Taking Charge of Your VoIP Project

Prev don't be afraid of buying books Next

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W]

scalability

     cost savings of VoIP network expansion

     growth management 2nd

     planning for future growth 2nd

Schneier, Bruce

SCP (Session Control Point)

script kiddies

security

     detecting breaches 2nd

     events

     forensics

     hackers versus physical intruders 2nd 3rd 4th

     intrusion detection

     intrusions

     prevention 2nd

     reacting to intrusions 2nd

    recommended practices

         securing central facilities 2nd 3rd 4th 5th 6th 7th

    vulnerabilities of VoIP

         annoyances 2nd

         call hijacking

         confidentiality 2nd 3rd 4th 5th

         data network 2nd 3rd 4th 5th

         DoS attacks 2nd

         IP phones 2nd 3rd

         packets 2nd

         toll fraud 2nd

         undefined processes 2nd 3rd 4th

selecting

     metrics for SLAs 2nd

         availability 2nd

         call quality 2nd

         call setup performance 2nd

selecting codecs 2nd 3rd

selecting integrators

     criteria 2nd 3rd 4th

selecting MSPs

     criteria 2nd 3rd

self service MSPs

self-healing networks

Sequence Number field (RTP header)

servers

     gatekeepers

     hardening 2nd 3rd 4th

     security vulnerabilities 2nd

sharing drives

sharing network resources

     overprovisioning 2nd

     oversubscribing 2nd

     performance requirements

shunning

signaling

signatures

silence suppression

single network infrastructure savings in VoIP deployment 2nd 3rd

SIP (Session Initiation Protocol)

SIV (system integrity verifier)

SLA

SLAs

     cancelling contracts

     implementing 2nd

         defining responsibilities

         enforcement procedures 2nd

         measurement tools 2nd

         negotiations 2nd 3rd 4th 5th

         selecting relevant metrics 2nd 3rd

     incident tracking

     managing 2nd

     selecting metrics 2nd

         availability 2nd

         call quality 2nd

         call setup performance 2nd

SLAs (service-level agreement)

     ensuring reliability of VoIP deployment

soft benefits

softphones 2nd

     security vulnerabilities

Source Address field (IP packet header)

Source ID field (RTP header)

SS7 (Signaling System 7)

stages of telephone call

standards

     data-networking

     G.711

stateful inspection

STP (Signal Transfer Point)

subjective call quality measurements

switches 2nd 3rd

     Class 5

     tandem

Amazon

Категории