National Repository of Grey Literature 54 records found  beginprevious35 - 44next  jump to record: Search took 0.01 seconds. 
Secure data connection over an insecure public network infrastructure
Kořínek, Petr ; Halbich, Čestmír (advisor) ; Vasilenko, Alexandr (referee)
In the theoretical part, the short history of the formation and functional description switched networks. I devote a lot of attention to network protocols used in the practical part. Composition body frames and packets, especially content of their heads. In the practical part deals with the design of the physical model of interconnections and configuration of its active elements. Following are tests of functionality and a maximum load of line with the current state of measurement CPU routers. Evaluation of tests, I set the appropriate configuration elements. I performed tests achieved data throughput solution 75Mbit / s. The benefit of this work are the possibilities arising from the use of throughput protocols on the second layer.
Geologic Well Data Processing, Transformation and Administration
Kováč, Jakub ; Boráň, Pavel (referee) ; Ondrák, Viktor (advisor)
The bachelor thesis is concerned with the geophysical data processing, transformation and administration of a small company for purpose of constant access to an actual informations. The thesis presents solutions with consider on security, reliability and economics of a whole problem.
Project of Client-based VPN Remote Access Solution for the worldwide Retail Business Company in the region of Central Europe
Ondrák, Richard ; Havlín, Petr (referee) ; Kříž, Jiří (advisor)
The aim of this Thesis is to project and describe new Client-based Remote Access Solution for the Tesco Stores retail company in the region of Central Europe. Based on facts that the all present Tesco’s Remote Access Systems have not any longer met the increasing requirements and needs of corporate users and suppliers it is clear that the main scope is to find and implement such Solution that will meet and exceed all requirements. The main Project Aspects are to be the ease of use, security of the solution, unexacting administration of the system and user groups, and one unified Solution for the all Countries from the region of Central Europe that is suitably integrated in the Tesco IT infrastructure.
Proposal of the secure network model
Kis, Matej ; Rosenberg, Martin (referee) ; Babnič, Patrik (advisor)
The goal of this work was to create a design of a secured network infrastructure with decribing different ways of securing at ISO/OSI layers. Create a list of protocols which can be used to achieve a secured network design. In the theoretical part of this work the attention was placed to analyze possible solutions, which can be appllied in a practical part of the work. The practical part involves a design of a network topology and simulation. The part of the simulation was device configuration and network security testing.
Installation, configuration and testing of server services DHCP, FTP, VPN, NAT and SNMP in IPv4 and IPv6 environments
Brázda, Libor ; Sysel, Petr (referee) ; Novotný, Vít (advisor)
This bachelor thesis focuses on selecting server services such as FTP, DHCP, VPN, NAT and SNMP and their implementation in operating system Windows Server 2008 R2 and linux distribution Debian. The theoretical part analyzes the problems of TCP/IP protocol including addressing in IPv4 and IPv6 environments. In next chapters, thesis contains detailed descriptions of individual services, their principles, security, etc. The last part is focused on the description of the laboratory task, their activities and contribution to student and also software used in the implementation tasks. The result of laboratory work is created job on the configuration of individual services in both operating systems. Tasks are made for students without previous knowledge of the problem, so they can successfully configure and test these tasks.
Hardware Accelerated Encryption of Network Traffic
Novotňák, Jiří ; Kořenek, Jan (referee) ; Žádník, Martin (advisor)
The aim of this thesis is to draft and implement high-speed encryptor of network trafic with throughput 10Gb/s in one way. It has been implementated for FPGA Xilinx Virtex5vlx155t placed on card COMBOv2-LXT. The encryption is based on AES algorithm using 128 bit key length. The security protokol is ESP in version for protokol IPv4. Design is fully synthesizable with tool Xilinx ISE 11.3, however it is not tested on real hardware. Tests in simulation works fine.
Challenges in Optimal Bandwidth for Medical Image Transfer
Schindler, Vladimír ; Šimák, Boris (referee) ; Šárek, Milan (referee) ; Dostál, Otto (advisor)
This dissertation thesis is focused on the optimization of bandwidth parameters for the transport of medical image data between medical devices and remote data storage. As real and fully functional structure, which will be analyzed in this work. It was selected system MeDiMed (Metropolitan Digital Imaging System in Medicine). The thesis examines the operation of the small health organizations and their modalities, which use this system for remote data archiving. Traffic analysis is then statistically processed. The thesis also deals with the analysis of increasing the security during accessing health system, and assesses its impact on transmitted data. The effect of setting the transmission parameters and the most widely used types of ciphers on the transfer speed is also compared.
Security of VoIP protocols
Novotný, František ; Číka, Petr (referee) ; Krajsa, Ondřej (advisor)
This bachelor dissertation deals with the VoIP (Voice over Internet Protocol) safety. The most used transport and signal protocols employing this technology are presented first. Two extended protocols, SIP (Session Initiation Protocol) and IAX (Inter-Asterisk eXchange Protocol), as well as open source Asterisk, which is closely connected with these protocols, are shown in detail. After that, methods, attacks and threats able to assure secure transfer in the use of VoIP among users are described. Afterwards the practical part of this essay, divided into two parts, is presented. In the first part, a passive attack in the form of tapping is demonstrated, and in the second, active attacks are described which take the form of forced cancellations and forwarded calls between two communicating users. With both attacks, safety measures that could effectively prevent against their potential attacking are proposed. In the closing part, the VoIP safety is evaluated for securing a quality connection between users communicating through it.
Cryptographic protocols used in computer networks
Lúdik, Michal ; Hajný, Jan (referee) ; Doležel, Radek (advisor)
This work deals with the analysis of basic cryptographic protocols, principle of the authentication and verification of their safety. In the first part of the work is a short introduction to the issue - cryptography, some types of attacks, authentication and authorisation. In the second part is the analysis of protocols SSH, SSL, IPSec, and Kerberos, authentication and verification of their functionality and security under laboratory conditions.
Protocol IPv6 and its implementation scenarios
Rýzner, Zdeněk ; Krajsa, Ondřej (referee) ; Lambertová, Petra (advisor)
This thesis deals with IPv6 – the Internet layer protocol and its situation in today’s Internet. In theoretical part are described major changes, which the new protocol brings to networking area – especially addressing, headers format and autoconfiguration. Comparison of IPv6 and IPv4 is also included. Practical part covers connecting to IPv6-Internet with selected transition methods, analyses these methods and features its implementation in dependence on network environment.

National Repository of Grey Literature : 54 records found   beginprevious35 - 44next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.