I . Introduction
First and foremost I would like to thank Matt Florel and the
VICIdial group for the thousands of man hours it took them to develop astguiclient or as we know right now VICIdial.
This document is not an official article from the VICIdial group. I made this document to introduce new users to this wonderful piece of open source software that can be used to power startup call centers at lesser capital ( imagine getting an avaya system that’s around 1,000 –
1,800 USD a seat).
This document will cover the basics of vicidial, I will discuss one by one the major components of a VICIdial system and how they work together as a solution to your needs.
We will be tackling installation and configuration from scratch using Ubuntu Server 8.0.4 LTS as my choice of distribution mainly because most of my deployments are on Ubuntu Server. And yes we will be installing from scratch.
At the end of this document you will be able to have an understanding of how vicidial works, how to install it and how to start operating it.
And lastly this document is not for sale, this can be downloaded freely. It is my pleasure to give back to the community by making other new users knowledgeable instead of ripping them off.
II. What is VICIdial?
VICIdial is a set of scripts that are designed to interact with the
Asterisk Open-Source IP PBX Phone System to make it function as an inbound / outbound call center solution.
Scripts are made up of PERL and PHP. It uses MySQL as its database server, Apache / Httpd Server for its front end web interface, and Linux as its operating system.
It is developed by the vicidial group http://www.vicidial.com lead by Matt Florel.
And YES VICIdial is Open-Source under AGPLv2 license. No licensing cost involved, what you will be paying for mostly will be the integration cost, training and custom development.
The latest version of VICIdial upto date is: VICIdial 2.2 Release
Candidate 7.
The latest development version of VICIdial is: 2.4b which can be downloaded using subversion.
III. Features of Vicidial?
Here are the major features of VICIdial as taken from their official project website http://www.vicidial.org:
Inbound, Outbound and Blended call handling
Outbound agent-controlled, broadcast and predictive dialing
Full USA FTC-compliance capability
Web-based agent and administrative interfaces
Ability to have agents operate remotely
Integrated call recording
Three-Way calling within the agent application
Scheduled Callbacks: Agent-Only and Anyone
Scalable to hundreds of seats
Ability to use standard Telco lines and VOIP trunks
Open-Source AGPLv2 licensed, with no software licensing cost
IV. VICIdial Full Feature List
Ability for an agent to call clients in succession from a database through a web-client
Ability to display a script for the agent to read with fields like name, address, etc. filled-in
Ability to set a campaign to auto-dial and send live calls to available agents
Ability to dial predictively in a campaign with an adaptive dialing algorithm Ability to dial on a single campaign across multiple Asterisk servers, or multiple campaigns on a single server
Ability to transfer calls with customer data to a closer/verifier on the local system or a remote Asterisk server
Ability to open a custom web page with user data from the call, per campaign
Ability to autodial campaigns to start with a simple IVR then direct to agent
Ability to broadcast dial to customers with a pre-recorded message Ability to park the customer with custom music per campaign
Ability to send a dropped call to a voicemail box per campaign if no agent is available
Ability to set outbound CallerID per campaign
Ability to take inbound calls grabbing CallerID
Ability to function as an ACD for inbound and fronter/closer verification calls
Ability to have an agent take both
prevent box contents from extending across page boundaries. Task 1: Displaying IP Configuration Settings Open the Windows Command Prompt using the desktop or the Taskbar icon. Maximize the size of the CLI. Use the ipconfig /all command to determine the following IP configuration settings for “Wired” Ethernet NIC: IP Address: 169.254.102.64 Subnet Mask: 255.255.0.0 Default Gateway: NONE MAC (Physical) Address 00-0C-29-13-36-83 Copy and paste the specified ipconfig /all command output…
Session Management Network Layer Functions Addressing Routing TCP/IP Examples Implications for Management Network and Transport Layers Transport Layer Layer 4 in the Internet model Links application and network layers Responsible for segmentation and reassembly Session management Responsible for end-to-end delivery of messages Network Layer Layer 3 in the Internet model Responsible for addressing and routing of messages Protocols TCP/IP Originally developed as a single internetworking protocol by Vint…
IP Address Schema A private network will be planned and designed for this particular company and with this type of network planning, private IP addresses will be put in place to prevent public routing. The purpose of a private IP addressing scheme is to allow an organization to issue their devices IP addresses from a private network range. By using a private address scheme, it will allow this company to use a small portion of public IP addresses and with these limits; all network devices can be…
extending across page boundaries. Task 1: Rename the Ethernet Interface and Display IP Configuration Settings Open the Windows Command Prompt using the desktop or the Taskbar icon. Maximize the size of the CLI. Use the ipconfig /all command to determine the following IP configuration settings for “Wired” Ethernet NIC: IP Address: 192.168.101.114 Subnet Mask: 255.255.255.0 Default Gateway: 192.168.101.1 MAC (Physical) Address 74-E5-0B-1A-DB-8C Copy and paste the specified ipconfig /all command output…
Frantzy Senat Lab 1.2 1 What three categories of tasks are listed in the ICT interface?Provide computer information, Update this server, and download and installing updates. 2What is the current time zone configured for this computer?Pacific Time 3 Why does a shield icon appear next to the Change date and time button?It indicates that this process requires full administrator access token and it will display a UACelevation prompt 4 What is the current name of your computer? W2K8xx…
world has an IP address that connects to the internet. When the internet was created they did not believe that IPv4 was ever going to run out of possible addresses that are able to be assigned to individuals and companies. Each IP address is assigned to either a wireless or wired connection. The history of IPv6 which is barely out there yet it does have a history already. There are many positives and negatives of both addressing Internet Protocols. Also I will talk about how DHCP servers can be used…
No firewall can protect the network from internal or external threats, especially those that use spoofed or manipulated IP address information. The defense in depth (DiD) approach is the most effective method of securing resources and makes use of many different layers of network security. Hence, the need for more than one firewall, be it in a personal workstation and server, is a good idea to protect against intruders. If intruders gain control of the perimeter firewall or network management software…
Unit 1 Exercise 1. IP Addressing Scenario The subnet range would be one-hundred and forty five from one-hundred and forty six. The network number would be one-hundred and forty four. Also the broadcast number will be one-hundred and forty seven. In this case as far as which class it would be is class b. Honestly I would say because of the number of hosts. In the case of the how the IP addressed would be assigned I would consider choosing statically. Why because a static IP address is a number that…
• The server that holds the primary zone is called a primary server. • Each zone can have only a single primary zone server. • Zone data is stored in a text file. Secondary A secondary zone is a read-only copy of the zone database. • Changes cannot be made to the records in a secondary zone. • A server that holds a secondary zone is called a secondary server. • Secondary servers copy zone data from other servers through a process called zone transfer. • Secondary servers can copy…
addressing. Use ipconfig to retrieve host IP information. Use ping to verify connectivity. Hint: To ensure that the instructions always remain visible during an activity, click the "Top" check box in the lower left-hand corner of this instruction window. Background In this activity, you will add two computers to the Branch Office network. The company uses DHCP for dynamic addressing of all PCs. Step 1: Study the Topology The topology shows 2 PCs, a switch, a server, a router, and a cloud. Considering…