Century Classifieds>Century Online Courses>Introduction to Magma: Cloud Native Wireless Networking

Introduction to Magma: Cloud Native Wireless Networking

About this Course

Magma leverages open source software and commodity hardware to help operators manage their networks efficiently. It provides a high level of automation, high reliability, and the ability to deliver new network services quickly. It is agnostic to the radio access network technology, supporting any cellular “generation” from 2G to 5G, as well as WiFi and CBRS for unlicensed spectrum. Magma can be federated with existing cellular networks to allow networks to be cost-effectively extended into remote areas. This course is designed for technology strategists or decision makers at telcos looking to understand the applicability of Magma to their environment. This course is also aimed at rural ISP operators, systems integrators, and anyone looking to set up a lab environment to experiment with Magma or deploy it in production. This course will help you gain an understanding of the overall Magma architecture and how it fits into the bigger picture of cellular network architectures, particularly 4G/LTE and 5G. You will learn to recognize and understand the main functions of a mobile wireless network, understand the key use cases and value proposition of Magma, the overall architecture of Magma at a functional block level, and the functions performed by each of the main Magma components (Access Gateway, Federation Gateway, and Orchestrator). The course will also provide resources to learn more to deploy Magma on standard hardware. This course prepares you to fully explore the Magma project. It provides the necessary background to help you determine if Magma is appropriate for your setting, and equips you to start installing and experimenting with the system.

Created by: The Linux Foundation

Level: Introductory


Related Online Courses

In this course you will work on your very own project where you will go through the process of designing and prototyping your very own app.Created by: Curtin UniversityLevel: Introductory more
Malicious software, or malware, is typically delivered over a network and is designed to cause disruption to a computer, client, server, or network. Disruptions can include leaked private... more
Data is the most important asset in the Cloud Computing era. This course focuses on the collection, storage and management of big data. It provides a comprehensible frame structure for Data... more
Este curso en línea te permitirá aprender los conceptos básicos que te ayudarán a desarrollar las habilidades de programación necesarias para iniciarte en el lenguaje C. En este curso de info... more
As the Linux kernel has thousands of developers spread worldwide, working on many different time zones and on various complex projects, it became imperative to coordinate and keep track of all that... more

CONTINUE SEARCH

FOLLOW COLLEGE PARENT CENTRAL