RF Back to Basics Session 1: RF Microwave Signal Chain & Network Analysis
Transmit/receive signal chains will be introduced along with important characteristics for design and measurement that will be discussed throughout the RF Back to Basics 5 session series. The Network Analysis section will cover transmission line basics, S-Parameters, and the Smith Chart. Transmit, receive and directivity paths will be described along with how dynamic range and accuracy can be optimized. Calibration and error correction will also be covered.
RecordedMay 12 202077 mins
Your place is confirmed, we'll send you email reminders
Andrew Young, Security Solutions Architect, Keysight
You can’t manage what you can’t measure. Now, for the first time, effectively measure your security posture and drive continuous improvement. Keysight's Threat Simulator gives you dynamic network intelligence by constantly probing your network for weaknesses and vulnerabilities. Its patented recommendation engine provides easy to follow, step by step instructions for remediation.
Join this session and learn more about how Threat Simulator can help you better fortify your network.
"Change is constant and just like everything else organizations' networks are ever evolving. As you add more devices, increase the number of work from home employees, and new cyber threats emerge, how do you ensure you are not only securing your network, but maintain performance and user experience. During this session we will review how Keysight can help your organization to achieve:
* Access to network data from remote sites for real-time visibility operations
* Automate network performance checks and improve the application delivery experience for remote workers
* Validate the security posture of your networks with real applications and complete range of threat vectors "
You cannot protect your organization from the constant threat of cyberattacks with best-effort security monitoring. You need 100% data access and visibility as well as the intelligence to evaluate vast volumes of traffic, without slowing or disrupting your network. Embracing a security architecture for continuous visibility means validating security before deployment and protecting production networks with comprehensive data inspection.
Join this session and learn how Keysight's inline security solutions can ensure constant monitoring and the fastest possible recovery with a high availability configuration.
Performance Matters when choosing the right network and security solutions. NetOps and SecOps teams are asked to do more with their existing network monitoring and security tool investments. That’s not easy when traffic volumes and patterns are constantly growing and shifting. Join this session to learn how Keysight can help you achieve peak network performance with an easy to use solution and zero packet loss.
Don’t let the details prevent you from seeing the big picture. But what if the details ARE the big picture?
SPAN ports can leave your organization blind to network data. For quick and dirty stuff or if you are just playing in a sandbox, SPAN may be OK. But, if you are looking to support a production network, particularly if that network is core to your business or if you are doing something intended to be in place for a long time, you need to build the foundation of your security or visibility layer.
Join this session to learn how Keysight's Taps can help!
With 20 years of experience as the source of truth for the biggest network operators and the biggest network equipment makers in the world, Keysight supplies leading organizations with tools to give them dynamic network intelligence, keeping their networks and applications running better. The right approach starts with a network tap, which provides robust, reliable data – better and more accurate than SPAN port. It also starts a data collection architecture built using lossless packet brokers, using hardware acceleration and FPGAs to ensure no dropped packets even with features and filters turned on. External bypass switches help enhance overall system resiliency and reliability.
Scott Register, VP, Product Management and Kyle Flaherty, Security Strategy and Growth at Keysight Technologies
This webinar will enable you to discover the benefits of pre-production and live network testing. Learn how breach and attack simulation functionality can be leveraged to optimize the security and robustness of government networks.
Join us to:
-Understand what breach and attack simulation means
-Learn the benefits of breach and attack simulation
-Discover how to deploy the right type of testing scenarios for pre-production and live environments and how they are different
Brian McKellar, Edge Computing Expert, Keysight Technologies
Are your collaboration, voice, and video applications struggling to keep up with an influx of remote connections? It’s hard to perform at your best if your network isn’t performing at its best. You need to focus on business — not whether the next conference call is going to work.
Join this webinar and discover how active network monitoring can help you minimize service disruptions and get back on track. You will learn how to:
-verify network readiness for unexpected events, like a significant increase in teleworking users and VPN load
-validate quality of experience, troubleshoot bottlenecks, and pinpoint where to increase bandwidth or adjust network quality of service
-troubleshoot faster by identifying whether performance issues stem from your network, your carrier, your applications, or your users’ connection
Allison Wong, Principal Cloud, Solution Architect FireEye
New cyberattacks appear every day and defenders need to stay a step ahead. If protecting your network, hybrid clouds, and business operations feels like a race against time, attend this timely session to learn new strategies used by the world’s leading security experts.
Experts from FireEye and Ixia will explore the power of advanced network visibility in detecting threats in real time to optimize investigations and forensics. Join this webinar to see what visibility means to a typical day in the life of security operations including:
• Detecting threats and acting faster
• Gaining complete visibility across your network, hybrid clouds, and business operations
• Providing forensics teams with better data
As network perimeters vanish, visibility proves vital to monitoring and securing performance, meeting compliance mandates, and side-stepping data breaches.
Attend this session for a real-world take on creating the visibility and peace of mind you deserve.
Phil Page, Technical Manager, Nozomi Networks. Dennis Carpio, Sr. Director, Bus Dev. Keysight.
With the Internet of Things (IoT) bringing industrial devices online, cyber defenses must extend to new locations and technologies for the first time. Join Nozomi and Ixia to learn whether the industrial Internet of Things – or IIoT—is placing your operational technology (OT), company data, or brand at risk.
Experts will show you how to gain real-time visibility across Industrial Control System (ICS) environments to detect complex threats that appear suddenly or develop over time. Learn to quickly improve security at power substations, oil and gas facilities, discrete manufacturing sites and other remote locations.
Register for this webinar to learn how to:
-gain visibility of industrial devices for the first time
-accelerate response time across ICS environments
-improve operational technology (OT) uptime and efficiency
Craig Reynolds, Director of Edge Network Strategy, Ixia, a Keysight busines
Service providers often rely on vendors for final-mile connectivity. But as enterprises demand higher speeds and reliability, managing and fulfilling service level agreements (SLAs) can prove exceedingly difficult. In this webinar, you’ll discover how IxProbe helps service providers and enterprises alike hasten troubleshooting, monitor performance, and ensure quality-of-service across all branch locations — regardless of who is fulfilling the final mile.
Discover how you can hasten troubleshooting, monitor performance, and ensure service level agreements (SLAs) across all branch locations — regardless of who is supplying last mile connectivity.
In this webinar you will learn how to:
-Ensure your branch locations are always meeting their SLAs
-Fix problems quickly to save money when branch networks experience downtime
-Prevent performance problems before they cause major outages across your network
This webinar introduces Keysight’s Advanced Design System (ADS) and covers linear design techniques including S-parameter simulation, impedance matching, tuning, and optimization. It also touches on non-linear frequency- and time-domain simulation, EM Simulation, and passive and active RF device models.
Joel Nelson - RF and Microwave Application Engineer
What do you do with the result after you take a measurement? Often, people compare the result to a specification and make a “Pass” or “Fail” decision to ship or reject the item under test. They don’t teach you in school how accuracy affects the risk of incorrect Pass/Fail decisions. We will.
Bill Blakely - RF and Microwave Application Engineer
This webinar covers CW signal generation and characteristics, including phase-noise and signal synthesis using VCO’s and Phase-Locked-Loops.It will also discuss analog and digital modulation generation and measurement techniques.
Accelerating Innovation to Connect and Secure the World
Let us help you simulate your designs, validate your prototypes, manufacture with the highest quality, and test and monitor your network strength within your data center and into the cloud.
Enterprises, governments and service providers use Keysight solutions to improve network and security operations (NetOps and SecOps) and IT management through an end-to-end visibility infrastructure that includes physical and virtual networks, applications, and security. View our content and learn how Keysight can strengthen your security posture through rigorous testing and improve network performance with dynamic network intelligence.