• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 5
  • 1
  • 1
  • Tagged with
  • 7
  • 7
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Rozbor protokolů CISCO sítí / Protocols Analysis of CISCO Networks

Karlík, Martin January 2016 (has links)
ABSTRACT Bc.Karlík, Martin Department of Telecommunications, Faculty of Electrical Engineering and Communication, Brno University of Technology. Analysis of CISCO networking protocols This semestral thesis is focused on CISCO networks and protocols like MPLS, BGP, Ipv4, Ipv6, Multicast – sprase / dense mode. The task was study of those protocols and design and implement lab excercise with one of those protocols by using free network simulator GNS3. In this excercise is used CISCO router 3745.
2

Procesní jednotka pro analýzu a editaci síťového provozu v FPGA / Processing Unit for Analysis and Modification of Network Traffic

Pazdera, Jan Unknown Date (has links)
This paper deals with the design and implementation of the Processing Unit for Analysis and Modification of Network Traffic. The proposed unit is intended to analyse an incoming network traffic and perform packet header editations to provide the proper packet delivery. The designed architecture has the following characteristics. It is based on the stream processor concept which allows to process independent stream elements (i.e. packets) in parallel. Multiply stream clients can be used to process the same stream data concurrently. The stream clients can be driven either autonomously or by program. The packets are processed according to the incoming metadata and transmited to the output. The Processing Unit has been implemented in VHDL language. The target technology is Field Programmable Gate Array (FPGA).
3

Struktury budoucích směrovacích tabulek pro IPv6 / Future Structure of IPv6 Routing Tables

Kšica, Martin January 2010 (has links)
This thesis is focused on structure of future IPv6 routing tables. It contains basic information about IPv6 addresses , description of hierarchy address allocation, multihoming , strategy of IPv4/IPv6 address allocation, statistics of structure properties at routing tables and forecast of future space for address IPv6 protocol. Other part of this thesis is implementation of IPv6 address generator which generates addresses according given configuration. This thesis simultaneously includes investigation of strategy IPv6 address allocation at region of RIPE NCC organization.
4

Laboratorní úlohy v prostředí NS3 pro předmět Pokročilé komunikační techniky / Laboratory exercises in NS3 enviroment for Advanced communication technology course

Vadkerti, Gabriel January 2015 (has links)
This master thesis deals with creating laboratory exercises for students in simulator NS-3, where the IPv4 and IPv6 protocols, unicast and multicast transmission types, quality of services in wireless networks, furthermore protocols TCP and UDP are analyzed. The first section describes the NS-3 network simulator, the Eclipse development environment and the method how to connect them. In the next section protocols IPv4 and IPv6 are presented, the structure of the headers and the technique of fragmentation are described in detail. Based on this a laboratory exercise is created which deals with comparison of protocols IPv4 and IPv6. In the next section the types of transmissions are described, furthermore the multicast transmission type is explained more in detail. In the next practical section the second laboratory exercise is created, which deals with comparison of unicast and multicast transmission types. The subject of the following section is ensuring quality of services in data networks, the EDCA access method is discussed more in detail. In the next section the EDCA access method is implemented in a simulation as a laboratory exercise, in which the impact of the access category of EDCA to different transmission parameters is investigated. The next section deals with protocols TCP and UDP, furthermore with the structure of their headers. In the last section a laboratory exercise is created, in which the properties of the protocols TCP and UDP are compared.
5

Säkerhetsgranskning av DMZ-kraven för CGI:s Digital Portal

Nikitin, Evgenii, Fernström, Cornelis January 2024 (has links)
Internet är idag en enorm samling av information och möjligheter, där webbservrar bland annat finns placerade för att tillgängliggöra olika webbtjänster. Inom detta arbete har vi i samband med det internationella IT-företaget CGI utfört en analys på säkerhetsaspekter kring webbtjänsten Digital Portal (en självbetjäningsportal) som CGI byggde för att erbjuda tjänster till sina kunder. Denna analys fokuserar framför allt på den DMZ som portalen utnyttjar, vilket innebär säkerhetskrav, brister och risker hos uppställningen och till sist olika bekämpningsmetoder och åtgärder för dessa brister och risker. Vi utforskade frågor angående hur kraven uppfylls, vilka brister och åtgärder som finns i uppställningen. Eftersom CGI:s DMZ huvudsakligen bygger på IPv4 har vi i denna rapport även analyserat styrkor och svagheter för rent IPv6-baserade DMZ-uppställningar.  Inom detta arbete har vi studerat litteratur som behandlar säkerheten hos DMZ. Vi har analyserat de krav CGI ställer på sin egen DMZ för en självbetjäningsportal, där vi med det som referens utforskat risker och brister hos DMZ-uppställningar. Med hjälp av intervjuer av personal hos CGI har vi även fått direkt tillgång till tankar och detaljer som inte visar sig i dokumentationen, där vi kan få ett direkt intryck till motivationen vid utvecklingen av denna DMZ. Med denna metod har vi kunnat visa att alla de utforskade kraven uppfylls. Utöver detta har vi identifierat potentiella risker angående fildelning där endast filändelsen granskas vid färd till DMZ, samt filskanning som endast sker vid anländande till server. Vi har även kommit fram till att SSO kan ha bristfälligt skydd mot phishing- och DoS-attacker.
6

Návrh nových laboratorních úloh pro prostředí GNS3 / Design of new laboratory exercises for GNS3 environment

Barniak, Martin January 2015 (has links)
Diploma thesis deals with four laboratory tasks in simulation environment GNS3. Designed tasks are primarily focused on comparison of IPv4 and IPv6 protocols. In the first task the subject is concerned about OSPFv2 and OSPFv3 routing protocols. Next themes are transit techniques like NAT-PT and tunneling like GRE and 6to4. The second task is focused on configuration of routing protocols like EIGRP and EIGRPv6. Next sections are concerned about DHCP and ICMP protocols within IPv4 and IPv6 protocol suits. The third task is primarily focused on security relations of protocol suite IPv6. It contains OSPFv3 authentication, access lists and Cisco stateful IOS firewall. Content of the fourth task is protocol MPLS. First part of this task is concerned about basic configuration of this protocol and second part is focused on MPLS within IPv6 environment. All tasks contain test questions and individual part task.
7

Návrh laboratorních úloh v simulačním prostředí NS3 / Creation of laboratory exercises in the NS3 enviroment

Štefančík, Matej January 2015 (has links)
Diploma thesis provides an introduction to the ns-3 network simulator. It describes the basic abstactions and components of the instrument. This work further discusses the theory, which was applied during simulation creation. The concept of unicast, the issue of IP addressing and routing in networks are specificaly analyzed. The practical part is focused on the creation of four laboratory tasks within the scope of Advanced Communication Techniques. The first task is dedicated to the the issue of static unicast routing in the network. It clarifies the impact of metrics on the process of routing. The following task compares the different types of ICMPv4 and ICMPv6 messages. The third task discusses additional functions of the ICMPv6. Specifically, it focuses on five different types of ICMPv6 messages defined by NDP (Neighbor Discovery Protocol) and their role in the network traffic. The last task focuses on ensuring the quality of services (QoS) in wireless networks, by setting priorities and thereby dividing the traffic into different classes. Attention is focused on parameters such as throughput, delay and jitter.

Page generated in 0.2947 seconds