Inter-Asterisk Exchange (IAX): Deployment Scenarios in SIP-Enabled Networks

by
Format: eBook
Pub. Date: 2009-01-01
Publisher(s): Wiley
Availability: This title is currently not available.
  • Free Shipping Icon

    This Item Qualifies for Free Shipping!*

    *Excludes marketplace orders.

List Price: $131.25

Rent Textbook

Select for Price
There was a problem. Please try again later.

New Textbook

We're Sorry
Sold Out

Used Textbook

We're Sorry
Sold Out

eTextbook

We're Sorry
Not Available

Summary

Find out how IAX can complement SIP to overcome complications encountered in current SIP-based communicationsWritten by an expert in the field of telecommunications, this book describes the Inter-Asterisk Exchange protocol (IAX) and its operations, discussing the main characteristics of the protocol including NAT traversal, security, IPv6 support, interworking between IPv4 and IPv6, interworking with SIP and many others. The author presents the ways in which IAX can be activated so as to avoid complications such as NAT and the presence of intermediary boxes in operational architectures. This book analytically demonstrates the added values of IAX protocol compared to existing ones, while proposing viable deployment scenarios that assess the behavior of the protocol in operational networks.Key Features: Promotes a viable alternative protocol to ease deployment of multimedia services Analyses the capabilities of the IAX protocol and its ability to meet VoIP service provider requirements, and provides scenarios of introducing IAX within operational architectures Addresses the advantages and disadvantages of SIP, and Details the features of IAX that can help, in junction with SIP, to overcome various disadvantages of SIP Explores the added values of IAX protocol compared to existing protocols Discusses the compatibility of new adopted architectures and associated protocolsThis book will be a valuable reference for service providers, protocol designers, vendors and service implementers. Lecturers and advanced students computer science, electrical engineering and telecoms courses will also find this book of interest.

Table of Contents

Foreword.Terminology and Definitions.Acronyms and Abbreviations.Acknowledgement.1 Introduction.1.1 General Introduction.1.2 On Voice over IP and Telephony over IP.1.3 Context.1.4 Enhancement Strategies to Solve SIP Issues.1.5 IAX: Towards Lightweight Telephony Architectures.1.6 IAX and Standardisation.1.7 Rationale.1.8 What This Book is Not.1.9 Structure of the Book.2 The IAX Protocol at a Glance.2.1 What Does IAX Stand For?2.2 Is IAX Specific to the Asterisk Platform?2.3 What is the Difference between IAX2 and IAX?2.4 Why another New VoIP Protocol?2.5 How Does IAX Solve VoIP Pains?2.6 How is Calls Multiplexing Achieved?2.7 And What About Demultiplexing?2.8 What Port Number Does IAX Use?2.9 What Transport Protocol Does IAX Use?2.10 Is IAX a Reliable Protocol?2.11 How Does IAX Ensure Reliability?2.12 Is there an IAX Registration Procedure?2.13 Does IAX Registration Differ from SIP Registration?2.14 How Are Media Streams Transported in IAX?2.15 Is CODEC Negotiation Supported by IAX?2.16 Is On-Fly CODEC Change Possible During a Call?2.17 IAX: a Path-Coupled or Decoupled Protocol?2.18 Can IAX be Aware of the Status of the Network Load?2.19 What About Security?2.20 Could IAX Devices Be Managed?2.21 Is Firmware Version Updating Supported by IAX?2.22 Can IAX Be Extended to Offer New Features?2.23 How is an IAX Resource Identified?2.24 What Does an IAX URI Look Like?2.25 Is it Possible to Set a Call Involving Several IAX Servers?2.26 Is it Possible to Discover the Location of an IAX Resource?2.27 What Is DUNDi?2.28 What Is TRIP?2.29 What Is ENUM?References.Further Reading.Part One: IAX Protocol Specifications.3 IAX Uniform Resource Identifier.3.1 Introduction.3.2 Format of IAX Uniform Resource Identifiers.3.3 Examples of IAX Uniform Resource Identifiers.3.4 Comparing IAX Uniform Resource Identifiers.3.5 IAX Uniform Resource Identifiers and ENUM.3.5.6 Examples of IAX ENUM Service Registration.References.Further Reading.4 IAX Frames.4.1 Introduction.4.2 Full Frames.4.3 Mini Frames.4.4 Meta Frames.4.5 Encrypted Frames.4.6 Conclusion.References.Further Reading.5 IAX Information Elements.5.1 Introduction.5.2 List of IAX Information Elements.5.3 Example of IAX Information Element Traces.References.Further Reading.6 IAX Messages.6.1 Introduction.6.2 Taxonomy of IAX Messages.6.3 IAX Requests/Responses.6.4 IAX Functional Categories.6.5 IAX Media Frames.6.6 IAX Reliable/Unreliable Messages.References.Further Reading.7 IAX Connectivity Considerations.7.1 Introduction.7.2 IAX Transport Protocol.7.3 IAX Port Number.7.4 IAX Call Multiplexing and Demultiplexing.7.5 IAX Reliability Mechanism.7.6 Authentication and Encryption.7.7 Conclusion.References.Further Reading.8 IAX Operations.8.1 Introduction.8.2 Provisioning and Firmware Download.8.3 Registration.8.4 Call Setup.8.5 Call

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.