Flylib.com
Taking Charge of Your VoIP Project
Taking Charge of Your VoIP Project
ISBN: 1587200929
EAN: 2147483647
Year: 2004
Pages: 90
Authors:
Hillary J. Michaud
,
Jeffrey T. Hicks
BUY ON AMAZON
Main Page
Table of Contents
Copyright
About the Authors
About the Technical Reviewers
Acknowledgments
Why We Wrote This Book
Who Should Read this Book
How This Book Is Organized
Chapter 1. VoIP Basics
In the Telephony Community
In the Data-Networking Community
Chapter Summary
End Notes
Chapter 2. Building a Business Case for VoIP
A VoIP Business Case
VoIP Benefits and Obstacles
Analyzing VoIP ROI
Getting a Good ROI
Chapter Summary
End Notes
Chapter 3. Planning for VoIP
Planning Analysis and Assessment
Evaluation and Purchase
Deployment Tuning and Testing
Chapter Summary
End Notes
Chapter 4. Do It Yourself or Outsource?
Why Outsource?
Some Options for Outsourcing
Whether to Outsource?And to Whom?
A Methodology for Approaching Outsourcing
Chapter Summary
End Notes
Chapter 5. Quality of Service and Tuning
Sharing a Network
QoS What and Why
Network QoS Techniques
Tuning Choices
Configuration and Testing
QoS and Tuning Recommendations
Chapter Summary
End Notes
Chapter 6. Ongoing VoIP Management
Understanding VoIP Management
Managing Operations
Maintaining High Availability
Maintaining Call Quality
Accounting and Billing
Chapter Summary
End Notes
Chapter 7. Establishing VoIP SLAs
Determining What to Measure in a VoIP SLA
Implementing VoIP SLAs
Chapter Summary
End Notes
Chapter 8. VoIP Security
Network Security Is Tough
Three Stages in Managing Security
Problem Areas for VoIP Security
VoIP Security Recommendations
Chapter Summary
Conclusion
End Notes
Index
SYMBOL
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
Taking Charge of Your VoIP Project
ISBN: 1587200929
EAN: 2147483647
Year: 2004
Pages: 90
Authors:
Hillary J. Michaud
,
Jeffrey T. Hicks
BUY ON AMAZON
Systematic Software Testing (Artech House Computer Library)
Test Implementation
The Test Manager
Improving the Testing Process
Appendix B Testing Survey
Appendix C IEEE Templates
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Overview of Captology
The Functional Triad Computers in Persuasive Roles
Computers as Persuasive Tools
Credibility and Computers
The Ethics of Persuasive Technology
802.11 Wireless Networks: The Definitive Guide, Second Edition
11 Network Operations
Contention-Based Access Using the DCF
Frame Format
General Structure of an 802.11 Interface
11 Performance Tuning
The Lean Six Sigma Pocket Toolbook. A Quick Reference Guide to Nearly 100 Tools for Improving Process Quality, Speed, and Complexity
Using DMAIC to Improve Speed, Quality, and Cost
Value Stream Mapping and Process Flow Tools
Identifying and Verifying Causes
Reducing Lead Time and Non-Value-Add Cost
Complexity Value Stream Mapping and Complexity Analysis
Cultural Imperative: Global Trends in the 21st Century
From 2,000,000 B.C. to A.D.2000: The Roots and Routes of Culture
Cultural Black Holes
The Pacific Rim: The Fourth Cultural Ecology
Empires Past, Present, and Future
Appendix A Cultural Categorization Characteristics
Comparing, Designing, and Deploying VPNs
Deploying IPsec VPNs: Fundamental Considerations
Review Questions
Summary
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies