Multimedia Telephony (MMTel) 10B Training Programs. Catalog of Course Descriptions

Similar documents
IMS 11A Core and IMS Nodes Training Programs. Catalog of Course Descriptions

Catalog of Course Descriptions

IMS 16 System & Products Training Programs. Catalog of Course Descriptions

IMS 15 System & Products Training Programs. Catalog of Course Descriptions

Catalog of Course Descriptions

Business Communication Suite (BCS) 3.0 Training Programs. Catalog of Course Descriptions

UDC 13B Training Programs. Catalog of Course Descriptions

vims System and Products Training Programs Catalog of Course Descriptions

BCS 2.1 Training Programs. Portfolio Presentation

IMS Core 10B and IMS Nodes Training Programs. Portfolio Presentation

User Data Consolidation (UDC) 15 Training Programs. Catalog of Course Descriptions

Mobile Centrex (MCX) 1.0 Training Programs. Catalog of Course Descriptions

vims System and Products Training Programs Catalog of Course Descriptions

Telephony Server Platform (TSP) 5 Training Programs. Catalog of Course Descriptions

User Data Consolidation (UDC) 16 Training Programs. Catalog of Course Descriptions

User Data Consolidation (UDC) 16 Training Programs. Catalog of Course Descriptions

Ericsson Multi Activation 6.0 Training Programs. Catalog of Course Descriptions

IMS 14 PSTN to IP. training programs

IMS 14 system & products. training programs

Ericsson Multi Activation (EMA) 15 Training Programs. Catalog of Course Descriptions

Ims 15 PSTN to IP. training programs

IMS 15 Business Communication. training programs

IMS 17 and vims1 Mobile Telephony Evolution with VoLTE. training programs

IMS 15 Mobile Telephony Evolution with volte. training programs

IMS 16 Mobile Telephony Evolution with volte. training programs

Ericsson Composition Engine (ECE) 17 Training Programs. Catalog of Course Descriptions

IMS 14 VISUAL communication. training programs

IMS 17 and vims 1 system & products. training programs

ECE 2.01 Training Programs. Catalog of Course Descriptions

ERICSSON USER DATA CONSOLIDATION (UDC) 12A

IMS 16 system & products. training programs

IMS 17 and vims1 enriched Communication. training programs

USER MANAGEMENT Training Programs. Package Presentation

Messaging in One (MiO) 3.0 Training Programs. Catalog of Course Descriptions

Security Gateway (SEG) 5 Training Programs. Catalog of Course Descriptions

Diameter Signaling Controller (DSC) Training Programs. Catalog of Course Descriptions

Wi-Fi Mobility Gateway (WMG) 1 Training Programs. Catalog of Course Descriptions

Ericsson Multi Activation (EMA) 16 Training Programs. Catalog of Course Descriptions

Charging System (CS) 18 Training Programs. Catalog of Course Descriptions

Mobile Positioning System (MPS) Training Programs. Catalog of Course Descriptions

Charging System (CS) 18 Training Programs. Catalog of Course Descriptions

Optical Networks Training Programs. Catalog of Course Descriptions

Mobile Positioning System (MPS) 16 Training Programs. Catalog of Course Descriptions

Timmins Training Consulting

Ericsson Network Manager (ENM) 17 Training Programs. Catalog of Course Descriptions

IP Broadband Network Management R12 Training Programs. Catalog of Course Descriptions

Optical Network 2011 Training Programs. Catalog of Course Descriptions

Ericsson Adaptive Inventory (EAI) 18 Training Programs. Catalog of Course Descriptions

Messaging in One (MiO) 1.0 Training Programs. Catalog of Course Descriptions

Ericsson Adaptive Inventory Training Programs. Catalog of Course Descriptions

Ericsson Mobile Positioning System (MPS) 11 Training Programs. Catalog of Course Descriptions

IP Broadband Network Management 2016 Training Programs. Catalog of Course Descriptions

MED: Voice over IP systems

Packet Core 2011 Training Programs. Catalog of Course Descriptions

RAN Transmision (RANT) T14A Training Programs. Catalog of Course Descriptions

OSS-RC 13B System Administration ( 5 Days)

8.4 IMS Network Architecture A Closer Look

Packet Core 2009 Training Programs. Catalog of Course Descriptions

IP Broadband Network Management 2018 Training Programs. Catalog of Course Descriptions

Troubleshooting Voice Over IP with WireShark

Router 6000 R17 Training Programs. Catalog of Course Descriptions


Overview and Status of NGN Standardization Activities. Naotaka Morita Vice Chairman of SG13, ITU-T NTT Service Integration Laboratories

Ericsson Network Manager (ENM) 18 Training Programs. Catalog of Course Descriptions

Network Operation Competence Development Solution Training Catalog

Cloud System 2016 Training Programs. Catalog of Course Descriptions

(A212) Communication Application Server (AS) Standalone Overview

Multi Mediation 18 Training Programs. Catalog of Course Descriptions

TSIN02 - Internetworking

Packet Core Network 2018 Training Programs. Catalog of Course Descriptions

Cloud Systems 2018 Training Programs. Catalog of Course Descriptions

Charging System (CS) 5.3 Training Programs. Catalog of Course Descriptions

OSS-RC 12 Training Programs. Catalog of Course Descriptions

VoIP Core Technologies. Aarti Iyengar Apricot 2004

VoIP Basics. 2005, NETSETRA Corporation Ltd. All rights reserved.

IP Multimedia Subsystem Application Servers

Package Presentation OSS-RC 6 Training Programs. Ericsson AB

Mobile Softswitch Solution (MSS) R6.0

LTE RBS6000 & OSS Field Maintenance

What is NGN? Hamid R. Rabiee Mostafa Salehi, Fatemeh Dabiran, Hoda Ayatollahi Spring 2011

Packet Core 2010 Training Programs. Catalog of Course Descriptions

Mobile Softswitch Solution (MSS) R6.1 Training Programs. Catalog of Course Descriptions

ERICSSON WALLET PLATFORM (EWP) 3.1 TRAINING PROGRAMS

Microwave Networks R13 Training Programs. Catalog of Course Descriptions

Status of IMS-Based Next Generation Networks for Fixed Mobile Convergence

IMS: Lessons Learned. Brough Turner SVP & CTO

Ericsson GSM-N Ucore4 Training Programs Catalog of Course Descriptions

Ericsson view of Convergence

Mobile Softswitch Solution (MSS) 16A Learning Services

Mobile Softswitch Solution (MSS) 14B Learning Services

Chapter 3: IP Multimedia Subsystems and Application-Level Signaling

Training Catalogue PDC Year 2000

IP Generic Training Programs. Catalog of Course Descriptions

Enterprise Voice and Online Services with Microsoft Lync Server 2013

Voice Over LTE (VoLTE) - A Core Perspective Comprehensive hands-on workshop

Session Initiation Protocol (SIP)

Key technologies in IMS YUAN ZHANG. China telecom Beijing Research Institute

Multi-Service Access and Next Generation Voice Service

Deploying, Configuring, and Administering Microsoft Lync Server 2010 (MS 10533A)

IP Multimedia Subsystem(IMS) and Its Applications

Transcription:

Multimedia Telephony (MMTel) 10B Training Programs Catalog of Course Descriptions

Page 2 Catalog of Course Descriptions INTRODUCTION...4 IMS IN A NUTSHELL...5 IMS FROM A BUSINESS PERSPECTIVE...7 IMS 10B OVERVIEW...9 IMS SIGNALING...11 MMTEL AND LTE SEMINAR...15 MMTEL 3.0 PROVISIONING...17 SBG 3.1 OPERATION AND CONFIGURATION FOR IMS...19 IS MGW 2.0 OPERATION AND CONFIGURATION FOR IMS...23 IS MGC 6.1 OPERATION AND CONFIGURATION...27 IMS 10B PSTN GATEWAY OPERATION AND CONFIGURATION...31 IPWORKS 7.0 OPERATION AND MAINTENANCE FOR IMS...35 UDC R1 OVERVIEW...37 CUDB 1.0 OPERATION AND SERVICE CONFIGURATION...41 CSCF 5.0 HSS/SLF 5.0 OPERATION AND CONFIGURATION...45 PGM 4.1 OPERATION & CONFIGURATION...49 Commercial in Confidence 2 2010

Page 3 MTAS 3.1 OPERATION AND CONFIGURATION...51 IMS SERVICE DEVELOPMENT STUDIO (SDS) 4.1 APPLICATION DEVELOPMENT..55 IMS OPERATION AND MAINTENANCE ADVANCED...59 Commercial in Confidence 3 2010

Introduction Ericsson has developed a comprehensive Training Programs service to satisfy the competence needs of our customers, from exploring new business opportunities to expertise required for operating a network. The Training Programs service is delineated into packages that have been developed to offer clearly defined, yet flexible training to target system and technology areas. Each package is divided into flows, to target specific functional areas within your organization for optimal benefits. Learning service delivery is supported by the following methods: Icon Delivery Method Instructor Led Training (ILT) Web Based Learning/eLearning (WBL) Structured Knowledge Transfer (SKT) Seminar (SEM) Workshop (WS) Virtual Classroom Training (VCT) Delivery Enablers Remote Training Lab (RTL)

IMS in a Nutshell LZU 1087775 R1A Description Do you want to learn more about IP Multimedia Subsystem (IMS)? This web-based course is an introduction to Ericsson IMS. It provides an overview of the IP Multimedia Subsystem (IMS) and the Ericsson solutions based on IMS Core. The IMS architecture is briefly described. Learning objectives On completion of this course the participants will be able to: 1 Explain the purpose and benefits of IMS 2 Describe the IMS architecture briefly 3 List the Ericsson IMS offerings Target audience The target audience for this course is: Fundamentals Prerequisites Students should have a good general knowledge of telecommunications. Duration and class size The length of the course is 1 hours. Learning situation This a web-based interactive training course with multimedia content.

Page 6 Intentionally Blank Commercial in Confidence 6 2010

IMS from A Business Perspective LZU108 2077 R1A Description For many, IMS is the future. It will provide revenue enhancing services and open up new channels in a convergent environment. For some more, IMS represents a standardized base on which to build for future. How will money be generated with IMS? Are their alternatives and what s the best way forward? IMS from business perspective aims to provide a business overview to give you answers you need to make your decisions about one of the most important technological innovations in the telecom industry. By understanding the market needs and taking own business goals in mind, it will be possible to find the best way forward. Ericsson s global presence allows us to provide business perspective based on global understanding. As one of the leaders in this field, Ericsson has technical and market knowledge to provide the best. Learning objectives On completion of this course the participants will be able to apply the knowledge to own situation and provide guidance for own IMS strategy. 1 Understand the market evolution behind the move towards IMS List the main business and technology drivers Give examples of Converging solutions Provide an overview of the IMS Technology and innovative IMS services Explain operator and end-user benefits of IMS based multimedia services 2. List common enablers in IMS networks List operator & end-user benefits of IMS based multimedia services Present an overview of types of services available Give examples of services using IMS-unique properties 3. Explain the roles in an economic eco-system Describe IMS business ecosystem Define the various B2B relationships in the eco-system Discuss IMS support for development and evolution of new services 4. Describe best practices for service launch for maximizing IMS service uptake Build services packages for different segments Discuss pricing schemes Suggest suitable promotions for each segment 5. List key elements influencing the profitability of the IMS networks Describe different IMS Business case scenarios List some IMS success stories

Page 8 Target audience The target audience for this course is: Business Developers This audience has responsibility of defining, recommending or implementing the operator strategy specifically within the multimedia domain Prerequisites The participants should be familiar with basic telecommunications business and the evolution towards multimedia services. A successful completion of Telecom Operator 2.0; Business Challenges & Opportunities (LZU 108 6935) will provide the neccesary understanding. Duration and class size The length of the course is 6 hours and the maximum number of participants is 16 Learning situation This course is based on theoretical instructor-led lessons given in a classroom environment Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Topics in the course Estimated time 1 Business & Technological drivers 45 minutes IMS Services 45 minutes IMS Eco System 45 Minutes Successful launch of IMS services 45 Minutes Building IMS Business Case & Wrap-up 90 Minutes Commercial in Confidence 8 2010

IMS 10B Overview Description LZU 108 8143 R1A Do you want to know how operators and end users can benefit from IMS and what the different Ericsson IMS solutions are; then this is a course for you. The course provides an overview of the IP Multimedia Subsystem (IMS) and the Ericsson solutions for IMS based on the system products IMS Core and MMTel. End user benefits and what IMS services an operator can offer are explained. The features, nodes & signalling aspects are described for the IMS offerings related to IMS Core and MMTel. Learning objectives On completion of this course the participants will be able to: 1 Explain why there is a need for IMS 1.1 Describe the IMS system in overview the services and capabilities IMS provides. 1.2 List which standardization bodies define IMS and IMS related services 1.3 Explain what is meant by the IMS eco system 1.4 Present operator and end-user benefits of IMS. 2 Outline the Ericsson IMS Offerings 2.1 Explain the IMS offerings in the areas of Voice, Video, Presence, Messaging and Business communication in overview 3 Describe the architecture of the Ericsson System Products 3.1 List the main features of IMS Core and MMTel 3.2 Name and explain the functional nodes in IMS Core and MMTel 3.3 Explain how MMTel interworks with PSTN and other VoIP networks 3.4 Identify the signaling and media protocols used in the system products and describe where they are used 3.5 Recognize the platforms used for the System Products 4 Present typical IMS end-to-end session set-ups 4.1 Get a basic understanding of SIP 4.2 Illustrate the SIP & Diameter signalling sequence for Registration. 4.3 Explain the SIP signalling sequence for an IMS to IMS session. 4.4 Present the SIP signalling sequence for an IMS to PSTN session Target audience The target audience for this course is: Fundamentals Prerequisites Students should have a good general knowledge of telecommunications. 9

Duration and class size The length of the course is 1 day (6 hours) and the maximum number of participants is 16. Learning situation This course is based on theoretical instructor-led lessons given in a classroom environment. Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Topics in the course Estimated time 1 Introduction to IMS 1 hour Ericsson IMS Solutions 2 hours Ericsson IMS System Products 2 hours IMS end-to-end session set-up 1 hour Commercial in Confidence 10 2010

IMS Signaling LZU 108 7193 R2A Description This course provides a detailed introduction to signalling in the IMS by presenting the protocols involved and different traffic cases from the IMS/MMTel system (optionally PTT). The following protocols are described with reference to the Ericsson IMS solutions and to the relevant IETF and 3GPP specifications: SIP protocol and the most important IMS related extensions to SIP; SDP (Session Description Protoco)l; Diameter protocol and IMS related Diameter applications; H248/MeGaCo. In addition, other related protocols, such as MSCML, TBCP, DNS & RTP will be described. Actual signalling traces are used where possible to show the practical aspects of signalling in an IMS network. Learning objectives On completion of this course the participants will be able to: 1 Describe the architecture of IMS; the functions of the main logical nodes in the IMS System; the main IMS specifications and protocols. 1.1 Describe the roles of IETF, 3GPP, TISPAN & OMA in IMS. 1.2 Describe the main 3GPP specifications and IETF RFCs relating to IMS. 1.3 Describe the concepts related to mobile and fixed access to IMS. 1.4 Describe the main protocols, signalling flows and node functions for typical IMS Sessions, including Registration, IMS/MMTel to IMS/MMTel Sessions; IMS/MMTel to GSTN sessions and Push To Talk sessions. 2 Understand and describe the structure, specifications and usage of Session Initiation Protocol (SIP). 2.1 Describe what SIP is and the reasons why SIP is required in IMS. 2.2 List and describe the main RFCs related to SIP and SDP. 2.3 Explain the basic functions and capabilities of SIP and SDP. 2.4 Describe the function of SIP Components, SIP Proxies and SIP User Agents (UAC, UAS). 2.5 Explain stateful and stateless SIP Proxies. 2.6 Describe the specifications, functions and usage of the SIP Methods and SIP Responses, including: The use of the REGISTER Method. The use of the INVITE, BYE, CANCEL, ACK, Methods in Session Establishment. The functions and use of the SIP OPTIONS Method. The use of SUBSCRIBE, NOTIFY & SUBSCRIBE Methods with reference to the Presence Service in IMS. 11

The use of the SIP INFO, UPDATE & REFER Methods in session establishment and mid-session signalling. The use of the MESSAGE Method for instant messaging. The PRACK Method (incl. RSeq & Rack) and its usage in IMS. 2.7 Explain SIP Transactions and Dialogs. 2.8 Explain Telephone numbers, SIP-URIs, Tel-URLs for addressing end-users. 2.9 Explain the routing and addressing principles of SIP messages and the function of the SIP routing header fields (Request URI, Via, Route, Record-Route, Contact and others). 2.10 Describe the function and uses of the more common SIP header fields used in IMS and their related RFCs. 2.11 Describe the Registration process, including Authentication. 2.12 Describe SIP to SIP and SIP to ISUP Session establishment. 2.13 Describe SIP/ISUP interworking including specifications, and the function and use of Number Normalization, ENUM and External Network Selection (Breakout BGCF). 2.14 Explain SIP forking. 3 Understand and describe the structure, specifications and usage of Session Description Protocol (SDP) in IMS. 3.1 Explain the function of SDP and the offer / answer model for SDP in IMS. 3.2 Describe the structure of SDP and the function of the SDP fields with reference to the associated RFCs. 3.3 Describe the use of SDP in SIP and MeGaCo signalling sequences. 4 Describe the use of RTP/RTCP in IMS 4.1 List the rfc standards associated with RTP & RTCP. 4.2 Describe the function and content of the RTP header fields, including payload types for speech, video and DTMF (rfc2833). 4.3 Describe RTCP functions and messages. 5 Describe the function of DNS in IMS. 5.1 Describe when DNS is used in IMS signalling flows. 5.2 Describe the location of SIP servers using DNS. 5.3 Describe the purpose and structure of NAPTR, SRV and A-Record queries. 5.4 Describe the function and purpose of the ENUM function. 6 Understand and describe the structure, specifications and usage of the Diameter Protocol in IMS 6.1 Describe the base functions and capabilities of Diameter and the associated RFCs. 6.2 Describe the routing principles of Diameter in IMS. 6.3 Describe the structure of Commands. 6.4 Describe the structure, types and format of AVPs. 6.5 Describe the main Diameter base protocol messages and AVPs. 6.6 Describe Vendor specific Commands & AVPs 6.7 Describe the services provided by the Cx/Dx, Zx, Sh/Dh and Rf interfaces in IMS. 6.8 Describe the main IMS Diameter messages and AVPs associated with the Cx/Dx, Zx, Sh/Dh and Rf interfaces in IMS. 6.9 Analyze typical Diameter signalling flows and Message content for Registration (Cx/Dx and Sh/Dh), Session Establishment and Charging (Rf). Commercial in Confidence 12 2010

7 Understand and describe the structure, specifications and usage of H248 (MeGaCo) 7.1 Describe the main function and usage of H248 in IMS and the main RFCs. 7.2 Describe the H248 Context Model. 7.3 Describe the H248 Commands, Descriptors and Parameters and their use in IMS. 7.4 Describe Packages and Profiles. 7.5 Describe typical H248 signalling sequences in IMS and their relationship with SIP and ISUP signalling. 8 Explain in detail, a range of IMS signalling flows (including SIP, SDP, Diameter, H248, DNS protocols), including the function and use of the more common SIP header fields and Diameter AVPs. 8.1 Describe the Registration signalling flow, including HTTP Digest, SSO & AKA Authentication. 8.2 Describe session establishment flows for SIP to SIP, SIP to PSTN and PSTN to SIP calls. 8.3 Describe Presence signalling flows and the use of the Subscribe, Notify & Publish Methods. 8.4 Describe signalling flows for a range of call scenarios, such as: Call to unregistered user Call to user with Call Forwarding service active Call to user registered at several locations. Sequences using the OPTIONS, INFO and REFER methods. 9 Analyze detailed WireShark protocol analyzer traces for a range of IMS signalling scenarios. 9.1 Use the basic features of WireShark to capture; display; filter and analyze signalling flows. 10 Describe the IMS architecture and signalling flows for typical PTT sessions (Optional) 10.1 Describe the PTT services and the mobile IMS architecture. 10.2 Describe the signalling sequences for a typical PTT session. 10.3 Analyze detailed Signalling Trace Analysis for a range of SIP & PTT session scenarios. Target audience The target audience for this course is: System Technicians, Service Technicians, System Engineers, Service Engineers. Prerequisites The students should have attended IMS Overview LZU 108 7721 (or LZU 108 7192 ) In addition the students should have a good basic understanding of general datacom and telecoms networks and good knowledge of IP networking and the TCP/IP protocol family. Duration and class size The length of the course is 24 hours (4 days) and the maximum number of participants is 16 Commercial in Confidence 13 2010

Learning situation This course is based on theoretical instructor-led lessons and theoretical exercises based on WireShark traces. Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Topics in the course Estimated time 1 IMS Revision & Standards. 1.5 hours SIP Theory 3 hours Exercise: Registration trace 1.5 hours 2 SIP Theory part 2 and SDP 3 hours Diameter Theory 1.5 hours DNS & RTP Theory 0.5 hours Exercise: Analysis of IMS Signalling trace: SIP Message Routing 1 hour 3 Exercise: Analysis of IMS signalling trace: IMS user to IMS user Session Establishment 1 hours H248/Megaco Theory 1.5 hours IMS to GSTN Breakout Theory & GSTN to IMS sessions 1 hour Exercise: Analysis of IMS Signalling Traces: SIP to GSTN 2.5 hours Breakout & GSTN to SIP sessions 4 Theory: IMS Signalling flows for a range of scenarios 2 hours Exercises: Analysis of IMS Signalling traces for a range of 3.5 hours scenarios Summary & Close 0.5 hour Commercial in Confidence 14 2010

MMTel and LTE Seminar Description LZU 108 7966 R1A Do you want to know how telephony services will be provided for LTE using the 3GPP standard MMTel? Then this seminar is something for you. The seminar provides an overview of the MMTel and LTE/EPC interworking. It describes how the MMTel services are transported using EPC and LTE to a mobile client. The QoS mechanism, media transport and Signaling for different traffic cases will be described. Learning objectives On completion of this course the participants will be able to: 1 Explain why MMTel and EPC should be used to provide Telephony services over IP for Mobile broadband Networks. 2 Describe the services provided by MMTel 3 Understand how MMTel is enabling Fixed Mobile Convergence (FMC) 4 Explain how QoS is assured in the EPC for the MMTel Services 5 List the nodes and their functions in the EPC and MMtel solutions. 6 Describe a basic MMTel Client to MMTel Client over LTE/EPC traffic case Target audience The target audience for this course is: Fundamentals Prerequisites Students should have a good general knowledge of telecommunications. Duration and class size The length of the course is 3 hours and the maximum number of participants is 16 (for ILT). Learning situation The seminar can be ILT or WBL (Rapid e-learning). 15

Intentionally Blank Commercial in Confidence 16 2010

MMTel 3.0 Provisioning Description LZU 108 7702 R1A Are you implementing Multimedia Telephony (MMTel) in your network? Are you facing the challenges of understanding how to add new subscribers and services to the network? This training will help you to gain a thorough understanding of the processes of provisioning subscribers and services in MMTel3.0. Services and subscribers will be provisioned using the CAI3G interface via Ericsson Multi Activation (EMA). Self Administration of services will also be described. Learning objectives On completion of this course the participants will be able to: 1 Perform provisioning of MMTel 3.0 subscribers and services via the EMA CAI3G interface. 1.1 Use an xml editor and xml templates to create xml bodies that are sent to EMA in CAI3G commands transported on the SOAP protocol to provision subscribers and services. 1.2 Follow the appropriate User Guides to add/modify subscribers and add/modify services for a subscriber. 2 Use self-administration via a web portal to add/modify services for a subscriber 3 Verify provisioned subscribers and services 3.1 Use the EMA Processing Log to check the provisioning processes. 3.2 Verify the provisioned data in the MMTel 3.0 nodes that should be provisioned (HSS, SLF, PGM, DNS/ENUM and MTAS). 3.3 Verify that it is possible to establish calls to the newly provisioned subscribers Target audience The target audience for this course is: System Engineer, Service Engineer. Prerequisites Successful completion of the following courses: IMS 5.0 Overview LZU 108 7721 Duration and class size The length of the course is 12 hours (2 days) and the maximum number of participants is 8. 17

Learning situation This training is based on theoretical and practical instructor-led sessions given in both classroom and in a technical environment using equipment and tools, which can be accessed remotely. Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Topics in the course Estimated time 1 Perform provisioning of subscribers and services using CAI3G 8 hours 2 Perform self administration of subscribers and services 2 hours Verify the provisioned users and services 2 hour Commercial in Confidence 18 2010

SBG 3.1 Operation and Configuration for IMS LZU 108 7968 R1A Description Concerned about security of your IMS network? Wanted to know what SBG can offer? Without SBG, your IMS network is vulnerable to attack from both internally and externally. This course will help you to understand the importance of SBG in IMS network from security point of view and supports for other features and functions. It will also cover operational aspect and configuration so that you can operate and configure Ericsson SBG 3.1 in your network. Learning objectives On completion of this course the participants will be able to: 1 Describe SBG Features and Functions 1.1 List SBG Interfaces and Protocols 1.2 List and Describe SBG Features and Functions 1.3 Describe the mapping of SBG functions to standard 1.4 Describe the position of SBG in various IMS solutions. 2 Describe SBG System Architecture 2.1 Describe the logical architecture of SBG 2.2 Describe the Hardware and Software implementation of SBG 3 Perform Surveillance activities (basic operation and maintenance) of SBG 3.1 Login and navigate the SBG element manager and the SBG CPI 3.2 Monitor the SBG Status and Interfaces 3.3 Monitor SBG Alarms and Events 3.4 Initiate and collect SBG logs 3.5 Perform SBG Backup 3.6 Initiate and collect SBG statistics 4 Describe network use cases with SBG 4.1 Describe signaling flow via SBG 4.2 Describe media flow via SBG 5 Describe the Installation process of SBG 5.1 Describe the SBG Installation process 5.2 Describe possible options for SBG installation 5.3 Describe the IS network configuration for SBG 6 Configure and verify the SBG Interworking interfaces 6.1 Configure and verify SBG interface towards access or foreign network 6.2 Configure and verify SBG interface towards core network 6.3 Configure and verify SBG e2 interface (Geographical Location) 6.4 Configure and verify SBG Rq interface (Admission Control) 6.5 Configure and verify SBG Rf interface (Charging) 6.6 Configure and verify SBG interface towards DNS 19

6.7 Configure and verify SBG signaling and media routing 6.8 Configure and verify SBG function specific parameters. 7 Describe and Configure SBG Features 7.1 Describe the handling of NAPTR failures as defined in RFC 3263 default procedure. 7.2 Describe and configure Hosted NAT traversal. 7.3 Describe and configure the User agent whitelist. 7.4 Describe how to display contact bindings for a specific user. 8 Describe and configure the SBG TISPAN P-CSCF functionality 8.1 Describe the new role which allows an A-SBG to act as a P-CSCF towards a core network. 8.2 Describe and configure the new SIP Mw-reference point. 8.3 Describe and configure the P-Charging-Vector generated for the P-CSCF. 8.4 Describe and configure the SBG P-CSCF handling of Via headers compared with the SBG in an A-ALG role. 8.5 Describe and configure the handling of Number portability parameters in the Req-URI. 8.6 Describe and configure the handling of Path headers in REGISTER requests. 8.7 Describe the handling of the P-Associated-Identity header. 8.8 Describe the default hard-coded topology hiding for P-CSCF role. 8.9 Describe and configure an E-CSCF as outgoing proxy for emergency calls using UDP and/or TCP as transport protocol. 8.10 Describe and configure enhanced geographical redundancy for E-CSCFs. 8.11 Describe the additional impacts on A-ALG due to the inclusion of TISPAN P-CSCF. 9 Perform root cause analysis of faults in SBG 9.1 Analyze and solve SBG alarms 9.2 Analyze and solve end to end signaling faults 10 Set up and analyze performance measurements for SBG 11 Describe how to configure a secure and redundant SBG 11.1 Describe the fallback option for Geographical redundancy of SBG Target audience The target audience for this course is: System Engineers, Service Engineers. This audience is responsible for operation and configuration of the SBG. Prerequisites Successful completion of the following courses: IMS 5.0 Overview LZU 108 7192 IMS Signaling LZU 108 7193 IS 2.0 Overview LZU 108 7085 IS 2.0 Operation and Configuration LZU 108 7086 Commercial in Confidence 20 2010

Duration and class size The length of the course is 18 hours (3 days) and the maximum number of participants is 8. Learning situation The course is based on the theoretical and practical instructor-led lessons given in a classroom environment with remote access to the SBG. Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Topics in the course Estimated time 1 Features and Functions 2 hours Architecture 1 hour Surveillance Activities 1.5 hours SBG Network use cases 1.5 hours 2 SBG Installation 1 hour SBG Configuration 3 hours P-CSCF Configuration 2 hours 3 Alarms and Events analysis 2 hour SBG measurement analysis 1 hour SBG Fault Finding 2 hours SBG Node Hardening 1 hour Commercial in Confidence 21 2010

Intentionally Blank Commercial in Confidence 22 2010

IS MGW 2.0 Operation and Configuration for IMS Note: This course is only delivered on demand Description LZU 108 7704 R1A Do you need competence in how to operate and configure the MGW for IMS? This course covers just that. It will provide the participants with the knowledge to perform Surveillance, Operation and Configuration activities on the MGW. It consists of theory and practical exercises on how to operate and configure the MGW on Ericsson Integrated Site (IS). This includes configuration towards IMS and TDM networks. Learning objectives On completion of this course the participants will be able to: 1 Describe the IS MGW with its Features and Functions 1.1 Name the IS MGW Interfaces and Protocols 1.2 Understand the position of IS MGW in various network solutions 2 Explain the IS MGW System Architecture 2.1 Present the logical architecture of IS MGW 2.2 Describe the Hardware and Software implementation of IS MGW 3 Handle Surveillance activities on the IS MGW 3.1 Use the MGW element manager together with the node documentation 3.2 Monitor the IS MGW Status and Interfaces 3.3 Interpret IS MGW Alarms and Events 3.4 Initiate and fetch the IS MGW logs 3.5 Perform IS MGW Backup 3.6 Initiate and collect IS MGW statistics 4 Explain the IS MGW network use cases 4.1 Illustrate the control signaling and the media flows via the IS MGW 5 Understand the Installation process of IS MGW 5.1 Describe the possible options for IS MGW installation 6 Configure and verify the IS MGW and Interworking interfaces 6.1 Define an IS Virtual MGW 6.2 Configure and verify the IS MGW interface towards an IP network 6.3 Configure and verify the IS MGW interface towards a TDM network 6.4 Initiate Media Supervision 7 Perform root cause analysis of faults in the IS MGW 8 Understand how to configure a secure and redundant IS MGW 23

Target audience The target audience for this course is: System Engineer, Service Engineer, Service Technician, System Technician This audience is responsible for operation and configuration of the IS MGW. Prerequisites Successful completion of the following courses: IMS 5.0 Overview LZU 108 7721 IMS Signaling LZU 108 7193 IS 2.0 Overview LZU 108 7085 IS 2.0 Operation and Configuration LZU 108 7086 Duration and class size The length of the course is 12 hours and the maximum number of participants is 8. Learning situation The course is based on the theoretical and practical instructor-led lessons given in a classroom environment. Commercial in Confidence 24 2010

Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Topics in the course Estimated time 1 Features and Functions 2 hours Architecture 1 hour Surveillance Activities 2 hours MGW Network use cases 1 hour 2 MGW Installation 1 hour MGW Configuration 2 hours Alarms and Events analysis 1 hour MGW measurement analysis 1 hour MGW Node Hardening 1 hour Commercial in Confidence 25 2010

Intentionally Blank Commercial in Confidence 26 2010

IS MGC 6.1 Operation and Configuration Note: This course is only delivered on demand Description LZU 108 7705 R1A Do you need competence in how to operate and configure the MGC? This course covers just that. It will provide the participants with the knowledge to perform Surveillance, Operation and Configuration activities on the MGC. It consists of theory and practical exercises on how to operate and configure the MGC on Ericsson Integrated Site (IS). This includes configuration of signaling interfaces towards IP and TDM networks, number analysis and routing. Learning objectives On completion of this course the participants will be able to: 1 Describe the IS MGC with its Features and Functions 1.1 Name the IS MGC Interfaces and Protocols 1.2 List and Describe the IS MGC Features and Functions 1.3 Understand the position of IS MGC in various network solutions 2 Explain the IS MGC System Architecture 2.1 Present the logical architecture of IS MGC 2.2 Describe the Hardware and Software implementation 3 Handle Surveillance activities on the IS MGC 3.1 Use the MGC element manager together with the node documentation 3.2 Monitor the IS MGC Status and Interfaces 3.3 Interpret IS MGC Alarms and Events 3.4 Create and fetch the IS MGC logs 3.5 Perform IS MGC Backup 3.6 Initiate and collect IS MGC statistics 4 Explain the IS MGC network use cases 4.1 Illustrate the control signaling via the IS MGC for different network deployments 5 Understand the Installation process of the IS MGC 5.1 Describe the possible options for the IS MGC installation 27

6 Configure and verify the MGC Interworking interfaces 6.1 Configure the interface towards the Media Gateway (MGW) 6.2 Configure the signaling interface towards an IP network 6.3 Configure the interface towards a TDM network 6.4 Configure the Charging interface 6.5 Configure the interface towards DNS 6.6 Define the number analysis and routing tables 6.7 Establish an end-to-end call using the configured interfaces and data 7 Perform root cause analysis of fault in IS MGC 7.1 Analyze and solve IS MGC alarms 7.2 Trace and solve end to end signaling faults 8 Understand how to configure a secure and redundant IS MGC Target audience The target audience for this course is: System Engineer, Service Engineer, Service Technician and System Technician This audience is responsible for operation and configuration of the IS MGC. Prerequisites Successful completion of the following courses: IMS 5.0 Overview LZU 108 7721 IMS Signaling LZU 108 7193 IS 2.0 Overview LZU 108 7085 IS 2.0 Operation and Configuration LZU 108 7086 Commercial in Confidence 28 2010

Duration and class size The length of the course is 12 hours and the maximum number of participants is 8. Learning situation The course is based on the theoretical and practical instructor-led lessons given in a classroom environment. Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Topics in the course Estimated time 1 Features and Functions 2 hours Architecture 1 hour Surveillance Activities 2 hours MGC Network Use Cases 1 hour 2 MGC Installation 1 hour MGC Configuration 3 hours Alarms and Events Analysis 1 hour MGC Measurement Analysis 0,5 hours MGC Node Hardening 0,5 hours Commercial in Confidence 29 2010

Intentionally Blank 30

IMS 10B PSTN Gateway Operation and Configuration Description LZU 108 8144 R1A Do you need competence in how to operate and configure the IS PSTN GW? This course covers just that. It will provide the participants with the knowledge to perform Surveillance, Operation and Configuration activities on the PSTN GW when used in an IMS context. It consists of theory and practical exercises on how to operate and configure the PSTN GW on Ericsson Integrated Site (IS). This includes configuration of signaling interfaces towards IP and TDM networks, number analysis and routing. The PSTN GW consists of the MGC 6.1 and MGW 2.0 nodes which are interconnected via H.248. Learning objectives On completion of this course the participants will be able to: 1 Describe IMS 10B PSTN Gateway with its Features and Functions 1.1 Understand the position of the PSTN GW within the IMS 10B based solutions 1.2 Name the IS PSTN GW Interfaces and Protocols 1.3 List and Describe the MGC Features and Functions 1.4 Explain the terminology used in the PSTN GW 2 Describe PSTN GW System Architecture 2.1 Present the logical architecture of PSTN GW 2.2 Describe the Hardware and Software implementation 2.3 Explain the High Availability feature of the MGC 6.1 3 Handle Surveillance activities on the IS PSTN GW 3.1 Use the PSTN GW element manager together with the node documentation 3.2 Monitor the PSTN GW Status and Interfaces 3.3 Interpret PSTN GW Alarms and Events 3.4 Create and fetch the PSTN GW logs 3.5 Perform PSTN GW Backup 3.6 Initiate and collect PSTN GW statistics 4 Explain network use cases with PSTN GW 4.1 Illustrate the call flows for the break out and in scenarios via PSTN GW Commercial in Confidence 31 2010

5 Configure and verify PSTN GW Interworking interfaces 5.1 Configure the PSTN GW H.248 interface 5.2 Configure the PSTN GW interface (signaling and media) towards IMS core network 5.3 Configure the PSTN GW interface (signaling and media) towards PSTN network 5.4 Define PSTN GW number and routing analysis 5.5 Create the PSTN GW DNS and Charging interfaces 5.6 Establish an end-to-end call using the configured interfaces and data 6 Perform root cause analysis of faults in PSTN GW 6.1 Analyze and solve PSTN GW alarms 6.2 Trace and solve end to end signaling fault 7 Understand how to configure a secure and redundant PSTN GW Target audience The target audience for this course is: System Engineers and Service Engineers with responsiblity for operation and configuration of the PSTN GW. Prerequisites Successful completion of the following courses: IMS 10B Overview LZU 108 8143 IMS Signaling LZU 108 7193 IS 2.0 Overview LZU 108 7085 IS 2.0 Operation and Configuration LZU 108 7086 Duration and class size The length of the course is 24 hours (4 days) and the maximum number of participants is 8. Learning situation The course is based on the theoretical and practical instructor-led lessons given in a classroom environment. Commercial in Confidence 32 2010

Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Topics in the course Estimated time 1 PSTN GW Introduction and Architecture 3 hours PSTN GW Surveillance activities 2 hours Practical Exercises PSTN GW Network Use cases 1 hour Practical Exercises 2 PSTN GW Initial Node Configuration 4 hours Practical Exercises PSTN GW Configuration (Adding of E1) 2 hours Practical Exercises 3 TDM Side configuration (SS7/ISUP and TDM transport) 2 hours Practical Exercises SIGTRAN Configuration (SS7/ISUP and IP transport) 2 hours Practical Exercises Number Analysis and Call Routing 2 hours Practical Exercises 4 Root Cause Analysis of faults 3 hours PSTN GW Performance Management 1 hour PSTN GW Node Hardening 1 hour Summary 1 hour Commercial in Confidence 33 2010

Intentionally Blank Commercial in Confidence 34 2010

IPWorks 7.0 Operation and Maintenance for IMS LZU1087974 R1A Description Do you need to know how to configure IPWorks, do basic maintenance tasks, and learn some tips and tricks? IPWorks is an advanced product with several user interfaces, a layered architecture, and a combination of disk-based and memory-based databases. This course provides practical knowledge on the operation and maintenance of IPWorks. The course emphasizes the knowledge of configuring the DNS and ENUM (with Number Portability) services. The students are introduced to fault, node and performance management of the system. Furthermore, the course covers some security aspects of IPWorks. With the help of the manual provided in this course, and the guidance of the instructor, the attendees will be able to learn the most efficient ways of performing operation and maintenance procedures. Learning objectives On completion of this course the participants will be able to: 1 Understand the purpose of IPWorks and the services it provides 2 Explain the architecture of IPWorks 3 Recount IPWorks redundancy options 4 Describe IPWorks deployment scenarios 5 Work with IPWorks interfaces 6 Configure various parts of the system 6.1 Configure DNS server 6.2 Operate ENUM server 7 Execute fault management 7.1 Inspect alarms and work with the SNMP agents 7.2 Configure and view logs 8 Practice maintenance tasks 8.1 System backup and restore 8.2 Configure and view statistics reports 9 Handle User management Target audience The target audience for this course is: Service Deployment Engineer, Network Deployment Engineer, System Engineer, Service Engineer, System Administrator. 35

Prerequisites Successful completion of the following course: IMS 5.0 Overview LZU 108 7721 Fundamental knowledge of IP protocol suite and Linux OS Duration and class size The length of the course is 2 days (12 hours) and the maximum number of participants is 8. Learning situation This course is based on theoretical and practical instructor-led lessons given in both classroom and in technical environment using equipment and tools. Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Topics in the course Estimated time 1 IPWorks Features 1 hour System architecture 1 hour Deployment scenarios 1 hour User interfaces 1 hour Configuration Management 2 hours 2 Configuration Management 2 hours Fault management 1 hour Backup and restore 1 hour Performance Management 1 hour User Management 1 hour Commercial in Confidence 36 2010

UDC R1 Overview Description LZU 108 7432 R1A Do you want to know what User Data Consolidation (UDC) is? And how the subscribers databases can be smoothly combined into a central database? How this new Data architecture can provide easier launch of services, high availability and efficient capacity? This course is a must for those who want to know the new Data Layered Architecture, how these subscribers databases can be centralized, the new concepts and the advantages of the User Data Consolidation R1 Business Solution. Also take a look into the new components such as HLR/AUC-S, Centralized User Data Base (CUDB) and Provisioning Gateway (PG). Learning objectives On completion of this course the participants will be able to: 1 Understand the market trends and drivers for operators to optimize subscriber data handling and introduction of new services 1.1 Identify today s network and subscriber handling 1.2 Acknowledge the market situation and market background 1.3 Discuss the introduction of new services 2 Clarify the User Data Consolidation R1 Business Solution 2.1 Describe the new Data Layered Architecture (DLA) in the mobile networks 2.2 List the interfaces and protocols used in the UDC R1 2.3 Recognize the benefits of UDC R1 2.4 Discuss the new concepts related to the UDC solution 2.5 List the HLR/AuC Server node functions 2.6 Check the CUDB node functions 2.7 Illustrate the Provisioning Gateway functions 2.8 Signaling Distribution Function in UDC 2.9 View the CUDB deployment scenarios 3 Describe the HLR/AUC-Server node using the customer documentation 3.1 List the hardware used to implement the HLR/AUC-S function 3.2 Categorize the new O&M procedures in HLR/AUC-S node 3.3 State the different mml commands used in the HLR/AUC-S 3.4 Check the HLR/AUC-Server new interfaces and connections 3.5 Interpret the LDAP protocol in the UDC solution 3.6 Describe the HLR/AuC-S data model 3.7 Basic and optional features of HLR/AuC-S 37

4 Identify the CUDB node described in the system documentation 4.1 Briefly name the platform and software used in the CUDB nodes 4.2 Understand the main elements that compose the CUDB nodes 4.3 Recognize the CUDB database mechanisms 4.4 Express how the data redundancy is applied in the CUDB nodes 4.5 List the CUDB data model used in the UDC R1 solution 4.6 Basic and optional features of CUDB 5 State the Provisioning Gateway (PG) node in the UDC solution 5.1 List the hardware and software implementation of PG node 5.2 Describe the PG interaction with or without EMA 5.3 Recognize the data information tree in CUDB node 5.4 Understand how Individual provisioning, Massive requests, Schedule procedures are handle in UDC solution 5.5 Explain how LDAP protocol interacts during subscriber handling 6 View UDC R1.0 deployment scenarios 6.1 Demonstrate the UDC R1 by using basic cases 6.2 State location update procedures in UDC R1 6.3 Identify how a phone call to mobile subscriber procedures happens in UDC R1 6.4 Verify subscriber authentication procedures in UDC R1 Target audience The target audience for this course is: Service Planning Engineers, Service Design Engineers, Network Design Engineers, Network Deployment Engineers, Service Deployment Engineers, System Technicians, Service Technicians, System Engineers, Service Engineers, Field Technicians, System Administrators, Application Developers, Business Developers, Customer Care Administrators. Prerequisites The participants should be familiar with 2.5 G and 3G networks and service offerings. User Profile Capability, Linux, Java, TCP/IP, XML, LDAP and Generic Database Knowledge or successful completion of the following course: Service Layer Overview LZU 108 6610 R1A Duration and class size The length of the course is 2 days and the maximum number of participants is 16. Commercial in Confidence 38 2010

Learning situation This course is based on theoretical instructor-led lessons given in a classroom environment. Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Topics in the course Estimated time 1 Market and Business Situation UDC Solution Description HLR/AUC-Server node functionality 2 CUDB node description and scenarios deployment PG node function in UDC Solution Deployment Scenarios Final Test 0.5 h 3.0 h 2.5 h 3.0 h 1.5 h 1.0 h 0.5 h Commercial in Confidence 39 2010

Intentionally Blank Commercial in Confidence 40 2010

CUDB 1.0 Operation and Service Configuration Description LZU 108 7435 R1A Do you want to know more about the CUDB system 1.0? How to operate it? Do you know each component and functionality inside CUDB? This course will help you on all these and more. It will give you a very good knowledge to check, operate and configure many aspects in CUDB system and its components. Also, you will understand the O&M procedures of each part inside CUDB system. This course is part of the User Data Consolidation (UDC) R1 Business Solution training flow. Learning objectives On completion of this course the participants will be able to: 1 Present the CUDB system in the UDC R1 Solution based on customers documentation 1.1 Verify CUDB system function inside the UDC R1 Solution 1.2 Identify the CUDB system components 1.3 List all the platforms used by CUDB system and its components 1.4 Understand the database concepts used in the CUDB system 1.5 Check the features for CUDB 1.0 and nodes capacity 1.6 Clarify the CUDB interfaces for UDC R1 1.7 Detail the LDAP protocol procedures used in CUDB system/nodes 2 List the main generic database terms and concepts 2.1 Explain DS units and DS groups concepts 2.2 Examine the Directory Information Base (DIB) and Directory Information Tree (DIT) in the CUDB nodes 2.3 Understand cluster configuration for databases 2.4 Check redundancy and replication possibilities for databases 2.5 Discuss backup and restore procedures for databases 2.6 Understand in-memory database mechanism 3 Detail CUDB 1.0 node architecture and functionalities in UDC R1 3.1 Explain load balancers, switches, LDAP servers, partition functions and DS units tasks in the CUDB nodes 3.2 Review and detail data model used for UDC R1 3.3 Discuss redundancy and data replications implemented in CUDB 3.4 Understand the cluster configuration used for CUDB 1.0 3.5 Identify some deployment scenarios for CUDB nodes 3.6 Understand the most common provisioning flows such as adding new subscribers; provide subscriber-service data and others 41

4 List the most important operation activities in the CUDB 1.0 system 4.1 Learn how to access each component in CUDB system 4.2 View the most important alarms in each component 4.3 View the software management in the CUDB 1.0 system 4.4 Demonstrate backup and restore procedures for all configuration information and storage data 4.5 Understand how operation system backups are done in CUDB 1.0 4.6 Make backup and restore at CUDB system level 5 Obtain basic statistics and performance data for CUDB 1.0 system 5.1 Check statistics tools included in CUDB system 5.2 Extract statistics files per CUDB node 5.3 List performance metrics accordingly to the customer product information 6 Explore Provisioning Gateway functionality based on customer system documentation 6.1 View the PG node structure 6.2 Review PG hardware and software components 6.3 Check PG interfaces towards HLR/AUC-Servers and CUDB system nodes 6.4 Express common alarms in the PG node Target audience The target audience for this course is: Service Planning Engineers, Service Design Engineers, Network Design Engineers, Network Deployment Engineers, Service Deployment Engineers, System Technicians, Service Technicians, System Engineers, Service Engineers, Field Technicians, System Administrators, Customer Care Administrators. Prerequisites The participants should be familiar with Linux, IP Networks, XML, LDAP and Generic Database Knowledge and successful completion of the following course: UDC R1 Overview LZU 108 7432 R1A Commercial in Confidence 42 2010

Duration and class size The length of the course is 3 days and the maximum number of participants is 8. Learning situation This course is based on theoretical and practical instructor-led lessons given in both classroom and in a technical environment using equipment and tools, which are accessed remotely. Time schedule The time required always depends on the knowledge of the attending participants and the hours stated below can be used as estimate. Day Topics in the course Estimated time 1 Course Introduction & Pre-test Introduction Database introduction CUDB System 2 CUDB System (cont.) CUDB Operation Activities 3 CUDB Statistics Overview Provisioning Gateway Conclusion & Final Test 0.5 h 2.0 h 2.0 h 1.5 h 3.0 h 3.0 h 2.0 h 3.5 h 0.5 h Commercial in Confidence 43 2010

Intentionally Blank Commercial in Confidence 44 2010

CSCF 5.0 HSS/SLF 5.0 Operation and Configuration LZU 108 7709 R2A Description This course will provide the participants with the knowledge to perform Surveillance, Operation and Configuration activities on the IMS Core nodes: CSCF, HSS & SLF. Learning objectives On completion of this course the participants will be able to: 1 Describe CSCF, HSS, SLF node functions and interworking 1.1 Describe CSCF, HSS, SLF node functions 1.2 Explain nodes interworking, interfaces and protocols 1.3 Describe CSCF, HSS, SLF nodes architecture 1.4 Explain how CSCFs, HSS, SLF support basic session establishment procedures 1.5 Describe the difference between HSS Classic Deployment and HSS-FE Deployment. 2 Perform surveillance tasks on CSCF, HSS, SLF 2.1 Describe User Access 2.2 Navigate the Element Manager 2.3 Use the CPI Description documents to identify the function of CSCF, HSS, SLF parameters and to perform basic configuration checks of the CSCF, HSS, SLF nodes and interfaces 2.4 Perform system backups 2.5 Perform software checks 2.6 Perform CSCF, HSS, SLF nodes status checks 2.7 Schedule maintenance tasks 2.8 Explain the alarms connected to CSCF, HSS, SLF, view alarm lists, perform alarm searches and fetch relevant logs 3 Explain how to configure CSCF, HSS, SLF in a secure and redundant way 3.1 Explain HSS Redundancy Solutions 3.2 Explain SLF High Availability 3.3 Explain how node hardening is achieved for CSCF, HSS, SLF 3.4 Explain parameters in CSCF, HSS, SLF that are important for security 3.5 Explain the authentication methods available in CSCF/HSS 4 Configure and verify the CSCF, HSS, SLF components and interworking interfaces 4.1 Configure and verify the Cx/Dx interfaces between CSCF and HSS/SLF 4.2 Configure parameters for Digest and NBA authentication methods 4.3 Configure and verify the Rf/Ro interfaces between CSCF and a Charging Mediator 4.4 Configure and verify the Sh/Dh interface between AS and HSS/SLF 4.5 Configure and verify the interface between HSS-FE and CUDB 45

4.6 Configure and verify the interface between CSCF and DNS/ENUM 4.7 Configure and verify the CSCF SIP interfaces 4.8 Configure and verify Number Normalization tables in CSCF 4.9 Configure and verify the BGCF (External Network Selection) 4.10 Configure and verify Policy Control Parameters on CSCF and HSS 4.11 Configure and verify Service Profiles containing Triggers in HSS 4.12 Configure and verify Individual Service Profiles and Triggers in HSS 4.13 Configure Charging Profiles in CSCF and HSS 4.14 Configure and verify the Emergency Call Handling in E-CSCF 4.15 Configure and verify SLF Parameters 5 Perform root cause analysis of faults in the CSCF, HSS, SLF 5.1 Resolve CSCF, HSS, SLF related alarms 5.2 Relate IMS end-to-end session faults to faulty parameter settings in CSCF, HSS, SLF 5.3 Use session traces in order to localize and solve CSCF, HSS, SLF faults 5.4 Find and solve faults in HSS, SLF related to subscriber provisioning 6 Handle Performance management for CSCF, HSS, SLF 6.1 Explain how to monitor the performance of the CSCF, HSS, SLF 6.2 Configure and verify CSCF, HSS, SLF measurements Target audience System Engineers, Service Engineers. Prerequisites Successful completion of the following courses: IMS 5.0 Overview LZU 108 7721 IMS Signaling LZU 108 7193 TSP 6 Operation and Maintenance LZU 108 7341 Duration and class size The length of the course is 30 hours (5 days) and the maximum number of participants is 6. Learning situation This course is based on theoretical and practical instructor-led lessons given in both classroom and in a technical environment using equipment and tools, which are accessed remotely. Commercial in Confidence 46 2010