Home > Articles > Networking > Voice/IP Communications

Voice/IP Communications

RSS Feed Subscribe to this topic  RSS details

73 Items

Sort by Date | Title

Introduction to Voice XML Part 4: Grammars, Scope, and Event Handlers
By Frank Coyle
Aug 31, 2007
Frank Coyle tells you why putting it all together will keep all your users happy.
Introduction to Voice XML Part 3: Voice XML Grammars
By Frank Coyle
Aug 10, 2007
Improve the quality of the voice interface by understanding the rules of voice grammars.
Introduction to VoiceXML Part 2: Working with Forms
By Frank Coyle
Aug 3, 2007
Create a login page and data capture page for a Baseball Facts Hotline.
An Introduction to VoiceXML
By Frank Coyle
Jul 27, 2007
If you've ordered a pizza lately, you've used VoiceXML. Learn how it works.
How to Host a Virtual Meeting
By David Christiansen
Jun 29, 2007
Virtual meetings aren't like face-to-face meetings; learn to do virtual well.
VoIP: An In-Depth Analysis
By Manoj Bhatia, Jonathan Davidson, Satish Kalidindi, Sudipto Mukherjee, James Peters
Oct 20, 2006
This chapter explains many of the issues facing Voice over IP (VoIP) and ways in which Cisco addresses these issues.
Basic IPsec VPN Topologies and Configurations
By James Henry Carmouche
Sep 29, 2006
In this chapter, you will review several common deployments of IPsec virtual private networks (VPNs).
Multiprotocol Label Switching Traffic Engineering Technology Overview
By Santiago Alvarez
Sep 22, 2006
This chapter presents a review of Multiprotocol Label Switching Traffic Engineering (MPLS TE) technology. MPLS TE can play an important role in the implementation of network services with quality of service (QoS) guarantees.
Details of Installing Skype
By Harry Max, Taylor Ray
Sep 1, 2006
This sample chapter is perfect for anyone who wants detailed instructions on downloading and installing Skype on their PCs.
Place Skype Calls Using a Real Phone
By Kulvir Singh Bhogal
Jun 30, 2006
VOIP has been proclaimed by many as the way of the future for telephone calls. But that future is today! Kulvir Bhogal brings you up to speed with using Skype and the Actiontec Internet Phone Wizard to turn your standard phone into a way to make free Skype calls to landline/mobile phones &mash; in both the US and Canada.
Building Resilient IP Networks: The Access Module
By Beng-Hui Ong, Kok-Keong Lee, Fung Lim
Jun 9, 2006
This chapter focuses on Ethernet switching technology, specifically Layer 2 network resiliency and how it should be built to provide a solid foundation for the Layer 3 network.
Services Over IP: Delivering New Value Through Next-Generation Networks
By IBM Business Consulting Services
Apr 28, 2006
The communications industry is facing unparalleled changes which are breaking down traditional industry boundaries. Providers from different technologies and backgrounds all focus on the same future — integrated service offerings for next-generation customers. IP technology is the catalyst for change, and the transition to all-IP networks is underway. How individual service providers respond to the reality of IP will create the foundations of the industry of tomorrow and determine winners and losers.
Get Caller ID Information on Your PCs via YAC: Yet Another Caller ID Program
By Kulvir Singh Bhogal
Jan 6, 2006
In this article, Kulvir Bhogal shows you how to use a free program called Yet Another Caller ID Program (YAC). YAC allows you see who's calling you immediately—right on your computer screen.
Scaling OSPF and IS-IS
By Jeff Doyle
Dec 1, 2005
Scalable may well be one of the most overused words in the network designer's lexicon. It applies to protocols, to software, to operating systems, to hardware architecture, and to networks. Scalable means, simply enough, the ability of the relevant entity (select one from the list just given) to get much bigger than it presently is without reducing performance, stability, or accuracy; making your customers angry; or getting you fired. This chapter covers scalability in OSPF and IS-IS.
IPSec Authentication and Authorization Models
By Vijay Bollapragada, Mohamed Khalid, Scott Wainner
Oct 21, 2005
This chapter covers IPSec features and mechanisms that are primarily targeted at the authentication of remote access users. You'll learn about XAUTH, which provides extended authentication for IPSec telecommuters by using authentication schemes such as RADIUS. MODECFG uses a push model to push attributes to the IPSec client.
Deploying Cisco CallManager and Unity Devices
By David Bateman
Oct 14, 2005
This chapter covers all the required tasks needed to add phones and gateways to a Cisco CallManager system. Four methods to add phones to the system are discussed: manual registration, Auto-registration, BAT, and TAPS.
Cisco CallManager Express VoIP Call Processing Features
By Danelle Au, Baldwin Choi, Rajesh Haridas, Christina Hattingh, Ravi Koulagi, Mike Tasker, Lillian Xia
Jul 15, 2005
In this chapter, you'll read about some of the more popular Cisco CME phone and call processing features. You will see examples of how these features can be configured and combined to provide a rich and flexible set of functions. You will also see how to configure call transfer and forwarding functions in a variety of network scenarios.
Mobile IP Technology and Applications
By Stefan Raab, Madhavi W. Chandra
Jul 8, 2005
This chapter highlights the major concepts of IOS Mobile IP configuration in a simple lab topology. It presents in detail the most important concepts in IOS Mobile IP configuration. We start out by using six routers to examine each component individually. Several alternatives requiring fewer routers are presented at the end of the chapter.
Troubleshooting Any Transport over MPLS Based VPNs
By Mark Lewis
Jun 10, 2005
MPLS Layer 3 VPNs allow a service provider to provision IP connectivity for multiple customers over a shared IP backbone, while maintaining complete logical separation of customer traffic and routing information. Learn more about MPLS Layer 3 VPNs in this sample chapter from Cisco.
Understanding High Availability of IP and MPLS Networks
By Iftekhar Hussain
Jan 14, 2005
This chapter describes major sources of network failures and provides an overview of techniques that are commonly used to improve availability of IP/MPLS networks. In particular, this chapter outlines mechanisms for reducing network downtime due to control-plane failures.

<< < Prev Page 1 2 3 4 Next >