SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Downloaden Sie, um offline zu lesen
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014
DOI : 10.5121/ijcnc.2014.6310 121
REAL-TIME AUDIO TRANSLATION MODULE
BETWEEN IAX AND RSW
Hadeel Saleh Haj Aliwi and Putra Sumari
School of Computer Sciences, Universiti Sains Malaysia, Penang, Malaysia
ABSTRACT
At the last few years, multimedia communication has been developed and improved rapidly in order to
enable users to communicate between each other over the internet. Generally, multimedia communication
consists of audio and video communication. However, this research concentrates on audio conferencing
only. The audio translation between protocols is a very critical issue, because it solves the communication
problems between any two protocols. So, it enables people around the world to talk with each other even
they use different protocols. In this research, a real time audio translation module between two protocols
has been done. These two protocols are: InterAsterisk eXchange Protocol (IAX) and Real-Time Switching
Control Protocol (RSW), which they are widely used to provide two ways audio transfer feature. The
solution here is to provide interworking between the two protocols which they have different media
transports, audio codec’s, header formats and different transport protocols for the audio transmission. This
translation will help bridging the gap between the two protocols by providing interworking capability
between the two audio streams of IAX and RSW. Some related works have been done to provide translation
between IAX and RSW control signalling messages. But, this research paper concentrates on the
translation that depends on the media transfer. The proposed translation module was tested and evaluated
in different scenarios in order to examine its performance. The obtained results showed that the Real-Time
Audio Translation Module produces lower rates of packet delay and jitter than the acceptance values for
each of the mentioned performance metrics.
KEYWORDS
Multimedia, VoIP, Interworking, InterAsterisk eXchange Protocol (IAX), Real Time Switching Control
Criteria (RSW).
1. INTRODUCTION
Multimedia communication has been developed and improved to be the basic and essential
service in order to satisfy the needs of the Internet users [12, 18, 19, 20]. It has appeared to be
more and more applicable in distributed environments [10, 21]. There are various protocols that
control and signal the calls of the Internet telephone [1]; such protocols existed in Internet
Protocol (IP) telecommunication. For data and signaling, two major protocols are considered in
the field of the multimedia conferencing such as RSW and IAX protocols. Video functionality,
similar quality of service and competitive voice are provided by these two protocols. The two
protocols have been widely exploited and utilized into many different methods [15]. This work
proposes a translation module between audio streams of IAX protocol and RSW control protocol.
Generally, the procedure to a translator between the both protocols is starting from the first
network to perform transferring the data into a first protocol. And then the second network to
perform transferring the data into a second protocol. Finally, the translation server (conference
gateway) to maintain translation information for a protocol translation, this translation occurs
between the first and the second protocols [15].
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014
122
IAX and RSW audio transfer protocols have many differences in handling and exchanging voice
packets between each other. In addition, different transport protocols and techniques are used by
each of these protocols throughout audio exchange. The packet format in IAX protocol differs
from the corresponding packet in RSW control protocol. When the data is attempted to be
exchanged among each other by the two protocols, the data could not be understood by each of
the two protocols. To overcome the translation problem between the audio streams of the two
protocols (IAX and RSW), we proposed an audio translation module, which will be able to act as
a translator between IAX and RSW audio streams. This translation module will help bridging the
gap between IAX and RSW by providing interworking capability between the two audio streams.
There are two sides accompanied with the translation between the two protocols: the control
signaling and audio stream translation. The control signaling translation between two protocols,
more specifically between RSW control protocol and IAX protocol has already done [6,7]. And
the audio stream translation, which is the proposed work in this paper. The performed audio
stream translation is true while this research concentrates on the two protocols (RSW control
protocol and IAX protocol).
2. BRIEF DESCRIPTION OF IAX AND RSW PROTOCOLS
This section will briefly describe the both protocols; Real-time Switching (RSW) Control
Protocol and InterAsterisk eXchange (IAX) Protocol.
2.1. RSW Control Protocol
Real-time Switching (RSW) control criteria is a control protocol used to handle a multipoint-to-
multipoint multimedia conferencing sessions. RSW control protocol was developed in 1993 as a
control mechanism for conferencing by the Network Research Group in school of computer
sciences, University Sciences Malaysia (USM) [9]. RSW protocol doesn’t have its own header to
carry the data so, Real-Time Protocol (RTP) protocol [3] is used to carry audio and video data
through multimedia conferencing. User Datagram Protocol (UDP) is a transport protocol [2] that
is also used by RSW to transfer audio and video data. The RSW control criteria is involved in
decreasing bandwidth when many clients using the MCS system. RSW makes a list of priority for
the participants to avoid confusion when many participants are trying to speak up during
conference [6,13]. There are several advantages for the RSW control criteria [9] such as Equal
Privileges, First Come First Serve, First come first serve with time-out, Organizer Main Site and
Restricted Active site. The RSW audio packet format consists of four parts as shown in figure 1,
which are IP header [2], UDP header, RTP header, and and RSW payload (varies based on the
codec used) which is the body of the audio message.
IP (20 bytes) UDP (8 bytes) RTP (12 bytes) RSW Payload
Figure 1. RSW Audio Packet Format.
2.2. InterAsterisk eXchange Protocol
In (2004) Mark Spencer [5] has created the Inter-Asterisk eXchange (IAX) protocol for asterisk
that performs VoIP signalling. Streaming media is managed, controlled and transmitted through
the Internet Protocol (IP) networks based on this protocol. Any type of streaming media could be
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014
123
used by this protocol. However, IP voice calls are basically being controlled by IAX protocol
[14]. Furthermore, this protocol can be called as a peer to peer (P2P) protocol that performs two
types of connections which are Voice over IP (VoIP) connections through the servers and Client-
Server communication. IAX is currently changed to IAX2 which is the second version of the IAX
protocol. The IAX2 has deprecated the original IAX protocol [5]. Call signalling and multimedia
transport functions are supported by the IAX protocol. In the same session and by using IAX,
Voice streams (multimedia and signalling) are conveyed. Furthermore, IAX supports the trunk
connections concept for numerous calls. The bandwidth usage is reduced when this concept is
being used because all the protocol overhead is shared for all the calls between two IAX nodes.
Over a single link, IAX provides multiplexing channels [11]. IAX is a simple protocol in such a
way Network Address Translation (NAT) traversal complications are avoided by it [8]. Unlike
RSW, IAX has its own frames (full and mini frames) to carry control, audio, video messages and
signals. IAX full frames are responsible to carry the signals and the control messages, while Mini
frame are the only type of frames which hold the data during the media transmission session
between two endpoints A and B. Each audio/video flow is of IAX Mini Frames (M frames)
contains 4 bytes header (source call number (2 bytes) and timestamp (2 bytes)). UDP transport
protocol is used by IAX to transfer audio and video data [4]. The IAX audio packet format
consists of four parts, which are the IP header, the UDP header, the IAX header [5] and the IAX
payload (varies based on the codec used). Audio packet format of the IAX protocol is shown in
figure 2.
IP (20 bytes) UDP (8 bytes) IAX header (4 bytes) IAX payload
Figure 2. IAX Audio Packet Format.
3. CODEC’S USED IN IAX-RSW TRANSLATION MODULE
In order to transmit the packets from the sender to the receiver, an audio codec should be used. In
this paper, GSM codec is proposed in order to convert the analog audio to digital form [17]. Then,
the digital audio will be compressed to decrease the consumption of network bandwidth needed to
pass on the speech to the receiver. GSM audio codec has the bandwidth of (13.2 kb/s). However,
while sending the codec data across an IP network, it is going to increase the used bandwidth.
While dealing with voice, it is better not to introduce too much latency. For example, sending
voice frames every 20 ms, which means every 50 frames have to be sent in one second. Dividing
13.2 kb/s by 50 will give 33 bytes. As a result, 33 bytes of voice data will be sent per one frame.
In addition, IP header (20 bytes a packet), UDP header (8 bytes a packet) adding the RTP
protocol header (12 bytes a packet). This codec will be used not only for the IAX protocol, but
also for the RSW control protocol. In this paper, the two audio streams protocols will use the
same codec to transmit and receive the audio packets between the clients.
4. IAX-RSW TRANSLATION METHOD
This section will explain the two audio streams translation methods, which are RSW to IAX and
IAX to RSW. The proposed translation module consists of three components: IAX network, RSW
network, and the translation server or it can be called conference gateway. The proposed
conference gateway includes two buffers; IAX to RSW buffer and RSW to IAX buffer. The main
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014
124
task of these buffers is converting the packet format of the source protocol to be identical to the
format of the destination protocol to be clearly received.
• IAX to RSW buffer:
1. Collecting and storing the packets received from IAX client.
2. Extracting the mini header from IAX packets.
3. Inserting the RTP header (on behalf of the mini header) to IAX packets in order to be
identical to RSW packet format.
4. Preparing the converted packets to be sent to the RSW client.
• RSW to IAX buffer:
1. Collecting and storing the packets received from RSW client.
2. Extracting the RTP header from RSW packets.
3. Inserting the mini header (on behalf of RTP header) to RSW packets in order to be
identical to IAX packet format.
4. Preparing the converted packets to be sent to the IAX client.
5. SIMULATION ENVIRONMENT
Generally, there are no objections to have the flexibility to choose any simulation program to
simulate the proposed translation module as long as it meets the requirements to simulate such a
service. Furthermore, there are no restrictions to use particular hardware as a base to simulate the
translation module. GloMoSim (Global Mobile system Simulator) was used to simulate the
translation module [23]. GloMoSim is preferred to be chosen because it is extensible and
composable [22]. The operating system that was used as an environment to run GloMoSim is
Windows Vista. The hardware platform that was used to simulate the proposed translation module
is Intel Core Duo 2.00 GHz.
The simulation model consists of three main elements, which are: IAX network, RSW network,
and the conference gateway gateways with the internet connection. In the proposed simulation
model, voice packets are collected in the gateway’s buffer. The translation processes are done in
the gateway. This simulation model has many parameters in order to understand the simulation
processing, such as number of clients, buffer size, audio codec...etc.
6. PERFORMANCE METRICS TESTS
The real-time audio streams of IAX-RSW translation module will be evaluated by measuring and
testing by two performance metrics, which are: Packet Delay and Jitter. In this scenarios, the
packet delay and jitter tests of IAX-RSW translation module (one-to-one) were performed by
taking one RSW client and one IAX client. Both ways (RSW-to-IAX and IAX-to-RSW) were
tested using variable packet sequence numbers ranging from 10 to 100 packets.
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014
125
6.1. Packet Delay Test
Packet Delay is defined as “The measure of time that it takes the talker’s voice to reach the
listener’s ear” [24]. In the real-time applications, voice delay is considered to be a critical issue,
such as audio conferencing systems [25].
The end-to-end acceptable delay is 150 milli secondsPacket delay examines the quality of VoIP
service; as packet delay increased the QoS of VoIP calls decreased.
Packet delay is ranged between 1 and 15 ms in RSW-to-IAX transmission, while packet delay is
ranged between 1 and 12 ms in IAX-to-RSW transmission.
As IAX protocol has trunking property, this makes the quality of services for this protocol are
better than the other session protocols. Figure 3 shows that the IAX-RSW translation module
result values for packet delay are less than the accepted packet delay value which is 150 ms.
6.2. Jitter Test
The transmitted packets from the source to the destination may be reached with different delays
that rely on the queue in the crowded networks, several paths to avoid congestion, etc. This case
cause dissimilar time variations.
The different time variations of received packets on the destination are known as Jitter. Jitter can
bother and influence the quality of audio. Jitter should be less than 30 milliseconds [26].
Jitter examines the quality of VoIP service; as jitter increased the QoS of VoIP calls decreased.
According to figure 4, jitter is ranged between 2 and 4.3 ms in RSW-to-IAX transmission, while
it is ranged between 2 and 3.9 ms in IAX-to-RSW transmission.
We can notice that the jitter results of both ways are almost convergent.
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014
126
Figure 4. One-to-One IAX-RSW Packet Delay Results.
Figure 5. One-to-One IAX-RSW Jitter Results.
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014
127
7. SUMMARY
For guaranteeing a seamless end to end connectivity for IAX-RSW translation, we have proposed
solution to these interworking problems by doing an audio translation module. Using the
proposed Translation Module will enable VoIP protocols uses different sizes and formats of data
chunks to exchange audio streams. The translation module can be a base for any two different
protocols or more. The proposed method came as a translation audio streams module that can be
used when provide IAX-RSW full interworking. It will be a valuable research if the translation
module that depends on media transfer part (which is this performed work) combined with
translation module that depends on the signalling part, so we can get completed results. The
proposed translation module was tested and evaluated in different scenarios in order to examine
its performance. The obtained results showed that the Real-Time Translation Module produces
lower rates of packet delay and jitter than the acceptance values for each of the mentioned
performance metrics.
REFERENCES
[1] A. Uyar, (2005) “Scalable Oriented Architecture for Audio/Video conferencing,” Ph.D. Thesis,
Syracuse University, USA.
[2] A.S. Tanenbaum, (2003) “Computer Networks,” 4th edition, Pearson Education, Inc.
[3] C. Perkins, (2003) “RTP: Audio and Video for the Internet,” Addison Wesley, USA.
[4] D. DiNicolo, (2007) “Transporting VoIP Traffic with UDP and RTP”.
[5] M. Spencer & F.W. Miller, (2004) “IAX Protocol Description”.
[6] M.S. Kolhar, A.F. Bayan, T.C. Wan, O. Abouabdalla & R. Sureswaran, (2008) “Control and Media
Session: IAX with RSW Control Criteria,” Proceedings of International Conference on Network
Applications, Protocols and Services, Executive Development Centre, Universiti Utara Malaysia,
pp.130-135.
[7] M.S. Kolhar, A.F. Bayan, T.C. Wan, O. Abouabdalla & R. Sureswaran, (2008) “Multimedia
Communication: RSW Control Protocol and IAX,” The 5th International Symposium on High
Capacity Optical Networks and Enabling Technologies, Penang, Malaysia, pp.75-79.
[8] M.S. Kolhar, M.M. Abu-Alhaj, O. Abouabdalla, T.C. Wan & A.M. Manasrah, (2009) “Comparative
Evaluation and Analysis of IAX and RSW,” International Journal of Computer Science and
Information Security, pp.250-252.
[9] O. Abouabdalla & R. Sureswaran, (2006) “Enable Communication between the RSW Control Criteria
and SIP Using R2SP,” The 2nd International Conference on Distributed Frameworks for Multimedia
Applications, pp.1-7.
[10] O. Abouabdalla & R. Sureswaran, (2000) “Server Algorithm to Manage Distributed Network Entities
for Multimedia Conferencing System,” In Proceedings IWS Asia Pacific Advanced Network and its
Applications, pp.141-146.
[11] P. Montoro & E. Casilari, (2009) “A Comparative Study of VoIP Standards with Asterisk,”
Proceedings of the Fourth International Conference on Digital Telecommunications, pp.1-6.
[12] S. Gale, (1990) “Human Aspect of Interactive Multimedia Communication Interaction with
Computers”.
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014
128
[13] R. Sureswaran, R.K. Subramanian, H. Guyennet & M. Trehel, (1997) “Using RSW Control
Criteria to Create a Distributed Environment for Multimedia Conferencing,” Proceedings on Research
and Development in Computer Science and its Applications, Penang, Malaysia, pp.27-29.
[14] T. Abbasi, S. Prasad, N. Seddigh & I. Lambadaris, (2005) “A Comparative Study of the SIP and
IAX,” Canadian Conference on Electrical and Computer Engineering, pp.179- 183.
[15] T. Oishi & H. Inouchi, (2007) “Method and System for Persistent Translation between Protocols”.
[16] T. Kelliher, (2008) “TCP and UDP socket programming”.
[17] V. Toncar, (2009) “VoIP Basics: Overview of Audio Codec’s”.
[18] Y. Wan, X. Zhang & W. Li, (2000) “Audio Multimedia Conferencing System Based on the
Technology of Speech Recognition,” The 2000 IEEE Asia-Pacific Conference on Circuits and
Systems, pp.771-774.
[19] A. Uyar, S. Pallickara & G. Fox, (2003) “Towards an Architecture for Audio/Video Conferencing in
Distributed Brokering Systems,” Proceedings of the International Conference on Communications in
Computing, Las Vegas, USA, pp.17-23.
[20] S.A.K. Al-Omari, P. Sumari, S. Al-Taweel & A.M. Manasrah, (2010) “CUSTP: Custom Protocol for
Audio and Video Conferencing System over P2P Networks,” International Journal of Digital Content
Technology and its Applications, pp.61-74.
[21] B. White, J. Lepreau, L. Stoller, R. Ricci, S. Guruprasad, M. Newbold, M. Hibler, C. Barb, & A.
Joglekar, (2002) “An Integrated Experimental Environment for Distributed Systems and Networks,”
in Proceeding of the Fifth Symposium on Operating Systems Design and Implementation, Salt Lake
City, Utah 84112-9205 USA, pp.255-270.
[22] X. Zeng, R. Bagrodia & M. Gerla: GloMoSim, (1998) “A Library for Parallel Simulation of Large-
scale Wireless Networks,” Proceeding of the IEEE PADS 98 Parallel and distributed simulation,
Banff, Alta, pp.154-161.
[23] J. Hsu, T. Yan & R. Bagrodia, (1999) “A Simulation Study of Packetized Voice Over Multi-hop
Wireless Networks using GloMoSim,” Proceedings of the International Conference on Parallel and
Distributed Processing Techniques and Applications, Las Vegas, Nevada, USA.
[24] G. Rittenhouse & H. Zheng, (2005) “Providing VOIP Service in UMTS-HSDPA with Frame
Aggregation,” Proceeding IEEE International Conference on Acoustics, Speech, and Signal
Processing, pp. 1157-1160.
[25] D. Su & J. Srivastava, (1999) “Investigating factors influencing QoS of internet phone, Proceeding
International Conference on Multimedia Computing and Systems, pp. 308-313.
[26] A.R. Reibman, V.A. Vaishampayan & Y. Sermadevi, (2004) “Quality Monitoring of Video Over a
Packet Network,” IEEE Transactions, pp. 327- 334.
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014
129
Authors
Hadeel Saleh Haj Aliwi has obtained her Bachelor degree in Computer Engineering from
Ittihad Private University, Syria in 2007-2008 and Master degree in Computer Science from
Universiti Sains Malaysia, Penang, Malaysia in 2011. Currently, she is a PhD candidate at the
School of Computer Science, Universiti Sains Malaysia. Her main research area interests are in
includes Multimedia Networking, Voice over Internet protocols (VoIP), and Real-time
Interworking between Heterogeneous signalling protocols, and Instant Messaging protocols.
Putra Sumari obtained his MSc and PhD in 1997 and 2000 from Liverpool University,
England. Currently, he is Associate Professor and a lecturer at the School of Computer Science,
USM. He is the head of the Multimedia Computing Research Group, CS, USM. Member of
ACM and IEEE, Program Committee and reviewer of several International Conference on
Information and Communication Technology (ICT), Committee of Malaysian ISO Standard
Working Group on Software Engineering Practice, Chairman of Industrial Training Program,
School of Computer Science, USM, Advisor of Master in Multimedia Education Program, UPSI, Perak.

Weitere ähnliche Inhalte

Was ist angesagt?

Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...ijmnct
 
VoIP and multimedia networking
VoIP and multimedia networkingVoIP and multimedia networking
VoIP and multimedia networkingsangusajjan
 
Session Initiation Protocol (SIP)– Via Header Detailed Coverage
Session Initiation Protocol (SIP)– Via Header Detailed Coverage Session Initiation Protocol (SIP)– Via Header Detailed Coverage
Session Initiation Protocol (SIP)– Via Header Detailed Coverage Sridhar Kumar N
 
Lec 12(Transport Layer)
Lec 12(Transport Layer)Lec 12(Transport Layer)
Lec 12(Transport Layer)maamir farooq
 
Data communication part2
Data communication part2Data communication part2
Data communication part2Melvin Cabatuan
 
presentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationspresentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationsAnyapuPranav
 

Was ist angesagt? (20)

Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...
 
Digital network lecturer6
Digital network  lecturer6Digital network  lecturer6
Digital network lecturer6
 
Switching systems lecture6
Switching  systems lecture6Switching  systems lecture6
Switching systems lecture6
 
VoIP and multimedia networking
VoIP and multimedia networkingVoIP and multimedia networking
VoIP and multimedia networking
 
Transport Layer Description By Varun Tiwari
Transport Layer Description By Varun TiwariTransport Layer Description By Varun Tiwari
Transport Layer Description By Varun Tiwari
 
SIP Presentation
SIP PresentationSIP Presentation
SIP Presentation
 
Session Initiation Protocol (SIP)– Via Header Detailed Coverage
Session Initiation Protocol (SIP)– Via Header Detailed Coverage Session Initiation Protocol (SIP)– Via Header Detailed Coverage
Session Initiation Protocol (SIP)– Via Header Detailed Coverage
 
Switching systems lecture8 mpls
Switching  systems lecture8 mplsSwitching  systems lecture8 mpls
Switching systems lecture8 mpls
 
2 applications.key
2 applications.key2 applications.key
2 applications.key
 
Digital network lecturer4
Digital network  lecturer4Digital network  lecturer4
Digital network lecturer4
 
Transport layer
Transport layerTransport layer
Transport layer
 
Switching systems lecture5
Switching  systems lecture5Switching  systems lecture5
Switching systems lecture5
 
Digital network lecturer8
Digital network  lecturer8Digital network  lecturer8
Digital network lecturer8
 
Lec 12(Transport Layer)
Lec 12(Transport Layer)Lec 12(Transport Layer)
Lec 12(Transport Layer)
 
Data communication part2
Data communication part2Data communication part2
Data communication part2
 
presentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationspresentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunications
 
Transportlayer tanenbaum
Transportlayer tanenbaumTransportlayer tanenbaum
Transportlayer tanenbaum
 
Tcp ip
Tcp ipTcp ip
Tcp ip
 
Digital network lecturer2
Digital network  lecturer2Digital network  lecturer2
Digital network lecturer2
 
Bluetooth mobileip
Bluetooth mobileipBluetooth mobileip
Bluetooth mobileip
 

Andere mochten auch

IMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATION
IMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATIONIMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATION
IMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATIONIJCNCJournal
 
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftCorporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftIJCNCJournal
 
PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...
PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...
PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...IJCNCJournal
 
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESIJCNCJournal
 
On modeling controller switch interaction in openflow based sdns
On modeling controller switch interaction in openflow based sdnsOn modeling controller switch interaction in openflow based sdns
On modeling controller switch interaction in openflow based sdnsIJCNCJournal
 
A bandwidth allocation model provisioning framework with autonomic characteri...
A bandwidth allocation model provisioning framework with autonomic characteri...A bandwidth allocation model provisioning framework with autonomic characteri...
A bandwidth allocation model provisioning framework with autonomic characteri...IJCNCJournal
 
On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...IJCNCJournal
 
Link aware nice application level multicast protocol
Link aware nice application level multicast protocolLink aware nice application level multicast protocol
Link aware nice application level multicast protocolIJCNCJournal
 
A new method for controlling and maintaining
A new method for controlling and maintainingA new method for controlling and maintaining
A new method for controlling and maintainingIJCNCJournal
 
Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)IJCNCJournal
 
Design, implementation and evaluation of icmp based available network bandwid...
Design, implementation and evaluation of icmp based available network bandwid...Design, implementation and evaluation of icmp based available network bandwid...
Design, implementation and evaluation of icmp based available network bandwid...IJCNCJournal
 
Security analysis of generalized confidentialmodulation for quantum communica...
Security analysis of generalized confidentialmodulation for quantum communica...Security analysis of generalized confidentialmodulation for quantum communica...
Security analysis of generalized confidentialmodulation for quantum communica...IJCNCJournal
 
A low complex modified golden
A low complex modified goldenA low complex modified golden
A low complex modified goldenIJCNCJournal
 
Internet service provider mobile
Internet service provider mobileInternet service provider mobile
Internet service provider mobileIJCNCJournal
 
Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...IJCNCJournal
 
A comparative analysis of number portability routing schemes
A comparative analysis of number portability routing schemesA comparative analysis of number portability routing schemes
A comparative analysis of number portability routing schemesIJCNCJournal
 
Pwm technique to overcome the effect of
Pwm technique to overcome the effect ofPwm technique to overcome the effect of
Pwm technique to overcome the effect ofIJCNCJournal
 
Cloud computing challenges and solutions
Cloud computing challenges and solutionsCloud computing challenges and solutions
Cloud computing challenges and solutionsIJCNCJournal
 
Correlation based feature selection (cfs) technique to predict student perfro...
Correlation based feature selection (cfs) technique to predict student perfro...Correlation based feature selection (cfs) technique to predict student perfro...
Correlation based feature selection (cfs) technique to predict student perfro...IJCNCJournal
 

Andere mochten auch (19)

IMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATION
IMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATIONIMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATION
IMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATION
 
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftCorporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theft
 
PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...
PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...
PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...
 
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
 
On modeling controller switch interaction in openflow based sdns
On modeling controller switch interaction in openflow based sdnsOn modeling controller switch interaction in openflow based sdns
On modeling controller switch interaction in openflow based sdns
 
A bandwidth allocation model provisioning framework with autonomic characteri...
A bandwidth allocation model provisioning framework with autonomic characteri...A bandwidth allocation model provisioning framework with autonomic characteri...
A bandwidth allocation model provisioning framework with autonomic characteri...
 
On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...
 
Link aware nice application level multicast protocol
Link aware nice application level multicast protocolLink aware nice application level multicast protocol
Link aware nice application level multicast protocol
 
A new method for controlling and maintaining
A new method for controlling and maintainingA new method for controlling and maintaining
A new method for controlling and maintaining
 
Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)
 
Design, implementation and evaluation of icmp based available network bandwid...
Design, implementation and evaluation of icmp based available network bandwid...Design, implementation and evaluation of icmp based available network bandwid...
Design, implementation and evaluation of icmp based available network bandwid...
 
Security analysis of generalized confidentialmodulation for quantum communica...
Security analysis of generalized confidentialmodulation for quantum communica...Security analysis of generalized confidentialmodulation for quantum communica...
Security analysis of generalized confidentialmodulation for quantum communica...
 
A low complex modified golden
A low complex modified goldenA low complex modified golden
A low complex modified golden
 
Internet service provider mobile
Internet service provider mobileInternet service provider mobile
Internet service provider mobile
 
Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...
 
A comparative analysis of number portability routing schemes
A comparative analysis of number portability routing schemesA comparative analysis of number portability routing schemes
A comparative analysis of number portability routing schemes
 
Pwm technique to overcome the effect of
Pwm technique to overcome the effect ofPwm technique to overcome the effect of
Pwm technique to overcome the effect of
 
Cloud computing challenges and solutions
Cloud computing challenges and solutionsCloud computing challenges and solutions
Cloud computing challenges and solutions
 
Correlation based feature selection (cfs) technique to predict student perfro...
Correlation based feature selection (cfs) technique to predict student perfro...Correlation based feature selection (cfs) technique to predict student perfro...
Correlation based feature selection (cfs) technique to predict student perfro...
 

Ähnlich wie Real time audio translation module between iax and rsw

SAMSUNG Wireless Enterprise - Voice Optimization [White paper]
SAMSUNG Wireless Enterprise - Voice Optimization [White paper]SAMSUNG Wireless Enterprise - Voice Optimization [White paper]
SAMSUNG Wireless Enterprise - Voice Optimization [White paper]Marcello Marchesini
 
Throughput Performance Analysis VOIP over LTE
Throughput Performance Analysis VOIP over LTEThroughput Performance Analysis VOIP over LTE
Throughput Performance Analysis VOIP over LTEiosrjce
 
Optimal Communication Of Real Time Data On Secure Cdma Ip...
Optimal Communication Of Real Time Data On Secure Cdma Ip...Optimal Communication Of Real Time Data On Secure Cdma Ip...
Optimal Communication Of Real Time Data On Secure Cdma Ip...Stefanie Yang
 
OPTIMIZING VOIP USING A CROSS LAYER CALL ADMISSION CONTROL SCHEME
OPTIMIZING VOIP USING A CROSS LAYER CALL ADMISSION CONTROL SCHEMEOPTIMIZING VOIP USING A CROSS LAYER CALL ADMISSION CONTROL SCHEME
OPTIMIZING VOIP USING A CROSS LAYER CALL ADMISSION CONTROL SCHEMEIJCNCJournal
 
Real time transport protocol
Real time transport protocolReal time transport protocol
Real time transport protocolSwaroopSorte
 
2. A Survey of Rate Adaptation Techniques for Dynamic Adaptive Streaming over...
2. A Survey of Rate Adaptation Techniques for Dynamic Adaptive Streaming over...2. A Survey of Rate Adaptation Techniques for Dynamic Adaptive Streaming over...
2. A Survey of Rate Adaptation Techniques for Dynamic Adaptive Streaming over...AliIssa53
 
Analysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentAnalysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentEditor IJMTER
 
Video steaming Throughput Performance Analysis over LTE
Video steaming Throughput Performance Analysis over LTEVideo steaming Throughput Performance Analysis over LTE
Video steaming Throughput Performance Analysis over LTEiosrjce
 
VOIP PERFORMANCE OVER BROADBAND WIRELESS NETWORKS UNDER STATIC AND MOBILE ENV...
VOIP PERFORMANCE OVER BROADBAND WIRELESS NETWORKS UNDER STATIC AND MOBILE ENV...VOIP PERFORMANCE OVER BROADBAND WIRELESS NETWORKS UNDER STATIC AND MOBILE ENV...
VOIP PERFORMANCE OVER BROADBAND WIRELESS NETWORKS UNDER STATIC AND MOBILE ENV...ijwmn
 
Mobile Networking and Ad hoc routing protocols validation
Mobile Networking and Ad hoc routing protocols validationMobile Networking and Ad hoc routing protocols validation
Mobile Networking and Ad hoc routing protocols validationIOSR Journals
 
dynamic media streaming over wireless and ip networks
dynamic media streaming over wireless and ip networksdynamic media streaming over wireless and ip networks
dynamic media streaming over wireless and ip networksNaveen Dubey
 
Sip technology overview
Sip technology overviewSip technology overview
Sip technology overviewOded Ben-Dori
 
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS ijwmn
 
Paper id 21201485
Paper id 21201485Paper id 21201485
Paper id 21201485IJRAT
 
Wave ppt Wireless Access in Vehicular Environment
Wave ppt Wireless Access in Vehicular EnvironmentWave ppt Wireless Access in Vehicular Environment
Wave ppt Wireless Access in Vehicular EnvironmentACE ENGINEERING COLLEGE
 

Ähnlich wie Real time audio translation module between iax and rsw (20)

SAMSUNG Wireless Enterprise - Voice Optimization [White paper]
SAMSUNG Wireless Enterprise - Voice Optimization [White paper]SAMSUNG Wireless Enterprise - Voice Optimization [White paper]
SAMSUNG Wireless Enterprise - Voice Optimization [White paper]
 
C011111523
C011111523C011111523
C011111523
 
Throughput Performance Analysis VOIP over LTE
Throughput Performance Analysis VOIP over LTEThroughput Performance Analysis VOIP over LTE
Throughput Performance Analysis VOIP over LTE
 
Ch 2
Ch 2Ch 2
Ch 2
 
Optimal Communication Of Real Time Data On Secure Cdma Ip...
Optimal Communication Of Real Time Data On Secure Cdma Ip...Optimal Communication Of Real Time Data On Secure Cdma Ip...
Optimal Communication Of Real Time Data On Secure Cdma Ip...
 
OPTIMIZING VOIP USING A CROSS LAYER CALL ADMISSION CONTROL SCHEME
OPTIMIZING VOIP USING A CROSS LAYER CALL ADMISSION CONTROL SCHEMEOPTIMIZING VOIP USING A CROSS LAYER CALL ADMISSION CONTROL SCHEME
OPTIMIZING VOIP USING A CROSS LAYER CALL ADMISSION CONTROL SCHEME
 
Real time transport protocol
Real time transport protocolReal time transport protocol
Real time transport protocol
 
2. A Survey of Rate Adaptation Techniques for Dynamic Adaptive Streaming over...
2. A Survey of Rate Adaptation Techniques for Dynamic Adaptive Streaming over...2. A Survey of Rate Adaptation Techniques for Dynamic Adaptive Streaming over...
2. A Survey of Rate Adaptation Techniques for Dynamic Adaptive Streaming over...
 
Analysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentAnalysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX Environment
 
D011112432
D011112432D011112432
D011112432
 
Video steaming Throughput Performance Analysis over LTE
Video steaming Throughput Performance Analysis over LTEVideo steaming Throughput Performance Analysis over LTE
Video steaming Throughput Performance Analysis over LTE
 
VOIP PERFORMANCE OVER BROADBAND WIRELESS NETWORKS UNDER STATIC AND MOBILE ENV...
VOIP PERFORMANCE OVER BROADBAND WIRELESS NETWORKS UNDER STATIC AND MOBILE ENV...VOIP PERFORMANCE OVER BROADBAND WIRELESS NETWORKS UNDER STATIC AND MOBILE ENV...
VOIP PERFORMANCE OVER BROADBAND WIRELESS NETWORKS UNDER STATIC AND MOBILE ENV...
 
Mobile Networking and Ad hoc routing protocols validation
Mobile Networking and Ad hoc routing protocols validationMobile Networking and Ad hoc routing protocols validation
Mobile Networking and Ad hoc routing protocols validation
 
dynamic media streaming over wireless and ip networks
dynamic media streaming over wireless and ip networksdynamic media streaming over wireless and ip networks
dynamic media streaming over wireless and ip networks
 
40120140504014 2
40120140504014 240120140504014 2
40120140504014 2
 
Sip technology overview
Sip technology overviewSip technology overview
Sip technology overview
 
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS
 
Paper id 21201485
Paper id 21201485Paper id 21201485
Paper id 21201485
 
Wave ppt Wireless Access in Vehicular Environment
Wave ppt Wireless Access in Vehicular EnvironmentWave ppt Wireless Access in Vehicular Environment
Wave ppt Wireless Access in Vehicular Environment
 
Cn assignment
Cn assignmentCn assignment
Cn assignment
 

Mehr von IJCNCJournal

Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...IJCNCJournal
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...IJCNCJournal
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...IJCNCJournal
 

Mehr von IJCNCJournal (20)

Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & Communications
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
 

Kürzlich hochgeladen

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Kürzlich hochgeladen (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Real time audio translation module between iax and rsw

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014 DOI : 10.5121/ijcnc.2014.6310 121 REAL-TIME AUDIO TRANSLATION MODULE BETWEEN IAX AND RSW Hadeel Saleh Haj Aliwi and Putra Sumari School of Computer Sciences, Universiti Sains Malaysia, Penang, Malaysia ABSTRACT At the last few years, multimedia communication has been developed and improved rapidly in order to enable users to communicate between each other over the internet. Generally, multimedia communication consists of audio and video communication. However, this research concentrates on audio conferencing only. The audio translation between protocols is a very critical issue, because it solves the communication problems between any two protocols. So, it enables people around the world to talk with each other even they use different protocols. In this research, a real time audio translation module between two protocols has been done. These two protocols are: InterAsterisk eXchange Protocol (IAX) and Real-Time Switching Control Protocol (RSW), which they are widely used to provide two ways audio transfer feature. The solution here is to provide interworking between the two protocols which they have different media transports, audio codec’s, header formats and different transport protocols for the audio transmission. This translation will help bridging the gap between the two protocols by providing interworking capability between the two audio streams of IAX and RSW. Some related works have been done to provide translation between IAX and RSW control signalling messages. But, this research paper concentrates on the translation that depends on the media transfer. The proposed translation module was tested and evaluated in different scenarios in order to examine its performance. The obtained results showed that the Real-Time Audio Translation Module produces lower rates of packet delay and jitter than the acceptance values for each of the mentioned performance metrics. KEYWORDS Multimedia, VoIP, Interworking, InterAsterisk eXchange Protocol (IAX), Real Time Switching Control Criteria (RSW). 1. INTRODUCTION Multimedia communication has been developed and improved to be the basic and essential service in order to satisfy the needs of the Internet users [12, 18, 19, 20]. It has appeared to be more and more applicable in distributed environments [10, 21]. There are various protocols that control and signal the calls of the Internet telephone [1]; such protocols existed in Internet Protocol (IP) telecommunication. For data and signaling, two major protocols are considered in the field of the multimedia conferencing such as RSW and IAX protocols. Video functionality, similar quality of service and competitive voice are provided by these two protocols. The two protocols have been widely exploited and utilized into many different methods [15]. This work proposes a translation module between audio streams of IAX protocol and RSW control protocol. Generally, the procedure to a translator between the both protocols is starting from the first network to perform transferring the data into a first protocol. And then the second network to perform transferring the data into a second protocol. Finally, the translation server (conference gateway) to maintain translation information for a protocol translation, this translation occurs between the first and the second protocols [15].
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014 122 IAX and RSW audio transfer protocols have many differences in handling and exchanging voice packets between each other. In addition, different transport protocols and techniques are used by each of these protocols throughout audio exchange. The packet format in IAX protocol differs from the corresponding packet in RSW control protocol. When the data is attempted to be exchanged among each other by the two protocols, the data could not be understood by each of the two protocols. To overcome the translation problem between the audio streams of the two protocols (IAX and RSW), we proposed an audio translation module, which will be able to act as a translator between IAX and RSW audio streams. This translation module will help bridging the gap between IAX and RSW by providing interworking capability between the two audio streams. There are two sides accompanied with the translation between the two protocols: the control signaling and audio stream translation. The control signaling translation between two protocols, more specifically between RSW control protocol and IAX protocol has already done [6,7]. And the audio stream translation, which is the proposed work in this paper. The performed audio stream translation is true while this research concentrates on the two protocols (RSW control protocol and IAX protocol). 2. BRIEF DESCRIPTION OF IAX AND RSW PROTOCOLS This section will briefly describe the both protocols; Real-time Switching (RSW) Control Protocol and InterAsterisk eXchange (IAX) Protocol. 2.1. RSW Control Protocol Real-time Switching (RSW) control criteria is a control protocol used to handle a multipoint-to- multipoint multimedia conferencing sessions. RSW control protocol was developed in 1993 as a control mechanism for conferencing by the Network Research Group in school of computer sciences, University Sciences Malaysia (USM) [9]. RSW protocol doesn’t have its own header to carry the data so, Real-Time Protocol (RTP) protocol [3] is used to carry audio and video data through multimedia conferencing. User Datagram Protocol (UDP) is a transport protocol [2] that is also used by RSW to transfer audio and video data. The RSW control criteria is involved in decreasing bandwidth when many clients using the MCS system. RSW makes a list of priority for the participants to avoid confusion when many participants are trying to speak up during conference [6,13]. There are several advantages for the RSW control criteria [9] such as Equal Privileges, First Come First Serve, First come first serve with time-out, Organizer Main Site and Restricted Active site. The RSW audio packet format consists of four parts as shown in figure 1, which are IP header [2], UDP header, RTP header, and and RSW payload (varies based on the codec used) which is the body of the audio message. IP (20 bytes) UDP (8 bytes) RTP (12 bytes) RSW Payload Figure 1. RSW Audio Packet Format. 2.2. InterAsterisk eXchange Protocol In (2004) Mark Spencer [5] has created the Inter-Asterisk eXchange (IAX) protocol for asterisk that performs VoIP signalling. Streaming media is managed, controlled and transmitted through the Internet Protocol (IP) networks based on this protocol. Any type of streaming media could be
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014 123 used by this protocol. However, IP voice calls are basically being controlled by IAX protocol [14]. Furthermore, this protocol can be called as a peer to peer (P2P) protocol that performs two types of connections which are Voice over IP (VoIP) connections through the servers and Client- Server communication. IAX is currently changed to IAX2 which is the second version of the IAX protocol. The IAX2 has deprecated the original IAX protocol [5]. Call signalling and multimedia transport functions are supported by the IAX protocol. In the same session and by using IAX, Voice streams (multimedia and signalling) are conveyed. Furthermore, IAX supports the trunk connections concept for numerous calls. The bandwidth usage is reduced when this concept is being used because all the protocol overhead is shared for all the calls between two IAX nodes. Over a single link, IAX provides multiplexing channels [11]. IAX is a simple protocol in such a way Network Address Translation (NAT) traversal complications are avoided by it [8]. Unlike RSW, IAX has its own frames (full and mini frames) to carry control, audio, video messages and signals. IAX full frames are responsible to carry the signals and the control messages, while Mini frame are the only type of frames which hold the data during the media transmission session between two endpoints A and B. Each audio/video flow is of IAX Mini Frames (M frames) contains 4 bytes header (source call number (2 bytes) and timestamp (2 bytes)). UDP transport protocol is used by IAX to transfer audio and video data [4]. The IAX audio packet format consists of four parts, which are the IP header, the UDP header, the IAX header [5] and the IAX payload (varies based on the codec used). Audio packet format of the IAX protocol is shown in figure 2. IP (20 bytes) UDP (8 bytes) IAX header (4 bytes) IAX payload Figure 2. IAX Audio Packet Format. 3. CODEC’S USED IN IAX-RSW TRANSLATION MODULE In order to transmit the packets from the sender to the receiver, an audio codec should be used. In this paper, GSM codec is proposed in order to convert the analog audio to digital form [17]. Then, the digital audio will be compressed to decrease the consumption of network bandwidth needed to pass on the speech to the receiver. GSM audio codec has the bandwidth of (13.2 kb/s). However, while sending the codec data across an IP network, it is going to increase the used bandwidth. While dealing with voice, it is better not to introduce too much latency. For example, sending voice frames every 20 ms, which means every 50 frames have to be sent in one second. Dividing 13.2 kb/s by 50 will give 33 bytes. As a result, 33 bytes of voice data will be sent per one frame. In addition, IP header (20 bytes a packet), UDP header (8 bytes a packet) adding the RTP protocol header (12 bytes a packet). This codec will be used not only for the IAX protocol, but also for the RSW control protocol. In this paper, the two audio streams protocols will use the same codec to transmit and receive the audio packets between the clients. 4. IAX-RSW TRANSLATION METHOD This section will explain the two audio streams translation methods, which are RSW to IAX and IAX to RSW. The proposed translation module consists of three components: IAX network, RSW network, and the translation server or it can be called conference gateway. The proposed conference gateway includes two buffers; IAX to RSW buffer and RSW to IAX buffer. The main
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014 124 task of these buffers is converting the packet format of the source protocol to be identical to the format of the destination protocol to be clearly received. • IAX to RSW buffer: 1. Collecting and storing the packets received from IAX client. 2. Extracting the mini header from IAX packets. 3. Inserting the RTP header (on behalf of the mini header) to IAX packets in order to be identical to RSW packet format. 4. Preparing the converted packets to be sent to the RSW client. • RSW to IAX buffer: 1. Collecting and storing the packets received from RSW client. 2. Extracting the RTP header from RSW packets. 3. Inserting the mini header (on behalf of RTP header) to RSW packets in order to be identical to IAX packet format. 4. Preparing the converted packets to be sent to the IAX client. 5. SIMULATION ENVIRONMENT Generally, there are no objections to have the flexibility to choose any simulation program to simulate the proposed translation module as long as it meets the requirements to simulate such a service. Furthermore, there are no restrictions to use particular hardware as a base to simulate the translation module. GloMoSim (Global Mobile system Simulator) was used to simulate the translation module [23]. GloMoSim is preferred to be chosen because it is extensible and composable [22]. The operating system that was used as an environment to run GloMoSim is Windows Vista. The hardware platform that was used to simulate the proposed translation module is Intel Core Duo 2.00 GHz. The simulation model consists of three main elements, which are: IAX network, RSW network, and the conference gateway gateways with the internet connection. In the proposed simulation model, voice packets are collected in the gateway’s buffer. The translation processes are done in the gateway. This simulation model has many parameters in order to understand the simulation processing, such as number of clients, buffer size, audio codec...etc. 6. PERFORMANCE METRICS TESTS The real-time audio streams of IAX-RSW translation module will be evaluated by measuring and testing by two performance metrics, which are: Packet Delay and Jitter. In this scenarios, the packet delay and jitter tests of IAX-RSW translation module (one-to-one) were performed by taking one RSW client and one IAX client. Both ways (RSW-to-IAX and IAX-to-RSW) were tested using variable packet sequence numbers ranging from 10 to 100 packets.
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014 125 6.1. Packet Delay Test Packet Delay is defined as “The measure of time that it takes the talker’s voice to reach the listener’s ear” [24]. In the real-time applications, voice delay is considered to be a critical issue, such as audio conferencing systems [25]. The end-to-end acceptable delay is 150 milli secondsPacket delay examines the quality of VoIP service; as packet delay increased the QoS of VoIP calls decreased. Packet delay is ranged between 1 and 15 ms in RSW-to-IAX transmission, while packet delay is ranged between 1 and 12 ms in IAX-to-RSW transmission. As IAX protocol has trunking property, this makes the quality of services for this protocol are better than the other session protocols. Figure 3 shows that the IAX-RSW translation module result values for packet delay are less than the accepted packet delay value which is 150 ms. 6.2. Jitter Test The transmitted packets from the source to the destination may be reached with different delays that rely on the queue in the crowded networks, several paths to avoid congestion, etc. This case cause dissimilar time variations. The different time variations of received packets on the destination are known as Jitter. Jitter can bother and influence the quality of audio. Jitter should be less than 30 milliseconds [26]. Jitter examines the quality of VoIP service; as jitter increased the QoS of VoIP calls decreased. According to figure 4, jitter is ranged between 2 and 4.3 ms in RSW-to-IAX transmission, while it is ranged between 2 and 3.9 ms in IAX-to-RSW transmission. We can notice that the jitter results of both ways are almost convergent.
  • 6. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014 126 Figure 4. One-to-One IAX-RSW Packet Delay Results. Figure 5. One-to-One IAX-RSW Jitter Results.
  • 7. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014 127 7. SUMMARY For guaranteeing a seamless end to end connectivity for IAX-RSW translation, we have proposed solution to these interworking problems by doing an audio translation module. Using the proposed Translation Module will enable VoIP protocols uses different sizes and formats of data chunks to exchange audio streams. The translation module can be a base for any two different protocols or more. The proposed method came as a translation audio streams module that can be used when provide IAX-RSW full interworking. It will be a valuable research if the translation module that depends on media transfer part (which is this performed work) combined with translation module that depends on the signalling part, so we can get completed results. The proposed translation module was tested and evaluated in different scenarios in order to examine its performance. The obtained results showed that the Real-Time Translation Module produces lower rates of packet delay and jitter than the acceptance values for each of the mentioned performance metrics. REFERENCES [1] A. Uyar, (2005) “Scalable Oriented Architecture for Audio/Video conferencing,” Ph.D. Thesis, Syracuse University, USA. [2] A.S. Tanenbaum, (2003) “Computer Networks,” 4th edition, Pearson Education, Inc. [3] C. Perkins, (2003) “RTP: Audio and Video for the Internet,” Addison Wesley, USA. [4] D. DiNicolo, (2007) “Transporting VoIP Traffic with UDP and RTP”. [5] M. Spencer & F.W. Miller, (2004) “IAX Protocol Description”. [6] M.S. Kolhar, A.F. Bayan, T.C. Wan, O. Abouabdalla & R. Sureswaran, (2008) “Control and Media Session: IAX with RSW Control Criteria,” Proceedings of International Conference on Network Applications, Protocols and Services, Executive Development Centre, Universiti Utara Malaysia, pp.130-135. [7] M.S. Kolhar, A.F. Bayan, T.C. Wan, O. Abouabdalla & R. Sureswaran, (2008) “Multimedia Communication: RSW Control Protocol and IAX,” The 5th International Symposium on High Capacity Optical Networks and Enabling Technologies, Penang, Malaysia, pp.75-79. [8] M.S. Kolhar, M.M. Abu-Alhaj, O. Abouabdalla, T.C. Wan & A.M. Manasrah, (2009) “Comparative Evaluation and Analysis of IAX and RSW,” International Journal of Computer Science and Information Security, pp.250-252. [9] O. Abouabdalla & R. Sureswaran, (2006) “Enable Communication between the RSW Control Criteria and SIP Using R2SP,” The 2nd International Conference on Distributed Frameworks for Multimedia Applications, pp.1-7. [10] O. Abouabdalla & R. Sureswaran, (2000) “Server Algorithm to Manage Distributed Network Entities for Multimedia Conferencing System,” In Proceedings IWS Asia Pacific Advanced Network and its Applications, pp.141-146. [11] P. Montoro & E. Casilari, (2009) “A Comparative Study of VoIP Standards with Asterisk,” Proceedings of the Fourth International Conference on Digital Telecommunications, pp.1-6. [12] S. Gale, (1990) “Human Aspect of Interactive Multimedia Communication Interaction with Computers”.
  • 8. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014 128 [13] R. Sureswaran, R.K. Subramanian, H. Guyennet & M. Trehel, (1997) “Using RSW Control Criteria to Create a Distributed Environment for Multimedia Conferencing,” Proceedings on Research and Development in Computer Science and its Applications, Penang, Malaysia, pp.27-29. [14] T. Abbasi, S. Prasad, N. Seddigh & I. Lambadaris, (2005) “A Comparative Study of the SIP and IAX,” Canadian Conference on Electrical and Computer Engineering, pp.179- 183. [15] T. Oishi & H. Inouchi, (2007) “Method and System for Persistent Translation between Protocols”. [16] T. Kelliher, (2008) “TCP and UDP socket programming”. [17] V. Toncar, (2009) “VoIP Basics: Overview of Audio Codec’s”. [18] Y. Wan, X. Zhang & W. Li, (2000) “Audio Multimedia Conferencing System Based on the Technology of Speech Recognition,” The 2000 IEEE Asia-Pacific Conference on Circuits and Systems, pp.771-774. [19] A. Uyar, S. Pallickara & G. Fox, (2003) “Towards an Architecture for Audio/Video Conferencing in Distributed Brokering Systems,” Proceedings of the International Conference on Communications in Computing, Las Vegas, USA, pp.17-23. [20] S.A.K. Al-Omari, P. Sumari, S. Al-Taweel & A.M. Manasrah, (2010) “CUSTP: Custom Protocol for Audio and Video Conferencing System over P2P Networks,” International Journal of Digital Content Technology and its Applications, pp.61-74. [21] B. White, J. Lepreau, L. Stoller, R. Ricci, S. Guruprasad, M. Newbold, M. Hibler, C. Barb, & A. Joglekar, (2002) “An Integrated Experimental Environment for Distributed Systems and Networks,” in Proceeding of the Fifth Symposium on Operating Systems Design and Implementation, Salt Lake City, Utah 84112-9205 USA, pp.255-270. [22] X. Zeng, R. Bagrodia & M. Gerla: GloMoSim, (1998) “A Library for Parallel Simulation of Large- scale Wireless Networks,” Proceeding of the IEEE PADS 98 Parallel and distributed simulation, Banff, Alta, pp.154-161. [23] J. Hsu, T. Yan & R. Bagrodia, (1999) “A Simulation Study of Packetized Voice Over Multi-hop Wireless Networks using GloMoSim,” Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, Las Vegas, Nevada, USA. [24] G. Rittenhouse & H. Zheng, (2005) “Providing VOIP Service in UMTS-HSDPA with Frame Aggregation,” Proceeding IEEE International Conference on Acoustics, Speech, and Signal Processing, pp. 1157-1160. [25] D. Su & J. Srivastava, (1999) “Investigating factors influencing QoS of internet phone, Proceeding International Conference on Multimedia Computing and Systems, pp. 308-313. [26] A.R. Reibman, V.A. Vaishampayan & Y. Sermadevi, (2004) “Quality Monitoring of Video Over a Packet Network,” IEEE Transactions, pp. 327- 334.
  • 9. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014 129 Authors Hadeel Saleh Haj Aliwi has obtained her Bachelor degree in Computer Engineering from Ittihad Private University, Syria in 2007-2008 and Master degree in Computer Science from Universiti Sains Malaysia, Penang, Malaysia in 2011. Currently, she is a PhD candidate at the School of Computer Science, Universiti Sains Malaysia. Her main research area interests are in includes Multimedia Networking, Voice over Internet protocols (VoIP), and Real-time Interworking between Heterogeneous signalling protocols, and Instant Messaging protocols. Putra Sumari obtained his MSc and PhD in 1997 and 2000 from Liverpool University, England. Currently, he is Associate Professor and a lecturer at the School of Computer Science, USM. He is the head of the Multimedia Computing Research Group, CS, USM. Member of ACM and IEEE, Program Committee and reviewer of several International Conference on Information and Communication Technology (ICT), Committee of Malaysian ISO Standard Working Group on Software Engineering Practice, Chairman of Industrial Training Program, School of Computer Science, USM, Advisor of Master in Multimedia Education Program, UPSI, Perak.