+92-51-2855986-8 info@realsolutions.com.pk
 
 
 
 
  About Real Solution
  Download Brochure
  Our Services
 
 
 
 

OUR EXPERTISE & DESIGNED PROFESSIONAL COURSES

TELECOMMUNICATIONS FOR NON-ENGINEERS


This course provides an introduction to the landscape and fundamental technologies of the telecommunications marketplace. Designed with the non-technical professional in mind, this course provides day-to-day examples of the intricacies and competitive landscape of the industry.
Most importantly, telecom fundamentals for non-engineers provide crucial insights into fast-changing and dynamic competitive landscape, regulations and impact of new technologies.

TELECOMMUNICATIONS FUNDAMENTALS LEVEL - I

An overview of the telecom industry, buzzwords., technologies, concepts, and trends. Explore the telecom landscape from standards and protocols to premise, access, and transport and convergence technologies. Students will understand telecom protocols, basic telephony, premises technologies, access and transport technologies, voice and data convergence, Voice over IP (VoIP), Softswitch, wireless and optical networking.

OBJECTIVES
After successfully completing this course the attendees will:
• Understand the communications industry structure, how it is changing, and how it affects competition
• Comprehend the basics of voice and data communications technologies
• Understand the differences between analog and digital transmission
• Understand the components of voice networks
• Understand private voice and data network design alternatives
• Understand basics of voice traffic engineering
• Understand the basics of local and wide area networks (LANs, WANs)
• Understand technologies such as frame relay, ATM, Ethernet and TCP/IP
• Understand xDSL, cable modems, and wireless technologies
• Understand what is happening in voice/data/multimedia convergence
• Understand voice over IP, cable, DSL, Frame Relay, and ATM
• Explore optical networking and wireless technologies

TELECOMMUNICATIONS FUNDAMENTALS LEVEL-II

Telecommunications Fundamentals Level II provides a thorough technical overview of modern telecom, data and convergent networks by utilizing REAL SOLUTIONS Roadmaps. Participants will acquire an understanding of how current advancements will fit into today's networks to build the next generation of telecommunication services.
OBJECTIVES

After successfully completing the course attendees will:
• Understand the details of telecom networks and technologies
• Understand advanced data communications concepts
• Understand IP Networking
• Understand cellular networking (TDMA, GSM/GPRS/EDGE/UMTS, CDMA, CDMA2000 and W-CDMA)
• Understand optical networking
• Explore SS7, Intelligent Networks (IN) and Advanced Intelligent Networks (AIN)
• Understand DSL, ATM, and Frame Relay Networks
• Understand Voice over IP (VoIP)

VOIP FUNDAMENTALS

Voice over IP (VoIP), which integrates voice and data transmission, is quickly becoming an important factor in network communications. It promises lower operational costs, greater flexibility, and a variety of enhanced applications. VoIP Fundamentals provides a thorough introduction to this new technology to help experts in both the data and telephone industries plan for the new networks. The hands-on labs are very useful methods to understand the A-Z of VoIP.

OBJECTIVES
After completing this course, students will be able to:
• Explain the basics of telephony and TCP/IP
• Understand the engineering tools and procedures required for a voice network and the current    technologies leading to the integration of voice and data networks
• Explain the basics of Voice over IP (VoIP)
• Understand existing and emerging standards for VoIP and network architectures to support VoIP
• Understanding Carrier Grade VoIP Technologies
• Describe the protocols that support VoIP calls and explain how IP works with the PSTN
• Identify some of the challenges VoIP faces in today's networks to demonstrate a good understanding of its capabilities
• Explore the latest enabling technologies
• Explain Softswicth/MGC, Media Gateways, SIP, Megaco, and MGCP
• Voice characteristics, compression standa Mean Opinion Scores (MOS)
• Learn about the functional components involved in using gateways to deploy VoIP networks
• Explain the concepts of quality of service enforcement techniques
• Explain performance and voice quality considerations
• Discuss VoIP OSS/BSS
• Review transitioning to the All-VoIP PSTN and VoIP Taxation
• Explore project planning process of VoIP Review successful VoIP deployments for wireline, wireless, and cable operators
• Discuss successful and unsuccessful VoIP deployments
• Step through a practical process for managing a VoIP deployment project
• Explore the current and future market trends
• Discuss Video Services Over IP


SONET/SDH AND DWDM FUNDAMENTALS

This course provides an overview of the SONET/SDH and DWDM network architecture, networking elements and components, and technologies, required to build evolving transport networks. The course is presented at a level suitable for individuals comfortable with basic telecom and transport networks concepts who want to gain familiarity with all aspects of SONET/SDH and DWDM networks.

The student will gain a good understanding of architecture, services and applications commonly deployed in SONET/SDH and DWDM networks. This course is completed with a view of current optical networking solutions.

OBJECTIVES
Upon completion of this course, the attendees will be able to:
• Understand SONET/SDH Technology
• Understand SONET/SDH Transmission Hierarchy
• Explore SONET/SDH Architectures & Services
• Understand Digital Signal Synchronization
• Understand SONET/SDH Network Elements
• Develop SONEt/SDH network architecture and configuration using Terminal Multiplexer, Regenerator, Add/Drop Multiplexer (ADMs), Digital Cross-Connects and Digital Loop Carrier
• Understand Protection Switching
• Understand the basics of DWDM
• Explain basic DWDM Network Designs and Engineering
• Learn how to utilize different parameters in DWDM networks and optical systems

IP SECURITY TRAINING

IPv6 is a IETF standard that allows the Internet to expand it's address space, provide better IP mobility, and enhance security. REAL SOLUTIONS’s IPv6Security training course provides a technical understanding of the IPv6 security. IPv6 Security Fundamentals course provides a formal framework for IPv6 end-to-end security architecture and implementation issues. The course provides the essential needs in managing a IPv6 network audit and vulnerability assessment. It provides a formal framework for finding and eliminating IPv6 network security threats, ensuring that no vulnerabilities are overlooked.
The course also details what commercial, freeware, and shareware tools are available, how they work, and how to use them. By following the procedures outlined in the course, you can pinpoint what individual parts of your IPv6 network need to be hardened.

OBJECTIVES
After attending this course, you will be able to:
• Understand the basics of IPv6
• Understand the basics of IPv6 Security
• Secure IPv6 networks against threats and attacks
• Analyze and react to denial-of-service (DoS) attacks
• Implement security standards and processes to protect your IPv6 network
• Create a secure IPv6 infrastructure

 

IPTV TRAINING

REAL SOLUTIONS's IPTV course provides a comprehensive understanding of the IPTV technology. The course will cover major aspects of the IPTV standard from a business, network. Service, architecture, hardware, software, protocols and platforms perspective.
REAL SOLUTIONS's established background in legacy video, along with a comprehensive understanding of the IP technologies, provides rich insight into the IPTV technology and results in a superior training experience for our customers. The course provides indepth information, example implementations, case studies, and practical guidance to give your team members a running start.

OBJECTIVES
After attending this course, you will be able to:
• Understand the basics of video
• Understand the basics of IP networking technology
• Differentiate between technologies such as streaming, download and play, and file transfer
• Understand IPTV protocols and standards
• Understand video transport over IP networks
• Learn more about technologies like MPEG, multicasting, RTP/RTCP, and streaming
• Identify the issues with IPTV implementation
• Discover challenges with implementing some IP television

VPN FUNDAMENTALS

A VPN is a communications environment in which access is controlled to permit peer connections only within a defined community of interest, and is constructed though some form of partitioning of a common underlying communications medium, where this underlying communications medium provides services to the network on a non-exclusive basis. Virtual private networks have become an essential part of today's business networks, as they provide a cost-effective means of assuring private internal and external communications over the shared Internet infrastructure.

Virtual Private Networks: Technologies and Solutions is a comprehensive, practical guide to VPNs.
VPN Fundamentals includes VPN concepts and architectures, an in-depth examination of advanced features and functions such as tunneling, authentication, access control, VPN gateways, VPN clients, and VPN network and service management.

This course presents the various technology components, concrete solutions, and best practices you need to deploy and manage a highly successful VPN.

OBJECTIVES
After completing this course, attendees will be able to:
• Understand IPSec, featuring the Authentication Header, Encapsulating Security Payload, Internet Key Exchange, and implementation details
• Understand PPTP, L2F, L2TP, and MPLS as VPN tunneling protocols
• Review Two-party and three-party authentication, including RADIUS and Kerberos
• Explore Public key infrastructure (PKI) concept and its integration into VPN solutions
• Understand Access control policies, mechanisms, and management, and their application to VPNs
• Review VPN gateway functions, including site-to-site intranet, remote access, and extranet
• Review Gateway configuration, provisioning, monitoring, and accounting
• Explore Gateway interaction with firewalls and routers
• Understand VPN client implementation issues, including interaction with operating systems
• Understand Client operation issues, including working with NAT, DNS, and link MTU limits
• Explore VPN service and network management architectures and tunnel and security management
• Review successful VPN deployments
• Discuss successful and unsuccessful VPN deployments
• Step through a practical process for managing a VPN deployment project
• Explore the current and future market trends

MPLS FUNDAMENTALS

MPLS stands for "Multiprotocol Label Switching". In an MPLS network, incoming packets are assigned a "label" by a "label edge router (LER)". Packets are forwarded along a "label switch path (LSP)" where each "label switch router (LSR)" makes forwarding decisions based solely on the contents of the label. At each hop, the LSR strips off the existing label and applies a new label which tells the next hop how to forward the packet.

Label Switch Paths (LSPs) are established by network operators for a variety of purposes, such as to guarantee a certain level of performance, to route around network congestion, or to create IP tunnels for network-based virtual private networks. In many ways, LSPs are no different than circuit-switched paths in ATM or Frame Relay networks, except that they are not dependent on a particular Layer 2 technology.

An LSP can be established that crosses multiple Layer 2 transports such as ATM, Frame Relay or Ethernet. Thus, one of the true promises of MPLS is the ability to create end-to-end circuits, with specific performance characteristics, across any type of transport medium, eliminating the need for overlay networks or Layer 2 only control mechanisms Multi Protocol Label Switching (MPLS) is one of the central elements of next generation networks. It provides an IP-compatible, QoS-capable infrastructure that enables the convergence of voice, IP, ATM, Ethernet, and Frame Relay onto the same backbone network. MPLS can combine the intelligence and salability of routing with the reliability and manageability of traditional carrier networks. It is the key to scalable virtual private networks (VPNs) and end-to-end quality of service (QoS).

This course provides an in-depth study of MPLS technology, including MPLS theory and configuration, network design issues, case studies, operations, VPN, Traffic Engineering and GMPLS (Generalized MPLS).

OBJECTIVES
• List the features, functions and benefits of MPLS
• Identify suitable applications for MPLS
• Describe the underlying concepts of MPLS
• Describe the frame-mode MPLS and cell-mode MPLS
• Describe the concept of MPLS labels, label stack and different label formats
• Describe the label distribution process between LSRs
• Describe the loop detection and prevention mechanisms in MPLS
• Explore the future trends of MPLS

WIRELESS LANs (802.11) FUNDAMENTALS

This course provides an understanding of the wireless LAN technologies, applications and standards. Other important topics such as protocol layers, quality of service, throughput, coverage, interoperability, interference and security are discussed. Basic RF theory, propagation, Link budget math, troubleshooting, WLAN security foundations and site survey are explored.

After a general introduction to wireless networks, this practical course moves quickly into the details of the wireless LANs standards (802.11a, 802.11b, 802.11g, 802.11n), 802.11 physical (DSSS and OFDM), MAC (Media Access Control), detailed 802.11 framing, WEP (Wired Equivalent Privacy protocol), WPA/WPA2, TKIP, 802.1x, Enhanced MAC (IEEE 802.11e), 802.11f, 802.11i, QoS Requirements, Inter-frame Spacing, EDCF Access, HCF for QBSS, Enhanced Security management operations, and the PCF (point coordination function) are all covered in detail. Real-world experiences through case studies and implementation tips are located throughout the course reference material.

OBJECTIVES
After successfully completing the course the students will:
• Understand the basic concepts of 802.11
• Be able to understand the technical implementation of different types of Wireless LANs
• Gain a general understanding of Wireless LANs systems coverage and capacity
• Be able to select the most effective wireless LAN type from a wide assortment of recent and emerging standards
• Examine an Independent assessment of competing wireless LAN technologies
• Be able to perform a more efficient design and operational support of wireless LANs because of an understanding of wireless LAN protocol operations and frame structures

NETWORK SECURITY AND FIREWALLs FUNDAMENTALS/strong>

This is the second course in a five part series that teaches protocol layers and security, the resources needed to secure servers, using firewalls, the levels of firewall protection, how to detect and distract hackers, and how to respond to hacker activity.

OBJECTIVES
• Identify the components of a TCP/IP packet and security risks related to TCP/IP at various layers of the OSI model.
• Identify the implementation of TCP/IP security on a Windows NT system.
• Identify securing the Web server, FTP server, and SMTP server and testing the network security for a specific network.
• Identify firewalls and proxy servers.
• Identify setting up RAS for VPN and establishing a VPN session.
• Identify firewall design.
• Identify how to configure Win Route.
• Identify proactive detection, the prevention of breach of network security, and the creation of response plans to handle breach of network security.

LINUX/ SUN SOLARIS/ MICROSOFT OPERATING SYSTEMS TRAININGs

  • Introduction to Linux/ Sun Solaris/ Microsoft
  • Linux, Sun Solaris & Microsoft Fundamentals
  • Enterprise Linux/Sun Solaris/Microsoft System Administration
  • Enterprise Linux/Sun Solaris/Microsoft Network Services
  • Linux/Sun Solaris/Microsoft Troubleshooting
  • Linux/Sun Solaris/Microsoft Network Security
  • Linux/Sun Solaris/Microsoft Security Administration
  • Linux/Sun Solaris/Microsoft Administration
 
 
 
Home   |   Our Courses   |   Our Services   |   Request Info   |   Contact Us   |   FAQs   |   About Us

Copyright © 2012 Real Solutions