...ii Cisco TelePresence Fundamentals Cisco TelePresence Fundamentals Tim Szigeti, Kevin McMenamy, Roland Saville, Alan Glowacki Copyright©2009 Cisco Systems, Inc. Published by: Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the publisher, except for the inclusion of brief quotations in a review. Printed in the United States of America First Printing May 2009 Library of Congress Cataloging-in-Publication Data Cisco TelePresence fundamentals / Tim Szigeti ... [et al.]. p. cm. ISBN-13: 978-1-58705-593-5 (pbk.) ISBN-10: 1-58705-593-7 (pbk.) 1. Multimedia communications. 2. Computer conferencing. I. Szigeti, Tim. II. Title. [DNLM: 1. Cisco Systems, Inc. ] TK5105.15.C57 2009 006.7--dc22 2009013062 ISBN-13: 978-1-58705-593-5 ISBN-10: 1-58705-593-7 Warning and Disclaimer This book is designed to provide information about Cisco TelePresence. Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information is provided on an “as is” basis. The authors, Cisco Press, and Cisco Systems, Inc. shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book or...
Words: 17200 - Pages: 69
...Introduction: Voice over IP or VoIP is a relatively new modern way of digital voice communication that relies on many communication protocols, technologies, methodologies, and transmission techniques. The distinctive feature of VoIP is that communication happens over the internet. VoIP is a revolutionary technology that has the potential to compete with the world’s telephone systems. Some engineers have indicated that the creation of VoIP is basically a clever “reinvention of the wheel” that relates to telephone communication. Contrary to the misconception that VoIP induces, it does not deal only with voice transmission. VoIP technology can be considered a medium of transmission also for fax, SMS, voice messaging applications that are transmitted via the Internet rather than the PSTN or public switched telephone network. Some may refer to VoIP as IP telephone but these two terms are actually different since IP telephone has to do with digital telephony systems that use IP protocols for voice communication, while VoIP is actually a subset of IP telephone that transports phone calls and other type of digital information. VoIP has a relatively short history since it began spreading in 1994 as a way of communication developed by some Israeli people. Later in 1995, the first VoIP company launched on the market, "Vocaltec". By releasing an internet phone software that could be added to a computer and its peripherals while using the internet, Vocaltec's software made it possible...
Words: 4209 - Pages: 17
...Dell Optiplex 3020 * TYPETower ------------------------------------------------- * BUNDLED OSWindows (7) ------------------------------------------------- * CPU FAMILYCore i5 ------------------------------------------------- * PROCESSOR SPEED3.2 GHz ------------------------------------------------- * SYSTEM RAM8 GB * HARD DRIVE(S)1 TB (total) Platter ------------------------------------------------- * RELEASEDNovember 15, 2013 ------------------------------------------------- General * TypeTower * Bundled OSWindows (7) ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- Processor * Processor makeIntel * CPU familyCore i5 * CPU model4570 * Processor speed3.2 GHz * Number of CPUs1 * Cache size3 MB L3 cache ------------------------------------------------- Video * Graphics adapterIntegrated * Graphics (integrated)Intel ------------------------------------------------- Optical media * Optical drives1 * Disc loading typeTray loading * Readable optical mediaDVD (8x), CD (8x) * Optical write supportYes * Writable optical mediaDVD, CD * Writable DVD formatsDVD-RW, DVD+RW * CD formatsCD-RW ------------------------------------------------- Networking * Ethernet10/100/1000 [Gigabit] * Ethernet ports1 ports ...
Words: 3534 - Pages: 15
...THE ART OF CYBER WAR — ASYMMETRIC PAYOFFS LEAD TO MORE SPENDING ON PROTECTION 151 As Physical Security Converges With IT Security and Becomes More Network-Based, Can Cisco Compete? Cisco recently introduced new video surveillance IP cameras and monitoring software targeted for small businesses. As corporate security technology and services become increasingly network-delivered and database-driven, the physical security market presents a compelling incremental growth opportunity for Cisco that we believe can exceed the billion dollar annual revenue threshold in the next 35 years. The physical security industry has been undergoing a paradigm shift toward convergence, whereby previously disjointed functions of IT security and physical security are experiencing greater formal cooperation. Organizations continue to implement more IP-based video surveillance cameras and building access controls both to upgrade capabilities and to reduce operational costs. Deploying IP-based security upgrades capabilities and reduces operational costs. Through the IP network a security system can assign priority to data and automatically discover new nodes such as IP cameras and control sensors, eliminating the time and effort of manual provisioning. Shifting building access controls from isolated networks to existing IP networks that house data, voice, and video can improve incident detection and assessment, authenticating both the user and device to provide efficient integrity checks. • Video...
Words: 10724 - Pages: 43
...Project in Data Communication Helen Grace A. Fernandez 201011542 February 9, 2011 Contents 1 Reaction to the Game 2 Description of Hardware 2.1 First Generation . . . . . . . . . 2.1.1 1G Base Station . . . . . 2.1.2 Copper Node . . . . . . . 2.1.3 Coax Node . . . . . . . . 2.1.4 Optical Node . . . . . . . 2.1.5 20 RAS 5850s . . . . . . . 2.1.6 WAN Switch IGX MGX 2.1.7 WAN Switch BPX . . . . 2.1.8 Router 7200 . . . . . . . . 2.1.9 Router 7500 . . . . . . . . 2.1.10 ONS 15454 . . . . . . . . 2.1.11 Mobile Switch MSC . . . 2.1.12 Cable Headend Analog . 2.1.13 Cable Headend Digital . 2.1.14 Telephone Switch . . . . 2.1.15 Second Generation . . . . 2.1.16 50 WiFi Base Stations . 2.1.17 25 MSPPs . . . . . . . . . 2.1.18 10 CMTS UBRs . . . . . 2.1.19 50 DSLAMs . . . . . . . . 2.1.20 25 MWRs . . . . . . . . . 2.1.21 20 Cat2000 Switches . . 2.1.22 Router 7600 . . . . . . . . 2.1.23 Router 10000 . . . . . . . 2.1.24 Router 12000 . . . . . . . 1 8 10 10 10 12 13 14 15 16 17 18 20 22 23 24 25 26 27 28 29 30 31 32 33 34 36 38 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....
Words: 35981 - Pages: 144
...Emory University | Internetworking Technology Handbook | [Type the document subtitle] | | SAVIOUR EMMANUEL UDOBONG | [Pick the date] | [Type the abstract of the document here. The abstract is typically a short summary of the contents of the document. Type the abstract of the document here. The abstract is typically a short summary of the contents of the document.] | Internetworking Basics An internetwork is a collection of individual networks, connected by intermediate networking devices, that functions as a single large network. Internetworking refers to the industry, products, and procedures that meet the challenge of creating and administering internetworks. The following articles provide information about internetworking basics: * Internetworking Basics * Introduction to LAN Protocols * Introduction to WAN Technologies * Bridging and Switching Basics * Routing Basics * Network Management Basics * Open System Interconnection Protocols LAN Technologies A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers, servers, and other devices. LANs offer computer users many advantages, including shared access to devices and applications, file exchange between connected users, and communication between users via electronic mail and other applications. The following articles provide information different LAN technologies: * Ethernet...
Words: 217433 - Pages: 870
...Securing Cisco Routers (SECR) Glossary A AAA ABEND Access Access attacks Authentication, Authorization, Accounting. Allows all facets of user security to be defined on a central server. Abnormal END. Abnormal termination of software. 1.) In dealing with network security it is an all-encompassing term that refers to unauthorized data manipulation, system access, or privileged escalation. An all-encompassing term that refers to unauthorized data manipulation, system access, or privileged escalation. Unauthorized data retrieval is simply reading, writing, copying, or moving files that are not intended to be accessible to the intruder. Limiting the flow of information from the resources of a system to only the authorized persons or systems in the network. See ACE. access control Access Control Entry access control list See ACL. access device access layer Access Method Hardware component used in your signaling controller system: access server or mux. The point at which local end users are allowed into the network. 1.) Generally, the way in which network devices access the network medium. 2.) Software within an SNA processor that controls the flow of information through a network. Defines access rights and privileges for the network users. The access policy should provide guidelines for connecting external networks, connecting devices to a network, and adding new software to systems. The remote computer system which connects a personal computer to the Internet. Access Virtual...
Words: 23221 - Pages: 93
...Intel® PROSet/Wireless WiFi Connection Utility User's Guide Intel® PROSet/Wireless WiFi Connection Utility User's Guide Supported wireless adapters: Intel® Intel® Intel® Intel® Intel® Intel® Intel® Intel® Intel® Intel® Intel® Intel® Centrino® Ultimate-N 6300 Centrino® Advanced-N + WiMAX 6250 Centrino® Advanced-N 6200 Centrino® Wireless-N 1000 WiMAX/WiFi Link 5350 WiFi Link 5300 WiMAX/WiFi Link 5150 WiFi Link 5100 Wireless WiFi Link 4965AGN Wireless WiFi Link 4965AG_ PRO/Wireless 3945ABG Network Connection PRO/Wireless 3945_BG Network Connection With your WiFi network card, you can access WiFi networks, share files or printers, or even share your Internet connection. All of these features can be explored using a WiFi network in your home or office. This WiFi network solution is designed for both home and business use. Additional users and features can be added as your networking needs grow and change. Depending on the model of your Intel WiFi adapter, your adapter is compatible with 802.11a, 802.11b, 802.11g, and 802.11n (draft 2.0) wireless standards. Operating at 5 GHz or 2.4 GHz frequency at data rates of up to 450 Mbps, you can now connect your computer to existing high-speed networks that use multiple access points within large or small environments. Your WiFi adapter maintains automatic data rate control according to the access point location and signal strength to achieve the fastest possible connection. All of your wireless network connections are easily managed...
Words: 75784 - Pages: 304
...VOICE, VIDEO, AND DATA NETWORK CONVERGENCE VOICE, VIDEO, AND DATA NETWORK CONVERGENCE ARCHITECTURE AND DESIGN, FROM VOIP TO WIRELESS JUANITA ELLIS CHARLES PURSELL JOY RAHMAN Amsterdam Boston London New York Oxford San Francisco Singapore Sydney Tokyo Paris San Diego This book is printed on acid-free paper. Copyright 2003, Elsevier Science (USA). All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Permissions may be sought directly from Elsevier’s Science & Technology Rights Department in Oxford, UK: phone: (+44) 1865 843830, fax: (+44) 1865 853333, e-mail: permissions@elsevier.com.uk. You may also complete your request on-line via the Elsevier Science homepage (http://elsevier.com), by selecting “Customer Support” and then “Obtaining Permissions.” Explicit permission from Academic Press is not required to reproduce a maximum of two figures or tables from an Academic Press chapter in another scientific or research publication provided that the material has not been credited to another source and that full credit to the Academic Press chapter is given. Academic Press An imprint of Elsevier Science 525 B Street, Suite 1900, San Diego, California 92101-4495, USA http://www.academicpress.com Academic Press 84 Theobald’s Road, London WC1X 8RR...
Words: 125371 - Pages: 502
...PROJECT REPORT ON A STUDY ON INTERNET SHARING SITE YOUTUBE.COM EXECUTIVE SUMMARY INTERNET -The Internet is a worldwide, publicly accessible network of interconnected computer networks that transmit data by packet switching using the standard Internet Protocol (IP). It is a "network of networks" that consists of millions of smaller domestic, academic, business, and government networks, which together carry various information and services, such as electronic mail, online chat, file transfer, and the interlinked Web pages and other documents of the World Wide Web. COMMON USES OF THE INTERNET - Email, Remote access, Collaboration, File sharing, Streaming media, Voice telephony, Leisure, and Marketing. VIDEOS SHARING SITES - Video sharing refers to websites or software where a user can distribute their video clips. Some services may charge, but the bulk of them offer free services. Many services have options for private sharing and other publication options. YOUTUBE.COM – Founded in February 2005, YouTube is the leader in online video, and the premier destination to watch and share original videos worldwide through a Web experience. YouTube allows people to easily upload and share video clips on www.YouTube.com and across the Internet through websites, mobile devices, blogs, and email. FACTS ABOUT YOUTUBE – Founded in February of 2005 by three former employees of eBay's PayPal unit. In July, more than 30 million people...
Words: 18981 - Pages: 76
...Full Circle THE INDEPENDENT MAGAZINE FOR THE UBUNTU LINUX COMMUNITY ISSUE #90 - October 201 4 Photo: miss_millions (Flickr.com) P R I S O N AR C H I T E C T BUILD YOUR OWN OPEN SOURCE PRISON Fu ll Ci rcle M a g a zi n e i s n e i th e r a ffi li a te d wi th , n o r e n d o rse d b y, Ca n o n i ca l Ltd . full circle magazine #90 1 contents ^ HowTo OpenConnect to Cisco p.1 4 Full Circle THE INDEPENDENT MAGAZINE FOR THE UBUNTU LINUX COMMUNITY Linux News p.04 BACK NEXT MONTH LibreOffice p.1 5 Command & Conquer p.1 2 Arduino p.25 LinuxLabs p.XX Broadcast With WCS p.1 7 Linux Labs p.28 Review p.36 My Story p.37 BACK NEXT MONTH Blender p.XX Letters p.40 Tuxidermy p.41 Q&A p.42 BACK NEXT MONTH Inkscape BACK NEXT MONTH Ubuntu Women p.XX Ubuntu Games p.44 Graphics p.22 Security p.XX The articles contained in this magazine are released under the Creative Commons Attribution-Share Alike 3.0 Unported license. This means you can adapt, copy, distribute and transmit the articles but only under the following conditions: you must attribute the work to the original author in some way (at least a name, email or URL) and to this magazine by name ('Full Circle Magazine') and the URL www.fullcirclemagazine.org (but not attribute the article(s) in any way that suggests that they endorse you or your use of the work). If you alter, transform, or build upon this work, you must distribute the resulting work under...
Words: 22047 - Pages: 89
...This page was intentionally left blank This page was intentionally left blank Hands-On Ethical Hacking and Network Defense Second Edition Michael T. Simpson, Kent Backman, and James E. Corley ———————————————————————— Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. This is an electronic version of the print textbook. Due to electronic rights restrictions, some third party content may be suppressed. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. The publisher reserves the right to remove content from this title at any time if subsequent rights restrictions require it. For valuable information on pricing, previous editions, changes to current editions, and alternate formats, please visit www.cengage.com/highered to search by ISBN#, author, title, or keyword for materials in your areas of interest. Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated...
Words: 185373 - Pages: 742
...TB 11-5800-229-10 TECHNICAL BULLETIN SYSTEM OVERVIEW GUIDE WARFIGHTER INFORMATION NETWORK - TACTICAL (WIN-T) INCREMENT 2 FInal Draft DISTRIBUTION STATEMENT C: Distribution authorized to U.S. Government Agencies and their contractors. This publication is required for administrative and operational purposes. This determination was made on 15 March 2011. Other requests for this document must be referred to Commander, U.S. Army CECOM Life Cycle Management Command (LCMC), ATTN: AMSEL-LCL-ECM, Aberdeen Proving Ground, MD 21005-1846. WARNING: This document contains technical data whose export is restricted by the Arms Export Control Act (Title 22, U.S.C., Sec 2751, et. seq.) or the Export Administration Act of 1979, as amended, Title 50A, U.S.C., App. Violations of these export laws are subject to severe criminal penalties. Disseminate in accordance with provisions of DoD Directive 5230.25.. DESTRUCTION NOTICE - Destroy by any method that will prevent disclosure of contents or reconstruction of the document. HEADQUARTERS, DEPARTMENT OF THE ARMY 15 JUNE 2012 TB 11-5800-229-10 LIST OF EFFECTIVE PAGES/WORK PACKAGES NOTE: The portion of text affected by the change is indicated by a vertical bar in the outer margins of the page. Changes to illustrations are indicated by a vertical bar adjacent to the title. Zero (0) in the “Change No.” column indicates an original page or work package. Date of issue for the original manual is: Original: 15 June 2012 TOTAL...
Words: 42929 - Pages: 172
...加拿大机械工程: 加拿大作为资源型发达国家,毗邻美国,机械工程专业在各种领域(如石油、天然气、木材、航空航天、能源、汽车等)都有颇多涉及,机械工程师一直高居各类人才需求的前5位。而作为这一行业的从业人员,毕业生需要在加拿大各省或地方的专业工程师协会登记,并经审核后获得由工程师协会颁发的专业资格证书。无论选择在国外发展还是回国效力,在发达国家积累的同行业工作经验都将是留学生的宝贵财富。 机械工程是以有关的自然科学和技术科学为理论基础,结合生产实践中的技术经验,研究和解决在开发、设计、制造、安装、运用和修理各种机械中的全部理论和实际问题的应用学科。 机械工程的服务领域广阔而多面,凡是使用机械、工具,以至能源和材料生产的部门,无不需要机械工程的服务。 【机械工程职业前景 】 就业方向:毕业生可在有关企业、科研单位、国家机关和高等院校从事机电产品设计、制造、管理、营销、科研和教学等工作。机械工程师主要在专业顾问公司、电力行业、生产及加工行业、运输行业工作。 【其雇主类型如下】 ¬ 专业服务机构(26.7%) ¬ 运输工具生产行业(11.9%) ¬ 机械制造行业(8.4%) ¬ 金属加工业(7.0%) ¬ 建筑行业(4.3%) ¬ 电力行业(4.2%) ¬ 其他制造行业(3.9%) 工程类专业作为留学热门专业,良好的就业环境和优厚的收入水平一直是这个专业的两大亮点。 【2012薪酬】 加拿大大学与雇主协会(National Association of Colleges and Employers)公布了今年春季毕业的毕业生的起薪,据统计,本科毕业生的起薪达到了55,000 左右,比去年提高了3.5%。而机械工程类专业毕业的学生遥遥领先于其他专业(如商科和管理类)达到了66,000 元,比去年上升了3.8%。 加拿大化学工程: 化学工程不同于化学专业,而且比化学专业更复杂。化学工程是将化学知识应用到了商业领域,结合了化学、工程、和生物化学三个领域的知识。化学工程专业的学生学习内容包括分子结构,设计化学反应过程(包括制造石油、食品、制药等化学过程),还需要了解原料在工厂里通过什么样的化学反应最后生成产品,也需要了解环保方面的知识,防止潜在的环境污染与生化危险。化工专业并不是一个容易学习的专业,但是就业前景不错。造纸厂、化肥厂、制药公司、塑料制品厂、石油制造行业都需要化工专业毕业生。就业:市场需求很大,化工在工程类专业中需求量排第3位,也是工程类专业中收入最高的专业。毕业生还可以选择其他的工程专业,进行深造,或者可以进入法学院和医学院学习。 加拿大化学工程专业2011年排名: 1. 多伦多大学 2. 麦吉尔大学 3. UBC 4. 麦克马斯特大学 5. 皇后大学 6. 阿尔伯塔大学 7. 滑铁卢大学 8. 卡尔加里大学 9. 曼尼托巴大学 10. 渥太华大学 加拿大材料工程: 材料是用于制造有用物件的物质。材料科技是电子、信息、通讯、航天、机械及光电产业的基础。因此,材料被称为「工业之母」。根据材料的组成结构,可分成金属材料、无机非金属材料、高分子材料和复合材料;根据材料的性能特征,可分成结构材料和功能材料。当今,人们把材料、信息、能源作为现代文明的三大支柱。新材料技术更成为三大高新技术之一。 ...
Words: 747 - Pages: 3
...Red Hat Enterprise Linux 5.3 Release Manifest Package Manifest for all Architectures. Red Hat Enterprise Linux Documentation Don Domingo Copyright © 2008 . This material may only be distributed subject to the terms and conditions set forth in the Open Publication License, V1.0 or later (the latest version of the OPL is presently available at http://www.opencontent.org/openpub/). Red Hat and the Red Hat "Shadow Man" logo are registered trademarks of Red Hat, Inc. in the United States and other countries. All other trademarks referenced herein are the property of their respective owners. 1801 Varsity Drive Raleigh, NC 27606-2072 USA Phone: +1 919 754 3700 Phone: 888 733 4281 Fax: +1 919 754 3701 PO Box 13588 Research Triangle Park, NC 27709 USA Abstract This document is a record of all package changes since the last minor update of Red Hat Enterprise Linux 5 1. Added Packages ................................................................................................................... 1 2. Dropped Packages .............................................................................................................. 19 3. Updated Packages ............................................................................................................... 20 1. Added Packages cmirror-1.1.36-1.el5 • Group: System Environment/Base • Summary: cmirror - The Cluster Mirror Package • Description: cmirror - Cluster Mirroring 1 Release Manifest cmirror-kmod-0.1.21-10.el5 • Group: System...
Words: 32183 - Pages: 129