Monthly Archives: January 2015

authentication

Understanding SIP Authentication

SIP as both a protocol and an architecture has a number of places where security can be applied. You can secure SIP signaling with Transport Layer Security (TLS). This encrypts the metadata of a call – e.g. who called who. You can secure the media of a session with SRTP – audio, video, etc. Session […]

integration

Unified Communications and Me

Life comes with a few simple rules: Be kind to others. Live purposefully. Learn from your mistakes. Don’t buy a unified communications solution from a company that doesn’t deliver unified communications to its own employees. In my latest article for No Jitter, I explore how my company, Arrow Systems Integration, implements unified communications.  I tried […]

The godfather

It’s Not Social…It’s Business

Will you be ready for the next new thing?  Are you prepared to meet the expectations of the web-based consumer?  Do you have a social media strategy?  What are you doing with WebRTC?  Have you upgraded to SIP? In my latest article for No Jitter, I explore how social media and business have merged.  It’s […]

Dial-tone

Avaya Aura IMS Processing Once Again

Last week, I walked you through how Avaya implements IMS processing between Session Manager and Communication Manager.   Even though it may have looked fairly complicated and slightly convoluted, I actually did you a favor by greatly simplifying the call flow. The complete call flow is even worse. I also did myself a favor by presenting […]

photo-22

A traceSM view of Avaya Aura IMS Processing

It goes without saying that SIP is a protocol. After all, it is Session Initiation Protocol. It’s a series of request methods, responses, headers, and documented call flows. You send an INVITE and expect to receive a 100 Trying, 180 Ringing, and eventually a 200 OK. That’s the way I teach SIP and that is […]

Huh

Breaking Down Communications Jargon

Let’s face it. The communications industry is jargon filled to the point where we come off like a secret society. Our acronyms are the secret handshakes that either let you into the club or keep you out in the cold. In my latest article for No Jitter, I present a series of terms and concepts […]

MWI2

A Look at SIP-Based Voice Mail Part Two

Last week in my article A Look at How Avaya Aura Supports SIP-Based Voice Mail, I walked you through how a ringing call is redirected to a voice mail server. You saw the incoming INVITE, the 181 Call is Being Forwarded, and the subsequent INVITE to Modular Messaging. That’s all good stuff, but I left […]

Branch_Office

Rethinking the Survivable Branch Office

Since the early to mid-2000s, I have been consistent in how I designed a survivable branch office. My best-practices solution consisted of one or more gateways, a call processor, and some local trunks. During normal operations, the branch office relied on the enterprise’s main processor for all call processing activity and the remote processor would […]