Taking Charge of Your VoIP Project

Prev don't be afraid of buying books Next

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W]

data networks

     security vulnerabilities 2nd 3rd 4th 5th

data rates

     correlation to delay

data-networking standards

datagrams

defining

     roles for SLA implementation

         selecting relevant metrics 2nd 3rd

         SLA negotiations 2nd 3rd 4th 5th

defining security policies

     exploiting vendor resources 2nd 3rd

     identifying security team 2nd

     performing postmortems 2nd

delay 2nd

     correlation to data rates

     effect on MOS score 2nd

     one-way

delay variation [See jitter]

deploying VoIP

     as major IT project

         ensuring reliability 2nd

         up-front planning 2nd

     assembling test plan 2nd 3rd

     building pilot deployment 2nd 3rd

         evaluating system 2nd 3rd

         solving echo problems 2nd

         transcoding

     ensuring profitability 2nd

     estimating ROI 2nd 3rd 4th

         investments 2nd 3rd

         returns 2nd

     outsourcing 2nd

         application integration

         developing partnerships 2nd 3rd

         integrator selection criteria 2nd 3rd 4th

         maintaining partnerships

         MSP selection criteria 2nd 3rd

         MSPs

         network tuning 2nd

         PBXs

         performing network upgrades 2nd

         pilot deployments 2nd

         toll bypass

         troubleshooting 2nd

         VoIP-readiness assessment

     planning phase 2nd

         assessing reliability 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

         codec selection 2nd 3rd

         compiling current telephony usage information 2nd 3rd 4th 5th

         delay 2nd 3rd

         evaluating call quality 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

         jitter 2nd

         lost data 2nd

         performing readiness assessment 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

Destination Address field (IP packet header)

detecting security breaches 2nd 3rd

devices

     codecs 2nd

         bandwidth consumption

         compression techniques

         transcoding

     eliminating equipment gaps

    IP phones

         security vulnerabilities 2nd 3rd 4th

devies

    softphones

         security vulnerabilities

dial tone response time

DiffServ

digital telephones

DoS attacks 2nd

downtime costs 2nd

Amazon

Категории