Print Friendly, PDF & Email

Whether you require a single course for a small group or an extensive training program for your entire workforce, on-site courses offer significant savings and convenience with the same quality hands-on instruction delivered in TONEX Training Education Centers around the world.

TONEX Training offers many training seminars in variety of subject areas including Telecom, Mobile and Cellular, Wireless, Engineering, Technology, IT, business, AI and Machine Learning, Systems Engineering, Defense, Tactical Data Links (TDL), Aerospace, Aviation, Space Engineering, Specification Writing, Power and Energy, Enterprise Architecture Management, Mini MBA, Finance, Logistics, Blockchain, Leadership, and Product/Project Management. We offer programs in our four state-of-the-art Executive Conference Centers and in 20 other cities in US and international locations including:

  • Atlanta, GA
  • Dallas, TX
  • Plano, TX
  • San Francisco, CA
  • Santa Clara, California
  • Santa Monica, California
  • Alexandria, Virginia
  • New York City, NY
  • Rome, Italy
  • Shanghai, China
  • London, UK
  • Munich, Germany
  • Stockholm, Sweden
  • Tokyo, Japan
  • Seoul, Korea
  • Hong Kong
  • Bangalore, India
  • Istanbul, Turkey
  • Dubai, UAE
Jan
16
Tue
LTE RF Planning Training – LTE RF Planning, Design, Optimization Training @ TONEX Nashville Taining Site
Jan 16 @ 9:00 am – Jan 18 @ 4:00 pm
Print Friendly, PDF & Email

Why should you choose TONEX for your LTE RF Planning Training?

LTE RF Planning Training is focused on carrying out RF planning and Design and capacity planning for Long Term Evolution (LTE) based networks. It provides a solid understanding of how to plan, design and optimize and a high quality LTE network. Learn how to plan and design LTE networks, techniques to boost LTE capacity, and how to lower interference and increase quality in the LTE network.

LTE RF Planning

LTE RF Planning Training Course will show the attendees how to plan, design and optimize LTE networks efficiently?

With the proliferation of smart devices, M2M, social networking and location-based services, operators are seeing LTE data usage expand rapidly to augment traditional GSM voice service revenues. With the increased data traffic delivered through LTE networks and  increasing of more bandwidth-intensive applications, operators are experiencing capacity issues on their LTE networks. Unfortunately adding more spectrum is more costly and is not always an option.

LTE networks promise to be more spectral-efficient however LTE many operators are planning  to target a series of non-traditional vertical markets and M2M (machine-to-machine) communications. So any additional LTE capacity could be quickly used up. The need for proactive  RF planning, design and optimization, is the purpose of LTE RF Planning Training Course.

Learn the theory and practical aspects of LTE RF Planning including:

  • High level overview of LTE
  • LTE Air Interface Overview
  • Basic Spectrum Planning
  • Radio Network Planning Basics
  • Initial LTE RF Link Budget
  • Detailed LTE RF Propagation
  • RF Link Budget Principals
  • LTE Capacity Planning
  • LTE RF Components, RF Propagation Theory and LTE Channels
  • Basics of RF designs
  • Planning a LTE Network
  • Planning the parameters of Network
  • Performance of Network (KPI Analysis)
  • LTE Cell Planning
  • Fine Tuning and Optimization
  • Continuous Optimization
  • RF Antenna Systems
  • Inter System Interference
  • Inter-Technology Antenna Sharing

Who Should Attend

RF Engineers, Radio Network Planning Engineers, project managers, operators,  Regulators. or anyone else responsible for RF planning or design will benefit from LTE RF Planning Training Course: Radio Network Planning, Design and Optimization.

 

Objectives

Upon completing this course, the attendees are able to to:

  • Understand LTE Air Interface and basic Spectrum Planning
  • List main LTE radio interface parameters
  • Describe LTE Air Interface applied to RF Planning, Design and Optimization
  • Understand the LTE RF planning, design and optimization principals
  • Understand basics of  Frequency Reuse for LTE
  • Describe the impact of  MIMO on LTE and its planning
  • Calculate Link Budgets for LTE using TONEX tools
  • List Timing and Synchronization for LTE
  • List LTE RF planning and design tools
  • Describe the impact of the LTE backhaul in the planning and design process

Outline

Introduction to the RF Planning, Design and Optimization Processes

  • What is RF Planning?
  • Planning for Capacity and/or Coverage
  • Nominal Cell Size
  • Radio Propagation 101
  • Propagation Models
  • Link Budgets 101
  • The Power Law
  • Using a Planning Tool
  • Site Acquisition and Selection
  • Mast Options
  • Nominal Areas for Sites
  • Feedback Loop
  • Detailed Site Design
  • Concrete Canyons
  • High Sites
  • Drive Testing
  • Flat Earth Modeling
  • RF Planning and Tools

LTE Air Interface Overview

  • S-OFDMA (LTE downlink)
  • SC-FDMA (LTE uplink)
  • Number of Subcarriers
  • Symbol Size
  • Subcarrier Types
  • Frames
  • Resource Blocks (RB)
  • UL Allocation
  • Modulation Techniques
  • Error Correction
  • Basic Spectrum Planning in LTE
  • Operating Bands
  • Channel Bandwidths
  • Channel Spacing
  • Guard Band Considerations

LTE RF Link Budget

  • Effective Radiated Power
  • Thermal Noise
  • Noise Figure
  • Ambient Noise
  • SNR
  • Implementation Margin
  • Fast Fading
  • Receive Diversity Gain
  • System Gain and Losses
  • Typical Parameter Values
  • Base Station Antenna Gain
  • Uplink Budget
  • Downlink Budget
  • Data rate (Mbps)
  • Receiver sensitivity (dBm)
  • Interference Margin (dB)
  • Control Channel Overhead (dB)
  • Maximum path loss
  • Propagation (Path Loss) Models
  • Environment : urban, rural, dense urban, suburban, open, forest, water
  • Estimated Number of Sites
  • Neighbor Cell Lists for each site
  • Detailed Coverage Predictions (e.g. Signal Strength (RSRP), Signal Quality (RSRQ) Best CINR, Best Server Areas, Uplink and Downlink Throughput)
  • Sites Coverage by Signal Strength
  • Fine Tuning and Optimization

RF Propagation Models

  • Free Space
  • HATA
  • Okumura Model
  • COST-HATA
  • COST-231 Walfisch-Ikegami Model
  • ERCEG-GREENSTEIN
  • Stanford University Interim (SUI) model
  • SEMI-DETERMINISTIC Models
  • Ray Tracing Model
  • Factors Impacting Propagation Models

Mapping of Path Losses to Cell Sizes

  • Okumura–Hata parameter
  • Urban Indoor
  • Suburban Indoor
  • Rural Indoor
  • Rural outdoor fixed
  • Base station antenna height (m)
  • Mobile antenna height (m)
  • Mobile antenna gain (dBi) 0
  • Slow fading standard deviation (dB)
  • Location probability (%)
  • Correction factor (dB)
  • Indoor loss (dB)
  • Slow fading margin (dB)
  • Cell Size in Km

LTE Capacity Planning

  • Uplink Throughput
  • Capacity and  MPR Distributions
  • CINR Distributions
  • MAC Scheduler
  • Antenna Schemas
  • LTE System Spectral Efficiency
  • TDD Capacity
  • Workload Modeling
  • LTE Traffic Planning and Calculations

Practical LTE Planning Considerations

  • Coverage vs. Capacity Planning
  • Coverage in Noise-Limited Cases
  • Definition of average SINR
  • Optimizing LTE system bandwidth for coverage
  • LTE in Interference-Limited Cases
  • Link budget with non-negligible interference: Interference Margin
  • Trade-off between cell range, network load and cell edge throughput
  • Cell range vs. network load, fixed cell edge throughput
  • Network load vs. cell edge throughput, fixed cell range
  • Antenna Systems MIMO Transmission Schemes in LTE
  • Frequency Reuse
  • Timing and Synchronization for LTE
  • Carrier to Interference
  • Noise ratio
  • Inter System Interference
  • Inter technology Antenna Sharing
  • Cell range versus cell edge throughput, fixed network load
  • Frequency-Aware UL/DL Scheduling
  • Example of Measured MIMO Radio Channel
  • Backhaul Capacity Planning

Case Studies, and Hands-on Workshops

  • Creating a brand new LTE network in Johannesburg
  • Planning a LTE network in Hawaii
  • Designing a LTE network in Dubai
  • Link-budget analysis of a LTE network in Frankfurt, Germany
  • Optimization a LTE network in Tokyo
Feb
12
Mon
Link 16 Training | Courses | Tactical Data Link Training @ UMW Dahlgren, VA
Feb 12 @ 9:00 am – Feb 14 @ 4:00 pm
Print Friendly, PDF & Email

Link 16 and Tactical Digital Information Links (TADIL) Training Courses

Link 16 Training, TONEX is the world’s premier provider in Tactical Data Link (TDL) Courses including  Link 11 Training, Link 16 Training, Link 22 Training and JREAP Training.  TONEX is specialized in  specializes Tactical Data Link Training Courses including Link 11, Link 16, Link 22 and JREAP.

Tactical Data Link Training Courses including Link 16  Training Crash Course provides the concepts behind Link 16 tactical data Link system/ JTIDS / MIDS architecture, installation, integration, data processing and operation.

link 16 training<img class=”aligncenter size-full wp-image-11816″ src=”https://i2.wp.com/www.tonex.com/wp-content/uploads/link-16-training-course.jpg?resize=580%2C373&ssl=1″ alt=”link 16 training” srcset=”https://i1.wp.com/www.tonex.com/wp-content/uploads/link-16-training-course.jpg?w=700&ssl=1 700w, https://i2.wp.com/www.tonex.com/wp-content/uploads/link-16-training-course.jpg?resize=300%2C193&ssl=1 300w, https://i2.wp.com/www.tonex.com/wp-content/uploads/link-16-training-course.jpg?resize=640%2C411&ssl=1 640w” sizes=”(max-width: 580px) 100vw, 580px” data-recalc-dims=”1″ />

Link 16 Training covers all aspects of tactical data links  employed by the U.S Navy, the Joint Services, NATO and Japan.  Link 16 / JTIDS / MIDS training course covers all aspects of Link 16 / JTIDS (Joint Tactical Information Distribution System)/ MIDS (Multifunctional Information Distribution System).

Link 16 Training<img class=”alignnone size-full wp-image-2786″ src=”https://i2.wp.com/www.tonex.com/wp-content/uploads/link-16.gif?resize=197%2C154″ alt=”Link 16 Training” data-recalc-dims=”1″ />

Link 16 Training by TONEX

TONEX is an internationally recognized training company that  delivers customized Link 16 training solutions to DoD, NATO and defense contractors.

By choosing Tonex for your Link 16 training courses, you can expect that all the information learned in class is accurate, relevant and up to date. Our Link 16 courses are designed by Link 16 experts in the field, and this allows our workshops to excel in certain topics that only professionals in the field would understand. We also continually update our reading materials, teaching techniques and course offerings to reflect the latest trends in technology. Instead of following the trends, we stay ahead of them to be a frontrunner in the industry.

Our Link 16 training courses follow a specific format that includes the overview, the body of the class and the conclusion, which wraps up with Tonex and industry certifications. Our Link 16 training courses are flexible enough that they can be modified to fit the needs of your business so that your employees can focus on the core values of your organization. Browse our catalog of workshops or contact a Tonex representative to find the best boot camps to advance your career.

Link 16 Training crash course, Bootcamp style starts with an introduction to Tactical Data Links and covers concepts behind Network Centric Operations (NCO), Link 16  planning, network design, network management, operations and maintenance, and troubleshooting are discussed.

Other Tactical Data Link Training Programs

Link 16 Training for Managers3 days
Link 16 Training | Courses | Tactical Data Link Training3 days
Link 22 Training2 days

Check the new Advanced Link 16 Training:

Advanced Link 16 Training3 days

Link 16 Training Courses<img class=”alignnone size-full wp-image-2787″ src=”https://i1.wp.com/www.tonex.com/wp-content/uploads/Link-16-training.jpg?resize=320%2C209″ alt=”Link 16 Training Courses” srcset=”https://i0.wp.com/www.tonex.com/wp-content/uploads/Link-16-training.jpg?w=320&ssl=1 320w, https://i1.wp.com/www.tonex.com/wp-content/uploads/Link-16-training.jpg?resize=300%2C195&ssl=1 300w” sizes=”(max-width: 320px) 100vw, 320px” data-recalc-dims=”1″ />

Other Training Services

TONEX provides customized training to meet specific platform implementation goals Including:

  • Data link: SADL/EPLRS
  • Platform specific: Operator and Maintenance
  • COMSEC Workshop
  • Mission Planning Workshop
  • LINK 16 OPTASK Link Workshop
  • Advanced Link 16 

Learning Objectives

Upon completing of this course, the student will:

  • Discuss Tactical Digital Information Link (TADIL)
  • Understand the key concepts behind Link 16 / JTIDS / MIDS
  • List LINK 16/ JTIDS / MIDS Principals and Features
  • Explore Link 16 / JTIDS / MIDS architecture
  • Discuss Link 16 system characteristics
  • Explore network architecture, services, elements, protocols to support services
  • Identify the role of key network nodes, interfaces, protocols, control and related protocols
  • Discuss TDMA and CDMA and access mode
  • Describe Network Participation Groups (NGP) and J-Series Messages
  • Discuss various Link 16 terminals and message packing and pulses
  • Understand similarities and differences between Link 16 Networks and Nets
  • Describe Link 16 Network Access Modes, Network Time, Network Time Reference (NTR) and Terminal Synchronization
  • Understand Link 16 Network Roles, Relays and  Pulse Deconfliction
  • Calculate Link 16 capacity and Time Slot Duty Factor (TSDF)
  • Discuss Communications Security and Link 16 Cyber Security
  • Describe Link 16 MSEC/TSEC methods
  • Discuss JTIDS / MIDS Network Planning and Design
  • Discuss JTIDS / MIDS Management, Operation and Troubleshooting and Monitoring
  • Understand the role of Joint Range Extension Applications Protocol (JREAP)
  • Discuss Link 16 Network Enable Weapons
  • Discuss Link 16 troubleshooting techniques and procedures

Course Outline

Overview of Tactical Digital Information Link (TADIL)

  • What is TADIL?
  • TADIL Capabilities
  • Basic principles and purpose
  • Platforms and Development
  • Joint Tactical Information Distribution System (JTIDS)
  • Surveillance Control Data Link (SCDL)
  • Ground Station Modules (GSMs)
  • Joint Tactical Data Link Management Plan (JTDLMP)
  • Tactical data link for command, control, and intelligence
  • TADIL A/B [Link-11]
  • Link 16 as the prime data link for U.S. and NATO forces
  • TADIL C [Link-4A]
  • Conventional Link Eleven Waveform (CLEW)
  • Single Tone Link Eleven Waveform (SLEW)
  • Link 22 to replace Link 11 and to complement Link 16
  • Secure digital radio link in HF and UHF band

Overview of TADIL J (Link-16)/JTIDS/MIDS

  • Basic Link 16 principles and purpose
  • Link 16 capabilities
  • Link 16 protocol vs. terminals
  • MIL-STD-6016 – Tactical Data Link (TDL) 16 Message Standard
  • STANAG 5516 – Tactical Data Exchange – Link 16
  • MIDS System Segment Specification (SSS)
  • MIDS System Segment – Interface Control Document (Hardware ICD)
  • MIL-STD-6016E: Tactical Data Link (TDL) 16 Message Standard
  • Overview of  or Satellite TADIL J (S-TADIL J)
  • Real-time Beyond Line-of-Sight (BLOS)

Overview of Link 16 System Architecture, Protocols and Components 

  • Overview of Link 16 Operations
  • Link 16 Architecture
  • Link 16 Network Time and Network Roles
  • Link 16 Terminal Navigation and Network Relays
  • Link 16 Terminals and Platforms/Capabilities
  • Link 16 Configurations / Maintenance
  • Link 16 Data Terminals
  • Voice Transmission and Reception over Link 16
  • Principles of Multiple Access in Link 16
  • TDMA Principles in the Link 16
  • Link 16 Frequencies and Time Slots
  • Link 16 Interference Protection Features
  • Time Slot Duty Factor (TDSF)
  • Participation Groups
  • Network Operations, Roles and Responsibilities
  • Precise Participant Location and Identification (PLLI)
  • Link 16 Security
  • Multinetting
  • Range Extension Techniques

Purpose of Tactical Digital Information and Link 16 Systems

  • Purpose and Description
  • Data Link Advantages
  • Link 16 for anti-jam (AJ), secure, data and voice system
  • Standard waveforms and messages to promote interoperability
  • Joint Tactical Information Distribution System (JTIDS) and Multifunctional Information
  • Distribution System (MIDS)
  • Architecture and Network Design
  • Link 16 Parameters
  • Pulse Deconfliction
  • Frequency Assignments
  • Architecture Examples
  • Time Slot Blocks (TSBs)
  • Message Construction
  • Net synchronization
  • Frequencies and Interference Protection Feature (IPF)
  • Range Extension by Relay
  • Time Slot Reallocation (TSR)
  • Precise Participant Location and Identification (PPLI)
  • Link-16 Enhance Throughput (LET)
  • VMF Message Catalogue
  • Video on Link-16

Principles and Features of Link 16 Systems and Terminals

  • Link 16 System Characteristics
  • Air/Ground Situational Awareness
  • Link 16 Architecture
  • LINK 16 Features
  • LINK 16 Functions
  • Fully Functional Link 16 Terminal
  • MIDS LVT-1 (Ethernet)
  • MIDS LVT-2 (Ethernet)
  • MIDS LVT-2 (X.25)
  • MIDS LVT-11 IP
  • MIDS LVT-3 (1553)
  • USN E-2 (1553)
  • USAF E-8 (1553)
  • USAF F-15 (1553)
  • USAF MCE (1553)
  • USMC MCE (1553)
  • US Army 2M (X.25)
  • LINK 16 Terminals
  • Multifunctional information distribution system (MIDS) fighter data link
  • Low Volume Terminals (LVT)
  • Terminal Options: MIDS terminals, Class 2 terminals
  • MIDS Low-Volume Terminals (LVTs)
  • The MIDS-LVT (1) Family
  • LVT (1) TACAN Tactical Air Navigation System, and Voice
  • LVT (4) Voice, but eliminates TACAN
  • LVT (6) provides TACAN no Voice
  • LVT (7) bare-bones model, no TACAN or Voice
  • MIDS LVT (2) family ground terminal
  • Handheld Link 16 Radio, BATS-D
  • Handheld Form Factor

LINK 16 Network Management Operational Scenarios

  • LINK 16 Architecture and Management
  • LINK 16 Troubleshooting and Monitoring
  • LINK 16 Network Planning and Design
  • LINK 16 Operation and Troubleshooting and Monitoring
  • Related J series messages

LINK-16 Capabilities

  • LINK-16 Basic Capabilities
  • Tactical Data Link 16
  • Link 16 Architecture
  • Link 16 System Operation
  • Waveform
  • Time Slots
  • Exchange real-time tactical data
  • Architecture
  • Time Division Multiple Access (TDMA)
  • Synchronization
  • Acquisition & maintenance of system time
  • Network
  • Time Slot
  • Link 16 Division of Network Time
  • Epochs, Frames and Timeslots
  • Network Participation Groups (NPG)
  • Terminal variations
  • Class I, Class II, MIDS (LVT-1, LVT-2, LVT-3)
  • Host platform integration requirements
  • Link 16 Messages
  • Link 16 Security

Joint Range Extension Applications Protocol (JREAP)

  • What is JREAP?
  • Tactical data over digital media and networks
  • JREAP/TADIL Testing/Simulation
  • JREAP Application Block
  • Joint Range Extension (JRE) Gateway
  • JREAP A – UHF DAMA
  • JREAP B – Serial
  • JREAP C – Ethernet

Satellite TADILS

  • GEO  vs. LEO
  • Link-11 via satellite
  • Satellite TADIL-J (STJ)
  • Multicast TADIL-J (MTJ)

Link 16 Network Enabled Weapon (NEW)

  • Introduction to Link 16 Network Enable Weapons
  • Net Enabled Weapons  supporting  missions Use Cases
  • Network Enabled Weapons (NEW) Architecture
  • Network Enabled Weapon Messages (J11.X)
  • NEW Implementation Requirements
  • In-Flight Target Updates (IFTUs)
  • Targeting and engagement of Moving Targets
  • In-flight Retargeting/Reallocation
  • In-flight Abort
  • Sensor to Weapon 3PS Targeting (S2W 3PS)
  • Weapon to Weapon Coordination (Cooperative Attack)

Structured Link 16 Troubleshooting Approaches

  • Isolate and solve Link 16 network, terminals and design problems
  • Root Cause Analysis Techniques applied to Link 16
  • TONEX Link 16 DFMEA and PFMEA processes and templates
  • Systematic elimination of hypothetical causes
  • Narrowing down on the possible causes
  • The top-down approach
  • The bottom-up approach
  • The spot-the-differences approach
  • The move-the-problem approach
  • Failure at Upper Link 16 Layers
  • Application Layer Failure
  • Failure at Lower Link 16 Layers
  • Failure at network topology
  • Failure at security keys
  • The Divide-and-Conquer Troubleshooting Approach
  • Follow-the-Path Troubleshooting Approach
  • The Compare-Configurations Troubleshooting Approach
  • The Swap-Components Troubleshooting Approach

Link 16 Troubleshooting Procedures

  • Link 16 Verification and Validation Plans
  • Testing, Simulation and Analysis Techniques
  • Verification of Link 16 initial and mission plans
  • Testing Link 16 Hardware Platforms and Software Features
  • Link 16 Network Design Verification
  • Testing Link 16 RF Capabilities
  • Synchronization testing
  • Testing Link 16 Features
  • Testing C2 to C2 Battle Management
  • Testing C2 to Fighter mission assignments
  • Testing Fighter to Fighter information exchange
  • Testing Imagery and Voice communications
  • Testing Network Enable Weapons

TONEX Link 16 Verification and Validation (V&V) Plans and Procedures

  • Link 16 Network Integrity V&V
  • Link 16 NPG Status V&V
  • Cryptonet V&V
  • Frequency Planning and Management V&V
  • Time Slot Duty Factor (TSDF) Tests
  • OPTASK Link V&V
  • Multi-Link Network V&V
  • Roles / Responsibilities V&V

 

Who Should Attend

Operators, Engineers, Designers, Architect, Software and Hardware Developers, Project Managers, Product Managers, Sales and Support and anyone else who is interested to understand concepts behind Link 16 / JTIDS / MIDS.

Feb
20
Tue
Telecom Audit Training Workshop @ Plano
Feb 20 @ 9:00 am – Feb 21 @ 4:00 pm
Print Friendly, PDF & Email

Telecom Audit Training Workshop Description

Telecom Audit Training workshop is designed to give telecom and non-telecom professionals the nuts-and-bolts of telecom audit. This course provides an overview of today’s telecom auditing, bill processing and reporting.

telecom audit training

Telecom audit training workshop allows you to gain a better understanding of your telecommunications expenditures (CAPEX), processes (OPEX), reduce your current telecommunications expenses and provides key information to assist you with your future technology investments.

telecom audit training

Topics covered:

  • Overview of the Telecom Industry
  • Audit processes
  • Telecom auditing & optimization
  • Telecommunications in organization’s OPEX and CAPEX
  • Efficiency of your telecommunications expenditures
  • Overview of North American Telecom Providers and Services
  • Overview of European Telecom Providers and Services
  • Overview of other Telecom Providers
  • Analysis of Service Providers
  • Cable companies rates
  • Other providers rates
  • AT&T, Sprint, Verizon and CenturyTel Business rates
  • International rates
  • Telecom services
  • Voice, video and data services
  • Local, long distance, and wireless
  • Leased lines and trunks
  • Security and VPN services
  • Managed Services
  • Hosted VoIP
  • Cloud, Data, Voice and Managed Services
  • Metro Ethernet for LAN, MAN and WAN networks
  • Retroactive telecom audit
  • Analyze your telecom usage
  • Customer Service Records (CSRs)
  • Call details records (CDRs)
  • Billing errors
  • Telecommunications invoices and verification
  • Services not requested, but being billed
  • Discontinued phone and data services still being billed
  • Unused or underused circuits and services
  • Variations between contractual terms and actual billing rates
  • Improper long distance selection
  • Local and long distance, 800, cellular, pager and data services
  • Per-minute charges vs. contractual agreements
  • Access and capacity inventory
  • Monthly recurring fees and features
  • Charges for non-contracted services
  • Miscellaneous surcharges
  • Taxes, Fees, and Surcharges
  • Equipment rental and leasing charges
  • Directory and Advertising charges
  • New laws, taxes, tariffs and plans
  • Federal, state, local, and franchise taxes
  • Combination of rates and services
  • Audit of calling area and patterns
  • Analyzing your current rate plans and network infrastructure design,
  • Possible savings on all of your telecom charges
  • Consolidation of services
  • Renegotiation of current pricing contracts with existing vendors
  • Migration of services to more cost-effective vendors
  • Negotiation of better contracts with vendors, inventory management and data control
  • Principals of rating, billing and tariffing
  • Invoice processing and workflow
  • Cost center allocation
  • General ledger and accounts payable
  • Service and exception reporting
  • Cost center, location, service type, vendor, general ledger accounts
  • Inventory and contract management
Mar
8
Thu
System Verification and Validation Training @ UMW, Dahlgren, VA
Mar 8 – Mar 9 all-day
Print Friendly, PDF & Email

System Verification and Validation (V&V) Training

System Verification and Validation Training, V&V Training, TONEX Verification and Validation training provides all aspects of the system engineering discipline employing a rigorous methodology for evaluating and assessing the correctness and quality of system and software throughout the system/software life cycle.

System Verification and Validation Training covers all aspects of systems engineering related processes to verification, validation and testing.

System Verification and Validation Training  details validation and verification processes. Validation process  is concerned with checking that the system will meet the customer’s actual needs based on defined requirements and needs, while verification is concerned with whether the system is built correctly and it is well-engineered, error-free, reliable, secure and so on.

Verification is the process of determining whether or not the products of a given phase of the system/software life cycle fulfill the requirements established during the preceding phase.

Validation is the process of determining that the requirements are the correct requirements and that they form a complete set of requirements this is done in the early stages of the development process. Validation of the end product or system determines if the system meets the user’s needs.

Learning Objectives

After the completion of this course, the students will be able to:

  • Describe system/software verification and validation and to discuss the distinction between them
  • List V&V Techniques and Methods
  • Describe the testing and inspection process and its role in V & V
  • Explain Life Cycle V&V Tasks
  • Explain static analysis as a verification technique

Who Should Attend

Verification and Validation Training course is intended for systems engineers, product managers,  and product developers, program managers, project and product managers, and other discipline engineers. The attendees will learn the techniques and best practices used to verify and validate system solutions.

NASA Definitions of V&V

Source: www.nasa.gov

Validation is defined as: The process of determining the degree to which a model is an accurate representation of the real world from the perspective of the intended uses of the model. (AIAA G-077-1998) Verification is defined as: The process of determining that a model implementation accurately represents the developer’s conceptual description of the model and the solution to the model. (AIAA G-077-1998)

Course Topics

System and Software Verification and Validation (V&V) Concepts

  • Introduction to V&V Techniques and Principles
  • V&V Definitions
  • V&V Techniques and Methods
  • Planning for V&V Life Cycle V&V Tasks
  • Measurements Applied to V&V
  • Verification Assessment
  • Validation Assessment

Systems Engineering (SE) Principals and Role of V&V

  • SEMP
  • ConOps
  • System Definition
  • Requirements Development [System and Sub-system Level Requirements]
  • High Level Design [Project Level Architecture]
  • Component Level Detailed Design
  • System Development and Implementation
  • Hardware/Software Development and Unit Test
  • Integration [Sub-system and System Level Integration]
  • Verification [Sub-system and system level verification]
  • Initial System Deployment
  • Validation, Operations & Maintenance, Changes & Upgrades
  • System Validation
  • Validation and assessment of the operational system
  • Ensuring the intended purpose and needs of system’s owner and stakeholders
  • Operations & Maintenance
  • Changes & Upgrades
  • System Retirement/Replacement

Overview of Testing principals

  • Human-based testing
  • Formal correctness proofs
  • Machine-based testing
  • Testing Techniques
  • Black-Box
  • White-Box
  • Levels or Phases of Testing
  • Unit testing
  • Component testing
  • Product testing
  • System testing
  • Functional (black-box) tests
  • Structural (white-box) tests
  • Unit level toward the system level tests
  • Integration testing
  • Regression testing
  • Re-testing to detect problems caused by the adverse effects of program change
  • Acceptance testing
  • Alpha testing
  • Beta testing
  • System Test Acceptance
  • Soak testing
  • Smoke (build verification) test
  • Lights out test

Plan-Based Testing Process Activities

  • Test Planning
  • Test Design
  • Test Implementation
  • Test Execution
  • Execution Analysis
  • Result Documentation
  • Final Reporting
  • Testing in Incremental (e.g. Agile) System/Software Development
  • Test-Driven Development (TDD)

Why V&V

  • Important to conduct V&V in its interactions with the system of which it is part.
  • Planning for V&V
  • Scope of work
  • Software Integrity Levels
  • Development of the Software V&V Plan (SVVP)
  • Cost of V&V

Life Cycle V&V Tasks

  • Acquisition V&V
  • Supply V&V
  • Development V&V (Concept, Requirements, Design, Implementation)
  • Development V&V (Test)
  • Development V&V (Installation and Checkout)
  • Operation V&V
  • Maintenance V&V

Development of the Software V&V Plan (SVVP)

  • V&V Techniques and Methods
  • Audits, Reviews, and Inspection
  • Analytic Techniques
  • Dynamic Techniques
  • Formal Verification
  • The structure of a test plan
  • The testing process
  • Requirements traceability
  • Tested items
  • Testing schedule
  • Test recording procedures
  • Hardware and software requirements
  • Constraints

Verification [Sub-system and system level verification]

  • The Verification process
  • Inputs
  • Concept of Operations
  • System and Sub-system Requirements
  • Design Specifications
  • Integration Plan [optional]
  • Deployment Strategy [optional]
  • Control
  • Project Plan/Systems Engineering Management Plan [SEMP]
  • Configuration Management Plan

Verification Enablers

  • Stakeholder involvement
  • Technical Reviews
  • Traceability to the verification plan & procedures
  • Verification Master Plan
  • Verification Plan documents
  • Verification Procedures
  • Verification Reports
  • Verified sub-system/system

Verification Process Activities

  • Plan verification activities in SEMP / Project Plan
  • Develop Verification Plan
  • Trace between specifications and test cases
  • Develop Verification Procedures
  • Perform verification
  • Document verification results
  • Key stages of verification
  • Sub-system Verification
  • System Verification step
  • Sub-system and system verification
  • Commissioning
  • Verification techniques
  • Inspection
  • Analysis
  • Demonstration
  • Test

System/Software Verification Overview

  • The Inspection Process
  • Requirements Inspections
  • Design Inspections
  • Code Inspections
  • Test Inspections
  • Measurement Attributes
  • IEEE Software Metrics Framework

System Validation

  • Description of System Validation
  • The system’s owner and stakeholders
  • Objective of System Validation
  • Assessment of the operational system
  • Needs of system’s owner and stakeholders
  • Validation process three primary activities
  • Planning
  • Stakeholder involvement
  • The plan
  • Validation Master Plan
  • Systems Engineering Management Plan [SEMP]
  • Validation strategy
  • Perform validation
  • System acceptance
  • Planning & strategy and the assessment results

System Validation Process

  • Process context
  • Inputs
  • Concept of Operations
  • Goals, objectives, and needs to be assessed
  • Control
  • Validation Documents Template
  • Plans to lay out the specific validation efforts
  • Reports on the results of the validation activity
  • Validation Plan Template
  • IEEE 1012-1998, Software Verification and Validation
  • Checklist – Critical Information
  • Validation Conduct
  • Activities
  • Categories of verification and validation
  • Quality control process and Quality assurance process
  • Prospective validation
  • Full scale validation
  • Partial validation
  • Cross-validation
  • Re-validation/Locational or Periodical validation

Software Validation Overview

  • Testing and Acceptance
  • Levels of Testing
  • Methods of Testing
  • Goals and Objectives of Testing
  • Unit Testing
  • Integration Testing
  • Validation Testing
  • Software Validation Testing
  • Test Planning
  • Test Estimation and Development
  • Test Execution
  • Measurement Applied to V&V Measurement Methods
  • Software Structural Metrics
  • Statistics-Based Measurements
  • Trend Analysis
  • Prediction-Based Measurement

Integration [Sub-system and System Level Integration]

  • Integration as the process of successfully combining hardware and software components, sub-systems, and systems into a complete and functioning whole
  • Integration planning
  • Integration Process

Who Should Attend

Systems Engineers, Hardware and software testing, QA and anyone else who wants to learn verification and validation.

Mar
27
Tue
Enterprise Architecture (EA) Training Boot Camp @ UMW Dahlgren, VA
Mar 27 – Mar 29 all-day
Apr
9
Mon
Microgrid Certification Training | Microgrid Certificate @ Tonex Plano Site
Apr 9 @ 9:00 am – Apr 12 @ 4:00 pm
Print Friendly, PDF & Email

Microgrid Certification Training, Microgrid Certificate

Microgrid Certification Training curriculum is a leading edge certification and relevant to what is happening in the energy industry right now. Microgrid technology is an advanced technology developed in recent years as a critical competence of traditional power networks with reliable and efficient operation across a wide range of industries. The ability to deliver the technical information of smart grids to the right audience at the right time is a valuable skill, especially for those engaged in the field of power systems.

Microgrid Certification Training, Micro grid Certificate helps you to understand the microgrids, their operation and control as well as energy management principles applied to the microgrids. This certificate is divided into three main topics in microgrids which will help engineers and scientists to prepare themselves with the skills and required confidence to meet their organization’s needs or position themselves for their job responsibilities and promotions.  Our experts at TONEX will help you to understand the fundamental concepts of micro grids in order to tackle the real-world challenges. The micro gird certificate consists of four major topics:

  • Introduction to Microgrids
  • Microgrid operation and control
  • Energy management systems in Microgrids

The first part of the Microgrid Certification Training briefly introduces the concept of microgrids, background of renewable energy sources as the main components of a microgrid, history of renewable energy sources, advantages of microgrids and transmission system implemented in microgrids. Furthermore, you will be introduced to the basic per unit systems applied to microgrids, different types of microgrids, main operating modes in a microgrid such as: islanded mode and grid connected mode To add more details to the microgrids, you will learn the basics of solar panels, wind farms and energy storage systems as three main components of a microgrid in detail.

For each part, the operation basics, and main components will be briefly introduced and recent advancement will be taught. For example, main components of a wind farm generation unit such as: wind generators, wind turbines, towers, and foundations will be introduced and power converters implemented for each device will be discusses briefly. By the end of the first part, the audience are supposed to understand the basics of microgrid operation and should be able to understand the solar photovoltaic panels, wind farms, and battery energy storage systems.

You will also learn:

  • Transformers in microgrids
  • Different types of load in microgrids
  • Fault tolerance in microgrids
  • Cost benefits regarding microgrids
  • Hybrid microgrids
  • Micrgorid stability assessment and protection
  • Batteries in solar panels
  • Different types of PV modules
  • PV strings
  • Hybrid PV systems
  • Pulse width modulation techniques in microgrids
  • Power voltage curves for PV system
  • Power curves in wind turbines
  • Different types of wind turbines
  • Concept of pitch in wind farms
  • Series compensation in wind parks
  • Control of wind energy systems
  • Concept of energy storage systems
  • Applications of energy storage systems in microgrids
  • Conventional energy storage systems
  • Control of battery energy storage systems
  • Droop control in energy storage systems

The second part of the Microgrid Certification Training, Microgrid certificate training focuses on operation and control of microgrids from basic traditional approaches to the advanced hierarchical control of microgrids.  Firstly, basics of microgrid control will be introduced and different control modes in islanded mode and grid connected operation mode of the microgrid will be discussed. You will also learn the power elecrtronic converter control, classifications and operation, operation principles of wind farms, PV, energy storage, concept of offshore wind farms, and maximum power point tracking in microgrids. Next our instructors will focus on two separate operating modes in a microgrid (islanded and grid connect) and will describe the different control methodologies applied to each mode so far. For example, effect of voltage dips in islanded mode, active power control in islanded/grid connected mode, supporting the voltage and frequency in grid connected mode, parallel operation of converters in islanded/grid connected mode, concept of droop control in islanded mode, reactive power sharing in grid connected mode, and low voltage ride through capability of converters in grid connected mode are covered in the second part. Finally, the advanced control methodology named as hierarchical control of microgrid will be introduced and concepts of primary, secondary and tertiary controllers will be discussed in detail. You will also learn:

  • Voltage source converters in microgrids
  • Distributed loads in microgrids
  • Effect of electric vehicle charging in microgrid
  • Operation of storage units in islanded mode
  • Virtual synchronous generator effect in islanded microgrid
  • Power quality in islanded mode
  • Effect of LCL filter
  • Inner current loop and frequency control in islanded mode
  • Control of single converter in grid connected mode
  • Master and slave control of microgrids
  • Primary droop control
  • Secondary voltage and frequency control in microgrids
  • Primary control in wind farms, energy storages and PV
  • Power flow using tertiary control of microgrids
  • Frequency restoration
  • Peak shaving in microgrids
  • Demand response in microgrids
  • Unbalance compensation
  • Voltage harmonic reduction in microgrids

The third part of Microgrid Certification Training, Microgrid certificate training covers the energy management system (EMS) in microgrids. Firstly, the definitions and common terms will be provided to describe the concept of EMS. Then, the audience will be introduced with the main topics of EMS in microgrids such as: Data forecasting in microgrid EMS, DG scheduling, load dispatch, photovoltaic effect in EMS, effect of fuel cells in microgrid EMS, and optimization platform for microgrids.  After introduction part, our instructors will go into the details of EMS architecture and control in microgrids. You will learn the centralized and decentralized EMS techniques, market operator, local controllers, effect of real time data in centralized EMS, communication advancement in EMS, exchanging the price information between multiple DGs, advantages and disadvantages of microgrid EMS, forecasting the data for EMS, optimizing the power flow, optimizing the EMS policies and voltage and frequency control in short term microgrid EMS. Finally, the audience will be introduced to the challenges in the microgrid EMS such as renewable energy intermittency, network latency, and reliability of communications, two way communication challenges, and cyber security in centralized and decentralized microgrid EMS.  You will also learn:

  • Optimal dispatch in microgrid EMS
  • Monitoring devices for EMS
  • Load dispatch in microgrid EMS
  • Major vendors of EMS
  • Photovoltaic in EMS
  • Battery energy storage effect in microgrid EMS
  • Centralized and decentralized EMS in microgrids
  • Microgrid central controller (MGCC)
  • Communicating with neighbors in microgrid
  • Synchronization of microgrid through consensus objective
  • Data transfer limit between neighbors in microgrid
  • Human machine interface (HMI)
  • Real-time control effect in microgrid EMS
  • Optimization in microgrid EMS
  • Weather forecasting
  • Short term and long term EMS
  • Electricity market in EMS
  • Reliability of communications
  • Time synchronization
  • Openness of microgrid EMS
  • Reliability and cyber security of microgrid EMS

microgrid certification training

Audience

The Microgrid Certification Training, Microgrid certificate training is a 4-day course designed for:

  • All engineers who wants to learn, design, or operate the micro grids
  • Power traders to understand the modern microgrid technologies.
  • Independent system operator personnel.
  • Faculty members from academic institutes who want to teach the renewable energy or micro grid courses.
  • Investors and contractors who plan to make investments in smart grid industry.
  • Professionals in other energy industries.
  • Marketing people who need to know the background of the products they sell.
  • Electric utility personnel who recently started career in power systems or having new job responsibilities related to micro grids.
  • Technicians, operators, and maintenance personnel who are or will be working at green energy based companies.
  • Managers, accountants, and executives of power system industry.
  • Scientist or non-electrical engineers involved in micro grid related projects or proposals.
  • Graduate students seeking a professional career in micro grids

 

Microgrid Certification Training Objectives

Upon completion of the Microgrid Certification Training, Microgrid certificate training course, the attendees are able to:

  • Understand the concept of microgrids with its main components
  • Understand the operation of battery energy storage systems
  • Describe the main parts and operation principle of wind farms
  • Explain the operation and control of solar PV modules.
  • Describe the main power electronic converter types implemented in microgrids
  • Understand the hierarchical control of microgrids
  • Describe the differences between islanded mode and grid connected mode operation of microgrids
  • Explain the droop control methods implemented in microgrids
  • Understand the voltage and frequency control algorithms in microgrids
  • Describe the power control methods in islanded or grid connected mode operation.
  • Understand the energy management systems (EMS) in microgrids.
  • Tackle different challenges related to microgrid EMS.
  • Understand the EMS in centralized or decentralized microgrids.
  • Explain the effect of data forecasting in microgrid EMS

Microgrid Certification Training Course Agenda and Topics

Microgrid Certification Training, Microgrid certificate-Part1 (Introduction):

Concept of Microgrids

  • Traditional power network
  • Background and history of renewable energy sources
  • Trends for microgrids
  • Power electronic based devices
  • Common terms
  • Cower consumption in microgrids
  • Renewable generation units
  • Transformers in microgrids
  • Different types of loads in microgrids
  • Component of a microgrids
  • Per unit system
  • Transmission lines
  • DC and AC microgrids
  • Advantages of microgrids
  • Redundancy
  • Modularity
  • Fault tolerance
  • Efficiency in microgrids
  • Maintenance
  • Smaller size and cost benefits
  • Grid connected microgrids
  • Islanded mode operation of microgrids
  • Typical structure of microgrids
  • AC-DC hybrid microgrids
  • Microgrid configurations
  • Synchronization of AC sources in microgrids
  • Stability assessment of microgrids
  • Microgrid protection

Solar Panels and Photovoltaics in Microgrids

  • Why solar energy?
  • High photovoltaic (PV) penetration and utility distribution systems
  • Solar system owners
  • Advanced distribution system and solar panels
  • Main components of a PV system
  • PV module or solar arrays
  • Battery
  • Charge regulator
  • Inverter
  • Back-up generator
  • DC/AC loads
  • Different types of PV modules
  • Main elements of a PV module selection
  • PV strings
  • Connection of modules, series and parallel
  • Lead-acid batteries in PV systems
  • Nickel Cadmium batteries in PV systems
  • Standalone PV system
  • Grid connected PV system
  • Hybrid PV system
  • PV system design considerations
  • Costs in PV systems
  • Installation and operation principals of PV systems
  • PV system control
  • Maximum power point tracking
  • Proportional resonance controller
  • Pulse width modulation unit
  • Current controller
  • Phase locked loop in PV systems
  • Voltage current characteristics of PV modules
  • Power curves for PV system
  • Incremental conductance control
  • Perturb and observe control in PV system

Wind Farms in Microgrids

  • Wind energy systems
  • Wind farm scales
  • Grid integration of wind farms
  • Economics of wind farms
  • Fundamentals of wind power
  • Kinetic energy in wind power
  • Efficiency in extracting the wind power
  • Power curves in wind turbines
  • Different types of wind turbines
  • Doubly fed induction generators (DFIG)
  • Permanent magnet based wind farms
  • Main components of a wind farms
  • Wind generator
  • Wind turbine
  • Wind turbine blades
  • Horizontal and vertical axis wind farms
  • Tower
  • Drive train
  • Electronics and control
  • Pitch
  • Brake
  • Cooling system
  • Foundation of wind farms
  • Control of wind farms
  • Transmission lines
  • Concept of reactive power compensation in wind farms
  • Oscillations in wind farms
  • Control of drivetrain speed
  • Blade regulation control
  • Stalling and pitch angle control
  • Active and reactive power control in DFIGs
  • Wind forecasting
  • Future technology developments of wind farms
  • Cost of wind energy

Battery Energy Storage Systems in Microgrids

  • Concept of energy storage systems
  • Emerging needs for energy storages
  • Effect of energy storages in utility, customers and generations
  • Classifications of energy storage systems
  • Economics of energy storages in market
  • Energy storage applications in current grids
  • Limiting factors in energy storage implementations
  • Mechanical storage systems
  • Electromechanical storage systems
  • Chemical energy storages
  • Thermal storage systems
  • Conventional battery technology
  • Capacitors
  • Superconducting magnetic energy storage
  • Contingency reserves by energy storages
  • Reactive support and voltage control
  • Black start capability of energy storages
  • Congestion management by energy storages in microgrids
  • Demand management
  • Detailed models of energy storage systems
  • Different sizes of energy storage system for microgrid applications
  • Applications of energy storages in microgrids
  • Grid operational support by energy storages
  • Power quality and reliability improvements by energy storages
  • Concept and power and energy in storage systems
  • Discharging principles
  • Short term applications of energy storages in microgrids
  • Control of energy storage systems
  • Droop control
  • Active and reactive power control in energy storages
  • State of charge (SOC) control
  • Optimization techniques by energy storage system control

 

Microgrid Certification Training, Microgrid certificate-Part2 (Control and Operation):

Basics of Microgrid Control

  • Types of operation of microgrids
  • Control in grid connected mode
  • Control in islanded mode
  • Power electronic based equipments in microgrids
  • Power electronic converters
  • Power electronic switches
  • Classification of power electronic converters implemented in microgrids
  • Voltage source converters in microgrids
  • Multilevel voltage source converters
  • Pulse width modulation techniques
  • Operation principles of PV panel system
  • Operation principles of wind turbines
  • Effect of UPS in microgrid systems
  • Distributed loads in microgrids
  • Effect of virtual inertias in microgrids
  • Integration of distributed generation to shape smart grids
  • Necessity of maximum power point trackers
  • Operation of storage units in islanded mode
  • Effect of electric vehicle charging stations in microgrids
  • Wind turbine generations, offshore and on shore

Islanded Mode Operation of Microgrids

  • Islanded mode operation basics
  • Effect of long-term voltage dips or faults
  • Importing and exporting the active and reactive power
  • Controlling the current and voltage in converters
  • Supporting the frequency and voltage
  • Virtual synchronous generator effect
  • Blackouts by main grids
  • Voltage and frequency management in islanded mode operation
  • Supply and demand balancing effect
  • Power quality in islanded mode operation
  • Hierarchy of loads in islanded mode
  • Concept of point of common coupling
  • Control of a voltage source converter in islanded mode
  • Effect of LCL filter
  • Direct and quadratic (d-q) axis based control
  • Voltage control loop
  • Effect of inner current loop in islanded mode
  • Parallel converters in islanded mode operation
  • Effect of master/slave control in islanded mode
  • Frequency droop control in parallel operation
  • Voltage droop control in parallel operation

Grid Connected Mode Operation of Microgrids

  • Basics of grid connected operation
  • Control of a single converter in grid connected mode
  • Effect of parallel converters in control
  • Concept of master and slave control
  • Inner current loop and voltage control in grid connected mode
  • Droop control strategy of grid connected converters
  • Active power sharing among converters through droop
  • Reactive power sharing droop
  • Concept of inertia in microgrids
  • Effect of synchronization through an inverter
  • An inverter working as a synchronous generator
  • Park transformation in droop control of inverters in grid connected mode
  • Low voltage ride through capability of voltage source converters in grid connected mode

Hierarchical Control of Microgrids

  • Primary control loop
  • Secondary control in microgrids
  • Tertiary control
  • Centralized control of microgrids
  • Decentralized control of microgrids
  • Primary control in wind energy systems
  • Primary control in PV systems
  • Primary control in energy storages
  • Secondary control in wind energy systems
  • Secondary control in PV systems
  • Secondary control in energy storages
  • Calculating power flow for tertiary control
  • SOC management control for energy storage system
  • Cooperative synchronization of multiple energy storage units
  • Secondary control in islanded microgrids
  • Frequency restorations
  • Power quality improvement
  • Energy management systems for load shedding
  • Load shedding
  • Peak shaving control
  • Synchronization of the microgrid with grid
  • Optimization and upper level control as a tertiary control loop
  • Low voltage ride through as a tertiary control loop
  • Islanding detection
  • Microgrids interconnections
  • Harmonic compensation
  • Voltage harmonic reduction in grid connected mode
  • Voltage harmonic reduction in islanded mode
  • Unbalance compensation in microgrids
  • Concept of unbalance in microgrids
  • Sources for unbalances
  • Modeling the unbalance effect
  • Designing the compensation algorithms

 

May
16
Wed
EMC/EMI Training for Aerospace @ Dallas
May 16 @ 9:00 am – May 18 @ 4:00 pm
Print Friendly, PDF & Email

EMC/EMI Training for Aerospace by TONEX

EMC/EMI Training for Aerospace will help the attendees to develop and build EMC / EMI compliance systems that optimizes your system’s performance and reliability.

Electromagnetic Interference (EMI)/Electromagnetic Capability (EMC) for Aerospace Training Course will help you to cost-effectively identify EMC/EMI problems early in your product development cycle. EMC/EMI Training for Aerospace should also help you with capability of troubleshooting your design if you have compliance problems such as: shielding, filtering, bonding and grounding techniques, and associated materials.

Learn how to establish interface and associated verification requirements for the control of the electromagnetic interference (EMI) emission and susceptibility characteristics of electronic, electrical, and electromechanical equipment and subsystems designed or procured for use by Aerospace activities and agencies including items that have the following features: electronic enclosures, equipment racks, electrical interconnections that are discrete wiring harnesses between enclosures, and electrical power input derived from prime power sources.

EMC testing (emissions and immunity) to a variety of standards including:

  • ANSI C63.4
  • Bellcore GR-1089-Core (NEBS)
  • EMC Directive for Europe (includes EN61000 series and EN550XX series of tests)
  • EPRI TR-102323
  • FCC Part 2, 15
  • FCC Part 18 Electromagnetic Tests and Certification
  • FCC Part 68 (Analog systems)
  • Magnetic Field Interactions MIL-E-16400
  • MIL-STD 461/462
  • NASA Specification MSFC Spec. 521
  • SAE J1211
  • SAE J551/J1113
  • TIA 631
  •  US Nuclear Regulatory Commission Guide 1.180
  • VCCI Japan
May
30
Wed
VSAT Technology Training Boot Camp @ Nashville
May 30 @ 9:00 am – Jun 1 @ 4:00 pm
Print Friendly, PDF & Email

VSAT Training covers Very Small Aperture Terminal (VSAT) systems. VSAT is growing throughout the world as a way of establishing private satellite communications networks for large organizations that have several widely dispersed locations, or providing higher bandwidth for the individual.

Depending on bandwidth requirement (data speed and/or communications channels), VSAT systems can be relatively small and easily installed.

A VSAT is a two-way satellite ground station with a dish antenna that is smaller than 3 meters (most VSAT antennas range from 75 cm to 2.4 m).

Very Small Aperture Terminals data rates typically range from narrowband up to 18 Mbit/s.

Very Small Aperture Terminals access satellites in geosynchronous orbit to relay data from small remote earth stations (terminals) to other terminals (in mesh configurations) or master earth station hubs (in star configurations).

Jun
21
Thu
Microwave Radio Link Planning and Frequency @ Nashville, TN
Jun 21 @ 9:00 am – Jun 22 @ 4:00 pm
Print Friendly, PDF & Email

Nashville, TN; June 21- 22, 2018

Microwave Training Course, Microwave Radio link planning and frequency management

Microwave Training Course presents the state-of-the-art in microwave radio communications. The course presents the basic theory, procedures, and techniques for microwave communication systems an Microwave Radio link planning and frequency management. Detailed mathematical analyses are minimized in order to concentrate on basic concepts, procedures, and optimal applications. Measured results are used to demonstrate each of the techniques discussed.

Microwave networks provide reliable point-to-point and highly directional communication that maximizes your RF transmission. Because Microwave uses a higher frequency band, the capacity, throughput, and reliability of Microwave networks is well proven and understood to be very efficient throughout the telecommunications industry. In existence since the mid 1940’s, point-to-point microwave now uses digital modulation rather than simply analog.

Course Agenda

Radio System Design

  • Radio Propagation.
  • Line-of-Sight Microwave
  • Digital Line-of-Sight Microwave
  • Forward Error Correction (FEC) and Advanced Digital Waveforms
  • Basic Principles of Satellite Communications
  • Digital Communications by Satellite
  • Very Small Aperture Terminals
  • Radio System Design Above 10 GHz
  • Mobile Communications: Cellular Radio and Personal Communication Services
  • High Frequency (HF) Transmission Links
  • Meteor Burst Communication
  • Interference Issues in Radio Communications
  • Radio Terminal Design Considerations

Introduction to Microwave Communications

  • Overview
  • Microwave Radio Service
  • Regulatory and Licensing

Transmission Media

  • Copper Wire
  • Microwave Radio
  • Fiber Optic Cable
  • Bandwidth
  • Attenuation
  • Noise

Transmission Principles

  • Impedances
  • Matching
  • SWR
  • Return Loss

Propagation Transmission Characteristics

  • Microwave Frequencies
  • Wavelength – Defined
  • Propagation
  • Natural and Man-Made Obstructions to Propagation
  • Spectrum regulation and licensing aspects
  • Relevant ITU Recommendations
  • Wave propagation and effects
  • ITU Propagation Models
  • Path profile analysis
  • Microwave devices and antennas

 

Modulation In Microwave Systems

  • Modulation Overview
  • Basebands
  • FM & PM Modulation
  • Digital Modulation

Baseband Interfaces and Channels

  • System Loading -FDM
  • Network Elements
  • Low Density Digital S
  • Medium Density DS3
  • High Density SONET/SDH
  • Higher Capacity Optical Netorks

The Microwave System

  • Transmitters
  • Receivers
  • Microwave Antennas

Microwave Links

  • Antennas
  • Propagation
  • Power budgets (link calculations)
  • FDM/TDM
  • Basic rules

 

Microwave Link Budget and System Evaluation

  • The Link Budget
  • System Gain and Loss
  • Planning a Point to Point System
  • Understanding Digital Microwave System Testing
  • Interpreting Microwave Alarms

 

Microwave Radio Link Planning and Frequency Management

  • Planning & Coordination of Microwave Links (PtP & PtMP)
  • Communication links with high capacity and availability.
  • Wave propagation
  • Microwave link budgets and availability calculations
  • Technical parameters of antennas and microwave devices
  • Analysis of Path Profiles
  • LoS ( line of sight) aspects
  • Engineering of links and frequency and capacity planning
  • Effective use of frequency raster
  • Analysis of the complete network interference
  • Low interference and high frequency reuse
  • Availability and error performance
  • Link budget calculation
  • Frequency planning and channel assignment
  • Techniques for Interference analysis and network optimization

Who Should Attend

Engineers, technicians and managers who are new to Microwave and require applicable skills in design, planning and engineering.

Objectives

After completing this course, students will be able to:

  • Explain the Basics of RF and Microwave
  • Understand the engineering tools and procedures required for Microwave engineering and planning
  • Understand existing and emerging standards for Microwave
  • Understand RF Propagation and Antenna Principle
  • Describe and understand a broad spectrum of antenna types
  • Discuss Microwave Modulation Techniques
  • Review Microwave System Design Considerations
  • Review Microwave System Budget Profiles
  • Calculate Microwave Propagation Lossess and Link Budgets
  • Explain Microwave performance and Optimization considerations
  • Analyze system degradation due to Microwave components
  • Evaluate the performance of differing Microwave wireless system architectures
  • Explore project planning process of Microwave Systems
  • Review successful Microwave Deployments
  • Step through a practical process for managing Microwave networks
  • Explore the current and future market trends
  • Undertand Microwave Radio link planning and frequency management
Jan
14
Mon
Machine Learning Training Bootcamp @ Tonex Washington, DC
Jan 14 @ 9:00 am – Jan 16 @ 4:00 pm
Print Friendly, PDF & Email

Machine Learning Training Bootcamp

Machine Learning training bootcamp is a 3-day technical training course that covers the fundamentals of machine learning, a form and application of artificial intelligence (AI).

Machine learning helps to automate the data analysis process by enabling computers, machines and IoT to learn and adapt through experience applied to specific tasks without explicit programming.

Attendees will learn, comprehend and master ideas on machine learning concepts, key principles, techniques including: supervised and unsupervised learning, mathematical and heuristic aspects, modeling to develop algorithms, prediction, linear regression, clustering, classification, and prediction.

Learn differences and similarities between Machine Learning, Artificial Intelligence, Deep Learning, Data Mining and Data Warehouse. Artificial Intelligence uses models built by Machine Learning to create intelligent behavior applied to businesses, marketing and sales, operations, autonomous cars, games and industrial automation by prediction based on rules and using programming languages and algorithms.

Machine learning based on artificial intelligence provides the ability to learn about newer data sets without being programmed explicitly using methods of data analysis. Machine Learning takes advantages of Data Mining techniques, statistics, other key principles and learning algorithms to build models to predict future outcomes. Math and programming are the basis for many of the machine learning algorithms. Using machine learning as a tool, the machine must automatically learn the parameters of models from the data. Using larger datasets, better accuracy and performance is achieved.

Machine learning and data mining can use the same key algorithms to discover patterns in your data and dataset. In machine learning, the computers, machines and IoT devices must automatically learn the parameters of models from the data using self-learning algorithms to reveal insights and provide feedback in near real-time.

Machine learning, for example, can be used in proactive maintenance to continuously monitor the performance of simple or complex industrial systems, applications and events. Using the ability to learn and adapt, makes it the optimal choice for improvements in ongoing processes, and to automatically predict and prevent failures.

Learn how Machine Learning can automatically process and analyze huge volumes of complex data. Machine learning powers innovative automated technologies such as recommendation engines, facial recognition, financial losses from stock market and bonds, fraud protection, self-driving autonomous cars, robotics, industrial automation and future applications.

Learning Objectives

After completing this course, the student will be able to:

  • Learn about Artificial Intelligence (AI), Machine Learning (ML) and Deep Learning (DL)
  • List similarities and differences between AI, Machine Learning and Data Mining
  • Learn how Artificial Intelligence uses data to offer solutions to existing problems
  • Explore how Machine Learning goes beyond AI to offer data necessary for a machine to learn, adapt and optimize
  • Clarify how Data Mining can serve as foundation for AI and machine learning to use existing information to highlight patterns
  • List the various applications of machine learning and related algorithms
  • Learn how to classify the types of learning such as supervised and unsupervised learning
  • Implement supervised learning techniques such as linear and logistic regression
  • Use unsupervised learning algorithms including deep learning, clustering and recommender systems (RS) used to help users find new items or services, such as books, music, transportation, people and jobs based on information about the user or the recommended item
  • Learn about classification data and Machine Learning models
  • Select the best algorithms applied to Machine Learning
  • Make accurate predictions and analysis to effectively solve potential problems
  • List Machine Learning concepts, principles, algorithms, tools and applications
  • Learn the concepts and operation of support neural networks, vector machines, kernel SVM, naive bayes, decision tree classifier, random forest classifier, logistic regression, K-nearest neighbors, K-means and clustering
  • Comprehend the theoretical concepts and how they relate to the practical aspects of machine learning
  • Be able to model a wide variety of robust machine learning algorithms including deep learning, clustering and recommendation systems

Course Agenda and Topics

The Basics of Machine Learning

  • What is Machine Learning?
  • Emergence and applications of Artificial Intelligence and Machine Learning
  • Basics of Artificial Intelligence
  • Basics of Machine Learning
  • Basics of Data Mining
  • Data Mining versus Machine Learning versus Data Science
  • Data Mining and patterns
  • Why is machine learning important?
  • Creating good machine learning systems

Machine Learning Techniques, Tools and Algorithms

  • Supervised, unsupervised, semi supervised and reinforcement learning
  • Basic tools and ideas in Machine Learning
  • Supervised Machine Learning problems and solutions
  • Supervised Machine Learning tasks subgroups: regression and classification
  • Unsupervised Machine Learning
  • Unsupervised tasks and generative modelling
  • Reinforcement Learning, Hybrids and Beyond
  • Data preparation capabilities
  • Techniques of Machine Learning
  • Polynomial regression
  • Linear regression
  • Random forest
  • Decision tree regression
  • Gradient descent and regularization
  • Classification
  • Logistic regression
  • K-nearest neighbors
  • Support vector machines
  • Naive Bayes
  • Kernel support vector machines
  • Decision tree classifier
  • Random forest classifier
  • Clustering algorithms
  • K-means clustering
  • Bias and variance trade-off
  • Representation learning
  • Data Preprocessing
  • Data preparation
  • Feature engineering and scaling
  • Data and Datasets
  • Dimensionality reduction

Data and Data Science

  • Principles of Data science
  • Programming, logical reasoning, mathematics and statistics
  • Data Engineering versus Data Science
  • Time series comparison
  • Neural Networks
  • Steps to Machine Learning

Review of Terminology and Principles

  • Math Refresher
  • Concepts of linear algebra
  • Probability and statistics
  • Algorithms
  • Automation and iterative processes
  • Scalability
  • Ensemble modeling
  • Framing
  • Generalization
  • Machine Learning methods
  • Classification
  • Training and Training Set
  • Validation
  • Representation
  • Regularization
  • Logistic Regressions
  • Neutral Nets
  • Neutral Nets
  • Multi class Neutral Nets
  • Embeddings
  • Basic Algebra and Calculus
  • Basic Python
  • Chain rule
  • Concept of a derivative
  • Gradient or slope
  • Linear algebra
  • Logarithms, and logarithmic equations
  • Matrix multiplication
  • Mean, median, outliers and standard deviation
  • Partial derivatives
  • Sigmoid function
  • Statistics
  • Tanh
  • Tensor and tensor rank
  • Trigonometry
  • Variables, coefficients, and functions

Applied Artificial Intelligence (AI) and Machine Learning

  • Machine Learning prediction with models
  • Artificial Intelligence behaving and reasoning
  • Applications of Machine Learning
  • Machine Learning algorithms
  • Models
  • Techniques
  • Statistics and Math
  • Algorithms
  • Programming
  • Patterns and Prediction
  • Intelligent Behavior
  • Statistics quantifies numbers
  • Machine learning generalizing information from large data sets
  • Principles to detect and extrapolate patterns
  • Machine Learning System Analysis and Design
  • Support Vector Machines

Popular Machine Learning Methods

  • Supervised learning and unsupervised learning
  • Supervised learning algorithms and labeled data
  • Trained using labeled examples
  • Classification, regression, prediction and gradient boosting
  • Supervised learning and patterns
  • Predicting the values of the label on additional unlabeled data
  • Using historical data to predict likely future events
  • Unsupervised learning and unlabeled data
  • Unsupervised learning against data that has no historical labels
  • Semi supervised learning
  • Using both labeled and unlabeled data for training
  • Classification, regression and prediction
  • Reinforcement learning
  • Robotics, gaming and navigation
  • Discovery through trial and error
  • The agent (the learner or decision maker)
  • The environment (everything the agent interacts with)
  • Actions (what the agent can do)

Learning Applied to Machine Learning

  • Application of Supervised versus Unsupervised Learning
  • Case Study: credit card transactions as fraudulent charges
  • Self-organizing maps, nearest-neighbor mapping, k-means clustering and singular value decomposition
  • Face recognition

Principal Component Analysis

  • Anomaly detection
  • Deep learning
  • Neural networks
  • Learning with deep neural networks
  • Deep neural networks and hidden layers and multiple types of hierarchies
  • Deep learning as a type of machine learning
  • Regularization
  • Machine learning models need to generalize well to new examples that the model has not seen in practice.
  • Tools to prevent models from overfitting the training data.

Principles of Supervised Machine Learning Algorithms

  • Machine Learning algorithms mind map
  • What is supervised machine learning?
  • How does it relate to unsupervised machine learning?
  • Classification and regression supervised learning problems
  • Clustering and association unsupervised learning problems
  • Algorithms used for supervised and unsupervised problems
  • Supervised Machine Learning as a majority of practical machine learning
  • Supervised learning problems grouping into regression and classification problems
  • Principles of “Classification”
  • Principles of “Regression”
  • Popular examples of supervised machine learning algorithms
  • Linear regression for regression problems
  • Random forest for classification and regression problems
  • Support vector machines for classification problems

Principles of Unsupervised Machine Learning

  • The goal for unsupervised learning
  • Modeling the underlying structure or distribution in the data
  • Ways to learn more about the data
  • Algorithms to discover and present the interesting structure in the data
  • Unsupervised learning problems grouping into clustering and association problems
  • Principles of “Clustering”
  • Ways to discover the inherent groupings in the data
  • Principles of “Association”
  • Ways to discover rules that describe large portions of your data
  • Examples of unsupervised learning algorithms
  • K-means for clustering problems
  • Apriori algorithm for association rule learning problems
  • Semi-Supervised Machine Learning
  • Unlabeled data and a mixture of supervised and unsupervised techniques
  • Collecting and storing unlabeled data

Regression Applied to Machines Learning

  • Linear Regression with One Variable
  • Application of linear regression
  • Method for learning
  • Linear Algebra Review
  • Refresher on linear algebra concepts
  • Models with multiple variables
  • Linear Regression with Multiple Variables
  • Implement the learning algorithms in practice
  • Logistic Regression
  • Logistic regression is a method for classifying data into discrete outcomes
  • Logistic regression to classify a credit card transaction as fraud or not fraud

Principles of Neural Networks

  • Neural Networks Representation
  • Principles behind neural networks and models
  • Neural Networks Learning
  • Backpropagation algorithm
  • Learn parameters for a neural network.
  • Implementing your own neural network for credit card fraud
  • Advice for Applying Machine Learning
  • Best practices for applying machine learning in practice
  • Best ways to evaluate performance of the learned models

Large Scale Machine Learning

  • Real-world case studies
  • Interactive visualizations of algorithms in action
  • Pattern Recognition
  • Accuracy
  • Case Study: Marketing Campaign
  • Working with Regression
  • Prediction
  • Classification
  • Logistic Regression
  • Unsupervised Learning with Clustering

Introduction to Deep Learning

  • Principles of Deep Learning
  • Artificial Neural Networks
  • TensorFlow
  • Learning complicated patterns in large amounts of data
  • Identifying objects in images and words in sounds
  • Automatic language translation
  • Medical diagnoses

Applying Machine Learning

  • Applying machine learning to IoT
  • Financial services
  • DoD
  • Government
  • Health care
  • Marketing and sales
  • Oil and gas
  • Renewable Energy
  • Transportation

Overview of Algorithms

  • Associations and sequence discovery
  • Bayesian networks
  • Decision trees
  • Expectation maximization
  • Gaussian mixture models
  • Gradient boosting and bagging
  • Kernel density estimation
  • K-means clustering
  • Local search optimization techniques
  • Multivariate adaptive regression splines
  • Nearest-neighbor mapping
  • Neural networks
  • Principal component analysis
  • Random forests
  • Self-organizing maps
  • Sequential covering rule building
  • Singular value decomposition
  • Support vector machines

Overview of Tools and Processes

  • Comprehensive data quality and management
  • GUIs for building models and process flows
  • Interactive data exploration
  • Visualization of model results
  • Comparisons of different machine learning models
  • Identify the best machine learning models
  • Automated ensemble model evaluation
  • Repeatable and reliable results
  • Integrated, end-to-end platforms to automate data-to-decision process
  • Exploratory Data Analysis with R
  • Loading, querying and manipulating data in R
  • Cleaning raw data for modeling
  • Reducing dimensions with Principal Component Analysis
  • Identifying outliers in data
  • Working with Unstructured Data
  • Mining unstructured data
  • Building and evaluating association rules
  • Constructing recommendation engines
  • Machine learning with neural networks
Jan
21
Mon
Scrum @ Tonex Training Center
Jan 21 @ 9:00 am – Jan 22 @ 4:00 pm
Print Friendly, PDF & Email

Scrum training

Mar
6
Wed
Defense Demilitarization Program Course (DDPC) @ Tonex Dallas
Mar 6 @ 9:00 am – Mar 8 @ 4:00 pm
Print Friendly, PDF & Email

Defense Demilitarization Program Course (DDPC)

Defense Demilitarization Program Course (DDPC) will identify what the Defense Demilitarization Program Course DEMIL is and will define what the codes associated with the items mean.  Emphasis will be placed on the accurate coding of Munitions List Items (MLI) / Commerce Control List Items, the employment of the DEMIL manual and the latest changes effecting the DEMIL program.

DEMIL training will be tailored to personnel who have a functional responsibility associated with the logistics and disposal of military property, assignment of DEMIL codes and/or management of the DoD Demilitarization and Trade Security Controls Program.

DEMIL training is required for personnel to assign DEMIL code and to verify and validate that DEMIL of the MLI has been completed.

Target Audience: Provisioners, Inventory Managers and other NSWC PHD personnel who want to become familiar with Demilitarization

Pre-Requisites:  None

 Learning Objectives

Upon completion of this course, the participants are able to:

  • Identify regulatory and implementing documents used in DEMIL and Trade Security controls.
  • Examine the USML to identify MLI.
  • Discuss requirements for each DEMIL code.
  • Assign DEMIL codes to MLI.
  • Identify additional requirements for instructions associated with DEMIL code G, P and F items.
  • Identify the entities authorized to perform physical DEMIL.
  • Distinguish between DEMIL code “Q” and DEMIL code “A” items by using the Commerce Control List.
  • Determine appropriate disposition requirements for MLI and CCLI by using the DEMIL Code Challenge Program
  • Interpret disposition requirements for Munitions List Items and Commerce Control List Items.
  • Discuss DoD Trade Security Controls
  • Interpret the policies and programs applicable to MLI and CCLI in Contractor Inventory.

Course Agenda

  • Principles of DEMIL
  • DoD Demilitarization (DEMIL) Program
  • DEMIL Program Administration
  • DEMIL Planning Guidance
  • DEMIL Roles and Responsibilities
  • Demilitarization Coding
  • Policy and assigns responsibilities for the DoD DEMIL program
  • DoD Directive 5134.01
  • Oversight of DEMIL functions
  • DEMIL code assignment accuracy
  • DEMIL life cycle planning
  • Section 1051 of Public Law 105-261
  • DoD programs for the research, development, and acquisition; management; sustainment; maintenance; disposition; or release of DoD personal property
  • Commerce Control List (CCL)
  • Trade security controls (TSC) measures
  • DoD Instruction 2030.08
  • Sensitive and non-sensitive Commerce Control List Items (CCLI)
  • International transfers procedures in DoD Instruction 2040.02
  • DEMIL Validation Program
  • DEMIL and Controlled Inventory Item Codes (CIICs)
  • DLA Disposition Services
  • DLA Disposition Services/Controlled Property Verification
  • DEMIL Waivers and Modifications
  • Captured Property
  • Qualified Recycling Program
May
16
Thu
Design Verification Plan & Report Training | DVP&R Training @ Tonex Atlanta
May 16 @ 9:00 am – May 17 @ 4:00 pm
Print Friendly, PDF & Email

Design Verification Plan & Report (DVP&R) training course covers the theories, concepts, and methods required for DVP&R. Design verification, in general, is a crucial part of any product development. It is a key step in qualification testing, ensuring that the final product is the same as the product was supposed to design and develop. Failing to complete this step can lead to produce and manufacture a product that doesn’t meet the characteristics of the designed product or the prototype.

As you might know, many clients take the testing and design verification of products very seriously, as though in the same importance as the actual design. Even so, many contracts require design verification as a major phase, in which the clients often send their own people to witness testing and to ensure they are conducted to their satisfaction. Therefore, if you are the manager of or a member of the quality, R&D, and design team, you need to know how to conduct design verification and how to prepare the report. The TONEX Design Verification Plan and Report training course will help you gain sufficient knowledge and develop necessary skills to be able to complete DVP&R for your products.

TONEX Design Verification Plan and Report training includes many in-class activities including hands on exercises, case studies and workshops. During the DVP&R workshops, attendees can bring in their own design work and products and through our coaching, develop their own Design Verification Plan and Report (DVP&R).

While testing might seem costly at first, the price of not having it done can be way higher plus it can negatively affect the reputation of the company in the client’s view if the final product doesn’t meet the promised characteristics.

Testing should be included in the design process at many points, from the very beginning when the concept is developed to the end when the final product is produced. Although type of the tests and the methods vary from one point to another, the general guidelines are applied to all. During the DVP&R training course, we will teach you these guidelines and also teach you how to tailor them based on where, where, and the type of product for which you are conducting the tests.

Historically, DVP&R processes have been practiced by the automotive industry. However, currently such processes are being used in almost all manufacturing industries including mechanical, electrical, chemical, and even pharmaceutical and that’s because a proper Design Verification/Product Validation (DV/PV) can significantly eliminate failure modes and increase the reliability of the product. In this seminar, we will walk you through all the steps of a good, effective DV/PV that is appropriate for your industry.

Audience

The TONEX Design Verification Plan and Report (DVP&R) training is a 2-day course designed for:

  • Engineers, scientists, and managers involved with manufacturing
  • Production and manufacturing team
  • Product design personnel
  • Reliability, testing, and quality team members
  • R&D personnel
  • Product and process assurance people
  • Assembly personnel

Training Objectives

Upon completion of this course, attendees are able to:

  • Understand and explain the importance of Design Verification Plan and Report
  • Discuss the theory of Design Verification Plan and Report
  • Design an appropriate DVP for the product they are testing
  • Design and conduct necessary and relevant testing at various points during the design process
  • Interpreted the results of the testing to find if and where the problem is and where the product deviates from standards
  • Prepare the Design verification Report
  • Test the prototype
  • Identify the best method to conduct the verifications
  • Developing measurement methods
  • Determine opportunities to combine all verification activities
  • Determine required equipment, software, facilities, etc. to conduct verifications
  • Determine a high-level verification schedule

Course Outline

Overview and Background

  • Definition of Design Verification
  • What is a Design Verification Plan and Report
  • Why is it crucial in the designing and manufacturing process?
  • How does it impact the quality of the product, cost of production, and customer satisfaction?
  • When DVP&R is needed?

Introduction to Design Verification

  • Tests development
  • Prototype testing
  • Proof testing
  • Acceptance testing

The Verification Process

  • Basics of verification
  • Design scenarios and verification action plan
  • Verification; a risk-based process
  • Different types of risks
  • How to incorporate risk to affect the verification practice
  • Model of risk-based verification design

Verification Methods

  • Demonstration
  • Inspection
  • Analysis
  • Similarity
  • Testing
  • How to select the most appropriate method

The Verification Activities

  • Identifying verification activities
  • Preparing for verification activities
    • Best approach identification
    • Measurement methods definition
    • Verification activities combination
    • High-level verification schedule identification
    • Developing a detailed Design Verification Plan
  • Conducting verification activities
    • Performing the Design Verification Plan
    • Logging the results
    • Highlighting the non-conformance

Implementing A DVP&R

  • Setting out the verification testing method
  • Outline your Verification Plan
    • Review all the requirements and protocols
    • Analyze the potential risks
    • Draft you Verification Plan
  • Refine your Verification Plan
    • Identify the verification demand
    • Review all the possible verification methods
    • Analyze all the advantages/disadvantages of each method
    • Select the best approach
    • Validate the selected method(s)
  • Perform protocols
    • Complete protocols
    • Implement protocols

Complementary Checklist

  • Verification methods development
    • Draft the methods
    • Check the methods
  • Documentation
    • Documenting all the plans and protocols
  • Implement and manage changes in the design based on the DVP&R

Design Verification Plan & Report Hands-on and In-Class Activities

  • 3 Labs
  • 2 Workshops
  • 1 Group Activity

Sample DVP&R Activity Workshop

  • How to develop a DVP&R Template (TONEX’s DVP&R Template)
  • How to develop proper methods
  • How many testings (testing points) would you need?
  • Analyzing the potential risks
  • How to read the raw data and analyze them?
  • How to use data to decide whether (or not) the prototype or sample has deviated from its specifications?
  • How to prepare the report
  • How to use the report to make adjustments?
May
20
Mon
Pipeline Leak Detection Training | Pipeline Leak Monitoring Training @ TONEX Plano, TX
May 20 @ 9:00 am – May 23 @ 4:00 pm
Print Friendly, PDF & Email

Pipeline Leak Detection Training Course Description

Pipeline Leak Detection Course is a 4-day training boot camp covers all aspects of pipeline leak detection system. Pipeline leak detection systems can help minimize the liability of pipeline operating companies. The early identification and accurate location of a pipeline incident are essential for protecting a company’s reputation.

Leak detection is a good tool for quickly raising alarms for theft, identifying product loss due to wear and corrosion to the pipe, and/or preventing environmental events caused by spills. Whether driven by safety and production concerns or regulatory requirements, the method chosen for leak detection has a significant impact on its effectiveness.

Although moving crude oil, gas, liquid and hazardous materials in pipelines is the safest means of transport, a number of incidents have been associated with this method. Statistics from the Office of Pipeline Safety within the U.S. Department of Transportation, Pipeline and Hazardous Materials Safety Administration show that over the twenty year period from 1991 to 2010 there were 5,636 significant incidents involving 378 fatalities, US$ 440,652,471 property damage and 2,566,699 gross barrels spilled in the USA alone.
Pipeline incidents incur liabilities to pipeline operators, pipeline shareholders and owner of the volume lost. Such liabilities can range from cleaning up cost and damage compensation to criminal offences.

Major liabilities are usually associated with major leak events without a reliable pipeline leak detection system. Therefore investing in a proven and reliable leak detection system can help pipeline companies minimize the consequences of a pipeline incident.

To maintain the above performance standard, it is necessary for the pipeline operating companies and leak detection system to insure that:

  • The field instruments are working correctly.
  • The SCADA and telecommunication system are available.
  • The leak detection system is optimized to current operating and instrument conditions.
  • Alarms and anomalies are addressed timely.
  • Operators have confidence in the leak detection system at all times.

After completing this course, students will be able to:

  • Explain the basic architecture and components of a Pipeline and Pipeline Leak Detection System
  • (LDS)
  • Describe the component technologies behind an LDS system
  • Describe the component technologies behind a SCADA system
  • Apply potential benefits of LDS and SCADA applied to Aramco
  • Understand the base standards that apply to LDS
  • Understand the terms used in describing the technology
  • Discuss the technical aspects of LDS, SCADA and communications methods
  • Review LDS and SCADA System Design Considerations
  • Review integration of LDS with SCADA
  • Explain LDS and SCADA performance and Optimization considerations
  • Explore project planning process of LDS
  • Discuss successful and unsuccessful LDS deployments
  • Step through a practical process for managing LDS Systems
  • Explore the current and future LDS market trends

Topics Discussed

  • Pipeline Leak Detection techniques
  • Leak detection system optimizations to current operating and instrument conditions
  • Pipeline leak detection techniques by a SCADA system that controls and monitors the pipeline
  • Integrating leak detection into existing SCADA systems to provide alarm management of a leak
  • event as well as record keeping and trending before and after the event
  • Techniques to locating the leak with a precise location for quicker response and repairs

Pre-Requisites

Pipeline Leak Detection Training | Pipeline Leak Monitoring Training

Outline

Basic Fundamental and Concepts of Leak Detection

  • General Types of Energy Pipelines
  • Crude oil
  • Multi-products with varying batch sizes
  • Natural gas including wet gas
  • Carbon Monoxide (CO)
  • Hydrogen (H2), Ethylene, Chlorine, Propylene, LPG, and Water
  • Pipeline Components
  • Structural Design of Pipeline
  • Planning and Construction of Pipeline
  • Instrumentation and Pigging
  • Maintenance, Reliability and Failure Analysis
  • Pipe defects
  • Corrosion on Pipeline
  • Pipeline Rehabilitation and Repair Techniques
  • Flaws in Pipeline Leak Detection Systems
  • Leak Detection Systems (LDS)
  • Leak Detection and SCADA Systems
  • Integration of a LDS with SCADA
  • Multiphase pipeline leak detection
  • Pipeline Risk Assessment
  • Pipeline Maintenance and Repair
  • Classification of Leak Detection Technologies
  • Evaluation of Leak Detection Systems
  • Standards for Leak Detection Systems

Overview of Leak Detection Systems (LDS)

  • LDS technologies / methods
  • LDS technologies / methods
  • LDS components
  • Hydraulics theories pertaining to LDS
  • Communication infrastructure
  • Operations & maintenance
  • Troubleshooting and Diagnostics
  • Pipeline Leak Detection Best Practices
  • Statistical Pipeline Leak Detection
  • Rarefaction Wave Leak Detection
  • Multiphase Pipeline Leak Detection
  • Internally based LDS
  • Pressure/Flow monitoring
  • Acoustic Pressure Waves
  • Balancing methods
  • Statistical methods
  • RTTM methods
  • E-RTTM methods
  • Bubble Emission Method

Types of LDS

  • Externally based LDS
  • Infrared radiometric pipeline testing
  • Acoustic emission detectors
  • Vapour-sensing tubes
  • Fibre-optic leak detection
  • Visual Inspection Procedures
  • Visual Leak Detection Capability
  • Manual Over/Short Calculation
  • Pressure Monitoring
  • Discrete Sensor based Technologies
  • Liquid Sensing
  • Vapor Sensing
  • Acoustic Emissions
  • Factors that can affect External Methods

LDS Technique Selection

  • Pipeline Service Types
  • Types by Transport Function
  • Pipe Leakage Evaluation
  • Components and Definitions
  • LDS Technique Selection
  • LDS Selection Methodology
  • Methods Used
  • Burst & leak history
  • Pipeline Audits
  • DMA/Flow
  • Measurement (flow into less flow out of network)
  • Hydrostatic testing (pressure testing)
  • Pipeline Asset Management
  • Infrastructure Leakage Index (ILI)
  • Pressure Control
  • District Meter Areas (DMA’s)
  • Leak Noise Surveys
  • Leak Correlation Survey’s
  • Noise Logger Survey’s
  • Acoustic emission
  • Acoustic with Correlation
  • Ultrasonic
  • Ultrasonic flow measurement
  • Transit time and Doppler
  • Clamp-on ultrasonic flowmeters
  • Transducers
  • Measuring fluid flow velocity
  • Nonintrusive clamp-on transducers
  • Distance Measurement
  • Advanced Correlation
  • Infrared Thermography
  • Chemical
  • Mechanical
  • Ground Penetrating Radar
  • Volume or mass balance
  • Rate of change in flow or pressure
  • Hydraulic modelling
  • Pressure point analysis
  • Limitations of Leak Detection Methods
  • Method
  • Application
  • Limitations

Leak Classification and Action Criteria

  • Multiphase flow
  • Hydrates
  • Monitoring Techniques
  • Computational Methods
  • Over/Short Comparison
  • Volume Balance with Line Pack Correction
  • Pattern of Discrepancy Between Modeled and Measured Pressure and/or Flow
  • Rate of Pressure/Flow Change
  • Statistical Methods
  • System Identification with Digital Signal Analysis
  • Rupture Detection
  • Comparison of Computational Methods
  • Field Instrumentation Requirements
Jun
3
Mon
Bluetooth Training Bootcamp | Hands-on Bluetooth Classic and Bluetooth LE @ Tonex Plano Office
Jun 3 @ 9:00 am – Jun 5 @ 4:00 pm
Print Friendly, PDF & Email

Bluetooth Training Bootcamp, Hands-on Bluetooth Classic and Bluetooth LE (BLE) Training

Bluetooth Training Bootcamp, is a 3-days Hands-on Bluetooth Classic and Bluetooth LE (ble) Training Bootcamp with workshops, and exercises. This is a  practical Classic Bluetooth and BLE Training with hands-on activities.

Learn about Bluetooth Classic and Bluetooth Low Energy (BLE) wireless technology standards. Both Classic Bluetooth and BLE operate in the 2400-2483.5 MHz range within the ISM 2.4 GHz frequency band. In Classic Bluetooth, data is split into packets and exchanged through Bluetooth channels (79 designated channels, 1 MHz in bandwidth).

Bluetooth Classic is a good fit for consumer products vs. BLE with lower power consumption for Machine to Machine (M2M) and Internet of Things (IoT).

BLE also operates in the 2.4 GHz ISM band and unlike classic Bluetooth it remains in sleep mode most of the time (low duty cycle).

Learning Objectives

Upon completion of this course, the participants will be able to:

  • List the requirements and capabilities of Classic Bluetooth
  • List the requirements of Bluetooth Low Energy (BLE) including Bluetooth 4.2 (BLE) and Bluetooth 5
  • Compare Classic Bluetooth vs. Bluetooth Low Energy (BLE)
  • Explain the simplified architecture of both Classic Bluetooth and Bluetooth Low Energy (BLE)
  • Describe enhanced features in LTE Bluetooth Low Energy (BLE)
  • Describe Profile and Services in Classic Bluetooth and Bluetooth Low Energy (BLE)
  • Describe implementation models for both Classic Bluetooth and Bluetooth Low Energy (BLE)
  • Describe the concept of GAP/GATT in Bluetooth Low Energy (BLE)
  • Explain the security features in both Classic Bluetooth and Bluetooth Low Energy (BLE)
  • Sniff L2 and L3 packets in both Classic Bluetooth and Bluetooth Low Energy (BLE) using sniffers and devices
  • Analyze L2/L3 packets in both Classic Bluetooth and Bluetooth Low Energy (BLE)
  • Analyze and compare Physical Layer of Classic Bluetooth and Bluetooth Low Energy (BLE) using spectrum analyzers

Topics Include Details of Classic Bluetooth and BLE Profiles and Protocols

  • Profiles and Services
  • Classic Bluetooth Physical Layer Classic Bluetooth Controller stack
    • Classic Bluetooth Link layer
    • Asynchronous Connection-Less (ACL)
    • Synchronous Connection-Oriented (SCO)
    • Active Slave Broadcast (ASB)
    • Parked Slave Broadcast (PSB)
    • Link control protocol (LC)
    • Link manager protocol (LMP)
    • Low-energy link layer (LELL)
    • Host controller interface (HCI
  • Classic Bluetooth Host stack
    • Logical link control and adaptation protocol (LCAP)
    • Bluetooth network encapsulation protocol (BNEP)
    • Radio frequency communication (RFCOMM)
    • Service discovery protocol (SDP)
    • Telephony Control Protocol Specification (TCS)
    • Audio/video control transport protocol (AVCTP)
    • Audio/video distribution transport protocol (AVDTP)
    • Object exchange (OBEX)
    • Low Energy Attribute Protocol (ATT)
  • BLE Profiles and Services
  • Bluetooth Low Energy (BLE) Controller and Host stack
  • Generic Access Profile (GAP)
  • Generic Attribute Profile (GATT)
  • LE Privacy
  • BLE HCI Commands
  • Privacy and White List
  • Logical Link Control and Adaptation Layer Protocol (LCAP)
  • Host Controller Interface (HCI)
  • BLE Link Layer
  • BLE Physical Layer

 

Bluetooth Classic and BLE Combo Training Bootcamp Agenda

Introduction to Bluetooth Classic

  • What is Bluetooth technology?
  • Bluetooth Standards
  • IEEE Related Standards
  • The Bluetooth Special Interest Group (SIG)
  • Conformance and Compatibility Testing
  • Applications for Bluetooth
  • Classic Bluetooth
  • Bluetooth Services
  • Basic Bluetooth Operation
  • Configuring Bluetooth Devices
  • Device Discovery and Service Discovery
  • Data Throughput and Range
  • Spectrum
  • Frequency Hopping Spread Spectrum
  • Interference
  • Class of Radio
  • Power and Range

Classic Bluetooth Protocols       

  • PHY characteristics
  • Adaptive Frequency Hopping (AFH)
  • Link management protocol (LMP)
  • Packet structure, signaling, discover and connection procedures
  • Logical link control and adaptation protocol (L2CAP)
  • Host/controller interface (HCI)
  • Bluetooth network encapsulation protocol (BNEP)
  • Radio frequency communication (RFCOMM)
  • Service discovery protocol (SDP)
  • Audio/video control transport protocol (AVCTP)
  • Audio/video data transport protocol (AVDTP)
  • Asynchronous Connection-oriented (ACL)
  • Synchronous connection-oriented (SCO)

Classic Bluetooth Operation

  • Bluetooth Operations
  • Classic Bluetooth packet structure and connection procedures
  • Device Discoverability
  • Device Connectability
  • Bluetooth Classic Architecture
  • Masters and Slaves
  • Piconets and Scatternets
  • Device Addressing
  • Pairing and Bonding
  • Inquiry and Paging
  • Security
  • Link Keys
  • Authentication
  • L2 Packet Exchange
  • Bluetooth Packets
  • Packet structure, signaling, discover and connection procedures
  • Advertising Packets, and Scan Response Data
  • Data exchange

Working with Classic Bluetooth Profiles

  • Advanced Audio Distribution Profile (A2DP)
  • Hands-Free Profile (HFP)
  • Human Interface Device Profile (HID)
  • Synchronous Connection-Oriented (SCO)
  • Headset Profile (HSP)
  • Audio/Video Remote Control Profile (AVRCP)

Introduction to Bluetooth Low Energy (BLE)

  • BLE Background theory
  • BLE vs. Bluetooth Classic
  • BLE features
  • BLE Profiles and Services
  • The lowest power consumption
  • Robustness, security, and reliability
  • Wireless co-existence
  • Connection range and data rates
  • Ease of use and integration

Overview of BLE Protocols

  • Generic Access Profile (GAP)
  • Generic Attribute Profile (GATT)
  • Attribute Protocol (ATT)
  • Security Manager (SM)
  • Security and AES Encryption (NIST and NSA versions)
  • Logical Link Control and Adaptation Protocol (L2CAP)
  • Enhancements to L2CAP for Low Energy
  • Host Controller Interface (HCI), Host side
  • Host Controller Interface (HCI), Controller side
  • Enhancements to HCI Protocol
  • Direct Test Mode (DTM)
  • BLE Link Layer
  • BLE PHY Characteristics

BLE Operation

  • Bluetooth Configuration
  • Core Configurations
  • Basic operations (GAP)
  • Device roles
  • Connections in BLE
  • Event flow and handling
  • Scanning
  • Connecting
  • Service Discovery
  • Device discovery
  • Connection management
  • Pairing
  • Bonding
  • Sending and receiving data
  • Low power idle mode operation
  • Device discovery
  • Reliable point-to-multipoint data transfer
  • Advanced power-save
  • Advanced encryption functionalities
  • Single mode and dual mode
  • BLE Device Roles
  • Central and peripheral roles
  • Server and client roles
  • Advertising and Scan Response Data
  • Establishing a connection
  • Connected Network Topology
  • GATT Transactions
  • Services and Characteristics
  • Profiles vs. Services
  • Characteristics

Introduction to Bluetooth 5

  • Bluetooth Core 5.0
  • Bluetooth 5.0 Architecture
  • Changes from v4.2 to v5.0
  • Bluetooth 5.0 Features Added
  • Integrated in v5.0
  • Deprecated Features
  • Slot Availability Mask (SAM)
  • 2 Msym/s PHY for LE
  • LE Long Range
  • High Duty Cycle Non-Connectable Advertising
  • LE Advertising Extensions

Practical Activities

  • Quizzes and homework
  • Hands-on labs and demos
  • Hands-on Activities: Working with Classic and BLE Profiles
  • Hands-on Activities: Introduction, Setup, Pairing and Bonding Bluetooth Devices (classic and BLE)
  • Hands-on Activities: Sniffing Bluetooth L2 packets
  • Hands-on Activities: Sniffing BLE Bluetooth
  • Hands-on Activities: Analyzing Bluetooth and BLE L1 (Physical Layer)
  • Hands-on Activities: Capturing Bluetooth and BLE L2/L3 Packets
  • Hands-on Activities: Working with Profiles
  • Hands-on Activities: Create your own Profile
Jun
10
Mon
NERC CIP Training Bootcamp | Crash Course @ TONEX Atlanta, GA
Jun 10 @ 9:00 am – Jun 14 @ 4:00 pm
Print Friendly, PDF & Email

NERC CIP Training Bootcamp, a 5-Day Hands-on Cybersecurity Certificate

NERC CIP Training Bootcamp,   North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) training bootcamp is a crash course style training program designed and crated to meet the needs of the electric in regards to CIP compliance: Cyber Security for NERC CIP Versions 5 & 6 Compliance.

Security specialists, CIP Senior Manager, analysts, designer engineers, system operators, directors of CIP compliance, VPs of operations.

NERC Critical Infrastructure Protection (CIP) training bootcamp is a 5-day crash course empowers attendees with knowledge and skills covering version 5/6 standards. NERC Critical Infrastructure Protection training bootcamp addresses the role of FERC, NERC and the Regional Entities.

Learn approaches for identifying and categorizing BES Cyber Systems and requirements tio implement and comply the standards including strategies for the version 5/6 requirements.

TONEX is the industry leader in Cyber Security and NERC CIP. Our courses are planned, designed and developed by NERC CIP experts in CIP implementation and audits.

Learn how NERC Critical Infrastructure Protection (CIP) requirements address physical security and cybersecurity of the critical electricity infrastructure of North America including:

  • References to NERC CIP associated documents
  • References to Implementation Plan for Cyber Security Standards
  • References to Mandatory Reliability Standards for CIP
  • Guidance for Enforcement of CIP Standards
  • References to NERC CIP Rules
  • Best practices for managing NERC Compliance
  • Protecting: physical security, cybersecurity, emergency preparedness and response
  • Business continuity planning, and recovery from a catastrophic event with emphasis on deterring, preventing, limiting, and recovering from terrorist attacks
  • Sabotage Reporting
  • Critical Cyber Asset Identification
  • Security Management Controls
  • Personnel & Training
  • Electronic Security Perimeter(s)
  • Physical Security of Critical Cyber Assets
  • Systems Security Management
  • Incident Reporting and Response Planning
  • Recovery Plans for Critical Cyber Assets
  • Deterring to dissuade an entity from attempting an attack
  • Preventing  to cause an attempted attack to fail
  • Limiting  to constrain consequences of an attack in time and scope
  • Recovering – to return to normalcy quickly and without unacceptable consequences in the interim
  • Operating, Planning, and Critical Infrastructure Protection Committee
  • Security Guidelines
  • Control Systems Security
  • Cyber Security Analysis
  • Operating Security
  • Business Continuity Guideline
  • Physical Security
  • Protecting Sensitive Information
  • Security Policy
  • Bulk Electric System Security Metrics
  • Personnel Security Clearances
  • Compliance Enforcement and Input

Learn about:

NERC CIP Training

Who Should Attend:
  • CIP Compliance
  • IT  cybersecurity
  • ICS and SCAD cybersecurity
  • EMS cybersecurity
  • Field and security operations
  • Incident response
  • Project managers
  • CIP Auditors
  • Any other staff from electrical utilities who are  maintaining cyber security standards across their enterprise and substations
  • Generation, transmission and distribution staff working to meet NERC CIP standards
Program Learning Objectives:
  • Discuss requirements for reliable operation of the Bulk Electric System
  • List CIP categories of assets to which CIP requirements apply
  • Describe asset classification criteria and tiers: High/Medium/Low
  • List similarities and differences between CIP standards in version 5 and 6
  • Describe NERC filings and FERC rulings on these standards
  • Deep Dive into the CIP 5/6 requirements and obligations/expectations
  • Discuss sabotage reporting process
  • Describe identification and documentation requirements of the Critical Cyber Assets associated with the Critical Assets
  • Describe roles and responsibilities for minimum security management controls to protect Critical Cyber Assets
  • Discuss requirements for identification and protection of the Electronic Security Perimeters inside which all Critical Cyber Assets
  • Describe implementation of physical security programs for the protection of Critical Cyber Assets
  • Define methods, processes, and procedures for securing those systems determined to be Critical Cyber Assets
  • Ensure the identification, classification, response, and reporting of cybersecurity incidents related to Critical Cyber Assets
  • Ensure that recovery plans are put in place for Critical Cyber Assets and that these plans with established business continuity and disaster recovery techniques and practices
Program Coverage and Highlights of Enforcement:
  • NERC CIP requirements
  • HIghlights of NERC CIP 5 & 6
  • Overview of Cyber Security for NERC CIP Versions 5 & 6 Compliance
  • Asset Identification and Governance
  • Access Control and Monitoring
  • System Management
  • Information Protection and Response
  • CIP Process highlights
  • BES Cyber System Categorization
  • High and medium impact BES vs. low impact BES
  • Operational Technology (OT) security
  • Highlights of known ICS vulnerabilities
  • Configuration Change Management & Vulnerability Assessments
  • Cyber Security for NERC CIP Compliance
  • Electronic Security Perimeter(s)
  • Information Protection
  • Incident Reporting and Response Planning
  • Personnel & Training
  • Physical Security
  • Physical Security of BES Cyber Systems
  • Recovery Plans for BES Cyber Systems
  • Sabotage Reporting
  • Security Management Controls
  • System Security Management
  • Best Practice specifications
  • Reference Architecture
  • Gap and Cyber Vulnerability Assessments
  • Firewall/Network intrusion detection
  • Access Management
  • Centralized Patch Management
  • Security Information & Event Management
  • Automated Back-up & Recovery
  • Network Segmentation
  • Intrusion Prevention System (IPS)
  • Protocol Inspection
  • Security Factory Acceptance Testing (FAT)
  • Multi vendor testing
  • Cyber Asset Protection
  • System Design, Reliability and Configuration
  • Baseline Documentation
  • Change Control Services
  • Ports & services, applications & protocols
  • Equipment changes
  • Decommission plan
Jun
24
Mon
MIL-STD-810G Training @ Tonex Atlanta
Jun 24 @ 9:00 am – Jun 26 @ 4:00 pm
Print Friendly, PDF & Email

MIL-STD-810G Training,  MIL-810G training, Military Standard 810G Testing Course, TEST METHOD STANDARD FOR ENVIRONMENTAL ENGINEERING CONSIDERATIONS AND LABORATORY TESTS

MIL-STD-810G Training course, MIL-810G training provides technical understanding and guidance about the objectives and application of MIL-STD-810G, environmental design and test considerations and standards.

MIL-STD-810G training covers materiel acquisition program planning and engineering direction for considering the influences that environmental stresses have on materiel throughout all phases of its service life.

TONEX’s MIL-STD-810G training does also recommends design or test specifications based on environmental processes resulting in realistic materiel designs and test methods (based on materiel system performance requirements)

MIL-STD-810G training covers all the tests, the required equipment to perform each test, along with  the methodology to apply.

MIL-810G Training Learning Objectives

Upon completion of MIL-810G training, the attendees will:

  • Describe the objectives of MIL-STD-810G
  • Explain the benefits of MIL-STD-810G standard
  • Describe the major MIL-STD-810G test cases
  • List types of vibration, shock and climatic tests
  • Tailor materiel item’s environmental design and test limits to the conditions
  • Establish laboratory test methods that replicate the effects of environments on materiel
  • Describe Sine and Random Vibration, classical waveform shock testing and drop testing
  • Explain procedures behind Shock Response Spectrum Testing
  • Describe and select equipment and instrumentation to perform each test
  • List climatic test requirements, origination, equipment required, test methodology and understanding of results

 Course Content

Introduction and Course Overview

  • Introduction, History and Scope of MIL-STD-810G –
  • Environmental Engineering Programs
  • Environmental Management
  • Engineering Tasks and Engineering Management
  • Guidance for Program Management and Environmental Tailoring
  • Environmental Test Procedures
  • Typical Format for Environmental Test Procedures
  • Testing methods’ Introduction and Limitations
  • History and Rationale
  • Effects of the Environment
  • Test Sequence and Procedures
  • Analysis of Results
  • Equipment Needed
  • Sinusoidal vs. random vibration testing systems
  • Testing specifications, standards and procedures.
  • Vibration and shock test fixture design, fabrication, experimental evaluation and usage
  • Shock measurement, shock response spectrum (SRS) and shock testing

General Program Guidelines

  • Roles and Guidelines
  • Tailoring Procedures
  • Program Managers
  • Operational Requirements Document (ORD)
  • System Engineering Management Plan (SEMP)
  • Test and Evaluation Master Plan (TEMP)
  • Environmental Engineering Specialists (EES)
  • Preparing an Environmental Engineering Management Plan (EEMP)
  • Developing an Environmental Test and Evaluation Master Plan (ETEMP)
  • Defining a Life Cycle Environmental Profile (LCEP)
  • Developing Operational Environment Documentation (OED)
  • Developing an Environmental Issues/Criteria List (EICL)
  • Preparing a Detailed Environmental Test Plan (DETP)
  • Preparing an Environmental Test Report (ETR)
  • Design and Test Engineers and Facility Operators
  • Roles of design engineers
  • Roles of test engineers/facility operators
  • Guidance for design and test engineers and test facility operators
  • Natural environment (field/fleet) testing
  • Laboratory testing
  • Classical sinusoidal vibration
  • Resonance effects
  • Acceleration & force measurement
  • Electrohydraulic shaker systems
  • Electrodynamic shaker systems
  • Sine vibration testing
  • Random vibration testing

MIL-STD-810G Testing Methods

  • Military Standard testing
  • Climatics
  • Climatic Conditions and Daily Cycles of Temperature, Solar Radiation, and Relative Humidity
  • Temperature testing
  • Temperature shock
  • Humidity
  • Altitude
  • Low Pressure (Altitude)
  • High Temperature
  • Low Temperature
  • Temperature Shock
  • Contamination by Fluids
  • Solar Radiation (Sunshine)
  • Rain
  • Humidity
  • Fungus
  • Salt Fog
  • Sand and Dust
  • Explosive Atmosphere
  • Immersion
  • Acceleration
  • Vibration
  • Acoustic Noise
  • Shock
  • Pyroshock
  • Acidic Atmosphere
  • Gunfire Shock
  • Temperature, Humidity, Vibration and Altitude
  • Icing/Freezing Rain
  • Ballistic Shock
  • Vibro-Acoustic/Temperature
  •  Freeze /Thaw
  • Time Waveform Replication
  • Rail Impact
  • Multi-Exciter Testing (MET)
  • Mechanical Vibrations of Shipboard Equipment

General Laboratory test Method Guidelines

  • Test Conditions
  • Tolerances for Test Conditions
  • Test Instrumentation
  • Suitability for environment
  • Calibration
  • Stabilizing Test Temperature
  • Test item operating
  • Test item non-operating
  • Test Sequence
  • Test Level Derivation
  • Test Setup
  • Test item operation
  • Interrupted Tests
  • In-tolerance interruptions
  • Out-of-tolerance interruptions
  • Interruption due to test item operation failure
  • Combined Tests
  • Post-test Data
  • Environmental Effects and Failure Criteria
  • Environmental Test Reports
  • Water Purity
  • Analysis of Results
  • Monitoring
  • Monitoring test chamber parameters
  • Monitoring the item under test
  • Total High Temperature Exposure Duration

Environmental Management and Engineering Tasks 

  • Task 401 – Environmental Engineering Management Plan (EEMP)
  • Task 402 – Life Cycle Environmental Profile (LCEP)
  • Task 403 – Operational Environment Documentation (OED)
  • Task 404 – Environmental Issues/Criteria List (EICL)
  • Task 405 – Detailed Environmental Test Plans (DETP)
  • Task 406 – Environmental Test Reports (ETR)
  • Detailed Program Management Guidance
  • Environmental Tailoring Guidelines for Environmental Engineering Specialists (EES)
  • C-1 Areas of occurrence of climatic categories A1, A2, & A3 C-5
  • C-2 Areas of occurrence of climatic categories B1, B2, & B3 C-6
  • C-3 Areas of occurrence of climatic categories C1, C2, & C3 C
  • C-1 Areas of occurrence of climatic categories A1, A2, & A3 C-5
  • C-2 Areas of occurrence of climatic categories B1, B2, & B3 C-6
  • C-3 Areas of occurrence of climatic categories C1, C2, & C3 C-7
Jul
15
Mon
Advanced Satellite Communications Systems Training | Advanced SATCOM Training @ Tonex Plano, TX
Jul 15 @ 9:00 am – Jul 17 @ 4:00 pm
Print Friendly, PDF & Email

Advanced Satellite Communications Systems Training, Advanced SATCOM Training

Advanced Satellite Communications Systems Training, Advanced SATCOM Training, is a 3-day comprehensive technical training covering all aspects of satellite technology, system survey,  systems engineering as applied to satellite communications, hardware, software, applications, digital communications and processing in modern satellite networks, IP convergence, optimization and management.

Participants will learn about the fundamentals of satellites, advanced planning, analysis, architecture and  design, reliability, ground control systems, earth stations, operation and maintenance, logistics of the satellite systems and their major segments and components. Participants will also gain practical understanding of the basic design, construction and usage of commercial satellite networks, satellite system functional architecture and more.

Image result for satellite communications

Learn about:

  • The current state-of-the-art satellite communications systems, segments, equipment and components
  • Advanced communications and network principles, topologies and architecture, IP technology and networking convergence,  Voice ad Video over IP over satellite
  • Communications link details and specifications
  • Best Design and Implementation Practices
  • Design Lessons Learned from Failures
  • Communication Link budget theory and system and component Design
  • Using Tools to analysis and design major components

Methods of Learning: The methods of learning consist of visual presentations on Advanced SATCOM, textbook, discussions, activities and involvement of all participants in practical exercises to demonstrate application of knowledge learned.

Who Should Attend

  • Analysts
  • Engineers and Technicians
  • Product support analysts
  • Project managers
  • Reliability managers and engineers
  • Supportability representatives
  • Technical managers
  • Product managers
  • Software developers
  • Testers

Highlights of Advanced SATCOM Training:

  • Satellite Communications Applications
  • Overview SATCOM Systems
  • Overview SATCOM Military and Commercial Systems
  • Overview of next-gen communications satellites, payloads, wideband payload and platform control assets, and earth terminals operations
  • Overview of next-gen battlespace communications
  • Satellite Systems Engineering and Economics
  • Satellite Orbits and Transponder
  • Differences between GEO, MEO, LEO and HEO communications systems, segments, and systems engineering
  • Role of IP Convergence in modern military and commercial satellite systems
  • Satellite Architecture: Broadcast, Mesh, Hub-Spoke, Point-to-Point
  • Multiple Access Techniques: FDMA, DAMA, TDMA, CDMA, OFDM, OFDMA, Random Access. and Bandwidth-on-Demand
  • Satellite RF and Microwave Engineering
  • Digital Modulation Techniques
  • Satellite Communications Link Budget Calculations
  • Emerging Technology Developments
  • Future SATCOM trends

Learning Objectives

Upon completion of the advanced SATCOM training, the participants will be able to:

  • Explain the basic principles and concepts of satellite systems
  • List related satellite communications standards and their benefits
  • List the key Satellite system features and their benefits
  • Discuss the rationale for advanced commercial and military satellite communications and key deployment topologies
  • Describe features supporting advanced commercial and military deployments
  • Describe the guidance on commercial and military satellite systems engineering
  • Illustrate satellite system analysis, architecture, design and implementation scenarios
  • Define needs, goals, objectives and ConOps for a Satellite mission to satisfy the requirements
  • Apply Model-based Systems Engineering (MBSE) to each phase of a Satellite project lifecycle
  • Avoid the pitfalls in designing satellite and ground resources
  • List benefits of phased arrays, cancellation and adaptive coding and modulation
  • Explore best design and implementation practices and lessons learned

Course Agenda

Fundamentals of Satellite Systems 

  • Basic Definitions
  • Satellite Core Elements and Functionality
  • Basic Characteristics of Satellites
  • Microwave Frequencies and Satellite Communications Bands
  • Commercial vs. Military and Defense Bands
  • Digital Transmission, Compression, and Routing
  • Satellite Integration with Terrestrial Wired and Wireless Networks
  • Satellite System Elements
  • Space Segment
  • Ground Segment
  • Gateways
  • Satellite Orbit Configurations
  • Geosynchronous Satellites
  • Medium Earth Orbit (MEO) and Lower Earth Orbit (LEO) satellite constellations
  • Frequency Spectrum Allocations
  • ITU-R Spectrum Allocations and Regions
  • VHF, UHF, SHF and EHF Frequency Ranges
  • Example Microwave Bands: L, S, C, X, and Ku
  • Millimeter Wave Bands: Ka-, Q-, and V-Bands
  • Guided and Unguided Optical Properties
  • Satellite and C4ISR
  • Systems and Sensors

Space Systems Engineering

  • Spacecraft Systems
  • The Space Environment
  • Fundamentals of Engineering Space Systems
  • Systems Engineering for Space
  • Applications of Space Systems Engineering
  • Small Satellite Development and Experimentation
  • Using MIL-STD-810G
  • Environmental Engineering Considerations and Laboratory Tests
  • Celestial Mechanics
  • Launching Vehicles
  • Attitude Determination and Control
  • Propulsion
  • Electrical Power Systems
  • Thermal Control
  • Spacecraft Mechanical Structures
  • On-board Data Handling
  • Telecommunication
  • Ground Segment and Control
  • Product Assurance and Reliability
  • Mechanisms
  • Hardware and Software Design
  • Telemetry
  • On-Board Data Handling
  • Electrical Power System
  • Communication
  • Attitude and Orbit Control System
  • Assembly, Integration and Verification
  • Operations and Testing

Satellite Communications Network Architecture

  • Features of Satellite Networks
  • Emerging Applications
  • Network Architectures, Technologies and Protocols
  • Satellite Communications Network Configuration
  • Satellite Shared and Dedicated Bandwidth Services
  • Voice, Data, and Video over Satellite
  • Circuit-Switched vs. Packet-Switched Services
  • Satellite Communications Network Design and Analysis
  • Satellite Network Architectural Considerations
  • Satellite Communications, TCP/IP and MPLS
  • IPv6 Features
  • Satellites and Links Reliability
  • Quality of Service (QoS) Features and Issues
  • Point-to-Multipoint (Broadcast) Networks
  • Multicasting and Video Distribution
  • Point-to-Point Networks
  • VSAT Networks
  • VPN Networks

Advanced Military Satellite Systems

  • Evolution of Satellite Communication
  • Military Satellite Communications
  • Satellite and Intelligence, Surveillance & Reconnaissance
  • Introduction to Satellite Tactical Data Operations
  • C4ISR & Remote Sensing
  • Full Motion Video (FMV) Exploitation
  • Imagery Intelligence (IMINT) Fundamentals
  • Intelligence Analysis & Fusion
  • Coding, Modulation, Spread Spectrum Techniques and Encryption
  • Types of Satellite Communications Capabilities and Limitations
  • Voice, Video, Data, IP, Software Defined Radios
  • Communications Planning
  • Network Topologies
  • Typical Scenarios and Environments
  • Antenna Characteristics
  • Antenna Planning Considerations
  • Missile Warning Satellite Systems
  • CubeSAT

Microwave Link Engineering 

  • Propagation on the Earth-Space Link
  • Basic Microwave Propagation
  • Environmental Effects of Higher Frequency Bands
  • Directional Properties of Antennas
  • Polarization (Linear and Circular)
  • Satellite Link Budget Calculations (Hands-on)
  • Propagation Losses
  • Transmitters and Receivers
  • Overall Link Quality
  • Link Margin
  • Noise and Interference
  • Carrier-to-Noise Ratio
  • Link Budget Analysis and Margin

Satellite RF Modeling, Simulation and Engineering

  • Modulation, Multiple Access, and Impairments
  • Digital Baseband Signals and Hierarchies
  • Error Detection and Correction
  • Digital Modulation
  • Frequency Shift Keying (FSK)
  • Phase Shift Keying (PSK)
  • Amplitude and Phase Shift Keying
  • QAM
  • Multiple Access Methods
  • FDMA, DAMA, TDMA, CDMA, WCDMA and OFDM/OFDMA
  • ALOHA Packet Multiple Access
  • Bandwidth Utilization in Multiple Access
  • Distortion and Impairments
  • Transponders
  • Intermodulation Impairment
  • Uplink and Downlink RF Interference
  • Transmit Effective Isotropic Radiated Power (EIRP)
  • Receive Gain-to-Noise Temperature Ratio (G/T)

Overview of Communications Spacecraft

  • Spacecraft and Repeater
  • Overall Payload Requirements
  • Bent-Pipe Transponder Filtering
  • Linearity
  • Analog Bent-Pipe Repeaters
  • Wideband Receiver
  • Solid-State Power Amplifiers
  • Transponder Gain Control and Linearization
  • Spacecraft Antennas
  • Horn Antennas
  • Reflector Antennas
  • Center-Fed Parabolic Reflectors
  • Offset-Fed Parabolic Reflectors 249
  • Satellite Antenna Patterns
  • Direct Radiating Array Antennas
  • Phased Array

Satellite Antenna System Engineering

  • Satellite communication antennas
  • Airborne terminals
  • Antenna controller
  • Earth Observation Applications
  • Gateways
  • Geo Gateway Systems
  • High Dynamic Systems Tracking
  • High-Rate Modems
  • High-speed modems
  • Ka-Band Gateways
  • Ka-band gateways va-13.5m va-91 ka-9.1m va-135 ka-13.5m
  • Low-profile, high-frequency radomes
  • Motion Systems for Ku- and C-band Applications
  • Motors and controllers
  • Panels and mechanical structures
  • Radio frequency transmit/receive electronics
  • Reflectors
  • Reliable and Precision Tracking
  • Remote Sensing Systems
  • Software systems
  • Telemetry
  • Tracking Antennas for LEO, MEO, and GEO from UHF to Ka-band

Satellite Link Budget Modeling and Calculation

  • Adjacent channel interference C/ACI
  • Adjacent satellite Interference C/ASI
  • Altitude
  • Antenna aperture
  • Antenna efficiency (or gain)
  • Antenna ground noise temperature
  • Antenna mispointing loss
  • Availability
  • Bit Error Rate (BER)
  • Coupling Loss
  • Cross polarization interference C/XPI
  • Forward error correction (FEC) code
  • Frequency
  • HPA intermodulation interference C/I
  • Information rate
  • Link availability
  • LNB noise temperature
  • Modulation
  • Overhead (% information rate)
  • Polarization
  • Rain-climatic zone
  • Rate
  • Required Overall Eb/No
  • Roll off factor
  • Satellite EIRP (saturation)
  • Satellite gain setting
  • Satellite longitude
  • Satellite receive G/T
  • Satellite saturation flux density SFD
  • Site latitude and longitude
  • System margin
  • Transponder bandwidth
  • Transponder input back-off (IBO)
  • Transponder intermodulation interference C/IM
  • Transponder output back-off (OBO)

Satellite Operations and Organization

  • Satellite Systems Engineering and Economics
  • Satellite Systems Engineering Principles
  • System Development Methodology
  • Spacecraft Mission and Bus Subsystems
  • Mission Summary
  • Spacecraft Configuration
  • Spacecraft Bus Subsystems
  • Earth Stations and Network Technology
  • Basic Earth Station Configuration
  • Performance Requirements
  • Radio Frequency Equipment
  • Intermediate Frequency and Baseband Equipment
  • Modulators, Demodulators, and Modems
  • Multiplexing and Packet Processing
  • Tail Links and Terrestrial Interface
  • Earth Station Facility Design
  • Major Classes of Earth Stations
  • Launch Vehicles and Services
  • The Launch Mission
  • Launch Technology and Systems
  • Typical Launch Vehicles
  • Launch Interfaces
  • The Satellite Control System
  • Intercommunication Networks
  • Network Operations
  • Space Segment Economics
  • Earth Station Economics
  • Analysis of Network Economics
  • Satellite Communications: Instant Infrastructure
  • Conclusions for the Next Generation
Jul
18
Thu
USB 3.0 Training | USB 3.2 Updates @ Tonex Palo Alto
Jul 18 @ 9:00 am – Jul 19 @ 4:00 pm
Print Friendly, PDF & Email

USB 3.0 Training by TONEX, USB 3.2 Updates

The third generation of USB increases transfer rates to 5.0Gbits/s (SuperSpeed) and is backward compatible with all earlier USB 1.1/2.0 Low-Speed, Full-Speed, and High-Speed peripherals and hubs.

USB 3.2 doubles the maximum speed of a USB connection to 20Gb/s.  A USB 3.0 connection runs at 5Gb/s, and slower connections were USB 2 or even USB 1.1.

USB 3.2  5Gb/s devices are now called “USB 3.2 Gen 1.” 10Gb/s USB devices will become “USB 3.2 Gen 2.” And all 20Gb/s devices will be  “USB 3.2 Gen 2×2.”

USB 3.2 means 5, 10, or 20Gbps.

Updates on USB 3.2

USB 32 doubles the maximum speed of a USB connection to 20Gb/s. A USB 3.0 connection tuns at 5Gb/s, and slower connections were USB 2 or even USB 1.1. The new 3.2 version  5Gb/s data rate was branded “SuperSpeed USB,” following USB 2’s 480Mb/s “High Speed” and USB 1.1’s 12Mb/s “Full Speed.”

5Gb/s devices are now called “USB 3.2 Gen 1.” 10Gb/s devices become “USB 3.2 Gen 2.” And 20Gb/s devices will be “USB 3.2 Gen 2×2.”

SuperSpeed USB brings significant performance enhancements to the USB standard. It will deliver 10x the data transfer rate of Hi-Speed USB, as well as improved power efficiency.

  • SuperSpeed USB 3.0 has a 5 Gbps signaling rate offering 10x performance increase over Hi-Speed USB.
  • SuperSpeed USB 3.0 is a Sync-N-Go technology that minimizes user wait-time.
  • SuperSpeed USB will provide Optimized Power Efficiency.No device polling and lower active and idle power requirements.
  • SuperSpeed USB 3.0 is backwards compatible with USB 2.0. Devices interoperate with USB 2.0 platforms. Hosts support USB 2.0 legacy devices.
  • SuperSpeed USB 3.0 significant enhancements in the areas of device and system power conservation, error handling, and data flow control.
  • SuperSpeed USB 3.0 bus instances replace the USB broadcast bus model with directed (unicast) packets
  • Dual-simplex signaling enables asynchronous device notifications and simplifies link partner communication used in link flow control, packet acknowledgement and retry, and power management transitions.
  • USB 3.2 Gen 1: originally known as USB 3.0, and previously renamed to USB 3.1 Gen 1. It’s the original USB 3.0 specification, and it can transfer data at up to 5Gbps.
  • USB 3.2 Gen 2: Previously known as USB 3.1, and then later as USB 3.1 Gen 2. It offers speeds at up to 10Gbps.
  • USB 3.2 Gen 2×2: formally known as USB 3.2, it’s the newest and fastest spec, promising speeds at up to 20Gbps (by using two lanes of 10Gbps at once).

USB 3.0 Training

Course Topics

  • Motivation behind USB 3.0, 3.1 and USB 3.2
  • USB 3.2 Overview
  • USB 3.2 System Description
  • USB 3.2 Gen 1: ‘SuperSpeed USB’
  • USB 3.2 Gen 2: ‘SuperSpeed USB 10Gbps’
  • USB 3.2 Gen 2×2: ‘SuperSpeed USB 20Gbps’
  • USB 3.2 Physical Interface
  • USB 3.2 Mechanical
  • USB 3.2 Power
  • USB 3.2 System Configuration
  • SuperSpeed End-To-End Protocols (Protocol Layer)
  • SuperSpeed Port-To-Port Protocols (Link-Level Protocols)
  • SuperSpeed Link Power Management
  • USB 3.2 Hubs
  • USB 3.2 Reset, Initialization, and Configuration
  • SuperSpeed Physical Layer Electrical
  • Introduction to eXtensible Host Controller Interface (xHCI)
  • Type A, USB-C
  • USB-C and Power Delivery (PD)
  • USB-C and PD Procedures, Roles and Negotiations
  • USB-PD Port
  • Power Delivery (PD) specification
  • handling higher power
  • Power Delivery at the 5V setting and is configurable up to 20V
  • Using a standard USB-C cable up to 60W
  • 100W using a designated EMCA cable.
  • Choosing the Right Charger
  • Universal Charging Solution
  • USB 3.2 certification testing
  • The USB Platform Interoperability Lab (PIL) for USB 3.2 Gen 2 product development.
  • USB 3.2 Electrical Compliance Test Specification
  • xHCI Interoperability Test Procedures
  • xHCI Backwards Compatibility Test Procedures
  • Link Test Specification
  • Cable and Connector Compliance
  • Electrical Compliance Test Specifications
  • The Electrical Compliance Test Specification for SuperSpeed USB 10 Gbps Rev. 1.0
Jul
22
Mon
DoDAF, UPDM and SysML Workshop | MBSE Using DoDAF, UPDM and SysML Workshop @ TONEX DC Office
Jul 22 @ 9:00 am – Jul 26 @ 4:00 pm
Print Friendly, PDF & Email

DoDAF, UPDM and SysML Workshop, A 5-Day Hands-on Training Course

DoDAF, UPDM  and SysML Workshop covers DoDAF 2, UPDM 2 and SysML  topics. It introduces migration of DoDAF 2.0 to UPDM 2.0 using Model-Based Systems Engineering (MBSE) with Systems Modeling Language (SysML), the OMG SysML, the industry standard for MBSE applications.

DoDAF, UPDM  and SysML Workshop: DoD Architecture Framework 2 (DoDAF 2), the Unified Profile for DoDAF/MODAF (UPDM) and Systems Modeling Language (SysML) Workshop provides participants with a solid foundation and tools for Integrating DoDAF, UPDM with SysML and UML on a DoD acquisition program applying Model-Based Systems Engineering (MBSE) principles and best practices including SysML the industry standard visual modeling language for systems engineering applications provided by OMG.

DoDAF, UPDM and SysML Workshop uses practical problems using DoDAF. UDDM and SysML viewpoints, artifacts and diagram types.

Learning Objectives

Upon completion of DoDAF, UPDM and SysML Workshop, participants are able to:

  • Learn about DoDAF 2, UPDM 2 and SysML
  • Give examples of integration of DoDAF 2, UPDM 2 and SysML and applicable use cases and scenarios
  • Differentiate between DoDAF, UPDM and SysML
  • Explain the role of DoDAF 2, UPDM 2 and SysML and integrating them with DoDAF-compliant system architectures, capabilities and acquisition
  • Specify specific characteristics of the capabilities and utilization of DoDAF, UPDM and SysML
  • Give examples of DoDAF, UPDM and SysML artifacts and full system lifecycle development
  • Work with compliant DoDAF, UPDM and SysML tools and processes
  • Distinguish among tools to integrate DoDAF, UPDM and SysML
  • Explore DoDAF-compliant system using DoDAF2-UML2-UPDM2 compliant tools and visual modeling tools supporting DoDAF 2, UPDM 2 and SysML
  • Finalize a simple acquisition case study with DoDAF 2, SysML and UPDM 2 modeling

Who Should Attend

DoDAF , UPDM  and SysML Workshop is recommended for Enterprise and Solution Architects, Software Architects and Engineers, Developers, Analysts, Systems Engineers, System Modelers, System Architects, Project Managers, and anyone else who is interested to learn about DoDAF 2, UPDM 2 and SysML integration.

Topics Covered

Motivation behind integration of DoDAF , UPDM  and SysML 

  • DoDAF, UPDM, SysML and UML on a DoD Acquisition Program
  • Model Based Systems Engineering and Systems Modeling Language (SysML)
  • Model Based Systems Engineering (MBSE) Overview
  • Architecting With Model Based  Systems Engineering (MBSE)
    and Systems Modeling Language
  • DoDAF 2 Viewpoints and Views
  • DoDAF Specific Features
  • DoDAF 2.0 viewpoints and views
  • All Views viewpoint
  • Capability viewpoint
  • Project viewpoint
  • Operational viewpoint
  • Data and Information viewpoint
  • Services viewpoint
  • Systems viewpoint
  • Representation of DoDAF/UPDM in Commercial Tools
  • Systems Engineering with SysML
  • System Design Model, Including Traceability to OpsCon
  • Stakeholder Requirements Definition
  • Requirements Analysis
  • Architetutal Design

Unified Profile for DoDAF and MODAF™ (UPDM™) Framework

  • UPDM Value Proposition
  • UPDM as a domain specific variant of SysML
  • UPDM capabilities for defense applications
  • Language Architecture, UPDM Profile
  • Core Principles
  • Representing Stereotype Constraints
  • UML Constraint Representation
  • Important Areas of the Architecture
  • Using UPDM Profile
  • DoDAF Class Library
  • UPDM L1
  • UPDM L1::UPDM L0
  • UPDM L1::UPDM L0::Core
  • UPDM L1::UPDM L0::Core::AllElements
  • UPDM L1::UPDM L0::Core::ExternalTypes
  • UPDM L1::UPDM L0::Core::OperationalElements
  • UPDM L1::UPDM L0::Core::ServiceElements
  • UPDM L1::UPDM L0::Core::StrategicElements
  • UPDM L1::UPDM L0::Core::SystemsElements
  • UPDM L1::UPDM L0::Core::TechnicalStandardsElements
  • UPDM L1::UPDM L0::DoDAF
  • UPDM L1::UPDM L0::DoDAF::AcquisitionElements
  • UPDM L1::UPDM L0::DoDAF::AllElements
  • UPDM L1::UPDM L0::DoDAF::OperationalElements
  • UPDM L1::UPDM L0::DoDAF::ServiceElements
  • UPDM L1::UPDM L0::DoDAF::StrategicElements
  • UPDM L1::UPDM L0::DoDAF::SystemElements
  • UPDM L1::UPDM L0::DoDAF::TechnicalStandardsElements
  • UPDM L1::UPDM L0::MODAF
  • UPDM L1::UPDM L0::MODAF::AcquisitionElements
  • UPDM L1::UPDM L0::MODAF::AllElements
  • UPDM L1::UPDM L0::MODAF::OperationalElements
  • UPDM L1::UPDM L0::MODAF::StrategicElements
  • UPDM L1::UPDM L0::MODAF::TechnicalStandardsElements
  • UPDM L1::UPDM L0::SwAF
  • UPDM Views (Profile)
  • UPDM Elements Traceability
  • Sample Problem

MBSE, DoDAF, UPDM and SysML

  • Systems Modeling Language (SysML) relationship to the DoD Architecture Framework (DoDAF) and the Unified Profile for DoDAF/MODAF (UPDM)
  • transition to DoDAF/UPDM with MBSE & SysML
    SysML Relationship to DoDAF and UPDM
  • DoDAF models map directly to the  SysML diagram types
    DoDAF matrix artifacts
  • SysML models
  • DoDAF Data Elements
    DoDAF MetaModel (DM2)
  • DoDAF data elements and the relationships among them
  • The Unified Profile for DoDAF/MODAF (UPDM) asa SysML profile
  • Tools to develop SysML models using DoDAF or MODAF terminology
  • UPDM Domain Metamodel (DMM) and UPDM elements
  • Relationships between DMM and UPDM
  • DoDAF/UPDM and SysML Integration using SPARX Enterprise Architect edition and MagicDraw edition