
Wednesday, July 29, 2009
Wednesday, July 8, 2009
VoIP Technologies: A Comprehensive Guide to Voice over Internet Protocol (VoIP)
Looking for a reference on Voice over Internet Protocol (VoIP)? VoIP Technologies, your complete guide to Voice over Internet Protocol (VoIP), provides a comprehensive foundation of VoIP technology, as well as the knowledge necessary to successfully support any VoIP product.
Designed for those who have a working knowledge of data, this guide examines the major components of VoIP networks, the incorporation of VoIP into a data network, packaging and transmitting voice, maintaining voice quality, and addressing traffic issues. Many other topics are also discussed in this section, including VoIP standards, protocols, and configuring networks for VoIP. The second half of the guide focuses on designing and supporting complex VoIP solutions encountered in Wide and Local Area Networks (WAN and LAN).
This guide will also help to prepare you for the Technology Standards and Protocols for IP Telephony Solutions (920-803) and Technology Standards and Protocols for Converged Networks (920-804). Nortel Professional Certification exams.
Posted by Roffi Grandiosa at 8:13 PM 0 comments
Switching to VoIP
More and more businesses today have their receive phone service through Internet instead of local phone company lines. Many businesses are also using their internal local and wide-area network infrastructure to replace legacy enterprise telephone networks. This migration to a single network carrying voice and data is called convergence, and it's revolutionizing the world of telecommunications by slashing costs and empowering users. The technology of families driving this convergence is called VoIP, or Voice over IP.
VoIP has advanced Internet-based telephony to a viable solution, piquing the interest of companies small and large. The primary reason for migrating to VoIP is cost, as it equalizes the costs of long distance calls, local calls, and e-mails to fractions of a penny per use. But the real enterprise turn-on is how VoIP empowers businesses to mold and customize telecom and datacom solutions using a single, cohesive networking platform. These business drivers are so compelling that legacy telephony is going the way of the dinosaur, yielding to Voice over IP as the dominant enterprise communications paradigm.
Posted by Roffi Grandiosa at 8:06 PM 0 comments
Monday, September 3, 2007
VoIP Hacks: Tips & Tools for Internet Telephony (Hacks)
VoIP is simply overflowing with hack potential, and VoIP Hacks is the practical guide from O'Reilly that presents these possibilities to you. It provides dozens of hands-on projects for building a VoIP network, showing you how to tweak and customize a multitude of exciting things to get the job done. Along the way, you'll also learn which standards and practices work best for your particular environment. Among the quick and clever solutions showcased in the book are those for:
* gauging VoIP readiness on an enterprise network
* using SIP, H.323, and other signaling specifications
* providing low-layer security in a VoIP environment
* employing IP hardphones, analog telephone adapters, and softPBX servers
* dealing with and avoiding the most common VoIP deployment mistakes
In reality, VoIP Hacks contains only a small subset of VoIP knowledge-enough to serve as an introduction to the world of VoIP and teach you how to use it to save money, be more productive, or just impress your friends. If you love to tinker and optimize, this is the one technology, and the one book, you must investigate.
VoIP Hacks: Tips & Tools for Internet Telephony (Hacks)
Posted by Roffi Grandiosa at 11:53 AM 0 comments
Sunday, August 26, 2007
VoIP: Hacking Exposed
Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues are covered alongside detailed countermeasures, in-depth examples, and hands-on implementation techniques. Inside, you'll learn how to defend against the latest DoS, man-in-the-middle, call flooding, eavesdropping, VoIP fuzzing, signaling and audio manipulation, Voice SPAM/SPIT, and voice phishing attacks.
Find out how hackers footprint, scan, enumerate, and pilfer VoIP networks and hardware
Fortify Cisco, Avaya, and Asterisk systems
- Prevent DNS poisoning, DHCP exhaustion, and ARP table manipulation,
- Thwart number harvesting, call pattern tracking, and conversation eavesdropping,
- Measure and maintain VoIP network quality of service and VoIP conversation quality
- Stop DoS and packet flood-based attacks from disrupting SIP proxies and phones
- Counter REGISTER hijacking, INVITE flooding, and BYE call teardown attacks
- Avoid insertion/mixing of malicious audio
- Learn about voice SPAM/SPIT and how to prevent it
- Defend against voice phishing and identity theft scams
Posted by Roffi Grandiosa at 7:27 AM 0 comments
Labels: Books