SlideShare a Scribd company logo
1 of 68
Open Telephony The FreePBX ®  Way  Presented at Asterisk World, 2008 San Jose by Philippe Lindheimer FreePBX Project Leader http://freepbx.org
What is Open Telephony? +
A Revolutionary Telephony Platform is Born
The LAMP “Hall of Fame” Expands ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],A Asterisk
The FreePBX Project ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Who’s Using FreePBX? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],+ =
Leader in Asterisk PBX Innovations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Extensive Functionality
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Where to Learn More Open Telephony Training Seminar ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The End Thank You for Listening http://freepbx.org
[object Object],[object Object],[object Object],What’s with the Frog? Photo taken from  www.newint.org  (Klein)
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Return from IVR Making complex IVR trees Day IVR Sales Support Billing 1 2 3 Night IVR Sales Support Billing Msg 1 2 3 Support IVR Residental Contractors Main Menu 1 2 9 Return to IVR Tip: Use “Return to IVR” with IVR’s and Announcements that will be called from multiple parents.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Inbound Call Flow Call Routing *280 (Receptionist Override) Timecondition (8:00 – 17:00 M-F) Inbound Route (Company DID) Receptionist After Hours IVR
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Inbound Call Flow Call Routing extensions Time Condition 8-5 M-F extensions Company DID 8004522233 Day/Night Mode Control IVR 1-Sales 2-Support 3-Directions Sales Msg Support Msg Sales Ringgroup Support Queue After Hr Msg John’s Voicemail
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Outbound Call Flow Routes, Trunks, Dial Patterns Busy, Answer, No Answer Busy, Answer,  No Answer Congested, Channel Unavailable Congested, Channel Unavailable Strip digits If configured All Circuits Busy Bad Number Context Route 1 (Emergency) Match? Route 2 Match? Route 3 Match ? Next Trunk Next Trunk Tip: Always make your first route your Emergency Route to handle E911 and other related calls. This assures that numbers matching your emergency patterns will ALWAYS go down the Emergency Route.
CallerID Handling Originated Call From User or Forwarded Call (CF, Follow-Me, etc.) Emer- gency Route Emer- gency CID? Intra- Company Outbound CID Trunk CID Trunk CID Set Never Overide CID CID Set? Trunk CID? Use Emer- gency CID Use Internal CID Use Outboundcid Use Trunk CID Yes Yes Yes No Yes No No No Use Extension (Undefined Results) No Use Forwarded CID Use Trunk CID Use Trunk CID No CID Transmitted No No No Outbound Call Flow CallerID Yes No Yes Yes Yes If CallerID(name) == “hidden” (“hidden” <2124351234>) SetCallerPres(prohib_passed_screen) Internal Caller?
DUNDi 101 - Redundancy Outbound Call Flow DUNDi & Branch Offices Chicago Ann Arbor Cleveland Indianapolis Milwaukee Detroit Madison IAX Trunk Media Path
Advanced FreePBX Features VmX™ & Follow-Me Dial Attempt Aleternative Optional 0 or 2 VmX Locater™ Incoming Call Unavail Msg #home #cell Voice Mail System Confirmation Cell Voicemail ANSWER VmX Locater™ Busy Msg Busy # or No choice Press 1 No Answer
FreePBX Internals Architecture Module Plugin Logic LAMPA   Stack   (Linux – Apache – MySQL – PHP – Asterisk) FreePBX Core Application Libraries Module Plugin Libraries FreePBX Core Dialplan Objects Module Plugin Objects Authorization / Security FreePBX Framework and Core Logic FreePBX Core API Module Plugin API FreePBX GUI Module Plugin GUI FreePBX Config MySQL DB
FreePBX Internals Architecture FreePBX GUI Business Logic MySQL Config Storage Dialplan Generation & Business Logic Astdb Asterisk Environment page.dispname.php functions.inc.php retrieve_conf Dialplan & Configuration files voicemail.conf AGI & System Scripts
Inbound Call Flow Types of Modules extension, vm or featurecode extension, vm or featurecode From Previous Module Destination Modules Multi-Destination Modules (e.g. IVR, Time-Conditions, Day/Night Control) From Previous Module Destination Module (or extension, vm, featurecode) Simple Module (e.g. Announcement) extension, vm or featurecode Destination Module (or extension, vm, featurecode) From Previous Module Common Module (e.g. Ring Group, Queues,  Follow-Me)

More Related Content

What's hot

Introduction to VoIP using SIP
Introduction to VoIP using SIPIntroduction to VoIP using SIP
Introduction to VoIP using SIPKundan Singh
 
Getting started with IPv6
Getting started with IPv6Getting started with IPv6
Getting started with IPv6Private
 
#MoreCrypto : Introduction to TLS
#MoreCrypto : Introduction to TLS#MoreCrypto : Introduction to TLS
#MoreCrypto : Introduction to TLSOlle E Johansson
 
Building a new ecosystem for interoperable communications
Building a new ecosystem for interoperable communicationsBuilding a new ecosystem for interoperable communications
Building a new ecosystem for interoperable communicationsPaloSanto Solutions
 
Ipv4 over ipv6 by Jigar Tarsariya
Ipv4 over ipv6 by Jigar TarsariyaIpv4 over ipv6 by Jigar Tarsariya
Ipv4 over ipv6 by Jigar TarsariyaJigar Tarsariya
 
Asterisk WebRTC frontier: make client SIP Phone with sipML5 and Janus Gateway
Asterisk WebRTC frontier: make client SIP Phone with sipML5 and Janus GatewayAsterisk WebRTC frontier: make client SIP Phone with sipML5 and Janus Gateway
Asterisk WebRTC frontier: make client SIP Phone with sipML5 and Janus GatewayAlessandro Polidori
 
Phone Apps... para el teléfono de escritorio
Phone Apps... para el teléfono de escritorioPhone Apps... para el teléfono de escritorio
Phone Apps... para el teléfono de escritorioPaloSanto Solutions
 
Configuration and testing of network
Configuration and testing of networkConfiguration and testing of network
Configuration and testing of networkKak Yong
 
NetFlow Monitoring for Cyber Threat Defense
NetFlow Monitoring for Cyber Threat DefenseNetFlow Monitoring for Cyber Threat Defense
NetFlow Monitoring for Cyber Threat DefenseCisco Canada
 

What's hot (19)

No More Fraud Cluecon2014
No More Fraud Cluecon2014No More Fraud Cluecon2014
No More Fraud Cluecon2014
 
IPv6
IPv6IPv6
IPv6
 
Sip 416 (sip proxy server) intro
Sip 416 (sip proxy server) introSip 416 (sip proxy server) intro
Sip 416 (sip proxy server) intro
 
Sip 416 (sip proxy server) intro
Sip 416 (sip proxy server) introSip 416 (sip proxy server) intro
Sip 416 (sip proxy server) intro
 
NAT Scneario
NAT ScnearioNAT Scneario
NAT Scneario
 
Introduction to VoIP using SIP
Introduction to VoIP using SIPIntroduction to VoIP using SIP
Introduction to VoIP using SIP
 
Asterisk: the future is at REST
Asterisk: the future is at RESTAsterisk: the future is at REST
Asterisk: the future is at REST
 
Getting started with IPv6
Getting started with IPv6Getting started with IPv6
Getting started with IPv6
 
Kamailio on air
Kamailio on airKamailio on air
Kamailio on air
 
#MoreCrypto : Introduction to TLS
#MoreCrypto : Introduction to TLS#MoreCrypto : Introduction to TLS
#MoreCrypto : Introduction to TLS
 
Building a new ecosystem for interoperable communications
Building a new ecosystem for interoperable communicationsBuilding a new ecosystem for interoperable communications
Building a new ecosystem for interoperable communications
 
Ipv4 over ipv6 by Jigar Tarsariya
Ipv4 over ipv6 by Jigar TarsariyaIpv4 over ipv6 by Jigar Tarsariya
Ipv4 over ipv6 by Jigar Tarsariya
 
Asterisk WebRTC frontier: make client SIP Phone with sipML5 and Janus Gateway
Asterisk WebRTC frontier: make client SIP Phone with sipML5 and Janus GatewayAsterisk WebRTC frontier: make client SIP Phone with sipML5 and Janus Gateway
Asterisk WebRTC frontier: make client SIP Phone with sipML5 and Janus Gateway
 
IPv6
IPv6IPv6
IPv6
 
Phone Apps... para el teléfono de escritorio
Phone Apps... para el teléfono de escritorioPhone Apps... para el teléfono de escritorio
Phone Apps... para el teléfono de escritorio
 
Configuration and testing of network
Configuration and testing of networkConfiguration and testing of network
Configuration and testing of network
 
Voip In College
Voip In CollegeVoip In College
Voip In College
 
Ip4vsip6
Ip4vsip6Ip4vsip6
Ip4vsip6
 
NetFlow Monitoring for Cyber Threat Defense
NetFlow Monitoring for Cyber Threat DefenseNetFlow Monitoring for Cyber Threat Defense
NetFlow Monitoring for Cyber Threat Defense
 

Viewers also liked

Asterisk World Theater Talk Tlc 080319
Asterisk World Theater Talk Tlc 080319Asterisk World Theater Talk Tlc 080319
Asterisk World Theater Talk Tlc 080319Carl Ford
 
Introduction à la sécurité informatique Volume2
Introduction à la sécurité informatique Volume2Introduction à la sécurité informatique Volume2
Introduction à la sécurité informatique Volume2Sylvain Maret
 
Algorithme de chiffrement RC4, A5/1 & A5/2
Algorithme de chiffrement RC4, A5/1 & A5/2Algorithme de chiffrement RC4, A5/1 & A5/2
Algorithme de chiffrement RC4, A5/1 & A5/2Max Benana
 
Etude et Mise en oeuvre d'une architecture de téléphonie sur IP sécurisée au ...
Etude et Mise en oeuvre d'une architecture de téléphonie sur IP sécurisée au ...Etude et Mise en oeuvre d'une architecture de téléphonie sur IP sécurisée au ...
Etude et Mise en oeuvre d'une architecture de téléphonie sur IP sécurisée au ...stepmike
 
Alphorm.com Support de la Formation Les Sciences Forensiques : L’investigati...
Alphorm.com Support de la Formation Les Sciences Forensiques  : L’investigati...Alphorm.com Support de la Formation Les Sciences Forensiques  : L’investigati...
Alphorm.com Support de la Formation Les Sciences Forensiques : L’investigati...Alphorm
 
Alphorm.com ressources-formation-hacking-et-securite-reseaux-sans-fils
Alphorm.com ressources-formation-hacking-et-securite-reseaux-sans-filsAlphorm.com ressources-formation-hacking-et-securite-reseaux-sans-fils
Alphorm.com ressources-formation-hacking-et-securite-reseaux-sans-filsAlphorm
 
Alphorm.com Support Formation Hacking & Sécurité Expert Vulnérabilités Web
Alphorm.com Support Formation Hacking & Sécurité Expert Vulnérabilités WebAlphorm.com Support Formation Hacking & Sécurité Expert Vulnérabilités Web
Alphorm.com Support Formation Hacking & Sécurité Expert Vulnérabilités WebAlphorm
 
Alphorm.com Support de la formation Hacking & Sécurité, Expert - Vulnérabilit...
Alphorm.com Support de la formation Hacking & Sécurité, Expert - Vulnérabilit...Alphorm.com Support de la formation Hacking & Sécurité, Expert - Vulnérabilit...
Alphorm.com Support de la formation Hacking & Sécurité, Expert - Vulnérabilit...Alphorm
 
Alphorm.com Support de la formation Hacking et Sécurité Metasploit
Alphorm.com Support de la formation Hacking et Sécurité MetasploitAlphorm.com Support de la formation Hacking et Sécurité Metasploit
Alphorm.com Support de la formation Hacking et Sécurité MetasploitAlphorm
 
Alphorm.com Formation Cisco CCNP TSHOOT
Alphorm.com Formation Cisco CCNP TSHOOTAlphorm.com Formation Cisco CCNP TSHOOT
Alphorm.com Formation Cisco CCNP TSHOOTAlphorm
 
Alphorm.com Formation CEHV9 III
Alphorm.com Formation CEHV9 IIIAlphorm.com Formation CEHV9 III
Alphorm.com Formation CEHV9 IIIAlphorm
 
Un algorithme de chiffrement a flot base sur le probleme des 3 corps.
Un algorithme de chiffrement a flot base sur le probleme des 3 corps.Un algorithme de chiffrement a flot base sur le probleme des 3 corps.
Un algorithme de chiffrement a flot base sur le probleme des 3 corps.Samir Crypticus
 
Alphorm.com Formation Hacking et Sécurité , avancé
Alphorm.com Formation Hacking et Sécurité , avancéAlphorm.com Formation Hacking et Sécurité , avancé
Alphorm.com Formation Hacking et Sécurité , avancéAlphorm
 
Alphorm.com Formation CEHV9 II
Alphorm.com Formation CEHV9 IIAlphorm.com Formation CEHV9 II
Alphorm.com Formation CEHV9 IIAlphorm
 
Audit sécurité des systèmes d’information
Audit sécurité des systèmes d’informationAudit sécurité des systèmes d’information
Audit sécurité des systèmes d’informationAbbes Rharrab
 

Viewers also liked (20)

Asterisk World Theater Talk Tlc 080319
Asterisk World Theater Talk Tlc 080319Asterisk World Theater Talk Tlc 080319
Asterisk World Theater Talk Tlc 080319
 
RC4 Technique in Visual Cryptography
RC4 Technique in Visual CryptographyRC4 Technique in Visual Cryptography
RC4 Technique in Visual Cryptography
 
Introduction à la sécurité informatique Volume2
Introduction à la sécurité informatique Volume2Introduction à la sécurité informatique Volume2
Introduction à la sécurité informatique Volume2
 
Telephonie ip
Telephonie ipTelephonie ip
Telephonie ip
 
Algorithme de chiffrement RC4, A5/1 & A5/2
Algorithme de chiffrement RC4, A5/1 & A5/2Algorithme de chiffrement RC4, A5/1 & A5/2
Algorithme de chiffrement RC4, A5/1 & A5/2
 
VoIP
VoIPVoIP
VoIP
 
Etude et Mise en oeuvre d'une architecture de téléphonie sur IP sécurisée au ...
Etude et Mise en oeuvre d'une architecture de téléphonie sur IP sécurisée au ...Etude et Mise en oeuvre d'une architecture de téléphonie sur IP sécurisée au ...
Etude et Mise en oeuvre d'une architecture de téléphonie sur IP sécurisée au ...
 
Etude de la VoIP
Etude de la VoIPEtude de la VoIP
Etude de la VoIP
 
Alphorm.com Support de la Formation Les Sciences Forensiques : L’investigati...
Alphorm.com Support de la Formation Les Sciences Forensiques  : L’investigati...Alphorm.com Support de la Formation Les Sciences Forensiques  : L’investigati...
Alphorm.com Support de la Formation Les Sciences Forensiques : L’investigati...
 
Alphorm.com ressources-formation-hacking-et-securite-reseaux-sans-fils
Alphorm.com ressources-formation-hacking-et-securite-reseaux-sans-filsAlphorm.com ressources-formation-hacking-et-securite-reseaux-sans-fils
Alphorm.com ressources-formation-hacking-et-securite-reseaux-sans-fils
 
Alphorm.com Support Formation Hacking & Sécurité Expert Vulnérabilités Web
Alphorm.com Support Formation Hacking & Sécurité Expert Vulnérabilités WebAlphorm.com Support Formation Hacking & Sécurité Expert Vulnérabilités Web
Alphorm.com Support Formation Hacking & Sécurité Expert Vulnérabilités Web
 
Alphorm.com Support de la formation Hacking & Sécurité, Expert - Vulnérabilit...
Alphorm.com Support de la formation Hacking & Sécurité, Expert - Vulnérabilit...Alphorm.com Support de la formation Hacking & Sécurité, Expert - Vulnérabilit...
Alphorm.com Support de la formation Hacking & Sécurité, Expert - Vulnérabilit...
 
Alphorm.com Support de la formation Hacking et Sécurité Metasploit
Alphorm.com Support de la formation Hacking et Sécurité MetasploitAlphorm.com Support de la formation Hacking et Sécurité Metasploit
Alphorm.com Support de la formation Hacking et Sécurité Metasploit
 
Alphorm.com Formation Cisco CCNP TSHOOT
Alphorm.com Formation Cisco CCNP TSHOOTAlphorm.com Formation Cisco CCNP TSHOOT
Alphorm.com Formation Cisco CCNP TSHOOT
 
Alphorm.com Formation CEHV9 III
Alphorm.com Formation CEHV9 IIIAlphorm.com Formation CEHV9 III
Alphorm.com Formation CEHV9 III
 
Un algorithme de chiffrement a flot base sur le probleme des 3 corps.
Un algorithme de chiffrement a flot base sur le probleme des 3 corps.Un algorithme de chiffrement a flot base sur le probleme des 3 corps.
Un algorithme de chiffrement a flot base sur le probleme des 3 corps.
 
Alphorm.com Formation Hacking et Sécurité , avancé
Alphorm.com Formation Hacking et Sécurité , avancéAlphorm.com Formation Hacking et Sécurité , avancé
Alphorm.com Formation Hacking et Sécurité , avancé
 
TELEPHONIE SUR IP
TELEPHONIE SUR IPTELEPHONIE SUR IP
TELEPHONIE SUR IP
 
Alphorm.com Formation CEHV9 II
Alphorm.com Formation CEHV9 IIAlphorm.com Formation CEHV9 II
Alphorm.com Formation CEHV9 II
 
Audit sécurité des systèmes d’information
Audit sécurité des systèmes d’informationAudit sécurité des systèmes d’information
Audit sécurité des systèmes d’information
 

Similar to Asterisk World2008

BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.Sumutiu Marius
 
My speech at AstriCon 2007
My speech at AstriCon 2007My speech at AstriCon 2007
My speech at AstriCon 2007stefanocarlini
 
VoIP Security 101 what you need to know
VoIP Security 101   what you need to knowVoIP Security 101   what you need to know
VoIP Security 101 what you need to knowEric Klein
 
Día Neocenter | FreePBX The best & most complete open source & Commercial PBX...
Día Neocenter | FreePBX The best & most complete open source & Commercial PBX...Día Neocenter | FreePBX The best & most complete open source & Commercial PBX...
Día Neocenter | FreePBX The best & most complete open source & Commercial PBX...Neocenter SA de CV
 
From MSS to TelScale - Mobicents Summit 2011
From MSS to TelScale - Mobicents Summit 2011From MSS to TelScale - Mobicents Summit 2011
From MSS to TelScale - Mobicents Summit 2011telestax
 
Introduction to IP telephony & VoIP
Introduction to IP telephony & VoIP Introduction to IP telephony & VoIP
Introduction to IP telephony & VoIP Kaushal Bhavsar
 
OST Market - Hybrid Case Histories
OST Market - Hybrid Case HistoriesOST Market - Hybrid Case Histories
OST Market - Hybrid Case HistoriesRoberto Galoppini
 
Leverage the Network to Detect and Manage Threats
Leverage the Network to Detect and Manage ThreatsLeverage the Network to Detect and Manage Threats
Leverage the Network to Detect and Manage ThreatsCisco Canada
 
Yeastar MyPBX-Basic configuration
Yeastar MyPBX-Basic configurationYeastar MyPBX-Basic configuration
Yeastar MyPBX-Basic configurationHossein Yavari
 
Network Situational Awareness with d00gle
Network Situational Awareness with d00gleNetwork Situational Awareness with d00gle
Network Situational Awareness with d00gleDug Song
 
JmDNS : Service Discovery for the 21st Century
 JmDNS : Service Discovery for the 21st Century JmDNS : Service Discovery for the 21st Century
JmDNS : Service Discovery for the 21st CenturyGnu Alsonative
 
JmDNS : Service Discovery for the 21st Century
 JmDNS : Service Discovery for the 21st Century JmDNS : Service Discovery for the 21st Century
JmDNS : Service Discovery for the 21st CenturyGnu Alsonative
 
Astricon 2010: Scaling Asterisk installations
Astricon 2010: Scaling Asterisk installationsAstricon 2010: Scaling Asterisk installations
Astricon 2010: Scaling Asterisk installationsOlle E Johansson
 
Introduction to FreeSWITCH
Introduction to FreeSWITCHIntroduction to FreeSWITCH
Introduction to FreeSWITCHChien Cheng Wu
 
Prospect presentation
Prospect  presentationProspect  presentation
Prospect presentationstevepinkus
 
CableTap - Wirelessly Tapping Your Home Network
CableTap - Wirelessly Tapping Your Home NetworkCableTap - Wirelessly Tapping Your Home Network
CableTap - Wirelessly Tapping Your Home NetworkChristopher Grayson
 

Similar to Asterisk World2008 (20)

BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.
 
My speech at AstriCon 2007
My speech at AstriCon 2007My speech at AstriCon 2007
My speech at AstriCon 2007
 
VOIP services
VOIP servicesVOIP services
VOIP services
 
VoIP Security 101 what you need to know
VoIP Security 101   what you need to knowVoIP Security 101   what you need to know
VoIP Security 101 what you need to know
 
Día Neocenter | FreePBX The best & most complete open source & Commercial PBX...
Día Neocenter | FreePBX The best & most complete open source & Commercial PBX...Día Neocenter | FreePBX The best & most complete open source & Commercial PBX...
Día Neocenter | FreePBX The best & most complete open source & Commercial PBX...
 
From MSS to TelScale - Mobicents Summit 2011
From MSS to TelScale - Mobicents Summit 2011From MSS to TelScale - Mobicents Summit 2011
From MSS to TelScale - Mobicents Summit 2011
 
Introduction to IP telephony & VoIP
Introduction to IP telephony & VoIP Introduction to IP telephony & VoIP
Introduction to IP telephony & VoIP
 
OST Market - Hybrid Case Histories
OST Market - Hybrid Case HistoriesOST Market - Hybrid Case Histories
OST Market - Hybrid Case Histories
 
Leverage the Network to Detect and Manage Threats
Leverage the Network to Detect and Manage ThreatsLeverage the Network to Detect and Manage Threats
Leverage the Network to Detect and Manage Threats
 
jonny-martin-asterisk.pdf
jonny-martin-asterisk.pdfjonny-martin-asterisk.pdf
jonny-martin-asterisk.pdf
 
updated cv
updated cvupdated cv
updated cv
 
Yeastar MyPBX-Basic configuration
Yeastar MyPBX-Basic configurationYeastar MyPBX-Basic configuration
Yeastar MyPBX-Basic configuration
 
Network Situational Awareness with d00gle
Network Situational Awareness with d00gleNetwork Situational Awareness with d00gle
Network Situational Awareness with d00gle
 
JmDNS : Service Discovery for the 21st Century
 JmDNS : Service Discovery for the 21st Century JmDNS : Service Discovery for the 21st Century
JmDNS : Service Discovery for the 21st Century
 
JmDNS : Service Discovery for the 21st Century
 JmDNS : Service Discovery for the 21st Century JmDNS : Service Discovery for the 21st Century
JmDNS : Service Discovery for the 21st Century
 
Astricon 2010: Scaling Asterisk installations
Astricon 2010: Scaling Asterisk installationsAstricon 2010: Scaling Asterisk installations
Astricon 2010: Scaling Asterisk installations
 
Introduction to FreeSWITCH
Introduction to FreeSWITCHIntroduction to FreeSWITCH
Introduction to FreeSWITCH
 
voip_en
voip_envoip_en
voip_en
 
Prospect presentation
Prospect  presentationProspect  presentation
Prospect presentation
 
CableTap - Wirelessly Tapping Your Home Network
CableTap - Wirelessly Tapping Your Home NetworkCableTap - Wirelessly Tapping Your Home Network
CableTap - Wirelessly Tapping Your Home Network
 

More from Carl Ford

Does the Wireless Internet Need to be Interoperable
Does the Wireless Internet Need to be InteroperableDoes the Wireless Internet Need to be Interoperable
Does the Wireless Internet Need to be InteroperableCarl Ford
 
HTML5 Happening in Miami Beach
HTML5 Happening in Miami BeachHTML5 Happening in Miami Beach
HTML5 Happening in Miami BeachCarl Ford
 
Superwifiwhitespacemiami
SuperwifiwhitespacemiamiSuperwifiwhitespacemiami
SuperwifiwhitespacemiamiCarl Ford
 
M2M Evolution
M2M EvolutionM2M Evolution
M2M EvolutionCarl Ford
 
Miami2012 cag
Miami2012 cagMiami2012 cag
Miami2012 cagCarl Ford
 
M2memiami2012
M2memiami2012M2memiami2012
M2memiami2012Carl Ford
 
Html5 miami2012
Html5 miami2012Html5 miami2012
Html5 miami2012Carl Ford
 
Swifimiami2012
Swifimiami2012Swifimiami2012
Swifimiami2012Carl Ford
 
Swifimiami2012
Swifimiami2012Swifimiami2012
Swifimiami2012Carl Ford
 
4 gwemiami2012
4 gwemiami20124 gwemiami2012
4 gwemiami2012Carl Ford
 
4 gwemiami2012
4 gwemiami20124 gwemiami2012
4 gwemiami2012Carl Ford
 
Dev con5layout2
Dev con5layout2Dev con5layout2
Dev con5layout2Carl Ford
 
Bill volk gamification
Bill volk  gamificationBill volk  gamification
Bill volk gamificationCarl Ford
 
Css3 paul trani
Css3 paul traniCss3 paul trani
Css3 paul traniCarl Ford
 
Bridge wave 4gwe-miami_02feb(3)
Bridge wave   4gwe-miami_02feb(3)Bridge wave   4gwe-miami_02feb(3)
Bridge wave 4gwe-miami_02feb(3)Carl Ford
 
Mindspeed jim.johnston 4_gwe-spring 1.0
Mindspeed jim.johnston 4_gwe-spring 1.0Mindspeed jim.johnston 4_gwe-spring 1.0
Mindspeed jim.johnston 4_gwe-spring 1.0Carl Ford
 
Towerstream 4 gwe presentation final (1)
Towerstream 4 gwe presentation final (1)Towerstream 4 gwe presentation final (1)
Towerstream 4 gwe presentation final (1)Carl Ford
 
Adrian scrase 4_gwe_final
Adrian scrase 4_gwe_finalAdrian scrase 4_gwe_final
Adrian scrase 4_gwe_finalCarl Ford
 
Shakouri 4 gwe keynote jan 2011
Shakouri 4 gwe keynote jan 2011Shakouri 4 gwe keynote jan 2011
Shakouri 4 gwe keynote jan 2011Carl Ford
 

More from Carl Ford (20)

Does the Wireless Internet Need to be Interoperable
Does the Wireless Internet Need to be InteroperableDoes the Wireless Internet Need to be Interoperable
Does the Wireless Internet Need to be Interoperable
 
4 gwes2012
4 gwes20124 gwes2012
4 gwes2012
 
HTML5 Happening in Miami Beach
HTML5 Happening in Miami BeachHTML5 Happening in Miami Beach
HTML5 Happening in Miami Beach
 
Superwifiwhitespacemiami
SuperwifiwhitespacemiamiSuperwifiwhitespacemiami
Superwifiwhitespacemiami
 
M2M Evolution
M2M EvolutionM2M Evolution
M2M Evolution
 
Miami2012 cag
Miami2012 cagMiami2012 cag
Miami2012 cag
 
M2memiami2012
M2memiami2012M2memiami2012
M2memiami2012
 
Html5 miami2012
Html5 miami2012Html5 miami2012
Html5 miami2012
 
Swifimiami2012
Swifimiami2012Swifimiami2012
Swifimiami2012
 
Swifimiami2012
Swifimiami2012Swifimiami2012
Swifimiami2012
 
4 gwemiami2012
4 gwemiami20124 gwemiami2012
4 gwemiami2012
 
4 gwemiami2012
4 gwemiami20124 gwemiami2012
4 gwemiami2012
 
Dev con5layout2
Dev con5layout2Dev con5layout2
Dev con5layout2
 
Bill volk gamification
Bill volk  gamificationBill volk  gamification
Bill volk gamification
 
Css3 paul trani
Css3 paul traniCss3 paul trani
Css3 paul trani
 
Bridge wave 4gwe-miami_02feb(3)
Bridge wave   4gwe-miami_02feb(3)Bridge wave   4gwe-miami_02feb(3)
Bridge wave 4gwe-miami_02feb(3)
 
Mindspeed jim.johnston 4_gwe-spring 1.0
Mindspeed jim.johnston 4_gwe-spring 1.0Mindspeed jim.johnston 4_gwe-spring 1.0
Mindspeed jim.johnston 4_gwe-spring 1.0
 
Towerstream 4 gwe presentation final (1)
Towerstream 4 gwe presentation final (1)Towerstream 4 gwe presentation final (1)
Towerstream 4 gwe presentation final (1)
 
Adrian scrase 4_gwe_final
Adrian scrase 4_gwe_finalAdrian scrase 4_gwe_final
Adrian scrase 4_gwe_final
 
Shakouri 4 gwe keynote jan 2011
Shakouri 4 gwe keynote jan 2011Shakouri 4 gwe keynote jan 2011
Shakouri 4 gwe keynote jan 2011
 

Recently uploaded

Types of Cyberattacks - ASG I.T. Consulting.pdf
Types of Cyberattacks - ASG I.T. Consulting.pdfTypes of Cyberattacks - ASG I.T. Consulting.pdf
Types of Cyberattacks - ASG I.T. Consulting.pdfASGITConsulting
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
Simplify Your Funding: Quick and Easy Business Loans
Simplify Your Funding: Quick and Easy Business LoansSimplify Your Funding: Quick and Easy Business Loans
Simplify Your Funding: Quick and Easy Business LoansNugget Global
 
Entrepreneurial ecosystem- Wider context
Entrepreneurial ecosystem- Wider contextEntrepreneurial ecosystem- Wider context
Entrepreneurial ecosystem- Wider contextP&CO
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamArik Fletcher
 
Implementing Exponential Accelerators.pptx
Implementing Exponential Accelerators.pptxImplementing Exponential Accelerators.pptx
Implementing Exponential Accelerators.pptxRich Reba
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers referencessuser2c065e
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdfChris Skinner
 
Data Analytics Strategy Toolkit and Templates
Data Analytics Strategy Toolkit and TemplatesData Analytics Strategy Toolkit and Templates
Data Analytics Strategy Toolkit and TemplatesAurelien Domont, MBA
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfJamesConcepcion7
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerAggregage
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterJamesConcepcion7
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingrajputmeenakshi733
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...ssuserf63bd7
 
Customizable Contents Restoration Training
Customizable Contents Restoration TrainingCustomizable Contents Restoration Training
Customizable Contents Restoration TrainingCalvinarnold843
 
14680-51-4.pdf Good quality CAS Good quality CAS
14680-51-4.pdf  Good  quality CAS Good  quality CAS14680-51-4.pdf  Good  quality CAS Good  quality CAS
14680-51-4.pdf Good quality CAS Good quality CAScathy664059
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifeBhavana Pujan Kendra
 
5-Step Framework to Convert Any Business into a Wealth Generation Machine.pdf
5-Step Framework to Convert Any Business into a Wealth Generation Machine.pdf5-Step Framework to Convert Any Business into a Wealth Generation Machine.pdf
5-Step Framework to Convert Any Business into a Wealth Generation Machine.pdfSherl Simon
 

Recently uploaded (20)

Types of Cyberattacks - ASG I.T. Consulting.pdf
Types of Cyberattacks - ASG I.T. Consulting.pdfTypes of Cyberattacks - ASG I.T. Consulting.pdf
Types of Cyberattacks - ASG I.T. Consulting.pdf
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
Simplify Your Funding: Quick and Easy Business Loans
Simplify Your Funding: Quick and Easy Business LoansSimplify Your Funding: Quick and Easy Business Loans
Simplify Your Funding: Quick and Easy Business Loans
 
Entrepreneurial ecosystem- Wider context
Entrepreneurial ecosystem- Wider contextEntrepreneurial ecosystem- Wider context
Entrepreneurial ecosystem- Wider context
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management Team
 
Toyota and Seven Parts Storage Techniques
Toyota and Seven Parts Storage TechniquesToyota and Seven Parts Storage Techniques
Toyota and Seven Parts Storage Techniques
 
Implementing Exponential Accelerators.pptx
Implementing Exponential Accelerators.pptxImplementing Exponential Accelerators.pptx
Implementing Exponential Accelerators.pptx
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers reference
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
 
Data Analytics Strategy Toolkit and Templates
Data Analytics Strategy Toolkit and TemplatesData Analytics Strategy Toolkit and Templates
Data Analytics Strategy Toolkit and Templates
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdf
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon Harmer
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare Newsletter
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors Data
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketing
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
 
Customizable Contents Restoration Training
Customizable Contents Restoration TrainingCustomizable Contents Restoration Training
Customizable Contents Restoration Training
 
14680-51-4.pdf Good quality CAS Good quality CAS
14680-51-4.pdf  Good  quality CAS Good  quality CAS14680-51-4.pdf  Good  quality CAS Good  quality CAS
14680-51-4.pdf Good quality CAS Good quality CAS
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in Life
 
5-Step Framework to Convert Any Business into a Wealth Generation Machine.pdf
5-Step Framework to Convert Any Business into a Wealth Generation Machine.pdf5-Step Framework to Convert Any Business into a Wealth Generation Machine.pdf
5-Step Framework to Convert Any Business into a Wealth Generation Machine.pdf
 

Asterisk World2008

  • 1. Open Telephony The FreePBX ® Way Presented at Asterisk World, 2008 San Jose by Philippe Lindheimer FreePBX Project Leader http://freepbx.org
  • 2. What is Open Telephony? +
  • 3. A Revolutionary Telephony Platform is Born
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.  
  • 10.  
  • 11.  
  • 12.  
  • 13.  
  • 14.  
  • 15.  
  • 16.  
  • 17.  
  • 18.  
  • 19.  
  • 20.  
  • 21.  
  • 22.  
  • 23.  
  • 24.
  • 25. The End Thank You for Listening http://freepbx.org
  • 26.
  • 27.  
  • 28.  
  • 29.  
  • 30.  
  • 31.  
  • 32.  
  • 33.  
  • 34.  
  • 35.  
  • 36.  
  • 37.  
  • 38.  
  • 39.  
  • 40.  
  • 41.  
  • 42.  
  • 43.  
  • 44.  
  • 45.  
  • 46.  
  • 47.  
  • 48.  
  • 49.  
  • 50.  
  • 51.  
  • 52.  
  • 53.  
  • 54.  
  • 55.  
  • 56.  
  • 57.  
  • 58.  
  • 59. Return from IVR Making complex IVR trees Day IVR Sales Support Billing 1 2 3 Night IVR Sales Support Billing Msg 1 2 3 Support IVR Residental Contractors Main Menu 1 2 9 Return to IVR Tip: Use “Return to IVR” with IVR’s and Announcements that will be called from multiple parents.
  • 60.
  • 61.
  • 62.
  • 63. CallerID Handling Originated Call From User or Forwarded Call (CF, Follow-Me, etc.) Emer- gency Route Emer- gency CID? Intra- Company Outbound CID Trunk CID Trunk CID Set Never Overide CID CID Set? Trunk CID? Use Emer- gency CID Use Internal CID Use Outboundcid Use Trunk CID Yes Yes Yes No Yes No No No Use Extension (Undefined Results) No Use Forwarded CID Use Trunk CID Use Trunk CID No CID Transmitted No No No Outbound Call Flow CallerID Yes No Yes Yes Yes If CallerID(name) == “hidden” (“hidden” <2124351234>) SetCallerPres(prohib_passed_screen) Internal Caller?
  • 64. DUNDi 101 - Redundancy Outbound Call Flow DUNDi & Branch Offices Chicago Ann Arbor Cleveland Indianapolis Milwaukee Detroit Madison IAX Trunk Media Path
  • 65. Advanced FreePBX Features VmX™ & Follow-Me Dial Attempt Aleternative Optional 0 or 2 VmX Locater™ Incoming Call Unavail Msg #home #cell Voice Mail System Confirmation Cell Voicemail ANSWER VmX Locater™ Busy Msg Busy # or No choice Press 1 No Answer
  • 66. FreePBX Internals Architecture Module Plugin Logic LAMPA Stack (Linux – Apache – MySQL – PHP – Asterisk) FreePBX Core Application Libraries Module Plugin Libraries FreePBX Core Dialplan Objects Module Plugin Objects Authorization / Security FreePBX Framework and Core Logic FreePBX Core API Module Plugin API FreePBX GUI Module Plugin GUI FreePBX Config MySQL DB
  • 67. FreePBX Internals Architecture FreePBX GUI Business Logic MySQL Config Storage Dialplan Generation & Business Logic Astdb Asterisk Environment page.dispname.php functions.inc.php retrieve_conf Dialplan & Configuration files voicemail.conf AGI & System Scripts
  • 68. Inbound Call Flow Types of Modules extension, vm or featurecode extension, vm or featurecode From Previous Module Destination Modules Multi-Destination Modules (e.g. IVR, Time-Conditions, Day/Night Control) From Previous Module Destination Module (or extension, vm, featurecode) Simple Module (e.g. Announcement) extension, vm or featurecode Destination Module (or extension, vm, featurecode) From Previous Module Common Module (e.g. Ring Group, Queues, Follow-Me)