SIP "Threat or Critical Business Tool" 1.5 Day Executive Briefing With Special Session on OCS-Office Communications Server June 26-27 - Denver - Westin Westminster July 24-25 - San Francisco Downtown Courtyard August 21-22 - Denver - Westin Westminster September 25-26 - Orlando Courtyard October 16-17 - San Francisco Downtown Courtyard November 13-14 - Orlando Courtyard Denver 11-12 - Denver - Westin Westminster $495 per person - groups discounts available Courses are also free for Channel Partners - terms and conditions apply, For more go here http://www.techtionary.com/techu/ Online class afterward for onsite attendees is $199. For more information and scheduling, please call Special SIP Forum Member and Microsoft Partner price is $395 per user. Microsoft Partners Code - MSRoadshow Reference Promotional Code - SIPFshow Online Course fees are normally $299 per user for online courses. Large volume discounts are available. All major credit cards are accepted. What
Attendees are saying about these courses: According
to Matt Jolly of Oxford Networks, “VoIP Business Executive course VoIP
training to a new higher level. For example, there is nothing like the
tutorials SIP available anywhere or from anyone. For the channel partner
or customer, this course provides critical insights for successful
implementation and management. The new user interface speeds learning
allowing viewers to grasp complex concepts faster than ever before. With
this course, VoIP providers can rapidly accelerate the learning process
for their channel partners which in turn accelerate revenues. Now is the
time for users and providers alike to make this course an integral part
of their business operations.” Matt Jolly - Who
Should Attend: - This online course is designed for enterprise executive and
technical managers, channel partners, VAR-Value-Added Resellers,
SI-Systems Integrators, telephone interconnect, agents, master agents and
consultants. In addition, this
course will benefit corporate technical, staff marketing, training
business development, sales, channel managers, operations, engineering,
support and other corporate managers for SIP-VoIP providers, carriers,
software developers and hardware manufacturers.
What
You Will Learn: ·
Review the fundamentals of IP-Internet Protocol and platforms required for high
performance SIP-VoIP systems. This
includes soft switches, gateways, routers, services and other critical
components. ·
Explore business applications and opportunities.
Review what customers are buying today and why they are buying.
In addition, emerging “killer applications” will be explained
in depth. ·
Quickly grasp complex subjects such as H.323, MGCP and SIP.
As SIP-Session Initiation Protocol emerges are the key VoIP
communications protocol, discover how this technology will impact all
voice communications systems from key, PBX, IP-PBX, hosted, managed and
other systems. ·
Understand basic and advanced SIP-VoIP concepts features.
From hosted, managed, IAS, and IP-PBX, quickly understands
“what’s-what” for different customer applications and business
models. ·
Probe the issues behind Integrated and Converged Access.
Understand when and why organizations need a converged access
solution. ·
Understand
why “network assessment” is critical to any
SIP-VoIP implementation and why this step cannot be overlooked. ·
Address the issue of QoS-Quality of Service by overcoming jitter, echo, noise and
other network problems. Review
the role of RTCP and other tools to monitor and maintain high performance
VoIP networks. ·
Understand
the functions of the new communications
“toolbar.” See how the
benefits of “unified communications” as they improve business
operations. ·
Assess the Top-10 issues why SIP trunking and hosted VoIP is more than
“dial-tone,” and how it can represent change in the business and
business model of even the smallest enterprises.
Discuss and explore new ways to improve fundamental business
processes. ·
Explore
how a SIP-VoIP call is processed and review potential security attacks.
Discover how SPIT, VOMIT, DOS and other terrorist attacks can
target not just data, but voice packets. ·
Review SIP and SIP Trunking and all the implications and applications from
TCO-Total Cost of Ownership to QoS-Quality of Service.
SIP Trunking is the most profound new form of telecommunications
since POTS. Detailed
Course Outline A . Fundamental
Network and IP Technologies – the IP in SIP ·
1 –
Voice-to-Digital-to-Packet Transmission ·
2 –
Back To Basics – Cabling and Electrical ·
3 –
Transmission Concepts – DSL, T-1/E-1, ISDN-PRI, SIP Trunking, GIG-E ·
4 –
Optical Fiber & Bandwidth ·
5 –
Integrated Access Services – Dynamic Bandwidth Allocation –
BOD-Bandwidth On Demand ·
6 –
Introduction to IP-Internet Protocol and VoIP-SIP · 7 – TCP/IP and other Protocols and Layers – RTP, RTCP, SDP, SOAP, SALT
- Call
processing with Route, Image, DHCP, DNS, Image, Configuration servers ·
8 –
Hardware – Routers, Switches – MAC-Media Access Control,
WiFi-VLANS-VPNS ·
9 –
Protocols “Rules of the Road” – H.228, H.323, MGCP, SIP, and
Desktop “Softphones,” “Toolbars” and other end points
(desksets) ·
10 –
IP-PBX and Hosted VoIP/SIP – Integrated/Unified/Homogenized B. Top-10 Critical Technologies to SIP 1
– IP protocol, IP networking
and a VPN 2
- The difference between IAS-Integrated Access Service versus Converged
Access Service -
Enhanced IAS with MPPP-Multi-link Point-to-Point Protocol, PPP Multilink
Protocol (MP), L2TP-Layer 2 Tunneling Protocol 3
– SIP-Session Initiation
Protocol Trunking 4
– Justification for an IP PBX – options and approaches
5
– Technical difference between IAS-Integrated Access Service, Hosted and
Managed VoIP
- Call
processing with Route, Image, DHCP, DNS, Configuration servers -
Media Gateways replace PBXs - the following
tutorials are some examples of customer applications of MG-Media
Gateways:
-
Connection of IP-PBX to PSTN - SC-Session Controllers or SBC-Session Border Controllers are access devices operate at Layer 5 Session Layer, where as routers operate at Layer 3 Network. Some of the key SBC/SC functions are: - Secure network peering - private and public to enhance performance - Topology hiding - using various types of inter-AS-Autonomous System features as well as separating media (voice) and hide signaling (IP addresses) and data streams (traffic) - Border call routing - routing at AS level rather than with interior protocols - Interoperability - access/restrict to reduce voice spam - QoS & Call Admission Control - load/jitter correction - Billing systems interoperability - reduce billing errors - NAT-Network Address Translation - routing for maximum performance - CALEA-Communications Assistance for Law Enforcement Act - Compatibility with billing - Dialect conversion - Protocol conversion - Codec conversion - Firewall restrictions - Wholesale and Transit peering 6
– “Open Source” PBX options 7
– QoS-Quality of Service importance - how to measure it and fix it 8
– Softphones – Where they
make sense - user benefits 9
- The difference between
IPT-Internet Protocol Telephony and VoIP - Cisco, Broadsoft, Sylantro and
other platforms 10
- Unified Communications –
Mobility Applications
C. Top-10 Steps to a Successful SIP Implementation 1 - User Needs Assessment 2 - Network Assessment 3 - Systems Upgrade - Indepth POE-Power Over Ethernet & Comprehensive
Disaster Planning Tutorial 4 - Pre–Installation Planning 5 - Data Systems Integration - VLANs, VoWLANS,
Planning for WiFi, WiFi and IP Wireless "Roaming," WiFi Security
and more 6 - Installation and Cutover 7 - Managing
Change - Training 8 - Ongoing Use and Expectations 9 - Billing 10 - Managed Services - TCO-total cost of ownership,
monitoring, remote support, training, business development and others
& Future Applications
D. Diagnosing & Tools for Troubleshooting SIP Networks 1 - Problems: - Delay 2 - Testing for Problems - RTCP-XR-MRB-eXtended Reports -
Metrics Report Block 3 - More than 30 Problems and Common Solutions - like "CarTalk" bring your problems to "Nettalk" 4 – Best Practices - review of concepts such as Resiliency & Reliability – QoS in VoIP-SIP 5 – Vendors of Technical Solutions for VoIP Network Management 6 -
Conclusions and the Bottom Line E. SIP Essentials - SIP Introduction and Overview -
SIP Definition – IETF (RFC-3261) and Manufacturers
- CPL-Call Processing Language
- AOR-Address Of Record – q-values
- Location Service - DNS-Domain Name Service
- CPL-Call Processing Language
- B2BUA-Back-2-Back User Agent -
SIP-SS7-Signaling
System 7 call processing including – IAM-Initial Address Message,
Routing label, CIC-Circuit Identification Code and Message Type Code.
Examples of Message Type Codes include: Called Number, Calling Number, DPC-Destination
Point Code, OPC-Origination Point Code, SS7-ISUP ACM-Address Complete
Message, ANM-ANswer Message, CPG-Call ProGress Message, COT-COTinuity
Message, SUS-SUSpend Message, RES-RESume Message, FOT-FOrward message
Transfer, INR-INformation Request message, INF-INFormation Message,
RELease and other messages. -
SIP – Applications Layer 7 Protocol – Peer-to-Peer protocol -
SIP – Before and After -
SIP and Hosted – Better or Worse or Both -
SIP Signaling – Introduction, URI-Uniform Resource -
SIP & SBC-Session Border Controllers, servers, gateways, -
SIP with and without IADs-Integrated Access Devices -
SIP and SIP Phones, Softphones, Mobility, - SIP
Signaling Basics – Inbound/Outbound calling -
SIP Trunking –
Incremental “Slope” Growth -
CODECS-COmpression-DECompression signal processors – issues and
answers F. SIP Trunk Replacement & Disaster Planning -
SIP & Open Standards -
SIP and Trunk Replacement – same or different thing -
SIP and Proxy ARP-Address Resolution Protocol -
SIP and HSRP-Hot Standby Routing Protocol -
SIP and MPLS-Multi-Protocol Label Switching – COS and QoS -
SIP QoS – oxymoron or critical concept -
SIP on-net and off-net issues – overflow call processing -
SIP TCO-Total Cost of Ownership – Top-10 Benefits G. SIP Technology - Indepth -
SIP – OSI-Open Systems Interconnection - "If you do not know
where you are going, what difference does it make which path you
take".....Cheshire Cat (Alice in Wonderland) -
SIP “Methods” – Writing call processing as easy as email –
invite, ACK, bye, etc. -
SIP Signaling “commands” – 1xx-6xx -
SIP Inbound and Outbound call processing - SDP-Session Description Protocol - headers, Via, Max-Forwards, To:, URL-Uniform Resource Locator, URI-Uniform Resource Identifier, call-ID, Cseq, Contact, Content-Type, Content-Length, Security and others -
Session Description Protocol Security Descriptions (SDES) -
SIP Features - Forks, SIP Proxy, Redirect, Presence, Forking –
parallel-sequential-mixed, loops, spirals -
SIP Network devices - UA-User Agent, UAC-User Agent Client, UAS-User
Agent Server -
Proxy Server, Redirect Server, Registrar Server, B2BUA-Back-to-Back
User Agent -
SRTP-Secure Real-time Transport Protocol (RFC-3711)
- Authentication Tag and the Master Key Identifier
- Encryption H. SIP Security – “Best Practices” – Reality Check
-
SIP Security “Best Practices” – overview - SIP
Firewalls and Security – SPIT-SPam over Internet Telephony, DOS-Denial
Of Service, VOMIT-Voice Over Misconfigured Internet Telephony and other
emerging problems -
SIP Security and “Access Policy” – Stateful IP Filtering and
Inspection, Static and Stateless IP Filters, TLS-Transport Layer Security,
NAT-Network Address Translation, Persistent connection, Multi-homed hosts,
etc. -
SIP and MIM-Man-In-the-Middle attacks – Understanding wireline
and WiFi wireless attacks -
Telephone
Numbers – North American Numbering Plan and International ENUM-E.164 I. SIP Security Architectures – Building Blocks
-
SIP Security
Architectures – eight different VoIP configurations evaluating SIP-Aware
Firewalls and other security options -
- Type 1 –
Dedicated IP Pipe for VoIP
- Type 2 – Merged MPLS-Pipe with LER Tagging VoIP
- Type 3 – Merged IP pipe with SIP-Aware Firewall (SAFW)
- Type 4 – Separate IP Pipe for VoIP with Existing Non-SIP
Firewall and SIP-Aware Firewall (SOFW)
- Type 5 – Merged IP Pipe with Incumbent Non-SIP-aware Firewall,
No DMZ Port and SIP-aware Firewall (SAFW)
- Type 6 – Looks like Type 5 but Merged IP Pipe with Incumbent
Non-SIP-aware Firewall, No DMZ Port and SIP-aware Firewall
- Type 7 – Merged IP Pipe with Incumbent Non-SIP-aware Firewall
with a
- Type 8 – Merged IP
Pipe with Incumbent Non-SIP-aware Firewall -
Other approaches to SIP Security - Proxy/Gateway Inside the
Firewall, Proxy/Gateway in Co-Edge Mode and Proxy/Gateway Outside the
Firewall, how Firewalls add time delays to TCP/IP - 50-Point Comprehensive SIP Security Checklist - more than 50 different security concepts to review and include in the implementation and ongoing network management program - SIP Security-Privacy Lifecycle Management - key planning for capturing, storage, users, and disposition (archiving/destruction) J. SIP Class of Service & Quality of Service
-
SIP COS-Class Of Service and QoS-Quality of Service – ethernet
meets “smart” IP -
Managing “real-time” voice with RTCP-Real-Time Control Protocol
– MRB-Metrics Report Blocks -
Inside MRB – what’s what with all the info K. SIP Applications and Future Outlook -
SIP Applications
– IM-Instant Messaging call screening
- SIP Presence Communicated by IM-Instant Messaging
- Click-to-call and others -
SIP for Call Centers – calling options and pricing benefits - Event Notification
- Ondemand Conferencing -
Integration of additional "third-party" developed
SIP-enhanced services provides additional business and enterprise
justification for SIP trunking. -
UDDI-Universal Description, Discovery and Integration uses
standards-based services such as XML, HTTP, SOAP, TCP/IP (define above)
uniform service description and service discovery protocol. Discovery
services provide a consistent publishing interface and allow programmatic
discovery (registration) of services.
Description services provide the means for internet registration -
to be found but not advertisement or placement on search engine listings.
UDDI file structures are
designed using a "publish-once-read-by-many" concept.
That is, web site URL-Uniform Resource Locator can be designed
using UDDI standard file structures which can be published to the UDDI
server network. The UDDI
network can be accessed (discovered) by search engines, customers and
other list builders in a standard published (register) format.
UDDI Registries and protocol servers with: -
White Pages - Names, Address, Contact and Vcard information -
Yellow Pages - Industry categorizations and taxonomies -
Green Pages - Technical information including internal URL file discovery
structures -
UDDI is also designed to replace the robot.txt search engine web
site document structure concept. Here are some of the web site
description-discovery-registry information retrieved by search engine
spiders/bots and other retrieval programs. -
Voice-driven yellow pages - SALT-Speech Applications Language Tags
adds voice commands to web applications.
SALT is an extended set of markup (meta) tags based on
XML-eXtensible Markup Language though compatible with HTML-Hyper-Text
Markup Language and others. -
SIP – exciting new applications - SIP Total Tutorial with Future Outlook – IMS-IP Multi-media Systems – content servers, wireless integration, media gateways, etc. Special Session - Microsoft's OCS-Office Communications Server "Game Plan" OCS is a comprehensive transformation of voice communications. Here are some of the issues that will be presented:
In addition, OCS supports SIP and here are some of the concepts presented:
As time permits, other issues will be presented. Course
Leader - Thomas
B. Cross – CEO TECHtionary.com has three decades of experience in
startups and consulting advisor with leading providers and venture capital
companies in market planning and development, hardware/software design and
development, project management, intellectual property in
telecommunications, information technology, conferencing, teletraining,
telecommuting, groupware, networks, call centers, internet, artificial
intelligence and other fields. He has managed the successful development
of more than 10 software, hardware and internet products to market and
received industry awards for this work. He has authored 13 books, wrote,
produced and direct |