eBooks-it.org Logo
eBooks-IT.org Inner Image

Beyond VoIP Protocols

Understanding Voice Technology and Networking Techniques for IP Telephony

Beyond VoIP Protocols Image

Book Details:

Publisher:Wiley
Series: Wiley , Technology
Author:Olivier Hersent
Edition:1
ISBN-10:0470023627
ISBN-13:9780470023624
Pages:284
Published:Mar 04 2005
Posted:Nov 19 2014
Language:English
Book format:PDF
Book size:3.89 MB

Book Description:

In 1999-2000, VoIP (Voice-over-IP) telephony was one of the most successful buzzwords of the telecom bubble era. However, in 2001-2003, VoIP faced a very tough reality check. Now, manufacturers and service providers are drawing on what they have learnt from past experience in order to prepare to participate in the next major challenge faced by the telecommunications industry.This book offers a comprehensive overview of the issues to solve in order to deploy global revenue-generating effective "multimedia" services. Drawing on extensive research and practical deployment experience in VoIP, the authors provide essential advice for those seeking to design and implement a post-bubble VoIP network.Beyond VoIP Protocols: Understanding Voice Technology and Networking Techniques for IP Telephony Introduces the basics of speech coding and voice qualityDemonstrates how quality of service may be built into the network and deals with dimensioning aspects, e.g. multipoint communications and how to model call seizures.Explores the potential of multicast to turn an IP backbone into an optimized broadcast mediumIncludes amply illustrated, state-of-the-art practical advice for formulating a complete deployment strategyA companion volume to "IP Telephony: Deploying VoIP Protocols", this book takes the reader a stage deeper into how to prepare the network and exploit VoIP technology to its full potential.

Download Link:

Related Books:

IP Telephony

Deploying VoIP Protocols and IMS Infrastructure
IP Telephony Image
2nd Edition
All you need to know about deploying VoIP protocols in one comprehensive and highly practical reference - Now updated with coverage on SIP and the IMS infrastructureThis book provides a comprehensive and practical overview of the technology behind Internet Telephony (IP), providing essential information to Network Engineers, Designers, and Managers who need to understand the protocols. Furthermore, the author explores the issues involved in the migration of existing telephony infrastructure to an IP - based real time communication service. Assuming a working knowledge of IP and networking, it addresses the technical aspects of real-time applications ov...

Hacking VoIP

Protocols, Attacks, and Countermeasures
Hacking VoIP Image
Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs, insert unwanted audio into existing phone calls, and access sensitive information. Hacking VoIP takes a dual approach to VoIP security, explaining its many security holes to hackers and administrators. If you're serious about security, and you either use or administer VoIP, you should know where VoIP's biggest weaknesses lie and how to shore up your security. And if your intellectual curiosity is leading you to...

Hacking Exposed VoIP

Voice Over IP Security Secrets & Solutions
Hacking Exposed VoIP Image
Sidestep VoIP Catastrophe the Foolproof Hacking Exposed WayThis book illuminates how remote users can probe, sniff, and modify your phones, phone switches, and networks that offer VoIP services. Most importantly, the authors offer solutions to mitigate the risk of deploying VoIP technologies. --Ron Gula, CTO of Tenable Network SecurityBlock debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues are covered alongside detailed countermeasures, in-depth examples, and hands-on implem...



2007 - 2021 © eBooks-IT.org