Advanced Search

Bluetooth in Depth

Day One   Introduction Differences between wired and wireless communications Categories of information transmission Overview of short range wireless networks Bluetooth usage models and protocol stack 2.4 GHz Signal Propagation and Range Estimation Review of decibels Link budget equation and path loss model Calculating maximum range Partition attenuation and primary ray tracing Eavesdropping vulnerabilities Multipath…

Bluetooth Technology

Introduction What is Bluetooth The role of Bluetooth Competing technologies Applications for Bluetooth Bluetooth networks (Piconets, Scatternets) Hardware How Bluetooth Works Bluetooth protocol architecture Frequency band and RF channels Frequency hopping Master/slave transmission Data rates Device addressing Access procedures Using Bluetooth Bluetooth Security Authentication Encryption Key management Trust Security modes Bluetooth Data Transport Architecture L2CAP…

Bluetooth Course: Operation, Security, Applications, Coexistence

Bluetooth Course: Operation, Security, Applications, Coexistence   Part 1:  Bluetooth Overview Bluetooth usage model and protocol stack Categories of information transmission Short range wireless features Bluetooth protocol stack: Host and controller Part 2: The Bluetooth Radio Propagation and ranging RF modeling in indoor environments Calculating maximum range Eavesdropping vulnerability Modulation and radio performance Frequency hopping…

LTE Network Planning

LTE air interface overview Air interface structure overview Air interface bit mapping Theoretical throughput calculations Exercises Services and QoS restrictions Identification of available services QoS restrictions based on 3GPP standards Traffic considerations Simulation results and simulators Most useful simulation curves Exercises Initial conditions: Operator details and requirements Setting up the initial planning case Filling up…

HSDPA

UMTS-FDD: Review of Key Concepts Bit Error rate versus Eb/N0 UMTS-FDD Error control coding versus modulation versus Eb/N0 Logical, transport, and physical channels used for data transport Retransmission strategies used in UMTS-FDD versus hard/soft decoding HSDPA Architecture HSDPA-defined transport channels HSDPA physical layer changes relative to UMTS-FDD HSDPA MAC layer changes/improvements relative to UMTS-FDD HSDPA…

Business Communication: In-Person, Written, Verbal, Internet

Introduction to Course Welcome and Introductions Course Objectives and Road Map Discussion: What Is Communication? Introduction to Communication The Sender and the Receiver Communication Barriers Defining Communication Success Stages of the Communication Process: Sender, Message, Channel, Receiver, Feedback and Context Effective Listening (the Greatest Communication Skill of All) Business Email Advanced Technology Does Not Replace…

HR Performance Metrics: Think Strategically, Build Alliances!

Introduction to Measurement and Metrics The Four Components of Metrics That Create Accountability Linking Metrics to Clients’ Business Plan Employee and labor relations metrics:  What to measure and how to use the results EEO and diversity metrics:  Don’t just measure complaints or activities but how your involvement is improving performance Workforce retention (an area for…

HF Communications

Introduction History of HF communications Terrestrial wireless communications challenges:  Attenuation, reflection, diffraction, scattering, multipath effects, interference Spectrum Basics Electromagnetic spectrum:  Bands and uses, regulation More about the HF band Spectrum issues:  Line of Sight (LOS) transmission, path loss, etc Radio Propagation Electromagnetic field Ground and surface waves:  What, when Direct waves:  Direct LOS, Fresnel theory,…

Backhaul Standards

Standards and Protocols Introduction     A high level overview of the topic and the briefing.   Standardization Landscape Metro Ethernet Forum IP / MPLS Forum   Metro Ethernet Forum MEF 22 MEF 22: Standardization Process MEF 22: Overview MEF Specifications for Mobile Backhaul Generic Specification for Ethernet backhaul Guidelines to Architecture, Equipment and RAN Operation…

Backhaul Security

Security Introduction     A high level overview of the topic and the briefing.   Security and Privacy Layer 1 Issues Physical Security POP/CO CoLo Racks / Equipment Power / HVAC Eavesdropping / Signals Intelligence Metallic Fiber Wireless / RF Wireless / Optical Layer 2 Issues Data Link Level Security Client Tunnels Carrier / Service Provider…