Wireless Enabled Voice over Internet Protocol (VoIP) Network Application Using Asterisk PBX
Journal Title: EAI Endorsed Transactions on Internet of Things - Year 2018, Vol 4, Issue 15
Abstract
This paper reechoes the need to use VOIP-based communication channels in order to reduce the heavy cost burden of communication in Sub Saharan Africa and other developing countries. We focus specifically on the context of the campus environment and implement IP PBX to cut down the cost of placing and receiving voice calls, instant messaging and voice mails with other colleagues connected to an Asterisk server on WIFI-enabled networks. We are motivated by the ease and cost-effectiveness of setting up WIFI-enabled IP network infrastructure which in recent times could be extended to allow inter-institutional linkage to allow collaboration and research.
Authors and Affiliations
Euclid Narte Odjidja, Salah Kabanda, William Akotam Agangiba, Richard Kofi Annan
An Information-Centric Platform for Social- and Location-Aware IoT Applications in Smart Cities
Recent advances in Smart City infrastructures and the Internet of Things represent a significant opportunity to improve people’s quality of life. Corresponding research often focuses on Cloud-centric network architecture...
An iterative Power Allocation Alogrithm for Energy Efficiency Optimization in Massive MIMO Systems
In this paper, a transmitting power allocation strategy for users jointed together pre-coding is presented to eliminate inter-users interference and improve the energy efficiency of Massive MIMO systems. The power alloca...
Studies in Small Scale Data: Three Case Studies on Describing Individuals’ Spatial Behaviour in Cities
Big Data has been effectively mined to understand behavioural patterns in cities and to map large-scale trends predicated upon the repeated actions of many aggregated individuals. While acknowledging the vital role that...
Secure Login Using Multi-Tier Authentication Schemes in Fog Computing
Security threats are major barriers in authentication process in Fog Computing. Identification of a user through single signon process like simple password-based authentications are no longer considered secure. Different...
A Tracing Toolset for Embedded Linux Flash File Systems
NAND flash memory integration in the traditional I/O software stack of Unix-like operating systems (OS) was achieved without modifying most of the OS layers. In fact, one can dissociate two categories of flash memory dev...