to download the Conference Agenda - NetScout
to download the Conference Agenda - NetScout
to download the Conference Agenda - NetScout
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
See what we’re up <strong>to</strong> at Engage ‘10….<br />
SPECIAL INTEREST GROUP (SIG)<br />
Troubleshooting Methodology<br />
Innovative collaboration, that’s what we’re all about. In fact, <strong>the</strong> TSM is<br />
designing cus<strong>to</strong>m tu<strong>to</strong>rials with <strong>NetScout</strong> <strong>to</strong> help new users ramp up on<br />
<strong>NetScout</strong> products. Join us at Engage ’10 <strong>to</strong> learn more. “Our mission is<br />
<strong>to</strong> explore <strong>the</strong> use of <strong>NetScout</strong> products, identify common functionality, and<br />
relate it through Best Practices, FAQ sheets, and workfl ows ga<strong>the</strong>red from<br />
<strong>the</strong> Community, in order <strong>to</strong> maximize <strong>the</strong> effective use of <strong>the</strong> <strong>to</strong>ols. “<br />
Learn more at <strong>the</strong> Community table in <strong>the</strong> Engage Lounge or attend<br />
NUF Community sessions at Engage ‘10<br />
For more information contact<br />
Dave Sciu<strong>to</strong> at dave.sciu<strong>to</strong>@netscout.com or 603.233.1569<br />
TUESDAY, NOVEMBER 2, 2010<br />
1:00 PM–5:00 PM<br />
Plaza A<br />
BKS312 - Service Provider: Breakouts<br />
Technology Training: LTE Signaling in a Nutshell<br />
Guest Trainers: Russ Edwards, Award Solutions<br />
Long Term Evolution (LTE) is a 4th generation wireless network technology based on IP and a high speed<br />
radio interface . It provides much higher data rates (over 100 Mbps) <strong>to</strong> users while reducing cost-per-bit<br />
for service providers . LTE is very important <strong>to</strong> wireless opera<strong>to</strong>rs who are eager <strong>to</strong> deploy multimedia<br />
rich Internet content over a wireless medium with seamless access: anywhere, anytime . This cus<strong>to</strong>m<br />
workshop provides an overview of <strong>the</strong> LTE technology, including <strong>the</strong> network architecture, sub-networks,<br />
and <strong>the</strong> interworking architecture v . 2G/3G networks, with specific emphasis on signaling and messaging<br />
differentiation . Also examined: various procedures related <strong>to</strong> au<strong>the</strong>ntication, bearer setup, mobility and <strong>the</strong>ir<br />
associated signaling . Intended Audience: This course provides a comprehensive high level view of <strong>the</strong> LTE<br />
signaling and operations . It is designed as an introduction <strong>to</strong> key concepts and messages related <strong>to</strong> session<br />
setup in LTE networks .<br />
2:00 PM–3:00 PM<br />
Imperial B<br />
BKE207b - Enterprise: Best Practices<br />
How Do You Know if You are Being Hacked?<br />
Fred Phillips<br />
Thinking your network is secure and knowing your network is secure are not <strong>the</strong> same things . Knowing<br />
requires onging assessment of your moni<strong>to</strong>ring techniques, whereas thinking is <strong>the</strong> belief that <strong>the</strong> last<br />
security patch was good enough <strong>to</strong> hold it <strong>to</strong>ge<strong>the</strong>r . Does thinking mean your network is safe? No, it just<br />
means you have not detected <strong>the</strong> latest hack against it . In this lecture / demo we’ll examine some of<br />
<strong>the</strong> common network attacks and how intelligent your <strong>NetScout</strong> products are at recognizing <strong>the</strong>m . The<br />
techniques we’ll cover will get you thinking about how well you know your network, and <strong>the</strong> moni<strong>to</strong>ring<br />
practices you can put in place <strong>to</strong> make it more secure .<br />
17