-
In the past years, the networking world has been strongly influenced by a trend away from classic technologies towards All-IP. In this context, the course at hand offers you a comprehensive overview of current networking concepts—from transmission technology to the Next Generation Network. This is done both from the viewpoint of network operators and of enterprise structures. The course imparts a conceptual understanding of the different networking technologies and their fields of application. As a result, the participants will learn to use the corresponding terminology competently. New developments such as Software-Defined Networking (SDN) and Network Function Virtualization (NFV) round off the table of contents.
-
Course Contents
-
- Transmission and Switching, Multiplexing Methods, LAN and WAN
- Last Mile, Aggregation Area, and Backbone
- The Layer Model
- IP(v4 and v6) Addressing and Routing
- The Structure of the Internet—ISPs, Peerings, and Providings
- IP Applications (Client/Server and Peer to Peer)
- Security: Firewalls, VPNs, Intrusion Detection & Prevention
- Transmission Technology: SDH and WDM
- Multiprotocol Label Switching (MPLS)
- DSL Connections and Variants (ADSL, ADSL2, ADSL2+, and VDSL2), Vectoring
- Cable Networks and DOCSIS
- Metropolitan Ethernet
- LTE
- LANs: Ethernet Switching and VLANs, Network Design
- Wireless LAN: Bit Rates, Ranges, Security
- Storage Networks: Network Attached Storage and Storage Area Networks
- Voice Switching: Media Streams and Signaling
- Convergent Networks: VoIP and Next Generation Networks (NGN)
- Software-Defined Networking (SDN)
- Network Function Virtualization (NFV)
You will receive the comprehensive documentation package of the ExperTeach Networking series – printed documentation, e-book, and personalized PDF! As online participant, you will receive the e-book and the personalized PDF.
-
Target Group
-
The course addresses all persons in general who wish to become acquainted with the networking world from a technical point of view.
-
Knowledge Prerequisites
-
A keen interest in the concepts and technologies of modern communications networks is the main prerequisite for the course at hand.
1 | Networks— An Introduction |
1.1 | A Typical Scenario: Corporate Network |
1.1.1 | The Head Office |
1.1.2 | The Branch Offices |
1.1.3 | Mobile Workers |
1.2 | Applications and Requirements |
1.3 | Basic Concepts of Network Technology |
1.3.1 | Local Area Networks—LANs |
1.3.2 | WANs |
1.3.3 | Transmission and Switching |
1.3.4 | What is Multiplexing? |
1.3.5 | Setup of Networks |
1.3.6 | What is a protocol? |
1.4 | Multiplexing Methods |
1.4.1 | Packet Switching |
1.5 | Work-Sharing—The Layer Model |
2 | LANs |
2.1 | In-house Cabling |
2.2 | Ethernet—From the Shared Medium to the Switch |
2.2.1 | Ethernet Variants |
2.2.2 | The Ethernet Protocol |
2.2.3 | Hubs |
2.2.4 | Switches |
2.2.5 | Network Design |
2.2.6 | VLANs |
2.2.7 | Power over Ethernet |
2.2.8 | The Limits of the LAN |
2.3 | Wireless LAN |
2.3.1 | Bit Rates and Ranges |
2.3.2 | Authentication and Association |
2.3.3 | The Access Procedure |
2.3.4 | From Radio Cell to Radio Cell and Roaming |
2.3.5 | Controller-based Solutions |
2.3.6 | Security Aspects |
2.3.7 | Voice over WLAN |
2.4 | Modern Campus Networks |
2.4.1 | Network and Application |
2.4.2 | Fabric Networking |
2.5 | Data Centers and Storage Networks |
2.5.1 | Virtualization—Enabler of Cloud Computing |
2.5.2 | Server Virtualization |
2.5.3 | Microservices |
2.5.4 | Microservices and Containers |
2.5.5 | Cloud Computing Service Models |
2.5.6 | The Different Types of Clouds |
2.5.7 | Typical Services |
2.5.8 | Storage Networks |
2.5.9 | The Task |
2.5.10 | Network-Attached Storage |
2.5.11 | Storage Area Networks |
3 | The IP World |
3.1 | The Components of IP Networks |
3.2 | IPv4 Addresses and Domain Names |
3.2.1 | Addresses and Networks |
3.2.2 | Public IPv4 Addresses |
3.2.3 | Private IPv6 Addresses |
3.2.4 | DHCP |
3.2.5 | DNS |
3.3 | IPv6 |
3.3.1 | The New Protocol |
3.3.2 | Global Unicast Addresses |
3.3.3 | Address Assignment |
3.3.4 | Migration Procedure |
3.4 | IP Routing |
3.4.1 | The Path through an IP Network |
3.4.2 | Routing Protocols |
3.4.3 | QoS—DiffServ |
3.5 | The Internet |
3.5.1 | Internet Service Providers (ISP) |
3.5.2 | Peering and Providing |
3.5.3 | Routing in the Internet |
3.5.4 | Internet Access |
3.6 | IP Applications |
3.6.1 | Between Application and IP: TCP and UDP |
3.6.2 | Client/Server Concept |
3.6.3 | Peer-to-Peer |
3.7 | Security |
3.7.1 | Threats |
3.7.2 | Firewalls and Proxies |
3.7.3 | VPNs |
3.7.4 | Intrusion Detection and Prevention |
3.7.5 | Social Engineering |
3.7.6 | Advanced Persistent Threats |
3.7.7 | Advanced Threat Protection |
3.7.8 | Endpoint Security |
3.7.9 | Security Information and Event Management—SIEM |
3.7.10 | Digital Forensic |
4 | The Transport of IP in the WAN |
4.1 | Transmission in the WAN |
4.1.1 | Layer 1 Hierarchy |
4.1.2 | Wavelength Division Multiplexing |
4.2 | OTN |
4.2.1 | The Structure of OTN |
4.2.2 | Container Sizes |
4.3 | Metropolitan Ethernet |
4.3.1 | Application Scenarios for Metro Ethernet |
4.3.2 | Carrier Ethernet Services for Enterprise Customers |
4.3.3 | Ethernet Aggregation for DSL Networks |
4.3.4 | Ethernet Aggregation for 4G Networks |
4.4 | MPLS |
4.4.1 | Components of an MPLS Network |
4.4.2 | Label Switched Paths |
4.4.3 | The Path through an MPLS Network |
4.4.4 | Application Areas of MPLS |
4.4.5 | MPLS-TP |
4.5 | Software-Defined WAN |
4.5.1 | The SD-WAN Concept |
4.5.2 | SD-WAN Application |
5 | The Access Area |
5.1 | Access Networks |
5.2 | Leased Lines |
5.3 | DSL |
5.3.1 | Ranges and Bit Rates |
5.3.2 | Technologies for DSL Acceleration in an Overview |
5.3.3 | Vectoring—An Overview |
5.3.4 | Network Structure for VDSL2 |
5.3.5 | MSAN |
5.3.6 | Backbone Network Gateway—BNG |
5.3.7 | G.fast—the fast alternative? |
5.4 | Optical Access Networks in an Overview |
5.5 | Cable Networks |
5.5.1 | Network Structure |
5.5.2 | DOCSIS |
5.6 | Mobile Communications: from 1G to 5G |
5.6.1 | 4G |
5.6.2 | 5G |
5.7 | Internet of Things—An Introduction |
5.7.1 | What is the Internet of Things? |
5.7.2 | Chances and Challenges |
5.7.3 | Technologies |
6 | Telephony |
6.1 | Voice as an Application |
6.1.1 | Media Streams |
6.1.2 | Signaling |
6.2 | SIP |
6.3 | Voice Networks—Telephony with Separate Infrastructure |
6.4 | IP-based Telephony |
6.4.1 | VoIP and UC for Enterprise Customers |
6.4.2 | Telephony beyond Sites |
6.5 | The IP Multimedia Subsystem |
6.5.1 | IMS Architecture |
6.6 | SIP Trunking |
6.6.1 | SIP Trunking Architecture |
6.6.2 | Security |
6.7 | VoIP Peer-to-Peer |
7 | SDN and NFV |
7.1 | Software-Defined Networking |
7.1.1 | Classic Router/Switch Networks |
7.1.2 | Software-Defined Networking |
7.1.3 | Evaluation of the Concepts |
7.1.4 | The Precursor: NETCONF |
7.1.5 | SDN Syndicates |
7.2 | Network Function Virtualization (NFV) |
7.2.1 | NFV Framework |
7.2.2 | Virtualization of IMS and EPC |
7.2.3 | Virtualization of the Home Network |
7.3 | Chances for Providers |
7.4 | Risks for Providers |
A | Icons |
B | List of Abbreviations |
-
Classroom training
- Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!
-
Hybrid training
- Hybrid training means that online participants can additionally attend a classroom course. The dynamics of a real seminar are maintained, and the online participants are able to benefit from that. Online participants of a hybrid course use a collaboration platform, such as WebEx Training Center or Saba Meeting. To do this, a PC with browser and Internet access is required, as well as a headset and ideally a Web cam. In the seminar room, we use specially developed and customized audio- and video-technologies. This makes sure that the communication between all persons involved works in a convenient and fault-free way.
-
Online training
- You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.
-
Tailor-made courses
-
You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.
Request for customized courses

-
In the past years, the networking world has been strongly influenced by a trend away from classic technologies towards All-IP. In this context, the course at hand offers you a comprehensive overview of current networking concepts—from transmission technology to the Next Generation Network. This is done both from the viewpoint of network operators and of enterprise structures. The course imparts a conceptual understanding of the different networking technologies and their fields of application. As a result, the participants will learn to use the corresponding terminology competently. New developments such as Software-Defined Networking (SDN) and Network Function Virtualization (NFV) round off the table of contents.
-
Course Contents
-
- Transmission and Switching, Multiplexing Methods, LAN and WAN
- Last Mile, Aggregation Area, and Backbone
- The Layer Model
- IP(v4 and v6) Addressing and Routing
- The Structure of the Internet—ISPs, Peerings, and Providings
- IP Applications (Client/Server and Peer to Peer)
- Security: Firewalls, VPNs, Intrusion Detection & Prevention
- Transmission Technology: SDH and WDM
- Multiprotocol Label Switching (MPLS)
- DSL Connections and Variants (ADSL, ADSL2, ADSL2+, and VDSL2), Vectoring
- Cable Networks and DOCSIS
- Metropolitan Ethernet
- LTE
- LANs: Ethernet Switching and VLANs, Network Design
- Wireless LAN: Bit Rates, Ranges, Security
- Storage Networks: Network Attached Storage and Storage Area Networks
- Voice Switching: Media Streams and Signaling
- Convergent Networks: VoIP and Next Generation Networks (NGN)
- Software-Defined Networking (SDN)
- Network Function Virtualization (NFV)
You will receive the comprehensive documentation package of the ExperTeach Networking series – printed documentation, e-book, and personalized PDF! As online participant, you will receive the e-book and the personalized PDF.
-
Target Group
-
The course addresses all persons in general who wish to become acquainted with the networking world from a technical point of view.
-
Knowledge Prerequisites
-
A keen interest in the concepts and technologies of modern communications networks is the main prerequisite for the course at hand.
1 | Networks— An Introduction |
1.1 | A Typical Scenario: Corporate Network |
1.1.1 | The Head Office |
1.1.2 | The Branch Offices |
1.1.3 | Mobile Workers |
1.2 | Applications and Requirements |
1.3 | Basic Concepts of Network Technology |
1.3.1 | Local Area Networks—LANs |
1.3.2 | WANs |
1.3.3 | Transmission and Switching |
1.3.4 | What is Multiplexing? |
1.3.5 | Setup of Networks |
1.3.6 | What is a protocol? |
1.4 | Multiplexing Methods |
1.4.1 | Packet Switching |
1.5 | Work-Sharing—The Layer Model |
2 | LANs |
2.1 | In-house Cabling |
2.2 | Ethernet—From the Shared Medium to the Switch |
2.2.1 | Ethernet Variants |
2.2.2 | The Ethernet Protocol |
2.2.3 | Hubs |
2.2.4 | Switches |
2.2.5 | Network Design |
2.2.6 | VLANs |
2.2.7 | Power over Ethernet |
2.2.8 | The Limits of the LAN |
2.3 | Wireless LAN |
2.3.1 | Bit Rates and Ranges |
2.3.2 | Authentication and Association |
2.3.3 | The Access Procedure |
2.3.4 | From Radio Cell to Radio Cell and Roaming |
2.3.5 | Controller-based Solutions |
2.3.6 | Security Aspects |
2.3.7 | Voice over WLAN |
2.4 | Modern Campus Networks |
2.4.1 | Network and Application |
2.4.2 | Fabric Networking |
2.5 | Data Centers and Storage Networks |
2.5.1 | Virtualization—Enabler of Cloud Computing |
2.5.2 | Server Virtualization |
2.5.3 | Microservices |
2.5.4 | Microservices and Containers |
2.5.5 | Cloud Computing Service Models |
2.5.6 | The Different Types of Clouds |
2.5.7 | Typical Services |
2.5.8 | Storage Networks |
2.5.9 | The Task |
2.5.10 | Network-Attached Storage |
2.5.11 | Storage Area Networks |
3 | The IP World |
3.1 | The Components of IP Networks |
3.2 | IPv4 Addresses and Domain Names |
3.2.1 | Addresses and Networks |
3.2.2 | Public IPv4 Addresses |
3.2.3 | Private IPv6 Addresses |
3.2.4 | DHCP |
3.2.5 | DNS |
3.3 | IPv6 |
3.3.1 | The New Protocol |
3.3.2 | Global Unicast Addresses |
3.3.3 | Address Assignment |
3.3.4 | Migration Procedure |
3.4 | IP Routing |
3.4.1 | The Path through an IP Network |
3.4.2 | Routing Protocols |
3.4.3 | QoS—DiffServ |
3.5 | The Internet |
3.5.1 | Internet Service Providers (ISP) |
3.5.2 | Peering and Providing |
3.5.3 | Routing in the Internet |
3.5.4 | Internet Access |
3.6 | IP Applications |
3.6.1 | Between Application and IP: TCP and UDP |
3.6.2 | Client/Server Concept |
3.6.3 | Peer-to-Peer |
3.7 | Security |
3.7.1 | Threats |
3.7.2 | Firewalls and Proxies |
3.7.3 | VPNs |
3.7.4 | Intrusion Detection and Prevention |
3.7.5 | Social Engineering |
3.7.6 | Advanced Persistent Threats |
3.7.7 | Advanced Threat Protection |
3.7.8 | Endpoint Security |
3.7.9 | Security Information and Event Management—SIEM |
3.7.10 | Digital Forensic |
4 | The Transport of IP in the WAN |
4.1 | Transmission in the WAN |
4.1.1 | Layer 1 Hierarchy |
4.1.2 | Wavelength Division Multiplexing |
4.2 | OTN |
4.2.1 | The Structure of OTN |
4.2.2 | Container Sizes |
4.3 | Metropolitan Ethernet |
4.3.1 | Application Scenarios for Metro Ethernet |
4.3.2 | Carrier Ethernet Services for Enterprise Customers |
4.3.3 | Ethernet Aggregation for DSL Networks |
4.3.4 | Ethernet Aggregation for 4G Networks |
4.4 | MPLS |
4.4.1 | Components of an MPLS Network |
4.4.2 | Label Switched Paths |
4.4.3 | The Path through an MPLS Network |
4.4.4 | Application Areas of MPLS |
4.4.5 | MPLS-TP |
4.5 | Software-Defined WAN |
4.5.1 | The SD-WAN Concept |
4.5.2 | SD-WAN Application |
5 | The Access Area |
5.1 | Access Networks |
5.2 | Leased Lines |
5.3 | DSL |
5.3.1 | Ranges and Bit Rates |
5.3.2 | Technologies for DSL Acceleration in an Overview |
5.3.3 | Vectoring—An Overview |
5.3.4 | Network Structure for VDSL2 |
5.3.5 | MSAN |
5.3.6 | Backbone Network Gateway—BNG |
5.3.7 | G.fast—the fast alternative? |
5.4 | Optical Access Networks in an Overview |
5.5 | Cable Networks |
5.5.1 | Network Structure |
5.5.2 | DOCSIS |
5.6 | Mobile Communications: from 1G to 5G |
5.6.1 | 4G |
5.6.2 | 5G |
5.7 | Internet of Things—An Introduction |
5.7.1 | What is the Internet of Things? |
5.7.2 | Chances and Challenges |
5.7.3 | Technologies |
6 | Telephony |
6.1 | Voice as an Application |
6.1.1 | Media Streams |
6.1.2 | Signaling |
6.2 | SIP |
6.3 | Voice Networks—Telephony with Separate Infrastructure |
6.4 | IP-based Telephony |
6.4.1 | VoIP and UC for Enterprise Customers |
6.4.2 | Telephony beyond Sites |
6.5 | The IP Multimedia Subsystem |
6.5.1 | IMS Architecture |
6.6 | SIP Trunking |
6.6.1 | SIP Trunking Architecture |
6.6.2 | Security |
6.7 | VoIP Peer-to-Peer |
7 | SDN and NFV |
7.1 | Software-Defined Networking |
7.1.1 | Classic Router/Switch Networks |
7.1.2 | Software-Defined Networking |
7.1.3 | Evaluation of the Concepts |
7.1.4 | The Precursor: NETCONF |
7.1.5 | SDN Syndicates |
7.2 | Network Function Virtualization (NFV) |
7.2.1 | NFV Framework |
7.2.2 | Virtualization of IMS and EPC |
7.2.3 | Virtualization of the Home Network |
7.3 | Chances for Providers |
7.4 | Risks for Providers |
A | Icons |
B | List of Abbreviations |
-
Classroom training
- Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!
-
Hybrid training
- Hybrid training means that online participants can additionally attend a classroom course. The dynamics of a real seminar are maintained, and the online participants are able to benefit from that. Online participants of a hybrid course use a collaboration platform, such as WebEx Training Center or Saba Meeting. To do this, a PC with browser and Internet access is required, as well as a headset and ideally a Web cam. In the seminar room, we use specially developed and customized audio- and video-technologies. This makes sure that the communication between all persons involved works in a convenient and fault-free way.
-
Online training
- You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.
-
Tailor-made courses
-
You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.
Request for customized courses
