The analysis and modeling of efficiency of the developed telecommunication networks on the basis of IP PBX asterisk now
| Parent link: | 11th International Forum on Strategic Technology (IFOST 2016): 1-3 June 2016, Novosibirsk, Russiain/ Novosibirsk State Technical University.— , 2016 Pt. 1.— 2016.— [P. 510-514] |
|---|---|
| Autor corporatiu: | |
| Altres autors: | , , , , , , , , |
| Sumari: | Title screen Communication of clients with the server passes through a wireless point of WiFi access. The attacking device is the laptop that has the software package of CommView for WiFi. The analysis of stability program by automatic telephone exchange on the basis of Asterisk NOW from unauthorized access to a telecommunication network is provided in this article. The software product on the basis of Asterisk NOW uses as the server. As softfon and client base laptops, computers, and gadgets on which passes test are considered. Communication of clients with the server passes through a wireless point of WiFi access. The attacking device is the laptop on which the software package of CommView for WiFi is established. By the result of carried out test the analysis of network's vulnerability was made. Recommendations about a measure of protection from unauthorized access are made. The optimum option of network protection is offered. Режим доступа: по договору с организацией-держателем ресурса |
| Idioma: | anglès |
| Publicat: |
2016
|
| Col·lecció: | Information and communication technologies |
| Matèries: | |
| Accés en línia: | http://dx.doi.org/10.1109/IFOST.2016.7884168 |
| Format: | Electrònic Capítol de llibre |
| KOHA link: | https://koha.lib.tpu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=654569 |
MARC
| LEADER | 00000nla2a2200000 4500 | ||
|---|---|---|---|
| 001 | 654569 | ||
| 005 | 20240222102153.0 | ||
| 035 | |a (RuTPU)RU\TPU\network\20205 | ||
| 035 | |a RU\TPU\network\20196 | ||
| 090 | |a 654569 | ||
| 100 | |a 20170504d2016 k y0engy50 ba | ||
| 101 | 0 | |a eng | |
| 102 | |a RU | ||
| 105 | |a a z 101zy | ||
| 135 | |a drcn ---uucaa | ||
| 181 | 0 | |a i | |
| 182 | 0 | |a b | |
| 200 | 1 | |a The analysis and modeling of efficiency of the developed telecommunication networks on the basis of IP PBX asterisk now |f T. G. Serikov, A. Mekhtiyev (Mekhtiev), V. V. Yugay [et al.] | |
| 203 | |a Text |c electronic | ||
| 225 | 1 | |a Information and communication technologies | |
| 300 | |a Title screen | ||
| 320 | |a [References: p. 514 (8 tit.)] | ||
| 330 | |a Communication of clients with the server passes through a wireless point of WiFi access. The attacking device is the laptop that has the software package of CommView for WiFi. The analysis of stability program by automatic telephone exchange on the basis of Asterisk NOW from unauthorized access to a telecommunication network is provided in this article. The software product on the basis of Asterisk NOW uses as the server. As softfon and client base laptops, computers, and gadgets on which passes test are considered. Communication of clients with the server passes through a wireless point of WiFi access. The attacking device is the laptop on which the software package of CommView for WiFi is established. By the result of carried out test the analysis of network's vulnerability was made. Recommendations about a measure of protection from unauthorized access are made. The optimum option of network protection is offered. | ||
| 333 | |a Режим доступа: по договору с организацией-держателем ресурса | ||
| 461 | 0 | |0 (RuTPU)RU\TPU\network\20157 |t 11th International Forum on Strategic Technology (IFOST 2016) |o 1-3 June 2016, Novosibirsk, Russiain |o in 2 pt. |o [proceedings] |f Novosibirsk State Technical University |d 2016 | |
| 463 | 0 | |0 (RuTPU)RU\TPU\network\20158 |t Pt. 1 |v [P. 510-514] |d 2016 | |
| 610 | 1 | |a электронный ресурс | |
| 610 | 1 | |a труды учёных ТПУ | |
| 610 | 1 | |a WiFi | |
| 610 | 1 | |a wireless network | |
| 610 | 1 | |a attacks | |
| 610 | 1 | |a address | |
| 610 | 1 | |a network devices | |
| 610 | 1 | |a server | |
| 610 | 1 | |a Asterisk NOW | |
| 610 | 1 | |a беспроводные сети | |
| 610 | 1 | |a атаки | |
| 610 | 1 | |a адреса | |
| 610 | 1 | |a серверы | |
| 610 | 1 | |a телекоммуникационные сети | |
| 701 | 1 | |a Serikov |b T. G. | |
| 701 | 1 | |a Mekhtiyev (Mekhtiev) |b A. |c Specialist in the field of electronics |c Senior researcher of Tomsk Polytechnic University, Candidate of technical sciences |f 1972- |g Ali |3 (RuTPU)RU\TPU\pers\39786 | |
| 701 | 1 | |a Yugay |b V. V. | |
| 701 | 1 | |a Muratova |b A. K. | |
| 701 | 1 | |a Yakubova |b M. Z. | |
| 701 | 1 | |a Razinkin |b V. P. | |
| 701 | 1 | |a Okhorzina |b A. V. | |
| 701 | 1 | |a Yurchenko |b A. V. |c physicist |c Professor of Tomsk Polytechnic University, Doctor of Technical Sciences |f 1974- |g Aleksey Vasilievich |y Tomsk |3 (RuTPU)RU\TPU\pers\35053 |9 18328 | |
| 701 | 1 | |a Alkina |b A. D. | |
| 712 | 0 | 2 | |a Национальный исследовательский Томский политехнический университет (ТПУ) |b Институт неразрушающего контроля (ИНК) |b Кафедра промышленной и медицинской электроники (ПМЭ) |3 (RuTPU)RU\TPU\col\18719 |
| 801 | 2 | |a RU |b 63413507 |c 20200716 |g RCR | |
| 856 | 4 | |u http://dx.doi.org/10.1109/IFOST.2016.7884168 | |
| 942 | |c CF | ||