Diseno e Implemepletacion Voip
Diseno e Implemepletacion Voip
Diseno e Implemepletacion Voip
BY
MICHAEL AYISI.
(B080311004)
i
Project Report
On
Submitted by
MICHAEL AYISI.
Bachelor of Science
In
(ICT)
Affiliated to
November 2015
©2015
ii
DECLARATION
I hereby declare that the work submitted in this research is the results of my own designed
work and investigation, except where otherwise stated. It has not already been accepted for
any degree, and is not being currently submitted for any degree.
However, all aspects of this study have been discussed with and approved by my supervisor.
(B080311004)
Certified by
Supervisor
Certified by
Head of Department
i
DEDICATION
This work is dedicated to Almighty God for the knowledge, strength and ability he imparted
To my lovely Mom and Dad (Mr. and Mrs Ayisi) and my two sisters for their care throughout
my study. And to the Lecturers at the department I say thank you for your support. May the
ii
ACKNOWLEDGEMENT
I would like to take this opportunity to thank the Almighty God for his faithfulness. I would
as well like to take this chance to express my sincere gratitude to my well respected project
supervisor in the person of Mr. Collinson Agbesi for his meticulous and expert guidance,
constructive criticism, patient hearing and benevolent behaviour throughout my ordeal of the
present research.
I shall remain grateful to him for his cordial, cooperative attitude, wise and knowledgeable
I will also take this opportunity to express a deep sense of gratitude to our project coordinator
Mr. Isaac Afoakwa for his cordial support, valuable suggestions and guidance. I extend my
sincere thanks to our respected Head of department Bishop Emmanuel Anim Yeboah, for
It however, not possible for me to forget the kind of help provided by the faculty members,
Madam Sally Ann, Mr. Kofi Sarpong, Mr.Frank K. Banaseka, Mr. Stephen Dotse and Mr.
Emmanuel Sam. I also convey my thanks to IT Department Staff for extending their support
Finally, I am indebted to all those who in various ways helped to make this research work a
success.
iii
Table of Contents
DECLARATION ..........................................................................................................................................i
DEDICATION ............................................................................................................................................ ii
ACKNOWLEDGEMENT ............................................................................................................................ iii
Table of Contents ................................................................................................................................... iv
List of Tables ........................................................................................................................................ viii
ABSTRACT............................................................................................................................................... ix
1 CHAPTER ONE ..................................................................................................... 1
1.1 Introduction .............................................................................................................1
1.2 Background of Study ................................................................................................1
1.3 Problem Statement ..................................................................................................3
1.4 Study Objectives ......................................................................................................4
1.4.1 Global Objectives ..............................................................................................4
1.4.2 Specific Objectives ............................................................................................4
1.5 Significance of Study ................................................................................................5
1.6 Scope and Limitation of Study .................................................................................7
1.6.1 Scope ................................................................................................................7
1.6.2 Limitations ........................................................................................................7
1.7 Research Methodology ............................................................................................8
1.8 Organization of Study ..............................................................................................9
2 CHAPTER TWO .................................................................................................. 10
2.1 Literature Review ...................................................................................................10
2.2 History of Telephony ..............................................................................................11
2.3 Data Networks .......................................................................................................12
2.4 Voice over Internet Protocol (VoIP) .......................................................................12
2.5 VoIP components ...................................................................................................14
2.5.1 VoIP Protocols.................................................................................................16
2.5.2 Real-Time Protocol (RTP) ................................................................................17
2.5.3 Session Initiation Protocol (SIP) ......................................................................18
2.6 Review of existing system(s): .................................................................................23
2.6.1 3CX adoption by university of North Carolina ................................................24
2.6.2 Problems with this system..............................................................................25
2.7 Existing System ......................................................................................................26
2.7.1 Components of Existing System .....................................................................28
2.7.2 Process of the System.....................................................................................29
2.7.3 Problems of the Existing System ....................................................................30
3 CHAPTER THREE ................................................................................................ 31
iv
3.1 Proposed System ................................................................................................... 31
3.2 Introduction to Hardware Implementation .......................................................... 32
3.3 Development Tools and technologies used .......................................................... 32
3.3.1 Hardware ........................................................................................................ 32
3.3.2 Software ......................................................................................................... 35
3.4 Quality of Services (QoS) ....................................................................................... 35
3.4.1 QoS requirements for Voice application ........................................................ 37
3.5 Preparation Phase ................................................................................................. 37
3.5.1 Bandwidth ...................................................................................................... 37
3.5.2 Network architecture ..................................................................................... 38
3.5.3 Soft switch ...................................................................................................... 38
3.5.4 Connection ..................................................................................................... 42
3.5.5 Soft phones .................................................................................................... 42
3.5.6 3CX Phone Soft Phone .................................................................................... 43
3.5.7 Zoiper Soft Phone ........................................................................................... 44
3.5.8 Grand Stream HT 502 ATA ............................................................................. 45
4 CHAPTER FOUR................................................................................................. 46
4.1 Implementation and testing of the proposed system. .......................................... 46
4.1.1 Download and Installation of Ubuntu 14.04 LTS Server. ............................... 47
4.1.2 Download and Installation of Certified Asterisk 11.7.1 LTS (long term support).
49
4.2 Integration of Hardware ........................................................................................ 51
4.3 Implementing the features of Asterisk Server ...................................................... 52
4.3.1 Voice Call ........................................................................................................ 52
4.3.2 Voice mail ....................................................................................................... 54
4.4 Configuration ......................................................................................................... 55
4.4.1 Configuring LAN-VoIP user ............................................................................. 55
4.4.2 Configuration of E1200 Router ...................................................................... 56
4.4.3 Configuration of 3CX ...................................................................................... 57
4.4.5 Configuration of IP Telephone ....................................................................... 59
4.4.6 IVR (Interactive Voice Response) ................................................................... 61
4.5 Testing of RUC VoIP System .................................................................................. 62
4.6 Verification of VoIP metrics ................................................................................... 64
4.6.1 Security Issues ................................................................................................ 66
4.6.2 Change user main password and root default password .............................. 66
4.6.3 Avoiding SIP authentication requests from all IP addresses .......................... 67
4.6.4 Wireless phones require advanced wireless security .................................... 67
v
4.6.5 Physical security .............................................................................................67
5 CHAPTER FIVE ................................................................................................... 68
Conclusion and Recommendations ................................................................................. 68
5.1 Conclusion ..............................................................................................................68
5.1.1 Server Capacity ...............................................................................................69
5.1.2 User Capacity ..................................................................................................69
5.2 Future Recommendations .....................................................................................69
REFERENCES ................................................................................................................... 71
APPENDIX....................................................................................................................... 74
vi
List of Figures
Figure 2.4 SIP Distribution Architecture (Butt Muhammad Faisal Nazir, 2006). .....................18
Figure 3.6 represents the Zoiper Dial pad interface and Logo respectively. ...........................44
Figure 4.2 Creating a Virtual Machine for Ubuntu 64bit Server using Virtual Box. .................47
vii
Figure 4.8 Integrating HT502 ...................................................................................................51
Figure 4.19 Incoming Call from Accounts Office <2001> to Registry <2000> .........................63
Figure 4.20 Call established between the Registry Department and the Account Office.......64
Figure 4.21 Wireshark screenshot when RTP packets are filtered ..........................................65
Figure 4.22 Delay and jitter Vs packet sequence when only voice is transmitted ..................66
List of Tables
Table 2.1 VoIP Advantages and Disadvantages ..................................................................13
viii
ABSTRACT
This study entails the simulation and implementation of voice over a data network, a telephony
system using an IP PBX solution. A technology called voice over Internet Protocol (VoIP), or
Internet telephony means that voice is carried over an IP network. Voice, which is an analogue
signal, is converted to digital data, which is then disassembled and transmitted through a network
only to be reconverted back to an analogue signal on the other end using a Linux based IP-PBX
solution called Asterisk. This service can be properly managed and deployed over a network with
less stress and expenses. The IP PBX main server also has integrated in it other communication
services such as Voice mails, IVR’s, all embedded in the IP PBX SYSTEM.
This technology promises an evolutionary leap beyond the standard telephone service we
have been accustomed to, as well as a host of benefits. The new technology transmits voice
signals the same way email is sent, using the Internet’s data-transfer protocols to break
conversations into digital packets that can be sent on lower-cost, more efficient “packet-
switched” networks. This project was able to address the persistent communication problem
which existed in the departments by allowing users to communicate with the services the
Target market includes: Corporate organizations, Universities, Health care, Airports, Hotels,
Banks etc. This project is economic, cost effective, gives full control to the administrator and
provides mobility, feasible, Peer-to-Peer phone calls. The contents of IP PBX System,
supplemented by a good number of necessary and descriptive drawings which makes this
ix
1 CHAPTER ONE
1.1 Introduction
Voice over Data Networks is to transmit voice over Packet Switched Data Networks by
converting it into packets while keeping reliability and voice quality as in circuit switched
telephone networks, and gaining cost savings (L. Sun, 2004). In fact, the convergence of
voice and data networks is rapidly gaining grounds across the globe. The traditional
workplace is evolving; the way in which businesses communicate today is different than it
was in the past and yet is likely to change again in the future. Organizations are seeking
separate networks – voice, data, and mobile, yet most of the time these networks never
interact. The ability to link business application from various networks with communications
technology uses the Internet Protocol (IP) to transport voice signals over a data network.
Instead of using the conventional analogue voice signal (sine wave signal), human speech is
converted into a digital signal (1s and 0s) just like the data packets that travel through the
data network. Evolutionary? Yes. But IP telephony is more revolutionary than evolutionary
1
Data networks (accept occasional failures; subject to rapid change; need a lot of
bandwidth).
A solution that merges these two worlds must simultaneously offer reliability, cost
effectiveness, a high data rate and the ability to evolve quickly. A solution that takes into
account these seemingly incompatible needs are readily needed. The pros and cons of IP
telephony versus “classic” telephony have been debated in many papers and will not be
I want to focus on the impact Internet Protocol (IP) telephony solution will have on the
existing data network at Radford University College. This is helpful because transferring
voice calls over data networks can save 75% or more compared to traditional telephone
service. (Frost & Sullivan, 2007). With a detailed network infrastructure in place, it would not
cost much to make calls through this existing data networks to reach telephones internally
using existing telephone systems and methods of calling. Calls to a host not directly
connected to the network can be made possible through the use of a gateways that connects a
voice call to a public telephone network and allows for direct communications to future
“Embarking on an initiative to provide telephony and other voice related services over the
campus data network is piloting an open source solution (Asterisk by Degium) that provides
cost-effective high function enhanced media services, such as departmental voice systems,
voice mails, automatic call distribution, and IVRs”. (Deke Kasabian, 2005)
Students and staffs will have access to this solution and use different services such that they can
make voice calls, and use different features like voicemail, call group, queuing, interactive voice
responses and conference calls are features that a configured Asterisk server can offer.
2
This solution will fundamentally transform the way in which students and the university
administration communicate – from decreased carrier costs to increased response times, thus
Academic institutions like Radford University College are often challenged by the high cost
and lack of flexibility of ordinary telephone systems. Often, there are many communication
costs related to the management and implementations of programs for academic institutions.
Due to the global financial crises, these costs become an additional burden on the already
overstretched budgets.
Radford University College currently has a large campus wide data network, spanning
approximately 6 floors, and comprising of approximately 100 wired network ports, 7 CCTV
It’s rather unfortunate with such a detailed network infrastructure; there is no voice network.
The university employs the services of various telephone service providers e.g.: MTN,
Vodafone etc. In fact the issue of making calls internally through these service providers
imposes a high monthly cost. The current system at Radford University leaves little or no
The modern student is increasingly technology savvy, the Pew Research Centre findings as at
October 2014 states “65% of those between 18 and 24 own a smartphone and 23% have a
tablet. As such, these young people want campus administrators to further use tools like
unified communications (UC) solutions that cater for their digital demands”.
Therefore the aim of this project is to develop a communication technology to interconnect those
hosts that are in the various departments at Radford University. This solution will permit
3
the university’s IT department to deliver free telephone calls, voicemail, ring groups, call
transfer, conferencing, IVR and other telephony services to both students and staffs internally.
communication system that implements voice over a data network. It examines and integrates
different components that constitute an IP Telephony solution. A big part of the project is to
To develop an operational IP telephony solution for Radford University College, based on
a software implementation of a telephone Public Branch Exchange (PBX) running
a Linux distribution server Asterisk on the University’s data network.
Installation and
configuration of an operational Linux server based on Asterisk using
SIP Protocol.
Design a VoIP network to be utilized by the above server in which hosts can call each
other with softphones, IP phones and also offering features such as voicemail and
Interactive voice Response (IVR).
4
1.5 Significance of Study
communications requirement, ranging from a simple inter office intercom to a complex multi-
The first measure of success for IP telephony is the cost savings for long distance calls. Today
flat rate long-distance pricing is available with the Internet and can result in considerable savings
for both voice and fax. Large organizations with offices around the world save even more on
long-distance calls by using local Internet gateways. IP telephony provides a competitive threat to
providers of traditional telephone services that will clearly stimulate improvements in cost and
Scalable
Proprietary systems are easy to outgrow. Adding more phone lines or extensions often
requires expensive hardware modules. In some cases you need an entirely new phone system.
Not so with an IP PBX. A standard computer can easily handle a large number of phone lines
and extension, just add more phones to your network to expand! This solution is integrated
different communication devices like soft phone, IP phones and even hard phones.
Network Efficiency
The sharing of equipment and operations costs across both data and voice users can also improve
network efficiency since a packet switched IP network can handle more calls with the same
transmission infrastructure than the PSTN can with its circuit switched TDM approach.
5
Integration
Universal use of the IP protocols for both data and voice applications holds out the promise
of reduced complexity and more flexibility. This provides an opportunity to share facilities
such as directory services and security services, and eliminate points of failure.
Advanced Applications
In addition to basic telephony and fax, the long-term benefits are expected to be derived from
multimedia and point of-service applications such as directory services that enable conference
calls to be set up from Web based directories, and wireless unified messaging, which will let
users retrieve their voice and e-mail messages via their cellular phones. Combining voice and
data features into new applications will also provide the greatest returns over the longer term.
Better customer service & productivity!
With an IP PBX you can deliver better customer service and better productivity. Since the IP
telephone system is now computer-based, you can integrate phone functions with business
applications. For example, bring up the customer record of the caller automatically when you
receive his/her call, dramatically improving customer service and cutting cost by reducing time.
Eliminate vendor lock in
IP PBXs are based on the open SIP standard. You can mix and match any SIP hardware or
software phone with any SIP-based IP PBX or PSTN Gateway. In contrast, a proprietary
phone system often requires proprietary phones to use advanced features, and proprietary
6
1.6 Scope and Limitation of Study
1.6.1 Scope
The research highlights converged networks with Radford University’s existing data network.
traditional phones.
Design of a system offering voicemail and Interactive voice Response (IVR).
1.6.2 Limitations
There are still considerable technical challenges and limitation in implementing Voice over
Wi-Fi, including concerns about security, battery life in wireless handsets and call quality.
Wireless networks allocate bandwidth according to which devices are nearest to the WLAN
access points, which can cause problems for voice call quality although some suppliers are
developing systems that allocate bandwidth equally from the access points and can prioritize
7
1.7 Research Methodology
The methodology used in this study is the cisco lifecycle approach to network design and
implementation. PPDIOO stands for Prepare, Plan, Design, Implement, Operate, and Optimize.
PPDIOO is a Cisco methodology that defines the continuous life cycle of services required for a
network (Stephen J. Occhiogrossp, 2011). The network lifecycle approach provides several key
benefits aside from keeping the design process organized. These benefits includes:
It lowers the total cost of ownership by validating technology requirements
and
planning for infrastructure changes and resource requirements.
It increases network availability by producing a sound network design and validating
the network operation and improves business agility by establishing business
requirements and technology strategies.
It speeds access to applications and services
by improving availability, reliability,
security, scalability, and performance.
approach is used, which begins with the organization’s requirements before looking at
technologies. Network designs are tested and simulated a pilot or prototype network before
The first chapter provides for the General Introduction to the project; it includes the
background of Voice over Internet protocol technology, problem definition, objectives, scope
The second chapter presents the overview of Internet Telephony. Also, there are literature
The third chapter provides detailed description of the proposed system. It explains the
requirements and specifications as well as the design of the new system, it also contain the
The fourth chapter details the implementation, coding, documentation and the testing of the
proposed system.
9
2 CHAPTER TWO
Internet Protocol Telephony (IP Telephony) is the term commonly used to define the
transmission of phone calls over any data network that uses IP, like Internet, Intranets and
wired or wireless Local Area Networks (LAN). This is regardless of whether traditional
telephony equipment, computers and/or dedicated terminals take part in the calls and even if
the phone calls are totally or partially transmitted over the Internet. IP Telephony is, without
doubt, one of the technological developments that are being rapidly adopted by companies
nowadays. One of the main reasons of this quick migration to Internet Telephony is that it
makes the integration of all means of communication, communication devices and media
much easier. This way users can be in touch with anyone, wherever they are, and in real time.
In short, IP Telephony allows for Unified communications to become part of the business
environment, helping companies save money and boost employee performance. Internet
protocol IP Telephony’s history is in its very early stages. It all started only a few years ago,
in 1995, when Vocal Tec launched their first Internet telephone. Before that, IP Telephony
was a field that attracted the interest of researchers; but since voice communication over the
Internet has been proved to be not only possible but also commercially viable, many are the
companies that have entered the VoIP (voice over internet protocol) Telephony market trying
The type of equipment used in making and receiving a phone call classifies IP Telephony
usage set-ups or scenarios. The call can be initiated or terminated either by a PSTN (Public
Switched Telephone Network) device or a computer (PC or laptop) on each side of the call.
10
2.2 History of Telephony
The first voice transmission, sent by Alexander Graham Bell, was accomplished on 10th
voice transmission. Moving the voices across the wire requires a carbon microphone, a
battery, an electromagnet, and an iron diaphragm and a physical cable between each location
Since the invention of Graham, the structure of Public line telephone network has changed
significantly. In the following paragraphs we focus on telephony network and the PBX that
traditional telephone systems run on. The acronym PSTN stands for Public Switched
Telephone Network. PSTN is the network that traditional phone systems used and was
generally controlled by the telecommunication companies. This is the network our calls are
travelling over when we pick up our handset and dial a number. This network spans the world
POTS stand for Plain Old Telephone Service. It is commonly used for residential use.
POTS is an analogue system and is controlled by electrical loops.
ISDN (Integrated Services Digital Network): This is a faster and more feature-filled
connection (also more expensive). This gained some popularity within small to
11
medium-sized businesses as a cost-effective way of connecting to the PSTN and
getting some advanced services, like many lines to one office or voice and data lines
on one service. ISDN is a digital service and offers a few more features over POTS
T1/E1 is a digital service used for high-volume data and voice networks and offers yet
more features than ISDN, the most important feature being increased bandwidth that
translates, in telephony, to more telephone lines (Kerry Garrison, 2006).
Data Networks can be classified according to coverage area or by the protocol used to
transfer data via them. By the first classification, data networks can be Wide Area Networks
(WANs) that cover a large area and distant computers or Metropolitan Area Networks
(MANs) which covers a country for example or Local Area Networks (LANs) which connect
An IP network is based on the "best effort" principle which means that the network makes no
guarantees about packet loss rates, delays and jitter. For voice traffic, the perceived voice
quality will suffer from these impairments (e.g. loss, jitter and delay). I will focus on
Voice over Internet Protocol (VoIP) is one of the most important technologies in the world of
communication. VoIP is simply a way to make phone calls through the internet. In other words,
VoIP transmits packet via packet-switched based network in which voice packets may take the
most efficient path. On the other hand, the traditional public switched telephone network
12
(PSTN) is a circuit-switched based network which requires a dedicated line for
Furthermore, Internet was initially considered to transmit data traffic and it is performing this
task really well. However, Internet is best effort network and therefore it is not sufficient
In addition, there are about 1 billion fixed telephone lines and 2 billion cell phones in the world
that use PSTN systems. In the near future, they will move to networks that are based on open
protocols known as VoIP (V. Mockapetris, 2006). That can be seen from the increasing number
of VoIP users, for instance there are more than eighty million subscribers of Skype; a very
popular VoIP commercial application (K. Dileep, A. Saleem and R. Yeonseung, 2008). VoIP has
gained popularity due to the more advantages it offers than PSTN systems especially that voice is
transmitted in digital form which enables VoIP to provide more features. However, VoIP still
suffer few drawbacks which user should consider when deploying VoIP system.
Advantages Disadvantages
Low cost Users cannot make calls during power
Flexibility. outages.
Provides voice mail and call forwarding. Connection limitation to emergency
Easy to implement and install services.
Free services gained usually when Depends on Internet connection condition.
connecting from PC to PC (G. Samrat, B. IP network that does not guarantee Quality
Sudeept, 2008) of Service for voice communication (J.M.
Network Capacity utilization Lozano-Gendreau, A.Z. Halabi, M.
Users can make VoIP calls from anywhere Choueiri and V. Besong, 2006).
for long distance or international calls.
Integration with other available services
over the Internet.
13
Basically, VoIP system can be configured in these connection modes respectively; PC to PC,
telephony can be digital type or analogue type. In case of analogue phone, it would be connected
to the system via adapters which convert the analogue signals into digital format.
Next, packetization process is performed which fragment encoded voice into equal size of
packets. Furthermore, in each packet, some protocol headers from different layers are attached to
the encoded voice. Protocols headers added to voice packets are of Real-time Transport Protocol
(RTP), User Datagram Protocol (UDP), and Internet Protocol (IP) as well as data link layer
header. In addition, RTP and Real-Time Control Protocol (RTCP) were designed at the
application layer to support real-time applications. Although TCP transport protocol is commonly
used in the internet, UDP protocol is preferred in VoIP and other delay-sensitive real-time
applications. TCP protocol is suitable for less delay sensitive data packets and not for delay-
sensitive packets due to the acknowledgement (ACK) scheme that TCP applies.
This scheme introduces delay as receiver has to notify the sender for each received packet by
sending an ACK. On the other hand, UDP does not apply this scheme and thus, it is more
suitable for VoIP applications.
The packets are then sent out over IP network to its destination where the reverse process of
decoding and DE packetizing of the received packets is carried out. During the transmission
process, time variations of packets delivery (jitter) may occur. Hence, a playout buffer is used
at the receiver end to smoothen the playout by mitigating the incurred jitter. Packets are
queued at the playout buffer for a playout time before being played. However, packets
arriving later than the playout time are discarded. The principle components of a VoIP
system, which covers the end-to-end transmission of voice, are illustrated in Figure 2.2.
Besides, there are signalling protocols of VoIP namely Session Initiation Protocol (SIP) and
H.323. These signalling protocols are required at the very beginning to establish VoIP calls
and at the end to close the media streams between the clients (R. P. Swale, 2001). H.323 was
standardized by ITU-T specifically to smoothly work together with PSTN while SIP was
standardized by Internet engineering task force (IETF) to support internet applications such
as telephony.
15
In figure 2.3, VoIP protocol stack is illustrated. Furthermore, in IP networks, IP addresses
can be changed from one session to another, especially in dial-up case. Therefore, there is a
need for a common meeting point shared among users to enable them finding each other at
the establishment stage of communication. This common meeting point is generically known
as a call server.
Voice over IP (VoIP) is the transmission of voice over network using the Internet Protocol.
Here, I will introduce briefly be outlined the various VoIP Protocols that aided my project.
The Protocols that provide basic transport (RTP), call-setup signalling (H.323, SIP was used)
16
2.5.2 Real-Time Protocol (RTP)
The Real-time Transport Protocol (RTP) is a network protocol for delivering audio and video
over IP networks. RTP is used extensively in communication and entertainment systems that
services and web-based push-to-talk features. This protocol is a user session protocol which
relies on User Datagram Protocol (UDP), hence, make use of the checksums and
multiplexing services to allow data handling for programs in real time unicast or multicast
transmissions. RTP does not in itself guarantee real-time delivering of multimedia data. The
tool that RTP uses to achieve real time transmissions is the Real Time Control Protocol
(RTCP), which provides a feedback about some control information. With this, it is possible
to monitor the quality of the transmission and also possible to diagnose network problems.
RTP consists of four main fields; the detail of these fields is described below (Butt
RTP Payload type Indicates the specific media encoding and which codec to use. The codec
conveys the type of the data (such as voice, audio or video) and how it is encoded. It can be
changed if it has to adapt the variation in bandwidth, frame indication, which marks the
Sequence number helps the receiving end to reassemble the data and detect lost, out-of-
Time Stamp: It is used to reconstruct the timing of the original audio and video. It also helps
the receiving side determine variations in packet arrival times, known as jitter. It is the time
17
stamp that brings real value to RTP. At the receiving node each packet is compared with a
Source id: It is used to distinguish among multiple, incoming streams by the software at the
receiving side.
In this project work, RTP is used as voice streaming protocol to send real-time traffic.
To place a call on the data network, VoIP involves two types of protocol; call setup protocols
and voice streaming protocols. Call setup protocols are available to serve as the VoIP
signalling protocol, SIP, H.323 and IAX (Inter Asterisk exchange) are most common choices.
SIP is an Internet Engineering Task Force (IETF) defined signalling protocol, widely used for
controlling multimedia communication sessions such as voice and video calls over Internet
Protocol. The protocol can be used for creating, modifying and terminating of multimedia
Figure 2.4 SIP Distribution Architecture (Butt Muhammad Faisal Nazir, 2006).
18
Examples of communication sessions are Internet telephone calls, distribution of multimedia
etc. The modification can involve changing addresses or ports, inviting more participants, and
adding or deleting media streams. SIP clients typically use TCP (Transmission Control
Protocol) or UDP on port numbers 5060 and/or 5061 to connect to SIP servers and other SIP
endpoints. Port 5060 is commonly used for non-encrypted signalling traffic whereas port
5061 is typically used for encrypted traffic. In the next paragraphs, the structural, functional
As shown in Figure 2.4 the SIP protocol defines a collection of entities that take part on a
SIP communication, which are, User Agents, Proxy Server, Location Server, Registrar and
Redirect Server. All these elements work together on one computer to perform specific task.
Installation of these elements on the same machine increases the speed and processing
User Agent Client (UAC): It is an entity that makes a call or request to call.
User Agent Server (UAS): It's a server at application level, which contacts the user when a
SIP request is received and responses on the user's name. The response to the request is
User Agent (UA): It's an application, which contains both the UAC and UAS. When users
want to talk with another, it executes a program that contains a UA. They can reside on the
user computer in the form of an application, but they can be cellular phones, PSTN gateways,
19
PDA’S and IVR (Interactive Voice Response) systems and so on. All the interactions
between users and the SIP protocol are done through UA. When UAC sends request to UAS,
UAS respond to that request and the session is established between them.
Registrar Server
Registrar server is a logical SIP entity that accepts the registration requests from senders
extract registration information about current location (IP address, port and username) and
store that information into location database. At the completion of registration process,
Registrar Server sends the ACK 200 message to the requestor. Registrar is very important
entity that helps in storing current information in location database, which further use for
Redirect Server
A Redirect server is a user agent server that accepts and receive SIP request. Redirect server
checks the request from the location database and creates the list of current location of the
user and send back the request to the originator within a 3xx response (detail in next section).
The user receives the list of current destinations and send request directly to required
destination. A general SIP transaction model consists of sequence of SIP messages (request
and responses) between SIP network elements; which describe the SIP calls setup and
teardown process. Sequence of requests and their responses are used in number of steps to
Location Server
A location server is a SIP entity used by a proxy and redirect server to obtain the information
about the called party possible location. Location server stores the current location of the
The proxy servers accept session requests generated by UA and request the address
information about the destination user to the registrar server. Then, it redirects the invitation
directly to the destination user if it's located on the same domain, or redirects it to another
The SIP network has the address attribute: SIP URL (SIP Uniform Resource Locator) to be easily
recognizable. SIP URLs used in SIP networks follows the structure of an email address; a user @
host where user can be any user name, phone number, or the name of the agency. The host can be
either a domain name or an IP address. SIP address with the form phone number
@ gateway shows the phone number on the network the General Switched Telephone
SIP is a text-based protocol with syntax similar to that of Hyper Text Transfer Protocol
(HTTP). There are two different types of SIP messages: requests and responses. The first line
of a request has a method, defining the nature of the request, and a Request-URI (Uniform
Resource Indictor), indicating where the request should be sent. The first line of a response
has a response code [10]. Method is an important entity in the request line and used to decide
the function of request, six types of methods are defined: REGISTER, INVITE, ACK,
21
2.5.3.5 SIP Responses
Every request needs a response, when a user agent receives a request it replies the response.
Response methods are similar to request, except to the first line. First line of the response
contains protocol version (SIP/2.0), reply code, and reason phrase. The reply code is integer
number from 100 to 699 and indicates type of response. These 6 classes of responses are
T) that defines the protocols to provide audio-visual communication sessions on any packet
network. The H.323 standard addresses call signaling and control, multimedia transport and
within various Internet real-time applications and is widely deployed worldwide by service
providers and enterprises for both voice and video services over IP networks.
Within the context of H.323, an IP-based PBX might be a gatekeeper or other call control
element which provides service to telephones or videophones. Such a device may provide or
facilitate both basic services and supplementary services, such as call transfer, park, pick-up,
and hold (Jim Van Meggelen, Leif Madsen, and Jared Smith, 2007).
N.B: SIP has pretty much dethroned the once-mighty H.323 as the VoIP protocol of choice
certainly at the endpoints of the network. The premise of SIP is that each end of a connection is a
peer; the protocol negotiates capabilities between them. What makes SIP compelling is that
22
it is a relatively simple protocol, with syntax similar to that of other familiar protocols such as
Written in C++
License Proprietary
Website: http://www.3CX.com
3CX Phone System is software based private branch exchange (PBX) based on the SIP
(Session Initiation Protocol) standard. It enables extensions to make calls via the public
switched telephone network (PSTN) or via Voice over Internet Protocol (VoIP) services.
3CX Phone System for Windows is an IP business phone system that supports standard SIP
3CX Phone System for Windows was developed by 3CX and first published as a free IP PBX
product in 2006. The product was intended to provide a VoIP solution for use in a Microsoft
Windows environment. The first commercial edition of the product was launched in 2007.
Reviews of the product have noted its easy configuration, management, and hardware
23
compatibility. Smith on VoIP commented in a blog post about 3CX that it was very easy to
use, but did not have all the features its competitors provide.
In January 2007 Craig Hyatt, Information Technology Director for Campus Services at the
University of North Carolina (http://www.csit.unc.edu), decided that it was time to get rid of
a department’s traditional PBX which offered limited functionality and was very costly. He
opted for 3CX Phone System for Windows and as a result, monthly phone bills have been
reduced by a whopping 81%, and staffs has become more mobile and productive.
support the university’s mission of teaching, research and public service. This means that when
we decide to adopt a new technology in our own premises, it has to be the best”, says Hyatt.
Telephone bills at UNC’s Campus Services Information Technology have been dramatically
reduced since the adoption of 3CX, “With our old traditional PBX the cost per handset was
$48 per month, with a total monthly bill mounting to almost $400 for eight handsets. These
days, the share of the phone bill for eight handsets – out of the 25 we have installed – is only
$75 per month”, highlights Hyatt. This is an astonishing 81% decrease in cost!
The University of North Carolina at Chapel Hill Campus Services IT is using the Pro Edition
of 3CX Phone System for Windows and a total of 25 extensions with Grand stream GXP-
2000 phones. They are planning to add more extensions in the near future.
“We are delighted to see that the Information Technology department of an established
educational institution such as the University of North Carolina at Chapel Hill chose 3CX
Phone System for Windows to reap the benefits of IP Telephony; including considerable cost
24
savings in phone bills and increase in staff productivity and mobility through the use of
There is no doubt 3CX helps improve business processes, reduce costs and increase customer
satisfaction, but there likely isn’t one VoIP system without its ups and downs. I would like to
Compatibility: As a Windows-based software, 3CX works great. Unless you’re not using
Windows, in which case you’ll likely have to rethink your 3CX strategy for the future.
number of simultaneous calls only limits 3CX Phone Systems. 3CX licenses are available in
Pricing: 3CX Phone System is licensed based on the number of simultaneous calls (internal
Radford University College currently has a large campus wide data network with internet,
spanning approximately 6 floors, and comprising of approximately 100 wired network ports,
It’s rather unfortunate with such a detailed network infrastructure; there is no voice network
The university employs the services of various mobile/telephone service providers. A single
PSTN line (landline) from Vodafone as well as various mobile telephony services from other
Internally there isn’t any PBX system the links the reception to the various
Departments and students are unable to communicate with each other without one physically
being present at one’s office, however even if communication exists it’s achieved via a
mobile phone which cost money which could have been avoided.
For example; During Enquires a front desk personnel would need to reach an
individual/department being sought for in person, thus reducing productivity and allowing
longer queues at the reception. In fact the issue of making calls through Mobile providers
The current phone system at Radford University leaves little or no room for customization
26
Figure 2.6 Radford Existing Data Network
27
2.7.1 Components of Existing System
programs with more than 2,000+ students. For more detail see www.radforduc.edu.gh/
Offices include:
Reception
Conference room
Library
Faculties
Accounts
Registry
President Office
Fashion Design
Graphic Design
Applied science
School of health sciences
The VoIP server will be situated (located) at RUC ICT server room. End users use IP phones,
analogue phones with ATAs and finally installation of softphones on different computers
(desktop and laptops) will be performed in order to make call by using computers. Linux and
28
2.7.2 Process of the System
The current telephony system at Radford University allows for 80% direct (verbal) human
potential customers.
This delays information transmission that increases waiting time, thus producing longer
As shown in figure 2.7, enquires are done through phone calls to the front desk of the
Most often than not, customers are given verbal directions by the receptionist as to where to
find an office/department/individual that would best avail them with information they seek.
29
2.7.3 Problems of the Existing System
Some of the problems being faced by Radford University telephony system are as follows:
Heavy work load for the front desk personnel, which leads to inefficiency.
University public/mobile lines are always busy with high response rates leaving
customers dissatisfied.
Longer queues and overcrowded offices with new students, continuing students and
After verbal directions given, there is no assurance that whoever is being sought for is
Information inaccuracy.
30
3 CHAPTER THREE
The proposed solution will be implemented on Radford University’s existing campus network
to provide free voice calls between the various entities (i.e. student, staff, faculties,
departments etc.) within the university. It will also allow them use of features like Voicemail
and IVR (Interactive Voice Response).The service is secure and allows users to request for
extensions to place calls. Additionally, all the calls are placed through the Linux based
Asterisk PBX (Private Branch Exchange) which is in fact the core kernel. All calls are
connected with the wireless network and PC’s connected with both wired LAN and wireless
LAN. Every entity (i.e. user/office/department/faculty etc.) is provided with a unique extension
31
ID upon request and that will be used to connect within the university`s existing data
network. It is possible to use RUC existing telephone systems and methods of calling, even if
the host to call is not directly connected to the network, hence necessitating the use of
gateways to connect a voice over IP call to the public telephone networks. The different types
Implementation is the one of the important part of this thesis. I will discuss about the
implementation of Asterisk and also throw more lights on the hardware used in the
configure eth0 or Ethernet card that has been installed on the server, and then select enable
IP4 support, and finally enter the IP Address and IP Gateway. After installation of server and
soft phone now we are going to integrate ATA with our IPPBX server. Configuring all VoIP
users through the Asterisk server whether it is IP telephone or Softphone by creating SIP
There is the list of equipment’s listed here used for the simulation to a final completion of
this project. There is combination of software, hardware and the open sources libraries.
3.3.1 Hardware
The different hardware used in the system can be seen in Table 3.1 the table contains the
32
Table 3.1 Hardware
NO TOOLS SPECIFICATION
ANALOG TELEPHONE
Electronic Handset Volume Control
(6-Step) Flash (for Hook, or use with
special telephone company services, such
3 as
call waiting) 3-Step Ringer Selector
(Off/Low/High) Switchable Tone/Pulse
Settings
33
PC SERVER IP-PBX
Intel Dual Core E2160
1,8 Ghz
4 Memory 512Mb / HDD 3Gb / Fast
Ethernet Card
LAPTOP
6 Asus R510c
CPU : Intel Core i5 (3rd Gen) 3337U
Max Turbo Speed: 2.7GHz
OS: Windows 8.1
64-bit Computing: YES
RAM:6GB
HDD:750GB
CAT 5E
34
3.3.2 Software
Putty
Cisco Packet Tracer
Pixlr Editor
Audacity software for voice formatting
Wireshark 1.10.1
Wireshark is a network analyzing tool; it captures the packets and displays its details,
Wireshark helps to understand what is going on in the network in real time voice call.
Some of the features of Wireshark are captures live packets, displays a detailed protocol
information for the packet captured, can save the data packets captured, can apply packet
filters, performs stream analysis, and finally it captures information like delay, jitter,
QoS is the differentiation between types of traffic and types of services so that the different types
of service and traffic can be treated differently. This way, one type can be favoured over another.
The primary goal of QoS is to provide priority including dedicated bandwidth, controlled jitter,
and latency, and improve loss characteristics. Real time packets such as voice
35
and video packets must be prioritized such that they arrive at their destination on time. Before
showing how to improve the performance of the network to insure QoS, it is important to
Bandwidth is the fundamental requirement that there be enough space in a network
path for all of the packets to get through unimpeded (Not slowed or prevented). This
bandwidth need is symmetric-each end will transmit and receive this amount of traffic
(Quality of Service, n.d).
Packet loss is the amount of packets that does not arrive correctly to their destination.
This is due to insufficient bandwidth or transmission errors (Quality of Service, n.d).
Latency is the time delay between an event occurring on one site and the remote end
seeing it. Latency is introduced both by the encoding/decoding process, and hence
depends on the equipment used, and also by the time it takes packets to traverse the
network. A disruption in the image can cause a bad playing in the destination, but a
disruption in the voice is more important since it makes the transmission not
understandable (Quality of Service, n.d).
Jitter Packets from the source will reach the destination with different delays. A packet's
delay varies with its position in the queues of the routers along the path between
source and destination and this position can vary unpredictably. This variation in
delay is known as jitter and can seriously affect the quality of streaming audio and/or
video (Quality of Service, n.d).
N.B: Thought this project work we consider that NUR site has enough bandwidth to
accommodate voice and video traffic. While developing, my attention will be focused on how
36
3.4.1 QoS requirements for Voice application
VoIP deployments require the provisioning of explicit priority servicing for VoIP (bearer
Recommendations for voice Loss should be no more than 1 percent, one-way latency (mouth
to ear) should be no more than 150 ms., average one-way jitter should be targeted at less than
30 ms and a range of 21 to 320 kbps of guaranteed priority bandwidth is required per call
(depending on the sampling rate, the VoIP codec, and Layer 2 media overhead).
Voice quality directly is affected by all three QoS quality factors: loss, latency, and jitter
The prepare phase of the Cisco PPDIOO lifecycle approach to network design for a VoIP
solution at Radford University will necessitate the usage of all resources of the University.
3.5.1 Bandwidth
Bandwidth given to PC VoIP server is 1MB. With the number of VoIP users were 6 pieces,
and use codec PCMU. So generally get computations bandwidth used by 6 x 64KB = 384 Kb.
37
3.5.2 Network architecture
The network architecture is shown here. The Figure 3.2 showing the interconnection of the
calls from one phone line to another, across a telecommunication network or the public
calls are routed by purpose-built electronic hardware however, soft switches using general
38
A soft switch is also a VoIP server, providing a soft switch platform with full IP PBX call
features. The most difference from IP PBX is its enormous numbers of users. After thorough
review into platforms I could use in developing IP telephony solution for Radford University
I settled on an open source framework called Asterisk. Answers to these questions informed
my choice.
What is Asterisk?
turns an ordinary computer into a communications server. Asterisk powers IP PBX systems,
VoIP gateways, conference servers and other custom solutions. It is used by small businesses,
large businesses, call centers, carriers and government agencies, worldwide. Asterisk is free
Today, there are more than one million Asterisk-based communications systems in use, in
more than 170 countries. Asterisk is used by almost the entire Fortune 1000 list of customers.
Most often deployed by system integrators and developers, Asterisk can become the basis for
The Asterisk project started in 1999 when Mark Spencer released the initial code under the
GPL open source license. Since that time, it has been enhanced and tested by a global
39
What Can You Do With Asterisk?
and solutions. Asterisk is to real time voice and video applications as what Apache is to web
you to concentrate on creating innovative products and solutions. You can use Asterisk to
build communications applications, things like business phone systems (also known as
Asterisk includes both low and high-level components that significantly simplify the process
of building these complex applications. See the Asterisk Applications section for more
examples.
Asterisk became a preferred platform to develop Rad-VOICE for Radford University because
it is open source, which means you can get under the source code, see how it works and make
Asterisk is flexible and lets you define the solution that truly fits your requirements. Asterisk
use. But the framework itself is built by developers for developers. If one want to create
applications and solutions with Asterisk you will need a working knowledge of Linux, script
40
Figure 3.3 Asterisk Architecture
2007).
41
3.5.4 Connection
The medium used by the Lan-VoIP user is to connect to the server via the Intranet. Users can
connect to Asterisk IP-PBX server via the LAN Intranet wherever they may be on campus.
I reviewed two soft phones: namely 3cx soft phone and Zoiper soft phone. 3CX was chosen
because it had call forward features which is a major requirement by the university. This can
be installed on any personal computer and compatible with all the operating systems. As
compared to other softphones which provided free call transfer facility, they required advance
registration and less user friendly. One major drawback to using 3CX softphone was its
having to pay for premium subscription. This led to looking out for another softphone. I
handheld/smart mobile devices and even on PC. Its only drawback was also user’s inability to
42
3.5.6 3CX Phone Soft Phone
3CXPhone is a popular softphone that can be used on Windows, Mac, Android and iOS
operating systems. As a softphone it can be used to make and receive phone calls from your
The advantage of using 3CXPhone as your softphone is that you can boost your company’s
productivity and mobility while at the same time slashing your telecommunications costs.
3CXPhone Benefits
Presence
Easy to use, intuitive user interface with dial pad and buttons
Zoiper is a VoIP softphone that lets you make chat or make voice and video calls with your
Unlike other software like Skype or Viber, it is open and can be used with any VoIP provider
or PBX. Allowing for much more flexibility and cheaper or better quality termination.
• Up to two accounts
• Echo cancellation
Figure 3.6 represents the Zoiper Dial pad interface and Logo respectively.
44
3.5.8 Grand Stream HT 502 ATA
The Grand stream HT502 Analog Telephone Adaptor is an all-in-one VoIP integrated device
designed to be a total solution for networks providing VoIP services. The HT502 VoIP
features and functions are available using a regular analogue telephone. The HT 502 is
powerful VoIP router. The product inclusion of an integrated high performance NAT router
and dual 10/100 Mbps Ethernet WAN and LAN ports enables a shared broadband connection
between multiple Ethernet devices. In addition to being SIP 2.0 standard compliant, the
product supports Universal Plug-in-Play (UPnP), up to 2 SIP account profiles, and advanced
telephony features. The image of the Grand Stream HT 502 is given in Figure 3.7
Enhanced security
HTTP/HTTPS (pending)/Telnet/TFTP
45
4 CHAPTER FOUR
The implementation phase is very important for this project. A compromise between the ideal
set-up for this project and what is realisable with the available equipment must be found, but
nevertheless, the ideal project set-up must not be forgotten, to keep it as close to reality as
possible.
For the actual implementation a (Revised) step-by-step plan was chosen. The implementation
stage is divided into two sections, namely the installation and configuration. A server
46
4.1.1 Download and Installation of Ubuntu 14.04 LTS Server.
A 32/64bit version Linux based Ubuntu 14.04 LTS Server Operating System can be
installation of Linux based Ubuntu 14.04 LTS server on the Virtual Machine as shown below:
Figure 4.2 Creating a Virtual Machine for Ubuntu 64bit Server using Virtual Box.
1. Select Install Ubuntu Server and follow recommended steps. Fig 3.8
47
2. You can choose one of these option at the time of install or later. I chose LAMP
(Linux, Apache, MYSQL, PHP) server and also to be able to remotely log on to the
server I checked Open SSH server for install and clicked continue. Fig 3.9
4.1.2 Download and Installation of Certified Asterisk 11.7.1 LTS (long term support).
For this install I used Asterisk 11.7.1 and will be compiling from source at
http://downloads.asterisk.org/pub/telephony/asterisk-11-current.tar,gz
49
Before you begin the install process you will want to be sure that you server OS is up
to date. When the update completes, the server will reboot. Logged in as root type in
the following:
50
4.2 Integration of Hardware
Integration is the next step after installation of the Asterisk server. Analogue phones are
going to be integrated using ATA with our IP PBX server. Here we have following steps to
Insert a standard RJ11 telephone cable into the Phone1 port and connect the other end
Insert the Ethernet cable into the WAN port of HT502 and connect the other end of
Insert the power adapter into the HT502 and connect it to a wall outlet.
The HT502 has two FXS port. Both FXS ports can have a separate SIP account. This is a key
51
4.3 Implementing the features of Asterisk Server
The voice call is the basic property of unified communication system, voice call is based on
sip protocol. Communication is only allowed for those who are registered with the sip server.
Communication devices can work on voice feature to provide good sound quality.Now
Asterisk is installed and running so we are going to create 6 new users with their extensions
sudo vi /etc/asterisk/sip.conf
Users include:
52
Table 4.1 Credentials
type=friend type=friend
secret=1234abcd secret=1234abcd
host=dynamic host=dynamic
context=phones context=phones
[Accounts] [Faculty]
type=friend type=friend
secret=1234abcd secret=1234abcd
host=dynamic host=dynamic
context=phones context=phones
[Registry]
type=friend
secret=1234abcd
host=dynamic
context=phones
To create the extensions for the users we need to modify the file extensions.conf. If we dial
the number 1001 we should contact Radford University Front desk and if we dial the number
2000 we should contact the registry office. We also create a special extension "1000" to dial
into an IVR (Interactive Voice response). We also create a special extension "*100" to access
53
4.3.2 Voice mail
Voicemail is configured to handle calls that cannot be answered. Voicemail is generally made
is to call user group. Flow chart of voicemail can be seen in Figure 3.16
Personalized voicemail is a feature that allows callers to leave messages on phone. Voicemail
permits users to record outgoing message, so that when calls are routed voicemail callers will
hear greeting and have the option to leave a message. The voicemail message will also
provide a timestamp that informs when a caller contacted. This is an essential feature of
Asterisk server that allows a voice attachment activated for a particular user to enable voice
mail go to the extension profile that user, then enable status of voice mail.
54
4.4 Configuration
Asterisk server configuration will be done via a CLI console, which demands knowledge of
Linux to configure. Configuration is carried out also in accordance with the purposes of the
Radford University College. The following is a configuration that has been done:
analogue telephone adapter by creating SIP account for them. All communication devices
communicate through Sip protocol and all communication devices appear like LAN-VoIP
users for Asterisk server. Figure 3.17 shows this scenario of configuration.
55
4.4.2 Configuration of E1200 Router
Cisco Linksys E1200 Wireless-N Router is also web based, so we need access it via the web
We need to change the Network IP address to match our Asterisk server network address since
We proceed by disabling/ unchecking the DHCP option as the Asterisk server will be handling
the assigning of IP’s to the various devices both wirelessly and wired. You will need to set a
56
4.4.3 Configuration of 3CX
After creating extensions in the Asterisk server we start by creating sip profiles in 3cx. We
proceed by a click on create profile. After that we need to do account setting. The last stage is
Account name: Compulsory entry which is the name of the extension given you by admin.
Extension: Unique extension number with which users can call given by Admin
SIP. Select the type of account you want to configure and click on the “Next” – button.
Credentials
Your provider or system administrator should have provided you with a username, password
If your administrator provider you with a domain, proxy, registrar, hostname, outbound proxy
Polycom Sound Point IP450 is a next generation small-to-medium business IP phone that
features 3 lines with 3 SIP account, a 128x40 graphical LCD and 3-way conference. The IP
450 delivers superior HD audio quality, rich and leading edge telephony features,
easy deployment, advanced security protection for privacy, and broad interoperability with
most 3rd party SIP devices and leading SIP/NGN/IMS platforms. It is a perfect choice for
small-to-medium businesses looking for a high quality. Figure 3.20 and Figure 3.21 showing
There are slots at the back side of phone , Connect the handset and main phone case
Connect the LAN port of the phone to the RJ45 socket of a hub/switch or a router
Connect the 24V DC output plug to the power jack on the phone; plug the power
Now use your keyboard and make configuration through GUI while entering the IP
The device can be configured through a given IP address by the Asterisk DHCP server that is
192.168.1.105. When the IP address is types in the address bar of any browser we get
password, Polycom and 435 respectively. Navigate to the Lines section at the top -> Line 1
Authentication Password:
Leave all other settings as default and click the submit button
60
4.4.6 IVR (Interactive Voice Response)
IVR is a useful service such as automatic answering machine before the user can connect the
caller with the desired number of VoIP. If a call comes into the IP-PBX server, pending
configuration, calls will be automatically sent to the IVR, then the user can interact with the
IVR, before the call transferred to the division or VoIP users (Front desk or Account Office)
to the caller and ask them to press the key to connect to an organization, work group, a
With registered extensions, Asterisk can be set to meet our needs. It is possible that we want
the system automatically connected to the extension we already defined if our extension
In this section we present ways in which testing of the deployed VoIP server has been
conducted. The IVR presented on Figure 4.17 is the RUC IVR system. Customers should dial
1000 in order to get through 2 different 2 offices. It present a path to reach to RUC front
As a prototype system IVRs have been used to direct users to the departments they need to
enquire from. When the call is directed to a department it will be directed to the secretary of
that department, this one will perform a transfer according to the choice of the caller.
The same system will be implemented to support call that will be directed to other faculty.
The IVR also should provide options in which customer will choose in order to join
conferencing room. When calls are directed to URC ICT call department, agents will take
care of these callers. And when all agents are all occupied, callers will be held in queue.
The system should provide music on hold and announce the position to customers which are held
in queue. A sample below shows how customers (users) will be disposed in order to make
62
calls to each other. Softphones on PCs and laptops will send registration request to the VoIP
server, such that they can be registered and used while making calls.
Figure 4.19 Incoming Call from Accounts Office <2001> to Registry <2000>
63
The system has been configured to provide voice calls; Figure 4.20 shows a Zoiper softphone
with extension number <2000> from the <Registry> being called by a 3CXPhone softphone
Figure 4.20 Call established between the Registry Department and the Account Office
The verification of VoIP metrics consist of determining if VoIP requirement has been
established. Wireshark tool has been used in order to find the values associated to the
jitter,delay and packet loss. The values of these parameters have been used to determine the
values of MOS for Voice and Video calls. Remember that MOS is evaluated between 0(not
64
We use Wireshark to capture RTP packet that are crossing the network in order to be
analyzed. The filtering option on Wireshark permits me to isolate SIP and RTP packets so
that they can be represented graphically. Figure 4.21 displays filtered packets (RTP).
The filtered packet will be analyzed by using a utility that Wireshark provide. Open
Wireshark 1.10.8, filter interface which you are using to transmit communications then filter
The opened table provides me a number of sequence of packets, jitter, delay (Delta), packet
loss, IP bandwidth per packet. And finally it provides the maximum delay, packet loss
65
percentage and the maximum and mean jitter; their values are presented in Appendix A-3.
The following figures display jitter Vs packet sequence and delay Vs packet sequence.
Figure 4.22 Delay and jitter Vs packet sequence when only voice is transmitted
During voice call the maximum latency is 21.5 ms and maximum jitter is 0.72ms while in
video calls maximum delay 31ms and maximum jitter is 1.83 ms.
Security issues must be taken into consideration, while you are planning to deploy a system
In order to grant confidentiality and authentication to the server configuration files Asterisk
default main (admin) password and root passwords must be changed from default to the ones
This is done by using the “permit=” and “deny=” lines in sip.conf to only allow a reasonable
subset of IP addresses to reach each listed extension/user in the sip.conf file. Even if
accepting inbound calls from “anywhere” (via [default]) don’t let those users reach
authenticated elements!
Many VoIP phone systems offer wireless handsets for mobility. These implementations often
make use of existing 802.11x wireless solutions. Weak wireless security exposes VoIP
vulnerabilities. Do not give hackers the opportunity to wirelessly access your network. The
encryption. If you are using lower end wireless access points, you should at the very least use
WPA (a form of encryption) over WEP encryption, although a novice hacker can easily
defeat WEP.
All terminating equipment (such as switches, routers, and Asterisk server itself) should be
67
5 CHAPTER FIVE
5.1 Conclusion
The objective of this project was to provide a VoIP system that the Radford University
college campus can use to interconnect its users (student and stuffs). The provided system is
based on Asterisk; Asterisk was created in 1999 by Mark Spencer of Digium. Like any PBX,
it allows attached telephones (hard phones & softphones) to make calls to one another, and to
connect to other telephone services including the public switched telephone network and
permit to deliver other VoIP services like voicemail, video calls, queuing, call parking&
To verify that the service that the system is offering are appreciated by customers
and that the meet ITU-T requirements, QoS was implemented and verification test has been
conducted on pilot basis. From these tests I found, RUC VoIP system can be established
without network problems. Different telephony features has been configured while
developing the projects. The system is capable of delivering Voice, Voicemail, and IVR has
been created and configured. The tested system provides to the administrator a way of
configuring the system at any end point (PC) RUC network using a command line interface.
Quality of Service is shown by the delay and packet loss by transferring packets from
IP PBX network and by receiving packets from IP PBX network. Delay of phone displays the
highest delay of about 2.5 seconds compared with the SIP phone. Quality of Service is not good
while communicating phone to any SIP phone, this is likely due to the noise from the wireless
network there is in the air and due to ATA (Analogue Telephone Adapter).
68
5.1.1 Server Capacity
As specification of server will increase then more efficient IP PBX will be because of higher
processors that will process more call and manage data base.
Bandwidth
Bandwidth provided by Radford University College is 5 MB, then for VoIP-based voices is
enough to meet. The greater the bandwidth provided, the smaller delay caused.
Codec
Codec’s are used in determining the capacity of any user who capable of server capacity.
Because of this codec provides a measure of Different sampling. In this final project, the
After research that has been conducted on Radford University College IP network, the
Implement a VoIP server which will work on the Radford university College IP
network, to support the call establishment and provide different telephony features
Ghanaian institutions and enterprises in general, should implement this VoIP system
since it is cost effective and can interoperate with their existing Data networks.
69
Integration with PSTN Network
Asterisk can connect with the existent PSTN by using FXO telephony card, so it is
possible to be used as the VoIP gateway this will increase portability and decrease cost.
This project can also be integrated with GSM network through gateways. This will increase
portability and decrease cost. This project can also be integrated with Skype gateways
through which we can call from our all communication devices to any Skype ID.
Due to limitations such as time a Command Line Interface was used to manage calls and
configure calls. I was only able to develop a prototype web interface by typing into your
When developing the large scale enterprise network by connecting multiple Asterisk
servers located in different sites based on IAX2, to realize high security is the issue
because the voice data is not encrypted. To solve this issue, VPN method could be
70
REFERENCES
Meisel, J.B and Needles, M. (2005). “Voice over internet protocol (VoIP) development “,
Oliver Hersent, Jean Pierre Petit, and David Gurle, “Beyond VoIP Protocols:
Theodore Wallingford, (2005). “Switching to VoIP”, O’Reilly Media, Inc June, Print
ISBN-13:978-0-596-00868-0
Tim Szigeti & Christina Hattingh, (2013). End-to-End QoS Network Design: Quality of
Jim Van Meggelen, Leif Madsen, and Jared Smith, (2007). Asterisk: The Future of
Parker, M., and D. Van Doren, (2009). "Achieving Cost and Resource Savings with Unified
Communications."
L. Sun, (2004). “Speech Quality Prediction for Voice Over Internet Protocol, PhD”
Technology, January 24
71
Buckley, Sean, (2001). “Packet over Cable.” Telecommunications, March 4.
Lawrence Harte, (2003). Telecom Basics: Signal Processing, Signalling Control, and Call
Barrie Dempster and Kerry Garrison, (2006). Trixbox Made Easy: A Step-by-step Guide
to Installing and Running Your Home and Office VoIP System. September 1st
Puglia, Vincent, (2010). "Unified communications: The search for ROI through
5/contents/technology/ip-telephony-represents-a-structure-cabling-revolution.html
Craig Hyatt, (2007). University’s Phone Bills Reduced by 81% with 3CX Phone System
72
Accessed from http://searchunifiedcommunications.techtarget.com/tip/IP-PBX-Ten-
reasons-to-switch
Stephen J. Occhiogrossp, (2011). CCIE or NULL! : The Cisco PPDIOO Life Cycle May 9.
73
APPENDIX
A: LIST OF ABBREVIATIONS
ACK Acknowledge
74
I
IP Internet Protocol
UC Unified Communications
76
B-1 Screenshot of Sip.conf
77
B-3 Screenshot of Extensions.conf
78
C-2 SIP Response Code.
79
C-3 SIP Requests
Request Description
name
ACK Confirms that the client has received a final response to an INVITE request.
BYE Terminates a call and can be sent by either the caller or the callee.
REGISTER Registers the address listed in the To header field with a SIP server.
INFO Sends mid-session information that does not modify the session state.
UPDATE Modifies the state of a session without changing the state of the dialog.
80
D-1 Installation
D-2 Asterisk
81