Thursday, March 28, 2013

Technical Writing Training

Learn how to write clear, concise, and effective technical documents such as user manuals, technical white papers, specifications and technical report


Technical Writing Course will teach you the techniques and skills to communicate and  describe complicated or technical material to end users and stakeholders. 


This course provides a framework and a process for planning, specifying, writing, and editing technical documents including technical specifications.

This course will teach you the skills you need to become a technical writer. 

Learn how to:
  • Translate complex information into easily understood language
  • Discover secrets of successful  technical writing conventions, interviewing skills, desktop publishing,  and formatting techniques.
technical writing training

Monday, March 25, 2013

Negotiation Training

Most of us, irrespective of our specialty, must negotiate. Attend Negotiation Training Workshop to learn Effective Negotiation Skills



This Negotation Training Workshop, by combining theory, practice, and games aims to improve both the participants' understanding of negotiation and their effectiveness as negotiators.

  • Customized training
  • Expert instructors
  • Negotiation games
  • Interactive style


Negotiation Training Workshop



Saturday, March 23, 2013

RF Training approved for Continuing Education Units (CEU)

Get Trained in RF Technology and Earn 13 PDH approved by Professional Engineers by PIE (Practicing Institute of Engineering, Inc.) for CEU.



RF Training Fundamentals qualifies for Continuing Education Units (CEU) and for the acceptance of Professional Development Hours (PDH) activities submitted by PE’s for Continuing Professional Competency (CPC) credit.
RF Training

Learn RF and get 13 PDF from PIE applied to CEU. RF Training Fundamentals will cover:
  • RF 101
  • RF Theory of Operation
  • RF Propagation Models and Their Uses
  • Link Budget 
  • Modulation
  • Antenna 
  • RF System Design Considerations
  • RF Safety
  • RF Regulatory 

NFC-Near-Field-Communications

What is NFC (Near Field Communications)?



NFC or Near Field Communication, is a short range wireless evolved from RFID technology that makes use of electromagnetic radio fields instead of the typical direct radio transmissions used by technologies such as Bluetooth.

 It is meant for applications where a physical touch, or close to it, is required in order to maintain security. NFC is planned for use in mobile devices for marketing, payment, in conjunction with an electronic wallet, and for setting up connections between 

NFC creates a new and universal interface to existing devices through simple touch interaction.

All NFC transactions take place within a very small area, from a touch to 4 centimeters.  

Near Field Communications (NFC)


NFC is able to replace the pairing of Bluetooth-enabled devices, or the configuration of a Wi-Fi network through PINs and keys, by simply touching the two devices to be paired or connected to the network, or by touching the device to a tag. 


Sunday, March 17, 2013

Evolution from GSM to LTE-Advanced and Voice over LTE (VoLTE)

From GSM to Voice over LTE (VoLTE)


Voice-over-LTE is a big deal for mobile operators worldwide today moving subscribers from their traditional 2G networks to their new 4G networks. Operators want to to get off of GSM and CDMA and on to LTE to increase their capacity tenfold or more for their networks.


GSM Training




Voice and messaging services for Long-Term Evolution (LTE) is happening.  Using IP Multimedia Subsystem (IMS) developed by 3GPP, end-to-end voice and SMS messaging along with Roaming and Interconnection is a reality now.


VoLTE is built upon underlying 3GPP principles including LTE and IMS. VoLTE has similar characteristics like Vonage. It is more than just Voice over IP (VoIP). The IP networks are mostly managed with MPLS or other layer 2/3 techniques.




Rather than connecting an legacy circuit switched call, VoLTE calls are transmitted over LTE EPC and IMS networks using SIP as the signaling protocol.


VoLTE can use "HD Voice" or Rich Communication Services (RCS) will merge picture and video messaging.


RCS (Rich Communication Services) will deliver high quality voice and SMS by providing them with instant messaging or chat, live video and file sharing across any mobile device, on any network.  

What is a VPN?


VPN Training Courses Powered by TONEX


A VPN, or Virtual Private Network, is a private network that uses a public network (usually the Internet) to connect remote sites or users together.

Many organizations create their own VPNs  to accommodate the needs of remote employees and distant offices.

VPN Training

Instead of using a dedicated, real-world connection, such as leased line, a VPN uses "virtual" connections routed through the Internet from the company's private network to the remote site or employee. There are two common types of VPNs: Remote-Access and Site-to-Site.




Security is one the most important aspect of the VPN you need to know. IPsec is the  traditional choice for implementing VPN security at the layer 3 of the OSI 7-layer interconnection stack. Other alternative is SSL VPN through the application layer applications such as a web browser..




Thursday, March 14, 2013

LTE, EPC & Converged Mobile Backhaul

The Magic of Converged Mobile Backhaul for LTE

 

LTE Training



 
Service providers are revamping their Backhaul strategies with the deployment of  LTE and LTE-Advanced, and with an eye on the real cost of capacity provided by Packet Microwave as one of the most cost-effective and rapid rollout solution to LTE backhaul.

Packet Microwave is the Next Generation microwave radios supporting ‘All-IP"architecture suitable for LTE and LTE-Advanced supporting:

  • Native IP transport with built-in Layer 2 Ethernet switching
  • Intelligent use of spectrum using Adaptive Coding and/or Modulation, combined with co-channel operation
  • Legacy TDM traffic supported natively (hybrid) and/or using emulation technologies such as Pseudowire (PWE)
  • Packet synchronization support (e.g., IEEE 1588v2, Synchronous Ethernet)
  • Advanced OAM (Operations, Administration, and Management) to ITU-T Y.1731,IEEE 802.1ag and IEEE 802.1ah

Example of Available Channel Size(applied to LTE)

  • 10 MHz
  • 20 MHz 
  • 100 MHZ



Modulation Format

  • QPSK
  • 16QAM
  • 64QAM
  •  256QAM



Example of Receiver Sensitivity

  •     -62 dBm (256 QAM maximum speed);
  •     -88 dBm (QPSK minimum speed)



Features

  •     ATPC (Automatic Transmit Power Control)
  •     Modulation Shifting
  •     Forward Error Correction

Mcirowave Backhaul for LTE

Wireless Backhaul for LTE and LTE-Advanced


LTE mobile network operators can  chose between microwave and fiber solutions. The benefits of microwave backhaul is more scalability and less costly. Microwave is reliable and it is a viable  backhaul solution.  LTE backhaul capacity needs are being easily addressed by packet microwave today with speed up to 1 Gbit/s.

 Microwave backhaul is not as susceptible to construction accidents.  Millimeter technology allows for high-density deployments, facilitating co-location and facility sharing. For example, 80 GHz systems can achieve multi-gigabit speeds at 5-6 mile ranges with high service availability.
  

 Why Microwave Backhaul for LTE:
  • Lower transport costs and no monthly fees 
  • Faster deployment time  
  • Higher density deployments 
  • High reliability 


LTE Training
 

LTE traffic will be dominated by data, and multimedia  applications ranging from non-real time services such as email , web browsing, peer-to-peer, video, location based services, maps,  and file sharing to real-time and delay sensitive services such as video and voice. LTE-ready microwave backhaul systems must deliver high capacity and low latency over an IP network with important features such as:

  •  QoS aware Adaptive Coding and Modulation supporting QPSK, 16QAM, 64QAM and 256QAM
  • Statistical Multiplexing
    Ethernet rings using IP/MPLS, PBT or Carrier Ethernet
  • Carrier Grade Ethernet switch as part of the Radio link up to 99.999% availability

Tuesday, March 12, 2013

True value of LTE (Long Term Evolution) Technology

Benefits of LTE



LTE (Long Term Evolution) is more spectral efficient, scalable and makes excellent usage of the spectrum.  Faster data rates, low latency, lower  transport costs and flat network architecture are other benefits.


The objective for LTE was to provide scalable high performance Radio Access Network (RAN) technology that offers nomadic, pedestrian mobility and full vehicular speed mobility.  Because of scalable bandwidth, operators will be able to easily migrate their networks and users from HSPA to LTE over time

LTE and LTE-Advanced, the latest 3GPP evolution RAN  will significantly improve network performance with peak data rates up to 300Mbps in the 20 MHz allocation scheme.


LTE Training

LTE-Advanced will introduce spectrum aggregation up to 100MHz and data rate up to 1Gbps downlink. With cell-capacity with up to 200 users per cell in 5 MHz allocation, this technology will bring great benefits to users and the operators.



Monday, March 11, 2013

RF Courses - RF Training Classes

RF Seminars, RF Training Courses, Radio Frequency Training and RF Engineering Training Courses

I remember when we started the first RF training course in 1993. I listened carefully to one of the students in the class in Palo Alto, CA. He told me what a great idea to have a RF Engineering Training Bootcamp.


We created this excellent crash course and it has been a success since then.
Many jobs require comprehensive knowledge of RF Engineering and consulting for completion of complex and advanced level assignments. RF wireless engineering for a telecommunications system needs many disciplines.

RF Training


Our RF courses will cover RF network and infrastructure planning, deployment, or optimization applied to mobile radio propagation aspects through working on  following technologies – GSM/GPRS/EDGE, CDMA/1x, UMTS, HSPA, HSPA+, EVDO, LTE, LTE Advanced, VoLTE, Microwave, SATCOM, Radar and WiFi.

Sunday, March 10, 2013

TOGAF Training - Become TOGAF Certified

TOGAF Training leads to TOGAF Certification - Why choose TONEX for your TOGAF® Training?

 

TONEX is one of the leaders in TOGAF, DoDAF, FEAF,  and Enterprise Architecture training.

TOGAF Courses are available at many levels, for those who require familiarization with the TOGAF framework.
Open Group®, is a registered trademark, and TOGAF® is a trademark of The Open Group in the US and other countries.

 TOGAF Training Courses:

  
TOGAF 8 Training, Certification Boot Camp4 days
TOGAF 9 Training – Practitioner Level 1 and 2 Training – Certification4 days
TOGAF Bridge Certification2 days
TOGAF Foundation – TOGAF 9 Foundation Level 12 days

 

 













Friday, March 8, 2013

RF Training - RF Fundamentals

Why should you learn about RF and Microwaves Communications?


RF Engineers  contribute to the RF Planning and Design of Bluetooth, Zigbee, WiFi, cellular networks, Microwave, SATCOM, and VSAT. RF Engineers contribute also to new site planning and integration, and system optimization, radio engineering evaluation for system planning and site acquisition.

RF Engineers create and use RF propagation and planning tools; conduct and oversee field tests for potential sites, plan frequency assignments and identifying technical parameters for network growth;.

Learn how to identify causes of RF interference and troubleshooting interference problems with system performance; Develop long-term build plans, perform Macro/Micro Cell Design including antenna selection and placement. Gain knowledge in GSM, CDMA, EVDO,  LTE , LTE-Advanced, WiMAX, SATCOM, VSAT, WiMAX. 

Learn how to utilize propagation tools and other RF related equipment such as Map Info, Geoplan, Datapro and Prospect for site planning, site candidate comparison, propagation and coverage review and selection, antenna type and location, determination of coverage boundaries for extensions, regulatory filings, overall sector review of cell site locations for upgrades/modifications, and traffic engineering and investigation.



Thursday, March 7, 2013

LTE in Year-End 2012 - The End Result


LTE (Long Term Evolution) is the winner of Mobile Broadband. To Learn more about LTE, take one of our LTE Training Courses



LTE and HSPA+Global Statistics Year-End 2012

•6.4 billion total cellular connections
•5.8 billion 3GPP subscriptions (90 percent market share)  (3GPP includes GSM, EDGE, HSPA, HSPA+ plus LTE)
•More than 1.2 billion HSPA-LTE mobile broadband subscriptions
•506 commercial HSPA networks in 188 countries
•291 HSPA+ networks in 123 countries
•68.3 million LTE subscriptions; up from 45.1 million LTE subscriptions at the end of 3Q 2012
•151 commercial LTE networks in 67 countries

So in 2014 there will be LTE-only phones in most of markets and expect device subsidies to decrease in the next few years.








Mobile Security Training

Why do we care about Mobile Security?

mobile security training

Most mobile devices are a target for attacks. The attackers and hackers are aware of the vulnerabilities, lack of control, mobile security policies, lack of security on mobile devices, platforms and networks. There have been a large umber of malicious software attacks in the past.

What are the Mobile Security Problems?

Number of mobile vulnerabilities are increasing and there are number of fixes for the weaknesses.
The problems can be related to unauthorized use of the mobile devices and threat to the information stored on the devices.  Password, PIN, screen locks for authentication, biometric reader to scan a fingerprint for authentication are typically the solutions available.



Other issues in mobile security are: malware through download applications, wireless (WiFi or Cellular) encryption, security software, Mobile Operating systems vulnerabilities, Security patches, mobile firewalls, unsecured WiFi network, unauthorized modifications, jailbreaking, rooting, lack of Whitelisting,  risk assessments and lack of configuration management. 

We Provide mobile device security training, mobile security training, mobile app security training and mobile hacking and penetration training.

Monday, March 4, 2013

What is Bluetooth Technology?

Attend Bluetooth Training and Learn more about Bluetooth

During the Bluetooth Training, learn about Bluetooth technology, a short range wireless communications system connecting many different types of devices, such as mobile phones, headsets, heart monitors, medical equipment and many other smart devices.

Fast Facts on Bluetooth

Unlike other wireless standards, the Bluetooth Core Specification provides product developers both link layer and application layer definitions, which support data and voice applications.

Spectrum

Bluetooth technology operates in the unlicensed industrial, scientific and medical (ISM) band at 2.4 to 2.485 GHz, using a spread spectrum, frequency hopping, full-duplex signal at a nominal rate of 1600 hops/sec. The 2.4 GHz ISM band is available and unlicensed in most countries  Interference
Bluetooth technology's adaptive frequency hopping (AFH) capability was designed to reduce interference between wireless technologies sharing the 2.4 GHz spectrum. AFH works within the spectrum to take advantage of the available frequency.

This is done by the technology detecting other devices in the spectrum and avoiding the frequencies they are using. This adaptive hopping among 79 frequencies at 1 MHz intervals gives a high degree of interference immunity and also allows for more efficient transmission within the spectrum.
For users of Bluetooth technology this hopping provides greater performance even when other technologies are being used along with Bluetooth technology.

Range

Range is application specific and although a minimum range is mandated by the Core Specification, there is not a limit and manufacturers can tune their implementation to support the use case they are enabling.
Range may vary depending on class of radio used in an implementation:
  • Class 3 radios – have a range of up to 1 meter or 3 feet
  • Class 2 radios – most commonly found in mobile devices – have a range of 10 meters or 33 feet
  • Class 1 radios – used primarily in industrial use cases – have a range of 100 meters or 300 feet

Bluetooth Power

The most commonly used radio is Class 2 and uses 2.5 mW of power. Bluetooth technology is designed to have very low power consumption. This is reinforced in the specification by allowing radios to be powered down when inactive.

The Generic Alternate MAC/PHY in Version 3.0 HS enables the discovery of remote AMPs for high speed devices and turns on the radio only when needed for data transfer giving a power optimization benefit as well as aiding in the security of the radios.

Bluetooth low energy technology, optimized for devices requiring maximum battery life instead of a high data transfer rate, consumes between 1/2 and 1/100 the power of classic Bluetooth technology.

Mobile App Training

Why should you attend Mobile App Training – Crash Course Bootcamp Style?


TONEX offers many Mobile App Development training including iOS App Development, Android App Development and HTML5 App Development.


Tonex has been providing mobile app training boot camps since 2003, specialty courses and overview classes to business and government organizations.

We are pleased to offer such a diverse arrangement of mobile app training seminars that range from simple to complex. While the list of specialty mobile app training courses is versatile, some of our most popular seminars are in the following fields:

  • Android Training - Android App Development Training Course    3 days
  • Blackberry Mobile Applications Development Training    3 days
  • Blackberry Tablet Application Development Training    4 days
  • HTML5 Training | Learn about HTML5, CSS3, Javascript and more.    4 days
  • iOS Training - iOS App Development Training    4 days
  • jQuery Mobile Training    3 days
  • Mobile App Development Training - Crash Course Bootcamp Style    4 days
  • Mobile App Hacking Training - Penetration Testing and Ethical Hacking    4 days
  • Mobile App Security Training | Mobile Applications and Device Security Training    3 days
  • Titanium Training - Building Native Apps    2 days
  • Windows Phone Development Training    3 days

Sunday, March 3, 2013

ITU releases latest global technology development figures

ITU releases latest global technology development figures

27 February, 2013

  • Global mobile penetration now over 100% in four of the world’s six regions

  • Number of mobile-cellular subscriptions approaching 7 billion

  • Mobile broadband most dynamic market, with 2.1 billion subscriptions globally


    By the end of 2013 overall mobile penetration rates will have reached 96% globally, 128% in the developed world, and 89% in developing countries.

    ITU estimates that 2.7 billion people – or 39% of the world’s population – will be using the Internet by end 2013.

    Internet access, however, will remain limited in the developing world, with only 31% of the population forecast to be online at the end of 2013, compared with 77% in the developed world. Europe will remain the world’s most connected region with 75% Internet penetration, largely outpacing Asia and the Pacific (32%) and Africa (16%).

    The report also reveals for the first time global figures on the number of women (1.3 billion) and men (1.5 billion) using the Internet.

     

    To  learn more about Telecom, attend one of our Telecom Training Courses

What is Diameter? Role of Diameter in IMS and LTE

Role of Diameter in LTE Billing and Charging: Learn more by attending our Diameter Training


Diameter is an authentication, authorization, and accounting protocol used in LTE, LTE-advanced and Voice over LTE (VoLTE). The Diameter protocol was derived from the RADIUS protocol playing the role of AAA (Authentication, Authorization, and Accounting)  protocol.

The Diameter protocol applied to LTE was inherited from IMS (IP Multimedia Subsystem) architecture for IMS entities to exchange AAA-related information. 

Diameter nodes and agents

Diameter is  a Peer-To-Peer architecture using a client-server architecture. There are four kinds of Diameter agents: Relay Agent, Proxy Agent, Redirect Agent and Translation Agent

A Relay Agent forwards a message to the appropriate destination, depending on the message. A Proxy Agent can forward and modify messages providing value-added services, policy enforcement  or perform administrative tasks for a specific realm. A Redirect Agent acts as a centralized configuration repository for other Diameter nodes. Translation Agent is a special agent in charge of  message translations.

Diameter Base Protocol by IETF is defined in RFC3588

  • RFC3588; The Diameter Base Protocol.

Telecom Mini MBA

Telecom Mini MBA is the leading executive training program for the telecoms industry with over 16 years of service



The Telecoms Mini MBA, the leading executive training program for the telecoms industry designed for telecom operators, equipment vendors, software companies, and telecom regulators in the global telecoms industry.

Telecom Mini MBA  is highly interactive, focusing on real business, technology, management, leadership and industry trends. The program is designed to transfer critical knowledge of the key telecom and business competency areas required for success within the telecommunications industry such as:

  • Global Telecom Business and Technologies
  • Strategic Management
  • Economics
  • Global Financial Markets
  • Financial Accounting
  • Marketing and Brand Management
  • Operations, Process and Business Operations
  • Sales and Negotiation
  • Technology and Information Technology (IT)
  • Strategic Human Resources (HR)
  • Business Law
  • Workshops, Business Simulation and Projects (Customized)