Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
IP Telephony with H.323: Architectures for Unified Networks and Integrated Services

Buy
A comprehensive introduction to the protocols and architecture everyone must know in order to implement H.323-based IP telephony

IP Telephony with H.323

Internet Protocol (IP) telephony is changing the way business gets done, allowing multimedia messages such as voice, data, and video to be transmitted over standard routers, telephone switches, and lines. This authoritative book will help you gain a practical understanding of how IP telephony works by looking at the various protocols and architectural components using ITU-Ts H.323 standard. Written by the chief architects of H.323, it clearly describes the protocols that enable users to collaborate in a multimedia call as well as the H.323 protocols that permit supplementary services to be executed. The authors also explain the architecture and deployment scenarios of various types of gateways including network access gateways, trunking gateways, and residential gateways. In addition, they show you how security, QoS, and mobility can be integrated in H.323-based signaling protocols and the media streams.

Inside, youll find valuable insights on the use and implementation of the H.323 standard including how to:

  • Utilize the signaling, control, and media protocols to initiate, communicate, and terminate a call
  • Modify protocols to scale the size of conference calls to allow hundreds and thousands of participants
  • Route a call and provide a mechanism for timing the length of the call
  • Deploy Web-based protocols such as HTTP to control telephone calls
  • Integrate QoS and mobility in IP telephony systems
About the Author

VINEET KUMAR is a chief architect responsible for IP telephony and mobile Internet at Intel. He has been Principal Architect of H.323 at the ITU-T from its onset in 1995.

MARKKU KORPI is President, CTO, and founder of Cosini Technologies. He was previously Chief Systems Architect at Siemens where he designed multimedia networks. He served as editor of H.450.

SENTHIL SENGODAN is the Manager of the Internet Multimedia Security Group at Nokia Research Center, Boston. He leads IP telephony and IP security-related projects at Nokia Research Center, and has made IP telephony—related contributions to ITU-T, ETSI, IETF, and other bodies.

(HTML tags aren't allowed.)

Home Automation with Intel Galileo
Home Automation with Intel Galileo

Create thrilling and intricate home automation projects using Intel Galileo

About This Book

  • Make the most out of Intel Galileo by understanding its fundamentals and architecture
  • Explore sensors and devices to successfully control home functions like lights, security, energy management,...
Professional Apache Tomcat 6 (WROX Professional Guides)
Professional Apache Tomcat 6 (WROX Professional Guides)
With this comprehensive resource, you'll uncover the ins-and-outs of installing, configuring, and running the Apache Tomcat server. This book not only provides a line-by-line analysis of configuration options, but also explores the features and capabilities of Tomcat. You'll then gain the skills to solve the type of problems that arise during all...
Mastering Windows 7 Deployment
Mastering Windows 7 Deployment

Get professional-level instruction on Windows 7 deployment tools

Enterprise-level operating system deployment is challenging and requires knowledge of specific tools. It is expected that Windows 7 will be extensively deployed in businesses worldwide. This comprehensive Sybex guide provides thorough coverage of the Microsoft...


Group-based Cryptography (Advanced Courses in Mathematics - CRM Barcelona)
Group-based Cryptography (Advanced Courses in Mathematics - CRM Barcelona)

This book is about relations between three different areas of mathematics and theoretical computer science: combinatorial group theory, cryptography, and complexity theory. It is explored how non-commutative (infinite) groups, which are typically studied in combinatorial group theory, can be used in public key cryptography. It is also shown...

Windows 8 Bible
Windows 8 Bible

The first and last word on the feature-packed new Windows 8

Windows 8 is an exciting new version of Microsoft's flagship operating system and it's packed with exciting new features. From the new Windows 82032s lock screen and the new Internet Explorer to a built-in PDF reader and new user interface, Windows 8 is not...

User-Centered Computer Aided Language Learning
User-Centered Computer Aided Language Learning
In the field of computer aided language learning (CALL), there is a need for emphasizing the importance of the user. User-Centered Computer Aided Language Learning presents methodologies, strategies, and design approaches for building interfaces for a user-centered CALL environment, creating a deeper understanding of the opportunities and...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy