National Repository of Grey Literature 49 records found  previous11 - 20nextend  jump to record: Search took 0.01 seconds. 
Application for geolocation databases
Farkaš, František ; Grenar, David (referee) ; Komosný, Dan (advisor)
The topic of this thesis is testing and analysis of geolocation databases and comparison between commercial databases and noncommercial ones. Practical part is dedicated to implementation of application which is testing the databases and gathers the output data for analysis. First chapter of the thesis describes geolocation, use of geolocation and methods of getting geolocation data. Second chapter deals with implementation details of application and technologies used for implementation. The last chapter is dedicated to analysis and comparison of tested databases.
An accurate comparison of the methods for passive IP Geolocation
Mrázová, Andrea ; Komosný, Dan (referee) ; Verner, Lukáš (advisor)
This thesis aims to evaluate the physical location of the stations connected to the Internet, focusing on passive methods of IP geolocation, specifically by using geolocation databases. The first part is generally described what it is IP geolocation, the second section describes the active and passive methods of IP geolocation and the third section describes the practical parts of assignment and the results that we found.
Network design support
Zemánek, Martin ; Fojtová, Lucie (referee) ; Pelka, Tomáš (advisor)
The work is focused on support of computer networks. It contains basic information about the network elements and possibilities of their involvement. The steps are described so that all procedures were intelligible. The work contains various thoughts on various options for integration of network and end elements to be as effective as possible. Shown are various examples of design documentation, which should serve primarily as a good springboard. We can see the lists of VLANs, IP addresses, calculations of energy consumption and cooling requirements. The introductory section also presents a variety of topology and characteristics of networks and network elements. We deal with various technologies such as QoS, PoE, EteherChannel, Trunking, and more. We are also stacking switches and effective involvement of network elements. All these information was collected and on the basis of these applications have been developed, which should serve as online network documentation. The application is writing with Nette Framework, which also has support for Czech, so it is much material available, which relieved the work in an environment of PHP, MySQL, HTML and CSS. The result is a basic version that is ready to further develop and to be as user friendly as possible and ease the job of designing the network.
Design and realization of client application for cooperation with ONET Modeler
Polak, Martin ; Jelínek, Mojmír (referee) ; Molnár, Karol (advisor)
The bachelor thesis „Design and realization of client application for cooperation with OPNET Modeler“ is about trying to bring a client to easier and better communication with the server. Open new opportunities for effective work in the network. Goal of this work is to interconnect two communication stations, which will together communivate. OPNET communicates with an external program which redirects the data to the network layer. The work describes the individual steps in creating a model client. Part of the work is introduction to the OPNET Modeler simulation environment, whereupon it is tied together a detailed desciption of programming of an external application.
The PXA270M ARM module and its usage as private branch exchange
Vojtíšek, Jindřich ; Šilhavý, Pavel (referee) ; Daněček, Vít (advisor)
This work deals with using the operating system Linux on diskless devices. This is solved on the development kit Voipac PXA270M, which is based on the ARM processor. This work deals further with the distributions of the Linux operating system, which are suitable to use for the device based on the ARM processor. The Linux was chosen because it is one of the most flexible operating systems and the Linux is kept as open source software code, except to the distribution of the Red hat and a few special distributions. The NFS protocol and TFTP are described there. The TFTP and NFS are used to deploy the operating system. It describes there, what are the TFTP and NFS and the principle of their use in computer networks. Practical part is as to, what is needed for the functioning of the TFTP and NFS server on the Ubuntu 11.10 plus how configure them. The OpenOCD is another part of this work. The OpenOCD is designed to work in the device memory. There is shown how to install and run the OpenOCD in order to communicate with the development kit Voipac PXA270M. This work shows how to configure the bootloader U-boot for booting the operating system from the network using the NFS and TFTP. There is described how compile and install PBX Asterisk on Voipac PXA270M with use of cross compiler and how cross compile zlib, OpenSSL and ncurses needed to install nad run Asterisk.
Hardware Acceleration of Longest Prefix Match
Kekely, Lukáš ; Tobola, Jiří (referee) ; Kořenek, Jan (advisor)
This bachelor's thesis describes design and implementation of hardware architecture for longest prefix match in order to achieve high throughput, which is required in today's high-speed computer networks. It is focused on IPv4 as-well-as IPv6 networks. Designed hardware architecture has throughput 75 Gbps on the shortest IPv4 and IPv6 packets.  Performance of designed architecture is also compared with performance of chosen algorithms, which are used in nowadays commercial devices. These algorithms are: Tree Bitmap, Shape-Shifting Trie and Binary Search on Prefixes. All algorithms were implemented in C language using multi-threaded processing.
Modelling of network communication in OPNET IT Guru environment
Mazák, Andrej ; Škorpil, Vladislav (referee) ; Hošek, Jiří (advisor)
The aim of this work is to describe modeling of network communication with the given network performance and load. The selected model of network approaches the real network topology of a telecommunication operator that provides network services for the customers. We take a closer look on the functions of the significant network protocols EIGRP and BGP and we also will focus on their configuration on the selected network devices. Routing in the network will be analyzed in the individual project scenarios with a use of selected routing protocols. Routing policy will be enforced for a BGP protocol in a separate scenario with an aim to prefer a concrete routing path to the destination, which is a common case of traffic engineering. The issue of virtual private networks is also taken into a consideration in an individual scenario, where there is Firewall as a specific network device used for separation of networks of a different trustworthiness and a following introduction of IP tunneling for an encrypted communication among the selected network entities within the topology. Simulation of the network communication is aimed on the response of FTP service, time delay of Ethernet, throughput of backbone links and communication flow in the targeted scenarios. The output of this work deals with the analysis of the achieved results, comparison of graphs as well as evaluation of the determined simulation parameters.
Imlementation of GDPR Regulation to the KolejNet Information System
Krýzová, Lenka ; Sedlák, Petr (referee) ; Ondrák, Viktor (advisor)
The bachelor's thesis aims to make analysis of the current state of the KolejNet information system, personal data security and used internal standards of the company. It discusses the state of existing processes in corporation and improves functionality and quality of this information system, according to European GDPR regulation.
Anonymization of PCAP Files
Navrátil, Petr ; Hynek, Jiří (referee) ; Holkovič, Martin (advisor)
This diploma thesis deals with the design and implementation of an application suitable for the anonymization of PCAP files. The thesis presents TCP/IP model and for each layer highlights attributes that can be used to identify real people or organizations. Some of the anonymization methods suitable to modify highlighted attributes and sensitive data are described. The implemented application uses TShark tool to parse byte data of PCAP format to JSON format that is used in the application. TShark supports lots of network protocols which allows the application to anonymize various attributes.  Anonymization process is controlled by anonymization politics that can be customized by adding new attributes or anonymization methods.
Project of Home Network
Makovský, Vladimír ; Kobelka, Miroslav (referee) ; Ondrák, Viktor (advisor)
The goal of this bachelor's thesis is to project a small local computer net for a family living in a family house. Here is the description of processes that are necessary for implementing a computer net so that the members of the family could use this computer net in accordance with their requirements.

National Repository of Grey Literature : 49 records found   previous11 - 20nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.