LEADER 02504nam0 22004213i 450 001 SUN0084240 005 20180201113429.659 010 $a978-88-7959-619-0 100 $a20110614d2010 |0itac50 ba 101 $aita 102 $aIT 105 $a|||| ||||| 200 1 $aAnatomia umana$fFrederic H. Martini, Michael J. Timmons, Robert B. Tallitsch$gcon William C. Ober ... [et al.]$gedizione italiana a cura di Lucio Cocco ... [et al.] 205 $a4. ed 210 $aNapoli$cEdiSES$d2010 215 $aXXVII, 867 p.$cill.$d31 cm$e1 CD-ROM. 620 $dNapoli$3SUNL000005 676 $a611$cAnatomia, citologia, istologia umana$v22 700 1$aMartini$b, Frederic H.$3SUNV013294$0291663 701 1$aTimmons$b, Michael J.$3SUNV013296$0289809 701 1$aTallitsch$b, Robert B.$3SUNV013297$0286593 702 1$aOber$b, William C.$3SUNV017779 702 1$aCocco$b, Lucio$3SUNV059019 712 $aEdiSES$3SUNV000139$4650 790 1$aMartini, F. H.$zMartini, Frederic H.$3SUNV036882 790 1$aTimmons, M. J.$zTimmons, Michael J.$3SUNV059018 790 1$aTallitsch, R. B.$zTallitsch, Robert B.$3SUNV100968 790 1$aOber, W. C.$zOber, William C.$3SUNV063606 801 $aIT$bSOL$c20200518$gRICA 856 4 $u/sebina/repository/catalogazione/documenti/Indice 84240.pdf 912 $aSUN0084240 950 $aUFFICIO DI BIBLIOTECA DEL DIPARTIMENTO DI SCIENZE E TECNOLOGIE AMBIENTALI BIOLOGICHE E FARMACEUTICHE$d17PREST Ad39 $e17BIB646 20120802 $sBuono 950 $aUFFICIO DI BIBLIOTECA DEL DIPARTIMENTO DI SCIENZE E TECNOLOGIE AMBIENTALI BIOLOGICHE E FARMACEUTICHE$d17CONS Ad20 $e17BIB498 20110614 $sBuono 950 $aUFFICIO DI BIBLIOTECA DEL DIPARTIMENTO DI SCIENZE E TECNOLOGIE AMBIENTALI BIOLOGICHE E FARMACEUTICHE$d17PREST Ad22 $e17BIB509 20111011 $sSottolineato 950 $aUFFICIO DI BIBLIOTECA DEL DIPARTIMENTO DI SCIENZE E TECNOLOGIE AMBIENTALI BIOLOGICHE E FARMACEUTICHE$d17PREST Ad23 $e17BIB510 20111011 $sBuono 950 $aUFFICIO DI BIBLIOTECA DEL DIPARTIMENTO DI SCIENZE E TECNOLOGIE AMBIENTALI BIOLOGICHE E FARMACEUTICHE$d17PREST Ad21 $e17BIB499 20110614 $sSottolineato 996 $aHuman anatomy$914080 997 $aUNICAMPANIA LEADER 09750nam 2200709Ia 450 001 9911019407803321 005 20200520144314.0 010 $a9786612010798 010 $a9781282010796 010 $a1282010794 010 $a9780470742181 010 $a0470742186 010 $a9780470742198 010 $a0470742194 024 7 $a10.1002/9780470742181 035 $a(CKB)1000000000715968 035 $a(EBL)416435 035 $a(SSID)ssj0000180793 035 $a(PQKBManifestationID)11180489 035 $a(PQKBTitleCode)TC0000180793 035 $a(PQKBWorkID)10158443 035 $a(PQKB)10576939 035 $a(MiAaPQ)EBC416435 035 $a(CaBNVSL)mat08039736 035 $a(IDAMS)0b00006485f0d9a8 035 $a(IEEE)8039736 035 $a(OCoLC)352829733 035 $a(Perlego)2761984 035 $a(EXLCZ)991000000000715968 100 $a20080825d2009 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aInter-asterisk exchange (IAX) deployment scenarios in SIP-enabled networks /$fMohamed Boucadair 210 $aChichester, U.K. $cWiley$d2009 215 $a1 online resource (275 p.) 225 1 $aWiley series in communications networking & distributed systems 300 $aDescription based upon print version of record. 311 08$a9780470770726 311 08$a0470770724 320 $aIncludes bibliographical references and index. 327 $aForeword -- Terminology and Definitions -- Acronyms and Abbreviations -- Acknowledgement -- 1 Introduction -- 1.1 General Introduction -- 1.2 On Voice over IP and Telephony over IP -- 1.3 Context -- 1.4 Enhancement Strategies to Solve SIP Issues -- 1.5 IAX: Towards Lightweight Telephony Architectures -- 1.6 IAX and Standardisation -- 1.7 Rationale -- 1.8 What This Book is Not -- 1.9 Structure of the Book -- 2 The IAX Protocol at a Glance -- 2.1 What Does IAX Stand For? -- 2.2 Is IAX Specific to the Asterisk Platform? -- 2.3 What is the Difference between IAX2 and IAX? -- 2.4 Why another New VoIP Protocol? -- 2.5 How Does IAX Solve VoIP Pains? -- 2.6 How is Calls Multiplexing Achieved? -- 2.7 And What About Demultiplexing? -- 2.8 What Port Number Does IAX Use? -- 2.9 What Transport Protocol Does IAX Use? -- 2.10 Is IAX a Reliable Protocol? -- 2.11 How Does IAX Ensure Reliability? -- 2.12 Is there an IAX Registration Procedure? -- 2.13 Does IAX Registration Differ from SIP Registration? -- 2.14 How Are Media Streams Transported in IAX? -- 2.15 Is CODEC Negotiation Supported by IAX? -- 2.16 Is On-Fly CODEC Change Possible During a Call? -- 2.17 IAX: a Path-Coupled or Decoupled Protocol? -- 2.18 Can IAX be Aware of the Status of the Network Load? -- 2.19 What About Security? -- 2.20 Could IAX Devices Be Managed? -- 2.21 Is Firmware Version Updating Supported by IAX? -- 2.22 Can IAX Be Extended to Offer New Features? -- 2.23 How is an IAX Resource Identified? -- 2.24 What Does an IAX URI Look Like? -- 2.25 Is it Possible to Set a Call Involving Several IAX Servers? -- 2.26 Is it Possible to Discover the Location of an IAX Resource? -- 2.27 What Is DUNDi? -- 2.28 What Is TRIP? -- 2.29 What Is ENUM? -- References -- Further Reading -- Part One: IAX Protocol Specifications -- 3 IAX Uniform Resource Identifier -- 3.1 Introduction -- 3.2 Format of IAX Uniform Resource Identifiers -- 3.3 Examples of IAX Uniform Resource Identifiers -- 3.4 Comparing IAX Uniform Resource Identifiers. 327 $a3.5 IAX Uniform Resource Identifiers and ENUM -- References -- Further Reading -- 4 IAX Frames -- 4.1 Introduction -- 4.2 Full Frames -- 4.3 Mini Frames -- 4.4 Meta Frames -- 4.5 Encrypted Frames -- 4.6 Conclusion -- References -- Further Reading -- 5 IAX Information Elements -- 5.1 Introduction -- 5.2 List of IAX Information Elements -- 5.3 Example of IAX Information Element Traces -- References -- Further Reading -- 6 IAX Messages -- 6.1 Introduction -- 6.2 Taxonomy of IAX Messages -- 6.3 IAX Requests/Responses -- 6.4 IAX Functional Categories -- 6.5 IAX Media Frames -- 6.6 IAX Reliable/Unreliable Messages -- References -- Further Reading -- 7 IAX Connectivity Considerations -- 7.1 Introduction -- 7.2 IAX Transport Protocol -- 7.3 IAX Port Number -- 7.4 IAX Call Multiplexing and Demultiplexing -- 7.5 IAX Reliability Mechanism -- 7.6 Authentication and Encryption -- 7.7 Conclusion -- References -- Further Reading -- 8 IAX Operations -- 8.1 Introduction -- 8.2 Provisioning and Firmware Download -- 8.3 Registration -- 8.4 Call Setup -- 8.5 Call Tear-Down -- 8.6 Call Monitoring -- 8.7 Call Optimisation -- 8.8 Conclusion -- References -- Further Reading -- Part Two: Discussion and Analysis -- 9 IAX and Advanced Services -- 9.1 Introduction -- 9.2 CODEC Negotiation -- 9.3 Video Sessions -- 9.4 Negotiation of Several Media Types in the Same IAX Session -- 9.5 Presence Services -- 9.6 Instant Messaging -- 9.7 Topology Hiding -- 9.8 Mobility -- 9.9 Miscellaneous -- 9.10 Conclusion -- References -- Further Reading -- 10 Multi-IAX Servers Environment -- 10.1 Introduction -- 10.2 Focus -- 10.3 Discovery of IAX Resources -- 10.4 Setting End-to-End Calls -- 10.5 Load Balancing -- 10.6 Path-Coupled and Path-Decoupled Discussion -- 10.7 Forking -- 10.8 Route Symmetry -- 10.9 Conclusion -- References -- 11 IAX and NAT Traversal -- 11.1 Introduction -- 11.2 Structure -- 11.3 NAT Types -- 11.4 IAX and NAT Traversal Discussion -- 11.5 Operational Considerations -- 11.6 Conclusion -- References. 327 $aFurther Reading -- 12 IAX and Peer-to-Peer Deployment Scenarios -- 12.1 Introduction -- 12.2 Scope -- 12.3 A P2P Solution for Corporate Customers -- 12.4 Conclusion -- References -- Further Reading -- 13 IAX and IPv6 -- 13.1 Introduction -- 13.2 Context and Assumptions -- 13.3 Service Migration to IPv6 -- 13.4 Structure -- 13.5 The IP Address Exhaustion Problem -- 13.6 IPv6: a Long-Term Solution -- 13.7 Why IPv6 May Be Problematic for Telephony Signalling Protocols: the SIP Example -- 13.8 IAX: an IP Version-Agnostic Protocol? -- 13.9 Deployment of IAX Services in a 'Pure' IPv6 Environment -- 13.10 Heterogeneous Environment -- 13.11 Conclusion -- References -- Further Reading -- 14 IAX: Towards a Lightweight SBC? -- 14.1 Introduction -- 14.2 IP Telephony Administrative Domain -- 14.3 Deployment Scenarios -- 14.4 Deployment Contexts -- 14.5 Service Limitations Caused by SBCs -- 14.6 Functional Decomposition -- 14.7 Taxonomy of SBC Functions in an SIP Environment -- 14.8 Validity of these Functions in an IAX Architecture -- 14.9 Conclusion -- References -- Further Reading -- Part Three: Deployment Scenarios in SIP-Based Environments -- 15 Scenarios for the Deployment of IAX-Based Conversational Services -- 15.1 SIP Complications -- 15.2 Structure -- 15.3 Beyond the 'SIP-Centric' Era -- 15.4 Methodology -- 15.5 Overall Context -- 15.6 Architectural Requirements -- 15.7 Brief Comparison -- 15.8 Taxonomy -- 15.9 Introducing IAX into Operational Networks -- 15.10 Conclusion. / -- References -- 16 IAX in the Access Segment of SIP-Based Service Architectures -- 16.1 Introduction -- 16.2 A 'High-Level' Description of the Interworking Function -- 16.3 Examples of Call Flows -- 16.4 Bandwidth Optimisation: An Extension to SIP -- 16.5 Conclusion -- References -- 17 Validation Scenario -- 17.1 Overview -- 17.2 Configuring Asterisk Servers -- 17.3 Configuring the SIP Express Router (SER) -- 17.4 User Agent Configuration -- 17.5 Conclusion -- Further Reading -- Index. 330 $aFind out how IAX can complement SIP to overcome complications encountered in current SIP-based communications Written by an expert in the field of telecommunications, this book describes the Inter-Asterisk Exchange protocol (IAX) and its operations, discussing the main characteristics of the protocol including NAT traversal, security, IPv6 support, interworking between IPv4 and IPv6, interworking with SIP and many others. The author presents the ways in which IAX can be activated so as to avoid complications such as NAT and the presence of intermediary boxes in operational architectures. This book analytically demonstrates the added values of IAX protocol compared to existing ones, while proposing viable deployment scenarios that assess the behavior of the protocol in operational networks. Key Features: . Promotes a viable alternative protocol to ease deployment of multimedia services. Analyses the capabilities of the IAX protocol and its ability to meet VoIP service provider requirements, and provides scenarios of introducing IAX within operational architectures. Addresses the advantages and disadvantages of SIP, and Details the features of IAX that can help, in junction with SIP, to overcome various disadvantages of SIP. Explores the added values of IAX protocol compared to existing protocols. Discusses the compatibility of new adopted architectures and associated protocols This book will be a valuable reference for service providers, protocol designers, vendors and service implementers. Lecturers and advanced students computer science, electrical engineering and telecoms courses will also find this book of interest. 410 0$aWiley series in communications networking & distributed systems. 606 $aInternet telephony 606 $aComputer network protocols 615 0$aInternet telephony. 615 0$aComputer network protocols. 676 $a004.69/5 676 $a004.695 700 $aBoucadair$b Mohamed$01604356 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911019407803321 996 $aInter-asterisk exchange (IAX) deployment scenarios in SIP-enabled networks$93981008 997 $aUNINA