INTERACTIVE VOICE RESPONSE WITH AUTOMATED SPEECH RECOGNITION AND BIOMETRICS FOR BANWEB

Size: px
Start display at page:

Download "INTERACTIVE VOICE RESPONSE WITH AUTOMATED SPEECH RECOGNITION AND BIOMETRICS FOR BANWEB"

Transcription

1 SCHOOL OF ENGINEERING AND APPLIED SCIENCE THE GEORGE WASHINGTON UNIVERSITY PROJECT REPORT INTERACTIVE VOICE RESPONSE WITH AUTOMATED SPEECH RECOGNITION AND BIOMETRICS FOR BANWEB Group Name Telecommunication For Academic Purpose Presented By Jaywant Kapadnis Mandar Patil Parameswaran Krishnan

2 Abstract In this project we have created a student s university account called BanWeb for GWU using Freeswitch. A student can simply dial their University ID number (i.e. Gworld Number) and access their University account which contains their Academic, Employment and Personal information s. A completely automated and secure system is created using Biometrics like Voice Recognition and Speech operated IVR.

3 Contents Chapter 1 Block Diagram and Flow Chart 1 Chapter 2 All you need to know about Freeswitch 3 Chapter 3 Biometrics Voice Recognition 4 Chapter 4 Speech Operated IVR 6 Chapter 5 Data Base Connect 7 Chapter 6 Hacking Banweb Server 8

4 1 Chapter 1 Block Diagram And Flow Chart The block diagram consists of three major parts Freeswitch, Matlab and Database. The student initially uses a softphone (X-Lite 4) to establish a to their university banweb account by dialing their Gworld number. This extension initiates a lua script. This lua script calls matlab and runs a matlab program for voice recognition. After the user authentication matlab returns variables to lua which then calls a javascript. Now using javascript, a speech operated IVR is built which provides direct student interaction and their banweb menu is accessed. All the data in is extracted from a database. Also a facility to edit their banweb information is available with the students.

5 Flow Chart 2

6 3 Chapter 2 All You Need To Know About Freeswitch The best part of freeswitch is that it is an open source software. For this project the latest version of Freeswitch has been used. The open source software was build on Mac OS as well as Windows. A VoIP softphone is used at the ends integrated with freeswitch for communication. X-lite 4, a VoIP softphone is used which uses Session Initiation Protocol and is developed by CounterPath Corperations. The most used feature of Freeswitch is its modules. The modules used in this project are listed below. Applications mod_conference - Conference room module. mod_directory - Dial by Name directory. mod_dptools - Dialplan Tools: provides a number of apps and utilities for the dialplan. mod_fifo - FIFO module. Speech Recognition / Text-to-Speech mod_flite - Free open source Text to Speech. mod_pocketsphinx - Free open source Speech Recognition. Dialplan mod_dialplan_xml - Allows you to program dialplans in XML format. File Formats mod_local_stream - Multiple channels connected to same looped file stream. Languages mod_lua - Lua support. mod_spidermonkey - JavaScript support. o mod_spidermonkey_core_db - JavaScript support for the freeswitch SQLite. o mod_spidermonkey_skel - JavaScript dummy module. o mod_spidermonkey_teletone - JavaScript support for lib_teletone. o mod_spidermonkey_odbc - JavaScript support for ODBC. The most extensively used modules in this project are mod_spidermonkey, mod_lua, mod_flite and mod_pocketsphinx. The basic outer core of the project is based on Lua script which is a powerful, fast, lightweight, embeddable scripting language. Lua combines simple procedural syntax with powerful data description constructs based on associative arrays and

7 4 extensible semantics. Lua is dynamically typed, runs by interpreting bytecode for a registerbased virtual machine, and has automatic memory management with incremental garbage collection, making it ideal for configuration, scripting and rapid prototyping. Mod_flite is an open source text to speech engine that converts the written text to speech. Mod_pocketsphinx allows Freeswitch to recognize speech. This is the basic difference between the two, mod_flite is Text to speech conversion engine and mod_pocketsphinx is used for speech recognition. Mod_pocketsphinx uses 8k and 16k acoustical models, Semi-continuous recognition and is great for smaller grammar. Mod_Spidermonkey is a Mozilla JavaScript (ECMAScript) engine. It supports all the standard JavaScript language elements for example for and while loops, regexps and many others. CHAPTER 3 Biometrics Voice Recognition It was very important to secure the student s account (banweb) over the phone so that no user other than the intended would use it. As voice was the only medium of data transfer it was important that voice recognition be used to secure the interaction. The most common approach to voice recognition is divided into two classes: "template matching" and "feature analysis". Template matching has the highest accuracy when used properly, but it also suffers from the most limitations. In this project the template matching approach of voice recognition is used. Initially when the student registers to this service they have to record their name ten times which would be integrated and used as a template for matching later on when the student logs in by calling. After calling the system by dialing zero followed by their Gworld or Identification number (eg ), the first step is to speak their name. The electrical signal from the microphone is digitized by an "analog-to-digital (A/D) converter", and is stored in memory. To determine the "meaning" of this voice input, the computer attempts to match the input with a digitized voice sample, or template that has a known meaning. This technique is a close analogy to the traditional command inputs from a keyboard. The program contains the input template, and attempts to match this template with the actual input using a simple conditional statement. A more general form of voice recognition is available through feature analysis and this technique usually leads to "speaker-independent" voice recognition. Thus by working on the feature aspect of voice it was possible to get a very precise match to the actual user and also terminate the background noise to a great extent. Matlab Matlab is a very powerful tool to deal with voice. The very powerful voice engine in matlab enables it to perform many operations on any voice file. The following is the block diagram of the function of matlab in the project.

8 An alternate lua program is written so that the user/student can initially record their 10 voice samples to the database which can be used later on for matching. The student on registering to banweb calls on an extension and then records the 10 voice samples. Matlab Program for Voice Recognition with detailed explanation is given below 5 Step 1 Calling the wav file recorded in freeswitch Step 2 Read contents of wav file Step 3 Work out the number of samples are in 2secs Step 4 As our program is designed for samples. These samples are calculated using the recording frequency by changing the recording frequency in dialplan to 44100khz and keeping recording as small as 2 seconds. Write this output resampled wav file to original wav file Step 5 Then the newly recorded file is cropped and placed in a 88200x20 matrix Step 6 The rows of the matrix are truncated to the smallest length of the 10 recordings. Step 7 Convert the individual columns into frequency domain by applying the Fast Fourier Transform. Then take the modulus squared of all the entries in the matrix. Step 8 Normalize the spectra of each recording and place into the matrix fn. Only frequencies up to 600 are needed to represent the speech of most humans. Step 9 Find the average vector Step 10 Normalize the average vector Step 11 Find the Standard Deviation of the matrix of samples of voice, which is recorded, from user. Step 12 The 10 recordings form a database to match with the newly recorded recording of user. Then the 10 recordings are cropped and placed in a 88200x20 matrix Step 13 The rows of the matrix are truncated to the smallest length of the 10 recordings. Step 14 Convert the individual columns into frequency domain by applying the Fast Fourier Transform. Then take the modulus squared of all the entries in the matrix. Step 15 Normalize the spectra of each recording and place into the matrix fn. Only frequencies up to 600 are needed to represent the speech of most humans. Step 16 Find the average vector and normalize the average vector Step 17 Find the Standard Deviation of the pre-recorded samples and Pre-saved doc file is opened and the value in doc file is changed

9 6 Step 18 Here the standard deviation of 10 pre-recorded samples (std )is subtracted from standard deviation (std1) of recorded sample which is to be matched. Step 19 If the voice of user matches with the samples in database then value 1 is written in doc file otherwise 0 is written in it and the value of doc file determines that the user has been authorized to enter in the system or not. CHAPTER 4 Speech Operated IVR Interactive Voice Response (IVR) is an automated telephony system that interacts with callers, gathers information and routes calls to the appropriate destination. IVR allows customers to interact with a company s database by speech recognition, after which they can service their own inquiries by following the IVR dialogue. IVR systems can respond with prerecorded or dynamically generated audio to further direct users on how to proceed. IVR applications can be used to control almost any function where the interface can be broken down into a series of simple interactions. IVR systems deployed in the network are sized to handle large call volumes. In this project the function of IVR is to ease user interface. FreeSWITCH IVRs can be written in any language that FreeSWITCH supports including JavaScript, Python, Perl, Lua and an XML macro format of which JavaScript is used for better result. In order to run JavaScript it is important to load mod_spidermonkey module in freeswitch. The flowchat of the IVR is as given below

10 7 CHAPTER 5 Data Base Connect A database is a system intended to organize, store, and retrieve large amounts of data easily. The reason of implementing a database connection for retrieving information about students is of a vast number of entries and a detailed subsection. Database management is also easy for editing, sorting and searching student details which makes the banweb system more effective. Database also provides secure data transaction with high flexibility. A structured query language MySQL was used to prepare a database with all the entries. A MyPHP Admin server was set up on the host computer and a database named freeswitch was built on it. The database stored student details in the form of text. Each entity was fetched into freeswitch and this was stored in a variable. This variable was read by freeswitch using module mod_flite. These variables were called into freeswitch using PHP. The BANWEB written in JavaScript is as follows: 1. User uses voice-operated options to move ahead in the JavaScript. 2. Main speech detection module used is pocket sphinx with can be loaded in freeswitch and is used in the JavaScript. 3. JSGF grammar files are used which enable the speech detection 4. The Java Speech Grammar Format (JSGF) is a BNF-style, platform-independent, and vendor-independent textual representation of grammars for use in speech recognition. 5. The module defines speech tool and this is used to detect the speech. The basic default language is English. (SpeechTool.jm) 6. JSGF grammar can be defined customized as needed and can be used In the JavaScript. 7. The pocket sphinx uses a default English grammar file. Pocket sphinx uses this dictionary when no other dictionary is specified in the script. 8. We have used the default English grammar, which suffice for the application we have made. 9. When a user says a word or a sentence it is matched with the predefined word or sentence and if the match occurs the script move forward.

11 10. Now user has also been given the privilege to edit few options in the BANWEB 11. The user edited option is saved as a wav file.this wav file can be retrieved by the BANNWEB personnel who then listens to it authenticates it and then writes it in a text file in a database. 12. Now this written document is appropriately fetched by the JavaScript when the user returns the next time he can hear the edited information. 13. Option given editing is, User can hear the recorded information at any given time given that if they precede the BANWEB the second time. 8 CHAPTER 6 Hacking Banweb Server It is important that a student server is secure and the information in it cannot be changed or read easily. In this hacking process a network was setup where a user establishes a call to the banweb server. A Man in the middle attack was initiated. The hacker hacks freeswitch of the user calling the server by sniffing using Address resolution protocol (ARPSPOOF) using Backtrack over the wireless network. This allows attacker to sniff data frames on a wireless local area network. ARPSOOF sends a fake ARP message to a WLAN. The tools used in attacking are SMAP, which was used as a sip scanner, ARPSPOOF and Wireshark to capture the packets. A successfully RTP Capture was made and this was decoded and played back. The portion of the recorded file where the User/Student says their name is clipped and injected while the matlab asks for user authentication. Steps 1. Bridged the Main OS network with VM network and Used SMAP for scanning SIP 2. Call was established between user and server. 3. The packets were captured by the user performing man in the middle attack using resolution protocol (ARPSPOOF) 4. The SIP and RTP packets were captured in wireshark. 5. Now, hacker dials the banweb number and RTP packets are played back into server freeswitch and were able to log in banweb of the user successfully.

Enumerating and Breaking VoIP

Enumerating and Breaking VoIP Enumerating and Breaking VoIP Introduction Voice over Internet Protocol (VoIP) has seen rapid implementation over the past few years. Most of the organizations which have implemented VoIP are either unaware

More information

Troubleshooting Tools to Diagnose or Report a Problem February 23, 2012

Troubleshooting Tools to Diagnose or Report a Problem February 23, 2012 Troubleshooting Tools to Diagnose or Report a Problem February 23, 2012 Proprietary 2012 Media5 Corporation Scope of this Document This Technical Bulletin aims to inform the reader on the troubleshooting

More information

MITM Man in the Middle

MITM Man in the Middle MITM Man in the Middle Wifi Packet Capturing and Session Hijacking using Wireshark Introduction The main Objective of this Attack is to make a Fake Access point and send the fake ARP Packets on same Wi-Fi

More information

Configuring the CounterPath X-Lite SIP Softphone

Configuring the CounterPath X-Lite SIP Softphone NetVanta Unified Communications Technical Note Configuring the CounterPath X-Lite SIP Softphone Introduction CounterPath X-Lite is a free Session Initiation Protocol (SIP)-based softphone that is interoperable

More information

Softswitch & Asterisk Billing System

Softswitch & Asterisk Billing System Softswitch & Asterisk Billing System IP Telephony Process and architecture is known as Softswitch. Softswitch is used to bridge traditional PSTN and VoIP by linking PSTN to IP networks and managing traffic

More information

Evolution PBX User Guide for SIP Generic Devices

Evolution PBX User Guide for SIP Generic Devices Evolution PBX User Guide for SIP Generic Devices Table of contents Introduction... 1 Voicemail... Using Voicemail... Voicemail Menu... Voicemail to Email... 3 Voicemail Web Interface... 4 Find Me Rules...

More information

Open Source VoiceXML Interpreter over Asterisk for Use in IVR Applications

Open Source VoiceXML Interpreter over Asterisk for Use in IVR Applications Open Source VoiceXML Interpreter over Asterisk for Use in IVR Applications Lerato Lerato, Maletšabisa Molapo and Lehlohonolo Khoase Dept. of Maths and Computer Science, National University of Lesotho Roma

More information

Application Notes for Configuring Broadvox SIP Trunking with Avaya IP Office - Issue 1.0

Application Notes for Configuring Broadvox SIP Trunking with Avaya IP Office - Issue 1.0 Avaya Solution & Interoperability Test Lab Application Notes for Configuring Broadvox SIP Trunking with Avaya IP Office - Issue 1.0 Abstract These Application Notes describe the procedures for configuring

More information

Deploying Cisco Unified Contact Center Express 5.0 (UCCX)

Deploying Cisco Unified Contact Center Express 5.0 (UCCX) Deploying Cisco Unified Contact Center Express 5.0 (UCCX) Course Overview: This course, Deploying Cisco Unified Contact Center Express (UCCX) v5.0, provides the student with handson experience and knowledge

More information

The Trivial Cisco IP Phones Compromise

The Trivial Cisco IP Phones Compromise Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group ofir@sys-security.com http://www.sys-security.com September 2002

More information

White Paper Integration of TTY Calls into a Call Center Using the Placeholder Call Technique Updated: February 2007

White Paper Integration of TTY Calls into a Call Center Using the Placeholder Call Technique Updated: February 2007 Overview of Call Centers White Paper Integration of TTY Calls into a Call Center Using the Placeholder Call Technique Updated: February 2007 All organizations have a phone system, but a call center has

More information

1 VoIP/PBX Axxess Server

1 VoIP/PBX Axxess Server - 1 1 VoIP/PBX Axxess Server The Axxess Server supports comprehensive Voice Over Internet Protocol network services, which are based on the Open Source Asterisk VoIP software. The Axxess Server VoIP telephony

More information

Open-Source, Cross-Platform Java Tools Working Together on a Dialogue System

Open-Source, Cross-Platform Java Tools Working Together on a Dialogue System Open-Source, Cross-Platform Java Tools Working Together on a Dialogue System Oana NICOLAE Faculty of Mathematics and Computer Science, Department of Computer Science, University of Craiova, Romania oananicolae1981@yahoo.com

More information

Voice Call Addon for Ozeki NG SMS Gateway

Voice Call Addon for Ozeki NG SMS Gateway Voice Call Addon for Ozeki NG SMS Gateway Document version v.1.0.0.0 Copyright 2000-2011 Ozeki Informatics Ltd. All rights reserved 1 Table of Contents Voice Call Addon for Ozeki NG SMS Gateway Introduction

More information

Deploying Cisco Unified Contact Center Express Volume 1

Deploying Cisco Unified Contact Center Express Volume 1 Deploying Cisco Unified Contact Center Express Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and Course Flow Additional References Your Training Curriculum General Administration

More information

Hosted Fax Mail. Hosted Fax Mail. User Guide

Hosted Fax Mail. Hosted Fax Mail. User Guide Hosted Fax Mail Hosted Fax Mail User Guide Contents 1 About this Guide... 2 2 Hosted Fax Mail... 3 3 Getting Started... 4 3.1 Logging On to the Web Portal... 4 4 Web Portal Mailbox... 6 4.1 Checking Messages

More information

IP Based Voice Server Application With PBX Using Free SWITCH ISSN 2319-9725

IP Based Voice Server Application With PBX Using Free SWITCH ISSN 2319-9725 IP Based Voice Server Application With PBX Using Free SWITCH ISSN 2319-9725 Sachin Mallikarjun Hunur Shreyas S M Abstract: In today s world, individuals are able to build phone systems that outperform

More information

Automated Penetration Testing with the Metasploit Framework. NEO Information Security Forum March 19, 2008

Automated Penetration Testing with the Metasploit Framework. NEO Information Security Forum March 19, 2008 Automated Penetration Testing with the Metasploit Framework NEO Information Security Forum March 19, 2008 Topics What makes a good penetration testing framework? Frameworks available What is the Metasploit

More information

VoIP Recorder V2 Setup Guide

VoIP Recorder V2 Setup Guide VoIP Recorder V2 Setup Guide V2.10b Software Requirement for VoIP Recorder V2 (VR2) Please install WinPCap first. VR2 uses WinPCap to sniff network traffic. Download link: It is free. http://www.winpcap.org/install/default.htm

More information

and Voice Applications Eyal Wirsansky, Verso Technologies JaxJUG

and Voice Applications Eyal Wirsansky, Verso Technologies JaxJUG Voice Over IP, and Voice Applications Eyal Wirsansky, Verso Technologies JaxJUG Analog Telephony Mr. W AG Bell X What the *!@# is aa Switch?? Moving to Digital Voice (TDM) Separation of Voice and Signaling

More information

Application Notes for Configuring Intelepeer SIP Trunking with Avaya IP Office 7.0 - Issue 1.0

Application Notes for Configuring Intelepeer SIP Trunking with Avaya IP Office 7.0 - Issue 1.0 Avaya Solution & Interoperability Test Lab Application Notes for Configuring Intelepeer SIP Trunking with Avaya IP Office 7.0 - Issue 1.0 Abstract These Application Notes describe the procedures for configuring

More information

Grandstream Networks, Inc. How to Integrate UCM6100 with Microsoft Lync Server

Grandstream Networks, Inc. How to Integrate UCM6100 with Microsoft Lync Server Grandstream Networks, Inc. How to Integrate UCM6100 with Microsoft Lync Server Index Table of Contents OVERVIEW... 3 UCM6100 CONFIGURATION... 4 STEP 1: CREATE SIP PEER TRUNK... 4 STEP 2: CONFIGURE OUTBOUND

More information

Version 0.1 June 2010. Xerox WorkCentre 7120 Fax over Internet Protocol (FoIP)

Version 0.1 June 2010. Xerox WorkCentre 7120 Fax over Internet Protocol (FoIP) Version 0.1 June 2010 Xerox WorkCentre 7120 Fax over Internet Protocol (FoIP) Thank you for choosing the Xerox WorkCentre 7120. Table of Contents Introduction.........................................

More information

CUSTOMER CONFIGURATION AUTO ATTENDANT ADMINISTRATOR S GUIDE

CUSTOMER CONFIGURATION AUTO ATTENDANT ADMINISTRATOR S GUIDE CUSTOMER CONFIGURATION AUTO ATTENDANT ADMINISTRATOR S GUIDE Primus Business Services AAAG10-2013 Table of Contents Overview... 3 What is an Auto Attendant?... 3 Features... 4 Options... 6 Global Options...

More information

VoIP Service Reference

VoIP Service Reference IceWarp Unified Communications VoIP Service Reference Version 10.4 Printed on 13 April, 2012 Contents VoIP Service 1 Introduction... 1 The Big Picture... 4 Reference... 5 General... 5 Dial Plan... 7 Dial

More information

Web Portal User Guide

Web Portal User Guide Web Portal User Guide Fusion Hosted Voice Web Portal User Guide, Revision 2, September 2013 NCTC North Central 872 Highway 52 Bypass E Lafayette, TN 37083 615-666-2151 www.nctc.com Fusion Hosted Voice

More information

Hosted VoIP Phone System. Desktop Toolbar User Guide

Hosted VoIP Phone System. Desktop Toolbar User Guide Hosted VoIP Phone System Desktop Toolbar User Guide Contents 1 Introduction... 3 1.1 System Requirements... 3 2 Installing the Telesystem Hosted VoIP Toolbar... 4 3 Accessing the Hosted VoIP Toolbar...

More information

Configuration Notes 0217

Configuration Notes 0217 PBX Remote Line Extension using Mediatrix 1104 and 1204 Introduction... 2 Application Scenario... 2 Running the Unit Manager Network (UMN) Software... 3 Configuring the Mediatrix 1104... 6 Configuring

More information

Asterisk PBX Features

Asterisk PBX Features Asterisk PBX Features Automated Attendant Allows callers to be automatically transferred to a user s extension without the intervention of a receptionist. Some businesses use the PBX telephone system to

More information

WiFi Security Assessments

WiFi Security Assessments WiFi Security Assessments Robert Dooling Dooling Information Security Defenders (DISD) December, 2009 This work is licensed under a Creative Commons Attribution 3.0 Unported License. Table of Contents

More information

G563 Quantitative Paleontology. SQL databases. An introduction. Department of Geological Sciences Indiana University. (c) 2012, P.

G563 Quantitative Paleontology. SQL databases. An introduction. Department of Geological Sciences Indiana University. (c) 2012, P. SQL databases An introduction AMP: Apache, mysql, PHP This installations installs the Apache webserver, the PHP scripting language, and the mysql database on your computer: Apache: runs in the background

More information

Contents. Specialty Answering Service. All rights reserved.

Contents. Specialty Answering Service. All rights reserved. Contents 1 Abstract... 2 2 What Exactly Is IVR Technology?... 3 3 How to Choose an IVR Provider... 4 3.1 Standard Features of IVR Providers... 4 3.2 Definitions... 4 3.3 IVR Service Providers... 5 3.3.1

More information

How to Build a Simple Virtual Office PBX System Using TekSIP and TekIVR

How to Build a Simple Virtual Office PBX System Using TekSIP and TekIVR How to Build a Simple Virtual Office PBX System Using TekSIP and TekIVR This document explains how to build a simple virtual office PBX system using TekSIP and TekIVR. In this example following components

More information

Professional Penetration Testing Techniques and Vulnerability Assessment ...

Professional Penetration Testing Techniques and Vulnerability Assessment ... Course Introduction Today Hackers are everywhere, if your corporate system connects to internet that means your system might be facing with hacker. This five days course Professional Vulnerability Assessment

More information

Integration of Voice over Internet Protocol Experiment in Computer Engineering Technology Curriculum

Integration of Voice over Internet Protocol Experiment in Computer Engineering Technology Curriculum Integration of Voice over Internet Protocol Experiment in Computer Engineering Technology Curriculum V. Rajaravivarma and Farid Farahmand Computer Electronics and Graphics Technology School of Technology,

More information

Wildix Management System (WMS) White Paper

Wildix Management System (WMS) White Paper Wildix Management System (WMS) White Paper February 2007 Author: Giuseppe Innamorato Wildix Management System White Paper Status: Draft 0.1 Page 1 Index: 1. Management Summary...3 2. Document purpose...3

More information

Aculab digital network access cards

Aculab digital network access cards Aculab digital network access cards Adding and Using IPv6 Capabilities Guide Revision 1.0.2 PROPRIETARY INFORMATION Aculab Plc makes every effort to ensure that the information in this document is correct

More information

ACP 3.2 Novelties. Edition 01 March, 2014. Aastra - 2014 1

ACP 3.2 Novelties. Edition 01 March, 2014. Aastra - 2014 1 ACP 3.2 Novelties Edition 01 March, 2014 Aastra - 2014 1 Mitel 2014 Content New features New Aastra light classic interface Calls log SIP encryption Incoming SMS CSTA link for subscriber supervision Subscriber

More information

IP-PBX Quick Start Guide

IP-PBX Quick Start Guide IP-PBX Quick Start Guide Introduce... 3 Configure and set up the IP-PBX... 4 How to change the IP address... 7 Set up extensions and make internal calls... 8 How to make calls via the FXO port... 10 How

More information

Wireless Security: Secure and Public Networks Kory Kirk

Wireless Security: Secure and Public Networks Kory Kirk Wireless Security: Secure and Public Networks Kory Kirk Villanova University Computer Science kory.kirk@villanova.edu www.korykirk.com/ Abstract Due to the increasing amount of wireless access points that

More information

Application Notes for Configuring Cablevision Optimum Voice SIP Trunking with Avaya IP Office - Issue 1.1

Application Notes for Configuring Cablevision Optimum Voice SIP Trunking with Avaya IP Office - Issue 1.1 Avaya Solution & Interoperability Test Lab Application Notes for Configuring Cablevision Optimum Voice SIP Trunking with Avaya IP Office - Issue 1.1 Abstract These Application Notes describe the procedures

More information

IVR CRM Integration. Migrating the Call Center from Cost Center to Profit. Definitions. Rod Arends Cheryl Yaeger BenchMark Consulting International

IVR CRM Integration. Migrating the Call Center from Cost Center to Profit. Definitions. Rod Arends Cheryl Yaeger BenchMark Consulting International IVR CRM Integration Migrating the Call Center from Cost Center to Profit Rod Arends Cheryl Yaeger BenchMark Consulting International Today, more institutions are seeking ways to change their call center

More information

Securing end devices

Securing end devices Securing end devices Securing the network edge is already covered. Infrastructure devices in the LAN Workstations Servers IP phones Access points Storage area networking (SAN) devices. Endpoint Security

More information

Voicemail. Advanced User s Guide. Version 2.0

Voicemail. Advanced User s Guide. Version 2.0 Advanced User s Guide Version 2.0 Contents Introduction to the Documentation... 3 About the Documentation... 3 Ifbyphone on the Web... 3 Logging in to your ifbyphone Account... 3 Setting Up a Voice Mailbox...

More information

The Customer Portal will allow you to administrate your Arch system via the Internet. From the portal you can:

The Customer Portal will allow you to administrate your Arch system via the Internet. From the portal you can: Powerline Complete Web Portal Guide This complete web portal guide will show you how to utilize the Powerline system to its fullest potential; i.e. how to set up multiple transfers, generate listing or

More information

Phone Routing Stepping Through the Basics

Phone Routing Stepping Through the Basics Ng is Phone Routing Stepping Through the Basics Version 2.6 Contents What is Phone Routing?...3 Logging in to your Ifbyphone Account...3 Configuring Different Phone Routing Functions...4 How do I purchase

More information

NAT TCP SIP ALG Support

NAT TCP SIP ALG Support The feature allows embedded messages of the Session Initiation Protocol (SIP) passing through a device that is configured with Network Address Translation (NAT) to be translated and encoded back to the

More information

Cisco Unified Communications Manager 5.1 SIP Configuration Guide

Cisco Unified Communications Manager 5.1 SIP Configuration Guide Valcom Session Initiation Protocol (SIP) VIP devices are compatible with Cisco Unified Communications Manager (formerly Cisco Unified CallManager) (SIP enabled versions). The Valcom device is added to

More information

Integrating VoIP Phones and IP PBX s with VidyoGateway

Integrating VoIP Phones and IP PBX s with VidyoGateway Integrating VoIP Phones and IP PBX s with VidyoGateway Updated February 2011 INDEX: I. ABSTRACT.1 II. III. IV. VIDYOGATEWAY OVERVIEW.. 1 NETWORK TOPOLOGIES AND DEFINITIONS...2 CONNECTING TO VIDYOCONFERENCES

More information

Packetized Telephony Networks

Packetized Telephony Networks Packetized Telephony Networks Benefits of Packet Telephony Networks Traditionally, the potential savings on long-distance costs was the driving force behind the migration to converged voice and data networks.

More information

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006 WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able

More information

COPYRIGHT 2011 COPYRIGHT 2012 AXON DIGITAL DESIGN B.V. ALL RIGHTS RESERVED

COPYRIGHT 2011 COPYRIGHT 2012 AXON DIGITAL DESIGN B.V. ALL RIGHTS RESERVED Subtitle insertion GEP100 - HEP100 Inserting 3Gb/s, HD, subtitles SD embedded and Teletext domain with the Dolby HSI20 E to module PCM decoder with audio shuffler A A application product note COPYRIGHT

More information

Interfaces de voz avanzadas con VoiceXML

Interfaces de voz avanzadas con VoiceXML Interfaces de voz avanzadas con VoiceXML Digital Revolution is coming Self driving cars Self voice services Autopilot for CAR Speaker Automatic Speech Recognition ASR DTMF keypad SIP / VoIP or TDM Micro

More information

TEL 500 WRITE UP WEEK 8 FREE PBX SIP LAB SUBMITTED TO: PROF. RONNY BULL BY: ANUSHA ALIGAPALLY

TEL 500 WRITE UP WEEK 8 FREE PBX SIP LAB SUBMITTED TO: PROF. RONNY BULL BY: ANUSHA ALIGAPALLY TEL 500 WRITE UP WEEK 8 FREE PBX SIP LAB SUBMITTED TO: PROF. RONNY BULL BY: ANUSHA ALIGAPALLY DATE: 11/05/2014 ABSTRACT: Private Branch Exchange has multiple phones connected to it which are in the same

More information

Introducing Cisco Voice and Unified Communications Administration Volume 1

Introducing Cisco Voice and Unified Communications Administration Volume 1 Introducing Cisco Voice and Unified Communications Administration Volume 1 Course Introduction Overview Learner Skills and Knowledge Course Goal and Course Flow Additional Cisco Glossary of Terms Your

More information

A Smart Telephone Answering Machine with Voice Message Forwarding Capability

A Smart Telephone Answering Machine with Voice Message Forwarding Capability A Smart Telephone Answering Machine with Voice Message Forwarding Capability Chih-Hung Huang 1 Cheng Wen 2 Kuang-Chiung Chang 3 1 Department of Information Management, Lunghwa University of Science and

More information

Traffic Analyzer Based on Data Flow Patterns

Traffic Analyzer Based on Data Flow Patterns AUTOMATYKA 2011 Tom 15 Zeszyt 3 Artur Sierszeñ*, ukasz Sturgulewski* Traffic Analyzer Based on Data Flow Patterns 1. Introduction Nowadays, there are many systems of Network Intrusion Detection System

More information

CRYPTUS DIPLOMA IN IT SECURITY

CRYPTUS DIPLOMA IN IT SECURITY CRYPTUS DIPLOMA IN IT SECURITY 6 MONTHS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY COURSE NAME: CRYPTUS 6 MONTHS DIPLOMA IN IT SECURITY Course Description This is the Ethical hacking & Information

More information

Abstract. Avaya Solution & Interoperability Test Lab

Abstract. Avaya Solution & Interoperability Test Lab Avaya Solution & Interoperability Test Lab Application Notes for LumenVox Automated Speech Recognizer, LumenVox Text-to-Speech Server and Call Progress Analysis with Avaya Aura Experience Portal Issue

More information

During your session you will have access to the following lab configuration. CLIENT1 (Windows XP Workstation) 192.168.0.2 /24

During your session you will have access to the following lab configuration. CLIENT1 (Windows XP Workstation) 192.168.0.2 /24 Introduction The Network Vulnerabilities module provides you with the instruction and Server hardware to develop your hands on skills in the defined topics. This module includes the following exercises:

More information

VoIP Service Reference

VoIP Service Reference IceWarp Unified Communications VoIP Service Reference Version 10.4 Printed on 19 February, 2013 Contents VoIP Service 1 Introduction... 1 The Big Picture... 5 Reference... 6 General... 6 Dial Plan...

More information

Lab Introduction software Voice over IP

Lab Introduction software Voice over IP Lab Introduction software Voice over IP 1 Lab Capability and Status Software used in this course installed in Engineering labs including the lab opened for students ENGR1506 - http://labs.ite.gmu.edu/

More information

Thick Client Application Security

Thick Client Application Security Thick Client Application Security Arindam Mandal (arindam.mandal@paladion.net) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two

More information

Version 2.6. Virtual Receptionist Stepping Through the Basics

Version 2.6. Virtual Receptionist Stepping Through the Basics Version 2.6 Virtual Receptionist Stepping Through the Basics Contents What is a Virtual Receptionist?...3 About the Documentation...3 Ifbyphone on the Web...3 Setting Up a Virtual Receptionist...4 Logging

More information

Internet Telephony PBX System. IPX-300 Series. Quick Installation Guide

Internet Telephony PBX System. IPX-300 Series. Quick Installation Guide Internet Telephony PBX System IPX-300 Series Quick Installation Guide Overview PLANET IPX-300/IPX-300W IP PBX telephony systems ( IP PBX in the following term) are designed and optimized for the small

More information

FileMaker Server 10 Help

FileMaker Server 10 Help FileMaker Server 10 Help 2007-2009 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker, the file folder logo, Bento and the Bento logo

More information

Security and Risk Analysis of VoIP Networks

Security and Risk Analysis of VoIP Networks Security and Risk Analysis of VoIP Networks S.Feroz and P.S.Dowland Network Research Group, University of Plymouth, United Kingdom e-mail: info@network-research-group.org Abstract This paper address all

More information

A Guide to Connecting to FreePBX

A Guide to Connecting to FreePBX A Guide to Connecting to FreePBX FreePBX is a basic web Graphical User Interface that manages Asterisk PBX. It includes many features available in other PBX systems such as voice mail, conference calling,

More information

PORTA ONE. New Features Guide Maintenance Release 18. www.portaone.com

PORTA ONE. New Features Guide Maintenance Release 18. www.portaone.com PORTA ONE Porta Switch TM New Features Guide Maintenance Release 18 www.portaone.com Porta Switch Maintenance Release 18: New Features Guide Copyright Notice & Disclaimers Copyright 2000-2011 PortaOne,

More information

Cisco CallManager 4.1 SIP Trunk Configuration Guide

Cisco CallManager 4.1 SIP Trunk Configuration Guide Valcom Session Initiation Protocol (SIP) VIP devices are compatible with Cisco Unified Communications Manager systems. For versions of Communications Manager that do not support SIP endpoints (such as

More information

SL1100 Digital Call Logger User Guide

SL1100 Digital Call Logger User Guide SL1100 Digital Call Logger User Guide NDA-31389 Issue 1.01 NEC Corporation reserves the right to change the specifications, functions, or features at any time without notice. NEC Corporation has prepared

More information

PENTEST. Pentest Services. VoIP & Web. www.novacybersecurity.com

PENTEST. Pentest Services. VoIP & Web. www.novacybersecurity.com PENTEST VoIP & Web Pentest Services VoIP & WEB Penetration Testing The Experinced and National VoIP/Unified Communications R&D organization, NETAŞ NOVA Pentest Services test the applications, infrastructure

More information

NetVanta 7100 Exercise Service Provider SIP Trunk

NetVanta 7100 Exercise Service Provider SIP Trunk NetVanta 7100 Exercise Service Provider SIP Trunk PSTN NetVanta 7100 FXS 0/1 x2001 SIP Eth 0/0 x2004 SIP Server 172.23.102.87 Hosted by x2003 www.voxitas.com In this exercise, you will create a SIP trunk

More information

Workforce Management IVR. A multi-service voice platform

Workforce Management IVR. A multi-service voice platform WFM Workforce Management IVR Information Sheet Introduction High Level Overview Features Solution Components Industries Applications Call Flows Reporting Implementation and Deployment About Syntellect

More information

Call Recorder Oygo Manual. Version 1.001.11

Call Recorder Oygo Manual. Version 1.001.11 Call Recorder Oygo Manual Version 1.001.11 Contents 1 Introduction...4 2 Getting started...5 2.1 Hardware installation...5 2.2 Software installation...6 2.2.1 Software configuration... 7 3 Options menu...8

More information

Mediatrix 4404 Step by Step Configuration Guide June 22, 2011

Mediatrix 4404 Step by Step Configuration Guide June 22, 2011 Mediatrix 4404 Step by Step Configuration Guide June 22, 2011 Proprietary 2011 Media5 Corporation Table of Contents First Steps... 3 Identifying your MAC Address... 3 Identifying your Dynamic IP Address...

More information

Configuration Guide for connecting the Eircom Advantage 4800/1500/1200 PBXs to the Eircom SIP Voice platform.

Configuration Guide for connecting the Eircom Advantage 4800/1500/1200 PBXs to the Eircom SIP Voice platform. Configuration Guide for connecting the Eircom Advantage 4800/1500/1200 PBXs to the Eircom SIP Voice platform. 1 Contents Introduction.... 3 Installing the Applications Module... 4 Ordering a Licence for

More information

Testing IVR Systems White Paper

Testing IVR Systems White Paper Testing IVR Systems Document: Nexus8610 IVR 05-2005 Issue date: Author: Issued by: 26MAY2005 Franz Neeser Senior Product Manager Nexus Telecom AG, Switzerland We work to improve your network Abstract Interactive

More information

Asterisk Calling Card & Billing System

Asterisk Calling Card & Billing System Asterisk Calling Card & Billing System Asterisk based Calling Card Billing (A2Billing), PC to Phone Billing, IPPhone to Phone Billing with Admin Module, Reseller Module, Customer Module & Account (PIN)

More information

A This panel lists all the IVR queues you have built so far. This is where you start the creation of a IVR

A This panel lists all the IVR queues you have built so far. This is where you start the creation of a IVR IVR The IVR (Interactive Voice Response) feature allows you to automate some or all of your inbound call handling. At its simplest, you can implement an IVR that routes calls to a specific department selected

More information

VoIP Server Reference

VoIP Server Reference IceWarp Server VoIP Server Reference Version 10 Printed on 12 August, 2009 i Contents VoIP Service 1 Introduction... 1 V10 New Features... 3 SIP REFER... 3 SIP Call Transfer Agent Settings... 3 NAT traversal

More information

Using CounterPath X-Lite with Virtual PBX - PC

Using CounterPath X-Lite with Virtual PBX - PC Using CounterPath X-Lite with Virtual PBX - PC Installing X-Lite - Exit any software applications that use sound such as CD and media players. - Run the setup executable file. - Follow the prompts offered

More information

Vulnerability Assessment and Penetration Testing

Vulnerability Assessment and Penetration Testing Vulnerability Assessment and Penetration Testing Module 1: Vulnerability Assessment & Penetration Testing: Introduction 1.1 Brief Introduction of Linux 1.2 About Vulnerability Assessment and Penetration

More information

GWAVA 5. Migration Guide for Netware GWAVA 4 to Linux GWAVA 5

GWAVA 5. Migration Guide for Netware GWAVA 4 to Linux GWAVA 5 GWAVA 5 Migration Guide for Netware GWAVA 4 to Linux GWAVA 5 Copyright 2010 GWAVA, Inc. All rights reserved. Content may not be reproduced without permission. http://www.gwava.com Overview While GWAVA

More information

PCBest Networks VOIP Recorder

PCBest Networks VOIP Recorder PCBest Networks VOIP Recorder V1.196 Software Requirement for PCBest VOIP Recorder Please install WinPCap first. VOIP Recorder uses WinPCap to sniff network traffic. Download link: It is free. http://www.winpcap.org/install/default.htm

More information

AUTOCUE IVR. User Guide Updated: 06/18/15 Document Number: 36UG3101535

AUTOCUE IVR. User Guide Updated: 06/18/15 Document Number: 36UG3101535 AUTOCUE IVR User Guide Updated: 06/18/15 Document Number: 36UG3101535 Copyright 2015 SEDC All rights reserved. No part of this document may be copied or reproduced in any form or by any means without the

More information

SIP EXPRESS MEDIA SERVER (SEMS) WITH MPEG4 SUPPORT

SIP EXPRESS MEDIA SERVER (SEMS) WITH MPEG4 SUPPORT SIP EXPRESS MEDIA SERVER (SEMS) WITH MPEG4 SUPPORT Pradnya Gaonkar Kodanda Rami Reddy V Sandeep Mamilla Shubhra Pahwa Siva Mullati pradnya.gaonkar@iiitb.org kodandaramireddy.v@iiitb.org sandeep.mamilla@iiitb.org

More information

DiskPulse DISK CHANGE MONITOR

DiskPulse DISK CHANGE MONITOR DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com info@flexense.com 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product

More information

UCCXA: Cisco Unified Contact Center Express Advanced v4

UCCXA: Cisco Unified Contact Center Express Advanced v4 Course Outline Lesson 1. IPCC Express Overview/Review Components Definitions The Call Flow The Debug Process Triggered Debugging Non-Triggered Debugging Lesson 2. Troubleshooting Concepts The Call The

More information

IP PBX. SD Card Slot. FXO Ports. PBX WAN port. FXO Ports LED, RED means online

IP PBX. SD Card Slot. FXO Ports. PBX WAN port. FXO Ports LED, RED means online 1 IP PBX SD Card Slot FXO Ports PBX LAN port PBX WAN port FXO Ports LED, RED means online 2 Connect the IP PBX to Your LAN Internet PSTN Router Ethernet Switch FXO Ports 3 Access the PBX s WEB GUI The

More information

Integrating Skype for SIP with UC500

Integrating Skype for SIP with UC500 Integrating Skype for SIP with UC500 Version 1.1 2008 Cisco Systems, Inc. All rights reserved. 1 TABLE OF CONTENTS 1 OVERVIEW... 3 1.1 INTRODUCTION... 3 1.2 SCOPE... 3 1.3 REVISION CONTROL... 3 1.4 RESTRICTIONS...

More information

UCCXA: Cisco Unified Contact Center Express Advanced v4

UCCXA: Cisco Unified Contact Center Express Advanced v4 Course: UCCXA: Cisco Unified Contact Center Express Advanced v4 Description: Students build on the knowledge and scripting experience gained in the prerequisite UCCXD course by exploring more advanced

More information

Chapter 9 Telephone Conferencing

Chapter 9 Telephone Conferencing Chapter 9 Telephone Conferencing The Telephony feature of Elluminate Live! enables you to conduct your audio communications with other session attendees via telephone conferencing, while continuing to

More information

TEL 500. Voice Communications. Week 1 Write Up. Session Initiation Protocol Lab. Submitted To: Prof Ronny Bull. By: Sai Sharan Korvi

TEL 500. Voice Communications. Week 1 Write Up. Session Initiation Protocol Lab. Submitted To: Prof Ronny Bull. By: Sai Sharan Korvi TEL 500 Voice Communications Week 1 Write Up Session Initiation Protocol Lab Submitted To: Prof Ronny Bull By: Sai Sharan Korvi Date: 09/10/2014 ABSTRACT: Softphone is usually a software which can be used

More information

VoiceXML Data Logging Overview

VoiceXML Data Logging Overview Data Logging Overview - Draft 0.3-20 August 2007 Page 1 Data Logging Overview Forum Tools Committee Draft 0.3-20 August 2007 Data Logging Overview - Draft 0.3-20 August 2007 Page 1 About the Forum: Founded

More information

Contents 1. Setting up your Phone Phone Setup Phone Usage 2. User Portal 3. Softphone for your computer 4. Faxing

Contents 1. Setting up your Phone Phone Setup Phone Usage 2. User Portal 3. Softphone for your computer 4. Faxing User Guide 1 Contents 1. Setting up your Phone Phone Setup Phone setup instructions Recording Voicemail Greeting and Voicemail Menu Testing tools Phone Usage Call Transfer, Call Forwarding and Do Not Disturb

More information

Interaction Center Integration with HEAT

Interaction Center Integration with HEAT Interaction Center Integration with HEAT Installation and Configuration Guide Interactive Intelligence Customer Interaction Center (CIC) 2016 R1 Last updated September 14, 2015 (See Change log for summary

More information

Asterisk SIP Trunk Settings - Vestalink

Asterisk SIP Trunk Settings - Vestalink Asterisk SIP Trunk Settings - Vestalink Vestalink is a new SIP trunk provider that has sprung up as a replacement for Google Voice trunking within Asterisk servers. They offer a very attractive pricing

More information

spiderstar VoIP Interface Version 4.0 User manual

spiderstar VoIP Interface Version 4.0 User manual spiderstar VoIP Interface Version 4.0 User manual 2009 Vanillatech GmbH Contents 1 Introduction...3 2 Setup...4 2.1 on an existing VMWare Server or -Player...4 2.2 on an existing Linux server...4 3 Features...5

More information

Connecting with Vonage

Connecting with Vonage Connecting with Vonage Vonage (http://www.vonage.com/) offers telephone service using the VoIP (Voice over Internet Protocol) standard SIP (Session Initiation Protocol). The service allow users making

More information