Magnusson, 2006 - Google Patents
SIP trunking benefits and best practicesMagnusson, 2006
View PDF- Document ID
- 6349450484840619294
- Author
- Magnusson J
- Publication year
- Publication venue
- Ingate Systems whitepaper
External Links
Snippet
Back in the days of wireline telephony, when all phone calls went over the PSTN, businesses would purchase “trunks”–a dedicated line or a bundle of circuits–from their service provider. Today, we have adapted the concept of “trunking” to the IP-enabled …
- 101700064519 PSTN 0 abstract description 57
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/42025—Calling or Called party identification service
- H04M3/42034—Calling party identification service
- H04M3/42059—Making use of the calling party identifier
- H04M3/42068—Making use of the calling party identifier where the identifier is used to access a profile
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kuhn et al. | Security considerations for voice over IP systems | |
Hautakorpi et al. | Requirements from Session Initiation Protocol (SIP) Session Border Control (SBC) Deployments | |
US7936746B2 (en) | Multimedia communication session coordination across heterogeneous transport networks | |
KR101280281B1 (en) | An improved method and system for ip multimedia bearer path optimization through a succession of border gateways | |
Thermos et al. | Securing VoIP Networks | |
US7587757B2 (en) | Surveillance implementation in managed VOP networks | |
US7953070B1 (en) | Client configuration download for VPN voice gateways | |
Patrick | Voice over IP security | |
US20050243803A1 (en) | Dual-path data network connection method and devices utilizing the public switched telephone network | |
US7684385B2 (en) | Inter-enterprise telephony using a central brokerage device | |
Ayokunle | Integrating Voice over Internet Protocol (VoIP) technology as a communication tool on a converged network in Nigeria | |
Magnusson | SIP trunking benefits and best practices | |
Cao et al. | Security analysis and solutions for deploying IP telephony in the critical infrastructure | |
Hasan et al. | Collective study on security threats in VOIP networks | |
Habib et al. | Improving QoS of VoIP over WLAN (IQ-VW) | |
El-Mousa et al. | The design of a secure SIP-based architecture for broadband service providers | |
Cumming | Sip Market Overview | |
Al Saidat et al. | Develop a secure SIP registration mechanism to avoid VoIP threats | |
Abdallah | Secure Intelligent SIP Services | |
Arkin | Why ET Can’t Phone Home?: Security Risk Factors with IP Telephony based Networks | |
Niccolini et al. | IP Telephony Cookbook | |
Tzvetkov et al. | Service provider implementation of SIP regarding security | |
Pelaez¹ et al. | Patterns for VoIP signaling protocol architectures | |
Sweeney et al. | Commercial Interoperable VoIP IA Architecture | |
Lamba et al. | Security traits of VoIP |