Consolidate divergent networks into one seamless, high-performance communications landscape using cutting-edge SIP technology, tools, and techniques. Session Initiation Protocol (SIP): Controlling Convergent Networks explains how to deliver Internet phone calls, IMs, video streams, and teleconferences across legacy, wireless, and wireline networks. Learn how to manage SIP sessions, build layers and proxies, interpret control codes, set up gateways, and comply with IETF and 3GPP standards. You'll also get details on using the latest methods, maximizing QoS, and implementing security measures. Initiate, modify, and terminate IETF-compliant SIP sessionsConstruct SIP messages, requests, proxies, functions, and layersInterconnect WiFi, WiMax, VoIP, and wireline networksIncorporate TDM and SS7 systems using media and signaling gatewaysDetermine user locations with REGISTER and presence techniquesAugment functionality using RFCs and packet cable extensionsPrevent hijacking, tampering, DoS, DDoS, and BOTS attacksImplement reliable authentication, encryption, and intrusion detection policies
Consolidate divergent networks into one seamless, high-performance communications landscape using cutting-edge SIP technology, tools, and techniques. Session Initiation Protocol (SIP): Controlling Convergent Networks explains how to deliver Internet phone calls, IMs, video streams, and teleconferences across legacy, wireless, and wireline networks. Learn how to manage SIP sessions, build layers and proxies, interpret control codes, set up gateways, and comply with IETF and 3GPP standards. You'll also get details on using the latest methods, maximizing QoS, and implementing security measures. Initiate, modify, and terminate IETF-compliant SIP sessionsConstruct SIP messages, requests, proxies, functions, and layersInterconnect WiFi, WiMax, VoIP, and wireline networksIncorporate TDM and SS7 systems using media and signaling gatewaysDetermine user locations with REGISTER and presence techniquesAugment functionality using RFCs and packet cable extensionsPrevent hijacking, tampering, DoS, DDoS, and BOTS attacksImplement reliable authentication, encryption, and intrusion detection policies
Imprint | McGraw-Hill Companies |
Country of origin | United States |
Release date | July 2008 |
Availability | We don't currently have any sources for this product. If you add this item to your wish list we will let you know when it becomes available. |
Authors | Travis Russell |
Format | Electronic book text |
Pages | 500 |
ISBN-13 | 978-6611396640 |
Barcode | 9786611396640 |
Categories | |
LSN | 6611396640 |