INTERACTIVE VOICE RESPONSE WITH AUTOMATED SPEECH RECOGNITION AND BIOMETRICS FOR BANWEB
|
|
- Paulina Helena Lee
- 7 years ago
- Views:
Transcription
1 SCHOOL OF ENGINEERING AND APPLIED SCIENCE THE GEORGE WASHINGTON UNIVERSITY PROJECT REPORT INTERACTIVE VOICE RESPONSE WITH AUTOMATED SPEECH RECOGNITION AND BIOMETRICS FOR BANWEB Group Name Telecommunication For Academic Purpose Presented By Jaywant Kapadnis Mandar Patil Parameswaran Krishnan
2 Abstract In this project we have created a student s university account called BanWeb for GWU using Freeswitch. A student can simply dial their University ID number (i.e. Gworld Number) and access their University account which contains their Academic, Employment and Personal information s. A completely automated and secure system is created using Biometrics like Voice Recognition and Speech operated IVR.
3 Contents Chapter 1 Block Diagram and Flow Chart 1 Chapter 2 All you need to know about Freeswitch 3 Chapter 3 Biometrics Voice Recognition 4 Chapter 4 Speech Operated IVR 6 Chapter 5 Data Base Connect 7 Chapter 6 Hacking Banweb Server 8
4 1 Chapter 1 Block Diagram And Flow Chart The block diagram consists of three major parts Freeswitch, Matlab and Database. The student initially uses a softphone (X-Lite 4) to establish a to their university banweb account by dialing their Gworld number. This extension initiates a lua script. This lua script calls matlab and runs a matlab program for voice recognition. After the user authentication matlab returns variables to lua which then calls a javascript. Now using javascript, a speech operated IVR is built which provides direct student interaction and their banweb menu is accessed. All the data in is extracted from a database. Also a facility to edit their banweb information is available with the students.
5 Flow Chart 2
6 3 Chapter 2 All You Need To Know About Freeswitch The best part of freeswitch is that it is an open source software. For this project the latest version of Freeswitch has been used. The open source software was build on Mac OS as well as Windows. A VoIP softphone is used at the ends integrated with freeswitch for communication. X-lite 4, a VoIP softphone is used which uses Session Initiation Protocol and is developed by CounterPath Corperations. The most used feature of Freeswitch is its modules. The modules used in this project are listed below. Applications mod_conference - Conference room module. mod_directory - Dial by Name directory. mod_dptools - Dialplan Tools: provides a number of apps and utilities for the dialplan. mod_fifo - FIFO module. Speech Recognition / Text-to-Speech mod_flite - Free open source Text to Speech. mod_pocketsphinx - Free open source Speech Recognition. Dialplan mod_dialplan_xml - Allows you to program dialplans in XML format. File Formats mod_local_stream - Multiple channels connected to same looped file stream. Languages mod_lua - Lua support. mod_spidermonkey - JavaScript support. o mod_spidermonkey_core_db - JavaScript support for the freeswitch SQLite. o mod_spidermonkey_skel - JavaScript dummy module. o mod_spidermonkey_teletone - JavaScript support for lib_teletone. o mod_spidermonkey_odbc - JavaScript support for ODBC. The most extensively used modules in this project are mod_spidermonkey, mod_lua, mod_flite and mod_pocketsphinx. The basic outer core of the project is based on Lua script which is a powerful, fast, lightweight, embeddable scripting language. Lua combines simple procedural syntax with powerful data description constructs based on associative arrays and
7 4 extensible semantics. Lua is dynamically typed, runs by interpreting bytecode for a registerbased virtual machine, and has automatic memory management with incremental garbage collection, making it ideal for configuration, scripting and rapid prototyping. Mod_flite is an open source text to speech engine that converts the written text to speech. Mod_pocketsphinx allows Freeswitch to recognize speech. This is the basic difference between the two, mod_flite is Text to speech conversion engine and mod_pocketsphinx is used for speech recognition. Mod_pocketsphinx uses 8k and 16k acoustical models, Semi-continuous recognition and is great for smaller grammar. Mod_Spidermonkey is a Mozilla JavaScript (ECMAScript) engine. It supports all the standard JavaScript language elements for example for and while loops, regexps and many others. CHAPTER 3 Biometrics Voice Recognition It was very important to secure the student s account (banweb) over the phone so that no user other than the intended would use it. As voice was the only medium of data transfer it was important that voice recognition be used to secure the interaction. The most common approach to voice recognition is divided into two classes: "template matching" and "feature analysis". Template matching has the highest accuracy when used properly, but it also suffers from the most limitations. In this project the template matching approach of voice recognition is used. Initially when the student registers to this service they have to record their name ten times which would be integrated and used as a template for matching later on when the student logs in by calling. After calling the system by dialing zero followed by their Gworld or Identification number (eg ), the first step is to speak their name. The electrical signal from the microphone is digitized by an "analog-to-digital (A/D) converter", and is stored in memory. To determine the "meaning" of this voice input, the computer attempts to match the input with a digitized voice sample, or template that has a known meaning. This technique is a close analogy to the traditional command inputs from a keyboard. The program contains the input template, and attempts to match this template with the actual input using a simple conditional statement. A more general form of voice recognition is available through feature analysis and this technique usually leads to "speaker-independent" voice recognition. Thus by working on the feature aspect of voice it was possible to get a very precise match to the actual user and also terminate the background noise to a great extent. Matlab Matlab is a very powerful tool to deal with voice. The very powerful voice engine in matlab enables it to perform many operations on any voice file. The following is the block diagram of the function of matlab in the project.
8 An alternate lua program is written so that the user/student can initially record their 10 voice samples to the database which can be used later on for matching. The student on registering to banweb calls on an extension and then records the 10 voice samples. Matlab Program for Voice Recognition with detailed explanation is given below 5 Step 1 Calling the wav file recorded in freeswitch Step 2 Read contents of wav file Step 3 Work out the number of samples are in 2secs Step 4 As our program is designed for samples. These samples are calculated using the recording frequency by changing the recording frequency in dialplan to 44100khz and keeping recording as small as 2 seconds. Write this output resampled wav file to original wav file Step 5 Then the newly recorded file is cropped and placed in a 88200x20 matrix Step 6 The rows of the matrix are truncated to the smallest length of the 10 recordings. Step 7 Convert the individual columns into frequency domain by applying the Fast Fourier Transform. Then take the modulus squared of all the entries in the matrix. Step 8 Normalize the spectra of each recording and place into the matrix fn. Only frequencies up to 600 are needed to represent the speech of most humans. Step 9 Find the average vector Step 10 Normalize the average vector Step 11 Find the Standard Deviation of the matrix of samples of voice, which is recorded, from user. Step 12 The 10 recordings form a database to match with the newly recorded recording of user. Then the 10 recordings are cropped and placed in a 88200x20 matrix Step 13 The rows of the matrix are truncated to the smallest length of the 10 recordings. Step 14 Convert the individual columns into frequency domain by applying the Fast Fourier Transform. Then take the modulus squared of all the entries in the matrix. Step 15 Normalize the spectra of each recording and place into the matrix fn. Only frequencies up to 600 are needed to represent the speech of most humans. Step 16 Find the average vector and normalize the average vector Step 17 Find the Standard Deviation of the pre-recorded samples and Pre-saved doc file is opened and the value in doc file is changed
9 6 Step 18 Here the standard deviation of 10 pre-recorded samples (std )is subtracted from standard deviation (std1) of recorded sample which is to be matched. Step 19 If the voice of user matches with the samples in database then value 1 is written in doc file otherwise 0 is written in it and the value of doc file determines that the user has been authorized to enter in the system or not. CHAPTER 4 Speech Operated IVR Interactive Voice Response (IVR) is an automated telephony system that interacts with callers, gathers information and routes calls to the appropriate destination. IVR allows customers to interact with a company s database by speech recognition, after which they can service their own inquiries by following the IVR dialogue. IVR systems can respond with prerecorded or dynamically generated audio to further direct users on how to proceed. IVR applications can be used to control almost any function where the interface can be broken down into a series of simple interactions. IVR systems deployed in the network are sized to handle large call volumes. In this project the function of IVR is to ease user interface. FreeSWITCH IVRs can be written in any language that FreeSWITCH supports including JavaScript, Python, Perl, Lua and an XML macro format of which JavaScript is used for better result. In order to run JavaScript it is important to load mod_spidermonkey module in freeswitch. The flowchat of the IVR is as given below
10 7 CHAPTER 5 Data Base Connect A database is a system intended to organize, store, and retrieve large amounts of data easily. The reason of implementing a database connection for retrieving information about students is of a vast number of entries and a detailed subsection. Database management is also easy for editing, sorting and searching student details which makes the banweb system more effective. Database also provides secure data transaction with high flexibility. A structured query language MySQL was used to prepare a database with all the entries. A MyPHP Admin server was set up on the host computer and a database named freeswitch was built on it. The database stored student details in the form of text. Each entity was fetched into freeswitch and this was stored in a variable. This variable was read by freeswitch using module mod_flite. These variables were called into freeswitch using PHP. The BANWEB written in JavaScript is as follows: 1. User uses voice-operated options to move ahead in the JavaScript. 2. Main speech detection module used is pocket sphinx with can be loaded in freeswitch and is used in the JavaScript. 3. JSGF grammar files are used which enable the speech detection 4. The Java Speech Grammar Format (JSGF) is a BNF-style, platform-independent, and vendor-independent textual representation of grammars for use in speech recognition. 5. The module defines speech tool and this is used to detect the speech. The basic default language is English. (SpeechTool.jm) 6. JSGF grammar can be defined customized as needed and can be used In the JavaScript. 7. The pocket sphinx uses a default English grammar file. Pocket sphinx uses this dictionary when no other dictionary is specified in the script. 8. We have used the default English grammar, which suffice for the application we have made. 9. When a user says a word or a sentence it is matched with the predefined word or sentence and if the match occurs the script move forward.
11 10. Now user has also been given the privilege to edit few options in the BANWEB 11. The user edited option is saved as a wav file.this wav file can be retrieved by the BANNWEB personnel who then listens to it authenticates it and then writes it in a text file in a database. 12. Now this written document is appropriately fetched by the JavaScript when the user returns the next time he can hear the edited information. 13. Option given editing is, User can hear the recorded information at any given time given that if they precede the BANWEB the second time. 8 CHAPTER 6 Hacking Banweb Server It is important that a student server is secure and the information in it cannot be changed or read easily. In this hacking process a network was setup where a user establishes a call to the banweb server. A Man in the middle attack was initiated. The hacker hacks freeswitch of the user calling the server by sniffing using Address resolution protocol (ARPSPOOF) using Backtrack over the wireless network. This allows attacker to sniff data frames on a wireless local area network. ARPSOOF sends a fake ARP message to a WLAN. The tools used in attacking are SMAP, which was used as a sip scanner, ARPSPOOF and Wireshark to capture the packets. A successfully RTP Capture was made and this was decoded and played back. The portion of the recorded file where the User/Student says their name is clipped and injected while the matlab asks for user authentication. Steps 1. Bridged the Main OS network with VM network and Used SMAP for scanning SIP 2. Call was established between user and server. 3. The packets were captured by the user performing man in the middle attack using resolution protocol (ARPSPOOF) 4. The SIP and RTP packets were captured in wireshark. 5. Now, hacker dials the banweb number and RTP packets are played back into server freeswitch and were able to log in banweb of the user successfully.
Enumerating and Breaking VoIP
Enumerating and Breaking VoIP Introduction Voice over Internet Protocol (VoIP) has seen rapid implementation over the past few years. Most of the organizations which have implemented VoIP are either unaware
More informationTroubleshooting Tools to Diagnose or Report a Problem February 23, 2012
Troubleshooting Tools to Diagnose or Report a Problem February 23, 2012 Proprietary 2012 Media5 Corporation Scope of this Document This Technical Bulletin aims to inform the reader on the troubleshooting
More informationMITM Man in the Middle
MITM Man in the Middle Wifi Packet Capturing and Session Hijacking using Wireshark Introduction The main Objective of this Attack is to make a Fake Access point and send the fake ARP Packets on same Wi-Fi
More informationConfiguring the CounterPath X-Lite SIP Softphone
NetVanta Unified Communications Technical Note Configuring the CounterPath X-Lite SIP Softphone Introduction CounterPath X-Lite is a free Session Initiation Protocol (SIP)-based softphone that is interoperable
More informationSoftswitch & Asterisk Billing System
Softswitch & Asterisk Billing System IP Telephony Process and architecture is known as Softswitch. Softswitch is used to bridge traditional PSTN and VoIP by linking PSTN to IP networks and managing traffic
More informationEvolution PBX User Guide for SIP Generic Devices
Evolution PBX User Guide for SIP Generic Devices Table of contents Introduction... 1 Voicemail... Using Voicemail... Voicemail Menu... Voicemail to Email... 3 Voicemail Web Interface... 4 Find Me Rules...
More informationOpen Source VoiceXML Interpreter over Asterisk for Use in IVR Applications
Open Source VoiceXML Interpreter over Asterisk for Use in IVR Applications Lerato Lerato, Maletšabisa Molapo and Lehlohonolo Khoase Dept. of Maths and Computer Science, National University of Lesotho Roma
More informationApplication Notes for Configuring Broadvox SIP Trunking with Avaya IP Office - Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for Configuring Broadvox SIP Trunking with Avaya IP Office - Issue 1.0 Abstract These Application Notes describe the procedures for configuring
More informationDeploying Cisco Unified Contact Center Express 5.0 (UCCX)
Deploying Cisco Unified Contact Center Express 5.0 (UCCX) Course Overview: This course, Deploying Cisco Unified Contact Center Express (UCCX) v5.0, provides the student with handson experience and knowledge
More informationThe Trivial Cisco IP Phones Compromise
Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group ofir@sys-security.com http://www.sys-security.com September 2002
More informationWhite Paper Integration of TTY Calls into a Call Center Using the Placeholder Call Technique Updated: February 2007
Overview of Call Centers White Paper Integration of TTY Calls into a Call Center Using the Placeholder Call Technique Updated: February 2007 All organizations have a phone system, but a call center has
More information1 VoIP/PBX Axxess Server
- 1 1 VoIP/PBX Axxess Server The Axxess Server supports comprehensive Voice Over Internet Protocol network services, which are based on the Open Source Asterisk VoIP software. The Axxess Server VoIP telephony
More informationOpen-Source, Cross-Platform Java Tools Working Together on a Dialogue System
Open-Source, Cross-Platform Java Tools Working Together on a Dialogue System Oana NICOLAE Faculty of Mathematics and Computer Science, Department of Computer Science, University of Craiova, Romania oananicolae1981@yahoo.com
More informationVoice Call Addon for Ozeki NG SMS Gateway
Voice Call Addon for Ozeki NG SMS Gateway Document version v.1.0.0.0 Copyright 2000-2011 Ozeki Informatics Ltd. All rights reserved 1 Table of Contents Voice Call Addon for Ozeki NG SMS Gateway Introduction
More informationDeploying Cisco Unified Contact Center Express Volume 1
Deploying Cisco Unified Contact Center Express Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and Course Flow Additional References Your Training Curriculum General Administration
More informationHosted Fax Mail. Hosted Fax Mail. User Guide
Hosted Fax Mail Hosted Fax Mail User Guide Contents 1 About this Guide... 2 2 Hosted Fax Mail... 3 3 Getting Started... 4 3.1 Logging On to the Web Portal... 4 4 Web Portal Mailbox... 6 4.1 Checking Messages
More informationIP Based Voice Server Application With PBX Using Free SWITCH ISSN 2319-9725
IP Based Voice Server Application With PBX Using Free SWITCH ISSN 2319-9725 Sachin Mallikarjun Hunur Shreyas S M Abstract: In today s world, individuals are able to build phone systems that outperform
More informationAutomated Penetration Testing with the Metasploit Framework. NEO Information Security Forum March 19, 2008
Automated Penetration Testing with the Metasploit Framework NEO Information Security Forum March 19, 2008 Topics What makes a good penetration testing framework? Frameworks available What is the Metasploit
More informationVoIP Recorder V2 Setup Guide
VoIP Recorder V2 Setup Guide V2.10b Software Requirement for VoIP Recorder V2 (VR2) Please install WinPCap first. VR2 uses WinPCap to sniff network traffic. Download link: It is free. http://www.winpcap.org/install/default.htm
More informationand Voice Applications Eyal Wirsansky, Verso Technologies JaxJUG
Voice Over IP, and Voice Applications Eyal Wirsansky, Verso Technologies JaxJUG Analog Telephony Mr. W AG Bell X What the *!@# is aa Switch?? Moving to Digital Voice (TDM) Separation of Voice and Signaling
More informationApplication Notes for Configuring Intelepeer SIP Trunking with Avaya IP Office 7.0 - Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for Configuring Intelepeer SIP Trunking with Avaya IP Office 7.0 - Issue 1.0 Abstract These Application Notes describe the procedures for configuring
More informationGrandstream Networks, Inc. How to Integrate UCM6100 with Microsoft Lync Server
Grandstream Networks, Inc. How to Integrate UCM6100 with Microsoft Lync Server Index Table of Contents OVERVIEW... 3 UCM6100 CONFIGURATION... 4 STEP 1: CREATE SIP PEER TRUNK... 4 STEP 2: CONFIGURE OUTBOUND
More informationVersion 0.1 June 2010. Xerox WorkCentre 7120 Fax over Internet Protocol (FoIP)
Version 0.1 June 2010 Xerox WorkCentre 7120 Fax over Internet Protocol (FoIP) Thank you for choosing the Xerox WorkCentre 7120. Table of Contents Introduction.........................................
More informationCUSTOMER CONFIGURATION AUTO ATTENDANT ADMINISTRATOR S GUIDE
CUSTOMER CONFIGURATION AUTO ATTENDANT ADMINISTRATOR S GUIDE Primus Business Services AAAG10-2013 Table of Contents Overview... 3 What is an Auto Attendant?... 3 Features... 4 Options... 6 Global Options...
More informationVoIP Service Reference
IceWarp Unified Communications VoIP Service Reference Version 10.4 Printed on 13 April, 2012 Contents VoIP Service 1 Introduction... 1 The Big Picture... 4 Reference... 5 General... 5 Dial Plan... 7 Dial
More informationWeb Portal User Guide
Web Portal User Guide Fusion Hosted Voice Web Portal User Guide, Revision 2, September 2013 NCTC North Central 872 Highway 52 Bypass E Lafayette, TN 37083 615-666-2151 www.nctc.com Fusion Hosted Voice
More informationHosted VoIP Phone System. Desktop Toolbar User Guide
Hosted VoIP Phone System Desktop Toolbar User Guide Contents 1 Introduction... 3 1.1 System Requirements... 3 2 Installing the Telesystem Hosted VoIP Toolbar... 4 3 Accessing the Hosted VoIP Toolbar...
More informationConfiguration Notes 0217
PBX Remote Line Extension using Mediatrix 1104 and 1204 Introduction... 2 Application Scenario... 2 Running the Unit Manager Network (UMN) Software... 3 Configuring the Mediatrix 1104... 6 Configuring
More informationAsterisk PBX Features
Asterisk PBX Features Automated Attendant Allows callers to be automatically transferred to a user s extension without the intervention of a receptionist. Some businesses use the PBX telephone system to
More informationWiFi Security Assessments
WiFi Security Assessments Robert Dooling Dooling Information Security Defenders (DISD) December, 2009 This work is licensed under a Creative Commons Attribution 3.0 Unported License. Table of Contents
More informationG563 Quantitative Paleontology. SQL databases. An introduction. Department of Geological Sciences Indiana University. (c) 2012, P.
SQL databases An introduction AMP: Apache, mysql, PHP This installations installs the Apache webserver, the PHP scripting language, and the mysql database on your computer: Apache: runs in the background
More informationContents. Specialty Answering Service. All rights reserved.
Contents 1 Abstract... 2 2 What Exactly Is IVR Technology?... 3 3 How to Choose an IVR Provider... 4 3.1 Standard Features of IVR Providers... 4 3.2 Definitions... 4 3.3 IVR Service Providers... 5 3.3.1
More informationHow to Build a Simple Virtual Office PBX System Using TekSIP and TekIVR
How to Build a Simple Virtual Office PBX System Using TekSIP and TekIVR This document explains how to build a simple virtual office PBX system using TekSIP and TekIVR. In this example following components
More informationProfessional Penetration Testing Techniques and Vulnerability Assessment ...
Course Introduction Today Hackers are everywhere, if your corporate system connects to internet that means your system might be facing with hacker. This five days course Professional Vulnerability Assessment
More informationIntegration of Voice over Internet Protocol Experiment in Computer Engineering Technology Curriculum
Integration of Voice over Internet Protocol Experiment in Computer Engineering Technology Curriculum V. Rajaravivarma and Farid Farahmand Computer Electronics and Graphics Technology School of Technology,
More informationWildix Management System (WMS) White Paper
Wildix Management System (WMS) White Paper February 2007 Author: Giuseppe Innamorato Wildix Management System White Paper Status: Draft 0.1 Page 1 Index: 1. Management Summary...3 2. Document purpose...3
More informationAculab digital network access cards
Aculab digital network access cards Adding and Using IPv6 Capabilities Guide Revision 1.0.2 PROPRIETARY INFORMATION Aculab Plc makes every effort to ensure that the information in this document is correct
More informationACP 3.2 Novelties. Edition 01 March, 2014. Aastra - 2014 1
ACP 3.2 Novelties Edition 01 March, 2014 Aastra - 2014 1 Mitel 2014 Content New features New Aastra light classic interface Calls log SIP encryption Incoming SMS CSTA link for subscriber supervision Subscriber
More informationIP-PBX Quick Start Guide
IP-PBX Quick Start Guide Introduce... 3 Configure and set up the IP-PBX... 4 How to change the IP address... 7 Set up extensions and make internal calls... 8 How to make calls via the FXO port... 10 How
More informationWireless Security: Secure and Public Networks Kory Kirk
Wireless Security: Secure and Public Networks Kory Kirk Villanova University Computer Science kory.kirk@villanova.edu www.korykirk.com/ Abstract Due to the increasing amount of wireless access points that
More informationApplication Notes for Configuring Cablevision Optimum Voice SIP Trunking with Avaya IP Office - Issue 1.1
Avaya Solution & Interoperability Test Lab Application Notes for Configuring Cablevision Optimum Voice SIP Trunking with Avaya IP Office - Issue 1.1 Abstract These Application Notes describe the procedures
More informationIVR CRM Integration. Migrating the Call Center from Cost Center to Profit. Definitions. Rod Arends Cheryl Yaeger BenchMark Consulting International
IVR CRM Integration Migrating the Call Center from Cost Center to Profit Rod Arends Cheryl Yaeger BenchMark Consulting International Today, more institutions are seeking ways to change their call center
More informationSecuring end devices
Securing end devices Securing the network edge is already covered. Infrastructure devices in the LAN Workstations Servers IP phones Access points Storage area networking (SAN) devices. Endpoint Security
More informationVoicemail. Advanced User s Guide. Version 2.0
Advanced User s Guide Version 2.0 Contents Introduction to the Documentation... 3 About the Documentation... 3 Ifbyphone on the Web... 3 Logging in to your ifbyphone Account... 3 Setting Up a Voice Mailbox...
More informationThe Customer Portal will allow you to administrate your Arch system via the Internet. From the portal you can:
Powerline Complete Web Portal Guide This complete web portal guide will show you how to utilize the Powerline system to its fullest potential; i.e. how to set up multiple transfers, generate listing or
More informationPhone Routing Stepping Through the Basics
Ng is Phone Routing Stepping Through the Basics Version 2.6 Contents What is Phone Routing?...3 Logging in to your Ifbyphone Account...3 Configuring Different Phone Routing Functions...4 How do I purchase
More informationNAT TCP SIP ALG Support
The feature allows embedded messages of the Session Initiation Protocol (SIP) passing through a device that is configured with Network Address Translation (NAT) to be translated and encoded back to the
More informationCisco Unified Communications Manager 5.1 SIP Configuration Guide
Valcom Session Initiation Protocol (SIP) VIP devices are compatible with Cisco Unified Communications Manager (formerly Cisco Unified CallManager) (SIP enabled versions). The Valcom device is added to
More informationIntegrating VoIP Phones and IP PBX s with VidyoGateway
Integrating VoIP Phones and IP PBX s with VidyoGateway Updated February 2011 INDEX: I. ABSTRACT.1 II. III. IV. VIDYOGATEWAY OVERVIEW.. 1 NETWORK TOPOLOGIES AND DEFINITIONS...2 CONNECTING TO VIDYOCONFERENCES
More informationPacketized Telephony Networks
Packetized Telephony Networks Benefits of Packet Telephony Networks Traditionally, the potential savings on long-distance costs was the driving force behind the migration to converged voice and data networks.
More informationWIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006
WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able
More informationCOPYRIGHT 2011 COPYRIGHT 2012 AXON DIGITAL DESIGN B.V. ALL RIGHTS RESERVED
Subtitle insertion GEP100 - HEP100 Inserting 3Gb/s, HD, subtitles SD embedded and Teletext domain with the Dolby HSI20 E to module PCM decoder with audio shuffler A A application product note COPYRIGHT
More informationInterfaces de voz avanzadas con VoiceXML
Interfaces de voz avanzadas con VoiceXML Digital Revolution is coming Self driving cars Self voice services Autopilot for CAR Speaker Automatic Speech Recognition ASR DTMF keypad SIP / VoIP or TDM Micro
More informationTEL 500 WRITE UP WEEK 8 FREE PBX SIP LAB SUBMITTED TO: PROF. RONNY BULL BY: ANUSHA ALIGAPALLY
TEL 500 WRITE UP WEEK 8 FREE PBX SIP LAB SUBMITTED TO: PROF. RONNY BULL BY: ANUSHA ALIGAPALLY DATE: 11/05/2014 ABSTRACT: Private Branch Exchange has multiple phones connected to it which are in the same
More informationIntroducing Cisco Voice and Unified Communications Administration Volume 1
Introducing Cisco Voice and Unified Communications Administration Volume 1 Course Introduction Overview Learner Skills and Knowledge Course Goal and Course Flow Additional Cisco Glossary of Terms Your
More informationA Smart Telephone Answering Machine with Voice Message Forwarding Capability
A Smart Telephone Answering Machine with Voice Message Forwarding Capability Chih-Hung Huang 1 Cheng Wen 2 Kuang-Chiung Chang 3 1 Department of Information Management, Lunghwa University of Science and
More informationTraffic Analyzer Based on Data Flow Patterns
AUTOMATYKA 2011 Tom 15 Zeszyt 3 Artur Sierszeñ*, ukasz Sturgulewski* Traffic Analyzer Based on Data Flow Patterns 1. Introduction Nowadays, there are many systems of Network Intrusion Detection System
More informationCRYPTUS DIPLOMA IN IT SECURITY
CRYPTUS DIPLOMA IN IT SECURITY 6 MONTHS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY COURSE NAME: CRYPTUS 6 MONTHS DIPLOMA IN IT SECURITY Course Description This is the Ethical hacking & Information
More informationAbstract. Avaya Solution & Interoperability Test Lab
Avaya Solution & Interoperability Test Lab Application Notes for LumenVox Automated Speech Recognizer, LumenVox Text-to-Speech Server and Call Progress Analysis with Avaya Aura Experience Portal Issue
More informationDuring your session you will have access to the following lab configuration. CLIENT1 (Windows XP Workstation) 192.168.0.2 /24
Introduction The Network Vulnerabilities module provides you with the instruction and Server hardware to develop your hands on skills in the defined topics. This module includes the following exercises:
More informationVoIP Service Reference
IceWarp Unified Communications VoIP Service Reference Version 10.4 Printed on 19 February, 2013 Contents VoIP Service 1 Introduction... 1 The Big Picture... 5 Reference... 6 General... 6 Dial Plan...
More informationLab Introduction software Voice over IP
Lab Introduction software Voice over IP 1 Lab Capability and Status Software used in this course installed in Engineering labs including the lab opened for students ENGR1506 - http://labs.ite.gmu.edu/
More informationThick Client Application Security
Thick Client Application Security Arindam Mandal (arindam.mandal@paladion.net) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
More informationVersion 2.6. Virtual Receptionist Stepping Through the Basics
Version 2.6 Virtual Receptionist Stepping Through the Basics Contents What is a Virtual Receptionist?...3 About the Documentation...3 Ifbyphone on the Web...3 Setting Up a Virtual Receptionist...4 Logging
More informationInternet Telephony PBX System. IPX-300 Series. Quick Installation Guide
Internet Telephony PBX System IPX-300 Series Quick Installation Guide Overview PLANET IPX-300/IPX-300W IP PBX telephony systems ( IP PBX in the following term) are designed and optimized for the small
More informationFileMaker Server 10 Help
FileMaker Server 10 Help 2007-2009 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker, the file folder logo, Bento and the Bento logo
More informationSecurity and Risk Analysis of VoIP Networks
Security and Risk Analysis of VoIP Networks S.Feroz and P.S.Dowland Network Research Group, University of Plymouth, United Kingdom e-mail: info@network-research-group.org Abstract This paper address all
More informationA Guide to Connecting to FreePBX
A Guide to Connecting to FreePBX FreePBX is a basic web Graphical User Interface that manages Asterisk PBX. It includes many features available in other PBX systems such as voice mail, conference calling,
More informationPORTA ONE. New Features Guide Maintenance Release 18. www.portaone.com
PORTA ONE Porta Switch TM New Features Guide Maintenance Release 18 www.portaone.com Porta Switch Maintenance Release 18: New Features Guide Copyright Notice & Disclaimers Copyright 2000-2011 PortaOne,
More informationCisco CallManager 4.1 SIP Trunk Configuration Guide
Valcom Session Initiation Protocol (SIP) VIP devices are compatible with Cisco Unified Communications Manager systems. For versions of Communications Manager that do not support SIP endpoints (such as
More informationSL1100 Digital Call Logger User Guide
SL1100 Digital Call Logger User Guide NDA-31389 Issue 1.01 NEC Corporation reserves the right to change the specifications, functions, or features at any time without notice. NEC Corporation has prepared
More informationPENTEST. Pentest Services. VoIP & Web. www.novacybersecurity.com
PENTEST VoIP & Web Pentest Services VoIP & WEB Penetration Testing The Experinced and National VoIP/Unified Communications R&D organization, NETAŞ NOVA Pentest Services test the applications, infrastructure
More informationNetVanta 7100 Exercise Service Provider SIP Trunk
NetVanta 7100 Exercise Service Provider SIP Trunk PSTN NetVanta 7100 FXS 0/1 x2001 SIP Eth 0/0 x2004 SIP Server 172.23.102.87 Hosted by x2003 www.voxitas.com In this exercise, you will create a SIP trunk
More informationWorkforce Management IVR. A multi-service voice platform
WFM Workforce Management IVR Information Sheet Introduction High Level Overview Features Solution Components Industries Applications Call Flows Reporting Implementation and Deployment About Syntellect
More informationCall Recorder Oygo Manual. Version 1.001.11
Call Recorder Oygo Manual Version 1.001.11 Contents 1 Introduction...4 2 Getting started...5 2.1 Hardware installation...5 2.2 Software installation...6 2.2.1 Software configuration... 7 3 Options menu...8
More informationMediatrix 4404 Step by Step Configuration Guide June 22, 2011
Mediatrix 4404 Step by Step Configuration Guide June 22, 2011 Proprietary 2011 Media5 Corporation Table of Contents First Steps... 3 Identifying your MAC Address... 3 Identifying your Dynamic IP Address...
More informationConfiguration Guide for connecting the Eircom Advantage 4800/1500/1200 PBXs to the Eircom SIP Voice platform.
Configuration Guide for connecting the Eircom Advantage 4800/1500/1200 PBXs to the Eircom SIP Voice platform. 1 Contents Introduction.... 3 Installing the Applications Module... 4 Ordering a Licence for
More informationTesting IVR Systems White Paper
Testing IVR Systems Document: Nexus8610 IVR 05-2005 Issue date: Author: Issued by: 26MAY2005 Franz Neeser Senior Product Manager Nexus Telecom AG, Switzerland We work to improve your network Abstract Interactive
More informationAsterisk Calling Card & Billing System
Asterisk Calling Card & Billing System Asterisk based Calling Card Billing (A2Billing), PC to Phone Billing, IPPhone to Phone Billing with Admin Module, Reseller Module, Customer Module & Account (PIN)
More informationA This panel lists all the IVR queues you have built so far. This is where you start the creation of a IVR
IVR The IVR (Interactive Voice Response) feature allows you to automate some or all of your inbound call handling. At its simplest, you can implement an IVR that routes calls to a specific department selected
More informationVoIP Server Reference
IceWarp Server VoIP Server Reference Version 10 Printed on 12 August, 2009 i Contents VoIP Service 1 Introduction... 1 V10 New Features... 3 SIP REFER... 3 SIP Call Transfer Agent Settings... 3 NAT traversal
More informationUsing CounterPath X-Lite with Virtual PBX - PC
Using CounterPath X-Lite with Virtual PBX - PC Installing X-Lite - Exit any software applications that use sound such as CD and media players. - Run the setup executable file. - Follow the prompts offered
More informationVulnerability Assessment and Penetration Testing
Vulnerability Assessment and Penetration Testing Module 1: Vulnerability Assessment & Penetration Testing: Introduction 1.1 Brief Introduction of Linux 1.2 About Vulnerability Assessment and Penetration
More informationGWAVA 5. Migration Guide for Netware GWAVA 4 to Linux GWAVA 5
GWAVA 5 Migration Guide for Netware GWAVA 4 to Linux GWAVA 5 Copyright 2010 GWAVA, Inc. All rights reserved. Content may not be reproduced without permission. http://www.gwava.com Overview While GWAVA
More informationPCBest Networks VOIP Recorder
PCBest Networks VOIP Recorder V1.196 Software Requirement for PCBest VOIP Recorder Please install WinPCap first. VOIP Recorder uses WinPCap to sniff network traffic. Download link: It is free. http://www.winpcap.org/install/default.htm
More informationAUTOCUE IVR. User Guide Updated: 06/18/15 Document Number: 36UG3101535
AUTOCUE IVR User Guide Updated: 06/18/15 Document Number: 36UG3101535 Copyright 2015 SEDC All rights reserved. No part of this document may be copied or reproduced in any form or by any means without the
More informationSIP EXPRESS MEDIA SERVER (SEMS) WITH MPEG4 SUPPORT
SIP EXPRESS MEDIA SERVER (SEMS) WITH MPEG4 SUPPORT Pradnya Gaonkar Kodanda Rami Reddy V Sandeep Mamilla Shubhra Pahwa Siva Mullati pradnya.gaonkar@iiitb.org kodandaramireddy.v@iiitb.org sandeep.mamilla@iiitb.org
More informationDiskPulse DISK CHANGE MONITOR
DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com info@flexense.com 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product
More informationUCCXA: Cisco Unified Contact Center Express Advanced v4
Course Outline Lesson 1. IPCC Express Overview/Review Components Definitions The Call Flow The Debug Process Triggered Debugging Non-Triggered Debugging Lesson 2. Troubleshooting Concepts The Call The
More informationIP PBX. SD Card Slot. FXO Ports. PBX WAN port. FXO Ports LED, RED means online
1 IP PBX SD Card Slot FXO Ports PBX LAN port PBX WAN port FXO Ports LED, RED means online 2 Connect the IP PBX to Your LAN Internet PSTN Router Ethernet Switch FXO Ports 3 Access the PBX s WEB GUI The
More informationIntegrating Skype for SIP with UC500
Integrating Skype for SIP with UC500 Version 1.1 2008 Cisco Systems, Inc. All rights reserved. 1 TABLE OF CONTENTS 1 OVERVIEW... 3 1.1 INTRODUCTION... 3 1.2 SCOPE... 3 1.3 REVISION CONTROL... 3 1.4 RESTRICTIONS...
More informationUCCXA: Cisco Unified Contact Center Express Advanced v4
Course: UCCXA: Cisco Unified Contact Center Express Advanced v4 Description: Students build on the knowledge and scripting experience gained in the prerequisite UCCXD course by exploring more advanced
More informationChapter 9 Telephone Conferencing
Chapter 9 Telephone Conferencing The Telephony feature of Elluminate Live! enables you to conduct your audio communications with other session attendees via telephone conferencing, while continuing to
More informationTEL 500. Voice Communications. Week 1 Write Up. Session Initiation Protocol Lab. Submitted To: Prof Ronny Bull. By: Sai Sharan Korvi
TEL 500 Voice Communications Week 1 Write Up Session Initiation Protocol Lab Submitted To: Prof Ronny Bull By: Sai Sharan Korvi Date: 09/10/2014 ABSTRACT: Softphone is usually a software which can be used
More informationVoiceXML Data Logging Overview
Data Logging Overview - Draft 0.3-20 August 2007 Page 1 Data Logging Overview Forum Tools Committee Draft 0.3-20 August 2007 Data Logging Overview - Draft 0.3-20 August 2007 Page 1 About the Forum: Founded
More informationContents 1. Setting up your Phone Phone Setup Phone Usage 2. User Portal 3. Softphone for your computer 4. Faxing
User Guide 1 Contents 1. Setting up your Phone Phone Setup Phone setup instructions Recording Voicemail Greeting and Voicemail Menu Testing tools Phone Usage Call Transfer, Call Forwarding and Do Not Disturb
More informationInteraction Center Integration with HEAT
Interaction Center Integration with HEAT Installation and Configuration Guide Interactive Intelligence Customer Interaction Center (CIC) 2016 R1 Last updated September 14, 2015 (See Change log for summary
More informationAsterisk SIP Trunk Settings - Vestalink
Asterisk SIP Trunk Settings - Vestalink Vestalink is a new SIP trunk provider that has sprung up as a replacement for Google Voice trunking within Asterisk servers. They offer a very attractive pricing
More informationspiderstar VoIP Interface Version 4.0 User manual
spiderstar VoIP Interface Version 4.0 User manual 2009 Vanillatech GmbH Contents 1 Introduction...3 2 Setup...4 2.1 on an existing VMWare Server or -Player...4 2.2 on an existing Linux server...4 3 Features...5
More informationConnecting with Vonage
Connecting with Vonage Vonage (http://www.vonage.com/) offers telephone service using the VoIP (Voice over Internet Protocol) standard SIP (Session Initiation Protocol). The service allow users making
More information