Monday, October 03, 2005

What are the next steps for VoIP?

NETWORK WORLD NEWSLETTER: STEVE TAYLOR AND LARRY HETTICK ON
CONVERGENCE
10/03/05
Today's focus: What are the next steps for VoIP?

Dear networking.world@gmail.com,

In this issue:

* NGN panelists discuss upcoming challenges for VoIP
* Links related to Convergence
* Featured reader resource
_______________________________________________________________
This newsletter is sponsored by WiredRed Software

e/pop Web Conferencing - Share desktop, apps, PowerPoint and
multiparty video. Secure connections with SSL and even your own
PKI. Easy admin with user, feature and QoS controls. Software or
service: easy 5 minute server install, or one phone call hosted
service activation. Free trial.
http://www.fattail.com/redir/redirect.asp?CID=116699
_______________________________________________________________
DOES WMM MAKE YOU GO HMMM?

Eager to spur interoperable QoS among different vendors'
wireless gear, the Wi-Fi Alliance developed the Wi-Fi Multimedia
(WMM) specification. WMM is designed to support consumer and
corporate applications and works with all three 802.11 wireless
physical layer standards. For more on how WMM handles the
prioritization of data packets, DCF, CM and more, click here:
http://www.fattail.com/redir/redirect.asp?CID=116111
_______________________________________________________________

Today's focus: What are the next steps for VoIP?

By Steve Taylor and Larry Hettick

At last week's Next Generation Networks conference held in
Washington, D.C. we had the chance to attend several interesting
panel discussions but none more interesting than the discussion
about upcoming challenges for VoIP. In fact, most of the buzz at
NGN was about VoIP, convergence and IP Multimedia Subsystem
<http://www.networkworld.com/news/2005/092005-ims.html?rl>.

The VoIP panel discussion, entitled "VoIP's Next Challenges,"
included panelists Larry O'Pella director of strategic solutions
at Alcatel, Chris Miller distinguished member of consulting
staff for Lucent Worldwide Services, and Mike Hluchyj founder
and CTO of Sonus Networks.

Hluchyj noted that the issues discussed were VoIP's next steps
rather than challenges. Among those steps is the deployment of
VoIP in endpoint broadband access devices, said Hluchyj. He also
highlighted the deployment of VoIP over mobile EV-DO Rev A
networks, noting that mobile operators can get more than 50% of
increased spectrum efficiency using Rev A, as opposed to the
previous 1XRTT EV-DO versions. He predicted that VoIP's
acceptance would proceed even more quickly for mobile operators
than for wireline operators due to the mobile carriers' rapid
deployment of broadband access.

He also commented about the need for VoIP packet peering.
Although he correctly pointed out that peering architecture can
open the network to security threats, the use of "network border
switching" (a.k.a. session border controllers) can counter VoIP
packet peers by surrounding and protecting the individual
networks.

Hluchyj also noted that additional work on security is needed,
especially in the areas of traffic policing, authentication,
encryption and trust.

Next time, we'll highlight Lucent's Chris Miller's comments. Do
you agree or disagree with Hluchyj's observations? Please feel
free to e-mail us with your thoughts.

The top 5: Today's most-read stories

1. How to solve Windows system crashes in minutes
<http://www.networkworld.com/nlconvergence7597>
2. Verizon CTO lays out next-gen network plans
<http://www.networkworld.com/nlconvergence7985>
3. McAfee, Omniquad top anti-spyware test
<http://www.networkworld.com/nlconvergence6913>
4. Digging out new rootkits
<http://www.networkworld.com/nlconvergence7986>
5. Skype: Hazardous to network health?
<http://www.networkworld.com/nlconvergence7828>

_______________________________________________________________
To contact: Steve Taylor and Larry Hettick

Steve Taylor is president of Distributed Networking Associates
and publisher/editor-in-chief of Webtorials. For more detailed
information on most of the topics discussed in this newsletter,
connect to Webtorials <http://www.webtorials.com/>, the premier
site for Web-based educational presentations, white papers, and
market research. Taylor can be reached at
<mailto:taylor@webtorials.com>

Larry Hettick is an industry veteran with more than 20 years of
experience in voice and data. He is Vice President for Telecom
Services and Infrastructure at Current Analysis, the leading
competitive response solutions company. He can be reached at
<mailto:lhettick@currentanalysis.com>
_______________________________________________________________
This newsletter is sponsored by Sybase

It sounds so simple: if you collect enough business information,
you'll glean valuable insights that can drive both revenue
growth and competitive advantage. Along the way, however,
companies are discovering that managing the explosive growth of
online data can prove a formidable challenge. Here's how to
assess your data management style, and maximize your
opportunities to turn online data into business opportunity.
Click here for more on taming the data explosion.
http://www.fattail.com/redir/redirect.asp?CID=116662
_______________________________________________________________
ARCHIVE LINKS

Archives of the Convergence newsletter:
http://www.networkworld.com/newsletters/converg/index.html
_______________________________________________________________
Keep Private Data Secure - Safeguarding Applications

Recent studies have shown that almost 75 percent of attacks are
now at the application layer. Find out what you can do to
cost-effectively secure applications watch "Safeguarding Your
Web Applications" now.
http://www.fattail.com/redir/redirect.asp?CID=116042
_______________________________________________________________
FEATURED READER RESOURCE

The Trend Micro Threat Map

The Trend Micro Threat Map dynamically displays real-time data
to show worldwide trends in virus and content security threats
as they happen. Collected from actual computer infections, the
Threat Map can be used to help determine appropriate security
policies, based on the prevalence of threats that can adversely
affect your business.

<http://www.networkworld.com/go/trendmicro/trend_frr>
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2

International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>

To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>

Subscription questions? Contact Customer Service by replying to
this message.

This message was sent to: networking.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________

Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>

Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>

Copyright Network World, Inc., 2005

No comments:

Post a Comment