IAX-JINGLE Network Architectures Based-One/Two Translation Gateways
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 5
Abstract
Nowadays, Multimedia Communication has improved rapidly to allow people to communicate via the Internet. However, Internet users cannot communicate with each other unless they use the same chatting applications since each chatting application uses a certain signaling protocol to make the media call. The interworking module is a very critical issue since it solves the communication problems between any two protocols, and enables people around the world to make a voice/video call even if they use different chatting applications. Providing interoperability between different signaling protocols and multimedia applications takes the advantages of more than one protocol. Usually, each signaling protocol has its own messages which differ from other signaling protocol messages format. Thus, when two clients use different signaling protocols want to communicate phonetically, the sent/received messages between them will not be understood because the control and media packets in each protocol are different than the corresponding ones in the other protocol, The interworking module solves this kind of problem by matching the signals and media messages by providing translation gateways in the middle between the two protocols. Thus, many interworking modules have been proposed in order to enable many protocols’ users to chat with each other without any difficulties. This paper compares two interworking modules between Inter-Asterisk eXchange Protocol and Jingle Protocol. An experimental implementation in terms of session time is provided.
Authors and Affiliations
Hadeel Aliwi, Putra Sumari
Grid Connected PV Plant based on Smart Grid Control and Monitoring
Today, smart grid is considered as an attractive technology for monitoring and management of grid connected renewable energy plants due to its flexibility, network architecture and communication between providers and con...
Generic Packing Detection Using Several Complexity Analysis for Accurate Malware Detection
The attackers do not want their Malicious software (or malwares) to be reviled by anti-virus analyzer. In order to conceal their malware, malware programmers are getting utilize the anti reverse engineering techniques an...
MAI and Noise Constrained LMS Algorithm for MIMO CDMA Linear Equalizer
This paper presents a constrained least mean squared (LMS) algorithm for MIMO CDMA linear equalizer is presented, which is constrained on spreading sequence length, number of subscribers, variances of the Gaussian noise...
Classifying Arabic Text Using KNN Classifier
With the tremendous amount of electronic documents available, there is a great need to classify documents automatically. Classification is the task of assigning objects (images, text documents, etc.) to one of several pr...
ACCEPTANCE OF WEB 2.0 IN LEARNING IN HIGHER EDUCATION: A CASE STUDY NIGERIA
Technology acceptance has been studied in different perspectives. Though a few empirical studies on acceptance of Web 2.0 as a social networking tool in teaching and learning exist, none of such studies exist in Nigeria...