National Repository of Grey Literature 33 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Framework for Analysis of Changes in Data Structures of Core Routers
Bednářová, Marie ; Martínek, Tomáš (referee) ; Matoušek, Jiří (advisor)
Páteřní směrovače jsou síťová zařízení, která v kontextu výkonnosti musejí držet krok s požadavky nových internetových služeb a aplikací. Jeden z faktorů, který výkonnost směrovače ovlivňuje, je klasifikační algoritmus, který je součástí procesu přeposílání příchozích paketů na základě jejich cílové IP adresy. Každá adresa je předložena Forwarding Information Base (FIB), která implementuje algoritmus Longest Prefix Matching (LPM) - hledání nejdelšího shodného prefixu. FIB tabulka obsahuje prefixy všech dosažitelných sítí z daného směrovače a na základě poskytnuté IP adresy pak rozhodne, kam daný paket dále přeposlat, aby dorazil na místo určení. Existuje několik LPM algoritmů s různými vlastnostmi, jako je rychlost vyhledávání, náročnost na paměť, náročnost na aktualizaci, a další. FIB tabulka se v průběhu provozu směrovače aktualizuje na základě změn ve Routing Information Base (RIB). Tyto změny jsou prováděny na základě směrovacích informací, které si mezi sebou směrovače vyměňují. Z těchto poznatků vychází téma této práce, které se věnuje tomu jak, dynamické jsou změny datových struktur FIB tabulek v páteřních směrovačích. Tato práce se věnuje návrhu a implementaci frameworku, který je možné použít jako pomocný nástroj pro vyhodnocování LPM algoritmů, na základě toho, jak daný algoritmus mění datové struktury FIB tabulek v páteřních směrovačích. Test je prováděn pomocí simulace, kdy LPM algoritmus je nejprve umístěn do zjednodušeného modelu směrovače jako implementace FIB tabulky. Poté, na základě zpráv protokolu BGP (Border Gateway Protocol), bude algoritmus aktualizovat datovou strukturu FIB tabulky. Celá simulace je monitorována a účinky změn jsou zaznamenávány. Na konci simulace jsou poskytnuty výsledné statistiky. Framework dále umožňuje změnit implementaci LPM algoritmu a také nastavení samotné simulace. Nakonec je funkčnost frameworku prověřena na základě experimentů.
Advanced Segmentation of a Simulated Network
Slávik, Mark ; Komosný, Dan (referee) ; Benedikt, Jan (advisor)
The diploma thesis deals with the simulation of available routing protocols in the NS3 simulator and in the Quagga module. The functions of simulated routing protocols are described in the theoretical part. In the practical part, the functionality of the NS3 simulator and the RIP, OLSR and OSPF, BGP routing protocols from the Quagga module are introduced using a simple topology. Finally, the network is extended and several subnets are added. Using available analysis tools, the network is subsequently analyzed and evaluated with different scenarios.
Routing among autonomous systems in Internet
Daněk, Michal ; Komosný, Dan (referee) ; Novotný, Vít (advisor)
Bachelor thesis describes the architecture of the Internet, its division into autonomous system and methods of their interconnection. Furthermore extensively describes routing mechanisms among autonomous system but also inside. More space is dedicated to routing protocols OSPF and BGP. At the end of the work is designed laboratory task for subject Network Architecture where this protocols are used.
Netdev Driver for Acceleration COMBO Cards
Tran, Dominik ; Vrána, Roman (referee) ; Kučera, Jan (advisor)
This thesis deals with the development of the network device driver for the FPGA network COMBO cards, which should enable receiving and sending packets through standard network interface of Linux kernel. CESNET is developing a device called DDoS Protector for protection against an amplification (D)DoS attacks, which uses COMBO cards to achieve high performance. A SZE2 interface is used for high speed transfers of network data between COMBO card and a controlling software application, using technique of bypassing kernel network stack and other methods. DDoS Protector has to support standard network protocols, whose implementation directly on top of the SZE2 is very difficult. Instead, using kernel network stack, which is, by default, bypassed to achieve high performance, is much easier to implement and supports all sorts of protocols. Creation of the network device driver enables us to use kernel network stack and other network applications for COMBO cards. Based on the study of SZE2 interface and driver development, I designed and then successfully implemented network device driver. Driver was tested to ensure standard protocols work. It was also tested from the performance point of view. I have also developed the same type of driver for the newer interface - NDP and an application for an accelerated packet forwarding, both of which are functional and were not part of the thesis specification.
Protocols Analysis of CISCO Networks
Karlík, Martin ; Kenyeres, Martin (referee) ; Škorpil, Vladislav (advisor)
ABSTRACT Bc.Karlík, Martin Department of Telecommunications, Faculty of Electrical Engineering and Communication, Brno University of Technology. Analysis of CISCO networking protocols This semestral thesis is focused on CISCO networks and protocols like MPLS, BGP, Ipv4, Ipv6, Multicast – sprase / dense mode. The task was study of those protocols and design and implement lab excercise with one of those protocols by using free network simulator GNS3. In this excercise is used CISCO router 3745.
Three scenarios of simulation of global Internet behavior
Šiklóši, Miroslav ; Dvořák, Jan (referee) ; Jeřábek, Jan (advisor)
Goal of this thesis is to study about Internet from the perspective of autonomous systems, BGP protocol, transit, peering, DNS system and security. Next goal is to design suitable scenarious and topology, related with BGP protocol etc. and then desing suitable solutions.
Modeling and Simulation of BGP
Novák, Adrián ; Marek, Marcel (referee) ; Veselý, Vladimír (advisor)
This Master's thesis deals with modeling and simulation of BGP protocol within the OMNeT++ environment. The BGP protocol is described with employed data structures and the finite state machine of BGP peering. Next, the basic configuration is outlined involving the setup of the BGP protocol on Cisco devices. Further, BGP for OMNeT++ state-of-the-art is investigated together with its lack of functionality and issues. The second part of this thesis deals with design, implementation, and testing of the new functionality of BGP protocol and simulation models. The last section describes the overall achieved results.
Design of labs for Cisco academy courses
Oujezský, Václav ; Růčka, Lukáš (referee) ; Jeřábek, Jan (advisor)
This master's work deals with the design of laboratory exercises for Cisco Academy courses. Especially is oriented on Cisco technology. The theoretical part describes various devices used in the laboratory and the issue of functionality of these devices, such as switching, routing and solve any problems with the configurations of these elements. The practical part is directly generated designs laboratory exercises, focusing on specific examples of the problems from the configuration and network management with Cisco. An integral part of work consists of supporting the presentation of individual laboratory tasks, including configuration files, settings of the device. Create labs and verify the functionality of their configuration has been realized in the laboratory Cisco Academy Brno.
Network Management
Hrnčíř, Jan ; Martin,, Žídek (referee) ; Ondrák, Viktor (advisor)
Thesis deals with the assessment of the current state of computer network management and information security for a particular company. Analyzes will be foundation for possible change proposals and enhancements to the requirements and economic opportunities of the specific company.
Automation of DDoS Attack Mitigation
Nagy, Peter ; Podermański, Tomáš (referee) ; Grégr, Matěj (advisor)
The aim of this thesis is automation of DDoS attack mitigation. This thesis provides an overview of GNU/Linux network platforms and different approaches for their configuration. The aim is to select a platform that could be extended to automate DDoS mitigation. DDoS attack types are explained as well. Selected methods for DDoS mitigation are described in more detail such as Remote Triggered Black Hole and BGP Flowspec. Existing tools like DDoS Defender and FastNetMon are used to detect a DDoS attack. NETX was chosen as target implementation platform. To communicate with devices, API or BGP protocol with Flowspec extension are used.

National Repository of Grey Literature : 33 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.