Docstoc

ALS_Curriculum

Document Sample
ALS_Curriculum Powered By Docstoc
					                    Applied Learning Solutions’ Curriculum


                             Table of Contents

Wireless
Wireless Communications Fundamentals…………………………………… 3
Fundamentals of Radio Workshop……………………………………………. 8
Broadband Wireless Communications (4G)………………………………… 12
Wireless Network Security………………………………………………………. 17
802.11 Wireless Local Area Networks…………………................................. 22
802.11 Emerging Specifications……………………………………………….. 25
802.11n Next Generation High Throughput………………………………… 29
3GPP LTE / SAE……………………………………………………………………. 33
3GPP UMTS (See Aviat)………………………………………………………….. 36
Fixed and Mobile WiMAX ………………………………………………………. 40
Fixed Mobile Convergence (FMC)……………………………………………. 44



Cloud Computing
Cloud Computing Essentials……………………………………………………. 49
Cloud Computing Network Connectivity In-Depth………………………...52
Cloud Computing Fault Tolerance In-Depth………………………………...52
Cloud Computing Dynamic Load Management In-Depth……………… 53
Cloud Computing Security In-Depth…………………………………………. 53
Planning Your Cloud Computing Implementation………………………… 53
Running Database Services in Cloud Computing…………………………. 54
Running Messaging Services in Cloud Computing………………………… 54
Running Virtualized Applications in Cloud Computing…………………… 54
Running Security Services in Cloud Computing……………………………. 54
The Cost Efficacy Case for Cloud Computing……………………………... 55

                                       Mike Clark
                       Vice-President-National Accounts Marketing
                                Applied Learning Solutions
                                      785-271-6050
                                   mclark@e-als.com

                                                                                 1
                Applied Learning Solutions’ Curriculum


IP Networking
Broadband Communications in 2010: IP Packets and TDM…………….. 56
IP Networks and VPNs …………………………………………………………... 61
IPv4 and Related Protocols Workshop and Lab …………………………... 77
Voice over IP (VoIP) Concepts and Protocols……………………………… 80
Quality of Service (QoS) in Multimedia IP Networks ………………………. 84
Rich Media, Unified Communications, Web 2.0 & Web 3.0……………… 87
IPv6 and IP Mobility………………………………………………………………. 94
MPLS Essentials…………………………………………………………………….. 101
MPLS-TP: MPLS Transport Profile………………………………………………… 105
MPLS Traffic Engineering………………………………………………………… 109

Network Architectures and Services
Carrier Ethernet and Wireless Backhaul: Technology,
Protocols and Implementation…………………………………………………. 113
MPLS and Wireless Backhaul ……………………………………………………. 118
Carrier Ethernet: Operations Administration
and Maintenance ………………………………………………………………... 121
IP Networks and VPNs…………………………………………………………….. 128
Network Architecture, Design and Traffic Engineering
of Multimedia Networks………………………………………………………….. 142
Emerging Communications Technologies in
Law Enforcement and Public Safety………………………………………….. 147

 Network and Information Systems Security
Network Security: IPsec 2010…………………………………………………… 152
Rural Telco Security Risk Assessment Program……………………………… 158
Securing NextGen 911 and Law Enforcement,
Public Safety and Homeland Security Communications………………… 163


                                  Mike Clark
                  Vice-President-National Accounts Marketing
                           Applied Learning Solutions
                                 785-271-6050
                              mclark@e-als.com

                                                                   2
                   Applied Learning Solutions’ Curriculum


                Wireless Communications Fundamentals

                               Course Description


Wireless communications is penetrating every aspect of our lives. This course is
designed to give students the foundation to understanding all forms of wireless
communications and to be aware of emerging wireless technologies. It will
cover the principles of how radios work, the different antenna options available
and the over-the-air propagation. In addition this course will discuss cellular
networks, Wi-Fi, microwave, satellite systems, WiMAX, sensors, RFID and
Bluetooth.
This is a two day instructor led technical course intended to give the student a
basic understanding of all the dominant wireless systems deployed today.

                               Course Objectives

At the end of this course the student should be able to:
      • Define the major components of a radio transmitter
      • Understand how the frequency channel and bandwidth impact cell
         coverage and capacity
      • Distinguish between different multiple access technologies
      • Describe the physical properties that effect radio propagation
      • List several different propagation models and their major
         characteristics
      • Explain how cellular systems support handover and power control
      • Identify the key radio characteristic of leading wireless technologies
      • Discuss emerging wireless technologies and their expected impact




                                                                                   3
                      Applied Learning Solutions’ Curriculum



                                   Course Outline

Day 1
        •   The Basics of Wireless Communications
            We provide the student with a basic understanding of the principles
            underlying all radio communications. We discuss the linkages between
            distance with time, frequency and transmitted power. This module
            provides a basis on which to understand and itemize the major parts of
            a link budget.

            Module Outline:

            o   History of Wireless Communications
            o   Electromagnetic Energy and Frequency Bands
            o   Understanding the Decibel (dB)
            o   Link Budgets

        •   Radio Fundamentals
            Students receive an understanding of the major components in a
            typical radio. We discuss the reasons why channel coding is generally
            required and walks through the various channel coding techniques.
            We also describes modulation and how digital data is represented as
            modulation symbols which are then transmitted over the air.

            Module Outline:

            o Basic Components of a Radio Transmitter
            o Forward Error Correction and Channel Coding
            o Modulation Symbols




                                                                                    4
             Applied Learning Solutions’ Curriculum


•   Antennae Basics and Options
    This module gives students an explanation of basic antenna concepts
    including radiation patterns, directivity, gain and polarization. It
    identifies basic antenna types, and defines the difference between
    MIMO, MISO, SIMO, and SISO. This module also equips students with
    information enabling them to understand the significant impact of
    antenna gain and propagation patterns on coverage.

    Module Outline:

    o Antenna Basics and Terminology
    o Antenna Types and Propagation Patterns
    o Feedlines and Tower Top Low Noise Amplifiers

•   Propagation Characteristics and Modeling
    Students address propagation loss and the factors that affect it. This
    section assists the student in understanding the difference between
    empirical and physical models, and the scenarios on when to use
    these models. This module also defines the major causes of fading and
    the primary fading models to predict coverage.

    Module Outline:

    o   Propagation Fundamentals
    o   Free Space Loss Model
    o   Plane Earth Loss Model
    o   Power Law Loss Model
    o   Reflection and Diffraction
    o   Fading Concepts and Models




                                                                           5
                      Applied Learning Solutions’ Curriculum


Day 2
        •   Multiple Access Technologies including GSM, CDMA and OFDM
            We provide students with the knowledge to compare and contrast the
            different multiple access technology used in the GSM, CMDA, WiMAX
            and LTE system being deployed today. We discuss the advantages
            and disadvantages of these access technologies in terms of delivering
            voice, data and video rich services.

            Module Outline:

            o   Definition of Multiple Access Technologies
            o   Frequency Division Multiple Access
            o   Time Division Multiple Access
            o   Code Division Multiple Access
            o   Orthogonal Frequency Division Multiple Access

        •   Cellular Networks
            Students gain an understanding of how the cellular networks operate.
            We cover the underlying principle of cellular namely frequency reuse,
            and illustrate how roaming and handoff occur. This module also
            describes techniques to reduce power usage and steps the student
            through the steps of making a cellular voice call.

            Module Outline:

            o   Frequency Reuse and Cell Planning
            o   Network Architecture
            o   Handoff and Roaming
            o   Power Management Sleep and Idle Mode
            o   Making a Voice Call




                                                                                    6
                    Applied Learning Solutions’ Curriculum


      •   Other Wireless Networks
          This module provides students with an awareness of the other wireless
          networks and their distinguishing technical features. It discusses short
          range Personal Area Networks such as Bluetooth as well as long range
          satellite systems such as GPS. Student are provided with an explanation
          as to why there are so many diverse wireless networks being deployed.
          Module Outline:
          o Wi-Fi
          o WiMAX and 3GPP LTE
          o Sensor Networks and RFID
          o Bluetooth
          o Satellite Networks including GPS

      •   Emerging Wireless Technologies
          We introduce students to the newly emerging wireless technologies
          and there potential impact. We look at antenna technologies
          including MIMO for high data rates and fractal antennae for devices
          that need to support transmission on multiple different frequencies. This
          course also looks at Wireless USB which is being deployed on PCs.

          Module Outline:

          o   Open and Closed Loop MIMO
          o   Low Density Parity Check Codes
          o   Fractal Antennae
          o   Wireless USB
          o   Femto Cells
          o   4G Cellular Systems

Who should attend this course
This course will be of benefit to any one working with wireless systems, including
marketing and sales, technical support and product development staff.

Course Prerequisites There are no prerequisite requirements to attend this
course; however a background in communications is desirable.
                                                                                     7
                   Applied Learning Solutions’ Curriculum


Fundamentals of Radio Workshop: Analysis, Design and Propagation
                  (supports WCET certification)

                              Course Description:

This is an intense hands-on workshop, designed to provide the student with an in-
depth understanding of the technical aspects of RF system design, analysis and
deployment. Technologies used for Line-of-Sight (LOS) and Non-Line-of-Sight
(NLOS) radio, from HF to EHF, are addressed. Throughout this course, the student
will gain in-depth knowledge of RF through the use of multiple calculation
exercises as well as exercises and simulations using provided spreadsheets.
Each module builds upon the previous modules, enhancing the student’s
understanding of the topic areas.
As an IEEE WCET workshop, this course focuses on the following knowledge
areas of the WCET certification exam:
Area 1: RF Engineering, Propagation and Antennas
Area 2: Wireless Access Technologies
Area 7: Fundamental Knowledge


                               Course Objectives:


Upon successful completion of this course the student will be able to:
     • Identify different E-M propagation modes based on frequency
     • Define the relationship between bandwidth and Baud rate
     • Use decibels for gains, losses and power levels
     • Describe the various components of a radio and their functions
     • Describe various amplifier types and impairments
     • Quantify the relationship between noise and bandwidth
     • Determine the bit rate of a channel based on bandwidth, modulation
        scheme and FEC overhead
     • Describe multiple access using FDMA, TDMA, CDMA and OFDMA
     • Determine Near-field and Far-field regions of an antenna
                                                                                8
              Applied Learning Solutions’ Curriculum


•   Compare VSWR, Return Loss, Reflected Power and Mismatch Loss
•   Describe multiple antenna systems: MIMO and Adaptive Arrays
•   Perform a cascade analysis for both terrestrial and satellite systems
•   Perform link budgets for both Line-of-Sight and Non-Line-of Sight links
•   Determine LOS distance based on the radio horizon
•   Perform a path loss analysis using a simple physical model
•   Describe how Delay Spread and Doppler Spread effect small–scale
    fading
•   Perform a path loss analysis for a NLOS environment


                            Course Outline:


•   Introduction to Wireless Technologies
    o A Brief History of Wireless Communications
    o The Continuing Evolution of Wireless Technologies
    o Overview of Modern Wireless Technologies

•   Radio Wave Characteristics
    o The Electro-magnetic Spectrum
    o Propagation Modes of Radio Waves
    o Radio Spectrum: Licensed and License Exempt

•   Fundamental Radio Concepts
    o Basics of Information Transfer for Radio
    o Working with Decibels—Gains, Losses, Power Levels
    o Basic Radio Components
    o Wireless Impairments: Internal Noise and Distortion

•   Digital Modulation and Error Correction Techniques
    o Analog and Digital Modulation
    o Getting More Bits per Baud
    o Error Correction Techniques


                                                                              9
              Applied Learning Solutions’ Curriculum


•   Physical Layers and Multiple access Techniques
    o Basic Access Techniques
    o OFDM and OFDMA
    o Spread Spectrum and CDMA

•   Basics of Antennas and Antenna Systems
    o E-M Field Radiation: Intentional and Unintentional
    o Basic Antenna Types and Uses
    o Basic Antenna Characteristics
    o Antenna Field Regions
    o Care and Feeding of Antennas
    o Antenna Diversity Techniques
    o Advanced Antenna Systems

•   Link Budget Analysis Techniques
    o Noise and Noise Sources
    o Link Budget Considerations
    o Budgeting the Radio Link

•   Line-of-Sight Radio Propagation
    o Defining Line-of-Sight
    o Line-of-Sight Path Loss Analysis

•   The Non-Line-of-Sight Propagation Environment
    o Non-Line-of-Sight Propagation Mechanisms
    o Impairments due to Time Dispersal
    o Modeling Propagation Loss in a NLOS Environment


                  Exercises performed in this course:


•   Wavelength/Frequency conversion
•   Using decibels—powers levels, gains and adding ratios
•   Amplifier back-off vs. efficiency

                                                            10
             Applied Learning Solutions’ Curriculum


•   Determining the thermal noise seen by an antenna
•   Receiver noise contribution—Noise Figure
•   Determining the bit rate of a channel
•   Determining theoretical symbol error rate
•   OFDM and Orthogonality
•   CDMA and Processing gain
•   Determining aperture antenna gain
•   Antenna pattern evaluation—beam-width and front-to-back ratio
•   Determining antenna reactive and radiative near fields
•   Converting between VSWR and reflection coefficient
•   Comparing % reflected power and return loss measurements
•   Phase combining simulation
•   Performing a simple RF power budget
•   Converting gain and NFdB to linear ratios
•   Performing Cascade analysis of a terrestrial receive system
•   Converting NFdb to Noise Temperature
•   Performing Cascade analysis of a satellite receive system
•   Performing LOS link budget using manuf. equip. specifications
•   Determine LOS and NLOS margin based on service objectives
•   Determining LOS radio horizon
•   Determining Fresnel zone clearance
•   Performing a Free-space path loss analysis
•   Determining link reliability based on rain fade margin
•   Estimating diffraction gain for obstacle in radio path
•   Determining the Coherence Bandwidth for a given environment
•   Estimating the RMS Delay Spread of an open area
•   Determining the Coherence time for a given Doppler spread
•   Estimating NLOS path loss using the Log Distance formula
•   Comparing expected loss for several models in a given environment




                                                                        11
                    Applied Learning Solutions’ Curriculum


                Broadband Wireless Communications (4G)

                               Course Description

This is a 2 day detailed course intended to give the student a technical
comparison of the broadband wireless communications solutions that are being
deployed today.
The demand for high speed wireless connectivity is growing, with some analysts
predicting there will be over 2 billion mobile broadband users by 2015. Spectrum
is a scarce resource and mobile operators are embracing technologies like Wi-
Fi, femto cell, and wireless USB technologies in order to provide a complete
broadband solution. This course describes and contrasts the different wireless
technologies providing connectivity for delivering broadband subscriber
services.

                                Course Objectives

At the end of this course the student should be able to:
      • Define broadband wireless and the various application and services it
         enables
      • Understand the emerging wireless techniques to deliver broadband
         connectivity, including OFDM, MIMO, femto cells and multiple channel
         solutions
      • Distinguish between different broadband technologies including Wi-Fi,
         WiMAX, and LTE
      • Describe the major features of IEEE 802.11n and how higher data rates
         are attained
      • List the key technical attributes of the emerging 3GPP Advanced LTE
         and IEEE 802.16m enhancements
      •   Explain how WiMedia Wireless USB supports broadband connectivity between
          a user’s personal devices




                                                                                12
                      Applied Learning Solutions’ Curriculum


                                   Course Outline
Day 1
        •   Introduction to Wireless Broadband
            We provide the student with an understanding of the wireless
            broadband market. We look at the products and services being
            envisioned, the different deployment scenarios, and what mobile
            operators are implementing today. The module also compares and
            contrasts the different wireless broadband technologies.

            Module Outline:

            o   Definition of wireless broadband and 4G
            o   Wireless broadband market and major trends
            o   Forecasts and early products
            o   Personal networking
            o   Digital home and digital office
            o   Everywhere connectivity
            o   Complementary and competing technologies

        •   Wireless Enabling Technologies
            Students will learn about the key wireless technologies that are
            changing how wireless broadband is being delivered. We explain why
            OFDM / OFDMA is the air interface of choice for broadband
            communications, the different MIMO antenna techniques that can
            improve capacity and increase data rates, the use of femto cells in
            indoor environments, microwave possibilities for delivering cell site
            backhaul capacity, and fractal antennas supporting multiple radio
            technologies on one device.

            Module Outline:
            o Frequency Division Multiple Access
            o Orthogonal Frequency Division Access
            o Contrasting OFDM and OFDMA
            o Multiband OFDM
            o Benefits and disadvantages of OFDM
                                                                                13
                     Applied Learning Solutions’ Curriculum


            o Introduction to MIMO concepts
            o Open and closed loop MIMO
            o Virtual MIMO
        •   IEEE 802.11n High Throughput
            This module gives students a comprehensive understanding of how the
            next generation Wi-Fi radio can achieve data rates of 600Mb/s. It
            explains the key technical attributes of 802.11n, including dual and
            40MHz channel operations, PHY and MAC layer optimizations. This
            module also contrasts 802.11n with 802.11a/g, and discusses the Wi-Fi
            Alliance testing of 802.11n products.

            Module Outline:
            o Applications and services
            o Contrasting 802.11a/g with 802.11n
            o Optimizing OFDM parameters
            o Dual channel and 40MHz channel options
            o MAC enhancements to support higher data rates

Day 2
        •   IEEE 802.16 Mobile WiMAX
            We study the technology being implemented today by Clearwire
            Sprint and Comcast to deliver wireless broadband connectivity to users
            both in their home and away. This section explains the enhancements
            added to the 802.16 specification to support mobility and how data
            rates of over 70Mb/s can be achieved. We also discuss the spectrum
            considerations for WiMAX deployments, and the work going on in
            802.16m to meet the ITU 4G requirements.

            Module Outline:
            o Understanding the specifications
            o Contrasting fixed and mobile WiMAX
            o Connecting to a WiMAX base station
            o Quality of Service and scheduling RF resources
            o Implementation challenges and solutions
            o WiMAX Forum and product certification
                                                                                14
              Applied Learning Solutions’ Curriculum


•   3GPP Long Term Evolution (LTE)
    We address this new radio interface that will allow service providers
    who are currently deploying 3G cellular systems to offer higher data
    rates (such as AT&T and Verizon). This module introduces the new
    system architecture and terminology, explains why 3GPP elected to
    use OFDMA on the downlink and SC-FDMA on the uplink, and discusses
    the evolution to a flat all IP core network architecture. We also explain
    the work going on to define LTE Advanced, and provide a comparison
    between LTE and WiMAX.

    Module Outline:
    o Timeline for standards development
    o System architecture and terminology
    o Contrasting SC-FDMA and OFDMA
    o Internetworking with existing 2G and 3G cellular systems
    o Transitioning to an all IP network
    o Conformance testing

•   Wireless USB
    Wireless USB technology is used to provide broadband
    communications between devices that are in close proximity. This
    section shows the frequency bands for operations and discusses FCC
    ruling. This module also describes the alternative ultra wideband
    technologies, including WiMedia, and discusses the Wireless USB
    certification activities.

    Module Outline:
    o RF Frequency bands and FCC rulings
    o Alternative ultra wideband technologies
    o Topology and connectivity options
    o Physical layer
    o Logical Link Control Layer
    o WiMedia and Wireless USB certification



                                                                           15
                    Applied Learning Solutions’ Curriculum


      •   Course summary
          We summarize the key differences between the major wireless
          broadband technologies discussed in the course. The summary
          provides students with comparison tables and lists of key features. We
          also describe the standards activities that enable interworking and
          hand off between these wireless access technologies.

          Module Outline:
          o Contrasting different wireless broadband technologies
          o Interworking and seamless handover

Who should attend this course

This will be of benefit to any one working with wireless systems, including
marketing and sales, technical support and product development staff.

Course Prerequisites

There are no prerequisite requirements to attend this course; however it is
recommend that students first attend the Wireless Communications
Fundamentals course.




                                                                               16
                   Applied Learning Solutions’ Curriculum


                          Wireless Network Security

                                Course Description

The ease of sending sensitive and personal data in an increasingly mobile world
means that people in the wireless and telecommunications industries must
understand how security applies to their technologies. New government and
industry regulations also make security awareness mandatory in many roles
across these industries.
The purpose of this course is to provide students with a detailed understanding
of security in wireless networks. In addition to understanding the specifics of the
various wireless security standards, we also explain how these standards work
with other services and standards in real-world implementations to create a
complete security infrastructure.

We supply practical hands-on exercises that reinforce key concepts. Students
use the same real-world tools during the exercises that they will encounter
outside the classroom.

                                Course Objectives

At the end of the course, the student will be able to:
      • Explain the core principles of wireless security
      • List the security technologies that compose an operational
         infrastructure
      • Distinguish between various wireless security technologies
      • Identify security standards and their use
      • Apply key security concepts including cryptography, authentication,
         authorization, privacy, confidentiality, integrity, and availability in a
         wireless security context
      • List applications of security in modern technologies with emphasis on
         wireless and wired network applications
      • Identify potential and current wireless security threats and
         countermeasures

                                                                                     17
                      Applied Learning Solutions’ Curriculum


        •   Recognize and describe acronyms and terminology that apply to
            wireless security (supplemental glossary provided by instructor)

                                    Course Outline

Day 1

        •   Overview of Security Standards and Terminology
            Many security industry and academic courses teach their own non-
            standard taxonomy. Even when students have an understanding of core
            security terminology, the terminology frequently differs from both the
            accepted standard and from understanding the terms in a wireless
            security paradigm. As a result, students typically have difficulty
            communicating and collaborating on wireless security until they establish
            a common taxonomy. This module defines common security terms that
            we will use throughout the course. It also refreshes students on both well-
            established and new security standards to ensure that they receive the
            most effective learning possible from the remainder of the course.

            Module Outline:
            o Authentication and Authorization
            o Cryptography and Cryptanalysis
            o Shared Secret and Public Key Cryptography
            o Digital Signatures and Hashes
            o Cryptographic Standards

        •   Network and Internet Security
            Most connectivity today involves the Internet, either as backbone for
            tunneling or as an exposed provider. Corporate networks are
            increasingly interconnected through and to the Internet.
            Understanding how security impacts these networks is essential. We
            examine the security standards and methods for protecting data in a
            variety of connected paradigms.



                                                                                   18
                      Applied Learning Solutions’ Curriculum


            Module Outline:
            o Data Encryption and Signing
            o Public Key Certificates
            o Secure Sockets Layer (SSL) Applications
            o Email security
            o Internet Protocol Security (IPSec)
        •   Hands-On Exercises
            o Identifying application of Internet security controls
            o Capturing and examining IPSec network traffic
            o Analyzing SSL strengths and weaknesses

Day 2
        •   Wireless Authentication Methods
            To ensure the most in-depth analysis of wireless security, we address the
            two common standards in distinct portions: authentication and
            cryptography. In this module we examine the most common wireless
            security methods in use today from an authentication perspective. We
            learn how the user proves their identity to the network, and how the
            network authenticates and authorizes them to allow access. There are
            strong ties to the next module on cryptography to ensure that students
            get a complete understanding.

            Module Outline:
            o Cleartext
            o Wired Equivalent Privacy (WEP)
            o Wi-Fi Protected Access (WPA, WPA2)
            o Passphrases and Public Key Certificates
            o 802.1X Port-based Network Access Control
            o Remote Authentication Dial In User Service (RADIUS)




                                                                                   19
              Applied Learning Solutions’ Curriculum


•   Wireless Cryptography
    Data protection and authentication is one of the most important uses
    of wireless security. Most users and administrators take for granted that
    any data sent over a "secure" wireless network is completely protected
    against all attackers. We examine exactly how data is encrypted,
    transmitted, received, and decrypted over a variety of wireless
    network protocols, showing strengths and weaknesses during each
    analysis.

    Module Outline:
    o Cleartext
    o WEP
    o WPA and WPA2
    o 802.1X
    o Mutual Certificate-Based Authentication
    o Encrypted tunnel using Virtual Private Network (VPN)

•   Wireless Security End-to-End
    The final module of the course ties together all the previously covered
    components by describing several common deployment
    configurations. The class completes hands-on exercises and discussions
    together and in small groups to understand, analyze, and describe the
    security benefits and drawbacks of these common configurations.

    Module Outline:
    o Common Wireless Configurations in Homes
    o Common Wireless Configurations in Small Businesses
    o Common Wireless Configurations in Large Corporations
    o Common Wireless Configurations in Public Venues

•   Hands-On Exercises
    o Network and packet analysis of unencrypted Wi-Fi data
    o Network and packet analysis of encrypted Wi-Fi data
    o Wireless network surveying and target selection
    o Application of common wireless attack techniques
                                                                           20
                   Applied Learning Solutions’ Curriculum



Who Should Attend This Course

This course benefits anyone working with wireless, including marketing and sales,
technical support, and product development engineering.

Course Prerequisites

Participants should have a familiarity with computers to attend this course.
Knowledge of wireless communications is preferred but not required.
Familiaritywith general computer security is recommended.




                                                                               21
                    Applied Learning Solutions’ Curriculum


              Basics of 802.11 Wireless Local Area Networks

                                Course Description

We provide students with a solid understanding of how IEEE 802.11 Wireless LANs
work including basic operational procedures and deployment challenges.
Students participate in supplemental hands-on exercises to reinforce key
concepts. This course provides the basis for participants to understand the
advanced 802.11courses.

                                Course Objectives

At the end of this course the student will be able to:

   •   Understand the services provided by Wi-Fi
   •   List the major strengths of the ODFM scheme and understand why it is the
       choice for broadband communications
   •   Describe the different 802.11 physical layers, including 802.11a, g and n
   •   Define the major functions and operational procedures of 802.11
   •   Understand which 802.11 standards apply to various real-world scenarios
   •   Outline the major considerations in implementing Wi-Fi networks

                                  Course Outline


Module 1 - Introduction to IEEE 802.11

Students will understand the key differentiators between WLANs and other
wireless technologies. We explore the evolution of the standard from the initial
802.11 1997 specifications to the enhancements being deployed today such as
high throughput and mesh networking. We also study the different deployment
scenarios including hot spots and muni-nets. This module includes the issues
associated with deployment in the licensed-exempt frequency bands.

   •   Introduction to Wireless Local Area Network (WLAN)
                                                                               22
                   Applied Learning Solutions’ Curriculum


   •   802.11 WLAN Deployment Scenarios
   •   Standards Creation Process
   •   Family of Standards
   •   Spectrum Considerations

Module 2 - 802.11 MAC Layer Operational Procedures
This module gives the student an understanding of how Wi-Fi works, including
how Subscriber Stations connect to an Access Point, compete for resources and
send data. It covers how contention is handles and the impact of a heavily
loaded cell.

   •   Network Architecture
   •   Connecting to an 802.11 Network
   •   Authentication and Association
   •   Sending Data on the 802.11 Network
   •   Handling Contention
   •   Coexistence of b and g

Hands- on Exercises

   •   Enumerating and Accessing Wi-Fi Networks

Module 3 - 802.11 Physical Layers
We take an in-depth look of the different 802.11 physical layers 802.11a,b and g.
We contrast 802.11a, b and g and show how the introduction of an OFDM air
interface enable data rates of up to 54Mb/s to be achieved. This module also
describes the Physical Packet Data Unit (PPDU) and how 802.11b and g devices
can coexist.

   •   Introduction to 802.11 Physical Layers
   •   802.11b Direct Sequence Spread Spectrum
   •   Orthogonal Frequency Division Multiplexing (OFDM)
   •   802.11a Higher Speed in the 5GHz
   •   802.11g Higher Data Rate in the 2.4GHz
   •   802.11n High Throughout
                                                                               23
                  Applied Learning Solutions’ Curriculum


Module 4 - Challenges of Implementing Wi-Fi Networks
     Students gain an appreciation for the issues RF engineers face when
     deploying WLAN in offices, warehouses and across campuses. They learn
     key radio concepts that impact coverage and over-the-air data rates.
     This module also discusses the difference between indoor and outdoor
     propagation, the impact of antenna placement and provides advice on
     frequency channel allocations.

  •   Theory of Radio
  •   Coverage and Data Rates
  •   Radio Wave Propagation in Indoor and Outdoor Environments
  •   Antennae Options and Placement
  •   Allocating Channel Frequencies

Hands-on exercises

  •   Managing the Co-existence of g and n Networks




                                                                         24
                   Applied Learning Solutions’ Curriculum


                       802.11 Emerging Specifications

                               Course Description

In the last few years there has been considerable activity in the 802.11 Standard
Group where they are developing enhancements to the basic standards,
including higher data rates, mesh networking and fast roaming between Access
Points. This course helps students gain a solid understanding of these new and
emerging IEEE 802.11 standards.


                               Course Objectives

At the end of this course the student should be able to:

   •   Understand the status of the emerging IEEE 802.11 enhancements
   •   Describe the major features of the 802.11n High Throughput standard and
       how higher data rates are attained
   •   Explain the major enhancements included in 802.11r that enable roaming
       while making a voice call
   •   Identify the major attributes of implementing an 802.11s mesh network
   •   Define the major functions required to provide transparency as user roam
       between 802.11 and cellular networks
   •   Discuss the new physical layer being defined in 802.11y to support
       operations in the 3.6GHz band




                                                                               25
                    Applied Learning Solutions’ Curriculum


                                  Course Outline


Module 1 - 802.11 Specifications and Current Status

Module 2 – Key 802.11 Operations
This module describes the basic operations of an 802.11 Wireless LAN so students
can appreciate the changes made in the subsequent specification
enhancements. It includes how a Subscriber Station connects to the network,
contends for use of the medium and sends data. This module also includes a
description of the MAC frame structure.

   •   802.11 Network Topology and Components
   •   Connecting to an 802.11 WLAN
   •   Sending Data and Collision Avoidance
   •   Handling Contention


Module 3 - 802.11e QoS
We provide students with an understanding of the limitations of Point
Coordination Function (PCF) in delivery QoS. We then describe the major
enhancements made to the MAC layer to support Quality of Service (QoS)
802.11e. This module also explains the Wi-Fi Alliance certification testing goals
referred to as MultiMedia (WMM).

   •   Enhanced Distributed Channel Access
   •   Hybrid Control Channel Access
   •   802.1e MAC Data Frames
   •   Wi-Fi Alliance Certification of 802.11e key features

Module 4 - 802.11n High Throughput
Students learn how enhancements to the Physical Layer allow data rates of up
to 600 Mb/s. We discuss the advantage of OFDM for broadband data and
explain the key aspects an MIMO and beamforming antenna technology.


                                                                                    26
                   Applied Learning Solutions’ Curriculum


Students will also understand the MAC layer enhancements which are defined
to improve efficiency when transmitting at broadband data rates.

   •   Introduction to 802.11n
   •   Comparing 802.11a, b, g and n
   •   802.11n Physical Layer
   •   MIMO and Beamforming Antenna Technology
   •   MAC enhancements

Module 5 - 802.11r Fast Roaming and Transition to VoWLAN
We explain the operational mechanisms for how 802.11r allows a Station to
transitions between two Access Points quick enough to support a voice call or
video session. This module also includes a discussion on the major components
of 802.21 Media Independent Handover and how 802.11r and 802.21 coexist.
We also describe the specification work being done in the 3GPP to support
handover between Wi-Fi and 3G mobile systems.

   •   Voice over Wireless LANS (VoWLAN)
   •   802.11r Fast Base Station Transition
   •   802.21 Media Independent Handover (MIH)
   •   3GPP Network Interworking Specifications

Module 6 - 802.11s Mesh Networking
Students explore the benefits of mesh networking and will be able to describe
the current status of 802.11s deployments. We also study the major functional
components of an 802.11s mesh network and define the operational
procedures for how a Subscriber Station finds and joins an 802.11s mesh network.

   •   Introduction to Mesh Networks
   •   802.11s Mesh Network Architecture and Components
   •   Connecting to a Mesh and Path Selection
   •   Routing Protocols
   •   Mesh MAC Frame Structure and QoS Enhancements
   •   Mesh Security Considerations
   •   Mesh Power Save
                                                                                27
                   Applied Learning Solutions’ Curriculum


Module 7 - 802.11u Interworking with Non-802 Networks
Students learn the technical differences between Wi-Fi and cellular networks
and identify the challenges of integrating these networks. This module then
discusses network discovery and selection and describes information transfer
from external networks.

   •   Contrasting Wi-Fi and Cellular
   •   802.11u Network discovery and selection
   •   802.11u Information Transfer with QoS Mapping
   •   802.11u Provisioning Emergency Services

Module 8 - 802.11y 3650-3700 MHz Operations
This module describes enhancement to the 802.11 standards to support
operations in the 3650–3700 MHz band. It discusses the impact higher power
transmissions and the concepts of cognitive radios. We also analyze the various
deployment scenarios and future use of this technology.

   •   Deployment Scenarios
   •   Spectrum Considerations
   •   Cognitive Radios
   •   802.11y Physical Layer
   •   802.11y MAC Sublayer and Frame Format




                                                                               28
                   Applied Learning Solutions’ Curriculum


                Next Generation 802.11n High Throughput

                               Course Description


The objective of this course is to provide students with a detailed understanding
of the new IEEE 802.11n High Throughput standard. In addition to studying the
specifics of the 802.11n standard, we explain the underpinned radio techniques
that are being deployed to attain the high data rates over the air, and the new
deployment challenges that these radio techniques introduce.

                                Course Objectives

At the end of the course, the student will be able to:

      •   Describe the enhancements provided by 802.11n over the previous
          standards
      •   Understand why OFDM is the air interface of choice for broadband
          communications
      •   Distinguish between the different MIMO techniques
      •   Define the 802.11n PHY and MAC changes that enable high data rate
          performance
      •   List the challenges in implementing 802.11n and how to mitigate them
      •   Discuss how the emerging 802.11 standards further complement and
          extend the capability of Wi-Fi networks
      •   Recognize and describe 802.11n-appropriate acronyms and
          terminology (supplemental glossary provided by instructor)




                                                                               29
                    Applied Learning Solutions’ Curriculum


                                 Course Outline

Module 1 - Overview of IEEE 802.11n High Throughput
We provide an introduction to the new High Throughput standard that promises
to deliver data rates up to 600Mb/s. We discuss the evolution of the 802.11
standard, how 802.11n enables new digital home and office scenarios, and
shows some of the new 802.11n products in the market today. This module also
covers the Wi-Fi Alliance certification of 802.11n equipment and provides an
overview and interdependencies of the key 802.11n features added to the
802.11 PHY and MAC layers.

      •   Introduction to IEEE 802.11n
      •   Applications and services requiring higher data rates
      •   History and Wi-Fi Alliance certification
      •   Major features and benefits of IEEE 802.11n
      •   Architectural components of IEEE 802.11n

Module 2 - Radio Techniques Underlying IEEE 802.11n
To attain higher data rates than legacy 802.11 systems, 802.11n leverages newer
radio techniques. This module provides a comprehensive understanding of how
Orthogonal Frequency Division Multiplexing (OFDM) works and why all
broadband wireless technologies including 802.11n are based on OFDM. We
also detail the specific attributes of 802.11n OFDM and their technical
advantages. This module is essential for understanding how 802.11n attains
600MB/s data rates.

      •   History of Orthogonal Frequency Division Multiplexing (OFDM)
      •   Understanding OFDM
      •   Benefits and disadvantages of ODFM
      •   Contrasting 802.11n and 802.11a OFDM attributes

Module 3 - Antenna Options Enabled in IEEE 802.11n
One of the most significant enhancements to Wi-Fi is the inclusion of advanced
antenna techniques including Space Time Block Code (STBC), Multiple Input
Multiple Output (MIMO), and beamforming. This module explains these
                                                                             30
                   Applied Learning Solutions’ Curriculum


techniques and the key factors in determining optimal antenna strategies for
different radio environments. The module also covers how 802.11n uses channel
sounding mechanisms to determine channel state information.

     • Historical Wi-Fi Antennae
     • Space-Time Block Coding (STBC)
     • Spatial Division Multiplexing (SDM)
     • Beamforming
     • Contrasting the pros and cons of STBC, MIMO, and beamforming
     •
Hands-On Exercises
           Identifying and distinguishing 802.11n signals
           Assessing the impact of different data rates on multimedia content

Module 4 - Interoperability with Legacy Devices
Students learn how 802.11n uses physical layer preambles to support the
coexistence of 802.11a, g, and n devices connecting to the same Access Point.
We also describe a more efficient environment, referred to as Green Field
mode, where only 802.11n devices are operational within the Basic Service Set.
The complex methods used to distinguish between the 802.11n modes of
operation is explored in depth.

      •   IEEE 802.11a legacy packet format
      •   High Throughput (HT) Mixed Mode operations
      •   Mixed Format (MF) preamble
      •   Green Field (GF) deployment

Module 5 - IEEE 802.11n Physical Layer
This module describes the 20 and 40MHz channel options, how they can coexist
in the same frequency band, and how the modulation and coding schemes
work to protect the integrity of transmitted data. It also explores propagation
models that are useful in planning the coverage and antenna placement
aspects of an 802.11n deployment.



                                                                              31
                   Applied Learning Solutions’ Curriculum


      •   40 MHz channels
      •   Coexistence and interoperability between 20 and 40 MHz deployments
      •   Modulation and coding scheme enhancements
      •   Low Density Parity Check (LDPC) codes
      •   802.11n propagation models

Module 6 - IEEE 82.11n Medium Access Control (MAC) Layer

802.11n defines a new physical layer that can deliver broadband data rates.
Operating at this high data rate has an impact on the higher protocol layers.
This module looks at the changes in 802.11n to improve the efficiency of the
MAC layer, including MSDU and MPDU aggregation, compressed and implicit
block acknowledgements, and Transmission Operations (TxOP) enhancements.
We also describe MAC layer changes to support coexistence with legacy
equipment and coexistence of different 802.11n systems.

      •   Key aspects of the 802.11 MAC layer
      •   802.11n improvements required to support higher data rates
      •   Coexistence of 20 and 40MHz systems
      •   Mechanisms to protect 802.11n transmissions

Hands-On Exercises

      •   Measuring the coexistence of 20 and 40 MHz channels
      •   Calculating the maximum data rate for 802.11n deployments




                                                                            32
                   Applied Learning Solutions’ Curriculum


                               3GPP LTE / SAE

                              Course description

The term Fourth Generation (4G) refers to the next generation of cellular
networks, and promises to deliver broadband wireless services such as
multimedia communications, high speed Internet access and HDTV. Long Term
Evolution and Service Architecture Evolution (LTE/SAE) define enhancements to
the current Third Generation (3G) radio and IP network architecture referred to
as UMTS.


                               Course Objectives

Upon successful completion of this course students will be able to:
     • Discuss market trends that drove the definition of the LTE/SAE standards
     • Recognize the status of providers planning LTE deployments
     • Understand the key technical attributes of the emerging 3GPP LTE/SAE
        enhancements
     • Describe the major features of the LTE standard and how higher data
        rates are attained
     • Distinguish between user and control planes, and between logical and
        transport channels
     • Explain the major enhancements included in SAE that enable more
        efficient delivery of IP services
     • Define the major functions required to provide transparency as user
        roam between 2G, 3G and 4G systems
     • Identify the major deployments consideration in upgrading from 3G to
        4G wireless




                                                                              33
                     Applied Learning Solutions’ Curriculum


                                   Course Outline

Day 1
        •   Introduction to fourth generation (4G) wireless systems
            Students explore the advantages of the next generation 4G over the
            currently deployed 3G systems. They learn the key features of the new
            radio interface LTE and the enhancements to create a flat IP
            architecture SAE for delivering services. We also contrast LTE with the
            other wide area network standard IEEE 802.16 referred to as WiMAX.
        •   Understanding OFDM and the Allocation of RF Resources
            We help the students understand why OFDM is the air interface of
            choice for broadband communications. This section illustrates the
            differences between OFDM and OFDMA. We also discuss why LTE
            defines OFDMA for communications to the mobile device but chose to
            use SC-FDMA for communications to the base station. This module also
            defines the functional components of an LTE transmitter and discusses
            the supported frequency bands and channel bandwidths.
        •   Multiple Input Multiple Output (MIMO)
            This module gives the student an understanding of how MIMO works
            and the different MIMO options including: single and multi-user MIMO,
            Spatial Division Multiple Access, Space Time Block Coding and
            beamforming. This module also includes an introduction to the
            planning models available to support coverage and capacity
            predictions for MIMO based networks.




                                                                                 34
                     Applied Learning Solutions’ Curriculum


Day 2
        •   Evolution UTRAN (E-UTRAN)
            Students receive a detailed understanding of the LTE radio, covering
            the frame structure for both FDD and TDD deployments. We describe
            both the downlink and the uplink channel structures and illustrate how
            data rates of 300 Mb/s and 75 Mb/s can be achieved on the downlink
            and uplink respectively. This module also illustrates how RF resources
            may be allocated to subscriber services.
        •   Service Architecture Evolution (SAE)
            We help students understand the evolution of the GPRS core network
            to support the delivery of diverse and broadband IP services. We
            describe the SAE core referred to as Evolved Packet Core (EPC) and its
            major components, including support for mobility between LTE and
            legacy 2G /3G systems in addition to other technologies such as Wi-Fi
            and WiMAX.
        •   Advanced LTE
            Advanced LTE is an enhancement to LTE that promises to meet the 4G
            requirements defined by International Telecommunications Union.
            These include a peak data rate of 1Gb/s. This module will allow the
            students to both understand the application of these 4G requirements,
            and also have a solid technical foundation on which to understand
            these emerging standards.

Who should attend this course
This will be of benefit to any one working with 2G or 3G, including marketing and
sales, technical support and product development staff.

Course Prerequisites
There are no prerequisite requirements to attend this course, however it is
recommend that students first attend the Wireless Communications
Fundamentals course.




                                                                                35
                     Applied Learning Solutions’ Curriculum


                                    3GPP UMTS

                                 Course Description

Universal Mobile Telecommunications System (UMTS) is the 3G standard for the
evolution of GSM mobile carriers, defined to enable the delivery of data
services. Initial deployments occurred in Japan in 2001, since then UMTS has
been deployed in countries across the world. As of December 2009 there were
315 commercial WCDMA deployments in 132 countries. This is a technical course
designed to provide students with a technical foundation for understanding
UMTS.

                                 Course Objectives

Upon successful completion students will be able to:
     • Understand the Current Deployment Status of UMTS
     • Describe the UMTS Architecture and Key Components
     • Explain the Key Functional Aspects of the WCDMA Air Interface
     • Draw the WCDMA Channel Structure
     • Define the HSPDA and HSUA and their Impact on the Data Rate
     • List the major UMTS core network components
     • Discuss the evolution from UMTS to LTE

                                   Course Outline

Day 1
        •   Introduction to UMTS
            Students are provided with an understanding of the history of UMTS
            and its success in the market to date. It also contrasts and compares
            UMTS with 2G GPRS/EGPRS so that student can see the advantage of
            3G over 2G networks. This module also covers the spectrum allocated
            and being used today for UMTS deployments.




                                                                                36
             Applied Learning Solutions’ Curriculum


    Module Outline:
    o History of Cellular from 1st and 2nd Generation Systems to 3G
    o Market Drivers and Current Status
    o 3G Standards Organizations
    o GPRS and EGPRS
    o UMTS Architecture and Components
    o Frequency Band and other Spectrum Considerations

•   WCDMA Air Interface
    This module gives the student an understanding of the UTRAN
    architecture and a technical understanding of why CDMA was the air
    interface of choice for 3G. It explains how handover between base
    station and power control is handled. This module also describes the
    downlink and uplink channel structure and how radio resources are
    allocated to subscriber services.

    Module Outline:
    o Introduction to UMTS Terrestrial Radio Access Network (UTRAN)
    o Understanding CDMA
    o Handover and Power Control
    o Radio Resource Control
    o Channel Types and Bearers
    o UMTS Frame Structure
    o Physical Channels

•   High Speed Downlink Packet Access (HSDPA)
    We provide students a technical understanding of HSDPA. The module
    covers how subscribers may share a high data rate channel. This
    module will assist students in understanding the advantages of HSDPA
    and the operational and performance aspects of implementing the
    HSDPA channel.

    Module Outline:
    o HSDPA Concepts and Terminology
    o High Speed Downlink Shared Channel

                                                                       37
                      Applied Learning Solutions’ Curriculum


            o   High Speed Shared Control Channel
            o   Uplink Dedicated Physical Control Channel
            o   Operational Procedures
Day 2
        •   High Speed Uplink Packet Access (HSUPA)
            Students are shown how high data rates on the uplink are achieved.
            We discuss how it employs link adaptation methods as in HSDPA , but
            on the uplink the subscriber must request and be granted resources to
            transmit. This module concludes with a summary comparison between
            HSDPA and HSUPA.

            Module Outline:
            o Overview of HSUPA physical channels
            o Enhanced Dedicated Channel
            o Absolute Grant Channel
            o Dedicated Physical Control Channel
            o Dedicated Physical Data Channel
            o Requesting Permission to Send Data
            o Comparison between HSDPA and HSUPA

        •   UMTS Core Network Protocols and Procedures
            We provide the student with a broad understanding of how the
            network architecture evolves from 2G to a 3GPP R4/R5 network. We
            discuss new capabilities, such as the utilization of soft switches, MSC
            Server and MGW. This module also describes the migration towards IP
            based multimedia services.

            Module Outline:
            o Overview of the UMTS Architecture
            o Core Network Components
            o Core Network Signaling
            o Service and Multimedia Provisioning
            o UMTS Interfaces and Interwork




                                                                                  38
                   Applied Learning Solutions’ Curriculum


      •   Evolved High Speed Packet Access (eHSPA)
          We provide the student with an understanding of how the use of MIMO
          technologies increases the data rate. We also cover the transition of
          the core GPRS network to a flat all IP network. The module also briefly
          describes the evolution of 3G WCDMA based networks to LTE
          ODFMA/SC-FDMA air interface and even higher data rates.

          Module Outline:
          o 3GPP Release 7 Features
          o Multiple Input Multiple Output (MIMO)
          o All IP Architecture
          o 3GPP Release 8 Features
          o Long Term Evolution (LTE)

Who Should Attend This Course
This course is designed to benefit marketing, technicians, technical professionals,
and product development engineers. This course is particular value to people
working on or in the process of transitioning to 3G UMTS.

Course Prerequisites
There are no prerequisite requirements to attend this course, however it is
strongly recommend that students first attend the Wireless Communications
Fundamentals course to gain basic knowledge of radio principles in addition to
modulation and coding techniques.




                                                                                39
                  Applied Learning Solutions’ Curriculum


                         Fixed and Mobile WiMAX

                              Course Description

WiMAX is being deployed globally to provide broadband data rates to homes,
small businesses, and mobile subscribers. This course provides students with a
thorough understanding of the services enabled by WiMAX, the licensed and
licensed-exempt spectrum issues, and the functional capabilities of WIMAX. It
also details the enhancements made to the standard to support mobility.
This is a 2 day instructor led in depth technical course on the IEEE 802.16
standard intended to give student a solid understanding of WiMAX, how it works
and deployment consideration.

                              Course Objectives

Upon successful completion of this course students will be able to:
     • Understand the services provided by WiMAX
     • List the major strength of the ODFMA air interface and understand why
        this has become the air interface of choice for broadband
        communications
     • Describe the different WiMAX physical layers
     • Define the major functions and operational procedures of WiMAX
     • Explain the major enhancements WiMAX currently under definition
     • Discuss how WiMAX maybe consider complementary or competitive to
        other broadband technologies, such as, 3G and Wi-Fi




                                                                            40
                     Applied Learning Solutions’ Curriculum


                                  Course Outline

Day 1
        •   WiMAX Market Opportunities and Spectrum Considerations
            Students are provided with an understanding of the current WiMAX
            market. We define the different fixed and mobile configurations of
            current WiMAX deployments, discuss the major benefits of WiMAX, and
            contrast the licensed and licensed-exempt frequency bands available
            for deployment.

            Module Outline:
              Wireless Broadband Applications and Services
              Contrasting Wireless Broadband Technologies
              WiMAX Market Status
              Spectrum Considerations
              Module Summary

        •   WiMAX Standards Evolution within IEEE and WiMAX Forum
            We take the student through the 802.16 standards process and explain
            the different specifications and work going forward. We define the
            essential WiMAX terminology and overview the WIMAX architecture.

            Module Outline:
              IEEE 802 Standards Process
              IEEE 802 Family of Standards
              Overview of WiMAX
              802.16 Standards Evolution
              WiMAX Forum
              Module Summary




                                                                              41
                      Applied Learning Solutions’ Curriculum


        •   WiMAX Physical Layers
            This module gives students a detailed understanding of the 802.16
            physical layer. It starts with an explanation of the key aspects of the
            fixed WiMAX OFDM and the Mobile WiMAX OFDMA air interfaces, it
            walks the student through the major components of a WiMAX radio
            transmitter, and it details how radio resources are allocated to
            subscriber services.
            Module Outline:
                Orthogonal Frequency Division Multiplexing (OFDM)
                Advantages of OFDM
                802.16-2004 and 802.16e-2005 Physical Layers
                Key Aspects of an OFDM Radio
                Allocation of OFDM Subcarriers
                Module Summary

Day 2

        •   802.16 Medium Access Control Layer
            Now we provide the student with a thorough understanding of the
            802.16 MAC layer. We explain the different types of connections in
            802.16 and how QoS is enabled and detail how a MAC PDU is
            constructed and transmitted on the PHY layer. We also describe the
            MAC operational procedures including how a Subscriber Station
            connects to an 802.16 network, makes bandwidth requests and sends
            data. The enhancements to support mobility such as the handover
            and power control are also covered.

            Module Outline:
              MAC Connections and Provisioning of QoS Services
              MAC Frame Structure
              MAC Packet Data Unit (MPDU)
              MAC Operational Procedures
              802.16e-2005 Procedures to Support Mobility
              Module Summary


                                                                                      42
                  Applied Learning Solutions’ Curriculum


     •   802.16 Security Sub-Layer
         This module gives the student an understanding of the security layer
         that is part of the 802.16 specifications. It describes the major
         components of the 802.16 security sublayer and discussed access
         control and encryption. This module also defines the security
         enhancements required to support mobility and handover.
         Module Outline:
             WiMAX Security
             Privacy Key Management
             Data Encryption
             02.16e Security Enhancements to Support Mobility
             Module Summary

Course Prerequisites
There are no prerequisite requirements to attend this course, although a
background in telecommunications and / or wireless communications would be
advantageous.




                                                                                43
                   Applied Learning Solutions’ Curriculum


                     Fixed Mobile Convergence (FMC)


                                Course Description

Fixed Mobile Convergence is the delivery of services and applications anywhere
anytime, whether at home, in the office or on the move. Today service
providers are successfully bundling fixed and mobile phone, TV and Internet
services. They are expanding their networks to include access points and femto
cells within the customer premises. The next step is to provide the user with a
seamless experience to services whether they are using a mobile data phone, a
personal computer or accessing services via the TV. The seamless user
experience is referred to as fixed mobile convergence.

There are four essential concepts that enable fixed mobile convergence:

   1. The convergence of wireline and wireless telecommunications core
      networks to an all IP platform, enabling services to be delivered efficiently
      and with the appropriate Quality of Service (QoS).

   2. Internet technologies such as HTTP, SIP, VoIP, IPv6 that create a service
      delivery platform on which a complete range of multimedia services can
      be delivered.

   3. The deployment of new wireless access technologies like 802.11n, WiMAX
      and LTE that enable broadband speeds equivalent to wireline.

   4. Mobile devices such as smart phones and Netbooks, where the
      communications and computing have been successfully integrated.




                                                                                 44
                Applied Learning Solutions’ Curriculum


                                Course Outline

•   Module One: Introduction to Fixed Mobile Convergence
    Students learn about the concepts supporting Fixed Mobile
    Convergence. Each concept is covered in more depth in subsequent
    modules. These services can be delivered to users seamlessly across
    multiple locations, multiple networks and multiple devices. This section
    describes the key technologies that enable the delivery of services via
    the cloud.
    o   Defining Convergence
    o   Market Opportunities
    o   Illustration of an Ubiquitous Service
    o   Key Enabling Technologies
    o   Standards Organizations and Associations


•   Module Two: Convergence to an all IP Network
    This module discusses the transition of today’s PSTN and PLMN
    telecommunications networks to an all IP network. We discuss the IP
    protocols that enable the delivery of services with different Quality of
    Service (QoS) levels, the routing of packets in a mobile environment,
    and options for securing access and user traffic across diverse
    networks.
    o   Circuit Switch Networks
    o   Packet Based Networks
    o   IP Networks
    o   Quality of Service (QoS) over IP Networks
    o   Secure Communications




                                                                               45
               Applied Learning Solutions’ Curriculum


•   Module three: IP Multimedia Service (IMS)
    Students learn how IMS allows services and applications to be
    delivered across different IP networks. We address the key aspects of
    the IMS service control architecture and the use of the SIP protocol to
    provide communications to any device. This module also details how
    “presence”, that is the current user status information, is handled to
    enable new user experiences in social networking, gaming and
    collaboration, and how voice call continuity works between the
    traditional circuit switched and IMS domains.
    o   Introduction to IMS
    o   IMS Architecture and Components
    o   User Identities and User Profiles
    o   Presence
    o   Voice Call Continuity
    o   Multimedia Messaging

•   Module four: Non IMS Service Delivery Platforms
    We introduce students to Cloud Computing and how it enables users
    to access services and applications from anywhere. We distinguish
    between the different Cloud offerings such as Software as a Service
    (SaaS) and Platform as a Service (PaaS). This module also discusses the
    key technology enabling Cloud Computing, including data centers,
    network servers, storage and network access.
    o   Introduction to Cloud Computing
    o   Illustrations of Services in a Cloud (SaaC)
    o   Network Architecture and Components
    o   Dynamic Storage
    o   Service Development and Provisioning




                                                                          46
               Applied Learning Solutions’ Curriculum


•   Module five: Broadband Wireless Technologies
    We study the key wireless technologies being implemented to provide
    broadband connectivity anywhere. At the end of this module students
    will be able to discuss the major differences between the emerging
    broadband wireless technologies. This module covers the latest Wi-Fi
    standards 802.11n that enables digital home and digital office services,
    the latest 3G mobile technologies HSPA+ and LTE that promise a full
    multimedia experience, and WiMAX that is providing broadband
    services equivalent to Wireline.
    o   Introduction to Broadband Wireless
    o   IEEE 802.11n Wireless LANs
    o   3GPP High Speed Packet Access(HSPA+)
    o   3GPP Long Term Evolution(LTE)
    o   IEEE 802.16 WiMAX


•   Module six: Mobile Internet Devices
    The number of Internet enabled devices connected to broadband
    wireless networks is increasing at an amazing rate. These devices
    enable access to Cloud applications and services anywhere. In the
    future, for a subscriber to have a rich set of services and applications,
    all they may need on the actual device is a browser that can access
    the cloud. This module provides students with an understanding of the
    key technical aspects for how wireless Internet enabled devices can
    access the Cloud for services.
    o   Introduction to Smart Phones and Netbooks
    o   Operating Systems
    o   Mobile Virtualization
    o   Browsers and Widgets
    o   Mobile Cloud Services
           Collaboration
           Social Networking
                                                                            47
               Applied Learning Solutions’ Curriculum


•   Module seven: Bringing it all together
    Students are provided with a course summary that shows them how
    what they’ve learned in this course work together to deliver services
    anywhere anytime: IP networks, Internet technologies and broadband
    wireless access.
    o   Transition to an All IP Network
    o   IMS Service Delivery Platform
    o   Non IMS Service Delivery Platforms
    o Wireless Broadband Access
    o Illustration of Fixed Mobile Services




                                                                       48
                    Applied Learning Solutions’ Curriculum


                      Cloud Computing Fundamentals

                                Course Description

Cloud computing is one of the hottest, fastest growing services in the IT industry
today. It is changing the way enterprises and small businesses interact and
collaborate: providing access to IT computer resources, enabling sharing and
distribution of data, integrating communications and many more business
critical services.

Students will receive a foundational understanding of the cloud computing
solutions being developed and deployed today. Students will have a firm
understanding of what cloud computing does, why it is a key trend in the
technology industry, how it works, and where it is going.


                                Course Objectives

At the end of this course the student will be able to:
      • Understand cloud computing
      • Distinguish between different cloud solution architectures
      • Describe the cloud as a service delivery platform
      • Determine where cloud computing offers benefits in an IT infrastructure
      • Identify current solutions and future trends in the cloud computing
         industry

                                  Course Outline


Module 1 - Understanding Cloud Computing
Students explore the basic concepts of the cloud computing paradigm. We
define the cloud and the features that a cloud includes and excludes. We also
define the standard cloud service delivery models. Students also learn to
distinguish between cloud services and cloud applications.

                                                                                 49
                    Applied Learning Solutions’ Curriculum


      •   Cloud Computing Introduction
      •   Taxonomy of Cloud Computing
      •   Cloud Services and Features
      •   Types of Cloud Architectures
      •   Benefits of Cloud Computing

Module 2 - Cloud Architecture and Implementation
Students deconstruct cloud computing to understand the underlying
architecture. We examine the components that make up a core cloud and
show how they work with each other and how they communicate with clients
and other networks.

      •   Cloud Computing Model Analysis
      •   Components of a Cloud
      •   Communication Architectures
      •   Application Architectures and Implementation
      •   Implementation Considerations and Requirements

Module 3 - The Data Center as a Cloud Provider
Clouds share many features of modern data centers including scalability and
availability. But there are a number of differences, both in feature sets and level
of implementation. In this module, students learn the differences between the
two concepts, even as they understand that the concepts cannot be cleanly
separated. We focus on the features that are commonly attributed as benefits
to cloud computing that are also associated with a modern, well-run data
center.

      •   Data Center Architecture
      •   Cloud Provider Architecture
      •   Distinguishing Between Services
      •   Security In A Cloud
      •   Availability In A Cloud
      •   Scalability In A Cloud
      •   Functional Flexibility In A Cloud

                                                                                 50
                   Applied Learning Solutions’ Curriculum


Module 4 - Commercial Cloud Platforms and Providers
There are numerous cloud computing providers in today's technology
marketplace. Students will examine several provider offerings from different
perspectives including decision makers, technologists, and platform providers.
The providers include key players such as Amazon and Google, both of whom
deliver numerous cloud services today. This ensures that students understand the
benefits, drawbacks, requirements, limitations, and services that the most
prevalent cloud providers offer.

      •   Understanding Cloud Computing Platforms
      •   Cloud Computing Standards
      •   Analyzing Today's Cloud Providers and Platforms

Module 5 - The Future of Cloud Computing
Cloud computing today is at the beginning of a long-term adoption process.
Cloud providers are rapidly creating platforms and services to deliver to this new
market, and all industries that leverage IT are either implementing or examining
cloud solutions today. This module serves to show students where cloud
computing will be in the future based on trends, demands, and the
monetization of the industry.

      •   Technology Trends in Cloud Computing
      •   Impact of Cloud Computing on IT
      •   Impact of Cloud Computing on Home Applications
      •   Direction of Cloud Computing




                                                                                51
                   Applied Learning Solutions’ Curriculum


                       Cloud Computing Curriculum
Introductory Focused

Cloud Computing Essentials
Why Cloud Computing is critical to today's IT and services infrastructure. Topics
include network connectivity, dynamic load management, geo-location, and
the numerous components that create a cloud environment. Students will learn
how Cloud Computing works. This can be a prerequisite course as it lays the
foundation for the subsequent courses in this curriculum.


Technology Focused

Cloud Computing Network Connectivity In-Depth
This course describes how the various Cloud Computing components connect
to each other, to a corporate network, and to the Internet. Topics include
network interfaces, routing, local and remote access, and network bandwidth
optimization.

Cloud Computing Fault Tolerance In-Depth
The loss of service can be catastrophic to a business. Fault tolerance is a
required business need across most industries today. At the core of the Cloud
Computing value is the ability to be fault tolerant. This course describes the
different methods and technologies that make Cloud Computing fault tolerant.
Topics include data fault tolerance, connectivity fault tolerance, and data
center geo-location and failover.




                                                                                52
                   Applied Learning Solutions’ Curriculum



Cloud Computing Dynamic Load Management In-Depth
In today’s business models it is often difficult to determine the demand for a
service or application before broad deployment. As a result, many services
deploy the wrong size of infrastructure, either wasting resources or under-
deploying or losing business. One core benefit to Cloud Computing is the ability
to scale up and down depending on load and network traffic. This course
covers various technologies including dynamic server scaling, dynamic
bandwidth scaling, and load management techniques.

Cloud Computing Security In-Depth
Today’s computing environment is often heavily regulated by government and
industry rules. Many of these rules govern privacy and data security. With Cloud
Computing, there is always concern about data management. This course helps
you understand concerns and solutions about security and privacy in a Cloud
Computing environment. Topics include data management, data access,
privacy, and redundancy.

Planning Your Cloud Computing Implementation
This course ties together all the Cloud Computing technologies to create a
cohesive plan. We look at identifying the physical space, hardware, network
components, software, and services that you need to build your cloud. This
course is best for service planners, network planners, and architects.
Prerequisites of this course are all of the preceding Technology Curriculum
courses.




                                                                               53
                   Applied Learning Solutions’ Curriculum


Service and Application Focused

Running Database Services in Cloud Computing
Storing and accessing data in a Cloud Computing environment has unique
challenges. This course focuses on databases that are hosted in a cloud and
these unique challenges. These include database availability, data throughput,
and client/server application requirements.

Running Messaging Services in Cloud Computing
Messaging is a critical component of most companies today. But hosting
messaging, including email, Voice over IP (VoIP), and instant messaging services
can be challenging. So many organizations choose to host these services in a
Cloud Computing environment. There are many considerations for hosting
messaging services in a cloud including data security during communication
and storage, timely access to data, and integration of the services to provide a
seamless platform and experience. This course describes the challenges and
solutions.

Running Virtualized Applications in Cloud Computing
Application deployment and maintenance is one of the highest costs in larger IT
organizations. Virtualizing these applications often leads to huge savings
because the apps are easier to control, update, deploy, and service. However,
there are a number of pitfalls and the process can be quite complex. This course
describes how to determine the right applications for hosting in a cloud, how to
approach the process, and how to overcome the problems to make this
solution a success.

Running Security Services in Cloud Computing
With Cloud Computing, there is always concern about data management. This
course helps you understand concerns and solutions about security and privacy
in a Cloud Computing environment. Topics include ensuring that your data is
protected both in-transit and at rest, verifying that your data is managed and
stored in compliance with your security policies, and the physical security of a
Cloud Computing environment.

                                                                              54
                   Applied Learning Solutions’ Curriculum


Business Planning Focus

The Cost Efficacy Case for Cloud Computing
This course is an introduction to the business side of Cloud Computing. Detailed
examination of the short- and long-term costs associated with cloud integration
are examined and compared to the costs of doing “business as usual.” We
examine the various types of cloud computing from a business perspective
including hybrid and private clouds. Case studies of existing cloud deployments
are used so students can see real-world examples and how they can apply to
specific scenarios.




                                                                               55
                   Applied Learning Solutions’ Curriculum


       Broadband Communications in 2010: IP Packets and TDM

The Broadband paradox:
Have you heard that TDM is dead and has been replaced by packets? Have
you also heard that TDM is alive and being strongly considered for the next
generation architecture for the global Internet? If you think these two
statements are confusing and need some explanation then this is the course for
you.

The packet vs. circuit debate, long thought to have been won by the packet
people with their variable length, layer 3 packets, is far from over. What is
emerging are streamlined QoS-aware multimedia networks operating at layers
1, 2, 2.5 and 3 which take into account the best aspects of packet and TDM
and combine them into broadband transmission systems suitable for a wide
range of multimedia needs.

This two day course is ideally suited for individuals who would like to develop a
better understanding of both the packet and circuit switched worlds. We also
provide a clearer vision of what emerging and future networks will look like.




                                                                                    56
                     Applied Learning Solutions’ Curriculum


                                    Objectives:

At the end of this course all attendees will be able to:
      • Explain TDM and circuit networking including benefits,
         drawbacks, examples, applications, clocking,
         synchronization and overheads.
      • Explain packet, cell and frame networks including benefits,
         drawbacks, examples, applications, clocking,
         synchronization and overheads.
      • Explain broadband and the similarities and differences
         between broadband and TDM and packet, cell and
         frame networks and how they compliment each other.
      • Explain how different aspects of each of the above
         networking approaches can be combined to optimize
         certain network benefits for specific applications and uses.
Audience:
The course is designed specifically for learners who have an intermediate
understanding of packet and/or circuit technologies.

                                      Outline


Day 1
        •   Introduction
        •   Circuit, Frame, Cell and Packet Technologies
            o Frame Technologies (PPPoE/PPoA, Frame Relay and Ethernet)
            o Cell Technologies (Cell Relay: ATM and STM)
            o Packet Technologies (IP v4 and IP V6)
            o Future Circuit Architectures (STM and SAIN)
            o Circuit, Frame, Cell and Packet Technologies Glossary
                                                                            57
               Applied Learning Solutions’ Curriculum


•   Broadband and the Circuit to Packet Switching Migration
    o Broadband vs. Narrowband
    o Circuit Emulation Services
    o Circuit to Packet Migration
               Moore’s Law
               Technology Issues
               Financial Issues
               Regulated vs Non-Regulated Entities Impact
    o Broadband, Circuit and Packet Switching Glossary
•   Wireless
    o WiFi and WiMAX
    o VoIP over WiFi
    o MESH networks
    o Wireless Local Loops and Basic Exchange Telephone Radio System (BETRS)
    o Regulated and Unregulated Wireless Issues
    o Wireless Glossary
•   Fiber to the Premise (Home/Small Business/Branch)
    o SONET
    o Passive Optical Networks
    o Active Optical Networks
    o ATM
    o Fiber’s Role in the Triple Play
    o Fiber to the Premise Glossary
•   IPTV and IP Video
    o Unicast, Broadbast and Multicast
    o Content and Digital Rights Management
    o Implementation Issues Overview
    o IPTV Glossary

                                                                    58
                     Applied Learning Solutions’ Curriculum


        •   VoIP/Voice over Packet
            o Architectures
            o Implementations
            o Protocols
            o E9-1-1 Issues and Status
            o Communications Assistance to Law Enforcement Act (CALEA)
            o VoIP Glossary
Day 2
        •   Extending Copper’s Lifeline
            o Cleaning up the Loop
            o Emerging/Emergent DSL (ADSL, SDSL, VDSL, VHDSL) Technologies
            o Future of Copper In Rural Telcos
            o Copper Local Loop Glossary
        •   Bandwidth Provisioning and Rate Control
            o Broadband Provisioning
            o Controlling Admission Rates
            o Network Admission Algorithms
            o Rate Control and the Service Level Agreement
            o Bandwidth Provisioning and Rate Control Glossary
        •   Metro/WAN Ethernet Services
            o Network Interface Devices
            o Demarcation Function
            o Buffering, Rate Enforcement and Admission Control
            o Network Statistics and Diagnostics
            o Anatomy of a NID
            o Glossary
        •   Numbering Schemes and Addressing
            o VoIP Uniform Resource Identifiers and Numbering Plans

                                                                             59
              Applied Learning Solutions’ Curriculum


    o ENUM and other Numbering Proposals
    o Intermodal Local Number Portability
    o Numbering for Emergency Services
    o The Future of E.164 numbering
    o Numbering and Addressing Glossary
•   Module 12: A Broadband Future
    o Multiplexing/Sharing and Non-Constant Bit Rate Networking
    o Broadband Services
             Constant Bit Rate
             Variable Bit Rate
             Unspecified Bit Rate
             Available Bit Rate Services
•   Multimedia/Triple Play Access Facilities
•   Trends in non-Circuit Networking
•   Multiplexed and Traffic Sensitive Glossary


                              Conclusion

•   Review
•   Final Question & Answer




                                                                  60
                    Applied Learning Solutions’ Curriculum


                            IP Networks and VPNs

The term Virtual Private Networks can be applied to a wide range of protocols
and services ranging from IETF Layer 1 Virtual Private Wire Service (VPWS) and
Virtual Private Line Service (VPLS) to IETF Layer 5 Secure Sockets Layer/Transport
Layer Security SSL/TLS and Secure Shell (SSH) VPNs.

This course, Applied IP Networks and Virtual Private Networks (VPNs) has been
updated for 2010. It begins by describing the common characteristics required
of all VPNs and then catalogs every major VPN variation using the common
characteristics to contrast and compare key aspects. These include ease of
implementation, cost, complexity and security.

In order to assure that the learner fully understands the eccentricities and
nuances of the various VPN approaches about 20% of the course – is devoted
to applying what is being learned in a group VPN selection exercise based on
real-world needs and requirements. Are today’s telecom customers faced with
more than 20 choices? Yes, but these are the top 20!
                                   Background:

Because of the breadth and depth of our client’s product line and range of VPN
customers, we created this course to give a fair and reasonable explanation of
the entire range of VPN technologies, protocols, standards and services. And
even though this course contains information on 20 different choices there are
no “legacy” technologies included. All 20 varieties are currently available or will
be available in the marketplace before the end of 2010. This is an excellent first
session and it provides the required framework for understanding additional VPN
training. Veteran learners also enjoy the course because it can provide a
significant update to what they already understand.
                                    Highlights:

Applied Learning Solutions’ Applied IP Networks and VPNs provides a broad
overview of the range of VPN options and contrasts and compares them based
upon a variety of key factors. Highlights include:
                                                                          61
                    Applied Learning Solutions’ Curriculum


   •   Detailed VPN selection matrix is a part of the class and is personalized by
       the learner as class progresses
   •   Coverage of the full range of key VPN technologies, services, protocols
       and standards
   •   Technology agnostic approach consistent with our client’s go-to-market
       strategy
   •   Learn why there are no “bad” VPNs, only bad VPN implementations.
   •   Course taught by practitioners with deep industry experience with carriers,
       service providers, government agencies, and small, medium and large
       enterprises.
   •   Half day VPN selection exercise based upon actual customer needs and
       issues
                                     Objectives:

At the end of this session students will be able to:
   1. Identify the predominant VPN approaches at all layers of the IETF model
   2. Describe VPN customer requirements and selection criteria for carrier,
      service provider and end-user customers
   3. Contrast and compare key selection criteria of each VPN
   4. Explain the basic operations of each type of VPN
   5. Describe similarities and differences between the various types of VPN
                                        Level:
This is an intermediate level course. See Prerequisites for additional details.


                                    Prerequisites:

A basic working knowledge of frame-based and packet-based protocols is
desirable in order to get the most from this course.




                                                                                  62
                     Applied Learning Solutions’ Curriculum


                                   Course Outline

Day 1

Module 1: VPNs in 2010
Carrier, service provider and end-user organizations have a wide range of
options for creating Virtual Private Networks. This section will provide a high level
framework in which to categorize VPN. This will be used for the rest of the class to
prepare a comparison matrix included in the final exercise.
   • VPN Customers
          o Carriers
          o Service Providers
          o End-User Organizations
   • VPN Needs & Criteria
          o Standards
          o Security & Privacy
          o Complexity
          o Cost
          o Compatibility
          o Performance
   • The Comparison Matrix
   • Quick Look: The Top 20 VPNs

Module 2: Optical VPNs (xWDM)
Many service providers, carriers and larger enterprise and government
customers are choosing to build metro and even regional and national networks
from dark fibers that they “light up” with wavelength division multiplexing. This
section covers optical advancements that are making xWDM a popular
alternative for VPNs.

   •    History & Future Projections
   •    Technology & Standards
   •    Operational Overview
           o Addressing
           o Switching
                                                                                  63
                   Applied Learning Solutions’ Curriculum


          o Routing
          o Encapsulation
          o QoS / QoE
   •   Security and Privacy
   •   Complexity
   •   Cost
   •   Compatibility
   •   Performance
   •   Products & Services

Module 3: Virtual Private Wire Service (VPWS)
Virtual Private Wire Service (VPWS) provides a transparent Layer 1 transport that
is ideal for customers who just need a pipe and will control QoS/QoE themselves.
This section explains how it works and compares VPWS to other options.
     • History & Future Projections
     • Technology & Standards
     • Operational Overview
           o Addressing
           o Switching
           o Routing
           o Encapsulation
           o QoS / QoE
     • Security and Privacy
     • Complexity
     • Cost
     • Compatibility
     • Performance
     • Products & Services

Module 4: Virtual Private Line Service (VPLS)
Many people confuse Virtual Private Line Service with Virtual Private Wire
Service. Admittedly the differences are subtle but important. After this section
you will know, and appreciate, the difference.



                                                                                   64
                    Applied Learning Solutions’ Curriculum


   •   History & Future Projections
   •   Technology & Standards
   •   Operational Overview
          o Addressing
          o Switching
          o Routing
          o Encapsulation
          o QoS / QoE
   •   Security and Privacy
   •   Complexity
   •   Cost
   •   Compatibility
   •   Performance
   •   Products & Services

Module 5: Provider Backbone Trunking (PBT)
End user organizations love LANs. Carriers and service providers love REVENUE.
What could be better than a simple, standardized Layer 2, metro LAN service
that allows carriers and service providers to get REVENUES by letting customers
extend their LANS?
   • History & Future Projections
   • Technology & Standards
   • Operational Overview
          o Addressing
          o Switching
          o Routing
          o Encapsulation
          o QoS / QoE




                                                                                  65
                   Applied Learning Solutions’ Curriculum


   •   Security and Privacy
   •   Complexity
   •   Cost
   •   Compatibility
   •   Performance
   •   Products & Services

Module 6: Provider Backbone Bridging (PBB)
Just like VPLS and VPWS there are differences between Provider Backbone
Transport (PBT) and Provider Backbone Bridging (PBB) and this section will clearly
identify the similarities and differences.
   • History & Future Projections
   • Technology & Standards
   • Operational Overview
           o Addressing
           o Switching
           o Routing
           o Encapsulation
           o QoS / QoE
   • Security and Privacy
   • Complexity
   • Cost
   • Compatibility
   • Performance
   • Products & Services


Module 7: Carrier Ethernet E-LINE
E-Line is an option provided by the Metro Ethernet Forum when point-to-point
connectivity is what is needed over the metro or wide area. Even though it is
point-to-point many organizations are combining E-Line services to create VPNs
and are very happy with their results.




                                                                                66
                   Applied Learning Solutions’ Curriculum


   •   History & Future Projections
   •   Technology & Standards
   •   Operational Overview
          o Addressing
          o Switching
          o Routing
          o Encapsulation
          o QoS / QoE
   •   Security and PrivacyComplexity
   •   Cost
   •   Compatibility
   •   Performance
   •   Products & Services


Module 8: Carrier Ethernet E-LAN
E-Line VPNs are “do-it-yourself” projects often combining E-Line services from
multiple providers to create what E-LAN does by design. E-LAN is growing in
popularity and, the fact is, that many customers use both E-LAN and E-Line to
meet their overall needs.
    • History & Future Projections
    • Technology & Standards
    • Operational Overview
          o Addressing
          o Switching
          o Routing
          o Encapsulation
          o QoS / QoE




                                                                                 67
                   Applied Learning Solutions’ Curriculum


   •   Security and Privacy
   •   Complexity
   •   Cost
   •   Compatibility
   •   Performance
   •   Products & Services

Module 9: Virtual Private LAN Service (VPLS)
Though Virtual Private LAN Service (VPLS) shares an acronym with Virtual Private
Line Service (VPLS) and both are used for Virtual Private Networks (VPNs). There
are actually more differences than similarities between these two VPN options.
This section explains why.
    • History & Future Projections
    • Technology & Standards
    • Operational Overview
           o Addressing
           o Switching
           o Routing
           o Encapsulation
           o QoS / QoE
    • Security and Privacy
    • Complexity
    • Cost
    • Compatibility
    • Performance
    • Products & Services

Module 10: Layer 2 Tunneling Protocol (L2TP)
L2TP combines the best aspects of Cisco’s former VPN hero Layer 2 Forwarding
(L2F) and Microsoft Point-to-Point Tunneling Protocol (PPTP). Cisco is now very
enamored with, and relying on L2TP which is currently widely deployed in the
Version 3 form.




                                                                               68
                    Applied Learning Solutions’ Curriculum


   •   History & Future Projections
   •   Technology & Standards
   •   Operational Overview
          o Addressing
          o Switching
          o Routing
          o Encapsulation
          o QoS / QoE
   •   Security and Privacy
   •   Complexity
   •   Cost
   •   Compatibility
   •   Performance
   •   Products & Services


Module 11: Pseudo-Wire (PW)
Many would argue that Pseudo-Wire, per se, is not a VPN technology. Don’t tell
that to the numerous carriers and service providers who are constructing cost-
effective Pseudo-Wire VPNs. After this section you will know what they know.
   • History & Future Projections
   • Technology & Standards
   • Operational Overview
          o Addressing
          o Switching
          o Routing
          o Encapsulation
          o QoS / QoE
   • Security and Privacy
   • Complexity
   • Cost
   • Compatibility
   • Performance
   • Products & Services


                                                                             69
                    Applied Learning Solutions’ Curriculum


Module 12: Multi-Protocol Label Switching (MPLS)
Multi-Protocol Label Switching (MPLS) is arguably the predominant carrier and
service provider choice globally for delivering QoS-assured Internet Protocol
Virtual Private Networks. This section contrasts and compares MPLS with other
options and provides a current status report and overview of MPLS.
    • History & Future Projections
    • Technology & Standards
    • Operational Overview
           o Addressing
           o Switching
           o Routing
           o Encapsulation
           o QoS / QoE
    • Security and Privacy
    • Complexity
    • Cost
    • Compatibility
    • Performance
    • Products & Services




Module 13: Cisco AToM
Cisco has taken control of the traditional Layer 1 carrier space and transported
it to its own turf with Cisco Any Transport over MPLS. AToM is both a strategic and
tactical approach that puts MPLS at the heart of the network. Better in many
ways than MPLS along AToM is the topic of this section.
     • History & Future Projections
     • Technology & Standards
     • Operational Overview
            o Addressing
            o Switching
                                                                                  70
                    Applied Learning Solutions’ Curriculum


           o Routing
           o Encapsulation
           o QoS / QoE
   •    Security and Privacy
   •    Complexity
   •    Cost
   •    Compatibility
   •    Performance
   •    Products & Services

Day 2

Module 14: IPsec VPNs
IP Security (IPsec) is, for the most part, over its growing pains and being used
widely in enterprise, carrier and service provide Virtual Private Networks where
endpoints are controlled by the network owner and what is being secure is
valuable enough to warrant the time and trouble of IPsec. IPsec is the topic of
this section where we will discuss the security of properly implemented and
managed IPsec systems as well as the ease and simplicity with which
companies can implement insecure, information leaking infrastructures if they
don’t follow the guidelines.
    • History & Future Projections
    • Technology & Standards
    • Operational Overview
           o Addressing
           o Switching
           o Routing
           o Encapsulation
           o QoS / QoE




                                                                                   71
                    Applied Learning Solutions’ Curriculum


   •   Security and Privacy
   •   Complexity
   •   Cost
   •   Compatibility
   •   Performance
   •   Products & Services

Module 15: IP VPNs
While still quite popular amongst the IP cognoscenti, those “in the know”, IP
VPNs are experiencing a steep decline in the marketplace. This is due to
restrictions inherent in the design and Layer 3-orientation of this IP-focused VPN
approach. In this section we will explain why IP VPNs are loosing ground and
other approaches are gaining rapidly.
   • History & Future Projections
   • Technology & Standards
   • Operational Overview
            o Addressing
            o Switching
            o Routing
            o Encapsulation
            o QoS / QoE
   • Security and Privacy
   • Complexity
   • Cost
   • Compatibility
   • Performance
   • Products & Services

Module 16: TLS/SSL VPNs
Nearly everyone knows that when the little lock icon in the lower corner of the
browser turns gold their transactions are being protected by the Secure Socket
Layer (SSL) protocol or its standardized cousin Transaction Layer Security (TLS).
What few know is that those same protocols can be used to build VPNs which
are ideal for ad-hoc use while providing a reasonably good level of security.

                                                                                 72
                    Applied Learning Solutions’ Curriculum


   •   History & Future Projections
   •   Technology & Standards
   •   Operational Overview
          o Addressing
          o Switching
          o Routing
          o Encapsulation
          o QoS / QoE
   •   Security and Privacy
   •   Complexity
   •   Cost
   •   Compatibility
   •   Performance
   •   Products & Services


Module 17: Cisco Easy VPN
Cisco Easy VPN is just what the name implies. In this section we will look at
Cisco’s Easy VPN and understand what makes it perfect for many organizations
who have a need for the benefits of a Virtual Private Network without the hassle
of other approaches.
   • History & Future Projections
   • Technology & Standards
   • Operational Overview
          o Addressing
          o Switching
          o Routing
          o Encapsulation
          o QoS / QoE




                                                                              73
                    Applied Learning Solutions’ Curriculum


   •   Security and Privacy
   •   Complexity
   •   Cost
   •   Compatibility
   •   Performance
   •   Products & Services


Module 18: Cisco AnyConnect VPN
Cisco AnyConnect VPN is another Cisco VPN offering for a specific segment of
the marketplace. We will dive into Cisco AnyConnect VPN and understand its
strengths and weaknesses as a VPN approach.
    • History & Future Projections
    • Technology & Standards
    • Operational Overview
          o Addressing
          o Switching
          o Routing
          o Encapsulation
          o QoS / QoE
    • Security and Privacy
    • Complexity
    • Cost
    • Compatibility
    • Performance
    • Products & Services

Module 19: Secure Shell (SSH) VPN
Secure Shell (SSH) is the secure, more fully featured version of the Telnet terminal
protocol that has come into vogue in the last decade or so. Who thought
people would us it for VPNs? Well, they are and in this section we will explain the
why and how of it.




                                                                                  74
                    Applied Learning Solutions’ Curriculum


   •   History & Future Projections
   •   Technology & Standards
   •   Operational Overview
          o Addressing
          o Switching
          o Routing
          o Encapsulation
          o QoS / QoE
   •   Security and Privacy
   •   Complexity
   •   Cost
   •   Compatibility
   •   Performance
   •   Products & Services

Module 20: SOAP VPNs
Originally SOAP was devised by Microsoft as a way for their enterprise customers
to get all services (email, ftp, web, etc) through firewalls by exploiting the trust
inherently given to browser-based service. In the mean time SOAP has become
a bona-fide VPN tool in use more in enterprises than in carrier or service provider
environments but an important VPN tool about which to learn.
   • History & Future Projections
   • Technology & Standards
   • Operational Overview
           o Addressing
           o Switching
           o Routing
           o Encapsulation
           o QoS / QoE
   • Security and Privacy
   • Complexity
   • Cost
   • Compatibility
   • Performance
   • Products & Services
                                                                                  75
                    Applied Learning Solutions’ Curriculum


Exercise: VPN Selection
Learners will self-select the group in which they will participate in this exercise.
The three groups are Carrier, Service Provider and End-User. Each group will be
given a set of real world requirements, in the form of mock Requests for
Proposals, and, based upon the perspective of their group, will propose a VPN
solution that meets the prospects needs.

This is not a Sales or Product Marketing exercise but, rather, a process to
provide valuable insights into the technical requirements of the three primary
classifications of customers for VPN products and services

Conclusion




                                                                                   76
                    Applied Learning Solutions’ Curriculum


              IPv4 and Related Protocols Workshop and Lab

                                Course Description
This IP workshop and lab focuses on the IPv4 protocol and related protocols and
their basic functionality. Using a hands-on WireShark (formerly Ethereal)
workshop approach to supplement sparse lecture this two day course is
structured so that the learner emerges with an understanding of the
fundamentals of IPv4 and related protocols and is prepared to go on to other
more specific topics such as VoIP/SIP, IPsec and other IP-centric topics This is an
excellent pre-course for Cisco certification training.

                                 Course Objective:

Develop a bit-level understanding of version 4 of the Internet Protocol and its
supporting protocols.

                                Expected Outcomes:
   •   Be able to explain all IPv4 packet header fields and understand their
       usages and variations.
   •   Understand and apply IPv4 addressing, subnetting, CIDR and related
       addressing issues
   •   Be able to use specific Internet Control Message Protocol functions which
       are critical to the proper trouble-shooting and verification of IP networks
       including PING and Traceroute
   •   Identify and dissect primary protocols that support the functionality of IPv4
   •   Use or improve usage of the WireShark (formerly Ethereal) protocol
       analyzer.



                                                                                     77
                    Applied Learning Solutions’ Curriculum


                                  Course Outline
The Workshop is divided into two distinct modules and the Lab consists of 4
student exercises

Module One: IPv4 Protocol
   •   Lower OSI Layers
   •   Upper OSI Layers
   •   Layer 3 Functionality
           o End Systems
           o Intermediate Systems
   •   IP v4 Header Fields & Functions
           o Version
           o Internet Header Length (IHL)
           o Type of Service (TOS) / Differentiated Services (DS)
           o Total Length
           o Identification
           o Flags
           o Fragment Offset
           o Time To Live (TTL)
           o Protocol
           o Header Checksum
           o Source address
           o Destination address
           o Options


Module Two: IPv4 Protocol Processing
   •   Addressing
   •   Address representations
          o Classful IP addressing
          o Classless IP addressing
   •   Subnetting
          o VLSM
          o CIDR and Supernetting
                                                                              78
                   Applied Learning Solutions’ Curriculum


   •   Special-use addresses
   •   Private networks
   •   Virtual private networks
   •   Link-local addressing
   •   Local host
   •   Address resolution (ARPs)
   •   Network Address Translation (NAT)
   •   Fragmentation and reassembly
   •   ICMP
   •   PING
   •   TRACE ROUTE

Module Three: IPv4 Supporting Protocol Operations
   •   Address Resolution (ARP/RARP)
   •   Dynamic Host Configuration Protocol (DHCP)
   •   Domain Name Service (DNS)
   •   User Datagram Protocol (UDP)
   •   Transmission Control Protocol (TCP)
   •   Simple Mail Transfer Protocol (SMTP)
   •   Post Office Protocol v3 (POP3)
   •   File Transfer Protocol (FTP)
   •   HTTP/Secure HTTP
   •   Related Protocols

Workshop Exercises and IPv4 Lab
1. Protocol Analyzer Overview Lab (Optional*)
2. Load & Run WireShark Protocol Analyzer Exercise (Optional*)
3, WireShark Familiarity Exercise (Optional*)
4. IPv4 Protocol Trace Analysis Lab
5. Supporting Protocol Trace Analysis Lab
6. Analysis and Reporting Exercise
7. Independent student exercise and discovery Lab




                                                                 79
                    Applied Learning Solutions’ Curriculum


               Voice over IP (VoIP) Concepts and Protocols
A technical crash course on the protocols and internal operations of Voice over
IP. Students will also receive a comprehensive overview of the technical,
business and marketing aspects of VoIP.

   •   Introduction
   •   The Telephony “Family Tree”
           o Analog
           o Digital Circuit
           o Digital Packet
   •   Business Voice End-to-End
           o Telephone Set
           o Analog Telephone
           o Digital Telephone - Features
           o Signaling
                    In-Band
                    ISDN/Out-of-Band
           o Private Branch Exchange (PBX)
           o Voice Coding
                    Pulse Code Modulation (PCM)
                    a-Law Encoding (Europe)
                    mu-Law Encoding (North America
                    Adaptive Differential PCM (ADPCM)
           o Voice Band Data (VBD)
                    High speed modems
                    FAX
           o Switching
           o Numbering Plans
           o Digit Analysis
           o PSTN
           o VPN
           o Private Network (Satellite, T1, VoIP, etc.)
           o Business Voice End-to-End
           o Private Branch Exchange (PBX)
           o Switching
                                                                             80
                Applied Learning Solutions’ Curriculum


       o Call Handling
       o Routing
       o CENTREX
•   Physical Connections
       o Tie Lines
       o Access T1/E1s
       o Time Division Multiplexing (TDM)
       o Framing & Options
       o Channelized vs Non-channelized
       o Clocking
       o Pulse Dialing or Tone Dialing
       o Inside the Central Office (CO)
                  Digital Cross-Connect Systems (DCS/DACS)
                  Switches
                  Intra-Network/Inter-Network Connections
                  North American Digital Hierarchy &
                      • Pleisiochronus Digital Hierarchy
                  Fiber Optic Terminating System (FOTS)
                  SONET & Wave Division Multiplexing (WDM)
•   VoIP and Broadband
       o Broadband vs Narrowband
       o Capacity vs Performance
       o The “Broadband Flip”
•   QoS Options
       o Prioritization
       o Bandwidth Reservation
       o Route Optimization
•   VoIP Devices and Systems
       o Analog Terminal Adapters (ATA)
       o VoIP Phones
       o VoIP Video Phones
       o VoIP/WiFI Phones
       o Gateways / Softswitches
       o Cisco Call Manager
•   VoIP Implementation Issues
                                                             81
                Applied Learning Solutions’ Curriculum


       o Delay
       o Delay Variation
       o Packet Loss
       o Network Availability
•   Quality of Experience
       o Expectations
       o Age/Gender of Speaker/Listener
       o Speaker/Listener Familiarity
       o Native Language
       o Prior Experience
       o Network Requirements
       o Factors affecting QoE
                 Voice Algorithm
                 Voice Compression
                 Silence Suppression
                 Echo Cancellation
                 Tandem Hops/Multiple Encoding
•   VoIP & Chip Sets: Status & Future
       o VoIP Chipsets
       o Embedded Monitoring & Performance
       o VoIP & Wireless

       VoIP Call Quality LAB: Hands-on protocol analyzer exercise.

•   VoIP Protocols Overview
       o Common Protocols
                IP
                TCP/UDP/WDP
                RTP/RTCP
       o VoIP Protocols Comparison
                H.323
                SIP/SIP-T
                Cisco Skinny
                MGCP/Megaco
                TGCP
                                                                     82
                 Applied Learning Solutions’ Curriculum


Protocol Examples & Call Traces
      o Media Gateway Control Protocol (MGCP) Example
      o Session Initiation Protocol (SIP) Call Trace

         SIP Call Trace LAB: Hands On Protocol Analyzer Exercise

      o Cisco ( SCCP)Skinny Call Trace

     Cisco Skinny Call Trace LAB: Hands-On Protocol Analyzer Exercise

•   Conclusion




                                                                        83
                     Applied Learning Solutions’ Curriculum


            Quality of Service (QoS) in Multimedia IP Networks

Students will acquire new technical and market insights into the predominant
approaches to Quality of Service issues encountered by Carriers, Service
Providers and end-user organizations who are attempting to move toward
everything over IP (EoIP). QoS requires a balancing act and fine tuning of the
network, including consideration of any service level agreement (SLAs) that may
be in place for the subject network.

   •   Quality of Service for Cisco Outline, ver 1-9, as of 26 April 2008
   •   Quality of Service
          o Quality of Service
          o Quality of Experience
          o QoS vs QoE
   •   QoS Issues
          o Multimedia/Beyond the “Triple Play”
          o Differentiation
          o Prioritization
          o Admission Control
          o Edge vs Core – Edge and Core
          o Simplicity and Complexity
          o Measurement, Reporting and Consequences
   •   Theory/Background
          o Design
                     Quality of Service (QoS)
                     Service Differentiator
                     QoS Requirement by application
   •   QoS Dependencies
          o QoS Dependencies Model
                     Service Level Agreement
                     Class of Service
                     Quality of Service (QoS)
                     Customer Network Management (CNM)

                                                                             84
                Applied Learning Solutions’ Curriculum


•   QoS Options
      o Prioritization
                 Airline Example
                 ATM CoS
                 Frame Relay
                     • Priority PVCs
                     • RTP Priority
                 Distributed Fragmentation
                 Traffic Shaping
                 Link Fragmentation and Interleaving (LFI)
                 802.1 p/q (LAN Switching Prioritization and VLAN)
                 Weighted Fair Queuing (WFQ)
                 Class Based Weighted Fair Queueing (CBWFQ)
                 Low Latency Queueing (LLQ/DLLQ)
                 Priority Queueing (PQ)
                     • IP CoS
                     • DiffServ (Differentiated Services)
                     • IP RTP Priority
                 Proprietary Schemes (ex Cisco 1P2Q2T)
      o Bandwidth Reservation
                 Airline Example
                 TDM Bandwidth Reservation (Packet Cable)
                 Bandwidth Reservation (VoDSL)
                 RSVP (IP Reservation Protocol)
                 MPLS RSVP-TE
      o Route Optimization
                 Airline Example
                 Micro Electro-Mechanical Switching (MEMS) Optical Networks
                 Synchronous Adaptive Infrastructure Network (SAIN)
                 WAN Bridging / PBB
                 MPLS / gMPLS
      o Hybrid(s)


                                                                         85
                Applied Learning Solutions’ Curriculum



•   NetFlow/IPFIX
       o NetFlow: Cisco (version 9)
       o IP Flow Information eXport: IETF RFC
       o Others use other names
       o IP Packet attributes used by NetFlow:
                 IP source address
                 IP destination address
                 Source port
                 Destination port
                 Layer 3 protocol type
                 Class of Service
                 Router or switch interface
       o NetFlow Traffic Statistic Collection
                 NetFlow Cache
                 NetFlow Collector
                 Traffic Analysis Example
                 Security Analysis Example
•   Cisco IP IOS SLAs
       o Cisco IP IOS Service Level Agreements
       o Cisco IP IOS SLA vs Traditional SLA
                 Cisco IP IOS SLA Operations
                 VoIP SLA Example
                     • Voice Quality MOS Scores
                     • MOS vs ICPIF Scores
                     • UDP Operations Statistics
•   Conclusion




                                                         86
                    Applied Learning Solutions’ Curriculum


        Rich Media, Unified Communications, Web 2.0 & Web 3.0

                                    Overview

Applied Rich Media, Unified Communications, Web 2.0 and Web 3.0 is a
comprehensive course covering many aspects of multimedia communications.
It was designed specifically to provide the essential skills and knowledge
needed to work with Unified Communications protocols, architectures and
implementations.

                                    Highlights
Applied Learning Solutions’ Applied Rich Media, Web 2.0, Web 3.0 and Unified
Communications provides both the high level architectural and industry
perspectives and also presents the detailed level view of the protocols and the
functional aspects of these topics. Students will gain an understanding of the
technologies, how to deal with the next generation of applications and the
network infrastructure required to support them. Highlights include:
   •   Brief competitive overview of UC, Web 2.0 and Web 3.0 industry
       landscape
   •   Evolution and Directions in Web architectures and services
   •   Architectural overview of Unified Communications
   •   Protocol Workshop based upon a discovery learning approach
   •   Emphasis on Product Requirements and System Testing
   •   Focus on Quality of Service and Quality of Experience Issues
   •   Security, Certificate Authorities, Encryption and Key Management
   •   40% Traditional and Discovery Labs and Interactive Group Lab Debriefs




                                                                               87
                    Applied Learning Solutions’ Curriculum


                                     Objectives

At the end of this session students will be able to:
   1. Describe Unified Communications architectures
   2. Explain multiple definitions of UC in the marketplace and where Unified
      Communications fits in
   3. Dissect traditional and emerging communications protocols used in UC,
      Web 2.0 and Web 3.0
   4. Explain how Unified Communications and Web 2.0 represent the post-
      Triple Play world of IP networking
   5. Participate in making John Chamber’s promise of the next generation IP
      network a reality


                                        Level

This is an Intermediate level course. See Prerequisites for additional detail.

                                    Prerequisites


A working knowledge of the Internet Protocol suite, data, voice and video
protocols and a basic understanding of principles of Quality of Service and
Quality of Experience are desirable to fully appreciate the materials being
presented. Individuals without some or all of these prerequisites will benefit from
this learning experience, as well, but may be unable to finish lab work during
class.




                                                                                  88
                 Applied Learning Solutions’ Curriculum


                               Course Outline

• Introduction
• Four Views of Unified Communications
       o Microsoft View
       o Service Provider View
       o Carrier View
       o Cisco View

• Web 1.0 → Web 2.0 -> Web 3.0 and Beyond
     o The O’Reilly Factor
               Shifting Paradigms
               Netscape vs. Google.
               Web 2.0
               “The Architecture of Participation”.
               Data “ownership” and copyright protection
               end of the software release cycle
     o upgrading is a continuous process.
     o Lightweight Programming Models.
     o Software above the level of a single device
     o Rich User Experience.
     o 7 core competencies.
     o “The Berners-Lee Factor”
     o W3C
     o Web 3.0
     o Beyond Web 3.0

• Unified Communications
       o Building blocks for Enterprises and Service Providers.
       o Standards-based solution
                 Third party certification
                 • Vendor Independence
                 • Interoperability.
                 Third party apps
                 • IBM, Microsoft and others.

                                                                  89
                Applied Learning Solutions’ Curriculum


      o Voice, Video, text/IM and applications sharing converge
      o Pillars of UC
                  Presence
                  Preference
                  Routing
                  Conference
                  Voice Mail & Messaging
                  Mobility
                  Security

• Unified Communications
       o UC Examples
                  Example 1: Single Site with Unified Communications Manager
                  Business Edition
                  Example 2: Multisite with Unified Communications Manager
                  Business Edition
                  Example 3: Headquarters with
                  Example 4: Headquarters with Branches Distributed
• Inside UC Part 1: Sessions
       o SIP Compared to H.323
       o SIP IP Video Components
       o SIP-based Endpoint
       o Video Hardphone
       o Video Softphone and Camera
       o SIP Proxy Server
                  Proxy for SIP signaling
       o SIP Registrar
       o SIP IP Video Components
       o SIP-based IP Conference Bridge
       o SIP-based PSTN Gateway
       o Most important SIP messages
       o SIP Addressing
       o Fully-Qualified Domain Names
       o SMTP-style Domain Names [RFC 2368]
       o E.164 style addresses [RFC 2806]

                                                                          90
                Applied Learning Solutions’ Curriculum


      o Mixed addresses
      o SIP IP Video Call Flow
                 SIP Call Establishment uses SDP to negotiate session
                 parameters.
                 Dialing to a SIP MCU
                 Types of conferences
                 • Scheduled/Pre-Initiated Conference
                 • Ad hoc Conference
      o RSVP Protocol
                 RSVP (IP Reservation Protocol) is used to assure QoS for UC
                 Sessions.

                   Protocol Analyzer Familiarization LAB


                   SIP, SDP, RTP and RTSP Protocols LAB

• Inside UC Part 2: Data
       o The World Wide Web
                   HyperText Transfer Protocol (HTTP
                   HTTPS is Secure HTTP
                   HTML
                   XML
                   XML Digital Signatures
       o File Transfer Protocol (FTP)
       o Trivial FTP (TFTP) are used extensively within
• Inside UC Part 3: Voice
       o VoIP Protocols Overview
                   H.323
                   Session Initiation Protocol (SIP)
                   Cisco Skinny
                   Media Gateway Control Protocol (MGCP)
       o Beyond just making basic phone calls.

• Inside UC Part 4: Video
       o Rich Media Communications.
                                                                               91
               Applied Learning Solutions’ Curriculum


      o IP Video Solution
                IPVC
                Video Telephony
                Rich Media.
      o Video Call vs Video Conference
                Video Call

                Video Conferences
                    • Ad Hoc
                    • Reservation-less
                    • Scheduled.
       o Components
                Endpoints
                    • IP Phones
                    • 3rd party SCCP licensed endpoints
                    • Industry Standard H.323 video endpoints
                    • Soft Endpoints
                Video Networking Infrastructure
                Call Server
                Unified Communications Manager
       o MCU
                SCCP/H.323 MCU
       o Gateways
                ISDN (H.320)/ H.323 Gateways
• Inside UC Part 5: Rich Media
       o Scope of Cisco Rich Media
                Cross-section of communication and collaboration.
       o Cisco RMC Components
                Full arsenal of tools.
                Cisco MeetingPlace Architecture
       o MeetingPlace Functional Overview
                Administration and management
                MeetingTime
                SNMP
                Notification
                                                                    92
                Applied Learning Solutions’ Curriculum


                   SMTP E-mail Integration
                   Outlook or Notes Integration
                   Conferencing
                   Audio
                   Video
                   Web
• Inside UC Part 6: Security
        o Privacy & Security
        o Security
        o IPsec Architecture and Road Map
        o Encryption
        o Keys
                   Symmetric Keys
                   Asymmetric Keys
        o DES
        o 3DES
        o AES
        o Public Key Cryptography
        o Perfect Forward Secrecy
        o Public/private Key Infrastructure
        o SIP Proxy/Secure Authentication
                   Hashing Functions
                      • MD4
                      • MD5
                   SHA-1
                   Authentication, Authorization and Accounting (AAA) Security
                   HTTP Digest Authentication
                   Secure Real Time Protocol
• Pulling it All Together:
• Rich Media, Web 2.0, Web3.0 and Unified Communications
• Section Reviews and Conclusion




                                                                            93
                   Applied Learning Solutions’ Curriculum


                              IPv6 and IP Mobility

                                    Overview

IP version 6 is of increasing interest to our students globally and represents the
next great challenge in terms of learning and application of knowledge. Tightly
coupled with IPv6 are IP Mobility and changes to standards - such as IPsec and
routing - to work properly within the IPv6 framework. Migration and co-existence
with IPv4 are also of paramount importance. All of these topics are covered in
this two day Applied Learning Solutions course.
Applied IPv6 and IP Mobility presents both topics in sufficient depth to be
perfectly suited for our students. The course format includes two hands-on lab
exercises and utilizes the industry standard Wire Shark protocol analyzer. The labs
are key to the value of this session and help by supplementing lectures and
stimulating greater class interaction.

                                    Objectives
At the end of this training program the attendee will be able to:
   1. Perform coding, analysis, troubleshooting and system testing with IPv6-
      based systems.
   2. Assist in the translation and evolution of IPv4-based systems to IPv6
   3. Analyze, design and implement security for IPv6 based upon IPsec.
   4. Design, implement and analyze IP mobility systems in an IPv6 environment
   5. Describe the differences in routing between IPv4 and IPv6 as well as in a
      mixed IPv4-IPv6 environment
   6. Provide support for migration of systems and components to an IPv6
      framework




                                                                                 94
                    Applied Learning Solutions’ Curriculum


                                    Prerequisites
In order to get the most out of the course the attendee must have a strong
working knowledge of the IP version 4 protocol suite and an understanding of
basic security concepts such as encryption, tunneling and key management
and routing. These topics will be summarized only very briefly in the context of
the course.

                                   Requirements
All students must bring a personal notebook computer on which they have
administrative rights to load and install new software.

                                     Audience

This course is designed based upon over a decade of working with a variety of
Clients, from the field to engineering and both in the US and internationally. It is
particularly well suited for students who want more detail on the topics and
appreciate very current information.


Introduction: IP Networks in Transition

IPv6 Protocol in Depth
   • Comparison to IPv4
   • Addressing
          o Address Space
          o Address Allocation
          o Address Lifetime
          o Address Mask
          o Address Prefix
          o Address Resolution Protocol (ARP)
          o Address Scope
          o Address Types
          o Private and Public Addresses
          o Unspecified Address
   • Communications trace
                                                                                   95
               Applied Learning Solutions’ Curriculum


• Configuration
• Domain Name System (DNS)
        o DNS Discovery
        o DNS Assignment
• Dynamic Host Configuration Protocol (DHCP)
        o DHCP in a Mobile IP Environment
• File Transfer Protocol (FTP)
• Fragments/Fragmentation
• Host Table
• Interface
• Internet Control Message Protocol (ICMP)
• Internet Group Management Protocol (IGMP)
• IP header
        o IP header options
        o IP header protocol byte
        o IP header Type of Service (TOS) byte
        o Mobility Header and RFC 4283 Overview
• LAN connection
• Layer 2 Tunnel Protocol (L2TP)
• Loopback address
• Maximum Transmission Unit (MTU)
• Network Address Translation (NAT)
• Network Table
• Node Info Query
• Packet Filtering
• Packet Forwarding
• Packet Tunneling
• PING
• Point-to-Point Protocol (PPP)
• Ports
• Port restrictions
• Protocol Table
• Quality of Service (QOS)
• Renumbering
• Routes and Routing
                                                        96
                   Applied Learning Solutions’ Curriculum


   • Routing Information Protocol (RIP)
   • Services Table
   • Simple Network Management Protocol (SNMP)
   • Sockets API
   • Source Address Selection
   • Starting and Stopping
   • Telnet
   • Trace Route
   • Transport Layers
   • Virtual Private Networking (VPN)

IPv6 Protocol Lab
Objective: To view, dissect and analyze a variety of IPv6 call traces with a
protocol analyzer and answer questions about normal and abnormal protocol
operation with a variety of higher layer protocols and network services.


IPv4 to IPv6 Migration Overview

   • Migration and Interoperability Concerns
   • Security Issues
   • Tunnels
   • IPv4/IPv6 Embedded Addresses
   • Default Configured Tunnel
   • Dual Stack Operation

IPSec Architectural & Capabilities Overview

   • IETF IPSec Roadmap
   • IPSec Implementation
           o AH
           o ESP
   • IPSec Modes
           o Transport Mode
           o Transport Mode with NAT Traversal
                                                                               97
                    Applied Learning Solutions’ Curriculum


         o Tunnel Mode
   • Security Associations (SAs)
   • IPSec Processing
         o Fragmentation
         o Internet Control Message Protocol (ICMP)


IPsec Protocol Lab
Objective: To analyze multiple IPsec protocol traces to better understand the
workings of AH, ESP and IKE.

Mobility Support in IPv6

   • RFC 3775
   • Overview of MobileIPv6
   • RFC 4283 Mobile Node Identifier Option for Mobile IPv6 In Depth
         o Modifications to IPv6 Neighbor
         o Requirements for Types of IPv6 Nodes
         o Correspondent Node Operation
         o Home Agent Operation
         o Mobile Node Operation
         o Protocol Constants
         o Protocol Configuration Variables




                                                                                98
             Applied Learning Solutions’ Curriculum


• IANA Considerations
• New IPv6 Protocol, Message Types, and Destination Option
• Mobile Node Identifier Option
      o MN-NAI Mobility Option
      o Processing Considerations
      o Security Considerations
               General Considerations
               MN-NAI Considerations




                                                             99
                 Applied Learning Solutions’ Curriculum


Security Considerations for Mobile IPv6
   • Mobile IPv6 Security
   • RFC 4285 Authentication Protocol for Mobile IPv6
         o RFC 4285 MIP Authentication for IPv6
                   Overview
                   Terminology
         o Operational Flow
         o Mobility Message Authentication Option
         o MN-HA Mobility Message Authentication Option
         o Mobility Message Replay Protection Option
   • Dual Stack Authentication

IPv6 Routing
   • IS-IS (RFC 1195)
            o Overview of the Protocol
            o Subnetwork Independent Functions
            o Subnetwork Dependent Functions
            o Structure and Encoding of PDUs
            o Encoding of IP-Specific Fields in IS-IS PDUs
   • OSPF for IPv6 (OSPFv3) (RFC 2740)
            o Differences from OSPF for IPv4
            o Implementation
            o OSPF data
            o Architectural
            o Configurable
            o Authentication/Confidentiality for OSPFv3 (RFC 4552)

                          Review and Conclusion




                                                                     100
                 Applied Learning Solutions’ Curriculum


                              MPLS Essentials

Students will gain a practical understanding of Multiprotocol Label
Switching; benefits, protocols, how it supports VPN services and traffic
engineering, and the management capabilities. This course is designed to
tie together the theoretical understanding of how MPLS works to the
practical applications. Students participate in lab exercises to reinforce
their knowledge of the applications.

                             Course Objective:

To provide a practical understanding of the technical specifications of
MPLS, how it works, and how it supports critical applications.

                            Expected Outcomes:

Upon successful completion of this course, the participant will be able to:

   •   Better understand the role of MPLS in networks and the benefits
       associated with using it
   •   Describe the control plane protocols for routing and signaling
       involved in delivering MPLS
   •   Explain how VPN services are delivered using MPLS
   •   Understand the management functions and challenges of MPLS
   •   Describe the applications which make use of TE

                               Course Outline:

Module 1: MPLS Overview
A description of the driving forces to develop MPLS and the expected
benefits from implementation.
          • History
          • Drivers
          • Benefits
          • Implementations




                                                                          101
                 Applied Learning Solutions’ Curriculum


Module 2: MPLS Definitions and Concepts
Defining the terms and acronyms associated with MPLS will aid in the
understanding of the concepts. The various Label formats and the
functions of the MPLS fields in header are defined, and the virtual circuit
concept is addressed.
          • Edge vs. Core
          • P, PE, CE devices
          • Label Switching vs. Routing
          • Label Formats
          • Label Operations
          • Label Switched Paths
          • Pseudowires


Module 3: MPLS Applications
The 2 main applications for MPLS are VPN and Traffic Engineering. The
different types of VPNs will be discussed and the basic concepts of Traffic
Engineering will be explained. More details on these subjects are found
later in the course.
           • VPN (L1, L2, L3)
              o VPN Architectures (Overlay vs. Peer-Peer)
              o VPN types (Site-Site, Remote Access, Overlapping)
           • Traffic Engineering and QoS

Module 4: Routing Overview
Routing is a critical component for MPLS. Several of these protocols have
been modified to support MPLS applications. These basic routing features
and modifications will be discussed.
          • OSPF
          • IS-IS
          • BGP




                                                                              102
                 Applied Learning Solutions’ Curriculum


Module 5: Signaling Protocols
Once the routing is computed, the Label Switched Paths must be set up via
signaling. There are 2 protocol choices for this function and the pros and
cons of both will be discussed.
          • LDP
          • RSVP-TE

Module 6: Layer 3 VPN
IP VPN is a key application of MPLS. New terms are introduced and the
step-by-step setup of a Layer 3 VPN will be discussed.
          • Specifications
          • VRF
          • Route Distinguishers
          • Route Targets
          • MP-BGP
          • Steps to configure a VPN
             o Full Mesh
             o Hub/Spoke

Module 7: Layer 2/Layer1 VPN
A pseudowire is used for transport of circuits and Layer 2 (Ethernet, Frame
Relay, ATM, etc.) services over an MPLS network. This concept will be
defined and the step-by-step setup procedure will be discussed.
         • Pseudowire Specifications
         • T-LDP
         • Point-point (VPWS or E-Line Service)
         • Multipoint (VPLS)
         • Hierarchical VPLS




                                                                          103
                 Applied Learning Solutions’ Curriculum


Module 8: MPLS OAM
Operations, Administration, and Maintenance of MPLS networks are critical
to the success for service delivery. This module addresses the requirements
to properly manage an MPLS network and the tools available for
management and troubleshooting.
          • Requirements
          • Specifications
          • Tools
            o MPLS Ping
            o MPLS Traceroute
            o VCCV

Module 9: MPLS Traffic Engineering
Traffic Engineering is one of the key features/applications of MPLS as it
enables Hard QoS and optimal use of resources. The capabilities and
benefits of MPLS TE are discussed.
          • Problem with traditional IP routing
          • Benefits of TE
          • Specifications
          • TE Parameters
          • Fast ReRoute

Lab Exercises:

Lab 1: MPLS backbone design
Given a traditional IP network and a set of customer requirements, design
the MPLS backbone to support these requirements. Identify the
appropriate signaling protocols to be used and the locations of the LSPs.
Lab 2: IPVPN and VPLS design
Given various customer network requirements, design the network using
IPVPN and then using VPLS. Identify the benefits and drawbacks to each
and which solution you would recommend.
Lab 3: Traffic Engineering
Given an MPLS backbone, detail the steps necessary to enable it for TE,
and design a resilient network for a specific customer using backup paths
and FRR.



                                                                            104
                  Applied Learning Solutions’ Curriculum


                    MPLS Transport Profile (MPLS-TP)

Students will gain an understanding of the requirements for a Transport
Network and specifications for MPLS-TP: benefits, protocols, how it differs
from IP/MPLS, applications, and management; and how MPLS-TP might fit in
their networks or their customers’ networks.


                              Course Objective:


To provide a practical understanding of the technical specifications
regarding MPLS-TP and how it may be useful in real networks.


                            Expected Outcomes:

Upon successful completion of this course, the participant will be able to:

   •   Better understand the role of MPLS-TP in service provider networks
       and the benefits associated with MPLS
   •   Describe the drivers behind MPLS-TP and the benefits of using it in the
       network
   •   Identify the differences between IP/MPLS and MPLS-TP
   •   Explain the control plane enhancements required to enable MPLS for
       Transport Applications
   •   Explain the various resiliency capabilities and tools for operations,
       administration, and maintenance.




                                                                           105
                 Applied Learning Solutions’ Curriculum


                               Course Outline:


Module 1: Introduction and IP/MPLS Review
A high-level overview/review of MPLS drivers and concepts. This is a
snapshot of why MPLS is important, the benefits to service providers and
users, the organizations driving the technology, and the protocol formats.
   • Data Plane
   • Control Plane
   • Applications/Services

Module 2: MPLS-TP Overview

The reason for MPLS-TP is to marry the Transport network (typically
SONET/SDH) with a packet construct. The limitations of traditional circuit-
based networks are known, and if these limitations can be overcome using
packet technologies while retaining the benefits of circuits, this leads to a
very flexible, resilient network that meets customer needs.

   •   Concepts
   •   Origins/History
   •   Why?
   •   Where does it fit
   •   Comparisons with other Transport Networks
   •   Benefits

Module 3: MPLS-TP Applications

Most packet backbones are already IP/MPLS, but there traditionally have
been various types of protocols from the Access and Aggregation networks
feeding the backbone. By extending the reach of MPLS toward the
customer, MPLS can be seamless for applications like Mobile Backhaul and
Metro Ethernet.

   •   Access
   •   Aggregation
   •   Core


                                                                          106
                   Applied Learning Solutions’ Curriculum


Module 4: MPLS-TP Requirements

RFC 5654 details the requirements of the MPLS-TP network. This document is
a product of a joint effort of the International Telecommunications Union
(ITU) and IETF to include an MPLS Transport Profile within the IETF MPLS and
PWE3 architectures to support the capabilities and functionalities of a
packet transport network.

   •   General/Layering
   •   Data Plane
   •   Control Plane
   •   Recovery
   •   QoS

Module 5: MPLS-TP Protocols

The key differences between IP/MPLS and MPLS-TP lie in the Control Plane
and Network Management areas. The control plane is optional, but if there
is one it needs to meet the requirements of the transport network.

   •   Control Plane
       o GMPLS
       o RSVP-TE
   •   Data Plane
   •   Management Plane

Module 6: MPLS-TP OAM

Operations, Administration, and Maintenance (OAM) is the most important
aspect of MPLS-TP and the area where there is much defining and
developing occurring. The big question is how to handle these features
when there is no control plane.

   •   Concepts
   •   Entities
   •   Protocols



                                                                         107
                 Applied Learning Solutions’ Curriculum


Module 7: MPLS-TP Network Management Requirements

FCAPS is required for all networks. The method of gathering specific
information may vary. Network Management systems typically enable
configuration of elements and services, but how the network reports faults
and performance information may depend on the type of network. In
some cases Network Management functions may require OAM tools.

   •   Fault
   •   Configuration
   •   Performance
   •   Security

Module 8: Summary
Lab Exercises:

Lab 1: MPLS-TP network design

Each student will have a choice of a Mobile Backhaul network, DSLAM
aggregation network, or Metro Ethernet network. The task is to design these
networks using MPLS-TP and identify the benefits/drawbacks of using MPLS-
TP.

Lab 2: OAM Behavior

For a given fault condition in the MPLS-TP network, identify which OAM tool
would best identify/report the fault and what the recovery action would
be.




                                                                         108
                 Applied Learning Solutions’ Curriculum


                         MPLS Traffic Engineering

Students will gain a practical understanding of traffic engineering for MPLS:
benefits, protocols, existing and emerging applications, and management
challenges. This course is designed to tie the theoretical aspects of traffic
engineering to practical applications and uses configuration examples and
lab exercises to emphasize that application.

                              Course Objective:

To provide a practical understanding of the technical specifications
regarding traffic engineering, how MPLS uses traffic engineering, and what
applications are enabled by it.

                             Expected Outcomes:

Upon successful completion of this course, the participant will be able to:
  • Better understand the role of traffic engineering in MPLS networks and
     the benefits associated with it
  • Describe the control plane protocols for routing and signaling
     involved in delivering MPLS traffic engineering
  • Explain the attributes used to describe the characteristics of TE
     tunnels
  • Understand the management functions and challenges of TE
  • Describe the applications which make use of TE
  • Design a traffic-engineered network

                                Course Outline:

Module 1: MPLS review
A high-level overview/review of MPLS drivers and concepts. This is a
snapshot of why MPLS is important, the benefits to service providers and
users, the organizations driving the technology, and the protocol formats
and applications.


      •   Why MPLS
      •   History and business drivers
                                                                            109
                  Applied Learning Solutions’ Curriculum


      •   Players in defining MPLS specs
      •   Basic MPLS framework
      •   MPLS common applications

Module 2: Traffic Engineering Overview
Traditional IP networks forward traffic based on certain routing metrics,
which requires that all traffic take the best path. This leads to overutilization
of some links, while others are underutilized. Traffic engineering maximizes
the utilization of the entire network.

      •   What is TE
      •   How TE compares with metric-based routing
      •   Why MPLS-TE?
      •   Benefits

Module 3: MPLS-TE Control Plane
The primary concern for traffic engineering is the setup of tunnels that
reserve resources. This requires additional information from the routing
protocols, as well as special information used to signal the setup of the
tunnels.
      • Routing protocols
      • Signaling protocols
      • Global MPLS-TE parameters
      • Interface parameters
      • MPLS-TE Tunnel parameters

Module 4: MPLS-TE Data plane
Once the tunnels are setup, then traffic must be mapped to use a specific
tunnel. Then the traffic must be encapsulated with the appropriate label to
be carried across the specified label switched path.
       • Autoroute
       • PBR
       • CoS
       • LSP Data format
Module 5: MPLS-TE Applications
There are many applications for MPLS-TE, whether it be the different ways
we can use TE, or the applications that run on TE tunnels. Fast ReRoute
(FRR) is one of the key applications of TE that enables the switchover onto
                                                                              110
                  Applied Learning Solutions’ Curriculum


bypass tunnels in less that 50ms. Other applications improve scalability and
performance as well as enable new uses such as multicast.

      •   FRR
      •   LDP scalability using TE
      •   Hierarchical RSVP
      •   VPN
      •   P2MP-TE

Module 6: Tunnel management and verification
After the tunnels are setup, they may need to be verified for continuity,
path, and performance. There are various management functions
available in the control plane and data plane.

      •   OAM
      •   LSP Ping
      •   LSP traceroute
      •   RSVP error messages




                                                                            111
                 Applied Learning Solutions’ Curriculum


Module 7: Summary and Conclusions

Lab Exercises:

Lab 1: TE network design

Given a traditional OSPF-routed network with a set of traffic flows, design
how you would engineer the traffic flows to optimize the use of resources in
the network.

Lab 2: Enabling the network for TE

Assuming the network is comprised of nodes running IOS, what commands
would you use to enable MPLS-TE:
     Globally
     At the interface level

Lab 3: Tunnel Setup

Given your design for Lab 1, identify the tunnel parameters required to
engineer the traffic according to your design.

Lab 4: Fast Reroute

For your high-priority tunnels in Lab 3, design a fast reroute plan to protect
against the possibility of multiple link failures and any node failing.




                                                                             112
                  Applied Learning Solutions’ Curriculum


  Carrier Ethernet and Wireless Backhaul: Technology, Protocols
                       and Implementation

There is no question that Ethernet has successfully emerged from the local
area into the metropolitan and wide areas and that it is presently the
hottest “new” 40 year old technology out there. Ethernet is taking on all
rivals, old and new, in the metro and carrier space as well as the backhaul
role for bandwidth hungry wireless applications.
This course is ideally suited for individuals with little prior experience as well
as those who are very familiar with Ethernet on the premises and want to
make the jump, along with Ethernet, to the metro and WANs.

                                   Objectives

At the end of this course all attendees will be able to:
   • Explain why Ethernet is a preferred transport for multimedia
      networking.
   • Enumerate issues related to Ethernet Backhaul
   • Differentiate between Ethernet Wireless LANs and Ethernet Backhaul
      for Wireless
   • Describe the basic aspects of Virtual LANS, tags and Quality of
      Service
   • Define what a Service Level Agreement is, why it is important
   • Provide a basic description of reliability and survivability aspects of
      the system
   • Provide a basic description of security aspects of the service
   • Explain the specific Metro Ethernet Forum specifications for Mobile
      Backhaul Ethernet Transport
   • Describe Virtual LAN usage within the Carrier Ethernet context
      including tags and QoS issues
   • List the operational issues of the end-to-end components and the
      interfaces between them
                                                                                113
                    Applied Learning Solutions’ Curriculum


  •     Provide an in-depth description of reliability and survivability aspects
        of the system and discuss alternatives
  •     Provide an in-depth description of security aspects of the service and
        discuss alternatives

                                     Audience:

The course is designed specifically for learners who have an intermediate
understanding of wireless and terrestrial communications technologies,
concepts and protocols. No prior knowledge of or experience with Ethernet
is required.

                                   Course Outline

Day 1
  •     Basic Carrier Ethernet Concepts
           o Ethernet History, State-of-the-Art and Future Trends
                     Who is Bob Metcalfe? Why do we care?
                     LAN Ethernet
                     Wireless Ethernet
                     Optical Ethernet
                     Metro & Wide Area Ethernet
                     Ethernet Interconnection
                     Ethernet Switching and MPLS
                     Metro Ethernet vs. SONET/SDH
           o Metro Ethernet Forum
           o Ethernet Alliance
           o IEEE
           o Metro & WAN Ethernet Requirements & Services
                     Resiliency
                     Reliability

                                                                             114
              Applied Learning Solutions’ Curriculum


                Redundancy
                Interoperability
                Quality of Service/SLA Support
                Security
                Multicast Support
                Services
                    •    VPN Services
                    •    TDM/CES Support
                    •    Triple Play Services
                Service Management
       o E-Line and E-LAN Services
                E-LAN
                E-Line Services defined by
                the MEF
                Ethernet-over-PDH/SONET (EoPDH/EoS) – Concept
                E-Tree
       o Ethernet Architecture Overview
       o Ethernet Service Overview
       o EVPL Service
                Initial Ethernet Service Offering
                Generic
                VLAN Tag Insertion
                CE-VLAN Bundling & Pass-thru
       o Security


•   Carrier Ethernet and Backhaul Architectures
       o Physical View
       o Logical View
       o Implementation View
       o Ethernet Architecture Description
       o Components, Attributes and Configuration
                                                                115
                   Applied Learning Solutions’ Curriculum


                     Relationships between VCGs, EVCs, and VLANs
                     VCG and EVC Configurations
                     UNI Port Attributes
                     EVC Service Attributes
           o Implementation
Day 2
  •     VLANs and Quality of Service (QoS)
  •     VLANs and VLAN Stacking using Q-in-Q
  •     VLAN Tag Fields


  EXERCISE: Hands-on analysis of Ethernet headers and VLAN tags using
  WireShark protocol analyzer on the student’s own computers. Students
  are advised to pre-load WireShark on their computers.


  •     Customer Traffic Policing
           o Egress Port Queuing & Class of Service (CoS) Mapping
           o QoS Options Today
                     CBR
                     VBR-rt
                     VBR-nrt
                     ABR
                     UBR
                     7-Priority Tag Classification within the EVC
                     Flexible traffic flow mapping
                     EVC CoS, CE-VLAN, Internal Header & CoS Queue
                     Mappings


  •     Reliability and Survivability
           o System Availability vs Service Availability
           o Path Diversity
           o Protection Switching
                                                                        116
             Applied Learning Solutions’ Curriculum


      o Restoration Architecture
      o Future: 50ms Inter-MSC Restoration
      o Future: 50ms Intra-MSC Restoration with Odd-Even VLANs
•   VLANs in More Depth
      o Relationship between an EVC and SP-VLAN Tag
      o VLAN to VCG Mapping
      o Multiple VLANs to VCG
•   Troubleshooting and SLA Compliance
      o NID Features and Functions
      o End-to-end Continuity Check (CC) OAM
      o End-to-end Loopback (LB) OAM
      o End-to-End Performance Monitoring (PM) OAM
      o End-to-End OAM and SLA Verification
      o Pertinent End-to-end PM Counters per EVC on NID
      o Pertinent End-to-End Traffic Statistics per VLAN or EVC on NID
•   Conclusion




                                                                     117
                 Applied Learning Solutions’ Curriculum


                      MPLS and Wireless Backhaul

Students will gain an understanding of the requirements for a next
generation backhaul network enabling 3G and 4G services. The various
implementations existing will impact the migration path to MPLS in the
backhaul network.


                             Course Objective:


To provide a practical understanding of the technical requirements to
support next generation wireless services in the backhaul network.


                            Expected Outcomes:

Upon successful completion of this course, the participant will be able to:

   •   Better understand the role of MPLS in service provider networks and
       the benefits associated with MPLS
   •   Describe the drivers behind upgrading the backhaul network
   •   Identify the different backhaul network technologies implemented
       today
   •   Explain how MPLS can be used in the backhaul environment
   •   Explain the benefits of using MPLS for wireless backhaul

                               Course Outline:

Module 1: Wireless Backhaul Overview
A description of the current state of wireless backhaul networks and the
driving forces to enable the network to support new services.

   •   History
   •   Market
   •   Current Implementations
   •   Drivers


                                                                           118
                 Applied Learning Solutions’ Curriculum


Module 2: MPLS Review
A high-level review of the basic concepts and terminology of MPLS.

   •   Concepts
   •   Protocols
   •   Terminology

Module 3: Wireless Backhaul Requirements
Identifying the key requirements for supporting wireless services in the
backhaul network.

   •   TDM
   •   ATM
   •   Frame Relay
   •   Ethernet
   •   IP

Module 4: MPLS Traffic Engineering Review
A High-level review of the basic Traffic Engineering concepts and the
features that MPLS-TE provides.

   •   Benefits of TE
   •   TE Parameters
   •   Fast ReRoute

Module 5: MPLS Circuit Emulation
Since TDM circuits are very prevalent in WBH networks the MPLS network
must be able to support them.

   •   Circuit Emulation concepts
   •   SAToP
   •   CESoPSN
   •   CEM




                                                                           119
                 Applied Learning Solutions’ Curriculum


Module 6: Using MPLS to support WBH Requirements
Based on the requirements defined in the previous module, the use of MPLS
to meet those requirements is defined.

   •   Pseudowire
   •   LSP
   •   Traffic Engineering and QoS


Module 7: Managing the MPLS WBH network
Operations, Administration, and Maintenance of MPLS networks are critical
to the success for service delivery. This module addresses the requirements
to properly manage an MPLS network and the tools available for
management and troubleshooting.

   •   Requirements
   •   Specifications
   •   Tools
       o MPLS Ping
       o MPLS Traceroute
       o VCCV

Lab Exercises:

Lab 1: MPLS WBH network design
Given an existing wireless backhaul network and requirements to support
next generation services, design the network using MPLS from the cell site to
the controller. Identify the features of MPLS that would be implemented.

Lab 2: Circuit Emulation design
Given various network requirements for TDM transport over the WBH
network, design the network using the proper type of pseudowires for the
application. Identify the benefits and drawbacks to each and which
solution you would recommend.

Lab 3: LSP design
Given the applications that must be supported on a WBH network, detail
the type of LSPs you would use and your reasons.
                                                                          120
                 Applied Learning Solutions’ Curriculum


   Carrier Ethernet Operations, Administration & Maintenance
                                   (OAM)

The Applied Learning Solutions Carrier Ethernet OAM course covers the
basics of Operations, Administration and Maintenance for Ethernet service
providers emphasizing Ethernet in the first/middle/last mile and Ethernet
backhaul. This course has hands-on labs using the WireShark protocol
analyzer which is downloaded at no charge from the Internet.

At the end of the training the learner will have a fundamental
understanding of the IEEE 802.3ah link level OAM standards and 802.1ag
and ITU-T Y.1731 end-to-end performance standards and related protocols
and standards as well as specific trouble shooting and problem resolution
procedures. This training will shorten install times and, therefore, time-to-
revenue and will increase network and system availability, which is a key
component to positive service differentiation in the marketplace.



                                 Objectives

At the end of this course the learner will be able to:
   • Better apply current knowledge of Carrier Ethernet
   • Confidently execute specific installation and testing procedures
   • Use basic and advanced functions of Network Interface
      Devices (NIDs)
   • Analyze Ethernet frames, customer and SP VLAN IDs and
      Ethernet protocol exchanges
   • Evaluate performance of Ethernet services at the VCG, UNI and
      VLAN levels




                                                                           121
               Applied Learning Solutions’ Curriculum


                             Course Outline

Day 1
Module 1: Ethernet Review
This first section will provide a high level overview of the Ethernet
protocol as used in Carrier Ethernet and wireless backhaul and will allow
attendees to do two hands-on lab exercises within the first two hours of
class. This intro and the exercises will provide a solid foundation for the
class work and exercises that follow.
• Carrier Ethernet
         o VLANs
                   Frame Format
                   802.1q
                   802.1p
                   Tags
                   Q-in-Q
         o Priorities and QoS
• Typical Service Offerings
• Example Architectures

Exercise 1: WireShark Download, Install and Familiarization
Download and install the WireShark protocol analyzer and perform basic
familiarization exercises with pre-saved packet capture files.

Exercise 2: Sample Ethernet Frame Analysis
Analyze pre-saved capture files, identify the different fields and
answer basic questions about the protocol exchanges.

Module 2: Carrier Ethernet Service Level Agreements
Service Level Agreements (SLAs) are important both for comparing
Carrier Ethernet services prior to procurement and for determining if the
service is living up to its promises. This section will review the key elements
of various SLAs in order to provide objectives and put the following
sections into perspective. Emphasis will be placed on delay, delay
variation, frame delivery, Classes of Service (CoS) and system and
service availability.
                                                                           122
              Applied Learning Solutions’ Curriculum


•   CE Service Level Agreements (SLAs)
       o Samples
       o Discussion of Variations/Differences
       o Impact of Meeting and Not Meeting
•   SLA Parameters
       o Availability / Reliability
       o Delay
       o Delay Variation
       o Frame Delivery
•   Class of Service and Frame Handling

Module 3: OA&M Overview
Traditional networks have OAM&P, Operations Administration,
Maintenance and Provisioning. Newer broadband networks have
chosen to fold Provisioning into OA&M. This section provides a high level
overview of the mandatory operations of OA&M.
• Ethernet OAM Stack
       o Link performance monitoring
       o Fault detection and fault signaling
       o Loopback testing
• Operations (O)
       o Broad Definition & Brief History
       o Ethernet Specific Definition
• Administration (A)
       o Broad Definition & Brief History
       o Ethernet Specific Definition
• Management/Maintenance (M)
       o Broad Definition & Brief History
       o Ethernet Specific Definition




                                                                      123
              Applied Learning Solutions’ Curriculum


Module 4: Metro/Carrier Ethernet OAM High Level View
Beyond the basics of broadband OAM lie the details of OAM specifically
for metro/carrier Ethernet. This section covers the important MEF and IETF
Recommendations, IEEE and ITU standards, architecture and topology.
• Metro Ethernet Forum
      o MEF 4
      o MEF 12
      o MEF 10.1
      o MEF 17
      o MEF 16 (E-LMI)
• IEEE
      o 802.3ah
      o 802.1ag Connectivity Fault Management
• ITU
      o Y.1731
• IETF: SNMP
• Architecture & Topology
      o Customer Equipment/Edge (CE)
                Routers
                Switches
                NIDs
      o Access
      o Provider Equipment/Edge (PE)
      o Service Domains
      o Maintenance Entity Groups (MEG)
      o Maintenance End Points (MEP)
      o Maintenance Intermediate Points (MIP)
      o Maintenance Associations (MA)
• Putting the Pieces Together
      o Customer View
      o Service Provider View




                                                                       124
                 Applied Learning Solutions’ Curriculum


Module 5: Ethernet Network Interface Devices
This module introduces Ethernet NIDs and their functionality. The NID
discussed is a generic NID but specific NIDs can be included in the course.
    • NID Overview
         o Service Demarkation
         o Ethernet “Smart Jack” Analogy
    • Service Assurance Functionality:
         o Performance Analysis
         o SLA Monitoring
         o In-Service Throughput Testing
         o RFC-2544 Automated Test Suite & Reports
         o Loopbacks
         o Per-Flow Statistics
         o Tapping & Monitoring
    • Service Creation & Traffic Conditioning
         o Service Mapping
         o Bandwidth Policing
         o Traffic Shaping
         o Filtering
         o Aggregation
    • Day 1 Review

Day 2
Module 6: Ethernet in the First Mile (802.3ah)
The IEEE 802.3ah standard describes Ethernet in the first mile (EFM). This
section will review VLANs, the frame format and important related
standards before taking a deep dive into the OAM aspects of 802.3ah.
   • EFM Protocols, Exchanges and Functions
          o Discovery
          o Link Monitoring
          o Remote Failure Indication (RFI)
          o Remote Loopback.




                                                                             125
                   Applied Learning Solutions’ Curriculum


Module 7: Connectivity Fault Management (802.1ag)
The IEEE 802.1ag standard provides connectivity fault management for
802.1ah-based Ethernet services. This section goes into great depth in
describing the operation and application of this important standard.
   •   Conformance
   •   Architectural Concepts and Terms
   •   Principles of bridge operation
   •   Bridge Management
   •   Support of the MAC Service by Provider Bridged Networks
   •   Connectivity Fault Management
   •   Management protocol
   •   Connectivity Fault Management Operation
   •   Connectivity Fault Management Entity operation
   •   Connectivity Fault Management protocols
   •   Encoding of CFM Protocol Data Units
   •   Connectivity Fault Management
           o Fault Detection
           o Fault Verification
           o Fault Isolation
           o Fault Notification
           o Performance Monitoring

   Module 8: Y.1731
   IEEE is not the only source for Ethernet OAM standards. The International
   Telecommunications Union (ITU) has weighed in, as well, and while
   Y.1731 is very similar in many ways to 802.1ag there are some important
   differences. This section leverages the prior section to abbreviate the
   presentation of key functions and focuses more on points of difference
   between the two standards than on point of similarity.
   • Overview
   • Protocol & Operations
   • Comparison with 802.1ag
           o Similarities
           o Differences




                                                                          126
                 Applied Learning Solutions’ Curriculum


Module 9: RFC2544
RFC2544 is a standard for benchmarking performance on Ethernet services
while they are out-of-service thereby making products based on RFC2544
ideal for establishing pre-turn up baselines that can be used for
performance comparison later as well as for use in testing Ethernet services
during catastrophic, service-impacting outages before the failed
connection can be returned to service.
   • Overview
   • RFC2544 Test Suite
          o Throughput Test
          o Back-to-Back Test
          o Frame Loss Test
          o Latency Test
   • Applying RFC2544

Course Review

Conclusion




                                                                          127
                 Applied Learning Solutions’ Curriculum


                          IP Networks and VPNs

The term Virtual Private Networks can be applied to a wide range of
protocols and services ranging from IETF Layer 1 Virtual Private Wire Service
(VPWS) and Virtual Private Line Service (VPLS) to IETF Layer 5 Secure Sockets
Layer/Transport Layer Security SSL/TLS and Secure Shell (SSH) VPNs.

This course, Applied IP Networks and Virtual Private Networks (VPNs) has
been updated for 2010. It begins by describing the common characteristics
required of all VPNs and then catalogs every major VPN variation using the
common characteristics to contrast and compare key aspects. These
include ease of implementation, cost, complexity and security.

In order to assure that the learner fully understands the eccentricities and
nuances of the various VPN approaches about 20% of the course – is
devoted to applying what is being learned in a group VPN selection
exercise based on real-world needs and requirements. Are today’s telecom
customers faced with more than 20 choices? Yes, but these are the top 20!
                                Background:

Because of the breadth and depth of our client’s product line and range of
VPN customers, we created this course to give a fair and reasonable
explanation of the entire range of VPN technologies, protocols, standards
and services. And even though this course contains information on 20
different choices there are no “legacy” technologies included. All 20
varieties are currently available or will be available in the marketplace
before the end of 2010. This is an excellent first session and it provides the
required framework for understanding additional VPN training. Veteran
learners also enjoy the course because it can provide a significant update
to what they already understand.
                                 Highlights:

Applied Learning Solutions’ Applied IP Networks and VPNs provides a broad
overview of the range of VPN options and contrasts and compares them
based upon a variety of key factors. Highlights include:
  • Detailed VPN selection matrix is a part of the class and is personalized
      by the learner as class progresses
                                                                          128
                  Applied Learning Solutions’ Curriculum


   •   Coverage of the full range of key VPN technologies, services,
       protocols and standards
   •   Technology agnostic approach consistent with our client’s go-to-
       market strategy
   •   Learn why there are no “bad” VPNs, only bad VPN implementations.
   •   Course taught by practitioners with deep industry experience with
       carriers, service providers, government agencies, and small, medium
       and large enterprises.
   •   Half day VPN selection exercise based upon actual customer needs
       and issues
                                  Objectives:

At the end of this session students will be able to:
   1. Identify the predominant VPN approaches at all layers of the IETF
      model
   2. Describe VPN customer requirements and selection criteria for carrier,
      service provider and end-user customers
   3. Contrast and compare key selection criteria of each VPN
   4. Explain the basic operations of each type of VPN
   5. Describe similarities and differences between the various types of
      VPN
                                     Level:
This is an intermediate level course. See Prerequisites for additional details.


                                 Prerequisites:

A basic working knowledge of frame-based and packet-based protocols is
desirable in order to get the most from this course.




                                                                              129
                   Applied Learning Solutions’ Curriculum


                                 Course Outline

Day 1

Module 1: VPNs in 2010
Carrier, service provider and end-user organizations have a wide range of
options for creating Virtual Private Networks. This section will provide a high
level framework in which to categorize VPN. This will be used for the rest of
the class to prepare a comparison matrix included in the final exercise.
   • VPN Customers
          o Carriers
          o Service Providers
          o End-User Organizations
   • VPN Needs & Criteria
          o Standards
          o Security & Privacy
          o Complexity
          o Cost
          o Compatibility
          o Performance
   • The Comparison Matrix
   • Quick Look: The Top 20 VPNs

Module 2: Optical VPNs (xWDM)
Many service providers, carriers and larger enterprise and government
customers are choosing to build metro and even regional and national
networks from dark fibers that they “light up” with wavelength division
multiplexing. This section covers optical advancements that are making
xWDM a popular alternative for VPNs.

   •    History & Future Projections
   •    Technology & Standards
   •    Operational Overview
           o Addressing
           o Switching
           o Routing
           o Encapsulation
           o QoS / QoE
                                                                             130
                 Applied Learning Solutions’ Curriculum


   •   Security and Privacy
   •   Complexity
   •   Cost
   •   Compatibility
   •   Performance
   •   Products & Services

Module 3: Virtual Private Wire Service (VPWS)
Virtual Private Wire Service (VPWS) provides a transparent Layer 1 transport
that is ideal for customers who just need a pipe and will control QoS/QoE
themselves. This section explains how it works and compares VPWS to other
options.
    • History & Future Projections
    • Technology & Standards
    • Operational Overview
           o Addressing
           o Switching
           o Routing
           o Encapsulation
           o QoS / QoE
    • Security and Privacy
    • Complexity
    • Cost
    • Compatibility
    • Performance
    • Products & Services

Module 4: Virtual Private Line Service (VPLS)
Many people confuse Virtual Private Line Service with Virtual Private Wire
Service. Admittedly the differences are subtle but important. After this
section you will know, and appreciate, the difference.
   • History & Future Projections
   • Technology & Standards
   • Operational Overview
          o Addressing
          o Switching
          o Routing
          o Encapsulation
                                                                             131
                 Applied Learning Solutions’ Curriculum


          o QoS / QoE
   •   Security and Privacy
   •   Complexity
   •   Cost
   •   Compatibility
   •   Performance
   •   Products & Services

Module 5: Provider Backbone Trunking (PBT)
End user organizations love LANs. Carriers and service providers love
REVENUE. What could be better than a simple, standardized Layer 2, metro
LAN service that allows carriers and service providers to get REVENUES by
letting customers extend their LANS?
    • History & Future Projections
    • Technology & Standards
    • Operational Overview
          o Addressing
          o Switching
          o Routing
          o Encapsulation
          o QoS / QoE
    • Security and Privacy
    • Complexity
    • Cost
    • Compatibility
    • Performance
    • Products & Services

Module 6: Provider Backbone Bridging (PBB)
Just like VPLS and VPWS there are differences between Provider Backbone
Transport (PBT) and Provider Backbone Bridging (PBB) and this section will
clearly identify the similarities and differences.
   • History & Future Projections
   • Technology & Standards
   • Operational Overview
           o Addressing
           o Switching
           o Routing
                                                                        132
                 Applied Learning Solutions’ Curriculum


          o Encapsulation
          o QoS / QoE
   •   Security and Privacy
   •   Complexity
   •   Cost
   •   Compatibility
   •   Performance
   •   Products & Services


Module 7: Carrier Ethernet E-LINE
E-Line is an option provided by the Metro Ethernet Forum when point-to-
point connectivity is what is needed over the metro or wide area. Even
though it is point-to-point many organizations are combining E-Line services
to create VPNs and are very happy with their results.
    • History & Future Projections
    • Technology & Standards
    • Operational Overview
           o Addressing
           o Switching
           o Routing
           o Encapsulation
           o QoS / QoE
    • Security and PrivacyComplexity
    • Cost
    • Compatibility
    • Performance
    • Products & Services




                                                                         133
                 Applied Learning Solutions’ Curriculum


Module 8: Carrier Ethernet E-LAN
E-Line VPNs are “do-it-yourself” projects often combining E-Line services
from multiple providers to create what E-LAN does by design. E-LAN is
growing in popularity and, the fact is, that many customers use both E-LAN
and E-Line to meet their overall needs.
    • History & Future Projections
    • Technology & Standards
    • Operational Overview
         o Addressing
         o Switching
         o Routing
         o Encapsulation
         o QoS / QoE
    • Security and Privacy
    • Complexity
    • Cost
    • Compatibility
    • Performance
    • Products & Services

Module 9: Virtual Private LAN Service (VPLS)
Though Virtual Private LAN Service (VPLS) shares an acronym with Virtual
Private Line Service (VPLS) and both are used for Virtual Private Networks
(VPNs). There are actually more differences than similarities between these
two VPN options. This section explains why.
    • History & Future Projections
    • Technology & Standards
    • Operational Overview
          o Addressing
          o Switching
          o Routing
          o Encapsulation
          o QoS / QoE




                                                                         134
                 Applied Learning Solutions’ Curriculum


   •   Security and Privacy
   •   Complexity
   •   Cost
   •   Compatibility
   •   Performance
   •   Products & Services

Module 10: Layer 2 Tunneling Protocol (L2TP)
L2TP combines the best aspects of Cisco’s former VPN hero Layer 2
Forwarding (L2F) and Microsoft Point-to-Point Tunneling Protocol (PPTP).
Cisco is now very enamored with, and relying on L2TP which is currently
widely deployed in the Version 3 form.
   • History & Future Projections
   • Technology & Standards
   • Operational Overview
          o Addressing
          o Switching
          o Routing
          o Encapsulation
          o QoS / QoE
   • Security and Privacy
   • Complexity
   • Cost
   • Compatibility
   • Performance
   • Products & Services


Module 11: Pseudo-Wire (PW)
Many would argue that Pseudo-Wire, per se, is not a VPN technology. Don’t
tell that to the numerous carriers and service providers who are
constructing cost-effective Pseudo-Wire VPNs. After this section you will
know what they know.
    • History & Future Projections
    • Technology & Standards
    • Operational Overview
           o Addressing
           o Switching
                                                                           135
                 Applied Learning Solutions’ Curriculum


          o Routing
          o Encapsulation
          o QoS / QoE
   •   Security and Privacy
   •   Complexity
   •   Cost
   •   Compatibility
   •   Performance
   •   Products & Services


Module 12: Multi-Protocol Label Switching (MPLS)
Multi-Protocol Label Switching (MPLS) is arguably the predominant carrier
and service provider choice globally for delivering QoS-assured Internet
Protocol Virtual Private Networks. This section contrasts and compares MPLS
with other options and provides a current status report and overview of
MPLS.
   • History & Future Projections
   • Technology & Standards
   • Operational Overview
          o Addressing
          o Switching
          o Routing
          o Encapsulation
          o QoS / QoE
   • Security and Privacy
   • Complexity
   • Cost
   • Compatibility
   • Performance
   • Products & Services




                                                                        136
                  Applied Learning Solutions’ Curriculum


Module 13: Cisco AToM
Cisco has taken control of the traditional Layer 1 carrier space and
transported it to its own turf with Cisco Any Transport over MPLS. AToM is
both a strategic and tactical approach that puts MPLS at the heart of the
network. Better in many ways than MPLS along AToM is the topic of this
section.
   • History & Future Projections
   • Technology & Standards
   • Operational Overview
          o Addressing
          o Switching
          o Routing
          o Encapsulation
          o QoS / QoE
   • Security and Privacy
   • Complexity
   • Cost
   • Compatibility
   • Performance
   • Products & Services

Day 2

Module 14: IPsec VPNs
IP Security (IPsec) is, for the most part, over its growing pains and being
used widely in enterprise, carrier and service provide Virtual Private
Networks where endpoints are controlled by the network owner and what is
being secure is valuable enough to warrant the time and trouble of IPsec.
IPsec is the topic of this section where we will discuss the security of properly
implemented and managed IPsec systems as well as the ease and
simplicity with which companies can implement insecure, information
leaking infrastructures if they don’t follow the guidelines.
    • History & Future Projections
    • Technology & Standards
    • Operational Overview
           o Addressing
           o Switching
           o Routing
                                                                             137
                 Applied Learning Solutions’ Curriculum


          o Encapsulation
          o QoS / QoE
   •   Security and Privacy
   •   Complexity
   •   Cost
   •   Compatibility
   •   Performance
   •   Products & Services

Module 15: IP VPNs
While still quite popular amongst the IP cognoscenti, those “in the know”, IP
VPNs are experiencing a steep decline in the marketplace. This is due to
restrictions inherent in the design and Layer 3-orientation of this IP-focused
VPN approach. In this section we will explain why IP VPNs are loosing
ground and other approaches are gaining rapidly.
   • History & Future Projections
   • Technology & Standards
   • Operational Overview
            o Addressing
            o Switching
            o Routing
            o Encapsulation
            o QoS / QoE
   • Security and Privacy
   • Complexity
   • Cost
   • Compatibility
   • Performance
   • Products & Services

Module 16: TLS/SSL VPNs
Nearly everyone knows that when the little lock icon in the lower corner of
the browser turns gold their transactions are being protected by the Secure
Socket Layer (SSL) protocol or its standardized cousin Transaction Layer
Security (TLS). What few know is that those same protocols can be used to
build VPNs which are ideal for ad-hoc use while providing a reasonably
good level of security.

                                                                           138
                  Applied Learning Solutions’ Curriculum


   •   History & Future Projections
   •   Technology & Standards
   •   Operational Overview
          o Addressing
          o Switching
          o Routing
          o Encapsulation
          o QoS / QoE
   •   Security and Privacy
   •   Complexity
   •   Cost
   •   Compatibility
   •   Performance
   •   Products & Services


Module 17: Cisco Easy VPN
Cisco Easy VPN is just what the name implies. In this section we will look at
Cisco’s Easy VPN and understand what makes it perfect for many
organizations who have a need for the benefits of a Virtual Private Network
without the hassle of other approaches.
   • History & Future Projections
   • Technology & Standards
   • Operational Overview
          o Addressing
          o Switching
          o Routing
          o Encapsulation
          o QoS / QoE
   • Security and Privacy
   • Complexity
   • Cost
   • Compatibility
   • Performance
   • Products & Services




                                                                          139
                 Applied Learning Solutions’ Curriculum


Module 18: Cisco AnyConnect VPN
Cisco AnyConnect VPN is another Cisco VPN offering for a specific
segment of the marketplace. We will dive into Cisco AnyConnect VPN and
understand its strengths and weaknesses as a VPN approach.
   • History & Future Projections
   • Technology & Standards
   • Operational Overview
        o Addressing
        o Switching
        o Routing
        o Encapsulation
        o QoS / QoE
   • Security and Privacy
   • Complexity
   • Cost
   • Compatibility
   • Performance
   • Products & Services

Module 19: Secure Shell (SSH) VPN
Secure Shell (SSH) is the secure, more fully featured version of the Telnet
terminal protocol that has come into vogue in the last decade or so. Who
thought people would us it for VPNs? Well, they are and in this section we
will explain the why and how of it.
    • History & Future Projections
    • Technology & Standards
    • Operational Overview
          o Addressing
          o Switching
          o Routing
          o Encapsulation
          o QoS / QoE
    • Security and Privacy
    • Complexity
    • Cost
    • Compatibility
    • Performance
    • Products & Services
                                                                            140
                 Applied Learning Solutions’ Curriculum


Module 20: SOAP VPNs
Originally SOAP was devised by Microsoft as a way for their enterprise
customers to get all services (email, ftp, web, etc) through firewalls by
exploiting the trust inherently given to browser-based service. In the mean
time SOAP has become a bona-fide VPN tool in use more in enterprises
than in carrier or service provider environments but an important VPN tool
about which to learn.
   • History & Future Projections
   • Technology & Standards
   • Operational Overview
          o Addressing
          o Switching
          o Routing
          o Encapsulation
          o QoS / QoE
   • Security and Privacy
   • Complexity
   • Cost
   • Compatibility
   • Performance
   • Products & Services

Exercise: VPN Selection
Learners will self-select the group in which they will participate in this
exercise. The three groups are Carrier, Service Provider and End-User. Each
group will be given a set of real world requirements, in the form of mock
Requests for Proposals, and, based upon the perspective of their group, will
propose a VPN solution that meets the prospects needs.

This is not a sales or product marketing exercise but, rather, a process to
provide valuable insights into the technical requirements of the three
primary classifications of customers for VPN products and services

                                 Conclusion




                                                                              141
                 Applied Learning Solutions’ Curriculum


      Network Architecture, Design and Traffic Engineering of
                      Multimedia Networks
Network Architecture, Design and Traffic Engineering of Multimedia
Networks provides two days of intensive, instructor-lead knowledge transfer
in a highly interactive lecture format followed by an optional full day of
network design exercises to reinforce learning from the first two days
lectures.
The course relies heavily on instructor/class interaction and lab exercises to
make sure that the learner gets the most out of this class and can apply the
material back on the job. A wireless-enabled laptop for which the learner
has administrative rights is needed for the exercises.

                                 Audience:

This course is designed for all persons designing, architecting, supporting
and planning QoS-aware multimedia wireless and wireline networks with an
emphasis on those networks based on the Internet Protocol.

                                Prerequisites

Solid understanding of circuit, cell and packet networking concepts and
protocols, broadband networking, Quality of Service (QoS) and Quality of
Experience (QoE) and at least two years experience designing and
implementing networks.

                                 Objectives:

Design multimedia networks based on IPv4, IPv6 and related protocols
Integrate Data, Voice, Video, signaling and telemetry on a single IP
infrastructure
Secure IP sessions and streams in a multi-user IP network environment
Assure that user’s achieve desired Quality of Service and Quality of
Experience goals
Migrate existing networks into multimedia unified communications systems




                                                                           142
                 Applied Learning Solutions’ Curriculum


                               Course Outline

Day 1: Traffic Engineering Concepts

Traffic Engineering Techniques
An overview of traditional circuit and non-circuit traffic engineering and a
discussion of QoS and QoE and how they impact traditional approaches.
   • Overview
   • Circuit
   • Cell
   • Packet
   • Switch/Router Issues
   • Access & Admission
   • Backbone
   • Internetworking
   • QoS/QoE Issues

Traffic Distributions & Metrics
A discussion of how traffic is distributed, how those distributions are
predicted and the important metrics for performance and modeling.
   • Busy Hour Traffic (BHT) Measurement
   • Busy Hour Call Attempts (BHCA)
   • “Best Effort” Metrics
   • Traffic Engineering Focus Points
           o Access
           o Backbone
           o Interconnection




                                                                          143
                 Applied Learning Solutions’ Curriculum


Doing The Math
Calculations that are important in circuit and packet network
environments.
   • Blocking Rates
   • Grade of Service (GoS)
   • Quality of Service (QoS)
   • The Erlangs
         o Erlang B
         o Extended Erlang B Calculation (EEB)
         o Equivalent Queue, Extended Erlang B (EQEEB)
         o Erlang C
   • Engest Calculation
   • Poisson Calculation
   • Binomial Calculation

Provisioning
Putting the traffic engineering calculations to use in provisioning different
aspects of the networks
   • Circuit/TDM
   • Cell/ATM
   • Packet/IP
   • Internetworking

Traffic Engineering Exercise
        Group and/or individual exercise engineering access and backbone
for basic enterprise network environment. Objective is to size access for
optimum QoS/QoE and price/cost trade-offs.




                                                                                144
                 Applied Learning Solutions’ Curriculum


Day 2: Applying Traffic Engineering

Multimedia
A brief description of the various traffic types on dedicated networks
followed by a deep-dive on the ramifications of combining data, voice
and video and accompanying signaling and control on a single
multimedia network.
    • Data Only
    • Voice Only
    • Video Only
    • Data and Voice
    • Data, Voice and Video
    • Signaling and Control

Services & Class of Service (CoS)
Why is traffic classification needed, how is it applied and what impact is
there on Service Level Agreements and vice-versa.
   • Service Definitions
   • Service Level Agreements (SLAs)
          o Availability
          o Packet Delivery
          o Delay
          o Delay Variation
          o Service-Specific Metrics
   • SLA Importance & Use

QoS Portfolio
Having laid the groundwork and provided a background a wide range of
existing Quality of Service mechanisms, which can be implemented singly
or in combination, are reviewed in depth.
    • Prioritization
          o IP CoS / DiffServ (Differentiated Services)
          o 802.1 p/q (LAN Switching Prioritization and VLAN)
          o Weighted Fair Queuing/Class Based Weighted
          o Fair Queueing (WFQ/CBWFQ)
          o Low Latency Queueing (LLQ/DLLQ)
          o Priority Queueing (PQ)
          o Packet Fragmentation / Segmentation
                                                                             145
             Applied Learning Solutions’ Curriculum


      o Frame Relay Priority PVCs and RTP Priority
      o ATM CoS
      o Intserv / RSVP (IP Reservation Protocol)
      o Other representative techniques
•   Bandwidth Reservation
      o Bandwidth Reservation (VoDSL)
      o TDM Bandwidth Reservation (Packet Cable)
      o RSVP
•   Route Optimization
      o MPLS / gMPLS
      o RSVP/RSVP-TE
•   Hybrid(s)
•   Quality of Experience
      o QoE vs QoS
      o The Importance of QoE
      o QoE Examples
      o QoE and SLAs
•   Multimedia Traffic Engineering Exercise
      o QoS and QoE will be optimized in a custom SLA to meet
          specific customer requirements.




                                                                146
                 Applied Learning Solutions’ Curriculum


  Emerging Communications Technologies in Law Enforcement
                   and Public Safety

Due to the dynamic nature of the topic this course is updated within days
of each delivery to be sure that it contains the most current and up-to-date
information available. This is course is delivered by individuals who work in
public safety, law enforcement and homeland security technology and
standards areas. The instructor is intimately familiar with the topic both from
a “business” and a “technical” perspective and the course is structured in a
similar manner.

The first day of the program emphasizes productivity, return on investment
and general functional descriptions while the second day focuses on
underlying technologies, changes and necessary components. Both days
are suitable for the entire audience while the first half will be of greater
interest and applicability to management and strategic, tactical and
logistical planning personnel and the second day will be of greater interest
to engineers, technicians and technologists.

                                 Objectives:

At the end of this course all attendees will be able to:
   • Explain the application of emerging technologies to law
      enforcement, public safety and homeland security
   • Sort out the wide range of emerging homeland security
      initiatives and understand their current status
   • Provide better planning and support of agencies across
      the full range of law enforcement, public safety and
      homeland security
   • Understand the US Government system for procuring
      telecommunications services.


                                                                           147
                   Applied Learning Solutions’ Curriculum


                                   Audience:

This course was designed for individuals in Information Technology,
planning, strategic, tactical and logistical roles within public safety, law
enforcement and homeland security agencies at the local, state and
national level who require visibility of upcoming communications
methodologies, systems and technologies. No security clearance is
required. All information shared during this course is in the public domain.

                                    Outline


Day 1
   •    The Big Picture
           o Civilian Technologies & Government Applications
           o Web 2.0
           o Unified Communications
           o XML
           o Wireless Communications
           o Intranets & VPNs
           o Location Based Services
   •    Government Technologies
           o Encryption
           o Secure LE Networks
           o Information Sharing Initiatives
                    FBI National Data Exchange
                    National Information Exchange Model (NIEM)
                    National Suspicious Activity Reporting System (SAR)
                    State, Tribal and UASI Fusion Centers
           o Government Emergency Telecommunications Service (GETS)
           o Wireless Priority Service (WPS)
           o “Wire Tapping” in the Packet Age

                                                                           148
              Applied Learning Solutions’ Curriculum


•   Technologies In Depth
      o Intranets & VPNs
               Intranets vs VPNs
               Encryption
               Secure LE Networks
               IPSec
      o Web 2.0 & Social Networking
               Mash-Ups
               Rich User Experience
               Architecture of Participation
               Blog/blogging
               Leveraging Collective Intelligence
               Hackability / Remixability
               Lightweight Programming Models
               Wiki
               Virtualization
               Examples: Facebook, Twitter, etc.
      o Unified Communications
               Sessions / SIP / SDP
               Presence
               Preference
               Multimedia
               Mobility
               Security
      o Telepresence
               Definition / Examples
               Gov and LE Applications




                                                       149
               Applied Learning Solutions’ Curriculum


Day 2
•   eXtensible Markup Language (XML)
        o History / Evolution
        o Structure and Usage
        o Examples
                 FBI National Data
                 Exchange (NDeX)
•   National Information Exchange Model (NIEM)
•   Wireless Communications
        o Location Based Services
        o Wireless Priority Service (WPS)
•   Next Gen 911 (911 NG)
        o Multiple Definitions
        o NENA Model
        o Technical Overview
        o Funding and Regulation
        o Migration Paths
•   Other Initiatives and Applications
        o National Suspicious Activity Reporting System (SAR)
                 Structure & Usage
                 Policies and Procedure
                 Benefits
        o State, Tribal and UASI Fusion Centers
                 Structure & Usage
                 Policies and Procedure
                 Benefits
        o Government Emergency Telecommunications Service (GETS)
                 Technology
                 Applications
                 Examples

                                                                150
              Applied Learning Solutions’ Curriculum


•   “Wire Tapping” in the Packet Age
      o Communications Assistance to Law Enforcement Act (CALEA)
      o Wireless Monitoring
•   Procurement: Networx
      o Overview
      o Procurement Vehicle
      o Structure
      o Selling to / Buying From
•   Conclusion




                                                              151
                 Applied Learning Solutions’ Curriculum


                      Network Security: IPsec 2010

                                   Overview

Network security has become as much a part of corporate DNA as Internet
Protocol. We know that security of information in motion (for instance, in
transit over a network) and at rest (on servers and computer disks) is critical.
One of the most important tools for securing information in motion is IPsec,
now in its third major version. This Applied Network Security: IPsec 2010 two
day class combines expert lecture with five hands-on laboratory exercises
to provide the learning with an insider’s knowledge of how IPsec works.
Unlike many IPsec classes, lectures, papers, books and other information
sources that tout IPsec as the ultimate solution – the be-all and end-all of
network security – this course takes the position that IPsec is one of many
tools and puts IPsec into perspective. The security portfolio is described in
terms of where IPsec fits in and where it does not and how to get a more
comprehensive security posture using the right tool for the job, whether that
tool is IPsec, something combined with IPsec or does not include IPsec at
all.

                                  Objectives
At the end of this training program the attendee will be able to:
   1. Understand the internal protocol operations of IPSec.
   2. Describe similarities and differences between IPSec and other
      security architectures.
   3. Analyze and troubleshoot call traces of IPSec call setups, tunnel
      negotiation and key distribution.
   4. Detect attempts to compromise IPSec security such as, but not
      limited to, person-in-the-middle attacks, spoofing and session
      hijacking.
   5. Determine appropriate security mechanisms and countermeasures
      for the most common types of attacks on IPSec.
   6. Discuss performance vs. security trade-offs when implementing
      systems based upon IPSec security.



                                                                             152
                Applied Learning Solutions’ Curriculum


                               Pre-Requisites
In order to get the most out of the course the attendee should have a
strong working knowledge of the IP protocol suite and an understanding of
basic security concepts such as encryption, tunneling and key
management.

                               Requirements
All students must bring a personal notebook computer on which they have
administrative rights to load and install new software.

                                 Audience
This course is suitable for all technical and semi-technical audiences
requiring a deeper understanding of network security and where IPsec fits in
and how it works, in the broader networking context.

                              Course Outline


   Introduction
   • Evolution of [Computer] Security
   • Security Dramatis Personae
          o “Alice”
          o “Bob”
          o “Eve”
          o Malory
          o Others
   Security Building Blocks
   • IP Security (IPsec).
   • Authentication, Authorization and Accounting (AAA) Security
   • Passwords
          o Multiple Factor Authentication
                     Single Factor Authentication
                     Two Factor Authentication
                     Three Factor Authentication
   • Password Authentication Protocol (PAP)
   • Hashing Functions
          o MD4
                                                                        153
                Applied Learning Solutions’ Curriculum


         o MD5
         o SHA-1
   • Challenge Handshake Authentication Protocol (CHAP)
   • Encryption
         o Keys
                   Symmetric Keys
                   Assymetric Keys
         o Encryption Example: DES

Encryption Lab: 45 minutes
View call traces of encrypted network traffic using the Encapsulating
Security Payload. Lab includes introduction to key cryptographic
techniques.
Lab Debrief: Group Discussion / 15 minutes
   • Other IPsec Crypto Options
          o DES
          o 3DES
          o AES
   • Public Key Cryptography
   • Public Key Exchange Algorithms
          o Diffie-Hellman
          o RSA
          o El Gamal
   • Perfect Forward Secrecy
   • Key Management
   • Tunnels
          o L2F
          o Generic Routing Encapsulation (GRE)
          o Point-to-Point Tunneling Protocol (PPTP)
          o Layer 2 Tunneling Protocol (L2TP)
   • Remote Access Dial-In User Security (RADIUS)
L2TPv3 Lab: 45 minutes
View setup of an L2TPv3 tunnel and logical multimedia connections within
the tunnel. Lab covers appropriate parts of PPP, L2TPv3, PAP and CHAP
protocols.
Lab Debrief: Group Discussion / 15 minutes



                                                                       154
                Applied Learning Solutions’ Curriculum


IPsec Overview
   • IPsec Architecture and Road Map
   • IPsec Modes
          o Tunnel Mode
          o Transport Mode
   • Encapsulating Security Payload (ESP)
   • Authentication Header (AH)
   • Internet Security Association and Key Management Protocol (ISAKMP)
   • IPsec Security Associations
   • Domain of Interpretation (DoI)
   • Internet Key Exchange
          o IKE Phases, or modes
                    Main Mode
                    Quick Mode.
   • Internet Key Exchange v2
   • IPsec Implementation
          o Bump In The Stack
          o Bump In The Wire
   • IPsec Policy
   • Fragmentation

Encapsulating Security Payload (ESP)
   • Encapsulating Security Payload (ESP)
          o Security Association (SA)
          o Security Parameters
          o Sequence Number
          o Payload carries user data and may include crypto
             synchronization info.
          o Padding
          o Pad length
          o Next Heafer
   • Authentication data field contains an Integrity Check Value (ICV)
ESP Lab: 45 minutes
View call traces of encrypted network traffic using the Encapsulating
Security Payload. Lab includes introduction to key cryptographic
techniques.
Lab Debrief: Group Discussion / 15 minutes


                                                                         155
                 Applied Learning Solutions’ Curriculum


Authentication Header (AH)
   • Integrity, origin authentication, and optional anti-replay
   • Next Header
   • Length
   • SPI
   • Sequence Number
   • Authentication data

AH Lab: 45 minutes
View call traces of traffic that uses the Authentication Header with and
without Encapsulating Security Payload. Lab includes hacks against and
countermeasures to ESP and AH security vulnerabilities.
Lab Debrief: Group Discussion / 15 minutes

ISA Key Management Protocol (ISAKMP) and Internet Key Exchange (IKE)
   • An in-depth look at ISAKMP and IKE

IKE/ISAKMP Lab: 45 minutes
View call traces of completed and aborted tunnel establishment and key
exchanges using IKE and ISAKMP.
Lab Debrief: Group Discussion / 15 minutes

Security Policy for IPsec
   • Policy Definition and Discussion
   • IPsec Policy Example

IOS Security
   • Secure Connectivity Technologies
   • Self-Defending Network Elements
          o Monitoring Provided by Monitoring, Analysis and Response
             System (MARS)
          o Secure IP telephony, unified messaging, IP video and
             audioconferencing
          o Secure Connectivity Technologies




                                                                           156
                 Applied Learning Solutions’ Curriculum


Structured Wireless Aware Network (SWAN) framework
    • Mobile and Nomadic Worker Support
    • WAN Alternative
           o Three Solution Elements (all use IPsec)
                     IOS Software VPN Security Routers
                     Adaptive Security Appliances (ASA)
                     Catalyst 6500 Series Switches
           o IOS VPN Security Routers
    • Easy VPN
    • Voice and Video Enabled VPN (V3PN)
    • GRE-Based VPNs
    • Dynamic Multipoint VPN (DMVPN)
    • Group Encrypted Transport (GET) VPN
    • SSL VPN




                                                          157
                    Applied Learning Solutions’ Curriculum


              Rural Telco Security Risk Assessment Program

Why we need this program                      Three day workshop

Rural Telcos, for the most part, have been    The ALS Rural Telco Security Risk
ahead of their urban counterparts in          Assessment program is a three day "crash
adopting new, advanced technologies and       course" briefing. We identify the major
offering new services to clients, but lag     threats and the people behind them in the
way behind in securing those offerings.       national security, commercial, Telco and
What many rural Telcos do not think           personal communications areas. We show
about is that security breaches and           the links between them (for example
associated liabilities do not require         personal identity theft that funds
hackers, criminals and fraudsters to          terrorism or lapses in rural Telco security
actually visit their locale. The global       that can be exploited by terrorists to
Internet provides remote electronic access    breach homeland security), their motives
to their business systems, networks,          and risk assessment.
people and customers and the same              This briefing includes three exercises to
global information superhighway that          engage learners and reinforce learning
enables unprecedented levels of               including instructions on completion of
interoperability, multimedia content and      the Applied Learning Solutions Security
ecommerce can also be exploited by            Assessment “Report Card” for Rural
criminals, terrorists, con artists and        Telcos. The Report Card allows
purveyors of kiddy porn to deliver those      executives to assess, monitor and grade
big city problems right to their rural door   their organizations in three key security
step.                                         areas: Organizational Security,
The ALS Rural Telco Security Risk             Infrastructure and Physical Security and
Assessment training program prepares          Network and IT Security. You will see
rural Telco executive management and          how you stack up against other US
their technical staff to return to their      Telcos.
company and complete a comprehensive
three part report card to determine their
own security risks and liabilities.
This important program, which has been
delivered to multinational corporations,
911 agencies, national, regional and rural
Telcos and non-profit organizations for
over a decade should be attended by both
management and technical staff as it
requires a “security culture” within an
organization to fully secure the company.

                                                                                     158
                 Applied Learning Solutions’ Curriculum

    Objectives and Outcomes

•   Broader and deeper understanding
    of security concepts and
    principles as they relate
    specifically to rural Telcos
•   Ability to assess security risks and
    liabilities
•   Skills to manage the process of
    security vulnerability assessment
    and the impact on Telco operation
•   Understand the role of Telco
    security and homeland security
•   Appreciation of the value of a
    Security Culture in rural Telcos
•   Basic understanding of security
    theory and practice
•   Ability to participate in the
    development of security practices
    and procedures
•   Understanding of multiple
    security options and their
    associated pros and cons




                                                          159
                    Applied Learning Solutions’ Curriculum

ALS Rural Telco Security Risk                      2. Targeted Attacks
Assessment Program                              B. Signals Intelligence (Sigint)
Day 1:                                              1. Radio Frequency (RF)
I. Introduction: Security Overview                  Wireless
     A Security Definition                          2. Infrared (IR) Wireless
     B. A Brief History of Computer                 3. Keyboard signals
Security                                            4. Jamming
     C. Security Objectives                         Other
        1. Secrecy/Privacy                      C. Human Intelligence (Humint)
        2. Integrity                                1.   Social Engineering
        3. Availability                             2.   Identity Theft
     D. The Three “As” of Security                  3.   Phishing
        1. Authentication                           4.   Clickjacking
        2. Authorization                        D. Electronic Intelligence (Elint)
        3. Accounting (Forensics)                  1. Malware
     E. Three Security Disciplines                     a. Virus
        1. Signals Intelligence (SigInt)               b. Worm
        2. Human Intelligence (Humit)                  c. Trojan Horse
        3. Electronic Intelligence (Elint)         2. Denial of Service (DoS)
II. The Threat Assessment Matrix                   3. Protocol Exploits
     A. Disciplines (Vertical) x                   4. Application Exploits
Objectives (Horizontal)                            5. Information at Rest
     B. Assigning Threats                          6. Information in Transit
     C. Prioritizing Threats                 V. Countermeasures
     D. Determining Countermeasures             A. Sigint
EXERCISE I: Application of Threat                  1. Shielding
Assessment Matrix                                  2. Tempest
III. Attacker Profiles and Motives                 3. User Awareness
   A. Ira Winkler’s Hacker Pyramid                 4. Training
      1. Amateurs/Script Kiddies                B. Humint
      2. Professionals                             1. Training
      3. Hacker Elite                              2. Awareness
   B. Motives                                      3. Training and Awareness
      1. Criminal/Financial                        4. Behavioral Modeling
      2. Ideological                               5. Punishment/Reward
      3. Personal/Vanity                        C. Elint
      4. Hybrids                                   1. Passwords
   C. Inside vs. Outside Threat                    2. Multi-Factor Authentication
IV. Attacker Tools and Techniques            (MFA)
   A. Two Types of Attack                          3. Firewalls
      1. Convenience Attacks                       4. Deep Packet Inspection
                                                                                     160
                     Applied Learning Solutions’ Curriculum

       5. Heuristic Analysis                       N. Intrusion Detection Systems
EXERCISE II: Attacker/Defender                         and Defense In Depth
Role Plays                                  IX. Network Services Security Tools &
                                            Techniques
Day 2                                           A. The Insider Threat
VI. Budgeting and Bang for the Buck             B. Exploiting Backdoors, Bugs, and
Analysis (BBA)                                     Loopholes
   A.   Risk Identification                     C. Packet Sniffers
   B.   Risk Assessment                         D. Social Engineering
   C.   Prioritization                          E. Reverse Social Engineering
   D.   Budgeting Approaches                    F. Trespassing, Dumpster Diving,
        1. Desired Budget
                                                   and Shoulder Surfing
        2. Allotted Budget
                                                G. Denial of Service (DoS),
     E. Bang-for-the-Buck Analysis
                                                   Smurfing, and Spam
        1. BBA
                                                H. Covert Channels and
        2. RoI
                                                   Steganography
VII. Network Security Philosophy
                                                I. Content Filtering and Stateful
   A. The Ideal Security System
                                                   Inspection
   B. Planning for Internet Security
                                                J. Filtering and Content Security
   C. Organizational Security Policy
                                                   Overview
VIII. System Security Concepts
                                                K. Privacy and Legal Issues in
       A. Encryption/Cryptography
                                                   Domestic and Global Networks
       B. Key Management Systems
                                                L. Children’s Internet Protection Act
       C. Authentication and
                                                   (CIPA) and Related Topics
           Authorization
                                                M. Types of Filtering: URL, content,
       D. Digital Certificates and Digital
                                                   heuristic, photo, ‘sounds like’, etc
           Signatures
       E. Policy-Based Security             Day 3
           Enforcement                      VII. The Security Assessment “Report
       F. Malicious Software (Malware)      Card”
       G. ISP / WISP Access Security           A. Organizational Security
       H. VPNs & VPN Access Security                 a. TELCO Security Policy
       I. Tunneling                                      Document
       J. Internet Protocol Security                 b. Security Policy Review
           (IPsec)                                       Process
       K. IP Proxy Agents / Proxy                    c. Internal Security
           Servers                                       Awareness
       L. Secure Sockets Layer (SSL) &               d. Employee Credential
           SSL VPNs                                      Verification
       M. Firewalls and Deep Packet                  e. Employee Policy
           Inspection                                    Compliance
                                                                                   161
                Applied Learning Solutions’ Curriculum

       f. Security Cooperation with     EXERCISE III: Applying the Security
           Suppliers, Contractors and   Assessment Report Card
           Clients                      VIII. Conclusion: Developing a
B. Infrastructure and Physical          Security Culture
   Security                             XXII Conclusion: Securing the Rural
       a. Physical Asset Control        Telco
       b. Facility Access Systems
       c. Back-Up Plans for Basic
           Services
       d. Computer / Network / IT
           Disaster Recovery Plan
       e. Hazardous Materials /
           Process Security
C. Network and IT Security
       a. Common Vulnerabilities
       b. Network Access
       c. Firewalls
       d. VPN Deployment,
           Tunneling/Encryption,
           IPSec and PKI
       e. Intrusion Detection
           System (IDS) Deployment
       f. Managed Security
           Monitoring (MSM)
       g. Security Impact on
           Productivity and TELCO
           Effectiveness
       h. Denial of Service /
           Distributed Denial of
           Service Attacks
       i. Hackback / Hackback
           Prevention
       j. Unauthorized Tunneling
           Protection
       k. Telephony and VoIP
           Security
       l. Email Security
       m. Wireless Security
       n. Forensics


                                                                         162
                  Applied Learning Solutions’ Curriculum


 Securing NextGen 911 and Law Enforcement, Public Safety and
             Homeland Security Communications

Throughout history government communication has always been of interest
to a wide variety of individuals and institutions: other nations, criminals, the
press and the government’s own citizens. This two day program, Securing
NextGen 911 and Law Enforcement, Public Safety and Homeland Security
Communications, will provide rich insights into the current methods of
protecting important government information both in transit across the
network and as it sits on servers in centralized and distributed data centers.

                                  Objectives

At the end of this course all attendees will be able to:
      • Understand and mitigate the majority of threats to
         government information security.
      • Identify threat sources and their motives
      • Prioritize expenditures and budgeting for security
         based upon known and knowable criteria.
      • Strengthen the security of their own organization or
         their client organization in both the cyber and
         physical realms

                                   Audience:


This course was designed for individuals in Information Technology,
planning, strategic, tactical and logistical roles within public safety, law
enforcement and homeland security agencies at the local, state and
national level who require knowledge of network and network infrastructure
security. No security clearance is required. All information shared during this
course is in the public domain.

                                                                               163
                   Applied Learning Solutions’ Curriculum


                                      Outline


Day 1
  •     Introduction: Security Overview
           o Security Definition
           o A Brief History of Computer Security
           o Security Objectives
                     Secrecy/Privacy
                     Integrity
                     Availability
           o The Three “As” of Security / Triple A Security
                     Authentication
                     Authorization
                     Accounting (Forensics)
           o Three Security Disciplines
                     Signals Intelligence (SigInt)
                     Human Intelligence (Humit)
                     Electronic Intelligence (Elint)
  •     The Threat Assessment Matrix
           o Disciplines (Vertical) x Objectives ((Horizontal)
           o Assigning Threats
           o Prioritizing Threats
           o Determining Countermeasures
  •     EXERCISE I: Application of Threat Assessment Matrix
  •     Attacker Profiles and Motives
           o Ira Winkler’s Hacker Pyramid
                     Amateurs/Script Kiddies
                     Professionals
                     Hacker Elite
           o Motives
                     Criminal/Financial
                                                                 164
              Applied Learning Solutions’ Curriculum


               Ideological
               Personal/Vanity
               Hybrids
      o Insider vs Outside Threat
•   Attacker Tools and Techniques
      o Two Types of Attack
               Convenience Attacks
               Targeted Attacks
      o Signals Intelligence (Sigint)
               Radio Frequency (RF) Wireless
               Infrared (IR) Wireless
               Keyboard signals
               Jamming
               Other
      o Human Intelligence (Humint)
               Social Engineering
               Identity Theft / Impersonation
               Phishing
               Clickjacking
      o Electronic Intelligence (Elint)
               Malware
                   •   Virus
                   •   Worm
                   •   Trojan Horse
               Denial of Service (DoS)
               Protocol Exploits
               Application Exploits
      o Information at Rest
      o Information in Transit



                                                       165
                     Applied Learning Solutions’ Curriculum


Day 2
  •     Countermeasures
           o Sigint
                      Shielding
                      Tempest
                      User Awareness
                      Training
           o Humint
                      Training
                      Awareness
                      Training and Awareness
                      Behavioral Modeling
                      Punishment/Reward
           o Elint
                      Passwords
                      Multi-Factor Authentication (MFA)
                      Firewalls
                      Deep Packet Inspection
                      Heuristic Analysis
                      Encryption
                      Tunneling
                      IPsec
  •     EXERCISE II: Attacker/Defender Role Plays
  •     Budgeting and BBA
           o Risk Identification
           o Risk Assessment
           o Prioritization
           o Budgeting Approaches
                      Desired Budget
                      Allotted Budget
           o Bang-for-the-Buck Analysis
                                                              166
              Applied Learning Solutions’ Curriculum


                 BBA
                 RoI
•   Specific Applications
       o NextGen 911
       o LE/HLS Networks, Services and Websites
       o LE/HLS Radio and Wireless Traffic
•   Conclusion: Security as a Part of the Process
•   Conclusion




                                                       167

				
DOCUMENT INFO
Shared By:
Categories:
Tags:
Stats:
views:31
posted:11/5/2011
language:English
pages:167