H323 open source code
: Www.openh323.org
There are protocol stacks, soft terminals (openphone, ohphone), and opengk, openmcu .....
Http://www.voxgratia.org/documents.html
Open g.729
I. Features of ECHO in Internet voice communicationCompared with traditional telephones, real-time voice transmission over the Internet has a fatal weakness. That is, the quality of voice is poor, and there are many factors that affect the quality
SIP is an application control signaling protocol proposed by IETF. As the name implies, it is used to initiate a session. It can be used to create, modify, and end multimedia session processes attended by multiple participants. Participants can
I recently found out doing a sip capture on a FreeBSD system is a little different than centos or other Linux distributions. here is a easy to use command that will grab the SIP packets from TCP dump. this will give you an easy to read text file for
Principle: InProgramAfter the program is switched to the background, an action is executed every 10 minutes to wake up the program, thus ensuring that the program runs in the background.
1. Add the uibackgroundmodes key value to info. plist.
Let
"IPv6 configured Commands"
IPv6 Install/Installation IPv6, limited to XP system use
IPv6 unicast-routing/Enable IPv6 forwarding, configuring on the router
Show IPv6 router/view IPv6 routing Table
IPv6 router RIP test/enable RIP protocol, named
To the same version to import backup VOS2009 data interrupts the current call login ssh. Terminating vos service/etc/init.d/mbx2009d Stop/etc/init.d/vos2009dall stop/etc/init.d/mysql STOPCD/VAR/LIB/MYSQLCP-DPRF Vosdb/root/vosdbdate/etc/init.d/mysql
1. VoIP1) First, modify the plist configuration of the application and add the following settings:Application does not run in Background: NoRequired background modes: VoIPNote: after these configurations are added, the application will automatically
Document directory
Registering multiple user devices
The via header, forking, loop prevention
An example using proxies
User location
Let's step out of the SIP layers and see what we have so far: using the layers, we can now create and receive
Things can become more complex in scenarios other than those outlined above. for example, you might use prack (defined in RFC 3262), which is a provisional response acknowledgement. there are some cases in which we wowould like to guarantee the
Document directory
For users of hash tables, this is an instant. The hash table operation is very fast. In computer programs, if you need to search for thousands of records within one second, a hash table (such as the spelling checker) is usually
Some time ago, I was dragged to. Net for two months and worked overtime every day. Alas, This Is What outsourcing companies do.
Now you don't have to work overtime. You can study the audio and video communication based on SIP.
After studying blogs
Google is testing a more practical function for Gmail Chat: users can directly call or receive Google Voice calls in the pop-up dialog box of Gmail. A new phone window with a digital keyboard will appear in the Gmail Chat Window, where you can also
I found a very good sip Forum:
Huisi Communication Technology Forum Http://www.citiy.com A series of slides for SIP This handout is copyrighted by Zheng Yu. Allows copying, distributing, and customization under "GNU Free
Original address: http://blog.sina.com.cn/s/blog_4a0823ca010004ye.html in a TCP/IP based network, our information, including mail, Im,web and so on all PCs---to---pc transmission, I think most people still understand that. Because each host has a separate IP address, they pass certain devices, such as switches, and then routed, looking for the next node of different network segments, until the message is transferred to the address they want to reach the destination. Of course, the premise is tha
are used to determine the accessibility of a remote endpoint.
Ii. sctp Application
1. overall frame of IP network 7 signaling transmission
This article takes sctp as an example to discuss the application of SS7 in VoIP applications. The overall framework for IETF-Based IP network transmission signaling 7 is described in rfc2719. Sctp is mainly used to transmit ISUP messages between the signaling gateway (S
Introduction
Communication providers and their partners and users are increasingly eager for a new generation of IP-based services. Now we have the SIP Session Initiation Protocol. SIP was born less than a decade ago in the computer science laboratory.
It is the first protocol suitable for multi-user sessions in various media content. Now it has become the specification of the Internet Engineering Task Group (IETF.
Today, more and more carriers, CLEC competitors, and ITSPIP telephone service pr
software for carrier networks. Network equipment suppliers (Nev) are developing hardware that supports sip signaling and services. Currently, many IP phones, user agents, network proxy servers, VOIP gateways, media servers, and application servers are using SIP.
SIP uses similar authoritative protocols, such as web Hypertext Transfer Protocol (HTTP) formatting and Simple Mail Transfer Protocol (SMTP) email protocols-evolved and evolved into a new and
applications;Completely part of the service-oriented architecture SOA)Can be displayed in any type of browser or device, also known as multi-channel transmission;Provides a personalized view of applications through the WebLogic Portal.At present, the capabilities of these combinations are generally referred to as the Service Delivery Platform, SDP ). This example blur the differences between wireless, wired, VoIP, and Web-based transfer channels. In
some telecommunications business software developed by third-party service providers (such as common text messages, caIling, or zhutai services ).
The first two types of software are the main development areas of open-source communication projects due to their strong versatility and mature and stable technologies and standards. Next, we will briefly describe the status of open source software in the communication industry through several mature protocol stack software, that is, the second type
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.