Voice over WiFi Training | VoWiFi Training

Voice over WiFi Training | VoWiFi Training

Print Friendly, PDF & Email

Introduction:

Voice over WiFi Training | VoWiFi Training Course Description

With this Voice over WiFi Training | VoWiFi Training, you will learn about Voice over Wi-Fi (or VoWiFi) concepts, principals, architecture and design using IMS, SIP and EPC core. Voice over WiFi Training | VoWiFi Training course covers all the principals carriers need to leverage residential and enterprise Wi-Fi Access Points transparent along with interworking concepts and challenges between IMS, 3G, small cell, Wi-Fi, and 4G/LTE.

Voice over WiFi Training | VoWiFi Training provides an intermediate-to-advanced-level technical analysis of VoWiFi architecture, registration, call-setup, location update, mobility and security procedures. Protocol traces and logs are provided mapped to procedures and discuss various methods, functions and signalling parameters.

Duration: 2 days

Voice over WiFi Training | VoWiFi Training
 
Voice over WiFi Training | VoWiFi TrainingRelated Courses
 

Customize It:

• If you are familiar with some aspects of Voice over WiFi Training | VoWiFi Training, we can omit or shorten their discussion.
• We can adjust the emphasis placed on the various topics or build the Voice over WiFi Training | VoWiFi Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
• If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Voice over WiFi Training | VoWiFi Training course in manner understandable to lay audiences.

Objectives:

After completing this Voice over WiFi Training | VoWiFi Training course, attendees will be able to:

◾ Intro to key VoWiFi technical concepts
◾ Network Architecture for VoWiFi for the IMS and non-IMS based core
◾ Network Architecture for Femto Small Cell and interworking with EPC and IMS
◾ VoWifi IMS based solution based on 3GPP standards
◾ Trusted and untrusted non-3GPP WiFi architecture carrying voice and SMS/MMS
◾ IIMS access using VoWiFi
◾ VoWiFi, EPC, IMS architecture , interfaces and protocols
◾ RCS and Joyn services for VoWiFi
◾ VoWiFi signalling, roaming and messaging
◾ Voice / media call setup up signaling
◾ Voice / media bearer establishment
◾ VoWiFi performance and capacity
◾ The Mobile core Network for VoWiFi
◾ IMS service applied to VoWiFi
◾ VoWiFi default bearer establishment for IMS
◾ 3GPP EPS AAA interfaces
◾ ANGw, ePDG
◾ SWm, SWa, STa, SWd interfaces
◾ AAA server, AAA proxy

Voice over WiFi Training | VoWiFi Training – Course Outlines:

IMS architecture for Vowifi

◾Telephony in WiFi networks
◾VoWiFi based on the IP Multimedia Subsystem (IMS) network
◾SIP servers
◾IMS Identifiers
◾SIP protocol applied to Vowifi
◾Diameter protocol applied to Vowifi
◾QoS procedures for Vowifi
◾Overview of 802.11e principals
◾Wi-Fi Multimedia (WMM)
◾Packet Loss, Jitter, and Latency affecting voice, SMS and MMS
◾IMS Call Flow Examples
◾IMS Access Using Vowifi
◾IMS Flow Using Vowifi
◾Vowifi User Plane and Control Plane

VoWiFi Procedure Descriptions

◾Authentication and Authorization procedure
◾3GPP AAA Server Detailed Behaviour
◾3GPP AAA Proxy Detailed Behaviour
◾SWa HSS/AAA Initiated Detach
◾SWa Re-Authentication and Re-Authorization Procedure
◾Commands for SWa authentication and authorization procedures
◾Diameter-EAP-Request (DER) Command
◾Diameter-EAP-Answer (DEA) Command
◾Commands for SWa HSS/AAA Initiated Detach
◾Commands for Untrusted non-3GPP Access network Initiated Session Termination
◾Commands for SWa Re-Authentication and Re-Authorization Procedures
◾STa Access Authentication and Authorization
◾HSS/AAA Initiated Detach on STa
◾STa Re-Authorization and Re-Authentication Procedures

Non-3GPP Access Network Initiated Session Termination

◾Commands for STa HSS/AAA Initiated Detach for Trusted non-3GPP Access
◾Commands for Re-Authentication and Re-Authorization Procedure
◾Commands for Trusted non-3GPP Access network Initiated Session Termination
◾AN-Trusted
◾Session Handling

Untrusted non-3GPP Access / ePDG related procedures

◾Commands used in connection with the STa interface
◾Commands used in connection with the SWm interface
◾Commands used in connection with the S6b interface
◾Authentication and Authorization Procedures

ePDG Architecture

◾ePDG Detailed Behavior
◾ePDG Initiated Session Termination Procedures
◾3GPP AAA Server Initiated Session Termination Procedures
◾Authorization Information Update Procedures
◾Commands for SWm Authentication and Authorization Procedures
◾Commands for ePDG Initiated Session Termination
◾Commands for Authorization Information Update

SWx Description

◾Authentication Procedure
◾Location Management Procedures
◾HSS Initiated Update of User Profile
◾S6b and H2 Description
◾Authentication and Authorization Procedures when using DSMIPv6
◾Authorization Procedures when using PMIPv6 or GTPv2
◾PDN GW Initiated Session Termination Procedures
◾3GPP AAA Initiated Session Termination Procedures
◾Service Authorization Information Update Procedures
◾Authorization Procedures when using MIPv4 FACoA
◾Commands for S6b DSMIPv6 Authorization Procedures
◾S6b DSMIPv6 procedures
◾S6b PMIPv6 or GTPv2 procedures
◾S6b Re-used Diameter AVPs
◾SWx interface

Whether you are looking for general information or have a specific question, we want to help!
 
Request More Information

Time frame:

No Comments Yet.

Leave a comment

0