| [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] R-value calculating 2nd R-values reacting to intrusions 2nd readiness assessment of VoIP implementation real-time monitoring 2nd recommendations ITU-T recommended QoS practices 2nd recommended security practices securing central facilities 2nd 3rd 4th 5th 6th 7th redundancy reliability assessing 2nd 3rd of hardware 2nd of IT processes 2nd of link and carrier of network design 2nd of software five nines reliability of VoIP deployment ensuring 2nd remote access points security vulnerabilities replacing equipment resources overprovisioning 2nd oversubscribing 2nd sharing response time returns estimating in VoIP deployment 2nd RFCs (Request For Comments) ROI 2nd analyzing 2nd calculating 2nd 3rd 4th ensuring profitability 2nd evaluating investments estimating 2nd 3rd measuring benefits of VoIP 2nd convergence 2nd cost savings 2nd 3rd 4th 5th 6th 7th hard benefits new features 2nd 3rd 4th 5th productivity savings 2nd soft benefits measuring obstacles to VoIP business risks 2nd cost investment 2nd returns calculating 2nd routers RSVP 2nd RTP header fields 2nd lost data 2nd RTP (Real-time Transport Protocol) RTP header compression 2nd 3rd RTP multiplexing RTP Payload Type field (RTP header) |