Deploying Cisco® Voice over IP Solutions

Book description

Learn real-world voice-over-IP deployment solutions and strategies from the Cisco experts

Deploying Cisco Voice over IP Solutions covers:

  • Definitive guidelines on real-world VoIP deployments, the fundamentals of the latest VoIP solutions, and a look into the future of VoIP services

  • Different techniques for engineering and properly sizing traffic-sensitive voice networks

  • Basic concepts applicable to echo analysis, echo cancellation, and locating and eliminating echoes

  • Various QoS features applicable to voice

  • Detailed information on call admission control (CAC)

  • Dial plan configuration recommendations on Cisco H.323 gateways and gatekeepers used to support large dial plans

  • Basic tasks of designing a long-distance VoIP network

  • The two classes of hosted voice networks: Managed Multiservice (MMS) networks and packet voice VPNs

  • Fax services store and forward as well as real-time relay fax services

  • Sample configurations and step-by-step examples to help you learn how to build a VoIP network

  • Deploying Cisco Voice over IP Solutions provides networking professionals the knowledge, advice, and insight necessary to design and deploy voice over IP (VoIP) networks that meet customers' needs for scalability, services, and security. Beginning with an introduction to the important preliminary design elements that need to be considered before implementing VoIP, Deploying Cisco Voice over IP Solutions also demonstrates the basic tasks involved in designing an effective service provider-based VoIP network. You'll conclude with design and implementation guidelines for some of the more popular and widely requested VoIP services, such as prepaid services, fax services, and virtual private networks (VPNs).

    This book is a collaboration of Cisco Systems CCIE(r) engineers, technical marketing engineers, and systems engineers. You'll find design experience from people who have designed some of the world's largest VoIP networks.

    Table of contents

    1. Contents (1/2)
    2. Contents (2/2)
    3. Introduction (1/2)
    4. Introduction (2/2)
    5. Part I: Network Design Considerations
      1. Chapter 1 Understanding Traffic Analysis
        1. Traffic Theory Basics
        2. Traffic Models
        3. Selecting Traffic Models (1/2)
        4. Selecting Traffic Models (2/2)
        5. Applying Traffic Analysis to VoIP Networks (1/2)
        6. Applying Traffic Analysis to VoIP Networks (2/2)
        7. End-to-End Traffic Analysis Example
        8. Summary
      2. Chapter 2 Understanding Echo Analysis
        1. Echo Analysis Basics
        2. Locating an Echo
        3. Effects of Network Elements on Echo
        4. Echo Canceller (1/2)
        5. Echo Canceller (2/2)
        6. Customer Expectations About Echo
        7. Service Provider Expectations About Echo
        8. Configuring Gateways to Minimize Echo
        9. Process for Locating and Eliminating Echoes
        10. Echo Analysis Case Study (1/2)
        11. Echo Analysis Case Study (2/2)
        12. Summary
      3. Chapter 3 Understanding Quality of Service for Voice over IP
        1. Quality of Service Requirements
        2. Packet Classification
        3. QoS Queuing Mechanisms
        4. Fragmentation and Interleaving
        5. Traffic Shaping
        6. IP RTP Header Compression
        7. Differentiated Services for VoIP
        8. VoIP QoS over Leased Lines (Using PPP) Example
        9. VoIP QoS over Frame Relay Networks Example
        10. VoIP QoS over ATM Example
        11. RSVP—Dynamic Classification and Admission Control (1/3)
        12. RSVP—Dynamic Classification and Admission Control (2/3)
        13. RSVP—Dynamic Classification and Admission Control (3/3)
        14. Summary
      4. Chapter 4 Understanding Call Admission Control
        1. Call Admission Control
        2. CAC Mechanisms (1/2)
        3. CAC Mechanisms (2/2)
        4. Local CAC Mechanisms (1/2)
        5. Local CAC Mechanisms (2/2)
        6. Measurement-Based CAC Mechanisms (1/2)
        7. Measurement-Based CAC Mechanisms (2/2)
        8. Resource-Based CAC Mechanisms (1/5)
        9. Resource-Based CAC Mechanisms (2/5)
        10. Resource-Based CAC Mechanisms (3/5)
        11. Resource-Based CAC Mechanisms (4/5)
        12. Resource-Based CAC Mechanisms (5/5)
        13. Feature Combinations, Interactions, and Sequencing (1/2)
        14. Feature Combinations, Interactions, and Sequencing (2/2)
        15. Summary
    6. Part II: Network Design Strategies
      1. Chapter 5 Designing Static Dial Plans for Large VoIP Networks
        1. Components of Large H.323 Networks
        2. Design Methodology for Large-Scale Dial Plans
        3. H.323 Network Components in Large-Scale Dial Plans (1/5)
        4. H.323 Network Components in Large-Scale Dial Plans (2/5)
        5. H.323 Network Components in Large-Scale Dial Plans (3/5)
        6. H.323 Network Components in Large-Scale Dial Plans (4/5)
        7. H.323 Network Components in Large-Scale Dial Plans (5/5)
        8. Dial Plan Call Routing Tools and Features (1/2)
        9. Dial Plan Call Routing Tools and Features (2/2)
        10. Example: Use of Translation Rules, Technology Prefixes, and Dial-Peer Failover (1/2)
        11. Example: Use of Translation Rules, Technology Prefixes, and Dial-Peer Failover (2/2)
        12. Example: Implementing an International Dial Plan (1/4)
        13. Example: Implementing an International Dial Plan (2/4)
        14. Example: Implementing an International Dial Plan (3/4)
        15. Example: Implementing an International Dial Plan (4/4)
        16. Summary
      2. Chapter 6 Designing a Long-DistanceVoIP Network
        1. Long-Distance VoIP Network Features and Benefits
        2. Long-Distance VoIP Design Methodology
        3. Step 1: Identify Services
        4. Step 2: Determine Carriers or Providers
        5. Step 3: Determine Interconnection Types
        6. Step 4: Determine Call Topologies
        7. Step 5: Identify Deployment Scenario
        8. Step 6: Identify Functional Areas
        9. Step 7: Identify Required Hardware and Software Components (1/2)
        10. Step 7: Identify Required Hardware and Software Components (2/2)
        11. Step 8: Identify Design and Scalability Issues (1/4)
        12. Step 8: Identify Design and Scalability Issues (2/4)
        13. Step 8: Identify Design and Scalability Issues (3/4)
        14. Step 8: Identify Design and Scalability Issues (4/4)
        15. Step 9: Configure and Provision Components
        16. Summary
    7. Part III: Network Services
      1. Chapter 7 Managed Multiservice Networks and Packet Voice VPNs
        1. Managed Multiservice Networks
        2. Peer-to-Peer Managed Multiservice Networks
        3. Packet Voice Virtual Private Networks (1/2)
        4. Packet Voice Virtual Private Networks (2/2)
        5. Summary
      2. Chapter 8 Fax Services
        1. Traditional Fax over Circuit-Switched Networks
        2. Cisco Store and Forward Fax (1/7)
        3. Cisco Store and Forward Fax (2/7)
        4. Cisco Store and Forward Fax (3/7)
        5. Cisco Store and Forward Fax (4/7)
        6. Cisco Store and Forward Fax (5/7)
        7. Cisco Store and Forward Fax (6/7)
        8. Cisco Store and Forward Fax (7/7)
        9. T.38 Real-Time Fax and Never-Busy Fax Service (1/3)
        10. T.38 Real-Time Fax and Never-Busy Fax Service (2/3)
        11. T.38 Real-Time Fax and Never-Busy Fax Service (3/3)
        12. Summary
      3. Chapter 9 Unified Messaging
        1. Market Scope
        2. Unified Messaging Features
        3. Components of a Unified Messaging System (1/2)
        4. Components of a Unified Messaging System (2/2)
        5. Typical uOne Call Flows (1/3)
        6. Typical uOne Call Flows (2/3)
        7. Typical uOne Call Flows (3/3)
        8. Deploying Unified Messaging Services in a Service Provider Environment (1/2)
        9. Deploying Unified Messaging Services in a Service Provider Environment (2/2)
        10. Deploying Unified Messaging for Dial Internet Access (1/2)
        11. Deploying Unified Messaging for Dial Internet Access (2/2)
        12. Deploying Unified Messaging for Dedicated Internet Access
        13. Redundancy and Load Balancing (1/2)
        14. Redundancy and Load Balancing (2/2)
        15. Unified Messaging Configuration Examples (1/2)
        16. Unified Messaging Configuration Examples (2/2)
        17. Summary
      4. Chapter 10 Prepaid Services
        1. Debit Card Application Overview
        2. Debit Card Application Functional Call Flow (1/2)
        3. Debit Card Application Functional Call Flow (2/2)
        4. Architecture for Internally Managed Prepaid Services
        5. Prepaid Services Configuration Guidelines (1/2)
        6. Prepaid Services Configuration Guidelines (2/2)
        7. Internally Managed Prepaid Services Call Example (1/2)
        8. Internally Managed Prepaid Services Call Example (2/2)
        9. Using OSP for Clearinghouse Services
        10. OSP Clearinghouse Operation and Call Flow
        11. Architecture for OSP
        12. OSP Clearinghouse Solution Configuration Guidelines (1/2)
        13. OSP Clearinghouse Solution Configuration Guidelines (2/2)
        14. Troubleshooting OSP
        15. OSP Clearinghouse Configuration Examples (1/2)
        16. OSP Clearinghouse Configuration Examples (2/2)
        17. Summary
    8. Part IV: Appendixes
      1. Appendix A: Erlang B Traffic Model (1/4)
      2. Appendix A: Erlang B Traffic Model (2/4)
      3. Appendix A: Erlang B Traffic Model (3/4)
      4. Appendix A: Erlang B Traffic Model (4/4)
      5. Appendix B: Extended Erlang B Traffic Model (1/11)
      6. Appendix B: Extended Erlang B Traffic Model (2/11)
      7. Appendix B: Extended Erlang B Traffic Model (3/11)
      8. Appendix B: Extended Erlang B Traffic Model (4/11)
      9. Appendix B: Extended Erlang B Traffic Model (5/11)
      10. Appendix B: Extended Erlang B Traffic Model (6/11)
      11. Appendix B: Extended Erlang B Traffic Model (7/11)
      12. Appendix B: Extended Erlang B Traffic Model (8/11)
      13. Appendix B: Extended Erlang B Traffic Model (9/11)
      14. Appendix B: Extended Erlang B Traffic Model (10/11)
      15. Appendix B: Extended Erlang B Traffic Model (11/11)
      16. Appendix C: TCL IVR Scripts (1/2)
      17. Appendix C: TCL IVR Scripts (2/2)
    9. Index
      1. A
      2. B
      3. C
      4. D
      5. E
      6. F
      7. G
      8. H
      9. I
      10. K–L
      11. M
      12. N
      13. O
      14. P
      15. Q
      16. R
      17. S
      18. T
      19. U
      20. V
      21. W
      22. Z

    Product information

    • Title: Deploying Cisco® Voice over IP Solutions
    • Author(s): Jonathan Davidson, Tina Fox
    • Release date: November 2001
    • Publisher(s): Cisco Press
    • ISBN: 9781587050305