Voice over WiFi Training | VoWiFi Training

Voice over WiFi Training | VoWiFi Training

Print Friendly, PDF & Email

Introduction:

Voice over WiFi Training | VoWiFi Training Course with Hands-On Exercises (Online, Onsite and Classroom Live)

With this Voice over WiFi Training | VoWiFi Training, you will learn about Voice over Wi-Fi (or VoWiFi) concepts, principals, architecture and design using IMS, SIP and EPC core. This course covers all the principals carriers need to leverage residential and enterprise Wi-Fi Access Points transparent along with interworking concepts and challenges between IMS, 3G, small cell, Wi-Fi, and 4G/LTE.

Voice over WiFi Training provides an intermediate-to-advanced-level technical analysis of VoWiFi architecture, registration, call-setup, location update, mobility and security procedures. Protocol traces and logs are provided mapped to procedures and discuss various methods, functions and signalling parameters.

Duration: 2 days

Related Courses

Customize It:

  • If you are familiar with some aspects of Voice over WiFi Training | VoWiFi Training, we can omit or shorten their discussion.
  • We can adjust the emphasis placed on the various topics or build the Voice over WiFi Training | VoWiFi Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
  • If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Voice over WiFi Training | VoWiFi Training course in manner understandable to lay audiences.

Voice over WiFi Training | VoWiFi Training – Objectives:

After completing this Voice over course, attendees will be able to:

  • Intro to key VoWiFi technical concepts
  • Network Architecture for VoWiFi for the IMS and non-IMS based core
  • Network Architecture for Femto Small Cell and interworking with EPC and IMS
  • VoWifi IMS based solution based on 3GPP standards
  • Trusted and untrusted non-3GPP WiFi architecture carrying voice and SMS/MMS
  • IIMS access using VoWiFi
  • VoWiFi, EPC, IMS architecture , interfaces and protocols
  • RCS and Joyn services for VoWiFi
  • VoWiFi signalling, roaming and messaging
  • Voice / media call setup up signaling
  • Voice / media bearer establishment
  • VoWiFi performance and capacity
  • The Mobile core Network for VoWiFi
  • IMS service applied to VoWiFi
  • VoWiFi default bearer establishment for IMS
  • 3GPP EPS AAA interfaces
  • ANGw, ePDG
  • SWm, SWa, STa, SWd interfaces
  • AAA server, AAA proxy

Voice over WiFi Training | VoWiFi Training – Course Outlines:

IMS architecture for Vowifi

◾Telephony in WiFi networks
◾VoWiFi based on the IP Multimedia Subsystem (IMS) network
◾SIP servers
◾IMS Identifiers
◾SIP protocol applied to Vowifi
◾Diameter protocol applied to Vowifi
◾QoS procedures for Vowifi
◾Overview of 802.11e principals
◾Wi-Fi Multimedia (WMM)
◾Packet Loss, Jitter, and Latency affecting voice, SMS and MMS
◾IMS Call Flow Examples
◾IMS Access Using Vowifi
◾IMS Flow Using Vowifi
◾Vowifi User Plane and Control Plane

VoWiFi Procedure Descriptions

◾Authentication and Authorization procedure
◾3GPP AAA Server Detailed Behaviour
◾3GPP AAA Proxy Detailed Behaviour
◾SWa HSS/AAA Initiated Detach
◾SWa Re-Authentication and Re-Authorization Procedure
◾Commands for SWa authentication and authorization procedures
◾Diameter-EAP-Request (DER) Command
◾Diameter-EAP-Answer (DEA) Command
◾Commands for SWa HSS/AAA Initiated Detach
◾Commands for Untrusted non-3GPP Access network Initiated Session Termination
◾Commands for SWa Re-Authentication and Re-Authorization Procedures
◾STa Access Authentication and Authorization
◾HSS/AAA Initiated Detach on STa
◾STa Re-Authorization and Re-Authentication Procedures

Non-3GPP Access Network Initiated Session Termination

◾Commands for STa HSS/AAA Initiated Detach for Trusted non-3GPP Access
◾Commands for Re-Authentication and Re-Authorization Procedure
◾Commands for Trusted non-3GPP Access network Initiated Session Termination
◾AN-Trusted
◾Session Handling

Untrusted non-3GPP Access / ePDG related procedures

◾Commands used in connection with the STa interface
◾Commands used in connection with the SWm interface
◾Commands used in connection with the S6b interface
◾Authentication and Authorization Procedures

ePDG Architecture

◾ePDG Detailed Behavior
◾ePDG Initiated Session Termination Procedures
◾3GPP AAA Server Initiated Session Termination Procedures
◾Authorization Information Update Procedures
◾Commands for SWm Authentication and Authorization Procedures
◾Commands for ePDG Initiated Session Termination
◾Commands for Authorization Information Update

SWx Description

◾Authentication Procedure
◾Location Management Procedures
◾HSS Initiated Update of User Profile
◾S6b and H2 Description
◾Authentication and Authorization Procedures when using DSMIPv6
◾Authorization Procedures when using PMIPv6 or GTPv2
◾PDN GW Initiated Session Termination Procedures
◾3GPP AAA Initiated Session Termination Procedures
◾Service Authorization Information Update Procedures
◾Authorization Procedures when using MIPv4 FACoA
◾Commands for S6b DSMIPv6 Authorization Procedures
◾S6b DSMIPv6 procedures
◾S6b PMIPv6 or GTPv2 procedures
◾S6b Re-used Diameter AVPs
◾SWx interface

Whether you are looking for general information or have a specific question, we want to help!

Request More Information

    Time frame:

    0