National Repository of Grey Literature 221 records found  beginprevious192 - 201nextend  jump to record: Search took 0.00 seconds. 
Architectures of Internet-Based Systems with Multicasting
Veselý, Vladimír ; Matoušek, Petr (referee) ; Švéda, Miroslav (advisor)
With rapid expansion of interest in multimedia and distributed computing applications across the Internet increases importance of optimized delivery of group traffic. According to current situation the best practice to achieve this goal is multicasting. This masters thesis summarizes multicasting methods and facts. Also it draws conclusions from practical application of presented information on commercial project.
Fast Recognition of Application Protocol
Adámek, Michal ; Veselý, Vladimír (referee) ; Polčák, Libor (advisor)
This thesis focuses on methods for fast recognition of application protocols. Fast recognition is recognition with minimal delay from the time of capturing the first data packet sent  from the source node. This thesis describes possible techniques and methods for recognition of application protocols and basic information and description of reference system for lawful interception in computer networks. Furthermore, the thesis describes analysis, design and implementation phase of a tool for fast recognition of application protocols. The conclusion of this thesis describes the results of tests performed by the tool and shows its limitations and possible extensions.
Dynamic State of OMNeT++ Model via SNMP
Smejkal, Jakub ; Grégr, Matěj (referee) ; Veselý, Vladimír (advisor)
This work outlines ways of getting dynamic state into OMNeT++ model. SNMP as major technology was selected for reaching the goals. Protocols CDP and LLDP are participating in topology detection and in theoretical layer Breadth- first search is used. The output of this tool is file syntactically specied by NED language which is describing computer network.
Multicast Routing Modelling in OMNeT++
Rybová, Veronika ; Matoušek, Petr (referee) ; Veselý, Vladimír (advisor)
Multicast traffic is common in today's networks. We need to simulate multicast architecture to be familiarized with its functionality in all situations. This thesis describes modelling and simulation of multicast routing using OMNeT++ tool. The text introduces protocol PIM and its particular modes (DM, SM, SSM, and BiDir) with emphasis on PIM-DM. The thesis focuses especially on design and implementation of OMNeT++ extension by multicast routing protocol PIM-DM. Correctness of implementation is verified by comparison of simulation and real network on example.
Modelling and Analysis of Campus Network at the BUT
Kojecký, Vladimír ; Veselý, Vladimír (referee) ; Grégr, Matěj (advisor)
This thesis deals with the design and implementation of tools for creating a computer network simulation model. Network analysis is based on configuration files from connected network devices. According to the requirements of the simulation it is necessary in the configuration file to focus on data relating to the monitored elements and their properties, or which may be of some influence. The output is then passed on simulation environment to form the desired network model by the observed data, which is already possible to perform simulations.
Modelling of L2 Loop-Preventing Protocols
Hrnčiřík, Matej ; Grégr, Matěj (referee) ; Veselý, Vladimír (advisor)
This thesis informs about currently used technologies, which provide loop protection on data link layer of computer networks. It clarifies issues of Ethernet networks. Chosen protocols are then closely described. There are presented advantages and disadvantages of chosen protocols and they are compared to other technologies. Practical section describes the initial implementation of IS-IS in OMNeT++ environment, which serves as the basic building block of TRILL protocol. An important issue is to verify correctness of implementation.
Identifying Skype Traffic Using NetFlow Data
Šebeň, Patrik ; Veselý, Vladimír (referee) ; Grégr, Matěj (advisor)
NetFlow is a network protocol commonly used for collectiong IP traffic information. But there is a way to use this collected data for indentifying clients in Skype communication. This paper describes identifiable patterns in Skype protocol and how to find them in NetFlow data. This way we can identify nodes and supernodes in Skype network.
Static Analysis of Computer Networks
Hozza, Tomáš ; Veselý, Vladimír (referee) ; Ryšavý, Ondřej (advisor)
Some problems in configurations of network devices are difficult to identify. Access control lists present an important part of many configurations. Conflicts among rules of an access control list can cause holes in security policy or quality of service. In this paper we focus on identifying and classifying conflicts among rules of an access control list. Discovering all possible types of conflicts is not a trivial task. We present optimized algorithm for complete access control list analysis using tries, based on existing research by Baboescu and Varghese. The tool for detecting conflicts among access control list rules of one given Cisco, HP or Juniper device using tries based algorithm has been implemented. Bit vectors in tries use WAH compression method to reduce memory consumption. Implemented tool was tested for correctness and performance. The hypothesis that this solution would make the analysis of access lists significantly faster has been proven.
Multicast Distribution Trees Modelling in OMNeT++
Malik, Adam ; Ryšavý, Ondřej (referee) ; Veselý, Vladimír (advisor)
Support of multicast routing and its implementation is one of the main goals in nowadays computer networks. Adapting new technology could be often challenging and connected with difficulties. For this reason its better to try it in some simulating enviroment and implement it only after successful results of tests and simulations. The aim of this diploma thesis is to familiarize the reader with the multicast routing, describe the possibilities of network testing in OMNeT++ and come up with new multicast routing framework for this discrete simulation tool.
Identification of Useful Data for Lawful Interception
Holomek, Tomáš ; Veselý, Vladimír (referee) ; Polčák, Libor (advisor)
This thesis deals with the identification of useful data in lawful interception. First part summarizes the standards related to computer networks and lawful intercepts. Next part of the project focuses mainly on the HTTP application protocol, which is described in version 1.1. The work also specifies the classes into which the data traffic can be divided according to the importance to law enforcement agency. It introduces several methods of distribution of data streams into the proposed classes. Finally, the implementation of this methods has been tested for usability in network lines used today.

National Repository of Grey Literature : 221 records found   beginprevious192 - 201nextend  jump to record:
See also: similar author names
21 VESELÝ, Vojtěch
3 Veselý, V.
1 Veselý, Viktor
2 Veselý, Vladan
2 Veselý, Vladislav
1 Veselý, Vlastimil
21 Veselý, Vojtěch
2 Veselý, Vratislav
26 Veselý, Václav
5 Veselý, Vít
2 Veselý, Vítek
2 Veselý, Vítězslav
Interested in being notified about new results for this query?
Subscribe to the RSS feed.