• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 13
  • 6
  • 4
  • 2
  • Tagged with
  • 25
  • 18
  • 12
  • 10
  • 10
  • 9
  • 9
  • 9
  • 8
  • 5
  • 5
  • 5
  • 4
  • 4
  • 4
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Spojovací systémy založené na IP telefonii / Communication systems based on IP telephony

Zimek, Josef January 2008 (has links)
My master’s thesis is focused on designing and creating communication network, which provides communication between two independent networks through encrypted tunnel. My solution is based on routers formed by older personal computers with FreeBSD like a operating system. Between routers is created static encrypted tunnel by using IPSec protocol. Voice services provides packet oriented exchange Asterisk with support of signaling protocol SIP. This solution can be used eg. for connecting remote branch to headquarters of company and then can branch utilize shrared resources. To headquarters can connect also remote workers from their home. In this case are used SSL certificates to authentication of user. This scenario is very required today.
12

Komunikační síť ve firmě / Net for communication in a company

Sychra, Jakub January 2008 (has links)
This work deals with accessible communications technologies and their possible usage in firms. It is necessary to have a survey about types and trends of communications technologies at proposal of communications network. It is important to choose the combination that is suitable with its reliability, achievement and price.
13

Analýza možností implementace VoIP v rozlehlé síti Třineckých železáren a.s. / Analysis of VoIP implementation in the WAN network of Třinecké železárny a.s.

Pieniažek, Ireneusz January 2010 (has links)
This diploma thesis is focused on the implementation of the technology VoIP in the remote branch offices of a big company. There are used the current WAN lines, which have been so far used only for transfer of data. Implementation of IP telephony is extending the utilization of those lines and at the same time the costs for running of the telephone services are reduced. There are described the models for proposal and also the proposal for solution of IP telephony for a specific company.
14

Analýza audio kodeků užívaných při IP telefonii / Analysis of Audio Codecs Applied in IP telephony

Hlavica, Michal January 2012 (has links)
Issue of this diploma thesis is focused on analysis of audio codecs used within IP telephony. Attention of teoretical part is given mostly to audio codecs according to ITU-T recommendations, but also to signaling protocols used here. For practical part of analysis is chosen router Cisco 2821 and IP phones Cisco 7975G. Configuration is done over operating system Cisco IOS. Chosen signaling protocol is SCCP. For analysis itself are chosen 2 analysers – L-580FX and Fluke NetTool. These are used in combination with program Wireshark. Analysed parameters are latency, packet lost, bandwidth, jitter and mean opinion score. Measured values are presented in graphs and tables and they are discussed. Next output of the thesis is laboratory excercise, which deals with analysis of audio codecs.
15

Hlasová služba v integrovaných sítích / Voice Service in Integrated Networks

Yeftsifeyeu, Aliaksandr January 2014 (has links)
The master’s thesis presents routing protocols, SIP handshake, describes modern VoIP networks and its features. Thesis is primary focused on networks with integrated MPLS. The most known advantages and disadvantages were described of modern network based on such technology. Further, networks and a router with installed Cisco Call Manager Express 7.1 were configured, which is provided by CISCO. For recreating of fully working telephone network IP PBX10 has been used from SMC Networks. For connection between different phones within these integrated networks, SIP trunk was configured on SMC PBX10 as well as on router, which is connecting three configured Cisco IP phones. Each phone has its own number according to the dial plan. For calls from one network to another the special pattern has been established, so the number of each caller can be easily identified by added digit. On one of the CISCO routers was shown a configuration of MPLS and OSPF protocols. With an analyzer VePAL TX300e, the lab network has been measured to analyze QoS parameters of the network according to standard RFC 2544. Thesis also gives references to lab devices, which have been used accordingly to the work.
16

Bezpečnost firemních telefonních sítí využívajících VoIP / Security of Enterprise VoIP Telephony Networks

Šolc, Jiří January 2008 (has links)
This thesis focuses on enterprise VoIP telephony network security. Introduces brief comparison of old analog and digital voice networks and IP telephone networks with special focus on VoIP system security. The goal of the thesis is to identify the risks of implementation and operation of VoIP technologies in enterprise environment and so thesis brings some conclusion how to minimalize or avoid these risks. First two chapters briefly introduce the development of telephony technologies with differentiation of enterprise telephone network from public telephone networks. Further it describes individual technologies, digitalization of voice, processing the signal and VoIP protocols and components. Third chapter focuses on infrastructure of telephony networks with special interest for architecture of IP telephony and ways of establishing call processing. It describes data flows for further security risk analysis, which this technology came with. Fifth chapter is about enterprise security standards in common and is trying to describe information security management system (ISMS) adopting VoIP technology. Individual security threats and risks are described in sixth chapter, along with known methods how to avoid them. Final parts of thesis concludes of two real situation studies of threats and risks of VoIP technologies implemented in environment of small commercial enterprise and medium size enterprise, in this example represented by University of economics. These chapters conclude theoretical problems shown on practical examples.
17

Možnosti vazby softswitche Asterisk na pobočkové ústředny 4. generace / Possibilities of connecting the Asterisk softswitch to the 4th generation PBX

Halamík, Zdeněk January 2008 (has links)
This master’s thesis dissertate the possibilities of the linkage between Asterisk softswitch and the 4th generation private branch exchange. This should create a new generation’s network, so-called NGN, by the convergence of existing telecommunication networks with an IP computer network. This master’s thesis is divided into several chapters. In introduction is described the evolution of the private branch exchanges as well as the principles of the voice digitizing, codecs and signaling commonly used in both TDM and VoIP networks. The main aim of this project is the configuration of Asterisk software exchange for connection with PBX Alcatel 4400 as well as public phone network PSTN. Another goal of this master’s thesis was the configuration of Alcatel PBX and diagnostics of CCS and CAS signaling on E1 interface. In conclusion there are summarized advantages of NGN networks and their utilization in the future.
18

Aplikace nových komunikačních technologií do firemní počítačové sítě / Aplication of New Communication Technologies into Company´s Computer Network

Šafránek, Filip January 2009 (has links)
The target of master's thesis is implementation solution of communication VoIP technologies and connection recording system and CRM system in order to saving costs for company INTERNET TRADING s.r.o..
19

Ochrana datové sítě s využitím NetFlow dat / Network Protection Using NetFlow Data

Sedlář, Petr January 2010 (has links)
This document provides information about Cisco NetFlow technology and its usage to protect networks from different types of attacks. Part of the document is a summary of common security risks in term of their detection on network and transport layer. There are specified characteristics of NetFlow data containing samples of security risks. On the basis of these characteristics, an application for detection these risks is designed and implemented.
20

Mitteilungen des URZ 2/2003

Dippmann,, Junghänel,, Müller,, Richter,, Riedel,, Schier,, Strobel,, Trapp,, Wegener,, Ziegler, 08 March 2004 (has links)
Informationen des Universitätsrechenzentrums

Page generated in 0.0557 seconds