National Repository of Grey Literature 224 records found  beginprevious21 - 30nextend  jump to record: Search took 0.01 seconds. 
Modelling of L2 Loop-Preventing Protocols
Hrnčiřík, Matej ; Grégr, Matěj (referee) ; Veselý, Vladimír (advisor)
This thesis informs about currently used technologies, which provide loop protection on data link layer of computer networks. It clarifies issues of Ethernet networks. Chosen protocols are then closely described. There are presented advantages and disadvantages of chosen protocols and they are compared to other technologies. Practical section describes the initial implementation of IS-IS in OMNeT++ environment, which serves as the basic building block of TRILL protocol. An important issue is to verify correctness of implementation.
Multicast Distribution Trees Modelling in OMNeT++
Malik, Adam ; Ryšavý, Ondřej (referee) ; Veselý, Vladimír (advisor)
Support of multicast routing and its implementation is one of the main goals in nowadays computer networks. Adapting new technology could be often challenging and connected with difficulties. For this reason its better to try it in some simulating enviroment and implement it only after successful results of tests and simulations. The aim of this diploma thesis is to familiarize the reader with the multicast routing, describe the possibilities of network testing in OMNeT++ and come up with new multicast routing framework for this discrete simulation tool.
Modelling of OSPFv3 Link-State Routing Protocol
Ruprich, Michal ; Grégr, Matěj (referee) ; Veselý, Vladimír (advisor)
The thesis deals with simulation of routing protocols. The aim is to create a functioning model of OSPF link-state protocol in the simulation framework OMNET++. OMNET++ is a discrete simulation environment which was created to provide means to build models of various network protocols and technologies. Chapters in the first part of the thesis focuson the theoretical foundation of OSPFv2 and OSPFv3 and their differences. Important data structures, finite state automata and communication techniques are described and the information is later used to implement the model itself. The chapters in the second part deal with the implementation of the model in C++. The created model reflects the functionality of OSPF on Cisco devices.
Prototype of Intrusion Solution for Mobile Networks
Kamenský, Timotej ; Letavay, Viliam (referee) ; Veselý, Vladimír (advisor)
Spolu s rozvojom mobilných sietí stúpa aj dôležitosť ich zabezpečenia. Zraniteľnosti jed- notlivých mobilných protokolov na vrstve L1 - L3 je možné ľahko zneužiť. S použitím malého a relatívne lacného Software Defined Radio je možné implementovať rôzne druhy útokov cieliacich na mobilné siete. Cieľom tejto práce je vytvoriť intruzívny nástroj, implementujúci dostupné útoky. Tie zahrňujú zarušenie spojenia, Zníženie kvality služieb, Denial of Service, Sledovanie polohy, IMSI catcher.
Comparison of Distance-Vector Routing Protocol
Cocuľa, Maroš ; Grégr, Matěj (referee) ; Veselý, Vladimír (advisor)
This work deals with comparing the distance vector routing protocols. More accurately, protocols EIGRP, RIP and Babel. The aim is to compare information using the simulation OMNeT++, as well as the physical connection. Part of the work is a detailed description of the protocols, simulator OMNeT++ and the libraries INET and ANSAINET. Finally, we summarized the results of experiments and the comparison of protocols with each other.  
User Behavior Anomaly Detection
Petrovič, Lukáš ; Veselý, Vladimír (referee) ; Pluskal, Jan (advisor)
The aim of this work is to create an application that allows modeling of user behavior and subsequent search for anomalies in this behavior. An application entry is a list of actions the user has executed on his workstation. From this information and from information about the events that occurred on this device the behavioral model for a specific time is created. Subsequently, this model is compared to models in different time periods or with other users' models. From this comparison, we can get additional information about user behavior and also detect anomalous behavior. The information about the anomalies is useful to build security software that prevents valuable data from being stolen (from the corporate enviroment).
Automatic Webpage Reconstruction
Serečun, Viliam ; Ryšavý, Ondřej (referee) ; Veselý, Vladimír (advisor)
Many legal institutions require a burden of proof regarding web content. This thesis deals with a problem connected to web reconstruction and archiving. The primary goal is to provide an open source solution, which will satisfy legal institutions with their requirements. This work presents two main products. The first is a framework, which is a fundamental building block for developing web scraping and web archiving applications. The second product is a web application prototype. This prototype shows the framework utilization. The application output is MAFF archive file which comprises a reconstructed web page, web page screenshot, and meta information table. This table shows information about collected data, server information such as IP addresses and ports of a device where is the original web page located, and time stamp.
Web Traffic Analysis and Reconstruction with NetMon
Weiss, Patrik ; Ryšavý, Ondřej (referee) ; Veselý, Vladimír (advisor)
This thesis discusses design and implementation of tool for reconstruction of HTTP traffic based upon HTTP proxy with Microsoft Network Monitor application interface. This thesis also solves problems with reconstruction and analysis of HTTP data such as TCP fragmentation. Output of this thesis is an application for web traffic reconstruction.
Modelling of L2 Management Protocols
Rajca, Tomáš ; Marek, Marcel (referee) ; Veselý, Vladimír (advisor)
This thesis deals with modelling and simulation of management protocols on the data-link layer in OMNeT++ tool. Namely protocol CDP, LLDP and ODR routing. These protocols are described in the first thesis' half and in the second half is described their design and implementation in ANSA project. Correctness of implementation is verified by comparison between simulated and real network examples. Also dependencies on module DeviceConfiguratoru were removed from ANSAINET library.
Modelling IS-IS and TRILL
Marek, Marcel ; Grégr, Matěj (referee) ; Veselý, Vladimír (advisor)
In this thesis, we describe the principles of IS-IS routing protocol. We introduce the current state of implementation of this protocol within the simulation framework OMNeT++. We present the implementation of the IS-IS protocol created within the ANSA project. Moreover, we employ its variant called TRILL that is nowadays deployed as replacement of STP in data-center environment. The aim is to enable the modelling of the protocols without the need having to build physical architecture.

National Repository of Grey Literature : 224 records found   beginprevious21 - 30nextend  jump to record:
See also: similar author names
22 VESELÝ, Vojtěch
3 Veselý, V.
1 Veselý, Viktor
2 Veselý, Vladan
2 Veselý, Vladislav
1 Veselý, Vlastimil
22 Veselý, Vojtěch
2 Veselý, Vratislav
26 Veselý, Václav
5 Veselý, Vít
2 Veselý, Vítek
2 Veselý, Vítězslav
Interested in being notified about new results for this query?
Subscribe to the RSS feed.