1. Telecommunication Basic
    • Introduction to telecom terms
    • GSM History
    • Evolution in circuit switched networks
    • Cellular concept, Specifications and terminologies
    • Why digital systems are preferred?
    • Analog System, Digital System, Trunking System
  2. Modulation Scheme
    • High frequency transmission
    • Pulse shaping filters- Raised cosine roll off filter and Gaussian filter
    • PSK, QPSK, OQPSK, DPSK, MSK,
    • GMSK Necessity
    • Analog modulation techniques
    • Digital modulation techniques
    • Criteria for selecting appropriate modulation scheme in wireless communication
    • Why GMSK is preferred in GSM?
  3. MAC
    • Introduction to MAC
    • TDMA-TDMA frame structure
    • Types of bursts(Normal, access, frequency correction, synchronization)
    • Efficiency of a frame
    • Dynamic TDMA
    • FDMA (How spectrum is utilized by operators)
    • CDMA and Live Example
    • Implementation in GSM network
  4. Fundamentals of Cellular Communication
    • Frequency reuse
    • Channel assignment strategies (Fixed and dynamic, cell breathing)
    • Capacity improvement
    • Cell sectoring, cell splitting
    • Microcell zones
    • Practical capacity improvement techniques, Capacity improvement in metros
  5. GSM Channels
    • Logical Channels
    • Channel and frame Structure
    • Speech processing
    • Speech processing in GSM
    • Power levels in mobile Station
    • GSM Public Land Mobile Network Services
    • Speech coding
    • Waveform coding
    • Frequency domain waveform coding
    • Channel coding-Convolutional codes and Block codes
    • Turbo codes, Reed Solomon codes
    • Vocoders, Speech codecs in European system, Adaptive Multiple rate Codec, Enhanced Variable Rate codec
  6. Call Flows
    • Basic call flows
    • (Post MNP)
    • Network Structure (CS)
    • Basic ISUP Call Flow
    • Post-paid subs calls Port-in or regular intra-MSC
    • Prepaid subs calls Port-in or regular intra-MSC
    • Post-paid subs calls to Local Mobile operator subscriber
    • Prepaid subs calls to Local Mobile operator subscriber
    • Post-paid subs calls other circle (NAT) Mobile subscriber
    • Prepaid subs calls other circle (NAT) Mobile subscribe
    • SMS flows.
    • Prepaid subs sends SMS, B number is
    • Regular/Port -In Intra-MSC
    • Post-paid subs sends SMS,
    • B number is Regular-foreign subscriber
    • Post-paid subs sends SMS, B number is
    • Ported-out or cross-ported
    • Prepaid subs sends SMS, B number is
  7. Teletraffic Engineering
    • Call capacity
    • Service levels
    • Traffic measurement units
    • Definition of few important terms in Teletraffic
    • Data collection
    • Office engineering considerations
    • Traffic types,
    • Blocking formulas,
    • Erlang B formula,
    • Poisson’s formula
    • Erlang C Formula,
    • Comparison of Erlang B and Poisson’s formula
    • Binomial formula, Exercise
  8. Radio Propagation and Propagation Path Loss Models
    • Ground wave Propagation
    • Free space attenuation
    • Radio wave propagation
    • Characteristic of a wireless channel
    • Multipath delay spread
    • Coherence bandwidth and coherence time
    • Signal fading statistics
    • Level crossing rate and average fade duration
    • Propagation path loss models (Okumura/Hata model, cost 231 model)
    • IMT 2000 model,
    • Exercise (Practical considerations)

button to change this text.

  1. 2G review
    • Standardization of Bodies
    • GSM frequency bands
    • Cell concepts
    • SIM & MS
    • Mobile Identities
    • GSM Subsystem
    • GSM Service area
    • GSM Network Elements
    • NMC in Mobile Network
    • Channels in GSM
  2. GPRS & EDG
    • GSM architecture
    • Advantages of Packet Switching over Circuit Switching
    • Introduction to GPRS, GPRS Features
    • GPRS Benefits & Applications
    • GPRS coding schemes
    • GPRS Architecture
    • Interfaces
    • GPRS Network Elements
  3. Principles of CDMA
    • Radio Channel Access Schemes
    • Spread Spectrum
    • RAKE Receiver
    • Power Control
    • Handovers
    • Soft Handover
    • Relocation
    • Hard handover
    • Intersystem Handovers
    • Multiuser Detection
  4. WCDMA Air Interface: Physical Layer
    • Channels
    • Logical Channels
    • Transport channels
    • Physical Channels
    • Shared Channels
    • Channel mapping
    • Spreading and Scrambling codes
    • Diversity
    • Time Diversity
    • Multipath diversity
    • Macro diversity
    • Antenna diversity
  5. WCDMA Air Interface: Protocol Stack
    • Control plane
    • MAC
    • MAC Services
    • MAC functions
    • TFC selections
    • RLC
    • RLC Services
    • RRC Functions
    • RRC protocol states
    • Location Management
  6. WCDMA-Network
    • UMTS Network Structure
    • Core Network
    • UMTS RAN
    • GSM RAN
    • Interfaces
    • Network Protocols
  1. Background of LTE
    • Introduction
    • Evolution of mobile system before LTE
      • The First 3G Standardization
    • ITU Activities
      • IMT-2000 and IMT-Advanced
      • Spectrum for IMT Systems
    • Drivers for LTE
    • Standardization of LTE
      • The Standardization Process
      • The 3GPP Process
      • The 3G Evolution to 4G
  1. High Data Rates in Mobile Communication
    • High Data Rates: FundamentalConstraints
      • High Data Rates in Noise-Limited Scenarios
      • Higher Data Rates in Interference-Limited Scenarios
    • HigherData Rates Within a Limited Bandwidth: Higher- Order Modulation
      • Higher-Order Modulation in Combination with Channel Coding
      • Variations in Instantaneous Transmit Power
    • Wider Bandwidth Including Multi-Carrier Transmission
      • Multi-Carrier Transmission
  1. OFDM Transmission
    • Basic Principles of OFDM
    • OFDM Demodulation
    • OFDM implementation using IFFT/FFT Processing
    • Cyclic-Prefix Insertion
    • Frequency-domain model of OFDM transmission
    • Channel estimation and references symbols
    • Frequency Diversity with OFDM: Importance of channel coding
    • Selection of basic OFDM Parameter
      • OFDM Subcarrier Spacing
      • Number of Subcarriers
      • Cyclic-Prefix Length
    • Variation ininstantaneous transmission Power
    • OFDM as a user-multiplexing and multiple-access scheme
    • Multi-Cell BROADCAST/MULTICAST transmission and OFDM

 

  1. Wider-Band “Single-Carrier” Transmission
    • Equalization against radio-channel frequency selectivity
      • Time-Domain Linear Equalization
      • Frequency-Domain Equalization
      • Other Equalizer Strategies
    • Uplink FDMA with Flexible bandwidth assignment
    • DFT-Spread OFDM
      • Basic Principles
      • DFTS-OFDM Receiver
      • User Multiplexing with DFTS-OFDM
      • Distributed DFTS-OFDM
  1. Multi-Antenna Techniques
    • Multi-Antenna Configuration
    • Benefits of Multi-Antenna Technique
    • Multiple Receive Antennas
    • Multiple Transmit Antennas
      • Transmit-Antenna Diversity
        • Delay Diversity
        • Cyclic-Delay Diversity
        • Diversity by Means of Space–Time Coding
        • Diversity by Means of Space–Frequency Coding
        • Transmitter-Side Beam-Forming
      • Spatial Multiplexing
        • Basic Principles
        • Precoder-Based Spatial Multiplexing
          • Nonlinear Receiver Processing
  1. Scheduling, Link Adaptation, and Hybrid ARQ
    • Link Adaptation: Power and rate control
    • Channel-Dependentscheduling
      • Downlink Scheduling
      • Uplink Scheduling
      • Link Adaptation and Channel-Dependent Scheduling in the Frequency Domain
      • Acquiring on Channel-State Information
      • Traffic Behavior and Scheduling
    • Advance retransmission Scheme
    • Hybrid ARQ with soft combining
  1. LTE Radio Access: An Overview
    • Basic Principle
      • Transmission Scheme
      • Channel-Dependent Scheduling and Rate Adaptation
      • Inter-Cell Interference Coordination
      • Hybrid ARQ with Soft Combining
      • Multi-Antenna Transmission
      • Spectrum Flexibility
    • LTE Release 9
      • Multicast and Broadcast Support
      • Positioning
      • Dual-Layer Beam-Forming
    • LTE Release10 and IMT-Advance
      • Carrier Aggregation
      • Extended Multi-Antenna Transmission
      • Relaying
      • Heterogeneous Deployments
    • Terminal Capabilities
  2. Radio-Interface Architecture
    • Overall System Architecture
      • Core Network
      • Radio-Access Network
    • Radio Protocol Architecture
      • Radio-Link Control
      • Medium-Access Control
      • Physical Layer
    • Control-Plane Protocol
      • State Machine
  1. Physical Transmission Resources
    • Overall Time–Frequency Structure
    • Normal Subframes and MBSFN Subframe.
    • Carrier Aggregation
    • Frequency-Domain Location of LTE Carriers
    • Duplex Scheme
      • Frequency-Division Duplex (FDD)
      • Time-Division Duplex (TDD)
      • LTE and TD-SCDMA Coexistence

 

  1. Downlink Physical-Layer Processing
    • Transport-Channel Processing
      • Processing Steps
      • Localized and Distributed Resource Mapping
    • Downlink Reference Signals
      • Cell-Specific Reference Signals
      • Demodulation Reference Signals
      • CSI Reference Signals
    • Multi-Antenna Transmission
      • Transmit Diversity
      • Codebook-Based Precoding
        • Closed-Loop Operation
        • Open-Loop Operation
      • Non-Codebook-Based Precoding
      • Downlink Multi-User MIMO
        • MU-MIMO within Transmission Modes 8/9
        • MU-MIMO Based on CRS
      • Downlink L1/L2 Control Signaling
        • Physical Control Format Indicator Channel
        • Physical Hybrid-ARQ Indicator Channel
        • Physical Downlink Control Channel
        • Downlink Scheduling Assignment
        • Uplink Scheduling Grants
        • Carrier Aggregation and Cross-Carrier Scheduling
        • Power-Control Commands
        • PDCCH Processing
        • Blind Decoding of PDCCHs
  1. Uplink Physical-Layer Processing
    • Transport-Channel Processing
      • Processing Steps
      • PUSCH Frequency Hopping
      • PUSCH Frequency Hopping
      • UPLINK REFERENCE SIGNALS
      • Uplink Demodulation Reference Signals
      • Uplink Sounding Reference Signals
    • Uplink Multi-AntennaTransmission
      • Precoder-Based Multi-Antenna Transmission for PUSCH
      • Uplink Multi-User MIMO
      • PUCCH Transmit Diversity
    • Uplink L1/L2 Control Signaling
      • Uplink L1/L2 Control Signaling on PUCCH
      • Uplink L1/L2 Control Signaling on PUSCH
    • Uplink Timing Alignment
  2. Retransmission Protocols
    • Hybrid ARQ with soft Combining
      • Downlink Hybrid ARQ
      • Uplink Hybrid ARQ
      • Hybrid-ARQ Timing
    • Radio-Link Control
      • Segmentation, Concatenation, and Reassembly of RLC SDUs
      • RLC Retransmission
      • In-Sequence Delivery
      • RLC Operation
  1. Power Control, Scheduling, and Interference Handling
    • Uplink Power Control
    • Scheduling and Rate Adaptation
      • Downlink Scheduling
      • Uplink Scheduling
      • Semi-Persistent Scheduling
      • Scheduling for Half-Duplex FDD
      • Channel-State Reporting
      • Discontinuous Reception  (DRX)  and  Component CarrierDeactivation
    • Inter-Cell Interference Coordination
    • Heterogeneous network Deployments
  2. Access Procedures
    • Acquisition and Cell Search
    • System Information
    • Random Access
      • Step 1: Random-Access Preamble Transmission
      • Step 2: Random-Access Response
      • Step 3: Terminal Identification
      • Step 4: Contention Resolution
    • PAGING
  3. Multimedia Broadcast/Multicast Services
    • Architecture
    • Overall Channel Structure and Physical-Layer Processing
    • Scheduling of MBMS Services

 

  1. Relaying
    • Relays in LTE
    • Overall Architecture
    • Backhaul Design for Relaying
  2. Spectrum and RF Characteristics
    • Spectrum For LTE
    • Flexible Spectrum Use
    • Flexible Channel Bandwidth Operation
    • Carrier Aggregation For LTE
    • Multi-Standard Radio Base Stations
    • Overview of RF Requirements for LTE
    • Output Power Level Requirements
      • Base-Station Output Power and Dynamic Range
      • UE Output Power and Dynamic Range
    • Transmitted Signal Quality
    • Unwanted Emission Requirements
    • Sensitivity andDynamic Range
    • Receiver Susceptibility to Interfering Signals
  3. Performance
    • Performance Assessment
    • Performance in Terms of Peak Data Rates and Latency
    • Performance Evaluation of LTE-Advance
    • Conclusion
  4. Other Wireless Communications Systems
    • HSPA
    • GSM/EDGE
    • CDMA2000 AND HRPD/1x EV-DO
    • IEEE 802.16E, Mobile WiMAX AND 802.16 m
    • Summary
  5. Final Thoughts
    • Where to go in the Future?
      • Advanced Multi-Cell Coordination
      • Network Energy Efficiency
      • Machine-Type Communication
      • New ways of Using Spectrum
      • Direct Device-to-Device Communication
    • Concluding Remarks
  1. Operation of IP Data Networks
    • Recognize the purpose and functions of various network devices such as routers, switches, bridges and hubs
    • Select the components required to meet a given network specification
    • Identify common applications and their impact on the network
    • Describe the purpose and basic operation of the protocols in the OSI and TCP/IP models
    • Predict the data flow between two hosts across a network
    • Identify the appropriate media, cables, ports, and connectors to connect Cisco network devices to other network devices and hosts in a LAN
  2. LAN Switching Technologies
    • Determine the technology and media access control method for Ethernet networks
    • Identify basic switching concepts and the operation of Cisco switches
      • Collision domains
      • Broadcast domains
      • Ways to switch
      • Store
      • Forward
      • Cut through
      • CAM Table
    • Configure and verify initial switch configuration including remote access management
      • Hostname
      • IP default-gateway
      • local user and password
      • Enable secret password
      • console and VTY logins
      • exec-timeout
      • service password encryption
      • copy run start
    • Verify network status and switch operation using basic utilities such as
      • Ping
      • telnet
      • SSH
    • Describe how VLANs create logically separate networks and the need for routing between them
    • Explain network segmentation and basic traffic management concepts
      • Configure and verify VLANs
      • Configure and verify trunking on Cisco switches
      • DTP (topic)
      • Auto-negotiation
  1. IP Addressing (IPv4/IPv6)
    • Describe the operation and necessity of using private and public IP addresses for IPv4 addressing.
    • Identify the appropriate IPv6 addressing scheme to satisfy addressing requirements in a LAN/WAN environment.
    • Identify the appropriate IPv4 addressing scheme using VLSM and summarization to satisfy addressing requirements in a LAN/WAN environment
    • Describe the technological requirements for running IPv6 in conjunction with IPv4
      • Dual stack
    • Describe IPv6 addresses
      • Global unicast
      • Multicast
      • Link local
      • Unique local
      • EUI 64
      • Auto-configuration
  1. IP Routing Technologies
    • Describe basic routing concepts
      • Packet forwarding
      • Router lookup process
      • Process Switching/Fast Switching/CEF
    • Configure and verify utilizing the CLI to set basic Router configuration.
      • Hostname
      • Local user & password
      • Enable secret password
      • Console & VTY logins
      • exec-timeout
      • Service password encryption
      • Interface IP Address
      • Loopback
      • Banner
      • copy run start
    • Configure and verify operation status of an Ethernet interface.

Verify router configuration and network connectivity using

  • Ping
    • Extended ping
  • Traceroute
  • Telnet
  • SSH
  • Show cdp neighbors
  • Configure and verify routing configuration for a static or default route given specific routing requirements
  • Differentiate methods of routing and routing protocols
    • Static vs. dynamic
    • Link state vs. distance vector
    • Next hop
    • IP routing table
    • Passive interfaces (how they work)
    • Configure and verify OSPF (single area)
    • Benefit of single area
    • Configure OSPv2 in a single area
    • Configure OSPv3 in a single area
    • Router ID
    • Passive interface
  • Configure and verify inter VLAN routing (router on a stick)
    • Sub interfaces
    • Upstream routing
    • Encapsulation
    • Configure SVI interfaces
  1. IP Services
    • Configure and verify DHCP (IOS router)
      • Configuring router interfaces to use DHCP
      • DHCP options (Basic overview and functionality)
      • Excluded addresses
      • Lease time
    • Describe the types, features, and applications of ACLs
      • Standard (editing and sequence numbers)
      • Extended
      • Named
      • Numbered
      • Log option
    • Configure and verify ACLs in a network environment
      • Named
      • Numbered
      • Log option
    • Identify the basic operation of NAT
      • Purpose
      • Pool
      • Static
      • 1 to 1
      • Overloading
      • Source addressing
      • One-way NAT
    • Configure and verify NAT for given network requirements
    • Configure and verify NTP as a client
  2. Network Device Security
    • Configure and verify network device security features
      • Device password security
      • Enable secret vs. enable
        • Disable telnet
        • SSH
          • VTYs
          • Physical security
          • Service password
          • Describe external authentication methods
        • Configure and verify switch port security
        • Configure and verify ACLs to filter network traffic
        • Configure and verify ACLs to limit telnet and SSH access to the router
      • Troubleshooting
        • Troubleshoot and correct common problems associated with IP addressing and host configurations
        • Troubleshoot and resolve VLAN problems
          • Identify that VLANs are configured
          • Verify port membership is correct
          • Correct IP address is configured
        • Troubleshoot and resolve trunking problems on Cisco switches
          • Verify correct trunk states
          • Verify correct encapsulation is configured
          • Correct VLANs are allowed
        • Troubleshoot and resolve ACL issues
          • Verify statistics
          • Verify permitted networks
          • Verify direction
            • Interface
          • Troubleshoot and resolve Layer 1 problems
            • Framing
            • CRC
            • Runts
            • Giants
            • Dropped Packets
            • Late Collisions
            • Input/output errors
  1. LAN Switching Technologies
    • Identify enhanced switching technologies
      • RSTP
        • PVSTP
      • Ether Channels
    • Configure and verify PVSTP operation
  2. IP Routing Technologies
    • Describe the boot process of Cisco IOS routers
    • Configure and verify the operation status of a serial interface
    • Manage Cisco IOS files
      • Boot Preferences
      • Cisco IOS Images (15)
      • Licensing
        • Show license
        • Change license
      • Differentiate methods of routing and routing protocols
        • Administrative distance
        • Split horizon
        • Metric
        • Next hop
      • 2015Configure and verify OSPF (multi-area)

Neighbor adjacencies

  • OSPF states
  • Configure OSPv2
  • Configure OSPv3
  • Router ID
  • Understand LSA types and purpose
  • Configure and verify EIGRP (single AS)
    • Feasible distance/feasible successors/administrative distance
    • Feasibility condition
    • Metric composition
    • Router ID
    • auto summary
    • Path Selection
    • Load Balancing
      • Unequal
      • Equal
    • Passive Interface
  1. IP Services
    • Recognize high availability (FHRP)
      • VRRP
      • HSRP
      • GLBP
    • Configure and verify syslog
      • Utilize syslog output
    • Describe SNMP v2 and v3
  2. Troubleshooting
    • Identify and correct common network problems
    • Utilize net flow data
    • Troubleshoot and resolve spanning tree operation issues
      • Verify root switch
      • Verify priority
      • Verify mode is correct
      • Verify port states
    • Troubleshoot and resolve routing issues
      • Verify routing is enabled (extensible and Hierarchical Interaction Protocol (SHIP))
      • Verify routing table is correct
      • Verify correct path selection
    • Troubleshoot and resolve OSPF problems
    • Verify neighbor adjacencies
      • Verify hello and dead timers
      • Verify OSPF area
      • Verify interface MTU
      • Verify network types
      • Verify neighbor states
      • Review OSPF topology table
    • Troubleshoot and resolve EIGRP problems
      • Verify neighbor adjacencies
      • Verify AS number
      • Verify load balancing
      • Verify split horizon
    • Troubleshoot and resolve inter VLAN routing problems
      • Verify connectivity
      • Verify encapsulation
      • Verify subnet
      • Verify native VLAN
      • Port mode trunk status
    • Troubleshoot and resolve WAN implementation issues
      • serial interfaces
        • Frame relay
        • PPP
      • Monitor Net Flow statistics
      • 10 TS Ether Channel problems
  1. WAN Technologies
    • Identify different WAN Technologies
      • Metro Ethernet
      • VSAT
      • Cellular 3g/4g
      • MPLS
      • T1/E1
      • ISDN
      • DSL
      • Frame relay
      • Cable
      • VPn
    • Configure and verify a basic WAN serial connection
    • Configure and verify a PPP connection between Cisco routers
    • Configure and verify Frame Relay on Cisco routers

Implement and troubleshoot

    1. Common Security Threats
      • Describe common security threats
        • Common threats to the physical installation
        • Mitigation methods for common network attacks
        • Email-based threats
        • Web-based attacks
        • Mitigation methods for Worm, Virus, and Trojan Horse attacks
        • Phases of a secure network lifecycle
        • Security needs of a typical enterprise with a comprehensive security policy
        • Mobile/remote security
        • DLP
    1. Security and Cisco Routers
      • Implement security on Cisco routers
        • CCP Security Audit feature
        • CCP One-Step Lockdown feature
        • Secure router access using strong encrypted passwords, and using IOS login enhancements, IPV6 security.
        • Multiple privilege levels
        • Role-based CLI
        • Cisco IOS image and configuration files
      • Describe securing the control, data and management plane
      • Describe CSM
      • Describe IPv4 to IPv6 transition
        • Reasons for IPv6
        • Understanding IPv6 addressing
        • Assigning IPv6 addresses
        • Routing considerations for IPv6
    1. AAA on Cisco Devices
      • Implement authentication, authorization, and accounting (AAA)
        • AAA using CCP on routers
        • AAA using CLI on routers and switches
        • AAA on ASA
      • Describe TACACS+
      • Describe RADIUS
      • Describe AAA
        • Authentication
        • Authorization
        • Accounting
      • Verify AAA functionality.
    2. IOS ACLs
      • Describe standard, extended, and named IP IOS ACLs to filter packets
        • IPv4
        • IPv6
        • Object groups
        • ACL operations
        • Types of ACLs (dynamic, reflexive, time-based ACLs)
        • ACL wild card masking
        • Standard ACLs
        • Extended ACLs
        • Named ACLs
        • VLSM
      • Describe considerations when building ACLs
        • Sequencing of ACEs
        • Modification of ACEs
      • Implement IP ACLs to mitigate threats in a network
        • Filter IP traffic
        • SNMP
        • DDoS attacks
        • CLI
        • CCP
        • IP ACLs to prevent IP spoofing
        • VACLs
    1. Secure Network Management and Reporting
      • Describe secure network management
        • In-band
        • Out of band
        • Management protocols
        • Management enclave
        • Management plane
      • Implement secure network management
        • SSH
        • Syslog
        • SNMP
        • NTP
        • SCP
        • CLI
        • CCP
        • SSL
    1. Common Layer 2 Attacks
      • Describe Layer 2 security using Cisco switches
        • STP attacks
        • ARP spoofing
        • MAC spoofing
        • CAM overflows
        • CDP/LLDP
      • Describe VLAN Security
        • Voice VLAN
        • PVLAN
        • VLAN hopping
        • Native VLAN
      • Implement VLANs and trunking
        • VLAN definition
        • Grouping functions into VLANs
        • Considering traffic source to destination paths
        • Trunking
        • Native VLAN
        • VLAN trunking protocols
        • Inter-VLAN routing
      • Implement Spanning Tree
        • Potential issues with redundant switch topologies
        • STP operations
        • Resolving issues with STP
    1. Cisco Firewall Technologies
      • Describe operational strengths and weaknesses of the different firewall technologies
        • Proxy firewalls
        • Packet and stateful packet
        • Application firewall
        • Personal firewall
      • Describe stateful firewalls
        • Operations
        • Function of the state table
      • Describe the types of NAT used in firewall technologies
        • Static
        • Dynamic
        • PAT
      • Implement Zone Based Firewall using CCP
        • Zone to zone
        • Self-zone
      • Implement the Cisco Adaptive Security Appliance (ASA)
        • NAT
        • ACL
        • Default MPF
        • Cisco ASA sec level
      • Implement NAT and PAT
        • Functions of NAT, PAT, and NAT Overload
        • Translating inside source addresses
        • Overloading Inside global addresses
    1. Cisco IPS
      • Describe IPS deployment considerations
        • SPAN
        • IPS product portfolio
        • Placement
        • Caveats
      • Describe IPS technologies
        • Attack responses
        • Monitoring options
        • Syslog
        • SDEE
        • Signature engines
        • Signatures
        • Global correlation and SIO
        • Network-based
        • Host-based
      • Configure Cisco IOS IPS using CCP
        • Logging
        • Signatures
    1. VPN Technologies
      • Describe the different methods used in cryptography
        • Symmetric
        • Asymmetric
        • HMAC
        • Message digest
        • PKI
      • Describe VPN technologies
        • IPsec
        • SSL
      • Describe the building blocks of IPSec
        • IKE
        • ESP
        • AH
        • Tunnel mode
        • Transport mode
      • Implement an IOS IPSec site-to-site VPN with pre-shared key authentication
        • CCP
        • CLI
      • Verify VPN operations.
      • Implement SSL VPN using ASA device manager
        • Clientless
        • AnyConnect

button to change this text.

    1. Layer 2 Technologies
      • Configure and verify switch administration
        • SDM templates
        • Managing MAC address table
        • Troubleshoot Err-disable recovery
      • Configure and verify Layer 2 protocols
        • CDP, LLDP
        • UDLD
      • Configure and verify VLANs
        • Access ports
        • VLAN database
        • Normal, extended VLAN, voice VLAN
      • Configure and verify trunking
        • VTPv1, VTPv2, VTPv3, VTP pruning
        • dot1Q
        • Native VLAN
        • Manual pruning
      • Configure and verify Ether-Channels
        • LACP, PAgP, manual
        • Layer 2, Layer 3
        • Load balancing
        • Ether-Channel misconfiguration guard
      • Configure and verify spanning tree
        • PVST+, RPVST+, MST
        • Switch priority, port priority, path cost, STP timers
        • Port Fast, BPDU guard, BPDU filter
        • Loop guard and Root guard
      • Configure and verify other LAN switching technologies
        • SPAN, RSPAN
      • Describe chassis virtualization and aggregation technologies
        • Stack wise
    1. Infrastructure Security
      • Configure and verify switch security features
        • DHCP snooping
        • IP Source Guard
        • Dynamic ARP inspection
        • Port security
        • Private VLAN
        • Storm control
      • Describe device security using Cisco IOS AAA with TACACS+ and RADIUS
        • AAA with TACACS+ and RADIUS
        • Local privilege authorization fallback
    1. Infrastructure Services
      • Configure and verify first-hop redundancy protocols
        • HSRP
        • VRRP
        • GLBP
    1. Telecommunication Basic
      • Introduction to telecom terms
      • GSM History
      • Evolution in circuit switched networks
      • Cellular concept, Specifications and terminologies
      • Why digital systems are preferred?
      • Analog System, Digital System, Trunking System
    2. Modulation Scheme
      • High frequency transmission
      • Pulse shaping filters- Raised cosine roll off filter and Gaussian filter
      • PSK, QPSK, OQPSK, DPSK, MSK,
      • GMSK Necessity
      • Analog modulation techniques
      • Digital modulation techniques
      • Criteria for selecting appropriate modulation scheme in wireless communication
      • Why GMSK is preferred in GSM?
    3. MAC
      • Introduction to MAC
      • TDMA-TDMA frame structure
      • Types of bursts(Normal, access, frequency correction, synchronization)
      • Efficiency of a frame
      • Dynamic TDMA
      • FDMA (How spectrum is utilized by operators)
      • CDMA and Live Example
      • Implementation in GSM network
    4. Fundamentals of Cellular Communication
      • Frequency reuse
      • Channel assignment strategies (Fixed and dynamic, cell breathing)
      • Capacity improvement
      • Cell sectoring, cell splitting
      • Microcell zones
      • Practical capacity improvement techniques, Capacity improvement in metros
    5. GSM Channels
      • Logical Channels
      • Channel and frame Structure
      • Speech processing
      • Speech processing in GSM
      • Power levels in mobile Station
      • GSM Public Land Mobile Network Services
      • Speech coding
      • Waveform coding
      • Frequency domain waveform coding
      • Channel coding-Convolutional codes and Block codes
      • Turbo codes, Reed Solomon codes
      • Vocoders, Speech codecs in European system, Adaptive Multiple rate Codec, Enhanced Variable Rate codec
    6. Call Flows
      • Basic call flows
      • (Post MNP)
      • Network Structure (CS)
      • Basic ISUP Call Flow
      • Post-paid subs calls Port-in or regular intra-MSC
      • Prepaid subs calls Port-in or regular intra-MSC
      • Post-paid subs calls to Local Mobile operator subscriber
      • Prepaid subs calls to Local Mobile operator subscriber
      • Post-paid subs calls other circle (NAT) Mobile subscriber
      • Prepaid subs calls other circle (NAT) Mobile subscribe
      • SMS flows.
      • Prepaid subs sends SMS, B number is
      • Regular/Port -In Intra-MSC
      • Post-paid subs sends SMS,
      • B number is Regular-foreign subscriber
      • Post-paid subs sends SMS, B number is
      • Ported-out or cross-ported
      • Prepaid subs sends SMS, B number is
    7. Teletraffic Engineering
      • Call capacity
      • Service levels
      • Traffic measurement units
      • Definition of few important terms in Teletraffic
      • Data collection
      • Office engineering considerations
      • Traffic types,
      • Blocking formulas,
      • Erlang B formula,
      • Poisson’s formula
      • Erlang C Formula,
      • Comparison of Erlang B and Poisson’s formula
      • Binomial formula, Exercise
    8. Radio Propagation and Propagation Path Loss Models
      • Ground wave Propagation
      • Free space attenuation
      • Radio wave propagation
      • Characteristic of a wireless channel
      • Multipath delay spread
      • Coherence bandwidth and coherence time
      • Signal fading statistics
      • Level crossing rate and average fade duration
      • Propagation path loss models (Okumura/Hata model, cost 231 model)
      • IMT 2000 model,
      • Exercise (Practical considerations)

    button to change this text.

    1. Introduction to EMF
      • What is EMF
      • Why do we take EMF Measurement?
      • Aim of EMF measurement
    2. EMF Exposure Zone
      • Definition of exposure
      • What are the levels of EMF exposure & zones
      • Compliance zone
      • Occupational zone
      • Exceedance zone
    3. EMF Evaluation Technique
      • calculation method
      • broadband measurement method
    4. How to make EMF Measurement Reports
      • d1 sheet
      • d2 sheet
      • Panoramic photos
      • Safety sinages
      • Layout
    5. Broadband Measurement Method
      • Site data
      • Site overview
      • Technical parameter
      • Adjacent building data
      • Compliance by measurement
    6. Term Cell Audit
      • Guidelines of department of telecommunication.
      • Up gradation of other operators
      • Self upgradation
      • New upgradation
    7. RF SERVEY
      • Overview of sites and sectors.
      • Why do we do RF survey in telecom?
      • Drive test
      • Details of antennas (RTT, RTP, Wall mount)
      • Antenna tilting
      • Line of sight
      • Technical site survey report(TSSR)
    8. Test Instruments Required in EMF
      • Narda Introduction
      • Safety mode
      • Power spectrum Analysis
      • Level Recorder
    1. Basic MPLS Concepts
      • MPLS Architecture
      • MPLS Terminology
      • MPLS Labels
      • Label Switch Routers
      • LFIB and Outgoing Labels
      • MPLS and BGP
      • Label Distribution Protocols
    2. L3VPN Components
      • Signalling (MPBGP)
      • VRF, RD & Route Targets
      • PE – CE Routing
    3. L3VPN Core
      • Routing within the core with MPLS
      • MPLS BGP Design
      • VPNv4 Addressing
      • Support for existing Internet Routing
      • MPBGP update packets
      • Extended Communities
      • VPN Label Propagation
      • VPN Packet Forwarding in the core
      • Label Stack
      • Label PHP
    4. MPLS VPN Mechanisms
      • Virtual Routing and Forwarding Tables
      • Routing Protocol Contexts
      • VPN Aware Routing Protocols
      • VRF Table
      • Route Propagation – Outbound for BGP and Non BGP Protocols
      • Route Propagation – Inbound for BGP and Non BGP Protocols
    5. Address Translation
      • Scenarios
      • NAT-src
      • NAT-dst
      • VIP Addresses
      • MIP Addresses
      • Address Translation
    6. VRF Configuration
      • Creating VRF’s
      • Assigning RD’s
      • Import and Export Route Targets
      • Assigning the VRF to an Interface
    7. MP-IBGP Configuration
      • Configuring BGP Address Families
      • Configuring MP-IBGP between PE routers
      • MP-BGP Community Propagation
      • Disabling IPv4 Route Exchange
      • Configuring Route Reflectors
    8. BGP as the PE-CE Routing Protocol
      • Benefits of BGP as the PE-CE protocol
      • Configuring per-VRF BGP Routing Context
      • Limiting the Number of Routes in a VRF
      • Limiting the Number of Prefixes received from a BGP neighbor
      • AS-Override
      • Hub and Spoke in MPLS VPN
      • Allow AS-IN
      • Site of Origin (SOO) for Loop Prevention
      • Selective Import
      • Selective Export
    9. OSPF as the PE-CE Routing Protocol
      • OSPF Hierarchical Model
      • OPSF in a MPLS VPN Routing Model
      • OSPF Superbackbone
      • New BGP Extended Communities
      • Configuring PE-CE OSPF Routing
      • OSPF Down bit for Loop Prevention
      • OSPF Tag Field for Interdomain Loop Prevention
      • OSPF same and different Process ID’s
      • OSPF Sham Link
    10. Other PE-CE Routing
      • Configuring Static PE-CE Routing
      • Configuring RIPv2 PE-CE Routing
      • Configuring EIGRP PE-CE Routing
    1. Managed Services
      • NAT at the CE
      • NAT at the PE
      • Centralized NAT
      • Managed CE
      • PE-CE Link Monitoring
      • Internet Access through the VPN – Double Tagging
      • Internet Access through IPv4 BGP – Single Tagging
      • Route Servers for Enterprise peering with multiple SP’s
      • Intranet using MPLS
      • Extranet using MPLS
      • Hub & Spoke with Firewall
      • Nat & Managed Services
      • Internet Access using MPLS
      • Remote Access using MPLS
      • Route Servers
    2. OSPF as the PE-CE Routing Protocol
      • OSPF Hierarchical Model
      • OPSF in a MPLS VPN Routing Model
      • OSPF Superbackbone
      • New BGP Extended Communities
      • Configuring PE-CE OSPF Routing
      • OSPF Down bit for Loop Prevention
      • OSPF Tag Field for Interdomain Loop Prevention
      • OSPF same and different Process ID’s
      • OSPF Sham Link
    3. Inter-AS
      • Inter-AS Deployment Scenarios
      • Back to Back VRF’s
      • MP-EBGP for VPNv4
      • Multi-Hop EBGP between Route Reflectors
      • Non-VPN Transit Provider
    4. CsC – Carrier Supporting Carrier
      • CsC Deployment Scenarios
      • Enabling MPLS n the PE-CE Interface
      • Customer ISP not running MPLS
      • Customer ISP running MPLS
      • Customer ISP running MPLS-VPN – Hierarchical VPN
    1. MPLS – Traffic Engineering
      • Need for MPLS – TE
      • MPLS – TE Overview
      • Information Distribution for TE
      • Requirements for the IGP
      • OSPF Extensions for TE
      • IS-IS Extensions for TE
      • Flooding by the IGP
      • Maximum Reservable Bandwidth
      • Attribute Flags
      • TE Metric
      • Path Calculation
      • Path Setup Option
      • IP Explicit Address Exclusion
      • Setup and Holding Priority
      • Reoptimization
      • PCALC
      • Path Setup
      • RSVP and Labels
      • Record Route Object
      • Other Information carried by RSVP
      • RSVP Messages
      • Forwarding Traffic down the Tunnels
      • Static Routing
      • Policy Routing
      • Auto route Announce
      • TE Tunnels between PE Routers
      • TE Tunnels between P routers
      • FRR Link Protection
      • FRR Node Protection
    2. MPLS QoS
      • Diffserv with IP packets
      • Diffserv with MPLS packets
      • Default MPLS QoSBehaviour
      • DiffservTunnelling Models
      • Pipe Model
      • Short Pipe Model
      • Uniform Model
      • Advantages of DiffservTunnelling Models
      • DiffservTunnelling Models Implementation
      • Recolouring the EXP field
    3. Multicast VPN
      • MVPN Overview
      • MVNP Benefits
      • MVPN Terminology
      • Multicast Distribution Tree – MDT
      • The Default MDT
      • The Data MDT
      • MVPN Implementation
    4. L2VPN
      • L2VPN Introduction
      • PWE3 – Pseudowire
      • OSPF Superbackbone
      • Layer 2 Tunnelling Options
      • IETF Models for L2VPN
      • Introduction to AToM
      • EoMPLS
      • FRoMPLS
      • MPLS AToM Case Studies Like to Like
      • MPLS AToM Case Studies Any to Any
  1. Module 1: Basics of SDH and PDH
    • What is SDH?
    • SDH is a timing hierarchy
    • Hierarchical synchronization
    • SDH System
    • Terminal Equipment
    • Regenerator
    • Add/Drop Multiplexer Plesiochronous Digital Hierarchy (PDH)
    • Difference between PDH & SDH
    • SDH Standards.

    Module 2: SDH Architecture

    • TX END
    • RX END
    • STM-1 Frame Format
    • STM-N Frame Format
    • Frame Format

    Module 3: SDH Mapping

    • Container
    • Virtual Container
    • Tributary Unit
    • Tributary Unit Group
    • Administrative Unit
    • Administrative Unit Group
    • STM-N Frame.

    Module 4: SDH Multiplexing

    • SDH Layers
    • SDH Formats and Procedures
    • SDH Frame Structures
    • Advantages

    Module 5: Equipment Alarms

    • Card Failed
    • Card Missing
    • Card Mismatch
    • Derived voltage overload [PSU Related]
    • Derived voltage under load
    • Input voltage high on PSU
    • Input voltage low on PSU
    • DCN Failure [Software & Memory Related]
    • Disk 90 per cent full
    • LAN port down
    • Memory usage exceeded

    Module 6: Equipment Alarms (Power Supply)

    • Input voltage high on PSU
    • Input voltage low on PSU
    • DCN Failure [Software & Memory Related]
    • Fan failed [Temperature Related]
    • External alarm occurred [External Alarm]
    • SDH objects
    • Nomenclature
    • Downstream & Upstream
    • Alarm Understanding Rules
    • RS Alarms, MS Alarms & HP / LP Alarms
    • Description of Alarms
    • Masking of Alarms
    • Secondary Suppressed Alarms (SSA)
    • Alarm Propagation Examples