Analysis of the Telecommunication Networks Name Institution Affiliation Abstract Communication between clients and the server computer occurs through a Wi-Fi access point that is wireless. The laptop acts as the attacking device and has the com view Wi-Fi software. The article gives an analysis of stability program using automated telephone exchange based on Asterisk NOW from an access that is not authorized to a telecommunication network (Goldstein & Rerle 2000). Asterisk NOW based software uses a server. Gadgets and Computers through which the test is passed are taken as Softfon and laptops that is client based. Network’s vulnerability analysis was done using the results obtained (Kuznetsov et al. 2000). Recommendations are made relating to a protection measure from access that is unauthorized. The choice that is made is optimum for network functions. All the advantages of the program IP ATC Asterisk Now are revealed during the process. IP PBX Asterisk Now LAN model which is on the Opnet modeler V.14 software package is made to research the parameters and features of such a network. The work that is performed has direction towards applications of its make in design by people with expertise design of telecommunication networks together with research related during decision-making stage in its design. Works Cited Avakov R.A. (1981). Bases of automatic switching. Maryland: Radio and communication. Goldstein B.S Ekhriyel I.M. & Rerle R. D. (2000). Intellectual networks. Maryland: Radio and communication. Kulgin M. (1999). Technologies of corporate networks. Boston: St. Petersburg. Kuznetsov A.E Pinchuk A. V. Sukhovitsky A.L. (2000). Creation of the IP-telephony networks / Computer Telephony. Boston: Pearson. [...]
Attached is the prompt. This is due at 12pm Friday, March 30th. Single Spaced. ONE Scholarly article on Telecommunications.