نتایج جستجو برای: voice over internet protocolvoip
تعداد نتایج: 1314036 فیلتر نتایج به سال:
The Internet is under rapid growth and continuous evolution in order to accommodate an increasingly large number of applications with diverse service requirements. In particular, Internet telephony, or voice over IP is one of the most promising services currently being deployed. Besides the potentially significant cost reduction, Internet telephony can offer many new features and easier integra...
Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract This document discusses IAB concerns about effective end-to-end congestion control for best-effort voice traffic in the Internet. These concerns have to do with fairness, user quality, and with the dangers of conges...
Ghana was one of the first countries in sub-Saharan Africa to gain Internet access. By 1996, three Internet service providers (ISPs) were competing. During the Internet boom years, 1998-2000, the ISP and Internet Café industries in Ghana grew rapidly. In 2004, policy-makers are struggling with the question of how to fund telecommunications deployment in rural Ghana. The question is urgent becau...
In this paper, we present our research on characterizing voice and video traffic behavior in large-scale Internet Videoconferencing systems. We built a voice and video traffic quality measurement testbed to collect Videoconferencing traffic traces from several sites all over the world that were connected to our testbed via disparate network paths on the Internet. Our testbed also featured the H...
Spam over Internet Telephony is becoming a large problem of the Voice over IP Architectures. Voice over IP has become a valid alternative to the Public Switched Telephone Network and it has a new paradigm for providing telephony services at a lower cost and higher flexibility. In the meantime, with Voice over IP the privacy becomes so hard and the benefits introduced are as strong as the securi...
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . i Declaration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iii Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vi List of Abbreviations and Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . xv
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید