ABCs of Videoconferencing

download ABCs of Videoconferencing

of 7

Transcript of ABCs of Videoconferencing

  • 7/28/2019 ABCs of Videoconferencing

    1/7

    of videoconferencing

    /D|/SCRATCH/ABCs%20of%20videoconferencing.htm[07/05/2013 01:16:56 p.m.]

    Search /Docfinder:

    Advanced search | Help | Site

    ESEARCHENTERS

    ApplicationsCareersConvergenceData CenterLANsNet/Systems Mgmt.NOSesOutsourcingRouters/SwitchesSecurityService ProvidersSmall/Med.BusinessStorageWAN ServicesWeb/e-commerceWireless/Mobile

    ITE RESOURCES

    Daily NewsNewslettersThis Week in NWTests/ReviewsBuyer's Guides

    /

    ABCs of videoconferencing

    Pick the right client device, figure out LAN bandwidth requirements,nail down WAN links, then start conferencing.

    By Christine PereyNetwork World, 10/29/01

    If your company's travel budget has been slashed or if the recentterrorist attacks have made employees reluctant to fly, you may beconsidering videoconferencing as an alternative to face-to-facemeetings.

    Before you jump in, here's a comprehensive guide to enterprise-levelvideoconferencing that covers everything from bandwidthrequirements to equipment options to deployment costs.

    Audio primer: Videoconferencing

    Get up to speed on the basic technology.

    http://search.nwfusion.com/index.html?col=&qs=&qc=&si=0&ql=a&nh=25&lk=1&rf=0http://www.nwfusion.com/research/searchhelp.htmlhttp://www.nwfusion.com/sitemap.htmlhttp://www.networkworld.com/topics/applications.htmlhttp://www.networkworld.com/careers/http://www.networkworld.com/topics/convergence.htmlhttp://www.networkworld.com/topics/datacenter.htmlhttp://www.networkworld.com/topics/lans.htmlhttp://www.networkworld.com/topics/management.htmlhttp://www.networkworld.com/topics/nos.htmlhttp://www.networkworld.com/topics/outsourcing.htmlhttp://www.networkworld.com/topics/routers.htmlhttp://www.networkworld.com/topics/security.htmlhttp://www.networkworld.com/edge/http://www.networkworld.com/net.worker/http://www.networkworld.com/topics/storage.htmlhttp://www.networkworld.com/topics/wan.htmlhttp://www.networkworld.com/topics/ecommerce.htmlhttp://www.networkworld.com/topics/wireless.htmlhttp://www.networkworld.com/news/netflash.htmlhttp://www.networkworld.com/newsletters/http://www.networkworld.com/news/thisweek.htmlhttp://www.networkworld.com/reviews/http://www.networkworld.com/reviews/bg.htmlhttp://www.networkworld.com/primers/videoconf/videoconfprimer.htmlhttp://ad.doubleclick.net/click;h=v8/3ddb/0/0/%2a/n;44306;0-0;0;43070114;2321-160/600;0/0/0;u=,idge-11357561046_1367950625,12ea3f7ca485525,idge,idge.idge_l;~aopt=2/1/e/0;~sscs=%3fhttp://www.networkworld.com/primers/videoconf/videoconfprimer.htmlhttp://www.networkworld.com/reviews/bg.htmlhttp://www.networkworld.com/reviews/http://www.networkworld.com/news/thisweek.htmlhttp://www.networkworld.com/newsletters/http://www.networkworld.com/news/netflash.htmlhttp://www.networkworld.com/topics/wireless.htmlhttp://www.networkworld.com/topics/ecommerce.htmlhttp://www.networkworld.com/topics/wan.htmlhttp://www.networkworld.com/topics/storage.htmlhttp://www.networkworld.com/net.worker/http://www.networkworld.com/net.worker/http://www.networkworld.com/edge/http://www.networkworld.com/topics/security.htmlhttp://www.networkworld.com/topics/routers.htmlhttp://www.networkworld.com/topics/outsourcing.htmlhttp://www.networkworld.com/topics/nos.htmlhttp://www.networkworld.com/topics/management.htmlhttp://www.networkworld.com/topics/lans.htmlhttp://www.networkworld.com/topics/datacenter.htmlhttp://www.networkworld.com/topics/convergence.htmlhttp://www.networkworld.com/careers/http://www.networkworld.com/topics/applications.htmlhttp://www.nwfusion.com/sitemap.htmlhttp://www.nwfusion.com/research/searchhelp.htmlhttp://search.nwfusion.com/index.html?col=&qs=&qc=&si=0&ql=a&nh=25&lk=1&rf=0http://www.nwfusion.com/http://ad.doubleclick.net/activity;src%3D2919002%3Bmet%3D1%3Bv%3D1%3Bpid%3D43070114%3Baid%3D266674147%3Bko%3D1%3Bcid%3D53613973%3Brid%3D53530709%3Brv%3D1%3Bcs%3Dp%3Beid1%3D1078364%3Becn1%3D1%3Betm1%3D0%3B_dc_redir%3Durl%3fhttp://ad.doubleclick.net/click%3Bh%3Dv8/3dcc/3/0/%2a/o%3B266674147%3B0-0%3B1%3B43070114%3B3454-728/90%3B53613973/53530709/1%3Bu%3D%2Cidge-21284195155_1366666851%2C12bd2ccb9d08309%2Cidge%2Cidge.idge_l-idgt.gn-idgt.cu-na.x224-na.x277-na.apc-na.aom-na.x325-na.anj-na.apu-na.apg-na.apy-na.aqf-na.aqh-na.ara-na.lj-na.lk-na.8-na.25-na.lg-na.w152_y-na.w154_y-na.w156_y-na.li-na.ly-na.lr-na.43-na.35%3B~aopt%3D2/1/e/0%3B~sscs%3D%3fhttp://resources.networkworld.com/show/200015647/00622540083381NWWORUXTN5Z73/?email=%%emailaddr%%http://ad.doubleclick.net/click;h=v8/3dcc/0/0/%2a/j;44306;0-0;0;43070114;31-1/1;0/0/0;u=,idge-21187542524_1366666850,12bd2ccb9d08309,idge,idge.idge_l-idgt.gn-idgt.cu-na.x224-na.x277-na.apc-na.aom-na.x325-na.anj-na.apu-na.apg-na.apy-na.aqf-na.aqh-na.ara-na.lj-na.lk-na.8-na.25-na.lg-na.w152_y-na.w154_y-na.w156_y-na.li-na.ly-na.lr-na.43-na.35;~aopt=2/1/e/0;~sscs=%3fhttp://ad.doubleclick.net/click;h=v8/3dcc/0/0/%2a/j;44306;0-0;0;43070114;31-1/1;0/0/0;u=,idge-21187542524_1366666850,12bd2ccb9d08309,idge,idge.idge_l-idgt.gn-idgt.cu-na.x224-na.x277-na.apc-na.aom-na.x325-na.anj-na.apu-na.apg-na.apy-na.aqf-na.aqh-na.ara-na.lj-na.lk-na.8-na.25-na.lg-na.w152_y-na.w154_y-na.w156_y-na.li-na.ly-na.lr-na.43-na.35;~aopt=2/1/e/0;~sscs=%3fhttp://ad.doubleclick.net/click;h=v8/3ddb/0/0/%2a/j;44306;0-0;0;43070114;31-1/1;0/0/0;u=,idge-21187542524_1366666850,12bd2ccb9d08309,idge,idge.idge_l-idgt.gn-idgt.cu-na.x224-na.x277-na.apc-na.aom-na.x325-na.anj-na.apu-na.apg-na.apy-na.aqf-na.aqh-na.ara-na.lj-na.lk-na.8-na.25-na.lg-na.w152_y-na.w154_y-na.w156_y-na.li-na.ly-na.lr-na.43-na.35;~aopt=2/1/e/0;~sscs=%3fhttp://ad.doubleclick.net/click;h=v8/3ddb/0/0/%2a/j;44306;0-0;0;43070114;31-1/1;0/0/0;u=,idge-21187542524_1366666850,12bd2ccb9d08309,idge,idge.idge_l-idgt.gn-idgt.cu-na.x224-na.x277-na.apc-na.aom-na.x325-na.anj-na.apu-na.apg-na.apy-na.aqf-na.aqh-na.ara-na.lj-na.lk-na.8-na.25-na.lg-na.w152_y-na.w154_y-na.w156_y-na.li-na.ly-na.lr-na.43-na.35;~aopt=2/1/e/0;~sscs=%3fhttp://www.networkworld.com/primers/videoconf/videoconfprimer.html
  • 7/28/2019 ABCs of Videoconferencing

    2/7

    of videoconferencing

    /D|/SCRATCH/ABCs%20of%20videoconferencing.htm[07/05/2013 01:16:56 p.m.]

    OpinionForumsSpecial IssuesHow to/PrimersCase StudiesNetwork LifeEncyclopediaT Briefings

    ODAY'S NEWS BYODLawsuitsLoom as WorkGets Personal

    Red Hatdrops JBoss,goes withWildFly forJava

    middleware Debate ragesovercontentiousInternet salestax proposal

    HowOpenStackShouldPrepare Itselffor theEnterprise

    Five Ways toImprove Your

    EnterpriseSocialNetworkingStrategy

    The Internetof Things:Coming to anetwork nearyou

    Windows 8Update:Smaller, lessexpensivegear on tapfor back-to-school

    Cisco edgesF5 in VPNshootout

    Anonymouscalls forInternetblackout toprotest CISPA

    Hospital optsfor Wi-Fi overGPS insmartphone

    Client devices

    Currently there are three distinct categories of clients definedprimarily by usage.

    Desktop: Desktop videoconferencing clients are assigned to asingle user. They cost between $600 and $3,000 for a hardware-based system and up to $150 for a software-only client. Connectivityis over IP.

    Small group: Either an appliance that costs between $3,000 and

    $12,000 or a PC-based system that costs between $6,000 and$14,000. Small-group videoconferencing systems are relatively easyto configure and use. They run over ISDN or IP.

    Large group/boardroom: Provide the highest-quality video, but alsocome with the highest price tag, with systems starting at $10,000.They also run over ISDN or IP.

    Comparison data Types of client devices, bandwidth requirements, and network components forvideoconferencing.

    LAN speeds

    Videoconferencing can leverage the existing public telephone network,a private IP network or the Internet. The target bandwidth forinteractive video communications is in the 300K to 400K bit/sec perstream range. This includes audio and video as well as controlsignaling.

    The H.323 protocol does not require that two or more endpoints in asession send the same data rate they receive. A low-poweredendpoint may only be able to encode at a rate of 100K bit/sec, but,because decoding is less processor-intensive, it could decode a 300Kbit/sec videostream.

    Nevertheless, in videoconferencing, bandwidth is assumed to besymmetrical. In full-duplex networks such as ISDN, Ethernet, ATMand time division multiplexed networks, capacity is expressed asbandwidth in one direction, though equal bandwidth is available fortraffic in the opposite direction.

    You need to estimate the number of simultaneous sessions yournetwork needs to support, and figure out if your network hasbandwidth end-to-end.

    A T-1 offers 1.5M bit/sec in each direction and would be amplebandwidth for two 512K bit/sec or three 384K bit/secvideoconferences, depending on the amount of simultaneous traffic on

    the network. Also, make sure that you have 10/100 switched Ethernetthroughout the LAN segments where videoconferencing traffic isexpected.

    Multipoint conference bandwidth (with which three or more locationscan see and hear one another) is calculated separately from point-to-point sessions. Multipoint can be conducted in either IP or ISDNenvironments, and some conferencing units will support both networktypes.

    Multipoint conferencing products may be software-based oraccelerated with special hardware, and their configuration canproduce different bandwidth consumption patterns as well as differentuser experiences. For example, when an endpoint is used to host a

    http://www.networkworld.com/opinions/http://www.networkworld.com/forum/http://www.networkworld.com/indepth/http://www.networkworld.com/howto/http://www.networkworld.com/howto/casestudies.htmlhttp://www.networklifemag.com/http://www.networkworld.com/links/Encyclopedia/http://www.networkworld.com/it-briefing/http://www.networkworld.com/news/2013/042213-byod-lawsuits-loom-as-work-268976.htmlhttp://www.networkworld.com/news/2013/042213-byod-lawsuits-loom-as-work-268976.htmlhttp://www.networkworld.com/news/2013/042213-byod-lawsuits-loom-as-work-268976.htmlhttp://www.networkworld.com/news/2013/042213-byod-lawsuits-loom-as-work-268976.htmlhttp://www.networkworld.com/news/2013/042213-wildfly-268985.htmlhttp://www.networkworld.com/news/2013/042213-wildfly-268985.htmlhttp://www.networkworld.com/news/2013/042213-wildfly-268985.htmlhttp://www.networkworld.com/news/2013/042213-wildfly-268985.htmlhttp://www.networkworld.com/news/2013/042213-wildfly-268985.htmlhttp://www.networkworld.com/news/2013/042213-wildfly-268985.htmlhttp://www.networkworld.com/news/2013/042213-debate-rages-over-contentious-internet-268980.htmlhttp://www.networkworld.com/news/2013/042213-debate-rages-over-contentious-internet-268980.htmlhttp://www.networkworld.com/news/2013/042213-debate-rages-over-contentious-internet-268980.htmlhttp://www.networkworld.com/news/2013/042213-debate-rages-over-contentious-internet-268980.htmlhttp://www.networkworld.com/news/2013/042213-debate-rages-over-contentious-internet-268980.htmlhttp://www.networkworld.com/news/2013/042213-how-openstack-should-prepare-itself-268969.htmlhttp://www.networkworld.com/news/2013/042213-how-openstack-should-prepare-itself-268969.htmlhttp://www.networkworld.com/news/2013/042213-how-openstack-should-prepare-itself-268969.htmlhttp://www.networkworld.com/news/2013/042213-how-openstack-should-prepare-itself-268969.htmlhttp://www.networkworld.com/news/2013/042213-how-openstack-should-prepare-itself-268969.htmlhttp://www.networkworld.com/news/2013/042213-how-openstack-should-prepare-itself-268969.htmlhttp://www.networkworld.com/news/2013/042213-five-ways-to-improve-your-268971.htmlhttp://www.networkworld.com/news/2013/042213-five-ways-to-improve-your-268971.htmlhttp://www.networkworld.com/news/2013/042213-five-ways-to-improve-your-268971.htmlhttp://www.networkworld.com/news/2013/042213-five-ways-to-improve-your-268971.htmlhttp://www.networkworld.com/news/2013/042213-five-ways-to-improve-your-268971.htmlhttp://www.networkworld.com/news/2013/042213-five-ways-to-improve-your-268971.htmlhttp://www.networkworld.com/news/2013/042213-internet-things-267824.htmlhttp://www.networkworld.com/news/2013/042213-internet-things-267824.htmlhttp://www.networkworld.com/news/2013/042213-internet-things-267824.htmlhttp://www.networkworld.com/news/2013/042213-internet-things-267824.htmlhttp://www.networkworld.com/news/2013/042213-internet-things-267824.htmlhttp://www.networkworld.com/news/2013/042213-win8-update-268982.htmlhttp://www.networkworld.com/news/2013/042213-win8-update-268982.htmlhttp://www.networkworld.com/news/2013/042213-win8-update-268982.htmlhttp://www.networkworld.com/news/2013/042213-win8-update-268982.htmlhttp://www.networkworld.com/news/2013/042213-win8-update-268982.htmlhttp://www.networkworld.com/news/2013/042213-win8-update-268982.htmlhttp://www.networkworld.com/news/2013/042213-win8-update-268982.htmlhttp://www.networkworld.com/reviews/2013/042213-vpn-test-268316.htmlhttp://www.networkworld.com/reviews/2013/042213-vpn-test-268316.htmlhttp://www.networkworld.com/reviews/2013/042213-vpn-test-268316.htmlhttp://www.networkworld.com/news/2013/042213-anonymous-calls-for-internet-blackout-268939.htmlhttp://www.networkworld.com/news/2013/042213-anonymous-calls-for-internet-blackout-268939.htmlhttp://www.networkworld.com/news/2013/042213-anonymous-calls-for-internet-blackout-268939.htmlhttp://www.networkworld.com/news/2013/042213-anonymous-calls-for-internet-blackout-268939.htmlhttp://www.networkworld.com/news/2013/042213-anonymous-calls-for-internet-blackout-268939.htmlhttp://www.networkworld.com/news/2013/042213-hospital-opts-for-wi-fi-over-268951.htmlhttp://www.networkworld.com/news/2013/042213-hospital-opts-for-wi-fi-over-268951.htmlhttp://www.networkworld.com/news/2013/042213-hospital-opts-for-wi-fi-over-268951.htmlhttp://www.networkworld.com/news/2013/042213-hospital-opts-for-wi-fi-over-268951.htmlhttp://open_window%28%27http//www.nwfusion.com/research/2001/1029feat2side.html')http://ad.doubleclick.net/click;h=v8/3dcc/0/0/%2a/n;44306;0-0;0;43070114;2321-160/600;0/0/0;u=,idge-21594113514_1366666852,12bd2ccb9d08309,idge,idge.idge_l-idgt.gn-idgt.cu-na.x224-na.x277-na.apc-na.aom-na.x325-na.anj-na.apu-na.apg-na.apy-na.aqf-na.aqh-na.ara-na.lj-na.lk-na.8-na.25-na.lg-na.w152_y-na.w154_y-na.w156_y-na.li-na.ly-na.lr-na.43-na.35;~aopt=2/1/e/0;~sscs=%3fhttp://open_window%28%27http//www.nwfusion.com/research/2001/1029feat2side.html')http://www.networkworld.com/news/2013/042213-hospital-opts-for-wi-fi-over-268951.htmlhttp://www.networkworld.com/news/2013/042213-hospital-opts-for-wi-fi-over-268951.htmlhttp://www.networkworld.com/news/2013/042213-hospital-opts-for-wi-fi-over-268951.htmlhttp://www.networkworld.com/news/2013/042213-hospital-opts-for-wi-fi-over-268951.htmlhttp://www.networkworld.com/news/2013/042213-anonymous-calls-for-internet-blackout-268939.htmlhttp://www.networkworld.com/news/2013/042213-anonymous-calls-for-internet-blackout-268939.htmlhttp://www.networkworld.com/news/2013/042213-anonymous-calls-for-internet-blackout-268939.htmlhttp://www.networkworld.com/news/2013/042213-anonymous-calls-for-internet-blackout-268939.htmlhttp://www.networkworld.com/news/2013/042213-anonymous-calls-for-internet-blackout-268939.htmlhttp://www.networkworld.com/reviews/2013/042213-vpn-test-268316.htmlhttp://www.networkworld.com/reviews/2013/042213-vpn-test-268316.htmlhttp://www.networkworld.com/reviews/2013/042213-vpn-test-268316.htmlhttp://www.networkworld.com/news/2013/042213-win8-update-268982.htmlhttp://www.networkworld.com/news/2013/042213-win8-update-268982.htmlhttp://www.networkworld.com/news/2013/042213-win8-update-268982.htmlhttp://www.networkworld.com/news/2013/042213-win8-update-268982.htmlhttp://www.networkworld.com/news/2013/042213-win8-update-268982.htmlhttp://www.networkworld.com/news/2013/042213-win8-update-268982.htmlhttp://www.networkworld.com/news/2013/042213-win8-update-268982.htmlhttp://www.networkworld.com/news/2013/042213-internet-things-267824.htmlhttp://www.networkworld.com/news/2013/042213-internet-things-267824.htmlhttp://www.networkworld.com/news/2013/042213-internet-things-267824.htmlhttp://www.networkworld.com/news/2013/042213-internet-things-267824.htmlhttp://www.networkworld.com/news/2013/042213-internet-things-267824.htmlhttp://www.networkworld.com/news/2013/042213-five-ways-to-improve-your-268971.htmlhttp://www.networkworld.com/news/2013/042213-five-ways-to-improve-your-268971.htmlhttp://www.networkworld.com/news/2013/042213-five-ways-to-improve-your-268971.htmlhttp://www.networkworld.com/news/2013/042213-five-ways-to-improve-your-268971.htmlhttp://www.networkworld.com/news/2013/042213-five-ways-to-improve-your-268971.htmlhttp://www.networkworld.com/news/2013/042213-five-ways-to-improve-your-268971.htmlhttp://www.networkworld.com/news/2013/042213-how-openstack-should-prepare-itself-268969.htmlhttp://www.networkworld.com/news/2013/042213-how-openstack-should-prepare-itself-268969.htmlhttp://www.networkworld.com/news/2013/042213-how-openstack-should-prepare-itself-268969.htmlhttp://www.networkworld.com/news/2013/042213-how-openstack-should-prepare-itself-268969.htmlhttp://www.networkworld.com/news/2013/042213-how-openstack-should-prepare-itself-268969.htmlhttp://www.networkworld.com/news/2013/042213-how-openstack-should-prepare-itself-268969.htmlhttp://www.networkworld.com/news/2013/042213-debate-rages-over-contentious-internet-268980.htmlhttp://www.networkworld.com/news/2013/042213-debate-rages-over-contentious-internet-268980.htmlhttp://www.networkworld.com/news/2013/042213-debate-rages-over-contentious-internet-268980.htmlhttp://www.networkworld.com/news/2013/042213-debate-rages-over-contentious-internet-268980.htmlhttp://www.networkworld.com/news/2013/042213-debate-rages-over-contentious-internet-268980.htmlhttp://www.networkworld.com/news/2013/042213-wildfly-268985.htmlhttp://www.networkworld.com/news/2013/042213-wildfly-268985.htmlhttp://www.networkworld.com/news/2013/042213-wildfly-268985.htmlhttp://www.networkworld.com/news/2013/042213-wildfly-268985.htmlhttp://www.networkworld.com/news/2013/042213-wildfly-268985.htmlhttp://www.networkworld.com/news/2013/042213-wildfly-268985.htmlhttp://www.networkworld.com/news/2013/042213-byod-lawsuits-loom-as-work-268976.htmlhttp://www.networkworld.com/news/2013/042213-byod-lawsuits-loom-as-work-268976.htmlhttp://www.networkworld.com/news/2013/042213-byod-lawsuits-loom-as-work-268976.htmlhttp://www.networkworld.com/news/2013/042213-byod-lawsuits-loom-as-work-268976.htmlhttp://www.networkingsmallbusiness.com/http://www.nwfusion.com/weblogs/layer8/http://www.networkworld.com/rss/http://www.networkworld.com/it-briefing/http://www.networkworld.com/links/Encyclopedia/http://www.networklifemag.com/http://www.networkworld.com/howto/casestudies.htmlhttp://www.networkworld.com/howto/http://www.networkworld.com/indepth/http://www.networkworld.com/forum/http://www.networkworld.com/opinions/
  • 7/28/2019 ABCs of Videoconferencing

    3/7

    of videoconferencing

    /D|/SCRATCH/ABCs%20of%20videoconferencing.htm[07/05/2013 01:16:56 p.m.]

    navigationapp

    Viewpoint:When itcomes toenterprisesecurity, is itbetter tofocus oncompliance orrisk?

    Microsoftfaces a loss ofrelevance

    iPhone 6rumor rollupfor the weekending April19

    Browserspose thegreatestthreat toenterprise,Microsoftreports

    IBM defendsOpenDaylightfrom doubters

    Microsoft maybacktrack onStart buttonin Windows 8

    Assange toGoogle'sSchmidt:'Idon'tuseemail'

    IBM-Lenovodeal likely tofocus on low-end,commodityservers,analyst says

    Reports:Blackstoneabandonsoffer for Dell

    Samsungfights dirtywith

    misleadingclaims againstHTC whomay havereplied in kind

    HouseapprovesCISPA overprivacyobjections

    Cloud fightkeepsAmazon,Microsoft,

    multipoint conference, the maximum bandwidth for any singleparticipant is the bandwidth allocated to that host divided by thenumber of locations participating. When you need to have more thanfour locations on a call at the same time, network-based products arerecommended.

    If you decide that your IP network can't handle the additional trafficassociated with live video sessions in a merged or converged networkdeployment, your options are to rely on circuit switched networks orto deploy additional IP bandwidth capacity.

    The WAN connection

    Approximately 80% of the group videoconferencing units installedtoday interface directly with ISDN. Less than 5% use ATM, and theremainder are on an IP net.

    ISDN is recommended when:

    You are planning to connect with people in locations outside yourcompany.

    The locations are in Europe, where ISDN is easily available andbroadband IP remains at least 50% more expensive than in the U.S.

    Your IP network capacity is lacking and you do not expect to placeoutbound calls more than two or three hours per month.

    If you use ISDN for transport and you want to add centralized useradministration or system management, you can still install anEthernet connection to each device and a management softwarepackage such as Polycom's Global Management System or Vcon'sMXM on a server in the company's data center.

    The limitations of ISDN (Basic Rate Interface or Primary RateInterface) include:

    Availability not widespread in the U.S.

    Difficulty configuring and managing once ordered.

    Subject to service interruptions (single point of failure).

    It has distance-driven and metered costs (long-distance).

    The infrastructure supports only one telephony-like service:multipoint conferencing.

    Video calls on ISDN cannot be put on hold, cannot be forwarded(when no one answers, when the line is in use or for any otherreason), and there has never been a video mail box on ISDN.Recording one side of an ISDN videoconference is possible using ananalog VCR provided the appropriate interfaces exist on the localclient system.

    The IP option

    Using proprietary technologies or H.323 standard-compliantendpoints, an IP network designed only for data can be modified tosupport business-quality videoconferencing services.

    Where bandwidth is available, the IT manager would need to add andadjust a few components to provide a complete solution, or outsourcethe management to a third party such as WireOne's GlowPoint serviceor Sprint's IP videoconferencing services.

    If the deployment is expected to have more than five or six systems,a centralized user and network administration console such as

    http://www.networkworld.com/news/2013/042213-hospital-opts-for-wi-fi-over-268951.htmlhttp://www.networkworld.com/news/2013/042213-hospital-opts-for-wi-fi-over-268951.htmlhttp://www.networkworld.com/news/2013/042213-viewpoint-security-268777.htmlhttp://www.networkworld.com/news/2013/042213-viewpoint-security-268777.htmlhttp://www.networkworld.com/news/2013/042213-viewpoint-security-268777.htmlhttp://www.networkworld.com/news/2013/042213-viewpoint-security-268777.htmlhttp://www.networkworld.com/news/2013/042213-viewpoint-security-268777.htmlhttp://www.networkworld.com/news/2013/042213-viewpoint-security-268777.htmlhttp://www.networkworld.com/news/2013/042213-viewpoint-security-268777.htmlhttp://www.networkworld.com/news/2013/042213-viewpoint-security-268777.htmlhttp://www.networkworld.com/news/2013/042213-viewpoint-security-268777.htmlhttp://www.networkworld.com/news/2013/042213-microsoft-faces-a-loss-of-268961.htmlhttp://www.networkworld.com/news/2013/042213-microsoft-faces-a-loss-of-268961.htmlhttp://www.networkworld.com/news/2013/042213-microsoft-faces-a-loss-of-268961.htmlhttp://www.networkworld.com/news/2013/041913-iphone6-rumors-268924.htmlhttp://www.networkworld.com/news/2013/041913-iphone6-rumors-268924.htmlhttp://www.networkworld.com/news/2013/041913-iphone6-rumors-268924.htmlhttp://www.networkworld.com/news/2013/041913-iphone6-rumors-268924.htmlhttp://www.networkworld.com/news/2013/041913-iphone6-rumors-268924.htmlhttp://www.networkworld.com/news/2013/041913-browsers-pose-the-greatest-threat-268914.htmlhttp://www.networkworld.com/news/2013/041913-browsers-pose-the-greatest-threat-268914.htmlhttp://www.networkworld.com/news/2013/041913-browsers-pose-the-greatest-threat-268914.htmlhttp://www.networkworld.com/news/2013/041913-browsers-pose-the-greatest-threat-268914.htmlhttp://www.networkworld.com/news/2013/041913-browsers-pose-the-greatest-threat-268914.htmlhttp://www.networkworld.com/news/2013/041913-browsers-pose-the-greatest-threat-268914.htmlhttp://www.networkworld.com/news/2013/041913-browsers-pose-the-greatest-threat-268914.htmlhttp://www.networkworld.com/news/2013/041913-ibm-opendaylight-268912.htmlhttp://www.networkworld.com/news/2013/041913-ibm-opendaylight-268912.htmlhttp://www.networkworld.com/news/2013/041913-ibm-opendaylight-268912.htmlhttp://www.networkworld.com/news/2013/041713-microsoft-may-backtrack-on-start-268802.htmlhttp://www.networkworld.com/news/2013/041713-microsoft-may-backtrack-on-start-268802.htmlhttp://www.networkworld.com/news/2013/041713-microsoft-may-backtrack-on-start-268802.htmlhttp://www.networkworld.com/news/2013/041713-microsoft-may-backtrack-on-start-268802.htmlhttp://www.networkworld.com/news/2013/041913-assange-to-google39s-schmidt-39i-268906.htmlhttp://www.networkworld.com/news/2013/041913-assange-to-google39s-schmidt-39i-268906.htmlhttp://www.networkworld.com/news/2013/041913-assange-to-google39s-schmidt-39i-268906.htmlhttp://www.networkworld.com/news/2013/041913-assange-to-google39s-schmidt-39i-268906.htmlhttp://www.networkworld.com/news/2013/041913-assange-to-google39s-schmidt-39i-268906.htmlhttp://www.networkworld.com/news/2013/041913-assange-to-google39s-schmidt-39i-268906.htmlhttp://www.networkworld.com/news/2013/041913-assange-to-google39s-schmidt-39i-268906.htmlhttp://www.networkworld.com/news/2013/041913-ibm-lenovo-deal-likely-to-focus-268899.htmlhttp://www.networkworld.com/news/2013/041913-ibm-lenovo-deal-likely-to-focus-268899.htmlhttp://www.networkworld.com/news/2013/041913-ibm-lenovo-deal-likely-to-focus-268899.htmlhttp://www.networkworld.com/news/2013/041913-ibm-lenovo-deal-likely-to-focus-268899.htmlhttp://www.networkworld.com/news/2013/041913-ibm-lenovo-deal-likely-to-focus-268899.htmlhttp://www.networkworld.com/news/2013/041913-ibm-lenovo-deal-likely-to-focus-268899.htmlhttp://www.networkworld.com/news/2013/041913-ibm-lenovo-deal-likely-to-focus-268899.htmlhttp://www.networkworld.com/news/2013/041913-blackstone-abandons-offer-for-268902.htmlhttp://www.networkworld.com/news/2013/041913-blackstone-abandons-offer-for-268902.htmlhttp://www.networkworld.com/news/2013/041913-blackstone-abandons-offer-for-268902.htmlhttp://www.networkworld.com/news/2013/041913-blackstone-abandons-offer-for-268902.htmlhttp://www.networkworld.com/news/2013/041813-android-roundup-268881.htmlhttp://www.networkworld.com/news/2013/041813-android-roundup-268881.htmlhttp://www.networkworld.com/news/2013/041813-android-roundup-268881.htmlhttp://www.networkworld.com/news/2013/041813-android-roundup-268881.htmlhttp://www.networkworld.com/news/2013/041813-android-roundup-268881.htmlhttp://www.networkworld.com/news/2013/041813-android-roundup-268881.htmlhttp://www.networkworld.com/news/2013/041813-android-roundup-268881.htmlhttp://www.networkworld.com/news/2013/041813-android-roundup-268881.htmlhttp://www.networkworld.com/news/2013/041813-house-approves-cispa-over-privacy-268879.htmlhttp://www.networkworld.com/news/2013/041813-house-approves-cispa-over-privacy-268879.htmlhttp://www.networkworld.com/news/2013/041813-house-approves-cispa-over-privacy-268879.htmlhttp://www.networkworld.com/news/2013/041813-house-approves-cispa-over-privacy-268879.htmlhttp://www.networkworld.com/news/2013/041813-house-approves-cispa-over-privacy-268879.htmlhttp://www.networkworld.com/news/2013/041813-aws-268883.htmlhttp://www.networkworld.com/news/2013/041813-aws-268883.htmlhttp://www.networkworld.com/news/2013/041813-aws-268883.htmlhttp://www.networkworld.com/news/2013/041813-aws-268883.htmlhttp://www.networkworld.com/news/2013/041813-aws-268883.htmlhttp://www.networkworld.com/news/2013/041813-aws-268883.htmlhttp://www.networkworld.com/news/2013/041813-aws-268883.htmlhttp://www.networkworld.com/news/2013/041813-aws-268883.htmlhttp://www.networkworld.com/news/2013/041813-house-approves-cispa-over-privacy-268879.htmlhttp://www.networkworld.com/news/2013/041813-house-approves-cispa-over-privacy-268879.htmlhttp://www.networkworld.com/news/2013/041813-house-approves-cispa-over-privacy-268879.htmlhttp://www.networkworld.com/news/2013/041813-house-approves-cispa-over-privacy-268879.htmlhttp://www.networkworld.com/news/2013/041813-house-approves-cispa-over-privacy-268879.htmlhttp://www.networkworld.com/news/2013/041813-android-roundup-268881.htmlhttp://www.networkworld.com/news/2013/041813-android-roundup-268881.htmlhttp://www.networkworld.com/news/2013/041813-android-roundup-268881.htmlhttp://www.networkworld.com/news/2013/041813-android-roundup-268881.htmlhttp://www.networkworld.com/news/2013/041813-android-roundup-268881.htmlhttp://www.networkworld.com/news/2013/041813-android-roundup-268881.htmlhttp://www.networkworld.com/news/2013/041813-android-roundup-268881.htmlhttp://www.networkworld.com/news/2013/041813-android-roundup-268881.htmlhttp://www.networkworld.com/news/2013/041913-blackstone-abandons-offer-for-268902.htmlhttp://www.networkworld.com/news/2013/041913-blackstone-abandons-offer-for-268902.htmlhttp://www.networkworld.com/news/2013/041913-blackstone-abandons-offer-for-268902.htmlhttp://www.networkworld.com/news/2013/041913-blackstone-abandons-offer-for-268902.htmlhttp://www.networkworld.com/news/2013/041913-ibm-lenovo-deal-likely-to-focus-268899.htmlhttp://www.networkworld.com/news/2013/041913-ibm-lenovo-deal-likely-to-focus-268899.htmlhttp://www.networkworld.com/news/2013/041913-ibm-lenovo-deal-likely-to-focus-268899.htmlhttp://www.networkworld.com/news/2013/041913-ibm-lenovo-deal-likely-to-focus-268899.htmlhttp://www.networkworld.com/news/2013/041913-ibm-lenovo-deal-likely-to-focus-268899.htmlhttp://www.networkworld.com/news/2013/041913-ibm-lenovo-deal-likely-to-focus-268899.htmlhttp://www.networkworld.com/news/2013/041913-ibm-lenovo-deal-likely-to-focus-268899.htmlhttp://www.networkworld.com/news/2013/041913-assange-to-google39s-schmidt-39i-268906.htmlhttp://www.networkworld.com/news/2013/041913-assange-to-google39s-schmidt-39i-268906.htmlhttp://www.networkworld.com/news/2013/041913-assange-to-google39s-schmidt-39i-268906.htmlhttp://www.networkworld.com/news/2013/041913-assange-to-google39s-schmidt-39i-268906.htmlhttp://www.networkworld.com/news/2013/041913-assange-to-google39s-schmidt-39i-268906.htmlhttp://www.networkworld.com/news/2013/041913-assange-to-google39s-schmidt-39i-268906.htmlhttp://www.networkworld.com/news/2013/041913-assange-to-google39s-schmidt-39i-268906.htmlhttp://www.networkworld.com/news/2013/041713-microsoft-may-backtrack-on-start-268802.htmlhttp://www.networkworld.com/news/2013/041713-microsoft-may-backtrack-on-start-268802.htmlhttp://www.networkworld.com/news/2013/041713-microsoft-may-backtrack-on-start-268802.htmlhttp://www.networkworld.com/news/2013/041713-microsoft-may-backtrack-on-start-268802.htmlhttp://www.networkworld.com/news/2013/041913-ibm-opendaylight-268912.htmlhttp://www.networkworld.com/news/2013/041913-ibm-opendaylight-268912.htmlhttp://www.networkworld.com/news/2013/041913-ibm-opendaylight-268912.htmlhttp://www.networkworld.com/news/2013/041913-browsers-pose-the-greatest-threat-268914.htmlhttp://www.networkworld.com/news/2013/041913-browsers-pose-the-greatest-threat-268914.htmlhttp://www.networkworld.com/news/2013/041913-browsers-pose-the-greatest-threat-268914.htmlhttp://www.networkworld.com/news/2013/041913-browsers-pose-the-greatest-threat-268914.htmlhttp://www.networkworld.com/news/2013/041913-browsers-pose-the-greatest-threat-268914.htmlhttp://www.networkworld.com/news/2013/041913-browsers-pose-the-greatest-threat-268914.htmlhttp://www.networkworld.com/news/2013/041913-browsers-pose-the-greatest-threat-268914.htmlhttp://www.networkworld.com/news/2013/041913-iphone6-rumors-268924.htmlhttp://www.networkworld.com/news/2013/041913-iphone6-rumors-268924.htmlhttp://www.networkworld.com/news/2013/041913-iphone6-rumors-268924.htmlhttp://www.networkworld.com/news/2013/041913-iphone6-rumors-268924.htmlhttp://www.networkworld.com/news/2013/041913-iphone6-rumors-268924.htmlhttp://www.networkworld.com/news/2013/042213-microsoft-faces-a-loss-of-268961.htmlhttp://www.networkworld.com/news/2013/042213-microsoft-faces-a-loss-of-268961.htmlhttp://www.networkworld.com/news/2013/042213-microsoft-faces-a-loss-of-268961.htmlhttp://www.networkworld.com/news/2013/042213-viewpoint-security-268777.htmlhttp://www.networkworld.com/news/2013/042213-viewpoint-security-268777.htmlhttp://www.networkworld.com/news/2013/042213-viewpoint-security-268777.htmlhttp://www.networkworld.com/news/2013/042213-viewpoint-security-268777.htmlhttp://www.networkworld.com/news/2013/042213-viewpoint-security-268777.htmlhttp://www.networkworld.com/news/2013/042213-viewpoint-security-268777.htmlhttp://www.networkworld.com/news/2013/042213-viewpoint-security-268777.htmlhttp://www.networkworld.com/news/2013/042213-viewpoint-security-268777.htmlhttp://www.networkworld.com/news/2013/042213-viewpoint-security-268777.htmlhttp://www.networkworld.com/news/2013/042213-hospital-opts-for-wi-fi-over-268951.htmlhttp://www.networkworld.com/news/2013/042213-hospital-opts-for-wi-fi-over-268951.html
  • 7/28/2019 ABCs of Videoconferencing

    4/7

    of videoconferencing

    /D|/SCRATCH/ABCs%20of%20videoconferencing.htm[07/05/2013 01:16:56 p.m.]

    Google andRackspaceclamoring forenterprisecustomers

    iPad 5 rumorrollup for theweek endingApril 17

    Google cloudopen for

    business includes $400cover charge

    OpenNetworkingFoundationdirectordetails SDNdirections,OpenDaylightimpact

    More breakingnews

    Polycom's Global Management System, RADVision's H.323 gatekeeperor Vcon's MXM is recommended.

    Some companies are going a step further and designing an enterpriseconferencing portal using technologies such as FVC's Click-to-Meet.While these packages differ in their features and functions, they aredesigned to perform address book management (an important issuewhen clients are set up behind a firewall and use network addresstranslation), set performance metrics on a per-device or user basis,and can even reduce the risk of application data traffic degradationdue to excessive bandwidth consumption.

    QoS questions

    Implementing quality of service (QoS) in a LAN helps to protect theintegrity of service-sensitive applications without forklift upgrades.Most of the leading network equipment vendors already supportcommon QoS standards, such as RSVP; they only need to be enabledby the network administrator.

    You should also find out what your backbone provider uses for itsQoS. If the protocol or scheme chosen for QoS in the local loop is notthe same as that implemented in the backbone, the enterprisenetwork needs to put QoS translation software in place for QoSrequests to operate end-to-end during a videoconference.

    Even when QoS protocols are in place, you may need additionalnetwork tuning to ensure that the video applications don't crowd outdata applications. To avoid this, network managers should segmentand manage bandwidth on each switch and router to limit the total,prioritized video traffic.

    After provisioning appropriate bandwidth and QoS, other challengesremain. One of the biggest obstacles is getting real-time video trafficthrough firewalls. Since H.323-compliant applications use dynamicallyallocated sockets for audio, video and data channels, a firewall mustbe able to allow H.323 traffic through on an intelligent basis. Thefirewall must be either H.323-enabled with an H.323 proxy, or able to

    snoop on the control channel to determine which dynamic sockets

    are in use for H.323 sessions, and to allow traffic through only aslong as the control channel is active.

    Merging and emerging services

    Since the very essence of videoconferencing is communications andmost legacy systems are not on IP networks, the user is likely toencounter a situation where protocols need translation acrossdifferent networks. When a videoconference needs to span both theISDN and IP infrastructures, gateways are necessary.

    RADVision is the leading manufacturer of videoconferencing gatewaysand offers a variety of form factors and densities to meet diversenetwork requirements.

    Some companies have to share limited resources and want areservation system to permit room or multipoint control unit (MCU)scheduling.

    Endpoint and MCU vendors offer some scheduling tools that maymeet your company's needs. Third-party products, such asCollaborative Systems' Orchestra, MagicSoft's VC Wizard and GlobalScheduling Solutions' Global Schedule, have unique features.

    When the videoconferencing basics are in place for groupconferencing, you might consider a number of optimizations. Forexample, by enabling IP multicast and using intelligent clients, anetwork can efficiently support multiway meetings without adding an

    http://www.networkworld.com/news/2013/041813-aws-268883.htmlhttp://www.networkworld.com/news/2013/041813-aws-268883.htmlhttp://www.networkworld.com/news/2013/041813-aws-268883.htmlhttp://www.networkworld.com/news/2013/041813-aws-268883.htmlhttp://www.networkworld.com/news/2013/041813-aws-268883.htmlhttp://www.networkworld.com/news/2013/041813-ipad5-rumors-268880.htmlhttp://www.networkworld.com/news/2013/041813-ipad5-rumors-268880.htmlhttp://www.networkworld.com/news/2013/041813-ipad5-rumors-268880.htmlhttp://www.networkworld.com/news/2013/041813-ipad5-rumors-268880.htmlhttp://www.networkworld.com/news/2013/041813-google-cloud-268854.htmlhttp://www.networkworld.com/news/2013/041813-google-cloud-268854.htmlhttp://www.networkworld.com/news/2013/041813-google-cloud-268854.htmlhttp://www.networkworld.com/news/2013/041813-google-cloud-268854.htmlhttp://www.networkworld.com/news/2013/041813-google-cloud-268854.htmlhttp://www.networkworld.com/news/2013/041813-qa-pitt-268858.htmlhttp://www.networkworld.com/news/2013/041813-qa-pitt-268858.htmlhttp://www.networkworld.com/news/2013/041813-qa-pitt-268858.htmlhttp://www.networkworld.com/news/2013/041813-qa-pitt-268858.htmlhttp://www.networkworld.com/news/2013/041813-qa-pitt-268858.htmlhttp://www.networkworld.com/news/2013/041813-qa-pitt-268858.htmlhttp://www.networkworld.com/news/2013/041813-qa-pitt-268858.htmlhttp://www.networkworld.com/news/2013/041813-qa-pitt-268858.htmlhttp://www.networkworld.com/news/netflash.htmlhttp://www.networkworld.com/news/netflash.htmlhttp://www.networkworld.com/news/netflash.htmlhttp://www.networkworld.com/news/netflash.htmlhttp://www.networkworld.com/news/2013/041813-qa-pitt-268858.htmlhttp://www.networkworld.com/news/2013/041813-qa-pitt-268858.htmlhttp://www.networkworld.com/news/2013/041813-qa-pitt-268858.htmlhttp://www.networkworld.com/news/2013/041813-qa-pitt-268858.htmlhttp://www.networkworld.com/news/2013/041813-qa-pitt-268858.htmlhttp://www.networkworld.com/news/2013/041813-qa-pitt-268858.htmlhttp://www.networkworld.com/news/2013/041813-qa-pitt-268858.htmlhttp://www.networkworld.com/news/2013/041813-qa-pitt-268858.htmlhttp://www.networkworld.com/news/2013/041813-google-cloud-268854.htmlhttp://www.networkworld.com/news/2013/041813-google-cloud-268854.htmlhttp://www.networkworld.com/news/2013/041813-google-cloud-268854.htmlhttp://www.networkworld.com/news/2013/041813-google-cloud-268854.htmlhttp://www.networkworld.com/news/2013/041813-google-cloud-268854.htmlhttp://www.networkworld.com/news/2013/041813-ipad5-rumors-268880.htmlhttp://www.networkworld.com/news/2013/041813-ipad5-rumors-268880.htmlhttp://www.networkworld.com/news/2013/041813-ipad5-rumors-268880.htmlhttp://www.networkworld.com/news/2013/041813-ipad5-rumors-268880.htmlhttp://www.networkworld.com/news/2013/041813-aws-268883.htmlhttp://www.networkworld.com/news/2013/041813-aws-268883.htmlhttp://www.networkworld.com/news/2013/041813-aws-268883.htmlhttp://www.networkworld.com/news/2013/041813-aws-268883.htmlhttp://www.networkworld.com/news/2013/041813-aws-268883.html
  • 7/28/2019 ABCs of Videoconferencing

    5/7

    of videoconferencing

    /D|/SCRATCH/ABCs%20of%20videoconferencing.htm[07/05/2013 01:16:56 p.m.]

    MCU.

    If using IP multicasting to achieve a multipoint scenario, each clientsends only one stream of packets to an IP multicast group and allparticipating machines receive the packets. In this scenario,bandwidth consumption is lower than when an endpoint or MCUsends out copies of the same packet to each of the receivers.

    Another second-generation feature found in products such asPolycom's ViewStation FX is integration of videoconferencing withstreaming media systems, enabling the broadcast of a

    videoconference from a coder/decoder to many remote viewers via astreaming media server or to archive a videoconference on astreaming media server for later review.

    Although an exception to the rule today, large financial servicescompanies that have integrated videoconferencing into their corporatecultures are beginning to deploy desktop videoconferencingcapabilities. With Universal Serial Bus interfaces, setting up avideocamera takes only a few minutes, in contrast with earlierdesktop products that required opening the PC and installing a card.Low-cost Webcams put all the computational load from compressingvideo and audio on the host computer. Optional hardware-acceleratedcameras designed specifically for videoconferencing, such as thePolycom ViaVideo or Vcon Vigo, produce the best results.

    How much does it cost?

    Depending on the number of endpoints, the type of client and choiceof networks, videoconferencing can cost as little as the price of aWebcam ($100) per seat to more than $15,000 per conference room.

    To budget a videoconferencing deployment, break down the fixedacquisition costs from the recurring and usage-based costs. The exactfixed costs are going to depend on the number of systems and thefeatures your users need. In general, systems provisioned for ISDNwill also support IP, but IP-only systems tend to cost several hundreddollars to $1,000 less than ISDN systems because they have fewercomponents. Management software is sold according to site licensesfrom $250 per license to $40,000 or more for unlimited licenses.Complete enterprise conferencing portal environments suitable forlarge companies can exceed $100,000 per installation, depending onhardware and software components.

    Another factor is the cost of installing the last mile. Basic Rate ISDNinstallation runs about $225 in most regions of the SBC territory, whileother regions tend to be higher. The cost of installing a T-1 dependson the distance between your facility and the nearest central office.

    Recurring costs are composed of the monthly cost of network access,network usage costs and, potentially, the salary for one or moretechnicians managing network provisioning, installations, room orconferencing system reservations, technical support and user training.The largest variable in this equation is the network usage costs.

    ISDN usage charges vary but can be estimated for individualcustomers (one site) at 5 cents per minute per B channel. A 384Kbit/sec videoconference will consume 6 B channels at a cost ofapproximately 30 cents per minute, or $18 per hour. Companies thatnegotiate their telecommunications rates with carriers for voice andvideo usually receive discounts on this rate.

    ISPs also charge for capacity, though not by the minute. To calculatethe costs of IP backbone services, multiply the data rate by the time.A 384K bit/sec call for one hour will generate nearly 1.4G bits ofbandwidth. On a VPN the network usage costs are already fixed andthe company will incur no additional charges.

  • 7/28/2019 ABCs of Videoconferencing

    6/7

    of videoconferencing

    /D|/SCRATCH/ABCs%20of%20videoconferencing.htm[07/05/2013 01:16:56 p.m.]

    Going with a managed service provider can be cost-effective for someregions and some companies. GlowPoint's Web site offers acalculator, and users can plug in the number of hours of usage perlocation and the average cost of ISDN service to obtain a costestimate.

    The costs of deploying videoconferencing are as variable as thenetworks and depend on the number of installations, features andchoice of network. Cost of ownership runs about $15 per hour for amidsize enterprise. It's safe to predict that costs will continue to fallas more people get on the bandwagon. And, in the face of rising

    travel costs, getting a rapid return on your investment invideoconferencing is easier now than ever before.

    RELATED LINKS

    Perey is president of Perey Research and Consulting in Placerville,Calif. She can be reached at [email protected].

    Global Test Alliance

    Perey is also a member of the Network World GlobalTest Alliance, a cooperative of the premier

    reviewers in the network industry, each bringing tobear years of practical experience on every review.

    For more Test Alliance information, including what it takes to becomea member, go to www.nwfusion.com/alliance.

    Audio primer: VideoconferencingGet up to speed on the basic technology.

    Videoconferencing demand peaks in WTC wakePreliminary estimates reveal sales of videoconferencing equipmentand services are expected to rise between 25 percent and 30 percentin the next few months.InfoWorld, 09/19/01.

    Time for videoconferencingThe terrorist attacks of Sept. 11 are likely to force many companies torethink how they bring people together to work.Network World, 09/24/01.

    The next great thing: video instant messagingVideo instant messaging, which is integrated into Microsoft's WindowsXP operating system, is going to make videoconferencing a ubiquitouspart of the business and consumer landscape.Network World, 07/09/01.

    Videoconferencing creeps toward the homeWhile desktop videoconferencing is enjoying heightened interest incorporations, its tentacles will be slow to reach at-home workers,according to experts.

    Net.Worker, 02/12/01.

    NWFusion offersmore than 40 FREEtechnology-specificemail newsletters inkey networktechnology areassuch as NSM, VPNs,Convergence,Security and more.

    New Event -WANs:Optimizing YourNetwork Now.Hear from theexperts about theinnovations that arealready starting toshake up the WAN

    Your FREE NetworkWorld subscriptionwill also includebreaking news andinformation onwireless, storage,infrastructure,carriers and SPs,enterprise

    mailto:[email protected]://www.networkworld.com/alliance/http://www.nwfusion.com/alliancehttp://www.networkworld.com/primers/videoconf/videoconfprimer.htmlhttp://www.nwfusion.com/news/2001/0919vconf.htmlhttp://www.nwfusion.com/columnists/2001/0924salamone.htmlhttp://www.nwfusion.com/columnists/2001/0709young.htmlhttp://www.nwfusion.com/net.worker/news/2001/116717_02-12-2001.htmlhttp://www.subscribenw.com/subscribe/new_intro.jsp?code=f1http://www.nwfusion.com/events/index.htmlhttp://www.networkworld.com/online/default.htmhttp://www.nwfusion.com/net.worker/news/2001/116717_02-12-2001.htmlhttp://www.nwfusion.com/columnists/2001/0709young.htmlhttp://www.nwfusion.com/columnists/2001/0924salamone.htmlhttp://www.nwfusion.com/news/2001/0919vconf.htmlhttp://www.networkworld.com/primers/videoconf/videoconfprimer.htmlhttp://www.nwfusion.com/alliancehttp://www.networkworld.com/alliance/mailto:[email protected]://www.networkworld.com/alliance/
  • 7/28/2019 ABCs of Videoconferencing

    7/7

    of videoconferencing

    Click here to signup!

    world. Free NetworkWorld TechnologyTour and Expo inDallas, SanFrancisco,Washington DC,and New York.Attend FREE

    applications,videoconferencing,plus productreviews, technologyinsiders,managementsurveys andtechnology updates- GET IT NOW.

    http://www.nwwsubscribe.com/FOC531http://www.nwfusion.com/WANS5SB1Phttp://www.nwfusion.com/goto.jsp?code=F19Hhttp://www.nwfusion.com/goto.jsp?code=F19Hhttp://www.nwfusion.com/WANS5SB1Phttp://www.nwwsubscribe.com/FOC531