project final2 h&f new
Post on 08-Apr-2018
220 Views
Preview:
TRANSCRIPT
-
8/7/2019 Project Final2 H&F new
1/95
Design and Develop VOIP Dialer and Recording Database
CHAPTER 1
1. INTRODUCTION
1.1 What is Voice Over Internet Protocol?
Voice over Internet Protocol is a general term for a family of transmission
technologies for delivery of voice communications over internet protocol networks such
as the internet or other packet-switched networks. Other terms frequently encountered
and synonymous with voice over internet protocol are internet protocol telephony,
internet telephony, voice over broadband, broadband telephony, and broadband phone.
internet telephony refers to communications services voice, facsimile, and/or voice-
messaging applications that are transported via the internet, rather than the public
switched telephone network.
Fig 1.1:- Alternative voice over internet protocol Architectures
The basic steps involved in originating an Internet telephone call are conversion of the
analog voice signal to digital format and compression/translation of the signal into
internet protocol packets for transmission over the internet; the process is reversed at the
receiving end. Voice over internet protocol systems employ session control protocols to
1
-
8/7/2019 Project Final2 H&F new
2/95
Design and Develop VOIP Dialer and Recording Database
control the set-up and tear-down of calls as well as audio codecs which encode speech
allowing transmission over an internet protocol network as digital audio via an audio
stream. Codec use is varied between different implementations of voice over internet
protocol (and often a range of codecs are used); some implementations rely on
narrowband and compressed speech, while others support high fidelity stereo codecs.
Voice over Internet Protocol is a technology for communicating using Internet
protocol instead of traditional analog systems. Some voice over internet protocol
services need only a regular phone connection, while others allow you to make
telephone calls using an Internet connection instead. Some voice over internet protocol
services may allow you only to call other people using the same service, but others may
allow you to call any telephone number - including local, long distance, wireless, and
international numbers. Voice over internet protocol is mainly concerned with the
realization of telephone service over internet protocol-based networks such as the
internet and intranet. Internet protocol telephony is currently breaking through to
become one of the most important service on the net. The actual breakthrough was made
possible by the high bandwidth available in an intranet and, increasingly, on the internet.
Another fundamental reason is the cost associated with the various implementations.
1.2 Phone to Phone via the Internet
Fig 1.2:- Phone to phone via internet
The public telephone network and the equipment makes it possible are taken for
granted in most parts of the world. Availability of a telephone and access to low-cost,
high quality worldwide network is considered to be essential in modern society
2
-
8/7/2019 Project Final2 H&F new
3/95
Design and Develop VOIP Dialer and Recording Database
(telephone are even expected to work when the power off).There is, however, a
paradigm shift beginning to occur since more and more communication is in digital
form and transported via packet networks such as internet protocol and Frame Relay
frames. Since data traffic, there has been considerable interest in transporting voice over
data networks. Support for voice communications using the internet protocol, which is
usually just called Voice over internet protocol or voice over internet protocol, has
become especially attractive given the low-cost, flat-rate pricing of the public Internet.
In fact, toll quality telephony over internet protocol has now become one of the key
steps leading to the convergence of the voice, video, and data communications
industries. The feasibility of carrying voice and signaling message over the internet has
already been demonstrated but delivering high-quality commercial products,
establishing public services, and convincing users to buy into the vision are just
beginning.
1.3 Phone to Internet to Gateway to PSTN
Fig 1.3:- Phone to internet to gateway to PSTN
1.4 Definition
Voice over internet protocol can be defined as the ability to make telephone calls
and to send facsimiles over internet protocol- based data networks with a suitable
3
-
8/7/2019 Project Final2 H&F new
4/95
Design and Develop VOIP Dialer and Recording Database
quality of service and a much superior cost/benefit. Equipment producers see Voice
over internet protocol as a new opportunity to innovate and copete. The challenge for
then is turning this vision into reality by quickly developing new voice over internet
protocol-enabled equipment. For Internet service providers, the possibility of
introducing usage-based pricing and increasing their traffic volumes is very attractive.
Users are seeking new types of integrated voice/data applications as well as cost
benefits. Successfully delivering voice over packet networks presents a tremendous
opportunity; however, implementing the products is not as straightforward a task as it
may first appear. This document examines the technologies, infrastructures, software,
and systems that will be necessary to realize voice over internet protocol on a large
scale. The types of applications that will both drive the market and benefit the most
from the convergence of voice and data networks will be identified.
1.5 History of Voice Over Internet Protocol
Voice over Internet Protocol owes its existence to the difference in price
between long-distance connections and the use of data networks. This technology uses
data networks such as the Internet to transmit voice information from a simple PC. A
telephone conversation is conducted via microphone and loudspeaker connected to the
sound card. Microsoft NetMeeting is the most common Internet telephony program. Its
feaures also include Internet video communication (image telephony). Or, a specially
adapter can be used to hook standard telephones up to the data network. All devices that
support the same standard can be connected over one data network. Gateways are also
available for connecting these devices to
telephones in the normal telephone network. These possibilities have led to the creation
of IP-based telephone systems using voice over internet protocol. The development of
voice over internet protocol technology is summarized and predicted in the following:
1995=> The year in which to PCs are connected using PC software
1996=> The year of the IP telephony client.
1997=> The year of the Gateway.
1998=> The year of the Gatekeeper.
1999=> The year of the Application.
4
-
8/7/2019 Project Final2 H&F new
5/95
Design and Develop VOIP Dialer and Recording Database
CHAPTER 2
2. Voice Over Internet Protocol Components
The components of VoIP include: end-user equipment, network components,call processors, gateways and protocols.
2.1End-user equipment
It is used to access the VoIP system to communicate with another end point.
Connection to the network may be physically cabled or may be wireless. The end-user
equipment may be a phone that sits on a desk or a softphone that is installed on a
PC.Functions include voice and possibly video communication, and may contain instant
messaging, monitoring and surveillance capabilities. 7 Though end-user equipment is
often deployed on an internal, protected network, it is usually is not individually
protected by other devices (firewalls) and may be threatened if the equipment has
vulnerabilities. The threat, of course, is also dependent on the level of security that
exists on the internal network. If the device is allowed to reach or can be reached from a
public or unprotected network, there may be threats that are not normally found on the
internal network. Softphone software may have vulnerabilities, there may be
vulnerabilities in the operating system it is running on, and there may be vulnerabilities
of other applications running on the operating system. Patching operating system, soft
phone software and those other applications can help mitigate the risk of any threats that
are present. Additionally, some end-user equipment may have firmware upgrades that
can be applied or may be able to obtain updated software during registration. For
operating system based Voice over internet protocol solutions, consideration should be
given to virus detection and host based firewalls as well as host-based intrusion
detection. Centralization of management of these security components is best, allowingthe users of the solution to focus on their duties instead of security details, increasing
productivity.
2.2 Network components
It includes cabling, routers, switches and firewalls. Usually the existing IP
network is where a new Voice over internet protocol system is installed. The impact on
the internet protocol network is greater than merely adding more traffic. The added
traffic has more of an urgency to reach its destination than most of the data traffic that is
5
-
8/7/2019 Project Final2 H&F new
6/95
Design and Develop VOIP Dialer and Recording Database
already supported. Switches, routers and firewalls will need to recognize and act on
Voice over internet protocol data in order to keep latency down. Additional security
measures, addressed later, will complicate this process.
Performance can be gained by separating the data traffic from the voice over
internet protocol traffic by putting them on different virtual local area networks. This
allows management of the data to be segregated so it can be handled based on data type.
Since the voice over internet protocol data must have a higher level, isolation of the data
types via virtual local area network can help increase the performance at the cost of that
on other virtual local area network. This cost may be very low to the other applications.
Although virtual local area network should not be relied on alone, they will add a layer
of security. The ability to listen to, or sniff, the network, potentially allows the hacker tomonitor calls and manipulate the voice over internet protocol system. It is generally
more difficult for a hacker to sniff or interfere with the voice traffic from the data virtual
local area network when the voice traffic is on its own virtual local area network, but it
can be done by manipulating the routing of the network. Encryption can also help
defend against sniffing. Another internet protocol network concern is network
slowdowns that might increase latency, jitter or packet loss. Slowdowns can be caused
for many reasons including configuration issues, denial of service attacks or high
bandwidth utilization by other systems on the network. Configuration issues are
probably best addressed with education and checking mechanisms, such as having a co-
worker verify configurations. Denial of service attacks are difficult to defend against,
but may be reduced by filtering the traffic that can communicate on the network to be
only that which is allowed. This may prove difficult due to the use of random ports by
voice over internet protocol. Regular network bandwidth analysis can help with tuning
of a network and helps with capacity planning. Being aware of bandwidth growth trends
helps network administrators know when bandwidth needs to be addressed.
Voice over internet protocol suffers from most of the same internet protocol
network vulnerabilities as other systems. A well secured internal network is the first step
to protecting the voice over internet protocol system as it was for the pre-existing
internet protocol network. Care must be taken to ensure security solutions keep latencies
low or the security solution itself may prove to be a denial of service.
6
-
8/7/2019 Project Final2 H&F new
7/95
Design and Develop VOIP Dialer and Recording Database
2.3 Call processor
These functions can include phone number to internet protocol translation, call
setup, call monitoring, user authorization, signal coordination, and may help control
bandwidth. 6 Call processors are usually software that runs on a popular OS. This leaves
it open to network attacks for the vulnerabilities of the given OS, the vulnerabilities of
the application and other applications running on the operating system.
2.4 Gateways
It can be categorized into three functional types: Signaling Gateways, Media
Gateways and Media Controllers. In general, they handle call origination and detection
and analog to digital conversion. Signaling gateways manage the signal traffic between
an internet protocol network and a switched circuit network, while media gateways
manage media signals between the two. Media Gateway Controllers manage traffic. The
most common gateway protocols are megaco. Both are composites or derivations of
previously but now less used protocols.6 Vulnerabilities can exist between the internal
internet protocol network and the gated, circuit switched network. Care should be
taken to ensure any vulnerabilities are mitigated.
Gateway communication should be secured with internet protocol Sec to prevent
interference with calls and to prevent unauthorized calls from being setup. The gateway
itself is vulnerable to internet protocol based attacks and can be mitigated by using
internet protocol Sec and by removing any unnecessary services and open ports, as
should be done with any server.
7
-
8/7/2019 Project Final2 H&F new
8/95
Design and Develop VOIP Dialer and Recording Database
CHAPTER 3
3.working
Voice over internet protocol converts the voice signal from your telephone into adigital signal that can travel over the internet. If you are calling a regular telephone
number, the signal is then converted back at the other end. Depending on the type of
voice over internet protocol service, you can make a voice over internet protocol call
from a computer, a special voice over internet protocol phone, or a traditional phone
with or without an adapter. In addition, new wireless "hot spots" in public locations such
as airports, parks, and cafes allow you to connect to the Internet, and may enable you to
use Voice over internet protocol service wirelessly. If your Voice over internet protocol
service provider assigns you a regular telephone number, then you can receive calls
from regular telephones that dont need special equipment, and most likely youll be
able to dial just as you always have.
Fig 3.1:-voice over internet protocol work service
The exploratory nature of this study produced focus groups as an appropriate
method for data collection. Our overarching goal was to improve our understanding of
how Latino voice over internet protocol users employ the technology and why they
select certain voice over internet protocol services and providers. In addition, we wanted
8
-
8/7/2019 Project Final2 H&F new
9/95
Design and Develop VOIP Dialer and Recording Database
to learn about Latinos not connected to the Internet-what they know about voice over
internet protocol and why they are not online. Moreover, we sought to learn whether the
lower cost of telephone calls associated with voice over internet protocol are enough of
an incentive for non-Internet users to get online, and, if so, under what conditions. Four
focus groups of 9 to 12 participants were held in Los Angeles in August 2008 (total
sample size, N = 43). Two of the focus groups consisted of Latinos who are Internet
users and have either heard of or used some form of voice over internet protocol
technology and service. The other two groups consisted of Latinos who reported that
they do not use the Internet.
The study participants were residents of Glendale, Cudahy, Huntington Park,
and South Gate, cities that are part of Los Angeles County, a large metropolitan areawith a significant and diverse Latino population. Glendale is the third largest city in Los
Angeles County and it is the most ethnically diverse area of the four in this study.
Twenty percent (20%) of the population is Latino, 21% is Armenian, 35% is White
(non-Armenian, non-Hispanic), and 16% is Asian from different countries of origin.
Approximately 40% of the residents are homeowners. The median household income is
$41,800 (U.S. Census, 2000). In Glendale, 70% of Latinos are connected to the Internet.
This is one of the highest connectedness rates across Latino communities in Los
Angeles County (Wilkin et al., 2007). The contiguous cities of Huntington Park, South
Gate, and Cudahy are in Southeast Los Angeles. Over 90% of the population is Latino,
and most residents are of Mexican origin. The median household income is about
$32,000, and only 24% of the population is connected to the Internet.
9
-
8/7/2019 Project Final2 H&F new
10/95
Design and Develop VOIP Dialer and Recording Database
CHAPTER 4
4. PROTOCOL
There are several protocols used for voice over internet protocol but two aremost common. They are H.323 and Session Initiation Protocol.
Fig 4.1:- Protocol Layers
4.1 H.323
H.323 is a protocol suite specified by the International Telecommunications
Union that lays a foundation for internet protocol based real-time communications
including audio, video and data.8 H.323 allows for different configurations of audio,
video and data. Possible configurations include audio only, audio & video, audio & data
and, audio, data and video. H.323 does not specify the packet network or transport
protocols. This standard specifies four kinds of components: Terminals, Gateways,
Gatekeepers and Multi-point Control Units .Terminals are the end-user equipment
discussed above. Gateways handle communication between unlike networks with
protocol translation and media format conversion. Gatekeepers provide services such as
addressing, authorization and authentication, accounting functions and call routing.
Multi-point Control Units handle conferencing.
The International Telecommunications Union defines the H.323 zone that consists of
terminals, gateways, Multi-point Control Units, and a gatekeeper. The gatekeeper
10
-
8/7/2019 Project Final2 H&F new
11/95
Design and Develop VOIP Dialer and Recording Database
manages the zone. H.323 uses different protocols to manage different needs. There are
audio codecs and video codecs that encode and decode the audio and video data. H.225
covers registrations,
Fig 4.2:- H.323 Architecture
admissions & status and call signaling. Realtime Transport Control Protocol handles
various functions between the endpoints and the gateway, including registrations and
admission control as its name implies. It also manages changes in bandwidth and
disengage procedures. A Realtime Transport Control Protocol channel is opened, prior to
opening other channels, between the gateway and endpoint whereby Realtime Transport
Control Protocol messages are passed. Call signaling channels are opened between
endpoints and between an endpoint and a gatekeeper. They are used to set up
connections. Call setup and termination uses Q.931.9 H.245 is for channel negotiations
such as flow controls and general commands and H.235 specifies security. Real-time
Transport Protocol is used to transport data, typically via user datagram protocol and
provides a timestamp, sequence number, data type and ability to monitor delivery.
Realtime Transport Control Protocol is used mainly to monitor quality and manage
synchronization. As mentioned above, the H.235 protocols of H.323 are for security
profiles. These standards address authentication, integrity, privacy, and non-repudiation
10 and are expressed as Annexes to H.23 5 Version 2. They are Annexes D, E & F as
11
-
8/7/2019 Project Final2 H&F new
12/95
-
8/7/2019 Project Final2 H&F new
13/95
Design and Develop VOIP Dialer and Recording Database
more security whereas, user datagram protocol allows for faster, lower latency,
connections. Usual components of an Session Internet Protocol system are the user
agent, proxy server, registrar server, and the redirect server. The usual components
software contains client and server components. The client piece makes outgoing calls
and the server is responsible for receiving incoming calls. The proxy server forwards
traffic, the registrar server authenticates requests, and the redirect server resolves
information for the usual components client. The endpoints begin by connecting with a
proxy and/or redirect server which resolves the destination number into an internet
protocol address. It then returns that information to the originating endpoint which is
responsible for transmitting the message directly to the destination. A security
advantage of session internet protocol is that it uses one port. The main concerns for
security of are confidentiality, message integrity, no repudiation, authentication and
privacy. New security mechanisms were not created for session internet protocol
instead, session internet protocol uses those provided by Hyper Text Transfer Protocol
and Simple Mail Transfer Protocol as well as Internet Protocol Security.
Fig 4.3:- Self-Provided Customer Architecture
13
-
8/7/2019 Project Final2 H&F new
14/95
Design and Develop VOIP Dialer and Recording Database
Signal confidentiality is best provided with full encryption, however, since some session
internet protocol message fields must be read and/or modified by some proxies, care
must be taken and possibly other methods used. If however, the proxy can be trusted,
then encryption at the transport and/or network layers may be the best solution. Security
at the transport and networking layers accomplishes full packet encryption using
internet protocol sec. TLS had been used, but has been deprecated. Full encryption
requires support of the encryption method at each end point where it is implemented.
Hyper text transfer protocol authentication uses the 401 and 407 response codes and
header fields. This provides a stateless challenge-base mechanism for authentication
whereby the challenge and user credentials are passed in the headers. When a proxy or
usual components receives a request, it may challenge to ensure the identity of thesender. Once identity has been confirmed the receiver should also verify that the
requester is authorized. Details of this digest method may be found in RFC 326112.
Secure/Multipurpose Internet Mail Extension is an enhancement to Multipurpose
Internet Mail Extension that replaces Pretty Good Privacy. Since Multipurpose Internet
Mail Extension bodies are carried by session internet protocol, session internet protocol
may use to enhance security, Multipurpose Internet Mail Extension contains
components that can provide integrity and encryption for Multipurpose Internet Mail
Extension data and as RFC 2633 states Multipurpose Internet Mail Extension can be
used for authentication, message integrity and non-repudiation of origin (using digital
signatures) and privacy and data security (using encryption). Multipurpose Internet Mail
Extension is useful when full encryption of the packet is not feasible due to the need of
network components to use data from the header fields. User identification is done via
certificate belonging to the user that is compared to the header information. Integrity of
the message is verified by matching the information in the outside header with that of
the inside header. Normally, Multipurpose Internet Mail Extension is used to encrypt
Session Description Protocol but there may be requirements to encrypt certain header
components. Session internet protocol can provide header privacy by encapsulating the
entire message using Multipurpose Internet Mail Extension type message/sip. If used for
anonymity the message will need to be decrypted before the certificate can be identified
and consequently validated. Session internet protocol Security Concerns hyper text
transfer protocol digest does not provide the best integrity. Without Multipurpose
Internet Mail Extension, spoofing of the header would not be difficult. Multipurpose
14
-
8/7/2019 Project Final2 H&F new
15/95
Design and Develop VOIP Dialer and Recording Database
Internet Mail Extension requires a public key infrastructure. Since certificates are
associated with users, moving from one device to another may be difficult. With
Multipurpose Internet Mail Extension there may be issues with firewalls or other proxy
devices that may require viewing and/or changing session internet protocol bodies. There
is information in session internet protocol headers that may be considered sensitive, i.e.
an unlisted phone number. Consideration may need to be given to providing per-user
options that allow protection of this information. Session internet protocol and H.323
both use protocols that may use random ports requiring that the firewall be able to open
and close ports as required. An H.323 or session internet protocol aware firewall may be
required. As with H.323, network address translation presents problems for session
internet protocol.
4.3 Network Address Translation
Network Address Translation allows one network address to be translated at a
gateway between two networks into another address so that the packet will have a valid
source address on the network it is on. Most commonly Network Address Translation is
used to change private internet protocol addresses into public, Internet routable, internet
protocol addresses. Ports may also be translated. Network Address Translation traversal
is usually only a concern if end-user devices connect directly with an external network
or if they connect to the internal network from an external network.
Fig 4.4:- Network Address Translation Architecture
Network Address Translation is a layer of security because it hides the real
addresses on the internal network from the public network. Network Address
Translation can however, be a problem, because the routing device does not know the
15
-
8/7/2019 Project Final2 H&F new
16/95
Design and Develop VOIP Dialer and Recording Database
actual internet protocol address of the device. The information defining the endpoint is
in the header. The routing device must be able to read the header and in some cases (i.e.
with proxy firewalls) change it. This is hampered when encryption is used. The best
solution is to not use Network Address Translation if at all possible. By removing the
issue, the problem disappears, though another problem may present itself. When
Network Address Translation is required, care must be taken to select application and
proxy firewalls that handle the implementation or, alternatively, consider a service offered
by the public networks.
4.4 Denial of Service
Denial of Service is caused by anything that prevents the service from being
delivered. A Denial of Service can be the result of unavailable bandwidth or voice over
internet protocol components being unavailable. Many things can cause a Denial of
Service including: a network getting congested to a level that it cannot provide the
bandwidth needed to support the application; servers not capable of handling the traffic;
extraneous services may be running that reduce the available resources to the server;
malicious programs such as viruses and Trojan horses; other malicious programs with
the purpose of causing Denial of Service or hacking activity.
Fig 4.5:- PSTN Architecture
16
-
8/7/2019 Project Final2 H&F new
17/95
Design and Develop VOIP Dialer and Recording Database
If Denial of Service is caused by bandwidth constraints, potential solutions are
increasing the bandwidth and/or isolating the voice over internet protocol traffic so that
it gets service first. Various methods of ensuring servers dont stop working, such as
failover methods like clustering, can help reduce Denial of Service from failing
components. Each component of the voice over internet protocol system offered by the
vendor, should be evaluated, removing those that are unnecessary. Server size should be
planned such that all desired vendor services and expected traffic can be supported,
adding some percentage for expected growth.
Defending against malicious programs and activity is more difficult but should begin
with applying appropriate patches in a timely manner, and installing virus protection
with frequent updates. In addition, installation designers should consider a host basedfirewall, intrusion detection and/or intrusion prevention. Defense against Denial of
Service attacks of public servers can best be done by locating the device with the public
available internet protocol addresses behind a firewall or other device that only allows
communication from trusted sources. Also, harden the operating systems in use,
removing all unnecessary services and applications from the servers and workstations,
patching, etc.
4.5 Other Concerns
Additional concerns of a VoIP system that need to be considered are databases,
web servers, additional VoIP services offered by the vendor, protocol stacks, access to
public or unknown networks, physical security and electrical power. Databases are
needed at some point of the VoIP implementation to store and retrieve information as
needed to accommodate various functions of the system. Database security principles
should be applied including changing the default administrator password, patches as
they become available, and best practices concerning access to the database, especially
from sources other than the voice over internet protocol system. A common feature of
end-user equipment is a web browser, the purpose of which is to provide additional
functionality and increased productivity. A voice over internet protocol system server
may have a web browser interface allowing management. If supported, patch the device
when the patch becomes available and use as strong authentication as can be supported.
Each vendor, having their own implementation of voice over internet protocol system,
may require any number of services to run on a server to support their product. As
17
-
8/7/2019 Project Final2 H&F new
18/95
Design and Develop VOIP Dialer and Recording Database
mentioned before, keep patches up to date and turn off all unneeded services. If the risk
is great enough, consider encryption and/or protection by another device such as a
firewall. The voice application and the operating system have similar vulnerabilities and
should be patched as well. If the voice over internet protocol system stays within a
secured network and only connects to the public network through a gateway, the
gateway is a vulnerability that needs addressing. Deploy the hardened gateway behind
an appropriate firewall, i.e. one that is aware of the protocols used. Voice over internet
protocol system must process the protocols that it supports so it needs to have some
implementation of a network stack. Stack implementations are written by the vendor
purchased from another vendor. With the latter, all vendors that purchased a specific
vendors stack will share the same vulnerabilities. Patch if necessary, when patches
become available. Ensure that the components are physically secure. Access to the box
allows ownership. There are many methods of compromising a device, depending on the
device and the underlying operating system, with physical access. Good security
practices include removing the a-disk and the CD- ROM from the boot list and
password protect the configuration. If a component is unavailable, then there is a denial
or service.
18
-
8/7/2019 Project Final2 H&F new
19/95
Design and Develop VOIP Dialer and Recording Database
CHAPTER 5
5. APPLICATIONS AND BENEFITS
Voice communication will certainly remain a basic from of interaction for all ofus. The public switched telephone network mply cannot be replaced, or even
dramatically changed, in the short term (this may not apply to provide voice networks,
however). The immediate goal for voice over internet protocol service providers is to
reproduce existing telephone capabilities at a significantly lower total cost of operation
and to offer a technically competitive alternative to the public switched telephone
network.
Fig 5.1:- Voice over internet protocol infrastructure
It is the combination of voice over internet protocol with point-of-service
applications that shows great promise for the longer term. The first measure of success for
voice over internet protocol will be cost saving for long distance calls as long as there
are no additional constraints imposed on the end user. For example, callers should not
be required to use a microphone on a pc. voice over internet protocol provides a
competitive threat to the providers of traditional telephone service that, at the very least,
will stimulate improvements in cost and function throughout the industry implemented
using an internet protocol network. This design would also apply if other types of packet
networks (such as frame relay) were being used.
Some example of voice over internet protocol applications that are likely to be useful
would be:
19
-
8/7/2019 Project Final2 H&F new
20/95
Design and Develop VOIP Dialer and Recording Database
5.1 Public switched telephone network gateways
Interconnection of the Internet to the public switched telephone network can be
accomplished using a gateway, either integrated into or provided as a separate device. A
PC-based telephone, for example, would have access to the public network by calling a
gateway at a point close to the destination (thereby minimizing long distance charges).
5.2 Internet-aware telephones
The goal for developers is relatively simple: add telephone calling capabilities
( both voice transfer and signaling) to internet protocol-based networks and interconnect
these to the public telephone network and to private voice networks in such as way as to
maintain current voice quality standards and preserve the features everyone expects
from the teleph Fig illustrates an overall
Fig 5.2:- overall architecture for VoIP an product developer arise
Architecture for voice over internet protocol an Suggests that the challenges forthe product developer arise in five specific areas:
1. Voice quality should be comparable to what is available using the public switched
telephone network, even over networks having variable levels of operating system.
2. The underlying internet protocol network must meet strict performance criteria
including minimizing call refusals, network latency, packet loss and disconnects. This is
required even during congestion condition or when multiple users must share network
resources.
20
-
8/7/2019 Project Final2 H&F new
21/95
Design and Develop VOIP Dialer and Recording Database
3. Call control (signaling) must make the telephone calling process transparent so that
the callers need not know what technology is actually implementing the service.
4. public switched telephone network service interworking (and equipment
interoperability) involves gateways between the voice and data network environments.
5. System management, security, addressing (directories, dial plans) and accounting
must be provided, preferably consolidated with the public switched telephone network
operation support systems.
21
-
8/7/2019 Project Final2 H&F new
22/95
Design and Develop VOIP Dialer and Recording Database
CHAPTER 6
6. Comparison of VoIP software
VoIP software is used to conduct telephone-like voice conversations acrossInternet Protocol (IP) based networks. VoIP stands for "Voice over IP". For residential
markets, VoIP phone service is often cheaper than traditional public switched telephone
network (PSTN) service and can remove geographic restrictions to telephone numbers,
e.g. have a New York PSTN phone number in Tokyo.
For businesses, VoIP obviates separate voice and data pipelines, channeling both types
of traffic through the IP network while giving the telephony user a range of advanced
capabilities.
Softphones are client devices for making and receiving voice and video calls over the IP
network with the standard functionality of most "original" telephones and usually allow
integration with IP phones and USB phones instead of utilizing a computer's
microphone and speakers (or headset). Most softphone clients run on the open Session
Initiation Protocol (SIP) supporting various codecs. Skype runs on a closed proprietary
network, though the network (but not the official Skype client software) also supports
SIP clients. Online "Chat" programs now also incorporate voice and video
communications.
Other VoIP software applications include conferencing servers, intercom systems,
virtual FXOs and adapted telephony software which concurrently support VoIP and
PSTN like IVR systems, dial in dictation, on hold and call recording servers.
6.1 General softphone clients
Program Operating systems License Open Protocols/based Encryption Max Other capabilities Latest
22
-
8/7/2019 Project Final2 H&F new
23/95
Design and Develop VOIP Dialer and Recording Database
Source
?
upon/compatibl
e with
conferenc
e peersrelease
AOL Instant
Messenger
Linux, Mac OS,
Windows
Freeware
/ Closed
Proprietar
y
NoSIP (Windows
ver. only), RTP
Unknown Unknown
Video, file transfer,
PC to phone, phone
to PC
BlinkLinux, Mac OS,
Windows
GPL /
Free
software
Yes
ICE, SIP,
MSRP, RFB
(VNC)
sRTP, TLS Unlimited
IM, File Transfer,
Desktop Sharing,
Multi-party
conference,
Wideband
0.23.2
(February
15, 2011)
Brosix
Linux, Mac OS,
Windows
Freeware
/ Closed
Proprietar
y
No Yes Unknown
Text chat, File
transfer, Video chat,
Screen-shot, Screen-
sharing,
Whiteboard, Co-
browse
3.0 (July
2010)
Cisco IP
Communicat
or
Windows
Closed
Proprietar
y
NoSCCP (Skinny),
SIP, TFTPsRTP Unknown
7.0.3 (Aug
2009)
Ekiga
Linux, (Beta
Windows support),
OpenSolaris
GPL /
Free
software
Yes
SIP, H.323,
H.263,
H.264/MPEG-4
AVC, STUN,
Theora,
Zeroconf
No Unknown
Video, IM, LDAP,
Call Forwarding,
Call Transfer
3.2.7 (May
31, 2010)
Empathy Linux
GPL /
Free
software
Yes
SIP, XMPP
(Jingle), ICE
(STUN/TURN),
Zeroconf
No Unknown
IM, multi-user A/V,
collaborative
applications
2.32.0.1
(2010-10-
04)
Eyeball Chat Windows
Freeware
/ Closed
Proprietar
y
NoSIP, STUN,
ICE, XMPPYes Unknown
IM, Conferencing,
Voice, Video and
SIMPLE based
presence
Windows
3.2
Gizmo5
Linux, Mac OS X,
Windows, Windows
Mobile Phone,
Blackberry, Nokia,
PDA Java
Freeware
/ Closed
Proprietar
y
No SIP, XMPP SRTP Unknown
Record Calls,
Forward Calls,
MSN IM, Windows
Live Talk, Google
Talk, Talk with
Yahoo, Messenger,
XMPP
Windows:
4.0.5.395
(23 Sep
2009), Mac
OS:
4.0.0.269
(23 Sep
2009)
Google Talk Windows Closed No XMPP zRTP Unknown Video, chat, file 1.0.0.104
23
-
8/7/2019 Project Final2 H&F new
24/95
Design and Develop VOIP Dialer and Recording Database
Proprietar
y (using
libjingle)
transfer, voicemail,
mail via "GMail
Integration"
iChat Mac OS X
Closed
Proprietar
y
No
SIP AIM ICQ
XMPP H263
H264
Unknown Unknown
Integrated, PBX
independent
January
2007
Jitsi
Linux, Mac OS,
Windows XP/2000
(all java supported)
LGPL /
Free
software
YesSIP/SIMPLE,
XMPP
Voice
encryption
(SRTP and
negotiation
with zRTP),
Signaling
encryption
(TLS)
Unknown
Text messaging,
audio/video
telephony, IPv6, call
recording
updated
daily
(December
26, 2010; 2
months ago)
KPhone Linux (KDE)
GPL /
Free
software
YesSIP, STUN,
NAPTR/SRVSRTP Unknown
Video, voice, IM,
external Sessions,
IPv6 support for
UDP
1.2
(November
2008)
Linphone Linux, Windows
GPL /
Free
software
Yes SIP No UnknownVideo, IM, STUN,
IPv6
3.4.1 (Feb
2011)
Lotus
Sametime
Linux, Mac OS X,
Windows, mobile
Closed
Proprietar
y
NoSIP, SIMPLE,
T.120 and H.323TLS Unknown
IM, File transfer,
Voice, Presence,
Server stored
contact list, HTTP
tunneling, plugins,
embedable in Lotus
Notes
8.5 (22.
December
2009)
Mirial
Softphone
(Mirial
s.u.r.l.)
Windows
2000/XP/2003/Vista/
7 (including 64bit
versions), Mac OS X
(x86)
Closed
Proprietar
y
No SIP, H.323,
RTSP
DTLS-SRTP Unknown H.264 Full-HD
1080p video rx/tx,
Two independent
lines supporting
Call Control and 3-
Partyvideoconference in
Continuous
Presence, G.722.1/C
wideband audio,
Call
recording/export,
DV/HDMI/Compon
ent capture,
Presentation (H.239,
RFC-4796),
Encryption, Far End
7.0.24 (May
26, 2010)
24
-
8/7/2019 Project Final2 H&F new
25/95
-
8/7/2019 Project Final2 H&F new
26/95
Design and Develop VOIP Dialer and Recording Database
Multiple
realms
authentificati
on
mechanism
call recording,
Multi-way
conferencing
SightSpeed Mac OS X, Windows
Freeware
/ Closed
Proprietar
y
No
SIP,
RTP,Proprietary
P2P protocol
Unknown Unknown
Video, voicemail,
phone in, phone out,
multiparty calling,
conference
recording, text
messaging, NAT
traversal, video mail
6.0
Skype Linux, Mac OS X,
Windows
2000/XP/Vista/7/Mobile (no longer
supported), BREW,
Android, iPhone, PSP
Freeware
/ Closed
Proprietary
No Proprietary P2P
protocol; SIP
users canconnect to the
Skype network
using alternate
software/hardwa
re, but the Skype
software does
not support it
directly
Yes 25
starting
withversion
3.6.0.216.
10 with
2.x
Conferencing,
video, file transfer,
voicemail, Skype tophone, phone to
Skype, additional
P2P extensions
(games, whiteboard,
etc...); depending on
platform.
5.2.60.113
(Windows)
5.0.0.7994(Mac OS X)
2.1.0.81
(Linux)
1.5.0.12
(Symbian)
(March 15,
2011; 4 days
ago
(Windows)
January 27,
2011; 51
days ago
(Mac OS X)
January 20,
2010; 13
months ago
(Linux)
December 1,
2010; 3
months ago
(Symbian).
The version
numbers are
not
synchronize
d, i.e. the
features in
Mac OS
2.0.0
version are
not the same
as those
26
-
8/7/2019 Project Final2 H&F new
27/95
Design and Develop VOIP Dialer and Recording Database
found in
Linux 2.0.0
version.)
Spikko
Windows
2000/XP/Vista/7/Mo
bile , iPhone,
Freeware
/ Closed
Proprietar
y
No SIP Yes 8
Conferencing,
voicemail, PC to
phone, phone to PC,
Free international
phone numbers,
address book
integration;
Dec 2010
TeamSpeakLinux, Windows,
Mac OS X
Freeware
Closed /
Proprietar
y
NoYes
(Optional)Unknown
Conferencing, File
Transfers3.0.0-beta36
Telephone Mac OS X 10.5
BSD /
Free
Software
Yes SIP, STUN, ICE No UnknownAddress Book
integration0.14.0
TokboxMac OS X, Windows
XP/2000/Vista
Freeware
/ Closed
Proprietar
y
No Unknown Unknown Unknown
Video calling, video
conferencing, chat,
IM (MSN, AIM,
Yahoo!, Google
Talk)
Unknown
TpadWindows
2000/XP/Vista
Freeware
/ Closed
Proprietar
y
No SIP, STUN Unknown U nknown
Call Forwarding,
PC to PSTN, PSTN
to PC, Voicemail to
email
3.0.1
Tru App
Windows
2000/XP/Vista/7,
Mac OS X, Linux
iOS, Android,
Symbian, BlackBerry
OS,
Freeware
/ Closed
Proprietar
y
No SIP, XMPP Unknown Unknown
Chat, file transfer,
voicemail, inbound
numbers, integration
with GTalk,
Microsoft Live,
Skype
Twinkle Linux
GPL /
Free
software
Yes SIP SRTP, ZRTP Unknown
Conferencing, chat,
file transfer, Firefox
integration, call
redirection,
voicemail, support
of VoIP-to-Phone
services
1.4.2
(2009-02-
25)
VbuzzerWindows
2000/XP/Vista
Freeware
/ Closed
Proprietar
y
No SIP TLS Unknown
IM (MSN),
voicemail,
personalized voice
greeting.
2.0.282
27
-
8/7/2019 Project Final2 H&F new
28/95
Design and Develop VOIP Dialer and Recording Database
Ventrilo Mac OS X, Windows
Freeware
/ Closed
Proprietar
y
No No UnknownConferencing, chat,
text-to-speech3.0.7
Voice
Operator
Panel
Windows
2000/XP/Vista
Closed
Proprietar
y
No SIP, RTP Unknown Unknown
Call forwarding,
Call transfer, Call
recording, Presence,
Outlook integration,
Windows
Messenger/MSN/Li
ve integration,
CRM, Built-in web
browser & e-mailer,
LDAP, APS.
1.3.2
X-LiteMac OS, Windows,
(Linux)
Freeware
/ Closed
Proprietar
y
No SIP, STUN, ICE Yes Unknown
IM, single loginaccount, for
Windows and Mac
also Conferencing,
Video and SIMPLE
based presence]
Windows /
Mac OS: 4.0
/ Linux:
Discontinue
d
Yahoo!
Messenger
Mac OS (8, 9, X),
Windows,
(Linux/FreeBSD
version not VoIP
capable)
Freeware
/ Closed
Proprietar
y
No
SIP (using TLS)
and RTP
(media)
Unknown Unknown
Video, file transfer,
PC to phone, phone
to PC
ZfoneLinux, Mac OS X,
Windows
Freeware
/
Viewable
source
Proprietar
y
(includes
time
bomb
provision
)
No SIP, RTP SRTP, ZRTP Unknown
Beta 2008-
09-04
(Linux
0.9.224),
(Mac OS
0.9.246),
(Windows
0.9.206)
28
-
8/7/2019 Project Final2 H&F new
29/95
-
8/7/2019 Project Final2 H&F new
30/95
Design and Develop VOIP Dialer and Recording Database
Fig 7.1:- Virtual Box
7.1 Why is virtualization useful?
Running multiple operating systems simultaneously. Virtual Box allows you to
run more than one operating system at a time. This way, you can run software
written for one operating system on another (for example, Windows software on
Linux or a Mac) without having to reboot to use it. Since you can configure what
kinds of virtual hardware should be presented to each such operating system, you
can install an old operating system such as DOS or OS/2 even if your real
computers hardware is no longer supported by that operating system.
7.2 Supported host operating systems
Currently, Virtual Box runs on the following host operating systems:
7.2.1 Windows hosts:
Windows XP, all service packs (32-bit)
Windows Server 2003 (32-bit)
Windows Vista (32-bit and 64-bit1).
Windows Server 2008 (32-bit and 64-bit)
30
-
8/7/2019 Project Final2 H&F new
31/95
-
8/7/2019 Project Final2 H&F new
32/95
Design and Develop VOIP Dialer and Recording Database
Networking This package contains extra networking drivers for your Windows
host that Virtual Box needs to support Bridged Networking (to make your VMs virtual
network cards accessible from other machines on your physical network).
Python Support This package contains Python scripting support for the Virtual
Box API.For this to work, an already working Windows Python installation on the
system is required.1
Depending on your Windows configuration, you may see warnings about unsigned
drivers or similar. Please select Continue on these warnings as otherwise Virtual
Box might not function correctly after installation.
The installer will create a Virtual Box group in the Windows Start menu which
allows you to launch the application and access its documentation.
VBoxApplication Main binaries of Virtual Box.
Note: This feature must not be absent since it contains the minimum set of files
to have working Virtual Box installation.
VBoxUSB USB support.
VBoxNetwork All networking support; includes the VBoxNetworkFlt and
VBoxNetworkAdp features (see below).
VBoxNetworkFlt Bridged networking support.
VBoxNetworkAdp Host-only networking support.
VBoxPython Python support.
7.3.3 Uninstallation
As Virtual Box uses the standard Microsoft Windows installer, Virtual Box can besafely uninstalled at any time by choosing the program entry in the Add/Remove
Programs applet in the Windows Control Panel.
7.4 Starting Virtual Box
After installation, you can start Virtual Box as follows:
On a Windows host, in the standard Programs menu, click on the item in the
Virtual Box group. On Vista or Windows 7, you can also type Virtual Box in the
32
-
8/7/2019 Project Final2 H&F new
33/95
Design and Develop VOIP Dialer and Recording Database
search box of the Start menu.
When you start Virtual Box for the first time, a window like the following should
come up:
Fig 7.2:- Welcome to Virtual Box
This window is called the Virtual Box Manager. On the left, you can see a pane
that will later list all your virtual machines. Since you have not created any, the list is
empty. A row of buttons above it allows you to create new VMs and work on existing
VMs, once you have some. The pane on the right displays the properties of the virtual
machine currently selected, if any. Again, since you dont have any machines yet, the
pane displays a welcome message.
To give you an idea what Virtual Box might look like later, after you have created many
machines, heres another example:
33
-
8/7/2019 Project Final2 H&F new
34/95
Design and Develop VOIP Dialer and Recording Database
Fig 7.3:- Virtual Box Main Menu
7.5 Creating your virtual machine
Click on the New button at the top of the Virtual Box Manager window. A
wizard will pop up to guide you through setting up a new virtual machine (VM):
Fig 7.4:- Create New Virtual Machine
On the following pages, the wizard will ask you for the bare minimum of information
that is needed to create a VM, in particular:
34
-
8/7/2019 Project Final2 H&F new
35/95
Design and Develop VOIP Dialer and Recording Database
Fig 7.5:- Choosing Operating System
7.5.1 Virtual Machine Name :
The VM name will later be shown in the VM list of the Virtual Box Manager
window, and it will be used for the VMs files on disk. Even though any name could
be used, keep in mind that once you have created a few VMs, you will appreciate if
you have given your VMs rather informative names; My VM would thus be less
useful than Windows XP SP2 with Open Office.
7.5.2 Operating System Type :
select the operating system that you want to install later. The supported
operating systems are grouped; if you want to install something very unusual that is
not listed, select Other. Depending on your selection, Virtual Box will enable or
disable certain VM settings that your guest operating system may require. This is partic-
ularly important for 64-bit guests. It is therefore recommended to always set it to the
correct value.
7.5.3 Virtual Machine RAM :
On the next page, select the memory (RAM) that Virtual Box should allocate
every time the virtual machine is started. The amount of memory given here will be
taken away from your host machine and presented to the guest operating system, which
will report this size as the (virtual) computers installed RAM.
35
-
8/7/2019 Project Final2 H&F new
36/95
-
8/7/2019 Project Final2 H&F new
37/95
-
8/7/2019 Project Final2 H&F new
38/95
Design and Develop VOIP Dialer and Recording Database
a new disk image. Hence, press the New button.
This brings up another window, the Create New Virtual Disk Wizard, which
helps you create a new disk image file in the new virtual machines folder.
Fig 7.8:- Virtual Disk Wizard
Press Next to continue.
Fig 7.9:- Type of Virtual Hard Disk
Virtual Box supports two types of image files:
A dynamically expanding file will only grow in size when the guest actually
stores data on its virtual hard disk. It will therefore initially be small on the host hard
drive and only later grow to the size specified as it is filled with data.
A fixed-size file will immediately occupy the file specified, even if only a
fraction of the virtual hard disk space is actually in use. While occupying much more
38
-
8/7/2019 Project Final2 H&F new
39/95
Design and Develop VOIP Dialer and Recording Database
space, a fixed-size file incurs less overhead and is therefore slightly faster than a
dynamically expanding file.
To prevent your physical hard disk from running full, VirtualBox limits the size of the
image file. Still, it needs to be large enough to hold the contents of your operating
system and the applications you want to install for a modern Windows or Linux
guest, you will probably need several gigabytes for any serious use:
Fig 7.10:- Size of Virtual Hard Disk
After having selected or created your image file, again press Next to go to the next
page.
39
-
8/7/2019 Project Final2 H&F new
40/95
Design and Develop VOIP Dialer and Recording Database
Fig 7.11:- Summary of Virtual Hard Disk
7.5.5 Finish:
After clicking on Finish, your new virtual machine will be created. You will
then see it in the list on the left side of the Manager window, with the name you
entered initially.
7.6 Running your virtual machine
Fig 7.12:- Running New Virtual Machine
To start a virtual machine, you have several options:
Double-click on its entry in the list within the Manager window or
select its entry in the list in the Manager window it and press the Start button at
the top or
for virtual machines created with VirtualBox 4.0 or later, navigate to the
VirtualBox VMs folder in your system users home directory, find the subdirectory of
the machine you want to start and double-click on the machine settings file (with a
. v b o x file extension).
This opens up a new window, and the virtual machine which you selected will boot up.
Every-thing which would normally be seen on the virtual systems monitor is shown in
the window.
40
-
8/7/2019 Project Final2 H&F new
41/95
Design and Develop VOIP Dialer and Recording Database
In general, you can use the virtual machine much like you would use a real computer.
There are couple of points worth mentioning however.
7.6.1 Starting a new VM for the first time
When a VM gets started for the first time, another wizard the First Start
Wizard will pop up to help you select an installation medium. Since the VM is
created empty, it would otherwise behave just like a real computer with no operating
system installed: it will do nothing and display an error message that no bootable
operating system was found.
Fig 7.13:- First Run Wizard
For this reason, the wizard helps you select a medium to install an operating system
from.
If you have physical CD or DVD media from which you want to install your guest
operating system (e.g. in the case of a Windows installation CD or DVD), put the
media into your hosts CD or DVD drive.
Then, in the wizards drop-down list of installation media, select Host drive with
the correct drive letter (or, in the case of a Linux host, device file). This will allow
your VM to access the media in your host drive, and you can proceed to install from
there.
If you have downloaded installation media from the Internet in the form of an ISO
image file (most probably in the case of a Linux distribution), you would normally
burn this file to an empty CD or DVD and proceed as just described. With VirtualBox
41
-
8/7/2019 Project Final2 H&F new
42/95
Design and Develop VOIP Dialer and Recording Database
however, you can skip this step and mount the ISO file directly. VirtualBox will then
present this file as a CD or DVD-ROM drive to the virtual machine, much like it does
with virtual hard disk images.
For this case, the wizard
s drop-down list contains a list of installation media that
were previously used with VirtualBox.
If your medium is not in the list (especially if you are using VirtualBox for the
first time), select the small folder icon next to the drop-down list to bring up a
standard file dialog, with which you can pick the image file on your host disks.
Fig 7.14:- Select Installation Media
In both cases, after making the choices in the wizard, you will be able to install your
operating system.
42
-
8/7/2019 Project Final2 H&F new
43/95
Design and Develop VOIP Dialer and Recording Database
Fig 7.15:- Summary First Run Wizard
Press Finish.
CHAPTER 8
8. Elastix
Elastix is an appliance software that integrates the best tools available for
Asterisk-based PBXs into a single, easy-to-use interface. It also adds its own set of
utilities and allows for the creation of third party modules to make it the best software
package available for open source telephony.
The goals of Elastix are reliability, modularity and ease-of-use. These characteristics
added to the strong reporting capabilities make it the best choice for implementing an
Asterisk-based PBX.
The features provided by Elastix are many and varied. Elastix integrates many softwarepackages, each including their own set of great features. However, Elastix adds new
interfaces for control and reporting of its own, to make it a complete package. Some of
the features provided natively by Elastix are:
VIDEO support. You can use videophones with Elastix!
Virtualization support. You can run multiple Elastix virtual machines on the
same box.
43
-
8/7/2019 Project Final2 H&F new
44/95
Design and Develop VOIP Dialer and Recording Database
Really friendly Web user interface.
"Fax to email" for incoming faxes. Also, you can send any digital document to a
fax number through a virtual printer.
Billing interface.
Graphical configuration of network parameters.
Resource usage reporting.
Remote restart/shutdown options.
Incoming/outgoing calls and channel usage reports.
Integrated voicemail module.
Voicemail Web interface.
Integrated operator panel module.
Extra SugarCRM and Calling Card modules included.
Download section with commonly used accessories.
Embedded help interface.
Instant messaging server (Openfire) integrated.
Multi-lingual support. Languages supported include:
o English
o Spanish
o Russian
o Korean
o Greek
o Chinese
o Polish
o German
o French
44
-
8/7/2019 Project Final2 H&F new
45/95
-
8/7/2019 Project Final2 H&F new
46/95
Design and Develop VOIP Dialer and Recording Database
immediately.
You will see it commence a basic start up, load a few drivers and will next stop at the
screen below
Fig 8.2:- Choosing Language
For these and all following screens, you use a combination of the up and down arrows,
the button and the bar. The space bar acts as the button,
moves between the sections (e.g. between selection of the language and the
OK button in the above screen). The bar is also used to toggle the * in
multiple selections.
Select your language using the arrow keys and then press to move to the OK
button. Once the OK is highlighted you can then press .
The following screen will appear
46
-
8/7/2019 Project Final2 H&F new
47/95
Design and Develop VOIP Dialer and Recording Database
Fig 8.3:- Keyboard Type
For most users, the US keyboard will suit, so press to move the highlight to the
OK button and press the bar.
The next screen may or may not come up on your installation, depending on whether
you have a clean Hard Drive with no data or you have a Hard Drive with a partition
already on it. In this case we are working with a new hard drive. The black mark out in
the diagram below may vary from system to system, so I have blanked it out to avoid
confusion.
Fig 8.4:- Warning
In this screen it is telling us that it wants to initialize the drive and erase all data. The
47
-
8/7/2019 Project Final2 H&F new
48/95
Design and Develop VOIP Dialer and Recording Database
YES button is already highlighted, so we proceed by pressing .
Now the next screen needs a little bit of tender care.
Fig 8.5:- Partitioning Type
The reason for this is that the default selections need to be changed, as the defaults have
been set to avoid you accidentally erasing the data on your hard drive
You need to use the arrow keys to move the selection up to REMOVE ALLPARTITIONS as shown in the previous screen. If you have multiple drives in your
system, you need to make sure that it has chosen the correct drive. Now use TAB to
move to the OK button and press the bar.
48
-
8/7/2019 Project Final2 H&F new
49/95
Design and Develop VOIP Dialer and Recording Database
Fig 8.6:- Warning
You need to use the key to select the YES button and press SPACE if you are
sure that there is no useable data on this drive.
Fig 8.7:- Partitioning layout
Again use the key to move the highlight, this time to the NO button. Unless
you are very familiar with Linux Partitioning, then you don't want to review andpossibly change the partitioning, so just take the easy option and select NO.
The next screen allows us to configure the network card on your machine.
Fig 8.8:- Configure Network Interface
49
-
8/7/2019 Project Final2 H&F new
50/95
Design and Develop VOIP Dialer and Recording Database
So just press the bar and the next screen will appear
Fig 8.9:- Ethernet Configuration
This is one of the screens where you need to use the space bar to select your options.
You definitely need to ACTIVATE ON BOOT (otherwise it will not start the Network
Card), and as a minimum select ENABLE lPv4 support. Unless you 100% know what
you are doing, I would leave lPv6 support not enabled.
Press the key to move to highlight the OK button and proceed to the next screen
Fig 8.10:- IPv4 Configuration for Ethernet
50
-
8/7/2019 Project Final2 H&F new
51/95
Design and Develop VOIP Dialer and Recording Database
This is where you set your Network card settings. If you want to use DHCP, then select
DHCP, and the Network card will pick up the settings from your DHCP server on your
network (if you have one). For 99% of systems however, most will be setup with a
STATIC IP (manual) address).
Now to the ok button and press
The following screen will appear
Fig 8.11:- Network Settings
Here you set the Gateway, Primary DNS and Secondary DNS IP addresses. Again you
should know these. On many systems, the Gateway is your router, your primary DNS
server would normally be a DNS Server on your Network (e.g. a Windows or Linux
Server) and as a backup a good option if your router acts as a DNS proxy (most do),
then select your router as the secondary DNS.
Press to get to the OK button and press to move to the next screen.
51
-
8/7/2019 Project Final2 H&F new
52/95
Design and Develop VOIP Dialer and Recording Database
Fig 8.12:- Host Name Configuration
Here you just select Manually (which is the default) and type in a name for your
server. It is not critical what the name is, just something unique to identify your
server on the network. Press to highlight the OK button and press
to move to the next screen.
Fig 8.13:- Time Zone
In this screen we set the time zone. Select the time zone you are in and press to
move to the OK button and press .
The next screen and what you place in here is critical
52
-
8/7/2019 Project Final2 H&F new
53/95
Design and Develop VOIP Dialer and Recording Database
Fig 8.14:- Root Password
This is ROOT password screen and what you enter here needs to be written down. The
number of people who don't write this down, or forget it is, or say that this screen did
not come up is quite bad. The reason for this is that some more password screens come
up as part of the install, and they forget which password is which. The result of losing
this password results in a complete reinstall of the Elastix product, or a lot of technical
reading and understanding of Linux to understand how to reset this password. WRITE
IT DOWN before you enter it in here.
One other word of warning, make sure of the status of your Key,
especially with the use of the key many inadvertently press the
key due their close proximity to each other.
to the OK button and press bar.
You will now witness a variety of screens pop up, which include the formatting
screen, working out dependencies, transferring image, and finally you should see the
Package Installation screen. All these screens will occur without your input. As a
guide, the Package Installation screen should be started within a few minutes of your
last press of the OK button. However, this can vary especially on the formatting
screen if you have a large hard drive.
53
-
8/7/2019 Project Final2 H&F new
54/95
Design and Develop VOIP Dialer and Recording Database
Fig 8.15:- Package Installation
This Package Installation screen will probably run anywhere between 5 - 18 minutes
depending on the speed of your machine / hard disks etc.
When it's finished the system will reboot, hopefully eject the CD (which you can now
and should remove. You will notice on boot up, that the various lines will have a green
OK next to each of them, except that there will probably be a red FAIL next to
WANPIPE. This is ok, don't panic. This will only ever be a OK when you use the
SANGOMA product, and have it configured properly.
The next screen that will pop up will be the password entry screen for MYSQL. Enter
a different password than what you used for the previous ROOT password. Again
WRITE IT DOWN now before you enter it. Check the status to make
sure you are entering it correctly.
54
-
8/7/2019 Project Final2 H&F new
55/95
Design and Develop VOIP Dialer and Recording Database
Fig 8.16:- MySQL Password
The next screen will ask you to confirm the MYSQL password you just entered. Enter it
again
Fig 8.17:- Confirm MySQL Password
It will then run off and perform some password scripts which complete and then come
up with the next screen.
This next screen will now ask you to set the password for the rest of the products
included with Elastix. These products include the Elastix Web Login, Freepbx, Vtiger,
and A2Billing. The user name is automatically admin, so you are just setting the
55
-
8/7/2019 Project Final2 H&F new
56/95
Design and Develop VOIP Dialer and Recording Database
default password here (don't worry they can be changed later within each application).
It is important that they have a decent password from the start. WRITE IT DOWN
before you enter it in here.
Fig 8.18:- Admin Password
The next screen will ask you to confirm it.
Fig 8.19:- Confirm Admin Password
Complete these steps and then you will be rewarded with the following screen
after it has completed its startup scripts.
56
-
8/7/2019 Project Final2 H&F new
57/95
Design and Develop VOIP Dialer and Recording Database
Fig 8.20:- Elastix Login
At this point, your Elastix system is installed. Now you probably want to see the Web
GUI to start exploring your Elastix system. On a separate workstation, in your Internet
Browser (Firefox is the preferred browser) enter the following address into the address
bar: htt p://{YourElastixPrimarvlPAddress} and press enter (e.g. http://172.22.22.40)
You will then see the following screen but don't panic
Fig 8.21:- Elastix Web Interface
57
-
8/7/2019 Project Final2 H&F new
58/95
Design and Develop VOIP Dialer and Recording Database
This has popped up as the Elastix system utilizes SSL for all configuration pages, but
your system does not have a valid SSL Certificate. Depending on your need you can
purchase your own SSL Certificate, so in the meantime, we trust the system we are
communicating with and we need to let the browser know this. Each browser/version
has a different way of handling this, so you need to work out how it works on your
browser.
On Firefox you click on I Understand the Risks and then click on Add Exception and
when the next page shows click on Confirm Security Exception.
At this point, you will now be presented with the main Elastix login page as
shown in the next diagram.
Fig 8.22:- Elastix GUI
Use the admin login and password which hopefully you wrote down for the
Elastix GUI. That's it, now all that is left is to login and start exploring and
configuring.
58
-
8/7/2019 Project Final2 H&F new
59/95
Design and Develop VOIP Dialer and Recording Database
CHAPTER 9
9. WEB Administration Interface
9.1. WEB Configuration
9.1.1 Network Parameters
Go to Network section.
9.1.2 Configuration of telephonic hardware
Go to Port Details.
9.1.3 Creation of new extension
This area is for handsets, softphones, paging systems, or anything else that could
be considered an 'extension' in the classical PBX context.
Defining and editing extensions is probably the most common task performed by a
PBX administrator, and as such, you'll find you'll become very familiar with this page.
There are presently four types of devices supported - SIP, IAX2, ZAP and 'Custom'.
To create a New Extension, go to the PBX menu, which by default goes to the
Configuration PBX section; in this section, choose the option Extensions on the
left panel. Now we can create a new extension.
First, choose the device from among the available options:
Fig 9.1:- Add Extension
Generic SIP Device: SIP is the Standard protocol for VoIP handsets and ATA's.
59
-
8/7/2019 Project Final2 H&F new
60/95
Design and Develop VOIP Dialer and Recording Database
Generic IAX2 Device: IAX is 'Inter Asterisk Protocol', a newer protocol supported by
only a few devices (eg, PA1688 based phones, and the IAXy ATA).
Generic ZAP Device: ZAP is a hardware device connected to your Asterisk machine
- E.g., a TDM400, TE110P
Other (Custom) Device: Custom is a 'catch all', for any non standard device, eg
H323. It can also be used for "mapping" an extension to an "outside" number. For
example, to route extension 211 to 1-800-555-1212, you could create a custom
extension 211 and in the "dial" text box you could enter:
Local/18005551212@outbound-allroutes.
Once the correct device has been chosen, click on Login.
Note: Now we proceed to input the necessary fields (obligatory) to create a new
extension.
Continue to enter the corresponding information:
Fig 9.2:- Add Sip Extension
60
-
8/7/2019 Project Final2 H&F new
61/95
-
8/7/2019 Project Final2 H&F new
62/95
Design and Develop VOIP Dialer and Recording Database
Fig 9.4:- Add Sip Account
Next, let's go to the Audio Codecs section and select all of the available codecs. We
apply the changes and click on the Register button, so that our telephone registers in
the system.
Fig 9.5:- Audio Codecs
Finally, you can make a call from one extension to another.
62
-
8/7/2019 Project Final2 H&F new
63/95
Design and Develop VOIP Dialer and Recording Database
9.1.5 Recording of welcome/greeting message
This section describes how to record a message or activate one that was created
in another medium.
To access this module, go to the PBX menu, where the Configuration PBX
section will appear by default. In the left panel, choose the System Recordings
option.
Fig 9.6:- System Recordings
The first option that we have is to create an announcement by recording it directly. For
this, we will need to enter the extension from which we want to make the recording,
which in this case is extension 201, then we can click on the Go button.
Next, Asterisk will be waiting for our recording at extension 201, and to continue, we
have to punch in *77. After recording our message, press the pound sign (#).
To review our recording, press *99, enter the name of the recording and click on the
Save button.
The second option that we have is to upload a recording that was created in another
medium. For that, we will need to have a file that's supported by Asterisk; click on the
Find button and locate our file. Then, continue to give the recording a name and,
finally, click on the Save button.
63
-
8/7/2019 Project Final2 H&F new
64/95
Design and Develop VOIP Dialer and Recording Database
9.1.6 Configuration of welcome IVR
The IVR allows us to record a welcome message and allows us to have a menu
controlled by the telephone keys (10 number keys, plus the symbols pound '#' and
asterisk '*'). With this, it is possible to send the call to another destination or to the
IVR that sent the announcement.
To access the IVR module, go to the PBX menu, which appears by default in the
Configuration PBX section. In the left panel, choose the IVR option.
Fig 9.7:- Digital Receptionist
To record a welcome or greeting message, go to the System Recordings section, for
example:
IVR: Thank you for calling Elastix. If you know the extension, please dial it now.
Otherwise, stay on the line and an operator will be with you shortly.
64
-
8/7/2019 Project Final2 H&F new
65/95
Design and Develop VOIP Dialer and Recording Database
Fig 9.8:- Edit Menu Digital Receptionist
To add a new IVR, it's not necessary to complete all of the fields, and in our case (a
welcome/greeting IVR), we do not need options. The necessary fields are the
following:
Change Name: To change the name, we'll put Welcome.
Timeout: Waiting time (in seconds) before the call is routed to an operator after the
welcome message is played. For this example, we will use 3.
Enable direct dial: An option that permits the caller to dial an extension directly en
case he or she knows it, without having to wait for the operator.
Announcement: This is the announcement or welcome message that was recorded
earlier. It will appear in a list with all of the available messages.
Now we can proceed to configure certain options that are frequently used. The first is
the option 0 (zero) that allows us to go directly to the operator and the second is also
to go to the operator, but the caller has to listen to the welcome message and wait for
65
-
8/7/2019 Project Final2 H&F new
66/95
Design and Develop VOIP Dialer and Recording Database
the time that was configured earlier to pass.
Among the available options on the menu, in the left part there is a box where you
should put the option. For the first one (zero), we'll put that in the box and assign an
extension that was previously configured; this extension will be the operator.
These extensions will appear after the option Core.
Now we'll proceed to configure the second option (to go to the operator after the
welcome message is played and the waiting time is over). In the box to the left, put the
letter t, which means timeout and we'll assign the operator's extension.
Finally, let's record the IVR.
9.1.7 Fax Configuration
Go to MENU: FAX.
9.2. Reference to available modules
9.2.1. MENU SYSTEM
9.2.1.1 System Info
The option System Info of the Menu System in Elastix lets us monitor the
servers hardware resources. Within this option, we have two sections:
System Resources
System Resource shows us the values of actual use of both the memory as well as
the processor.
Fig 9.9:- System Resource
66
-
8/7/2019 Project Final2 H&F new
67/95
Design and Develop VOIP Dialer and Recording Database
CPU Info Information about brand, model and processor speed
Uptime Time from the last reboot of the server
CPU usage Percentage of use of processor capacity
Memory usage Percentage of RAM memory utilized
Swap usage Percentage of SWAP memory utilized
Here is a graphic with the statistics of simultaneous calls, percentage of use of
processor and percentage of use of RAM memory.
Fig 9.10:- System Resources Graphs
Hard Drives
This section shows a summary of the utilization of storage available on the server.
Fig 9.11:- Hard Drives
9.2.1.2 Network
The option Network of the Menu System in Elastix lets us view and
configure the parameters of the network of the server.
Within this option we have two sections:
67
-
8/7/2019 Project Final2 H&F new
68/95
Design and Develop VOIP Dialer and Recording Database
Network Parameters
Fig 9.12:- Network Parameters
This corresponds to the general network parameters of the server:
Host Server Name, for example: pbx.subdomain.com
Default
GatewayIP Address of the Port of Connection (Default Gateway)
Primary DNS IP Address of the Primary Domain Name Server (DNS)
Secundary
DNS
IP Address of the Secondary or Alternative Domain Name
Server (DNS)
To change any of these parameters, click on the button Edit Network Parameters.
Ethernet Interfaces List
This shows the list of network interfaces available on the server, with the following
data:
Fig 9.13:- Ethernet Interfaces Links
Device Name of the Operating System that is assigned to the Interface
68
-
8/7/2019 Project Final2 H&F new
69/95
Design and Develop VOIP Dialer and Recording Database
Type The type of IP address that the Interface has, which could be
STATIC when the IP address is fixed or DHCP when the IP
address is obtained automatically when the equipment is booted
up. To use the second option, there should be a DHCP server in
the network.
IP IP Address assigned to the Interface
Mask The Network Mask assigned to the Interface
MAC
Address
Physical Address of the network Interface
HW Info Additional information about the network Interface
Status Shows the physical status of the Interface, if its connected or not
To change the parameters of any of the Interfaces, click on the name of the device.
The only values that can be changed are: Type, IP and Mask
Fig 9.14:- Edit Interface
9.2.1.3 User Management
Users
The option Users allows us to create and modify the users who will have
access to the Elastix Web Interface. There are three types or groups of users:
1 Administrator
2 Operator
3 Telephone User
Each of these groups represents distinct levels of access to the Elastix Web Interface.
These levels signify the group of menus to which each type of user has access. The
69
-
8/7/2019 Project Final2 H&F new
70/95
Design and Develop VOIP Dialer and Recording Database
distinct permissions for access to the menus are better illustrated in the following
table:
Menu Administrator
Operato
r Telephone User
Menu: System
System Info Yes Yes No
PBX Configuration Yes No No
Network Yes No No
User Management Yes No No
Shutdown Yes No No
Operator Panel
Flash Operator Panel Yes Yes No
Voicemails
Asterisk Recording
InterfaceYes Yes Yes
Fax
Virtual Fax List Yes Yes No
New Virtual Fax Yes No No
Reports
CDR Report Yes Yes No
Channels Usage Yes Yes No
Billing
Rates Yes No No
Billing Report Yes No No
Destination Distribution Yes No No
Trunk Configuration Yes No No
Extras
70
-
8/7/2019 Project Final2 H&F new
71/95
Design and Develop VOIP Dialer and Recording Database
SugarCRM Yes Yes Yes
Calling Cards Yes Yes Yes
Downloads
Softphones Yes Yes Yes
Fax Utilities Yes Yes Yes
Group Permission
The option Group Permission of the Menu System in Elastix lets us
determine the menus to which each group of users will have access.
The list below shows the names of the Elastix menus; you should select the ones that
each group should have permission to access, and then click the Apply button.
Fig 9.15:- Group Permission
9.2.1.4 Language
71
-
8/7/2019 Project Final2 H&F new
72/95
Design and Develop VOIP Dialer and Recording Database
The option Language of the Menu System in Elastix lets us configure the
language for the Elastix Web Interface.
Fig 9.16:- Language
Select the language from the list and click the Change button.
9.2.1.5 Date and Time Configuration
The option Date and Time Configuration of the Menu System Info in Elastix
lets us configure the Date, Hour and Time zone for the Elastix Web Interface.
Fig 9.17:- Date and Time Configuration
Select the new date, hour and time zone and click on the Apply changes button.
9.2.1.6 Load Module
To upload a new module, click on the Examinar button, select the file and,
finally, click on the Save button.
Fig 9.18:- Load Module
9.2.1.7 Backup
The option Backup of the Menu System Info in Elastix lets us choose the
configurations that we desire to backup Elastix.
72
-
8/7/2019 Project Final2 H&F new
73/95
Design and Develop VOIP Dialer and Recording Database
Fig 9.19:- Backup
To make a Backup of the Elastix configurations, select from the available options, and
click on the Process button.
9.2.1.8 Restore
The option Restore of the Menu System Info in Elastix lets us choose the
configurations to restore Elastix, apart from the aforementioned Backup.
Fig 9.20:- Restore
To restore the Elastix configurations, select from the available options, input the path
of the resto
top related