THALES comments

From TD-er's Wiki
Jump to navigationJump to search

General remarks 0

  1. Wiki is een hele mooie oplossing, zorg later wel voor een duidelijke structuur. Bijvoorbeeld als volgt:
    • literatuur
      • Codecs
      • Protocols
      • Software tooling
      • etc.
    • experiment VoipBuster
      • experiment set up
      • result
      • conclusions indien van toepassing.
    • experiment Dundi blabla
      • experiment set up
      • result
      • conclusions indien van toepassing.
    • analysis of this and that
      • experiment set up
      • result
      • conclusions indien van toepassing.
  2. Include information regarding the table of selectable codecs by IAX, we discussed on the phone.
  3. Try to keep data together that belongs together.
  4. SIPp test tooling. Nice feature, good discovery. I would like to know if you have experimented with it. It seems rather powerfull.
  5. Start thinking about the way you will present the features when I am at the university.
  6. 11:06, 7 March 2007 (CET). wget -m thales.td-er.nl didnot work. Seems to be an eternal loop. Think of a way to give results to THALES, for instance Trixbox instances and CD containing the info on this site. Also think about the presentation of the results this Friday, slides/demonstration/etc.

Assignment 1

  1. Article: Voice-only with different codecs. Not clear is which codec is used where and conclusion is missing. Article: Voice only analysis. Not clear which codec is used. Which values are expected and what the results are; Bandwidth is xx,x kbit/s which is less than the 123 kbit/s for the g71234 codec. Conclusion > Parameter "Bandwidth = low"??? in IAX.conf selects the optimal codec
  2. Article: Voice and video analysis. To be able to answer this question you need my measurements, I did not provide yet. Could the following :
  3. Be a little more specific. Now you have: IAX2IAX2 is the Inter-Asterisk eXchange protocol. This is used to transport the calls between Asterisk PBX stations. Thus comparible with SIP and the protocol used is selected on criteria x,y,z and the selection can be found in a table made by the PBX at startup etc. etc. etc. ???. Dundi figures perfect! 11:06, 7 March 2007 (CET)
  4. Empty
  5. Describe how to setup PBX-VMware. Tips and tricks etc. Maybe it is just sufficient to grab your file and load it to VMWare.

Assignment 2

  1. Keep up the spirit with this assignment. 11:09, 7 March 2007 (CET) In any case make some figures to clarify your proposed solution. In these figures the relation between gatekeeper and trixbox can become more obvious.
  2. Hebben jullie VoipBuster gedaan op Trixbox 2.0 ipv 1.2.3. Zo ja wat zijn de verschillen, ik wil graag kunnen werken op 1.2.3. Tenzij alles beter is op 2.0
  3. Article: Conference call. As mentioned during phone call, conferencing hosted by the pbx using video should be investigated.
  4. Empty
  5. Empty

Discussion Tomorrow

We will discuss the documentation in detail but I think some conclusions should be made more explicit, for example:

VoIP buster 06 numbers are routed through the installed modem-card, because this is cheaper than using VoIPbuster. What does this mean? SIP to land line is possible, what about the reverse? State clearly what the result per step was. Example, you tested H323 clients with a GnuGatekeeper, and communication was possible between H323 <-> H323. But the gatekeeper box should be unchecked. WHAT DOES THIS MEAN?? Gnomemeeting So for these calls you have to check the box. WHICH BOX??

Documentation remarks

Assignment 1

Just a question: Are you sure that Asterisk is always sampling internally to 8000 samples/sec BECAUSE THEN => Maximum recorded frequency ~ 4000 Hz => This is bad for SONAR !!

DUNDi as a routing protocol <-- What happened here

Assignment 2

Editing ZapTel <-- What happened here

Could you make clear that the instructions are to make Case III working. Maybe it is an idea to draw a picture with the configuration where you name the different computers. Then it becomes clear which section of commands should be applied to which computer. Divide theory regarding the possible configurations, and Case III you tried to work out (actually the remark Mr. Achterop made earlier).