lind-peinture
» » Inter-Asterisk Exchange (IAX): Deployment Scenarios in SIP-Enabled Networks (Wiley Series on Communications Networking Distributed Systems)

eBook Inter-Asterisk Exchange (IAX): Deployment Scenarios in SIP-Enabled Networks (Wiley Series on Communications Networking Distributed Systems) ePub

by Mohamed Boucadair

eBook Inter-Asterisk Exchange (IAX): Deployment Scenarios in SIP-Enabled Networks (Wiley Series on Communications Networking  Distributed Systems) ePub
Author: Mohamed Boucadair
Language: English
ISBN: 0470770724
ISBN13: 978-0470770726
Publisher: Wiley; 1 edition (February 17, 2009)
Pages: 272
Category: Networking & Cloud Computing
Subcategory: Computers
Rating: 4.8
Votes: 473
Formats: lrf docx mobi doc
ePub file: 1100 kb
Fb2 file: 1594 kb

Communication Technology - Networks. Part Three: Deployment Scenarios in SIP-Based Environments. 15 Scenarios for the Deployment of IAX-Based Conversational Services. 1. SIP Complications.

Communication Technology - Networks. Inter-Asterisk Exchange (IAX): Deployment Scenarios in SIP-Enabled Networks.

Part Three: Deployment Scenarios in SIP-Based Environments. 17 Validation Scenario Overview Configuring Asterisk Servers Configuring the SIP Express Router (SER) User Agent Configuration Conclusion. 15 Scenarios for the Deployment of IAX-Based Conversational Services SIP Complications Structure. 7 1. Beyond the SIP-Centric Era Methodology Overall Context Architectural Requirements Brief Comparison Taxonomy Introducing IAX into Operational Networks Conclusion.

Inter-Asterisk Exchange (Iax) book. encountered in current SIP-based communications Written by an expert in the field of telecommunications, this book describes the Inter-Asterisk Exchange protocol (IAX) and its operations, discussing the main characteristics of the protocol including NAT traversal, security, IPv6 support, interworking between IPv4 and IPv6, interworking with SIP and many others.

Wiley series in communications networking & distributed systems.

2 The IAX Protocol at a Glance

Inter-Asterisk exchange (IAX): deployment scenarios in SIP-enabled networks (Series in communications networking & distributed systems) Deployment Scenarios in SIP-Enabled Networks Wiley Series on Communications Networking & Distributed Systems Series, Vol. 31. Author: Boucadair Mohamed. 2 The IAX Protocol at a Glance. What Does IAX Stand For? . Is IAX Specific to the Asterisk Platform? . What is the Difference between IAX2 and IAX? . Why another New VoIP Protocol?

book by Mohamed Boucadair

Inter-Asterisk Exchange (IAX): Deployment Scenarios in SIP-Enabled Networks.

Inter-Asterisk Exchange (IAX): Deployment Scenarios in SIP-Enabled Networks. by Mohamed Boucadair. Written by an expert in the field of telecommunications, this book describes the Inter-Asterisk Exchange protocol (IAX) and its operations, discussing the main characteristics of the protocol including NAT traversal, security, IPv6 support, interworking between IPv4 and IPv6, interworking with SIP and many others. The author presents the ways in which IAX can be activated so as to avoid complications such as NAT and the presence of intermediary boxes in operational architectures.

Find out how IAX can complement SIP to overcome complications encountered in current SIP-based communications.

Original publication date.

Inter-Asterisk Exchange IAX. Deployment Scenarios in SIP-Enabled Networks. This bestselling book is now the standard guide to building phone systems with Asterisk, the open source IP PBX that has traditional telephony providers running scared!

Inter-Asterisk Exchange IAX. Book Details: Publisher: Wiley. If you've worked with telephony in the past, you're familiar with the problem: expensive and inflexible systems that are tuned to the vendor's needs, not yours.

Find out how IAX can complement SIP to overcome complicationsencountered in current SIP-based communications

Written by an expert in the field of telecommunications, thisbook describes the Inter-Asterisk Exchange protocol (IAX) and itsoperations, discussing the main characteristics of the protocolincluding NAT traversal, security, IPv6 support, interworkingbetween IPv4 and IPv6, interworking with SIP and many others. Theauthor presents the ways in which IAX can be activated so as toavoid complications such as NAT and the presence of intermediaryboxes in operational architectures. This book analyticallydemonstrates the added values of IAX protocol compared to existingones, while proposing viable deployment scenarios that assess thebehavior of the protocol in operational networks.

Key Features:

Promotes a viable alternative protocol to ease deployment ofmultimedia services
lind-peinture.fr
© All right reserved. 2017-2020
Contacts | Privacy Policy | DMCA
eBooks are provided for reference only