People that are using previous releases of Cisco Unified Communications Manager (4.X, 5.X, 6.X, 7.X and 8.0) will need to understand the changes in the newest version of Cisco Unified Communications Manager (CUCM) 9.x and how it impacts them from an upgrade perspective.
The CCNA Exam v1.0 (200-301) is a 120-minute exam that tests a candidate's knowledge of network fundamentals, network access, IP connectivity, IP services, security fundamentals, and automation and programmability. The exam covers topics like network components, IP addressing, routing protocols, network security concepts, and controller-based networking architectures. The Implementing and Administering Cisco Solutions (CCNA) course helps candidates prepare for this exam.
The document provides an overview of chapter 1 from the CCNA Routing and Switching Introduction to Networks course. It discusses how networks are used in everyday life and how they have changed the way people interact, learn, work and play. It also describes the basic components of networks, including end devices, intermediary devices, network media, and topologies. Additionally, it differentiates between local area networks (LANs), which span a small geographic area, and wide area networks (WANs), which interconnect LANs over a wider geographical area.
This document provides an overview of a project report on Voice over Internet Protocol (VoIP) submitted by two students, Amardeep Singh and Jaswinder Singh, at Chandigarh Engineering College in partial fulfillment of their B-Tech degree in Electronics and Communication Engineering. The report introduces VoIP technology, discusses software and hardware used in the project including Cisco routers and switches, and provides details on configuring an IP phone network with Cisco Call Manager Express including assigning IP addresses via DHCP and configuring phone directory numbers. Future enhancements discussed include integrating VoIP with wireless networks.
CCNA 2 Routing and Switching v5.0 Chapter 6Nil Menon
This document discusses static routing and how to configure static routes on Cisco routers. It begins with an overview of static routing, including the advantages and disadvantages. It then covers different types of static routes such as standard, default, summary, and floating static routes. The document provides examples of how to configure IPv4 and IPv6 static routes, default routes, and verify the routes. It also includes background information on topics like classful addressing and CIDR that are relevant to static route configuration.
The document discusses the key considerations for network design. It explains that hierarchical network design with core, distribution and access layers provides a stable, reliable and scalable network. The core layer focuses on high throughput and uptime. Distribution layer factors include traffic filtering, access control and route summarization. Access layer design considers physical layout, VLANs, traffic patterns and security risks. Server farms, wireless networks, and VPN implementations each have their own set of benefits and challenges to consider.
IoT Challenges: Technological, Business and Social aspectsRoberto Minerva
Internet of Things is promising to be a set of technologies able to have a high impact on how people live, produce, modify and interact with the environment. Such a transformation is driven by increasing technologies capabilities of sensors/actuators, communications, general-purpose hardware, availability of software and programmability of devices. The integration of so different technologies is a problem in itself and IoT is also trying to solve cogent issues of specific problem domains, such as e-health, transportation, manufacturing, and so on. Large IoT systems (e.g., smart cities) stand on their own because the smartness requires integration of different technologies, processes and different administrative domains creating the needs to deal with a complex system. In addition to technological and problem domain specific challenges, there exist further challenges that fall in business, social and regulation realms. They can greatly impact the deployment and the success of IoT deployment. The speech aims at providing a view on some major technologies challenges of IoT and to cover a few critical business and social issues that could hamper the large deployment of IoT systems by providing some examples of implementation.
What Is IoT, IoT Testing And What Are Its Challenges | BugRaptorsBugRaptors
As per the research, IoT testers may face the problems with the test strategies and planning so we provide some recommendations and the sample test cases. At Bugraptors, a list provided by our team is not only complete or wide-ranging but it well gets you a brief idea of how to proceed with the IoT testing.
With IoT, we can connect devices other than computers such as home appliances, vehicles which contains electronics, software, actuators and connectivity to other devices using embedded sensors, processors and communication hardware.
This presentation covers a detailed description of:
1. What is IoT?
2. What is IoT Testing?
3. Why to test IoT?
4. How does IoT Framework Works?
5. Types of IoT Testing?
6. IoT Testing Challenges
7. Best practices for effective IoT Software Testing
To get more information, watch out the detailed blog - https://bit.ly/2T5XkFi
Facebook: https://www.facebook.com/BugRaptors
Twitter: https://www.twitter.com/BugRaptors
LinkedIn: https://www.linkedin.com/company/bug-raptors
The CCNA Exam v1.0 (200-301) is a 120-minute exam that tests a candidate's knowledge of network fundamentals, network access, IP connectivity, IP services, security fundamentals, and automation and programmability. The exam covers topics like network components, IP addressing, routing protocols, network security concepts, and controller-based networking architectures. The Implementing and Administering Cisco Solutions (CCNA) course helps candidates prepare for this exam.
The document provides an overview of chapter 1 from the CCNA Routing and Switching Introduction to Networks course. It discusses how networks are used in everyday life and how they have changed the way people interact, learn, work and play. It also describes the basic components of networks, including end devices, intermediary devices, network media, and topologies. Additionally, it differentiates between local area networks (LANs), which span a small geographic area, and wide area networks (WANs), which interconnect LANs over a wider geographical area.
This document provides an overview of a project report on Voice over Internet Protocol (VoIP) submitted by two students, Amardeep Singh and Jaswinder Singh, at Chandigarh Engineering College in partial fulfillment of their B-Tech degree in Electronics and Communication Engineering. The report introduces VoIP technology, discusses software and hardware used in the project including Cisco routers and switches, and provides details on configuring an IP phone network with Cisco Call Manager Express including assigning IP addresses via DHCP and configuring phone directory numbers. Future enhancements discussed include integrating VoIP with wireless networks.
CCNA 2 Routing and Switching v5.0 Chapter 6Nil Menon
This document discusses static routing and how to configure static routes on Cisco routers. It begins with an overview of static routing, including the advantages and disadvantages. It then covers different types of static routes such as standard, default, summary, and floating static routes. The document provides examples of how to configure IPv4 and IPv6 static routes, default routes, and verify the routes. It also includes background information on topics like classful addressing and CIDR that are relevant to static route configuration.
The document discusses the key considerations for network design. It explains that hierarchical network design with core, distribution and access layers provides a stable, reliable and scalable network. The core layer focuses on high throughput and uptime. Distribution layer factors include traffic filtering, access control and route summarization. Access layer design considers physical layout, VLANs, traffic patterns and security risks. Server farms, wireless networks, and VPN implementations each have their own set of benefits and challenges to consider.
IoT Challenges: Technological, Business and Social aspectsRoberto Minerva
Internet of Things is promising to be a set of technologies able to have a high impact on how people live, produce, modify and interact with the environment. Such a transformation is driven by increasing technologies capabilities of sensors/actuators, communications, general-purpose hardware, availability of software and programmability of devices. The integration of so different technologies is a problem in itself and IoT is also trying to solve cogent issues of specific problem domains, such as e-health, transportation, manufacturing, and so on. Large IoT systems (e.g., smart cities) stand on their own because the smartness requires integration of different technologies, processes and different administrative domains creating the needs to deal with a complex system. In addition to technological and problem domain specific challenges, there exist further challenges that fall in business, social and regulation realms. They can greatly impact the deployment and the success of IoT deployment. The speech aims at providing a view on some major technologies challenges of IoT and to cover a few critical business and social issues that could hamper the large deployment of IoT systems by providing some examples of implementation.
What Is IoT, IoT Testing And What Are Its Challenges | BugRaptorsBugRaptors
As per the research, IoT testers may face the problems with the test strategies and planning so we provide some recommendations and the sample test cases. At Bugraptors, a list provided by our team is not only complete or wide-ranging but it well gets you a brief idea of how to proceed with the IoT testing.
With IoT, we can connect devices other than computers such as home appliances, vehicles which contains electronics, software, actuators and connectivity to other devices using embedded sensors, processors and communication hardware.
This presentation covers a detailed description of:
1. What is IoT?
2. What is IoT Testing?
3. Why to test IoT?
4. How does IoT Framework Works?
5. Types of IoT Testing?
6. IoT Testing Challenges
7. Best practices for effective IoT Software Testing
To get more information, watch out the detailed blog - https://bit.ly/2T5XkFi
Facebook: https://www.facebook.com/BugRaptors
Twitter: https://www.twitter.com/BugRaptors
LinkedIn: https://www.linkedin.com/company/bug-raptors
This document contains the resume of JanardhanReddyLekkala. It summarizes his objective, which is to succeed in his career and find a job providing growth, excellence and self-development. It then outlines his technical skills and work experience as a Network Engineer and Network Administrator, where he has designed, implemented and troubleshot networking infrastructure. His responsibilities included network monitoring, bandwidth allocation, server configuration, and resolving technical issues for customers.
The document discusses the transport layer in computer networks. It describes how transport layer protocols like TCP and UDP support end-to-end communication by establishing connections between applications, segmenting data, and ensuring reliable or unreliable delivery. TCP provides reliable, in-order transmission using sequence numbers, acknowledgments and retransmissions if needed. UDP is connectionless and unreliable but has less overhead than TCP. The document compares TCP and UDP, and explains how applications use each protocol depending on their reliability needs.
CCNA 1 Routing and Switching v5.0 Chapter 2Nil Menon
This document provides an overview of configuring a Cisco IOS network operating system. It discusses accessing and navigating the Cisco IOS using the command line interface, including setting hostnames, limiting access using passwords, and saving configurations. It also covers basic networking concepts like addressing schemes and verifying connectivity between devices.
CCNA 2 Routing and Switching v5.0 Chapter 1Nil Menon
The document is a chapter from a Cisco textbook that introduces switched networks. It discusses the convergence of data, voice and video networks and the benefits of a single, converged network. It describes the core, distribution and access layers of hierarchical network design and how switches use MAC address tables, store-and-forward or cut-through switching to segment networks into separate collision domains while maintaining a common broadcast domain. The chapter objectives are to explain switched network design and frame forwarding processes.
This document describes a server load balancing system for structured data. The objectives are to develop a load balancer that can manage large amounts of data and provide functionality for uploading, downloading, and deleting data, while providing reliability, scalability, and high performance. The system uses a master server to distribute loads to slave servers and track their locations. Clients communicate directly with slave servers to access data using unique keys. This allows for horizontal scaling and fault tolerance. The system is designed to handle large volumes of data across multiple servers and provide reliable access even if servers fail.
This chapter discusses systems management for IoT and introduces NETCONF and YANG as solutions. It notes the need for automated configuration, monitoring, reliability and reusable configurations for IoT systems management. It describes SNMP and its limitations. NETCONF is introduced as a session-based network management protocol using XML and YANG for data modeling. YANG is used to model configuration and state data for NETCONF. The chapter provides an example YANG module and discusses using NETCONF and YANG for IoT systems management.
Introduction to API Contract Testing, and taking three different approaches to ensure confidence that we are conforming to design, OpenAPI, and resulting user experience.
The document discusses network protocols and models. It explains that protocols establish rules for communication between devices on a network. Protocols define message formatting, sequencing, and other elements. Protocols are organized into protocol suites which allow different protocols to work together. Standards organizations establish common protocols to ensure interoperability. Reference models like TCP/IP and OSI break the communication process into layers to simplify understanding and development of protocols. Data is encapsulated as it passes through each layer of a model, with different protocol data units at each level. Addresses at both the network and data link layers are used to route data from source to destination.
EIGRP and OSPF are hybrid and link-state routing protocols respectively. EIGRP uses the DUAL algorithm and metric system to determine the best paths, while OSPF uses the Dijkstra algorithm and link state advertisements. Both protocols form neighbor relationships to exchange routing information, but OSPF requires adjacencies and is more restrictive in sharing routes between areas.
The so-called Cyber Physical Systems (CPSs) which are known as fourth generation of Industrial Revolution, are being realized. In This presentation, a CPS is defined, its characteristics and benefits are listed and its impacts on products are discussed.
This document provides an overview of modern network security threats and introduces the key concepts covered in Chapter One of the CCNA Security curriculum. It discusses the rationale for network security, including increased internet connectivity, cyber crime, legislation, proliferation of threats, and sophistication of threats. It also defines important security concepts like risks, vulnerabilities, and countermeasures.
Realize True Business Value With ThousandEyesThousandEyes
ThousandEyes monitoring provides visibility into SaaS environments to help businesses realize true value. With hybrid workforces and cloud adoption increasing, enterprises are struggling to understand user experience for SaaS apps using traditional monitoring. ThousandEyes removes blind spots in the digital supply chain and provides end-to-end visibility from network to cloud.
Presentation of Mr.Vibin Chander, CEO, Shabari Software Solutions, CBE. Delivered during the Faculty development Program on NS2 organized by Department of Computer Science, Rathinam College of Arts and Science (Autonomous), Eachanari, Coimbatore - 641021.
The document discusses the transport layer of the OSI model. It describes two main transport layer protocols: TCP, which provides reliable, ordered delivery of data; and UDP, which provides fast but unreliable delivery. TCP uses port numbers to identify applications, three-way handshakes to establish connections, sequence numbers to reorder segments, acknowledgements to provide reliability, and retransmissions to handle lost data. UDP does not provide reliability or ordering guarantees. The document outlines how these protocols support communication across networks.
This document provides an overview of the Internet of Things (IoT) including:
1) A definition of IoT and discussion of its vision to create a network of billions of connected devices.
2) Descriptions of the key enablers that allow IoT to function such as smart devices, communication networks, cloud computing, and sensors.
3) An outline of some of the major challenges with IoT including handling big data, security, bandwidth issues, standardization, and power consumption.
4) Examples of applications of IoT in areas like healthcare, infrastructure, automotive, and connected vehicles.
The document discusses several common IoT networking protocols:
- MQTT is a lightweight publish/subscribe protocol that works over TCP/IP and supports three quality of service (QoS) levels.
- CoAP is designed for constrained devices and machine-to-machine communication using a RESTful request/response model over UDP. It defines four message types.
- XMPP supports publish/subscribe messaging over TCP and uses XML, allowing for interoperability and extensibility.
- AMQP is optimized for financial applications using a binary protocol over TCP, and guarantees message delivery through different levels like at-least-once and exactly-once.
reStartEvents Colorado Cleared Virtual Career Fair Employer DirectoryKen Fuller
The document summarizes several job opportunities at different companies for cleared professionals. It provides details on positions in software engineering, cybersecurity, data science, artificial intelligence, engineering and more. Locations mentioned include Colorado, Maryland, Washington D.C., Alabama, California and Virginia. Companies advertising include Leidos, Northrop Grumman, Jacobs, L3Harris, Maxar, Raytheon, Sierra Space and the Software Engineering Institute.
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)Tutun Juhana
This document provides an overview of the OSI model and TCP/IP protocol suite for computer networks. It describes the seven layers of the OSI model from the physical layer to the application layer and their functions. It then explains that while the OSI model was intended as a standard, TCP/IP became dominant in practice. The four layers of the TCP/IP protocol suite are also outlined - the physical and data link layers have no standard protocols, while the network layer uses IP and the transport layer includes TCP and UDP. The application layer combines functions from several OSI layers.
This deck covers the value of using Cisco Prime Collaboration to manage your collaboration environment. Discover new ways of provisioning, reporting and troubleshooting through the single-pane-of-glass that is Cisco Prime Collaboration. For more information please visit our website: http://www.cisco.com/ca/
This document discusses Cisco Unified Communications Manager 9.1 licensing updates and license migration planning. It provides information on:
1. Changes to Extension Mobility licensing in CUCM 9.1(1a) where it is no longer a licensed user feature.
2. How CUCM and ELM work together to calculate license requirements based on user, device, and feature configuration and check compliance.
3. Examples of license requirements for different configuration scenarios including users only, devices only, and users with devices to help understand CUCM licensing.
4. Steps to take prior to migrating licenses to UC 9.x including fulfilling unused licenses, installing all licenses, and using the Cisco License Count Utility to
This document contains the resume of JanardhanReddyLekkala. It summarizes his objective, which is to succeed in his career and find a job providing growth, excellence and self-development. It then outlines his technical skills and work experience as a Network Engineer and Network Administrator, where he has designed, implemented and troubleshot networking infrastructure. His responsibilities included network monitoring, bandwidth allocation, server configuration, and resolving technical issues for customers.
The document discusses the transport layer in computer networks. It describes how transport layer protocols like TCP and UDP support end-to-end communication by establishing connections between applications, segmenting data, and ensuring reliable or unreliable delivery. TCP provides reliable, in-order transmission using sequence numbers, acknowledgments and retransmissions if needed. UDP is connectionless and unreliable but has less overhead than TCP. The document compares TCP and UDP, and explains how applications use each protocol depending on their reliability needs.
CCNA 1 Routing and Switching v5.0 Chapter 2Nil Menon
This document provides an overview of configuring a Cisco IOS network operating system. It discusses accessing and navigating the Cisco IOS using the command line interface, including setting hostnames, limiting access using passwords, and saving configurations. It also covers basic networking concepts like addressing schemes and verifying connectivity between devices.
CCNA 2 Routing and Switching v5.0 Chapter 1Nil Menon
The document is a chapter from a Cisco textbook that introduces switched networks. It discusses the convergence of data, voice and video networks and the benefits of a single, converged network. It describes the core, distribution and access layers of hierarchical network design and how switches use MAC address tables, store-and-forward or cut-through switching to segment networks into separate collision domains while maintaining a common broadcast domain. The chapter objectives are to explain switched network design and frame forwarding processes.
This document describes a server load balancing system for structured data. The objectives are to develop a load balancer that can manage large amounts of data and provide functionality for uploading, downloading, and deleting data, while providing reliability, scalability, and high performance. The system uses a master server to distribute loads to slave servers and track their locations. Clients communicate directly with slave servers to access data using unique keys. This allows for horizontal scaling and fault tolerance. The system is designed to handle large volumes of data across multiple servers and provide reliable access even if servers fail.
This chapter discusses systems management for IoT and introduces NETCONF and YANG as solutions. It notes the need for automated configuration, monitoring, reliability and reusable configurations for IoT systems management. It describes SNMP and its limitations. NETCONF is introduced as a session-based network management protocol using XML and YANG for data modeling. YANG is used to model configuration and state data for NETCONF. The chapter provides an example YANG module and discusses using NETCONF and YANG for IoT systems management.
Introduction to API Contract Testing, and taking three different approaches to ensure confidence that we are conforming to design, OpenAPI, and resulting user experience.
The document discusses network protocols and models. It explains that protocols establish rules for communication between devices on a network. Protocols define message formatting, sequencing, and other elements. Protocols are organized into protocol suites which allow different protocols to work together. Standards organizations establish common protocols to ensure interoperability. Reference models like TCP/IP and OSI break the communication process into layers to simplify understanding and development of protocols. Data is encapsulated as it passes through each layer of a model, with different protocol data units at each level. Addresses at both the network and data link layers are used to route data from source to destination.
EIGRP and OSPF are hybrid and link-state routing protocols respectively. EIGRP uses the DUAL algorithm and metric system to determine the best paths, while OSPF uses the Dijkstra algorithm and link state advertisements. Both protocols form neighbor relationships to exchange routing information, but OSPF requires adjacencies and is more restrictive in sharing routes between areas.
The so-called Cyber Physical Systems (CPSs) which are known as fourth generation of Industrial Revolution, are being realized. In This presentation, a CPS is defined, its characteristics and benefits are listed and its impacts on products are discussed.
This document provides an overview of modern network security threats and introduces the key concepts covered in Chapter One of the CCNA Security curriculum. It discusses the rationale for network security, including increased internet connectivity, cyber crime, legislation, proliferation of threats, and sophistication of threats. It also defines important security concepts like risks, vulnerabilities, and countermeasures.
Realize True Business Value With ThousandEyesThousandEyes
ThousandEyes monitoring provides visibility into SaaS environments to help businesses realize true value. With hybrid workforces and cloud adoption increasing, enterprises are struggling to understand user experience for SaaS apps using traditional monitoring. ThousandEyes removes blind spots in the digital supply chain and provides end-to-end visibility from network to cloud.
Presentation of Mr.Vibin Chander, CEO, Shabari Software Solutions, CBE. Delivered during the Faculty development Program on NS2 organized by Department of Computer Science, Rathinam College of Arts and Science (Autonomous), Eachanari, Coimbatore - 641021.
The document discusses the transport layer of the OSI model. It describes two main transport layer protocols: TCP, which provides reliable, ordered delivery of data; and UDP, which provides fast but unreliable delivery. TCP uses port numbers to identify applications, three-way handshakes to establish connections, sequence numbers to reorder segments, acknowledgements to provide reliability, and retransmissions to handle lost data. UDP does not provide reliability or ordering guarantees. The document outlines how these protocols support communication across networks.
This document provides an overview of the Internet of Things (IoT) including:
1) A definition of IoT and discussion of its vision to create a network of billions of connected devices.
2) Descriptions of the key enablers that allow IoT to function such as smart devices, communication networks, cloud computing, and sensors.
3) An outline of some of the major challenges with IoT including handling big data, security, bandwidth issues, standardization, and power consumption.
4) Examples of applications of IoT in areas like healthcare, infrastructure, automotive, and connected vehicles.
The document discusses several common IoT networking protocols:
- MQTT is a lightweight publish/subscribe protocol that works over TCP/IP and supports three quality of service (QoS) levels.
- CoAP is designed for constrained devices and machine-to-machine communication using a RESTful request/response model over UDP. It defines four message types.
- XMPP supports publish/subscribe messaging over TCP and uses XML, allowing for interoperability and extensibility.
- AMQP is optimized for financial applications using a binary protocol over TCP, and guarantees message delivery through different levels like at-least-once and exactly-once.
reStartEvents Colorado Cleared Virtual Career Fair Employer DirectoryKen Fuller
The document summarizes several job opportunities at different companies for cleared professionals. It provides details on positions in software engineering, cybersecurity, data science, artificial intelligence, engineering and more. Locations mentioned include Colorado, Maryland, Washington D.C., Alabama, California and Virginia. Companies advertising include Leidos, Northrop Grumman, Jacobs, L3Harris, Maxar, Raytheon, Sierra Space and the Software Engineering Institute.
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)Tutun Juhana
This document provides an overview of the OSI model and TCP/IP protocol suite for computer networks. It describes the seven layers of the OSI model from the physical layer to the application layer and their functions. It then explains that while the OSI model was intended as a standard, TCP/IP became dominant in practice. The four layers of the TCP/IP protocol suite are also outlined - the physical and data link layers have no standard protocols, while the network layer uses IP and the transport layer includes TCP and UDP. The application layer combines functions from several OSI layers.
This deck covers the value of using Cisco Prime Collaboration to manage your collaboration environment. Discover new ways of provisioning, reporting and troubleshooting through the single-pane-of-glass that is Cisco Prime Collaboration. For more information please visit our website: http://www.cisco.com/ca/
This document discusses Cisco Unified Communications Manager 9.1 licensing updates and license migration planning. It provides information on:
1. Changes to Extension Mobility licensing in CUCM 9.1(1a) where it is no longer a licensed user feature.
2. How CUCM and ELM work together to calculate license requirements based on user, device, and feature configuration and check compliance.
3. Examples of license requirements for different configuration scenarios including users only, devices only, and users with devices to help understand CUCM licensing.
4. Steps to take prior to migrating licenses to UC 9.x including fulfilling unused licenses, installing all licenses, and using the Cisco License Count Utility to
Collaboration Architecture Design: Unified Call Control and Dial plans for Vo...Cisco Canada
learn the latest enhancements on architecture and dialplan for rich media environments which include voice and video and desktop. The products and solutions discussed are relevant for any deployment of SIP, H.323, audio and video endpoints (either hard endpoints or soft clients). Some of the newer features/capabilities we'll discuss include: Global Dial Plan Replication (GDPR), VCS working as a gateway for cross platform B2B. I will discuss call control integrations with Cisco Unified Communications Manager 10.x and Cisco Video Communications Server 8.x and will give guidance on architectural deployments with Cisco Unified Communications Manager on most common scenarios (single site, multiple site, SME topology) for both point-to-point and multipoint calls. For more information please visit our website here: http://www.cisco.com/web/CA/index.html
This document discusses Cisco Business Edition 6000, a unified communications solution optimized for mid-sized businesses. It provides an overview of the solution, highlighting its affordability, simplicity, and scalability. Key features include integrated voice, video, messaging and mobility applications, virtualization to reduce costs, and deployment options to meet business needs as they grow.
The document discusses Cisco Unified Communications Manager (CUCM) 9.x licensing, including the User Count Tool (UCT) and Enterprise License Manager (ELM). The UCT allows customers to determine licensing needs for upgrading to CUCM 9.0 from previous versions. The ELM centrally manages licenses for CUCM and other UC products. Licenses are node-locked to the ELM and issued based on reported usage. The ELM helps customers stay compliant by tracking usage and license availability.
The document discusses Cisco's Business Edition 6000 (BE6000) unified communications solution. It provides an overview of key features including:
- Complete collaboration capabilities for all users including voice, video, messaging and conferencing.
- Affordable pricing that lowers costs through server consolidation and reduced hardware needs.
- Simple deployment and administration through unified provisioning and automated licensing.
- Support for up to 1,000 users across 50 sites with call control, voicemail, contact center and other features.
Cisco vs. Microsoft - Strategic Decisions for a Unified Communications Deploy...Brent Kelly
Many organizations have Cisco networking equipment as well as Cisco voice communications solutions. These same organizations also have Microsoft desktop software and MIcrosoft Lync, which is used by many enterprises for presence and instant messaging.
Both vendors are pushing very hard to have organizations adopt their entire unified communications offering. For Cisco, this means deploying the Jabber client along with WebEx for conferencing and Cisco video solutions. For Microsoft, this means deploying more capabilities in Microsoft Lync, including conferencing and collaboration as well as Enterprise Voice.
In many companies, there are articulate and impassioned people who are sincerely trying to do their best who argue for one vendor's unified communications offering over the other. This often ends up in a "Cisco versus Microsoft" discussion, which may become a heated argument.
What to do?
This presentation looks at many of the issues involved with a Cisco vs. Microsoft unified communications debate. It provides individuals and companies with strategies for eliminating one vendor as well as ways the two solutions may co-exist in the organization.
Within the next five years, advances in display technology will make science fiction reality with screens that are unobtrusive, frameless, ambient and ultra - high definition. There no longer needs to be a 'black - hole' in the corner of the room, but screens will instead seamlessly blend into the home environment. Organic LED technology needs no edges at all, and it will be possible to create tiled surfaces of almost any shape using low -cost standard parts.
The concept of 'immersion', readily expressed in a simple control, really does give viewers the opportunity to enjoy programs according to their wishes at that moment, with content whose size, position, and level of interactivity adaptively matches the current needs of each audience. Key to the principle is a simple architecture which is readily extensible throughout the home and an engine which reacts to user input and metadata within a multiplicity of content items and streams. Our work has received enthusiastic press and industry attention as they share our excitement about TV’s potential future.
Cumbre PR/AR sobre el mercado Telco en America LatinaFelipe Lamus
The document discusses technology transitions in the market and how they are impacting service providers and IT. It covers topics like public clouds, software-defined architectures, white box switches, and the industry shake up. It presents Cisco's strategies and platforms for leading through this transition, including the Application Centric Infrastructure (ACI), Cisco ONE platform, and evolving software and cloud offerings. Cisco aims to lead the next technology transition to the application economy through its platforms, architectures, software, and ability to disrupt markets as it has done previously through innovation.
This document discusses end-to-end data center virtualization presented by Ronnie Scott in Toronto, Canada on May 30, 2013. It begins with an overview of virtualization and definitions of virtual, then outlines the agenda which includes data center virtualization, virtual networking and cloud services, virtual compute and storage, and software defined networking. It proceeds to discuss topics like front-end data center virtualization including virtual port channels, fabric extenders, and FabricPath. Virtual networking services from the Nexus 1000V are also examined including port profiles, VXLAN, and vPath for service chaining.
This document discusses pricing models for IP telephony and unified communications solutions from various vendors. It finds that:
1) Vendors like Avaya, Cisco, and Microsoft are evolving their licensing models from standalone to bundled pricing in an effort to simplify costs for customers. However, pricing complexity remains an issue.
2) A feasibility study is recommended to define requirements and success criteria before selecting a vendor solution to ensure alignment with business needs and strategy.
3) Competitive procurement yields the best pricing and support offers, though it requires more effort. Doing one's homework to understand each vendor's technologies, licenses, and total cost of ownership is important.
The document discusses building a resilient unified communications network with an integrated approach to high availability, security, and quality of service. It recommends a network design that leverages modular platforms to dynamically configure endpoints for proper power, VLANs, security, QoS, and registration. An optimal unified communications network requires high availability, quality of service, and embedded security features to be implemented consistently across the network infrastructure.
Cisco prime-nms-overview-hi-techdays deep divesolarisyougood
This document discusses Cisco Prime Network Management and its benefits over traditional point-product network management solutions. It provides an overview of Cisco Prime's integrated workflows, common user experience, consolidated management capabilities, and benefits such as reduced costs, accelerated service rollout, and consistent user experience. Key features covered include comprehensive device lifecycle management, deep application visibility and performance assurance, and consolidated reporting and compliance auditing through a single management interface.
Cisco prime-nms-overview-hi-techdays deep divesolarisyougood
This document discusses Cisco Prime Network Management and its benefits over traditional point-product network management solutions. It provides an overview of Cisco Prime's integrated workflows, common user experience, consolidated management capabilities, and support for the full device lifecycle. Key features highlighted include comprehensive device manageability, assurance of application experience and visibility, simplified deployment of Cisco devices, and support for network lifecycle management.
Application Policy Enforcement Using APIC Cisco Canada
This document provides an overview of Cisco Application Centric Infrastructure (ACI) and the Application Policy Infrastructure Controller (APIC). It discusses how ACI solves problems with overloaded network constructs and language barriers between developers and infrastructure teams. It defines key ACI concepts like tenants, endpoint groups, contracts, filters, and actions. It also describes how ACI uses a centralized policy model to define application connectivity and control network traffic in application-centric terms through provider-consumer relationships between endpoint groups. The document concludes by reserving time for attendees to complete hands-on labs demonstrating ACI concepts.
Slide deck containing basics for Microsoft Cloud Licensing. Discusses CAL equivalent licensing, Dynamics 365 licensing, Microsoft Azure licensing, M365 Licensing and more.
This new mobile world moves fast. No more waiting for people to get back from lunch to return or a call, or needing your office desktop to finish your work.
Just about everyone you know has more than one mobile device – and a lot of them carry around multiple devices at one time. ? As never before, organizations must manage the transitions on and off different networks seamlessly, while protecting sensitive information.
Enterprise Architecture, Deployment and Positioning Cisco Russia
The document discusses enterprise network deployment models and Cisco products for each model. It provides an overview of unified access, traditional access, converged access, and instant access deployment models. For each model, it describes the key characteristics and considerations, as well as which Cisco products are best suited as the lead platform. The document also covers topics like Cisco TrustSec for security, application visibility and control, and resiliency features of Cisco Catalyst infrastructure products.
Similar to Best Practices for Migrating Previous Versions of Cisco Unified Communications (20)
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco Canada
The document discusses network slicing, which is the next step in virtualization for 4G/5G mobile networks. Network slicing allows the core network to be partitioned into multiple logical networks or "slices", each with its own network functions to support the requirements of different services. This approach enables network resources and functions to be allocated to specific services or customer segments in a flexible manner. It reduces complexity compared to existing networks that must support many different services and customers on a single common infrastructure. The key benefits of network slicing include improved network agility and the ability to support diverse service requirements.
The document summarizes a Cisco presentation on next-generation datacenter security. It discusses how the majority of security teams' time is spent securing servers and data in the datacenter. It then covers challenges such as budget constraints, product overload, and complexity of threats. The presentation introduces Cisco's architectural approach to datacenter security focusing on threat prevention, visibility, segmentation, threat intelligence, automation, and analytics. It provides examples of Cisco solutions that integrate to deliver firewall, access control, analytics, and other capabilities.
Cisco connect montreal 2018 vision mondiale analyse localeCisco Canada
The document discusses Cisco's multi-cloud strategy and products. It introduces Cisco Container Platform (CCP) as a solution that automates deploying, running, and operating containers on physical or virtual machines. CCP is based on Kubernetes and provides integrated networking, management, security and analytics capabilities while allowing containers to run in hybrid cloud environments across VM, bare metal, Cisco HyperFlex, ACI and public clouds.
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec CiscoCisco Canada
The document discusses Cisco's solutions for securing mobility, including Meraki SM, Cisco AMP for Endpoint, Cisco Umbrella, Cisco Cloudlock, Cisco Cloud Email Security, Cisco Threat Response, Identity Service Engine, and Cisco DUO Security. Representatives from Cisco provide overviews of each solution for securing users, data, and applications across SaaS, PaaS, and IaaS environments.
Cisco connect montreal 2018 collaboration les services webex hybridesCisco Canada
Cisco Connect Montreal provided information on Cisco's Webex Hybrid Services which allow for integration between on-premises and cloud collaboration solutions. The key services discussed included Hybrid Directory Service for user synchronization, Hybrid Calendar Service for calendaring integration, Hybrid Call Service for calling capabilities, Hybrid Message Service for messaging interoperability, and the new Cisco Webex Edge service for enhanced audio, video mesh, and media experiences.
Integration cisco et microsoft connect montreal 2018Cisco Canada
The document discusses Cisco and Microsoft integrations for collaboration. It describes major areas of integration including calling, messaging, meetings, email/calendar, content management, and instant messaging. It provides details on Cisco and Microsoft integrations for meetings, with examples of joining internal and external participants. The document also discusses Cisco Spark and Webex capabilities for open collaboration across organizations and platforms.
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco Canada
This document summarizes a presentation on model-driven programmability for Cisco IOS XR. The presentation covers data models, management protocols like NETCONF and gRPC, the YANG Development Kit (YDK) SDK, and telemetry. It defines key concepts like model-driven manageability, native and open data models, protocol operations, and the benefits of the YDK for simplifying application development through model-driven abstractions. Example code demonstrates basic YDK usage and a potential peering configuration use case is outlined. Resources for further information are also provided.
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco Canada
The document discusses Cisco SD-WAN and its advantages over traditional and legacy WAN architectures. It highlights how Cisco SD-WAN uses a centralized control plane and software-defined intelligence to provide automated, predictive, and intent-based networking. This allows for flexible, scalable, and secure connectivity across hybrid WAN transports in a way that is simpler to manage and operate than hardware-centric WAN solutions.
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...Cisco Canada
The document discusses Cisco's DNA Center and its capabilities for automating network management. It covers:
- Why intent-based networking is needed to reduce costs and errors from manual network changes
- How DNA Center supports intent-based networking by allowing administrators to define policies and have them automatically implemented across the network
- Key automation use cases DNA Center addresses like onboarding new devices, managing software upgrades, creating configuration templates, and deploying wireless networks
- Demonstrations of DNA Center's capabilities for plug-and-play deployment, software management, template configuration, and wireless provisioning
Cisco Connect Toronto 2018 an introduction to Cisco kineticCisco Canada
Robert Barton from Cisco presented on Cisco Kinetic, an IoT analytics platform. Cisco Kinetic consists of three modules: the Gateway Management Module for onboarding and managing IoT gateways at scale, the Edge and Fog Processing Module for analyzing IoT data in real-time at the edge, and the Data Control Module for securely routing IoT data between edge, fog, and cloud according to data policies. Cisco Kinetic aims to enable end-to-end IoT analytics across the entire network from device to cloud.
Cisco Connect Toronto 2018 DevNet OverviewCisco Canada
Hank Preston, a Cisco engineer, gave a presentation on DevNet and how it is helping developers. He discussed how DevNet has grown significantly, now with over 100,000 members and 500,000 learning labs completed. DevNet provides resources like APIs, sandboxes, and training to help developers build applications and automate networks. Preston emphasized that networks are becoming more programmable and automated through DevNet tools and platforms.
Cisco Connect Toronto 2018 DNA assuranceCisco Canada
The document discusses Cisco's DNA Assurance solution. It provides an agenda that covers business requirements, context, learning, user requirements, technology requirements, and the various components of DNA Assurance including client assurance, network assurance, application assurance, and machine learning. It discusses challenges around network operations including time spent troubleshooting and replicating issues. It also covers how DNA Assurance uses concepts like context, learning, and design thinking to provide insights and automate remediation.
Cisco Connect Toronto 2018 network-slicingCisco Canada
The document discusses network slicing, which is the partitioning of network resources and functions to run selected applications, services, or connections in isolation from each other for specific business purposes. This allows mobile operators to offer virtual private networks on a common infrastructure through network slicing on an end-to-end basis across access, transport, and core networks. Slicing enables new revenue opportunities through network slices optimized for different vertical industries while simplifying service delivery and management.
Cisco Connect Toronto 2018 the intelligent network with cisco merakiCisco Canada
The document discusses Cisco Meraki's intelligent network and SD-WAN capabilities. It highlights that Meraki has over 14,000 customers using its SD-WAN, it has a renewal rate over 95%, and its newest product is WAN assurance. The presentation provides an overview of Meraki's cloud-managed solutions for wireless, switching, security, and other IT functions. It demonstrates Meraki's network monitoring and troubleshooting tools through examples and a demo of its capabilities.
Cisco Connect Toronto 2018 sixty to zeroCisco Canada
The document discusses automating security tasks through various solutions from Cisco. It introduces the Cisco Advanced Malware Protection (AMP) solution, which uses machine learning to detect known and unknown malware across endpoints, networks, and email. It also introduces Cisco Cognitive Threat Analytics, which analyzes web traffic using machine learning to detect anomalous and malicious activity inside organizations. The document provides examples of how these solutions can automate tasks like hunting for threats, detecting anomalies, and attributing suspicious activity to specific entities. It includes demos of the AMP and Cognitive Intelligence user interfaces.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
10. Video, Mobility, BYOD, Cloud, & B2B
Drive to 9
CUCM Upgrade Program
Drive to 9 – Objective
Enable Customers to leverage next generation
Collaboration Experiences by upgrading to Cisco
Unified Communications Manager 9.1 or higher!
17. Enterprise Licensing Manager (ELM)
Centralized user license (UCL/CUWL) management, reporting, compliance, and electronic
fulfillment
Introduced in Unified Communications 9.x release
Software application part of Unified CM 9.x
ELM can run on a separate server or co-resident with UC Applications
ELM can manage multiple applications/clusters
Unified CM, Unity Connection, IM and Presence
ELM tracks the "feature usage" of each product registered for license management and then
evaluates the overall license status of the features under use.
19. e-Fulfillment Overview
Two options for fulfilling licenses: manual and electronic
e-Fulfillment is enabled by default
Electronic is much quicker and easier
User simply enters a PAK ID and selects which license types to fulfill
Requires HTTPS connectivity to Cisco Licensing back office
Supports partial fulfillment
Allows user to fulfill a subset of the entire PAK
Manual fulfillment still required when migrating pre-9.0 licenses
27. User Count Tool (UCT)
Software application
Allows a customer to view CUCM license requirements for all CUCM devices and to plan
for unused DLU allocation to UC 9.0 licenses.
May be used for planning migration to UC 9.0 licenses for CUCM instances.
Cisco License Count Utility may be downloaded from the www.cisco.com software
download site:
(Cisco Unified Communications Manager 8.6 utilities Unified Communications
Manager / CallManager / Cisco Unity Connection Utilities )
License Count
Utility
(UCT)
28. License Count Utility (UCT)
Use for pre-purchase planning
1. Connect and generate license
report
2. Review current license usage
3. Plan unused DLU license
allocation
29. Pre-Migration
Checklist
Fulfill any unused license PAKs
Install all licenses
Validate licensing installed and
snapshot
Use Cisco License Count Utility
(UCT) to plan UC 9.0 CUCM
license requirements
Order and install UC 9.0
*IMPORTANT NOTE: Unused PAKs and/or licenses from pre-9.0 versions cannot be fulfilled once migrated to
version 9.0
30. UC 9.x License Migration
UCM (sub)
UCM (pub)
ELM
Unity
Connection
9.x
9.x 9.x
STEP 1: UC 9.x Migration
Upgrade UC Applications and CUCM to Version 9.x
STEP 2: Install ELM 9.x
ELM Version 9.x installed – co-resident or standalone
STEP 3: Connect ELM to UC 9.x products
Add CUCM (pub), BE6k/BE5k, Unity Connection Applications to ELM inventory
SOAP/https
SOAP/https
Customer
STEP 0: Pre-Migration Checklist
Validate all licenses are installed on pre-9.x system
31. UC 9.x License Migration (cont’d)
ELM
STEP 4: ELM Migration Utility
Use ELM Migration Utility to Plan then Order then Install migrated licenses
STEP 5: Generate Migration Request
Generate Migration Request creates the required information for license migration.
STEP 6: Request License Migration
From www.cisco.com Product License Registration portal – Get New – Migration License – Unified
Communications 9.x www.cisco.com/go/license
Customer www.cisco.com
STEP 7: Install License
Install UC 9.x License file (.bin) on ELM. Use License – Install License File
step 4 step 6
step 5
step 7
34. Migration SWAT Team Engineering Escalation Upgrade Services
PDI Help Desk Drive to 9 TAC Upgrade Resource Center
Gaps
Identified
No Gaps
Upgrade Resources and Support
High Level Migration Process
Migration to CUCM 9.x
Readiness
Assessment (HW,
SW, Applications,
Licenses, Services)
Upgrade & Update
Licenses
Upgrade Server,
Endpoints,
Applications,
Licenses, UCSS,
ESW
Download 9.x SW
Partner
Customer
AS
Customer
Decides to
Upgrade to
CUCM 9.x
Remediation
35. Pre Migration
Readiness Assessment
Review software migration path
Determine hardware requirements
Refer to the SRND and Compatibility Matrix
Consider all UC applications
Consider all 3rd party applications
Review impact to business processes
Lab/Development testing
Plan system migration
Planning for end user training if required
Decommissioning of Old HW/SW
Complete assurance testing
Implement new features / technology
Update end user documentation /
monitoring tools
Provide end user training
Post Migration
49. Complete Your Paper
“Session Evaluation”
Give us your feedback and you could win
1 of 2 fabulous prizes in a random draw.
Complete and return your paper
evaluation form to the room attendant
as you leave this session.
Winners will be announced today.
You must be present to win!
..visit them at BOOTH# 100