National Repository of Grey Literature 175 records found  1 - 10nextend  jump to record: Search took 0.00 seconds. 
Framework for Analysis of Changes in Data Structures of Core Routers
Bednářová, Marie ; Martínek, Tomáš (referee) ; Matoušek, Jiří (advisor)
Páteřní směrovače jsou síťová zařízení, která v kontextu výkonnosti musejí držet krok s požadavky nových internetových služeb a aplikací. Jeden z faktorů, který výkonnost směrovače ovlivňuje, je klasifikační algoritmus, který je součástí procesu přeposílání příchozích paketů na základě jejich cílové IP adresy. Každá adresa je předložena Forwarding Information Base (FIB), která implementuje algoritmus Longest Prefix Matching (LPM) - hledání nejdelšího shodného prefixu. FIB tabulka obsahuje prefixy všech dosažitelných sítí z daného směrovače a na základě poskytnuté IP adresy pak rozhodne, kam daný paket dále přeposlat, aby dorazil na místo určení. Existuje několik LPM algoritmů s různými vlastnostmi, jako je rychlost vyhledávání, náročnost na paměť, náročnost na aktualizaci, a další. FIB tabulka se v průběhu provozu směrovače aktualizuje na základě změn ve Routing Information Base (RIB). Tyto změny jsou prováděny na základě směrovacích informací, které si mezi sebou směrovače vyměňují. Z těchto poznatků vychází téma této práce, které se věnuje tomu jak, dynamické jsou změny datových struktur FIB tabulek v páteřních směrovačích. Tato práce se věnuje návrhu a implementaci frameworku, který je možné použít jako pomocný nástroj pro vyhodnocování LPM algoritmů, na základě toho, jak daný algoritmus mění datové struktury FIB tabulek v páteřních směrovačích. Test je prováděn pomocí simulace, kdy LPM algoritmus je nejprve umístěn do zjednodušeného modelu směrovače jako implementace FIB tabulky. Poté, na základě zpráv protokolu BGP (Border Gateway Protocol), bude algoritmus aktualizovat datovou strukturu FIB tabulky. Celá simulace je monitorována a účinky změn jsou zaznamenávány. Na konci simulace jsou poskytnuty výsledné statistiky. Framework dále umožňuje změnit implementaci LPM algoritmu a také nastavení samotné simulace. Nakonec je funkčnost frameworku prověřena na základě experimentů.
Advanced Segmentation of a Simulated Network
Slávik, Mark ; Komosný, Dan (referee) ; Benedikt, Jan (advisor)
The diploma thesis deals with the simulation of available routing protocols in the NS3 simulator and in the Quagga module. The functions of simulated routing protocols are described in the theoretical part. In the practical part, the functionality of the NS3 simulator and the RIP, OLSR and OSPF, BGP routing protocols from the Quagga module are introduced using a simple topology. Finally, the network is extended and several subnets are added. Using available analysis tools, the network is subsequently analyzed and evaluated with different scenarios.
Web application for automated network design
Grenčík, Dominik ; Dvořák, Jan (referee) ; Kubánková, Anna (advisor)
This master thesis focuses on creating a web application for the automated design of computer networks in the context of the rapid development of information technologies and their crucial role in the business environment. The work consists of theoretical and practical parts, with the theoretical part addressing the development of web applications, necessary programming languages, and tools, as well as the theory of computer networks and their design. The practical section includes the design and implementation of the backend with a relational database and the frontend with a description of components and functionality. The developed web application demonstrates how automated network design contributes to efficient planning and implementation of computer networks.
Design of laboratory activities for Telecommunication network services course
Dúbravka, Adrián ; Tomašov, Adrián (referee) ; Horváth, Tomáš (advisor)
This master's thesis focuses on designing three laboratory tasks for the subject of Telecommunication Network Services. The aim of this work is to develop education in the field of telecommunication networks through practice-oriented tasks. The work begins with a theoretical introduction that addresses current requirements for metallic and optical networks. It thoroughly examines the various services and approaches used in these networks. The theoretical part specifically focuses on the IXIA network analyzer, which is presented as a key tool for analysis and testing in laboratory conditions, including its advantages and limitations. In the practical part of the work, the design of three laboratory tasks integrated into the course is presented. These tasks are designed to correspond to realistic network scenarios and provide students with practical skills with devices and software. The first task involves working with the IXIA network generator, the second task focuses on simulation and testing using the GNS3 software and the third task thoroughly analyzes the DOCSIS system, its configuration, and functionality.
RouterOS Devices Management System
Konečný, Jakub ; Novotný, Tomáš (referee) ; Hájek, Josef (advisor)
This bachelor's thesis describes a design and an implementation of an information system for management control and remote configuration of devices running MikroTik's RouterOS system. Primary purpose of the system is managing all compatible devices at one place. Within each device you can modify its DNS and DHCP settings, create or edit static DNS records and static routes. System is written in PHP using Nette Framework and MySQL database.
Design methods for computer networks
Božek, Martin ; Stančík, Peter (referee) ; Hajný, Jan (advisor)
Bacherol‘s thesis deals with a topic of a suitable computer network design for a mid-sized infrastructure, its security and router and firewall realization. This boundary element is able to manage basic processes of network controlling between inner and outer network. There is a brief analysis of OSI model but we focused our attention on TCP/IP model more closely. Our project includes description and outlines an importance of the most common elements of the particular network type and their contribution to the security. Description of the three most frequent topologies of the infrastructure type follows. On the basis of the found information, we have chosen and analysed the most suitable topology from the security point of view. The result of the theoretical part is a network model proposal. In the practical part, some our findings are tested and implemented in a real setting. We used a technology of virtualization for the final realization and testing. Thanks to the virtualization used for realization and testing, we could configure the router and the firewall, which are boundary elements that separate the inner network from the Internet.
Authenticing Active Devices in Identity-Based Networking Services
Lomnický, Marek ; Lampa, Petr (referee) ; Matoušek, Petr (advisor)
Main goal of this thesis is to study and test network access based on IBNS technology giving possibility to design flexible security policy based on user's identity and rights that is transparent to physical network components.
An Application Utilizing esmska Plugins for Sending SMS Messages via Web Gateways
Marton, Dominik ; Očenášek, Pavel (referee) ; Rychlý, Marek (advisor)
This thesis describes the design and implementation of a console application, that utilizes esmska JavaScript modules to enable sending SMS messages from inside of user scripts via web gateways without CAPTCHA security plugin, and of a web service with REST interface making this application accessible remotely. Both are primarily made with the purpose of running on network devices with OpenWrt operating system while trying to minimise memory consumption. The whole solution is written in C with the help of libcurl library, embedded JavaScript interpreter Duktape and standard C library uClibc.
Communication systems based on IP telephony
Zimek, Josef ; Kapoun, Vladimír (referee) ; Herman, Ivo (advisor)
My master’s thesis is focused on designing and creating communication network, which provides communication between two independent networks through encrypted tunnel. My solution is based on routers formed by older personal computers with FreeBSD like a operating system. Between routers is created static encrypted tunnel by using IPSec protocol. Voice services provides packet oriented exchange Asterisk with support of signaling protocol SIP. This solution can be used eg. for connecting remote branch to headquarters of company and then can branch utilize shrared resources. To headquarters can connect also remote workers from their home. In this case are used SSL certificates to authentication of user. This scenario is very required today.
Family House Computer Network Design
Kuchařík, Lukáš ; Košťál, Lubor (referee) ; Ondrák, Viktor (advisor)
This bachelor thesis describes the design of computer networks for a family house. The main task will be to draft a newly built computer network based on the requirements of the owner. Try to find the best solution for handling network so that the best fit to the object.

National Repository of Grey Literature : 175 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.