This book is the product of a few authors and many behind-the-scenes workers who deserve recognition. Our thanks go to our editor, Brett Bartow, who did his best to keep us on track and on time, in spite of
Our technical editors on this book did a great job of making sure the book was technically correct and suggesting ways to improve the content. The book would not have been as good without them. A big thank you to Danelle Au, Christina Hattingh, Sibrina Shafique, Brandon Ta, and Lingling Zhang!
Denise would like to thank the AES Engineering and Callisma groups within AT&T for the loan of lab equipment. Thanks also to Tom Petzold for helping keep this relevant.
David would like to thank the voice TEC team for their reviews and suggestions and for their insights on instruction and certification. He also wants to thank his manager, Drew Rosen, for supporting him in this and all his other efforts.
Ken would like to thank his manager, Michael Aaron, for his support during this process.
Icons Used in This Book
Command Syntax Conventions
The conventions used to present command syntax in this book are the same conventions used in the Cisco IOS Command Reference. The Command Reference describes these conventions as
Cisco IOS routers have shipped with voice interface cards since 1997, and after this capability was available the
VoIP did not fascinate the popular
Although the idea of a voice gateway is conceptually simple enoughit's a
A Cisco Press book with comprehensive coverage focused entirely on voice gateway technology and features was a long time coming, and at last with this book, the authors provide an
The book goes on to provide insights into many other areas of gateway selection and deployment, including the myriad choices in carrying fax and modem traffic over IP, dial plan features and digit manipulation tools, call admission control capabilities to keep voice traffic off the IP network when it does not have the quality levels to carry it, a review of DSP technology and operation, and an examination of IP connectivity implications and QoS features required to carry voice traffic with decent quality. Later chapters in the book also include discussions on pure IP-oriented topics such as TCL and VXML applications capabilities, conference mixing, transcoding, gatekeeper functions and connectivity, and IP-to-IP gateway (session border controller) services and features. All of these pure VoIP services are
The book also covers key areas of interest in any network, including security measures and high availability. VoIP network security is a wide topic fully deserving of its own book-length treatment, but this book provides enough basic information to get your network deployed. It covers how voice gateway traffic
Throughout the book is a case study that solidifies the chapter discussions by providing practical, hands-on examples of how the configuration of the system implements the features. This, together with the detailed chapter-by-chapter coverage of crucial gateway topics, make this an invaluable book essential to the tool chest of