Problem solve Get help with specific problems with your technologies, process and projects.

Top VoIP Chapter Downloads of 2007

These downloads were the highest performing VoIP chapter excerpts for 2007. If you haven't read them yet, get caught up with our all-in-one guide to the best chapters of the year.

In 2007 brought you a host of chapter downloads from the newest and best titles in technology. IPTV and VoIP security were among the most popular themes in your favorites. In case you missed one, and want to catch up on your reading, here are the Best Chapter Excerpts from 2007.

Securing VoIP Networks Chapter 7: Key Management Mechanisms

Key management is a fundamental part of protecting Internet multimedia applications like VoIP, but the protocols can be difficult to design. Securing VoIP Networks explains the current and emerging key management security, amid detailed charts to guide you through the process of securing your network.

IPTV Crash Course: Chapter 3: The Technology of IP Networks

Chapter 3 of "IPTV Crash Course" by Joseph Weber and Tom Newberry presents an overview of IP suite data transmission basics and advanced protocols that IPTV utilizes in creating a television service supported by the Internet.

Building a VoIP Network with Nortel's Multimedia Communication Server 5100

"SIP Architecture" explains how SIP revolutionized the Internet communication industry, and helps you to understand the functions and features of the system.

Cisco IP Communications Express: CallManager Express with Cisco Unity Express

In this chapter, you'll read about some of the more popular Cisco CME phone and call processing features. You will see examples of how these features can be configured and combined to provide a rich and flexible set of functions. You will also see how to configure call transfer and forwarding functions in a variety of network scenarios.

How to Cheat at VoIP Security

Converging voice and data on the same wire, regardless of the protocols used, ups the ante for network security engineers and managers. One consequence of this convergence is that in the event of a major network attack, the organization's entire telecommunications infrastructure can be at risk. Securing the whole VoIP infrastructure requires planning, analysis, and detailed knowledge about the specifics of the implementation you choose to use.

Voice over IP Fundamentals

"VoIP: An In-Depth Analysis," discusses some of the issues that both developers and users need to consider when working with VoIP.

Voice over IPv6: Architectures for Next Generation VoIP Networks

VoIP technolgies are not immune to system failures, from hacking to jitter, and these issues can present problems for companies who depend on their network. This chapter examines some of the issues that are faced by VoIP systems, focusing on those that can be addressed by IPv6, namely scalability and end-to-end robustness.

This was last published in December 2007

Dig Deeper on VoIP Migration and Implementation

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.