SlideShare uma empresa Scribd logo
1 de 14
Baixar para ler offline
Lync 2013 - Sprachintegration
1
Agenda
 Lync2013– Sprachintegration
 Voice Investments
 IntertrunkRoute
 Numbermanipulation in SIP Trunk
 New Voice Feature
 Voice Mail Escape
 PSTN connection
2
Lync2013-Sprachintegration
 Mit Lynckommenviele IT-Firmenzumersten Mal mit der Welt der Telefonie in Berührung.Dabei stellt
sich fürIT-Firmenoftmals die Frage: Wiemuss Lync2013andas Telefonie-Netzwerkangeschlossen
werden undwas gilt es zubeachten? ErfahrenSie es indieser Session.
 Seit fünfeinhalbJahrenarbeite ichausschliesslich auf dem Produkt OCS/Lync.Indiesem
Bereich durfte erdie sehr spannende undaufregende Zeit seit dem Einstieg der Microsoft
indie Welt der Telefonie miterleben. Als Ausgleich zumIT-Alltagspielt er sehr gerne
Radball oder unternimmtAusflüge mit seiner Familie.
3
VoiceInvestments
4
• “Anywhere Access”
• IM andRich Presence
• Common voice
features
• Unified messaging
• Audioandvideo
conferencing
• Desktop integration
• Single Number reach
• Attendant Console
• Delegation/TeamCall
• Response Groups
• Session Initiation
Protocol (SIP) Trunking
• Dial-in audio
conferencing
• Higher definition video
• UCWorkflow activities
• Branch Resiliency (SBA)
• Datacenter Resiliency
• CallAdmission Control
• Callpark
• Topologychanges
• Mediabypass
• Enhanced 9-1-1 for North
America (NA)
• Routing changes
• Analog devices
• Common area phones
• Privateline
• Malicious CallTrace
(MCT)
• Larger deviceportfolio
• A/V for Mobileclients
• Intertrunk Route
• Number manipulation in
SIPTrunk
• Gateway M:N
• RTP latching
• Call forward History
• P-Asserted Identity
• 3pccRefer
• Voice MailEscape
• Responsegroup Manager
• CallPickup
• HybridVoice (Office 365)
• Room conferencing
Systems
“OCS
2007”
“OCS 2007
R2”
“Lync
2010”
“Lync
2013”
IntertrunkRoute
 IncomingPSTN calls can be routed
to a private branchexchange (PBX) phone
 Interconnectwith two ormore
IP-PBX systems
5
NumbermanipulationinSIPTrunk
 Source numberscan be
manipulated
 Destination numberscanbe
manipulated
 Using regex
6
NewVoice Feature
 RTPlatching
 RTPlatching is a technology that enables RTP/RTCPconnectivity througha NAT (networkaddress
translator) device or firewall
 Call forward History
 Indicates whether call history information will be forwarded throughthe trunk.
 3pcc Refer
 Indicates whether the 3pcc protocol can be usedto allow transferredcalls to bypass the hosted site.
3pcc is also knownas "third partycontrol," and occurs when a third-party is used to connect a pair
of callers (for example, anoperator placing a call from person A to person B). TheREFER method is
a standard SIP method which indicates that the recipient should contact a third-party by using
information supplied by thesender.
 Forward PAI
 Indicateswhether the P-Asserted-Identity (PAI) headerwill be forwarded along with the call. The
PAI header provides a wayto verify the identity of the caller
7
VoiceMail Escape
 Lync2013can detect whena call has been routed to voice mail, and prevent the call frombeing
immediately routed to the user’s mobile phone voice mail without giving the user the opportunity to
answer the call
8
PSTNconnection
 On replacing PBX youshould care aboute the legacy stuff like: DECT, analog Ports, Fax, Dooropener
Etc.
 How should the migration should bedone: Big Bang, coexistance
 What are the existing DID?
 What are the futureDID?
 How should the Lync connectedto the PSTN?
9
PSTNconnection
 Gateway connection to thePSTN
10
GatewayLync Server
Lync Client
PSTN
SIP
ISDN
Analoge Anschlüsse
PSTNconnection
 SIP Trunkwithout SBC
11
SIP Trunk
Lync Server
Lync Client
PSTN
SIP ISDN
Analoge Anschlüsse
PSTNconnection
 SIP TrunkwithSBC
12
SIP Trunk
Lync Server
Lync Client
PSTN
SIP
ISDN
Analoge Anschlüsse
SIP
SBC
PSTNconnection
 behind PBX without Gateway
13
PBXLync Server
Lync Client
PSTN
SIP
ISDN
SIP / ISDN
PSTNconnection
 behind PBX with Gateway
14
PBXLync Server
Lync Client
PSTN
SIP
ISDN
SIP / ISDN

Mais conteúdo relacionado

Mais procurados

Spoofing attack: Learn about Email spoofing, IP address spoofing and many other
Spoofing attack: Learn about Email spoofing, IP address spoofing and many otherSpoofing attack: Learn about Email spoofing, IP address spoofing and many other
Spoofing attack: Learn about Email spoofing, IP address spoofing and many otherPankaj Dubey
 
Bluejacking
BluejackingBluejacking
Bluejackingdixitas
 
bluejacking.ppt
bluejacking.pptbluejacking.ppt
bluejacking.pptAeman Khan
 
Bluejacking by Niharika Mundra
Bluejacking  by Niharika MundraBluejacking  by Niharika Mundra
Bluejacking by Niharika MundraNiki mundra
 

Mais procurados (9)

Spoofing attack: Learn about Email spoofing, IP address spoofing and many other
Spoofing attack: Learn about Email spoofing, IP address spoofing and many otherSpoofing attack: Learn about Email spoofing, IP address spoofing and many other
Spoofing attack: Learn about Email spoofing, IP address spoofing and many other
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
 
Blue jacking
Blue jackingBlue jacking
Blue jacking
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Ip Spoofing
Ip SpoofingIp Spoofing
Ip Spoofing
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
bluejacking.ppt
bluejacking.pptbluejacking.ppt
bluejacking.ppt
 
Bluejacking by Niharika Mundra
Bluejacking  by Niharika MundraBluejacking  by Niharika Mundra
Bluejacking by Niharika Mundra
 
What is nfc
What is nfcWhat is nfc
What is nfc
 

Semelhante a Lync 2013 – Sprachintegration

Analysis of VoIP Forensics with Digital Evidence Procedure
Analysis of VoIP Forensics with Digital Evidence ProcedureAnalysis of VoIP Forensics with Digital Evidence Procedure
Analysis of VoIP Forensics with Digital Evidence Procedureijsrd.com
 
SIP trunking: Weapon of mass communication
SIP trunking: Weapon of mass communicationSIP trunking: Weapon of mass communication
SIP trunking: Weapon of mass communicationFlowroute
 
Important VoIP Terms Every Business Should Know | Acefone
Important VoIP Terms Every Business Should Know | AcefoneImportant VoIP Terms Every Business Should Know | Acefone
Important VoIP Terms Every Business Should Know | AcefoneNaina Rajput
 
Energize your Unified Communications with SIP
Energize your Unified Communications with SIPEnergize your Unified Communications with SIP
Energize your Unified Communications with SIPXO Communications
 
如何做報告 (How to make a presentation?)
如何做報告 (How to make a presentation?)如何做報告 (How to make a presentation?)
如何做報告 (How to make a presentation?)Frank Fang Kuo Yu
 
Session Initiation Protocol: Security Issues Overview
Session Initiation Protocol: Security Issues OverviewSession Initiation Protocol: Security Issues Overview
Session Initiation Protocol: Security Issues OverviewCSCJournals
 
How to Optimize VoIP Call Quality Across Multiple Calling Environments
How to Optimize VoIP Call Quality Across Multiple Calling EnvironmentsHow to Optimize VoIP Call Quality Across Multiple Calling Environments
How to Optimize VoIP Call Quality Across Multiple Calling EnvironmentsAshik Jibon
 
Understanding Session Border Controllers
Understanding Session Border ControllersUnderstanding Session Border Controllers
Understanding Session Border Controllersstefansayer
 
Sending Faxes in real-time over an IP Network
Sending Faxes in real-time over an IP NetworkSending Faxes in real-time over an IP Network
Sending Faxes in real-time over an IP NetworkGFI Software
 
Computer Seminar.pptx
Computer Seminar.pptxComputer Seminar.pptx
Computer Seminar.pptxMelvinShaji12
 
Securty Issues from 1999
Securty Issues from 1999Securty Issues from 1999
Securty Issues from 1999TomParker
 
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIPAN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIPSean Flores
 

Semelhante a Lync 2013 – Sprachintegration (20)

Analysis of VoIP Forensics with Digital Evidence Procedure
Analysis of VoIP Forensics with Digital Evidence ProcedureAnalysis of VoIP Forensics with Digital Evidence Procedure
Analysis of VoIP Forensics with Digital Evidence Procedure
 
SIP trunking: Weapon of mass communication
SIP trunking: Weapon of mass communicationSIP trunking: Weapon of mass communication
SIP trunking: Weapon of mass communication
 
Sip Protocol
Sip ProtocolSip Protocol
Sip Protocol
 
Important VoIP Terms Every Business Should Know | Acefone
Important VoIP Terms Every Business Should Know | AcefoneImportant VoIP Terms Every Business Should Know | Acefone
Important VoIP Terms Every Business Should Know | Acefone
 
Cloopen IM Plus
Cloopen IM PlusCloopen IM Plus
Cloopen IM Plus
 
Energize your Unified Communications with SIP
Energize your Unified Communications with SIPEnergize your Unified Communications with SIP
Energize your Unified Communications with SIP
 
如何做報告 (How to make a presentation?)
如何做報告 (How to make a presentation?)如何做報告 (How to make a presentation?)
如何做報告 (How to make a presentation?)
 
voip_en
voip_envoip_en
voip_en
 
Session Initiation Protocol: Security Issues Overview
Session Initiation Protocol: Security Issues OverviewSession Initiation Protocol: Security Issues Overview
Session Initiation Protocol: Security Issues Overview
 
How to Optimize VoIP Call Quality Across Multiple Calling Environments
How to Optimize VoIP Call Quality Across Multiple Calling EnvironmentsHow to Optimize VoIP Call Quality Across Multiple Calling Environments
How to Optimize VoIP Call Quality Across Multiple Calling Environments
 
Understanding Session Border Controllers
Understanding Session Border ControllersUnderstanding Session Border Controllers
Understanding Session Border Controllers
 
Sending Faxes in real-time over an IP Network
Sending Faxes in real-time over an IP NetworkSending Faxes in real-time over an IP Network
Sending Faxes in real-time over an IP Network
 
ccna project
ccna projectccna project
ccna project
 
Computer Seminar.pptx
Computer Seminar.pptxComputer Seminar.pptx
Computer Seminar.pptx
 
VOIP PROTOCOLS.pptx
VOIP PROTOCOLS.pptxVOIP PROTOCOLS.pptx
VOIP PROTOCOLS.pptx
 
VOIP PROTOCOLS.pptx
VOIP PROTOCOLS.pptxVOIP PROTOCOLS.pptx
VOIP PROTOCOLS.pptx
 
Securty Issues from 1999
Securty Issues from 1999Securty Issues from 1999
Securty Issues from 1999
 
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIPAN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
 
ECE 6570 Class01
ECE 6570 Class01ECE 6570 Class01
ECE 6570 Class01
 
VOIP services
VOIP servicesVOIP services
VOIP services
 

Mais de Digicomp Academy AG

Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019
Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019
Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019Digicomp Academy AG
 
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...Digicomp Academy AG
 
Innovation durch kollaboration gennex 2018
Innovation durch kollaboration gennex 2018Innovation durch kollaboration gennex 2018
Innovation durch kollaboration gennex 2018Digicomp Academy AG
 
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handout
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handoutRoger basler meetup_digitale-geschaeftsmodelle-entwickeln_handout
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handoutDigicomp Academy AG
 
Roger basler meetup_21082018_work-smarter-not-harder_handout
Roger basler meetup_21082018_work-smarter-not-harder_handoutRoger basler meetup_21082018_work-smarter-not-harder_handout
Roger basler meetup_21082018_work-smarter-not-harder_handoutDigicomp Academy AG
 
Xing expertendialog zu nudge unit x
Xing expertendialog zu nudge unit xXing expertendialog zu nudge unit x
Xing expertendialog zu nudge unit xDigicomp Academy AG
 
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?Digicomp Academy AG
 
IPv6 Security Talk mit Joe Klein
IPv6 Security Talk mit Joe KleinIPv6 Security Talk mit Joe Klein
IPv6 Security Talk mit Joe KleinDigicomp Academy AG
 
Agiles Management - Wie geht das?
Agiles Management - Wie geht das?Agiles Management - Wie geht das?
Agiles Management - Wie geht das?Digicomp Academy AG
 
Gewinnen Sie Menschen und Ziele - Referat von Andi Odermatt
Gewinnen Sie Menschen und Ziele - Referat von Andi OdermattGewinnen Sie Menschen und Ziele - Referat von Andi Odermatt
Gewinnen Sie Menschen und Ziele - Referat von Andi OdermattDigicomp Academy AG
 
Querdenken mit Kreativitätsmethoden – XING Expertendialog
Querdenken mit Kreativitätsmethoden – XING ExpertendialogQuerdenken mit Kreativitätsmethoden – XING Expertendialog
Querdenken mit Kreativitätsmethoden – XING ExpertendialogDigicomp Academy AG
 
Xing LearningZ: Digitale Geschäftsmodelle entwickeln
Xing LearningZ: Digitale Geschäftsmodelle entwickelnXing LearningZ: Digitale Geschäftsmodelle entwickeln
Xing LearningZ: Digitale Geschäftsmodelle entwickelnDigicomp Academy AG
 
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only BuildingSwiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only BuildingDigicomp Academy AG
 
UX – Schlüssel zum Erfolg im Digital Business
UX – Schlüssel zum Erfolg im Digital BusinessUX – Schlüssel zum Erfolg im Digital Business
UX – Schlüssel zum Erfolg im Digital BusinessDigicomp Academy AG
 
Die IPv6 Journey der ETH Zürich
Die IPv6 Journey der ETH Zürich Die IPv6 Journey der ETH Zürich
Die IPv6 Journey der ETH Zürich Digicomp Academy AG
 
Xing LearningZ: Die 10 + 1 Trends im (E-)Commerce
Xing LearningZ: Die 10 + 1 Trends im (E-)CommerceXing LearningZ: Die 10 + 1 Trends im (E-)Commerce
Xing LearningZ: Die 10 + 1 Trends im (E-)CommerceDigicomp Academy AG
 
Zahlen Battle: klassische werbung vs.online-werbung-somexcloud
Zahlen Battle: klassische werbung vs.online-werbung-somexcloudZahlen Battle: klassische werbung vs.online-werbung-somexcloud
Zahlen Battle: klassische werbung vs.online-werbung-somexcloudDigicomp Academy AG
 
General data protection regulation-slides
General data protection regulation-slidesGeneral data protection regulation-slides
General data protection regulation-slidesDigicomp Academy AG
 

Mais de Digicomp Academy AG (20)

Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019
Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019
Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019
 
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...
 
Innovation durch kollaboration gennex 2018
Innovation durch kollaboration gennex 2018Innovation durch kollaboration gennex 2018
Innovation durch kollaboration gennex 2018
 
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handout
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handoutRoger basler meetup_digitale-geschaeftsmodelle-entwickeln_handout
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handout
 
Roger basler meetup_21082018_work-smarter-not-harder_handout
Roger basler meetup_21082018_work-smarter-not-harder_handoutRoger basler meetup_21082018_work-smarter-not-harder_handout
Roger basler meetup_21082018_work-smarter-not-harder_handout
 
Xing expertendialog zu nudge unit x
Xing expertendialog zu nudge unit xXing expertendialog zu nudge unit x
Xing expertendialog zu nudge unit x
 
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?
 
IPv6 Security Talk mit Joe Klein
IPv6 Security Talk mit Joe KleinIPv6 Security Talk mit Joe Klein
IPv6 Security Talk mit Joe Klein
 
Agiles Management - Wie geht das?
Agiles Management - Wie geht das?Agiles Management - Wie geht das?
Agiles Management - Wie geht das?
 
Gewinnen Sie Menschen und Ziele - Referat von Andi Odermatt
Gewinnen Sie Menschen und Ziele - Referat von Andi OdermattGewinnen Sie Menschen und Ziele - Referat von Andi Odermatt
Gewinnen Sie Menschen und Ziele - Referat von Andi Odermatt
 
Querdenken mit Kreativitätsmethoden – XING Expertendialog
Querdenken mit Kreativitätsmethoden – XING ExpertendialogQuerdenken mit Kreativitätsmethoden – XING Expertendialog
Querdenken mit Kreativitätsmethoden – XING Expertendialog
 
Xing LearningZ: Digitale Geschäftsmodelle entwickeln
Xing LearningZ: Digitale Geschäftsmodelle entwickelnXing LearningZ: Digitale Geschäftsmodelle entwickeln
Xing LearningZ: Digitale Geschäftsmodelle entwickeln
 
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only BuildingSwiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
 
UX – Schlüssel zum Erfolg im Digital Business
UX – Schlüssel zum Erfolg im Digital BusinessUX – Schlüssel zum Erfolg im Digital Business
UX – Schlüssel zum Erfolg im Digital Business
 
Minenfeld IPv6
Minenfeld IPv6Minenfeld IPv6
Minenfeld IPv6
 
Was ist design thinking
Was ist design thinkingWas ist design thinking
Was ist design thinking
 
Die IPv6 Journey der ETH Zürich
Die IPv6 Journey der ETH Zürich Die IPv6 Journey der ETH Zürich
Die IPv6 Journey der ETH Zürich
 
Xing LearningZ: Die 10 + 1 Trends im (E-)Commerce
Xing LearningZ: Die 10 + 1 Trends im (E-)CommerceXing LearningZ: Die 10 + 1 Trends im (E-)Commerce
Xing LearningZ: Die 10 + 1 Trends im (E-)Commerce
 
Zahlen Battle: klassische werbung vs.online-werbung-somexcloud
Zahlen Battle: klassische werbung vs.online-werbung-somexcloudZahlen Battle: klassische werbung vs.online-werbung-somexcloud
Zahlen Battle: klassische werbung vs.online-werbung-somexcloud
 
General data protection regulation-slides
General data protection regulation-slidesGeneral data protection regulation-slides
General data protection regulation-slides
 

Último

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

Lync 2013 – Sprachintegration

  • 1. Lync 2013 - Sprachintegration 1
  • 2. Agenda  Lync2013– Sprachintegration  Voice Investments  IntertrunkRoute  Numbermanipulation in SIP Trunk  New Voice Feature  Voice Mail Escape  PSTN connection 2
  • 3. Lync2013-Sprachintegration  Mit Lynckommenviele IT-Firmenzumersten Mal mit der Welt der Telefonie in Berührung.Dabei stellt sich fürIT-Firmenoftmals die Frage: Wiemuss Lync2013andas Telefonie-Netzwerkangeschlossen werden undwas gilt es zubeachten? ErfahrenSie es indieser Session.  Seit fünfeinhalbJahrenarbeite ichausschliesslich auf dem Produkt OCS/Lync.Indiesem Bereich durfte erdie sehr spannende undaufregende Zeit seit dem Einstieg der Microsoft indie Welt der Telefonie miterleben. Als Ausgleich zumIT-Alltagspielt er sehr gerne Radball oder unternimmtAusflüge mit seiner Familie. 3
  • 4. VoiceInvestments 4 • “Anywhere Access” • IM andRich Presence • Common voice features • Unified messaging • Audioandvideo conferencing • Desktop integration • Single Number reach • Attendant Console • Delegation/TeamCall • Response Groups • Session Initiation Protocol (SIP) Trunking • Dial-in audio conferencing • Higher definition video • UCWorkflow activities • Branch Resiliency (SBA) • Datacenter Resiliency • CallAdmission Control • Callpark • Topologychanges • Mediabypass • Enhanced 9-1-1 for North America (NA) • Routing changes • Analog devices • Common area phones • Privateline • Malicious CallTrace (MCT) • Larger deviceportfolio • A/V for Mobileclients • Intertrunk Route • Number manipulation in SIPTrunk • Gateway M:N • RTP latching • Call forward History • P-Asserted Identity • 3pccRefer • Voice MailEscape • Responsegroup Manager • CallPickup • HybridVoice (Office 365) • Room conferencing Systems “OCS 2007” “OCS 2007 R2” “Lync 2010” “Lync 2013”
  • 5. IntertrunkRoute  IncomingPSTN calls can be routed to a private branchexchange (PBX) phone  Interconnectwith two ormore IP-PBX systems 5
  • 6. NumbermanipulationinSIPTrunk  Source numberscan be manipulated  Destination numberscanbe manipulated  Using regex 6
  • 7. NewVoice Feature  RTPlatching  RTPlatching is a technology that enables RTP/RTCPconnectivity througha NAT (networkaddress translator) device or firewall  Call forward History  Indicates whether call history information will be forwarded throughthe trunk.  3pcc Refer  Indicates whether the 3pcc protocol can be usedto allow transferredcalls to bypass the hosted site. 3pcc is also knownas "third partycontrol," and occurs when a third-party is used to connect a pair of callers (for example, anoperator placing a call from person A to person B). TheREFER method is a standard SIP method which indicates that the recipient should contact a third-party by using information supplied by thesender.  Forward PAI  Indicateswhether the P-Asserted-Identity (PAI) headerwill be forwarded along with the call. The PAI header provides a wayto verify the identity of the caller 7
  • 8. VoiceMail Escape  Lync2013can detect whena call has been routed to voice mail, and prevent the call frombeing immediately routed to the user’s mobile phone voice mail without giving the user the opportunity to answer the call 8
  • 9. PSTNconnection  On replacing PBX youshould care aboute the legacy stuff like: DECT, analog Ports, Fax, Dooropener Etc.  How should the migration should bedone: Big Bang, coexistance  What are the existing DID?  What are the futureDID?  How should the Lync connectedto the PSTN? 9
  • 10. PSTNconnection  Gateway connection to thePSTN 10 GatewayLync Server Lync Client PSTN SIP ISDN Analoge Anschlüsse
  • 11. PSTNconnection  SIP Trunkwithout SBC 11 SIP Trunk Lync Server Lync Client PSTN SIP ISDN Analoge Anschlüsse
  • 12. PSTNconnection  SIP TrunkwithSBC 12 SIP Trunk Lync Server Lync Client PSTN SIP ISDN Analoge Anschlüsse SIP SBC
  • 13. PSTNconnection  behind PBX without Gateway 13 PBXLync Server Lync Client PSTN SIP ISDN SIP / ISDN
  • 14. PSTNconnection  behind PBX with Gateway 14 PBXLync Server Lync Client PSTN SIP ISDN SIP / ISDN