National Repository of Grey Literature 28 records found  1 - 10nextend  jump to record: Search took 0.00 seconds. 
Proposal of the secure network model
Kis, Matej ; Rosenberg, Martin (referee) ; Babnič, Patrik (advisor)
The goal of this work was to create a design of a secured network infrastructure with decribing different ways of securing at ISO/OSI layers. Create a list of protocols which can be used to achieve a secured network design. In the theoretical part of this work the attention was placed to analyze possible solutions, which can be appllied in a practical part of the work. The practical part involves a design of a network topology and simulation. The part of the simulation was device configuration and network security testing.
Virtualization of computing machines and operating systems
Kadlíček, Jan ; Burget, Radim (referee) ; Novotný, Vít (advisor)
This bachelor thesis is about virtualization of machines and learning how to work with virtualization technologies, such as VirtualBox, VMware, Hyper-V, Docker Container, this paper also compares their parameters. Important part of this paper is to choose the best virtualization technology for tracking on Department of Telecommunications, based on results of tests.
Virtualisation as a data network simulation apparatus
Chapčák, David ; Burda, Karel (referee) ; Krkoš, Radko (advisor)
This bachelor’s thesis deals with the use of virtualization, especially for data network simulation. The theoretical part deals with virtualization including virtualization division into groups and evaluate the advantages and disadvantages of virtualization. The following part describes several common virtualization tools. The majority of the text is devoted to simulation and presents several network simulators, which use virtualization. In the next part several experimental networks that are currently operating are described. Furthermore the measurement portion is realized where the measured parametres gathered from virtual network are compared with data measured in real network. The final section summarizes the results and draws conclusions.
Laboratory scenarios describing DNS system
Sakala, Peter ; Langhammer, Lukáš (referee) ; Jeřábek, Jan (advisor)
The master’s thesis deals with Domain Name System (DNS) and its practical use. It describes hierarchy of domain names, resource record types, protocol used, as well as DNSSEC extension. The most utilized implementations of authoritative and recursive DNS servers are presented. Virtualization, containers and other tools with potential use in labs are described. Two lab scenarios in virtualized environment with instructions for students were designed and developed in this thesis.
Virtual Machine Management System
Skála, Milan ; Zachariášová, Marcela (referee) ; Dolíhal, Luděk (advisor)
This thesis focuses on design and implementation of the application for remote management of virtual machines that will be able to manage the virtual machines automatically. It describes a motivation for deployment of virtualization technology in companies and corporations, various virtualization methods altogether with their assessment from the practical point of view. The existing, globally widespread solutions, are also analyzes in the thesis. The application, which will be able to remotely control virtual machines, is designed and implemented in the practical part of this thesis. The final part describes possibilities of further extensions of the application.
Technology for comprehensive support of multimedia services in heterogeneous networks
Dosoudil, Petr ; Krkoš, Radko (referee) ; Novotný, Vít (advisor)
The theses explains the Evolution Packet System (EPS) and subsystem IP Multimedia Subsystem (IMS). It also informs how these systems cooperate and through which interfaces the main data and signals between these two technologies are transfered. The thesis includes practical section, in which installation and configuration of sections of the IMS system including its "core", and application and medial server. For verification of the functionality of the system, two dissimilar clients are installed, and emulator WAN is applied for simulation of Internet. The product of the theses is the design of the laboratory exercise drafted in such a way that it can be solved by students less knowledgeable of the issues.
Detection of Honeypot Systems in Network
Teknős, Martin ; Drozd, Michal (referee) ; Barabas, Maroš (advisor)
This thesis is focusing on detection of honeypot systems in network. It presents different techniques for detection of honeypot systems and then focuses on three of them: TCP/IP fingerprinting, clock skew estimation and service exercising. A console application was created, to test these selected techniques. The thesis describes a design of the application, its implementation and also presents results of experiments with the application and selected techniques.
Comparison of Various Virtualisation Tools for MS Windows
Marek, Jan ; Rozman, Jaroslav (referee) ; Samek, Jan (advisor)
This thesis deals with comparison of virtualisation tools for MS Windows. It describes techniques of virtualization, forms of mesauring computer performance and also benchmarks used to mesauring performance. At the end of this thesis are interpreted results of benchmarks and final comparation tested tools.
Remote connection to virtualized operating system
Veselý, Marek ; Červenka, Vladimír (referee) ; Komosný, Dan (advisor)
The thesis is focused on the new IT trend – virtualization. Below are described the types of virtualization, as well as different implementations of it. In the following chapters there will be described the TCP and ICMP protocols, as well as the SSH services. The last part of this work is dedicated to measurements where there will be highlighted the advantages and disadvantages of virtualization.
Techniques of Virtualisation of Computing Platforms in Linux
Župka, Jiří ; Kumpošt, Marek (referee) ; Vojnar, Tomáš (advisor)
The thesis tests and compares various existing virtualization tools for virtualization of computing platforms and explains important conceptions of virtualization technology. It's main contribution is a performance,  efficiency, scalability and robustness comparison of virtualization tools. This comparison should help the Redhat company to make a decision whether they should leave XEN as a main virtualization tool in their distributions and move on to another newer and more user friendly virtualization tool like KVM.

National Repository of Grey Literature : 28 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.