Download presentation
Presentation is loading. Please wait.
Published byAubrey White Modified over 9 years ago
1
Presented by Nihar Rao Errabelli & Ravisekhar Lellapalli
2
›Introduction. ›Objectives of this project. ›Resources Used. ›Conference Call Setup Without Pin Protection. ›Conference Call with Pin Protection. ›Administrative Functions. ›Results. ›Extendibility. ›Conclusion.
3
›Telephone conferencing is playing a crucial role in the modern world. ›Asterisk server can be used to setup the conference bridge. ›Used MeetMe, MeetMeAdmin and MeetMeCount applications.
4
›Creating a conference without pin protection. ›Creating multiple conference rooms. ›Setting up pin protection for each conference room. ›Implementing admin functions on the conference. –Muting and unmuting. –Locking and Unlocking. –Kicking out the participants from the conference. –Counting the participants in the conference –Ejecting the last participant from the conference.
5
›One Virtual Machine with asterisk server loaded. ›Five digium hard phones.
6
Legitimate Participant 1 Legitimate Participant 2 Legitimate Participant 3 Illegitimate Participant 1 Asterisk Server Conference Room 500
7
Legitimate Participant 1 Legitimate Participant 2 Legitimate Participant 3 Illegitimate Participant 1 Asterisk Server Conference Room 600 Call Rejected
8
Asterisk Server Confere nce Room 600 Confere nce Room 601 12345 67890
9
Legitimate Participant 1 Legitimate Participant 2 Admin Asterisk Server Conference Room 600 Dial 123 Legitimate Participant 3
10
Legitimate Participant 1 Legitimate Participant 2 Admin Asterisk Server Conference Room 600 Dial 124 Legitimate Participant 3
11
Legitimate Participant 1 Legitimate Participant 2 Admin Asterisk Server Conference Room 600 Dial 125 Legitimate Participant 3 This conference is locked
12
Legitimate Participant 1 Legitimate Participant 2 Admin Asterisk Server Conference Room 600 Dial 126 Legitimate Participant 3
13
Legitimate Participant 1 Legitimate Participant 2 Admin Asterisk Server Conference Room 600 Dial 127 Legitimate Participant 3 Kicked out
14
Legitimate Participant 1 Legitimate Participant 2 Admin Asterisk Server Conference Room 600 Dial 128 Legitimate Participant 3 Kicked out
15
Legitimate Participant 1 Legitimate Participant 2 Admin Asterisk Server Conference Room 600 Dial 129 Legitimate Participant 3 Ejected
16
Legitimate Participant 1 Legitimate Participant 2 Admin Asterisk Server Conference Room 600 Dial 130 Legitimate Participant 3 No. of participants are 3
17
›Gathered the logs at asterisk CLI.
19
›Some other features like recording the conference can be added. ›Wideband audio conferencing. –High quality in voice. –High detailed voice. –Sampling rate is 16khz ›This project can be extended with video conferencing “AppKonference”.
20
›An effective conference could be created with asterisk. ›Pin protection avoids illegitimate or unauthorized participants. ›Implementation of admin functions are really crucial.
21
›Retrieved from http://www.asterisk.org/get- started/applications/conferencehttp://www.asterisk.org/get- started/applications/conference ›Retrieved from http://www.asterisk.name/asterisk/0596009623/asterisk-app-b- 111.html http://www.asterisk.name/asterisk/0596009623/asterisk-app-b- 111.html ›Retrieved from http://www.asteriskdocs.org/en/2nd_Edition/asterisk-book- html-chunk/asterisk-APP-B-111.html http://www.asteriskdocs.org/en/2nd_Edition/asterisk-book- html-chunk/asterisk-APP-B-111.html ›Retrieved from https://www.iconfinder.com/icons/60740/lock_locked_privacy_ secure_icon https://www.iconfinder.com/icons/60740/lock_locked_privacy_ secure_icon ›Retrieved from http://www.voipsupply.com/digium-d45http://www.voipsupply.com/digium-d45 ›Retrieved from http://www.tmcnet.com/tmc/videos/default.aspx?vid=3612
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.