Inter-Asterisk Exchange (IAX): Deployment Scenarios in SIP-Enabled Networks / Edition 1

Hardcover (Print)
Buy New
Buy New from
Used and New from Other Sellers
Used and New from Other Sellers
from $19.60
Usually ships in 1-2 business days
(Save 85%)
Other sellers (Hardcover)
  • All (9) from $19.60   
  • New (5) from $101.54   
  • Used (4) from $19.60   


Find out how IAX can complement SIP to overcome complications encountered in current SIP-based communications

Written by an expert in the field of telecommunications, this book describes the Inter-Asterisk Exchange protocol (IAX) and its operations, discussing the main characteristics of the protocol including NAT traversal, security, IPv6 support, interworking between IPv4 and IPv6, interworking with SIP and many others. The author presents the ways in which IAX can be activated so as to avoid complications such as NAT and the presence of intermediary boxes in operational architectures. This book analytically demonstrates the added values of IAX protocol compared to existing ones, while proposing viable deployment scenarios that assess the behavior of the protocol in operational networks.

Key Features:

  • Promotes a viable alternative protocol to ease deployment of multimedia services
  • Analyses the capabilities of the IAX protocol and its ability to meet VoIP service provider requirements, and provides scenarios of introducing IAX within operational architectures
  • Addresses the advantages and disadvantages of SIP, and Details the features of IAX that can help, in junction with SIP, to overcome various disadvantages of SIP
  • Explores the added values of IAX protocol compared to existing protocols
  • Discusses the compatibility of new adopted architectures and associated protocols

This book will be a valuable reference for service providers, protocol designers, vendors and service implementers. Lecturers and advanced students computer science, electrical engineering and telecoms courses will also find this book of interest.

Read More Show Less

Product Details

Meet the Author

Mohamed Boucadair completed his degree at the Ecole Nationale Supérieure d'Ingénieur de Caen (Institut des Sciences de la Matière et des Rayonnements.) He currently works for France Telecom R&D and is part of the team working on VoIP services. He has previously been involved in IST research projects (TEQUILA, MESCAL, AGAVE), working on dynamic provisioning and inter-domain traffic engineering. Boucadair has also worked as an R&D engineer in charge of dynamic provisioning, QoS, multicast and intra/inter-domain traffic engineering. He has published many journal articles and written extensively on these subject areas.

Read More Show Less

Table of Contents


Terminology and Definitions.

Acronyms and Abbreviations.


1 Introduction.

1.1 General Introduction.

1.2 On Voice over IP and Telephony over IP.

1.3 Context.

1.4 Enhancement Strategies to Solve SIP Issues.

1.5 IAX: Towards Lightweight Telephony Architectures.

1.6 IAX and Standardisation.

1.7 Rationale.

1.8 What This Book is Not.

1.9 Structure of the Book.

2 The IAX Protocol at a Glance.

2.1 What Does IAX Stand For?

2.2 Is IAX Specific to the Asterisk Platform?

2.3 What is the Difference between IAX2 and IAX?

2.4 Why another New VoIP Protocol?

2.5 How Does IAX Solve VoIP Pains?

2.6 How is Calls Multiplexing Achieved?

2.7 And What About Demultiplexing?

2.8 What Port Number Does IAX Use?

2.9 What Transport Protocol Does IAX Use?

2.10 Is IAX a Reliable Protocol?

2.11 How Does IAX Ensure Reliability?

2.12 Is there an IAX Registration Procedure?

2.13 Does IAX Registration Differ from SIP Registration?

2.14 How Are Media Streams Transported in IAX?

2.15 Is CODEC Negotiation Supported by IAX?

2.16 Is On-Fly CODEC Change Possible During a Call?

2.17 IAX: a Path-Coupled or Decoupled Protocol?

2.18 Can IAX be Aware of the Status of the Network Load?

2.19 What About Security?

2.20 Could IAX Devices Be Managed?

2.21 Is Firmware Version Updating Supported by IAX?

2.22 Can IAX Be Extended to Offer New Features?

2.23 How is an IAX Resource Identified?

2.24 What Does an IAX URI Look Like?

2.25 Is it Possible to Set a Call Involving Several IAX Servers?

2.26 Is it Possible to Discover the Location of an IAX Resource?

2.27 What Is DUNDi?

2.28 What Is TRIP?

2.29 What Is ENUM?


Further Reading.

Part One: IAX Protocol Specifications.

3 IAX Uniform Resource Identifier.

3.1 Introduction.

3.2 Format of IAX Uniform Resource Identifiers.

3.3 Examples of IAX Uniform Resource Identifiers.

3.4 Comparing IAX Uniform Resource Identifiers.

3.5 IAX Uniform Resource Identifiers and ENUM.


Further Reading.

4 IAX Frames.

4.1 Introduction.

4.2 Full Frames.

4.3 Mini Frames.

4.4 Meta Frames.

4.5 Encrypted Frames.

4.6 Conclusion.


Further Reading.

5 IAX Information Elements.

5.1 Introduction.

5.2 List of IAX Information Elements.

5.3 Example of IAX Information Element Traces.


Further Reading.

6 IAX Messages.

6.1 Introduction.

6.2 Taxonomy of IAX Messages.

6.3 IAX Requests/Responses.

6.4 IAX Functional Categories.

6.5 IAX Media Frames.

6.6 IAX Reliable/Unreliable Messages.


Further Reading.

7 IAX Connectivity Considerations.

7.1 Introduction.

7.2 IAX Transport Protocol.

7.3 IAX Port Number.

7.4 IAX Call Multiplexing and Demultiplexing.

7.5 IAX Reliability Mechanism.

7.6 Authentication and Encryption.

7.7 Conclusion.


Further Reading.

8 IAX Operations.

8.1 Introduction.

8.2 Provisioning and Firmware Download.

8.3 Registration.

8.4 Call Setup.

8.5 Call Tear-Down.

8.6 Call Monitoring.

8.7 Call Optimisation.

8.8 Conclusion.


Further Reading.

Part Two: Discussion and Analysis.

9 IAX and Advanced Services.

9.1 Introduction.

9.2 CODEC Negotiation.

9.3 Video Sessions.

9.4 Negotiation of Several Media Types in the Same IAX Session.

9.5 Presence Services.

9.6 Instant Messaging.

9.7 Topology Hiding.

9.8 Mobility.

9.9 Miscellaneous.

9.10 Conclusion.


Further Reading.

10 Multi-IAX Servers Environment.

10.1 Introduction.

10.2 Focus.

10.3 Discovery of IAX Resources.

10.4 Setting End-to-End Calls.

10.5 Load Balancing.

10.6 Path-Coupled and Path-Decoupled Discussion.

10.7 Forking.

10.8 Route Symmetry.

10.9 Conclusion.


11 IAX and NAT Traversal.

11.1 Introduction.

11.2 Structure.

11.3 NAT Types.

11.4 IAX and NAT Traversal Discussion.

11.5 Operational Considerations.

11.6 Conclusion.


Further Reading.

12 IAX and Peer-to-Peer Deployment Scenarios.

12.1 Introduction.

12.2 Scope.

12.3 A P2P Solution for Corporate Customers.

12.4 Conclusion.


Further Reading.

13 IAX and IPv6.

13.1 Introduction.

13.2 Context and Assumptions.

13.3 Service Migration to IPv6.

13.4 Structure.

13.5 The IP Address Exhaustion Problem.

13.6 IPv6: a Long-Term Solution.

13.7 Why IPv6 May Be Problematic for Telephony Signalling Protocols: the SIP Example.

13.8 IAX: an IP Version-Agnostic Protocol?

13.9 Deployment of IAX Services in a ‘Pure’ IPv6 Environment.

13.10 Heterogeneous Environment.

13.11 Conclusion.


Further Reading.

14 IAX: Towards a Lightweight SBC?.

14.1 Introduction.

14.2 IP Telephony Administrative Domain.

14.3 Deployment Scenarios.

14.4 Deployment Contexts.

14.5 Service Limitations Caused by SBCs.

14.6 Functional Decomposition.

14.7 Taxonomy of SBC Functions in an SIP Environment.

14.8 Validity of these Functions in an IAX Architecture.

14.9 Conclusion.


Further Reading.

Part Three: Deployment Scenarios in SIP-Based Environments.

15 Scenarios for the Deployment of IAX-Based Conversational Services.

15.1 SIP Complications.

15.2 Structure.

15.3 Beyond the ‘SIP-Centric’ Era.

15.4 Methodology.

15.5 Overall Context.

15.6 Architectural Requirements.

15.7 Brief Comparison.

15.8 Taxonomy.

15.9 Introducing IAX into Operational Networks.

15.10 Conclusion.


16 IAX in the Access Segment of SIP-Based Service Architectures.

16.1 Introduction.

16.2 A ‘High-Level’ Description of the Interworking Function.

16.3 Examples of Call Flows.

16.4 Bandwidth Optimisation: An Extension to SIP.

16.5 Conclusion.


17 Validation Scenario.

17.1 Overview.

17.2 Configuring Asterisk Servers.

17.3 Configuring the SIP Express Router (SER).

17.4 User Agent Configuration.

17.5 Conclusion.

Further Reading.


Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)