ABCs of Videoconferencing
-
Upload
oscar-maldonado -
Category
Documents
-
view
214 -
download
0
Transcript of ABCs of Videoconferencing
-
7/28/2019 ABCs of Videoconferencing
1/7
of videoconferencing
/D|/SCRATCH/ABCs%20of%20videoconferencing.htm[07/05/2013 01:16:56 p.m.]
Search /Docfinder:
Advanced search | Help | Site
ESEARCHENTERS
ApplicationsCareersConvergenceData CenterLANsNet/Systems Mgmt.NOSesOutsourcingRouters/SwitchesSecurityService ProvidersSmall/Med.BusinessStorageWAN ServicesWeb/e-commerceWireless/Mobile
ITE RESOURCES
Daily NewsNewslettersThis Week in NWTests/ReviewsBuyer's Guides
/
ABCs of videoconferencing
Pick the right client device, figure out LAN bandwidth requirements,nail down WAN links, then start conferencing.
By Christine PereyNetwork World, 10/29/01
If your company's travel budget has been slashed or if the recentterrorist attacks have made employees reluctant to fly, you may beconsidering videoconferencing as an alternative to face-to-facemeetings.
Before you jump in, here's a comprehensive guide to enterprise-levelvideoconferencing that covers everything from bandwidthrequirements to equipment options to deployment costs.
Audio primer: Videoconferencing
Get up to speed on the basic technology.
http://search.nwfusion.com/index.html?col=&qs=&qc=&si=0&ql=a&nh=25&lk=1&rf=0http://www.nwfusion.com/research/searchhelp.htmlhttp://www.nwfusion.com/sitemap.htmlhttp://www.networkworld.com/topics/applications.htmlhttp://www.networkworld.com/careers/http://www.networkworld.com/topics/convergence.htmlhttp://www.networkworld.com/topics/datacenter.htmlhttp://www.networkworld.com/topics/lans.htmlhttp://www.networkworld.com/topics/management.htmlhttp://www.networkworld.com/topics/nos.htmlhttp://www.networkworld.com/topics/outsourcing.htmlhttp://www.networkworld.com/topics/routers.htmlhttp://www.networkworld.com/topics/security.htmlhttp://www.networkworld.com/edge/http://www.networkworld.com/net.worker/http://www.networkworld.com/topics/storage.htmlhttp://www.networkworld.com/topics/wan.htmlhttp://www.networkworld.com/topics/ecommerce.htmlhttp://www.networkworld.com/topics/wireless.htmlhttp://www.networkworld.com/news/netflash.htmlhttp://www.networkworld.com/newsletters/http://www.networkworld.com/news/thisweek.htmlhttp://www.networkworld.com/reviews/http://www.networkworld.com/reviews/bg.htmlhttp://www.networkworld.com/primers/videoconf/videoconfprimer.htmlhttp://ad.doubleclick.net/click;h=v8/3ddb/0/0/%2a/n;44306;0-0;0;43070114;2321-160/600;0/0/0;u=,idge-11357561046_1367950625,12ea3f7ca485525,idge,idge.idge_l;~aopt=2/1/e/0;~sscs=%3fhttp://www.networkworld.com/primers/videoconf/videoconfprimer.htmlhttp://www.networkworld.com/reviews/bg.htmlhttp://www.networkworld.com/reviews/http://www.networkworld.com/news/thisweek.htmlhttp://www.networkworld.com/newsletters/http://www.networkworld.com/news/netflash.htmlhttp://www.networkworld.com/topics/wireless.htmlhttp://www.networkworld.com/topics/ecommerce.htmlhttp://www.networkworld.com/topics/wan.htmlhttp://www.networkworld.com/topics/storage.htmlhttp://www.networkworld.com/net.worker/http://www.networkworld.com/net.worker/http://www.networkworld.com/edge/http://www.networkworld.com/topics/security.htmlhttp://www.networkworld.com/topics/routers.htmlhttp://www.networkworld.com/topics/outsourcing.htmlhttp://www.networkworld.com/topics/nos.htmlhttp://www.networkworld.com/topics/management.htmlhttp://www.networkworld.com/topics/lans.htmlhttp://www.networkworld.com/topics/datacenter.htmlhttp://www.networkworld.com/topics/convergence.htmlhttp://www.networkworld.com/careers/http://www.networkworld.com/topics/applications.htmlhttp://www.nwfusion.com/sitemap.htmlhttp://www.nwfusion.com/research/searchhelp.htmlhttp://search.nwfusion.com/index.html?col=&qs=&qc=&si=0&ql=a&nh=25&lk=1&rf=0http://www.nwfusion.com/http://ad.doubleclick.net/activity;src%3D2919002%3Bmet%3D1%3Bv%3D1%3Bpid%3D43070114%3Baid%3D266674147%3Bko%3D1%3Bcid%3D53613973%3Brid%3D53530709%3Brv%3D1%3Bcs%3Dp%3Beid1%3D1078364%3Becn1%3D1%3Betm1%3D0%3B_dc_redir%3Durl%3fhttp://ad.doubleclick.net/click%3Bh%3Dv8/3dcc/3/0/%2a/o%3B266674147%3B0-0%3B1%3B43070114%3B3454-728/90%3B53613973/53530709/1%3Bu%3D%2Cidge-21284195155_1366666851%2C12bd2ccb9d08309%2Cidge%2Cidge.idge_l-idgt.gn-idgt.cu-na.x224-na.x277-na.apc-na.aom-na.x325-na.anj-na.apu-na.apg-na.apy-na.aqf-na.aqh-na.ara-na.lj-na.lk-na.8-na.25-na.lg-na.w152_y-na.w154_y-na.w156_y-na.li-na.ly-na.lr-na.43-na.35%3B~aopt%3D2/1/e/0%3B~sscs%3D%3fhttp://resources.networkworld.com/show/200015647/00622540083381NWWORUXTN5Z73/?email=%%emailaddr%%http://ad.doubleclick.net/click;h=v8/3dcc/0/0/%2a/j;44306;0-0;0;43070114;31-1/1;0/0/0;u=,idge-21187542524_1366666850,12bd2ccb9d08309,idge,idge.idge_l-idgt.gn-idgt.cu-na.x224-na.x277-na.apc-na.aom-na.x325-na.anj-na.apu-na.apg-na.apy-na.aqf-na.aqh-na.ara-na.lj-na.lk-na.8-na.25-na.lg-na.w152_y-na.w154_y-na.w156_y-na.li-na.ly-na.lr-na.43-na.35;~aopt=2/1/e/0;~sscs=%3fhttp://ad.doubleclick.net/click;h=v8/3dcc/0/0/%2a/j;44306;0-0;0;43070114;31-1/1;0/0/0;u=,idge-21187542524_1366666850,12bd2ccb9d08309,idge,idge.idge_l-idgt.gn-idgt.cu-na.x224-na.x277-na.apc-na.aom-na.x325-na.anj-na.apu-na.apg-na.apy-na.aqf-na.aqh-na.ara-na.lj-na.lk-na.8-na.25-na.lg-na.w152_y-na.w154_y-na.w156_y-na.li-na.ly-na.lr-na.43-na.35;~aopt=2/1/e/0;~sscs=%3fhttp://ad.doubleclick.net/click;h=v8/3ddb/0/0/%2a/j;44306;0-0;0;43070114;31-1/1;0/0/0;u=,idge-21187542524_1366666850,12bd2ccb9d08309,idge,idge.idge_l-idgt.gn-idgt.cu-na.x224-na.x277-na.apc-na.aom-na.x325-na.anj-na.apu-na.apg-na.apy-na.aqf-na.aqh-na.ara-na.lj-na.lk-na.8-na.25-na.lg-na.w152_y-na.w154_y-na.w156_y-na.li-na.ly-na.lr-na.43-na.35;~aopt=2/1/e/0;~sscs=%3fhttp://ad.doubleclick.net/click;h=v8/3ddb/0/0/%2a/j;44306;0-0;0;43070114;31-1/1;0/0/0;u=,idge-21187542524_1366666850,12bd2ccb9d08309,idge,idge.idge_l-idgt.gn-idgt.cu-na.x224-na.x277-na.apc-na.aom-na.x325-na.anj-na.apu-na.apg-na.apy-na.aqf-na.aqh-na.ara-na.lj-na.lk-na.8-na.25-na.lg-na.w152_y-na.w154_y-na.w156_y-na.li-na.ly-na.lr-na.43-na.35;~aopt=2/1/e/0;~sscs=%3fhttp://www.networkworld.com/primers/videoconf/videoconfprimer.html -
7/28/2019 ABCs of Videoconferencing
2/7
of videoconferencing
/D|/SCRATCH/ABCs%20of%20videoconferencing.htm[07/05/2013 01:16:56 p.m.]
OpinionForumsSpecial IssuesHow to/PrimersCase StudiesNetwork LifeEncyclopediaT Briefings
ODAY'S NEWS BYODLawsuitsLoom as WorkGets Personal
Red Hatdrops JBoss,goes withWildFly forJava
middleware Debate ragesovercontentiousInternet salestax proposal
HowOpenStackShouldPrepare Itselffor theEnterprise
Five Ways toImprove Your
EnterpriseSocialNetworkingStrategy
The Internetof Things:Coming to anetwork nearyou
Windows 8Update:Smaller, lessexpensivegear on tapfor back-to-school
Cisco edgesF5 in VPNshootout
Anonymouscalls forInternetblackout toprotest CISPA
Hospital optsfor Wi-Fi overGPS insmartphone
Client devices
Currently there are three distinct categories of clients definedprimarily by usage.
Desktop: Desktop videoconferencing clients are assigned to asingle user. They cost between $600 and $3,000 for a hardware-based system and up to $150 for a software-only client. Connectivityis over IP.
Small group: Either an appliance that costs between $3,000 and
$12,000 or a PC-based system that costs between $6,000 and$14,000. Small-group videoconferencing systems are relatively easyto configure and use. They run over ISDN or IP.
Large group/boardroom: Provide the highest-quality video, but alsocome with the highest price tag, with systems starting at $10,000.They also run over ISDN or IP.
Comparison data Types of client devices, bandwidth requirements, and network components forvideoconferencing.
LAN speeds
Videoconferencing can leverage the existing public telephone network,a private IP network or the Internet. The target bandwidth forinteractive video communications is in the 300K to 400K bit/sec perstream range. This includes audio and video as well as controlsignaling.
The H.323 protocol does not require that two or more endpoints in asession send the same data rate they receive. A low-poweredendpoint may only be able to encode at a rate of 100K bit/sec, but,because decoding is less processor-intensive, it could decode a 300Kbit/sec videostream.
Nevertheless, in videoconferencing, bandwidth is assumed to besymmetrical. In full-duplex networks such as ISDN, Ethernet, ATMand time division multiplexed networks, capacity is expressed asbandwidth in one direction, though equal bandwidth is available fortraffic in the opposite direction.
You need to estimate the number of simultaneous sessions yournetwork needs to support, and figure out if your network hasbandwidth end-to-end.
A T-1 offers 1.5M bit/sec in each direction and would be amplebandwidth for two 512K bit/sec or three 384K bit/secvideoconferences, depending on the amount of simultaneous traffic on
the network. Also, make sure that you have 10/100 switched Ethernetthroughout the LAN segments where videoconferencing traffic isexpected.
Multipoint conference bandwidth (with which three or more locationscan see and hear one another) is calculated separately from point-to-point sessions. Multipoint can be conducted in either IP or ISDNenvironments, and some conferencing units will support both networktypes.
Multipoint conferencing products may be software-based oraccelerated with special hardware, and their configuration canproduce different bandwidth consumption patterns as well as differentuser experiences. For example, when an endpoint is used to host a
http://www.networkworld.com/opinions/http://www.networkworld.com/forum/http://www.networkworld.com/indepth/http://www.networkworld.com/howto/http://www.networkworld.com/howto/casestudies.htmlhttp://www.networklifemag.com/http://www.networkworld.com/links/Encyclopedia/http://www.networkworld.com/it-briefing/http://www.networkworld.com/news/2013/042213-byod-lawsuits-loom-as-work-268976.htmlhttp://www.networkworld.com/news/2013/042213-byod-lawsuits-loom-as-work-268976.htmlhttp://www.networkworld.com/news/2013/042213-byod-lawsuits-loom-as-work-268976.htmlhttp://www.networkworld.com/news/2013/042213-byod-lawsuits-loom-as-work-268976.htmlhttp://www.networkworld.com/news/2013/042213-wildfly-268985.htmlhttp://www.networkworld.com/news/2013/042213-wildfly-268985.htmlhttp://www.networkworld.com/news/2013/042213-wildfly-268985.htmlhttp://www.networkworld.com/news/2013/042213-wildfly-268985.htmlhttp://www.networkworld.com/news/2013/042213-wildfly-268985.htmlhttp://www.networkworld.com/news/2013/042213-wildfly-268985.htmlhttp://www.networkworld.com/news/2013/042213-debate-rages-over-contentious-internet-268980.htmlhttp://www.networkworld.com/news/2013/042213-debate-rages-over-contentious-internet-268980.htmlhttp://www.networkworld.com/news/2013/042213-debate-rages-over-contentious-internet-268980.htmlhttp://www.networkworld.com/news/2013/042213-debate-rages-over-contentious-internet-268980.htmlhttp://www.networkworld.com/news/2013/042213-debate-rages-over-contentious-internet-268980.htmlhttp://www.networkworld.com/news/2013/042213-how-openstack-should-prepare-itself-268969.htmlhttp://www.networkworld.com/news/2013/042213-how-openstack-should-prepare-itself-268969.htmlhttp://www.networkworld.com/news/2013/042213-how-openstack-should-prepare-itself-268969.htmlhttp://www.networkworld.com/news/2013/042213-how-openstack-should-prepare-itself-268969.htmlhttp://www.networkworld.com/news/2013/042213-how-openstack-should-prepare-itself-268969.htmlhttp://www.networkworld.com/news/2013/042213-how-openstack-should-prepare-itself-268969.htmlhttp://www.networkworld.com/news/2013/042213-five-ways-to-improve-your-268971.htmlhttp://www.networkworld.com/news/2013/042213-five-ways-to-improve-your-268971.htmlhttp://www.networkworld.com/news/2013/042213-five-ways-to-improve-your-268971.htmlhttp://www.networkworld.com/news/2013/042213-five-ways-to-improve-your-268971.htmlhttp://www.networkworld.com/news/2013/042213-five-ways-to-improve-your-268971.htmlhttp://www.networkworld.com/news/2013/042213-five-ways-to-improve-your-268971.htmlhttp://www.networkworld.com/news/2013/042213-internet-things-267824.htmlhttp://www.networkworld.com/news/2013/042213-internet-things-267824.htmlhttp://www.networkworld.com/news/2013/042213-internet-things-267824.htmlhttp://www.networkworld.com/news/2013/042213-internet-things-267824.htmlhttp://www.networkworld.com/news/2013/042213-internet-things-267824.htmlhttp://www.networkworld.com/news/2013/042213-win8-update-268982.htmlhttp://www.networkworld.com/news/2013/042213-win8-update-268982.htmlhttp://www.networkworld.com/news/2013/042213-win8-update-268982.htmlhttp://www.networkworld.com/news/2013/042213-win8-update-268982.htmlhttp://www.networkworld.com/news/2013/042213-win8-update-268982.htmlhttp://www.networkworld.com/news/2013/042213-win8-update-268982.htmlhttp://www.networkworld.com/news/2013/042213-win8-update-268982.htmlhttp://www.networkworld.com/reviews/2013/042213-vpn-test-268316.htmlhttp://www.networkworld.com/reviews/2013/042213-vpn-test-268316.htmlhttp://www.networkworld.com/reviews/2013/042213-vpn-test-268316.htmlhttp://www.networkworld.com/news/2013/042213-anonymous-calls-for-internet-blackout-268939.htmlhttp://www.networkworld.com/news/2013/042213-anonymous-calls-for-internet-blackout-268939.htmlhttp://www.networkworld.com/news/2013/042213-anonymous-calls-for-internet-blackout-268939.htmlhttp://www.networkworld.com/news/2013/042213-anonymous-calls-for-internet-blackout-268939.htmlhttp://www.networkworld.com/news/2013/042213-anonymous-calls-for-internet-blackout-268939.htmlhttp://www.networkworld.com/news/2013/042213-hospital-opts-for-wi-fi-over-268951.htmlhttp://www.networkworld.com/news/2013/042213-hospital-opts-for-wi-fi-over-268951.htmlhttp://www.networkworld.com/news/2013/042213-hospital-opts-for-wi-fi-over-268951.htmlhttp://www.networkworld.com/news/2013/042213-hospital-opts-for-wi-fi-over-268951.htmlhttp://open_window%28%27http//www.nwfusion.com/research/2001/1029feat2side.html')http://ad.doubleclick.net/click;h=v8/3dcc/0/0/%2a/n;44306;0-0;0;43070114;2321-160/600;0/0/0;u=,idge-21594113514_1366666852,12bd2ccb9d08309,idge,idge.idge_l-idgt.gn-idgt.cu-na.x224-na.x277-na.apc-na.aom-na.x325-na.anj-na.apu-na.apg-na.apy-na.aqf-na.aqh-na.ara-na.lj-na.lk-na.8-na.25-na.lg-na.w152_y-na.w154_y-na.w156_y-na.li-na.ly-na.lr-na.43-na.35;~aopt=2/1/e/0;~sscs=%3fhttp://open_window%28%27http//www.nwfusion.com/research/2001/1029feat2side.html')http://www.networkworld.com/news/2013/042213-hospital-opts-for-wi-fi-over-268951.htmlhttp://www.networkworld.com/news/2013/042213-hospital-opts-for-wi-fi-over-268951.htmlhttp://www.networkworld.com/news/2013/042213-hospital-opts-for-wi-fi-over-268951.htmlhttp://www.networkworld.com/news/2013/042213-hospital-opts-for-wi-fi-over-268951.htmlhttp://www.networkworld.com/news/2013/042213-anonymous-calls-for-internet-blackout-268939.htmlhttp://www.networkworld.com/news/2013/042213-anonymous-calls-for-internet-blackout-268939.htmlhttp://www.networkworld.com/news/2013/042213-anonymous-calls-for-internet-blackout-268939.htmlhttp://www.networkworld.com/news/2013/042213-anonymous-calls-for-internet-blackout-268939.htmlhttp://www.networkworld.com/news/2013/042213-anonymous-calls-for-internet-blackout-268939.htmlhttp://www.networkworld.com/reviews/2013/042213-vpn-test-268316.htmlhttp://www.networkworld.com/reviews/2013/042213-vpn-test-268316.htmlhttp://www.networkworld.com/reviews/2013/042213-vpn-test-268316.htmlhttp://www.networkworld.com/news/2013/042213-win8-update-268982.htmlhttp://www.networkworld.com/news/2013/042213-win8-update-268982.htmlhttp://www.networkworld.com/news/2013/042213-win8-update-268982.htmlhttp://www.networkworld.com/news/2013/042213-win8-update-268982.htmlhttp://www.networkworld.com/news/2013/042213-win8-update-268982.htmlhttp://www.networkworld.com/news/2013/042213-win8-update-268982.htmlhttp://www.networkworld.com/news/2013/042213-win8-update-268982.htmlhttp://www.networkworld.com/news/2013/042213-internet-things-267824.htmlhttp://www.networkworld.com/news/2013/042213-internet-things-267824.htmlhttp://www.networkworld.com/news/2013/042213-internet-things-267824.htmlhttp://www.networkworld.com/news/2013/042213-internet-things-267824.htmlhttp://www.networkworld.com/news/2013/042213-internet-things-267824.htmlhttp://www.networkworld.com/news/2013/042213-five-ways-to-improve-your-268971.htmlhttp://www.networkworld.com/news/2013/042213-five-ways-to-improve-your-268971.htmlhttp://www.networkworld.com/news/2013/042213-five-ways-to-improve-your-268971.htmlhttp://www.networkworld.com/news/2013/042213-five-ways-to-improve-your-268971.htmlhttp://www.networkworld.com/news/2013/042213-five-ways-to-improve-your-268971.htmlhttp://www.networkworld.com/news/2013/042213-five-ways-to-improve-your-268971.htmlhttp://www.networkworld.com/news/2013/042213-how-openstack-should-prepare-itself-268969.htmlhttp://www.networkworld.com/news/2013/042213-how-openstack-should-prepare-itself-268969.htmlhttp://www.networkworld.com/news/2013/042213-how-openstack-should-prepare-itself-268969.htmlhttp://www.networkworld.com/news/2013/042213-how-openstack-should-prepare-itself-268969.htmlhttp://www.networkworld.com/news/2013/042213-how-openstack-should-prepare-itself-268969.htmlhttp://www.networkworld.com/news/2013/042213-how-openstack-should-prepare-itself-268969.htmlhttp://www.networkworld.com/news/2013/042213-debate-rages-over-contentious-internet-268980.htmlhttp://www.networkworld.com/news/2013/042213-debate-rages-over-contentious-internet-268980.htmlhttp://www.networkworld.com/news/2013/042213-debate-rages-over-contentious-internet-268980.htmlhttp://www.networkworld.com/news/2013/042213-debate-rages-over-contentious-internet-268980.htmlhttp://www.networkworld.com/news/2013/042213-debate-rages-over-contentious-internet-268980.htmlhttp://www.networkworld.com/news/2013/042213-wildfly-268985.htmlhttp://www.networkworld.com/news/2013/042213-wildfly-268985.htmlhttp://www.networkworld.com/news/2013/042213-wildfly-268985.htmlhttp://www.networkworld.com/news/2013/042213-wildfly-268985.htmlhttp://www.networkworld.com/news/2013/042213-wildfly-268985.htmlhttp://www.networkworld.com/news/2013/042213-wildfly-268985.htmlhttp://www.networkworld.com/news/2013/042213-byod-lawsuits-loom-as-work-268976.htmlhttp://www.networkworld.com/news/2013/042213-byod-lawsuits-loom-as-work-268976.htmlhttp://www.networkworld.com/news/2013/042213-byod-lawsuits-loom-as-work-268976.htmlhttp://www.networkworld.com/news/2013/042213-byod-lawsuits-loom-as-work-268976.htmlhttp://www.networkingsmallbusiness.com/http://www.nwfusion.com/weblogs/layer8/http://www.networkworld.com/rss/http://www.networkworld.com/it-briefing/http://www.networkworld.com/links/Encyclopedia/http://www.networklifemag.com/http://www.networkworld.com/howto/casestudies.htmlhttp://www.networkworld.com/howto/http://www.networkworld.com/indepth/http://www.networkworld.com/forum/http://www.networkworld.com/opinions/ -
7/28/2019 ABCs of Videoconferencing
3/7
of videoconferencing
/D|/SCRATCH/ABCs%20of%20videoconferencing.htm[07/05/2013 01:16:56 p.m.]
navigationapp
Viewpoint:When itcomes toenterprisesecurity, is itbetter tofocus oncompliance orrisk?
Microsoftfaces a loss ofrelevance
iPhone 6rumor rollupfor the weekending April19
Browserspose thegreatestthreat toenterprise,Microsoftreports
IBM defendsOpenDaylightfrom doubters
Microsoft maybacktrack onStart buttonin Windows 8
Assange toGoogle'sSchmidt:'Idon'tuseemail'
IBM-Lenovodeal likely tofocus on low-end,commodityservers,analyst says
Reports:Blackstoneabandonsoffer for Dell
Samsungfights dirtywith
misleadingclaims againstHTC whomay havereplied in kind
HouseapprovesCISPA overprivacyobjections
Cloud fightkeepsAmazon,Microsoft,
multipoint conference, the maximum bandwidth for any singleparticipant is the bandwidth allocated to that host divided by thenumber of locations participating. When you need to have more thanfour locations on a call at the same time, network-based products arerecommended.
If you decide that your IP network can't handle the additional trafficassociated with live video sessions in a merged or converged networkdeployment, your options are to rely on circuit switched networks orto deploy additional IP bandwidth capacity.
The WAN connection
Approximately 80% of the group videoconferencing units installedtoday interface directly with ISDN. Less than 5% use ATM, and theremainder are on an IP net.
ISDN is recommended when:
You are planning to connect with people in locations outside yourcompany.
The locations are in Europe, where ISDN is easily available andbroadband IP remains at least 50% more expensive than in the U.S.
Your IP network capacity is lacking and you do not expect to placeoutbound calls more than two or three hours per month.
If you use ISDN for transport and you want to add centralized useradministration or system management, you can still install anEthernet connection to each device and a management softwarepackage such as Polycom's Global Management System or Vcon'sMXM on a server in the company's data center.
The limitations of ISDN (Basic Rate Interface or Primary RateInterface) include:
Availability not widespread in the U.S.
Difficulty configuring and managing once ordered.
Subject to service interruptions (single point of failure).
It has distance-driven and metered costs (long-distance).
The infrastructure supports only one telephony-like service:multipoint conferencing.
Video calls on ISDN cannot be put on hold, cannot be forwarded(when no one answers, when the line is in use or for any otherreason), and there has never been a video mail box on ISDN.Recording one side of an ISDN videoconference is possible using ananalog VCR provided the appropriate interfaces exist on the localclient system.
The IP option
Using proprietary technologies or H.323 standard-compliantendpoints, an IP network designed only for data can be modified tosupport business-quality videoconferencing services.
Where bandwidth is available, the IT manager would need to add andadjust a few components to provide a complete solution, or outsourcethe management to a third party such as WireOne's GlowPoint serviceor Sprint's IP videoconferencing services.
If the deployment is expected to have more than five or six systems,a centralized user and network administration console such as
http://www.networkworld.com/news/2013/042213-hospital-opts-for-wi-fi-over-268951.htmlhttp://www.networkworld.com/news/2013/042213-hospital-opts-for-wi-fi-over-268951.htmlhttp://www.networkworld.com/news/2013/042213-viewpoint-security-268777.htmlhttp://www.networkworld.com/news/2013/042213-viewpoint-security-268777.htmlhttp://www.networkworld.com/news/2013/042213-viewpoint-security-268777.htmlhttp://www.networkworld.com/news/2013/042213-viewpoint-security-268777.htmlhttp://www.networkworld.com/news/2013/042213-viewpoint-security-268777.htmlhttp://www.networkworld.com/news/2013/042213-viewpoint-security-268777.htmlhttp://www.networkworld.com/news/2013/042213-viewpoint-security-268777.htmlhttp://www.networkworld.com/news/2013/042213-viewpoint-security-268777.htmlhttp://www.networkworld.com/news/2013/042213-viewpoint-security-268777.htmlhttp://www.networkworld.com/news/2013/042213-microsoft-faces-a-loss-of-268961.htmlhttp://www.networkworld.com/news/2013/042213-microsoft-faces-a-loss-of-268961.htmlhttp://www.networkworld.com/news/2013/042213-microsoft-faces-a-loss-of-268961.htmlhttp://www.networkworld.com/news/2013/041913-iphone6-rumors-268924.htmlhttp://www.networkworld.com/news/2013/041913-iphone6-rumors-268924.htmlhttp://www.networkworld.com/news/2013/041913-iphone6-rumors-268924.htmlhttp://www.networkworld.com/news/2013/041913-iphone6-rumors-268924.htmlhttp://www.networkworld.com/news/2013/041913-iphone6-rumors-268924.htmlhttp://www.networkworld.com/news/2013/041913-browsers-pose-the-greatest-threat-268914.htmlhttp://www.networkworld.com/news/2013/041913-browsers-pose-the-greatest-threat-268914.htmlhttp://www.networkworld.com/news/2013/041913-browsers-pose-the-greatest-threat-268914.htmlhttp://www.networkworld.com/news/2013/041913-browsers-pose-the-greatest-threat-268914.htmlhttp://www.networkworld.com/news/2013/041913-browsers-pose-the-greatest-threat-268914.htmlhttp://www.networkworld.com/news/2013/041913-browsers-pose-the-greatest-threat-268914.htmlhttp://www.networkworld.com/news/2013/041913-browsers-pose-the-greatest-threat-268914.htmlhttp://www.networkworld.com/news/2013/041913-ibm-opendaylight-268912.htmlhttp://www.networkworld.com/news/2013/041913-ibm-opendaylight-268912.htmlhttp://www.networkworld.com/news/2013/041913-ibm-opendaylight-268912.htmlhttp://www.networkworld.com/news/2013/041713-microsoft-may-backtrack-on-start-268802.htmlhttp://www.networkworld.com/news/2013/041713-microsoft-may-backtrack-on-start-268802.htmlhttp://www.networkworld.com/news/2013/041713-microsoft-may-backtrack-on-start-268802.htmlhttp://www.networkworld.com/news/2013/041713-microsoft-may-backtrack-on-start-268802.htmlhttp://www.networkworld.com/news/2013/041913-assange-to-google39s-schmidt-39i-268906.htmlhttp://www.networkworld.com/news/2013/041913-assange-to-google39s-schmidt-39i-268906.htmlhttp://www.networkworld.com/news/2013/041913-assange-to-google39s-schmidt-39i-268906.htmlhttp://www.networkworld.com/news/2013/041913-assange-to-google39s-schmidt-39i-268906.htmlhttp://www.networkworld.com/news/2013/041913-assange-to-google39s-schmidt-39i-268906.htmlhttp://www.networkworld.com/news/2013/041913-assange-to-google39s-schmidt-39i-268906.htmlhttp://www.networkworld.com/news/2013/041913-assange-to-google39s-schmidt-39i-268906.htmlhttp://www.networkworld.com/news/2013/041913-ibm-lenovo-deal-likely-to-focus-268899.htmlhttp://www.networkworld.com/news/2013/041913-ibm-lenovo-deal-likely-to-focus-268899.htmlhttp://www.networkworld.com/news/2013/041913-ibm-lenovo-deal-likely-to-focus-268899.htmlhttp://www.networkworld.com/news/2013/041913-ibm-lenovo-deal-likely-to-focus-268899.htmlhttp://www.networkworld.com/news/2013/041913-ibm-lenovo-deal-likely-to-focus-268899.htmlhttp://www.networkworld.com/news/2013/041913-ibm-lenovo-deal-likely-to-focus-268899.htmlhttp://www.networkworld.com/news/2013/041913-ibm-lenovo-deal-likely-to-focus-268899.htmlhttp://www.networkworld.com/news/2013/041913-blackstone-abandons-offer-for-268902.htmlhttp://www.networkworld.com/news/2013/041913-blackstone-abandons-offer-for-268902.htmlhttp://www.networkworld.com/news/2013/041913-blackstone-abandons-offer-for-268902.htmlhttp://www.networkworld.com/news/2013/041913-blackstone-abandons-offer-for-268902.htmlhttp://www.networkworld.com/news/2013/041813-android-roundup-268881.htmlhttp://www.networkworld.com/news/2013/041813-android-roundup-268881.htmlhttp://www.networkworld.com/news/2013/041813-android-roundup-268881.htmlhttp://www.networkworld.com/news/2013/041813-android-roundup-268881.htmlhttp://www.networkworld.com/news/2013/041813-android-roundup-268881.htmlhttp://www.networkworld.com/news/2013/041813-android-roundup-268881.htmlhttp://www.networkworld.com/news/2013/041813-android-roundup-268881.htmlhttp://www.networkworld.com/news/2013/041813-android-roundup-268881.htmlhttp://www.networkworld.com/news/2013/041813-house-approves-cispa-over-privacy-268879.htmlhttp://www.networkworld.com/news/2013/041813-house-approves-cispa-over-privacy-268879.htmlhttp://www.networkworld.com/news/2013/041813-house-approves-cispa-over-privacy-268879.htmlhttp://www.networkworld.com/news/2013/041813-house-approves-cispa-over-privacy-268879.htmlhttp://www.networkworld.com/news/2013/041813-house-approves-cispa-over-privacy-268879.htmlhttp://www.networkworld.com/news/2013/041813-aws-268883.htmlhttp://www.networkworld.com/news/2013/041813-aws-268883.htmlhttp://www.networkworld.com/news/2013/041813-aws-268883.htmlhttp://www.networkworld.com/news/2013/041813-aws-268883.htmlhttp://www.networkworld.com/news/2013/041813-aws-268883.htmlhttp://www.networkworld.com/news/2013/041813-aws-268883.htmlhttp://www.networkworld.com/news/2013/041813-aws-268883.htmlhttp://www.networkworld.com/news/2013/041813-aws-268883.htmlhttp://www.networkworld.com/news/2013/041813-house-approves-cispa-over-privacy-268879.htmlhttp://www.networkworld.com/news/2013/041813-house-approves-cispa-over-privacy-268879.htmlhttp://www.networkworld.com/news/2013/041813-house-approves-cispa-over-privacy-268879.htmlhttp://www.networkworld.com/news/2013/041813-house-approves-cispa-over-privacy-268879.htmlhttp://www.networkworld.com/news/2013/041813-house-approves-cispa-over-privacy-268879.htmlhttp://www.networkworld.com/news/2013/041813-android-roundup-268881.htmlhttp://www.networkworld.com/news/2013/041813-android-roundup-268881.htmlhttp://www.networkworld.com/news/2013/041813-android-roundup-268881.htmlhttp://www.networkworld.com/news/2013/041813-android-roundup-268881.htmlhttp://www.networkworld.com/news/2013/041813-android-roundup-268881.htmlhttp://www.networkworld.com/news/2013/041813-android-roundup-268881.htmlhttp://www.networkworld.com/news/2013/041813-android-roundup-268881.htmlhttp://www.networkworld.com/news/2013/041813-android-roundup-268881.htmlhttp://www.networkworld.com/news/2013/041913-blackstone-abandons-offer-for-268902.htmlhttp://www.networkworld.com/news/2013/041913-blackstone-abandons-offer-for-268902.htmlhttp://www.networkworld.com/news/2013/041913-blackstone-abandons-offer-for-268902.htmlhttp://www.networkworld.com/news/2013/041913-blackstone-abandons-offer-for-268902.htmlhttp://www.networkworld.com/news/2013/041913-ibm-lenovo-deal-likely-to-focus-268899.htmlhttp://www.networkworld.com/news/2013/041913-ibm-lenovo-deal-likely-to-focus-268899.htmlhttp://www.networkworld.com/news/2013/041913-ibm-lenovo-deal-likely-to-focus-268899.htmlhttp://www.networkworld.com/news/2013/041913-ibm-lenovo-deal-likely-to-focus-268899.htmlhttp://www.networkworld.com/news/2013/041913-ibm-lenovo-deal-likely-to-focus-268899.htmlhttp://www.networkworld.com/news/2013/041913-ibm-lenovo-deal-likely-to-focus-268899.htmlhttp://www.networkworld.com/news/2013/041913-ibm-lenovo-deal-likely-to-focus-268899.htmlhttp://www.networkworld.com/news/2013/041913-assange-to-google39s-schmidt-39i-268906.htmlhttp://www.networkworld.com/news/2013/041913-assange-to-google39s-schmidt-39i-268906.htmlhttp://www.networkworld.com/news/2013/041913-assange-to-google39s-schmidt-39i-268906.htmlhttp://www.networkworld.com/news/2013/041913-assange-to-google39s-schmidt-39i-268906.htmlhttp://www.networkworld.com/news/2013/041913-assange-to-google39s-schmidt-39i-268906.htmlhttp://www.networkworld.com/news/2013/041913-assange-to-google39s-schmidt-39i-268906.htmlhttp://www.networkworld.com/news/2013/041913-assange-to-google39s-schmidt-39i-268906.htmlhttp://www.networkworld.com/news/2013/041713-microsoft-may-backtrack-on-start-268802.htmlhttp://www.networkworld.com/news/2013/041713-microsoft-may-backtrack-on-start-268802.htmlhttp://www.networkworld.com/news/2013/041713-microsoft-may-backtrack-on-start-268802.htmlhttp://www.networkworld.com/news/2013/041713-microsoft-may-backtrack-on-start-268802.htmlhttp://www.networkworld.com/news/2013/041913-ibm-opendaylight-268912.htmlhttp://www.networkworld.com/news/2013/041913-ibm-opendaylight-268912.htmlhttp://www.networkworld.com/news/2013/041913-ibm-opendaylight-268912.htmlhttp://www.networkworld.com/news/2013/041913-browsers-pose-the-greatest-threat-268914.htmlhttp://www.networkworld.com/news/2013/041913-browsers-pose-the-greatest-threat-268914.htmlhttp://www.networkworld.com/news/2013/041913-browsers-pose-the-greatest-threat-268914.htmlhttp://www.networkworld.com/news/2013/041913-browsers-pose-the-greatest-threat-268914.htmlhttp://www.networkworld.com/news/2013/041913-browsers-pose-the-greatest-threat-268914.htmlhttp://www.networkworld.com/news/2013/041913-browsers-pose-the-greatest-threat-268914.htmlhttp://www.networkworld.com/news/2013/041913-browsers-pose-the-greatest-threat-268914.htmlhttp://www.networkworld.com/news/2013/041913-iphone6-rumors-268924.htmlhttp://www.networkworld.com/news/2013/041913-iphone6-rumors-268924.htmlhttp://www.networkworld.com/news/2013/041913-iphone6-rumors-268924.htmlhttp://www.networkworld.com/news/2013/041913-iphone6-rumors-268924.htmlhttp://www.networkworld.com/news/2013/041913-iphone6-rumors-268924.htmlhttp://www.networkworld.com/news/2013/042213-microsoft-faces-a-loss-of-268961.htmlhttp://www.networkworld.com/news/2013/042213-microsoft-faces-a-loss-of-268961.htmlhttp://www.networkworld.com/news/2013/042213-microsoft-faces-a-loss-of-268961.htmlhttp://www.networkworld.com/news/2013/042213-viewpoint-security-268777.htmlhttp://www.networkworld.com/news/2013/042213-viewpoint-security-268777.htmlhttp://www.networkworld.com/news/2013/042213-viewpoint-security-268777.htmlhttp://www.networkworld.com/news/2013/042213-viewpoint-security-268777.htmlhttp://www.networkworld.com/news/2013/042213-viewpoint-security-268777.htmlhttp://www.networkworld.com/news/2013/042213-viewpoint-security-268777.htmlhttp://www.networkworld.com/news/2013/042213-viewpoint-security-268777.htmlhttp://www.networkworld.com/news/2013/042213-viewpoint-security-268777.htmlhttp://www.networkworld.com/news/2013/042213-viewpoint-security-268777.htmlhttp://www.networkworld.com/news/2013/042213-hospital-opts-for-wi-fi-over-268951.htmlhttp://www.networkworld.com/news/2013/042213-hospital-opts-for-wi-fi-over-268951.html -
7/28/2019 ABCs of Videoconferencing
4/7
of videoconferencing
/D|/SCRATCH/ABCs%20of%20videoconferencing.htm[07/05/2013 01:16:56 p.m.]
Google andRackspaceclamoring forenterprisecustomers
iPad 5 rumorrollup for theweek endingApril 17
Google cloudopen for
business includes $400cover charge
OpenNetworkingFoundationdirectordetails SDNdirections,OpenDaylightimpact
More breakingnews
Polycom's Global Management System, RADVision's H.323 gatekeeperor Vcon's MXM is recommended.
Some companies are going a step further and designing an enterpriseconferencing portal using technologies such as FVC's Click-to-Meet.While these packages differ in their features and functions, they aredesigned to perform address book management (an important issuewhen clients are set up behind a firewall and use network addresstranslation), set performance metrics on a per-device or user basis,and can even reduce the risk of application data traffic degradationdue to excessive bandwidth consumption.
QoS questions
Implementing quality of service (QoS) in a LAN helps to protect theintegrity of service-sensitive applications without forklift upgrades.Most of the leading network equipment vendors already supportcommon QoS standards, such as RSVP; they only need to be enabledby the network administrator.
You should also find out what your backbone provider uses for itsQoS. If the protocol or scheme chosen for QoS in the local loop is notthe same as that implemented in the backbone, the enterprisenetwork needs to put QoS translation software in place for QoSrequests to operate end-to-end during a videoconference.
Even when QoS protocols are in place, you may need additionalnetwork tuning to ensure that the video applications don't crowd outdata applications. To avoid this, network managers should segmentand manage bandwidth on each switch and router to limit the total,prioritized video traffic.
After provisioning appropriate bandwidth and QoS, other challengesremain. One of the biggest obstacles is getting real-time video trafficthrough firewalls. Since H.323-compliant applications use dynamicallyallocated sockets for audio, video and data channels, a firewall mustbe able to allow H.323 traffic through on an intelligent basis. Thefirewall must be either H.323-enabled with an H.323 proxy, or able to
snoop on the control channel to determine which dynamic sockets
are in use for H.323 sessions, and to allow traffic through only aslong as the control channel is active.
Merging and emerging services
Since the very essence of videoconferencing is communications andmost legacy systems are not on IP networks, the user is likely toencounter a situation where protocols need translation acrossdifferent networks. When a videoconference needs to span both theISDN and IP infrastructures, gateways are necessary.
RADVision is the leading manufacturer of videoconferencing gatewaysand offers a variety of form factors and densities to meet diversenetwork requirements.
Some companies have to share limited resources and want areservation system to permit room or multipoint control unit (MCU)scheduling.
Endpoint and MCU vendors offer some scheduling tools that maymeet your company's needs. Third-party products, such asCollaborative Systems' Orchestra, MagicSoft's VC Wizard and GlobalScheduling Solutions' Global Schedule, have unique features.
When the videoconferencing basics are in place for groupconferencing, you might consider a number of optimizations. Forexample, by enabling IP multicast and using intelligent clients, anetwork can efficiently support multiway meetings without adding an
http://www.networkworld.com/news/2013/041813-aws-268883.htmlhttp://www.networkworld.com/news/2013/041813-aws-268883.htmlhttp://www.networkworld.com/news/2013/041813-aws-268883.htmlhttp://www.networkworld.com/news/2013/041813-aws-268883.htmlhttp://www.networkworld.com/news/2013/041813-aws-268883.htmlhttp://www.networkworld.com/news/2013/041813-ipad5-rumors-268880.htmlhttp://www.networkworld.com/news/2013/041813-ipad5-rumors-268880.htmlhttp://www.networkworld.com/news/2013/041813-ipad5-rumors-268880.htmlhttp://www.networkworld.com/news/2013/041813-ipad5-rumors-268880.htmlhttp://www.networkworld.com/news/2013/041813-google-cloud-268854.htmlhttp://www.networkworld.com/news/2013/041813-google-cloud-268854.htmlhttp://www.networkworld.com/news/2013/041813-google-cloud-268854.htmlhttp://www.networkworld.com/news/2013/041813-google-cloud-268854.htmlhttp://www.networkworld.com/news/2013/041813-google-cloud-268854.htmlhttp://www.networkworld.com/news/2013/041813-qa-pitt-268858.htmlhttp://www.networkworld.com/news/2013/041813-qa-pitt-268858.htmlhttp://www.networkworld.com/news/2013/041813-qa-pitt-268858.htmlhttp://www.networkworld.com/news/2013/041813-qa-pitt-268858.htmlhttp://www.networkworld.com/news/2013/041813-qa-pitt-268858.htmlhttp://www.networkworld.com/news/2013/041813-qa-pitt-268858.htmlhttp://www.networkworld.com/news/2013/041813-qa-pitt-268858.htmlhttp://www.networkworld.com/news/2013/041813-qa-pitt-268858.htmlhttp://www.networkworld.com/news/netflash.htmlhttp://www.networkworld.com/news/netflash.htmlhttp://www.networkworld.com/news/netflash.htmlhttp://www.networkworld.com/news/netflash.htmlhttp://www.networkworld.com/news/2013/041813-qa-pitt-268858.htmlhttp://www.networkworld.com/news/2013/041813-qa-pitt-268858.htmlhttp://www.networkworld.com/news/2013/041813-qa-pitt-268858.htmlhttp://www.networkworld.com/news/2013/041813-qa-pitt-268858.htmlhttp://www.networkworld.com/news/2013/041813-qa-pitt-268858.htmlhttp://www.networkworld.com/news/2013/041813-qa-pitt-268858.htmlhttp://www.networkworld.com/news/2013/041813-qa-pitt-268858.htmlhttp://www.networkworld.com/news/2013/041813-qa-pitt-268858.htmlhttp://www.networkworld.com/news/2013/041813-google-cloud-268854.htmlhttp://www.networkworld.com/news/2013/041813-google-cloud-268854.htmlhttp://www.networkworld.com/news/2013/041813-google-cloud-268854.htmlhttp://www.networkworld.com/news/2013/041813-google-cloud-268854.htmlhttp://www.networkworld.com/news/2013/041813-google-cloud-268854.htmlhttp://www.networkworld.com/news/2013/041813-ipad5-rumors-268880.htmlhttp://www.networkworld.com/news/2013/041813-ipad5-rumors-268880.htmlhttp://www.networkworld.com/news/2013/041813-ipad5-rumors-268880.htmlhttp://www.networkworld.com/news/2013/041813-ipad5-rumors-268880.htmlhttp://www.networkworld.com/news/2013/041813-aws-268883.htmlhttp://www.networkworld.com/news/2013/041813-aws-268883.htmlhttp://www.networkworld.com/news/2013/041813-aws-268883.htmlhttp://www.networkworld.com/news/2013/041813-aws-268883.htmlhttp://www.networkworld.com/news/2013/041813-aws-268883.html -
7/28/2019 ABCs of Videoconferencing
5/7
of videoconferencing
/D|/SCRATCH/ABCs%20of%20videoconferencing.htm[07/05/2013 01:16:56 p.m.]
MCU.
If using IP multicasting to achieve a multipoint scenario, each clientsends only one stream of packets to an IP multicast group and allparticipating machines receive the packets. In this scenario,bandwidth consumption is lower than when an endpoint or MCUsends out copies of the same packet to each of the receivers.
Another second-generation feature found in products such asPolycom's ViewStation FX is integration of videoconferencing withstreaming media systems, enabling the broadcast of a
videoconference from a coder/decoder to many remote viewers via astreaming media server or to archive a videoconference on astreaming media server for later review.
Although an exception to the rule today, large financial servicescompanies that have integrated videoconferencing into their corporatecultures are beginning to deploy desktop videoconferencingcapabilities. With Universal Serial Bus interfaces, setting up avideocamera takes only a few minutes, in contrast with earlierdesktop products that required opening the PC and installing a card.Low-cost Webcams put all the computational load from compressingvideo and audio on the host computer. Optional hardware-acceleratedcameras designed specifically for videoconferencing, such as thePolycom ViaVideo or Vcon Vigo, produce the best results.
How much does it cost?
Depending on the number of endpoints, the type of client and choiceof networks, videoconferencing can cost as little as the price of aWebcam ($100) per seat to more than $15,000 per conference room.
To budget a videoconferencing deployment, break down the fixedacquisition costs from the recurring and usage-based costs. The exactfixed costs are going to depend on the number of systems and thefeatures your users need. In general, systems provisioned for ISDNwill also support IP, but IP-only systems tend to cost several hundreddollars to $1,000 less than ISDN systems because they have fewercomponents. Management software is sold according to site licensesfrom $250 per license to $40,000 or more for unlimited licenses.Complete enterprise conferencing portal environments suitable forlarge companies can exceed $100,000 per installation, depending onhardware and software components.
Another factor is the cost of installing the last mile. Basic Rate ISDNinstallation runs about $225 in most regions of the SBC territory, whileother regions tend to be higher. The cost of installing a T-1 dependson the distance between your facility and the nearest central office.
Recurring costs are composed of the monthly cost of network access,network usage costs and, potentially, the salary for one or moretechnicians managing network provisioning, installations, room orconferencing system reservations, technical support and user training.The largest variable in this equation is the network usage costs.
ISDN usage charges vary but can be estimated for individualcustomers (one site) at 5 cents per minute per B channel. A 384Kbit/sec videoconference will consume 6 B channels at a cost ofapproximately 30 cents per minute, or $18 per hour. Companies thatnegotiate their telecommunications rates with carriers for voice andvideo usually receive discounts on this rate.
ISPs also charge for capacity, though not by the minute. To calculatethe costs of IP backbone services, multiply the data rate by the time.A 384K bit/sec call for one hour will generate nearly 1.4G bits ofbandwidth. On a VPN the network usage costs are already fixed andthe company will incur no additional charges.
-
7/28/2019 ABCs of Videoconferencing
6/7
of videoconferencing
/D|/SCRATCH/ABCs%20of%20videoconferencing.htm[07/05/2013 01:16:56 p.m.]
Going with a managed service provider can be cost-effective for someregions and some companies. GlowPoint's Web site offers acalculator, and users can plug in the number of hours of usage perlocation and the average cost of ISDN service to obtain a costestimate.
The costs of deploying videoconferencing are as variable as thenetworks and depend on the number of installations, features andchoice of network. Cost of ownership runs about $15 per hour for amidsize enterprise. It's safe to predict that costs will continue to fallas more people get on the bandwagon. And, in the face of rising
travel costs, getting a rapid return on your investment invideoconferencing is easier now than ever before.
RELATED LINKS
Perey is president of Perey Research and Consulting in Placerville,Calif. She can be reached at [email protected].
Global Test Alliance
Perey is also a member of the Network World GlobalTest Alliance, a cooperative of the premier
reviewers in the network industry, each bringing tobear years of practical experience on every review.
For more Test Alliance information, including what it takes to becomea member, go to www.nwfusion.com/alliance.
Audio primer: VideoconferencingGet up to speed on the basic technology.
Videoconferencing demand peaks in WTC wakePreliminary estimates reveal sales of videoconferencing equipmentand services are expected to rise between 25 percent and 30 percentin the next few months.InfoWorld, 09/19/01.
Time for videoconferencingThe terrorist attacks of Sept. 11 are likely to force many companies torethink how they bring people together to work.Network World, 09/24/01.
The next great thing: video instant messagingVideo instant messaging, which is integrated into Microsoft's WindowsXP operating system, is going to make videoconferencing a ubiquitouspart of the business and consumer landscape.Network World, 07/09/01.
Videoconferencing creeps toward the homeWhile desktop videoconferencing is enjoying heightened interest incorporations, its tentacles will be slow to reach at-home workers,according to experts.
Net.Worker, 02/12/01.
NWFusion offersmore than 40 FREEtechnology-specificemail newsletters inkey networktechnology areassuch as NSM, VPNs,Convergence,Security and more.
New Event -WANs:Optimizing YourNetwork Now.Hear from theexperts about theinnovations that arealready starting toshake up the WAN
Your FREE NetworkWorld subscriptionwill also includebreaking news andinformation onwireless, storage,infrastructure,carriers and SPs,enterprise
mailto:[email protected]://www.networkworld.com/alliance/http://www.nwfusion.com/alliancehttp://www.networkworld.com/primers/videoconf/videoconfprimer.htmlhttp://www.nwfusion.com/news/2001/0919vconf.htmlhttp://www.nwfusion.com/columnists/2001/0924salamone.htmlhttp://www.nwfusion.com/columnists/2001/0709young.htmlhttp://www.nwfusion.com/net.worker/news/2001/116717_02-12-2001.htmlhttp://www.subscribenw.com/subscribe/new_intro.jsp?code=f1http://www.nwfusion.com/events/index.htmlhttp://www.networkworld.com/online/default.htmhttp://www.nwfusion.com/net.worker/news/2001/116717_02-12-2001.htmlhttp://www.nwfusion.com/columnists/2001/0709young.htmlhttp://www.nwfusion.com/columnists/2001/0924salamone.htmlhttp://www.nwfusion.com/news/2001/0919vconf.htmlhttp://www.networkworld.com/primers/videoconf/videoconfprimer.htmlhttp://www.nwfusion.com/alliancehttp://www.networkworld.com/alliance/mailto:[email protected]://www.networkworld.com/alliance/ -
7/28/2019 ABCs of Videoconferencing
7/7
of videoconferencing
Click here to signup!
world. Free NetworkWorld TechnologyTour and Expo inDallas, SanFrancisco,Washington DC,and New York.Attend FREE
applications,videoconferencing,plus productreviews, technologyinsiders,managementsurveys andtechnology updates- GET IT NOW.
http://www.nwwsubscribe.com/FOC531http://www.nwfusion.com/WANS5SB1Phttp://www.nwfusion.com/goto.jsp?code=F19Hhttp://www.nwfusion.com/goto.jsp?code=F19Hhttp://www.nwfusion.com/WANS5SB1Phttp://www.nwwsubscribe.com/FOC531