National Repository of Grey Literature 46 records found  beginprevious35 - 44next  jump to record: Search took 0.01 seconds. 
Network Tasks Optimalization
Dražil, Jan ; Korček, Pavol (referee) ; Viktorin, Jan (advisor)
Nowdays, when we are running out of public IPv4 addresses, we rely on techniques that at least postpone their complete exhaustion. One of these techniques is a network address translation (NAT). Internet providers require the highest possible bandwidth from devices that perform this task. This thesis compares NAT DPDK, built on top of DPDK framework, with freely available alternatives. This work also extends NAT DPDK with Application-Level Gateway support.
Installation, configuration and testing of server services DHCP, FTP, VPN, NAT and SNMP in IPv4 and IPv6 environments
Brázda, Libor ; Sysel, Petr (referee) ; Novotný, Vít (advisor)
This bachelor thesis focuses on selecting server services such as FTP, DHCP, VPN, NAT and SNMP and their implementation in operating system Windows Server 2008 R2 and linux distribution Debian. The theoretical part analyzes the problems of TCP/IP protocol including addressing in IPv4 and IPv6 environments. In next chapters, thesis contains detailed descriptions of individual services, their principles, security, etc. The last part is focused on the description of the laboratory task, their activities and contribution to student and also software used in the implementation tasks. The result of laboratory work is created job on the configuration of individual services in both operating systems. Tasks are made for students without previous knowledge of the problem, so they can successfully configure and test these tasks.
Http Tunneling of Camera Image Data Transmission
Kabelka, Michal ; Ráb, Jaroslav (referee) ; Ryšavý, Ondřej (advisor)
This thesis is trying to describe design and implementation of software for communication interface of camera with server developed for company Wasatis. The first part is describing difficulties and effort to finding solutions to given problems. The next part is about communication through interface called Call Back Connection. In next few parts it is describing process of implementation and principle of configuration of applications. In final part it solves security questions of communication.
Computer Identification Based on Packet Timestamps
Novotný, Jan ; Polčák, Libor (referee) ; Kaštil, Jan (advisor)
This work describes perspective identification technique called computer identification based on packet timestamps. This work also describes an algorithm to calculate skew of computer clock, on which the entire computer identification technique is based on. We will use this technique to identify a number of computers in the real computer network, the device that is running NAT and computers located behind NAT. Finally we show, how to determine the number of computers located behind NAT.
Dungeon Lords Board Game
Kawulok, Lukáš ; Kubát, David (referee) ; Doležel, Michal (advisor)
In this work I am describing transformation board game Dungeon lords into computer game. Computer version of the game will have the same rules as board version.Final build of the game allows network playing, saving of game and loading of the saved game. During development of the game is aviable only board version. In documentation I describe steps of developing and also rules of the game. In the end is described the way of testing and also revieling of bugs and their repair. Projet was created in C# language in MS Visual Studio 2010. To creation of GUI is used WDF technique.
Network Synchronization of Data under OS Windows
Hellar, Jan ; Trchalík, Roman (referee) ; Očenášek, Pavel (advisor)
This thesis deals with an implementation of a tool for file synchronization over a network for OS Windows. It also illustrates what issues are associated with synchronization of files, such as collision detection and resolution and the issue of setting up connection between two devices over the internet when connected to the internet via NAT devices. Thesis presents factual implementation of collision resolver and application of methods for NAT traversal. By testing the final solution correctness of collision resolver and NAT traversal technique was verified. Results of testing are discussed and possible extensions are proposed.
Identities in Tunelled Networks and during Network Address Translation
Šeptun, Michal ; Marek, Marcel (referee) ; Polčák, Libor (advisor)
This thesis introduces the design and implementation of the extension of the system for lawful interception. The system is developed as a part of the Sec6Net project at FIT BUT and provides a platform for research activities in determining identities in computer networks. Parts which has the task of monitoring changes in a user's identity will be extended, so that the system is able to determine the identity even in the tunneled and translated networks. It describes the problems encountered during implementation and their solutions. There are described mechanisms for tunneling networks, mainly virtual private networks and transition mechanisms for IPv6, IP addresses and NAT variants. In the end the tests of the individual modules are described.
Exploration of the jet stream in the civil air transport
Švec, Michal ; Imriš, Pavel (referee) ; Krška, Karel (advisor)
This master’s thesis deals with jet streams. The exploration part describes conditions of jet stream formation, its characteristics, classification on the geographical basis and phenomena attendant on the jet streams. It also contains a description of jet stream measurement methods and methods of its interpretation in aeronautical meteorological charts. Organization of aeronautical traffic in the north Atlantic region within reach of the jet streams is further described. Practical part of this thesis contains author’s own research which compares time and economical profitability of transatlantic flights planned according to the jet streams. The principle of this evaluation was based on assessment of real flights and flights via shortest possible routes. It was proven, that profits mentioned above are gained only in the oceanic parts of flights.
Proxy firewall
Kugler, Zdeněk ; Pelka, Tomáš (referee) ; Pust, Radim (advisor)
This diploma thesis deals with the topic of proxy servers and firewalls and considers other associated technologies and network techniques. It systematically describes the general issues of firewalls, with a special focus on proxy firewalls and their safety. Additional systems mentioned in this document are intrusion detection systems (IDS), antivirus systems and content control filters – as these are also connected with safety of networks, servers and workstations or with limiting various Internet sources. IDS systems can be typically supplemented with various additional applications or tools that enrich them and increase their potential – including graphic additions. This part is remembered too. Some systems can communicate with each other, which is successfully utilised (FW & IDS co-operation, for example). The purpose of the first large chapter is to present firewall technologies, to list firewall types, their basic functionality and to present the final comparison. It marginally mentions firewall applications in practice. Chapter two explains the theory of network address translation (NAT), deals with its functionality, safety and with limiting the NAT mechanism. Chapter three brings a comprehensive presentation of proxy servers. It explains their principle from the point of view of functionality and the specification of application areas. The chapter is complete with a clear list of proxy server types and their descriptions. The last chapter named Linux Proxy Firewall is the key part of the work. It deals generally with the Linux platform, the Debian GNU/Linux distribution, principles of safety policy, network configuration, network server safety, Linux firewalls (Netfilter framework, Iptables tool) and with the Squid proxy server. The following subchapters respect the previous structure: they describe the theories of intrusion detection systems, antivirus checks and content filtering based on different methods. All this is presented similarly to the previous chapters. A proxy firewall solution built on the Linux operating system has been proposed in the practical part. The Debian GNU/Linux distribution has been chosen, being very suitable for server use due to its features. This environment is also used for additional safety software contained in the proxy firewall: antivirus protection, content filtering and an intrusion detection system. The priority is the most comprehensive computer network security, which requires detection abilities with the broadest possible coverage in the area of network safety. The purpose of this diploma thesis is not only to describe the principle of operation of proxy servers and to compare them with other types and other systems, but it also brings my own proposed free solution, which increases network safety and has the ambition of comparing it with clearly commercial products available on the market.
An Architecture for Global Distributed SIP Network Using IPv4 Anycast
Anděl, Ladislav ; Polívka, Michal (referee) ; Kovář, Petr (advisor)
Tato diplomová práce se zabývá metodami pro výběr nejbližší RTP proxy k VoIP klientům s použitím IP anycastu. RTP proxy servery jsou umístěny v síti Internetu a přeposílají RTP data pro VoIP klienty za síťovými překladači adres(NAT). Bez zeměpisně rozmístěných RTP proxy serverů a metod pro nalezení nejbližšího RTP proxy serveru by došlo ke zbytečnému poklesu kvality přenosu médialních dat a velkému zpoždení. Tento dokument navrhuje 4 metody a jejich porovnání s podrobnějšími rozbory metod s využitím DNS resolvování a přímo SIP protokolu. Tento dokument také obsahuje měření chování IP anycastu v porovnání mezi metrikami směrování a metrikami časovými. Nakonec dokumentu je také uvedena implemetace na SIP Express Router platformě.

National Repository of Grey Literature : 46 records found   beginprevious35 - 44next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.