Flylib.com
Cisco Voice Gateways and Gatekeepers
ISBN: 158705258X
EAN: 2147483647
Year: 2004
Pages: 218
Authors:
David Mallory
,
Ken Salhoff
,
Denise Donohue
BUY ON AMAZON
Part I: Voice Gateways and Gatekeepers
Gateways and Gatekeepers
Gateways and Gatekeepers
The Role of Voice Gateways
The Role of Voice Gatekeepers
The Role of IP-to-IP Gateways
Introduction to Voice Protocols
Call Control Agents
Deployment Scenarios
Case Study: Introduction
Chapter Review Questions
Part II: Gateways
Media Gateway Control Protocol
Media Gateway Control Protocol
Introduction to MGCP
MGCP Operation
Call Flow with MGCP
Dial Plan Considerations
Implementing MGCP Gateways
Securing MGCP Gateways
Troubleshooting Tools
Case Study: Configuring an MGCP Gateway
Review Questions
H.323
H.323
H.323 Specifications
H.323 Network Components
Call Flow
H.323 Protocol Pros and Cons
When to Use H.323
Dial Plan Considerations
Implementing H.323 Gateways
Securing H.323 Gateways
Troubleshooting Tools
Case Study: Configuring an H.323 Gateway
Review Questions
Session Initiation Protocol
Session Initiation Protocol
Description of SIP
SIP Call Flow
SIP Pros and Cons
When to Use SIP
Dial Plan Considerations
Implementing SIP Gateways
Securing SIP Gateways
Allowing H.323 to SIP Connections
Troubleshooting Tools
Case Study: Configuring SIP Between a Gateway and CallManager 5.x
Review Questions
Circuit Options
Circuit Options
Circuit Signaling
Analog Circuits
Digital Circuits
Review Questions
Connecting to the PSTN
Connecting to the PSTN
PSTN Circuit Selection Overview
Analog Trunks
Digital Trunks
Case Study: Add an E1 R2 Connection to the Leeds Gateway
Review Questions
Connecting to PBXs
Connecting to PBXs
Analog Trunks
Digital Trunks
Configuring Transparent Common Channel Signaling
Case Study: Implementing a Cisco Voice Gateway at the Shanghai Office
Review Questions
Connecting to an IP WAN
Connecting to an IP WAN
Applications for Connecting to an IP WAN
Design Considerations
Quality of Service
Providing Fax and Modem Services
Security
Case Study: Using a T1 Link as a Tie Line
Review Questions
Dial Plans
Dial Plans
Numbering Plans
Overlapping Numbering Plans
Building a Scalable Dial Plan
Dial Peers
Dial Peer Matching
Case Study: Configuring PSTN Access
Review Questions
Digit Manipulation
Digit Manipulation
Basic Digit Manipulation
Number Expansion
Voice Translation Rules and Profiles
Manipulating Caller ID
Order of Operation in Digit Manipulation
Troubleshooting Digit Manipulation
Case Study
Review Questions
Influencing Path Selection
Influencing Path Selection
Hunt Groups
Using Trunk Groups
Tail-End Hop-Off
Call Admission Control
POTS-to-POTS Call Routing Considerations
Case Study: Implementing Gateway-Controlled RSVP
Review Questions
Configuring Class of Restrictions
Configuring Class of Restrictions
COR Overview
COR Operation
Implementing COR
Assigning COR Lists with SRST
Assigning COR Lists with Cisco CallManager Express
Restricting Inbound Calls
Case Study: Implementing COR for Miami
Review Questions
SRST and MGCP Gateway Fallback
SRST and MGCP Gateway Fallback
SRST Overview
Configuring SRST
Dial Plan Considerations
SRST Features
SIP SRST
Call Preservation
Secure SRST
MGCP Gateway Fallback
Configuring MGCP Gateway Fallback
Verifying and Troubleshooting SRST
Verifying and Troubleshooting MGCP Gateway Fallback
Case Study: Integrating SRST with an Analog Voice-Mail System
Review Questions
DSP Resources
DSP Resources
Need for DSP Resources
Determining the DSP Resources Required
Configuring DSP Resources
Transcoding for CallManager Express
Case Study: Add DSP Resources to the Miami Gateway
Review Questions
Using Tcl Scripts and VoiceXML
Using Tcl Scripts and VoiceXML
Tcl IVR and VoiceXML Application Overview
Sample Applications
Downloading Tcl Scripts from Cisco.com
Configuring the Gateway to Use a Tcl Script
Implementing the AA Tcl Script
Creating Audio Files
Restrictions and Caveats
Case Study: Implementing ACD Application
Review Questions
Part III: Gatekeepers
Deploying Gatekeepers
Deploying Gatekeepers
Gatekeeper Functionality
Gatekeeper Signaling
E.164 Number Resolution
Call Admission Control
Gatekeeper Deployment Models
Gatekeepers with CallManager
Security with Gatekeepers
Review Questions
Gatekeeper Configuration
Gatekeeper Configuration
Configuring Basic Gatekeeper Functionality
Multiple Gatekeeper Configurations
Configuring Directory Gatekeepers
Troubleshooting Gatekeepers
CallManager and Gatekeepers
Gatekeeper Redundancy
Configuring Resource Availability Indicator
Configuring Gatekeeper Security
Case Study: Deploying Gatekeepers to Assist in Migration to VoIP
Review Questions
Part IV: IP-to-IP Gateways
Cisco Multiservice IP-to-IP Gateway
Cisco Multiservice IP-to-IP Gateway
IP-to-IP Gateway Overview
Cisco Multiservice IP-to-IP Gateway
Basic Configuration
IP-to-IP Gateway Features
Case Study: Providing Enterprise VoIP Trunking to VoIP Service of the Service Provider
Review Questions
Appendix A. Answers to Chapter-Ending Review Questions
Appendix A. Answers to Chapter-Ending Review Questions
Index
Cisco Voice Gateways and Gatekeepers
ISBN: 158705258X
EAN: 2147483647
Year: 2004
Pages: 218
Authors:
David Mallory
,
Ken Salhoff
,
Denise Donohue
BUY ON AMAZON
Interprocess Communications in Linux: The Nooks and Crannies
Permissions
A ClientServer Message Queue Example
Shared Memory Class
Peeking at Data
Appendix B. UNIX Error Messages
Beginning Cryptography with Java
The JCA and the JCE
Symmetric Key Cryptography
Asymmetric Key Cryptography
CMS and S/MIME
Appendix C Using the Bouncy Castle API for Elliptic Curve
Quantitative Methods in Project Management
Introduction to Probability and Statistics for Projects
Organizing and Estimating the Work
Making Quantitative Decisions
Risk-Adjusted Financial Management
Expense Accounting and Earned Value
The Oracle Hackers Handbook: Hacking and Defending Oracle
The Oracle Network Architecture
Attacking the TNS Listener and Dispatchers
Triggers
Indirect Privilege Escalation
Accessing the File System
DNS & BIND Cookbook
Monitoring a Name Server
Limiting Concurrent TCP Clients
Sending TSIG-Signed Dynamic Updates
Configuring a Caching-Only Name Server
Reverse-Mapping an Address with dig
Python Programming for the Absolute Beginner, 3rd Edition
Copying Directory Trees
Where to Go from Here
Processing Internet Email
JPython ( Jython): Python for Java
Implementing Stacks
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies