A Comparison Between Inter-Asterisk eXchange Protocol and Jingle Protocol: Session Time
Abstract
Over the last few years, many multimedia conferencing and Voice over Internet Protocol (VoIP) applications have been developed due to the use of signaling protocols in providing video, audio and text chatting services between at least two participants. This paper compares between two widely common signaling protocols: InterAsterisk eXchange Protocol (IAX) and the extension of the eXtensible Messaging and Presence Protocol (Jingle) in terms of delay time during call setup, call teardown, and media sessions.
Keywords:
multimedia conferencing, VoIP, signaling protocols, Jingle, IAXDownloads
References
I. Basicevic, M. Popovic, D. Kukolj, “Comparison of sip and h.323 protocols”, 3rd International Conference on Digital Telecommunications ICDT ’08, pp. 162–167, 2008 DOI: https://doi.org/10.1109/ICDT.2008.14
E. Chow, “RTP: A transport protocol for real-time applications”, 2000, available at: http://cs.uccs.edu/~cs525/RTP.PDF
B. Forouzan, Data Communications and Networking, 4th edition, McGrawHill, New York, USA, 2007.
D. Geneiatakis, T. Dagiuklas, G. Kambourakis, C. Lambrinoudakis, S. Gritzalis, “Survey of security vulnerabilities in session initial protocol”, IEEE Communications Surveys & Tutorials, Vol. 8, No. 3, pp. 68-81, 2006 DOI: https://doi.org/10.1109/COMST.2006.253270
J. Glasmann, W. Kellerer, H. Muller, “Service architectures in h.323 and SIP: a comparison”, IEEE Communications Surveys & Tutorials, Vol. 5, No. 2, pp. 32-47, 2003 DOI: https://doi.org/10.1109/COMST.2003.5341337
B. Goode, “Voice over internet protocol (VoIP)”, Proceedings of the IEEE, pp. 1495 –1517, 2002 DOI: https://doi.org/10.1109/JPROC.2002.802005
Google Developers, “Google Talk for developers”, 2011, vailable at: https://developers.google.com/talk/jep_extensions/extensions
T. Dajiuklas, K. Ioannou, A. Garmpis, “A lightweight and scalable VoIP platform based on MGCP/H.323 interworking and QOS management capabilities”, 4th WSEAS International Conference on Information Security, Communications and Computers, Tenerife, Spain, pp. 548-553, 2005
H. S. Haj Aliwi, S. A. Alomari, P. Sumari, “An effective method for audio translation between IAX and RSW protocols”, World Academy of Science, Engineering and Technology, Vol. 5, No. 11, pp. 253-256, 2011
H. S. Haj Aliwi, P. Sumari, “A comparative study of VoIP, MCS, instant messaging protocol and multimedia applications”, International Journal of Advances in Computer Networks and Its Security, Vol. 4, No. 2, pp. 67-70, 2014.
H. S. Haj Aliwi, S. A. Alomari, P. Sumari, “An efficient audio translation approach between SIP and RSW protocols”, 3rd World Conference on Information Technology (WCIT-2012), University of Barcelona, Spain, pp. 31-37, 2013
H. S. Haj Aliwi, P. Sumari, “A comparative study of VoIP protocols”, International Journal of Computer Science and Information Security, Vol. 11, No. 4, pp. 97-101, 2013
H. S. Haj Aliwi, P. Sumari, S. A. Alomari, “An efficient interworking between heterogeneous networks protocols and multimedia computing applications”, International Journal of Computer Science and Information Security, Vol. 11, No. 5, pp. 81-86, 2013
M. Kolhar, M. Abu-Alhaj, O. Abouabdalla, T.C. Wan, A. Manasrah, “Comparative evaluation and analysis of IAX and RSW”, International Journal of Computer Science and Information Technology, Vol. 6, No. 3, pp. 250–252, 2013
S. Ludwig, J. Beda, P. Saint-Andre, R. McQueen, S. Egan, J. Hildebrand, “Jingle”, XSF XEP 0166, 2007, available at: http://xmpp.org/extensions/xep-0166.html
S. Ludwig, P. Saint-Andre, S. Egan, R. McQueen, D. Cionoiu, “Jingle RTP Sessions”, XEP 0167, 2009, available at: http://xmpp.org/extensions/xep-0167.html
S. Ramadass, R. K. Subramanian, H. Guyennet, M. Trehel, “Using RSW control criteria to create a distributed environment for multimedia conferencing”, Proceedings on Research and Development in Computer Science and its Applications, Penang, Malaysia, pp. 27-29, 1997
E. Reeves, “Testing devices that handle Inter-Asterisk eXchange, Version 2 (IAX2) Protocol”, 2011. available at: http://blogs.ixiacom.com/ixia-blog/content-aware-testing-iax2-protocol/
P. Saint-Andre, “Extensible messaging and presence protocol (XMPP)”, RFC 3921, Instant Messaging and Presence. Internet Engineering Task Force, 2004 DOI: https://doi.org/10.17487/rfc3921
P. Saint-Andre, “Interworking between the session initiation protocol (SIP) and the extensible messaging and presence protocol (XMPP): media sessions”, XMPP Standards Foundation, 2013, available at: https://tools.ietf.org/html/draft-ietf-stox-media-07 DOI: https://doi.org/10.17487/rfc7248
P. Saint-Andre, S. Ibarra, E Ivov, “Interworking between the session initiation protocol (SIP) and the extensible messaging and presence protocol (XMPP): Media Sessions”, XMPP Standards Foundation, 2015, available at: https://tools.ietf.org/html/draft-ietf-stox-media-05 DOI: https://doi.org/10.17487/RFC7702
M. Spencer, B. Capouch, E. Guy, F. Miller, K. Shumard, “IAX: Inter-Asterisk eXchange Version 2”, 2010, available at: http://tools.ietf.org/html/ rfc5456 DOI: https://doi.org/10.17487/rfc5456
M. Spencer, “IAX”, 2004, available at: http://www.voip-info.org/wiki/ view/IAX
M. Spencer, “Configuring IAX clients”, 2004, available at: http://www.voip-info.org/wiki/view/Asterisk+config+iax.conf
M. Spencer, F.W. Miller, “IAX protocol description”, 2004, available at: http://www.voipinfb.hu/content/download/iax.pdf
N. Garg, “Network simulators: a case study”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 5, No. 1, pp. 651-655, 2015
Downloads
How to Cite
License
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.