Inter-Asterisk Exchange (IAX): Deployment Scenarios in SIP-Enabled Networks
()
About this ebook
Written by an expert in the field of telecommunications, this book describes the Inter-Asterisk Exchange protocol (IAX) and its operations, discussing the main characteristics of the protocol including NAT traversal, security, IPv6 support, interworking between IPv4 and IPv6, interworking with SIP and many others. The author presents the ways in which IAX can be activated so as to avoid complications such as NAT and the presence of intermediary boxes in operational architectures. This book analytically demonstrates the added values of IAX protocol compared to existing ones, while proposing viable deployment scenarios that assess the behavior of the protocol in operational networks.
Key Features:
- Promotes a viable alternative protocol to ease deployment of multimedia services
- Analyses the capabilities of the IAX protocol and its ability to meet VoIP service provider requirements, and provides scenarios of introducing IAX within operational architectures
- Addresses the advantages and disadvantages of SIP, and Details the features of IAX that can help, in junction with SIP, to overcome various disadvantages of SIP
- Explores the added values of IAX protocol compared to existing protocols
- Discusses the compatibility of new adopted architectures and associated protocols
This book will be a valuable reference for service providers, protocol designers, vendors and service implementers. Lecturers and advanced students computer science, electrical engineering and telecoms courses will also find this book of interest.
Related to Inter-Asterisk Exchange (IAX)
Titles in the series (15)
Service Automation and Dynamic Provisioning Techniques in IP / MPLS Environments Rating: 0 out of 5 stars0 ratingsPersonal Networks: Wireless Networking for Personal Devices Rating: 3 out of 5 stars3/5Towards 4G Technologies: Services with Initiative Rating: 0 out of 5 stars0 ratingsInter-Asterisk Exchange (IAX): Deployment Scenarios in SIP-Enabled Networks Rating: 0 out of 5 stars0 ratingsMobile Peer to Peer (P2P): A Tutorial Guide Rating: 0 out of 5 stars0 ratingsPublish / Subscribe Systems: Design and Principles Rating: 3 out of 5 stars3/56LoWPAN: The Wireless Embedded Internet Rating: 0 out of 5 stars0 ratingsMobility Models for Next Generation Wireless Networks: Ad Hoc, Vehicular and Mesh Networks Rating: 0 out of 5 stars0 ratingsService Provision: Technologies for Next Generation Communications Rating: 0 out of 5 stars0 ratingsQOS-Enabled Networks: Tools and Foundations Rating: 0 out of 5 stars0 ratingsFast and Efficient Context-Aware Services Rating: 0 out of 5 stars0 ratingsCore and Metro Networks Rating: 0 out of 5 stars0 ratingsNetwork Congestion Control: Managing Internet Traffic Rating: 0 out of 5 stars0 ratingsSoftware Defined Mobile Networks (SDMN): Beyond LTE Network Architecture Rating: 0 out of 5 stars0 ratings
Related ebooks
The Wireless Internet Explained Rating: 5 out of 5 stars5/5Parlay / OSA: From Standards to Reality Rating: 0 out of 5 stars0 ratingsSymbian OS Communications Programming Rating: 0 out of 5 stars0 ratingsMobile Middleware: Supporting Applications and Services Rating: 0 out of 5 stars0 ratingsMultimedia Broadcasting and Multicasting in Mobile Networks Rating: 0 out of 5 stars0 ratingsMultiplexed Networks for Embedded Systems: CAN, LIN, FlexRay, Safe-by-Wire... Rating: 0 out of 5 stars0 ratingsNetwork Programming in .NET: With C# and Visual Basic .NET Rating: 3 out of 5 stars3/5Towards 4G Technologies: Services with Initiative Rating: 0 out of 5 stars0 ratingsCore and Metro Networks Rating: 0 out of 5 stars0 ratingsPorting to the Symbian Platform: Open Mobile Development in C/C++ Rating: 0 out of 5 stars0 ratingsMulticast in Third-Generation Mobile Networks: Services, Mechanisms and Performance Rating: 0 out of 5 stars0 ratingsVoice over Internet Protocol (VoIP) Security Rating: 0 out of 5 stars0 ratingsInformation Technology Standards: Quest for the Common Byte Rating: 5 out of 5 stars5/5Mobile Python: Rapid prototyping of applications on the mobile platform Rating: 4 out of 5 stars4/5IM Instant Messaging Security Rating: 0 out of 5 stars0 ratingsAmbient Networks: Co-operative Mobile Networking for the Wireless World Rating: 0 out of 5 stars0 ratingsMobile Peer to Peer (P2P): A Tutorial Guide Rating: 0 out of 5 stars0 ratingsUnderstanding and Designing Computer Networks Rating: 5 out of 5 stars5/5The World Wide Wi-Fi: Technological Trends and Business Strategies Rating: 0 out of 5 stars0 ratingsVoIP: Wireless, P2P and New Enterprise Voice over IP Rating: 0 out of 5 stars0 ratingsSchaum's Outline of Computer Networking Rating: 0 out of 5 stars0 ratingsDigital Video Distribution in Broadband, Television, Mobile and Converged Networks: Trends, Challenges and Solutions Rating: 0 out of 5 stars0 ratingsMobile Telecommunications Protocols for Data Networks Rating: 3 out of 5 stars3/5Next Generation Wireless Applications: Creating Mobile Applications in a Web 2.0 and Mobile 2.0 World Rating: 0 out of 5 stars0 ratings6LoWPAN: The Wireless Embedded Internet Rating: 0 out of 5 stars0 ratingsSymbian OS Internals: Real-time Kernel Programming Rating: 0 out of 5 stars0 ratingsPersonal Computer Local Networks Report Rating: 0 out of 5 stars0 ratingsSecurity in Wireless Ad Hoc and Sensor Networks Rating: 0 out of 5 stars0 ratingsDesigning and Developing Scalable IP Networks Rating: 0 out of 5 stars0 ratingsATM and Internet Protocol Rating: 0 out of 5 stars0 ratings
Telecommunications For You
12 Ways Your Phone Is Changing You Rating: 4 out of 5 stars4/5Android App Development For Dummies Rating: 0 out of 5 stars0 ratingsMedical Charting Demystified Rating: 2 out of 5 stars2/515 Dangerously Mad Projects for the Evil Genius Rating: 4 out of 5 stars4/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5The Hello Girls: America’s First Women Soldiers Rating: 4 out of 5 stars4/5Codes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5The Deal of the Century: The Breakup of AT&T Rating: 4 out of 5 stars4/5A Beginner's Guide to Ham Radio Rating: 0 out of 5 stars0 ratingsWireless and Mobile Hacking and Sniffing Techniques Rating: 0 out of 5 stars0 ratingsMedical Terminology Demystified Rating: 4 out of 5 stars4/522 Radio and Receiver Projects for the Evil Genius Rating: 0 out of 5 stars0 ratingsMORE Electronic Gadgets for the Evil Genius: 40 NEW Build-it-Yourself Projects Rating: 4 out of 5 stars4/5The Great U.S.-China Tech War Rating: 4 out of 5 stars4/5Radio and Radar Astronomy Projects for Beginners Rating: 0 out of 5 stars0 ratingsPharmacology Demystified Rating: 4 out of 5 stars4/5iPhone Unlocked Rating: 0 out of 5 stars0 ratingsMaking Things Move DIY Mechanisms for Inventors, Hobbyists, and Artists Rating: 0 out of 5 stars0 ratingsMath Proofs Demystified Rating: 5 out of 5 stars5/5iPhone X Hacks, Tips and Tricks: Discover 101 Awesome Tips and Tricks for iPhone XS, XS Max and iPhone X Rating: 3 out of 5 stars3/5Probability Demystified 2/E Rating: 4 out of 5 stars4/5Cell Phone Photo Tips: How to Take Better Photos with Your Smart Phone Rating: 3 out of 5 stars3/5Get on the Air...Now! A practical, understandable guide to getting the most from Amateur Radio Rating: 3 out of 5 stars3/5Chemistry DeMYSTiFieD, Second Edition Rating: 3 out of 5 stars3/5Nurse Management Demystified Rating: 0 out of 5 stars0 ratingsCodes and Ciphers Rating: 5 out of 5 stars5/5Telecom For Dummies Rating: 0 out of 5 stars0 ratings
Reviews for Inter-Asterisk Exchange (IAX)
0 ratings0 reviews