Edan, N. M., Al-Sherbaz, A., Turner, S. J. and Ajit, S. (2016) Drawbacks of Inter-Asterisk Exchange protocol in V.VoIP. In: IEEE Computing Conference 2017. IEEE. (Accepted)
The files below are currently restricted to repository staff only.
They may be awaiting processing or under a publisher's embargo.
Items under embargo will be available for download from the date noted.
Item Type: | Conference Proceedings |
---|---|
Abstract: | There is a lot of interest in the use of multimedia protocols over Internet, especially in terms of quality of service and signalling, such as the IAX2 protocol. This paper aims to identify the limitations of the IAX2 protocol in a real world implementation of V.VoIP, primarily of its quality of video calls, based on an Asterisk server. Including the contradictions in the IAX2 standard and compare it with its related work over various issues, such as quality of service, security, codecs, port, frames, etc. This work will interest to developers in order to make them aware of the current IAX2 issues. |
Uncontrolled Keywords: | Voice and video over Internet Protocol (V.VoIP), Quality of service (QoS), Inter-Asterisk Exchange (IAX2), Session Initiation (SIP) and Asterisk PBX server |
Subjects: | T Technology > TK Electrical engineering. Electronics. Nuclear engineering > TK5101 Telecommunication > TK5105.15 Multimedia communications |
Creators: | Edan, Naktal Moaid, Al-Sherbaz, Ali, Turner, Scott J and Ajit, Suraj |
Publisher: | IEEE |
Faculties, Divisions and Institutes: |
University Faculties, Divisions and Research Centres - OLD > Research Group > Advanced Technologies Research Group Faculties > Faculty of Arts, Science & Technology > Computing |
Date: | November 2016 |
Date Type: | Acceptance |
Title of Book: | IEEE Computing Conference 2017 |
Event Title: | IEEE Technically Sponsored Computing Conference 2017 |
Event Dates: | 18-20 July 2017 |
Event Location: | London |
Event Type: | Conference |
Language: | English |
Status: | Accepted |
Refereed: | Yes |
Related URLs: | |
References: | H. Assem, “Assessing and Improving the VVoIP Call Quality,” M.A thesis, National University of Ireland, Ireland,2013. [2] A. Lazzez, O. Ben Fredj, and Thabet. Slimani. (2013). “IAX-Based Peer-to-Peer VoIP Architecture.” International Journal of Computer Science Issue. vol, (3), pp, 280. Available: http://arxiv.org/ftp/arxiv/papers/1310/1310.5805.pdf [2013]. [3] T. Christiansen, I. Giotis, and S. Mathur, “Performance Evaluation of VoIP in Different Settings,” in Cs.Washington.Edu, 2004. [4] M. S. Nasir and K. Saeed, “A Comparison of SIP with IAX an Efficient new IP Telephony Protocol A Comparison of SIP with IAX an Efficient new IP Telephony Protocol,” Conference: International Conference of Engineering and Emerging Technology, 2015, pp. 1- 6. August. [5] S. Spinsante, E. Gambi, and E. Bottegoni, “Security solutions in VoIP applications: State of the art and impact on quality,” Proc. Int. Symp. Consum. Electron. ISCE, pp. 1–4, 2008. [6] [RFC 5456], M. Spencer, E. Guy, and F. Miller, “Inter-Asterisk eXchange Version 2,” RFC 5456, Austria, pp. 1–101, 2010. [7] D. Villacís, F. R. Acosta, and R. a. Lara Cueva, “Performance analysis of VoIP services over WiFi-based systems,” 2013 IEEE Colomb. Conf. Commun. Comput. VOLCOM 2013 - Conf. Proc., pp. 1–6, 2013. [8] G. Pallis, “a Comparative Study of in-Band and Out-of-Band VoIP Protocols in Layer 3 and Layer 2.5,” MSc, Napier University, UK, 2010. [9] L. V Chandra. (2011, July). “T Ransport L Ayer P Protocols T Axonomy From,” Advanced Computing: An International Journal. vol. 2, no. 4, pp. 9–21. Available: http://airccse.org/journal/acij/papers/2411acij02.pdf [June. 2016]. [10] K. S. Chava and J. Ilow, “Integration of open source and enterprise IP PBXs,” Proc. 3rd Int. Conf. Testbeds Res. Infrastructures Dev. Networks Communities, TridentCom 2007. [11] P. Montoro and E. Casilari, “A comparative study of VoIP standards with Asterisk,” in Proceedings - 2009 4th International Conference on Digital Telecommunications, ICDT 2009, pp. 1–6. [12] O. J. S. Parra, N. O. D. Martinez, and G. L. Rubio, “Comparison SIP and IAX to voice packet signaling over VoIP,” in Proceedings - 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, (TrustCom) 2013, pp. 1442–1449. [14] O. Micolini and A. Herrera, “Traffic analysis over a VoIP server,” IEEE Lat. Am. Trans., vol. 11, no. 1, pp. 370–375, 2013. [15] S. A. Naktal Moaid Edan, Ali Al-Sherbaz, Scott Turner, “Performance Evaluation of QoS Using SIP & IAX2 VVoIP Protocols with CODECS,” in Proceedings - 13th IEEE SAI Computing Conference, London, UK, 2016, pp.1-6. [16] M. S. Nasir and K. Saeed, “A Comparison of SIP with IAX an Efficient new IP Telephony Protocol A Comparison of SIP with IAX an Efficient new IP Telephony Protocol,” no. August 2015. [17] H. Saleh, H. Aliwi, and P. Sumari, (2015, December)“A Comparative Study between Inter-Asterisk Exchange and Jingle Protocols,” Indian Journal of Science and Technology. vol. 8, pp. 1–11.Available: http://www.indjst.org/index.php/indjst/article/viewFile/71178/66092 [June. 2016]. [18] E. Bash, “ENHANCEMENT OF AES ALGORITHM FOR IAX PROTOCOL Preparation:,” in Ph.D. Proposal, 2015, vol. 1. [19] T. Internet, “Protocols for VoIP The Need for VoIP Protocols,” Protocols for VoIP, 1st ed, 2005, pp. 137–155. [20] M. Boucadair, Inter-Asterisk exchange (IAX). France: Wiley, 2009, pp. 247. [21] K. O. Detken and E. Eren, “VoIP Security regarding the Open Source Software Asterisk,” Imeti 2008 Int. Multi-Conference Eng. Technol. Innov. Vol I, Proc., pp. 93–98, 2008. [22] T. Subashri, A. Arjun, and S. Ashok, “Real-time implementation of Elliptic Curve Cryptography over an open source VoIP server,” in Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT), 2014, pp. 1–6. [23] A. N. Jabel, S. Manickam, and S. Ramdas, “A study of SIP trunk security and challenges,” Int. Conf. Electron. Devices, Syst. Appl., pp. 239–243, 2012. [24] I. A. Kautsar, S. Djanali, I. T. Faculty, and I. T. Faculty, “Analysis Quality of Service on VoIP Application Based on Modified Iax2 Protocol,” Prosiding Seminar Nasional Manajemen Teknologi XV, 2012, pp. 1–8. |
URI: | http://nectar.northampton.ac.uk/id/eprint/9024 |
Actions (login required)
Edit Item |