National Repository of Grey Literature 226 records found  beginprevious202 - 211nextend  jump to record: Search took 0.00 seconds. 
Modelling of L2 Loop-Preventing Protocols
Hrnčiřík, Matej ; Grégr, Matěj (referee) ; Veselý, Vladimír (advisor)
This thesis informs about currently used technologies, which provide loop protection on data link layer of computer networks. It clarifies issues of Ethernet networks. Chosen protocols are then closely described. There are presented advantages and disadvantages of chosen protocols and they are compared to other technologies. Practical section describes the initial implementation of IS-IS in OMNeT++ environment, which serves as the basic building block of TRILL protocol. An important issue is to verify correctness of implementation.
Identifying Skype Traffic Using NetFlow Data
Šebeň, Patrik ; Veselý, Vladimír (referee) ; Grégr, Matěj (advisor)
NetFlow is a network protocol commonly used for collectiong IP traffic information. But there is a way to use this collected data for indentifying clients in Skype communication. This paper describes identifiable patterns in Skype protocol and how to find them in NetFlow data. This way we can identify nodes and supernodes in Skype network.
Static Analysis of Computer Networks
Hozza, Tomáš ; Veselý, Vladimír (referee) ; Ryšavý, Ondřej (advisor)
Some problems in configurations of network devices are difficult to identify. Access control lists present an important part of many configurations. Conflicts among rules of an access control list can cause holes in security policy or quality of service. In this paper we focus on identifying and classifying conflicts among rules of an access control list. Discovering all possible types of conflicts is not a trivial task. We present optimized algorithm for complete access control list analysis using tries, based on existing research by Baboescu and Varghese. The tool for detecting conflicts among access control list rules of one given Cisco, HP or Juniper device using tries based algorithm has been implemented. Bit vectors in tries use WAH compression method to reduce memory consumption. Implemented tool was tested for correctness and performance. The hypothesis that this solution would make the analysis of access lists significantly faster has been proven.
Multicast Distribution Trees Modelling in OMNeT++
Malik, Adam ; Ryšavý, Ondřej (referee) ; Veselý, Vladimír (advisor)
Support of multicast routing and its implementation is one of the main goals in nowadays computer networks. Adapting new technology could be often challenging and connected with difficulties. For this reason its better to try it in some simulating enviroment and implement it only after successful results of tests and simulations. The aim of this diploma thesis is to familiarize the reader with the multicast routing, describe the possibilities of network testing in OMNeT++ and come up with new multicast routing framework for this discrete simulation tool.
Identification of Useful Data for Lawful Interception
Holomek, Tomáš ; Veselý, Vladimír (referee) ; Polčák, Libor (advisor)
This thesis deals with the identification of useful data in lawful interception. First part summarizes the standards related to computer networks and lawful intercepts. Next part of the project focuses mainly on the HTTP application protocol, which is described in version 1.1. The work also specifies the classes into which the data traffic can be divided according to the importance to law enforcement agency. It introduces several methods of distribution of data streams into the proposed classes. Finally, the implementation of this methods has been tested for usability in network lines used today.
Modelling IS-IS and TRILL
Marek, Marcel ; Grégr, Matěj (referee) ; Veselý, Vladimír (advisor)
In this thesis, we describe the principles of IS-IS routing protocol. We introduce the current state of implementation of this protocol within the simulation framework OMNeT++. We present the implementation of the IS-IS protocol created within the ANSA project. Moreover, we employ its variant called TRILL that is nowadays deployed as replacement of STP in data-center environment. The aim is to enable the modelling of the protocols without the need having to build physical architecture.
Modelling Gateway Redundancy Protocols
Vítek, Petr ; Grégr, Matěj (referee) ; Veselý, Vladimír (advisor)
This master's thesis report deals with the theoretical analysis of FHRP. First Hop Redundancy Protocols are network protocols which are designed to protect the default gateway and also to ensure high availability in the network by using redundancy. The reader becomes familiar with protocols VRRP, HSRP and GLBP and also learn the way how to configure them to on real Cisco devices. It also describes how implement VRRP int the simulated enviroment of OMNeT++. The result of the implementation is verified in the test topologies.
BitCoin Wallet for Windows Phone Platform
Prokop, Tomáš ; Grégr, Matěj (referee) ; Veselý, Vladimír (advisor)
Master's thesis deals with description of a new trading system known as BitCoin. Bitcoin is a unique type of virtual cash in the current world without the influence of large corporations. The system is protected through the use of cryptographic methods that are discussed in detail.  The work explains the principles of integrity of transactions exchange transactions and the acquisition of new money through so-called miners. Individual miners services are mediated through software clients including a description of mining. The paper focuses on protocols for communication. It analyzes the different types of software purses for platforms Windows, Linux and Android. Examining reengineering of purses for Android. This document in no small part discusses the implementation own wallets for the Windows Phone platform 8th.
Modelling PIM-SM in OMNeT++
Procházka, Tomáš ; Ryšavý, Ondřej (referee) ; Veselý, Vladimír (advisor)
In this master's thesis I deal with modelling and simulating of multicast routing protocol PIM Sparse Mode in OMNeT++. I also describe basic information about multicast, protocol PIM-SM, its configuration and multicast data streams visualization in computer networks. The thesis is especially focused on design and implementation of PIM-SM in OMNeT++ and extension of ANSAINET library.
Modelling of EIGRP Routing Protocol
Bloudíček, Jan ; Grégr, Matěj (referee) ; Veselý, Vladimír (advisor)
The network simulation allows analysis of the computer networks behavior and configured protocols. This thesis focuses on the EIGRP routing protocol and its integration into the OMNeT++ simulation enviroment. The text includes a detailed description of the protocol and its configuration on Cisco devices. Furthermore, the text focuses on design of extension that supports routing protocol. The following describes implementation of the protocol according to design. Finally, the implemented solution is compared with the output of real devices.

National Repository of Grey Literature : 226 records found   beginprevious202 - 211nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.