the trends, we stay ahead of them to be a frontrunner in the industry. Our Link 16 training courses follow a specific format that includes the overview, the body of the class and the conclusion, which wraps up with Tonex and industry certifications. Our Link 16 training courses are flexible enough that they can be modified to fit the needs of your business so that your employees can focus on the core values of your organization. Browse our catalog of workshops or contact a Tonex representative to find the best boot camps to advance your career. Link 16 Training crash course, Bootcamp style starts with an introduction to Tactical Data Links and covers concepts behind Network Centric Operations (NCO), Link 16  planning, network design, network management, operations and maintenance, and troubleshooting are discussed.

link 16 training<img class=”aligncenter size-full wp-image-11816″ src=”https://cdn.shortpixel.ai/client/q_glossy,ret_img,w_700,h_450/https://tonex.wpenginepowered.com/wp-content/uploads/link-16-training-course.jpg” alt=”link 16 training” width=”700″ height=”450″ srcset=”https://cdn.shortpixel.ai/client/q_glossy,ret_img,w_700/https://tonex.wpenginepowered.com/wp-content/uploads/link-16-training-course.jpg 700w, https://cdn.shortpixel.ai/client/q_glossy,ret_img,w_300/https://tonex.wpenginepowered.com/wp-content/uploads/link-16-training-course-300×193.jpg 300w, https://cdn.shortpixel.ai/client/q_glossy,ret_img,w_640/https://tonex.wpenginepowered.com/wp-content/uploads/link-16-training-course-640×411.jpg 640w” sizes=”(max-width: 700px) 100vw, 700px” /> Link 16 Training, TONEX is the world’s premier provider in Tactical Data Link (TDL) Courses including  TDL Crah Course, Link 4A, Link 11 , Link 16 , Link 16 Cybersecurity, Link 22, VMF, JREAP, SADL, IFDL, MADL, EPLRS, CDL, CEC, MDL, and TTNT .  TONEX is specialized in  specializes Tactical Data Link Training Courses including Link 11, Link 16, Link 22, SADL/EPLRS, VMF and JREAP. For  4-days Tactical Data Link Training Crash Course, TDL Training Bootcamp CLICK HERE Tactical Data Link Training Courses including Link 16  Training Crash Course provides the concepts behind Link 16 tactical data Link system/ JTIDS / MIDS architecture, installation, integration, data processing and operation.

COURSE NAMELENGTH
Advanced Link 16 Training3 days
Joint Range Extension Applications Protocol Training | JREAP Training Bootcamp4 days
Link 16 Advanced Training | Network Enabled Weapons Bootcamp4 days
Link 16 and MIDS Training Bootcamp5 days
Link 16 Cybersecurity Crash Course4 days
Link 16 Systems Engineering Training Course3 days
Link 16 Training for Managers3 days
Link 16 Training | Courses | Tactical Data Link Training3 days
Tactical Data Link Training Crash Course | TDL Training Bootcamp4 days
Tactical Data Links (TDL) Testing Training Bootcamp4 days
Variable Message Format (VMF) Training Bootcamp4 days

  Link 16 Training<img class=”alignnone size-full wp-image-2786″ src=”https://cdn.shortpixel.ai/client/q_glossy,ret_img,w_197,h_154/https://tonex.wpenginepowered.com/wp-content/uploads/link-16.gif” alt=”Link 16 Training” width=”197″ height=”154″ />

 

Link 16 Training Learning Objectives:

Upon completing of this course, the student will:

  • Discuss Tactical Digital Information Link (TADIL)
  • Understand the key concepts behind Link 16 / JTIDS / MIDS
  • List LINK 16/ JTIDS / MIDS Principals and Features
  • Explore Link 16 / JTIDS / MIDS and JTRS architectures
  • Discuss Link 16 system characteristics
  • Explore network architecture, services, elements, protocols to support services
  • Identify the role of key network nodes, interfaces, protocols, control and related protocols
  • Discuss similarities and differences between Link 4A, Link 11, Link 22, Joint Range Extension Applications Protocol (JREAP), Variable Message Format (VMF), Fifth Generation Aircraft Systems, Interim JTIDS/MIDS Message Specification (IJMS), Situational Awareness Data Link (SADL), Enhanced Position Location Reporting System (EPLRS), Inter/Intra Flight Data Link (IFDL), Multifunction Advanced Data Link (MADL), NATO STANAG standards, CDL (Common Data Link), MDL (Multipurpose Data Link), CEC (Cooperative Engagement Capability),  Tactical Targeting Network Technology (TTNT)
  • Discuss TDMA and CDMA and access mode
  • Describe Network Participation Groups (NGP) and J-Series Messages
  • Discuss various Link 16 terminals and message packing and pulses
  • Understand similarities and differences between Link 16 Networks and Nets
  • Describe Link 16 Network Access Modes, Network Time, Network Time Reference (NTR) and Terminal Synchronization
  • Understand Link 16 Network Roles, Relays and  Pulse Deconfliction
  • Calculate Link 16 capacity and Time Slot Duty Factor (TSDF)
  • Discuss Communications Security and Link 16 Cyber Security
  • Describe Link 16 MSEC/TSEC methods
  • Discuss JTIDS / MIDS Network Planning and Design
  • Discuss JTIDS / MIDS Management, Operation and Troubleshooting and Monitoring
  • Understand the role of Joint Range Extension Applications Protocol (JREAP)
  • Discuss Link 16 Network Enable Weapons
  • Discuss Link 16 troubleshooting techniques and procedures

Link 16 Training Courses<img class=”alignnone size-full wp-image-2787″ src=”https://cdn.shortpixel.ai/client/q_glossy,ret_img,w_320,h_209/https://tonex.wpenginepowered.com/wp-content/uploads/Link-16-training.jpg” alt=”Link 16 Training Courses” width=”320″ height=”209″ srcset=”https://cdn.shortpixel.ai/client/q_glossy,ret_img,w_320/https://tonex.wpenginepowered.com/wp-content/uploads/Link-16-training.jpg 320w, https://cdn.shortpixel.ai/client/q_glossy,ret_img,w_300/https://tonex.wpenginepowered.com/wp-content/uploads/Link-16-training-300×195.jpg 300w” sizes=”(max-width: 320px) 100vw, 320px” />

Course Outline (Link 16; 3-days)

Overview of Tactical Digital Information Link (TADIL)

  • What is TADIL?
  • TADIL Capabilities
  • Basic principles and purpose
  • Platforms and Development
  • Joint Tactical Information Distribution System (JTIDS)
  • Surveillance Control Data Link (SCDL)
  • Ground Station Modules (GSMs)
  • Joint Tactical Data Link Management Plan (JTDLMP)
  • Tactical data link for command, control, and intelligence
  • Link 4A
  • TADIL A/B [Link-11]
  • Link 16 as the prime data link for U.S. and NATO forces
  • TADIL C [Link-4A]
  • Conventional Link Eleven Waveform (CLEW)
  • Single Tone Link Eleven Waveform (SLEW)
  • Link 22 to replace Link 11 and to complement Link 16
  • Secure digital radio link in HF and UHF band
  • Joint Range Extension Applications Protocol (JREAP)
  • Variable Message Format (VMF)
  • Fifth Generation Aircraft Systems
  • Interim JTIDS/MIDS Message Specification (IJMS)
  • Situational Awareness Data Link (SADL)
  • Enhanced Position Location Reporting System (EPLRS)
  • Inter/Intra Flight Data Link (IFDL)
  • Multifunction Advanced Data Link (MADL)
  • NATO STANAG standards
  • CDL (Common Data Link)
  • MDL (Multipurpose Data Link)
  • CEC (Cooperative Engagement Capability)
  • Tactical Targeting Network Technology (TTNT)

Overview of TADIL J (Link-16)/JTIDS/MIDS

  • Basic Link 16 principles and purpose
  • Link 16 capabilities
  • Link 16 protocol vs. terminals
  • MIL-STD-6016 – Tactical Data Link (TDL) 16 Message Standard
  • STANAG 5516 – Tactical Data Exchange – Link 16
  • MIDS System Segment Specification (SSS)
  • MIDS System Segment – Interface Control Document (Hardware ICD)
  • MIL-STD-6016E: Tactical Data Link (TDL) 16 Message Standard
  • Overview of  or Satellite TADIL J (S-TADIL J)
  • Real-time Beyond Line-of-Sight (BLOS)

Overview of Link 16 System Architecture, Protocols and Components 

  • Overview of Link 16 Operations
  • Link 16 Architecture
  • Link 16 Network Time and Network Roles
  • Link 16 Terminal Navigation and Network Relays
  • Link 16 Terminals and Platforms/Capabilities
  • Link 16 Configurations / Maintenance
  • Link 16 Data Terminals
  • Voice Transmission and Reception over Link 16
  • Principles of Multiple Access in Link 16
  • TDMA Principles in the Link 16
  • Link 16 Frequencies and Time Slots
  • Link 16 Interference Protection Features
  • Time Slot Duty Factor (TDSF)
  • Participation Groups
  • Network Operations, Roles and Responsibilities
  • Precise Participant Location and Identification (PLLI)
  • Link 16 Security
  • Multinetting
  • Range Extension Techniques

Purpose of Tactical Digital Information and Link 16 Systems

  • Purpose and Description
  • Data Link Advantages
  • Link 16 for anti-jam (AJ), secure, data and voice system
  • Standard waveforms and messages to promote interoperability
  • Joint Tactical Information Distribution System (JTIDS) and Multifunctional Information
  • Distribution System (MIDS)
  • Architecture and Network Design
  • Link 16 Parameters
  • Pulse Deconfliction
  • Frequency Assignments
  • Architecture Examples
  • Time Slot Blocks (TSBs)
  • Message Construction
  • Net synchronization
  • Frequencies and Interference Protection Feature (IPF)
  • Range Extension by Relay
  • Time Slot Reallocation (TSR)
  • Precise Participant Location and Identification (PPLI)
  • Link-16 Enhance Throughput (LET)
  • VMF Message Catalog
  • Video on Link-16

LINK-16 Capabilities

  • LINK-16 Basic Capabilities
  • Tactical Data Link 16
  • Link 16 Architecture
  • Link 16 System Operation
  • Waveform
  • Time Slots
  • Exchange real-time tactical data
  • Architecture
  • Time Division Multiple Access (TDMA)
  • Synchronization
  • Acquisition & maintenance of system time
  • Network
  • Time Slot
  • Link 16 Division of Network Time
  • Epochs, Frames and Timeslots
  • Network Participation Groups (NPG)
  • Terminal variations
  • Class I, Class II, MIDS (LVT-1, LVT-2, LVT-3)
  • Host platform integration requirements
  • Link 16 Messages
  • Link 16 Security

Principles and Features of Link 16 Systems and Terminals

  • Link 16 System Characteristics
  • Air/Ground Situational Awareness
  • Link 16 Architecture
  • LINK 16 Features
  • LINK 16 Functions
  • Fully Functional Link 16 Terminal
  • MIDS LVT-1 (Ethernet)
  • MIDS LVT-2 (Ethernet)
  • MIDS LVT-2 (X.25)
  • MIDS LVT-11 IP
  • MIDS LVT-3 (1553)
  • USN E-2 (1553)
  • USAF E-8 (1553)
  • USAF F-15 (1553)
  • USAF MCE (1553)
  • USMC MCE (1553)
  • US Army 2M (X.25)
  • LINK 16 Terminals
  • Multifunctional information distribution system (MIDS) fighter data link
  • Low Volume Terminals (LVT)
  • Terminal Options: MIDS terminals, Class 2 terminals
  • MIDS Low-Volume Terminals (LVTs)
  • The MIDS-LVT (1) Family
  • LVT (1) TACAN Tactical Air Navigation System, and Voice
  • LVT (4) Voice, but eliminates TACAN
  • LVT (6) provides TACAN no Voice
  • LVT (7) bare-bones model, no TACAN or Voice
  • MIDS LVT (2) family ground terminal
  • Handheld Link 16 Radio, BATS-D
  • Handheld Form Factor

Overview of NPGs

  • Network Participation Group (NPG)
  • 1 Initial Entry
  • 2/3 RTT-A/RTT-B
  • 4 Network Management
  • 5/6 PPLI and Status
  • 7 Surveillance
  • 8 Mission Management/ Weapons Coordination
  • 9 Control
  • 11 Image Transfer
  • 12/13 Voice A/B
  • 18 Network Enabled Weapons
  • 19/20 Fighter-to-Fighter A&B
  • 21 Engagement Coordination
  • 27 Joint Net PPLI
  • 28 Distributed Network Management

Example of LINK 16 Messages (J Series)

  • Network Management
  • Precise Participant Location and Identification (PPLI)
  • Surveillance
  • Intelligence
  • Weapons Coordination and Management (Network Enables Weapons AKA NEW)
  • Control
  • Platform and System Status
  • Electronic Warfare (EW)

LINK 16 Network Management Operational Scenarios

  • LINK 16 Architecture and Management
  • LINK 16 Troubleshooting and Monitoring
  • LINK 16 Network Planning and Design
  • LINK 16 Operation and Troubleshooting and Monitoring
  • Related J series messages

Link 16 Network Enabled Weapon (NEW)

  • Introduction to Link 16 Network Enable Weapons
  • Net Enabled Weapons  supporting  missions Use Cases
  • Network Enabled Weapons (NEW) Architecture
  • Network Enabled Weapon Messages (J11.X)
  • NEW Implementation Requirements
  • In-Flight Target Updates (IFTUs)
  • Targeting and engagement of Moving Targets
  • In-flight Retargeting/Reallocation
  • In-flight Abort
  • Sensor to Weapon 3PS Targeting (S2W 3PS)
  • Weapon to Weapon Coordination (Cooperative Attack)

Satellite TADILS

  • GEO  vs. LEO
  • Link-11 via satellite
  • Satellite TADIL-J (STJ)
  • Multicast TADIL-J (MTJ)

Structured Link 16 Troubleshooting Approaches

  • Isolate and solve Link 16 network, terminals and design problems
  • Root Cause Analysis Techniques applied to Link 16
  • TONEX Link 16 DFMEA and PFMEA processes and templates
  • Systematic elimination of hypothetical causes
  • Narrowing down on the possible causes
  • The top-down approach
  • The bottom-up approach
  • The spot-the-differences approach
  • The move-the-problem approach
  • Failure at Upper Link 16 Layers
  • Application Layer Failure
  • Failure at Lower Link 16 Layers
  • Failure at network topology
  • Failure at security keys
  • The Divide-and-Conquer Troubleshooting Approach
  • Follow-the-Path Troubleshooting Approach
  • The Compare-Configurations Troubleshooting Approach
  • The Swap-Components Troubleshooting Approach

Link 16 Troubleshooting Procedures

  • Link 16 Verification and Validation Plans
  • Testing, Simulation and Analysis Techniques
  • Verification of Link 16 initial and mission plans
  • Testing Link 16 Hardware Platforms and Software Features
  • Link 16 Network Design Verification
  • Testing Link 16 RF Capabilities
  • Synchronization testing
  • Testing Link 16 Features
  • Testing C2 to C2 Battle Management
  • Testing C2 to Fighter mission assignments
  • Testing Fighter to Fighter information exchange
  • Testing Imagery and Voice communications
  • Testing Network Enable Weapons

TONEX Link 16 Verification and Validation (V&V) Plans and Procedures

  • Link 16 Network Integrity V&V
  • Link 16 NPG Status V&V
  • Cryptonet V&V
  • Frequency Planning and Management V&V
  • Time Slot Duty Factor (TSDF) Tests
  • OPTASK Link V&V
  • Multi-Link Network V&V
  • Roles / Responsibilities V&V

oint Range Extension Applications Protocol (JREAP)

  • What is JREAP?
  • Tactical data over digital media and networks
  • JREAP/TADIL Testing/Simulation
  • JREAP Application Block
  • Joint Range Extension (JRE) Gateway
  • JREAP A – UHF DAMA
  • JREAP B – Serial
  • JREAP C – Ethernet

Link 16 Training covers all aspects of tactical data links  employed by the U.S Navy, the Joint Services, NATO and Japan.  Link 16 / JTIDS / MIDS training course covers all aspects of Link 16 / JTIDS (Joint Tactical Information Distribution System)/ MIDS (Multifunctional Information Distribution System).

Other Special Training Services

TONEX provides customized training to meet specific mission  and technology implementation goals Including:

  • SADL/EPLRS Fundamentals
  • VMF Fundamentals
  • JREAP Fundamentals
  • SATCOM Fundamentals
  • Combat Modeling and Simulation Fundamentals
  • Mission Planning Workshop
  • Platform specific: Operator and Maintenance
  • MIDS Terminal Fundamentals
  • COMSEC Workshop
  • Battlespace Technologies
  • Link 16 OPTASK Link Workshop
  • Advanced Link 16 Workshop
  • Link 16 Network Planning, Design, and Management
  • Tactical Data Link (TDL) RF Workshop
  • TDL Verification and Validation Workshop
  • Military EMC/EMI Workshop
  • Battlespace and Defense Communications Certification
  • Link 16 Network Management Workshop
  • Tactical Data Links & TDL Security Bootcamp
  • Link 16 Terminal Course
  • Military RF Engineering Bootcamp
  • Link 16 Master Certification
  • Link 22 Master Certification
  • Link 16, VMF and SADL/EPLRS Bootcamp
  • Tactical Data Links (TDL) Testing
  • TDL Planning, Procurement and Acquisition
  • Military Cyber Security Training Bootcamp
  • TDL for the Senior Military Professionals
  • Cyber for Military Professionals
  • Cyber Risk Management for Military Professionals
  • Defense Information Security Management Systems
  • Netcentric System of Systems Engineering Bootcamp

Who Should Attend

Operators, Engineers, Designers, Architect, Software and Hardware Developers, Project Managers, Product Managers, Sales and Support and anyone else who is interested to understand concepts behind Link 16 / JTIDS / MIDS.