Академический Документы
Профессиональный Документы
Культура Документы
Contents
Introduction: ................................................................................................................................ 3
Asterisk: ...................................................................................................................................... 3
Call: ......................................................................................................................................... 5
modules.cnf: .......................................................................................................................... 13
manager.cnf ........................................................................................................................... 13
extensions.cnf: ...................................................................................................................... 13
Sip.conf: ................................................................................................................................ 13
iax.conf: ................................................................................................................................ 13
logger.conf: ........................................................................................................................... 13
rtp.conf: ................................................................................................................................. 13
Conclusion: ............................................................................................................................... 14
List of Figures
Figure 1: SIP based VoIP structure
Figure 2: Asterisk core and its four API; Source: Spencer, 2003
Figure 3: Actual Model for placing voice and video calls using Asterisk Server and PSTN;
Source: Qadeer et al., 2012
Figure 4: Actual model for placing voice and video calls using only the Asterisk Server; Source:
Qadeer et al., 2012.
Introduction:
The literature review is based on exploration of existing literature based on Asterisk, its
application programming interface (API) with the protocols related to voice, text and video in
system and networking environment. In this chapter, Asterisk is being discussed along with
detailed discussion about the features related to asterisk in terms of its services like VoIP (Voice
over internet protocol), ToIP (Text over internet protocol) and voice mails etc. Not only services
but also a brief review of .cnf files and their usage in asterisk is elaborated. An overview of
computer networking & types of networks are given with the discussion on network control and
linkage between asterisk system and networking. Alongside the chapter will help to answer the
core question of the dissertation which is how diverse Asterisk is taking over traditional
telephonic services. After the literature review, methodology of the research will be given which
will highlight and elaborates the steps use in the implementation of Asterisk in network
environment.
Asterisk:
Asterisk is basically a software project, with the help of which the applications of private branch
exchange (PBX) system is possible (Asterisk, 2009). Asterisk, is not a very old technology, its
relatively new and created by Mark Spencer in 1999 and is considered to be the leading product
of Diguim, Inc (Digium®, 2009). The software project Asterisk, is being released to allow dual
software license model. This technology will allow registering licensees either with exclusive
licensed issued by Diguim or with the GNU General Public License (GPL). Since the initiation
of Asterisk, it is remarkably prospered and grown; at the moment it is part of well-known
telephonic structures and gives its support to a range of protocols and technologies. Hardware
support system is very important for Asterisk to get connected with not only standard circuit-
switched telephone networks but also with the standard packet-switch computer networks. This
is the reason that according to Malone, asterisk is not only the most prevalent PBX product but
also the manufacturers claims Asterisk have hold on more than 80% of PBX market (Malone,
2009). The basic software of Asterisk has many features in its PBX system proprieties the main
are voice mail, conference phone calls menu and automatic call distribution. Asterisk is a pioneer
software which facilitates and helps in video, conference and voice calling facility without any
restriction of wired phone (Meggelen, Madsen, & Smith, 2007). It enables the application which
is made in Asterisk environment to communicate through internet. This can be done with the
help of one wired and another wireless technology or both wireless technologies but with the
presence of internet. In simpler words this technology is merging internet and the cellular world
(Camarillo & Garc´ıa-Mart´ın, 2006).
Call:
General example of VoIP call can be given as if one person is calling from personal computers
using software based phone like skype etc. to another computer with the similar type of
configuration of software installed in it.
Call Conferencing:
The conference call is one of the features of PBX which facilitates the user to coordinate with
each other via call. It can be used by all users. Every user has the security password which
ensures the privacy and acts like a conference bridge between users. It is not an complicated and
long procedure to enter in the conference call its as simple as dialing an extension from your
phone (Qadeer & Imran, 2008). The feature has many advantages one of them is that it facilitates
the user to do conference call with native codec streaming instead of any zaptel hardware i.e. no
restriction of downsampling. The above mentioned advantages increase the popularity of VoIP
based conferencing.
Voice Mail:
Voice mail is also possible using VoIP. Taking the example of Skype, if any particular person is
using Skype as an VoIP software, voice mail facility enables them to not only call but also left a
voice message if the other person which is using the same configuration of software. The VoIP
allows listening, sending, deleting and forwarding the particular message (Imran & Qadeer,
2009)
H.323 Protocol:
Video conferencing is another major tool and application which can be utilized by Asterisk.
H.323 Protocol is the International Telecommunication Union (ITU) protocol which was initially
developed to support the IP transportation science for video conferencing (Al-Sadoon, 2009). It
is like a cherry for cake as it tends to add video and voice at the same time.
Both the protocols, (SIP and H.323) have similar features and methodologies and both protocols
use standardized signaling protocols and offers services like video calls, call hole, records and
transfer.
Figure 2: Asterisk core and its four API; Source: Spencer, 2003
Figure 3: Actual Model for placing voice and video calls using Asterisk Server and PSTN;
Source: Qadeer et al., 2012
Figure 4: Actual model for placing voice and video calls using only the Asterisk Server; Source:
Qadeer et al., 2012
This model looks quite simple and elaborates that using simple Asterisk based module and it is
clearly depicted by Qadeer and his team. In the end, they concluded that this model is not only
successfully implemented in university campus for an experimental basis but also it can be used
and applicable in any organization which is connected over the internet. Not only this but using
both wired LAN and wireless LAN is also a reliable source of communication in any
environment whether its work or educational. Alongside they also highlight that Asterisk is
protected and have a reliable privacy which is dependable and can be used in daily lives.
asterisk.conf:
The files with an extension of .cnf and named as asterisk represents the location of the spool,
configuration files and the modules alongside the address to write the log files. It is highly
suggested that one should use the default file location. It can be said that I make the home for
specific files in the directory and help is boot options of the server.
modules.cnf:
The module files with .cnf extension controls and specifies the specific module file which should
or shouldn't be loaded on the start up. The file contains one section of modules for the loading
purpose during the start up.
manager.cnf
In Asterisk, there is a specific manager interface and the files for the configuration of manager
interface are contained in this extension.
extensions.cnf:
The asterisk’s dialplan details are contained in this file.
Sip.conf:
This file is the configuration of the SIP protocol. Endpoint authentication like the source and
service providers is also been configured using these files. Alongside, the decision making
process for the determination of willingness to accept or reject call and decision of which call
should go in dial plan is done by this file.
iax.conf:
It also works like sip.conf and determines IAX@ protocol configuration.
logger.conf:
In this file, log files are organized, it supports the identification and clarification of the specific
files which are generated and the level of log messages are mentioned on each file of Asterisk.
rtp.conf:
this file coordinates with the ports of RTP i.e. real time transport protocol which is used by
Asterisk for the generation and receiving of RTP traffic. The number of protocols uses RTP
protocols for the transportation of media between endpoints. The protocols which use RTP are
SIP, H.323, MGCP etc.
Conclusion:
Asterisk is a network based application which is the need of modern era. In this literature, it is
attempted to explore all the features which are related to Asterisk i.e. its environment, protocols,
extensions. After the keen exploration of literature, it can be concluded that asterisk is the future.
Time is near when asterisk will replace telephonic lines and traditional means of
communications while looking at the daily routines and personal way of living it can't be wrong
to say that technological and wireless communication software which are developed by Asterisk
are slowly creeping in our lives. There are many reasons for this invasion. One is that the VoIP
protocol reduces the cost of communication as compared to normal telephones (Al-Sadoon,
2009). Secondly, VoIP server which is obviously Asterisk is server controlled, no one can invade
inside without permission. There are proper security measures and the session is in the hands of
server its call, conference call or any text message. Also, it has a verity of protocols like SIP and
H.323 which ensures free messages, calls, and video calls too. So it is quite clear that there is no
doubt in it that Asterisk is the future of telephony. In this project, implementation of Asterisk in a
network environment will be done to ensure that the selected sample space also gives their
feedback on this technology, aiming that this thesis will also contribute in literature in best ways.
Research Gap:
During the research, quite a few gaps are found. Asterisk is reliable and successful software
which is being used by the developers and the applications are implemented all over the world.
Although it has practical usage but the publish literature is quiet similar and there are very less
research papers in this field. There is need of published material in the field of integration of
networking with asterisk along with the configuration files elaboration and detailed knowledge
about the applications which are coupled with networking and Asterisk.
Bibliography
Abbasi, T. P. (2005). A comparative study of the SIP & IAX voice protocols. CCECE/CCGEI.
Saskatoon.
Abbasi, T., Prasad, S., Seddigh, N., & Lambadaris, I. (2005). A comparative study of the SIP &
IAX voice protocols. . CCECE/CCGEI. Saskatoon.
ADT. (2009). Security Asterisk Reference Information Version 1.6.1.0. Retrieved November 30,
2018, from Asterisk Development Team:
http://svn.digium.com/svn/asterisk/tags/1.6.1.0/doc/tex/security.tex
Alam, Z. M., Bose, S., Rahman, M. D., & Al-Mumin, A. M. (2007). Small office PBX using
Voice over IP. ICACT.
Al-Sadoon, G. M. (2009). Asterisk open source to implement voice over internet Protocol.
International Journal of Computer Science and Network Security, 9(6).
Asterisk. (2009). Aesterisk. Retrieved November 30, 2018, from The Open Source PBX &
Telephony Platform: http://www.asterisk.org/.
Camarillo, G., & Garc´ıa-Mart´ın, A. M. (2006). The 3G IP Multimedia Subsystem (IMS) :
Merging The Internet And The Cellular Worlds, (2nd ed.). . Chichester, Engliand: Wiley
& Sons.
Digium®. (2009). Digium®. Retrieved November 30, 2018, from The Asterisk Company:
http://www.digium.com
Halsal, F. (2006). Computer Networking and the Internet (5th ed.). Addison Wesley.
Hellström, G. (2005). IETF RFC 4103: RTP Payload for Text Conversation. The internet
Society.
Hellström, G. (2006). IETF RFC 4351: Real-Time Transport Protocol (RTP) Payload for Text
Conversation Interleaved in an Audio Stream. the Internet Society.
Hitchcock, J. (2006). Decorating Asterisk: Experiments in Service Creation for a Multi-Protocol
Telephony Environment UsingOpen Source Tools. Rhodes University.
Horn, F. J. (2005). IPSec-based dynamic security services for the MYSEA environment. MSc
Thesis. Monterey, California: , Naval Postgraduate School.
Imran, A., & Qadeer, M. A. (2009). Conferencing, Paging, Voice Mailing via Asterisk EPBX.
International Conference on Computer Engineering and Technology, 978-0-7695-3521-
0/09.
J, G., & Jivica. (2008). 4G : Functionalities Development and an Analysis of Mobile Wireless
Grid. . Proceeding of First International Conference on Emerging Trends in Engineering
and Technology, (pp. 270-275).
Malone, J. (2009, January 28). Open source PBX is 18% of North America market. Retrieved
November 30, 2018, from No Jitter:
http://www.nojitter.com/showArticle.jhtml?articleID=212903167
Mao, F. N., Talevskit, A., & Chang, E. (2007). Voice over internet protocol on mobile devices.
6th IEEE/ACIS International Conference on Computer and Information Science (ICIS).
Martín, S. G. (2009). Contribution to Asterisk Open Source Project. Universitat Oberta de
Catalunya (UOC).
Meggelen, V. J., Madsen, L., & Smith, J. (2007). Asterisk.the Future of Telephony. Second
Edition. (2nd ed.). 1005 Gravenstein Highway North, Sebastopol, CA: reilly Media, Inc.
Olejniczak, S. P. (2009). VoIP Deployment for Dummies. John Wiley & Sons.
Qadeer, A. M., & Imran, A. (2008). Asterisk Voice Exchange-An alternative to conventional
EPBX. Proceeding of IEEE. ICCEE.
Qadeer, M. A., Shah, K., & Goel, U. (2012). Voice - Video Communication on Mobile Phones
and PCs’ using Asterisk EPBX. International Conference on Communication Systems
and Network Technologies.
Rosenberg, J. (2002). SIP: session initiation protocol. Retrieved November 29, 2018, from RFC
3261, Internet Engineering Task Force.: http://www.rfc-editor.org/rfc/rfc3261.txt.
Solarwindz. (2011, 03 22). My Asterisk Voip Pbx Config Files. Retrieved November 30, 2018,
from Baidu: https://wenku.baidu.com/view/b0b186ff910ef12d2af9e730.html
Spencer, M. (2003). The Asterisk Handbook. Retrieved November 29, 2018, from Diguim:
www.digium.com
Spencer, M. (2008.). The Asterisk(R) open source PBX, README for Asterisk 1.6.1.0. Retrieved
from SVN: http://svn.digium.com/svn/asterisk/tags/1.6.1.0/README.
Voip. (2018). Asterisk config files. Retrieved November 29, 2018, from voip-info.org:
https://www.voip-info.org/asterisk-config-files/
Wu, L., & Aasgaard, H. L. (2006). Migration of VOIP/SIP Enterprise Solutions towards IMS.
Masters Thesis. Agder University College.