Please wait a minute...
Computer & Telecommunication  2015, Vol. 1 Issue (1-2): 37-39    DOI:
Current Issue | Archive | Adv Search |
VoIP Client Design Based on Android
Chen Ketang Zhang Yunbo
Qiongzhou College
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  The rapid developme nt of intelligent mobile phone provides a great platform for internet phone. The mobile VoIP client is developed based on Android, realizing the free call function in LAN.
Key wordsmobile internet/Android      VoIP/SIP     
Published: 08 November 2017
:  TP393  

Cite this article:

Chen Ketang, Zhang Yunbo. VoIP Client Design Based on Android. Computer & Telecommunication, 2015, 1(1-2): 37-39.

URL:

https://www.computertelecom.com.cn/EN/     OR     https://www.computertelecom.com.cn/EN/Y2015/V1/I1-2/37

[1] LI Jia-Qi SU Li-na. Research on Science and Technology Information Service platform of Comprehensive Sci-tech Journals based on Mobile Interconnection and its Architecture[J]. 电脑与电信, 2019, 1(6): 42-46.
[2] GAO Pan LIN Li. Discussion on the Omni-directional Defense for Virus Defense[J]. 电脑与电信, 2019, 1(5): 45-47.
[3] HUANG Xiao-hua. Analysis on the Head of the Web[J]. 电脑与电信, 2019, 1(5): 75-77.
[4] XIN Yan-shuang CHEN Si HAN Xiu-yuan. A Tele-collaboration Implementation Scheme Based on ICE[J]. 电脑与电信, 2019, 1(4): 61-65.
[5] FANG Yong. Research on the IPv6 Remote Network Monitoring and Communication System[J]. 电脑与电信, 2019, 1(3): 62-65.
[6] LIU Jin YAN Cong YUAN Xi. Research on Security Baseline Configuration Verification Based on Cloud Computing Virtualization Platform[J]. 电脑与电信, 2019, 1(1-2): 28-34.
[7] Wang Gang. A Congestion Control Mechanism for Improving Fairness of TCP and UDP Data Flow[J]. 电脑与电信, 2018, 1(12): 70-73.
[8] CHEN Si-qi. Fine Grained Image Localization Based on Bilinear Convolutional Neural Network [J]. 电脑与电信, 2018, 1(11): 78-80.
[9] ZHENG Ai-yuan. Research on Evaluation Function Based on Indexin Fuzzy Network[J]. 电脑与电信, 2018, 1(9): 32-35.
[10] WANG Biao, TAN Si-min, RUAN Yuan-hua, XIE Tian-jie. Research on Evaluation Index System of Cloud Computing Service Quality[J]. 电脑与电信, 2018, 1(4): 4-6.
[11] GUAN Yu. A RFID Authentication Protocol[J]. 电脑与电信, 2018, 1(4): 31-33.
[12] ZHANG Yun. Design of Intelligent Supervision and Evaluation System Based on Cloudview[J]. 电脑与电信, 2018, 1(4): 43-46.
[13] FANG Zi-ling, KUANG Fang-jun. Data Analysis on NetEase Ballad Lyrics Based on Python[J]. 电脑与电信, 2018, 1(4): 53-56.
[14] CHENWen-yao. IDC Core Network Design for Telecom Carriers[J]. 电脑与电信, 2018, 1(3): 40-42.
[15] LU Yu-fan, WANG Xun. Research on the Hadoop Platform Safety Reinforcement Based on the Kerberos Authentication Mechanism[J]. 电脑与电信, 2018, 1(1-2): 47-49.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd