National Repository of Grey Literature 175 records found  beginprevious21 - 30nextend  jump to record: Search took 0.01 seconds. 
Comparison of Distance-Vector Routing Protocol
Cocuľa, Maroš ; Grégr, Matěj (referee) ; Veselý, Vladimír (advisor)
This work deals with comparing the distance vector routing protocols. More accurately, protocols EIGRP, RIP and Babel. The aim is to compare information using the simulation OMNeT++, as well as the physical connection. Part of the work is a detailed description of the protocols, simulator OMNeT++ and the libraries INET and ANSAINET. Finally, we summarized the results of experiments and the comparison of protocols with each other.  
Automated Testing of OS Linux Protocol Stack Behaviour During Congestion
Tomašov, Adrián ; Grégr, Matěj (referee) ; Lichtner, Ondrej (advisor)
Táto práca sa zaoberá štúdiom a simuláciou zahltenej siete v laboratorných podmienkach a následne automatizovaným testovaním protokolového zásobníka v operačnom systéme Linux na tejto sieti. Na základe sady experimentov zistíme, aký dopad na správanie protokolového zasobníku má zahltenie siete. Následne bude popísaný spôsob simulácie a emulácie takejto siete fyzickým zariadením. Výstupom tejto práce budú rôzne konfigurácie strojov a emulátorov pre zahltenie siete, a k ním priložená sada meraní s vyhodnotením výsledkov. Tieto konfigurácie budú použité v automatizovanom testovaní jadra operačného systému Linux, aby sa chyby vo vývoji a pri implementácii sieťových protokolov a ovládačov pre sieťové karty našli rýchlejšie.
Internet of Things (IoT) Security Risks and Threat
Urbanovský, Jozef ; Grégr, Matěj (referee) ; Ryšavý, Ondřej (advisor)
The bachelor's thesis deals with the issue of security and attacks on the Internet of Things devices. The document addresses nature of Internet of Things, its characteristics and information security. The thesis analyzes dierent protocols and standards used by Internet of Things and types of network attacks. Part of work consists of packet capture analysis from IoT honeypot and showcases discoverd attacks. In fnal part, one specifc IoT device is analyzed in terms of security, around which is created an experimental IoT system. Subsequently this system is penetration tested with dierent attacks, thus creating new datasets.
Packet Filtering Using XDP
Mackovič, Jakub ; Podermański, Tomáš (referee) ; Grégr, Matěj (advisor)
Počítačové systémy, ktoré musia poskytovať svoje služby s vysokou dostupnosťou vyžadujú isté bezpečnostné opatrenia na to, aby ostali dostupné aj pod paketovými sieťovými útokmi. Nevyžiadané pakety musia byť zahodené čo najskôr a čo najrýchlejšie. Táto práca analyzuje eXpress Data Path (XDP) ako techniku skorého zahodenia paketov a extended Berkeley Packet Filter (eBPF) ako mechanizmus rýchlej analýzy obsahu packetov. Poskytuje sa pohľad na dnešnú prax v oblasti firewallov v systémoch s linuxovým jadrom a navrhne sa systém rýchlej filtrácie paketov založený na eBPF a XDP. Do detailov popisujeme naimplementované filtračné riešenie. Nakoniec sa vyzdvihujú výhody XDP oproti ostatným súčasným technikám filtrácie paketov na sérii výkonnostných testov.
Modelling IS-IS and TRILL
Marek, Marcel ; Grégr, Matěj (referee) ; Veselý, Vladimír (advisor)
In this thesis, we describe the principles of IS-IS routing protocol. We introduce the current state of implementation of this protocol within the simulation framework OMNeT++. We present the implementation of the IS-IS protocol created within the ANSA project. Moreover, we employ its variant called TRILL that is nowadays deployed as replacement of STP in data-center environment. The aim is to enable the modelling of the protocols without the need having to build physical architecture.
Tor Network Simulators: Comparison and Usability
Medek, Petr ; Grégr, Matěj (referee) ; Polčák, Libor (advisor)
This thesis talks about simulations of Tor network through simulators Shadow and Tor Path Simulator. As a part of the thesis was created web application using Tor Path Simulator that demonstrates principles of Tor network operation and attacks on it. Created application will run simulations according to parameters input by user and results will be shown using graphs and tables. Application was used as a basis for teaching materials. In my thesis I also focus on Shadow simulator and its usage.
Interactive Web Interface for IP Flow Data
Salač, Radek ; Grégr, Matěj (referee) ; Matoušek, Petr (advisor)
  This thesis describes development of application for analyzing IP flow data.    The author conducts relative comparison of already existing protocols and tools and studies theirs pro's and con's.    Based on this comparison and features requested by users,    author develops his own application primarly focused on interactive and user-friendly interface for working with IP flow data.
Duplicate Traffic Detection
Krch, Petr ; Polčák, Libor (referee) ; Grégr, Matěj (advisor)
This thesis describes methods for duplicate traffic detection in computer networks. At first, it analyzes the problem of redundant traffic including the description of its origin and causes. The thesis describes on what data and what methods we are able to detect an operation as duplicate. Finally, this thesis explains design of redudant traffic detection algorithm including testing plan and results evaluation.
Testing of high-speed tool for network address translation
Vrána, Roman ; Grégr, Matěj (referee) ; Žádník, Martin (advisor)
This master thesis presents a topic of testing network address translation. It describes basic principles of network address translation and general methods for testing network devices. These methods are then applied on NAT devices. Thesis then introduces a design of a  framework for performing functional tests. The designed framework is then implemented as a part of the thesis and used to test a newly developed high-speed NAT application.
ISP Network Optimalization
Čech, Ondřej ; Podermański, Tomáš (referee) ; Grégr, Matěj (advisor)
Bachoelor's thesis is focusing on analysis of network local ISP, detecting actual problems and offering a solution for founded problems. There were problems with broadcast-storm, private address space, RSTP protocol settings and DHCP spoofing. The following changes were introduced: OSPF routing, RSTP override, automatic backup, client separation using DHCP. There has been a reduction in broadcast traffic and associated broadcast-storm.

National Repository of Grey Literature : 175 records found   beginprevious21 - 30nextend  jump to record:
See also: similar author names
2 Grégr, Michal
Interested in being notified about new results for this query?
Subscribe to the RSS feed.