National Repository of Grey Literature 28 records found  beginprevious21 - 28  jump to record: Search took 0.01 seconds. 
Proposal of the secure network model
Kis, Matej ; Rosenberg, Martin (referee) ; Babnič, Patrik (advisor)
The goal of this work was to create a design of a secured network infrastructure with decribing different ways of securing at ISO/OSI layers. Create a list of protocols which can be used to achieve a secured network design. In the theoretical part of this work the attention was placed to analyze possible solutions, which can be appllied in a practical part of the work. The practical part involves a design of a network topology and simulation. The part of the simulation was device configuration and network security testing.
Techniques of Virtualisation of Computing Platforms in Linux
Župka, Jiří ; Kumpošt, Marek (referee) ; Vojnar, Tomáš (advisor)
The thesis tests and compares various existing virtualization tools for virtualization of computing platforms and explains important conceptions of virtualization technology. It's main contribution is a performance,  efficiency, scalability and robustness comparison of virtualization tools. This comparison should help the Redhat company to make a decision whether they should leave XEN as a main virtualization tool in their distributions and move on to another newer and more user friendly virtualization tool like KVM.
Comparison of Various Virtualisation Tools for MS Windows
Marek, Jan ; Rozman, Jaroslav (referee) ; Samek, Jan (advisor)
This thesis deals with comparison of virtualisation tools for MS Windows. It describes techniques of virtualization, forms of mesauring computer performance and also benchmarks used to mesauring performance. At the end of this thesis are interpreted results of benchmarks and final comparation tested tools.
Detection of Honeypot Systems in Network
Teknős, Martin ; Drozd, Michal (referee) ; Barabas, Maroš (advisor)
This thesis is focusing on detection of honeypot systems in network. It presents different techniques for detection of honeypot systems and then focuses on three of them: TCP/IP fingerprinting, clock skew estimation and service exercising. A console application was created, to test these selected techniques. The thesis describes a design of the application, its implementation and also presents results of experiments with the application and selected techniques.
Analysis of Entropy Levels in the Entropy Pool of Random Number Generator
Krempa, Peter ; Hanáček, Petr (referee) ; Barabas, Maroš (advisor)
V informatice je pojem entropie obvykle znám jako nahodný proud dat.  Tato práce krátce shrnuje metody generovaní nahodných dat a popisuje generátor náhodnych čísel, jež je obsažen v jádře operačního systému Linux.  Dále se práce zabývá určením bitové rychlosti generování nahodných dat tímto generátorem ve virtualizovaném prosředí, které poskytují různé hypervizory.  Práce popíše problémy nízkého výkonu generátory nahodných dat ve virtualním prostředí a navrhne postup pro jejich řešení.  Poté je nastíňena implementace navržených postupů, které je podrobena testům a její vysledky jsou porovnány s původním systémem. Systém pro distribuci entropie může dále vylepšit množství entropie v sytémovém jádře o několik řádu, pokud je připojen k vykonému generátoru nahodných dat.
Virtualization for the x86 platform
Müller, Pavel ; Kyselý, František (referee) ; Pelka, Tomáš (advisor)
A thesis describes a virtualization of x86 platform. In the first part the virtualization, its utilization and specific types of virtualization are described in a general way. The specific types of virtualization are full virtualization, paravirtualization, virtualization on core level, hardware virtualization and application virtualization. There is also described a general function of virtual machine, reasons of virtualization implementing, current development, focusing on future development and virtualization security. In the second part the thesis tries to find a solution with establishment charges of virtualization. To test purposes the following software programs were used. The first one is freeware benchmark Sandra from SiSoft company and second one is a software created on the basis of the thesis. For the tests the CPU overhead both an arithmetic-logical unit and a unit for work with numbers and floating decimal point, a RAM data transmission efficiency and a hard disk logging rate were chosen. The following test machines were described: VMWare, VirtualBox and Xen. In the third and the last part of the thesis is a description of network interface virtualization methods with a utilization of tun and tap system. In each particular step a virtual network interface creation and implementation are presented. Model situations of communication among virtual and physical machines with usage of these devices are described at the end of the thesis.
Technology for comprehensive support of multimedia services in heterogeneous networks
Dosoudil, Petr ; Krkoš, Radko (referee) ; Novotný, Vít (advisor)
The theses explains the Evolution Packet System (EPS) and subsystem IP Multimedia Subsystem (IMS). It also informs how these systems cooperate and through which interfaces the main data and signals between these two technologies are transfered. The thesis includes practical section, in which installation and configuration of sections of the IMS system including its "core", and application and medial server. For verification of the functionality of the system, two dissimilar clients are installed, and emulator WAN is applied for simulation of Internet. The product of the theses is the design of the laboratory exercise drafted in such a way that it can be solved by students less knowledgeable of the issues.
Remote connection to virtualized operating system
Veselý, Marek ; Červenka, Vladimír (referee) ; Komosný, Dan (advisor)
The thesis is focused on the new IT trend – virtualization. Below are described the types of virtualization, as well as different implementations of it. In the following chapters there will be described the TCP and ICMP protocols, as well as the SSH services. The last part of this work is dedicated to measurements where there will be highlighted the advantages and disadvantages of virtualization.

National Repository of Grey Literature : 28 records found   beginprevious21 - 28  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.