SlideShare une entreprise Scribd logo
1  sur  40
AstriCon 2007 September 27 Testing  Asterisk Advanced Test Methodologies  for Enterprise Class IP PBXs Stefano Carlini & Dario Busso, Klarya srl [email_address] [email_address]
Klarya @ ATS Group ,[object Object],...dai voce alla tua rete!
...dai voce alla tua rete! Customers in Italy
Enterprise IP Communication ,[object Object],[object Object],[object Object],[object Object],[object Object],...dai voce alla tua rete!
Is Asterisk enterprise ready? ,[object Object],[object Object],[object Object],[object Object],...dai voce alla tua rete!
Asterisk & SIP, the key factor ,[object Object],[object Object],[object Object],[object Object],...dai voce alla tua rete!
The tutorial focus ,[object Object],[object Object],[object Object],[object Object],[object Object],...dai voce alla tua rete!
Important Note ...dai voce alla tua rete! This is an overview about Asterisk Testing Methodologies This is  not  a full and complete study Purpose: give the  guidelines  to test your Asterisk PBXs
Testing SIP, interesting... but... ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Test Tools: Spirent Abacus 5000 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Abacus 5000: IGC3 card (1)‏ ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],Abacus 5000: IGC3 card (2)‏
Test Scenario (1)‏
Test Scenario (2)‏
Test Scenario (3)‏ ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
System(s) Under Test – SUTs (1)‏ ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
System(s) Under Test – SUTs (2)‏ ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Measurable Results: Abacus 5000 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],... and more...
The Measured Results. Focus on: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Testing Methodology (1)‏ ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Testing Methodology (2)‏ ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Testing Methodology (3)‏ ,[object Object],[object Object]
Test #1: Call Setup Rate (1)‏ ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Test #1: Call Setup Rate (2)‏ ,[object Object]
Test #1: Call Setup Rate (3)‏ ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Test #1: Call Setup Rate (4)‏ ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Test #2: Max Concurrent Calls (1)‏ ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Test #2: Max Concurrent Calls (2)‏ ,[object Object]
Test #2: Max Concurrent Calls (3)‏ ,[object Object],[object Object],[object Object],[object Object],[object Object]
Test #2: Max Concurrent Calls (4)‏ ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Results ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Results – Call Setup Rate Test (1)‏ ,[object Object],[object Object]
Results – Call Setup Rate Test (2)‏
Results – Call Setup Rate Test (3)‏
Results – Max Concurrent Calls
Results – Max Concurrent Calls
Conclusion (1)‏ ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusion (2)‏ Identify your deployment target Study the competitor's performances in order to have a reference Spend time to analyse and optimize your dial plan Study your system (OS & Applications) in order to optimize the configuration parameters
Conclusion (3)‏ A simple example: when you grow the number of the concurrent calls you get the following error in Asterisk: ERROR[6637] rtp.c: Unable to allocate socket: Too many open files  To solve the trouble you need increase the number of Operating System Open Files. In Gnuinux you need add the following command in startup Asterisk script: ulimit -c unlimited
Thank you! Klarya s.r.l. www.klarya.it [email_address]

Contenu connexe

Tendances

ACI Multicast 구성 가이드
ACI Multicast 구성 가이드ACI Multicast 구성 가이드
ACI Multicast 구성 가이드Woo Hyung Choi
 
SIP (Session Initiation Protocol)
SIP (Session Initiation Protocol)SIP (Session Initiation Protocol)
SIP (Session Initiation Protocol)KHNOG
 
Asterisk-Java Framework Presentation
Asterisk-Java Framework PresentationAsterisk-Java Framework Presentation
Asterisk-Java Framework PresentationJustin Grammens
 
ACI DHCP 구성 가이드
ACI DHCP 구성 가이드ACI DHCP 구성 가이드
ACI DHCP 구성 가이드Woo Hyung Choi
 
Transitioning IPv4 to IPv6
Transitioning IPv4 to IPv6Transitioning IPv4 to IPv6
Transitioning IPv4 to IPv6Jhoni Guerrero
 
Jingle: Cutting Edge VoIP
Jingle: Cutting Edge VoIPJingle: Cutting Edge VoIP
Jingle: Cutting Edge VoIPmattjive
 
NetFlow Monitoring for Cyber Threat Defense
NetFlow Monitoring for Cyber Threat DefenseNetFlow Monitoring for Cyber Threat Defense
NetFlow Monitoring for Cyber Threat DefenseCisco Canada
 
Sinnreich Henry Johnston Alan Pt 3
Sinnreich Henry Johnston Alan   Pt 3Sinnreich Henry Johnston Alan   Pt 3
Sinnreich Henry Johnston Alan Pt 3Carl Ford
 
Network Traffic Search using Apache HBase
Network Traffic Search using Apache HBaseNetwork Traffic Search using Apache HBase
Network Traffic Search using Apache HBaseEvans Ye
 
Stupid iptables tricks
Stupid iptables tricksStupid iptables tricks
Stupid iptables tricksJim MacLeod
 
IPv6 Transition Strategies
IPv6 Transition StrategiesIPv6 Transition Strategies
IPv6 Transition StrategiesAPNIC
 
RARP, BOOTP, DHCP and PXE Protocols
RARP, BOOTP, DHCP and PXE ProtocolsRARP, BOOTP, DHCP and PXE Protocols
RARP, BOOTP, DHCP and PXE ProtocolsPeter R. Egli
 
Iptables Configuration
Iptables ConfigurationIptables Configuration
Iptables Configurationstom123
 
Introduction to VoIP using SIP
Introduction to VoIP using SIPIntroduction to VoIP using SIP
Introduction to VoIP using SIPKundan Singh
 

Tendances (20)

Cipc
CipcCipc
Cipc
 
ACI MultiPod 구성
ACI MultiPod 구성ACI MultiPod 구성
ACI MultiPod 구성
 
ACI Multicast 구성 가이드
ACI Multicast 구성 가이드ACI Multicast 구성 가이드
ACI Multicast 구성 가이드
 
Wireshark
WiresharkWireshark
Wireshark
 
SIP for geeks
SIP for geeksSIP for geeks
SIP for geeks
 
SIP (Session Initiation Protocol)
SIP (Session Initiation Protocol)SIP (Session Initiation Protocol)
SIP (Session Initiation Protocol)
 
Asterisk-Java Framework Presentation
Asterisk-Java Framework PresentationAsterisk-Java Framework Presentation
Asterisk-Java Framework Presentation
 
ACI DHCP Config Guide
ACI DHCP Config GuideACI DHCP Config Guide
ACI DHCP Config Guide
 
Nat
NatNat
Nat
 
ACI DHCP 구성 가이드
ACI DHCP 구성 가이드ACI DHCP 구성 가이드
ACI DHCP 구성 가이드
 
Transitioning IPv4 to IPv6
Transitioning IPv4 to IPv6Transitioning IPv4 to IPv6
Transitioning IPv4 to IPv6
 
Jingle: Cutting Edge VoIP
Jingle: Cutting Edge VoIPJingle: Cutting Edge VoIP
Jingle: Cutting Edge VoIP
 
NetFlow Monitoring for Cyber Threat Defense
NetFlow Monitoring for Cyber Threat DefenseNetFlow Monitoring for Cyber Threat Defense
NetFlow Monitoring for Cyber Threat Defense
 
Sinnreich Henry Johnston Alan Pt 3
Sinnreich Henry Johnston Alan   Pt 3Sinnreich Henry Johnston Alan   Pt 3
Sinnreich Henry Johnston Alan Pt 3
 
Network Traffic Search using Apache HBase
Network Traffic Search using Apache HBaseNetwork Traffic Search using Apache HBase
Network Traffic Search using Apache HBase
 
Stupid iptables tricks
Stupid iptables tricksStupid iptables tricks
Stupid iptables tricks
 
IPv6 Transition Strategies
IPv6 Transition StrategiesIPv6 Transition Strategies
IPv6 Transition Strategies
 
RARP, BOOTP, DHCP and PXE Protocols
RARP, BOOTP, DHCP and PXE ProtocolsRARP, BOOTP, DHCP and PXE Protocols
RARP, BOOTP, DHCP and PXE Protocols
 
Iptables Configuration
Iptables ConfigurationIptables Configuration
Iptables Configuration
 
Introduction to VoIP using SIP
Introduction to VoIP using SIPIntroduction to VoIP using SIP
Introduction to VoIP using SIP
 

En vedette

6 Reasons BLOGGING is Good for Your Business
6 Reasons BLOGGING is Good for Your Business6 Reasons BLOGGING is Good for Your Business
6 Reasons BLOGGING is Good for Your BusinessErik Wolf
 
My speech at Internetworking Roma 2008
My speech at Internetworking Roma 2008My speech at Internetworking Roma 2008
My speech at Internetworking Roma 2008stefanocarlini
 
Marketing Automation Workshop - Colorado AMA 10/24/13
Marketing Automation Workshop - Colorado AMA 10/24/13Marketing Automation Workshop - Colorado AMA 10/24/13
Marketing Automation Workshop - Colorado AMA 10/24/13Erik Wolf
 
My speech at Internetworking Milano 2009
My speech at Internetworking Milano 2009My speech at Internetworking Milano 2009
My speech at Internetworking Milano 2009stefanocarlini
 
11 Things You Never Knew About Email Marketing (And How to do It Successfully)
11 Things You Never Knew About Email Marketing (And How to do It Successfully)11 Things You Never Knew About Email Marketing (And How to do It Successfully)
11 Things You Never Knew About Email Marketing (And How to do It Successfully)Erik Wolf
 
My speech at CONFSL 2009- – III Conferenza Italiana sul Software Libero
My speech at CONFSL 2009- – III Conferenza Italiana sul Software LiberoMy speech at CONFSL 2009- – III Conferenza Italiana sul Software Libero
My speech at CONFSL 2009- – III Conferenza Italiana sul Software Liberostefanocarlini
 
My speech at AstriCon 2008
My speech at AstriCon 2008My speech at AstriCon 2008
My speech at AstriCon 2008stefanocarlini
 

En vedette (7)

6 Reasons BLOGGING is Good for Your Business
6 Reasons BLOGGING is Good for Your Business6 Reasons BLOGGING is Good for Your Business
6 Reasons BLOGGING is Good for Your Business
 
My speech at Internetworking Roma 2008
My speech at Internetworking Roma 2008My speech at Internetworking Roma 2008
My speech at Internetworking Roma 2008
 
Marketing Automation Workshop - Colorado AMA 10/24/13
Marketing Automation Workshop - Colorado AMA 10/24/13Marketing Automation Workshop - Colorado AMA 10/24/13
Marketing Automation Workshop - Colorado AMA 10/24/13
 
My speech at Internetworking Milano 2009
My speech at Internetworking Milano 2009My speech at Internetworking Milano 2009
My speech at Internetworking Milano 2009
 
11 Things You Never Knew About Email Marketing (And How to do It Successfully)
11 Things You Never Knew About Email Marketing (And How to do It Successfully)11 Things You Never Knew About Email Marketing (And How to do It Successfully)
11 Things You Never Knew About Email Marketing (And How to do It Successfully)
 
My speech at CONFSL 2009- – III Conferenza Italiana sul Software Libero
My speech at CONFSL 2009- – III Conferenza Italiana sul Software LiberoMy speech at CONFSL 2009- – III Conferenza Italiana sul Software Libero
My speech at CONFSL 2009- – III Conferenza Italiana sul Software Libero
 
My speech at AstriCon 2008
My speech at AstriCon 2008My speech at AstriCon 2008
My speech at AstriCon 2008
 

Similaire à My speech at AstriCon 2007

BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.Sumutiu Marius
 
Brendan kearns berlin 2012 vn3
Brendan kearns berlin 2012 vn3Brendan kearns berlin 2012 vn3
Brendan kearns berlin 2012 vn3Brendan Kearns
 
Asterisk World Theater Talk Tlc 080319
Asterisk World Theater Talk Tlc 080319Asterisk World Theater Talk Tlc 080319
Asterisk World Theater Talk Tlc 080319Carl Ford
 
Sevana VQM Administration Manual
Sevana VQM Administration ManualSevana VQM Administration Manual
Sevana VQM Administration ManualSevana Oü
 
Introduction to Fog
Introduction to FogIntroduction to Fog
Introduction to FogCisco DevNet
 
Cisco Multi-Service FAN Solution
Cisco Multi-Service FAN SolutionCisco Multi-Service FAN Solution
Cisco Multi-Service FAN SolutionCisco DevNet
 
Adhearsion and Telegraph Framework Presentation
Adhearsion and Telegraph Framework PresentationAdhearsion and Telegraph Framework Presentation
Adhearsion and Telegraph Framework PresentationJustin Grammens
 
Getting the best out of WebRTC
Getting the best out of WebRTCGetting the best out of WebRTC
Getting the best out of WebRTCDigium
 
Getting the Best Out Of WebRTC - Astricon 2014
Getting the Best Out Of WebRTC - Astricon 2014Getting the Best Out Of WebRTC - Astricon 2014
Getting the Best Out Of WebRTC - Astricon 2014Dan Jenkins
 
Astricon 2010: Scaling Asterisk installations
Astricon 2010: Scaling Asterisk installationsAstricon 2010: Scaling Asterisk installations
Astricon 2010: Scaling Asterisk installationsOlle E Johansson
 
SVR402: DirectAccess Technical Drilldown, Part 2 of 2: Putting it all together.
SVR402: DirectAccess Technical Drilldown, Part 2 of 2: Putting it all together.SVR402: DirectAccess Technical Drilldown, Part 2 of 2: Putting it all together.
SVR402: DirectAccess Technical Drilldown, Part 2 of 2: Putting it all together.Louis Göhl
 
Using Asterisk in a SIP softswitch
Using Asterisk in a SIP softswitchUsing Asterisk in a SIP softswitch
Using Asterisk in a SIP softswitchMonica McArthur
 
Session Initiation Protocol
Session Initiation ProtocolSession Initiation Protocol
Session Initiation ProtocolMatt Bynum
 

Similaire à My speech at AstriCon 2007 (20)

Astricon 2007
Astricon 2007Astricon 2007
Astricon 2007
 
BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.
 
Brendan kearns berlin 2012 vn3
Brendan kearns berlin 2012 vn3Brendan kearns berlin 2012 vn3
Brendan kearns berlin 2012 vn3
 
Ruby voip
Ruby voipRuby voip
Ruby voip
 
Asterisk World Theater Talk Tlc 080319
Asterisk World Theater Talk Tlc 080319Asterisk World Theater Talk Tlc 080319
Asterisk World Theater Talk Tlc 080319
 
Portfolio
PortfolioPortfolio
Portfolio
 
Vo ip sip
Vo ip sipVo ip sip
Vo ip sip
 
Sevana VQM Administration Manual
Sevana VQM Administration ManualSevana VQM Administration Manual
Sevana VQM Administration Manual
 
Introduction to Fog
Introduction to FogIntroduction to Fog
Introduction to Fog
 
Cisco Multi-Service FAN Solution
Cisco Multi-Service FAN SolutionCisco Multi-Service FAN Solution
Cisco Multi-Service FAN Solution
 
VOIP services
VOIP servicesVOIP services
VOIP services
 
Adhearsion and Telegraph Framework Presentation
Adhearsion and Telegraph Framework PresentationAdhearsion and Telegraph Framework Presentation
Adhearsion and Telegraph Framework Presentation
 
Ethernet basics
Ethernet basicsEthernet basics
Ethernet basics
 
Getting the best out of WebRTC
Getting the best out of WebRTCGetting the best out of WebRTC
Getting the best out of WebRTC
 
Getting the Best Out Of WebRTC - Astricon 2014
Getting the Best Out Of WebRTC - Astricon 2014Getting the Best Out Of WebRTC - Astricon 2014
Getting the Best Out Of WebRTC - Astricon 2014
 
Astricon 2010: Scaling Asterisk installations
Astricon 2010: Scaling Asterisk installationsAstricon 2010: Scaling Asterisk installations
Astricon 2010: Scaling Asterisk installations
 
SVR402: DirectAccess Technical Drilldown, Part 2 of 2: Putting it all together.
SVR402: DirectAccess Technical Drilldown, Part 2 of 2: Putting it all together.SVR402: DirectAccess Technical Drilldown, Part 2 of 2: Putting it all together.
SVR402: DirectAccess Technical Drilldown, Part 2 of 2: Putting it all together.
 
Using Asterisk in a SIP softswitch
Using Asterisk in a SIP softswitchUsing Asterisk in a SIP softswitch
Using Asterisk in a SIP softswitch
 
IP and VoIP Fundamentals
IP and VoIP FundamentalsIP and VoIP Fundamentals
IP and VoIP Fundamentals
 
Session Initiation Protocol
Session Initiation ProtocolSession Initiation Protocol
Session Initiation Protocol
 

My speech at AstriCon 2007

  • 1. AstriCon 2007 September 27 Testing Asterisk Advanced Test Methodologies for Enterprise Class IP PBXs Stefano Carlini & Dario Busso, Klarya srl [email_address] [email_address]
  • 2.
  • 3. ...dai voce alla tua rete! Customers in Italy
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. Important Note ...dai voce alla tua rete! This is an overview about Asterisk Testing Methodologies This is not a full and complete study Purpose: give the guidelines to test your Asterisk PBXs
  • 9.
  • 10.
  • 11.
  • 12.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33. Results – Call Setup Rate Test (2)‏
  • 34. Results – Call Setup Rate Test (3)‏
  • 35. Results – Max Concurrent Calls
  • 36. Results – Max Concurrent Calls
  • 37.
  • 38. Conclusion (2)‏ Identify your deployment target Study the competitor's performances in order to have a reference Spend time to analyse and optimize your dial plan Study your system (OS & Applications) in order to optimize the configuration parameters
  • 39. Conclusion (3)‏ A simple example: when you grow the number of the concurrent calls you get the following error in Asterisk: ERROR[6637] rtp.c: Unable to allocate socket: Too many open files To solve the trouble you need increase the number of Operating System Open Files. In Gnuinux you need add the following command in startup Asterisk script: ulimit -c unlimited
  • 40. Thank you! Klarya s.r.l. www.klarya.it [email_address]