National Repository of Grey Literature 91 records found  beginprevious21 - 30nextend  jump to record: Search took 0.01 seconds. 
Network design support software
Špidla, Aleš ; Jeřábek, Jan (referee) ; Pelka, Tomáš (advisor)
The bachelor thesis is aimed at supporting of designing of computer networks. The thesis describes the steps which follows to successful propose of computer network. Furthermore, it discusses errors which should be avoided, the various recommendations from the positioning of devices in the patch panel, to allocating the address space of IP addresses. There is also mentioned three level hierarchy of networks, QoS, problems of VLANs and switches cascade connection. A large part describes the benefits of stackable switches, their inclusion in the network, and then describes the advantages of different kinds of PoE (Power over Ethernet) devices. Also noteworthy is the chapter, which deals with IP networks. It points out how to allocate IP addresses and it also describing the most frequently used method for allocating subnets which is reverse binary method. The last part is devoted to the description of the application, which allows users to learn about different variants of switches, VoIP phones, find out the advantages and disadvantages of different transmission media, or the difference between software or hardware firewall. The output of this application is form, which can serve as network documentation.
Mandatory access control
Grepl, Miroslav ; Soumar, Michal (referee) ; Pelka, Tomáš (advisor)
This master's thesis describes the problems of SELinux, and the methods of creation of a proper security policy with a focus on the SELinux reference policy and its mechanisms. It designs the methodics of formulation of specific security rules, supplemented with the practical example of its application. Furthermore, it describes the available security rules commonly used for http, ftp and ssh services securing, their modification and practical utilization. According to the proposed methodology, these services are protected with their own security rules and both security methods are mutually compared and evaluated.
Design, administration and analysis of SSM multicast network
Žák, Jakub ; Pelka, Tomáš (referee) ; Šimek, Milan (advisor)
My thesis deals with the Multicast transfer in IP networks and it describes distribution technology of packets with special focus on Multicast technology. The thesis is devoted to the principles of Multicast including the description of scheme, protocol Multicast distribution, registration in the Multicast groups and finally the advantages and disadvantages of the Multicast transfer. Further in the thesis is described in details the Source Specific Multicast technology (SSM) that comes from multicast. There is a description how this technology Works and its implementation in the network equipment including the user side. This part of the thesis also deals with so called Distribution Trees that are used as multicast distribution via the IP networks like for example Internet. Based on the knowledge of the Multicast was created the network to spread the multimedia data with support of Multicast and SSM. The network is designed based on the Cisco system equipment as is: Cisco Content Engine 566, Cisco IP/TV broadcast server and router 1812. This multimedia network provides many services including the live TV broadcast and video channels. In this network using the multicast distribution of packets was done an analysis by protocol analyzer unit WIreshark and Finisar. This protocol analyzer unit allows us to compare the efficiency of multimedia data transfer between the Unicast, Multicast and SSM.
Implementation of modular web based application
Suchý, Petr ; Koutný, Martin (referee) ; Pelka, Tomáš (advisor)
Diploma thesis Implementation of modular web based application deals with web modular systems. The aim of web modular system is to allow creating universal web presentation without necessity of creation new systems. Diploma thesis is devided into couple parts. Advantages of modular solution of web systems are highlighted in the first part and after that is analyzed the current situation of this problem. In the next part is designed own web modular system above all its kernel, modules and data model. In the final part is described own implementation of own designed system. The most stress is layed on security of the system. In the conclusion is summed up own solution and its most advantages.
Worm conveyor
Pelka, Tomáš ; Škopán, Miroslav (referee) ; Malášek, Jiří (advisor)
This bachelor project deals with, specifies and makes design of the worm horizontal conveyor. The project is divided into drawings and written part including the funcional capacity calculation and electromotor output. Further the part includes proposal of key dimensions of the conveyer with the soilidity control of the worm, solving of the suspended bearings, assemble issues, maintenance and potencial exchange of the worm due to abrasion.
Configuration management for Cisco backbone network
Bartoš, Jan ; Pelka, Tomáš (referee) ; Polívka, Michal (advisor)
The main aim of the master thesis was to create an application for backbone network configuration management. The priority of the application was to be effective and easy to take. Program has to be able to communicate with network devices by remote control and to download and upload configuration files. The program has enable also availability verification for remote control. For this purpose the ICMP protocol was used. The remote control is provided by telnet protocol and the protocol TFTP has been chosen for file tranfers providing. The application is a multithreading application based on the Java programming language. The Java graphic library Swing was used for GUI creation. The application supports file versioning, the configuration of the program can be saved as a text file, which can be easy changed by user. The program and its features are described in the second part of this thesis. The first part deals with theoretical facts about the IP networks and remote control of the Cisco backbone network devices.
Network design support
Zemánek, Martin ; Fojtová, Lucie (referee) ; Pelka, Tomáš (advisor)
The work is focused on support of computer networks. It contains basic information about the network elements and possibilities of their involvement. The steps are described so that all procedures were intelligible. The work contains various thoughts on various options for integration of network and end elements to be as effective as possible. Shown are various examples of design documentation, which should serve primarily as a good springboard. We can see the lists of VLANs, IP addresses, calculations of energy consumption and cooling requirements. The introductory section also presents a variety of topology and characteristics of networks and network elements. We deal with various technologies such as QoS, PoE, EteherChannel, Trunking, and more. We are also stacking switches and effective involvement of network elements. All these information was collected and on the basis of these applications have been developed, which should serve as online network documentation. The application is writing with Nette Framework, which also has support for Czech, so it is much material available, which relieved the work in an environment of PHP, MySQL, HTML and CSS. The result is a basic version that is ready to further develop and to be as user friendly as possible and ease the job of designing the network.
Mandatory access control policies of operating system
Novotný, Filip ; Lattenberg, Ivo (referee) ; Pelka, Tomáš (advisor)
The subject of this paper is data protection by means access control. It compares the difference between DAC and MAC access control and describes the progress of MAC due to user requierements. Next part is dedicated to SELinux, what offers more system safeness. SELinux is based on mandatory access control. Making own policy is dedicated to SELinux editor, which is composed of Simplified Policy and is easy to use for ordinary user.
Identity management
Kefer, Daniel ; Polívka, Michal (referee) ; Pelka, Tomáš (advisor)
The master thesis is divided into two parts. In the first part, identity management is described on theoretical basis. Particular domains of identity management including authentication, authorization and audit are explained as well as Single Sign-On concept, i.e. using single credentials and entering them just once for access to multiple independent systems or services. In the second part, which forms the main part of this thesis, a practical project was implemented on the infrastructure of the Department of Telecommunications within the Faculty of Electrical Engineering and Communication, Brno University of Technology. The goal of this project was to create an environment for central 4 authentication and Single Sign-On using only open source technologies within a computer laboratory used for teaching OS Linux. The project is based on OS Linux Debian, Kerberos as a protocol for secure authentication and LDAP server OpenLDAP. For the Single Sign-On demonstration, NFS services for accessing data on the network were chosen. Using NFS services, users can sign-on to any workstation and access all their data. Administration of users and their import from central FEEC databases was implemented using scripts developed in Python. Next, using Apache, PHP and MySQL, a front-end audit interface for the network administrator was developed in order to inspect and evaluate security events in the network. Messages about suspicious events are delivered to administrator’s mailbox in real time. The project is intended as a security platform which means that other services can be implemented for Single Sign-On as well as new mechanisms for evaluation of suspicious events.
Laboratories with CCENT Network Visualiser
Kadlčík, Michal ; Pelka, Tomáš (referee) ; Burda, Karel (advisor)
This work describes design and practical realization of three laboratory works for students of MNSB. These works are aimed to practice basics of computer networks, especially the configuration of LAN, IP addressing and routing. Local desktop simulator of computer networks CCENT Network Visualizer is used as a training program. Networks are created with the help of several graphical objects, which are configured and diagnosed as a part of this lab work. Additionally there is software that supports studying in the form of web pages, where the lab tasks are mentioned with correct results and some examples. Also the possibility of taking included tests and evaluation of answers. The simulator combined with the software is run by students on VMware virtual machine, so the work deals as well with the implementation on computer workstations.

National Repository of Grey Literature : 91 records found   beginprevious21 - 30nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.