1.

Record Nr.

UNINA9910465607803321

Titolo

11th International Fatigue Congress : selected, peer reviewed papers from the 11th International Fatigue Congress 2014, March 2-7, 2014, Melbourne, Australia / / edited by Graham Clark and Chun H. Wang

Pubbl/distr/stampa

Durnten-Zurich, Switzerland : , : Trans Tech Publications, , 2014

Durnten-Zurich, Switzerland ; ; Enfield, New Hampshire : , : distributed worldwide byTrans Tech Publications, , [date of distribution not identified]

©2014

ISBN

3-03826-389-3

Descrizione fisica

1 online resource (1819 p.)

Collana

Advanced Materials Research, , 1662-8985 ; ; Volume 891-892

Disciplina

620.1126

Soggetti

Materials - Fatigue

Fracture mechanics

Composite materials - Fatigue

Electronic books.

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Description based upon print version of record.

Nota di bibliografia

Includes bibliographical references at the end of each chapters and indexes.

Nota di contenuto

11th International Fatigue Congress; Foreword and Congress Committees; Table of Contents; I. Biomaterials; Molecular Dynamics Investigation on Shearing between Osteopontin and Hydroxyapatite in Biological Materials; Nanostructure and Fatigue Behavior of β-Type Titanium Alloy Subjected to High-Pressure Torsion after Aging Treatment; II. Case Studies and Industrial Applications; Analysis and Design of Offshore Pile Foundation; Offshore Pile Foundation Subjected to Lateral Cyclic Load in Layered Soil; Fatigue Strength of Machined and Shot Peened Grey Cast Iron

On Thermo-Hydro-Mechanical (THM) Fatigue Damage of Historical Stone BuildingsEffect of Thermal Cycling on the Mechanical Properties of a Continuous Fibre Composite Used for Car Clutch Facings; The Role of Surface Topography on Fatigue Behaviour of Nickel Based Superalloys; Failure Analysis to Blades of Steam Turbines at Normal Conditions of Operations and Resonance; Failure Analysis of Repeat



Tooth Breakage of a 40MW Steam Turbine Load Gearbox; III. Case Studies, Materials and Processes; Fatigue of Cold Expanded Open Hole Coupons with Pre-Existing Cracks

A Fractographic Investigation of a Failed Precombustion Chamber Nozzle from a Large Marine Diesel EngineCase Studies of Fatigue Failures in Defence Aircraft Components; The Influence of Corrosion Pits and Cold Expanded Fastener Holes on the Fatigue Life Aluminium 7075-T651; An Investigation of the Extent of Crack Closure for Crack Growth in an Aluminium Alloy; Effect of Load Spectra and Stress Magnitude on Crack Growth Behavior Variability from Typical Manufacturing Defects; A Brief History of Structural Fatigue Testing at Fishermans Bend Australia

Fatigue Life Improvement of Laser Clad 7075 Aluminium Alloy by Deep Surface Rolling TechniqueIV. Civil and Mining Structures; Fatigue Assessment of Large Thin-Walled Structures with Initial Distortions; Retrofitting for Fatigue Cracks at Connection between the Main Girder Web and Lateral Girder Flange Using the Bolting-Stop-Hole Method with Attached Plates; A Self-Heating Approach to Characterize Anisotropy Effects in Fatigue Behaviour: Application to a Nineteenth Century Puddled Iron from a French Railway Bridge

Evaluation of Bonding between High Modulus CFRP Sheet and Steel after Environmental Exposure and Fatigue LoadingImproved Fatigue Life Assessment of Lighting Poles; V. Composites; A Brief Review of Fatigue Strengthening of Metallic Structures in Civil Engineering Using Fibre Reinforced Polymers; Stiffness Based Fatigue Characterisation of CFRP; Fatigue Crack Growth Rate in Mode I of a Carbon Fiber 5HS Weave Composite Laminate Processed via RTM; The Influence of Orthotropy and Taper Angle on the Compressive Strength of Composite Laminates with Scarfed Holes

Notched Fatigue Behavior under Multiaxial Stress States

Sommario/riassunto

Collection of Selected, Peer Reviewed Papers from the 11th International Fatigue Congress 2014, March 2-7, 2014, Melbourne, Australia. The 282 papers are grouped as follows: I. Biomaterials, II. Case Studies and Industrial Applications, III. Case studies, Materials and Processes, IV. Civil and Mining Structures, V. Composites, VI. Corrosion and Fatigue, VII. Crack Closure and Shielding, VIII. Crack Growth Thresholds, IX. Creep-Fatigue, X. Cyclic Deformation and Crack Initiation, XI. Damage Evaluation and Fatigue Design, XII. Damage Tolerance/Aging Aircraft, XIII. Experimental Techniques, XIV.



2.

Record Nr.

UNINA9911019407803321

Autore

Boucadair Mohamed

Titolo

Inter-asterisk exchange (IAX) deployment scenarios in SIP-enabled networks / / Mohamed Boucadair

Pubbl/distr/stampa

Chichester, U.K., : Wiley, 2009

ISBN

9786612010798

9781282010796

1282010794

9780470742181

0470742186

9780470742198

0470742194

Descrizione fisica

1 online resource (275 p.)

Collana

Wiley series in communications networking & distributed systems

Disciplina

004.69/5

004.695

Soggetti

Internet telephony

Computer network protocols

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Description based upon print version of record.

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Foreword -- Terminology and Definitions -- Acronyms and Abbreviations -- Acknowledgement -- 1 Introduction -- 1.1 General Introduction -- 1.2 On Voice over IP and Telephony over IP -- 1.3 Context -- 1.4 Enhancement Strategies to Solve SIP Issues -- 1.5 IAX: Towards Lightweight Telephony Architectures -- 1.6 IAX and Standardisation -- 1.7 Rationale -- 1.8 What This Book is Not -- 1.9 Structure of the Book -- 2 The IAX Protocol at a Glance -- 2.1 What Does IAX Stand For? -- 2.2 Is IAX Specific to the Asterisk Platform? -- 2.3 What is the Difference between IAX2 and IAX? -- 2.4 Why another New VoIP Protocol? -- 2.5 How Does IAX Solve VoIP Pains? -- 2.6 How is Calls Multiplexing Achieved? -- 2.7 And What About Demultiplexing? -- 2.8 What Port Number Does IAX Use? -- 2.9 What Transport Protocol Does IAX Use? -- 2.10 Is IAX a Reliable Protocol? -- 2.11 How Does IAX Ensure Reliability? -- 2.12 Is there an IAX Registration Procedure? -- 2.13 Does IAX Registration Differ from SIP Registration? -- 2.14 How



Are Media Streams Transported in IAX? -- 2.15 Is CODEC Negotiation Supported by IAX? -- 2.16 Is On-Fly CODEC Change Possible During a Call? -- 2.17 IAX: a Path-Coupled or Decoupled Protocol? -- 2.18 Can IAX be Aware of the Status of the Network Load? -- 2.19 What About Security? -- 2.20 Could IAX Devices Be Managed? -- 2.21 Is Firmware Version Updating Supported by IAX? -- 2.22 Can IAX Be Extended to Offer New Features? -- 2.23 How is an IAX Resource Identified? -- 2.24 What Does an IAX URI Look Like? -- 2.25 Is it Possible to Set a Call Involving Several IAX Servers? -- 2.26 Is it Possible to Discover the Location of an IAX Resource? -- 2.27 What Is DUNDi? -- 2.28 What Is TRIP? -- 2.29 What Is ENUM? -- References -- Further Reading -- Part One: IAX Protocol Specifications -- 3 IAX Uniform Resource Identifier -- 3.1 Introduction -- 3.2 Format of IAX Uniform Resource Identifiers -- 3.3 Examples of IAX Uniform Resource Identifiers -- 3.4 Comparing IAX Uniform Resource Identifiers.

3.5 IAX Uniform Resource Identifiers and ENUM -- References -- Further Reading -- 4 IAX Frames -- 4.1 Introduction -- 4.2 Full Frames -- 4.3 Mini Frames -- 4.4 Meta Frames -- 4.5 Encrypted Frames -- 4.6 Conclusion -- References -- Further Reading -- 5 IAX Information Elements -- 5.1 Introduction -- 5.2 List of IAX Information Elements -- 5.3 Example of IAX Information Element Traces -- References -- Further Reading -- 6 IAX Messages -- 6.1 Introduction -- 6.2 Taxonomy of IAX Messages -- 6.3 IAX Requests/Responses -- 6.4 IAX Functional Categories -- 6.5 IAX Media Frames -- 6.6 IAX Reliable/Unreliable Messages -- References -- Further Reading -- 7 IAX Connectivity Considerations -- 7.1 Introduction -- 7.2 IAX Transport Protocol -- 7.3 IAX Port Number -- 7.4 IAX Call Multiplexing and Demultiplexing -- 7.5 IAX Reliability Mechanism -- 7.6 Authentication and Encryption -- 7.7 Conclusion -- References -- Further Reading -- 8 IAX Operations -- 8.1 Introduction -- 8.2 Provisioning and Firmware Download -- 8.3 Registration -- 8.4 Call Setup -- 8.5 Call Tear-Down -- 8.6 Call Monitoring -- 8.7 Call Optimisation -- 8.8 Conclusion -- References -- Further Reading -- Part Two: Discussion and Analysis -- 9 IAX and Advanced Services -- 9.1 Introduction -- 9.2 CODEC Negotiation -- 9.3 Video Sessions -- 9.4 Negotiation of Several Media Types in the Same IAX Session -- 9.5 Presence Services -- 9.6 Instant Messaging -- 9.7 Topology Hiding -- 9.8 Mobility -- 9.9 Miscellaneous -- 9.10 Conclusion -- References -- Further Reading -- 10 Multi-IAX Servers Environment -- 10.1 Introduction -- 10.2 Focus -- 10.3 Discovery of IAX Resources -- 10.4 Setting End-to-End Calls -- 10.5 Load Balancing -- 10.6 Path-Coupled and Path-Decoupled Discussion -- 10.7 Forking -- 10.8 Route Symmetry -- 10.9 Conclusion -- References -- 11 IAX and NAT Traversal -- 11.1 Introduction -- 11.2 Structure -- 11.3 NAT Types -- 11.4 IAX and NAT Traversal Discussion -- 11.5 Operational Considerations -- 11.6 Conclusion -- References.

Further Reading -- 12 IAX and Peer-to-Peer Deployment Scenarios -- 12.1 Introduction -- 12.2 Scope -- 12.3 A P2P Solution for Corporate Customers -- 12.4 Conclusion -- References -- Further Reading -- 13 IAX and IPv6 -- 13.1 Introduction -- 13.2 Context and Assumptions -- 13.3 Service Migration to IPv6 -- 13.4 Structure -- 13.5 The IP Address Exhaustion Problem -- 13.6 IPv6: a Long-Term Solution -- 13.7 Why IPv6 May Be Problematic for Telephony Signalling Protocols: the SIP Example -- 13.8 IAX: an IP Version-Agnostic Protocol? -- 13.9 Deployment of IAX Services in a 'Pure' IPv6 Environment -- 13.10 Heterogeneous Environment -- 13.11 Conclusion -- References -- Further Reading -- 14 IAX: Towards a Lightweight SBC? -- 14.1 Introduction -- 14.2 IP Telephony Administrative Domain -- 14.3



Deployment Scenarios -- 14.4 Deployment Contexts -- 14.5 Service Limitations Caused by SBCs -- 14.6 Functional Decomposition -- 14.7 Taxonomy of SBC Functions in an SIP Environment -- 14.8 Validity of these Functions in an IAX Architecture -- 14.9 Conclusion -- References -- Further Reading -- Part Three: Deployment Scenarios in SIP-Based Environments -- 15 Scenarios for the Deployment of IAX-Based Conversational Services -- 15.1 SIP Complications -- 15.2 Structure -- 15.3 Beyond the 'SIP-Centric' Era -- 15.4 Methodology -- 15.5 Overall Context -- 15.6 Architectural Requirements -- 15.7 Brief Comparison -- 15.8 Taxonomy -- 15.9 Introducing IAX into Operational Networks -- 15.10 Conclusion. / -- References -- 16 IAX in the Access Segment of SIP-Based Service Architectures -- 16.1 Introduction -- 16.2 A 'High-Level' Description of the Interworking Function -- 16.3 Examples of Call Flows -- 16.4 Bandwidth Optimisation: An Extension to SIP -- 16.5 Conclusion -- References -- 17 Validation Scenario -- 17.1 Overview -- 17.2 Configuring Asterisk Servers -- 17.3 Configuring the SIP Express Router (SER) -- 17.4 User Agent Configuration -- 17.5 Conclusion -- Further Reading -- Index.

Sommario/riassunto

Find out how IAX can complement SIP to overcome complications encountered in current SIP-based communications Written by an expert in the field of telecommunications, this book describes the Inter-Asterisk Exchange protocol (IAX) and its operations, discussing the main characteristics of the protocol including NAT traversal, security, IPv6 support, interworking between IPv4 and IPv6, interworking with SIP and many others. The author presents the ways in which IAX can be activated so as to avoid complications such as NAT and the presence of intermediary boxes in operational architectures. This book analytically demonstrates the added values of IAX protocol compared to existing ones, while proposing viable deployment scenarios that assess the behavior of the protocol in operational networks. Key Features: . Promotes a viable alternative protocol to ease deployment of multimedia services. Analyses the capabilities of the IAX protocol and its ability to meet VoIP service provider requirements, and provides scenarios of introducing IAX within operational architectures. Addresses the advantages and disadvantages of SIP, and Details the features of IAX that can help, in junction with SIP, to overcome various disadvantages of SIP. Explores the added values of IAX protocol compared to existing protocols. Discusses the compatibility of new adopted architectures and associated protocols This book will be a valuable reference for service providers, protocol designers, vendors and service implementers. Lecturers and advanced students computer science, electrical engineering and telecoms courses will also find this book of interest.