Scalable VoIP mobility integration and deployment
Today's businesses, big and small, are faced with the large scale restructuring concerning daily communications. Enterprises are moving from the standard wired telephony to wired and wireless communication via internet protocol (IP), Wi-Fi, and cellular services. With the stabilization of these...
Autor principal: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Burlington, MA ; Oxford :
Newnes
c2009.
|
Edición: | 1st edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627545606719 |
Tabla de Contenidos:
- Front cover; Half title page; Title page; Copyright page; Dedication; Table of contents; Chapter 1: Introduction to Voice Mobility; Why Voice Mobility?; Audience and Expected Background; How to Read This Book (Chapter Layout); Chapter 2: Voice Mobility Technologies; Introduction; The Anatomy of a Voice Call; Signaling Protocols in Detail; Bearer Protocols in Detail; Chapter 3: Elements of Voice Quality; Introduction; What Voice Quality Really Means; What Makes Voice Over IP Quality Suffer; How to Measure Voice Quality Yourself; Chapter 4: Voice Over Ethernet; Introduction
- The IP-Based Voice NetworkQuality of Service on Wired Networks; Chapter 5: Introduction to Wi-Fi; Introduction; The Advantages of Wi-Fi; The Basics of Wi-Fi; RF Primer; Wi-Fi's Approach to Wireless; The Wi-Fi Radio Types; Security for 802.11; Wi-Fi; Chapter 6: Voice Mobility over Wi-Fi; Introduction; Technologies that Address Voice Mobility with Wi-Fi; Inter-Access Point Handoffs; Wi-Fi Alliance Certifications for Voice Mobility; Real Concepts from High-Density Networks; Chapter 7: Voice over Cellular and Licensed Spectrum; Introduction; Anatomy of a Cellular Phone Call; Cellular Technologies
- Fixed-Mobile ConvergenceHandoff Between Different Networks: Handing In and Handing Out; Cellular-Centric Technology with UMA; Potential Alternatives to FMC: Cellular-Only Technology; Chapter 8: Securing Voice; Introduction; Principles of Security; Authentication, Authorization, and Accounting Services with RADIUS; Protecting Your Network End-to-End; Protecting the Pipe; Physically Securing the Handset; Physically Protecting the Network; Chapter 9: The Future: Video Mobility and Beyond; Introduction; Packetized Video; Beyond Voice and Video; References; Index