CSU Fullerton Classifieds>CSU Fullerton Online Courses>Introduction to Magma: Cloud Native Wireless Networking

Introduction to Magma: Cloud Native Wireless Networking

About this Course

Magma leverages open source software and commodity hardware to help operators manage their networks efficiently. It provides a high level of automation, high reliability, and the ability to deliver new network services quickly. It is agnostic to the radio access network technology, supporting any cellular “generation” from 2G to 5G, as well as WiFi and CBRS for unlicensed spectrum. Magma can be federated with existing cellular networks to allow networks to be cost-effectively extended into remote areas. This course is designed for technology strategists or decision makers at telcos looking to understand the applicability of Magma to their environment. This course is also aimed at rural ISP operators, systems integrators, and anyone looking to set up a lab environment to experiment with Magma or deploy it in production. This course will help you gain an understanding of the overall Magma architecture and how it fits into the bigger picture of cellular network architectures, particularly 4G/LTE and 5G. You will learn to recognize and understand the main functions of a mobile wireless network, understand the key use cases and value proposition of Magma, the overall architecture of Magma at a functional block level, and the functions performed by each of the main Magma components (Access Gateway, Federation Gateway, and Orchestrator). The course will also provide resources to learn more to deploy Magma on standard hardware. This course prepares you to fully explore the Magma project. It provides the necessary background to help you determine if Magma is appropriate for your setting, and equips you to start installing and experimenting with the system.

Created by: The Linux Foundation

Level: Introductory


Related Online Courses

How do you protect the critical data that is increasingly being stored in the cloud? Learn how to build a security strategy that keeps data safe and mitigates risk. In this course, part of the... more
Want to take a fascinating journey through the history of gaming? Then this course is for you. Our journey begins with an exploration of how ancient board games evolved into modern board games and... more
Building a fully-fledged algorithm to assemble genomes from DNA fragments on a real dataset is an enormous challenge with major demand in the multi-billion dollar biotech industry. In this capstone... more
Software testinggets a bad rap for being difficult, time-consuming, redundant, and above all - boring. But in fact, it is a proven way to ensure that your software will work flawlessly andcan meet... more
Las redes de computadores, o renombradas hoy en día como Networks of Things , son esenciales para soportar los servicios de Internet que usamos a diario, dado que soportan la transformación d... more

CONTINUE SEARCH

FOLLOW COLLEGE PARENT CENTRAL