The Enterprise Guide to Video Conferencing Created using iThoughts [...] [...]

Slides:



Advertisements
Similar presentations
Unified Communications Bill Palmer ADNET Technologies, Inc.
Advertisements

Network Systems Sales LLC
Polycom® ReadiManager™ SE200 Are you ready for video management?
©2012 ClearOne Communications. Confidential and proprietary. COLLABORATE ® Video Conferencing Networking Basics.
TANDBERG Video Communication Server March TANDBERG Video Communication Server Background  SIP is the future protocol of video communication and.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
An Approach to Secure Cloud Computing Architectures By Y. Serge Joseph FAU security Group February 24th, 2011.
Scopia MCU and SMB V8.0 Sales Presentation November, 2012 Roberto Fogliardi.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 14: Troubleshooting Remote Connections.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Asper School of Business University of Manitoba Systems Analysis & Design Instructor: Bob Travica System architectures Updated: November 2014.
IT:Network:Applications VIRTUAL DESKTOP INFRASTRUCTURE.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 8 Introduction to Printers in a Windows Server 2008 Network.
Data Centers and IP PBXs LAN Structures Private Clouds IP PBX Architecture IP PBX Hosting.
The Technology Presentation prepared by Warren Frost.
© 2009 Avaya Inc. All rights reserved. Introduction to SIP Trunking Alan Klein Consulting Systems Engineer February 2009.
Winter Consolidated Server Deployment Guide for Hosted Messaging and Collaboration version 3.5 Philippe Maurent Principal Consultant Microsoft.
CPE5021 Advanced Network Security ---Network Security and Performance--- Lecture 9 CPE5021 Advanced Network Security ---Network Security and Performance---
Computerized Networking of HIV Providers Networking Fundamentals Presented by: Tom Lang – LCG Technologies Corp. May 8, 2003.
Polycom Conference Firewall Solutions. 2 The use of Video Conferencing Is Rapidly Growing More and More people are adopting IP conferencing Audio and.
And how they are used. Hubs send data to all of the devices that are plugged into them. They have no ability to send packets to the correct ports. Cost~$35.
Unified Communications as a Managed Service DIR Telecom Forum, October 7, 2014 ROY ALBRECHT, Director, Sales and Marketing Globalscope Communications.
VPN for Sales Nokia FireWall-1 Products Complete Integrated Solution including: –CheckPoint FireWall-1 enterprise security suite –Interfaces installed.
Mobility And Anywhere Access Clancy Priest Technology Services Director City of Hayward.
PART 2: Product Line. Tenor Switches & Gateways Tenor AX Series Solution For Medium to Large Enterprises  Available in 8, 16, 24 and 48 port Available.
Chapter Overview Network Communications.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
Chapter 9: Novell NetWare
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
WELCOME.  SoundConnect  45 Minute Presentation  15 Minute Q & A  Recording will be available within 24-hours AGENDA Greg Plum VP Channel Development.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Identifying Application Impacts on Network Design Designing and Supporting Computer.
M.A.Doman Short video intro Model for enabling the delivery of computing as a SERVICE.
Internet Engineering Course Network Design. Internet Engineering Course; Sharif University of Technology Contents Define and analyse an organization network.
Windows Small Business Server 2003 Setting up and Connecting David Overton Partner Technical Specialist.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
Video Communication Market Trends Rafi Anuar Director, Product Management.
Appendix A UM in Microsoft® Exchange Server 2010.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Harvard Video Network. Before: High Level Harvard VC Core.
SharePoint in the Education Space Presented by: Daniel Petersen Director of Business Solutions Applied Tech.
Unleashing the Power of IP Communications™ Calling Across The Boundaries Mike Burkett, VP Products September 2002.
6.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 6: Designing.
CHAPTER - 4 COMPUTER NETWORK Dr. BALAMURUGAN MUTHURAMAN
Internetworking Lecture 10 October 23, Introduction to Internetworking So far, we’ve discussed about how a single network functions. Internetworking.
Networking Components Quick Guide. Hubs Device that splits a network connection into multiple computers Data is transmitted to all devices attached Computers.
Video Conferencing at ACU. Current System ACU North Sydney Datacenter 1x RMX2000 1xDMA7000 1xVBP-5300E 1xVBP-5300ST ACU Melbourne Datacenter 1x RMX2000.
What is Cloud Computing 1. Cloud computing is a service that helps you to perform the tasks over the Internet. The users can access resources as they.
© 2003, Cisco Systems, Inc. All rights reserved. 2-1 Campus Network Design.
ShoreTel Virtualization February, © 2014 ShoreTel, Inc. All rights reserved worldwide. Unified Communications Deployment Model 1 Secure Reliable.
Chapter 1: Explore the Network
Unit 3 Virtualization.
What are the strategic imperatives?
Chapter 7. Identifying Assets and Activities to Be Protected
Chapter 1 Introduction to Networking
Contents Software components All users in one location:
Designing the Physical Architecture
CIIT-Human Computer Interaction-CSC456-Fall-2015-Mr
CONNECTING TO THE INTERNET
Welcome To : Group 1 VC Presentation
Computer Technology Notes #4
CCNA R&S Overview  The CCNA Routing and Switching Boot Camp is a composite course derived from ICND1 and ICND2 content merged into a single accelerated.
Borderless Networks Services Supported
IS4680 Security Auditing for Compliance
Virtual Private Network
Firewalls Routers, Switches, Hubs VPNs
The Video over IP Company
Networking and Security
Instructor Materials Chapter 8: Applied Networking
Presentation transcript:

The Enterprise Guide to Video Conferencing Created using iThoughts [...] [...]

The Enterprise Guide to Video Conferencing

Introduction

Who is this document for?

What do you want to achieve? Video Calls Video Conferencing Document Sharing Recording Web Streaming Video Messaging Who are your users and what are their job roles?

What do you want to achieve? Where are your users and what devices will they use? What are your capacity requirements? – Number of Users – Concurrent Users – Network Capacity – Server Capacity

What do you want to achieve? – PC Processor & Memory Capacity What is your budget? What is your required Return on Investment

System Considerations Endpoints – Room System Huddle Room System Small Room System Medium to Large Room System Mobile Room System Board Room & Lecture Theatres – Desktop System

System Considerations – Software System Infrastructure – MCU – Gatekeeper – Firewall Traversal Server – Management – Integration

System Considerations – Recording – Other Infrastructure Components User Interface – Scheduled Calls – Unscheduled Calls (Ad Hoc) – Directory Integration

Security Considerations User Authentication Auto Answer vs Manual Answer Endpoint on Internal Network Side of Firewall Endpoint in DMZ Endpoint on Public Internet Side of Firewall Video Conferencing Infrastructure with Firewall Traversal

Security Considerations The Future

Design & Specification Design & Architecture - Endpoints Design & Architecture - Infrastructure – Hardware – Virtual Infrastructure – Hosted – Cloud – Hybrid

Design & Specification Physical Network Requirements – LAN & Switch Port Speed & Duplex – Spanning Tree – Proxy Servers IP Addressing WAN & Internet Bandwidth Requirements MCU/Bridge Requirements

Design & Specification Network Security Resilience/Redundancy Integration User Trial – Users – Endpoints – Infrastructure

Design & Specification – Bandwidth – Security Restrictions – Success Criteria – Stakeholders – Sign Off

Deployment Planning Preparation Installation Configuration – Infrastructure – Enfpoint – Directories

Deployment Testing – Network Infrastructure – Internal Private Call Testing – External Private Calls – Public Calls – Document Sharing Training

Deployment – Operational – User Documentation Maintenance

Next Steps [...] [...]