National Repository of Grey Literature 54 records found  beginprevious25 - 34nextend  jump to record: Search took 0.01 seconds. 
Performance and security analysis of Wireguard technology
Varga, Oliver ; Holasová, Eva (referee) ; Krajsa, Ondřej (advisor)
This thesis deals with the description of WireGuard virtual private networks technology, its comparison with the technologies IPsec and OpenVPN based on the encrpytion algorithms they use to ensure security and also compares their technical parameters such as latency, jitter and transfer speeds. The work includes a description of the WireGuard technology, a comparison of the mentioned technologies and finally the results of the measurements of their technical parameters. The methodology chosen by us for testing the parameters, the hardware used to obtain the results and the network topology are also described. Finally, the results obtained from the tests are compared.
Analysis of VPN tunnel technologies
Šopík, Adam ; Dvořák, Jan (referee) ; Kubánková, Anna (advisor)
The bachelor thesis is primarily focused on the study of network tunnels and how they affect physical and network parameters. The advantages and disadvantages that different technologies bring with them are discussed. The aim of the thesis was to measure several types of network technologies and determine their effect on network operating parameters such as delay, throughput and CPU load. The thesis also includes the design of one lab assignment for students that focuses on troubleshooting tunnels. This assignment aims to provide students with hands-on experience and improve their skills in solving tunneling related problems.
Smart Forest: Utilization of 5G Networks for Fire Detection and Prediction
Popelka, Adam ; Možný, Radek (referee) ; Mašek, Pavel (advisor)
The goal of bachelor thesis was in teoretical part study and describe Internet of Things, found difference between H2H (Human to Human), M2M (Machine to Machine) and mMTC (Massive Machine Type Communication), describe LPWAN (Low Power Wide Area Network) in licensed and unlicensed frequency band and compare them. The next task was describe in detail technology in licensed frequency band NB-IoT and LTE Cat-M and choose ona of the technology for use in practical part. In teoretical part it should also be found description of application protocols for LWPAN as MQTT, CoAP, LWM2M and then describe security. The task in the practical part was to choose a communication technology, communication module and device that will be used to measure the temperature, take photos of the surrounding environment, and then send the obtained data to the server. In order to put the device into operation, a program must be created that will measure the ambient temperature at intervals, which it will evaluate and, in the event of and excess, take a picture of the environmet and send the data to the server.
Creating a VPN Access Point on Raspberry Pi
Kovařík, Martin ; Hájek, Jaroslav (referee) ; Benedikt, Jan (advisor)
This bachelor thesis deals with creating a virtual private network (VPN) access point on a single-board Raspberry Pi computer. The theoretical part describes the principle of VPN, the most common tunneling protocols and the Raspberry Pi computer in general with its various generations and models. Selected protocols are implemented on the Raspberry Pi and their hardware load, response and throughput are measured. The stability of the protocols is tested and reliability evaluated.
Implementation and Security of IPv6 Protocol in the Company
Hensl, Jaroslav ; Sedlák, Petr (referee) ; Ondrák, Viktor (advisor)
This Master's thesis is focused on the IPv6 protocol implementation in a business environment. The thesis theoretically describes parts of the protocol which are then used in a real environment with respect to maximal compatibility and security. The thesis deals with hardware components, router configuration on FreeBSD OS, and switch configuration with RouterOS. The thesis also proposes how to monitor the network.
Module Extending Functionality of GDPR Solution
Janeček, Vít ; Pluskal, Jan (referee) ; Veselý, Vladimír (advisor)
The goal of this thesis is to introduced the principles of access control technologies, the General Data Protection Regulation and the software for data leakage protection. An essential part of the work is a draft and implementation of the expansion module for user device authentication including shared storage access authorization. Therefore, this module allows to verify whether a user can access shared corporate resources. It also allows to enable or disable access based on specified attributes, such as the type of the protected service or user permission. The basic verification of the module's functionality is realized through different sets of tests and a virtual environment that simulates the corporate environment. The result of the draft is a module that allows to verify access based on the device, and this module is moreover integrated into the Safetica security platform.
High-Speed Virtual Private Networks
Porubova, Anna ; Martinásek, Zdeněk (referee) ; Malina, Lukáš (advisor)
Purpose of this thesis is to become familiar with the issue of virtual private networks (VPN). Describe VPN types and their benefits. Analyze and evaluate various VPN solutions. There will be suggested test scenarios and their configuration solutions.
Concrete Security of the IPSec Protocol
Švarcová, Marie ; Rudolf, Bohuslav (advisor) ; Joščák, Daniel (referee)
The main goal of this thesis is to articulate and to prove security properties of the key exchange protocol IKE, through which the IPSec protocol establishes agreement on keys used for securing internet traffic. It also covers the description of differences between asymptotic and concrete security treatments and the notions of key exchange security and the security of underlying primitives used by key exchange protocols, in the context of concrete security. A general description of IPSec and its main functionalities follows, accompanied by detailed descriptions of both versions of IKE (IKEv1, IKEv2). A general introduction to key exchange is also included and a representative of signature-based version of IKE is introduced and its security is analysed. Powered by TCPDF (www.tcpdf.org)
High-Speed Virtual Private Networks
Porubova, Anna ; Martinásek, Zdeněk (referee) ; Malina, Lukáš (advisor)
Purpose of this project is to become familiar with the issue of virtual private networks (VPN). Describe VPN types and their benefits. Analyze and evaluate various VPN solutions. There will be suggested test scenarios and their configuration solutions.

National Repository of Grey Literature : 54 records found   beginprevious25 - 34nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.