Whether you require a single course for a small group or an extensive training program for your entire workforce, on-site courses offer significant savings and convenience with the same quality hands-on instruction delivered in TONEX Training Education Centers around the world.
TONEX Training offers many training seminars in variety of subject areas including Telecom, Mobile and Cellular, Wireless, Engineering, Technology, IT, business, AI and Machine Learning, Systems Engineering, Defense, Tactical Data Links (TDL), Aerospace, Aviation, Space Engineering, Specification Writing, Power and Energy, Enterprise Architecture Management, Mini MBA, Finance, Logistics, Blockchain, Leadership, and Product/Project Management. We offer programs in our four state-of-the-art Executive Conference Centers and in 20 other cities in US and international locations including:
- Atlanta, GA
- Dallas, TX
- Plano, TX
- San Francisco, CA
- Santa Clara, California
- Santa Monica, California
- Alexandria, Virginia
- New York City, NY
- Rome, Italy
- Shanghai, China
- London, UK
- Munich, Germany
- Stockholm, Sweden
- Tokyo, Japan
- Seoul, Korea
- Hong Kong
- Bangalore, India
- Istanbul, Turkey
- Dubai, UAE
Requirements Writing Training, and Specifications Writing Training course addresses the techniques used to write, validate and verify requirements and convert them to technical design specifications. It gives attendees the basic tools necessary to write effective system design specifications.
Requirements are the foundation for building systems and software. They determine WHAT the system must do and drive the system development. Requirements are used to determine [verify] if the project team built the system correctly. The requirements development process identifies the activities needed to produce a set of complete and verifiable requirements.
Learn how to:
- Write well-formed, validated requirements and specifications
- Analyze, Verify and Validate requirements into a user requirements document
- Create Project Plan/SEMP with various plans, such as the review plans, configuration management plans, and risk plans. [Control the requirements development].
- Establish Configuration management [CM] the process to control changes to the requirements and manage the baseline documentation.
- Plan the Risk management to monitor, control, and mitigate high risk requirements.
- Manage Technical reviews to identify defects, conflicts, missing, or unnecessary requirements.
- Manage Stakeholder involvement which is essential for validating the requirements. Are these the correct requirements?
- Establish Elicitation techniques to enable the discovery and understanding of the needed requirements.
- Manage Traceability of requirements to user needs & requirements, support documentation, and constraining policies [e.g., safety requirements].
Requirements define the functions, performance, and environment of the system under development to a level that can be built:Does the system do WHAT it is supposed to do? – These are Functional requirements.How well does the system do its functions? – These are Performance requirements.
TONEX Requirements Writing Training provides the foundation to produce requirements for the system and sub-systems with set of activities . The systems engineering standard [EIA 632] defines “requirement” as “something that governs what, how well, and under what conditions a product will achieve a given purpose.”
This course gives PEs 13 PDH (Professional Development Hours) approved by PIE.
Who Should Attend
SMEs, project stakeholders, users, Project and program managers, directors, project sponsors and anyone else involved in planning and writing specifications requirements for projects.
Objectives
Upon successful completion of the course, attendees will:
- Describe the way the system is intended to operate from the user’s perspective
- Describe Concept of Operations (ConOps) process where user needs, expectations, goals, and objectives are described
- Understand how feasibility Study can produce the conceptual high-level design and requirements which can be used as a starting point for the project.
- Demonstrate the ability to capture and validate requirements throughout the requirements analysis process.
- Learn how to conduct technical reviews, manage stakeholder involvement, and elicit requirements
- Understand traceability of requirements to user needs
- Understand the relationships among all stages of the system life cycle.
- Describe different levels of requirements
- Learn how to develop requirements, write and document requirements, check completeness of requirements, analyze, refine, and decompose requirements, validate requirements and manage requirements
- Describe communications techniques to elicit requirements
- Classify requirements as functional or design
- Demonstrate the ability to write functionally oriented and design oriented specifications
- Understand how to convert requirements into valid design specifications
- Learn how to separate System and Sub-system Requirements
- Learn how to create a Verification Plan to verify each system requirement
- Effectively produce design specification
- Effectively perform Verification (Functional, Non-Functional, and Interface reqs.) and Validation (ConOps)
Outline
BASICS OF SYSTEMS ENGINEERING
- Definition of Common Terms
- System Definition and Design
- Design Methodologies
- Master Plan Scope
- Concept of Operations (ConOps)
- Preliminary Engineering
- Final Engineering
- RFP vs. Consultant Design vs. Design-Build
REQUIREMENTS ANALYSIS
- Introduction to Requirements
- The Quality of Requirements
- Description of Requirements Writing (within the larger context of system development)
- Overview of Requirements Development
Communication Techniques for Eliciting Requirements
- Stakeholder involvement
- Defining valid and meaningful needs
- Technical reviews
- Stakeholder feedback on the needs being collected
- Prioritization of the needs
- ConOps to System Requirements (generic)
REQUIREMENTS
- Purpose of Requirements
- Levels of Requirements
- Understanding the different levels of requirements
- Performance requirements
- Conditions [e.g. environmental, reliability, and availability]
- Environmental and Non-Functional requirements
- System
- Sub system
- Component / task
Types of Requirements
- Eight basic types
- Differences between requirements for hardware, software, services
- Functional
- Non functional
- Performance, etc.
- Non-Requirements
STRUCTURE OF A WELL FORMED REQUIREMENT
- Definition
- Capabilities
- Conditions
- Constraints
- Operational Policies & Constraints
- Technical and Policy Constraints
- Properties
- Interface
- Human
- Hardware
- Software
- Communications
- Functional analysis – needs analysis, operational analysis, use cases
- Design requirements analysis
- States & Modes analysis
- Workshop – States and modes analysis
- Requirements parsing
- Writing requirements vs. defining a system proposed is critical
SPECIFICATIONS VS. REQUIREMENTS
- Development of requirements
- Description of the current environment
- Stakeholders
- Feedback to Stakeholders
- Facilitation skills and techniques
- Transforming Requirements into Requirements Specifications
- How requirements specifications relate to requirements
- Requirements Flowdown in Specifications
- Specification Types and Formats
- Types of requirements specification
- Specification Writing
- Review of requirements quality
- Requirement structural template
SYSTEM TESTS (Verification and vALIDATION)
- Test Plans
- Test Procedures
- User Acceptance Testing
- Requirements Verification Matrix
- Traceability to user requirements (Validation against ConOps)
- Traceability to system requirements (Verification against System Specs.)
- Verification (Functional, Non-Functional, and Interface reqs.)
- Validation (ConOps)
- System Integration
- Standards and Policies
WORKSHOPS/EXERCISE
- Workshop 1
- Examples of good and poor requirements (group project)
- Requirements constructs
- Group presentations and discussions
- Workshop 2- classifying requirements as functional or design
- Workshop 3 – writing a functionally oriented specification vs. a design oriented specification
- Analysis of Conops document
- Analysis of Test plans/procedures
What is DFMEA?
DFMEA, or Design Failure Mode and Effects Analysis, is typically used in the early stage of the product lifecycle and development as a troubleshooting and assurance process and tool.
What is FMEA?
Failure Mode and Effects Analysis (FMEA) is defined as a regular technique used to inhibit failure. Such action is conducted through the exploration of potential failure modes and the reasons can cause such failure. FMEA actions occur within a team activity by tackling high severity, high occurrence, and high detection rankings that is determined by the analysis. Only through the preventive process of FMEA we can assure the product performance is satisfactory and the chance of the product failure is reduced. The Design FMEA training course will help you explore these steps in detail and learn how to put them in action to prevent the system failure.
FMEA techniques are considered as a quality improvement tool. One of the reasons why FMEA has gained interests in recent years is because of automotive industry and implementing ISO/TS 16949. However, other industries such as aerospace, pharmaceutical, and electronics can benefit from such practice as a risk analysis tool and to increase the quality of their products. One of the beauties of this technique is its simplicity. Quality improvement tools are often made of complicated statistical analysis. Such simple yet sufficient and effective quality technique can save costs for the organization.
Learn about:
- What Design Failure Mode and Effects Analysis (DFMEA) is
- How Design Failure Mode and Effects Analysis (DFMEA) is related to Failure Mode and Effects Analysis (FMEA) and Process Failure Mode and Effects Analysis (PFMEA)
- Benefits of Design FMEA
- How to uncover opportunities to prevent failure proactively prior to the failures
- How to collect data and information as part of DFMEA Pre-Work
- How to use DFMEA to investigate and treat risk as actual failure including high severity Failure Modes
- Design Failure Mode and Effects Analysis (DFMEA) process and tools
- Learn about Design FMEA input and output including RPN, severity, occurrence, and detection rankings
- Learn about Requirements, Potential Failure Modes, Effects of Failure and Severity Ranking, Causes, Prevention Controls, Occurrence and Class Column, Detection Controls, calculating the Risk Priority Number (RPN) and more
- Select an Effective DFMEA Cross Functional Teams (CFTs) in your organization
- Analyze your process and plan Cross Functional Teams (CFTs) activities and control
- Plan Design Verification Plan & Report (DVP&R)
- Map design reviews to FMEA Outputs
- Use problem solving activities such as 8D to DFMEA input and output
- Use Design of Experiments (DOE) in conjunction with DFMEA
- Use other tools such as Why-Why, Fishbone Diagrams, Fault Tree Analysis (FTA), 8D, DOE to enhance your Design FMEA activities
Learn how to map Design FMEA Detection to the input into the Design Verification Plan & Report (DVP&R)
TONEX DFMEA Training Methodology
Design FMEA training includes many in-class activities including hands on exercises, case studies and workshops. During the Design FMEA workshops, students bring in their own design work and issues and through our coaching, develop their own Design FMEA.
The DFMEA training course will also address the relationship between FMEA process and FTA, DVP&R, and control plans. This course not only is conducted via lecture but also involves trainees in in-class activities. Students will experience designing and developing a mocking FMEA and risk analysis in the class.
Audience
The DFMEA training is a 2-day course designed for:
- Engineers, scientists, and managers involved with manufacturing
- Production and manufacturing team
- Product design personnel
- Reliability, testing, and quality team members
- R&D personnel
- Product and process assurance people
- Assembly personnel
Objectives
Upon completion of this seminar, the attendees are able to:
- Explain the concept and the purpose of Failure Mode and Effects Analysis (FMEA)
- Discuss the benefits, requirements, and goals of FMEA
- Decide when to use Design FMEA and when Process-FMEA
- Discuss the steps and process of the FMEA
- Gather up an FMEA team
- Define the Design FMEA scope
- Conduct all the steps of Design FMEA
- Conduct the ranking scales for Severity, Occurrence, and Detection
- Choose the appropriate technology methods to use as supplement to their DFMEA action plan
- Make the Design FMEA into an active document
- Develop a Control plan based on Design FMEA
- Determine corrective actions in order to develop a more correct FMEA
Outline
Overview of FMEA and DFMEA/Design FMEA
- Introduction to Failure Mode and Effects Analysis (FMEA)
- Definition of FMEA
- How FMEA works
- Why and where using FMEA
- System/Subsystem/component Design FMEA
- Manufacturing and Assembly Process FMEA
- Machinery and Equipment FMEA (Logistics Support)
Purpose of an FMEA
- Identifying potential risks
- Prioritizing the risks
- Developing an action plan to reduce the risks
Design-FMEA vs. Process-FMEA
- What is DFMEA?
- What is PFMEA?
- Difference between DFMEA and PFMEA?
- When to use which?
- Special features (critical and significant)
- Cooperation on special features
- Characteristics as inputs to PFMEA
Principles of DFMEA/Design-FMEA
- What Is A Design FMEA?
- Identifying potential or known failure modes
- Corrective and preventive actions
- Disciplined analysis of the product/system design
- Design-based failure modes
- Design FMEA steps and flow
- Examples
- DFMEA Development Methodology
- Scope
- Clarify your scope
- How to use the DFMEA Scope Worksheet
- Procedure
- Step-by-step directions of a Design FMEA
- How to use the FMEA Analysis Worksheet
- How to customize the Severity, Occurrence, and Detection Ranking Scales
- Failure Mode Avoidance FMA /FPA Failure Prevention Analysis
- Team structure and rules for efficiency – cross functional teams
- Control Plan
- Some tips on DFMEA
Design FMEA Relations to Process-FMEA
- Scope
- Clarify your scope
- How to use the PFMEA Scope Worksheet
- Procedure
- Step-by-step directions of a PFMEA
- How to use the FMEA Analysis Worksheet
- How to customize the Severity, Occurrence, and Detection Ranking Scales
- Control Plan
- Some tips on PFMEA
Design FMEA Training Hands-on and In-Class Activities
- 3 Labs
- 2 Workshops
- 1 Group Activity
Sample Design FMEA Activity Workshop
- How to complete the Design FMEA Template (TONEX’s DFMEA Template)
- Tools to extract product functions
- Disusing and analyzing potential Failure Modes
- Brainstorming and identifying potential Failure Effects
- Disusing and determining the Severity of the Effect
- Analyzing and identifying Potential Cause(s) of the Failure Mode
- Determining the Probability of Occurrence of the Failure Mode
- Identifying Design Verifications techniques for the Causes
- Determining the Probability of Non-Detection of the Failure Mode
- Prioritizing risks based on Risk Priority Number (RPN)
- Corrective and Preventive Actions
- Techniques to prioritizing Actions Based on the RPN
The Internet of Things Training, IoT Training by TONEX
The Internet of Things Training Course covers What the IoT is about, technology trends, deployments and convergence. Learn how to work with Building Connected Devices.
The Internet of Things Training Course attendees will learn about the dynamics of the IoT markets, technology, trends, planning, design and the convergence of platforms and services, with a special focus on the product design, architecture and implementation.
This is a fundamental IoT course covering the technologies behind the Internet of Things and connected devices.
Course Content
What is the Internet of Things (IoT)?
- Concepts and Definitions of The Internet of Things (IoT)
- History of IoT
- Applications
- IoT standards
- Requirements
- Functionalists and structure
- IoT enabling technologies
- IoT Architecture
- Major component of IoT
- Hardware, sensors, Systems-on-a-Chip, firmware, device drivers, application software, connectivity, cloud, and security
- Role of wired and wireless communication
- IoT communication and networking protocols
- IoT services and applications
- Security
- Cloud Computing and the Internet of Things
- Semantic Web 3.0 Standard for M2M and IoT
- IoT Platforms
- Challenges of adapting the concepts
Overview of IoT connectivity methods and technologies
- wireless 101
- RF 101
- ZigBee
- RFID
- Bluetooth LE or Bluetooth Smart Technology
- IEEE 802.15.4, IEEE 802.15.4e, 802.11ah
- Relay Access Point (AP)
- Grouping of stations
- Target Wake Time (TWT)
- Speed Frame Exchange
- Sectorization
- GSM, CDMA, GPRS,3G, LTE, small cells, SATCOM
- Sensors and sensor networks
- Serial communication
- Power consumption and optimization
- MIPI, M-PHY, UniPro, SPMI, BIF, SuperSpeed USB Inter-Chip (SSIC), Mobile PCIe (M-PCIe) and SPI
- Wired connectivity
- IPv4/IPv6
- Ethernet/GigE
- Real-time systems and embedded software
- Cloud computing and storage
- Augmented Reality
Evaluation of of The Internet of Things
- Platforms
- Mobile integration
- Deployment
- Data Visualization
- Convergence with Social Networks
- Value chain and Business models
- User centric cloud based services
- Analytical Hierarchy Process for technology selection
- End-to-end security
- Integration with IT systems
- Cost/benefit constraints
- End-to-end compatibility
- Application Architecture
- Lifecycle solution management
- Real-time response and delay
IEEE SA IoT: It is predicted that 50 to 100 billion things will be electronically connected by the year 2020. This Internet of Things (IoT) will fuel technology innovation by creating the means for machines to communicate many different types of information with one another. With all objects in the world connected, lives will be transformed. But the success of IoT depends strongly on standardization, which provides interoperability, compatibility, reliability, and effective operations on a global scale.
Recognizing the value of IoT to industry and the benefits this technology innovation brings to the public, the IEEE Standards Association (IEEE-SA) has a number of standards, projects and events that are directly related to creating the environment needed for a vibrant IoT.
MIL-1553 Training Course Description
Why choose TONEX for your MIL-1553 (MIL-STD-1553) Training?
MIL-1553 training course by TONEX covers MIL-STD-1553 protocol architecture, functional characteristics, technical components, design, operations, products, testing and trends.
MIL-STD-1553, MIL-STD-1553, or AS15531 is a military standard, Digital Time Division Command/Response Multiplex Data Bus, published by DoD that defines the mechanical, electrical and functional characteristics of a serial data bus. It features a dual redundant balanced line physical layer, a (differential) network interface, time division multiplexing, half-duplex command/response protocol and up to 31 remote terminals (devices).
MIL-STD-1773 is a version of MIL-STD-1553 using optical cabling.
Learning Objectives
Upon completion of this course, the attendees are be able to:
- Understand MIL-STD-1553 protocol, architecture and functional characteristics
- Explain the architecture of MIL-STD-1553
- Sketch the logical and physical architecture of MIL-STD-1553
- Describe MIL-STD-1553 mechanical, electrical and functional characteristics
- Explain technical components, design, operations and, testing aspects of MIL-STD-1553
- Explore
- Describe the key cyber security concepts in MIl-STD-1553
- List the requirements and capabilities of MIL-STD-1553 security
- Explore vulnerabilities and weaknesses of MIL-STD-1553 applied to aircrafts and weapons
Audience
Managers, applications developers, integrators, sales and marketing professionals involved in managing, marketing, selling, developing, testing or integrating MIL-STD-1553 applications and systems.
Course Content
Introduction to MIL-STD-1553
- MIL-STD-1553A
- MIL-STD-1553B
- Notice 1 and Notice 2
- MIL-STD-1553 General Requirements
- MIL-STD-1553 Standards updated by SAE.org
MIL-STD-1553 Data bus Overview
- Multiplexing in MIL-STD-1553
- MIL-STD-1553 Hardware Components
- Terminal Operation
- Data Bus Controller (BC)
- Remote Terminal (RT)
- Data Bus Monitor (BM)
MIL-STD-1553 Hardware Platforms
- Hardware Characteristics
- Data Bus Cable
- Data Bus Coupling
- Terminal I/O Characteristics
- Redundant Data Bus Requirements
MIL-STD-1553 Protocol
Command word, mode codes, mode command formats, data word, status word, message error bit.
- Message Formats
- Command Word
- Data Word
- Mode Codes
- Status Word
- Errors
Connecting the Bus
- Terminal Electrical Characteristics
- MIL-STD-1553 Cabling
- MIL-STD-1553 Coupling
- Direct Coupling
- Transformer Coupling
- MIL-STD- System Design
- Data Bus Topology and Redundancy
- Data Bus Control and Partitioning
- Bus Loading
MIL-STD-1553 System and Software Design
- MIL-STD-1553 Systems Engineering Principals
- MIL-STD-1553 Requirement Analysis
- System and Software Design
- Data Bus Topology and Control
- Robustness, Partitioning & Redundancy
- Bus Loading and Bus Controller Software
- Synchronous and Timing
MIL-STD-1553 Testing Procedures
- Testing and Verification
- Test and Operating Requirements
- Developmental Testing
- Design Verification
- Production Testing
- Systems Integration Testing
- Field & Operational Testing
- Integration Issues
MIL-STD-1553 Databus Specification Interpretation
- MIL-STD-1553 Products and Vendors
- MIL-STD-1553 Interface Hardware and Software
- Advanced MIL-STD-1553 UHF/VHF Radio
- High-Speed MIL-STD-1760 for the aircraft/weapon interface
- MIL-STD-1760C
- MIL-STD-1394b, a military version of Firewire
- Enhanced Performance MIL-STD-1553
Introduction to MIL-STD-1773
- Media Components and Design
- Testing
- Installation and Maintenance
- Enhancements and Optimization
MIL-STD-1553 Security
- MIL-STD-1553 Network and System Security
- Security Definitions
- Equipment originating or terminating classified plain text language
- Wirelines, equipment, and the interconnecting lines
- wirelines, components, equipment, and systems
- Encrypted or unclassified signals
- lectrical circuits components, equipment, systems
- Classified plain language data in electrical form
- nvestigations and studies of compromising emanations
- TEMPEST
- System Security Policy
- MIL-STD-1553 design (system, hardware, and software)
- Operational, maintenance, and logistic
- Security policy of the aircraft, ship, or system
Labs, Project and Interactive Sessions
Integrated Logistics Support Training
Integrated Logistics Support Training covers many aspects of unified and iterative approach to the management and technical activities for operational and materiel requirements and design specifications for logistics support. Integrated Logistics Support (ILS) is the management and technical process to integrate needs for logistic support into the design of a system or equipment throughout its life cycle.
Learn about the process by which all elements of logistic support are planned, acquired, tested, and provided in a timely and cost-effective manner. Learn how integrated logistics support define the support requirements related to system design and development and acquiring the required support.
Learn about Integrated Logistic Support services including:
- Maintenance Planning
- Manpower and Personnel
- Early Consideration of Manpower Requirements
- Technical Data
- Supply Support
- Training and Training Support
- Facilities
- System Configuration Identification & Validation
- Configuration Item / Technical Information (CI-TI) Database Development
- System Failure Analysis
- Preventative Maintenance / Supportability Analysis
- Troubleshooting and Repair
- Business Process and Workflow Automation
- Software/Database Development
Course Content:
Integrated Logistics Support (ILS) Framework
- Integrated product support
- Integrated product support elements
- Integrated product support process
- Integrated product support process in the acquisition strategy
- Integrated Product Support development
- Pre-materiel acquisition
- Materiel Solutions and Analysis Phase
- Technology Maturation and Risk Reduction Phase
- Engineering and Manufacturing Development Phase
- Production and Deployment Phase
- Operations and Support Phase
Product Support Management
- Strategic Approach and Risk Management,
- Performance based product support strategies
- Legacy materiel
- Supportability risk management
- Organization
- Product support manager
- Product support integrator
- Product support provider
- Product support management integrated product team
- Army integrated product support executive committee
- Integrated Product Support Management of Joint Programs
- Joint programs and Joint logistics
- Lead Service product support managers
- Implementing Performance Based Product Support Strategies,
- Metrics
- Performance-based arrangements
- Section V
- Contract Performance-based Arrangements,
- Requirements
- Public-private partnerships
- Contractor logistics support (nonpublic-private partnership support)
- Contract management
- Planning
- Reprocurement
Design
- Design interface
- Design for energy efficiency
- Maintenance task design parameters
- Condition-based maintenance plus in the design
- Design for manpower and personnel integration
- Design for standardization and interoperability
- Design for environment, safety, and occupational health
- Design for corrosion resistance
- Supply Management Army-Operations and Support Cost Reduction Program
- Commercial and nondevelopmental items market investigation
The Impact of Maintenance Planning
- Maintenance concepts and requirements for the life of the system
- Levels of repair
- Repair times
- Testability requirements
- Support equipment needs
- Manpower and skills required
- Facilities
- Site activation
Integrated Product Support Analysis and Software Tools
- Requirement
- Product support analysis and logistics product data
- Analysis of product support alternatives
- Life cycle cost analysis
- Reliability centered maintenance analyses, failure mode, effects, and criticality analysis, and fault tree analysis
- Level of repair analysis
- Modeling and simulation
- Core logistics determination of applicability and core logistics analysis
- Core depot assessment
- Depot source of repair analysis
- Provisioning analysis
- Post-fielding support analysis
- Integrated Product Support software tools
Technical Data and Configuration Management
- Technical data
- Configuration management
- Logistics product data
- Provisioning technical documentation
- Equipment publications
- Maintenance allocation chart
- Operator manuals
- Maintenance manuals
- Repair parts and special tools list
- Depot maintenance work requirements and national maintenance work requirements
Integrated Product Support Planning
- Integrated product support planning considerations
- Life Cycle Sustainment Plan
- Life Cycle Sustainment Plan content
- Maintenance support planning
- Logistics footprint
- Provisioning plan
- Depot maintenance partnerships
- Recapitalization program
- Depot Maintenance Support Plan
- Software support planning
- Fielded software support
- Computer Resources Life Cycle Management Plan
- Resource planning
- Operating and support cost
- Affordability
- Cost as an independent variable (cost consciousness)
- Program cost estimate
- Funding appropriations
- Replaced System Sustainment Plan
- System Demilitarization and Disposal Plan
- Materiel fielding planning
- Post-production support planning
- Preservation and storage of tooling for Major Defense Acquisition Programs
Force Development Documentation and Training Systems
- Equipment and Personnel
- Force development documentation
- Line item numbers
- Basis of issue plan feeder data
- Basis of issue plan
- Manpower requirements criteria
- Major item system map
- Training Systems and Devices,
- Pre-acquisition
- Acquisition
- Training system and training device fielding
- Training system and training device support
- Post-production software support
- New equipment training
Environment, Safety, and Occupational Health
- Environmental impact
- Environment, safety, and occupational health considerations
- Hazardous materials
Test and Evaluation
- Supportability test and evaluation
- Product support package
- Logistics demonstration
Integrated Product Support Program Reviews and Reporting
- Milestone Decision Review
- Type Classification
- Materiel Release
- Supportability Assessment
- Independent Logistics Assessment
- Department of the Army Integrated Product Support Reviews
- Sustainment reviews
- Integrated Product Support reporting
- Internal Control Evaluation for the Integrated Product Support Program
- Life Cycle Sustainment Plan mandatory annexes
- Life Cycle Sustainment Plan Development, Coordination, and Approval Process
ONF Certified SDN Associate certification (OCSA) Training
ONF Certified SDN Associate certification (OCSA) training course by TONEX is a preparation for ONF Certified SDN Associate (OCSA-110).
ONF Certified SDN Associate (OCSA) is awarded upon successful completion of the exam arranged by ONE.
TONEX ONF Certified SDN Associate (OCSA) certification exam preparation training course that attests and formally certifies successful candidates with vendor-neutral conceptual knowledge of the major domains of networking practices that support the theory and practice of Software Defined Networking (SDN).
Learn about ONE-Certified SDN Associate certification (OCSA) Domains:
- Basic SDN Concepts
- OpenFlow Basics
- SDN Architecture and Ecosystem
- SDN Open Source
Who Should Attend ONE-Certified SDN Associate certification (OCSA) training course and Intended Exam Audience
- SDN Sales Engineers
- Business Development Managers
- Product Managers
- Product Marketing
- Manager/Director for a Network/IT Group
- Network Technicians (Entry Level)
- IT Analysts (Entry Level)
- System Administrators (Entry Level)
- Consultant/Professional Services Engineer
- Students and Researchers
- Sales Representatives
Training Agenda
Overview of Networking Concepts
- OSI and TCP/IP models
- Fundamental elements of networking
- Connection-oriented vs. connectionless protocols
- Ethernet networks
- Collision domains and broadcast domains
- Routers vs. switches
- Layer 3/2 addressing
- Layer 2 addresses
- Layer 3 / IP addressing, including subnet masks
- Address resolution
- Address Resolution Protocol (ARP)
- Overview of Routing Protocols
- RIP, OSPF, ISIS, BGP
- Optical network fundamentals
- SONET/SDH, DWDM and OTN
- IP Network Services
- DHCP, DNS, ARP, NAT, ICMP
- IPv4 and IPv6 fundamentals
- Packet Filtering
Fundamental characteristics of SDN
- History of SDN
- What is SDN?
- SDN Value Proposition
- Control and forwarding planes
- SDN Use Cases
- Data Center applications and use cases
- Campus Networks applications and use cases
- Service Providers applications and use cases
- Enterprise applications and use cases
- Mobile Networks applications and use cases
Characteristics of an SDN Network
- Plane Separation
- Simplified Forwarding Element
- Centralized Control
- Network Automation
- Virtualization
- Openness
- Interoperability
SDN Devices
- Controllers
- Switches
- Orchestration
- API’s
- Overlay Networking Abstractions
SDN Architecture
- Traditional Network Architectures vs. SDN
- SDN architectural components
- Standards bodies
- Controller design
- API’s and applications.
- SDN Layers
- Northbound and Southbound API’s
- East/West API’s
- SDN Security and Availability
- Packet and Optical Integration methods
- SDN Migration Strategies
- Hybrid Mode Switches
SDN Ecosystem
- Standards Bodies and Industry alliances
- Network Operators and Enterprises
- Network Equipment Manufacturers
- Software vendors
- Academic and Industry research institutions and labs
- Open Source Initiatives
Who is the ONF and what do they do?
- Purpose of Open Networking Foundation (ONF)
- Structure
- Technical Working Groups
- Open Source Software Development
- Activities and Initiatives
- Controller Placement and Redundancy
- SDN Applications (service chaining, virtualized network functions, analytics)
What is OpenFlow® ?
- OpenFlow® Protocol operations
- Packet types and contents
- Communications between controller/switch
- Channel/communication/session establishment
- Message Types
- Basic Operation
- Packet Matching
- OpenFlow® versions
- Proactive vs Reactive Flows
- Statistics and Counters
- Steps in setting up a flow
- Policy Enforcement
- OpenFlow® Management and Configuration Protocol
- OF-Config, OAM, OFDPA, OVSDB
- Flow Table Entry Format
- Flow Timers
- Pipeline Processing
- Match Types
- Match Actions
Open Source SDN
- Identify key open source projects in the SDN Ecosystem.
- OpenFlow® Agents
- Indigo
- Linc
- OVS
- CPqD/ONF Driver (aka “libFluid”)
- OpenFlow® Controllers
- NOX
- POX
- ONOS
- ODL
- Floodlight
- RYU
- Utilities and Tools
- FlowSim
- Mininet
- Of DPA
- OF Test
- Wireshark
- Avior
- Open Source SDN Distributions (OSSDN Atrium, etc.)
- Open vSwitch
- Orchestration Systems
- Open Source Initiatives (OPNFV, OCP, ODCA, Open Config)
What will you learn at the TONEX Capacity Planning Training Course Boot Camp?
Capacity planning training course bootcamp provides the details of capacity planning as a repeatable process for IT infrastructure, cloud computing, and data centers. It’s about understanding service levels and resource usage and aligning capacity requirements with business demands with trending and forecasting.
Software Engineering Training-Crash Course
Software engineering training teaches you the advanced software engineering topics and provides you with the discipline to apply engineering and computer science concepts in the development, maintenance, usability and dependability of the software.
TONEX as a leader in teaching industry for more than 15 years is now announcing the software engineering training which helps you to recognize the software design software development, software testing, software maintenance and software management.
TONEX has served the industry and academia with high quality conferences, seminars, workshops, and exclusively designed courses in systems engineering area and is pleased to inform professional fellows about the recent comprehensive training on software engineering.
This course covers variety of topics in software engineering area such as: introduction to software engineering, software investigation and analysis, software design, software implementation and management, requirement analysis and engineering, software development process life cycle, and software development processes. Furthermore, you will be introduced to socio-technical systems, software system architecture, dependability and security engineering, software project planning and management, dependability and security assurance, software system configuration management, software system quality management, agile software system engineering, software verification and validation, software construction and distributed software systems.
By taking the software engineering training by TONEX, you will learn about present software engineering concepts as well as principles in parallel with the software development life cycle.
This training will begin with an introduction to software engineering, giving you a definition of the body of knowledge, as well as a discussion of the main methodologies of software engineering. The next step is to introduce the software development life cycle (SDLC) followed by software modeling using unified modeling language (UML), a standardized general purpose languages used to create visual models of object oriented software. Moreover, you will learn about the main phases of SDLC; requirements gathering, requirement analysis, design, coding, and testing.
If you are an IT professional who specialize in software engineering, you will benefit the presentations, examples, case studies, discussions, and individual activities upon the completion of the software engineering training and will prepare yourself for your career.
Learn about artifacts and approaches to develop the software systems, software engineering metrics, distributed, configurable and object oriented software. Moreover, you will learn about alignment of software systems with overall system design, software unique aspects of planning, requirements, architecture analysis, implementation, testing and maintenance, important of software engineering constraints, security and technology trends in software engineering.
Our instructors at TONEX will help you to understand different software engineering and development processes. Furthermore, you will be introduced to the different examination methods and tools in software engineering.
Finally, the software engineering training will introduce a set of labs, workshops and group activities of real world case studies in order to prepare you to tackle all the related software engineering challenges.
Audience
Software engineering training is a 4-day course designed for:
- Software developers want to acquire state of the art knowledge of software engineering
- Software engineers need to know everything about software engineering
- Business analysts having projects in software engineering
- System engineers
- Project managers of software projects
- System safety managers
- Software maintainers
- Software configuration managers
- Software programmers
- Software Managers and lead technical staff
- Any IT professionals need to improve their knowledge of software engineering
Training Objectives
Upon completion of the software engineering training course, the attendees are able to:
- Understand the systems engineering principles applied to design, development and integration of software intensive systems
- Learn about systems engineering, software engineering and software development with practical applications
- Explain the basic structure of designing and implementing software systems from analysis, verifications and validations
- Understand the software engineering life cycle models with their significance and objectives
- Understand how to reduce the software faults and failures to an acceptable margin using rigorous testing and inspection
- Conduct technical software performance measurements and defining deterministic factors in successful software system engineering
- Learn how to make plans for software systems, control the changes and analyze to improve the process
- Learn how to apply practical methods to improve software project performance in design process
Training Outline
Software engineering training course consists of the following lessons, which can be revised and tailored to the client’s need:
Introduction to Software Engineering
- Role of Software Engineer
- Definitions and Concepts
- Information Level in the Organization
- Software Life Cycle
- Categories of Software
- Alternate Software Acquisition Approaches
- Software Engineering Paradigms
- Desirable Features of Computer Software
- Summary and Concluding Remarks
- Software Development Life Cycle (SDLC)
- Software Modeling; Unified Modeling Language (UML)
Software Investigation and Analysis
- Project Selection and Initial System Requirements
- Project Selection
- Problem Definition
- Proposed Solution
- Scope and Objectives of the System
- System Justification
- Feasibility Analysis Report
- Alternate Approach to Feasibility Analysis
- Summary of System Inputs and Outputs
- Initial Project Schedule
- Project Team
- Requirement Specification
- Contents of the Requirement Specification
- Documenting the Requirements
- Requirement Validation
- Proceeding
- Presenting the Requirements Specification
- Information gathering
- Rationale for Information Gathering
- Interviews
- Questionnaires and Surveys
- Observation and Document Review
- Prototyping
- Brainstorming and Mathematical Proof
- Object Identification
- Communicating via diagrams
- Traditional System Flow Charts
- Innovation; Topology Chart
- Data Flow Diagrams
- Object Flow Diagrams
- Contemporary Diagramming Techniques
- Program Flow Chart
- decision models for system logic
- Structured Language
- Decision Tables
- Decision Trees
- Decision Techniques to Use
- Decision Techniques versus Flowcharts
- System Rules
- Project management aids
- PERT and CPM
- The Gantt Chart
- Project Management Software
Software Design
- Software Design Process
- Design Strategies
- Architectural Design
- Interface Design
- Software Design and Development Standards
- The Design Specification
- Database Design
- Approaches to Database Design
- Overview of File Organization
- User Interface Design
- Types of User Interfaces
- Steps in User Interface Design
- Output Design
- Output Methods versus Content and Technology
- Input Design
- Operation Design
- Categorization of Operations
- Essentials of Operation Design
- Informal Operation Requirements
- Formal Specifications
Software Implementation and Management
- Software Implementation Issues
- Software Operating Environment
- Installation of the System
- Code Conversion
- Change Over
- Software Marketing
- Standards and Quality Assurance
- Management of Targets and Financial Resources
- Leadership and Motivation
- Software Management
- Management Responsibilities
- Management Styles
- Software Maintenance
- Legacy Systems
- Software Integration
- Software Re-engineering
- Developing the Job Description
- Maintaining the Desired Environment
- Preserving Accountability
- Grooming and Succession Planning
- Software Economics
- Software Cost
- Software Value
- Assessing Software Productivity
- Estimation Techniques for Engineering Cost
- Organizing Effective Management
- Functional Organization
Parallel Organization - Hybrid Organization
- Organization of Software Engineering Firms
Requirements Analysis and Engineering
- Introduction to Requirements Analysis
- Systems Engineering Process Inputs
- Types of Requirements
- Requirements in Waterfall Model
- Software Requirement Specification (SRS)
- Elicitation Techniques
- Functional Requirements
- Non-Functional Requirements
- Domain Requirements
- Structured Analysis
- Entity-Relationship Approach
- Object Oriented Analysis
- Class and Object Identification
- The Dynamic Model
- Requirements Specifications
- Requirements Documentations
- Requirements Verification and Negotiation
- Requirements Validation
Software Development Process Life Cycle
- Waterfall Development
- Prototyping
- Incremental Development
- Iterative and Incremental Development
- Spiral Development
- Rapid Application Development
- Agile Development
- Lightweight Methodologies
- Code and Fix
- Process Meta-Models
- Formal Methods
Software System Development Processes
- Unified Software Development Process (USDP)
- Incremental Process
- Iterative Process
- Architecture Centric
- Use-Case Driven and Risk Confronting
- USDP Life Cycle
- Process Workflows
- Supporting workflows
- Inception Phase
- Elaboration Phase
- Construction Phase
- Transition Phase
- Lifecycle Objectives
- Lifecycle Architecture
- Unified Modeling Language
Socio-Technical Systems
- Socio-Technical System Stack
- Socio-Technical System Layers
- Equipment
- Operating system
- Communications and Data Management
- Application Systems
- Business Processes
- Organizations
- Society
- Socio-Technical System Characteristics
- Emergent Properties
- Non-deterministic
- Complex Relationships with Organizational Objectives
- Socio-Technical System Design Approaches
- Design Challenges
- Socio-Technical Systems Engineering
Software System Architecture
- Software Architecture Concepts
- Architectural Elements
- Stakeholders
- Architectural Descriptions
- Architectural Views
- Architectural Perspectives
- Role of Software Architects
- Architecture Definition Process
- Architectural Styles
- Pipe and filter
- Object Oriented
- Event Based
- Layered
- Repositories
- Process Control
- Distributed Architectures
- Architectural Analysis
- Domain Specific Design
- Middleware
- Model Driven Architecture
- Aspect Oriented Programming
Dependability and Security Engineering
- Security Engineering
- Usability and Psychology
- Protocols
- Access Control
- Cryptography
- Distributed Systems
- Economics
- Multilevel Security
- Multilateral Security
- Physical Protection
- Monitoring and Metering
- Security Printing
- Biometrics
- Emission Security
- Network Attack and Defense
- API Attacks
- Physical Tamper Resistance
- Telecom System Security
- System Evaluation and Assurance
- Managing the Development of Secure Systems
Software Project Planning and Management
- Project Management Framework
- Project Initiation
- Project Planning
- Project Monitoring
- Software Development Plan
- Project Management Plan and Software Development Management
- Pitfalls in Software Development Management Plan and Project Management Plan
- Scope Management
- Software Time Management
- Software Cost Management
- Software Risk Management
- Software configuration Management
- Software Release and Deployment Management
- Software Quality Management
Dependability and Security Assurance
- Managing Risks from Vulnerable Software
- Software Security Vulnerabilities
- Sources of Source Code Security Vulnerabilities
- Framework for Software Security Assurance
- Risk Assessment
- Vulnerability Management
- Security Standards
- Ongoing Assessment and Assurance
- Roles and Responsibilities
- Vulnerabilities in Web Applications
- Security, Reliability and Practices
- Roles and Responsibilities for Software Security Assurance
Software System Configuration Management
- Software Configuration Management Definition
- Software Configuration Item
- Software Configuration Management Directory
- Disciplines in Software Configuration Management
- Software Configuration Management for Different Software Environment
- Automated Tools for Software Configuration Management
- Software Configuration Management Planning
Software System Quality Management
- Software Quality Management
- Fundamentals of Software Quality
- Quality control and Reliability
- Quality Management System
- Defect Analysis
- Software Quality Assurance
- Statistical Software Quality Assurance
- Software Reliability
- Software Safety
Agile Software Systems Engineering
- Principles of Agile Methods
- Agile Method Applicability
- Agile Methods and Software Maintenance
- Plan Driven and Agile Development
- Extreme Programming
- System Engineering for Agile Software Development
- Agile System Engineering Processes
- Systems Engineering Agile Systems
Agile Software Development
- Agile Process Philosophy
- Agile Software Development Methodologies
- Extreme Programming
- Dynamic System Development Method
- Adaptive Software Development
- Crystal Methods
- Scrum
- XP
- Agile Unified Process
- Lean Software Development
- Feature Driven Development
- Business Benefits of Software Agility
- Rational Unified Process (RUM)
Verification and Validation
- Software Inspections
- Design Reviews
- Formal and Informal Reviews
- Software Testing
- Software Test Techniques
- Software Test Tools
- Software Demonstration
- Software Prototyping
- Software Simulation
- Independent Verification and Validation
Software Construction
- Code Complexity
- Coding Process
- Requirements for Coding
- Assessing Code Quality
- Developing Code Standards
Distributed Software Systems
- Concept of distributed software
- Distributed system characteristic
- Resource sharing
- Concurrency
- Scalability
- Fault tolerance
- Transparency
- Disadvantages of distributed software systems
- Distributed system architectures
- Multiprocessor architecture
- Client server architecture
- Distributed object
- COBRA
- Object request broker
Hands-on and In-Class Activities
- Labs
- Workshops
- Group Activities
Sample Workshops and Labs for Introduction to Software Engineering
- Role of Software Case Study
- Waterfall Model Example
- Software Crisis for a Given Scenario
- Plan Driven Software Development versus Agile Driven Development
- Personal Health monitoring
- Software Development Model Case Study
- Requirement Development Experiment
- Parking Garage Automation
- Traffic Monitoring
- Requirement Elicitation Case Study
- Software Design Example
- Restaurant Automation Example
- Multiprocessor Traffic Control System Example
- A Client Server ATM System
- Software Performance Testing Case
- Internet Banking System
- Workshop on How to Write a Software Project Proposal
Reliability Engineering Principles Training for Managers Course Description
Reliability Engineering Training for Managers, covers the basic principles, concepts, practical problem solving techniques, and a brief review of statistical calculations. Because this training is designed for non-engineers who often don’t have a strong background in math, the focus of training is mostly on principals of reliability engineering and problem solving practices and less on statistics and mathematical models. Reliability Engineering Principles (REP) Training hands-on training will assist you to enhance your business performance by cutting the costs associated with unreliability. REF training will teach you how to apply reliability tools to identify and resolve cost issues rather than functioning as technical miracles.
Learn About:
- Mean time frame between failures events
- TPM relationship with reliability principles
- Analyzing reliability data
- Weibull failure
- Monte Carlo simulations
- Pareto distributions
- Fault tree analysis
- Design review
- Load/strength interactions
- Sudden death and simultaneous testing
- Reliability growth models and displays
- Reliability strategies and standards
- Reliability audits
- Bathtub curves
- Effectiveness: availability, reliability, maintainability, and capability
- Weibull, normal, & log-normal probability plots
- Decision trees merging reliability and costs
- Critical items highly impacting safety/costs
- Failure rate
- Prediction
- Availability vs. Reliability
- MTTF, MTBF, and MTTR
- FMEA
- FMECA
- FTA
- RBD
- QFD
- Reliability testing strategies
- Accelerated testing
- Failure recording, analysis, and corrective action
- Contracting for reliability
- Management’s role in reliability improvements
TONEX REP Training Framework
- Long on concepts and problem solving techniques, short on math and statistics
- Fun, interactive, dynamic class
- Including labs, group activities, and hands-on workshop
Audience
Reliability Engineering Principles Training is a 3-day course designed for:
- Project managers
- Business owners
- Safety managers
- Quality managers
- Reliability managers
- Production/design managers
- Warranty analysts
- Problem-solving team personnel
- Asset reliability managers
- Capacity and predictive maintenance managers
Training Objectives
Upon the completion of Reliability Engineering Principles training for non-engineers, attendees are able to:
- Describe the bases, rationale, and concepts of reliability engineering
- Use the most relevant probability distribution to measure model times to failure
- Articulate the relationship between the time to failure distribution, the reliability function, and the hazard rate
- Estimate reliability values from test data and identify confidence limits on the results
- Use required tools to ensure a reliable product
- Explain the differences between assessing the reliability of a fixable and non-fixable systems
- Derive and sustain a strategic reliability engineering
- Derive control protocols to reduce risks and increase asset use
- Develop predictive strategies
- Construct an efficient predictive maintenance process
- Establish a root cause analysis procedure to reduce the wasted time, increase productivity, and a culture of continuous improvement
Course Outline
Overview of Reliability Engineering Principals
- What are the reliability engineering principals?
- Why reliability is important?
- Impact of reliability on the system
- Reliability dictionary
- Why would you want to enhance reliability?
- Reliability is art as well as science
- Predictive techniques
- Reliability improved system features
- Availability
- Maintenance management policies
Reliability Risk Assessments
- Engineering techniques
- Reliability hazard analysis
- Failure mode and effects analysis (FMEA)
- Fault tree analysis (FTA)
- Reliability Centered Maintenance (RCM)
- Load and material stress
- Fatigue and creep analysis
- Human error analysis
- Manufacturing defect analysis
- Reliability testing
Measuring Reliability
- Requirements
- The bathtub curve
- Life distributions
- Distribution functions
- Particular life distributions
- Modeling system reliability
- Series systems
- Active redundancy
- M-out-of-N redundancy
- Reliability prediction
Design for Reliability (DoE)
- Life cycle
- Reliability approaches
- Top-down methods
- Bottom-up methods
Reliability Engineering Actions
- Maintenance Prevention
- LCC Assessment
- Positive Maintenance
- Capital Equipment Replacement
- Cost/effective estimation
Working with Reliability Engineering Tools
- Attaining reliability associated data
- Reliability indices
- Decision trees
- Availability concepts, effectiveness equation and costs
- Probability plots
- Bathtub curves
- Pareto distributions and critical items lists
- Reliability block diagrams
- FMEA
- FMECA
- FTA
- Design reviews
- Vendor and parts control
- Thermal analysis (TA)
- Environmental stress screening (ESS)
- Crow/AMSAA reliability growth models
- Reliability strategies
- Benchmarking reliability
Essential Principles of Reliability Investigation
- Non-Probabilistic Reliability Methods
- Probabilistic Reliability Methods
- Historical Frequencies
- Manufacturers’ survivorship/mortality curves
- Expert Opinion Elicitation (EOE)
Warranty and Maintenance
- Product warranties review
- A review of maintenance
- Warranty and corrective maintenance
- Warranty and preventive maintenance
- Extended warranties and service contracts
- Stochastic point processes
- Perfect maintenance
- Minimal repair
- Imperfect or worse repaid
- Complex maintenance policy
- Reliability growth
Preventive Maintenance Models
- Block replacement models
- Age replacement models
- Ordering models
- Inspection models
Maintenance and Optimum Policy
- Replacement policies
- Preventive maintenance policies
- Inspection policies
Accelerated Life Testing
- Design of accelerated life testing plans
- Accelerated life testing models
- Extensions of the proportional hazards model
Human and Medical Device Reliability
- Human and medical device reliability terms and definitions
- Human stress—performance effectiveness, human error types, and causes of human error
- Human reliability analysis methods
- Human unreliability data sources
- Medical device reliability related facts and figures
- Medical device recalls and equipment classification
- Human error in medical devices
- Tools for medical device reliability assurance
- Data sources for performing medical device reliability
- Guidelines for reliability engineers with respect to medical devices
Probabilistic Risk Assessment
- Probabilistic risk assessment methodology
- Engineering risk vs environmental risk
- Risk measures and public impact
- Transition to risk-informed regulation
- Some successful probabilistic risk assessment applications
- Comments on uncertainty
- Deterministic, probabilistic, prescriptive, performance-based
Random-Request Availability
- System description and definition
- Mathematical expression for the random-request availability
- Numerical examples
- Simulation results
- Approximation
Failure Reporting and corrective action system (FRACAS)
- Definition of FRACAS
- Closed Loop Reporting System
- FRACAS Procedure
- Failure Identification
- FRACAS Process
- FRACAS Responsibilities
- Keys players
- How to prepare it
- Role of Engineering Managers and Program/ Project Managers
- Role of Reliability and Maintainability Engineers
- System Maintainers and Production/ QA Staff
- Integration & Test Engineering
Reliability Management
- Key aspects of reliability management
- Reliability plan elements
- Best practices
DoDAF 2 training, DoD Architecture Framework Version 2.0, advanced course and workshop focuses on creating and building DoDAF 2.0 viewpoints based on a selected project. DoDAF 2.0 Training also focuses on teaching the students how to create and model architecture data.
Through the selected projects, data will be collected, organized, and stored by a wide range of architecture tools developed by sources and organized using the DoDAF Meta-model (DM2).
Why DODAF 2 Training with TONEX?
TONEX Advanced DoDAF 2.0 training will help the students to create their own viewpoints based on a common denominator across their domain and boundaries. This is a 100% hands-on and project based.
Other Related DoDAF Training Courses
DoDAF 2.0 Training Workshop
After extensively covering architecture development with DoDAF, the DoDAF Training will focus on DoDAF 2.0 viewpoints and models. After briefly introducing the attendees to each model, the students will master how to create viewpoints and views using a real project (Scenario based) through various roles such as operators, PM and EA.
DoDAF six-step process recommended as best practice by enterprise architecture team. There are collaborative efforts were undertaken between:
- Program Management Team
- Enterprise Architecture Team
- Operational Team
- System and Engineering Team
- Compliance Team
Using DoDAF Six-Step Development Process, the attendees will create DoDAF 2.0 Viewpoints.
Bluetooth Smart Technology Training or Bluetooth Low Energy Training
Bluetooth® Smart (low energy) technology, also known as BTLE or Bluetooth Smart used in high-end smart-phones, smart mobile devices, sports devices, sensors, medical devices, IoT and other smart devices. Bluetooth® Smart technology allows users to connect their smartphones, tablets or other to the future 50 billions of smart devices by 2020. Bluetooth Smart Technology Training is a technical course covering all aspects of Bluetooth Core and enhancements for Smart Technology (Low Energy).
Learning Objectives
Upon completing this course, the attendees will be able to:
- Understand the link between Bluetooth and Bluetooth Smart or Low Energy standards
- List the relevant features and technologies for Bluetooth Smart
- Explain the different deployment scenarios for Bluetooth an Bluetooth Smart
- Describe the underlying technologies and protocols related to Bluetooth Smart
- Explain protocols used in Bluetooth Smart including: Physical Layer, Link Layer, Direct Test Mode, L2CAP for Low Energy, GAP for Low Energy, Generic Attribute Profile (GATT)
- Security and AES Encryption and Security Manager (SM)
- Explain the security features and protection mechanisms relevant for Bluetooth Smart deployments
- Explain the future technology and application trends in Bluetooth Smart
- Bluetooth Smart training course is intended for Engineers and Non-Engineers looking to gain a technical understanding of Bluetooth Smart and its future trends
Course Content
Overview of Bluetooth Technology
- Technology Overview
- Bluetooth Core Specification
- Overview of Operations
- Core System Architecture
- Profiles Overview
- What is Bluetooth Smart (Low Energy)?
- Remote display profile
- Sensor profile
- Classic Bluetooth Technology Security
- Bluetooth Smart Technology Security
Overview of Bluetooth Smart (Low Energy) features
- Active slaves
- Application throughput
- Basic Rate and Low Energy
- Regulatory aspects
- Combined Core Configuration
- Distance/Range
- Electrostatic discharge
- Ultra-low peak
- Frequency band
- Frequency tolerance
- Immunity tests
- Latency (from a non-connected state)
- Cost
- Maximum conducted output power
- Modulation
- Multi-vendor interoperability
- Network topology
- Over the air data rate
- Peak current consumption
- Power consumption
- Power spectral density
- Primary use cases
- Profile concept
- RF electromagnetic field
- Robustness
- Security
- Service discovery
- Spurious conducted emissions
Bluetooth Smart Protocols
- Physical Layer
- Link Layer
- Enhancements to HCI for Low Energy
- Direct Test Mode
- Security and AES Encryption
- Enhancements to L2CAP for Low Energy
- Enhancements to GAP for Low Energy
- Generic Attribute Profile (GATT)
- Security Manager (SM)
Bluetooth Smart Link layer specification
- Low power idle mode operation
- Device discovery
- Reliable point-to-multipoint data transfer
- Advanced power-save
- Advanced encryption functionalities
- Single mode and dual mode
Bluetooth Configuration
- Core Configurations
- Basic Rate Core Configuration
- Enhanced Data Rate Core Configurations
- High Speed Core Configuration
- Low Energy Core Configuration
- Basic Rate and Low Energy Combined Core Configuration
- Host Controller Interface Core Configuration
Generic Attribute Profile (GATT)
- Adopted GATT based Bluetooth Profiles and Services
- Service-based architecture based on the attribute protocol (ATT)
- GATT Architecture
- Profiles
- Applications
- Generic Access Profile
- Generic Attribute Profile
- Attribute Protocol
- Security Manager
- Logical Link Control and Adaptation Protocol
- Host Controller Interface
- Link Layer
- Direct Test Mode
- Physical Layer
GATT-Based Specifications
- Client
- Server
- Characteristic
- Service
- Descriptor
- UUID discovery for all primary services
- Find a services
- ANP (Alert Notification Profile)
- ANS (Alert Notification Service)
- CTS (Current Time Service)
- DIS (Device Information Service)
- FMP (Find Me Profile)
- HTP (Health Thermometer Profile)
- HTS (Health Thermometer Service)
- HRP (Heart Rate Profile)
- HRS (Heart Rate Service)
- IAS (Immediate Alert Service)
- LLS (Link Loss Service)
- NDCS (Next DST Change Service)
- PASP (Phone Alert Status Profile)
- PASS (Phone Alert Status Service)
- PXP (Proximity Profile)
- RTUS (Reference Time Update Service)
- TIP (Time Profile)
- TPS (Tx Power Service)
Mobile Bluetooth Development
- Overview of iOS Bluetooth development
- Overview of Bluetooth development on Android
Supply Support Logistics Course, SSLC Training Course
Supply Support Logistics Course provides an intensive training program designed to provide participants with an appreciation of the complexities and inter-relationships of efforts required to achieve and maintain supply support objectives for equipment/systems and alteration/modifications for Ships, Carriers, Submarines and Shore Sites.
Learn about:
- Logistics & Supply Management
- Acquisition Logistics Overview
- Role of Defense Logistics Agency (DLA), Performance-Based Agreement Toolkit and OSD Supply Chain Integration
- Principles of logistics as a multi-functional, technical management discipline
- Design, development, test, production, fielding, sustainment, and improvement modifications of DoD systems
- System’s life-cycle costs
- Operations and support costs
- Support considerations and system’s design requirements
- Support throughout its life-cycle
- Product Support elements
- Initial fielding and operational support of the system
- Role of Program Manager (PM) and Product Support Manager (PSM)
- Operating & Support (O&S) phase
- Employing Performance-Based Life-Cycle Product Support
- Sustainment Metrics
- Materiel Availability, Supportability and readiness to the user
The main elements of Acquisition Based Logistics are covered including
- Contractor Logistics Support
- Integrated Logistics Support (ILS)
- Life-Cycle Sustainment
- Performance-Based Logistics
- Supply Chain Management
- Supply Management
- Standardization
- Reliability
- Data Management
- Sustainment Metrics
- Just-in-Time (JIT) Inventory
- Life-Cycle Signature Support Plan (LSSP)
- Life-Cycle Sustainment Plan (LCSP)
- Product Support Strategy
- Support Concept
- Supportability
Learn about Defense Acquisition References including:
- DoD Directive 5000.01 “Defense Acquisition System
- MIL-Handbook 502 “DoD Handbook Acquisition Logistics
- Product Support Managers Guidebook
- DoD Logistics Assessment Guidebook
- Integrated Product Support Element Guidebook
- Naval Aviation Systems Team Acquisition Logistics Support Plan Guide
- Life Cycle Sustainment Plan (LCSP) Content Guide
- Flexibility Sustainment Guide
- Performance Based Logistics: A Program Manager’s Product Support Guide
- Performance Based Logistics (PBL) Guidebook
- Performance-Based Agreement Toolkit
- Introduction to Operational Availability
- Air Force Life Cycle Logistics Workforce Guidebook
- DoD Logistics Transformation Strategy “Achieving Knowledge-Enabled Logistics
- DoD Directive 4140.1 “Supply Chain Management Policy
- DoD 4140.1R “Supply Chain Materiel Management Regulation
- OSD “A Guide to Increased Reliability and Reduced Logistics Footprint
Supply Support Logistics Course will help participants understand Navy and Department of Defense (DoD) supply support elements which include:
- acquisition logistics;
- maintenance planning;
- provisioning;
- alteration installation management;
- equipment/ship configuration management;
- ship/equipment alteration development;
- allowance development;
- General Fund (GF) and Capital Fund (CF) material asset management;
- material handling/storage and material outfitting.
Supply Support Logistics Training will focus on Government Furnished Equipment/Systems (GFE) and their alterations / modifications and cover the above supply support elements for GFE equipment/systems and alteration/modifications being installed on Ships / Carriers / Submarines during new construction, Navy modernization periods, and pier side alteration installation team (AIT) installations. It will also include all shore based activity functions in obtaining supply support objectives and goals.
The course will cover policies, procedures, databases, and processes, which contribute to, or function within, the overall Product Support Management (PSM) of Carriers, Ships, Submarines, and Weapon Systems/Equipment in the Navy; and include:
- design interface;
- sustaining engineering;
- supply support, maintenance planning and management;
- Packaging, Handling, Storage, & Transportation (PHS&T);
- technical data;
- support equipment;
- training and training support;
- manpower and personnel;
- facilities and infrastructure;
- computer resources;
- alteration installation management,
- ship/equipment alteration development,
- provisioning, equipment/ship configuration management;
- allowance development;
- and material outfitting process.
Additionally, training on Navy alteration installation management; ship/equipment alteration development; planning yard process; and the Navy Modernization Process Management and Operations manual will be covered.
The course will review policies, procedures, databases, and processes, which contribute to, or function within the overall supply support objectives of the Navy to include the goals and objectives for new equipment/system acquisitions; alteration/modifications; new ship construction; Navy modernization process and shore activity functions and policies for the Inventory Locator Service (ILS) certification goals for supply support for provisioning, equipment / ship configuration management; GF material asset management; and material outfitting process for Ships, Carriers and Submarines.
Other Topics covered:
- DoD Supply Chain Materiel Management Procedures
- DoD 4140.01
- Operational Requirements
- Demand and Supply Planning
- Materiel Sourcing
- Make and Maintain Materiel
- Delivery of Materiel
- Materiel Returns, Retention, and Disposition
- Supporting Technologies
- Materiel Data Management and Exchange
- Materiel Programs
- Metrics and Inventory Stratification Reporting
- Management of Critical Safety Items, Controlled Inventory Items Including Nuclear Weapons-Related Materiel
- Management of Bulk Petroleum Products, Storage, and Distribution Facilities
- Defense Integrated Materiel Management for Consumable Items
- Shelf-Life Item Management Manual: Program Administration
- Shelf-Life Item Management Manual: Materiel Quality Control Storage Standards
- DoD 4140.65-M Compliance For Defense Packaging: Phytosanitary Requirements for Wood Packaging Material (WPM)
- Integrated Materiel Management of Nonconsumable Items
- Defense Materiel Disposition Manual
- Defense Demilitarization: Program Administration (Incorporates and cancels DoD 4160.21-M-1)
- Defense Transportation Regulation (DTR)
- DODM 5100.76 Physical Security of Sensitive Conventional Arms, Ammunition, and Explosives
- DoD 5105.38-M Security Assistance Management Manual
- DoD 5160.65-M Single Manager for Conventional Ammunition (SMCA)
- DoDM 5200.01 DoD 5200.01-R has been reissued as DoDM 5200.01
- DOD INFORMATION SECURITY PROGRAM: OVERVIEW, CLASSIFICATION, AND DECLASSIFICATION
- DOD INFORMATION SECURITY PROGRAM: MARKING OF CLASSIFIED INFORMATION
- DOD INFORMATION SECURITY PROGRAM: PROTECTION OF CLASSIFIED INFORMATION
- DOD INFORMATION SECURITY PROGRAM: CONTROLLED UNCLASSIFIED INFORMATION (CUI)
- DoD 5200.02-R Personnel Security Program
- DoD 5200.08-R Physical Security Program
- DoD 7000.14-R Department of Defense Financial Management Regulation (FMR)
Logistic Support for Government Furnished
- GFAE: Government-Furnished Aeronautical Equipment
- GFE: Government-Furnished Equipment
- GFF: Government-Furnished Facilities
- GFI: Government-Furnished Information
- GFM: Government-Furnished Material
- GFP: Government-Furnished Property
- GFS: Government-Furnished Software
TARGET AUDIENCE
Government Civilian, Military, and Navy support contractor personnel, Department of Defense Contractors (Equipment / System Contractors, Shipbuilders and Ship Repair Contractors)
Root Cause Analysis Training is in great demand in many diverse industries. TONEX’s unique, highly personalized Root Cause Analysis training will enhance and accelerate your current understanding of Root Cause Analysis, will allow you to improve technical depth and greatly widen your technical effectiveness in the Root Cause Analysis and other relevant fields.
This updated and expanded Root Cause Analysis Training course covers the fundamentals and many different tools and methods for root cause analysis. The Root Cause Analysis Training Course is presented as a general description of the root cause analysis , methods and tool, its purpose and typical industry domain and applications, the procedures, an example of its use, a checklist to help the attendees to make sure it is applied properly, and TONEX root cause analysis roadmaps, forms and templates.
What will Root Cause Analysis Training cover?
- Understand what Root Cause Analysis is
- Root Cause Analysis Methods and Techniques
- How to Start and Complete Root Cause Analysis
- Learn about Methods of Root Cause Analysis
- Explains expressed RCA as a holistic approach and analytical and creative thinking tools
- Techniques and tools to incorporate elements of equipment, process, environment and human reliability
- Enhance problem-solving and trouble-shooting effectiveness
- Plan and create model for in-depth analysis of problem situations.
- Human-error reduction strategies and processes involved with decision making
- Investigation techniques and failure-scene investigation methods also known as evidence gathering
- Use the tools available for analysis of problem situations
Topics Covered
- Introduction to the Field of Root Cause Analysis
- Principles of Root Cause Analysis (RCA)
- Root Cause Analysis (RCA) Methodologies
- Comparing Different Root Cause Analysis (RCA) Methodologies
- Failure Classification
- Root Cause Analysis as an Approach
- Opportunity Analysis
- The ‘5 Whys’
- Fishbone Diagrams
- Histograms
- Pareto Charts
- Cause and Effect Diagrams
- Run Charts
- Scatter Diagrams
- Flow Charts
- Control Charts
- Common Mistakes
- Unmanageable Conclusions
- Preventative Action
- Cause and Effect Principles
- Cause and Effect Analysis
- Charting Exercises
- Solutions thru Critical Thinking and Creativity
- Guidelines for Group Facilitation
- Corrective and Preventive Action (CAPA)
- CAPA in Site Management
- Incident Investigation
- Mapping & reporting software
Course Agenda
Introduction to Root Cause Analysis (RCA)
- What is Root Cause Analysis?
- When Do We Use It?
- What happened?
- How did it happen?
- Why did it happen?
- What can be done to prevent it from happening again?
- Basic Steps of RCA
- Gather the facts using a timeline and interviews
- Understand what happened
- Identify root causes
- Develop a Risk Reduction Plan
- Evaluate effectiveness of actions
Essentials of Root Cause Analysis (RCA) Process
- Define the Problem
- Collect Data
- Walk-Through Task Analysis
- Human Factors Engineering
- Organizational Policy and Procedure
- Preparing for the Root Cause Analysis Process
- Root Cause Analysis Process
- Implementing the Action Plan
- Sharing Results of Improvement
Types of Root Cause Analysis (RCA)
- Safety-based RCA
- Production-based RCA
- Process-based RCA
- Systems-based RCA
Root Cause Analysis Methods
- What Are the Types of Causes?
- Causal Factor Category List
- Determine Causes of Event
- Problem detection challenges
- Problem detection methods
- Selecting the right tools
- Improving your root-cause analysis
- Step-method
- Why-Why
- 5-Why Method
- FMEA
- Process FMEA vs. Design FMEA
- Bow-tie
- Event Tree Analysis (ETA)
- Failure Tree Analysis (FTA)
- FMECA
- Interview
- Fishbone Diagram (Ishikawa)
- Criteria for Event Description
- Cause and Effect Analysis
- Techniques for Conducting Interviews
Root Cause Analysis Workshops and Group Projects
- Case studies
- Introduction of TONEX Root Cause Analysis Framework
- Identifying the questions to determine the root causes
- Identifying and addressing the root causes of critical incidents
- Initial Data Gathering Techniques
- Interactive Activities
- Identifying corrective and preventive actions
- Bring your own problem into the class
Activity-Based Intelligence Training, learn about Activity-Based Intelligence solution and gain the expertise that is changing how the Intelligence Community planning, reviewing, processing and analyzing critical intelligence data in real-time from sources such as ground, airborne, ocean, space-based electro-optical, infrared, hyper-spectral sensors and others. Activity-Based Intelligence (ABI) Training bootcamp covers all aspects of intelligence-oriented data analysis approaches for efficient, real-time data analysis. Learn about Activity-Based Intelligence (ABI) tools, principles, processes and skills for data analysis and more.
Activity Based Intelligence (ABI) has been defined and sponsored by the U.S. Office of the Director for National Intelligence and has been embraced by the major U.S. intelligence agencies and their intelligence activities such as:
- Air Force Intelligence
- Department of the Treasury
- Army Intelligence
- Drug Enforcement Administration
- Central Intelligence Agency
- Federal Bureau of Investigation
- Coast Guard Intelligence
- Marine Corps Intelligence
- Defense Intelligence Agency
- National Geospatial-Intelligence Agency
- Department of Energy
- National Reconnaissance Office
- Department of Homeland Security
- National Security Agency
- Department of State
- Navy Intelligence
Computer-assisted problem solving techniques and methodologies such as as ABI can impact intelligence analysis and make ie more efficient and timeliness since too much big data being collected for human analyst and sometimes it is impossible to see the big picture. We need to understand and take action upon historical, current and anticipated activities involving national or global security.
The intelligence extracted from ABI make it easier for analysts to identify potential adversaries and their targets. By organizing and collecting large volumes of collected data, relevant patterns can be recognized and eventual suspicious behaviors can be acted on before a possible threat is imminent. The intelligence communities have a stunning amount of critical data at their disposal collected and stored each second, however when analyzed correctly, this analytical data set can help accelerate mission outcomes to address emerging security threats, and quality of the analysis in real time.
Seeing the Big Picture Inside Activity Based Intelligence – Looking for the big picture
Inside Activity Based Intelligence, we as analysts are looking for any interesting connections, in any types of data that constantly being produced and updated.
Activity Based Intelligence (ABI) refers to a method that allows varied types of data, almost like searching for a needle in a haystack even when we don’t know that we are looking for a needle or that we will find it in a particular haystack, very interesting.
ABI, A paradigm shift in analyzing data, points to a multi-INT approach to activity and transactional data analysis to resolve unknown-unknowns, develop intelligence, and drive collection:
- Analyze large, diverse, known and unknown data streams in real time
- Understand principles behind Intelligence Gathering
- What is Activity Based Intelligence?
- How does Activity Based Intelligence work?
- ABI Uniqueness
- Analyze ABI tools and techniques
- Learn about Patterns of Life (PoL) analysis and ABI techniques applied
- Wide-area motion imagery (WAMI), Esri’s use of ArcGIS and MARINA
- Targeted Approach based on the Analysis of an individual Target’s Movements and Communications
- Collection of data of all sorts
- Use of a continuous influx of data and understanding how unconventional adversary networks operate
- Patterns of interaction and activity in a particular area or population
- Events, movements, measurements and transactions
- Audio, video, infrared, radar, multispectral imagery, and information from Signals, Human and Measurement and Signature Intelligence
- Geotags and metadata classification
- Geo-reference to Discover
- Integrate before Exploitation
- Sequence Neutrality
- Data Neutrality
- Why data is considered equally valuable, no matter its source
- Why classified intelligence is not prioritized over open source data
- Discovering Unknown
- Behaviors & Signatures
- Known Behaviors & Signatures
- Object-Based Production
- Activity-Based Intelligence
- Signature-Based Search
- Structured Observables
- I&W, Monitoring, Targeting
- Known Locations and Targets
- Unknown Locations & Targets
ABI Training Course Objectives
Upon completion of this course, the attendees will be able to:
- Define what ABI methodology and approach is
- Identify the motivating factors behind ABI
- Explain value proposition of ABI
- Define the key features of ABI
- List the functional requirements of ABI
- List the four pillars of ABI
- Compare and contrast ABI, big data, Patterns of Life (PoL) and data mining and analysis methods
- Define Extracting, Transforming, and Loading (ETL) operations
- List ABI technology capabilities
- Describe the important scenarios for ABI applied to intelligence or defense mission
- Practice using the ABI methodology
Who Should Attend
Project and Program Managers, Intelligence analysts, Business Developers, Defense Contractors, System Engineers, Software Developers or anyone other U.S. citizen who is interested in gaining key concepts and principles involved in Activity-Based Intelligence and their applications and impact to intelligence and defense missions.
Course Outline
Introduction to Activity-Based Intelligence (ABI)
- What is Activity-Based Intelligence (ABI)
- Activity-Based Intelligence (ABI) value proposition
- History of ABI
- Why ABI
- Pillars of the ABI Approach
- What is Patterns of Life (PoL)
- Multi-INT approach to activity and transactional data analysis
- How to resolve unknown-unknowns develop intelligence
- Data Discovery Patterns
- Data Discovery Strategies
- Integrated intelligence and information-sharing
- Geo-spatial intelligence (GEOINT)
- Human Domain Analytics (HDA)
- Open-source information
- HUMINT or classified intelligence
- Intelligence Taxonomy and Ontology
- Principals of Structured Observation Management (SOM)
- Principals of Object Based Production (OBP)
- Role of Flexible Content Management (FCMS)
- The ABI multi-Intelligence (multi-INT) approach
- TrueFoundation of ABI
- Unknown-Unknow Location vs. Behavior
- Value of knowledge management
Process Flow for Intelligence
- Key Intelligence Questions
- Understanding
- Living Knowledge
- Objects and Activities
- Associations and Attributes
- Foundation
- Georeference to Discover
- Advanced Analytics
- Knowledge Capture
Why ABI?
- ABI as an intelligence tool
- Application to the vast wash of metadata and internet transactions Scaling with data
- ABI came out of the realization that the
- Scheduled, targeted, stove-piped analysis and collection paradigm
- Discover entities without signatures.
- Analyzing vs. discovering data
- Improve collection efficiency & effectiveness.
- Volume, Velocity, Variety, Veracity
- Activity-based GEOINT vs, target-based GEOINT
- Monitor activity
- Analyze entities
- Anticipate behavior and patterns
- ABI and “pattern of life” analysis
ABI Key Elements
- Collect, characterize and locate activities and transactions
- Identify and locate actors and entities conducting the activities and transactions
- Identify and locate networks of actors
- Understand the relationships between networks
- Develop patterns of life
- Geo-reference to discover
- Sensor neutrality
- Sequence neutrality
Activity-Based Intelligence Methodology
- Intelligence collection cycle
- Analysis, production and operations process cycle
- Establishing the ABI Methodology
- ABI as an analysis methodology
- ABI vs. Big Data
- Methodology in Action
- ABI methodology
- Analytic processes applied to situational analysis
- Sequential and pillars
- Georeference to discover
- Spatially and temporally indexed data
- Integrate before exploitation
- Data (sensor) neutrality
- Sequence neutrality
Intelligence Discipline of Activity-based Intelligence (ABI)
- Focusing on the activity and transactions
- Geospatial domain actions
- Cyber, social, financial and commercial domains
- Big data, across all domains, as the substance for ABI analysis
- Focused intelligence analysis, within critical timelines
- Data and Knowledge Management for ABI
- Information about activities, transactions and entities
- Using activity data (and its related metadata)
- Why associating data is vital to ABI analytics
Activity-based Intelligence (ABI) Applied
- ABI and intelligence analysis
- Irregular warfare, counterterrorism, counterinsurgency and counter-weapons of mass destruction
- Geospatial analysis
- Human network analysis
- GIS Visualization
- Data forecasting and modeling
- Spatiotemporal analysis
- Tabular visualization
- Pivot tables
- Link analysis strategies
- Quantitative estimation
- Analytic modeling
- Ontology design
- Graph analytics
ABI and Effective Tactical Data Science
- Intelligence production cycle
- Core fundamentals of Gathering and Acquiring Data
- Geospatial data
- Extract, Transform and Load (ETL) Operations on data
- Geospatial Transformations
- Textual Transformations vs. Imagery Transformations
- Big Data and Artificial Intelligence: Intelligence Matters
- CRUD operations
- Difference between REST and CRUD
- Data objects vs. complex objects abstractions
- Example of MongoDB CRUD Operations
- Geospatial analysis methods
- Human network analysis methods
- Data forecasting and modeling
- Spatiotemporal analysis
- Tabular visualization
- Pivot tables
- Link analysis strategies
- Quantitative estimation
- Analytic modeling
Workshops and Hands-on Exercises
NERC CIP Training Bootcamp, a 5-Day Hands-on Cybersecurity Certificate
NERC CIP Training Bootcamp, North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) training bootcamp is a crash course style training program designed and crated to meet the needs of the electric in regards to CIP compliance: Cyber Security for NERC CIP Versions 5 & 6 Compliance.
Security specialists, CIP Senior Manager, analysts, designer engineers, system operators, directors of CIP compliance, VPs of operations.
NERC Critical Infrastructure Protection (CIP) training bootcamp is a 5-day crash course empowers attendees with knowledge and skills covering version 5/6 standards. NERC Critical Infrastructure Protection training bootcamp addresses the role of FERC, NERC and the Regional Entities.
Learn approaches for identifying and categorizing BES Cyber Systems and requirements tio implement and comply the standards including strategies for the version 5/6 requirements.
TONEX is the industry leader in Cyber Security and NERC CIP. Our courses are planned, designed and developed by NERC CIP experts in CIP implementation and audits.
Learn how NERC Critical Infrastructure Protection (CIP) requirements address physical security and cybersecurity of the critical electricity infrastructure of North America including:
- References to NERC CIP associated documents
- References to Implementation Plan for Cyber Security Standards
- References to Mandatory Reliability Standards for CIP
- Guidance for Enforcement of CIP Standards
- References to NERC CIP Rules
- Best practices for managing NERC Compliance
- Protecting: physical security, cybersecurity, emergency preparedness and response
- Business continuity planning, and recovery from a catastrophic event with emphasis on deterring, preventing, limiting, and recovering from terrorist attacks
- Sabotage Reporting
- Critical Cyber Asset Identification
- Security Management Controls
- Personnel & Training
- Electronic Security Perimeter(s)
- Physical Security of Critical Cyber Assets
- Systems Security Management
- Incident Reporting and Response Planning
- Recovery Plans for Critical Cyber Assets
- Deterring to dissuade an entity from attempting an attack
- Preventing to cause an attempted attack to fail
- Limiting to constrain consequences of an attack in time and scope
- Recovering – to return to normalcy quickly and without unacceptable consequences in the interim
- Operating, Planning, and Critical Infrastructure Protection Committee
- Security Guidelines
- Control Systems Security
- Cyber Security Analysis
- Operating Security
- Business Continuity Guideline
- Physical Security
- Protecting Sensitive Information
- Security Policy
- Bulk Electric System Security Metrics
- Personnel Security Clearances
- Compliance Enforcement and Input
Learn about:
- Concepts behind The Energy Policy Act of 2005 (Energy Policy Act)
- Concepts behind Federal Energy Regulatory Commission (Commission or FERC) authority
- Concepts behind Reliability of the bulk power system, commonly referred to as the bulk electric system or the power grid
- Concepts behind Mandatory cybersecurity reliability standards
- Energy Independence and Security Act of 2007 (EISA)
- Role of National Institute of Standards and Technology (NIST) for smart grid guidelines and standards
Who Should Attend:
- CIP Compliance
- IT cybersecurity
- ICS and SCAD cybersecurity
- EMS cybersecurity
- Field and security operations
- Incident response
- Project managers
- CIP Auditors
- Any other staff from electrical utilities who are maintaining cyber security standards across their enterprise and substations
- Generation, transmission and distribution staff working to meet NERC CIP standards
Program Learning Objectives:
- Discuss requirements for reliable operation of the Bulk Electric System
- List CIP categories of assets to which CIP requirements apply
- Describe asset classification criteria and tiers: High/Medium/Low
- List similarities and differences between CIP standards in version 5 and 6
- Describe NERC filings and FERC rulings on these standards
- Deep Dive into the CIP 5/6 requirements and obligations/expectations
- Discuss sabotage reporting process
- Describe identification and documentation requirements of the Critical Cyber Assets associated with the Critical Assets
- Describe roles and responsibilities for minimum security management controls to protect Critical Cyber Assets
- Discuss requirements for identification and protection of the Electronic Security Perimeters inside which all Critical Cyber Assets
- Describe implementation of physical security programs for the protection of Critical Cyber Assets
- Define methods, processes, and procedures for securing those systems determined to be Critical Cyber Assets
- Ensure the identification, classification, response, and reporting of cybersecurity incidents related to Critical Cyber Assets
- Ensure that recovery plans are put in place for Critical Cyber Assets and that these plans with established business continuity and disaster recovery techniques and practices
Program Coverage and Highlights of Enforcement:
- NERC CIP requirements
- HIghlights of NERC CIP 5 & 6
- Overview of Cyber Security for NERC CIP Versions 5 & 6 Compliance
- Asset Identification and Governance
- Access Control and Monitoring
- System Management
- Information Protection and Response
- CIP Process highlights
- BES Cyber System Categorization
- High and medium impact BES vs. low impact BES
- Operational Technology (OT) security
- Highlights of known ICS vulnerabilities
- Configuration Change Management & Vulnerability Assessments
- Cyber Security for NERC CIP Compliance
- Electronic Security Perimeter(s)
- Information Protection
- Incident Reporting and Response Planning
- Personnel & Training
- Physical Security
- Physical Security of BES Cyber Systems
- Recovery Plans for BES Cyber Systems
- Sabotage Reporting
- Security Management Controls
- System Security Management
- Best Practice specifications
- Reference Architecture
- Gap and Cyber Vulnerability Assessments
- Firewall/Network intrusion detection
- Access Management
- Centralized Patch Management
- Security Information & Event Management
- Automated Back-up & Recovery
- Network Segmentation
- Intrusion Prevention System (IPS)
- Protocol Inspection
- Security Factory Acceptance Testing (FAT)
- Multi vendor testing
- Cyber Asset Protection
- System Design, Reliability and Configuration
- Baseline Documentation
- Change Control Services
- Ports & services, applications & protocols
- Equipment changes
- Decommission plan
LTE Fundamentals Training, LTE Standards Training
LTE Fundamentals Training, LTE (long-term evolution) mobile communication system, standardized by 3rd Generation Partnership Project (3GPP), a united telecommunications standard development organizations (ARIB, ATIS, CCSA, ETSI, TSDSI, TTA, TTC).
TONEX has developed comprehensive LTE Training Programs to satisfy the
competence needs of professionals exploring new LTE business opportunities to expertise
required for operating a LTE network.
Learn the fundamentals of the LTE services, features, network architecture, radio interface and the evolution of 4G telecommunication and LTE-Advanced.
LTE Fundamentals Training – Course Description
LTE Fundamentals Training course covers the fundamentals of LTE features and procedures. It gives an in-depth high-level understanding of the LTE Systems, radio access and core network architecture as well as the EPS Bearer Service, End-to-End QoS, policy and security. Also covered in this course are the protocols used over LTE interfaces.
LTE Fundamentals Training course gives an overview of the fundamental technology of Long Term Evolution (LTE). Attendees will learn the basics of the LTE, LTE radio interface, including multiple input, multiple output (MIMO), OFDM, uplink and downlink, SIMO, TDD, FDD, channel coding and GSA.
Learn about LTE standards, LTE services and network technologies, including radio access, the core transport network, and service capabilities, codecs, security, quality of service (QoS) and hooks for non-3GPP radio access to the core network, and for interworking with Wi-Fi networks. Topics included: LTE Radio Access Networks (RAN), LTE/EPC Service & Systems Aspects (SA), LTE Core Network & Terminals (CT) and interworking with UMTS and GSM EDGE Radio Access Networks (GERAN).
LTE Fundamentals Training discusses all aspects of high bitrates in IP communications with Fourth Generation Mobile Communications/LTE and various aspects of LTE including change of business and service paradigm, which it is bringing to mobile communications and M2M/IoT. LTE Fundamentals Training is a rich content training course developed and delivered by knowledgeable instructors and consultants focused on the entire mobile communication community.
LTE Fundamentals Training coverage also includes: LTE services, standards and architecture, Radio access sub-system, Evolved Packet Core (EPC), Signaling on the radio path, Macrocells, microcells, femtocells, SIM card and security, location based driven applications, and much more more.
Target Audience
The target audience for LTE Fundamentals Training course is: Business and Operations Professionals, HR, Network Engineers, Systems Engineers, Service Engineers, Service Design Engineer, and Network Design Engineer
Learning Objectives
Upon completion of completing this course, attendees will:
- Understand what LTE and EPC are
- Explain the evolution of cellular networks GSM, WCDMA, CDMA, TD-SCDMA, LTE and LTE-Advanced
- Compare and contrast Service functionalities of LTE and GSM, CDMA, 1xEV-DO and UMTS
- Understand LTE standardization and the role of 3GPP
- Discuss LTE service and business environment
- List LTE and EPC terminology, services and features
- Identify the key goals, functions and requirements of LTE and EPC
- List LTE Radio Fundamentals, Spectrum, Standards, Network Technologies, Architectures, Generations, Terminals & Devices
- Identify Key LTE Carriers, Network Operators & Resellers
- List necessary functions for LTE and EPC implementation
- Describe the key technical components of LTE and EPC
- Explore the role of LTE and EPC in future wireless deployments
- Discover voice and video over LTE requirements and implementation
- Compare and contrast Service functionalities of LTE and LTE-Advanced
- Gain a high level understanding of Voice and Video over LTE profiles
- Examine the future of LTE, LTE-Advanced, Voice over LTE (VoLTE) and Video over LTE (ViLTE)
- Explore the role of LTE and EPC in future M2M and IoT deployments
Course Outlines
LTE Overview
- What is LTE?
- LTE Standardization
- 3rd generation partnership project (3GPP)
- 3GPP history
- 3GPP, the current organization
- 3GPP releases
- GPP LTE release and beyond (LTE-advanced)
- IMT-advanced process
- LTE Market Trends
- Key LTE Business Challenges
- End User LTE Services and Applications
LTE Architecture Overview
- Overall high level description of LTE
- LTE performance
- FDD, TDD, LTE advanced
- Frequencies for LTE
- Basic parameters of LTE
- Radio access subsystem: E-UTRAN (also called EUTRA) E-UTRAN characteristics
- E-UTRAN interfaces
- Macrocells, microcells and femtocells
- Core network
- LTE network elements
- Functional split between the E-UTRAN and the EPC
- LTE – roaming architecture
- LTE network mobility management
- Role of IMS in LTE/EPC
- Voice over LTE (VoLTE)
- Video over LTE (ViLTE)
- SIM, USIM and ISIM
LTE Network Deployment considerations
- LTE Radio Network Considerations
- Transport Network Considerations
- LTE/EPC Core Network Considerations
LTE Radio Technology
- E-UTRAN (Evolved UTRAN)
- What is OFDM/OFDMA?
- OFDM (Orthogonal Frequency Division Multiplexing)
- SC-FDMA (Single-Carrier Frequency Division Multiple Access)
- FDD and TDD
- OFDMA advantages
- LTE channel: bandwidths and characteristics
- OFDM applied to LTE
- MIMO (Multiple Input Multiple Output)
- General facts behind MIMO
LTE Flat IP Core Network
- Fixed mobile convergence
- IP multimedia subsystem (IMS)
- General description of IMS
- Session Initiation Protocol (SIP)
- IMS components and interfaces
- Evolved packet system in GPP standards
- Policy and charging rules function (PCRF)
- Enhanced voice quality
- Circuit-switched fallback (CSFB)
- Simultaneous voice and LTE (SVLTE)
- Voice over LTE (VoLTE)
- Over-The-Top (OTT) applications
LTE Protocols and Procedures
- LTE RAN protocols and procedures
- Mobility in LTE
- LTE Systems radio access network architecture
- QoS in LTE
- Policy and charging
- LTE security
- Principles of LTE security
- LTE EPC security
- SIM card physical interface
Why should you choose TONEX LTE Training?
LTE Training by TONEX is an intensive learning experience that cover the essential elements of Long Term Evolution (LTE). LTE Training Crash Course covers the foundation of LTE, LTE RAN, concepts behind OFDMA/SC-FDMA, Overview of MIMO, LTE Cell Planning, LTE Capacity Planning, EPC, IMS, Diameter, EPC Signaling, Security, Voice over LTE, LTE-Advacned, LTE Backhaul (both Microwave and Metro Ethernet), PPE-TE, MPLS-TP and more.
TONEX Long Term Evolution (LTE) training crash course – bootcamp introduces LTE and related technologies required to plan, design, implement and manage the evolution route for wireless and cellular network operators towards 4G broadband mobile networks. These courses range from basics technological overview programs to detailed engineering and design LTE courses.
TONEX has been involved with over couple of dozens of LTE deployment worldwide, doing training for the engineers and non-engineers, LTE planning, architecture, systems engineering, design, implementation, security and OSS/network management.
LTE Training Boot Camp ® is the answer to your LTE-EPC/EPS technology needs. This innovative and intensive learning experience covers the essential elements of LTE and SAE/EPC/EPS in a nutshell by the industry experts.
Here is the schedule you can expect to follow during your boot camp:
Overview. We begin the seminar with an overview of LTE, its recent progression and what to expect during the seminar.
Body of Class. Throughout the seminar, we add a lot of detail to what we talked about in the overview. Expect comprehensive information that is current and relevant. Also expect to engage in hands-on activities and other interactive, real-world examples that make sense out of the information.
Wrap Up. The specialty course comes to a close, and clients receive their certificates. Tonex provides both Tonex certificates and industry certificates for clients to have on file to show their completion of the LTE training programs.
By choosing Tonex for your company’s technology, management and training seminars, you are getting the most up-to-date, highest quality boot camps possible. Our LTE courses are specifically designed by experts in the field, and they are continuously evaluated to ensure they are up to date. Contact Tonex to learn more about our innovative LTE training courses and the difference they can make for your employees.
LTE (Long Term Evolution) Training Bootcamp can combine the following training modules into a 4-days intense bootcamp based on the customer needs and requirements:
- OFDM and MIMO
- LTE Air Interface and Core Network
- LTE Core Network Planning and Design
- LTE RF Planning and Design
- LTE Protocols and Signaling
- LTE RAN Signaling and Operations
- LTE RF Performance
- LTE QoS
- LTE Capacity Planning and Traffic Engineering
- LTE Security
- LTE GSM/UMTS and EV-DO (eHRPD) Interworking
- IPv6 and MPLS
- LTE-Advanced (R10)
- IMS and Voice over IMS for LTE-EPC
- Voice over LTE (VolTE)
- SMS over LTE
LTE Training Crash Course Outline (base):
- Introduction to LTE (Long Term Evolution)
- Overview of IP Convergence in the mobile networks
- Introduction to LTE (Long Term Evolution) and SAE/ePC/EPS
- LTE Network Architecture
- LTE Interfaces and protocols
- LTE Packet Core (SAE/EPC and EPS)
- LTE/SAE/EPC Network Architecture
- Evolved UTRAN and Evolved Packet Core
- LTE/EPC Interworking
- LTE Protocol Stacks
- LTE Interfaces covered in details
- LTE-EPC Signaling
- IMS (IP Multimedia Subsystem) in LTE
- Overview of Diameter Protocol
- Diameter Applications in IMS
- LTE Operations and Procedures
- LTE Planning and Optimization
- Ethernet Backhaul for LTE
- QoS Applied to LTE-EPC
- PCC (Policy and Charging Control
- LTE and EPC Security
- Overview of LTE Air Interface; Overview of OFDM and MIMO
- LTE RF Planning and Design
- LTE Backhaul Requirements
- LTE Backhaul Aggregation Network Technology
- Overview of LTE-Advanced
Who Should Attend
Engineers and Non-Engineers professionals who need a through understanding of LTE, EPC, Services, Protocols, RF and Core Planning and Design, Backhaul, Capacity Planning, QoS, Security, VoLTE and LTE-Advanced,
Objectives
Upon completion of this training, the attendees will be able to :
- Understand HSPA/HSPA+ and Migration to LTE/EPC/EPS
- Understand how Different End User Services are Performed in LTE/EPC/EPS
- Understand and Comprehend the basics of LTE/EPC/EPS
- Understand LTE Architecture, Protocols and Signaling
- Understand LTE Network Architecture and Protocols (Radio and Core)
- Understand the Main Functionality in the Evolved UMTS Radio Access Network, E-UTRA/E-UTRAN or LTE
- Understand LTE Multiple Access Methods: OFDMA and SC-FDMA and MIMO
- Describe Evolved Packet Core (EPC), SAE (System Architecture Evolution) and Evolved Packet System (EPS)
- Describe UTRAN, All IP Network (AIPN) and E-UTRA/E-UTRAN architecture
- Highlight E-UTRA Air Interface and physical layer (downlink and uplink) functionalities and procedures
- Highlight E-UTRA Layer 2 and 3 Signaling Functionalities and Procedures
- Highlight LTE Radio and Core Network Planning and Design Procedures
- Highlight LTE Backhaul Requirements
- Describe LTE Backhaul Aggregation Network Technology
- Understand LTE Traffic Engineering
- Identify LTE Interworking
- Identify the following aspects of LTE networks: Quality of Service (QoS), Call setup procedures, Mobility support, LTE and EPC Security Architecture
- Describe Call flows and operational scenarios in HSPA/HSPA+ and LTE
Outline
LTE Training Modules (Customizable based on attendee’s background, needs and objectives)
What is LTE (Long Term Evolution)?
- Evolution from GSM/GPRS and UMTS/HSPA to LTE and LTE Advanced
- GSM (Global System for Mobile Communications
- GPRS (General Packet Radio Service)
- EDGE and EDGE II
- UMTS (Universal Mobile Telecommunication System)
- HSPA/HSPA+
- LTE and LTE Advanced
Overview of IP Convergence in the mobile networks
- Wireless Internet Basics
- GSM/EGPRS/UMTS/HSPA/HSPA+
- Ethernet Backhaul for LTE
- LTE Protocols and Signaling
- Overview of LTE SAE, Evolved Packet Core (EPC) and EPS
- Overview of LTE-EPC Networks and Signaling
- LTE and 1x/1xEV-DO (eHRPD) Interworking
- LTE and GSM/UMTS Interworking
- IMS Architecture and Protocols Applied to LTE
- LTE and EPC Security
- QoS Applied to LTE-EPC
Introduction to LTE (Long Term Evolution) and EPC/EPS
- Long Term Evolution (LTE) as a new radio platform technology
- Support to achieve higher peak throughputs than HSPA+ in higher spectrum bandwidth
- LTE for mobile, fixed and portable wireless broadband access
- Optimized for IP-based traffic
- Increasing capacity
- Reducing network complexity
- Lowering deployment and operational costs
- Enhanced UMTS Air Interface (E-UTRA)
- System Architecture Evolution (SAE) and Evolved Packet Core (EPC)
- EUTRAN/LTE and the SAE/EPC as the Evolved Packet System (EPS)
LTE Network Architecture
- LTE Interfaces and protocols
- Introduction to E-UTRAN
- E-UTRAN network architecture
- E-UTRAN protocols
- Orthogonal Frequency Division Multiplexing (OFDM)
- Multiple Input/Multiple Output (MIMO)
- Architecture and node functions
- The LTE Evolved Packet System (EPS)
- LTE SAE Evolved Packet Core (EPC)
- LTE-EPC Network Architecture
- Network nodes and roles of HSS, MME, S-GW, P-GW, and PCRF
- Key interfaces: S1, S5, S6, S10 and S11
- Key features and services
LTE Packet Core (SAE/EPC and EPS)
- Mobility Management Entity (MME)
- User Plane Entity (UPE)
- Serving Gateway (S-GW), PDN-GW and enhanced Packet Data Gateway (ePDG)
- DIAMETER, IPv6, SIP, SCTP and SIGTRAN
- Role of IP Multimedia Subsystem (IMS)
- Co-existence and Inter-working with 3GPP Radio Access Technology (RAT)
- Architecture and migration
LTE/SAE/EPC Network Architecture
- New enhanced base station, “Evolved NodeB (eNodeB)
- LTE air interface and performs radio resource management for the evolved access system
- Access GateWay (AGW) and termination of the LTE bearer
- Key logical functions
- MME (Mobility Management Entity) for the Control
- SAE PDN GW (System Architecture Evolution Packet Data
- Network GateWay for the User Plane
- Comparing the functional breakdown with existing 3G architecture
- Radio Network elements functions,
- Radio Network Controller (RNC), the AGW and the enhanced BTS (eNodeB)
- Core Network elements functions
- SGSN and GGSN or PDSN (Packet Data Serving Node)
- Routers and the AGW
- Overview of E-UTRAN’s Logical, Transport and Physical channels UE protocol stack
- Changes in MAC, RLC, RRC, NAS and PDCP
Evolved UTRAN and Evolved Packet Core
- Basic Concepts: bearers, Quality of Service
- NAS (Non Access Stratum) Protocols – EMM and ESM
- EPS Mobility Management (EMM) Procedures
- ESM Session Management (ESM) Procedures
- GTP – the GPRS Tunneling Protocol
- GTP-C and GTP-u
- Main GTP Procedures for EPS
- Mobility in EPS
- Multimedia over IP and IMS Basics
- EPS Security Mechanisms
LTE/EPC Interworking
- Interworking with 3GPP IP-access
- Interworking with Non-3GPP IP-access
- PCC (Policy and Charging Control)
- X2, S1 and S11-interface protocol stacks
- E-UTRA Layer 3 Protocols (NAS and RRC)
- Non Access Stratum protocols and procedures (EMM and ESM)
- Idle mode mobility mechanisms
- NAS security mechanisms
- The S1 and S11-Interface
- S1 Application Protocol (S1AP) procedures
- The GTP version 2 protocol (eGTP)
- X2 Application Protocol (X2AP) procedures
- Data forwarding and in-order delivery of data PDUs at handover
- Role of SCTP and IPv6 in LTE-EPC
- End-to-end signaling and traffic flow
Overview of LTE and EPC Protocol Stacks
- LTE-Uu Interface Protocols
- MAC, RLC, PDCP and RRC
- UE states and state transitions (NAS and RRC)
- Radio Resource Control (RRC) procedures
- Packet Data Convergence Protocol (PDCP)
- Radio Link Control Protocol (RLC)
- Medium Access Control Protocol (MAC)
- E-UTRAN and NAS Protocols
- S1 and X2 interfaces and protocol stack
- NAS states and functions
- NAS messaging
- Network identities of UE and EPC
- Connected Mode and UE States
- Attach to the Network
- Selection of MME, S-GW, and P-GW
- Authentication and IP address allocation
- Default bearer setup and registration
- LTE-EPC Protocols
- NAS protocol states
- Role of EMM and ESM
- GTPv2-C, GTP-U, Proxy-MIP (PMIPv6)
Overview of LTE and EPC Interfaces
- S1: S1-MME/S1AP (eNB – MME)
- S1-U (eNB-SGW)
- S2A, S2B
- X2 (eNB – eNB)
- X2AP (X2 Application Protocol)
- S3 (S4 SGSN – MME)
- S4 (S4 SGSN – SGW)
- S5 (SGW-PGW)
- S6A (HSS – MME)
- S6B (PGW – 3GPP AAA)
- S6D (HSS – S4 SGSN)
- S8 (SGW – PGW)
- S9 (PCRF – PCRF)
- S10 (MME – MME)
- S11 (MME – SGW)
- S12 (UTRAN – SGW)
- GX (PCRF – PGW)
- GXC (PCRF-SGW)
- RX (PCRF – IP APPLICATION [P-CSCF FOR IMS])
- GR (SGSN – HSS)
- GN (SGSN – MME / SGSN – PGW)
- GP (SGSN – PGW)
- SGi
LTE-EPC Signaling Principals
- Network identities and UE identities
- Signaling bearers
- Data bearers, EPS bearers
- PDN connections and APNs
- Intra-LTE Mobility
- X2-based handovers
- Intra and inter MME handovers
- Intra and inter S-GW handovers
- Tracking area updates
- IMS and Support for Voice
- IMS and seamless mobility
- Circuit-Switched Fallback (CSFB)
- Voice Call Continuity (VCC)
- Single Radio Voice Call Continuity (SRVCC)
IMS (IP Multimedia Subsystem) in LTE
- IP Multimedia Subsystem (IMS) Architecture
- P-CSCF (Proxy Call Session Control Function)
- CSCF (Interrogating Call Session Control Function)
- S-CSCF (Serving Call Session Control Function)
- BGCF (Breakout Gateway Control Function)
- MGCF (Media Gateway Control Function) / MGW (IMS-MGW)
- IMS Signaling Protocols
- IMS Scenarios & Operations
- IMS Quality of Service
Overview of Diameter Protocol
- Diameter and Related Interfaces
- Diameter Protocol
- Diameter Node
- Diameter Peer
- Client
- Server
- Agent
- Relay Agent
- Proxy Agent
- Redirect Agent
- Diameter Applications in EPS
- Diameter in EPS
- S6a between MME and HSS
- S6d between S4-SGSN and HSS
- S13 between MME and EIR
- S13 ’ between S4-SGSN and EIR
- S9 between Visited PCRF and Home PCRF
- Gx between PDN-GW and PCRF
- Gxx (Gxa, Gxb, Gxc) for policy control
- Gy between PDN-GW and OCS
- Gz between PDN-GW and OFCS
- Rx between P-CSCF and PCRF
- Sp between PCRF and SPR
Diameter Applications in IMS
- LIA: Location-Info-Answer
- LIR:Location-Info-Request
- MAA: Multimedia-Authentication-Answer
- MAR: Multimedia-Authentication-Request
- PPA: Push-Profile-Answer
- PPR: Push-Profile-Request
- RTA: Registration-Termination-Request
- RTR: Registration-Termination-Request
- SAA: Server-Assignment-Answer
- SAR: Server-Assignment-Request
- UAA: User-Authorization-Answer
- UAR: User-Authorization-Request
LTE Operations and Procedures
- System acquisition
- Idle mode operations
- Synchronization
- Cell search and random access
- RRC connection establishment
- Traffic operations in DL & UL
- Bearer setup and handover
- Power control
- LTE/SAE signaling
- EPC (MME) registration
- Security procedures
LTE Planning and Optimization
- Traffic and QoS considerations
- Security considerations
- Capacity planning considerations
- Planning tools
- Antenna selections
- Site location and integration
Ethernet Backhaul for LTE
- Wireless Networks Backhaul Overview
- GigE and Metro Ethernet
- IP and MPLS/GMPLS
- Ethernet Backhaul for LTE
- Carrier Ethernet in IP Backhaul
- Circuit Emulation (CESoE) and Circuit Bonding
- LTE Backhaul Evolution Scenario
- LTE Backhaul Capacity Planning
QoS Applied to LTE-EPC
- General Requirements for LTE QoS
- End User Requirements for QoS
- LTE End-to-End QoS Architecture
- LTE Service Establishment and QoS
- LTE QoS Parameters
- The class of QoS
- Guaranteed Bit Rate (GBR)
- Level of latency (delays in packet transmission)
- Jitter (variation in latency)
- Dropped packets
- EPS bearers, SDFs and TFTs
- PCC Architecture
- Service based Local Policy (SBLP)
- Policy Control Function (PCF)
- Technical Requirements for LTE QoS
- LTE Bearer Service Attributes
- Mapping QoS to LTE Services
PCC (Policy and Charging Control
- PCC architecture
- Policy and Charging Control Architecture
- Policy and Charging Rules Function – PCRF
- Subscriber Profile Repository (SPR)
- Application Function (AF)
- Policy and Charging Enforcement Function (PCEF)
- Gx, Rx and Sp interfaces
- Policy Control
- QoS handling and authorization
- Charging Control
- Roaming Scenarios and the S9 interface
LTE and EPC Security
- LTE Security Architecture
- UMTS and HSPA/HSPA+ Security Features
- Security in E-UTRAN
- Security in EPC/EPS
- Authentication and Key Management (AKA)
- AKA Algorithms
- LTE Security Procedures
Overview of LTE Air Interface; Overview of OFDM and MIMO
- LTE Air Interface
- Basics of OFDM and OFDMA
- Basics of SC-OFDMA
- LTE DL OFDMA
- LTE UL SC-OFDMA
- LTE Antenna Considerations
- Principles of MIMO
- Radio Resource Management requirements
- The eNB host functions
- Radio Resource Management
- Radio Bearer Control
- Radio Admission Control
- Connection Mobility Control
- Dynamic Resource Allocation (scheduling)
LTE RF Planning and Design
- Overview of LTE Radio Network Design and Engineering
- Link Budget for LTE
- LTE Capacity Planning
- LTE Design and Site Selection
- LTE Configuration Parameters
- LTE Operational Parameters
- KPIs in LTE Radio Network
LTE Backhaul Requirements
- LTE Services
- LTE User Download Speeds
- Estimated Net LTE User Data Peak Rates
- LTE Cell Site Backhaul Requirements
- Topologies for LTE Backhaul
- Hub and Spoke
- Tree/Tiered Networks
- Mesh And Ring Networks
- Ring Network Topology
- LTE Capacity Planning Models
- Statistical Traffic Distribution
- Traffic Dimensioning
- Traffic Asymmetry
LTE Backhaul Aggregation Network Technology
- Technologies
- RPR
- IP/MPLS and TP-MPLS
- VPWS/VPLS/H-VPLS
- GMPLS
- PBB-TE
- EPON
- Microwave wireless
- QoS support
- Backhaul migration
- IP/Ethernet backhaul
- Phased migration options
- Backhaul Evolution Strategies for LTE Operators
- Intelligent mobile core platform
- Metro IP edge router platform and
- Intelligent network management system
- IP/MPLS-based backhaul platform
- IP/GMPLS-based backhaul platform
Overview of LTE-Advanced
- IMT-Advanced by the International Telecommunication Union (ITU)
- LTE-Advanced in 3GPP in Release 10
- LTE-Advanced to qualify as IMT-Advanced/4G
- LTE-Advanced as a further evolution of LTE, an OFDMA-based technology, specified in Release 8 and 9
- Evolution of current OFDMA approaches
- High-order MIMO (e.g., 4X4)
- Wider radio channels (e.g., 50 to 100 MHz)
- Optimization in narrower bands (e.g., less than 20 MHz) due to spectrum constraints in some deployments
- Multi-channel operation in either same or different frequency bands
- Ability to share bands with other services
- IMT-2000 and IMT-Advanced
- 450 MHz band
- UHF band (689-960 MHz)
- 2.3 GHz band
- C-band (3 400-4 200 MHz
Certified In-Building Wireless Network Design Training, A Hands-on Certification Training by TONEX – Earn 26 CE (PDH – Professional Development Hours from PIE)
Certified In-Building Wireless Network Design Training provides knowledge and skills for in building RF Engineering and Design. In-Building Wireless Training course will cover all the essentials aspects of the wireless indoor network planning, design, implementation, and optimization.
In-Building Wireless Training Program is designed to give you knowledge and skills in in-building wireless from concepts to optimization. The course modules are covering: indoor design concepts, planning, design, network deployment, installation and optimization process. Learn about indoor wireless planning, site surveys, design, project management, and commissioning of indoor systems including DAS (distributed antenna systems) and small cells.
Discover how to examine building layout, coverage and capacity requirements, and service objectives, to provide an affordable indoor design and solution. Guidelines and technical, product selection, installation, commissioning, performance, GoS, QoS, QoE, optimization, and complete documentation are included in our training solution to assure cellular/PCS, two-way radios, and other mobile devices work reliably in buildings, tunnels, bridges, airports, concert halls and sport venues.
Master your knowledge and skills to plan, design, implement and optimize indoor wireless and small cell networks. Learn about RF, radio waves, propagation, antennas, modulation, coding, services, architecture, design, capacity planning, verification, interference and various trends in-building technologies including DAS, WiFi, GSM, CDMA, 3G and LTE-Advanced.
Understand design and implementation of indoor wireless technologies, Distributed Antenna Systems (DAS) and small cell technologies. Discover methods and tools for indoor wireless planning, design, implementation, deployment and optimizations of indoor wireless and small cell networks.
During the training, we will work with real projects to evaluate the feasibility, coverage and performance of the indoor wireless network, write system requirements and specifications, verify and validate design, implement and optimize the solution and produce as-built specs.
Learning Objectives
Upon completing this course, the attendees will be able to:
- List the various types of indoor wireless systems and solutions including DAS and small cells
- Discuss indoor wireless system solutions, DAS and small cells and their co-existence with micro and macro cells
- Determine the types of indoor wireless for a given coverage, technologies such as WiFi and LTE and service capacity requirements
- Determine how to effectively design an indoor wireless system in a cost effective manner with the highest performance as expected
- Identify the key RF parameters and design targets of indoor wireless systems including mobile, WiFi and Public Safety
- Discuss tools and methods to create as-built documentation
- Identify the various components and equipments used in deploying indoor wireless systems
- Prepare a indoor wireless systems engineering
- Discuss indoor wireless system ConOps, requirements, design, testing and optimization processes
- Prepare indoor wireless link budgets using our free tools
- Prepare link budgets for the optical links using our free tools
- List the indoor wireless system configuration and design parameters
- Identify best practices for the deployment of indoor wireless systems including project management site survey design, installation and optimizations.
- Identify the factors that may impact indoor wireless system performance through hands-on exercises and workshops.
Who Should Attend
Become expert in in-building wireless and perform service provisioning of cellular/PCS/LTE, Analog, VHF/UHF, Public Safety and WiFi (WLAN’s) inside buildings and other structures such as sport venues, concert halls, airports, tunnels and bridges.
Whether you work for a wireless service provider, system integrator, ISP, equipment manufacturer, building manager or business owner, this course will enhance your knowledge and skills to evaluate various wireless services in poor coverage areas and know-how on technologies to expand coverage into new areas. Our experienced and dedicated instructors will help you maximize your in building wireless communication capabilities in the most cost effective manner during this course.
This course is a comprehensive technical program to plan, design, implement, verify, validate, optimize indoor wireless systems including DAS and small cells and is intended for project managers, engineers, technicians and anyone else involved in planning, design, deployment and optimization of indoor wireless systems.
Course Agenda
Indoor wireless System Overview
- What and Why?
- Types of Indoor wireless systems
- DAS (Distributed Antenna Systems)
- Pico and Micro-cells
- Small Cells
- WiFi hotspots
- Indoor wireless technology overview
- Coverage requirements
- Indoor wireless capacity planning
- Indoor wireless system architecture
- Active and passive solutions
- Planning considerations
- Indoor wireless system design considerations
- Site surveys
- Pico and macro cell site considerations
- Mobile networks considerations
- LTE small cell considerations
- WiFi considerations
- Public Safety considerations
- Installation considerations
- Optimization considerations
Indoor wireless System Planning and Design
- Project deployment process
- Project management and system requirements baselines
- Scope of Work (SoW) for an In Building Wireless System
- Analysis of services
- Business and budgetary objectives
- Facility and document the as-built configuration
- RF environment in the design frequency
- Building drawings
- Design challenges
- Network architecture and topology
- RF planning and design
- Principles of sire survey
- Radio waves and propagation
- RF and optical Link Budget calculations
- Materials and RF propagation
- Refraction, Reflection, Diffraction and scattering
- Noise and Noise Figure
- Intermodulation and BER
- In-Building components
- Backhaul connection to the network
- Distributed Antenna Systems (DAS)
- Network management and operations
- in-Building Wireless System Architecture
- Passive DAS
- Active DAS
- Hybrid DAS
- Repeaters vs. base station solutions
- Technical considerations for various technologies
- GSM, CDMA/CDMA2000, UMTS, HSPA/HSPA+, LTE and LTE-Advanced
- OFDM/OFDMA/SC-FDMA and MIMO
- 802.11a/b/g/n/ac/ad
Workshop: Designing an indoor wireless project
- System design and development
- wireless voice/data needs
- Software analysis to specify optimum placement of access points and cells
- Large network “holes”
- Radio resources for outside mobile users.
- Macrocell
- Capacity requirements and security measures
- Design to architectural and operational constraints
- System procurement management
- Equipment specifications
- Performance guarantees
- Construction requirements
- Site-walks and pre-bid
Indoor wireless Site Survey
- Environment, layout and network requirements
- Antennas
- RF propagation
- RF measurements
- Equipment location
- Cable routing
- Performance evaluation
- Optimization
DAS and Small Cell Technology
- What is DAS?
- What is a small cell?
- Types of DAS and small cells
- Indoor vs. outdoor
- Co-existence with macro-network
- Coverage considerations
- Capacity considerations
- Small cell Connectivity
- Small cell architectures
- Power consideration
Testing, optimization, and final acceptance
- Installation and integration management
- Project management of installation and testing with all systems
- Integration with other systems and trades
- Verify proper interconnect
- Configuration of access points
- Tests of system performance
- System security demonstration
- Operational verification tests through facility with client staff
- As-built and test documentation for completeness
Workshop 2: Designing an Indoor Wireless System with PCS/Cellular/LTE and Public Safety Coverage Extension
- Dedicated radio resources
- General Technical Features
- Frequency range 100 MHz to 100 GHz
- Accurate propagation predictions
- Propagation models
- Conductivity, permittivity and transmission loss
- Time dispersion/multipath (RMS delay spread) studies
- Angle of arrival calculations
- 2D and 3D ray-tracing models for outdoor microcell
- Indoor wireless LAN/PBX/cell-extender studies.
- Line-of-sight (LOS) and NLOS rays
- Wall transmission
- Corner diffraction
- Attenuation due to partial Fresnel zone obstruction.
- Hata propagation model
- COST-231 propagation model
- Walfisch-Ikegami propagation model
- Simplified outdoor microcell studies
- Multi-story indoor studies
- Calculate attenuation between floors
- Plot results in a 3D, multi-story projection.
- Free-space propagation
- Reflection
- Diffraction
- Diffuse wall scattering
- Pico and microcells
- High and low powered passive repeaters
- Passive coax-based transport
- Low and high powered active distributed antenna systems
- Radio over Fiber (RoF)
- Cable-distributed vs. Fiber-distributed
Workshop 3: In-Building Wireless, DAS and Small Cell System Design Case
- Application and Design Principles
- Using BDA devices and systems
- Repeaters, Boosters, Cell Enhancers
- HVAC ducting “waveguide” distributed
- Over-the-air donors
- Microcell and on-Site donors
- Community and Multi-Operator
- Public Cellular and PCS
- Law Enforcement, Public Safety
- 150, 450, 800-900 trunked
- SCADA telemetry: 150, 450, 900 MHz.
- Public Unlicensed Mobile
- Basic Modulation Types
- Law Enforcement, Public Safety: FM, QPSK
- SCADA telemetry : FM, QPSK, others
- Public Unlicensed Mobile
- Signal Quality Criteria
- C/I, Linearity, Dynamic Range
- Headroom and Noise Performance
- Interference – External sources
- Internal sources generated
- Reflection-mode in cluttered environment
- Obstructions and Diffraction
- In-Building Propagation
- Free-space in rooms, hallways
- Attenuation through walls, floors, ceilings, doors, windows
- Frequency variability (“tilt”) of losses
- Loss, Tilt, and coupling in the use of HVAC ducts as waveguide
- Gains and Losses of system components
- Basic Design, Operational, and Troubleshooting discussions
Discussions and Solution Case Studies to focus on:
- Challenges in designing and executing in-building wireless projects
- Factors affect ROI and ongoing costs
- Gain a holistic approach to RF planning and solution integration
- Auditing In-building Wireless Deployment
- Active Distributed Antenna System (DAS)
- Passive DAS
- Repeater
- Pico or microcell
- Facility and Installation Considerations
- What is the type of facility?
- Open/warehouse
- Industrial/Manufacturing
- Cubed office
- Drywall office
- Hi-rise building
- Government building
- Hospital building
- Mall
- Airport
- Convention center
- Stadium/Arena
- Calculating number of subscribers within the venue
- Single-mode fiber vs. multi-mode fiber
- CAT3/5 cable
- CATV
- Coax
- Installation of conduit/innerduct required
- Plenum-rated cables
- Leaky Coax
- RF carriers per band
Final Assessment, Project and Certification
PPAP Training, Production Part Approval Process Training
PPAP Training, Production Part Approval Process Training Course Description
PPAP Training course, Production Part Approval Process Training discusses the requirements, procedures and protocols, and practices and activities specified by the PPAP manual.
Through this PPAP training, students prepare a sample PPAP package for submission, from the beginning to the end.
What is PPAP?
Production Part Approval Process (PPAP) is an analysis management to measure the capability of the system. Once the PPAP protocol is obeyed, the number of dysfunctional parts will reduce down to below a handful per million parts produced. This conclusive process will evaluate the performance of all the processes and steps involved in producing parts and it will assure that all the specifications and requirements are met.
This process assesses how well the processes used to produce parts will meet the specifications. Participants who complete this course They also know how to conduct and evaluate the processes, and
Added Value of the PPAP Training:
- Learn how to evaluate a PPAP report
- Review and prepare PPAP forms
- Learn how to submit PPAP reports
- Discuss the specific needs for part approval records or sample retention
- Know when/where PPAP submissions are required
- Recognize various levels of PPAP submission
- Understand where and how the PPAP submissions can be incorporated into the APQP
- Understand the statistics of process capability, process capability index, performance capability, and performance capability index (Cp, Cpk, Pp, and Ppk.)
- Learn how to present the outcomes to the customer in a high-qualified format align with the customer’s expectation.
TONEX PPAP Training Will Also Cover:
- The concepts and principals of the PPAP
- All the components of PPAP
- Review all the required documentation for each submission level
- Real-life examples and case studies
TONEX PPAP Training Methodology
TONEX PPAP training course is in the form of an interactive workshop. The seminar includes many in-class activities including hands on exercises, case studies and workshops. During the PPAP training course, students can bring in their own sample projects and through our coaching, develop their own PPAP.
Audience
Production Part Approval Process Training, PPAP Training is a 2-day course designed for:
- Internal auditors
- Second-party auditors
- The ISO/TS 16949 implementation team
- Cross-functional team members
- Project Managers, Engineers and Quality Department Personnel
- All individuals involved in submitting PPAP report
- All individuals involved in product quality planning activities
- All individuals interested in learning more about PPAP
Training Objectives
Upon the completion of PPAP training course, the attendees are able to:
- Understand the goals and objectives of PPAP
- Understand the phases of PPAP
- Explain why PPAP is applied
- Discuss all components of the PPAP
- Understand the customer specific requirements for submitting PPAP
- Discuss the evidence required by customers to submit PPAP
- Complete all phases and steps of a PPAP
- Define the scope and purposes of the PPAP
- Follow all the PPAP submission levels
- Evaluate all PPAP reports
- Prepare and fill out PPAP forms
- Understand how to incorporate the PPAP submissions into APQP
- Articulate and discuss the results of the PPAP
Course Outline
Overview of PPAP
- PPAP definition
- The purpose of PPAP
- When is a PPAP required?
- Benefits of PPAP submission
- What are the elements of a PPAP submission?
- What are the levels of PPAP?
- What is “Significant Production Run”?
- Run @ Rate
- Definition of risk
- PPAP status
- Authorized Engineering Change Documents
PPAP Requirements
- AIAG requirements
- Design Records
- Engineering Change Documents
- Customer Engineering Approval, if required
- Design Failure Modes & Effects Analysis (DFMEA) Process Flow Diagram
- Process Failure Modes & Effects Analysis (PFMEA) Control Plan
- Measurement Systems Analysis (MSA) Dimensional Results
- Qualified Laboratory Documentation
- Appearance Approval Report (AAR)
- Sample Product
- Master Sample
- Checking Aids
- Customer-Specific Requirements
- Part Submission Warrant (PSW)
- Internal, costumed, requirements
PPAP Levels
- Level 1 – Warrant only and Appearance Approval Report as requested submitted to the customer
- Level 2 – Warrant with samples and limited supporting data submitted to the customer
- Level 3 – Warrant with product samples and complete supporting data submitted to customer
- Level 4 – Warrant and other requirements as defined by the customer
- Level 5 – Warrant with product samples and complete supporting data reviewed at the supplier’s manufacturing location
- PPAP level table
- New parts levels
- Part changes levels
Production Warrant
- Definition
- Purpose
- When to use it
- Reviews checklist
Process Flow Diagram (PFD)
- What is PFD
- Purpose
- Symbols
- PFD example
- Reviewers checklist
Process FMEA (PFMEA)
- Origin of FMEA
- Definition
- Objectives
- When to use it
- Steps of PFMEA procedure
- Ratings
- Severity
- Occurrence
- Detection
- Analyzing the results
- PFMEA exercise
Control Plan
- Definition
- Purposes
- Application
- Tool interaction
- Phases
- Process, tools, characteristics
- Specifications, Measurement, Sample Size & Frequency
- Control Method, Reaction Plan
Measurement Style Analysis (MSA)
- Definition
- Objective
- Application
- Who needs to be involved?
- Attribute
- Variable
- Observed variation
- Resolution
- Error in resolution
- Possible causes
- Repeatability
- Reproducibility
- Error in resolution
- Possible causes
- Gage R&R study
- Gage R&R steps
- Select 10 items that represent the full range of long-term process variation
- Identify the evaluators
- Calibrate the gage or verify that the last calibration date is valid
- Record data in the Gage R&R worksheet in the PPAP Playbook
- Have each appraiser assess each part 3 times (trials – first in order, second in reverse order, third random)
- Input data into the Gage R&R worksheet
- Enter the number of operators, trials, samples and specification limits
- Analyze data in the Gage R&R worksheet
- Assess MSA trust level
- Take actions for improvement if necessary
- Gage R&R case study
- Reviewer’s checklist
Dimensional Results
- What is it?
- Objectives
- When is it applied?
- Acceptance criteria
- Reviewer’s checklist
Material & Performance Test Results
- Material test results
- Module test results
- Performance test results
Initial Process Study
- Definition
- Purposes
- Applications
- Steps for Determining Process Capability
- Choose the product or process characteristic
- Validate the specification limits
- Validate the measurement system
- Collect data
- Analyze data characteristics
- Analyze process stability
- Calculate process capability
- Variable data
- Capability indices
- CpK
- PpK
- Cp vs CpK
- Reviewer’s checklist
Appearance Approval Report
- Definition
- Objective
- Application
- Sample report
Sample Production Parts
- Definition
- Purpose
- Application
- Labeling
- Part label example
Completing the PPAP Submission
- Electronic submission
- Element 1 Part Submission Warrant
- Element 2 Design Records and & Bubbled Part Prints
- Element 3 Approved Engineering Change Documentation
- Element 4 Customer Engineering Approvals
- Element 5 Design FMEA (DFMEA)
- Element 6 Process Flow Diagrams
- Element 7 Process FMEA (PFMEA)
- Element 8 Control Plan
- Element 9 Measurement System Analysis (MSA)
- Element 10 Dimensional Report
- Element 11 Material, Performance Test Results
- Element 12 Initial Process Study (Cpk/Ppk)
- Element 13 Qualified Lab Documentation
- Element 14 Appearance Approval report
- Element 15 Sample Parts
- Element 16 Master Sample
- Element 17 Checking Aids
- Element 18A Tooling Information Form
- Element 18B Packaging Form
Discussion for Successful Implementation
TONEX Hands-On Workshop Sample PPAP
- Choose one case to conduct a PPAP on
- Prepare all the elements of the report
- Prepare required forms for submitting PPAP
- Use data to provide specific requirements for part approval records and sample retention
- Go through all the PPAP levels
- Perform required statistics analysis including Cp, CpK, or PpK
- Ensure the submission meet the customer’s specific requirements
- Present your final report to an imaginary customer
Production Part Approval Process Training, PPAP Training