Asterisk Deployments
Upcoming SlideShare
Loading in...5

Like this? Share it with your network


Asterisk Deployments

Uploaded on

Asterisk Deployment in Large Enterprise and Cloud Solutions

Asterisk Deployment in Large Enterprise and Cloud Solutions

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads


Total Views
On Slideshare
From Embeds
Number of Embeds



Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

    No notes for slide


  • 1. Asterisk Deployment inLarge Enterprise and Cloud Solutions Ali Pey Sr. Software Eng Architect Wed Jan 30, 2013
  • 2. Cloud Services for Business• eFax®• eVoice®• FuseMail®• Campaigner®• KeepItSafe®• Onebox®• 2
  • 3. Outline• Why Asterisk?• What can you do with Asterisk?• Network Diagrams• Large Enterprise and Could requirements• *** Proxy Servers (SBCs)• Load balancing, routing and failure detection• Security• NAT• Questions? 3
  • 4. Why Asterisk? (1/3)• It is Open Source• It has a Community – Numerous companies and resources – Forums, mailing lists – Tools• No Cost Open Source is revamping telecom 4
  • 5. Why Asterisk? (2/3)• More Independence (Not depending on a single company)• Continued Enhancements – The community is growing so are the features – Interoperability – WebRTC 5
  • 6. Why Asterisk? (3/3)• Flexibility, Customization and Integration – Integrates with your back end – Business Logic Integration – Database Integration – Special Features or Requirements 6
  • 7. What can you do with Asterisk? (1/3)• Make a phone Call• Conference, Hold, Transfer, Park, Announcement, Click to call, and many many more.• Basically any Telephony Feature you can imagine 7
  • 8. What can you do with Asterisk? (2/3)• Connect Phones/Clients: – Analog – SIP Phones – Soft phone – Web phone – Mobile – WebRTC• Trunks: – IP (SIP) – Digital: T1/E1 – Analog 8
  • 9. What can you do with Asterisk? (3/3)• PBX• Telephony and Voice Applications• Presence and BLF• Google Voice and WebRTC• Conferencing, Video, Fax, Auto Attendant, etc. etc.• The question is: What can’t you do with Asterisk? 9
  • 10. Diagram 1 - SIP Clients: SIP Phones, Soft phones,Web Phones, Mobile or even WebRTC 10
  • 11. Diagram 2: SIP Trunks 11
  • 12. Diagram 3 - Analog/Digital Cards/Gateways(Single point of failure) 12
  • 13. Large Enterprise and Cloud Solutions (or simply: Bigger Systems)• Redundancy• High Availability (Failure Detection)• Distribution and Routing Rules• Performance and Reliability• Security• NAT Traversal 13
  • 14. Proxy Servers What is a Proxy Server? (1/2)• Registrar Server for Clients• Routing, Rules, Failure Detection and Re- Routing• SIP Signaling, Codec and Digit Manipulation• Load Balancing• Scripting• Resource Allocation• Rate Limiting 14
  • 15. What is a Proxy Server? (2/2)• NAT Traversal• Media Proxy (or Direct Media Path)• Performance• Redundancy and High Availability• Security and Authentication 15
  • 16. Two Asterisk Servers and One Proxy Server 16
  • 17. Two Asterisk – Two Proxy servers 17
  • 18. Fully Redundant Distributed Environment 18
  • 19. Proxy Servers (SBCs)• Open Source vs. Commercial 19
  • 20. Open Source Proxy Servers• OpenSIPS• Kamailio• OverSIP (Ruby, WebSocket) 20
  • 21. Commercial SBCs (Session Border Controller)• Acme Packet• Dialogic• Audiocodes• Sonus• And quite a few others 21
  • 22. Fully Redundant Large Enterprise and Could Solution• Performance• Redundancy• High Availability• Routing, Rules, Load Balancing and Distribution• Security• NAT Traversal 22
  • 23. Performance, Redundancy, High Availability and Distribution 23
  • 24. Call Flow Diagram Examples• SIP Phone to SIP Phone Call• SIP Phone to SIP Trunk Call• SIP Trunk to SIP Trunk Call• Analog (Trunk or Phone) to SIP Trunk Call 24
  • 25. Call Routing• Load Balancing• Resources• Dynamic Routing• Rules• Failure detection 25
  • 26. Security• Sooner or later• Close network vs. Open and in between• What to look for?• What to examine?• Each deployment has its own unique characteristics that can make it safe.• Secure VoIP – Insecure system => Call patterns 26
  • 27. NAT• What is NAT?• Public IP vs. Private IP• SIP Signaling• Media 27
  • 28. Questions? 28
  • 29. 29