Solved

Total Active Calls 1 = Active Channels 2 Trixbox

Posted on 2010-08-27
5
1,127 Views
Last Modified: 2013-12-21
Trixbox is reporting that every call takes up two channels, can anyone explain this?
0
Comment
Question by:TestMonkey
  • 2
  • 2
5 Comments
 
LVL 16

Expert Comment

by:ccomley
Comment Utility
Could it be one channel for the call comign in from the trunk and one to connect the call onwards to your phone? Or are you forwarding the call to a mobile or something?
0
 
LVL 1

Author Comment

by:TestMonkey
Comment Utility
The phones are all IP phones and they are internal, call comes in on PRI, personal answers on IP phone
0
 
LVL 16

Expert Comment

by:ccomley
Comment Utility
I see - and the "channels" being reported are what? PRI channels, VOIP channels..?
0
 
LVL 1

Author Comment

by:TestMonkey
Comment Utility
How do I find that?
0
 
LVL 2

Accepted Solution

by:
asternic earned 500 total points
Comment Utility
A call has 2 legs: caller and callee. Each one takes one channel in asterisk, and if they are bridged together they count as 1 call.

When you have 1 call up between two extensions, you should see something like this in the asterisk cli when doing a "core show channels":

2 active channels
1 of 20 max active call ( 5.00% of capacity)

That is normal, the two channels are the legs of the call.

Now, if you have an inbound call that is not bridged to any extension and is busy in an application, like waiting on a queue, waiting for dtmf input, playing moh, leaving a voicemail, etc... as that particular channel is not bridged to any other, it will only count as one, and the output in show channels will look like this:

1 active channel
1 of 20 max active call ( 5.00% of capacity)

So, a bridged call takes 2 channels, while a non bridged call takes 1 channel.

Now, if you happen to use Local or Agent channel types, you will have to multiply that leg x 2.






0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

I recently purchased a Bluetooth headset called the Music Jogger (model BSH10). The control buttons on it look like this: One of my goals is to use it as the microphone and speakers for Skype calls. In that respect, it works well. However, I …
As companies replace their old PBX phone systems with Unified IP Communications, many are finding out that legacy applications such as fax do not work well with VoIP. Fortunately, Cloud Faxing provides a cost-effective alternative that works over an…
This tutorial demonstrates a quick way of adding group price to multiple Magento products.
You have products, that come in variants and want to set different prices for them? Watch this micro tutorial that describes how to configure prices for Magento super attributes. Assigning simple products to configurable: We assigned simple products…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now