1 |
Optimalizace síťových úloh / Network Tasks OptimalizationDražil, Jan January 2016 (has links)
Nowdays, when we are running out of public IPv4 addresses, we rely on techniques that at least postpone their complete exhaustion. One of these techniques is a network address translation (NAT). Internet providers require the highest possible bandwidth from devices that perform this task. This thesis compares NAT DPDK, built on top of DPDK framework, with freely available alternatives. This work also extends NAT DPDK with Application-Level Gateway support.
|
2 |
The IPTN's Airborne Data Relay System (ADReS): A System Concept and the Phase One System ConfigurationSoelaiman, Adi Dharma, Roesma, Fauzi Effendy 10 1900 (has links)
International Telemetering Conference Proceedings / October 17-20, 1988 / Riviera Hotel, Las Vegas, Nevada / By making use of NC212-200 commuter aircraft as an airborne container, the ADReS, a short for airborne data relay system, had been configured and tested in an experimental status during the year of 1987. A kind of test on EMC, EMI, RFI and telemetry data link were applied to the system. Prior to the IPTN's flight test program in the year of 1988 - 1992, the ADReS is designed not only to receive and to relay the data, but also planed to be able to process the data for quick data analysis purposes on board. This paper describes the ADReS system concept and its experimental status system - the Phase One system configuration.
|
3 |
Testování vysokorychlostního nástroje pro překlad IP adres / Testing of high-speed tool for network address translationVrána, Roman January 2016 (has links)
This master thesis presents a topic of testing network address translation. It describes basic principles of network address translation and general methods for testing network devices. These methods are then applied on NAT devices. Thesis then introduces a design of a framework for performing functional tests. The designed framework is then implemented as a part of the thesis and used to test a newly developed high-speed NAT application.
|
4 |
Struktury budoucích směrovacích tabulek pro IPv6 / Future Structure of IPv6 Routing TablesKšica, Martin January 2010 (has links)
This thesis is focused on structure of future IPv6 routing tables. It contains basic information about IPv6 addresses , description of hierarchy address allocation, multihoming , strategy of IPv4/IPv6 address allocation, statistics of structure properties at routing tables and forecast of future space for address IPv6 protocol. Other part of this thesis is implementation of IPv6 address generator which generates addresses according given configuration. This thesis simultaneously includes investigation of strategy IPv6 address allocation at region of RIPE NCC organization.
|
5 |
Routing policies and real paths in the Internet / Routing policies and real paths in the InternetHlaváček, Tomáš January 2016 (has links)
Routing policies are now represented by RPSL and by its evolutionary extension called RPSLng. These languages can be used for describing unique routing policy of each autonomous system. Experience shows that even though there are translation tools from RPSL and RPSLng to configuration formats of commonly used routers, the actual network configuration is rarely generated from RPSL sources and routing policy is then perceived as marginal paperwork, which often does not reflect the real network settings. There will be most likely a need for RPSL format change in order to remedy the discrepancies. To support this I present long-term measurements of inaccuracies in routing policies compared to real paths in the Internet. I also present a list of the most frequent problems, and I offer suggestions, how to reform RPSL to improve situation in the long term. Powered by TCPDF (www.tcpdf.org)
|
6 |
Routing policies and real paths in the Internet / Routing policies and real paths in the InternetHlaváček, Tomáš January 2016 (has links)
Routing policies are now represented by RPSL and by its evolutionary extension called RPSLng. These languages can be used for describing unique routing policy of each autonomous system. Experience shows that even though there are translation tools from RPSL and RPSLng to configuration formats of commonly used routers, the actual network configuration is rarely generated from RPSL sources and routing policy is then perceived as marginal paperwork, which often does not reflect the real network settings. There will be most likely a need for RPSL format change in order to remedy the discrepancies. To support this I present long-term measurements of inaccuracies in routing policies compared to real paths in the Internet. I also present a list of the most frequent problems, and I offer suggestions, how to reform RPSL to improve situation in the long term. Powered by TCPDF (www.tcpdf.org)
|
7 |
Návrh testeru paměti RAM ve VHDL / RAM-Tester Design in VHDLCharvát, Jiří Unknown Date (has links)
This paper describes various approaches to hardware testing semiconductor memory. We describe the priciple of basic memory types, the way which each of them stores information and their comunication protocol. Following part deals with common failures which may occur in the memory. The section also describes the implementation of memory model and tester designed in VHDL language. It is possible to inject some errors into memory, which are later detected by the tester. The final section shows the response of tester to various error types according to used error detection method. The paper is especially focused on failure detection by variants of march test.
|
8 |
Zákonné odposlechy: detekce identity / Lawful Interception: Identity DetectionPolčák, Libor January 2017 (has links)
Komunikace předávaná skrze Internet zahrnuje komunikaci mezi pachateli těžké trestné činnosti. Státní zástupci schvalují cílené zákonné odposlechy zaměřené na podezřelé z páchání trestné činnosti. Zákonné odposlechy se v počítačových sítích potýkají s mnoha překážkami. Identifikátory obsažené v každém paketu jsou koncovým stanicím přidělovány po omezenou dobu, nebo si je koncové stanice dokonce samy generují a automaticky mění. Tato dizertační práce se zabývá identifikačními metodami v počítačových sítích se zaměřením na metody kompatibilní se zákonnými odposlechy. Zkoumané metody musejí okamžitě detekovat použití nového identifikátoru spadajícího pod některý z odposlechů. Systém pro zákonné odposlechy následně nastaví sondy pro odposlech komunikace. Tato práce se převážně zabývá dvěma zdroji identifikačních informací: sledováním mechanismu pro objevování sousedů a detekcí identity počítače na základě přesností měření času jednotlivých počítačů. V rámci dizertačního výzkumu vznikly grafy identit, které umožňují spojování identit s ohledem na znění povolení k odposlechu. Výsledky výzkumu je možné aplikovat v rámci zákonných odposlechů, síťové forenzní analýzy i ve vysokoúrovňových programově řízených sítích.
|
9 |
Aktuální stav rozvoje českého e-governmentu / Current state of development of Czech eGovernmentHoleček, Vít January 2014 (has links)
This thesis deals with the implementation of basic registers of public administration in the Czech environment. The aim of the work is to analyze the current development project of the government and the causes of its origin within the overall context of the development of eGovernment in the Czech Republic. The thesis also includes a historical excursus into the issue of data records that are currently part of the system of basic registers. The last chapters of this work contain a brief analysis of local eGovernment concepts and basic public records data (inhabitans, businesses and local data) in the Slovak Republic and the United Kingdom of Great Britain and Northern Ireland.
|
Page generated in 0.0274 seconds