• Table des matières White paper Telic

    TABLE DES MATIÈRES – White paper Telic

    1. Téléphonie les «basics» 

    1.1. La téléphonie analogique …………………………………………………………………………………………………………….6

    1.1.1. Les lignes analogiques publiques……………………………………………………………………………………….6

    1.1.2. Les lignes analogiques internes………………………………………………………………………………………….6

    1.1.3. Dual-Tone Multi-Frequency (DTMF)…………………………………………………………………………………….7

    1.1.4. Groupe à hautes fréquences / Groupe à basses fréquences……………………………………………….7

    1.2. Integrated Services Digital Network (ISDN / RNIS) ……………………………………………………………………….7

    1.2.1. Basic Access (BA)……………………………………………………………………………………………………………7

    1.2.2. Primary Rate Access (PRA)……………………………………………………………………………………………….8

    1.3. Les lignes digitales………………………………………………………………………………………………………………………8

    1.4. Voice over IP (VoIP)………………………………………………………………………………………………………………………8

    1.4.1. Bande Passante……………………………………………………………………………………………………………..9

    1.4.2. Quality of Service (QoS)……………………………………………………………………………………………………9

    1.4.3. Niveaux de performances……………………………………………………………………………………………10

    1.4.4. Classe de Service………………………………………………………………………………………………………11

    1.4.5. Power over Ethernet (PoE & PoE+) ………………………………………………………………………………….12

    1.4.6. Virtual Local Area Network (VLAN)……………………………………………………………………………………12

    1.4.7. Infrastructure VLAN……………………………………………………………………………………………………12

    1.4.8. Compression et codecs………………………………………………………………………………………………….13

    1.4.9. VOIP-SIP.OPRG Codec and Bit Rate…………………………………………………………………………….14

    1.5. Session Initiation Protocol (SIP) …………………………………………………………………………………………………15

    1.5.1. L’architecture SIP et ses composants ………………………………………………………………………………15

    1.5.2. Mécanisme d’un appel SIP……………………………………………………………………………………………..16

    1.5.3. Un appel SIP…………………………………………………………………………………………………………….16

    1.5.4. Signalisation et flux des communications…………………………………………………………………………..18

    1.5.5. SIP providers………………………………………………………………………………………………………………..18

    1.5.6. SIP trunk ……………………………………………………………………………………………………………………..19

    1.5.7. Session Border Controller (SBC)………………………………………………………………………………………20

    1.5.8. Pourquoi un SBC est-il nécessaire ?…………………………………………………………………………………20

    1.5.9. Où placer le SBC ?……………………………………………………………………………………………………22

    1.6. Mobilité……………………………………………………………………………………………………………………………………..23

    1.6.1. Digital Enhanced Cordless Telecommunications (Dect)…………………………………………………………24

    1.6.2. IP Dect…………………………………………………………………………………………………………………………24

    1.6.3. Voice over WiFi (VoWiFi)………………………………………………………………………………………………….25

    COMMUNICATIONS UNIFIÉES 

    2. Communications Unifiées (UC) 

    2.1. Média et services………………………………………………………………………………………………………………………. 28

    2.1.1. Audio………………………………………………………………………………………………………………………….. 28

    2.1.2. Frequency response………………………………………………………………………………………………….. 28

    2.1.3. Vidéo………………………………………………………………………………………………………………………….. 29

    2.1.4. Chat…………………………………………………………………………………………………………………………… 29

    2.1.5. One Number et Rapid Session Shift…………………………………………………………………………………. 30

    2.1.6. Ad hoc Conferencing…………………………………………………………………………………………………….. 30

    2.1.7. Reserved Conferencing………………………………………………………………………………………………….. 30

    2.1.8. Communication muti-device ininterrompue……………………………………………………………………. 30

    2.1.9. Web Real-Time Communication (WebRTC)……………………………………………………………………….. 30

    3. Cloud 32

    3.1. Les Communications Unifiées en mode Private Cloud ……………………………………………………………….. 32

    3.1.1. Les principales raisons pour adopter le Cloud……………………………………………………………….. 32

    3.1.2. Caractéristiques du Private Cloud……………………………………………………………………………………. 33

    3.2. Cloud privé et public…………………………………………………………………………………………………………………. 33

    3.2.1. Internet Protocol – Virtual Private Network (IP-VPN)…………………………………………………………….. 33

    3.2.2. Connexion au data center………………………………………………………………………………………………. 34

    3.2.3. Multi-Protocol Label Switching (MPLS)……………………………………………………………………………… 34

    3.2.4. Very High Bit Rate Digital Subscriber Line (VDSL)……………………………………………………………….. 34

    3.2.5. Backbone opérateur MPLS………………………………………………………………………………………… 34

    3.3. Data Center………………………………………………………………………………………………………………………………. 35

    3.3.1. Duplication avancée à distance dans un environnement serveur Mission critical IA………………. 36

    3.3.2. Installation d’un contrôleur de stockage……………………………………………………………………. 37

    3.3.3. RAID……………………………………………………………………………………………………………………….. 38

    3.3.4. Disk Drive Patrol……………………………………………………………………………………………………….. 38

    3.3.5. Sécurisation des données Caches……………………………………………………………………………….. 39

    3.4. Virtualisation…………………………………………………………………………………………………………………………….. 42

    3.4.1. High Availability (HA)……………………………………………………………………………………………………… 42

    3.4.2. Clustering……………………………………………………………………………………………………………………. 42

    3.4.3. Network Interface Cards / Cartes d’Interface Réseau ( NIC Teaming )………………………………… 42

    3.4.4. Aperçu des possibilités de VMware®………………………………………………………………………… 43

    3.5. Firewall / Pare-feu…………………………………………………………………………………………………………………….. 44

    3.5.1. Domaines Virtuels (VDOM)………………………………………………………………………………………….. 44

    3.5.2. Pare-feu virtualisé……………………………………………………………………………………………………… 45

    3.5.3. Virtual Clustering………………………………………………………………………………………………………. 45

    3.5.4. SBC et Pare-feu……………………………………………………………………………………………………….. 46

    4. PRÉSENTATION DES PARTENAIRES

    Download your copy of the white paper now !Banner_Quant_ICT_datanews

    Tweet about this on TwitterShare on LinkedInShare on Google+Share on Facebook