2. ABOUT US
Aarav Tech Solutions will provide you the
best job oriented training with the help of
professionals working in top MNC's , who
knows How to fill the gap between
theoretical & industrial knowledge.
3. CONTENT
PROTOCOL TESTING SIP
(SESSION INITIATION PROTOCOL)
INTRODUCTION OF SIP
SCOPE
• ARCHITECTURE
• SIP NETWORK ELEMENTS
• SERVER TYPES
• TRANSACTION
• VOIP CALLS
• DIALOG
• SESSION
• MANDATORY AND OPTIONAL HEADERS
• SIP REQUEST AND RESPONSES
• CODECS
• B2B UAS
• SIP HEADERS
• SDP HEADERS
• ALL RESPONSE CODE (1XX,2XX,3XX,4XX,5XX,6XX) _WITH EXPLANATION
4. CALL HOLD
• CONSULTATION HOLD
• MUSIC ON HOLD
• TRANSFER - UNATTENDED
• TRANSFER - ATTENDED
• TRANSFER - INSTANT MESSAGING
• CALL FORWARDING UNCONDITIONAL
• CALL FORWARDING - BUSY
• CALL FORWARDING - NO ANSWER
• 3-WAY CONFERENCE - THIRD PARTY IS ADDED
• 3-WAY CONFERENCE - THIRD PARTY JOINS
• FORKING
• CALL MANAGEMENT
• CALL PARK
• CALL PICKUP
• AUTOMATIC REDIAL
• CLICK TO DIAL
• WIRESHARK PRACTICAL LAB (WITH ALL CALLS
FLOW) • SIPP TOOL/PUTTY TOOL
SIP CALL FLOWS
5. INTRODUCTION OF IMS
• IMS ARCHITECTURE
• IMS ENTITIES AND ITS FUNCTIONALITIES
• REFERENCE POINTS
• INTERNETWORKING WITH OTHER NETWORKS
PCSCF DISCOVERY
• PDP CONTEXT METHOD
• DHCP METHOD
ICSCF DISCOVERY
SCSCF ASSIGNMENT
IMS (IP MULTIMEDIA SUBSYSTEM)
6. INITIAL FILTER CRITERIA
• SERVICE POINT TRIGGERZ
• PANI HEADERS ,PVNI ,LIA, LIR, MNP QUERY ,LRN TAS
DNS QUERY ASSERTED IDENTITY ,P
PREFERRED IDENTITY
APPLICATION SERVER ASSIGNMENT
7. INITIAL FILTER CRITERIA
• SERVICE POINT TRIGGERZ
• PANI HEADERS ,PVNI ,LIA, LIR, MNP QUERY ,LRN TAS ,DNS
QUERY ASSERTED IDENTITY , PPREFERRED IDENTITY
DEPLOYMENT PROCESS
➢ DEPLOYMENT PROCESS (END TO END EXPLANATION)
➢ OPEN STACK (END TO END EXPLANATION WITH LIVE PRACTICE)
➢ BASIC DEFINITION HYPERVISOR, VMWARE ,VM, CLOUD
PRECONDITION
CHARGING
• ONLINE CHARGING
• OFFLINE CHARGING
APPLICATION SERVER ASSIGNMENT
8. • IMS
REGISTRATION •
VOLTE CALL
• IMS TO IMSCALL
• CONFERENCE CALL
• SRVCC CALL
• PS TO CSCALL
• CS TO PS
FLOWS
10. INTRODUCTION TO CLOUD COMPUTING
MODELS OF CLOUD COMPUTING
SETTING UP AWS ACCOUNTS
EVALUATING SERVICE LEVEL AGREEMENTS (SLA)
VARIOUS AWS SERVICES
AWS MANAGEMENT CONSOLE
THE AWS CLI - USING CREDENTIALS
THE AWS CLI- USING ROLES AWS GLOBAL
INFRASTRUCTURE
AWS
11. INTRODUCTION TO IAM
IAM USERS AND THEIR ACCESS
IAM ROLES AND THEIR PERMISSION
ACTIVE DIRECTORY FEDERATION
WEB IDENTITY FEDERATION
IAM BEST PRACTICES
ASSIGNMENT: CONFIGURING IAM USERS, GROUPS
ANDPOLICIES, AWS CLI/SDK ACCESS TO
MANAGESERVICES USING CREDENTIALS AND
ROLES LAB
IDENTITY ACCESS MANAGEMENT (IAM)
12. COMPONENTS AND TYPES OF LOAD BALANCING
AUTO SCALING AND ITS BENEFITS
LIFE CYCLE OF AUTO SCALING
COMPONENTS AND POLICIES OF AUTO SCALING
ASSIGNMENT - CONFIGURE LOAD BALANCER,
AUTO SCALING AS PER UTILIZATION IN DIFFERENT
SITUATIONS
ELASTIC LOAD BALANCING & AUTO SCALING
13. EC2 OVERVIEW
AMAZON MACHINE IMAGES(AMI)
AMI CREATION
SECURITY GROUPS
KEY PAIRS ASSIGNING ELASTIC IP ADDRESS
ELASTIC IP V/S PUBLIC IP
BOOTSTRAP SCRIPTSOVERVIEW OF AMAZON EBS
EBS VOLUME INTRO
EBS VS INSTANCE STORE
UPGRADING EBS VOLUME
AMAZON EC2
14. CLOUDTRAIL
CLOUDWATCH
CLOUDFORMATION
TRUSTED ADVISOR
ASSIGNMENT - CREATING EC2, VARIOUS LOGIN
WAYSFROM DIFFERENT OS, PUTTY AND PUTTY
KEYGEN USE, ASSIGNING EIP, AMI ASSIGNMENT,
CREATING ANDRESTORING SNAPSHOT, SNAPSHOT
TO AMI, EC2BOOTSTRAPPING, CLOUDFORMATION
& CLOUD WATCH ASSIGNMENTS.
AMAZON EC2