You are on page 1of 5

IMPLEMENTATION OF LINUX ZENTYAL AS A VOIP SERVER FOR WEB

BASED CONFERENCE ROOM APPLICATION

Susmini I. Lestariningati
Computer Engineering, Faculty of Engineering and Computer Science,
Indonesia Computer University (UNIKOM)
Jl. Dipati Ukur No. 112-114, Bandung 40132
lestariningati@yahoo.com

Abstract In this study designed an application that can provide


VoIP (Voice over Internet Protocol) is a technology that services such as conference room that integrates with
uses an IP network to provide voice communications slides, video and sound. Further use of these applications
electronically and in real-time. In implementation, VoIP can be implemented into Zentyal Linux operating system
can be used for a conference room that integrated with and can be tested based on the level of quality of service
slides, video, desktop sharing and voice. One of open that existed.
source web based conference room that ready to use is
Bigbluebutton. This application requires a VoIP module 2. Voice over Internet Protocol (VoIP)
that acts as a VoIP service provider in the application, Voice over Internet Protocol (VoIP) is a methodology
and to be connected with the client needed a tool that and group of technologies for the delivery of voice
acts as a gateway and have compatibility with the communications and multimedia sessions over Internet
conference room. Linux Zentyal operating system has a Protocol (IP) networks, such as the Internet. Other terms
built-in module for this purpose. The availability of commonly associated with VoIP are IP telephony,
VoIP services performed packet-capture process to Internet telephony, voice over broadband (VoBB),
obtain data packets received, the packet will be used as broadband telephony, IP communications, and
indicator of the VoIP service as an information from broadband phone service.
RTMP (Real Time Message Protocol). This protocol is
used as an indicator because voice packets are used in
VoIP services brought by this protocol. Then, to test
whether the RTMP protocol to function properly tested
by conducting conferences with several clients. The
outcomes is known that the greatest burden is when the
module initialization and just before the system
encountered a problem (down) and the results of testing
VoIP applications on Linux Zentyal showed that delay
that happens to play a role in VoIP, because voice is
sent must be in accordance with the delivery time in
order to have a conference that was not a big delay that
causing drop client. Figure 1 Voice Over Internet Protocol

Keywords: VoIP, Linux Zentyal, RTMP VoIP is a service delivered via a combination of
hardware and software. It enables people to use the
1. Introduction Internet as a means of transmitting voice, telephone
Nowadays VoIP technology is growing and utilized to calls, by sending voice data in IP packets rather than by
meet a wide range of technologies. In general, VoIP is traditional circuit switched transmissions (PSTN.)
used as a medium of cost-effective communication. Not VoIP calls over the Internet are usually free when the
only cost-effective, VoIP can also be integrated with file calls are made between two PCs or other types of IP
exchange, video and slides for presentation use. In hardware connected directly to the Internet.
addition, VoIP can also be used as a conference room In most cases where a VoIP call is terminated to a
that is implemented not only for 2 people, but can be traditional PSTN network, a small fee is charged to
used by many users. cover the cost of delivering the last leg of the call.
The problem that occurs is when the user in a Typically these costs are minimal and usually equate to
conference, that can not be handled by the service the cost of a local, domestic call, given that the Internet
provider (server) and the quality of a service cannot has been used to carry the call almost all the way.
guarantee when the service provider (server) can not
provide the service (down).
3. Web Conferencing o Network resource sharing
Web conferencing refers to a service that allows o Groupware: calendar, address book,
conferencing events to be shared with remote locations. webmail, wiki, etc.
These are sometimes referred to as webinars or, for o VoIP server
interactive conferences, online workshops. In general,  Jabber/XMPP server
the service is made possible by Internet technologies,  Zentyal User Corner for self users info updating
particularly on TCP/IP connections. The service allows  Reporting and monitoring
real-time point-to-point communications as well as  Software updates
multicast communications from one sender to many  Backups (configuration and remote data backup)
receivers. It offers information of text-based messages,
voice and video chat to be shared simultaneously, across
4. Design and Implementation
geographically dispersed locations. Applications for web
conferencing include meetings, training events, lectures, 4.1. Installation of the system
or short presentations from any computer. Computer spesification required for server web based
VoIP applications are:
1. Prosesor Intel Dual Core G620 2.60 Ghz
3.1. BigBlueButton
2. Minimum RAM 4 GB
BigBlueButton is an open source web conferencing
3. Harddisk space minimum 250 GB
system developed primarily for distance education.
BigBlueButton supports multiple audio and video
Installation of the system includes: operating system,
sharing, presentations with extended whiteboard
DHCP server, a web server Nginx and Bigbluebutton
capabilities - such as a pointer, zooming and drawing -
installation.
public and private chat, desktop sharing, integrated VoIP
1. The operating system used on the VoIP server is
using FreeSWITCH, and support for presentation of PDF
Linux Zentyal 2.2 while the client using the
documents and Microsoft Office documents. Moreover,
Windows 7 operating system. Installation of the
users may enter the conference in one of two roles:
Linux operating system can be done through the
viewer or moderator.
media CDROM for installation and subsequent
As a viewer, a user may join the voice conference, share
system base installation is done via the Internet.
their webcam, raise their hand, and chat with others. As
2. Setting DHCP (Dinamic Host Configuration
a moderator, a user may mute/unmute others, eject any
Protocol) needed because the server can provide
user from the session, and make any user the current
dynamic IP address for the client. Following the
presenter. The presenter may upload slides and control
installation of the DHCP server in Linux shell by
the presentation. [1]
typing the following command:
Although its components are open source, the
#sudo apt-get install dhcpd3
BigBlueButton client depends on a browser plugin for
3. Installing Ngix is to type the following command in
the Adobe Flash platform.
the shell Linux. The first line of this command is
used to install packages on a Linux server nginx
3.2. Linux Zentyal Zentyal.
Zentyal (formerly eBox Platform) is a program for a #sudo apt-get install nginx
Linux server for small and medium enterprises (SMBs), 4. After the DHCP server and a web server installed on
considered an alternative to Windows Server and other the Zentyal, the next stage Bigbluebutton
Microsoft infrastructure products for SMBs. Zentyal can application installation. Following initial installation
act as a gateway, Network Infrastructure Manager, configuration script Bigbluebutton:
Unified Threat Manager, office server, Unified #sudo apt-get install bigbluebutton
communications server or a combination of them. As of 5. After installing DHCP client and client opens the
September 2010, Zentyal 2.0 offers the following application by typing the IP address of the server on
features: the web browser.
 Networking
o Firewall and routing 4.2. Network Topology
o Network infrastructure
Network topology used is a physical star topology.
o VPN support
Three client computers and 1 server computer
o HTTP proxy
connected using a switch, the IP address settings as
o Intrusion Detection System
shown in figure 2 below.
o Mail Server
 Webmail
 Web server
o Certification authority
 Workgroup
o Centralized users and groups management
o Windows PDC
Komputer
Server VoIP

Network :192.168.1.0
IP Address : 192.168.1.1
Subnet Mask : 255.255.255.0
DHCP Server :
Switch 192.168.1.2 - 19.168.1.6

Client 3 :
DHCP

Client 1 :
DHCP

Client 2 :
DHCP

Figure 2 Network Topology

Before testing the Bigbluebutton application, we should


checking log on system, the aim is for the logs that had Figure 4 Packet Capturing Process
previously error can be cleaned and checked whether
Bigbluebutton application is active, commands that are
used in the shell, namely:
# sudo bbb-conf - clean
# sudo bbb-conf – check

4.3. Testing Availability of Voice Services


The next test is the test flow protocol used in conference
room that is used for testing the service. Testing is done
by performing packet capture using Wireshark software

Figure 5 Graph Analysis

From Figure 4 and 5 can be seen that working process on


the application protocol conference room using TCP,
Figure 3 BigBlueButton Application HTTP and RTMP. TCP (Transmission Control Protocol)
served to open lines of communication between the host
Figure 3 shows conference room application after the and the server so that there is a connection between the
login process is ready to stream audio and existing two so that the service can be provided. Once the
clients. When streaming process has occurred, during the connection is established services is further provided
process of data paker taken using Wireshark for knowing web services, HTTP (Hypertext Transfer Protocol)
the application packages that are transmitted during the tasked to deliver the content of the web content
streaming process in conference room applications. requested. RTMP (Real Time Message Protocol) in
Results of packet capture can be seen in Figure 4. Packet charge of carrying voice streaming content, this protocol
capture process is done on the client computer with the will be active during the streaming process sound, if the
IP address 192.168.1.7. protocol is not recorded when the packet capture process
can be an indication that the VoIP services in conference
room applications are not running, so the client can only
accept web services only. This can occur because of a
failure while running the web browser components
required by applications, such as the failure of the
component initialization red5, if this happens the client
will still get a view of applications such as in Figure 5
but sound streaming content can not be heard by another
client who was on the application. If this failure occurs
on the client's web browser page and conference room
applications must be reloaded.

4.4. Conference Testing


Delay and throughput obtained by using summaries
obtained from Wireshark software. Summaries are used
to see the quality of service in Bigbluebutton application.

Table 1 Delay and Throughput

Throughpu
Client Delay (ms)
t (Mbps)
Client 1 5,9 0,213
Client 2 12,7 0,181 Figure 7 CPU 0 Usage
Client 3 11,7 0,253 On the CPU workload is shown figure 7 there are several
Average 10,1 0,215 processes that work overload of the CPU, the process is:
a. Idle and steals
From the test results obtained, the delay value obtained Idle and steals when the CPU is running various
does not exceed 150 ms. This proves that there is delay modules are active according to the configuration
value is very good according to standard Tiphon. used.
b. User and system
4.5. System Workload and Resource Usage User and system CPU time is the process of
Monitoring fulfilling service requests from users when users
The next step is to see the system workload and resource access the services provided on the application
usage monitoring system is displayed on Zentyal server. server such as conference room access and run the
necessary modules.
c. Interrupt, soft interrupt and wait
Interrupt, soft interrupt and wait adalalah current
process CPU interrupts execute commands such as
the services provided by the firewall drop
connection.
d. Nice
Nice is the process when examining changes in the
configuration of the CPU module is running.

Figure 6 Workload of The System

Workload of the system is shown Figure 9 contains


information about the current state of the server works
with the three conditions of the running processes
a. Short term
Short term is a process that runs with short periods
or for the purposes of initialization module moment
or event that required such as DHCP initialization.
b. Mid Term
Mid term is a process that runs the middle period.
Figure 8 File System Usage
This process is associated with keeping the current
In the figure 8 is shown how much the use of the file
server load module or event that has been active as
system on the server when providing services Zentyal
logs and monitoring process.
c. Long Term
Long term is a process that runs the length of the
period. This process is related to the current server
load already provide services to clients such as a
data streaming process.
Figure 9 Physical Memory Usage

Figure 9 shows the allocation of RAM which is used


both for processing, page cache (allocation for the
module) and the buffer cache (allocations for streame
data).
Figure 7, 8, 9, and 10 show the processes and CPU
usage, RAM and hard drive while the system is working.

Figure 10 Module and Event Report

Figure 10 provides a report server activity that occurs


within a certain time frame. This report contains the
server when to start the service, which modules are not
running and when the server is not able to provide
services such as the date of December 28, 2012 at 14
server is down. This report is useful for evaluating the
work of the performance of the server so that it can be
determined when to do maintenance and optimization.

5. Conclusions
Monitoring results is known that the greatest burden is
when the module initialization and just before the system
encountered a problem (down). Once the system is back
to normal and running back module, load the system
tends to be stable by 4:10 image when viewed from the
load at mid term and long term service as it relates to
VoIP services.

References
[1] "BigBlueButton Overview". bigbluebutton.org. Archived
from the original on 25 October 2010.
[2] J. Martinez, K. Johnson, and C. Dean, “Article Title”, Book
Title, Publisher, pp. 1-10. June 2008.

You might also like