SlideShare una empresa de Scribd logo
1 de 9
WIRESHARK AND ASTERISK
THE FUTURE OF TELECOMMUNICATION NETWORKS
PRESENTED BY:
USMAN AHMAD I100390
SHAHBAZ ALI I100565
IMRAN AHMAD I100374
INTRODUCTION TO WIRESHARK AND ASTERISK
• Asterisk is a software which allows us to create a PBX, and IVR, a conference bridge
or any other virtual communication app one could imagine.
• It provides the functionalities of a PBX and it allows us to connect to other IP networks as well.
• Wireshark is a network packet analyzer software.
• A network packet analyzer captures the network packets and displays the information these packets carry.
• Previously the packet analyzing was very difficult and it required expensive hardware.
• Wireshark is one of the best open source packet analyzer available.
ASTERISK - CALL FLOW (CONT’D.)
• Different messages which are exchanged during a call setup are:
• [from-my-pri]
• exten => 14109850123,1,Answer
• exten => 14109850123,2,Wait(2)
• exten => 14109850123,3,Playback(monkeys)
• exten => 14109850123,4,Goto(more-monkeys,123,1)
• [more-monkeys]
• exten => _12X,1,Playback(sorry-no-more-monkeys)
• exten => _12X,2,Hangup
ASTERISK - REFERENCES
• http://www.asterisk.org/ - Latest Source Code
• http://www.digium.com/ - Asterisk TDM hardware
• http://www.voip-info.org/ - General VoIP How-To Info
• http://www.xten.com/ - Softphone
• http://www.asterisk-vonage.com/ - Asterisk to Vonage connectivity
• http://www.binary-systems.com/ - Asterisk Consulting & Training Services
CONFIGURATIONS OF
ASTERISK AND ZOIPER
VMWARE, UBUNTU 12.04, ASTERISK & ZOIPER
o Installation of VMware Work Station
o Installation of Ubuntu 12.04 Desktop 32 bit
o Update Ubuntu server
apt-get update && apt-get upgrade -y && reboot
o Dependencies (In order to compile and install Asterisk, you'll need to install a C compiler and a number of system libraries on your
system)
apt-get install build-essential wget libssl-dev libncurses5-dev libnewt-dev libxml2-dev linux-headers-$(uname -r) libsqlite3-dev uuid-ev
o DAHDI (Digium Asterisk Hardware Device Interface), libpri and Asterisk Installation
cd /usr/src/
wget http://downloads.asterisk.org/pub/telephony/dahdi-linux-complete/dahdi-linux-complete-current.tar.gz
wget http://downloads.asterisk.org/pub/telephony/libpri/libpri-1.4-current.tar.gz
wget http://downloads.asterisk.org/pub/telephony/asterisk/asterisk-11-current.tar.gz
o Extraction of tarballs
tar zxvf dahdi-linux-complete*
tar zxvf libpri*
tar zxvf asterisk*
VMWARE, UBUNTU 12.04, ASTERISK & ZOIPER
o Installation of DAHDI
cd /usr/src/dahdi-linux-complete*
make && make install && make config
o Installation of libpri
cd /usr/src/libpri*
make && make install
o Asterisk Installation
cd /usr/src/asterisk*
./configure && make menuselect && make && make install && make config && make samples
o Starting DAHDI
/etc/init.d/dahdi start
o Starting Asterisk and CLI
/etc/init.d/asterisk start
asterisk -rvvv
CONTINUED..
o modules.conf
Codecs, protocols, pads
o extensions.conf
exten users
o sip.conf
User registration
o Zoiper entry of users & Configurations
VoIP Protocol: SIP
Codecs: A-Law & μ-Law (G.711)
G.711 is a high quality coded for speech. It is a 64 kB bitrate codec based on 8 kS/S sampling of speech
with 8 bits resolution. G.711 uses logarithmic PCM (pulse code modulation)
μ-Law: This codec encodes 14-bit linear PCM audio samples into 8-bit logarithmic samples (American)
A-Law: 13 bit linear PCM into 8-bit logarithmic samples (European)
Call features: app_hangup.so
app_dial.so
app_transfer.so
app_hold.so

Más contenido relacionado

La actualidad más candente

FreeLix: Semplicità & Controllo
FreeLix: Semplicità & ControlloFreeLix: Semplicità & Controllo
FreeLix: Semplicità & ControlloValerio Balbi
 
IPv6 for Pentesters
IPv6 for PentestersIPv6 for Pentesters
IPv6 for Pentesterscamsec
 
Basic Cisco 800 Router Configuration for Internet Access
Basic Cisco 800 Router Configuration for Internet AccessBasic Cisco 800 Router Configuration for Internet Access
Basic Cisco 800 Router Configuration for Internet AccessHarris Andrea
 
IP tables
IP tablesIP tables
IP tablesaamodt
 
Configuring Ip Sec Between A Router And A Pix
Configuring Ip Sec Between A Router And A PixConfiguring Ip Sec Between A Router And A Pix
Configuring Ip Sec Between A Router And A Pixangelitoh11
 
20141102 VyOS 1.1.0 and NIFTY Cloud New Features
20141102 VyOS 1.1.0 and NIFTY Cloud New Features20141102 VyOS 1.1.0 and NIFTY Cloud New Features
20141102 VyOS 1.1.0 and NIFTY Cloud New Features雄也 日下部
 
2014 Security Onion Conference
2014 Security Onion Conference2014 Security Onion Conference
2014 Security Onion ConferenceDefensiveDepth
 
Wireshark.ethereal
Wireshark.etherealWireshark.ethereal
Wireshark.etherealgh02
 
KubeCon EU 2016: What is OpenStack's role in a Kubernetes world?
KubeCon EU 2016: What is OpenStack's role in a Kubernetes world?KubeCon EU 2016: What is OpenStack's role in a Kubernetes world?
KubeCon EU 2016: What is OpenStack's role in a Kubernetes world?KubeAcademy
 
See what happened with real time kvm when building real time cloud pezhang@re...
See what happened with real time kvm when building real time cloud pezhang@re...See what happened with real time kvm when building real time cloud pezhang@re...
See what happened with real time kvm when building real time cloud pezhang@re...LinuxCon ContainerCon CloudOpen China
 
Nxll12 zone based firewall
Nxll12 zone based firewallNxll12 zone based firewall
Nxll12 zone based firewallNetwax Lab
 
In depth understanding network security
In depth understanding network securityIn depth understanding network security
In depth understanding network securityThanawan Tuamyim
 

La actualidad más candente (20)

FreeLix: Semplicità & Controllo
FreeLix: Semplicità & ControlloFreeLix: Semplicità & Controllo
FreeLix: Semplicità & Controllo
 
SecurityPI - Hardening your IoT endpoints in Home.
SecurityPI - Hardening your IoT endpoints in Home. SecurityPI - Hardening your IoT endpoints in Home.
SecurityPI - Hardening your IoT endpoints in Home.
 
IPv6 for Pentesters
IPv6 for PentestersIPv6 for Pentesters
IPv6 for Pentesters
 
Ip tables
Ip tablesIp tables
Ip tables
 
Basic Cisco 800 Router Configuration for Internet Access
Basic Cisco 800 Router Configuration for Internet AccessBasic Cisco 800 Router Configuration for Internet Access
Basic Cisco 800 Router Configuration for Internet Access
 
Nat64 server
Nat64 serverNat64 server
Nat64 server
 
IP tables
IP tablesIP tables
IP tables
 
Configuring Ip Sec Between A Router And A Pix
Configuring Ip Sec Between A Router And A PixConfiguring Ip Sec Between A Router And A Pix
Configuring Ip Sec Between A Router And A Pix
 
20141102 VyOS 1.1.0 and NIFTY Cloud New Features
20141102 VyOS 1.1.0 and NIFTY Cloud New Features20141102 VyOS 1.1.0 and NIFTY Cloud New Features
20141102 VyOS 1.1.0 and NIFTY Cloud New Features
 
Icnd210 s05l02
Icnd210 s05l02Icnd210 s05l02
Icnd210 s05l02
 
2014 Security Onion Conference
2014 Security Onion Conference2014 Security Onion Conference
2014 Security Onion Conference
 
Wireshark.ethereal
Wireshark.etherealWireshark.ethereal
Wireshark.ethereal
 
KubeCon EU 2016: What is OpenStack's role in a Kubernetes world?
KubeCon EU 2016: What is OpenStack's role in a Kubernetes world?KubeCon EU 2016: What is OpenStack's role in a Kubernetes world?
KubeCon EU 2016: What is OpenStack's role in a Kubernetes world?
 
Iptables presentation
Iptables presentationIptables presentation
Iptables presentation
 
Linux router
Linux routerLinux router
Linux router
 
Netmiko library
Netmiko libraryNetmiko library
Netmiko library
 
IPV6 Under the Hood
IPV6 Under the HoodIPV6 Under the Hood
IPV6 Under the Hood
 
See what happened with real time kvm when building real time cloud pezhang@re...
See what happened with real time kvm when building real time cloud pezhang@re...See what happened with real time kvm when building real time cloud pezhang@re...
See what happened with real time kvm when building real time cloud pezhang@re...
 
Nxll12 zone based firewall
Nxll12 zone based firewallNxll12 zone based firewall
Nxll12 zone based firewall
 
In depth understanding network security
In depth understanding network securityIn depth understanding network security
In depth understanding network security
 

Destacado

Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)Savvius, Inc
 
Wi-Fi Opportunities In A 4G World
Wi-Fi Opportunities In A 4G WorldWi-Fi Opportunities In A 4G World
Wi-Fi Opportunities In A 4G WorldBrough Turner
 
Soluciones con Gateway/Router VoIP para Elastix
Soluciones con Gateway/Router VoIP para ElastixSoluciones con Gateway/Router VoIP para Elastix
Soluciones con Gateway/Router VoIP para ElastixPaloSanto Solutions
 
Visio wireshark display filters2
Visio wireshark display filters2Visio wireshark display filters2
Visio wireshark display filters2Jorge_Rod
 
Packet analyzing with wireshark-basic of packet analyzing - Episode_02
Packet analyzing with wireshark-basic of packet analyzing - Episode_02Packet analyzing with wireshark-basic of packet analyzing - Episode_02
Packet analyzing with wireshark-basic of packet analyzing - Episode_02Dhananja Kariyawasam
 
PRESENTATION TASK OF IEEE WRITING FORMAT
PRESENTATION TASK OF IEEE WRITING FORMAT PRESENTATION TASK OF IEEE WRITING FORMAT
PRESENTATION TASK OF IEEE WRITING FORMAT Raessa Fathul Alim
 
Business Case for Providing Public WiFi
Business Case for Providing Public WiFiBusiness Case for Providing Public WiFi
Business Case for Providing Public WiFiChad Williams
 
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...Savvius, Inc
 
Voice Quality Metrics in VoIP
Voice Quality Metrics in VoIPVoice Quality Metrics in VoIP
Voice Quality Metrics in VoIPFraj Alshahibi
 
New Ways to Generate Revenues from Public Wi-Fi
New Ways to Generate Revenues from Public Wi-FiNew Ways to Generate Revenues from Public Wi-Fi
New Ways to Generate Revenues from Public Wi-FiWi-Fi 360
 
IEEE report on Advanced Sensor
IEEE report on Advanced SensorIEEE report on Advanced Sensor
IEEE report on Advanced SensorGaurav Maniar
 
WiFi: Current And Future Opportunities
WiFi: Current And Future Opportunities WiFi: Current And Future Opportunities
WiFi: Current And Future Opportunities Peter Jarich
 
TCPdump-Wireshark
TCPdump-WiresharkTCPdump-Wireshark
TCPdump-WiresharkHarsh Singh
 
Introduction to VoIP using SIP
Introduction to VoIP using SIPIntroduction to VoIP using SIP
Introduction to VoIP using SIPKundan Singh
 
Cisco Certifications - A Complete Description of Entry Level to Architect Level
Cisco Certifications -  A Complete Description of Entry Level to Architect LevelCisco Certifications -  A Complete Description of Entry Level to Architect Level
Cisco Certifications - A Complete Description of Entry Level to Architect LevelNetwork Bulls
 
Packet analysis using wireshark
Packet analysis using wiresharkPacket analysis using wireshark
Packet analysis using wiresharkBasaveswar Kureti
 

Destacado (19)

Linux Router Gateway
Linux Router GatewayLinux Router Gateway
Linux Router Gateway
 
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
 
Wi-Fi Opportunities In A 4G World
Wi-Fi Opportunities In A 4G WorldWi-Fi Opportunities In A 4G World
Wi-Fi Opportunities In A 4G World
 
Soluciones con Gateway/Router VoIP para Elastix
Soluciones con Gateway/Router VoIP para ElastixSoluciones con Gateway/Router VoIP para Elastix
Soluciones con Gateway/Router VoIP para Elastix
 
Visio wireshark display filters2
Visio wireshark display filters2Visio wireshark display filters2
Visio wireshark display filters2
 
Packet analyzing with wireshark-basic of packet analyzing - Episode_02
Packet analyzing with wireshark-basic of packet analyzing - Episode_02Packet analyzing with wireshark-basic of packet analyzing - Episode_02
Packet analyzing with wireshark-basic of packet analyzing - Episode_02
 
PRESENTATION TASK OF IEEE WRITING FORMAT
PRESENTATION TASK OF IEEE WRITING FORMAT PRESENTATION TASK OF IEEE WRITING FORMAT
PRESENTATION TASK OF IEEE WRITING FORMAT
 
Business Case for Providing Public WiFi
Business Case for Providing Public WiFiBusiness Case for Providing Public WiFi
Business Case for Providing Public WiFi
 
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
 
Voice Quality Metrics in VoIP
Voice Quality Metrics in VoIPVoice Quality Metrics in VoIP
Voice Quality Metrics in VoIP
 
New Ways to Generate Revenues from Public Wi-Fi
New Ways to Generate Revenues from Public Wi-FiNew Ways to Generate Revenues from Public Wi-Fi
New Ways to Generate Revenues from Public Wi-Fi
 
IEEE report on Advanced Sensor
IEEE report on Advanced SensorIEEE report on Advanced Sensor
IEEE report on Advanced Sensor
 
Monetizing WiFi
Monetizing WiFiMonetizing WiFi
Monetizing WiFi
 
WiFi: Current And Future Opportunities
WiFi: Current And Future Opportunities WiFi: Current And Future Opportunities
WiFi: Current And Future Opportunities
 
TCPdump-Wireshark
TCPdump-WiresharkTCPdump-Wireshark
TCPdump-Wireshark
 
Introduction to VoIP using SIP
Introduction to VoIP using SIPIntroduction to VoIP using SIP
Introduction to VoIP using SIP
 
Wireshark
WiresharkWireshark
Wireshark
 
Cisco Certifications - A Complete Description of Entry Level to Architect Level
Cisco Certifications -  A Complete Description of Entry Level to Architect LevelCisco Certifications -  A Complete Description of Entry Level to Architect Level
Cisco Certifications - A Complete Description of Entry Level to Architect Level
 
Packet analysis using wireshark
Packet analysis using wiresharkPacket analysis using wireshark
Packet analysis using wireshark
 

Similar a Wireshark and asterisk

Jonny_Martin-Asterisk
Jonny_Martin-AsteriskJonny_Martin-Asterisk
Jonny_Martin-Asterisktutorialsruby
 
Jonny_Martin-Asterisk
Jonny_Martin-AsteriskJonny_Martin-Asterisk
Jonny_Martin-Asterisktutorialsruby
 
Jonny_Martin-Asterisk
Jonny_Martin-AsteriskJonny_Martin-Asterisk
Jonny_Martin-Asterisktutorialsruby
 
Jonny_Martin-Asterisk
Jonny_Martin-AsteriskJonny_Martin-Asterisk
Jonny_Martin-Asterisktutorialsruby
 
Asterisk quick start Guide
Asterisk quick start GuideAsterisk quick start Guide
Asterisk quick start GuideKing Asterisk
 
Bh fed-03-kaminsky
Bh fed-03-kaminskyBh fed-03-kaminsky
Bh fed-03-kaminskyDan Kaminsky
 
FreeSWITCH on Docker
FreeSWITCH on DockerFreeSWITCH on Docker
FreeSWITCH on Docker建澄 吳
 
Rasperry Pi and TI CC2650 IPv6 border router
Rasperry Pi and TI CC2650 IPv6 border routerRasperry Pi and TI CC2650 IPv6 border router
Rasperry Pi and TI CC2650 IPv6 border routerNikolaos Monios
 
2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)Mike Svoboda
 
First Steps Developing Embedded Applications using Heterogeneous Multi-core P...
First Steps Developing Embedded Applications using Heterogeneous Multi-core P...First Steps Developing Embedded Applications using Heterogeneous Multi-core P...
First Steps Developing Embedded Applications using Heterogeneous Multi-core P...Toradex
 
an_introduction_to_network_analyzers_new.ppt
an_introduction_to_network_analyzers_new.pptan_introduction_to_network_analyzers_new.ppt
an_introduction_to_network_analyzers_new.pptIwan89629
 
OSDC 2014: Nat Morris - Open Network Install Environment
OSDC 2014: Nat Morris - Open Network Install EnvironmentOSDC 2014: Nat Morris - Open Network Install Environment
OSDC 2014: Nat Morris - Open Network Install EnvironmentNETWAYS
 
Republic of IoT 2018 - ESPectro32 and NB-IoT Workshop
Republic of IoT 2018 - ESPectro32 and NB-IoT WorkshopRepublic of IoT 2018 - ESPectro32 and NB-IoT Workshop
Republic of IoT 2018 - ESPectro32 and NB-IoT WorkshopAlwin Arrasyid
 
Open bts guide_en_v0.1 (2)
Open bts guide_en_v0.1 (2)Open bts guide_en_v0.1 (2)
Open bts guide_en_v0.1 (2)Mamoud Kamara
 
"One network to rule them all" - OpenStack Summit Austin 2016
"One network to rule them all" - OpenStack Summit Austin 2016"One network to rule them all" - OpenStack Summit Austin 2016
"One network to rule them all" - OpenStack Summit Austin 2016Phil Estes
 
LF_OVS_17_OVS-DPDK Installation and Gotchas
LF_OVS_17_OVS-DPDK Installation and GotchasLF_OVS_17_OVS-DPDK Installation and Gotchas
LF_OVS_17_OVS-DPDK Installation and GotchasLF_OpenvSwitch
 

Similar a Wireshark and asterisk (20)

Jonny_Martin-Asterisk
Jonny_Martin-AsteriskJonny_Martin-Asterisk
Jonny_Martin-Asterisk
 
Jonny_Martin-Asterisk
Jonny_Martin-AsteriskJonny_Martin-Asterisk
Jonny_Martin-Asterisk
 
Jonny_Martin-Asterisk
Jonny_Martin-AsteriskJonny_Martin-Asterisk
Jonny_Martin-Asterisk
 
Jonny_Martin-Asterisk
Jonny_Martin-AsteriskJonny_Martin-Asterisk
Jonny_Martin-Asterisk
 
Kismet
KismetKismet
Kismet
 
Asterisk quick start Guide
Asterisk quick start GuideAsterisk quick start Guide
Asterisk quick start Guide
 
Asterisk quick start Guide
Asterisk quick start Guide Asterisk quick start Guide
Asterisk quick start Guide
 
Bh fed-03-kaminsky
Bh fed-03-kaminskyBh fed-03-kaminsky
Bh fed-03-kaminsky
 
FreeSWITCH on Docker
FreeSWITCH on DockerFreeSWITCH on Docker
FreeSWITCH on Docker
 
FreeSWITCH on Docker
FreeSWITCH on DockerFreeSWITCH on Docker
FreeSWITCH on Docker
 
Rasperry Pi and TI CC2650 IPv6 border router
Rasperry Pi and TI CC2650 IPv6 border routerRasperry Pi and TI CC2650 IPv6 border router
Rasperry Pi and TI CC2650 IPv6 border router
 
2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)
 
Rac on NFS
Rac on NFSRac on NFS
Rac on NFS
 
First Steps Developing Embedded Applications using Heterogeneous Multi-core P...
First Steps Developing Embedded Applications using Heterogeneous Multi-core P...First Steps Developing Embedded Applications using Heterogeneous Multi-core P...
First Steps Developing Embedded Applications using Heterogeneous Multi-core P...
 
an_introduction_to_network_analyzers_new.ppt
an_introduction_to_network_analyzers_new.pptan_introduction_to_network_analyzers_new.ppt
an_introduction_to_network_analyzers_new.ppt
 
OSDC 2014: Nat Morris - Open Network Install Environment
OSDC 2014: Nat Morris - Open Network Install EnvironmentOSDC 2014: Nat Morris - Open Network Install Environment
OSDC 2014: Nat Morris - Open Network Install Environment
 
Republic of IoT 2018 - ESPectro32 and NB-IoT Workshop
Republic of IoT 2018 - ESPectro32 and NB-IoT WorkshopRepublic of IoT 2018 - ESPectro32 and NB-IoT Workshop
Republic of IoT 2018 - ESPectro32 and NB-IoT Workshop
 
Open bts guide_en_v0.1 (2)
Open bts guide_en_v0.1 (2)Open bts guide_en_v0.1 (2)
Open bts guide_en_v0.1 (2)
 
"One network to rule them all" - OpenStack Summit Austin 2016
"One network to rule them all" - OpenStack Summit Austin 2016"One network to rule them all" - OpenStack Summit Austin 2016
"One network to rule them all" - OpenStack Summit Austin 2016
 
LF_OVS_17_OVS-DPDK Installation and Gotchas
LF_OVS_17_OVS-DPDK Installation and GotchasLF_OVS_17_OVS-DPDK Installation and Gotchas
LF_OVS_17_OVS-DPDK Installation and Gotchas
 

Último

Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideStefan Dietze
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Paige Cruz
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 

Último (20)

Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 

Wireshark and asterisk

  • 1. WIRESHARK AND ASTERISK THE FUTURE OF TELECOMMUNICATION NETWORKS PRESENTED BY: USMAN AHMAD I100390 SHAHBAZ ALI I100565 IMRAN AHMAD I100374
  • 2. INTRODUCTION TO WIRESHARK AND ASTERISK • Asterisk is a software which allows us to create a PBX, and IVR, a conference bridge or any other virtual communication app one could imagine. • It provides the functionalities of a PBX and it allows us to connect to other IP networks as well. • Wireshark is a network packet analyzer software. • A network packet analyzer captures the network packets and displays the information these packets carry. • Previously the packet analyzing was very difficult and it required expensive hardware. • Wireshark is one of the best open source packet analyzer available.
  • 3. ASTERISK - CALL FLOW (CONT’D.) • Different messages which are exchanged during a call setup are: • [from-my-pri] • exten => 14109850123,1,Answer • exten => 14109850123,2,Wait(2) • exten => 14109850123,3,Playback(monkeys) • exten => 14109850123,4,Goto(more-monkeys,123,1) • [more-monkeys] • exten => _12X,1,Playback(sorry-no-more-monkeys) • exten => _12X,2,Hangup
  • 4. ASTERISK - REFERENCES • http://www.asterisk.org/ - Latest Source Code • http://www.digium.com/ - Asterisk TDM hardware • http://www.voip-info.org/ - General VoIP How-To Info • http://www.xten.com/ - Softphone • http://www.asterisk-vonage.com/ - Asterisk to Vonage connectivity • http://www.binary-systems.com/ - Asterisk Consulting & Training Services
  • 6. VMWARE, UBUNTU 12.04, ASTERISK & ZOIPER o Installation of VMware Work Station o Installation of Ubuntu 12.04 Desktop 32 bit o Update Ubuntu server apt-get update && apt-get upgrade -y && reboot o Dependencies (In order to compile and install Asterisk, you'll need to install a C compiler and a number of system libraries on your system) apt-get install build-essential wget libssl-dev libncurses5-dev libnewt-dev libxml2-dev linux-headers-$(uname -r) libsqlite3-dev uuid-ev o DAHDI (Digium Asterisk Hardware Device Interface), libpri and Asterisk Installation cd /usr/src/ wget http://downloads.asterisk.org/pub/telephony/dahdi-linux-complete/dahdi-linux-complete-current.tar.gz wget http://downloads.asterisk.org/pub/telephony/libpri/libpri-1.4-current.tar.gz wget http://downloads.asterisk.org/pub/telephony/asterisk/asterisk-11-current.tar.gz o Extraction of tarballs tar zxvf dahdi-linux-complete* tar zxvf libpri* tar zxvf asterisk*
  • 7. VMWARE, UBUNTU 12.04, ASTERISK & ZOIPER o Installation of DAHDI cd /usr/src/dahdi-linux-complete* make && make install && make config o Installation of libpri cd /usr/src/libpri* make && make install o Asterisk Installation cd /usr/src/asterisk* ./configure && make menuselect && make && make install && make config && make samples o Starting DAHDI /etc/init.d/dahdi start o Starting Asterisk and CLI /etc/init.d/asterisk start asterisk -rvvv
  • 8. CONTINUED.. o modules.conf Codecs, protocols, pads o extensions.conf exten users o sip.conf User registration o Zoiper entry of users & Configurations
  • 9. VoIP Protocol: SIP Codecs: A-Law & μ-Law (G.711) G.711 is a high quality coded for speech. It is a 64 kB bitrate codec based on 8 kS/S sampling of speech with 8 bits resolution. G.711 uses logarithmic PCM (pulse code modulation) μ-Law: This codec encodes 14-bit linear PCM audio samples into 8-bit logarithmic samples (American) A-Law: 13 bit linear PCM into 8-bit logarithmic samples (European) Call features: app_hangup.so app_dial.so app_transfer.so app_hold.so