Inter-Asterisk Exchange (IAX) Deployment Scenarios in SIP-Enabled Networks

by
Edition: 1st
Format: Hardcover
Pub. Date: 2009-02-17
Publisher(s): WILEY
  • Free Shipping Icon

    This Item Qualifies for Free Shipping!*

    *Excludes marketplace orders.

List Price: $145.54

Buy New

Arriving Soon. Will ship when available.
$138.61

Rent Textbook

Select for Price
There was a problem. Please try again later.

Rent Digital

Rent Digital Options
Online:1825 Days access
Downloadable:Lifetime Access
$124.80
$124.80

Used Textbook

We're Sorry
Sold Out

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

Find out how IAX can complement SIP to overcome complications encountered in current SIP-based communicationsWritten by an expert in the field of telecommunications, this book describes the Inter-Asterisk Exchange protocol (IAX) and its operations, discussing the main characteristics of the protocol including NAT traversal, security, IPv6 support, interworking between IPv4 and IPv6, interworking with SIP and many others. The author presents the ways in which IAX can be activated so as to avoid complications such as NAT and the presence of intermediary boxes in operational architectures. This book analytically demonstrates the added values of IAX protocol compared to existing ones, while proposing viable deployment scenarios that assess the behavior of the protocol in operational networks.Key Features: Promotes a viable alternative protocol to ease deployment of multimedia services Analyses the capabilities of the IAX protocol and its ability to meet VoIP service provider requirements, and provides scenarios of introducing IAX within operational architectures Addresses the advantages and disadvantages of SIP, and Details the features of IAX that can help, in junction with SIP, to overcome various disadvantages of SIP Explores the added values of IAX protocol compared to existing protocols Discusses the compatibility of new adopted architectures and associated protocolsThis book will be a valuable reference for service providers, protocol designers, vendors and service implementers. Lecturers and advanced students computer science, electrical engineering and telecoms courses will also find this book of interest.

Author Biography

Mohamed Boucadair completed his degree at the Ecole Nationale Supérieure d'Ingénieur de Caen (Institut des Sciences de la Matière et des Rayonnements.) He currently works for France Telecom R&D and is part of the team working on VoIP services. He has previously been involved in IST research projects (TEQUILA, MESCAL, AGAVE), working on dynamic provisioning and inter-domain traffic engineering. Boucadair has also worked as an R&D engineer in charge of dynamic provisioning, QoS, multicast and intra/inter-domain traffic engineering. He has published many journal articles and written extensively on these subject areas.

Table of Contents

Foreword
Terminology and Definitions
Acronyms and Abbreviations
Acknowledgement
Introduction.
General Introduction
On Voice over IP and Telephony over IP
Context
Enhancement Strategies to Solve SIP Issues
IAX: Towards Lightweight Telephony Architectures
IAX and Standardisation
Rationale
What This Book is Not
Structure of the Book
The IAX Protocol at a Glance
What Does IAX Stand For?
Is IAX Specific to the Asterisk Platform?
What is the Difference between IAX2 and IAX?
Why another New VoIP Protocol?
How Does IAX Solve VoIP Pains?
How is Calls Multiplexing Achieved?
And What About Demultiplexing?
What Port Number Does IAX Use?
What Transport Protocol Does IAX Use?
Is IAX a Reliable Protocol?
How Does IAX Ensure Reliability?
Is there an IAX Registration Procedure?
Does IAX Registration Differ from SIP Registration?
How Are Media Streams Transported in IAX?
Is CODEC Negotiation Supported by IAX?
Is On-Fly CODEC Change Possible During a Call?
IAX: a Path-Coupled or Decoupled Protocol?
Can IAX be Aware of the Status of the Network Load?
What About Security?
Could IAX Devices Be Managed?
Is Firmware Version Updating Supported by IAX?
Can IAX Be Extended to Offer New Features?
How is an IAX Resource Identified?
What Does an IAX URI Look Like?
Is it Possible to Set a Call Involving Several IAX Servers?
Is it Possible to Discover the Location of an IAX Resource?
What Is DUNDi?
What Is TRIP?
What Is ENUM?
References
Further Reading
IAX Protocol Specifications.
IAX Uniform Resource Identifier.
Introduction
Format of IAX Uniform Resource Identifiers
Examples of IAX Uniform Resource Identifiers
Comparing IAX Uniform Resource Identifiers
IAX Uniform Resource Identifiers and ENUM
References
Further Reading
IAX Frames.
Introduction
Full Frames
Mini Frames
Meta Frames
Encrypted Frames
Conclusion
References
Further Reading
IAX Information Elements.
Introduction
List of IAX Information Elements
Example of IAX Information Element Traces
References
Further Reading
IAX Messages
Introduction
Taxonomy of IAX Messages
IAX Requests/Responses
IAX Functional Categories
IAX Media Frames
IAX Reliable/Unreliable Messages
References
Further Reading
IAX Connectivity Considerations.
Introduction
IAX Transport Protocol
IAX Port Number
IAX Call Multiplexing and Demultiplexing
IAX Reliability Mechanism
Authentication and Encryption
Conclusion
References
Further Reading
IAX Operations
Introduction
Provisioning and Firmware Download
Registration
Call Setup
Call Tear-Down
Call Monitoring
Call Optimisation
Conclusion
References
Further Reading
Discussion and Analysis.
IAX and Advanced Services.
Introduction
CODEC Negotiation
Video Sessions
Negotiation of Several Media Types in the Same IAX Session
Presence Services
Instant Messaging
Topology Hiding
Mobility
Miscellaneous
Conclusion
References
Further Reading
Multi-IAX Servers Environment.
Introduction
Focus
Discovery of IAX Resources
Setting End-to-End Calls
Load Balancing
Path-Coupled and Path-Decoupled Discussion
Forking
Route Symmetry
Conclusion
References
IAX and NAT Traversal
Introduction
Structure
NAT Types
IAX and NAT Traversal Discussion
Operational Considerations
Conclusion
References
Further Reading
IAX and Peer-to-Peer Deployment Scenarios
Introduction
Scope
A P2P Solution for Corporate Customers
Conclusion
References
Further Reading
IAX and IPv6.
Introduction
Context and Assumptions
Service Migration to IPv6
Structure
The IP Address Exhaustion Problem
IPv6: a Long-Term Solution
Why IPv6 May Be Problematic for Telephony Signalling Protocols: the SIP Example
IAX: an IP Version-Agnostic Protocol?
Deployment of IAX Services in a æPureÆ IPv6 Environment
Heterogeneous Environment
Conclusion
References
Further Reading
IAX: Towards a Lightweight SBC?
Introduction
IP Telephony Administrative Domain
Deployment Scenarios
Deployment Contexts
Service Limitations Caused by SBCs
Functional Decomposition
Taxonomy of SBC Functions in an SIP Environment
Validity of these Functions in an IAX Architecture
Conclusion
References
Further Reading
Deployment Scenarios in SIP-Based Environments.
Scenarios for the Deployment of IAX-Based Conversational Services.
SIP Complications
Structure
Beyond the æSIP-CentricÆ Era
Methodology
Overall Context
Architectural Requirements
Brief Comparison
Taxonomy
Introducing IAX into Operational Networks
Conclusion
References
IAX in the Access Segment of SIP-Based Service Architectures.
Introduction
A æHigh-LevelÆ Description of the Interworking Function
Examples of Call Flows
Bandwidth Optimisation: An Extension to SIP
Conclusion
References
Validation Scenario.
Overview
Configuring Asterisk Servers
Configuring the SIP Express Router (SER)
User Agent Configuration
Conclusion
Further Reading
Index
Table of Contents provided by Publisher. All Rights Reserved.

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.