National Repository of Grey Literature 125 records found  1 - 10nextend  jump to record: Search took 0.02 seconds. 
Authenticing Active Devices in Identity-Based Networking Services
Lomnický, Marek ; Lampa, Petr (referee) ; Matoušek, Petr (advisor)
Main goal of this thesis is to study and test network access based on IBNS technology giving possibility to design flexible security policy based on user's identity and rights that is transparent to physical network components.
Design and implementation of network collector
Bošeľa, Jaroslav ; Horváth, Tomáš (referee) ; Oujezský, Václav (advisor)
This master’s thesis deals with description of information protocol of network flow, mainly definition of Cisco NetFlow version 9. Describes it’s features, message format and attributes of transmitted data. The thesis is primarly focused onto NetFlow v9 transmitted template, which defines fileds and data in consecutive data flow. The essence of the thesis consists in implementation of simple NetFlow v9 parser, which has been programmed in Python prog.language, it’s tests of captured UDP data from file and port capture testing on development server in lab. There is a possibility of saving captured and parsed data into prepared database within implementation as output from capturing.
Simulation scenarios for analysis of behavior of transport networks
Koláčková, Aneta ; Koton, Jaroslav (referee) ; Jeřábek, Jan (advisor)
This master’s thesis deals with the issue of mobile networks, protocol suite TCP/IP and routing protocols. It focuses in particular on the functioning of the transport part of the third and fourth generation mobile networks and intends to fnd the most suitable options for their emulation. The master’s thesis compares two selected emulation programs through a series of tests that were performed on a server created for these purposes. The main outputs are two detailed comprehensive scenarios and solutions have been developed. The frst scenario deals with the overall transport network confguration. The second scenario is based on the frst one and is focused on troubleshooting of particular issues in this network. Their implementation helps to analyze the behavior of the transport part of the mobile network.
Computer networks based on VyOS and Cisco IOS operating systems
Jalovecký, Denis ; Dvořák, Jan (referee) ; Koláčková, Aneta (advisor)
This bachelor thesis focuses on configurations and issues of network protocols in operating systems of Cisco IOS and VyOS routers. One of the main goals include choosing the most appropriate emulator and installation of this emulator in virtual enviroment. The thesis also describes the properties and differences of protocols and their application in the network operating systems mentioned above. After learning about possibilities of emulations, two scenarios, in which the protocols were applied and analyzed, were created. These scenarios meet standard of a lab excersise which takes around one and a half hour. The most frequent issues and their solutions are mentioned as well. }
Proposal of the secure network model
Kis, Matej ; Rosenberg, Martin (referee) ; Babnič, Patrik (advisor)
The goal of this work was to create a design of a secured network infrastructure with decribing different ways of securing at ISO/OSI layers. Create a list of protocols which can be used to achieve a secured network design. In the theoretical part of this work the attention was placed to analyze possible solutions, which can be appllied in a practical part of the work. The practical part involves a design of a network topology and simulation. The part of the simulation was device configuration and network security testing.
Managing Mobile IP enabled networks with SNMP protocol
Závodný, Ondřej ; Vajsar, Pavel (referee) ; Skořepa, Michal (advisor)
The content of this thesis is to research possibilities of using SNMP for management of Mobile IP activated entities. The first two chapters deal with theoretical analysis of Mobile IP protocol, and Simple Network Management Protocol. The Mobile IP protocol analysis focuses especially on the elements Home agent and Foreign agent. In the SNMP chapter the analysis focuses mainly on ways to exchange messages. Another part of the document is devoted to a description of laboratory networks com- posed of routers Cisco 1841 and the configuration of them. Finally is described the programmed application to manager these devices in JAVA, which is included in Annex. The program periodically sends SNMP queries and finds relationships between the Home agent and the mobile nodes, and between the foreign agent and the mobile nodes. The application has a user-friendly interface that is shown on the attached flash animation. Finally, the thesis summarizes the concepts described in previous chapters and the goals to achieve.
Secure network based on CISCO systems
Wagner, Zdeněk ; Beran, Jan (referee) ; Macho, Tomáš (advisor)
This work deals with the matter of Virtual Private Network (VPN) utilizing both contemporary and older protocols and the possibilities of their use. Among the most interesting parts there are those presenting various ways of use of the VPN technology, IPSec protocol, IOS SSLVPN and RSA server with HW token ensuring the two-factor user authentication.
Design of laborotory high-speed system usage
Benda, Ondřej ; Polívka, Michal (referee) ; Škorpil, Vladislav (advisor)
This thesis deals with high-speed communication equipment based on Cisco 2821. Includes description of facilities, physical and logical diagrams, instructions for basic orientation in the operating system Cisco IOS, and the procedure for the preparation of the workplace. Further in this document, there are three laboratory task on the topic of MPLS IP, Traffic engineering with MPLS and Circuit emulation over IP. Each task includes introduction, instructions for the elaboration, the question of the task, desired outcome and brief guide for teachers.
An Analysis of Selected IPv6 Network Attacks
Pivarník, Jozef ; Podermański, Tomáš (referee) ; Grégr, Matěj (advisor)
This master's thesis analyses and demonstrates selected IPv6 attacks including two Man-in-the-Middle attacks and one Denial of Service attack - Rogue Router Advertisement, Neighbor Cache Poisoning and Duplicate Address Detection DoS, respectively. In the first part the author presents necessary information related to the issue and provides detailed information on how to realize these attacks in practice using publicly available tools. The second part of the thesis presents various ways of mitigating presented attacks, analyses implementations of some of those countermeasures on Cisco and H3C devices and discussess their applicability.
Optimization of Wireless Networks against Attacks
Řezníček, Martin ; Pust, Radim (referee) ; Škorpil, Vladislav (advisor)
The work describes the design of wireless networks and the problems relating to this technology. In the theoretical part it deals with the learning network, the security technology and design wireless network. In the practical part it describes the simulation and measure of the signal strength. The ensuring of the safety by aid WPA as well as Radius authentication, TKIP data encryption, and the possibility of breaking into the network. The following chapters deal with the connection of the users to the network (domain) and with the application of VOIP telephony on the network. The last part describes the extension of the network and the associated problems.

National Repository of Grey Literature : 125 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.