Introduction:
Voice over WiFi Training | VoWiFi Training Course with Hands-On Exercises (Online, Onsite and Classroom Live)
With this Voice over WiFi Training | VoWiFi Training, you will learn about Voice over Wi-Fi (or VoWiFi) concepts, principals, architecture and design using IMS, SIP and EPC core. This course covers all the principals carriers need to leverage residential and enterprise Wi-Fi Access Points transparent along with interworking concepts and challenges between IMS, 3G, small cell, Wi-Fi, and 4G/LTE.
Voice over WiFi Training provides an intermediate-to-advanced-level technical analysis of VoWiFi architecture, registration, call-setup, location update, mobility and security procedures. Protocol traces and logs are provided mapped to procedures and discuss various methods, functions and signalling parameters.
Duration: 2 days
Related Courses
- ViLTE Training | Video over LTE Training
- VoLTE Training | Voice over LTE Training
- VoLTE Performance Optimization Training
- VoLTE Protocols and Signaling Training
- VoLTE QoS Training | VoLTE Quality of Service Training
- VoLTE IMS and SIP Signaling Training
- VoLTE Security Training
- VoWiFi Training | Voice over WiFi Training
Customize It:
- If you are familiar with some aspects of Voice over WiFi Training | VoWiFi Training, we can omit or shorten their discussion.
- We can adjust the emphasis placed on the various topics or build the Voice over WiFi Training | VoWiFi Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
- If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Voice over WiFi Training | VoWiFi Training course in manner understandable to lay audiences.
Voice over WiFi Training | VoWiFi Training – Objectives:
After completing this Voice over course, attendees will be able to:
- Intro to key VoWiFi technical concepts
- Network Architecture for VoWiFi for the IMS and non-IMS based core
- Network Architecture for Femto Small Cell and interworking with EPC and IMS
- VoWifi IMS based solution based on 3GPP standards
- Trusted and untrusted non-3GPP WiFi architecture carrying voice and SMS/MMS
- IIMS access using VoWiFi
- VoWiFi, EPC, IMS architecture , interfaces and protocols
- RCS and Joyn services for VoWiFi
- VoWiFi signalling, roaming and messaging
- Voice / media call setup up signaling
- Voice / media bearer establishment
- VoWiFi performance and capacity
- The Mobile core Network for VoWiFi
- IMS service applied to VoWiFi
- VoWiFi default bearer establishment for IMS
- 3GPP EPS AAA interfaces
- ANGw, ePDG
- SWm, SWa, STa, SWd interfaces
- AAA server, AAA proxy
Voice over WiFi Training | VoWiFi Training – Course Outlines:
IMS architecture for Vowifi
◾Telephony in WiFi networks
◾VoWiFi based on the IP Multimedia Subsystem (IMS) network
◾SIP servers
◾IMS Identifiers
◾SIP protocol applied to Vowifi
◾Diameter protocol applied to Vowifi
◾QoS procedures for Vowifi
◾Overview of 802.11e principals
◾Wi-Fi Multimedia (WMM)
◾Packet Loss, Jitter, and Latency affecting voice, SMS and MMS
◾IMS Call Flow Examples
◾IMS Access Using Vowifi
◾IMS Flow Using Vowifi
◾Vowifi User Plane and Control Plane
VoWiFi Procedure Descriptions
◾Authentication and Authorization procedure
◾3GPP AAA Server Detailed Behaviour
◾3GPP AAA Proxy Detailed Behaviour
◾SWa HSS/AAA Initiated Detach
◾SWa Re-Authentication and Re-Authorization Procedure
◾Commands for SWa authentication and authorization procedures
◾Diameter-EAP-Request (DER) Command
◾Diameter-EAP-Answer (DEA) Command
◾Commands for SWa HSS/AAA Initiated Detach
◾Commands for Untrusted non-3GPP Access network Initiated Session Termination
◾Commands for SWa Re-Authentication and Re-Authorization Procedures
◾STa Access Authentication and Authorization
◾HSS/AAA Initiated Detach on STa
◾STa Re-Authorization and Re-Authentication Procedures
Non-3GPP Access Network Initiated Session Termination
◾Commands for STa HSS/AAA Initiated Detach for Trusted non-3GPP Access
◾Commands for Re-Authentication and Re-Authorization Procedure
◾Commands for Trusted non-3GPP Access network Initiated Session Termination
◾AN-Trusted
◾Session Handling
Untrusted non-3GPP Access / ePDG related procedures
◾Commands used in connection with the STa interface
◾Commands used in connection with the SWm interface
◾Commands used in connection with the S6b interface
◾Authentication and Authorization Procedures
ePDG Architecture
◾ePDG Detailed Behavior
◾ePDG Initiated Session Termination Procedures
◾3GPP AAA Server Initiated Session Termination Procedures
◾Authorization Information Update Procedures
◾Commands for SWm Authentication and Authorization Procedures
◾Commands for ePDG Initiated Session Termination
◾Commands for Authorization Information Update
SWx Description
◾Authentication Procedure
◾Location Management Procedures
◾HSS Initiated Update of User Profile
◾S6b and H2 Description
◾Authentication and Authorization Procedures when using DSMIPv6
◾Authorization Procedures when using PMIPv6 or GTPv2
◾PDN GW Initiated Session Termination Procedures
◾3GPP AAA Initiated Session Termination Procedures
◾Service Authorization Information Update Procedures
◾Authorization Procedures when using MIPv4 FACoA
◾Commands for S6b DSMIPv6 Authorization Procedures
◾S6b DSMIPv6 procedures
◾S6b PMIPv6 or GTPv2 procedures
◾S6b Re-used Diameter AVPs
◾SWx interface
Whether you are looking for general information or have a specific question, we want to help!
Request More Information