Train together, save more! 10% off individual registration, 20% off for pairs.
×
Log in
Or create your account
You have just added to your selection
Your cart is empty, See our trainings

Description

Traffic on data networks is made up of many applications whose volumes are generally inversely proportional to their importance to the business. This course aims to provide the technical and practical keys to network analysis.

Who is this training for ?

For whom ?

This course is aimed at network architects, project managers, information systems managers, network engineers.

Prerequisites

None.

Training objectives

  • Understand the art of analyzing network flows Know the impacts of active and passive metrology Identify tools useful for traffic management Understand audit methods applied to security Identify useful tools for monitoring Qos
  • Training program

      • Reminders on protocol architectures.
      • The corporate network, virtual networks, VPN techniques.
      • The long distance network, the services of ISP.
      • Access networks: xDSL, WiFi, WiMax.
      • Key network parameters.
      • Concept of sampling, measurement issues .
      • Throughputs, average values, bursts.
      • The number of packets per second (PPS).
      • Analyzing bottlenecks.
      • Active metrology vs passive metrology.
      • Metrology: the impact of the layers of the layered model.
      • Purely network approaches (level 2-3-4) .
      • Application approaches (level 7).
      • Application impact on the network.
      • IETF groups: IPSAMP, IPPM, IPFIX .
      • Why so many different efforts? SNMP approaches.
      • Statistical correlations.
      • Tools.
      • Admission control methods.
      • Impact of technologies on behavior.
      • Capacity planning.
      • Forecast developments.
      • Guarantee performance.
      • Tools for managing IT assets.
      • Analysis of operating systems.
      • Application analysis.
      • Topology discovery.
      • Security principles linked to traffic: firewalls.
      • Statefull and Stateless approaches.
      • The limits of current systems.
      • Intrusion detection: a real-time audit.
      • Traffic compliance with firewall rules.
      • Important steps.
      • Why a methodology? Permanent audit.
      • SLA concepts.
      • QoS vs CoS.
      • The end-to-end model.
      • Single audits.
      • What for? Example.
      • Performance and financial impact.
      • Analysers, management systems , Traffic Shapers, a state of the market.
      • Acterna/Sniffer Pro.
      • Ethereal/TCPDUMP.
      • Qosmos.
      • Qosmetrix.
      • NetFlow, Ntop.
      • Review and summary comparison.
    • 952
    • 14 h

    Submit your review

    Translated By Google Translate