Presented by Nihar Rao Errabelli & Ravisekhar Lellapalli
›Introduction. ›Objectives of this project. ›Resources Used. ›Conference Call Setup Without Pin Protection. ›Conference Call with Pin Protection. ›Administrative Functions. ›Results. ›Extendibility. ›Conclusion.
›Telephone conferencing is playing a crucial role in the modern world. ›Asterisk server can be used to setup the conference bridge. ›Used MeetMe, MeetMeAdmin and MeetMeCount applications.
›Creating a conference without pin protection. ›Creating multiple conference rooms. ›Setting up pin protection for each conference room. ›Implementing admin functions on the conference. –Muting and unmuting. –Locking and Unlocking. –Kicking out the participants from the conference. –Counting the participants in the conference –Ejecting the last participant from the conference.
›One Virtual Machine with asterisk server loaded. ›Five digium hard phones.
Legitimate Participant 1 Legitimate Participant 2 Legitimate Participant 3 Illegitimate Participant 1 Asterisk Server Conference Room 500
Legitimate Participant 1 Legitimate Participant 2 Legitimate Participant 3 Illegitimate Participant 1 Asterisk Server Conference Room 600 Call Rejected
Asterisk Server Confere nce Room 600 Confere nce Room
Legitimate Participant 1 Legitimate Participant 2 Admin Asterisk Server Conference Room 600 Dial 123 Legitimate Participant 3
Legitimate Participant 1 Legitimate Participant 2 Admin Asterisk Server Conference Room 600 Dial 124 Legitimate Participant 3
Legitimate Participant 1 Legitimate Participant 2 Admin Asterisk Server Conference Room 600 Dial 125 Legitimate Participant 3 This conference is locked
Legitimate Participant 1 Legitimate Participant 2 Admin Asterisk Server Conference Room 600 Dial 126 Legitimate Participant 3
Legitimate Participant 1 Legitimate Participant 2 Admin Asterisk Server Conference Room 600 Dial 127 Legitimate Participant 3 Kicked out
Legitimate Participant 1 Legitimate Participant 2 Admin Asterisk Server Conference Room 600 Dial 128 Legitimate Participant 3 Kicked out
Legitimate Participant 1 Legitimate Participant 2 Admin Asterisk Server Conference Room 600 Dial 129 Legitimate Participant 3 Ejected
Legitimate Participant 1 Legitimate Participant 2 Admin Asterisk Server Conference Room 600 Dial 130 Legitimate Participant 3 No. of participants are 3
›Gathered the logs at asterisk CLI.
›Some other features like recording the conference can be added. ›Wideband audio conferencing. –High quality in voice. –High detailed voice. –Sampling rate is 16khz ›This project can be extended with video conferencing “AppKonference”.
›An effective conference could be created with asterisk. ›Pin protection avoids illegitimate or unauthorized participants. ›Implementation of admin functions are really crucial.
›Retrieved from started/applications/conferencehttp:// started/applications/conference ›Retrieved from html html ›Retrieved from html-chunk/asterisk-APP-B-111.html html-chunk/asterisk-APP-B-111.html ›Retrieved from secure_icon secure_icon ›Retrieved from ›Retrieved from