This document provides an overview of the SSCA® SIP training program. It discusses the following:
1. Who would benefit from the training program including manufacturers, service providers, and sales/marketing personnel working with VoIP.
2. What is included in the training program which is 11 modules on topics like SIP, security, QoS, and more.
3. The total running time is approximately 19 hours including time for labs. It does not include study time for the certification exam.
4. The goal of the training is to help students gain the SSCA® certification which is recognized in the telecommunications industry.
SIP Parity Actvity Group & Video Interoperability ReviewIMTC
SIP Parity Actvity Group & Video Interoperability Review
Charles Eckel - Technical Leader II, Media Experience and Analytics at Cisco, and the IMTC SIP Parity Activity Group Leader.
SIP Parity Actvity Group & Video Interoperability ReviewIMTC
SIP Parity Actvity Group & Video Interoperability Review
Charles Eckel - Technical Leader II, Media Experience and Analytics at Cisco, and the IMTC SIP Parity Activity Group Leader.
Join us for an introductory webinar on VoIP and learn:
- The fundamental principles of VoIP including RTP and SIP
- What voice metrics to measure and why they matter
- The different methods to monitor and troubleshoot VoIP
SIP Trunking & Security in an Enterprise NetworkDan York
How secure are your VoIP systems as you deploy SIP-based systems in an enterprise environment? In this slide deck presented by VOIPSA Best Practices Chair Dan York at the Ingate SIP Trunking Seminars at ITEXPO September 17, 2008, Dan York walks through the security issues related to VoIP (with a focus on SIP trunking), the tools out there to attack/test VoIP systems, best practices and resources. (An audio recording of this session was made and will be available.)
Testing Asterisk: Advanced Test Methodologies for Enterprise Class IP PBXs.
SIP’s scalability is a key factor to Asterisk VoIP technology’s continued adoption, and the need to test the Asterisk iPBX servers under heavily saturated scenarios is becoming more acute. The Asterisk SIP servers must be able to bear heavy traffic loads for user registration and call setup functions that require reading from and writing to one or more large dynamic database(s). The corresponding test tools, call generators, terminators and analyzers must all be capable of processing the same significant loads. Klarya can test a large variety of VoIP and traditional telephony systems: the focus of this keynote is to delineate issues involved in testing Asterisk iPBX servers under heavy call saturation.
For the purposes of this research Klarya choose to test the Asterisk PBX under different test scenarios in order to determine the VoIP Call Setup rate, the maximum number of concurrent VoIP calls and the quality of Voip calls as data and media is introduced in the same network.
The representative test equipment used for this set of investigations included hardware and software from the Spirent Communications line of products: the Abacus 5000 IP telephony test system and the Avalanche System and Network Equipment Tester.
A short presentation on SIP Trunking. A background with SIP training and PSTN (T-1, ISDN PRI) and TCP/IP knowledge will be helpful. For more info connect with me at http://TrainingCity.com
Presented by: Muhammad Yeasir Arafat
ElastixWorld 2013
Today, the session initiation protocol (SIP) is the predominant protocol for IP Telephony Signalling. The intention of this paper is to present an overview of IP Telephony security issues - both current and future – focusing on SIP. We start by presenting some fundamental differences between IP Telephony and the public switched telephone network (PSTN). We then look at specific problems for SIP signalling that arise from these differences. We summarize current activities regarding SIP security, including recent developments in the research community and standardization efforts within the IETF. Finally, the paper gives an outlook on the security issues of IP Telephony.
Download paper at: http://elx.ec/ssiipt
A quick introduction to Kamailio - the leading Open Source SIP server (based on OpenSER and SER). Kamailio is quite different than Asterisk, FreeSwitch and many other VoIP platforms - why is that and how do you start getting your head around Kamailio?
Practical Fundamentals of Voice over IP (VoIP) for Engineers and TechniciansLiving Online
This manual provides solid practical advice on application, implementation and, most importantly, troubleshooting Voice Over IP (VOIP) systems.
MORE INFORMATION: http://www.idc-online.com/content/practical-fundamentals-voice-over-ip-voip-21?id=151
Discussion slides for the SIP forum IPv6 task group conference call 12/12/12 covering issues with SIP DNS, SIP and locating next hop in a dual stack world and issues with Server Based ALG decisions for media paths.
A presentation that tries to set an IPv6 agenda for the SIP community. VoIP and IPv6 is a natural match. If we want unified communication to be truly global and unified - we need to build solutions on IPv6 and not Ipv4.
SIP servers on embedded systems: Powering SoHo communicationsRADVISION Ltd.
Increasing number of small offices/home offices (SoHo) migrate to VoIP communication based on commodity appliances that provide the connectivity solution.
The appliance is in many cases a combination of:
* Residential gateway (RGW)
* Integrated access device (IAD)
* Key-system/ small PBX
* SIP firewall / GW
In some cases it even can be as part of a set-top box.
All the above is based on SIP server technology that is tailored to embedded devices. This technology involves significant business potential as well as technology challenges that will be elaborated on the webinar.
Join us for an introductory webinar on VoIP and learn:
- The fundamental principles of VoIP including RTP and SIP
- What voice metrics to measure and why they matter
- The different methods to monitor and troubleshoot VoIP
SIP Trunking & Security in an Enterprise NetworkDan York
How secure are your VoIP systems as you deploy SIP-based systems in an enterprise environment? In this slide deck presented by VOIPSA Best Practices Chair Dan York at the Ingate SIP Trunking Seminars at ITEXPO September 17, 2008, Dan York walks through the security issues related to VoIP (with a focus on SIP trunking), the tools out there to attack/test VoIP systems, best practices and resources. (An audio recording of this session was made and will be available.)
Testing Asterisk: Advanced Test Methodologies for Enterprise Class IP PBXs.
SIP’s scalability is a key factor to Asterisk VoIP technology’s continued adoption, and the need to test the Asterisk iPBX servers under heavily saturated scenarios is becoming more acute. The Asterisk SIP servers must be able to bear heavy traffic loads for user registration and call setup functions that require reading from and writing to one or more large dynamic database(s). The corresponding test tools, call generators, terminators and analyzers must all be capable of processing the same significant loads. Klarya can test a large variety of VoIP and traditional telephony systems: the focus of this keynote is to delineate issues involved in testing Asterisk iPBX servers under heavy call saturation.
For the purposes of this research Klarya choose to test the Asterisk PBX under different test scenarios in order to determine the VoIP Call Setup rate, the maximum number of concurrent VoIP calls and the quality of Voip calls as data and media is introduced in the same network.
The representative test equipment used for this set of investigations included hardware and software from the Spirent Communications line of products: the Abacus 5000 IP telephony test system and the Avalanche System and Network Equipment Tester.
A short presentation on SIP Trunking. A background with SIP training and PSTN (T-1, ISDN PRI) and TCP/IP knowledge will be helpful. For more info connect with me at http://TrainingCity.com
Presented by: Muhammad Yeasir Arafat
ElastixWorld 2013
Today, the session initiation protocol (SIP) is the predominant protocol for IP Telephony Signalling. The intention of this paper is to present an overview of IP Telephony security issues - both current and future – focusing on SIP. We start by presenting some fundamental differences between IP Telephony and the public switched telephone network (PSTN). We then look at specific problems for SIP signalling that arise from these differences. We summarize current activities regarding SIP security, including recent developments in the research community and standardization efforts within the IETF. Finally, the paper gives an outlook on the security issues of IP Telephony.
Download paper at: http://elx.ec/ssiipt
A quick introduction to Kamailio - the leading Open Source SIP server (based on OpenSER and SER). Kamailio is quite different than Asterisk, FreeSwitch and many other VoIP platforms - why is that and how do you start getting your head around Kamailio?
Practical Fundamentals of Voice over IP (VoIP) for Engineers and TechniciansLiving Online
This manual provides solid practical advice on application, implementation and, most importantly, troubleshooting Voice Over IP (VOIP) systems.
MORE INFORMATION: http://www.idc-online.com/content/practical-fundamentals-voice-over-ip-voip-21?id=151
Discussion slides for the SIP forum IPv6 task group conference call 12/12/12 covering issues with SIP DNS, SIP and locating next hop in a dual stack world and issues with Server Based ALG decisions for media paths.
A presentation that tries to set an IPv6 agenda for the SIP community. VoIP and IPv6 is a natural match. If we want unified communication to be truly global and unified - we need to build solutions on IPv6 and not Ipv4.
SIP servers on embedded systems: Powering SoHo communicationsRADVISION Ltd.
Increasing number of small offices/home offices (SoHo) migrate to VoIP communication based on commodity appliances that provide the connectivity solution.
The appliance is in many cases a combination of:
* Residential gateway (RGW)
* Integrated access device (IAD)
* Key-system/ small PBX
* SIP firewall / GW
In some cases it even can be as part of a set-top box.
All the above is based on SIP server technology that is tailored to embedded devices. This technology involves significant business potential as well as technology challenges that will be elaborated on the webinar.
Planning and Troubleshooting VoIP Performance shares insights on ThousandEyes helps visualize VoIP routing between branch offices and across the internet, optimize and plan new VoIP deployments and expansions, and troubleshoot VoIP performance to specific problem nodes, links and networks.
Why Session Border Controllers?
Product Portfolio of the Session Border Controller
Business Applications and Use Cases (Vega ESBC)
Carrier/Service Provider Applications and Use Cases (NetBorder SBC)
Sangoma SBC Load Balancing and Failover Techniques
SBC Walkthrough
Conceptual Overview of the SBC Call Processing Components
Introduction and Configuration of SIP Profiles
Introduction and Configuration of Domain Profiles
Introduction and Configuration of Media Profiles
Introduction and Configuration of SIP Trunks
Introduction and Configuration of Call Routing
Walkthrough
Kamailio is the leading Open Source SIP Server - a SIP proxy, registrar, location server, presence server, IMS server and much more. Find out more by viewing this quick presentation! (Updated June 2014)
Short presentation that introduces the basic concepts of SIP.
Note, some of the slides requires animations and will therefore look strange when viewed without them (e.g., see slide 17). Email me if you want the full presentation and I'll send it to you...
SIP (Session Initiation Protocol) is a signaling protocol used to create, manage and terminate sessions in an IP based network. This course is for beginners and aims to give a brief introduction to SIP before one ventures into the long RFC documents.
SIP (Session Initiation Protocol) is a signaling protocol used to create, manage and terminate sessions in an IP based network. This course is for beginners and aims to give a brief introduction to SIP before one ventures into the long RFC documents.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
The ssca® sip training program course outline
1. The SSCA® SIP training program
Overview
The SIP School™ is ‘the’ place to learn all about the Session Initiation Protocol also known as
SIP. There is so much information on the internet about SIP that is both hard to read and poorly
presented making it difficult for people to learn about this most important protocol. So The SIP
School™ with its lively, clear and fully animated eLearning program has become the only place to
enroll to learn about SIP.
Who would benefit from the SSCA® SIP training program?
Everyone…! This training is designed to suit anyone working with SIP such as: Manufacturers of
IP PBX and IP Phone equipment, SIP Security equipment manufacturers, SIP Trunk service
providers and Carriers, Network Design specialists, Sales and Marketing personnel working with
VoIP equipment and services; all of these will benefit from this program.
What’s in the SSCA® SIP training program?
Once you’ve enrolled, you’ll see 11 modules. You can work through the modules in order or
simply choose the ones you are most interested in. The modules are listed here but for more
detail, please look further into this document.
1. Core SIP
2. Wireshark
3. SIP-T and the PSTN
4. SIP, VoIP and QoS
5. SIP Security
6. Firewalls, NAT and Session Border Controllers
7. SIP Trunking
8. Testing, Troubleshooting and Interoperability
9. ENUM, DNS and VoIP Peering
10. SIP and Fax over IP
11. SIP and Unified Communications
How long will it take to work through?
Total Running time for this program (including time taken to work on all the labs) is approximately
19 hours from the start to finish though the time will vary based on the student’s own experience
and of course, how much time they want to spend on the material and if they want to replay some
modules.
This does not include study time for the SSCA® or the taking of the SSCA® final test itself.
Become a ‘SIP School Certified Associate’ or SSCA®
You can gain access to the test separately or with a ‘bundle’ license – check license ‘purchase’
options carefully.
The SSCA® certification is recognized in the Telecommunications world as the only certification
on SIP to strive for ‘Globally’. It is endorsed and supported by the TIA (Telecoms Industry
Association) along with Bicsi and a rapidly growing number of Manufacturers, Service providers
and Carriers.
To prepare for the certification test, each SIP training module has its own ‘mini’ quiz at the end to
help delegates ‘gauge’ how well they are doing.
NOTE: An access license for any training course and certification test is for 12 months from the
date of purchase.
2. Core SIP
Module times
Running time = 71 minutes
Quizzes = 7 minutes
Total = 78 minutes
SIP (The Session Initiation Protocol) is described in this module along with the many other
Components and Services that will be encountered on a SIP based network
Topics:
SIP – Who Benefits
SIP – The Session Initiation Protocol
SIP ‘Official Summary’
Based on HTML
Where does SIP fit in?
SIP Clients and Servers
SIP User Agents
Simple Call Session Setup
SIP System Architecture
The URI - Unique Resource Identifier
SIP Addressing
SIP Addressing Examples
SIP Servers and Operation
Registration
Re-Registration
SIP Proxy servers and why we need them
SIP Server – Proxy Mode
SIP Server – Re-Direct Mode
Proxy Server ‘State’ types
Location Services
Registration
Re-Registration
DHCP and SIP
SIP Proxy – Trapezoid Model
SIP Server in Proxy Mode
SIP Server in Proxy Redirect Mode
Stateful and Stateless Proxies
Location Server
Location Server – Components
Location Server – Information Sources
Location Server – Example
SIP Client Configuration
Configuration scenarios
Some basic elements
SIP Messaging
Request Methods
Response Codes
SIP Headers
INVITE – Example
RESPONSE – Example
SIP Request Methods
SIP Response Codes
SIP Headers
SIP HEADER - INVITE
SIP HEADER - 200 Response
SDP – the Session Description Protocol
SDP – The Session Description Protocol
SDP in a SIP Message
An SDP Example
Extending SDP
Changing Session Parameters
Call Hold example
Multiple ‘m’ lines
SDP – The Session Description Protocol
SDP Component in a SIP Message
SDP Example
3. Extending SDP
Changing Session Parameters
SDP Example - Put a call on Hold
SDP Example - Call Hold Trace
Call Hold – Old and New Methods
Music on Hold example
INVITE and reINVITE
SIP Mobility
SIP Mobility
SIP Call Forking - Parallel
SIP Call Forking - Sequential
Call legs, dialogs and Call IDs
Dialog trace example
Dialogs and Transactions
Branch Ids
Call Forward - No Answer
Call Forward to Voicemail
More on Proxies and SIP Routing
Stateless Proxy
Stateful Proxy
More Proxy information
VIA and Record Route
VIA Details
Record-Route Defined
Record Route Example
Loose and Strict Routing
Session Policies
MIME
MIME
Multiple MIME parts
SIP and the PSTN
SIP and the PSTN
SIP to PSTN Call Flow
SIP to PSTN Detail
SIP Codes and the PSTN
SIP and B2BUA
B2BUA - Back to Back User Agent
B2BUA Example
B2BUA Benefits and Features
SIP Summary
Request for Comments
New RFCs
SIPIT
The Call Process
4. Wireshark
Module times
Running time = 14 minutes
Quizzes = 1 minutes
Lab – ‘Various’ ~ approx 80 minutes
Total = 95 minutes
Note: If the student wishes to take more time over the module – this could run to a few
hours of learning. It’s completely dependent on the students desire to learn Wireshark
This module on Wireshark is an introduction and is intended to get students setup quickly so that
they can capture traffic to analyze during the Core module and the rest of the course. More
advanced Wireshark training can be found in the Troubleshooting, Testing and Interoperability
module of this course.
Topics:
Wireshark
What is Wireshark?
Your Initial Setup
Free @thesipschool.com account from OnSIP
SIP account with Voipuser.org
X-lite client for testing
Configure X-Lite
SIP Social directory
SIP test numbers
Download Wireshark
Wireshark – Basic Layout
Wireshark icons
Using Wireshark – Capturing
Using Wireshark – Simple Filters
Using Wireshark – More SIP statistics
Using Wireshark – RTP Statistics
Saving Captures
Over to you!
What are the codes?
Link to Troubleshooting module for Advanced Wireshark
5. SIP, the PSTN and SIP-T
Module times
Running time = 27 minutes
Quizzes = 7 minutes
Total = 34 minutes
SIP Networks will of course have to allow connections to and from the PSTN. This module works
through SIP and PSTN connectivity
Topics:
SIP-T and the PSTN
SIP to PSTN Overview
SIP to PSTN Call Flow
SIP to PSTN Detail
PSTN to SIP Call Flow
SIP to PSTN Call Failure
SIP to PSTN Call trace
Early Media
Early Media - SIP to PSTN Call
Early Offer and Delayed Offer
Early Offer / Delayed Offer
Gateways
Default Gateway?
Gateway Location and Routing with TRIP
TRIP Examples
SIP-T and PSTN Bridging
SIP-T and SIP-I
SS7, ISDN and SIP
ISUP and SIP Messages
ISDN User Part (ISUP) to SIP Codes
PSTN to PSTN via SIP
ISUP Encapsulation
ISUP Encapsulation / SDP
Addressing Notes
SIP and DTMF
DTMF - Quick Re-Cap
What is DTMF?
DTMF Transport methods
DTMF ‘Inband’
RFC 2833 ‘Trace’ example
RFC 4733 replaces 2833
RFC 4734
SIP INFO ‘Trace’ example
6. SIP, VoIP and QoS
Module times
Running time = 38 minutes
Quizzes = 7 minutes
Lab – ‘Various’ ~ approx 10 minutes
Total = 55 minutes
This module is a refresher module on the basics of Voice over IP and also focuses on
components that are important to a SIP based Network
Topics:
What is VoIP or Voice over IP?
What is VoIP?
What is Voice over IP?
VoIP – ‘A Basic Call’
VoIP and TCP / UDP
VoIP over the Internet
Branch to Branch VoIP
IP PBX
Voice Sampling and Codec
Encoding
Codecs for Voice
Try the Codec Test
High Definition (HD) Voice
Sound tests
Wideband (HD) codecs
MOS – Mean Opinion scores
The Real time Protocol or RTP
RTP Encapsulation
RTP Header Trace
Real Time Control Protocol
RTCP-XR (Extended Reports)
RTP / RTCP and UDP Ports
Quality of Service
QoS described
QoS Issues
Measuring Delay
Jitter and Packet Loss
General VoIP Acceptance Criteria
QoS on the Network
802.1Q – VLANs
802.1Q/P Tagging
802.1P - L2 Classification
TOS and DiffServe
Layer 3 Classification
Codecs and Bandwidth
Symmetric DSL (SDSL)
Testing your link
SIP, SDP and VoIP
SIP in the TCP/IP Model
SIP and SDP Messages
SIP and SDP Codec mapping
Where does SIP fit in?
SIP, SDP and VoIP INVITE
Audio and Video in the SDP body
7. SIP Security
Module times
Running time = 40 minutes
Quizzes = 7 minutes
Lab – ‘Various’ ~ approx 120 minutes
Total = 167 minutes
SIP Security is a complex issue and this modules covers many SIP Security problems along with
possible solutions
Topics:
Authentication and Authorization
SIP Proxy Authentication
401 and 407 Authorization
SIP Authorization
PROXY Authentication
SSL with MD5 Cracked!
MD5 v SHA
Encryption
Why Encrypt SIP?
Certificates and HTTPS
Certificate Authorities
Certificate Example
Self-Signed Certificates
Format type
Securing SIP and VoIP
SSL and TLS
SIP and TLS
TLS Thoughts
TLS and SIP in Action
SIPS and SIP Addressing
Secure RTP (SRTP)
Setting SRTP on SIP Devices
Secure RTP (SRTP) - Example
SRTP and SRTCP
sdes and the Crypto attribute
Crypto attribute example
Crypto multiple streams
RFC 4474 for Caller Identity
Caller Identity
DTLS/SRTP
S/MIME and SIP
MIME and ISUP
SIP Trunking and Security
Enhancing SIP Trunk Security
Alternatives - IPSec, ZRTP
Attacks and Responses
Types of Attack on a VoIP/SIP Network
FBI network examples
Responses and Protection
TLS v SSL
Response Identity – A Problem!
Rogue SIP Proxy
Phishing and SIP exploit
More Examples RFC 4475
Try for yourself with recommended software tools
NIST Recommendations
NIST Recommendations on securing VoIP
8. Firewalls, NAT and Session Border Controllers
Module times
Running time = 33 minutes
Quizzes = 7 minutes
Total = 40 minutes
Inevitably, all IP traffic comes across a Firewall / NAT device and in the case of SIP they can stop
the flow of SIP message. This module looks at the problems and the solutions including Session
border controllers.
Topics:
Overview
Issues to address
Firewalls
What does a Firewall do?
Are Firewalls effective?
NAT or Network Address Translation
What is NAT?
NAT Request
NAT Response
Multiple NATs
The NAT Problem
Types of NAT
Types of NAT
NAT – Full Cone
NAT – Restricted Cone
NAT – Port Restricted Cone
NAT – Symmetric
The NAPT or (PAT) Problem
Problems with NAT, Firewalls and SIP
The Solutions
STUN (Simple Traversal of UDP)
STUN (Simple Traversal of UDP)
STUN and rport
Problems with STUN
TURN (Traversal Using Relay NAT)
Interactive Connectivity Establishment (ICE)
How ICE works – Simplified!
More on ICE
Universal Plug and Play (UPnP)
Near end NAT
Far end NAT
The RTP Problem
The Firewall Problem
Solving the RTP Problem
Symmetric RTP
Media Proxy
Application Level Gateway
SIP Aware Firewalls - Incoming
SIP Aware Firewalls - Outgoing
Session Border Controllers
SBC for the Enterprise
SBC for the ITSP
Recommended Session Border Controller features
SBCs in Action!
9. SIP Trunking
Module times
Running time = 62 minutes
Quizzes = 7 minutes
Lab – ‘Setting up SIP Trunks’ ~ approx 120 minutes
o (If student has access to a SIP server)
Total = 189 minutes
This module teaches the theory of connecting a SIP based PBX to the PSTN and it is the
foundation of vendor specific Trunking modules.
Topics:
SIP Trunks
What is a SIP Trunk
Alternative to TDM
Separate Data and Voice connections
Converging the network
SIP Trunks and Codecs
SIP Trunk Benefits
SIP Trunking – In More Depth
SIP Trunk Capabilities
SIP Trunking Network Examples
SIP Peering
Peering problems?
Least Cost routing (LCR)
Disaster Recovery
Disaster Recovery ‘Expanded detail’
Disaster Recovery – Last resort?
Number Consolidation
Virtual Presences
Trunking Variations
Single Site, TDM PBX
Single Site, No ‘Forklift’
Single Site, Converged
Converged – SIP/IP PBX
Multiple Site, ‘Converged’
Multiple Site, ‘Converged’ + central SBC
Media Gateways
SIP PBX to Non-SIP PBX
SIP PBX to Non-SIP PBX, Call Flow
SIP Trunk Performance
Connection types
The ADSL issue
Codecs, Voice and Data
Symmetric DSL (SDSL)
Bandwidth Calculator
Testing your link
ADSL Developments
Fibre Options
SIP Trunking and MPLS
MPLS, basic explanation
MPLS Label format
MPLS in a MAC frame
MPLS example network
MPLS benefits
Your own private WAN
but ‘Not the only client’
Separate MPLS networks
Security and SIP Trunking
SIP Trunk Security - Overview
Session Border Controllers
More on SBCs
The ‘corporate’ SBC
10. SIP REFER issues
Setting up a SIP Trunk
Add a VoIP Provider
Provider SIP Servers
Authentication
Add a Dialling Rule
Trunk setup complete
Call out Trace
Comparing SIP packets from two ITSP providers
Some PBX Requirements
Enterprise PSTN Identities
P-Preferred and P-Asserted
Call Progress Tones
Next Generation Networks
What are NGNs?
An Example – British Telecom
Troubleshooting and Interops
SIP Trunks and Common Problems
The SIP Forum
SIPits
SIPit Results
SIP Connect Document
SIP Connect 1.1
Choosing an ITSP
Understanding ITSP Offerings
'Sticking points’?
SIP trunking Checklist for ITSP evaluation
Resource Websites
TMCnet – Sip trunking
Siptrunk.org
No Jitter - Hotzone
11. Testing, Troubleshooting and Interoperability
Module times
Running time = 69 minutes
Quizzes = 7 minutes
Lab – ‘Various’ ~ approx 240 minutes
Total = 316 minutes
Learn how to Monitor and Test SIP devices and services using Wireshark. This tool enables
delegates to analyze call control messages to establish where a fault may lie in your SIP
infrastructure. Full examples are provided and delegates are encouraged to follow the exercises
to try for themselves.
Setting up your test environment
Using SIP IP Phones
Using SIP Softphones
Even more SIP Softphones
SIP Communicator
Choosing a ‘Trial/Test’ ITSP
Getting Free ITSP Accounts
Configuring your Softphone
Get a SIP URI of your own
SIP2SIP accounts
Configuring SIP Communicator with a SIP2SIP account
Using ‘Test Numbers’
Multiple Setup options for you to try
Configure X-Lite and SIP Communicator on the same PC for testing
Example - The SIP Phones @ The SIP School™
Wireshark
Loading Wireshark
Network interface setup for capture
Wireshark - Basic Layout
Understanding Wireshark Icons
Using Wireshark - Capturing
Using Wireshark – Simple Filters
Using Wireshark – SIP Statistics
Saving Captures
Wireshark in more depth!
SIP Statistics
RTP / VoIP Capture and Playback
More ‘SIP ladder’ analysis
Coloring rules
More ‘filter expressions’
More Help on Wireshark if you need it
You try
Where to Capture?
Interoperability Testing
Interop Testing
Why Interop can be tough
Different interpretations in the RFC 3261
BLISS – Basic Interoperability for SIP Services
Interop Test Scenario
Interop Test operations
Sample Interop Traces
Wireshark example videos to help understand interop issues
Video call testing
Video tests with Wireshark trace analysis
SIPIT events
Common SIP problems
Will it ever work?
What else can you do?
Common SIP/VoIP Problems
Troubleshooting SIP Trunks
4xx — Client Failure Responses
5xx — Server Failure Responses
6xx — Global Failure Responses
More SIP Testing Tools
SIP Scenario
12. SIP Workbench
SIP Monitoring example app
SIP Scan
TestYourVoIP.com
HoverIP
NSLookup
SIP Center and Voip-info for more tools!
Using the NET to find answers
The SIP Wiki
13. ENUM, DNS and VoIP Peering
Module times
Running time = 39 minutes
Quizzes = 7 minutes
Lab – ‘Registering / Testing ENUM’ ~ approx 20 minutes
Total = 66 minutes
ENUM (along with DNS) is developing into an essential protocol on SIP networks and its purpose
is to assist in finding destination SIP devices from a single SIP address.
Topics:
ENUM Explained
What is E.164?
What is ENUM?
Why ENUM?
Call Routing and ENUM - Example
Enum, DNS and Domains
Why are we using DNS?
DNS and the Web
‘Finding’ Domain name servers using NSLookup
The e164.arpa Domain
Approved ENUM Delegations
TIERS 0, 1, 2 and 3
TIERS and Registrars
DNS and AOR
e164.arpa Domain in action
Example - ENUM in the UK
Address of Record
Reseaux IP Europeens
PSTN to SIP UA - Example
The ENUM Query
NAPTR Records
DNS Response to an ENUM query
‘Finding SIP servers using the tool - DIG
Calls Flows
PSTN to SIP UA – Example (2)
IP to PSTN (Simplified)
MARTINI
Types of ENUM
Different ‘Types’ of ENUM
The Problems with ‘Public’ ENUM
Example – ‘Private’ ENUM
Example – ‘Operator’ ENUM
VoIP Peering
Stay ‘On-Net
From ITSP to PSTN and Back…!
Loss of features with the PSTN
Peering Profiles and Agreements
Bi-lateral Peering
Multi-lateral Peering
A few providers
ENUM in North America
A complete ‘infrastructure’
ViPR
Verification Involving PSTN Reachability (ViPR).
What is ViPR
ViPR and P2P
Initial PSTN Call
ViPR Call Record
Query the DHT
DHT query and Validation
The Next call is a SIP Call
ViPR Summary
14. Try for yourself
Register your number
Testing ENUM
DIG and NAPTR records
ENUMPlus for multiple ENUM trees
ENUM and the future
How is ENUM moving forward?
Useful Links
15. SIP and Fax over IP
Module times
Running time = 31 minutes
Quizzes = 7 minutes
Total = 38 minutes
A lot of companies are now trying to run Fax services across SIP trunks and finding it’s not an
easy service to get working successfully. This module intends to describe the various flavors of
Fax over IP along what should be focused on in order to troubleshoot any issues.
Topics Include
Faxing Basics
Faxing background
T.30 Fax signaling
Associated tones and protocols
The ITU and TIA standards
Fax over IP
Fax over IP benefits
From the old to the new
Intro to FoIP
FoIP and SIP trunks
Protocol conversions
Fax Protocols
G.711 Pass-through
T.37 Store and Forward
T.38 Relay
Where does SIP fit in?
UDPTL
Protocol options for the future
FoIP in action
SIP in FoIP – Call Flow
SIP INVITE
INVITE for T.38
The INVITE SDP body
Wireshark FoIP example
SIP T.38 Call flows – IETF draft document
Bandwidth
T.38 and G.711 network traffic
Troubleshooting
The basics
More complex issues to watch out for
Ongoing Efforts
SIP Forum and i3 Forum
Use DTMF events instead?
16. SIP and Unified Communications
Module times
Running time = 48 minutes
Quizzes = 7 minutes
Total = 55 minutes
SIP and Unified Communications shows you how SIP underpins all the elements of Unified
Communications to realize efficiencies that a successful implementation promises to business.
Topics Include
Communication Breakdown
Playing Voicemail tag
Can’t find people
Available but not Available..!
More Examples of communication problems
IM Clients
IM Client Features
Enterprise Clients
Enterprise UC client comparisons
More in IM Clients
IM and Mobile devices
The Background Stuff
The IMPP working group
IMPP and CPP
More IMPP work
SIMPLE
How it all works
Presentity
A Basic SIP subscription
Multiple Presence States
Presence and P2P
A Presence Network
Getting inside the SIP packets
Presentity and more!
A Basic SIP Subscription
Multiple Presence States
Presence and P2P
A Presence Network
Get inside the SIP packets
The Packet Structure
PIDF Message Body
XML
Tuples
Example Presence doc with Tuples (using a Mobile Phone)
Rich Presence
The METHODS in Action
PUBLISH STATE
PUBLISH and PIDF/XML body
SUBSCRIBE METHOD
202 OK Response
NOTIFY
MESSAGE
Add A Buddy/Subscribe
is-composing
Alternative ‘Presence States’
2 Places at the same time
Conferencing
What SIP does in Conferencing
INITIATE a conference
JOIN a conference
LEAVE / EXIT a conference
INVITE other participants
REFER conference server to invite or others to join
EXPEL participants
CONFIGURE the media stream
17. CONTROL a conference
Why SIP?
Centralized conferencing
Centralized Signaling
Centralized Mixing (optional)
Centralized Authentication
B2BUA (Discussed in core module)
Conference Components
The Focus
More than one Focus
Conference Setup
iscomposing in Conference
MESSAGE in conference
BYE in conference
Alternative INVITE
SDP BODY OF INVITE
IETF work and Conferencing
XMPP v SIMPLE
What is XMPP?
SIMPLE and/or XMPP
Gateways
Federations
What is Federation?
Multiple Presence sources
Super-Aggregation
Inter-Domain Federation
Unified Communications
What’s all the fuss?
Unified Confusion
Components involved
What should UC do?
21st Century Dial tone
The Unified inbox
Unified aware applications
Find me – Follow me
Device awareness
Unified Comms for Business
Do your Homework
Humans and UC
UC in a SIP network
UCI Forum
The UCI Forum - Challenges
UCI Forum goals
UCIF website
Relevant RFCs
RFCs Galore