SIP应用场景

来自最权威最新完整开源SIP,语音通信,融合通信中文技术文档资料,提供详细的Asterisk Freepbx, FreeSBC, 免费会话边界控制器,网关,语音板卡,IPPBX,SBC配置资料-asterisk,freepbx,freesbc 用户手册 界面配置,呼叫路由,IVR, 网关对接,拨号规则,SIP 分机呼叫,pjsip, IVR, 录音, CDR, 队列呼叫,振铃组,CLI 命令中文资料手册
James.zhu讨论 | 贡献2015年11月13日 (五) 10:13的版本 (创建页面,内容为“'''SBC scenario overview''' '''SBC Use Case Overview''' * Connect remote workers securely to a VoIP infrastructure * Connect Branch Offices together securely...”)

(差异) ←上一版本 | 最后版本 (差异) | 下一版本→ (差异)
跳转至: 导航搜索

SBC scenario overview


SBC Use Case Overview

  • Connect remote workers securely to a VoIP infrastructure
  • Connect Branch Offices together securely without needing VPNs
  • Smoothly integrate legacy VoIP systems into a unified infrastructure
  • Evolve VoIP infrastructures while preserving investment and avoiding forklift upgrades
  • Integrate VoIP, disaster recovery solutions
  • Ensure compliance in VoIP networks
  • Ensure PSTNequivalency is achieved quickly and smooth when migrating to a SIPtrunking architecture
  • Protect VoIP assets from the security threats posed by a migration to SIP  trunking
  • Advanced security features – reduce risk for SIP trunk deployment
  • Improved business continuity with high availability voice services
  • Simplified approach to expansion of call capacity
  • Reduce overheads with lowered call costs and simplified integration with SIP providers

SBC for IP PBX to SIP Trunks

sbc-ippbx-sip-trun-case%5B1%5D.png

  • Known demarcation point
  • Reducesinteropissues/resourcewithcore
  • Transcoding if required

 

Multi ITSP Support for IP-PBX sbc-ippbx-multi-sip-trunk-case%5B1%5D.png


  • All advantages of SBC for SIP trunks
  • Least Cost Routing
  • Load balancing

Lync Interworking with IP-PBX

sbc-lync-multi-sip-trunk-case%5B1%5D.png

  • All advantages of SBC for SIP trunks
  • Least Cost Routing
  • Load Balancing

SBC For IP-PBX to SIP Trunks

sbc-hosted-pbx-use-case%5B1%5D.png

  • Known demarcation point
  • Reducesinteropissues/resourcewithcore
  • Transcoding if required
  • Protects Hosted PBX from DDOS and attacks
    • Registration Storms
    • Identity Theft