The analysis and modeling of efficiency of the developed telecommunication networks on the basis of IP PBX asterisk now

Bibliographic Details
Parent link:11th International Forum on Strategic Technology (IFOST 2016): 1-3 June 2016, Novosibirsk, Russiain/ Novosibirsk State Technical University.— , 2016
Pt. 1.— 2016.— [P. 510-514]
Corporate Author: Национальный исследовательский Томский политехнический университет (ТПУ) Институт неразрушающего контроля (ИНК) Кафедра промышленной и медицинской электроники (ПМЭ)
Other Authors: Serikov T. G., Mekhtiyev (Mekhtiev) A. Ali, Yugay V. V., Muratova A. K., Yakubova M. Z., Razinkin V. P., Okhorzina A. V., Yurchenko A. V. Aleksey Vasilievich, Alkina A. D.
Summary:Title screen
Communication of clients with the server passes through a wireless point of WiFi access. The attacking device is the laptop that has the software package of CommView for WiFi. The analysis of stability program by automatic telephone exchange on the basis of Asterisk NOW from unauthorized access to a telecommunication network is provided in this article. The software product on the basis of Asterisk NOW uses as the server. As softfon and client base laptops, computers, and gadgets on which passes test are considered. Communication of clients with the server passes through a wireless point of WiFi access. The attacking device is the laptop on which the software package of CommView for WiFi is established. By the result of carried out test the analysis of network's vulnerability was made. Recommendations about a measure of protection from unauthorized access are made. The optimum option of network protection is offered.
Режим доступа: по договору с организацией-держателем ресурса
Language:English
Published: 2016
Series:Information and communication technologies
Subjects:
Online Access:http://dx.doi.org/10.1109/IFOST.2016.7884168
Format: Electronic Book Chapter
KOHA link:https://koha.lib.tpu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=654569