Telephony Softswitch Solution (TSS) 4.0 Training Programs. Catalog of Course Descriptions

Size: px
Start display at page:

Download "Telephony Softswitch Solution (TSS) 4.0 Training Programs. Catalog of Course Descriptions"

Transcription

1 Telephony Softswitch Solution (TSS) 4.0 Training Programs Catalog of Course Descriptions

2 Page 2 Catalog of Course Descriptions INTRODUCTION...6 ACCESS NETWORKS, AN OVERVIEW...7 APG 40 DELTA (WINDOWS 2003)...9 APG 40 INSTALLATION AND CONFIGURATION (WINDOWS 2003 C2)...11 APG 40 INSTALLATION AND CONFIGURATION (WINDOWS 2003 C4)...13 APG 40 OPERATION AND MAINTENANCE (WINDOWS 2003)...15 APG 40 RECOVERY PROCEDURES (WINDOWS 2003 C/2)...17 APG 40 RECOVERY PROCEDURES (WINDOWS 2003 C/4)...20 APG 43 DELTA...23 APG 43 OPERATION AND MAINTENANCE...25 APG 43 INSTALLATION AND CONFIGURATION...28 APG 43 RECOVERY PROCEDURES...31 APZ /33 DELTA...34 APZ OPERATION, DELTA...36 APZ OPERATION AND MAINTENANCE...39 AXE 810 DATA TRANSCRIPT...42 AXE OPERATION & CONFIGURATION...46 AXE 810 MAINTENANCE...50 Commercial in Confidence

3 Page 3 AXE SURVEY...53 AXD MAINTENANCE...58 AXE ENABLER 1.0 DELTA...60 AXE 810 CONFIGURATION DELTA...63 AXD CONFIGURATION & VERIFICATION...65 CORE NETWORKS, AN OVERVIEW...69 ENGINE ACCESS RAMP INTRODUCTION...71 ENGINE ACCESS RAMP O & M FOR AXE APPLICATION...73 ENGINE INTEGRAL 3.1 TO TSS 4.0 INTEGRATION & VERIFICATION DELTA...75 ERICSSON ANALYZER WORKSHOP...78 ERICSSON NETWORK IQ 2 OVERVIEW...80 ERICSSON NETWORK IQ 2 OPERATION...82 ERICSSON NETWORK IQ 2 SYSTEM ADMINISTRATION...87 ERICSSON NETWORK IQ 2 REPORT MIGRATION WORKSHOP...90 IP NETWORK CONFIGURATION FOR INTEGRATED SITE...94 IP NETWORKING AND INTERNETWORKING...97 IP NETWORK APPLICATIONS...99 IP NETWORKING IP QUALITY OF SERVICE AND MPLS IP SECURITY Commercial in Confidence

4 Page 4 VOICE AND VIDEO OVER IP IS MGW 1.2 OPERATION & CONFIGURATION IS OPERATION AND CONFIGURATION IS OVERVIEW IS 2.0 OVERVIEW IS 2.0 OPERATION AND CONFIGURATION IS MGW 2.0 OPERATION & CONFIGURATION MN-OSS R6 TO R8 DELTA FOR TSS MN-OSS OPERATION FOR AXE MN-OSS OPERATION FOR TSS MN-OSS SYSTEM ADMINISTRATION FOR TSS MN-OSS TO OSS-RC 10 DELTA OSS-RC 10 TSS OPERATION OSS-RC 10 TSS SYSTEM ADMINISTRATION NETWORKING AND ETHERNET STANDARDS NETWORKING BASICS, AN OVERVIEW TSS 4.0 INTRODUCTION TSS DIMENSIONING TSS 4.0 FAULT FINDING TSS 4.0 INTEGRATION & VERIFICATION Commercial in Confidence

5 Page 5 TSS 4.0 SIGNALING Commercial in Confidence

6 Page 6 Introduction Ericsson has developed a comprehensive Training Programs service to satisfy the competence needs of our customers, from exploring new business opportunities to expertise required for operating a network. The Training Programs service is delineated into packages that have been developed to offer clearly defined, yet flexible training to target system and technology areas. Each package is divided into flows, to target specific functional areas within your organization for optimal benefits. Service delivery is supported using various delivery methods including: Icon Delivery Method Instructor Led Training (ILT) Seminar (SEM) Workshop (WS) Virtual Classroom Training (VCT) Web Based Learning (WBL) Short Article (SA) Streaming Video (SV) CD-ROM (CD) Structured Knowledge Transfer (SKT) Delivery Enablers Remote Training Lab (RTL) Web Portal (WP) Ericsson Education E-Learning Commercial in Confidence

7 Page 7 Access Networks, An Overview LZU R2A Description When you complete this course you will be able to describe the basic concepts and technologies in both fixed and mobile access networks. These concepts are all presented in such a way to give you a solid foundation to build upon. Learning objectives 1 Describe fixed network connections in access networks as described in Customer Product Information documents. 1.1 Outline basic concepts such as bandwidth and technologies in access networks 1.2 Describe access based on telephone networks (analogue and digital). 1.3 Outline other access network technologies, such as fiber optics and microwave. 2 Describe the basic concepts of mobile access for GSM, GPRS and UMTS. 2.1 Explain GSM architecture and outline how traffic flows in GSM. 2.2 Explain GPRS architecture and outline traffic flow in a GPRS network. 2.3 Explain UMTS architecture and outline traffic flow in a UMTS network. 2.4 Describe Mobile IP. Target audience The target audience for this course is: Service Planning Engineers, Service Design Engineers, Network Design Engineers, Network Deployment Engineers, Service Deployment Engineers, System Technicians, Service Technicians, System Engineers, Service Engineers, Field Technicians, System Administrators, Application Developers. Prerequisites The participants should be familiar with IP Network Applications WBL, LZU Duration and class size The length of the course is 2 hours 30 minutes. Commercial in Confidence

8 Page 8 Learning situation This is a web-based interactive training course with multimedia content. Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Topics in the course Estimated time 1 Fixed Network Connection: Access Networks 1 hour Connecting While Travelling: Mobile Access 1 hour 30 mins Commercial in Confidence

9 Page 9 APG 40 Delta (Windows 2003) LZU R2B Description This course is developed with focus on characteristics and features offered by the APG40 on APZ 12.0 and APZ 12.1 software level. The APG40 is an application platform complementing the AXE Central Processor by providing persistent storage, additional processing capacity and external connectivity based on open-standard communication protocols. The course describes the differences from APG40C/2 based on Windows NT to APG40C/2 based on Windows Server 2003 and APG40C/4 based on Windows Server Learning objectives On completion of this course the participants will be able to: 1 Describe the different I/O systems delivered by Ericsson 1.1 Explain the hardware and capacity improvements 1.2 Describe the data disk and the system disk structure 2 List the new Operating System (OS) functions in APG Describe how to connect to an APG40 using a client terminal and the Graphical User Interfaces (GUI) 2.2 Explain the function of the Active Directory 2.3 Describe how to work with Groups and Accounts 2.4 Describe the IPSec tasks on APG40 3 List the new parameters for the burbackup command 3.1 List the new parameters for burrestorecommand 4 List some steps from how to upgrade the operating system from Windows NT to Windows 2003 Server 5 Describe some new CP functions 5.1 Describe the new FTP configuration Target audience The primary target audience for this course: System Technicians and other staff working with APG40. Commercial in Confidence

10 Page 10 Prerequisites The participants should be familiar with the previous APG40 releases. Duration and class size The length of the course is 1/2 day and the maximum number of participants is 16. Learning situation This course is based on theoretical instructor-led lessons. Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Topics in the course Estimated time 1 Introduction 40 min Operating System in APG40 40 min APG40 Backup and Restore 45 min OS Upgrade Other Improvements 20 min 30 min Commercial in Confidence

11 Page 11 APG 40 Installation and Configuration (Windows 2003 C2) LZU R1A Description This course will prepare participants for installation and configurational tasks on the APG40. After the course the students will be able to install and put an APG40 into operation Learning objectives On completion of this course the participants will be able to: 1 Start up and Test the APG Follow the Test Instruction, Factory Start up and Test of APG40 Windows Server 2003 to install and configure the APG40 for operation 1.2 Change the site parameters 1.3 Configure the DHCP Server on the APG40 if necessary 2 Understand the domain concept and know how a MUD can be set up and used 2.1 Use the User Manager for Domains to add trusts between domains 3 Add user accounts to the system 3.1 Add users with different access rights to the APG40 and to the CP 4 Define a configuration with two APG40s 5 Migrate to APG40 from IOG Understand the main migration steps from IOG20 to APG40 6 Configure the Antivirus for APG Schedule virus scans and update the antivirus software definitions Target audience The target audience for this course is: System Technicians, System Engineers. This audience are personnel working with Network Maintenance, Network Operation, Network Development and System Administration. Prerequisites The participants should be familiar with Windows NT and have fulfillled the course LZU APG40 Operation and Maintenance (Windows 2003) and have AXE knowledge equal to the following course: LZU AXE Survey Duration and class size The length of the course is 2 days and the maximum number of participants is 8 Commercial in Confidence

12 Page 12 Learning situation This course is based on theoretical and practical instructor-led lessons given in both classroom and in a technical environment using equipment and tools, which are accessed both locally and remotely. Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Topics in the course Estimated time 1 Start Up, Configuration and Test of APG (mins) 2 Authority System and User Account Management 70 2 Configuration of two APG40s connected to the CP 30 2 Migration of IOG20 to APG Antivirus Configuration 50 Commercial in Confidence

13 Page 13 APG 40 Installation and Configuration (Windows 2003 C4) LZU R1A Description This course will prepare participants for installation and configurational tasks on the APG40. After the course the students will be able to install and put an APG40 into operation Learning objectives On completion of this course the participants will be able to: 1 Start up and Test the APG Follow the Test Instruction, Factory Start up and Test of APG40 Windows Server 2003 to install and configure the APG40 for operation 1.2 Change the site parameters 1.3 Configure the DHCP Server on the APG40 if necessary 2 Understand the domain concept and know how a MUD can be set up and used 2.1 Use the User Manager for Domains to add trusts between domains 3 Add user accounts to the system 3.1 Add users with different access rights to the APG40 and to the CP 4 Define a configuration with two APG40s 5 Migrate to APG40 from IOG Understand the main migration steps from IOG20 to APG40 6 Configure the Antivirus for APG Schedule virus scans and update the antivirus software definitions Target audience The target audience for this course is: System Technicians, System Engineers. This audience are personnel working with Network Maintenance, Network Operation, Network Development and System Administration. Prerequisites The participants should be familiar with Windows NT and have fulfillled the course LZU APG40 Operation and Maintenance (Windows 2003) and have AXE knowledge equal to the following course: LZU AXE Survey Duration and class size The length of the course is 2 days and the maximum number of participants is 8 Commercial in Confidence

14 Page 14 Learning situation This course is based on theoretical and practical instructor-led lessons given in both classroom and in a technical environment using equipment and tools, which are accessed both locally and remotely. Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Topics in the course Estimated time 1 Start Up, Configuration and Test of APG (mins) 2 Authority System and User Account Management 70 2 Configuration of two APG40s connected to the CP 30 2 Migration of IOG20 to APG Antivirus Configuration 50 Commercial in Confidence

15 Page 15 APG 40 Operation and Maintenance (Windows 2003) LZU R1C Description This course will introduce students to operational as well as maintenance issues on the APG40 platform (APG40C/2 and APG40C/4). After attending the course the students will be able to work practically with common APG40 handling tasks. Learning objectives On completion of this course the participants will be able to: 1 Describe the APG40 hardware and software on an overview level 1.1 List the characteristics of all hardware boards and connections 1.2 Explain how the APG40 is built up 2 Be able to use different interfaces to connect to the APG40 platform 2.1 Connect to the APG40 using Telnet, WinFiol or Terminal Server 3 Describe the Alarm System on an overview level 3.1 Describe how the AEH, ALH, and PRC co-operate to raise alarms 4 Define GOH data for the transfer of file and block outputs to remote destinations 4.1 Configure CDH, AFP and DBO functions for the transfer of data to remote systems 5 Collect statistics using STS 5.1 Configure the STS on APG40 to request, store and output counter data from the CP 6 Describe the concept AD-devices 6.1 Configure an AD-devices for command input and for routing of printouts 7 Load the CP from the APG40 8 Complete a backup and restore of the APG40 platform 8.1 Handle the burbackup and burrestore commands according to the OPIs 8.2 Use Hard Function Change and Soft Function Change to install new software and/or update parameters Target audience The target audience for this course is: System Technicians, System Engineers. This audience are personnel working with Network Maintenance, Network Operation and System Administration. Commercial in Confidence

16 Page 16 Prerequisites The participants should preferably have some knowledge of Windows 2003 Server and have AXE knowledge equal to the course LZU AXE Operation and Configuration or at least equal to the course: LZU AXE Survey Duration and class size The length of the course is 4 days and the maximum number of participants is 9. Learning situation This course is based on theoretical and practical instructor-led lessons given in both classroom and in a technical environment using equipment and tools, which are accessed remotely Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Topics in the course Estimated time 1 Introduction Accessing the APG40 Network APG40 Hardware APG40 Software 2 APG40 Software APG40 Alarm System File Management Subsystem 3 File Management Subsystem Man-Machine Communication Subsystem APG40 Backup, 4 APG40 Restore and Function Change STS Commercial in Confidence

17 Page 17 APG 40 Recovery Procedures (Windows 2003 C/2) LZU R1C Description The APG40 is a very important part of the AXE switching solutions, especially in MSC, HLR and Telephony Softswitch applications. It is therefore important that the maintenance and support staff can recover APG40 nodes if problems arise. This course will introduce students to the different recovery procedures available on the APG40. These procedures will be described in detail and performed practically on APG40 hardware. After attending this course the students will know how to make a proper backup of the APG40C/2 system to different media and to be able to use the different backups to recover the APG40C/2 in a fast and correct manner. Learning objectives On completion of this course the participants will be able to: Decide which Recovery Procedure to use and how faults are reported to Ericsson Choose between the existing methods for restoring an APG40 system Describe the different types of Trouble Reports Collect suitable information to be included in a Trouble Report Make a proper backup of the APG40 Make a backup of the APG and transfer it to an LCT to be used for disaster recovery Perform Restore on the APG40 system Perform both single node and cluster node restore Use the AP, System Disaster Recovery OPI to restore an APG40C/2 (Windows 2003) System Recover one or both system disks on the APG40C/2 from an LCT. Do a Quorum Restore on the APG40C/2 System. Restore the cluster quorum. Initiate a data disk restore on the APG40C/2 System Repair failed disks and get them running in an optimal state Understand the steps taken to perform a Node Change on the APG40C/2 System Commercial in Confidence

18 Page 18 Follow the OPI: APG40, Node, Change to understand the steps taken in this procedure. Target audience The target audience for this course is: System Technicians, Service Technicians, System Engineers, Service Engineers, and Field Technicians, System Administrators and all staff working both for Ericsson and for external companies with maintenance and support of APG40 systems Prerequisites Successful completion of the following course or equivalent knowledge: LZU , APG40 Operation and Maintenance (Windows 2003) Duration and class size The length of the course is 3 days and the maximum number of participants is 9. Learning situation This course is run only as instructor-led training (ILT). Commercial in Confidence

19 Page 19 Time schedule The time required always depends on the knowledge of the attending participants and the time stated below can be used as estimate. Day Topics in the course Estimated time 1 Different recovery methods Trouble Reports Exercise The backup procedure Exercises Recovery procedures: Restore Exercise 15 mins Recovery procedures: Disaster Recovery 90 Recovery procedures: Quorum Log Restore 30 Exercises Exercises 30 Recovery Procedures: Data Disk Recovery 50 Exercise 60 Other methods 60 Course Termination 20 Commercial in Confidence

20 Page 20 APG 40 Recovery Procedures (Windows 2003 C/4) LZU R1B Description The APG40 is a very important part of the AXE switching solutions, especially in MSC, HLR and Telephony Softswitch applications. It is therefore important that the maintenance and support staff can recover APG40 nodes if problems arise. This course will introduce students to the different recovery procedures available on the APG40. These procedures will be described in detail and performed practically on APG40 hardware. After attending this course the students will know how to make a proper backup of the APG40C/4 system to different media and to be able to use the different backups to recover the APG40C/4 in a fast and correct manner. Learning objectives On completion of this course the participants will be able to: 1 Decide which Recovery Procedure to use and how faults are reported to Ericsson 1.1 Choose between the existing methods for restoring an APG40 system. 1.2 Describe the different types of Trouble Reports. 1.3 Collect suitable information to be included in a Trouble Report 2 Make a proper backup of the APG Make a backup of the APG and transfer it to an LCT to be used for disaster recovery 3 Perform Restore on the APG40 system Perform both single node and cluster node restore 4 Perform the AP, System Disaster Recovery OPI to restore an APG40C/4 (Windows 2003) System Recover one or both system disks on the APG40C/4 from an LCT 5 Do a Quorum Restore on the APG40C/4 System Restore the cluster quorum 6 Initiate a data disk restore on the APG40C/4 System Repair failed disks and get them up in an optimal state 7 Perform a node restore on the APG40C/4 System Follow the OPI: APG40, Node, Change, APG40 C/4 to change a node in the APG40. Commercial in Confidence

21 Page 21 Target audience The target audience for this course is: System Technicians, Service Technicians, System Engineers, Service Engineers, Field Technicians, System Administrators and all staff working both for Ericsson and for external companies with maintenance and support of APG40 systems Prerequisites Successful completion of the following course or equivalent knowledge: LZU , APG40 Operation and Maintenance (Windows 2003) Duration and class size The length of the course is 3 days and the maximum number of participants is 9. Commercial in Confidence

22 Page 22 Learning situation This course is run only as instructor-led training (ILT). Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Topics in the course Estimated time 1 Health Check Different recovery methods Trouble Reports The backup procedure 30 mins Recovery procedures: Restore 40 Recovery procedures: Disaster Recovery 40 Recovery procedures: Quorum Log Restore 30 3 Recovery Procedures: Data Disk Recovery 40 Recovery Procedures: Node Change 40 Other methods 20 Course Termination 20 Commercial in Confidence

23 Page 23 APG 43 Delta LZU R2A Description The Adjunct Processor Group 43 (APG43) is the IO system of the APZ control system in AXE 10 and AXE 810 with focus on board size footprint and integration in the evolved Generic Ericsson Magazine (egem). The APG 43 is housed on blades (egem boards) in egem magazine, utilizing the egem infrastructure. This course will cover aspects in the new APG release. The students will retain knowledge regarding the architecture and the functionality of the APG43. The differences to the previous APGs will be covered. Learning objectives At the end of this course, the students will be able to: 1 Describe the APG features on an overview level 1.1 Be introduced to the main components of the APG Describe the APZ versions used with APG Observe the capacity differences between different IO systems 2 Describe the APG Hardware 2.1 Describe the layout of the egem subrack housing the APG Explain the Ethernet star connections in the backplane 2.3 Describe the different boards used in APG Describe the front cabling connections in APG 43 3 Describe the APG Software 3.1 Describe the new software structure used in APG Describe the new sub-systems introduced in APG Explain the VERITAS software RAID function in APG Describe the quota based protection feature 4 Discuss other improvements in APG Understand the new Configuration and Hardening feature in APOS 4.2 Describe the different user interfaces towards the APG Explain the changes to the Disaster Recovery procedure in APG Briefly describe the procedure to change a GED disk board 4.5 Describe the command differences between APG40 and APG43 Target audience The primary target audience for this course: System Technicians and other staff working with APG43. Commercial in Confidence

24 Page 24 Prerequisites The participants should be familiar with the previous APG40 releases. Duration and class size The length of the course is 1 day and the maximum number of participants is 16.. Learning situation This course is based on theoretical instructor-led lessons. Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Topics in the course Estimated time 1 Introduction 60 min APG 43 Hardware and Interfaces 120 min APG 43 Sofware and 3 rd party midlleware 60 min Other Improvements 100 min Commercial in Confidence

25 Page 25 APG 43 Operation and Maintenance Description LZU R1A Do you want to know how the APG43 works? Are you required to perform Operation and Maintenance activities on the APG43 such as backups, creating new user accounts, or configuring statistical measurement programs? This course describes the hardware and software structure of the APG43. It also explains many of the features in APG43 while describing the procedures and commands used to configure them. The participants will gain experience in handling the APG43 by performing a series of practical exercises designed to re-enforce the theoretical components of the course. The exercises include fault handling, trouble report creation, file transfer definitions, backup procedures and more. Learning objectives On completion of this course the participants will be able to: 1 Describe the APG features on an overview level 1.1 Introduce the APG43 product and its main features 1.2 Compare the performance and hardware characteristics of APG43 to previous IO systems 2 Describe the APG43 hardware components 2.1 Explain the layout of the EGEM magazine including APG Describe each board which makes up the APG43 and their functions 2.3 Understand the front cabling used in APG43, and be familiar with the connections 2.4 Be familiar with the APG43 data disk directory structure, and describe the contents 3 Use different interfaces to connect to the APG43 platform 3.1 Connect to the APG43 using Telnet, WinFiol or Terminal Server 3.2 Describe the serial console port in APG43, and when it is used Commercial in Confidence

26 Page 26 4 Explain the APG43 software structure 4.1 Provide a basic understanding of the software architecture, and describe the major components APHW, APOS, ACS on an overview level 4.2 Describe some of the commonly used applications such as Microsoft Cluster Server and other 3 rd Party products 4.3 Describe the functions of ACS and AES subsystems used in APG Perform exercises to define file transfer destinations in the AP, and generate files to observe the file transfer process. 5 Describe the principles of the alarm system in APG Explain the principles of the alarm system on the APG Describe the functions of PRC, USA and SSU 6 Describe the file management system implemented in APG Understand the main file handling functions used in FMS 6.2 Perform exercises to create, rename, copy and remove files in FMS 6.3 Explain the CP backup functions supported in APG Understand how to transfer a CP backup file into the AP to be loaded into the CP 7 Describe the Man-Machine Subsystem in APG Describe the hardware components in MCS 7.2 Understand how users can be defined in APG43 with different levels of access to AP and CP functions 7.3 Explain the alarm display function used in APG Define the data for an external alarm in APG43 8 Describe the APG43 System Backup, Restore and Function Change procedures 8.1 Describe the principles of the APG43 backup function, and perform a backup of the APG Explain the APG43 system restore procedure, and perform a single Node restore 8.3 Describe the Function change principles, and perform a soft function change in APG43 9 Describe the principles of the Statistics and Traffic Measurement subsystem STS in APG Have a basic understanding of STS concepts and their implementation in APG Explain the counters, objects and object types used in STS 9.3 Understand the output of files and the different formats used in STS 9.4 Perform and exercise to define measurement reports to produce statistical data to be output to a destination defined in APG43 Target audience The target audience for this course is: System Technicians, System Engineers. Commercial in Confidence

27 Page 27 This audience is responsible for Network Maintenance, Network Operation and System administration Prerequisites The participants should be familiar with previous version of APG 40 systems. Successful completion of the following courses: APG43 Delta FAB R1A Duration and class size The length of the course is 4 days and the maximum number of participants is 8. Learning situation This course is based on theoretical and practical instructor-led lessons given in both a classroom and in a technical environment, using equipment and tools. Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Topics in the course Estimated time 1 APG43 Introduction APG43 Hardware Accessing the APG43 Network APG43 Software 2 APG43 Software APG43 Alarm System APG43 File Management Subsystem 3 APG43 File Management Subsystem APG43 Man-Machine Communication Subsystem APG43 Backup 4 APG43 Restore and Function Change APG43 STS Commercial in Confidence

28 Page 28 APG 43 Installation and Configuration LZU R1A Description This course will prepare participants for installation and configurational tasks on the APG43 by engaging in theoretical and practical sessions with the trainer. Participants will have the opportunity to explore the APG43 functionalities in installation and configuration procedures After the course the students will be able to install, configure and put an APG43 into operation. Learning objectives On completion of this course the participants will be able to: 1 Describe the subsystem structure of the APG43 and the hardware layout in the e- GEM. It also describes the main hardware and functionality changes from the APG Describe the subsystems in the APG Recognize the hardware configuration of the APG Explain the main hardware and functionality differences from the APG Describe the structure of the Data Disk in APG43 2 Describe the hardware layout and cable connections of the APG43. It also describes the procedure to install and test an APG Describe the APG43 hardware and cable connections 2.2 Make and verify an AP System backup 2.3 Perform Hardware Configuration (HWC) changes 2.4 Prepare for Site Parameter Change 2.5 Perform a Start Up and Test procedure on an APG Configure the APG43 for APZ 2.7 Perform Test APG43 3 Understand the administration of the different security functions in the APG Describe the User management in APG How to define different user groups and their Authorities in APG43 and CP 3.3 APG43 Domain handling 3.4 Master User Domain (MUD) 4 Understand the Anti Virus software that is installed on the APG Describe the etrust Antivirus software 4.2 Know how to avoid getting virus on the APG Configure the antivirus software 4.4 Update the virus definitions 4.5 Create a scheduled scan job Commercial in Confidence

29 Page 29 Target audience The target audience for this course is: System Technicians, System Engineers. This audience are personnel working with Network Maintenance, Network Operation, Network Development and System Administration. Prerequisites The participants should be familiar with Windows 2003 and have fulfillled the course: APG43 Operation and Maintenance, LZU And APG43 Delta, LZU Paricipants should also have some AXE knowledge equal to the following course: AXE Survey, LZU Duration and class size The length of the course is 2 days and the maximum number of participants is 8. Learning situation This course is based on theoretical and practical instructor-led lessons given in both classroom and in a technical environment using equipment and tools, which are accessed both locally and remotely. Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Commercial in Confidence

30 Page 30 Day Topics in the course Estimated time (Minutes) 1 Course Introduction 15 1 Chapter 1 - Introduction to APG Chapter 2 - Start Up, Configuration and Test of APG Exercises for Chapter 1 and Chapter 3 - Authority System and User Account Management 90 2 Chapter 4 - Antivirus Configuration 70 2 Exercises for Chapter 3 and Commercial in Confidence

31 Page 31 APG 43 Recovery Procedures LZU R1A Description Do you want to know how to recover the APG43 when it is not working normally? Do you how to reconnect the APG43 in the network? This course will bring you all these answers by engaging in theoretical and practical sessions with the trainer, you will have the opportunity to explore the APG43 functionalities with recovery procedures. After attending this course the students will know how to make a proper backup of the APG43 system to different media and to be able to use the different backups to recover the APG43 in a fast and correct manner. Learning objectives On completion of this course the participants will be able to: 1 Decide which Recovery Procedure to use and how faults are reported to Ericsson 1.1 Choose between the existing methods for restoring an APG43 system. 1.2 Describe the different types of Trouble Reports. 1.3 Collect suitable information to be included in a Trouble Report. 2 Make a proper backup of the APG Follow OPI to make a backup of the APG and transfer it to an LCT to be used for disaster recovery. 3 Perform System Restore on the APG Follow OPI to perform both single node and double node restore. 4 Perform Disaster Recovery to restore an APG43 System 4.1 Follow OPI to Recover one or both system disks on the APG43. 5 Do a Quorum Restore on the APG43 System 5.1 Restore the cluster quorum following the OPI. Commercial in Confidence

32 Page 32 6 Replace a faulty GED data disk on the APG43 System 6.1 Follow OPI to replace a failed datadisk and return RAID to an optimal state. 7 Perform a replacement of a GEP APUB board in APG Follow the OPI to replace a faulty APUB board and restore the APG43 system. Target audience The target audience for this course is: Network Deployment Engineers, System Technicians, Service Technicians, System Engineers, Service Engineers, Field Technicians and System Administrators. These audiences can also include all staff working both for Ericsson and for external companies with maintenance and support of APG43 systems. Prerequisites The participants should be familiar with the previous APG40 releases. Successful completion of the following training flow: APG43 Delta FAB R1A APG43 Node Operation & Configuration FAB R1A Duration and class size The length of the course is 3 days and the maximum number of participants is 8. Learning situation This course is based on theoretical and practical instructor-led lessons given in both classroom and in technical environment using equipment and tools. Commercial in Confidence

33 Page 33 Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. (This paragraph is mandatory). Day Topics in the course Estimated time 1 Different recovery methods Trouble Reports The backup procedure 30 mins Recovery procedures: Restore 40 Recovery procedures: Disaster Recovery 40 Recovery procedures: Quorum Log Restore 30 3 Recovery Procedures: Data Disk Recovery 40 Recovery Procedures: Node Change 40 Other methods 20 Course Termination 20 Commercial in Confidence

34 Page 34 APZ /33 Delta LZN R2A Description This course describes the differences between APZ and APZ /33 Central Processor hardware and functionality from the operations and maintenance perspective. The course is designed for delivery to students who already posses a good knowledge of APZ, and are interested in the differences between the above mentioned processors. Learning objectives On completion of this course the participants will be able to: Describe the differences in the hardware structure between APZ and /33 Describe the hardware structure of APZ C Describe the new store structure of APZ /33 CP s List the new commands introduced with the APZ /33 CP s Perform Operation & Maintenance activities on APZ /33 CP s Target audience The target audience for this course is all technical staff working on operations and maintenance activities on the different variants of the APZ 212 Central Processor. Prerequisites The participant should be familiar with handling of older APZ 212 versions. Duration and class size The length of the course is 1 day and the maximum number of participants is 8. Learning situation This course is based on theoretical and practical instructor-led lessons given in both classroom and in a technical environment using equipment and tools. Commercial in Confidence

35 Page 35 Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Short description of the topics in the course Estimated time 1 Chapters 1,2 and 3 Exercise 1,2 and 3(if time permits) All Day Commercial in Confidence

36 Page 36 APZ Operation, Delta LZU R1A Description This course enables the students to operate and maintain the APZ The course is a delta between APZ /33 and APZ and will provide knowledge on concepts and APZ functions related to the operation tasks. It will also highlight the differences to APZ Through practical exercises will skill the participants in handling hardware faults and extracting of system logs. Learning objectives On completion of this course the participants will be able to: 1 Describe the evolution of APZ 212 processors. 2 Outline the key features of the APZ New CPU, Capacity, Warm standby concept and the I/O systems required. 3 Illustrate the APZ Hardware Cabinets. 4 Detail the CP Server Block (CPSB) and CPAM magazine in APZ Explain the internal and external interfaces. 6 Describe the differences in the Control Display Unit in the APZ Describe the different execution platforms in APZ Describe the APZ software structure. 9 Explain PlexEngine, the APZ VM, the ASA compiler, and the commercial Operating System for the APZ Explain the new Record Orientated architecture of the Data Store as opposed to the original Dats store format of previous APZs. 11 Describe the functionality of HAL and OS API. 12 Handle changes in APZ Hardware and Software 13 Reload, maintain and Dump the APZ Handle faults in CP Hardware, CDU, FANs and RPHM 15 Extract restart information in case of CP Software faults. 16 Describe the Central Log Handler functionality in the APZ 17 Extract error log files from CP / APG and send it for further analysis and troubleshooting. 18 Perform a retrieval of restart data. 19 Perform a function change of middleware. 20 Work with the Ethernet RP bus and Target audience The primary target audience for this course: System Technicians and System Engineers. Commercial in Confidence

37 Page 37 Prerequisites A knowledge of previous APZs is recommended. Duration and class size The length of the course is 2 days and the maximum number of participants is 8. Learning situation This course is based on theoretical and practical instructor-led lessons given in both classroom and in a technical environment using APZ equipment and tools (WinFiol, ALEX). Terminology APG APZ VM CDU CPU GEM HAL OS API RPB RPH Adjunct Processor Unit APZ Virtual Machine Control Display Unit Central Processor Unit. Generic Ericsson Magazine Hardware Abstraction Layer Operating system Application Interface Regional Processor Bus Regional Processor Handler Commercial in Confidence

38 Page 38 Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Short description of the topics in the course Estimated time 1 Course introduction 1 hour Describe the evolution of APZ Outline the key features of the APZ New CPU, Capacity, Warm standby concept and the I/O systems recommended. Illustrate the APZ Cabinet. 1,5 hours Detail the CPSB and CPAM magazines in APZ Describe the internal and external interface. Describe the differences in the Control Display Unit in the APZ Describe the execution platforms in APZ 0,5 hours Describe the APZ software structure. 1,5 hours Explain PlexEngine, the APZ VM, the ASA compiler, and the commercial Operating System for the APZ Explain the new Record Orientated architecture of the Data Store as opposed to the original Dats store format of previous APZs. Describe the functionality of HAL and OS API Handle changes in: 1,5 hours Hardware Software Reload, maintain and Dump the APZ handle faults in: 1 hours CP Hardware CDU and FAN RPHM Extract restart information in case of CP Software faults Extract error log files from CP / APG and send it for further analysis and troubleshooting. Perform a CP stoppage and retrieval of restart data.. Exercises 4,5 hours Course Summary 0,5 hour Commercial in Confidence

39 Page 39 APZ Operation and Maintenance LZU R1A Description The APZ is an essential part of the AXE system, especially as a new platform for the MSC, MSC-servers, HLR and Telephony Softswich applications. Through practical exercises the participants will gain experience in handling the APZ by checking its operational states, feeling how the APZ reacts in different situations like a system backup or reloading procedures, and extracting of system logs that can be further used for troubleshooting. Learning objectives On completion of this course the participants will be able to: 1 Describe the APZ in an overview level 1.1 Explain the APZ Evolution 1.2 Explain the basic APZ concepts 1.3 Explain the APZ architecture overview 1.4 Indicate the capacity and characteristics of different APZ versions 1.5 Discuss the key features of the APZ Recognize the APZ subsystems and functions 2 Demonstrate use of the APZ Hardware 2.1 Identify the hardware structure of the APZ on cabinet level 2.2 Describe the APZ on subrack level 2.3 State the functions of the APZ boards CPUB, MAUB and RPBI-S 2.4 State the functions of the egem magazine, SCB-RP/4 board and Fan Unit 2.5 Explain the CDU panel indications 2.6 Distinguish the major physical, logical interfaces and manageability functions in the APZ Recognize the APZ from the functional point of view 2.8 Explain RPB-E and IPonCP features 3 Demonstrate use of the Operation Handling concepts of APZ Describe the main aspects affecting operation handling 3.2 Differentiate the APZ operational states (CP, MAU, RPH) 3.3 Execute the backup procedure in the APZ Use the Hardware Configuration Table information 3.5 Load the APZ Central Processor 3.6 Describe the booting procedure of the APZ CP Commercial in Confidence

40 Page 40 4 Demonstrate use of the Fault handling concepts of the APZ List the hardware fault recovery processes 4.2 Repair hardware faults in APZ Hardware 4.3 List the Software Fault recovery process 4.4 Extract restart information in case of CP Software faults 4.5 Differentiate between PLEX Engine fault recovery and PLEX fault recovery 4.6 Use the Central Log Handler in APZ Discriminate the key features in the software structure of APZ Describe the APZ software structure. 5.2 Explain how the APZ Virtual Machine operates within Plex Engine 5.3 Describe the Program Control in AXE 5.4 Explain how the ASA Compiler operates within Plex Engine 5.5 Examine the memory lay out of APZ Explain the Program Execution Platform 5.7 Identify where the APZ Plex Engine software is stored in APG Explain the Function Change of Middleware and Firmware Target audience The primary target audience for this course is : System Technicians and System Engineers. Prerequisites Successful completion of the following courses: WCDMA AXE Operation LZU /1 or GSM AXE Operation LZU /2 or AXE Operation and Configuration LZU Duration and class size The length of the course is 2 days and the maximum number of participants is 8. Learning situation This course is based on theoretical and practical instructor-led lessons given in both classroom and in a technical environment using APZ equipment and tools (WinFiol, ALEX), which can also be accessed remotely. Commercial in Confidence

41 Page 41 Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Topics in the course Estimated time (min) 1 Course introduction 40 Describe the evolution of APZ 212 series Identify the APZ hardware and the major interfaces 60 Detail the APZ hardware : CPUB, MAUB, RPBIS and SCB-RP4 boards Demonstrate use of the Operation handling concepts of 60 APZ Working States and dump the APZ Exercises Demonstrate use of the Operation handling concepts of 60 APZ (continuation) Demonstrate use of Fault Handling concepts of APZ Extract restart information and error logs in case of CP Software faults Discriminate the key features in the software structure of 40 APZ Explain PlexEngine, the APZ VM, the ASA compiler Practical exercises 200 Course Summary 10 Commercial in Confidence

42 Page 42 Error! Unknown document property name. Error! Unknown document property name. Error! Unknown document property name. Description This course will develop the participant s current knowledge and understanding of exchange data to a point where he/she will be able to interpret exchange requirements and write the data transcript for an AXE 810. The participant will have the opportunity for discussion about data transcript production, inputs, flow and ideas. Generally, theoretical lessons will be followed by practical work giving the participant the opportunity to write data transcript from exchange requirements. Learning objectives On completion of this course the participants will be able to: 1 Understand the general hardware structure of AXE Understand the AXE modular system architecture 1.2 Understand the APZ control system 1.3 List the hardware components of AXE Explain the main benefits of AXE Explain the difference compared with BYB List the highlights of AXE Understand the new features of AXE Understand the basic structure of APG40 and APG Understand the basic structure of APZ /C 2.3 Understand the basic structure of APZ Understand the basic structure of APZ Understand the basic structure of APZ Explain the function of IPN 2.7 Explain the connection of IPN in different APZ version 3 Define the C3 file and other hardware of AXE Explain the inputs and outputs of the Data Transcript process 3.2 Use the Customer Product Information (Alex Document Browsers) in order to find appropriate commands, parameters and parameter values 3.3 Explain the process of converting a reference dump into a working dump 4 Perform a Size Alteration 4.1 Understand the concept of SAE 4.2 Explain the difference between global SAE and local SAE 4.3 Understand the manual and automatic SAE function Commercial in Confidence

43 Page List a simple DT example 5 Allocate RP and EM 5.1 Explain the basic structure of various GDM 5.2 List different RP types 5.3 List the DT examples of allocation for RP and EM 6 Define the Group Switch and connect Devices 6.1 Describe the GEM structure 6.2 Describe the structure of GS Understand the different capacity configuration of GS List the new hardware equipment in GEM 6.5 Describe the connection of GDM to the GS Describe the definition of BL phone, 6.7 Describe the structure and different configuration of CL List the DT example to define GS, SNT, DIP, device and route. 6.9 Describer ALI applications and list the DT example to define ATM Link Interface (ALI) 6.10 Describe and list DT for C7 MTP and HSL Describer SLI applications and list the DT example to define SLI 7 Define pre A-number and A-number analysis 7.1 Understand the basic principle of A-number analysis and A-number pre-analysis 7.2 Understand the commands and the parameters in the A-number and A-number preanalysis table 7.3 List simple DT example for A-number and A-number pre-analysis table 8 Define Pre B-number and B-Number Analysis 8.1 Understand the basic principle of B-number analysis and B-number pre-analysis 8.2 Understand the commands and the parameters in the B-number and B-number preanalysis table 8.3 List simple DT example for B-number and B-number pre-analysis 9 Define Routing Case Analysis 9.1 Understand the basic principle of routing case analysis 9.2 Understand the commands and the parameters in routing case analysis table 9.3 List simple DT example for routing case analysis 10 Define End-of-Selection (EOS) Analysis 10.1 Understand the basic principle of EOS analysis 10.2 Understand the parameters and actions possible to initiate in EOS analysis table 10.3 List simple DT example for EOS analysis 11 Define Equal Access 11.1 Understand the basic function and structure of equal access carrier analysis 11.2 Understand the commands and parameters in the equal access carrier analysis table Commercial in Confidence

44 Page List simple DT example for equal access carrier analysis 12 Define Charging Data 12.1 Understand the overall charging analysis table 12.2 Understand traffic activity analysis, charging case analysis and charging program analysis 12.3 Understand the calendar function 12.4 Understand the commands of charging analysis 12.5 List DT example for tariff charging 13 Define Access-Barring Analysis and Time-Supervision Analysis 13.1 Understand the basic concept of access barring analysis and time supervision 13.2 Understand the commands for access barring analysis and time supervision 13.3 List DT example of access barring analysis and time supervision analysis 14 Define Announcements 14.1 Understand the concept of phrase and announcements 14.2 Understand the access to announcement and the route data 14.3 List DT example of announcements Target audience The target audience for this course is: Network Deployment Engineers and System Engineers. The target audience for this course is personnel in the network planning or network configuration in the are of Data Transcript. Prerequisites Successful completion of the following course: AXE Operation and Configuration LZU or GSM/WCDMA AXE Operation LZU Duration and class size The length of the course is 5 days and the maximum number of participants is 8. Learning situation This course is based on theoretical and practical instructor-led lessons given in both classroom and in a technical environment using equipment and tools. Commercial in Confidence

45 Page 45 Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Topics in the course Estimated time 1 AXE 810 Overview APZ and APG Introduction to Data Transcript 2 Size Alteration Events Allocation of RP and EM Group Switch and Connection of Device 3 Group Switch and Connection of Device (continued) A number Analysis 4 B number Analysis Routing Case Analysis End of Selection Equal Access 5 Charging Analysis Access Barring and Time Supervision Announcement 2 hours 3 hours 1 hour 2 hours 2 hours 2 hours 4 hours 2 hours 2 hours 2 hours 1 hour 1 hour 2 hours 2 hours 2 hours Commercial in Confidence

46 Page 46 Error! Unknown document property name. Description Error! Unknown document property name. R3A Have you think about how the AXE system structure knowledge can facilitate your daily activities? Don t you know how to configure routes and devices because you are not familiar with operational routines? Many customers do face this situation too. This course will teach you how to operate the functions of the AXE 810 switch common to all AXE810 applications of a network. When finishing the course the students will have a deeper understanding of operation and configuration activities in AXE810 exchanges in an efficient way. The practical parts will be performed either in a real exchange, on SEA environment or in a Remote Lab (RTL) with realistic exercises. Learning objectives On completion of this course the participants will be able to: 1 Recognize the AXE 810 product structure and the documentation used 1.1 Identify the market position for AXE. 1.2 Recognize the product structure of AXE. 1.3 Recognize the BYB 501 building practice on an overview level. 1.4 Identify the main parts of the command code 1.5 Use different parameter variants of standard AXE commands 1.6 Interpret different printouts generated by the system 1.7 Handle WinFIOL to communicate with AXE 1.8 Handle the AXE library as an aid. 2 Demonstrate use of the basic APG functions 2.1 Recognize the APG Functions 2.2 Access the AXE system through the APG 2.3 Identify the APG HW Layout 2.4 Utilize the File Management Subsystem 3 Differentiate between the RPs types used in the system 3.1 Handle the RPs on a basic level. 3.2 Define EMs controlled by the RPs 3.3 Configure the databases used when defining RPs Commercial in Confidence

47 Page 47 4 Identify the structure of the Group Switch GS Operate the Group Switch GS Configure the different parts of the group switch. 4.3 Administer the clock function. 4.4 Discuss how the network synchronization is dealt with in AXE. 4.5 Explain the SNT, DIP and SDIP concepts. 4.6 Configure SNTs, DIPs and SDIPs. 5 Implement the necessary exchange data to connect routes and devices 5.1 Configure hardware for new routes. 5.2 Define routes and devices 5.3 Connect and disconnect devices 5.4 Modify Size Alteration Events on request from a work order 6 Manage Signaling in AXE810 systems 6.1 Identify basic signaling concepts. 6.2 Explain the differences between CAS and CCS signaling systems. 6.3 State the structure of the CCS. 6.4 Define a signaling system no. 7 (SS7) in AXE up to the MTP. 7 Make use of CPs in the APZ 212 family regarding their structure and functionalities 7.1 Handle a CP on a basic level 7.2 Operate the System Backup functions. 8 Correlate the main Analysis Tables in AXE : 8.1 Define data in the (Pre) B-Number Analysis table and check the result. 8.2 Define data in the Route Analysis table and check the result. 8.3 Analyze End-of-Selection codes using commands 8.4 Check data in Charging Analysis. 9 Perform Traffic Measurements in AXE 9.1 Retrieve statistics data from OMS Target audience The target audience for this course is: System Technicians, System Engineers. Commercial in Confidence

48 Page 48 Prerequisites The participants should be familiar with the AXE structure and have a general understanding of the functionalities of the system. Successful completion of the following course: LZU , AXE Survey Duration and class size The length of the course is 10 days and the maximum number of participants is 8 Learning situation This is a instructor-led training course based on exercises given in a technical environment using equipment and tools, which can also be accessed remotely Commercial in Confidence

49 Page 49 Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Topics in the course Estimated time 1 Introduction and Pre-Test 6 hs MML, WinFIOL, AXE Library and I/O functions 2 Understand the I/O System 4 hs 3 Define RP/EMs and SAEs 5 hs 4 Group Switch, SNT & DIP, Clock and Synchronization 6 hs 5 Route and Device Data Signaling in AXE 6 hs 6-7 APZ Backup Handling 11 hs 8-9 Analysis in AXE + Charging 15 hs 10 Traffic Measurements Final Evaluation 6 hs Commercial in Confidence

50 Page 50 Error! Unknown document property name. Description Error! Unknown document property name.0 R2A Do you have questions about faults, alarms? Do you feel afraid of recovering urgent alarms? Don t you know how to use the tools provided by Ericcson? Some people have the same questions and concerns. Then you should attend this course. Through case studies, the maintenance of all supported hardware configurations will be covered in this modular course. Each case covers one or more related events and builds on the knowledge learned from previous cases. Learning objectives On completion of this course the participants will be able to: 1 Replace plug-in units for various subordinate hardware elements (e.g. RPs, EMs), and execute the repair procedures using local O&M tools. 2 Generate printouts according to a Work Order, using local Operation and Maintenance (O&M) tools and on-line system documentation. 2.1 Log and save printouts, using local O&M tools 3 Locate and identify GSM hardware units, using online documentation. 3.1 Determine the order number and release revision of hardware elements, using the Alex library 3.2 Exchange subordinate hardware elements, using online documentation 4 Perform repair sequences on various hardware elements (e.g. RPs, EMs), using WinFIOL / OSS-RC, online documentation, and data from a Work Order. 5 Determine the order and release revision of AXE central elements, using online documentation. 5.1 Exchange hardware units in AXE central elements, using online documentation 5.2 Perform repair sequences on AXE central hardware elements, using WinFIOL/ OSS- RC, online documentation, and data from a Work Order 5.3 Generate status printouts of AXE central elements in accordance with a Work Order, using local O&M tools and online documentation 5.4 Determine APZ system status, using visible hardware indicators 6 Locate and identify APG 40 / APG 43 hardware units, using online documentation. 6.1 Generate printouts of APG 40 / APG43 system status and hardware elements, using local O&M tools and online documentation 7 Save a system backup copy on removable media, using online documentation and Work Order data. 7.1 Transfer a file from removable media to hard disk, using online documentation and Work Order data Commercial in Confidence

51 Page 51 8 Test load a system backup copy, using online documentation and Work Order data. 9 Perform routine preventive maintenance on the AXE, using online documentation. 10 Perform repair on Sigtran hardware (GARP). 11 Perform repair sequences on BSC-specific hardware elements (TRAU), using WinFIOL/OSS-RC, online documentation, and data from a Work Order. 12 Replace plug-in units for various subordinate hardware elements (e.g. RPs, EMs), and execute the repair procedures using local O&M tools. 13 Replace plug-in units for various central hardware elements (APZ, APG and GPB), and execute the repair procedures using O&M tools. Target audience The target audience for this course is: Field Technicians, System Technicians Prerequisites Successful completion of the following stream: AXE Operation and Configuration LZU GSM / WCDMA AXE Operation LZU APG 40 O&M LZU APG 43 O&M LZU Duration and class size The length of the standard course (only one APZ model) is 5 days and for all relevant APZ models is 7 days. The maximum number of participants is 8. Learning situation This is a task-oriented learning course based on tasks in the work process given in a technical environment using equipment and tools. Working in groups of two for most events, students are issued various Work Orders to resolve hardware faults, perform hardware replacement, and follow simple non-fault related maintenance routines using the system documentation. The instructor acts as facilitator, helping students to obtain the required competency and may present theorectical material to support and enhance skills learnt from performing the cases. Commercial in Confidence

52 Page 52 Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Topics in the course Estimated time 1 Win Fiol and ALEX Hardware handling and Structure (hardware presentation) AXE Hardware Faults Control Path (RP, EM Fault) 2 GS Fault AXE Hardware Fault Speech Fault (DIP, SNT, SDIP Fault) CP Status and Basic CP Fault Repair 3 CP Status and Basic CP Fault Repair MSC Specific (Optional) or Telephony Service Specific (Optional) or BSC Specific (Optional) 4 CP Stoppage IO Status and Basic IO Fault Repair IO Restart and Reload 5 Backup Handling and Routine Maintenance Final tests / summary 120 min 100 min 100 min 120 min 120 min 120 min 240 min 120 min 120 min 120 min 120 min 120 min 120 min 1 Day Commercial in Confidence

53 Page 53 AXE Survey LZU R4A Description Do you want to know the AXE 810 system and concepts? Many new terms are included in AXE 810 system, both hardware and software concepts as well. With this course, the attendees will be able to learn the AXE 810 platform used in mobile and fixed telephony. It also describes applicable features and businesses communication. Learning module objectives On completion of the following module, the participants will be able to: 1 Introduction to AXE 1.1 Underline today s communications network and the transport system that forms this network 1.2 Underline the trends in current communications networks and describing how AXE has developed in response to those trends 1.3 List terms that apply to the AXE system 1.4 List the AXE structure 1.5 List how the AXE system meets customer requirements 1.6 List the main benefits of AXE List the different product lines that are available in the fixed and mobile network 2 Signaling in the AXE System 2.1 List the differences between access and inter-exchange signalling 2.2 List the characteristics of subscriber line signalling 2.3 Underline the differences between CAS and CCS 2.4 Set Channel Associated Signaling in a signalling diagram 2.5 Set the Common Channel Signalling in a signalling diagram 2.6 List the equipment used by CAS and its implementation in AXE List the structure of CCS 2.8 Underline the implementation of CCS in AXE Set the Signalling Transport in IP networks in a signalling diagram 2.10 List the equipment used by SIGTRAN in the AXE810 Commercial in Confidence

54 Page 54 3 AXE Control System 3.1 Underline the Processor hierarchy in the AXE system 3.2 State the main APZ subsystems 3.3 List the function of the Central Processor Subsystem (CPS) 3.4 List the hardware units in APZ 212 family 3.5 List the new functions in APZ 3.6 Underline what is System Backup 3.7 Underline the function of the APG 3.8 List the function of the Regional processor subsystem (RPS) 3.9 Identify the RPP, RPG3, GARP 3.10 Underline how Regional Processors are connected to the Central processor 4 Operation, maintenance and management systems in AXE 4.1 List the evolution of operation, maintenance and management systems in today s communications networks 4.2 List what is distributed and centralized control 4.3 List what is meant by operation and maintenance activities 4.4 List the different alarm types 4.5 Underline the main features of Ericsson s Network traffic management (NTM) solution 4.6 Underline the Operation and Management system in WCDMA network 5 Hardware in the AXE system 5.1 Identify the hardware in the AXE system 5.2 Underline the hardware and mechanical structure of AXE 5.3 Underline the BYB 501 Packaging Structure 5.4 List equipments in the access network in general 5.5 Underline the two principles for digital switching 5.6 Understand how the synchronization is performed 5.7 Underline different synchronization methods 5.8 Identify the new hardware in AXE List the structure of the new GS890 in AXE Identify how switching is performed in AXE Identify the generic AXE magazine, GEM and GDM in APT Identify the different type of equipment connected to GS 5.13 Identify the procedure to update GS from previous AXE versions to GS Identify the ATM hardware implementation in the AXE system Commercial in Confidence

55 Page 55 6 AXE fixed network in general 6.1 Understand the network in general 6.2 Mention some PSTN and ISDN services 6.3 Explain how the basic traffic analysis functions in TCS are performed 6.4 Underline how the telecommunications services are analyzed 6.5 List the basic, call management, business support, CLASS and operator support services provided in PSTN 6.6 List the ISDN services: Bearer, Tele and supplementary services 6.7 List the basic call setup procedures in the TeS application 7 AXE architecture in mobile networks 7.1 Understand the architecture of cellular mobile networks 7.2 Name the development of cellular mobile communications 7.3 Identify Ericsson and AXE with regard to cellular mobile communications 7.4 Outline how Application modularity (AM) is implemented in AXE for digital mobile systems 7.5 Understand what is meant by the mobile core 7.6 List the different mobile systems 7.7 Relate in an overview level the WCDMA networks 7.8 Outline the function of the AXE server 7.9 Outline the MGW function of AXE 7.10 List the SIGTRAN implementation 8 Components and terms in the wireline network 8.1 List the basic terms for wireline networks 8.2 List different types of access 8.3 List ISDN access 8.4 List the V5.2 access 8.5 List the different TSS Solutions 8.6 List the general system structure of Ericsson Access Ramp. 8.7 Underline how the EAR is implemented 8.8 Understand the V5 access 8.9 Underline the Telephony Server 9 Services and features offered by business communications in AXE 9.1 List some of the advanced services and features offered by business communications in AXE 9.2 Describe the Business Group concept 9.3 Describe the management of business communications in AXE 9.4 Describe the Virtual private network (VPN) concept and outline how it is implemented in AXE 9.5 Describe the access methods to business communications in AXE 9.6 Describe the main functions of the Business communications manager (BCM) 9.7 Describe the service types offered by business communications in AXE 10 Intelligent network services and AXE 10.1 List the benefits of Intelligent network services 10.2 List the architecture of the Ericsson Intelligent network 10.3 Underline the fixed and mobile network convergence Commercial in Confidence

56 Page List examples of some intelligent network services 11 AXE in the packet switched architecture 11.1 List the AXE in the packet switched architecture 11.2 List the access network evolution 11.3 Explain the TSS evolution network 11.4 List the Telephony Server (TeS) applications 12 Mobile features in the AXE Systems 12.1 List examples of mobile features 13 Interworking funcionality 13.1 Underline the interworking functionality 13.2 List the interworking function s hardware and structure Target audience The target audience for this course is: System Technician, Service Technician, System Engineer, Service Engineer and/or Field Technician. Prerequisites The participants should have equivalent knowledge to the course GSM System Survey, LZU Duration and class size The length of the course is 3 days and the maximum number of participants is 16. Learning situation The course is based on instructor-led lessons and theoretical exercises in the classroom. Commercial in Confidence

57 Page 57 Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. For Mobile Network customers: Day Module Estimated time 1 1. Introduction to AXE System 1.5h 2. Signaling in AXE 1.5h 3. AXE Control System 2.0h Exercises 1.0h 2 4. AXE Operation & Maintenance & Management 2.5h 5. Hardware in AXE h Exercises 1.0h 3 7. AXE in Mobile 2.0h 10. AXE IN 1.0h 12. Mobile Features 1.0h 13. AXE Data calls 1.0h Exercises 1.0h For Fixed Network customers: Day Module Estimated time 1 1. Introduction to AXE System 1.5h 2. Signalling in AXE 1.5h 3. AXE Control System 2.0h Exercises 1.0h 2 4. AXE Operation & Maintenance & Management 2.5h 5. Hardware in AXE h Exercises 1.0h 3 6. Access and Traffic Handling 1.0h 8. AXE in Wireline Networks 1.0h 9. AXE and Business Application 1.0h 10. AXE IN 1.0h 11. AXE in Packet Switched Data 1.0h Exercises 1.0h Commercial in Confidence

58 Page 58 AXD Maintenance LZU R1A Description This course will teach students how to troubleshoot alarms, replace faulty hardware and perform system restarts on the AXD Learning objectives On completion of this course the participants will be able to: 1 Understand General Hardware Structure of the AXD Describe the general hardware structure of an AXD 301 switch 1.2 Describe the different subrack and board types 1.3 Describe the different equipment modules (ET s) 1.4 Describe the functions of the Switch Fabric 1.5 Describe the minimum configuration for each switch architecture 1.6 Outline the environmental requirements for the switch 1.7 Describe the Control System 2 Remove and replace faulty hardware 2.1 Describe the functions in the Equipment Management MFA 2.2 Create an EM 2.3 List information about the Hardware 2.4 Review Maintenance items 2.5 How to replace a board 3 Perform a backup and software upgrade 3.1 Describe the different types of software on the AXD Install, list and remove emergency corrections on the switch 3.3 Describe the software upgrade process 3.4 Perform a software upgrade on the switch using the AMS 3.5 Perform the activation of an optional delivery module 4 Troubleshoot events and alarms on the system 4.1 Understand how to handle alarms and events 4.2 Access the current alarm and event lists 4.3 Describe the attributes of the alarm and the event settings 4.4 Describe the external alarm administration 4.5 Understand some common alarms and events 5 Perform starts and restarts of the AXD Describe how to start and restart the AXD 301 System 5.2 Perform a system restart using the AMS 5.3 Carry out file synchronisation on the system 5.4 Power down and reboot the system Commercial in Confidence

59 Page 59 Target audience The target audience for this course is: System Technician, Field Engineer. Prerequisites Successful completion of the following courses: ATM Fundamentals FAB IP Networking LZU Duration and class size The length of the course is 1 day and the maximum number of participants is 8 Learning situation This course is based on theoretical and practical instructor-led lessons given in both classroom and in a technical environment using equipment and tools. Time schedule Day Topics in the course Estimated time 1 Module 1 Hardware Overview 2 hour Module 2 Hardware Maintenance 1 hour Module 3 Software Maintenance 1 hour Module 4 Event & Alarm Management 1 hour Module 5 System Starts & Restarts 1 hour Commercial in Confidence

60 Page 60 AXE ENABLER 1.0 DELTA Description LZU R2A The big challenge for an operator is to provide new services and functionalities, exceeding the subscribers expectations. The future proof network is knew as TSS Telephony SoftSwitch where the transport backbone is over IP or ATM. The new AXE Application System, ENABLER 1.0 enable the AXE to be used as Telephony Server or a traditional switch, according to the version, modern or classic. The Enabler 1.0 will increase the network performance, by the addition of new hardware and functionalities. This Delta course will describe all new functionalities and hardware introduced, giving and survey of the main differences between AXE Enabler and the previous application system Local 7.2/TL 4.2/TG 5.2. The instructor will share his experience with the students trough the theorectical and pratical exercises, and the studentts will have an oportunity to handle the new hardware as well as the main features Learning objectives On completion of this course the participants will be able to: Understand the differences between the modern and classic versions, describe the AXE Enabler 1.0 main applications. In addition, the paticipants will be able to handle the new hardware as well as the main features. 1. Describe the application system AXE Enabler Explain the HW compatibility 1.2. List the ISP improvements 1.3. Describe the main differences between Classic and Modern GAS 1.4. Briefly describe the system capacity 2. Identify the hardware supported 2.1. Describe the new HW platform AXE 810 (APZ , APZ and /33/33C, APG 40 APG 40 Win 2003, GS 890, RPG 3 and GARP Processor) 2.2. Define a Signaling Terminal based on RPG3 and the SS7 over IP based on GARP processor 3. List the features introduced and describe the main features 3.1. Define the MTP Point Code Mapping 3.2. Provide the subscriber with services and make test calls 3.3. Define the Carrier Selection 4. Describe the IPN bus 4.1. Configure the IPN bus 5. Explain the DBS function 5.1. Handle the DBS tables and table documentation available in Alex Library 6. Describe the Engine Integral Network 2.0 solution 6.1. Relate AXE Enabler 1.0 to EIN 2.0 Commercial in Confidence

61 Page 61 Target audience The target audience for this course is: Service Planning Engineers, Service Design Engineers, Network Design Engineers, Network Deployment Engineers, Service Deployment Engineers, System Technicians, Service Technicians, System Engineers, Service Engineers, Field Technicians, System Administrators, Application Developers, Business Developers, and Customer Care Administrators. This audience, external Customers and Ericsson personnel is responsible for implementation, installation, testing, network integration and support tasks on TSS Telephony SoftSwitch. Prerequisites The participants should be familiar with the AXE Local 7.2 Translocal 4.2 Application System or successful completion of the following course: Local 7 to Local7.2 Delta LZU (or equivalent) Duration and class size The length of the course is 3 days and the maximum number of participants is 8. Learning situation The course is based on instructor-led lessons and practical exercises in the classroom or via Centra. The practical exercises will be performed on a Simulated Environment AXE (SEA) or in an AXE. Commercial in Confidence

62 Page 62 Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Topics in the course Estimated time 1 Introduction and exercises 2 1 Hardware Description and exercises 4 2 New features and exercises 4,5 2 RPG3 and exercises 1,5 3 IPN BUS and exercises 2 3 DBS and exercises 2 3 EIN 2.0 and exercises 2 1 Introduction and exercises 2 Commercial in Confidence

63 Page 63 AXE 810 Configuration Delta LZU R4A Description The focus of this course is how to configure the new hardware in AXE810 (BYB ). It gives a theoretical survey of the main differences, on a high level, between BYB and the new hardware. Learning objectives On completion of this course the participants will be able to: 1 State the market for AXE based nodes in both fixed and mobile networks. 1.1 Define what AXE 810 is and what it is built-up of. 1.2 Account for the main benefits of AXE Account for the main highlights of AXE Account for the functionalities and characteristics of APZ , APZ C, APZ and APZ Explain the main Account for improvements in functionalities and characteristics for the main types of regional processors, such as RPP, RPG3, RPI and GARP. 3 Identify the main building blocks of the new APT hardware used in AXE Identify the main improvements regarding the group switch hardware. 3.2 Identify the main improvements regarding the echo cancellers, ET devices and Transcoders located in GEM subrack. 3.3 List the main changes of hardware located in GDM subrack. 4 Configure the group switch of AXE Configure SNTs connected to GEM, DLEB or GDM. 4.2 Configure device boards in GEM. 4.3 NNRP, explain how extensions to existing BYB nodes can be made. Target audience The target audience for this course are all technical personnel working with earlier AXE hardware releases BYB and 1.5. Examples are personnel working with Field Maintenance, Network Surveillance and Network Operation and Configuration. Commercial in Confidence

64 Page 64 Prerequisites The participants should be familiar with operation and configuration of AXE BYB Successful completion of any of the following courses will achieve this: LZU , AXE Hardware Maintenance. LZU , AXE Operation and Configuration. For GSM: LZU /2, GSM AXE Operation. For WCDMA: LZU /2, WCDMA AXE Operation. Duration and class size The length of the course is three days and the maximum number of participants is eight. Learning situation This course is based on theoretical and practical instructor-led lessons given in both classroom and in a technical environment using equipment and tools. Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Short description of the topics in the course Estimated time 1 Introduction APZ APT 2-3 Configuration Exercises, configuration of AXE h 14 h Commercial in Confidence

65 Page 65 AXD Configuration & Verification LZU R2A Description This course will teach participants about various components of the AXD 301 and it s management system. Participants will look at the management interfaces and security management and work with batch.jobs and log files. IP interfaces, SCTP, Routing Protocols (BGP, OSPF and IS-IS) will be configured. Queuing and scheduling mechanisms will also be duscussed. Learning objectives On completion of this course the participants will be able to: 1 Use the AXD Management system (AMS). 1.1 TSS 4.0 Overview 1.2 Understand where the AXD 301 fits in the network 1.3 Describe different solutions that use the AXD Examine traffic cases for TSS Configure different users in security management. 2.1 Connect to the operator s working environment 2.2 Use Locally connected Terminals (LCTs) for management operations 2.3 Configure an LCT for use with the AXD Management System (AMS) 2.4 Navigate the AMS Graphical User Interface (GUI) 2.5 Use the on-line documentation system 2.6 Understand the operations within Security MFA 2.7 Add new roles and new users 2.8 Describe the security Management for normal users 2.9 Define SSL Services 2.10 Define Authentication Control 3 Configure batch jobs and log files. 3.1 Set all the system data 3.2 View the Processor Resource Utilization 3.3 Create and execute batch jobs 3.4 View Log files 4 Create performance management reports. 4.1 Understand the Performance Management (PM) process 4.2 Understand the meaning of PM measurement type and PM measurement 4.3 Create new PM measurement types 4.4 Configure PM measurements 4.5 Configure the output of PM measurements reports Commercial in Confidence

66 Page 66 5 Show how the AXD 301 is used in networks 5.1 Voice Processing overview 5.2 Voice Processing features 5.3 Transcoder free IP-IP Transmit 5.4 Application Controlled Parameters 5.5 IP Voice Processing Service 6 Understand the principles of Voice Processing and how it is related to AXD Give an general overview of AXD 301 hardware and list rear and front boards 6.2 List new packet based interfaces and describe interface stack for IP based interfaces 6.3 Give short description of PoS and Ethernet Interfaces 7 Give an overview of the IP routing protocols OSPF, IS-IS, BGP, and Know how to define one of these interfaces on the AXD List some of the connections required for correct setup of AXD 301 in TSS 4.0 solution 7.2 Configuration IP interface and describe use of the access list 7.3 Describe PSC bandwidth allocation on IP interface and for what traffic purposes are different PSCs used in TSS Give short description of Routing Architecture as implemented in AXD List Nodes IP addresses and give short description of each 7.6 Describe Route Administration 7.7 List two types of Routing Tables in AXD 301and give short explanation (of functionality) of each 7.8 Give an short overview of Destination Analysis in AXD Give detailed description of Update of Destination Analysis Table via Static Routes 7.10 Give short description of IP Forwarding Control and its architecture 7.11 List four basic traffic cases in which AXD 301 takes part Describe use of the filtering and classification in AXD Discuss IP & Routing improvement in AXD release 8 Describe and define the differentiated services on the AXD Describe and configure OSPF 8.2 Describe TE OSPF 8.3 Describe IS-IS 8.4 Describe and configure both E-BGP and I-BGP 8.5 Understand use of communities 8.6 Understand Inter AS reference network solution with E-BGP/I-BGP and describe how is Destination Analysis Table populated in this case 9 Look at how Buffering, Scheduling, Resource Management, IP QoS is achieved in the AXD Describe IP resources Management 9.2 Describe bandwidth reservation for IP interface 9.3 Understand resource management on Switch Core Interface 9.4 Describe IP Buffering mechanisms on ingress and egress interfaces 9.5 Give an overview of IP Scheduling and Congestion mechanisms on ingress and egress interfaces Target audience Commercial in Confidence

67 Page 67 The target audience for this course is: System Engineers and Service Engineers. The audience for this course is Ericsson customers and employees working with implementation, installation, testing, integration, operation and support tasks on the AXD 301. Prerequisites The participants should be familiar with ATM and IP or successful completion of the following courses: AXD Maintenance ILT LZU IP Networking ILT LZU Duration and class size The length of the course is 3 days and the maximum number of participants is 8. Learning situation This course is based on theoretical and practical instructor-led lessons given in both classroom and in a technical environment using equipment and tools. Commercial in Confidence

68 Page 68 Time schedule Day Topics in the course Estimated time 1 Introduction 0.5 hours 1 Chapter 1 Introduction to TSS hour 1 Chapter 2 Management and Security 2 hours 1 Chapter 3 System Administration 1.5 hours 1 Chapter 4 Performance Management 1 hours 2 Chapter 5 Voice Processing Architecture 1 hours 2 Chapter 6 Interface Boards 2 hours 2 Chapter 7 Addressing, Routing and Forwarding 3 hour 3 Chapter 8 Routing Protocols 4 hours 3 Chapter 9 - Buffering, Scheduling, Resource Management, IP QoS 1.5 hours 3 Summary of the course 0.5 hours Commercial in Confidence

69 Page 69 Core Networks, An Overview LZU R2A Description Upon completion of this course, you will have acquired the knowledge to describe the technologies in the core networks, core network architecture and network operation and maintenance. Learning objectives 1 Describe the technologies in the core network as found in the system release documentation 1.1 Explain how a physical network is built 1.2 Outline different types of multiplexing (TDM and WDM) 1.3 Describe transmission technologies such as SDH and SONET 1.4 Describe optical ring architecture and the basics of ATM and MPLS 2 Define core network architectures 2.1 Understand traffic trends and outline multiservice backbone requirements 2.2 Explain resource allocation and quality of service 2.3 Outline performance optimization 2.4 Define IPSec and VPN technology 3 Outline the main principles of network operation and maintenance 3.1 Outline the steps involved in network operation 3.2 Explain network traffic and outline some network traffic situations 3.3 Explain monitoring using SNMP and PING 3.4 Define steps and routines for error handling Target audience The target audience for this course is: Service Planning Engineers, Service Design Engineers, Network Design Engineers, Network Deployment Engineers, Service Deployment Engineers, System Technicians, Service Technicians, System Engineers, Service Engineers, Field Technicians, System Administrators, Application Developers. Prerequisites The participants should be familiar with IP Network Applications WBL, LZU Commercial in Confidence

70 Page 70 Duration and class size The length of the course is 3 hours. Learning situation This is a web-based interactive training course with multimedia content. Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Topics in the course Estimated time 1 Technologies in the Core Network 1 hour Core Network Architecture 1 hour Network Operation and Maintenance 1 hour Commercial in Confidence

71 Page 71 ENGINE Access Ramp Introduction LZU R3A Description This course is to designed to provide both customers and Ericsson employees with an overview of the ENGINE Access Ramp product including the services it provides, its components and its role in the future. The course is theory only with an option for a practical demonstration of the hardware in a network environment depending on equipment availability. Learning objectives On completion of this course the participants will be able to: 1 Outline the role of ENGINE Access Ramp in the ENGINE concept. 2 List the services offered by ENGINE Access Ramp. 3 Describe the components of ENGINE Access Ramp. 4 Describe possible network configurations and product packages. 5 Identify how management is carried out in the access network. Target audience The target audience for this course is Ericsson personnel and external customers working with implementation, installation, testing, sales and marketing, network integration and support tasks on ENGINE Access Ramp. Also anyone requiring an overview of the ENGINE Access Ramp product. Prerequisites The participants should be familiar with basic telecom concepts. Duration and class size The length of the course is 1 day and the maximum number of participants is 16. Commercial in Confidence

72 Page 72 Learning situation The course is designed for instructor-led training with theoretical exercises in the classroom. If possible the students should be able to see an ENGINE Access Ramp. Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. (This paragraph is mandatory). Day Topics in the course Estimated time 1 Introduction to the course 15 minutes Introduction to the ENGINE and ENGINE Access Ramp 15 minutes The services provided by ENGINE Access Ramp 15 minutes The hardware structure of the ENGINE Access Ramp 15 minutes The access equipment, interfaces and protocols used 15 minutes The different variants of ENGINE Access Ramp 15 minutes The subracks and board types of the MUS-NBA variant 45 minutes The subracks and board types of the ASM variant 30 minutes The outdoor solutions of the ENGINE Access Ramp 15 minutes The configurations of the ENGINE Access Ramp cabinets 15 minutes Conclusion of the course 15 minutes Commercial in Confidence

73 Page 73 ENGINE Access Ramp O & M for AXE Application LZU R2A Description This course is a modular learning product on how to perform Operation & Maintenance activities on an ENGINE Access Ramp for AXE application. At the end of the course the student will be able to perform O&M activities on an AXE connected ENGINE Access Ramp. Learning Objectives 1 After the course the student will be able to understand and explain: 2 The general system structure of the ENGINE Access Ramp for AXE, its units and their basic functions 3 The HW building practice. 4 The different signalling interfaces used and how V5 is used in ENGINE Access Ramp 5 The difference between the ENGINE Access Ramp for AXE application and the ENGINE Access Ramp for V5.2 interface. 6 The connection of the bearer networks PSTN, ISDN-BA, their characteristics and the services they carry. 7 Verify control signalling on the CSP and the signalling on thev5.1 and TAU channels 8 Check the states of the signalling links, EMRPS, DIPs, devices and Plug-in Units 9 Verify the complete configuration of an existing MACCG / EMG 10 Define a new AU PSTN in an existing Network Node, connect subscribers and take those into service 11 Define a new AU ISDN in an existing Network Node, connect subscribers and take those into service 12 Test the subscriber lines 13 Check for alarms and take correct actions 14 The connection of the bearer networks ISDN-PRAA and external V5.1 and V5.2SL, to the ENGINE Access Ramp. 15 The HW units of the TAU and their main uses 16 The different buses and cabling of the TAU and their uses. 17 The main software blocks used by TAU, including the blocks for the different TAU applications. 18 How to define a TAU, including the subrack group it controls and the corresponding cabling. 19 How to perform a function change of an AU or TAU load module from opto disk to the AU/TAU. 20 Carry out a function change of load module for a plug-in unit, from the IOG20 to the plug-in unit (AU or TAU). 21 If time permits, the students can also define a new ENGINE Access Ramp EMG, in data, as an extra exercise. Commercial in Confidence

74 Page 74 Target Audience Operation and maintenance staff working with ENGINE Access Ramp for AXE application. Prerequisites The students should have experience of Operation and Maintenance activities on an AXE Local Exchange. Duration and class size The length of the course is 3 days and the maximum number of participants is 8. Learning situation Theoretical lessons/exercises and practical study cases Commercial in Confidence

75 Page 75 ENGINE Integral 3.1 to TSS 4.0 Integration & Verification Delta Description LZU R3A This course will give the participant practical knowledge about the integration and configuration differences between EIN 3.1 and TSS 4.0 FP1 Learning objectives On completion of this course the participants will be able: 1 Describe the HW and SW implementation of TSS 4.0 FP Explain the difference between EIN 3.1 and TSS 4.0 FP1 hardware and functionality. 2 Understand the TSS 4.0 FP1 HW & SW Implementation 2.1 Understand the HW and SW required for the TeS and the MGW when implementing TSS 4.0 FP1 (Both AXD & Integrated Site) 3 Describe the Traffic Handling 3.1 Explain how the server addresses physical resources in MGWs. 3.2 Explain the protocol stacks involved in TSS 4.0 FP1 3.3 Describe the basic traffic cases in TSS 4.0 FP1 3.4 Describe signaling sequences at basic call setup and release. 3.5 Explain how different codec s affect the bandwidth utilization in the core network. 4 Perform the TCC TGC Communication configurations 4.1 Explain the function of the TCC TGC control interface. 4.2 Become familiar with the application protocols and protocol stack used over this interface. 4.3 Configure the control interface using the IPN and GESB 4.4 Verify the interface. 5 Perform the TGC and MGW-IC Configuration 5.1 Define TGC and MGW-IC. 5.2 Configure and verify the IC interface. 5.3 Configure and verify H.248 signaling links. 6 Configure the Virtual MGW 6.1 Configure and verify VMGW in a MGW Blade system. 6.2 Configure and verify H.248 signaling links. 6.3 Configure and verify the different dev types in the VMGW. 7 Perform the BICC Configuration 7.1 Configure and verify a BICC interface between two Telephony servers. Commercial in Confidence

76 Page Monitor the BICC messages using TCC commands. 8 Configure SIP and SIP-T signaling interfaces 8.1 Configure and verify a SIP interface. 8.2 Configure and verify a SIP-T interface. 9 Configure H.323 signaling interfaces 9.1 Configure and verify a H.323 interface in the TeS towards a VoIP network. 10 Make a Call Path Tracing in TSS 10.1 Perform call path tracing in the TCC, TGC, and MGW. 11 Understand the Access gateway configuration 11.1 Introduction to the AGC (Access Gateway Controller) Understand how to configure a MSAN in the TSS 4.0 FP1 network. 12 Introduce the IMS, DNS and ENUM concepts in TSS 4.0 Network 12.1 Explain how the TSS 4.0 is used as PSTN GW in the IMT Network Outline the main components and signaling interfaces used in the IMT TSS PSTN Gateway Network Understand the different concepts and terms used in IMT PSTN Gateway Understand DNS/ENUM (IP Works) and show how it is connected to TSS. 13 Describe the Geographic Redundancy TSS Explain the Geographic Redundancy for TSS 4.0 concept 13.2 Detail the TSS 4.0 n+1 solution Target audience The target audience for this course is: System Engineer, Network Deployment Engineer. This audience is working with implementation, installation, testing, integration, operation and support tasks on TSS 4.0 Prerequisites The participants should have successfully completed of the following courses: Engine Integral 3.1 Integration and Verification LZU R2A and Integrated Site Overview (this course is on IS1.2) LZU R4B IS Operation and Configuration (this course is on IS1.2) LZU R2B IS MGw 1.2 Operation and Configuration LZU R1A or Integrated Site 2.0 Overview LZU R1B Commercial in Confidence

77 Page 77 Integrated Site 2.0 Operation and Configuration and IS MGw 2.0 Operation and Configuration LZU R1B LZU R1A Duration and class size The length of the course is 3 days and the maximum number of participants is 8. Learning situation This course is based on theoretical and practical instructor-led lessons given in both classroom and in a technical environment using equipment and tools, which could be accessed remotely. Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Topics in the course Estimated time 1-3 Delta theory and exercises 18 h Commercial in Confidence

78 Page 78 Ericsson Analyzer Workshop LZU R1A Description The Ericsson Analyzer operation workshop is intended to train the students in the concept of Ericsson s performance management system, Ericsson Analyzer, and in how to use the Analyzer applications. The system concept will be presented from an end user s point of view. Learning objectives On completion of this course the participants will be able to: 1. Describe the overall structure and components of the MN-OSS system. 2. Handle Authority Administration in the OSS system for Analyzer users. 3. Know how to setup performance measurements in AXE/AXD/IMT nodes. 4. Explain the overall file system layout and the filestores from AXE/AXD/IMT nodes. 5. Manage the Analyzer processes and error logs. 6. Be able to schedule Reports either via web GUI or using Launchpad. 7. Be able to troubleshoot end-to-end when data is missing in the reports. Target audience The target audience for this course is: Service Planning Engineers, Service Design Engineers, Network Design Engineers. Prerequisites The participants should have successfully completed of the following courses: MN-OSS Operation for TSS LZU Commercial in Confidence

79 Page 79 AXD Configuration & Verification LZU AXE O&C LZU (or equivalent knowledge) AXD301 C&V training LZU (or equivalent knowledge) Duration and class size The length of the course is 5 days and the maximum number of participants is 8. Learning situation This is a workshop based on interactive training sessions in a technical environment using equipment and tools Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Topics in the course Estimated time 1-5 Theory and exercises 30 h Commercial in Confidence

80 Page 80 Error! Unknown document property name. Error! Unknown document property name. Error! Unknown document property name. Description With the increasing number of statistical data generated by the 3G Technology (WCDMA) and the Service Layer (IMS), you will need to understand what the new Ericsson Performance Management (ENIQ) is, and what it replaces (SDM). You will also want to know how it can support other technologies. This course is intended for users who are new to ENIQ, but are familiar with Performance Management (PM) for RAN and Core. It describes the functionalities of ENIQ, how it brings value to your business, and how it differs from the previous solutions. There is a ENIQ Web Portal demonstration which will introduce you to the efficiency and effectiveness of ENIQ. Learning objectives On completion of this course the participants will be able to: 1 Discuss the fundamental concepts involved in ENIQ 1.1 Identify the reasons why ENIQ was introduced 1.2 Recognise the relationship between the ENIQ components 1.3 Underline the degree of integration between ENIQ and OSS-RC 2 Describe the Ericsson Network IQ Performance Management Solution 2.1 Name the advantages of Sybase IQ over alternative types of databases 2.2 Describe the possible network configurations 2.3 Explore the Customer Documentation to identify which technologies are supported by ENIQ 3 Illustrate the features and functionalities of ENIQ 3.1 Describe in ones own words how the data reaches the reports 3.2 Clarify the data aggregation principles 3.3 Compare ENIQ with SDM 4 Demonstrate the end-to-end PM solution 4.1 Research the CPI for report definitions 4.2 Explain the basic types of counters that can be collected 4.3 Underline the main OSS-RC mediation systems 4.4 Restate the data workflow and recall it when troubleshooting report generation Commercial in Confidence

81 Page 81 Target audience The target audience for this course is: Management team, Sales Team, System Technicians, System Engineers, Field Technicians and anyone who works with PM and needs to be familiar with the ENIQ solution. Prerequisites Successful completion of the following courses: CORE, GRAN or WCDMA Network Fundamentals. Students must also be familiar with Core, GRAN or WCDMA Performance Management Duration and class size The length of the course is 1 day and the maximum number of participants is 16. Learning situation This course is based on instructor led lessons and demonstrations. Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Topics in the course Estimated time 1 ENIQ Fundamentals 1 hour Technical Background 1.5 hours ENIQ Concepts 1.5 hours Performance Management 1.5 hours Demonstration of Web Portal 0.5 hours Commercial in Confidence

82 Page 82 Error! Unknown document property name. LZN Error! Unknown document property name. Description Can you imagine watching digital TV on a black-and-white TV Set, without a remote control to zap between the thousands of chanels? That is the feeling you will have if you do not match the increasing complexity of statistical output of your Network (UTRAN, GRAN, Core, IMS, non-ericsson vendors, etc). You are familiar with Performance Management (PM), you already use reports to better monitor the performance of you network. So you know that the number of counters available is increasing exponentially, and current systems cannot cope with that amount of data. Ericsson Network IQ (ENIQ) is your Ericsson solution to enable you to handle the complexity of your Radio Access and Core Network. It can handle multiple other technologies and multiple different vendors too. It is fully integrated to OSS-RC but it can be used as a standalone solution too. It is as flexible as you need it to be. This course is intended for users who are new to ENIQ, but are familiar with Performance Management. It describes the functionalities of ENIQ, and the main Business Objects operations you will need to carry out. It provides for a lot of practical exercises too. Learning objectives On completion of this course the participants will be able to: 1 Manage BO applications, reports and users 1.1 Identify the various BO applications relevant to ENIQ 1.2 Manage access (users, documents, reports) 1.3 Migrate previous reports 1.4 Refer to support documentation 2 Perform the reporting operations using the Web Portal 2.1 Navigate the Web Portal interface 2.2 Run a report 2.3 Exploit the output 2.4 Publish a reports in a folder and to categories 2.5 Create a report set 2.6 Configure the Web Portal to improve operations 3 Practice the reporting operations using the Web Intelligence Rich Client 3.1 Navigate the Web Intelligence Rich Client interface 3.2 Run a report 3.3 Create a basic report from an existing data source 3.4 Use report objects and conditions 3.5 Manage report instances 3.6 Schedule a report 4 Design an ad-hoc report 4.1 Customize a report Commercial in Confidence

83 Page Filter a query 4.3 Create once-off operational KPI s at report level 4.4 Manage objects 4.5 Navigate the Business Objects Designer interface 4.6 Use linked universes 4.7 Create customer reports based on product reports 4.8 Recognize the need to optimize report definition and design 5 Customize and improve reports 5.1 Use formats and templates 5.2 Customize the header 5.3 Highlight thresholds using alerters 5.4 Manipulate tables and charts 5.5 Enhance the data presentation by breaking down the output 6 Define more complex reports 6.1 Work with conditions 6.2 Explain the universe structure 6.3 Use aggregations 6.4 Work with multiple data providers 6.5 Handle counters with special aggregation or resolution characteristics 7 Set up statistical alarms 7.1 Clarify the workflow relating to performance alarm generation 7.2 Recognize the different types of templates, and when to use them 7.3 Create a defined alarm type, using the Web Intelligence Rich Client 7.4 Activate a defined alarm type, using the Web Portal 8 Discuss the steps to follow before seeking assistance 8.1 Determine who is responsible to deal with what challenge 8.2 Gather relevant information 8.3 Escalate the issue after having documented the steps taken to identify and resolve the issue Target audience The target audience for this course is: System Technicians, System Engineers, Field Technicians and anyone who works with WCDMA PM and needs to be familiar with the ENIQ solution Prerequisites Successful completion of the following courses: Ericsson Network IQ 2 Overview, or extensive ENIQ experience. Successful completion of the following courses: Core, GRAN, or WCDMA Network Fundamentals Be familiar with Core GRAN, or WCDMA Performance Management Commercial in Confidence

84 Page 84 Duration and class size The length of the course is 3 days and the maximum number of participants is 8. Learning situation The course is based on instructor-led lessons, demonstrations and hands-on exercises. The exercises are mainly case oriented where the participant is expected to investigate applications. Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Topics in the course Estimated time 1 Introduction and pre-test Report management basics 1.1 BO applications 1.2 User management 1.3 Document management 1.4 Universe management 1.5 Import BO 6.5 reports 1.6 Convert reports (Deski to Webi) 1.7 Post processing 1.8 Help and documentation 2 ENIQ Web Portal reporting 2.1 Interface 2.2 Generate a report 2.3 Export the output 2.4 Save the output 2.5 Share the output 2.6 Publish a report (save) 2.7 Create report sets and groups 2.8 End-user configuration Commercial in Confidence

85 Page Web Intelligence Rich Client reporting foundations 3.1 Interface 3.2 Retrieve a report (import, open) 3.3 Generate a report 3.4 Create a report, outline 3.5 Query manager 3.6 Use object dimensions 3.7 Use measures 3.8 Use time dimensions 3.9 Use busy hours 3.10 Use pre-defined conditions to filter the query 3.11 Save reports 3.12 Share reports 3.13 Publish a report (folder, category) 3.14 Schedule a report 3.15 Manage reports and instances 4 Report design 4.1 Report definition and structure 4.2 View a report s structure 4.3 Customize a report s design 4.4 Customize a report s definition 4.5 Use variables to create KPI s 4.6 Universe designer 4.7 Universe parameters 4.8 Universe objects 4.9 Universe classes 4.10 Universe variables 4.11 Universe conditions 4.12 Create a linked universe 4.13 Check a link universe (parameters, connection) 4.14 Published a linked universe 4.15 Customer reports based on product reports 4.16 Customize a universe 4.17 Report optimization 5 Further report design 5.1 Modify options 5.2 Customize format 5.3 Manage alerters 5.4 Edit the report header 5.5 Use details in report (e.g., title) 5.6 Manipulate tables structure 5.7 Work with charts 5.8 Sort data 5.9 Rank data 5.10 Insert calculations 5.11 Sections and breaks 5.12 Report filters Commercial in Confidence

86 Page 86 6 Advanced report definition Quick filters 6.2 Optional prompts 6.3 Relational operators in conditions 6.4 Universe structure 6.5 Reference tables 6.6 Fact tables 6.7 Joins 6.8 Aggregation awareness 6.9 Manage multiple input contexts 6.10 Manage multiple data providers 6.11 Multiple object/time report resolutions 6.12 Multiple object/time report aggregations 6.13 Report on vector counters 7 Alarm module Definitions 7.2 Workflow 7.3 Define an alarm type 7.4 Activate a defined alarm type 7.5 Limitations 8 First line troubleshooting Responsibilities 8.2 ENIQ administration 8.3 Troubleshooting steps 3 Conclusion and post-test 0.5 Commercial in Confidence

87 Page 87 Error! Unknown document property name. LZU Error! Unknown document property name. Description Ericsson Network IQ (ENIQ) does not need to be administered. That is mostly true of the ENIQ database itself, but as an overall system it still needs to be managed. This course is for anyone responsible for the administration of the Ericsson Network IQ System. It will focus on the daily, weekly and monthly task to be performed by an ENIQ System Administrator. It will also give a larger perspective by experiencing the reporting aspect of ENIQ, and by looking at what happens behind the scene to make ENIQ a futureproof performance management solution. Note: This course will detail the administration of ENIQ; it does not deal with specific counter values or KPI s interpretation, this is covered in the corresponding PM course. It is not a substitute for OSS-RC System Administration, Business Objects or Sybase training if you are involved in developing reports or advanced System Administration. Learning objectives On completion of this course the participants will be able to: 1 Experience end-to-end PM reporting solution 1.1 Explore performance management tools in ENIQ 1.2 Run a report on Web Portal 1.3 Create a report in Web Intelligence Rich Client 2 Discuss the system specifications 2.1 Identify the possible hardware configurations 2.2 List the main steps involved in installing ENIQ 2.3 Identify the software requirements 2.4 Refer to the ENIQ to OSS-RC integration components 3 Perform system maintenance tasks 3.1 Remember the Shutdown/Start-up sequence for the different systems 3.2 Perform the required User Maintenance tasks 3.3 Maintain and healthy System, and a consistent File System 3.4 Outline the principles of backup management 3.5 Investigate Alarm Management further 4 Analyze the data workflow 4.1 Browse the directory structure 4.2 Manually upload data 4.3 Manage the Sets 4.4 Monitor the data loading 4.5 Monitor the data aggregations and initiate data re-aggregation 5 Examine the structure of the Sybase IQ database 5.1 Correlate what is known of data partitioning with the actual tables and views Commercial in Confidence

88 Page Recognize the connection between the Business Object SQL statements and the stored data 5.3 Query the database using SQL GUI s or CLI 6 Practice the administration tasks and experience the tools 6.1 Execute day to day administration tasks such as; System status, Dataflow monitoring, Follow-up day aggregations, System memory, Incremental backup 6.2 Perform some of the weekly administration tasks such as; IQ PM database Full backup, Check the disk spaces, Follow-up week aggregations 6.3 Plan the monthly administration tasks, including the follow-up month aggregations 7 Discover technology packages 7.1 Make the connection between the creation of a Tech Pack, and the administration of ENIQ 7.2 Manage ENIQ licenses 7.3 Implement universe customization using a linked universe 7.4 Map counters from previous systems (e.g., SDM) 8 Diagnose reporting issues and perform basic troubleshooting 8.1 Determine who is responsible to deal with what challenge, especially as regards Report Developers queries 8.2 Recall the known issues and troubleshoot them Target audience The target audience for this course is: System Administrators Prerequisites Successful completion of the following courses: Ericsson Network IQ Overview, or extensive ENIQ experience. Successful completion of the following courses: Core, GRAN, or WCDMA Network Fundamentals Be familiar with Core GRAN, or WCDMA Performance Management IP Fundamentals Intermediate System Administration for the Solaris 10 operating System 3PP Sun Advanced System Administration for the Solaris 10 operating System 3PP Sun Duration and class size The length of the course is 4 days and the maximum number of participants is 8. Learning situation The course is based on instructor-led lessons, demonstrations and hands-on exercises. The exercises are mainly case oriented where the participant is expected to investigate applications. Commercial in Confidence

89 Page 89 Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Topics in the course Estimated time 1 Introduction and pre-test PM reporting System specifications System maintenance and 3 3 and 4 Data workflow 4.0 Database structure Administrator s tasks and tools Tech packs management Troubleshooting Conclusion and post-test 0.5 Commercial in Confidence

90 Page 90 Error! Unknown document property name. LZN Error! Unknown document property name. Description You are impressed with the ENIQ performance management. You are now acquainted with the ENIQ Operation using product reports, but sometimes you feel lost with the comprehensiveness of this new Performance Management solution. You know ENIQ is an improvement on the previous solutions, in terms of performance and capacity, but you were used to the old ways, with the old reports. You feel some reports are missing, some information seems to no be available, and you do not know where to start. ENIQ Overview and ENIQ Operation trainings were aimed at developing your competency in using ENIQ from scratch. This ENIQ Migration Workshop will guide you in the process of mapping your existing reports to ensure all your information is taken into account. It will be based on a migration from SDM to ENIQ as a use case, but will provide you with techniques to perform migrations from other systems. It will also demonstrate some of the most common pitfalls in migrating your reports, in order to retain as much backward compatibility as possible. At this stage the conceptual; differences between your previous PM solution and ENIQ will become clearer. Finally it will train you in the use of the Alarm Module, to allow you to raise alarms automatically when certain Performance Management thresholds are reached. At the end of this course you will be able to migrate yourself reports of low to medium complexity, and you will be able to prepare and monitor the migration of more complex reports if you require Ericsson to take care of them as a service. Note: This course does not deal with specific counter values or KPI s interpretation, this is covered in the corresponding PM course. It is not a substitute for Business Objects training if you are involved in developing reports. Commercial in Confidence

91 Page 91 Learning objectives On completion of this course the participants will be able to: 1 Map SDM report objects to ENIQ objects 1.1 Inventory counter objects from reports 1.2 Identify the BO Universe objects or SQL queries objects 1.3 Trace the Universe back the node level counters 1.4 Ensure the counters are collected from the nodes 1.5 Match the counters back to the ENIQ BO Universes 2 Migrate a simple report 2.1 Agree on complexity criteria 2.2 Identify reports qualifying for migration 2.3 Migrate a Deski (*.rep) report to the Webi format (*.wid) 2.4 Re-use the mapping techniques 3 Customize a migrated report 3.1 Create charts 3.2 View and edit formulas 3.3 Sort and filter reports 3.4 Customize complex layouts 3.5 Publish a report 4 Implement backward compatibility 4.1 Explore the BO Universe structure 4.2 Manage prompts, and select the time or object resolution 4.3 Create or modify report conditions for scheduling 4.4 Create multiple Data Providers when using multiple tables 4.5 Use common dimensions in different "contexts" 4.6 Create and edit a customized (linked) BO Universes 4.7 Manage Cell Sets/Area functionality 4.8 Emulate the delta calculation of Incremental Counters 4.9 Work with vector counters (PDF and DDM) 4.10 Implement differential time and group aggregation 5 Create a performance related alarm using the Alarm module 5.1 Define an Alarm type from a template 5.2 Use simple or complex KPI depending on the Technology 5.3 Schedule the Alarm 5.4 View the Alarms in the Web Portal Target audience System Technicians, System Engineers, Field Technicians and anyone who works with network Performance Management and needs to be familiar with the ENIQ solution. Prerequisites Successful completion of the following courses: Ericsson Network IQ 2 Overview training, or extensive ENIQ 2 experience Ericsson Network IQ 2 Operation training, or extensive ENIQ 2 experience Commercial in Confidence

92 Page 92 Successful completion of the following courses: Core, GRAN, or WCDMA (or other relevant managed networks) Network Fundamentals Be familiar with Core, GRAN, or WCDMA (or other relevant managed networks) Performance Management Duration and class size The length of the course is 3 days and the maximum number of participants is 8. Learning situation The course is based on workshop activities, demonstrations and hands-on exercises. The exercises are mainly case oriented where the participant is expected to investigate applications. Commercial in Confidence

93 Page 93 Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Topics in the course Estimated time 1 Review the configuration of the OSS-RC mediation systems 2.0 hours according to CPI specifications 1 Map SDM report objects to ENIQ objects 3.0 hours 1, 2 Migrate a simple report 3.0 hours 2 Migrate a customized report, or a non-sdm report 4.0 hours 3 Practice ways of working to obtain backward compatible 4.0 hours functionalities 3 Create a performance related alarm using the Alarm module 2.0 hours Commercial in Confidence

94 Page 94 Error! Unknown document property name. Error! Unknown document property name. Error! Unknown document property name. Description This course provides the patricipants the competence needed to configure the Integrated Site networking part. It is covering the IP network configuration for the Telephony Soft-switch (TSS 4.0) Feature Package 1 solution. IP network configuration is vital part of the modern IP and Telecom networks. Existing solutions are migrating to All IP taking advantages of the capacity and features of the network elements such are routers and switches. Ericsson s Integrated Site is a concept for IP based solution. This course exploits the networking possibilities provided by the IS. This course will teach participants about configuration of the IP protocols used to connect the Integrated Site to the IP Backbone. The Dynamic routing protocols like BGP, OSPF, RIP, IS-IS will be configured. IP Network interfaces will be configured and verified. The resiliency and DiffServ possibilities will be explored. Learning objectives On completion of this course the participants will be able to: 1 List the IS networking possibilities as used in TSS 4.0 FP1 network solution 1.1 Describe the TSS 4.0 network nodes and position the ISER and L3X 1.2 Describe ISER hardware and software architecture 1.3 Explain the dual stack option supported by IS 1.4 Describe the basic IP networking concepts 2 Describe the network interfaces in IS 2.1 Describe the ISER Interfaces 2.2 Configure all interface types in ISER 3 Describe the dynamic routing protocols implemented in the IS Edge Router 3.1 Provide an overview of the routing functionality 3.2 Describe and configure OSPF, BGP, ISIS and RIP 4 Describe the resiliency IS networking 4.1 Provide an overview of the Resiliency function 4.2 Describe and configure VRRP, BFD and Object Tracking 5 Explain how IPSec Function in implemented in IS Commercial in Confidence

95 Page Provide an overview of the IPSec function 5.2 Describe and configure the IKE and IPSec 6 Describe the QoS and traffic differentiation in IS 6.1 Provide an overview of the QoS function 6.2 Describe and configure the Traffic Classes and QoS Target audience The target audience for this course is: System Engineer, Network Deployment Engineer. This audience is working with implementation, installation, testing, integration, operation and support tasks on TSS 4.0 FP1 or similar solution using IS 2.0. Prerequisites Successful completion of the following courses: IP Networking IS Operation and Configuration or Integrated Site 2.0 Operation and Configuration LZU R5A LZU R2B LZU R1B Duration and class size The length of the course is 2 days and the maximum number of participants is 8. Learning situation This course is based on theoretical and practical instructor-led lessons given in both classroom and in a technical environment using equipment and tools. Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate.. Commercial in Confidence

96 Page 96 Day Topics in the course Estimated time 1 Introduction, Delta from previous release Network Interfaces in IS Dynamic Routing Exercises 1.5 hours 0.5 hour 1.5 hours 2.5 hours 2 Resiliency IPSec and DiffServ Exercises 0.5 hour 0.5 hour 5.0 hours Commercial in Confidence

97 Page 97 IP Networking and Internetworking LZU R2A Description If you need to have an understanding of the principles of IP networking and internetworking, then this three hour course will provide you with the information you need. This course covers the basics of IP addresses, internet domains, how IP packets are sent using routers to details on routing protocols and utilities used to get information on the network. Learning objectives 1 Describe the basic concepts of IP networking 1.1 Define virtual address and explain communication between networks 1.2 Outline the difference between IPv4 and IPv6 addressing 1.3 Outline how to configure the hosts in LAN (IP address, subnet mask, default gateway) 1.4 Understand Internet domains and how the Domain Name System works 1.5 Describe how to leave the local network using a Router 1 Describe the basic concepts of IP internetworking 1.1 Describe the Internet (transit, regional and ISP networks) 1.2 Understand routing domains and usage of two routing protocols (RIP and OSPF) 1.3 Discover networks using two useful utilities PING and Traceroute Target audience The target audience for this course is: Service Planning Engineers, Service Design Engineers, Network Design Engineers, Network Deployment Engineers, Service Deployment Engineers, System Technicians, Service Technicians, System Engineers, Service Engineers, Field Technicians, System Administrators, Application Developers, Business Developers. Prerequisites The participants should be familiar with Networking and Ethernet Standards, LZU Duration and class size The length of the course is 3 hours. Commercial in Confidence

98 Page 98 Learning situation This is a web-based interactive training course with multimedia content. Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Topics in the course Estimated time 1 IP Networking 1 hour 30 mins IP Internetworking 1 hour 30 mins Commercial in Confidence

99 Page 99 IP Network Applications LZU R2A Description This course is recommended for anyone who needs a basic introduction to IP network applications and TCP/IP data communications. Learning objectives 1 Describe network fundamentals and describe IP network applications 1.1 Explain how Internet applications are addressed in a data packet 1.1 Understand application models (Client/Server and Peer-to-Peer) 1.2 Describe how a Web browser works 1.3 Explain Web architecture and connecting to a Web server 1.4 Explain how to send and receive Internet and outline the protocols used 1.5 Outline IP telephony architecture 2 Explain the TCP/IP data communications architecture 2.1 Describe TCP/IP layered approach to networking 2.2 List the layers in the TCP/IP protocol stack 2.3 List the Internet organizations (ISOC, IETF and ICANN) 2.4 Explain IP addressing and routing and some important fields in an IP packet 2.5 Outline how the Transmission Control Protocol (TCP) works 3 Explain the TCP/IP data communications architecture 3.1 Describe TCP/IP layered approach to networking 3.2 List the layers in the TCP/IP protocol stack 3.3 List the Internet organizations (ISOC, IETF and ICANN) 3.4 Explain IP addressing and routing and some important fields in an IP packet 3.5 Outline how the Transmission Control Protocol (TCP) works Target audience The target audience for this course is: Service Planning Engineers, Service Design Engineers, Network Design Engineers, Network Deployment Engineers, Service Deployment Engineers, System Technicians, Service Technicians, System Engineers, Service Engineers, Field Technicians, System Administrators, Application Developers, Business Developers. Prerequisites The participants should be familiar with IP Networking and Internetworking WBL, LZU Commercial in Confidence

100 Page 100 Duration and class size The length of the course is 3 hours. Learning situation This is a web-based interactive training course with multimedia content. Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Topics in the course Estimated time 1 Using the Network: IP Network Applications 1 hour 30 mins TCP/IP Data Communications Architecture 1 hour 30 mins Commercial in Confidence

101 Page 101 IP Networking LZU R5A Description This course will give the students an insight and understanding of the TCP / IP protocol stack from the physical layer to the application layer. The students will learn the operation of different protocols and applications within the TCP / IP suite such DHCP, DNS, NFS, NIS, NTP, HTTP, SMNP, SMTP, Telnet, FTP, TFTP and RTP. Students will learn about IP addresses, both classful and classless (CIDR) and how subnetting / aggregation and VLSM operates. Students will learn about different network devices and will get a detailed understanding of LAN Switching, Routing and Routing protocols. The hands-on exercises and analysers are used to facilitate the understanding of theory sessions. Learning objectives On completion of each module the participants will be able to: 1 List and describe the IP networking including the involved Bodies. 1.1 List the functions of the different bodies involved in IP standards / RFCs. 1.2 Analyze the OSI reference model and how it relates to the TCP / IP stack. 1.3 Explain Ethernet as Physical and Data Link Layer: MAC Address, CSMA/CD principles, 1.4 Fast Ethernet, Gigabit Ethernet and speed negotiation. 1.5 Explain the operation of Hubs, Switches and Routers. 1.6 Explain Wireless LANs. 1.7 Explain IP Protocol. 1.8 Explain IPv4 packet structure, protocol header and features. 1.9 Explain VLSM, CIDR, Subnetting, aggregation, NAT and NAPT Explain ICMP protocol, ping and traceroute Explain IGMP protocol Perform exercises configuring IPv4 addresses, and check connectivity Demonstrate IPv6 packet structure, protocol header, features. 2 Explain and compare the transport protocols. 2.1 Explain TCP, UDP and SCTP protocol structures, headers and functionality. 3 List the applications protocols. 3.1 List and explain the operation of different protocols / applications such as DHCP, DNS, NFS, NIS, NTP, HTTP, SMNP, SMTP, Telnet, FTP, TFTP and RTP. 4 Describe IP Switching and Routing Protocols and perform exercises using Netsim Simulator. 4.1 Explain and perform exercises about ARP. 4.2 Explain and perform exercises of VLANs. Commercial in Confidence

102 Page Explain the purpose of Spanning Tree Protocol (STP). 4.4 Explain the operation of Static and Dynamic routing protocols. 4.5 Perform Static routing exercises. 4.6 List the differences between Vector Distance and Link State protocols. 4.7 Explain RIP routing protocol. 4.8 Explain OSPF routing protocol. 4.9 Explain BGP routing protocol Explain IS-IS routing protocol Perform routing Protocol exercises. Target audience The target audience for this course are personnel who are involved in IP networking or those who require more knowledge on IP addressing, application and routing protocols. Prerequisites There are no pre-requisites. Duration and class size The length of the course is 5 days and the maximum number of participants is 8. Learning situation This course is based on theoretical and practical instructor-led lessons given in both classroom and in a technical environment using equipment or simulation tools. Commercial in Confidence

103 Page 103 Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Short description of the topics in the course Estimated time 1 List the functions of the different Standard Bodies 0,5 h involved in IP Standards / RFCs Analyze the OSI Reference Model and how it relates 1,0 h to the TCP / IP stack Explain Ethernet as Physical and Data Link Layer: 1,5 h MAC Address, CSMA/CD principles, Fast Ethernet, Gigabit Ethernet and speed negotiation Explain the operation of Hubs, Switches and Routers 2,0 h Explain Wireless LANs 0,5 h Explain IP Protocol 0,5 h 2 Explain IPv4 packet structure, protocol header and 1,0 h features Explain VLSM, CIDR, Subnetting, aggregation, NAT 1,0 h and NAPT Explain ICMP protocol, ping and traceroute 1,0 h Explain IGMP protocol Perform exercises configuring IPv4 addresses, and 2,5 h check connectivity Demonstrate IPv6 packet structure, protocol header, 0,5 h features 3 Explain TCP, UDP and SCTP protocol structures, 2,0 h headers and functionality List and explain the operation of different protocols / 2,0 h applications such as DHCP, DNS, NFS, NIS, NTP, HTTP, SMNP, SMTP, Telnet, FTP, TFTP and RTP Explain and perform exercises about ARP 2,0 h 4 Explain and perform exercises of VLANs 3,0 h Explain the purpose of Spanning Tree Protocol (STP) 0,5 h Explain the operation of Static and Dynamic routing 0,5 h protocols Perform Static routing exercises 1,0 h List the differences between Vector Distance and Link 1,0 h State protocols Explain RIP routing protocol 1,0 h 5 Explain OSPF routing protocol 1,5 h Explain BGP routing protocol 0,5 h Explain IS-IS routing protocol 0,5 h Perform routing protocol exercises 2,5 h Commercial in Confidence

104 Page 104 IP Quality of Service and MPLS LZU R1A Description This course will give the students an insight and understanding of QoS. The students will learn the operation of QoS supporting IP Protocols and MPLS. The hands-on exercises are used to facilitate the understanding of theory sessions. Learning objectives On completion of each module the participants will be able to: 1 Understand how Quality of Service (QoS) works 1.1 Explain QoS Fundamentals and QoS related Protocols 1.2 Analyze the enhancement of the IP networks to support transmission of Real Time data 1.3 Describe QoS Basic Concepts 1.4 Describe QoS Architectures 1.5 Describe QoS Mechanisms 1.6 Explain Resource Reservation Protocol (RSVP) RFC Explain Basic MPLS Concepts 1.8 Describe MPLS Labels and Label Stack 1.9 Explain MPLS Applications 1.10 Describe Generalized Multiprotocols Label Switching GMPLS 1.11 Perform practical exercises covering Class Based Marking (CBM) using IP Precedence, DSCP and basic MPLS setup Target audience The target audience for this course is the staff involved in IP networking and require more knowledge on IP networks to guarantee quality of service. Prerequisites Successful completion of the following course or equivalent knowledge: IP Networking, LZU R5A Commercial in Confidence

105 Page 105 Duration and class size The length of the course is 2 days and the maximum number of participants is 8. Learning situation This course is based on theoretical and practical instructor-led lessons given in both classroom and in a technical environment using equipment or simulation tools. Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Short description of the topics in the course Estimated time 1 Explain QoS Fundamentals and QoS related Protocols 0.3 h Analyze the enhancement of the IP networks to support transmission of Real Time data 0.2 h Describe QoS Basic Concepts 0.5 h Describe QoS Architectures 0.5 h Describe QoS Mechanisms 1.0 h Explain Resource Reservation Protocol (RSVP) 1.0 h Explain Label Distribution Systems (LDP, RSVP-TE, BGP) 1.5 h 1, 2 Explain Basic MPLS Concepts 1.5 h Describe MPLS Labels and Label Stack 1.0 h Explain MPLS Applications 1.5 h Describe Generalized Multiprotocols Label Switching GMPLS Perform practical exercises covering Class Based Marking (CBM) using IP Precedence, DSCP and MPLS 1.0 h 2.0 h Commercial in Confidence

106 Page 106 IP Security LZU R1A Description This course will give the students an insight and understanding of Security issues. The students will learn the operation of Security topics such as authentication, confidentiality, and integrity. The hands-on exercises are used to facilitate the understanding of theory sessions. Learning objectives On completion of each module the participants will be able to: 1 Understand how IP Security (IP Sec) works 1.1 Analyze the existing security threats types 1.2 Explain Access control lists (ACL) 1.3 Explain the purpose and use of Firewalls 1.4 Explain Encryption techniques 1.5 Identify different Security Services 1.6 Explain how Virtual Private Networks (VPN) operate 1.7 Explain IP Security (IPSec) RFC Explain Authentication Header (AH) RFC Explain Encapsulating Security Payload (ESP) RFC Explain Internet Key Exchange (IKE) RFC 2409 v1/rfc 4306 v Show some Transport Layer Security Protocols (SSL and TLS) RFC 2246v1/RFC 4346 v Perform practical exercises covering the configuration of an IPSec VPN tunnel (Phase I and Phase II negotiation) Target audience The target audience for this course is the staff involved in IP networking and require more knowledge on IP networks to guarantee security. Prerequisites Successful completion of the following course or equivalent knowledge: IP Networking, LZU R5A Duration and class size The length of the course is 2 days and the maximum number of participants is 8. Commercial in Confidence

107 Page 107 Learning situation This course is based on theoretical and practical instructor-led lessons given in both classroom and in a technical environment using equipment or simulation tools. Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Short description of the topics in the course Estimated time 1 Analyze the existing security threats types 1.0 h Explain Access control lists (ACL) 1.0 h Explain the purpose and use of Firewalls 1.0 h Explain Encryption techniques 1.0 h Identify different Security Services 1.0 h Explain how virtual Private Networks (VPN) operate 1.0 h 2 Explain IP Security (IPSec) 1.0 h Explain Authentication Header (AH) 1.0 h Explain Encapsulating Security Payload (ESP) 1.0 h Explain Internet Key Exchange (IKE) 1.0 h Show some Transport Layer Security Protocols (SSL and TLS) Perform practical exercises covering the configuration of an IPSec VPN tunnel (Phase I and Phase II negotiation) 1.0 h 1.0 h Commercial in Confidence

108 Page 108 Voice and Video over IP LZU R1A Description This course will give the students an insight and understanding of Voice and Video over IP. The students will learn the operation of VoIP protocols and understand the concept about Video over IP. Learning objectives On completion of each module the participants will be able to: 1 Describe the Voice over IP protocols 1.1 Explain the main VoIP protocols: H.323, Media Gateway Control Protocol (MGCP) RFC 2705 and H.248 (MEGACO) 1.2 Explain Session Initiation Protocol (SIP) RFC List the Real-Time Transport Protocol (RTP) and Real Time Control Protocol (RTCP) RFC 3611 and RFC Perform Theoretical Exercise 2 Describe the Video over IP protocols 1.17 Explain Video over IP 1.18 Describe traditional video and IP Multicast 1.19 Describe concept of Internet Group Management Protocol IGMP 1.20 Describe video formats MPEG and Streaming 1.21 Comment Traditional solutions, Video conferencing over IP 1.22 Perform theoretical exercises covering SIP messages Target audience The target audience for this course is the staff involved in IP networking and require more knowledge on IP networks to guarantee quality of service, security, and management of realtime traffic. Prerequisites Successful completion of the following course or equivalent knowledge: IP Networking, LZU R5A Duration and class size The length of the course is 1 day and the maximum number of participants is 16. Commercial in Confidence

109 Page 109 Learning situation This course is based on theoretical instructor-led lessons given in classroom environment. Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Short description of the topics in the course Estimated time 1 Explain the main VoIP protocols: H.323, Media Gateway Control Protocol (MGCP) and H.248 (MEGACO) 0.5 h Explain Session Initiation Protocol (SIP) 1.0. h List the Real-Time Transport Protocol (RTP) and Real- Time Control Protocol (RTCP) RFC 3611 RFC h Explain Video over IP 0.5 h Describe Traditional Video Transport and IP Multicast 0.5 h Comment concept of Group Management Protocol - IGMP 0.5 h Describe video format MPEG and Streaming 0.5 h Describe video on demand vs. video broadcasting 0.5 h Comment traditional solutions, video conferencing over IP 0.5 h Perform theoretical exercises 1.0 h Commercial in Confidence

110 Page 110 IS MGW 1.2 Operation & Configuration LZU R1A Description This course will learn the students how to perform an initial installation and configuration of a Media Gateway (MGW) in the Integrated Site (IS). They will get theoretical background and practice in software and hardware installation, and network configuration of the Media Gateway. The position and the role of the IS MGW in ViG, IMT and TSS networks will be explored with reference to particular configuration. Learning objectives 1 Explain the IS MGW system architecture and functions. 1.1 Describe the MGW Blade System (BS) and its functions. 1.2 Create and perform the basic MGW BS configuration. 1.3 Show the different IS MGW solutions in ViG, IMT and TSS Configure the IS MGW 2.1 Explain the IS MGW Management Functional Areas (MFA). 2.2 Use the GUI and configure all MGW functions. 3 Configure the IS MGW Network 3.1 Explain the IS MGW subnets and VLANs. 3.2 Configure IS MGW Logical Networks and VLANs. 3.3 Describe the traffic separation function (QoS) and define the Differentiated Services on the IS. 3.4 Configure QoS parameters. 1 Define the IP and LAN Traffic Classes in IS and MGW 1.1 Configure the ISER connectivity using redundancy. 1.2 Describe and define IPSec in the MGW network 1.3 Describe the MGW Blade and Blade System scalability 1.4 Describe the admission control and the MGW Redundancy. 2 Operate and maintain the IS MGW 2.1 Describe the MGW O&M functions in I IS 2.2 Explain the IS MGW Operation and Maintenance architecture. 2.3 Describe and use the MGW alarm and event functions to maintain the node. 2.4 Verify the network connectivity 2.5 Create performance management reports related to the IP interfaces/traffic. Commercial in Confidence

111 Page 111 Target audience The target audience for this course is: Network Design Engineers, Network Deployment Engineers, Service Deployment Engineers, System Technicians, Service Technicians, System Engineers,.and operator personnel performing Operation, Maintenance and Engineering tasks in IS based MGWs Prerequisites The participants should be familiar with.integrated Site concept or Successful completion of the following courses: LZU Integrated Site Overview LZU _IS_Operation and Configuration or LZU IS Installation & Configuration The course LZU R1A IP network Configuration for Integrated Site is not required but should be completed as well since it covers all aspects related to networking using IS Duration and class size The length of the course is 2 dayss and the maximum number of participants is 8. Learning situation This course is based on theoretical and practical instructor-led lessons given in both classroom and in a technical environment using equipment and tools. Commercial in Confidence

112 Page 112 Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Topics in the course Estimated time 1 Introduction, Basic IS functions MGW architecture & Functions Create MGW Blade System Traffic handling in MGW H.248 and NB-signalng setup Exercises 2 IS MGW Networking Logical net and and VLAN configuration Dynamic routing, redundancy and QoS handling Exercises Commercial in Confidence

113 Page 113 IS Operation and Configuration LZU R2B Description This course provides participants with the skills and knowledge needed for managing an IS domain by exploring the elements involved in operation and maintenance and network configuration. This includes fault management, network management, hardware and software management of the IS infrastructure. Each task is complemented by practical exercises on a real IS. Participants will complete practical site management exercises using on-line documentation and the IS Management Interfaces. During the network configuration part of the training, the participants will work hands-on with configuration of the EXB, ISER and L3X blade systems. Learning objectives On completion of this course the participants will be able to: 1. Describe and handle the recommended IS infrastructure Management Interfaces Connect to the SIS and ISER using the recommended management interfaces Be familiar with the structure of the ISM GUI Use the on-line help and documentation 2. Inspect and verify Network Configuration Verify defined IS and BS Logical Networks, Subnets, Subnet Segments and VLANs Check the state of virtual routers Check the routing table in Virtual Routers (VR) Verify the state of logical and physical IP interfaces in the ISER Verify VR redundancy Use the performance monitoring services for the EXB and MXB Check the routing table in the L3X Verify the state of logical and physical IP interfaces in the L3X 3. Manage Blade System Log Files View BS log files in the ISM GUI Transfer BS log files to a remote location Know what types of log files that are handled by the IS central log service 4. Manage Software Understand the difference between software group (swg) and software delivery package, blade swg and BS swg Download new software Upgrade software Create and restore a blade system backup and site backup Manage backups (housekeeping of backups) Keep track of installed software 5. Manage Hardware Understand the role of the shelf manager Commercial in Confidence

114 Page 114 Inspect installed hardware in the ISM-GUI (sub-racks, blade systems and blades) Check valid blade types in the ISM-GUI Transfer a copy of the Hardware Inventory to a remote location Lock and unlock blades and blade systems Replace a faulty blade Be familiar with visual indicators on the boards 6. Detect faults and act on them Understand the role of the IS Fault Management function Monitor the IS in terms of alarm and event notifications Find relevant information on how alarms are ceased Understand how alarms are ceased Transfer alarm and event logs Create user defined alarm and event logs 7. Manage Users and Accounts Handle user accounts, access permissions and password settings in the ISM Handle access permissions and password settings in the ISER 8. Configure Management Interfaces Describe the role of Netconf in the IS CMF Enable SHTTP and SFTP Understand how scripts can be used to simplify site management 9. Perform Hardware Configuration Setup multi-subrack connections Define blade systems and add blades to blade systems Describe the blade system startup procedure 10. Setup Basic Network Configuration Describe the purpose of the IS common parameters and BS parameters Understand how BS parameters are mapped to the IS parameters Map blade system network requirements to common Integrated Site resources Explain L2 Switching and the use of link aggregation in the IS Configure L2 switching and LAG Explain the mapping between layer 2 and layer 3 Define logical networks, subnets, subnet segments and VLANs Define virtual routers and setup routing protocols for virtual routers Configure ISER IP interfaces Define traffic classes for IS common resources Configure tunnels in the ISER Configure static routing in the L3X and ISER Describe the IPv6 and IPv4 routing implementation in IS Describe IPSec/IKE for the ISER Describe handling of Diffserv (Differentiated services) Commercial in Confidence

115 Page 115 Target audience The target audience for this course is: System Technician, System Engineer, Field Technician Prerequisites Successful completion of the following courses: LZU IP Networking (or similar knowledge) LZU IS Overview Duration and class size The length of the course is 18 hours and the maximum number of participants is 8. Learning situation Instructor Led Training (ILT). This course is based on theoretical instructor-led lessons and practical / hands-on exercises on IS systems. Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Topics in the course Estimated time 1 Theory Introduction Management Interfaces Introduction to IS Network Management Blade System Log Files Software Management 1 Exercises Connecting to the SIS (ISM), EXB, ISER and L3X via recommended management interfaces Using the on-line help documentation Verifying network configuration Checking the state of virtual routers Viewing and transferring blade system log files Downloading new software and performing software upgrades Creating and restoring backups 3 h 3 h Commercial in Confidence

116 Page Theory Hardware Management Fault Management Security Management Management Interface Configuration Exercises Replacing blades Transferring a HW inventory Handling alarm and event logs Locating cause of the errors using available documentation and tools (event and alarm lists) Managing ISM Users and Accounts Managing users in the ISER Enabling SFTP and HTTPS 3 Theory Hardware Configuration Network Configuration Exercises Defining blade systems and adding blades to blade systems Setting up multi-sub rack connections Defining logical networks, subnets, subnet segments and VLANs Creating and configuring virtual routers, tunnels and routing protocols in the ISER Defining link aggregation for the EXB Defining traffic classes for IS common resources 3 h 3 h 3 h 3 h Commercial in Confidence

117 Page 117 IS Overview LZU R4B Description This course gives an introduction to the Integrated Site (IS). It answers the questions: What is IS? and why IS?. The drivers for IS, the scope and the benefits are highlighted together with some examples of IS application blade systems. In addition to the general principles, some technical details are presented to provide a bridge for further studies of the Integrated Site concept. Learning objectives On completion of this course the participants will be able to: 1. Understand the IS concept in general terms Describe the background to the IS concept Explain the IS basic concept Explain basic terminology related to IS Understand the benefits and drivers associated with IS Explain the consequences of the IS concept and list areas that it will affect Understand the meaning of the IS Framework and IS Infrastructure Describe the IS approach to standardization Describe the Equipment Practice employed in the IS (E-GEM) and name related standards 2. Give examples of possible solutions for IS based nodes Give examples of solutions for IMS, TSS and MSC-S on IS 3. Describe IS from the equipment view Describe the E-GEM subrack Describe the hardware employed for the infrastructure blade systems Explain the use of link aggregation in IS Describe the Multiple Subrack domain solution 4. Describe the main services offered by the Site Infrastructure Support Describe the purpose and function of the ISCO and BSOM Explain the purpose and function of the IS common parameters Describe the predefined internal subnets and VLANs 5. Have basic knowledge about management solutions in IS IS Management System (ISM), the Common Management Framework (CMF) and related user interfaces Give and introduction to IS common HW and SW management Commercial in Confidence

118 Page Describe IS from the network view Get an idea of the use of logical networks, subnets, subnet segments and VLANs Have basic knowledge about layer 2 switching and layer 3 routing implementation in IS Get a basic understanding of IP Addressing in IS Give an introduction to Quality of Service and Class of Service treatment in IS 7. Discuss security solutions for IS Introduce the security implementation in IS Target audience The target audience for this course is: Network Design Engineer, Network Deployment Engineer, System Technician, System Engineer, Field Technician, System Administrator, Application Developer, Business Developer, Customer Care Administrator Prerequisites The students should have a basic understanding of the network architecture for the fixed and mobile core networks. Furthermore knowledge of datacom in general and more specifically in TCP/IP is desirable. Duration and class size The length of the course is 6 hours and the maximum number of participants is 16. Learning situation Instructor Led Training (ILT). This course is based on theoretical instructor-led lessons. Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Topics in the course Estimated time 1 Introduction 80 min Solution Scenarios 30 min IS Equipment View 70 min IS System View 30 min IS Management View 30 min IS Network View 60 min IS Security View 10 min Conclusion 10 min Commercial in Confidence

119 Page 119 IS 2.0 Overview LZU R1B Description This course gives an introduction to the Integrated Site (IS). It answers the questions: What is IS and why IS. The drivers for IS, the scope and the benefits are highlighted together with some examples of IS application blade systems. In addition to the general principles, some technical details are presented to provide a bridge for further studies of the Integrated Site concept. The course covers the differences between IS 2.0 and the previous version IS 1.2. Learning objectives On completion of this course the participants will be able to: 1. Understand the IS concept in general terms. Describe the background to the IS concept Explain the IS basic concept and give examples of possible site solutions Explain basic terminology related to the IS Understand the benefits and drivers associated with the IS Explain the consequences of the IS concept and list areas that will be affected by the IS concept Understand the meaning of the IS Framework and IS Infrastructure Describe the IS approach to standardization Describe the Equipment Practice employed in the IS (E-GEM) and name related standards List the main differences between IS 1.2 and Give examples of possible solutions for IS based nodes. Describe the solutions for MSC-S, IMS and TSS on IS 3. Give an overview of the IS from the equipment view. Describe the EGEM subrack Describe the hardware employed for the infrastructure Blade Systems Explain the use of link aggregation in IS Describe the Multiple Subrack domain solution 4. Have basic knowledge about management solutions in the IS. Give an introduction to the IS Management System (ISM), the Common Management Framework and related user interfaces Give and introduction to IS common HW and SW management Describe the purpose and function of the ISCO and BSOM Explain the purpose and function of the IS common parameters. Commercial in Confidence

120 Page Describe the IS from the network and security views. Get an idea of the use of logical networks, subnets, subnet segments and VLANs. Have a basic knowledge about the layer 2 switching and layer 3 routing implementation in the IS Describe the purpose of the predefined internal subnets and VLANs Get a basic understanding of IP Addressing in the IS Give an introduction to Quality of Service and Class of Service treatment in the IS LAN 3 Give an introduction to security implementation in the IS Target audience The target audience for this course is: Network Design Engineer, Network Deployment Engineer, System Technician, System Engineer, Field Technician, System Administrator, Application Developer, Business Developer, Customer Care Administrator Prerequisites Successful completion of the following course: LZU IP Networking (or similar knowledge) Duration and class size The length of the course is 6 hours and the maximum number of participants is 16. Learning situation Instructor Led Training (ILT). This course is based on theoretical instructor-led lessons. Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Topics in the course Estimated time 1 Introduction to IS 75 min Solution Scenarios 45 min IS Equipment View 45 min IS Management View 45 min IS Network View 60 min Summary 10 min Commercial in Confidence

121 Page 121 IS 2.0 Operation and Configuration LZU R1B Description This course provides participants with the skills and knowledge needed for managing an IS domain by exploring the elements involved in operation and maintenance and network configuration. This includes fault management, network management, hardware and software management of the IS infrastructure. Each task is complemented by practical exercises on a real IS. Participants will complete practical site management exercises using on-line documentation and the IS Management Interfaces. During the network configuration part of the training, the participants will work hands-on with configuration of the EXB and ISER blade systems. Learning objectives On completion of this course the participants will be able to: 1. Describe and handle the recommended IS infrastructure Management Interfaces Connect to the SIS (ISM), ISER, EXB and L3X using the recommended management interfaces Be familiar with the structure of the ISM GUI Use the on-line help and documentation 2. Inspect and verify Network Configuration and ISP Verify defined IS and BS Logical Networks, Subnets, Subnet Segments and VLANs Check the state of virtual routers Check the routing table in Virtual Routers (VR) Verify the state of logical and physical IP interfaces in the ISER Verify VR redundancy Use the performance monitoring services for the EXB and MXB Know how to read and clear ISP counters Know how to check the routing table in the L3X Know how to check the state of logical and physical interfaces in the L3X 3. Manage Blade System Log Files View BS log files in the ISM GUI Transfer ASI and BS log files to a remote location Know what types of log files that are handled by the IS central log service 4. Manage Software Understand the function of the Private Software Management Understand the difference between software group (swg) and software delivery package, blade swg and BS swg Download new software Perform software updates Describe in service upgrade from IS 1.2 to IS 2.0 Create and restore a blade system backup and site backup Manage backups (housekeeping of backups) Keep track of installed software Commercial in Confidence

122 Page Manage Hardware Understand the role of the shelf manager Inspect installed hardware in the ISM-GUI (sub-racks, blade systems and blades) Check valid blade types in the ISM-GUI Transfer a copy of the Hardware Inventory to a remote location Lock and unlock blades and blade systems Replace a faulty blade Be familiar with visual indicators on the boards Be familiar with performing in-service upgrades of infrastructure HW Understand the function of Private HW Management 6. Detect faults and act on them Understand the role of the IS Fault Management function Explain the function of LAN FM Monitor the IS in terms of alarm and event notifications Find relevant information on how alarms are ceased Understand how alarms are ceased Transfer alarm and event logs Create user defined alarm and event logs Explain how disc usage is controlled in the IS 7. Manage Users and Accounts Handle user accounts, access permissions and password settings in the ISM Handle access permissions and password settings in the ISER 8. Configure Management Interfaces Describe the role of Netconf in the IS CMF Describe how to set up Northbound SNMP communication Enable SHTTP and SFTP Understand how scripts can be used to simplify site management 9. Perform Hardware Configuration Setup multi-subrack connections Define blade systems and add blades to blade systems Describe the blade system startup procedure 10. Setup Basic Network Configuration Describe the purpose of the IS common parameters and BS parameters Understand how BS parameters are mapped to the IS parameters Map blade system network requirements to common Integrated Site resources Explain L2 Switching and the use of link aggregation in the IS Understand how to configure L2 switching and LAG Explain the mapping between layer 2 and layer 3 Define logical networks, subnets, subnet segments and VLANs Define traffic classes for IS common resources Configure tunnels in the ISER Understand how to configure static routing in the ISER and L3X Describe the security capabilities of the ISER Describe handling of Diffserv (Differentiated services) in IS List the routing capabilities in ISER and exemplify basic OSPF configuration Target audience The target audience for this course is: System Technician, System Engineer, Field Technician Commercial in Confidence

123 Page 123 Prerequisites Successful completion of the following courses: LZU IP Networking (or similar knowledge) LZU IS 2.0 Overview Duration and class size The length of the course is 18 hours and the maximum number of participants is 8. Learning situation Instructor Led Training (ILT). This course is based on theoretical instructor-led lessons and practical / hands-on exercises on IS systems. Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Topics in the course Estimated time 1 Theory Introduction Management Interfaces Introduction to IS Network Management Blade System Log Files Software Management 1 Exercises Connecting to the SIS (ISM) and ISER using recommended management interfaces Using the on-line help documentation Verifying network configuration Checking the state of virtual routers 1 Viewing and transferring blade system log files Downloading new software and performing software upgrades Creating and restoring backups 2 Theory Hardware Management Fault Management Security Management Management Interface Configuration 3 h 3h 3 h Commercial in Confidence

124 Page 124 Exercises Replacing blades Transferring a HW inventory Handling alarm and event logs Locating cause of the errors using available documentation and tools (event and alarm lists) Managing ISM Users and Accounts Managing users in the ISER Enabling SFTP and HTTPS 3 Theory Hardware Configuration Network Configuration Exercises Defining blade systems and adding blades to blade systems Setting up multi-sub rack connections Defining logical networks, subnets, subnet segments and VLANs Creating and configuring virtual routers, tunnels and routing protocols in the ISER Defining link aggregation for the EXB Defining traffic classes for IS common resources 3 h 3 h 3 h Commercial in Confidence

125 Page 125 Error! Unknown document property name. Error! Unknown document property name. Error! Unknown document property name. Description This course will learn the students how to perform an initial installation and configuration of a Media Gateway (MGW) in the Integrated Site (IS). They will get theoretical background and practice in software and hardware installation, and network configuration of the Media Gateway. The position and the role of the IS MGW in ViG, IMT and TSS networks will be explored with reference to particular configuration. This course provides the participants with the competence needed to configure the MGW for the Telephony Soft-switch (TSS 4.0 FP1 ) Feature Package 1 solution. Learning objectives On completion of this course the participants will be able to: 1 Explain the IS MGW system architecture and functions. 1.1 Describe the MGW Blade System (BS) and its functions. 1.2 Create and perform the basic MGW BS configuration. 1.3 Show the different IS MGW solutions in ViG, IMT and TSS 4.0 FP1. 2 Configure the IS MGW. 2.1 Explain the IS MGW Management Functional Areas (MFA). 2.2 Use the GUI and configure all MGW functions. 3 Configure the IS MGW Network. 3.1 Explain the IS MGW subnets and VLANs. 3.2 Configure IS MGW Logical Networks and VLANs. 3.3 Describe the traffic separation function (QoS) and define the Differentiated Services on the IS. 3.4 Configure QoS parameters. 3.5 Define the IP and LAN Traffic Classes in IS and MGW 3.6 Configure the ISER connectivity using redundancy. 3.7 Describe and define IPSec in the MGW network 3.8 Describe the MGW Blade and Blade System scalability 3.9 Describe the admission control and the MGW Redundancy. 4 Operate and maintain the IS MGW. 4.1 Describe the MGW O&M functions in IS Explain the IS MGW Operation and Maintenance architecture. 4.3 Describe and use the MGW alarm and event functions to maintain the node. 4.4 Verify the network connectivity Commercial in Confidence

126 Page Create performance management reports related to the IP interfaces/traffic. Target audience The target audience for this course is: Network Design Engineers, Network Deployment Engineers, Service Deployment Engineers, System Technicians, Service Technicians, System Engineers,.and operator personnel performing Operation, Maintenance and Engineering tasks in IS based MGWs Prerequisites The participants should be familiar with.integrated Site concept or Successful completion of the following courses: Integrated Site 2.0 Overview LZU R1B Integrated Site 2.0 Operation and Configuration LZU R1B The course IP Network Configuration for Integrated Site LZU R1A is not required but should be completed as well since it covers all aspects related to networking using IS. Duration and class size The length of the course is 2 days and the maximum number of participants is 8. Learning situation This course is based on theoretical and practical instructor-led lessons given in both classroom and in a technical environment using equipment and tools. Commercial in Confidence

127 Page 127 Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Topics in the course Estimated time 1 Introduction, Basic IS functions MGW architecture & Functions Create MGW Blade System Traffic handling in MGW H.248 and NB-signalng setup Exercises 1 h 1 h 1 h 1 h 1 h 1 h 2 IS MGW Networking Logical net and and VLAN configuration Dynamic routing, redundancy and QoS handling Exercises 1.5 h 1.5 h 1.5 h 1.5 h Commercial in Confidence

128 Page 128 MN-OSS R6 to R8 Delta for TSS LZU R2A Description This course will give the student knowledge about how to use the new and upgraded tools in the Telephony Soft Switch Solution support functions of the MN-OSS 8.0. After the course the students will be able to handle all the new and updated applications in order to operate the system. Learning objectives On completion of this course the participants will be able to: 1. Give an overview of the MN-OSS Describe the work areas of MN-OSS Describe the MN-OSS components: AXE,AXD,IMT,TSS 1.3. Describe the MN-OSS security levels 1.4. Describe the MN-OSS external interfaces 1.5. Describe the supported nodes 2. Explain differences between MN-OSS R6.0 and MN-OSS R8.0 on feature level 2.1. Describe the main differences between MN-OSS 6.0 and MN-OSS Describe the tools have been removed in MN-OSS Describe the tools have been upgraded in MN-OSS Describe the tools have been added in MN-OSS Give an overview of the MN-OSS 8.0 HW system implementation and the new system services 3.1. Describe the Hardware of MN-OSS Describe the O&M architecture of MN-OSS Describe the Node Hardening function 3.4. Describe the Hrdware Matrix 3.5. Describe the Business Continuity Management 3.6. Explain the usage of Health Check OPI 4. Describe the tools added in MN-OSS Describe the SMIA tool 4.2. Describe SGw 4.3. Describe SN-CM application 4.4. Describe the XML Mediation 4.5. Describe briefly the TGR (TeS Geographical Redundancy) script based application Commercial in Confidence

129 Page Describe the tools updated in MN-OSS Describe the updates in ALV 5.2. Describe the updates in BASE 5.3. Describe the updates in ACT 5.4. Describe the updates in PMR 5.5. Describe the updates in TMG Target audience The target audience for this course is: Network Deployment Engineers, System Technicians, System Engineer. Prerequisites The participants should have successfully completed the following courses: MN-OSS Operations ToP LZU Or have equivalent knowledge & experience of MN-OSS R6.0. Duration and class size The length of the course is 2 days and the maximum number of participants is 8. Learning situation This course is based on theoretical and practical instructor-led lessons given on both classroom and technical environment using equipment and tools, which are accessed remotely. Commercial in Confidence

130 Page 130 Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Topics in the course Estimated time 1 Introduction 1 Differences from 6.0 to System Implementation & Services 2 SMIA 2 2 SMIA 1 SGW 0,5 XML Mediation 0.5 Updated Tools ( ALV, BASE, ACT, PMR, TMG ) 4 Commercial in Confidence

131 Page 131 MN-OSS Operation for AXE Description LZU R1A This course will give the student knowledge about how to use the Telephony Soft switch Solution support functions of the MN-OSS 8.0. After the course the students will be able to handle all the standard applications in order to operate the system. The focus of the course is communication, fault management and performance management of AXE and TSS based network element. The course consists of modules with mostly practical sessions (task-oriented) but there will also be theoretical parts. The students solve the tasks on the training system, using the online documentation. After the course the students should have the knowledge required to work as system operators, i.e. to perform the most common tasks required to operate and supervise AXE network elements. Learning objectives On completion of this course the participants will be able to: 1 Describe the work areas of the MN-OSS as well as the HW implementation 2 Describe the structure and contents of the User Documentation and help functions 3 Use ONE to launch applications and customize a network browser view 4 Configure and Use CHA to communicate with, and manage AXEs 5 Configure and Use WinFiol to communicate with, and manage AXEs 6 Use Element Management Tools to communicate with and configure AXE network elements. Schedule scripts and system command files, use command/response log and subscribe to spontaneous reports 7 Describe and use the Command File Language (CFL) in OPS and produce simple OPS command files 8 Describe and use OPS both as a development tool and part of an expert system 9 Transfer files between MN-OSS & AXE (IOG) network elements using FHA and FTP 10 Use the Software Management Organizer, SMO to handle software packages and files for AXE (IOG) (APG 40) 11 Use Fault Manager Tools to survey the network situation manage alarms, configure the way the alarms are presented, retrieve and analyze alarms from the alarm log 12 Use SMIA for setting up measurement jobs in the AXE based Network elements 13 Use SGW for collecting and handling of network statistical data for AXE based network elements Target audience The target audience for this course is: System Technicians, System Engineers, System Administrators. Commercial in Confidence

132 Page 132 This audience is system operators, who need to know the MN-OSS system concept and how to operate the system on the Windows 2003, Windows NT or UNIX platform. Prerequisites The participants should have successfully completed of the following courses: AXE Operation & Configuration LZU (or equivalent knowledge) Basic UNIX knowledge Duration and class size The length of the course is 3 days and the maximum number of participants is 8. Learning situation This course is based on theoretical and practical instructor-led lessons given in both classroom and in a technical environment using equipment and tools, which are accessed remotely. Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate Day Topics in the course Estimated Time 1 Introduction 0.5 MN-OSS Library 0.5 ONE 1 Element Management Tools/WinFiol 4 2 Element Management Tools/OPS 2 SMO/FHA 4 3 SMIA/SGW 2 Ericsson Fault Management Tools 4 Commercial in Confidence

133 Page 133 MN-OSS Operation for TSS LZU R2A Description This course will give the student knowledge about how to use the Telephony Soft switch Solution support functions of the MN-OSS 8.0. After the course the students will be able to handle all the standard applications in order to operate the system. The focus of the course is communication, bulk configuration, fault management and performance management of AXE and TSS based network element. The course consists of modules with mostly practical sessions (task-oriented) but there will also be theoretical parts. The students solve the tasks on the training system, using the online documentation. After the course the students should have the knowledge required to work as system operators, i.e. to perform the most common tasks required to operate and supervise AXE and TSS network elements. Learning objectives On completion of this course the participants will be able to: 1. Explain the MN-OSS implementation and structure 1.1. Describe the work areas of MN-OSS 1.2. Describe the MN-OSS components: AXE, AXD, IMT,TeS 1.3. Describe the MN-OSS security levels 1.4. Describe the MN-OSS external interface 1.5. Describe the supported nodes 2. Explain the different types of documentation for MN-OSS 2.1. Describe the structure of ALEX 2.2. Find relevant information in ALEX regarding MN-OSS functions and applications 2.3. Describe the documentation/help in AMS for AXD301 nodes 3. Explain the functionalities of ONE application 3.1. Use the ONE GUI to access the available support activities for O&M in the network 3.2. Find network objects and view object properties 3.3. Create and edit a network browser view 3.4. Launch applications 4. Explain the CHA application towards AXE nodes as a handling tool 4.1. Describe CHA for communicating with and managing AXE nodes 4.2. Describe how to run command files by using CHA Commercial in Confidence

134 Page Explain the EMT tools and Winfiol for managing AXE nodes 5.1. Perform Element Management by communicating with and configuring AXE network elements 5.2. Use Winfiol to communicate with AXEs 5.3. Use CLS to search in the Command and Response log 5.4. Setup time activation of command files/scripts with the Activity Manager 5.5. Set up subscriptions of spontaneous reports with the SRM 6. Describe the OPS application 6.1. Explain and use OPS both as a development tool and part of an expert system 6.2. Run command files by using OPS 6.3. Edit existing command files 6.4. Create and debug simple command files 7. Explain the SMO tool for performing SW and (optional) HW administration of AXE nodes 7.1. Describe SMO for handling software packages and files for AXE (IOG) (APG40) 7.2. Describe how to view network element details 7.3. Monitor started jobs 7.4. Run SMO procedures 8. Explain FHA application functionalities as both an AXE file destination and processing system 8.1. Transfer files between MN-OSS and AXE nodes using FHA 8.2. Describe how file transfers may be initiated to and from AXE 8.3. Setup and perform a file transfer between MN-OSS and AXE 8.4. Describe the structure of the AXE and MN-OSS file stores and be able to use them 8.5. Understand the file subscription to other external system 8.6. Describe how to set up post processing of files 9. Explain Fault Management implementation in MN-OSS 9.1. Describe the Fault Handling functions in MN-OSS 9.2. Use FM tools to manage alarms and configure the way they are presented 9.3. Configure the GNIP and connect the Alarm Status Viewer 9.4. Configure the ASM and interpret the different objects and alarm symbols 9.5. Configure and filter the information in ALV 9.6. Acknowledge alarms and write comments in ALV 9.7. Use filters to retrieve alarms and statistics from the alarm log with the ALB 10. Explain Performance management implementation in MN-OSS View,Create,Modify,Copy,Delete and stop measurement jobs in AXE NEs with SMIA Initiate audits on AXE nodes and check their current status Display the MML/Error/Audit/Activity log s associated with administration of the measurement jobs Print the STS DB Collection status Explain the SGW functionality Explain the XML Mediation functionality Commercial in Confidence

135 Page Explain the functionalities and roles of BASE applications Describe the role and basics of BASE Describe the relation between BASE and AOS applications Use the Audit Trail Browser to track network management actions Use the Topology Manager for centralized management of topology information of AXD nodes 12. Describe the AXD Operation Suite applications Understand the role and basics of ACT Initiate backup operations Perform bulk configuration Describe restore backup, patch operations and cloning configuration Create measurement jobs in AXD Create measurement configurations for AXDs Order measurements in AXDs Order performance monitoring reports to be generated Perform reachability tests for IP interfaces with Ping or Traceroute Perform Voice Over IP, VOIP, quality measurements Trouble-shoot Permanent Virtual Connections, PVCs, with ATM Path Tracing & Multiple Loopback Trouble-shoot Switched Virtual Connections, SVCs, with ATM SVC Failure Analysis Target audience The target audience for this course is: System Technicians, System Engineers, System Administrators. This audience is system operators, who need to know the MN-OSS system concept and how to operate the system on the Windows 2003, Windows NT or UNIX platform. Prerequisites The participants should have successfully completed of the following courses: AXE Opration & Configuration LZU (or equivalent knowledge) AXD Configuration & Verification LZU (or equivalent knowledge) They should have Basic UNIX knowledge. Duration and class size The length of the course is 5 days and the maximum number of participants is 8. Commercial in Confidence

136 Page 136 Learning situation This course is based on theoretical and practical instructor-led lessons given in both classroom and in a technical environment using equipment and tools, which are accessed remotely. Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate: Day Topics in the course Estimated Time 1 Introduction 0.5 MN-OSS Library 0.5 ONE 1 Element Management Tools/WinFiol 4 2 Element Management Tools/OPS 2 SMO/FHA 4 3 SMIA/SGW 2 BASE 2 ACT 2 4 PMR 2 TMG 3 5 Ericsson Fault Management Tools 6 Commercial in Confidence

137 Page 137 MN-OSS System Administration for TSS Description LZU R1A This course will give the student knowledge about administration of the MN-OSS system for TSS 4.0. After the course the student will be able to handle the standard maintenance of an up-and-running system. The student will gain thorough knowledge about how to handle processes, errors and authority in the MN-OSS system. The course also covers handling of network element connections and administration of fault management, performance management, and Citrix. The course consists of modules with both theoretical and practical sessions. The students solve the tasks on a training MN-OSS UNIX system, using the on-line documentation. Main focus is on the following areas: Handle Authority Administration in the MN-OSS system Manage processes in the MN-OSS system Set up connections to network elements Administration of applications (FM, PM, AOS, GNIP, etc) Perform standard maintenance in the MN-OSS system It should be noted that this is not an OSS operations course where the applications are operated, and neither does it give any information on how to operate or administer different network elements. Learning objectives On completion of this course the participants will be able to: 1 Describe the overall structure and components of the MN-OSS system. 1.1 Describe the role that OSS plays in supporting a telecommunications network 1.2 List the main building blocks of MN-OSS 1.3 Explain the architecture of MN-OSS 1.4 Use and customize ALEX documentation system 1.5 Locate key documents in the ALEX documentation 2 Handle Authority Administration in the OSS system 2.1 Add and Delete OSS User Accounts 2.2 Modify a User's Authority in TSS 2.3 Use TSS Authority Administration GUI 2.4 Use TSS Password Administration CLI 3 Handle File System and Backup & Restore procedures 3.1 Explain the overall file system layout 3.2 Explain the use of Disk Groups, Volumes and Plexes in Veritas Commercial in Confidence

138 Page List and describe the functions of DMR 3.4 Use DMR to take file system backups and restore 3.5 Use DMR for Mirror, Disk replacement and other tasks 3.6 Use database backup and restore scripts 4 Manage the OSS processes and error logs 4.1 Explain the structure of Common Integration Framework and the services it provides 4.2 Explain the Managed Component (MC) concept 4.3 Use the CIF Management Console to manage MCs 4.4 View CIF error log messages 4.5 Use CIF's command line interface 4.6 Use Object Explorer to access information hold in Configuration Services 4.7 Perform Standard Maintenance tasks 4.8 Handle the scripts scheduled in the crontab 5 Handle Network Element Integration and Data Handling 5.1 Explain the ONRM, its topology and connection to other OSS Subsystems 5.2 Explain the ARNE tool and how data is managed within the ONRM 5.3 Explain the purpose of the ONE Application 5.4 Use Add Remove Network Element (ARNE) 5.5 Establish and verify connection to an AXE/IOG, AXE/APG40, AXD and IS type network element 6 Handle the Fault Management 6.1 Explain the Fault Management Sub-system architecture 6.2 Explain Managed Components and Processes used in FM 6.3 Explain the basic features of GUI Alarm Viewers and FM NMS interfaces 6.4 Understand the flow of alarms 6.5 List and use troubleshooting tools at different FM internal interfaces 6.6 Configure and administrate the ASV/GNIP application 7 Handle the Performance Management 7.1 Describe the Performance Architecture 7.2 Explain how performance measurements are initiated and administrated 7.3 Verify that incoming files are received by the MN-OSS 7.4 Perform basic administration tasks on SMIA, SGW and PMR 7.5 List the Sybase databases that is used for performance management Target audience The target audience for this course is: System Administrators. This audience is MN-OSS administrators-to-be, who needs to know the MN-OSS system concept and how to perform maintenance in the system. Prerequisites Successfull completion of the following courses or equivalent: MN-OSS Operation for TSS LZU Commercial in Confidence

139 Page 139 Sun: Solaris System Administration I and II Sybase: Fast track to Adaptive Server Enterprise The participants should also be familiar with Veritas Volume Management and have general knowledge about TCP/IP. Duration and class size The length of the course is 5 days and the maximum number of participants is 8. Learning situation The course is based on instructor-led lessons and case-oriented exercises in a classroom equipped with an LCD-projector and a training environment where students connect remotely to an MN-OSS server with connections to either real or simulated network elements. Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Topics in the course Estimated time 1 Introduction 2 hours 1 User Administration 3 hours 1,2 Disk Mirror Handling and File Systems 4 hours 2,3 Process management 7 hours 3,4 NE integration and Data Handling 7 hours 4,5 Fault Management 5 hours 5 Performance Management 2 hours Commercial in Confidence

140 Page 140 Error! Unknown document property name. Error! Unknown document property name. Error! Unknown document property name. Description OSS-RC 10 extends the support of OSS-RC 10 to include support for Ericsson's Wireline product range replacing MN-OSS 8.0 for future applications. All platform changes that impact the functionality of OSS will be covered as well as any changes or improvements to the Fault Management, Software Management and Performance Management functionalities. Learning objectives On completion of this course the participants will be able to: 1 Give an overview of the OSS-RC Describe the Work Areas of OSS-RC Describe the Supported Nodes 1.3 Describe the OSS-RC Upgrade History 1.4 Describe the TSS network applications 1.5 Describe the Hardware configuration 2 Give an overview of the platform changes in OSS-RC Describe the basic service updates 2.2 Describe the ARNE enhancements 2.3 Describe the ONE enhancements 2.4 Explain the Sybase Activity Support Database cleanup mechanism 2.5 Describe the Self Management console enhancement 2.6 Describe the Solaris Volume manager 2.7 Describe the LDAP used for user management 3 Give an overview of the improvements in Fault Management 3.1 Describe ALV GUI improvements 3.2 Describe miscellaneous changes in FM 3.3 Describe capacity and performance improvements in FM 4 Describe the Software Management differences between MN-OSS 8.0 and OSS- RC Describe the SMO GUI enhancements 4.2 Use the Software Management Organizer, SMO, to handle IS modes 4.3 Describe the hardware inventory implementation differences Commercial in Confidence

141 Page Describe the Performance Management changes between MN-OSS 8.0 and 0SS- RC Describe the PM changes in OSS-RC Explain the PDM functionality 5.3 Describe the ENIQ solution for TSS 6 Give an overview of the OSS-RC 10 Infrastructure 6.1 Briefly describe the minimum deployment configuration of OSS-RC 10 for supporting wireline applications 6.2 Describe the functionality of the OSS-RC infrastructure components Target audience The target audience for this course is: Network Design Engineers, Network Deployment Engineers, Service Technicians and System Engineers Prerequisites The participants should be familiar with MN-OSS 8.0 applications for supporting TSS network, and OSS-RC 10 applications and functions, or Successful completion of the following course: MN-OSS Operation for TSS LZU R2A Duration and class size The length of the course is 2 days and the maximum number of participants is 8. Learning situation This course is based on theoretical and practical instructor-led lessons given in both classroom and in a technical environment using equipment and tools, which are accessed remotely. Time schedule Commercial in Confidence

142 Page 142 The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Topics in the course Estimated time 1 OSS-RC Introduction Platform Fault Management 2 Fault Management Software Management Performance Management Infrastructure Course Evaluation 1 h 4 h 1 h 2 h 1.5 h 1 h 1 h 0.5 h Commercial in Confidence

143 Page 143 Error! Unknown document property name. Error! Unknown document property name. Error! Unknown document property name. Description This course will give the student knowledge about how to use the Telephony Soft switch Solution support functions in the OSS-RC 10. After the course the students will be able to handle all the standard applications in order to operate the system. The focus of the course is communication, bulk configuration, fault management and performance management of AXE, AXD and IS nodes forming an TSS network. The course consists of modules with mostly practical sessions (task-oriented) but there will also be theoretical parts. The students solve the tasks on the training system, using the online documentation. After the course the students should have the knowledge required to work as system operators, i.e. to perform the most common tasks required to operate and supervise the TSS network elements. Learning objectives On completion of this course the participants will be able to: 1 Give an overview of the OSS-RC Describe the work areas of OSS-RC Describe the supported Nodes 1.3 Describe the OSS-RC upgrade history 1.4 Describe the wireline applications 1.5 Describe the hardware configuration 2 Give an overview of the documentation used for supporting the TSS functions in OSS-RC Describe the structure of the Active Library Explorer (ALEX) 2.2 Find relevant information in ALEX regarding OSS-RC functions and applications 2.3 Describe the documentation/help in AMS for AXD301 nodes 2.4 Describe the documentation/help in ISMS for IS nodes 3 Give an overview of the OSS Network Explorer application Detailed Learning DLO style 3.1 Use the OSS Network Explorer (ONE) GUI to access the available support activities for O&M in the network 3.2 Find network objects and view object properties 3.3 Create and edit a network browser view 3.4 Launch applications Commercial in Confidence

144 Page Give an overview of the AXE Command Handling (CHA) tool 4.1 Use CHA to communicate with, and manage AXEs 4.2 Run command files by using the CHA 5 Give an overview of the AXE Element Management tools and WinFiol application 5.1 Perform Element Management by communicating with, and configuring AXE network elements 5.2 Use WinFiol to communicate with, and manage AXEs 5.3 Use Command Log Search (CLS) to search in the Command and Response Log. 5.4 Set up time activation of command files/scripts with the Element Management Activity Manager (EMAM) 5.5 Set up subscriptions of spontaneous reports with the Spontaneous ReportsManager (SRM) 6 Give an overview of the Operations Procedure Support tool 6.1 Describe and use Operations Procedure Support (OPS) both as a development tool and part of an expert system 6.2 Run Command Files using OPS 6.3 Edit existing Command Files 6.4 Create and debug simple Command Files 7 Give an overview of the Software Management Application (SMO) application 7.1 Use the Software Management Organizer, SMO, to handle network elements 7.2 View Network Element details 7.3 Monitor started Jobs 7.4 Run an SMO procedure 7.5 Run an AXE procedure 7.6 Run an IS procedure 8 Give an overview of the Fault Management applications 8.1 Describe the Fault Handling functions in OSS-RC Use Fault Manager (FM) tools to manage alarms and configure the way they are presented 8.3 Configure the Alarm Status Matrix (ASM) and interpret the different objects and alarm symbols 8.4 Configure and filter the information in the Alarm List viewer (ALV) 8.5 Acknowledge alarms and write comments in the ALV 8.6 Use filters the retrieve alarms and statistics from the alarm log with the Alarm Log Browser (ALB) 8.7 Configure the Graphical and logical Network Information Presentation (GNIP) and connect the Alarm Status Viewer (ASV) 9 Give an overview of the Performance Management Commercial in Confidence

145 Page View, Create, Modify, Copy, Delete and Stop measurement jobs 9.2 Initiate Audits on Network Elements and check their current status 9.3 Display the MML/Error/Audit/Activity Logs associated with administration of measurement jobs 9.4 Print the STS Db Collection Status 9.5 Explain the SGw functionality 9.6 Explain the PDM functionality 9.7 Describe the ENIQ solution for TSS 10 Give an overview of BASE 10.1 Describe the role and basics of BASE Describe the relation between BASE and the AOS applications 10.3 Use the Topology Manager for centralized management of topology information of AXD nodes 10.4 Use the Audit Trail Browser to track network management actions 11 Give an overview of ACT, and PMR tools 11.1 Understand the role and basics of ACT 11.2 Initiate backup operations 11.3 Perform bulk configuration 11.4 Describe restore backup, patch operations and cloning configuration 11.5 Understand the role and basics of PMR 11.6 Create measurement jobs in AXD 11.7 Create measurement configurations for AXDs 11.8 Order measurements in AXDs 11.9 Order performance monitoring reports to be generated 12 Give an overview of IS management through OSS-RC Understand the role of IS in TSS 12.2 Describe the IS Management System 12.3 Explain how the IS nodes can be managed by OSS-RC 10 Target audience The target audience for this course is: System Technicians, System Engineers, System Administrators. Prerequisites The participants should have successfully completed of the following courses: AXE Operation and Configuration LZU (or equivalent knowledge) AXD Configuration & Verification LZU (or equivalent knowledge) IS 2.0 Operation and Configuration LZU (or equivalent knowledge) Commercial in Confidence

146 Page 146 They should have Basic UNIX knowledge. Duration and class size The length of the course is 5 days and the maximum number of participants is 8. Learning situation This course is based on theoretical and practical instructor-led lessons given in both classroom and in a technical environment using equipment and tools, which are accessed remotely. Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Topics in the course Estimated time 1 Introduction OSS-RC Documentation ONE CHA Element Management Tools/WinFiol 0.5 h 1.0 h 1.0 h 2.0 h 1.5 h 2 Element Management Tools/WinFiol Element Management Tools/OPS SMO 2.0 h 1.5 h 2.5 h 3 FM tools 6.0 h 4 SMIA/SGW/PDM BASE 5 ACT PMR IS Management Course summary & course evaluation 3.5 h 2.5 h 2.0 h 2.0 h 1.0 h 1.0 h Commercial in Confidence

147 Page 147 Error! Unknown document property name. Error! Unknown document property name. Error! Unknown document property name. Description This course will give the student thorough knowledge about administration of the OSS RC system for TSS networks. After the course the students will be able to handle network element connections, administration of the OSS-RC related applications and both standard and corrective maintenance of the system. The student will gain knowledge about how to manage processes, errors and authority issues in the OSS RC system. The course consists of chapters with both theoretical and practical sessions. The theoretical parts explain the structure of the OSS-RC system and the network environment. In the practical sessions the students will be presented with the tasks required to administer and maintain an OSS RC system. The students solve the tasks on a training system, using the on-line documentation. It should be noted that this is not an OSS-RC operations course where the applications are operated, and neither does it give any information on how to operate or administer different network elements. Learning objectives On completion of this course the participants will be able to 1 Give an overview of the OSS-RC Describe the OSS-RC on overview level 1.2 Describe the role of OSS-RC on supporting telecom networks 1.3 Describe the work areas of OSS-RC Locate key documents in ALEX documentation for OSS-RC 2 Give an overview of the User Management procedures 2.1 Describe the LDAP DS 2.2 Add and Delete OSS User Accounts 2.3 Use TSS Authority Administration 2.4 Modify User s Authority in TSS 2.5 Use TSS Password Administration 3 Describes the Disk and Volume Management 3.1 Navigate the OSS-RC file system structure 3.2 Explain the disk configurations used in OSS-RC 3.3 Differentiate between the uses of Solaris and Veritas Volume Managers 3.4 Investigate DMR, the standard backup solution for backup and restore. 3.5 Determine and describe the functions of DMR 3.6 Handle DMR to take file system backups and restores Commercial in Confidence

148 Page Describe the Storage Checkpoint feature and use its interfaces 4 Give an overview of the Common Integration Platform 4.1 Explain the structure of Common Integration Framework (CIF) Platform 4.2 Identify the components of the CIF Software Architecture and explain the function each provides 4.3 Recognize the role of the Solaris Operating System 4.4 Use the Service Management Facility to control the Solaris process 4.5 Investigate the different Database solutions provided by CIF and use tools to administer their operation 4.6 Determine the role CORBA based services play in the operation of the CIF platform 5 Give an overview of the most important CIF services 5.1 Explain the services provided by the Common Integration Framework (CIF) Platform 5.2 Investigate the role of CIF Self Management 5.3 Explain the Managed Component (MC) Concept 5.4 Use the CIF Management Console to manage MCs 5.5 Determine the role of the Configuration Service 5.6 Use Object Explorer to access information held in Configuration Services 5.7 Identify the use of the LDAP directory service and employ tools to browse its structure 5.8 Investigate the services used for navigation, parameter and event distribution within the platform 6 Give an overview of the Network Resource Model, the master topology model in OSS-RC Explain the ONRM, its topology and connection to other OSS Subsystems 6.2 Explain the ARNE tool and how data is managed within the ONRM 6.3 Explain the purpose of the ONE Application 6.4 Use tools to check on ONRM's integrity and consistency 7 Describe the Fault Management Subsystem 7.1 Inspect the Fault Management Subsystem Architecture 7.2 Determine the Managed FM Components and Processes 7.3 Navigate the flow of alarms through the FM subsystem 7.4 List and use troubleshooting tools at different FM internal interfaces 8 Give an overview of the OSS-RC 10 components that support the AXE NE type 8.1 Describe the architecture and functionalities of External Access Manager 8.2 Explain the OSS network interface to AXE IOG equipment 8.3 Perform troubleshooting on AXE IOG access problems 8.4 Describe the FM interface to AXE IOG nodes 8.5 Describe the flow of alarm information from AXE IOG nodes to FM Kernel 8.6 Describe Performance monitoring for AXE IOG nodes 8.7 Describe the configuration procedure for AXE IOG nodes 8.8 Explain the OSS network interface to AXE APG equipment 8.9 Perform troubleshooting on AXE APG access problems Commercial in Confidence

149 Page Describe the FM interface to AXE APG nodes 8.11 Describe the flow of alarm information from AXE APG nodes to FM Kernel 8.12 Describe Performance monitoring for AXE APG nodes 8.13 Describe the configuration procedure for AXE APG nodes 9 Give an overview of the AXD integration in OSS-RC 10 environment 9.1 Describe the FM interface towards AXD nodes 9.2 Explain Performance management implementation for AXD nodes 9.3 Describe the configuration procedure through ARNE for AXD nodes 10 Give an overview of the IS integration in OSS-RC 10 environment 10.1 Describe the FM interface towards IS nodes 10.2 Explain Performance management implementation 10.3 Describe the configuration procedure through ARNE Target audience The target audience for this course is: System Administrators. Prerequisites The participants should be familiar with: TSS concepts regarding the supported NEs Sybase: Fast track to Adaptive Server Enterprise Sun: Solaris 10 System Administration I and II The participants should also be familiar with Veritas Volume Management and have general knowledge of TCP/IP. Or, Successful completion of the following courses: TSS 4.0 Introduction LZU R3A TSS OSS-RC 10 TSS Operation LZU R1A Duration and class size The length of the course is 5 days and the maximum number of participants is 8. Commercial in Confidence

150 Page 150 Learning situation This course is based on theoretical and practical instructor-led lessons given in both classroom and in a technical environment using equipment and tools, which are accessed remotely. Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Topics in the course Estimated time 1 Introduction User management 2 Disk & Volume Management CIF Platform Overview 3 CIF Platform Services Network Resource Model 4 Fault Management AXE NE Integration 5 AXE NE Integration AXD NE Integration IS NE Integration 2 h 4 h 3 h 3 h 4 h 2 h 4 h 2 h 2 h 2 h 2 h Commercial in Confidence

151 Page 151 Networking and Ethernet Standards LZU R2A Description Upon completion of this course, you will be able to explain the main principles of modern LAN and WAN technologies and concepts, from Ethernet to Wireless LAN. Learning objectives 1 Describe Local Area Networks (LAN) and the Ethernet Standard 1.1 Define the building blocks in a LAN 1.2 Outline the different types of Ethernet standard 1.3 Explain data transmission in an Ethernet LAN - Ethernet frame 1.4 Understand Ethernet basics (CSMA/CD) 1.5 Outline the difference between a Hub and a Switch 1.6 Describe how to connect communication devices and design a LAN 2 Describe Wireless Local Area Networks (WLAN) 2.1 Describe two basic types of Wireless LAN (Ad Hoc and Infrastructure mode) 2.2 Outline the IEEE standard and its applications 2.3 Outline the properties of Home RF 2.4 Understand Bluetooth drivers and communication models Target audience The target audience for this course is: Service Planning Engineers, Service Design Engineers, Network Design Engineers, Network Deployment Engineers, Service Deployment Engineers, System Technicians, Service Technicians, System Engineers, Service Engineers, Field Technicians, System Administrators, Application Developers, Business Developers. Prerequisites The participants should be familiar with Networking Basics, An Overview, LZU Duration and class size The length of the course is 2.5 hours. Commercial in Confidence

152 Page 152 Learning situation This is a web-based interactive training course with multimedia content. Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Topics in the course Estimated time 1 Local Area Networks and the Ethernet Standard 1 hour 10 mins Wireless Local Area Networks, WLANs 1 hour 20 mins Commercial in Confidence

153 Page 153 Networking Basics, An Overview LZU R1B Description When you finish this course, you will have acquired knowledge of the basic networking principles and be able to describe how a PC communicates with other devices and networks. Learning objectives 1 Explain the basics of networking 1.1 Outline the input and output devices of a PC and how they are connected 1.2 Describe the communication parameters necessary to understand connections 1.3 Describe physical and logical network topologies 2 Describe how to connect a PC to a datacom network 2.1 dentify and describe communication devices in a LAN (Hub, Switch and Router) 2.2 Understand the different types of cables (UTP,STP and Fiber Optical) 2.3 Explain how to connect computers to a LAN 2.4 Explain the difference between Internet and Intranet 2.5 Outline how to implement a Structured Cabling System (independent cabling system) Target audience The target audience for this course is: Service Planning Engineers, Service Design Engineers, Network Design Engineers, Network Deployment Engineers, Service Deployment Engineers, System Technicians, Service Technicians, System Engineers, Service Engineers, Field Technicians, System Administrators, Application Developers, Business Developers, Customer Care Administrators. Prerequisites There are no prerequisites for this course. The course is open to anyone wishing to gain a basic understanding of modern datacom networking technologies. Duration and class size The length of the course is 2 hours. Learning situation This is a web-based interactive training course with multimedia content. Commercial in Confidence

154 Page 154 Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Topics in the course Estimated time 1 Network Basics 1 hour Your PC and the Datacom Network 1 hour Commercial in Confidence

155 Page 155 Error! Unknown document property name. Error! Unknown document property name. Error! Unknown document property name. Description This course provides an introduction into the Telephony Softswitch (TSS 4.0 Feature Package 1) concept, as part of this course we will look at the main conponents that make up the TSS 4.0 network. At the end of this introduction course students will have a good understanding of what TSS 4.0 is and an introduction into it s various conponents. Learning objectives On completion of this course the participants will be able to: 1 Describe the reasons for introducing the TSS solution and the benefits provided by the solution 1.1 Explain the functional architecture of the TSS 4.0 solution 1.2 Explain the signaling interfaces of TSS Explain the use of the DNS server and ENUM in TSS Describe the Different signaling in TSS Understand some typical signaling sequences related to the TSS Describe some terms and concepts used in TSS Have a basic knowledge of the Integrated Site concept and how it is used with TSS 4.0 FP1 3.1 Have a basic idea of the HW structure within the Integrated Site concept 3.2 Have a basic understanding of the IS Blade and Blade System concept 3.3 Understand the role of the MGW and TGC in the Integrated Site concept 3.4 Be familiar with basic aspects of the management system for the Integrated Site and Integrated Site Application Blade Systems 4 Describe the APZ Outline the capacity of different APZ versions 4.2 Understand the APZ architecture 4.3 Understand the APZ subsystems and functions 4.4 Understand the layout of the APZ Cabinet 5 Describe the APG Explain Key Features of the APG Explain Hardware Differences between APG 40 (C2 / C4) and APG43 6 Explain the AXD Commercial in Confidence

156 Page Briefly describe the Hardware and Software of the AXD Target audience The target audience for this course is: Service Planning Engineers, Service Design Engineers, Network Design Engineers, Network Deployment Engineers, Service Deployment Engineers, System Technicians, Service Technicians, System Engineers, Service Engineers, Field Technicians, System Administrators, Application Developers, Business Developers, Customer Care Administrators Prerequisites The participants should have a good general knowledge of telecommunications. Duration and class size The length of the course is 1 day and the maximum number of participants is 16. Learning situation This course is based on theoretical instructor-led lessons given in a classroom environment. Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Topics in the course Estimated time 1 TSS 4.0 Introduction TSS 4.0 Signalling Introduction IS in TSS 4.0 Technologies in the Connectivity Network (APZ 21260) APG 43 AXD 301 R hours 1.5 hours 1 hour 1 hour 0.5 hour 0.5 hour Commercial in Confidence

157 Page 157 Error! Unknown document property name. Error! Unknown document property name. Error! Unknown document property name. Description The course emphasizes on calculation and dimensioning of an Telephony Soft-switch FP1 (TSS 4.0) network. The focus is especially on capacity of the TeS, TGC/ML and MGWs nodes. For ML and MGWs, Integrated Site and AXD301 platforms are covered. The course includes also general TSS aspects needed to understand the included dimensioning procedures. The course contains presentations, exercises and cases in order to train the participants to handle the structuring, calculation and dimensioning of an TSS 4.0 network. Learning objectives On completion of this course the participants will be able to: 1 Retain basic understanding in the traffic theory used in TSS 4.0 dimensioning 1.1 Explain the Network Architecture for Telephony Softswitch Solution, TSS 1.2 Mention the protocols needed in TSS solution 1.3 Know the features in FP1 2 Mention the different terms and concepts regarding TSS 4.0 and TSS 4.0 FP1 solution 2.1 Describe the main components in TSS Solution 2.2 Describe the main TeS functions TCC, TGC, MGW/IC 2.3 Describe the MGW functions and the different GW in TSS 2.4 Shortly describe IS and its role in TSS 2.5 How the TGC and MGW can be implemented using IS 3 Describe the nodes in the TSS 4.0 solution 3.1 Describe the TSS solution nodes and the components and functions within each node 3.2 Pay attention to IS 2.0 solution 3.3 Understand how the capacity needed for TSS is depended on the type of traffic and type of access 4 Explain the Traffic Cases in TSS Shortly describe the protocols needed in TSS solution 4.2 Describe terms and concepts needed in TSS Solution 5 Explain the call types 5.1 Describe basic concepts in Traffic Theory needed in dimensioning process 5.2 Understand and explain processor load Definitions Commercial in Confidence

158 Page Draw the Traffic distribution examples showing the traffic flows 6.1 Describe the Node Dimensioning process in TSS Solution 7 Calculate and Dimension the Capacity of IS-based ML/MGW 7.1 Explain the concept Reference call 7.2 Describe the different traffic cases in TSS 7.3 Explain the Workload concept 8 Calculate and Dimension the Capacity of AXD301 based ML/MGW 8.1 Explain for TeS Call Handling capacity for Reference Calls 8.2 Explain the different TGC platforms that can be used for TGC implementation 8.3 Go through the Workload factors (WLF) of TeS in TSS Go through the Workload factors (WLF) for TGC implemented in IS and AXD 8.5 Explain the tables for MGW traffic and call handling capacity and WLF for MGW implemented in IS and AXD 9 Calculate Work Load factors 9.1 Understand how the MGW can be dimensioned in a Transit solution 9.2 Understand how a TGC controlling several MGWs can be dimensioned 9.3 Understand how the MGW can be dimensioned in a Local solution 9.4 Understand how the TGC can be dimensioned in a Local solution 10 Calculate and Dimension the Capacity of the TeS in TSS 4.0 network 10.1 Understand the bandwidth needs 10.2 Learn to calculate bandwidth needs Target audience The target audience for this course is: Network Design Engineers, Network Deployment Engineers. Prerequisites Successful completion of the following course: TSS 4.0 Introduction LZU R3A Duration and class size The length of the course is 3 days and the maximum number of participants is 16. Learning situation Commercial in Confidence

159 Page 159 This course is based on theoretical instructor-led lessons and exercises given in a classroom environment. Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Topics in the course Estimated time 1 TSS Architecture and node description 1.5 h Capacity Characteristics 1 h Concepts and Definitions 1 h Traffic Theory 1 h Node Dimensioning 1.5 h 2 Reference Call and Work Load Factor (WLF) Traffic Cases WLF in TeS, MGW (implemented in IS or AXD) Examples Conclusion what to dimension 2 h Traffic Distribution examples 1 h MGW Dimensioning example 1 h TeS Dimensioning example 1 h Bandwidth dimensioning example 1 h 3 Dimensioning Case 5 h Conclusion 1 h Commercial in Confidence

160 Page 160 TSS 4.0 Fault Finding Description LZU R3A This course will provide the participants with the competence needed to locate and solve faults in the Telephony Soft-switch (TSS 4.0 FP1) solution. The student will learn how to investigate and solve faults in the TSS 4.0 network, they will also learn how redundancy in the network is achieved. The course consists of task oriented exercises where the participants should find and solve faults/problems in the network using the trace tools available in the network nodes (AXE, AXD 301 or Integrated Site). Learning objectives On completion of this course the participants will be able to: 3 Understand the TSS 4.0 FP1 solution, list and describe the different protocols and their functions. 4 Describe signalling sequence and basic call setup. 5 Trace calls and signaling connections through the network, using the built-in tools for TCC, ML/TGC and MGW. 6 Initiate and understand different types of measurements 7 Understand the importance of providing the correct information. In the case of a upgrade or a fault to the system. 8 Locate and solve faults/problems in the TSS 4.0 FP1 solution by analyzing alarms and events in the different network elements. Target audience Commercial in Confidence

161 Page 161 The target audience for this course is: System Technicians, System Engineers, Field Technicians Prerequisites The participants should have successfully completed of the following course: TSS 4.0 Integration and Verification LZU R3A or EIN 3.1 to TSS 4.0 Integration and Verification Delta LZU R3A Duration and class size The length of the course is 2 days and the maximum number of participants is 8. Learning situation The course is instructor-led, using task oriented practical exercises, based on the TSS configuration available in the training network. Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Topics in the course Estimated time 1-2 TSS fault finding theory and exercises 12 h Commercial in Confidence

162 Page 162 TSS 4.0 Integration & Verification LZU R3A Description This course provides Ericsson customers with the competence needed to perform Integration and Verification of the Telephony Soft-switch (TSS 4.0) Feature Package 1 solution. The course consists of theory and case based exercises on how to integrate and verify TSS 4.0 FP1 on the AXE, Integrated Site platforms and AXD 301. All traffic and signaling interfaces in TSS will be covered and also the alarms related to the interfaces. Wireshark Traces will be created to show call sequences. The course will only describe TSS connected towards an IP core network. Learning objectives On completion of this course the participants will be able to: 1 Introduce the TSS 4.0 concepts and network elements 1.1 Outline the main components used in the TSS 4.0 FP1 network. 1.2 Become familiar with the new functionality incorporated into the TSS 4.0 FP1 solution. 1.3 Outline the signaling interfaces of TSS 4.0 FP Understand the different concepts and terms used in TSS 4.0 FP1. 2 Understand the TSS 4.0 HW & SW Implementation 2.1 Understand the HW and SW required for the TeS and the MGW when implementing. TSS 4.0 FP1 (Both AXD & Integrated Site). 3 Describe the Traffic Handling 3.1 Explain how the server addresses physical resources in MGWs. 3.2 Explain the protocol stacks involved in TSS 4.0 FP Describe the basic traffic cases in TSS 4.0 FP Describe signaling sequences at basic call setup and release. 3.5 Explain how different codec s affect the bandwidth utilization in the core network. 4 Perform the TCC TGC Communication configurations 4.1 Explain the function of the TCC TGC control interface. 4.2 Become familiar with the application protocols and protocol stack used over this interface. 4.3 Configure the control interface using the IPN and GESB. 4.4 Verify the interface. 5 Perform the TGC and MGW-IC Configuration 5.1 Define TGC and MGW-IC. 5.2 Configure and verify the IC interface. Commercial in Confidence

163 Page Configure and verify H.248 signaling links. 6 Configure the Virtual MGW 6.1 Configure and verify VMGW in a MGW Blade system. 6.2 Configure and verify H.248 signaling links. 6.3 Configure and verify the different dev types in the VMGW. 7 Perform the BICC Configuration 7.1 Configure and verify a BICC interface between two Telephony servers. 7.2 Monitor the BICC messages using TCC commands. 8 Understand and configure the ISUP Access 8.1 Configure and verify an ISUP access towards a MGW. 9 Perform EAR and RSS Access Configuration 9.1 Configure EAR and RSS access in MGW. 9.2 Configure EAR and RSS access in TCC. 9.3 Verify the EAR and RSS access in TSS. 10 Understand and configure PRA Access 10.1 Configure PRA access in MGW Configure PRA access in TCC Verify the PRA access in TSS. 11 Understand and configure V5.2 access 11.1 Configure V5.2 access in MGW Configure V5.2 access in TCC Verify the V5.2 access in TSS. 12 Configure SIP and SIP-I signaling interfaces 12.1 Configure and verify a SIP interface Configure and verify a SIP-I interface. 13 Configure H.323 signaling interfaces 13.1 Configure and verify a H.323 interface in the TeS towards a VoIP network. 14 Make a Call Path Tracing in TSS 14.1 Perform call path tracing in the TCC, TGC, and MGW. 15 Understand the MSAN configuration 15.1 Introduction to MSAN Understand how to configure a MSAN in the TSS 4.0 FP1 network. Commercial in Confidence

164 Page Introduce the IMS, DNS and ENUM concepts in TSS 4.0 FP1 Network 16.1 Explain how the TSS 4.0 FP1 is used as PSTN GW in the IMT Network Outline the main components and signaling interfaces used in the IMT TSS PSTN Gateway Network Understand the different concepts and terms used in IMT PSTN Gateway Understand DNS/ENUM (IP Works) and show how it is connected to TSS. 17 Describe the Geographic Redundancy TSS 4.0 FP Explain the Geographic Redundancy for TSS 4.0 concept Detail the TSS 4.0 FP1 n+1 solution. Target audience The target audience for this course is: System Engineer, Network Deployment Engineer. This audience is working with implementation, installation, testing, integration, operation and support tasks on TSS. Prerequisites The participants should have successfully completed some or all of the following flows: AXE Operation & Configuration LZU R3A TSS Introduction LZU R3A and AXD 301 Configuartion & Verification LZU R2A Integrated Site Overview (this course is on IS1.2) LZU R4B IS Operation and Configuration (this course is on IS1.2) LZU R2B IS MGw 1.2 Operation and Configuration LZU R1A or Integrated Site 2.0 Overview LZU R1B Integrated Site 2.0 Operation and Configuration and LZU R1B IS MGw 2.0 Operation and Configuration LZU R1A Duration and class size The length of the course is 5 days and the maximum number of participants is 8. Learning situation Commercial in Confidence

165 Page 165 This course is based on theoretical and practical instructor-led lessons given in both classroom and in a technical environment using equipment and tools, which could be accessed remotely. Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. (This paragraph is mandatory). Day Topics in the course Estimated time 1-5 Integration and Verification theory and exercises 30 Commercial in Confidence

166 Page 166 TSS 4.0 Signaling LZU R2A Description The complexity of the Core Network and the call control signaling has increased with the introduction of Soft-switch Solutions, Bearer Independent Call Control and options for IP-based transmission. This course is designed to give the participant an overview of signaling technologies and protocols used to manage and control voice calls in the Core Networks for TSS up to release TSS 4.0. The theoretical background will provide a better understanding for the Core Network in general and signaling in specific. Learning objectives On completion of this course the participants will be able to: 1 List the user plane protocol stacks in the Core Network 1.1 Explain the horizontally integrated network model for the next generation multi-service networks like TSS (Telephony Soft-switch Solution) 1.2 List the protocols used in the multi-service network and briefly describe their function 1.3 List the possible transport layer technologies and discuss their use 2 Explain the basic structure and terminology of the Signaling System Nº Explain the terms Subscriber Loop Signaling, Inter-Exchange Signaling, Channel Associated Signaling, and Common Channel Signaling 2.2 Explain the basic functions of OSI reference model layers and the relationship between the model and Signaling System Nº Draw and explain the basic structure of Signaling System Nº 7 and list at least three application-layer protocols 2.4 List and explain common network terminology used to describe network elements and the links between them. 3 Describe two different signaling transport alternatives used in the Core Network (MTP and SIGTRAN) and list the main differences between them. 3.1 List the major functions of the Message Transfer Part (MTP) 3.2 Explain the structure and functions of all MTP signal units (MSU, LSSU & FISU) and explain the function of all fields in the signal units 3.3 Explain the error control and signaling link supervision mechanisms 3.4 Explain the routing and load sharing of MTP signal units 3.5 Explain the network management functions and theirs influence on signaling traffic handling 3.6 List at least two different types of Ericsson signaling terminals and explain their connection in the AXE switch. Commercial in Confidence

167 Page Describe ISUP signaling capabilities briefly, and list the messages of a typical call setup. 4.1 Describe the concepts behind SS7 Signaling transport over IP. 4.2 Explain terminology, related to SIGTRAN, relevant for the Ericsson implementation. 4.3 Describe the function of the Stream Control Transmission Protocol (SCTP) in SIGTRAN 4.4 Describe the function of MTP3 User Adaption Layer (M3UA) in SIGTRAN. 5 Explain BICC & TGC signaling principles and concepts. 5.1 List the major functions of the ISDN User Part (ISUP) 5.2 List at least five messages used in typical call set-up cases and describe their functions 6 Describe the signaling between TeSs (also TeS to MGW) for setting up and releasing calls in the Telephony Softswitch Solution. 6.1 Explain the role of BICC in a Multi-Service Network 6.2 Explain how BICC relates to the ISDN User Part (ISUP) 6.3 List and describe new terminology pertaining to BICC 6.4 Diagrammatically represent the BICC Network Model 6.5 Explain the structure of BICC and its supports protocols 6.6 Describe the purpose and structure of Signaling Transport Converters (STCs) 6.7 Explain a typical call set-up procedure using BICC 6.8 Explain the difference between the BICC and the ISUP Message Signaling Unit 7 Describe the signaling for setting up and releasing bearers, between MGWs, in IP based backbone networks. 7.1 Explain the establishments of IP bearers to transport speech 7.2 Explain the tunneling principles used to establish an IP bearer 8 Explain SIP/SIP-T signaling principles and concepts. 8.1 Describe the basic functions and capabilities of SIP 8.2 Name major IETF protocols related to SIP, IMS and VoIP 8.3 List the SIP methods used in TSS and state their function 8.4 Explain the routing and addressing principles for SIP signaling 8.5 Explain the offer/answer model for SDP usage in SIP 8.6 Describe how SIP-T relates to BICC and SIP. 8.7 Explain the steps in a generic traffic case using SIP for session control. Commercial in Confidence

168 Page Explain H.323 signaling principles and concepts. 9.1 Describe the role of H.323 in TSS 9.2 Describe the different protocols of which H.323 consists 9.3 Compare the capabilities of H.323 vs. SIP and state important differences 9.4 Explain the steps in different traffic cases 10 Explain the inter-working between BICC, and Access Signaling in a typical circuit mode call setup in TSS Explain the interwoking Between H.323 and SIP Target audience The target audience for this course is personnel that needs a deeper insight about protocols and signaling techniques in the Core Network, like: System Engineer Network Design Engineers Prerequisites Successful completion of the following courses or flow: TSS Fundamentals FAB Duration and class size The length of the course is 3 days and the maximum number of participants is 16. Learning situation This course is based on theoretical instructor-led lessons given in a classroom environment. Commercial in Confidence

169 Page 169 Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate (effective time is stated, excluding brakes and 1 hour lunch). Day Topics in the course Estimated time 1 TSS Core Network Architecture 2 h 1 SS7 Intro 1 MTP (brief) 0,5 h 1 h 1 SIGTRAN 2 h 2 ISUP (brief) 2 BICC (Brief) 1,5 h 2,5 h 2/3 TGC 3 h 3 SIP, SIP-T 3,5 h 3 H.323 1,5 h 3 Traffic case, Signaling Interworking (BICC, SIP-I, TGC) 0,5 h Commercial in Confidence

170 Page 170 Commercial in Confidence

Telephony Server Platform (TSP) 5 Training Programs. Catalog of Course Descriptions

Telephony Server Platform (TSP) 5 Training Programs. Catalog of Course Descriptions Telephony Server Platform (TSP) 5 Training Programs Catalog of Course Descriptions Page 2 Catalog of Course Descriptions INTRODUCTION...3 TELECOM SERVER PLATFORM (TSP) 5 DELTA...4 TELECOM SERVER PLATFORM

More information

MSS R6.0 Training Programs. Preliminary Catalog of Course Descriptions

MSS R6.0 Training Programs. Preliminary Catalog of Course Descriptions MSS R6.0 Training Programs Preliminary Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION...5 ACCESS NETWORKS, AN OVERVIEW...6 APG 43 DELTA...8 APG43 INSTALLATION AND CONFIGURATION...10

More information

Mobile Softswitch Solution (MSS) R6.0

Mobile Softswitch Solution (MSS) R6.0 Package Presentation Mobile Softswitch Solution (MSS) R6.0 Training Programs 188/221 09-FAP 130 506 Uae A 1 Why invest in Mobile Softswitch Solution (MSS) R6.0 Package The package is divided into modular

More information

Mobile Centrex (MCX) 1.0 Training Programs. Catalog of Course Descriptions

Mobile Centrex (MCX) 1.0 Training Programs. Catalog of Course Descriptions Mobile Centrex (MCX) 1.0 Training Programs Catalog of Course Descriptions Page 2 Catalog of Course Descriptions INTRODUCTION...3 TELECOM SERVER PLATFORM (TSP) NODE MANAGEMENT...4 TELECOM SERVER PLATFORM

More information

Mobile Positioning System (MPS) Training Programs. Catalog of Course Descriptions

Mobile Positioning System (MPS) Training Programs. Catalog of Course Descriptions Mobile Positioning System (MPS) Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION... 3 ERICSSON MOBILE POSITIONING SYSTEM (MPS) OVERVIEW... 4 ERICSSON MOBILE

More information

GSM BSS 08A Training Programs. Catalog of Course Descriptions

GSM BSS 08A Training Programs. Catalog of Course Descriptions GSM BSS 08A Training Programs Catalog of Course Descriptions Page 2 Catalog of Course Descriptions INTRODUCTION...5 GSM BSS 08 CELL PLANNING WORKSHOP...6 GSM BSS 08 GPRS/EGPRS OPTIMIZATION WORKSHOP...9

More information

Ericsson Multi Activation 6.0 Training Programs. Catalog of Course Descriptions

Ericsson Multi Activation 6.0 Training Programs. Catalog of Course Descriptions Ericsson Multi Activation 6.0 Training Programs Catalog of Course Descriptions Page 2 Catalog of Course Descriptions INTRODUCTION...3 EMA 6.0 DELTA...4 EMA 6.0 OVERVIEW...6 EMA 6.0 INTERFACES...8 EMA 6.0

More information

Optical Networks Training Programs. Catalog of Course Descriptions

Optical Networks Training Programs. Catalog of Course Descriptions Optical Networks Training Programs Catalog of Course Descriptions 1 Catalog of Course Descriptions INTRODUCTION...4 OPTICAL NETWORKS SYSTEM OVERVIEW (VCT)...5 OPTICAL NETWORKS SYSTEM SURVEY...8 MARCONI

More information

Wi-Fi Mobility Gateway (WMG) 1 Training Programs. Catalog of Course Descriptions

Wi-Fi Mobility Gateway (WMG) 1 Training Programs. Catalog of Course Descriptions Wi-Fi Mobility Gateway (WMG) 1 Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION... 3 WI-FI MOBILITY GATEWAY (WMG) 1 OVERVIEW... 4 WI-FI MOBILITY GATEWAY (WMG)

More information

Security Gateway (SEG) 5 Training Programs. Catalog of Course Descriptions

Security Gateway (SEG) 5 Training Programs. Catalog of Course Descriptions Security Gateway (SEG) 5 Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION... 3 SECURITY GATEWAY (SEG) 5 OVERVIEW... 4 SECURITY GATEWAY (SEG) 5 OPERATION AND

More information

User Data Consolidation (UDC) 16 Training Programs. Catalog of Course Descriptions

User Data Consolidation (UDC) 16 Training Programs. Catalog of Course Descriptions User Data Consolidation (UDC) 16 Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION... 3 ERICSSON USER DATA CONSOLIDATION (UDC) 16 OVERVIEW... 4 ERICSSON USER

More information

RAN Transmision (RANT) T14A Training Programs. Catalog of Course Descriptions

RAN Transmision (RANT) T14A Training Programs. Catalog of Course Descriptions RAN Transmision (RANT) T14A Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION... 3 SIU 02 / TCU 02 T14 FIELD MAINTENANCE... 4 SIU 02 / TCU 02 T14 OPERATION AND

More information

Messaging in One (MiO) 3.0 Training Programs. Catalog of Course Descriptions

Messaging in One (MiO) 3.0 Training Programs. Catalog of Course Descriptions Messaging in One (MiO) 3.0 Training Programs Catalog of Course Descriptions Catalog of Course Descriptions MESSAGING IN ONE (MIO) 3.0 CORE SYSTEM OPERATION... 4 MESSAGING IN ONE (MIO) 3.0 CORE SYSTEM SURVEY...

More information

Mobile Positioning System (MPS) 16 Training Programs. Catalog of Course Descriptions

Mobile Positioning System (MPS) 16 Training Programs. Catalog of Course Descriptions Mobile Positioning System (MPS) 16 Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION... 3 ERICSSON MOBILE POSITIONING SYSTEM (MPS) 16 OVERVIEW... 4 ERICSSON MOBILE

More information

Mobile Softswitch Solution (MSS) R6.1 Training Programs. Catalog of Course Descriptions

Mobile Softswitch Solution (MSS) R6.1 Training Programs. Catalog of Course Descriptions Mobile Softswitch Solution (MSS) R6.1 Training Programs Catalog of Course Descriptions Page 2 Catalog of Course Descriptions INTRODUCTION...5 AXE EMERGENCY HANDLING...6 MSS VOIP INTERWORKING...9 SIGNALING

More information

Ericsson Mobile Positioning System (MPS) 11 Training Programs. Catalog of Course Descriptions

Ericsson Mobile Positioning System (MPS) 11 Training Programs. Catalog of Course Descriptions Ericsson Mobile Positioning System (MPS) 11 Training Programs Catalog of Course Descriptions Commercial in Confidence 2 Catalog of Course Descriptions INTRODUCTION... 4 ERICSSON MOBILE POSITIONING SYSTEM

More information

Optical Network 2011 Training Programs. Catalog of Course Descriptions

Optical Network 2011 Training Programs. Catalog of Course Descriptions Optical Network 2011 Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION...4 OPTICAL NETWORKS OVERVIEW...5 OPTICAL NETWORKS SYSTEM SURVEY...7 SPO 1400 (OMS 1400)

More information

User Data Consolidation (UDC) 16 Training Programs. Catalog of Course Descriptions

User Data Consolidation (UDC) 16 Training Programs. Catalog of Course Descriptions User Data Consolidation (UDC) 16 Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION... 3 ERICSSON USER DATA CONSOLIDATION (UDC) 16 OVERVIEW... 4 ERICSSON USER

More information

Ericsson Adaptive Inventory Training Programs. Catalog of Course Descriptions

Ericsson Adaptive Inventory Training Programs. Catalog of Course Descriptions Ericsson Adaptive Inventory Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION... 3 EAI 16.3 TECHNICAL FOUNDATION... 5 Commercial in Confidence 2 2017 Introduction

More information

Ericsson Multi Activation (EMA) 15 Training Programs. Catalog of Course Descriptions

Ericsson Multi Activation (EMA) 15 Training Programs. Catalog of Course Descriptions Ericsson Multi Activation (EMA) 15 Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION... 3 ERICSSON MULTI ACTIVATION (EMA) 15 PROVISIONING GATEWAY CLASSIC BASIC

More information

Ericsson Composition Engine (ECE) 17 Training Programs. Catalog of Course Descriptions

Ericsson Composition Engine (ECE) 17 Training Programs. Catalog of Course Descriptions Ericsson Composition Engine (ECE) 17 Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION... 3 ERICSSON COMPOSITION ENGINE (ECE) 17.1 CSS OPERATION & MAINTENANCE.

More information

Ericsson Network Manager (ENM) 17 Training Programs. Catalog of Course Descriptions

Ericsson Network Manager (ENM) 17 Training Programs. Catalog of Course Descriptions Ericsson Network Manager (ENM) 17 Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION... 3 TRANSFORMING FROM CLASSICAL OSS TO ENM OVERVIEW LIVE VIRTUAL... 5 ENM

More information

ECE 2.01 Training Programs. Catalog of Course Descriptions

ECE 2.01 Training Programs. Catalog of Course Descriptions ECE 2.01 Training Programs Catalog of Course Descriptions Page 2 Catalog of Course Descriptions INTRODUCTION...3 ECE 2.1 OPERATIONS AND MAINTENANCE...4 ECE 2.1 SERVICE COMPOSITION...6 ECE 2.1 SERVICE DEVELOPMENT...8

More information

Ericsson Adaptive Inventory (EAI) 18 Training Programs. Catalog of Course Descriptions

Ericsson Adaptive Inventory (EAI) 18 Training Programs. Catalog of Course Descriptions Ericsson Adaptive Inventory (EAI) 18 Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION... 3 EAI 18 TECHNICAL FOUNDATION... 5 EAI 18 NETWORK DESIGNER AND UNIFIED

More information

OSS-RC 12 Training Programs. Catalog of Course Descriptions

OSS-RC 12 Training Programs. Catalog of Course Descriptions OSS-RC 12 Training Programs Catalog of Course Descriptions 315/03819-FAP 130 506 Uae Rev: B Commercial in Confidence 2 Catalog of Course Descriptions INTRODUCTION... 5 OSS RC 12.0 OVERVIEW... 6 OSS RC

More information

Training Catalogue PDC Year 2000

Training Catalogue PDC Year 2000 Training Catalogue PDC Year 2000 E Training Catalogue PDC Table of Contents... 4 Introduction... 5 Overview Courses... 9 Network Operation... 16 System Administration... 24 Network Development... 29 Maintenance...

More information

GSM RAN G15B and Multi-Standard RANT T15B & U15B CUSTOMER PRESENTATION

GSM RAN G15B and Multi-Standard RANT T15B & U15B CUSTOMER PRESENTATION GSM RAN G15B and Multi-Standard RANT T15B & U15B CUSTOMER PRESENTATION Supported Service Delivery Methods Icon Delivery Method Instructor Led Training (ILT) Workshop (WS) LIVE Virtual Classroom Training

More information

Mobile Softswitch Solution (MSS) 14B Learning Services

Mobile Softswitch Solution (MSS) 14B Learning Services Mobile Softswitch Solution (MSS) 14B Learning Services Features Overview - LTE to GSM Handover (SRVCC) SRVCC support for calls in Alerting phase SRVCC support for Emergency calls in IMS HD voice with G.722

More information

Diameter Signaling Controller (DSC) Training Programs. Catalog of Course Descriptions

Diameter Signaling Controller (DSC) Training Programs. Catalog of Course Descriptions Diameter Signaling Controller (DSC) Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION...3 Open 2 Introduction Ericsson has developed a comprehensive Training

More information

GSM RAN G16B and Multi-Standard RANT T15B & U16B CUSTOMER PRESENTATION

GSM RAN G16B and Multi-Standard RANT T15B & U16B CUSTOMER PRESENTATION GSM RAN G16B and Multi-Standard RANT T15B & U16B CUSTOMER PRESENTATION Supported Service Delivery Methods Icon Delivery Method Instructor Led Training (ILT) Workshop (WS) LIVE Virtual Classroom Training

More information

LTE RBS6000 & OSS Field Maintenance

LTE RBS6000 & OSS Field Maintenance LTE RBS6000 & OSS Field Maintenance LZU 102 2688 R1A Description This course is a task-based course covering hardware replacement and maintenance of the RBS 6000 Family*. The participants will perform

More information

WCDMA RAN P7FP Training Programs. Package Presentation

WCDMA RAN P7FP Training Programs. Package Presentation WCDMA RAN P7FP Training Programs Package Presentation Ericsson AB 2008 1 Why invest in WCDMA RAN P7FP Package Better controlling and optimizing the network performance Optimal investment Efficiently building

More information

Improvements Within APZ

Improvements Within APZ Improvements Within APZ Chapter 3 This chapter is designed to provide the student with knowledge about the main changes within the APZ system. The chapter describes important improvements within all different

More information

WCDMA RAN P5 Training Programs. Package Presentation

WCDMA RAN P5 Training Programs. Package Presentation WCDMA RAN P5 Training Programs Package Presentation Ericsson AB 2009 1 Why invest in the WCDMA RAN P5 Package! Better controlling and optimizing the network performance! Optimal investment! Efficiently

More information

Ericsson Network Manager (ENM) 18 Training Programs. Catalog of Course Descriptions

Ericsson Network Manager (ENM) 18 Training Programs. Catalog of Course Descriptions Ericsson Network Manager (ENM) 18 Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION... 4 OVERVIEW OF ENM FOR CLASSICAL SO EM... 6 OVERVIEW OF ENM APPLICATION

More information

Package Presentation OSS-RC 6 Training Programs. Ericsson AB

Package Presentation OSS-RC 6 Training Programs. Ericsson AB Package Presentation Training Programs Ericsson AB 2009 1 Why invest in Package! Better controlling and optimizing the network performance! Optimal investment! Efficiently building and maintaining competence

More information

OSS-RC 13B System Administration ( 5 Days)

OSS-RC 13B System Administration ( 5 Days) OSS-RC 13B System Administration ( 5 Days) LZU1089424 R1A Description This course will give the student thorough knowledge required to administrate the OSS-RC system. This course prepares OSS-RC System

More information

Ericsson Multi Activation (EMA) 16 Training Programs. Catalog of Course Descriptions

Ericsson Multi Activation (EMA) 16 Training Programs. Catalog of Course Descriptions Ericsson Multi Activation (EMA) 16 Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION... 3 ERICSSON MULTI ACTIVATION (EMA) 16 OPERATION AND PROVISIONING... 4 ERICSSON

More information

Mobile Softswitch Solution (MSS) 16A Learning Services

Mobile Softswitch Solution (MSS) 16A Learning Services Mobile Softswitch Solution (MSS) 16A Learning Services Service Delivery Methods Icon Delivery Method Instructor Led Training (ILT) Workshop (WS) LIVE Virtual Classroom Training (VCT) elearning (WBL) Structured

More information

Ericsson GSM-N Ucore4 Training Programs Catalog of Course Descriptions

Ericsson GSM-N Ucore4 Training Programs Catalog of Course Descriptions Ericsson GSM-N Ucore4 Training Programs 2012 Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION... 3 ERICSSON GSM-N VOICE CORE NETWORK FUNDAMENTALS... 4 ERICSSON GSM-N R4 MEDIA

More information

User Data Consolidation (UDC) 15 Training Programs. Catalog of Course Descriptions

User Data Consolidation (UDC) 15 Training Programs. Catalog of Course Descriptions User Data Consolidation (UDC) 15 Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION... 4 ERICSSON CENTRALIZED USER DATABASE (CUDB) 15 OPERATION & SERVICE CONFIGURATION...

More information

IP Broadband Network Management R12 Training Programs. Catalog of Course Descriptions

IP Broadband Network Management R12 Training Programs. Catalog of Course Descriptions IP Broadband Network Management R12 Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION... 4 TMN, FCAPS AND SNMP OVERVIEW... 5 SERVICEON OVERVIEW... 7 SERVICEON

More information

Long Term Evolution Radio Access Network L14 Training Programs. Catalog of Course Descriptions

Long Term Evolution Radio Access Network L14 Training Programs. Catalog of Course Descriptions Long Term Evolution Radio Access Network L14 Training Programs Catalog of Course Descriptions 352/03819-FAP 130 506 Uae Rev: B Commercial in Confidence 2 Catalog of Course Descriptions INTRODUCTION...

More information

Catalog of Course Descriptions

Catalog of Course Descriptions Business Communication Suite (BCS) 2.0 Training Programs Catalog of Course Descriptions The information in this document is subject to change without notice. Page 2 Catalog of Course Descriptions INTRODUCTION...4

More information

Charging System (CS) 18 Training Programs. Catalog of Course Descriptions

Charging System (CS) 18 Training Programs. Catalog of Course Descriptions Charging System (CS) 18 Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION... 3 CHARGING SYSTEM (CS) 18 OVERVIEW... 6 CHARGING CONTROL NODE (CCN) OPERATIONS FOR

More information

USER MANAGEMENT Training Programs. Package Presentation

USER MANAGEMENT Training Programs. Package Presentation USER MANAGEMENT Training Programs Package Presentation Ericsson AB 2010 1 Why invest in Package Comprehensive portfolio that meets the customer needs. User Management is composed by a number of products

More information

Mobile Softswitch Solution (MSS) 17A Learning Services

Mobile Softswitch Solution (MSS) 17A Learning Services Mobile Softswitch Solution (MSS) 17A Learning Services Service Delivery Methods Icon Delivery Method Instructor Led Training (ILT) Workshop (WS) LIVE Virtual Classroom Training (VCT) elearning (WBL) Structured

More information

Mobile OSS OSS-RC Releases 2015

Mobile OSS OSS-RC Releases 2015 Mobile OSS OSS-RC Releases 2015 What does OSS-RC Training Provide? It allows us to build and maintain competence in OSS-RC with flexible Training Packages It includes Delta training in line with Product

More information

Packet Core 2009 Training Programs. Catalog of Course Descriptions

Packet Core 2009 Training Programs. Catalog of Course Descriptions Packet Core 2009 Training Programs Catalog of Course Descriptions Page 2 Catalog of Course Descriptions INTRODUCTION... 4 SGSN 2009A DELTA... 5 SGSN 2009B DELTA... 7 GGSN 2009A DELTA... 9 GGSN 2009B DELTA...

More information

Packet Core 2010 Training Programs

Packet Core 2010 Training Programs Packet Core 2010 Training Programs Package Presentation Packet Core 2010 Ericsson AB 2010 Page 1 Why invest in Packet Core Package Combinations of the flows in this Training Package is made up of modular

More information

WCDMA RAN W13 Learning Services

WCDMA RAN W13 Learning Services WCDMA RAN W13 Learning Services Why invest in WCDMA RAN W13 Learning Service Better controlling and optimizing the network performance Optimal investment Efficiently building and maintaining competence

More information

WCDMA RAN W12 LEARNING SERVICES

WCDMA RAN W12 LEARNING SERVICES WCDMA RAN W12 LEARNING SERVICES Why invest in WCDMA RAN W12 Learning Service Better controlling and optimizing the network performance Optimal investment Efficiently building and maintaining competence

More information

Catalog of Course Descriptions

Catalog of Course Descriptions IMS Common System (ICS) 5.0 Training Programs Catalog of Course Descriptions The information in this document is subject to change without notice. Page 2 Catalog of Course Descriptions INTRODUCTION...4

More information

LTE L17 Learning Services

LTE L17 Learning Services LTE L17 Learning Services Why invest in LTE L17 Learning Service Better controlling and optimizing the network performance Optimal investment Efficiently building and maintaining competence over system

More information

Multi Mediation 18 Training Programs. Catalog of Course Descriptions

Multi Mediation 18 Training Programs. Catalog of Course Descriptions Multi Mediation 18 Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION...3 MULTI MEDIATION 18 DELTA...5 MULTI MEDIATION 18 DELTA...11 MULTI MEDIATION 18 FILE ADVANCED

More information

Charging System (CS) 18 Training Programs. Catalog of Course Descriptions

Charging System (CS) 18 Training Programs. Catalog of Course Descriptions Charging System (CS) 18 Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION...3 CHARGING CONTROL NODE (CCN) OPERATIONS FOR CS 18...5 CHARGING CONTROL NODE (CCN)

More information

IP Broadband Network Management 2016 Training Programs. Catalog of Course Descriptions

IP Broadband Network Management 2016 Training Programs. Catalog of Course Descriptions IP Broadband Network Management 2016 Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION... 3 ERICSSON IP TRANSPORT NMS R12 FOR ASON (WSON) SOLUTION OPERATIONS

More information

Cloud Systems 2018 Training Programs. Catalog of Course Descriptions

Cloud Systems 2018 Training Programs. Catalog of Course Descriptions Cloud Systems 2018 Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION...3 Open 2 2018 Introduction Ericsson has developed a comprehensive Training Programs service

More information

Packet Core 2009 Training Programs

Packet Core 2009 Training Programs Packet Core 2009 Training Programs Package Presentation Packet Core 2009 Ericsson AB 2010 Page 1 Why invest in Packet Core Package Combinations of the flows in this Training Package exactly match the job

More information

Router 6000 R17 Training Programs. Catalog of Course Descriptions

Router 6000 R17 Training Programs. Catalog of Course Descriptions Router 6000 R7 Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION... 3 IP NETWORKING... 4 IP OVERVIEW & FUNDAMENTALS... 8 IP ROUTING OVERVIEW & FUNDAMENTALS...0

More information

IMS 14 PSTN to IP. training programs

IMS 14 PSTN to IP. training programs IMS 14 PSTN to IP training programs PSTN to IP Related Portfolio Business Solutions Global Services PSTN to IP Databases Application Enablers Interworking Covered Covered HSS MTAS EMe PGM BCE CUDB Covered

More information

IP Broadband Network Management 2018 Training Programs. Catalog of Course Descriptions

IP Broadband Network Management 2018 Training Programs. Catalog of Course Descriptions IP Broadband Network Management 2018 Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION... 3 ERICSSON IP TRANSPORT NMS R12 FOR ASON (WSON) SOLUTION OPERATIONS

More information

Ims 15 PSTN to IP. training programs

Ims 15 PSTN to IP. training programs Ims 15 PSTN to IP training programs PSTN to IP Related Portfolio Business Solutions Global Services PSTN to IP Databases Application Enablers Interworking Covered Covered HSS MTAS EMe PGM BCE CUDB Covered

More information

UDC 13B Training Programs. Catalog of Course Descriptions

UDC 13B Training Programs. Catalog of Course Descriptions UDC 13B Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION... 4 CSCF 13 HSS/SLF 12 OPERATION AND CONFIGURATION... 5 EPC HSS/SLF 12 OPERATION AND CONFIGURATION...

More information

Messaging in One (MiO) 1.0 Training Programs. Catalog of Course Descriptions

Messaging in One (MiO) 1.0 Training Programs. Catalog of Course Descriptions Messaging in One (MiO) 1.0 Training Programs Catalog of Course Descriptions Page 2 Catalog of Course Descriptions INTRODUCTION...3 MESSAGING IN ONE (MIO) 1.0 SYSTEM SURVEY...4 MESSAGING IN ONE (MIO) 1.0

More information

LTE L13 Learning Services

LTE L13 Learning Services LTE L13 Learning Services Why invest in LTE L13 Learning Service Better controlling and optimizing the network performance Optimal investment Efficiently building and maintaining competence over system

More information

Packet Core 2010 Training Programs. Catalog of Course Descriptions

Packet Core 2010 Training Programs. Catalog of Course Descriptions Packet Core 2010 Training Programs Catalog of Course Descriptions Page 2 Catalog of Course Descriptions INTRODUCTION...4 EVOLVED PACKET CORE (EPC) SYSTEM SURVEY...5 EPC SIGNALING...9 GPRS SYSTEM SURVEY...12

More information

Cloud System 2016 Training Programs. Catalog of Course Descriptions

Cloud System 2016 Training Programs. Catalog of Course Descriptions Cloud System 2016 Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION... 4 CLOUD IN A NUTSHELL... 5 CLOUD DRIVER AND OPPORTUNITY... 7 CLOUD SYSTEMS AND THE ERICSSON

More information

Mobile Softswitch Solution (MSS) 18. (Virtual and native deployment) training programs

Mobile Softswitch Solution (MSS) 18. (Virtual and native deployment) training programs Mobile Softswitch Solution (MSS) 18 (Virtual and native deployment) training programs Service Delivery Methods Icon Delivery Method Instructor Led Training (ILT) Workshop (WS) LIVE Virtual Classroom Training

More information

IMS 14 system & products. training programs

IMS 14 system & products. training programs IMS 14 system & products training programs Ims related Portfolio Business Solutions Mobile Telephony Evolution with VoLTE Flexible RCS Visual Communication PSTN to IP Visual Communication Global Services

More information

IMS 15 Mobile Telephony Evolution with volte. training programs

IMS 15 Mobile Telephony Evolution with volte. training programs IMS 15 Mobile Telephony Evolution with volte training programs MTE Related Portfolio Solutions Global Services Mobile Telephony Evolution with VoLTE Databases Application Enablers Interworking Covered

More information

Mobile OSS OSS-RC Releases 12

Mobile OSS OSS-RC Releases 12 Mobile OSS OSS-RC Releases 12 What does OSS-RC Training Provide? It allows us to build and maintain competence in OSS-RC with flexible Training Packages It includes Delta training in line with Product

More information

Packet Core 2012 Training Programs. Catalog of Course Descriptions

Packet Core 2012 Training Programs. Catalog of Course Descriptions Packet Core 2012 Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION... 4 SASN 2012 ADMINISTRATION AND TROUBLESHOOTING... 5 SASN 2012 OPERATION AND CONFIGURATION...

More information

R5 Training Programs. Catalog of Course Descriptions

R5 Training Programs. Catalog of Course Descriptions Mobile@Home R5 Training Programs Catalog of Course Descriptions Page 2 Catalog of Course Descriptions INTRODUCTION...3 IP NETWORKING...4 GPRS/EDGE OVERVIEW...7 GSM AXE OPERATION...8 GSM/WCDMA CORE NETWORK

More information

WCDMA RAN W11 Training Programs. Catalog of Course Descriptions

WCDMA RAN W11 Training Programs. Catalog of Course Descriptions WCDMA RAN W11 Training Programs Catalog of Course Descriptions Page 2 Catalog of Course Descriptions INTRODUCTION...4 WCDMA RAN W11 PERFORMANCE MANAGEMENT AND OPTIMIZATION...5 ERICSSON WCDMA SYSTEM OVERVIEW...9

More information

(A212) Communication Application Server (AS) Standalone Overview

(A212) Communication Application Server (AS) Standalone Overview (A212) Communication Application Server (AS) Standalone Overview This course provides a technical overview of the Communication Application Server Standalone configuration. Managers, administrators and

More information

IMS 16 System & Products Training Programs. Catalog of Course Descriptions

IMS 16 System & Products Training Programs. Catalog of Course Descriptions IMS 16 System & Products Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION... 4 CSCF 16 OPERATION AND CONFIGURATION... 5 CSCFV 16 OPERATION AND CONFIGURATION...

More information

Long Term Evolution - LTE L10 Training Programs. Catalog of Course Descriptions

Long Term Evolution - LTE L10 Training Programs. Catalog of Course Descriptions Long Term Evolution - LTE L10 Training Programs Catalog of Course Descriptions Page 2 Catalog of Course Descriptions INTRODUCTION... 3 LTE EVOLUTION, ADVANTAGES IN FEATURES AND APPLICATIONS... 4 LTE/SAE

More information

IMS 17 and vims1 Mobile Telephony Evolution with VoLTE. training programs

IMS 17 and vims1 Mobile Telephony Evolution with VoLTE. training programs IMS 17 and vims1 Mobile Telephony Evolution with VoLTE training programs IMS 17 Related Portfolio Solutions Global Services Mobile Telephony Evolution with VoLTE Databases Application Enablers Interworking

More information

IMS Core 10B and IMS Nodes Training Programs. Portfolio Presentation

IMS Core 10B and IMS Nodes Training Programs. Portfolio Presentation IMS Core 10B and IMS Nodes Training Programs Portfolio Presentation Agenda Why IMS Training? Overview of IMS Course Portfolio Training Delivery Methods Standard and Customized Training Competence Gap Analysis

More information

Ericsson Network Manager (ENM) 17

Ericsson Network Manager (ENM) 17 Ericsson Network Manager (ENM) 17 What does ENM Training Provide? The blended training portfolio is a combination of web based learning, virtual classroom training, instructor led training and also includes

More information

Microwave Networks R13 Training Programs. Catalog of Course Descriptions

Microwave Networks R13 Training Programs. Catalog of Course Descriptions Microwave Networks R13 Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION... 5 IP OVERVIEW & FUNDAMENTALS... 6 IP ROUTING OVERVIEW & FUNDAMENTALS... 8 IP-QOS OVERVIEW

More information

mobile backhaul solution

mobile backhaul solution mobile backhaul solution training program Access site Local Switching Site 2G BSC 3G RNC 4G LRAN, Access HRAN, Metro AGW why invest in a Microwave Networks package Faster time to revenue You can secure

More information

CDMA Training Programs. Catalog of Course Descriptions

CDMA Training Programs. Catalog of Course Descriptions CDMA Training Programs Catalog of Course Descriptions Page 2 Catalog of Course Descriptions CDMA 1XEV-DO OPERATIONS AND MAINTENANCE...20 THIS COURSE IS INSTRUCTOR-LED TRAINING WITH HANDS-ON EXERCISES....21

More information

BCS 2.1 Training Programs. Portfolio Presentation

BCS 2.1 Training Programs. Portfolio Presentation BCS 2.1 Training Programs Portfolio Presentation Agenda Why IMS Training? Overview of IMS Course Portfolio Training Delivery Methods Standard and Customized Training Competence Gap Analysis Steps Learning

More information

IMS 15 System & Products Training Programs. Catalog of Course Descriptions

IMS 15 System & Products Training Programs. Catalog of Course Descriptions IMS 15 System & Products Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION... 4 CSCF 15 OPERATION AND CONFIGURATION... 6 FLEXIBLE RCS SYSTEM SURVEY... 9 HSS 15

More information

IMS 15 Business Communication. training programs

IMS 15 Business Communication. training programs IMS 15 Business Communication training programs Business communication Related Portfolio Business Solutions Global Services Business Communication Databases Application Enablers Interworking Covered Covered

More information

Packet Core Network 2016 Training Programs. Catalog of Course Descriptions

Packet Core Network 2016 Training Programs. Catalog of Course Descriptions Packet Core Network 2016 Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION... 5 TRANSFORMING FROM NATIVE TO VIRTUAL EPC - LIVE VIRTUAL... 7 VIRTUAL EPC OVERVIEW...

More information

Background Chapter 1 OBJECTIVES:

Background Chapter 1 OBJECTIVES: Background Chapter 1 This chapter is designed to provide the student with a general knowledge about the AXE market as well as the main components in AXE 810. It will also show the benefits of the modernisation

More information

IMS 17 and vims 1 system & products. training programs

IMS 17 and vims 1 system & products. training programs IMS 17 and vims 1 system & products training programs IMS 17 Related Portfolio Solutions Mobile Telephony Evolution with VoLTE Wi-Fi calling Enriched Communication PSTN to IP Global Services Databases

More information

VRT-202 Veritas Cluster Server for UNIX/Linux Administration

VRT-202 Veritas Cluster Server for UNIX/Linux Administration VRT-202 Veritas Cluster Server for UNIX/Linux Administration COURSE DESCRIPTION The VERITAS Cluster Server course is designed for the IT professional tasked with installing, configuring, and maintaining

More information

IMS 11A Core and IMS Nodes Training Programs. Catalog of Course Descriptions

IMS 11A Core and IMS Nodes Training Programs. Catalog of Course Descriptions IMS 11A Core and IMS Nodes Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION...3 IMS IN A NUTSHELL...4 IMS FROM A BUSINESS PERSPECTIVE...5 IMS 11A OVERVIEW...8

More information

Charging System (CS) 5.3 Training Programs. Catalog of Course Descriptions

Charging System (CS) 5.3 Training Programs. Catalog of Course Descriptions Charging System (CS) 5.3 Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION... 3 CHARGING CONTROL NODE (CCN) OPERATIONS FOR CS 5.3... 4 CHARGING CONTROL NODE (CCN)

More information

IMS 16 Mobile Telephony Evolution with volte. training programs

IMS 16 Mobile Telephony Evolution with volte. training programs IMS 16 Mobile Telephony Evolution with volte training programs Volte Related Portfolio Solutions Global Services Mobile Telephony Evolution with VoLTE Databases Application Enablers Interworking HSS Covered

More information

ERICSSON WALLET PLATFORM (EWP) 3.1 TRAINING PROGRAMS

ERICSSON WALLET PLATFORM (EWP) 3.1 TRAINING PROGRAMS ERICSSON WALLET PLATFORM (EWP) 3.1 TRAINING PROGRAMS What's in the EWP 3.1 Learning Service? Course Name Number Length Method Ericsson Wallet Platform (EWP) 3.1 Overview LZU1089724 1 day ILT Ericsson Wallet

More information

IP Broadband Network Management 2011 Training program

IP Broadband Network Management 2011 Training program IP Broadband Network Management 2011 Training program What's in IP Broadband Network Management Learning Service Overview/Fundamentals ServiceON Element Management Operations ServiceON Network management

More information

IMS 17 and vims1 enriched Communication. training programs

IMS 17 and vims1 enriched Communication. training programs IMS 17 and vims1 enriched Communication training programs IMS 17 Related Portfolio Solutions Global Services Enriched Communication Databases Application Enablers Interworking HSS Covered MTAS Covered

More information

CDMA Training Programs Catalog of Course Descriptions

CDMA Training Programs Catalog of Course Descriptions CDMA Training Programs 2012 Catalog of Course Descriptions Catalog of Course Descriptions Introduction... 5 CDMA 1xEVDO Operations and Maintenance... 7 1XEVDO SYSTEM PERFORMANCE AND OPTIMIZATION... 11

More information

WCDMA RAN W10 Training Programs. Catalog of Course Descriptions

WCDMA RAN W10 Training Programs. Catalog of Course Descriptions WCDMA RAN W10 Training Programs Catalog of Course Descriptions Page 2 Catalog of Course Descriptions INTRODUCTION...4 WCDMA RAN W10 PERFORMANCE MANAGEMENT AND OPTIMIZATION...5 WCDMA RAN W10 QUALITY OF

More information

Packet Core 2011 Training Programs. Catalog of Course Descriptions

Packet Core 2011 Training Programs. Catalog of Course Descriptions Packet Core 2011 Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION... 4 EPC HSS/SLF 11A OPERATION AND CONFIGURATION... 5 EPC SIGNALING... 8 EPC SYSTEM SURVEY...

More information