National Repository of Grey Literature 56 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Art creation as an inevitable necessity
Hrubý, Adam - Kristian ; Sedlák, Michal (advisor) ; Vartecká, Anna (referee)
The diploma thesis deals with the question of understanding an individual's creative work as an existential inevitability. It asks questions about the definition of an unavoidable need and examines where such need to create comes from in case of the author of the work, as well as presenting examples of personalities from the world of visual arts and history. The work also investigates the question of the inevitability of creating in connection with teaching practice, based on personal experience, it asks whether art education can be based on a didactic project based on improvisation, on unexpected events and changes, and the need for children to be creative in their free time.
QoS in UMTS
Kavan, Radovan ; Hanus, Stanislav (referee) ; Kejík, Petr (advisor)
This thesis treats of QoS (Quality of Service) in UMTS system. The term quality of service is frequently used, recently, however not only in computer networks, but also more and more in mobile networks also. Present system of 2nd generation (2G) GSM enables only limited exploitation of QoS function. System UMTS is a system of 3rd generation (3G) already and contains quality of service in greater measure which is ensured with number of algorithms and functions. Individual QoS functions enable effective utilization of radio interface, support maintenance of planned coverage and offer high spectral efficiency. Functions that cater to quality of service are called RRM functions (Radio Resource Management). There exist five basic functions in UMTS system that are Admission control (AC), Power control (PC), Load control (LC), Handover control (HC) and Packet scheduler (PS). These functions are responsible for control of network access, control of power, control of network load, control of handover and packet (bit rate) scheduling. Last three functions are usually collectively designated as Congestion control, control of network overload. UMTS layer model, differentiation of services, traffic classes and 3GPP concept are also discussed. In thesis the attention is piad to Admission control algorithm – control of network access – in the uplink direction and to different ways of load (in the cell) modeling. Individual approaches are simulated in MATLAB. A possibility of using algorithm in the real system is discussed in conclusion.
Possibilities of QoS algorithms simulation and optimization
Charvát, Ondřej ; Číka, Petr (referee) ; Krajsa, Ondřej (advisor)
The bachelor's thesis deals with problematics of data transmission control in converged networks which is implemented there to offer telecommunication services in desired quality. Theoretical part of the thesis provides an overview of measurable parameters and lists factors by which they are affected. It discusses different levels of services offered and finally techniques used for it's provisioning as they are implemented in network appliances. In practical part a model of network with QoS implementation is constructed in simulation software Simulink. There are several traffic flows running in the simulated network which has different demands on transfer quality such as telephony or bulky file transfer. There is graphical user interface programmed in Matlab enviroment by which it is possible to alter QoS settings in the model and observe effect on achieved parameters of running data transfers. All simulation results are also displayed on the user interface. User may set all parameters manualy or let the software optimize settings according to prefered criterion, i.e. packet loss. In such way model demonstrates how changes in QoS configuratinon affects quality of services being transferred. The whole model is constructed in a way to be easily reconfigured in case of future use. It is possible for expample to add more traffic or to extend the model to larger network by using predefined blocks.
Switch optimization in converged network
Švec, Adam ; Sobek, Jiří (referee) ; Škorpil, Vladislav (advisor)
Switch Optimization in a Converged Network thesis discusses the role of the Ethernet switch in the network. It describes differences between the switch and the hub in the network and the impacts on the collision domain size. In the converged network, priority data switching according to their origin and thus the qualitative point of view is also addressed - e-mails, voice services and multimedia will each behave differently. A real element, switch L3 - a switch with services quality support - is mentioned. The tool Matlab - Simulink is briefly described and a functional simplified model of the ethernet switch was created. Furthermore, the topic was used as a theme for a laboratory task in the subject Services of Telecommunication Networks. A model for Simulink and an example of the laboratory protocol for the created task are attached to the thesis.
Experimental network for QoS support testing
Fogl, Miroslav ; Mácha, Tomáš (referee) ; Novotný, Vít (advisor)
The work specifies problems with support of qualitative requirements in IP network services on the network and link layer. There are also described options of qualitative support of individual networking components in the UTKO laboratory (routers, L3 switches). Created experimental network is loaded by various types of service (VoIP, FTP, HTTP, Video). Data services realization is ensured by available terminals (IP phones, IP cameras, IP video-phones, servers, client stations). Metering is targeted on the manipulation with packets in the router. Options which Cisco router offers are verified by packet analysis. Available methods of dropping are compared on the base of metering and evaluated. Optimal handling with output queue after metering in experimental network is LLQ mechanism. It is able to prefer packets according to their priority in the IP header. Further the difference of link overloading by huge dataflow after QoS policy using is simulated. To reach availability of data services in the whole network is necessary to deal with mechanisms for qualitative services support in all the network components in the network.
Quality of services support in the end applications
Zelinka, Jiří ; Novotný, Vít (referee) ; Hošek, Jiří (advisor)
The topic of this diploma thesis has been chosen for a discussion and implementation of quality of service on the application and link layer of the OSI model. At the beginning of this thesis the general parameters and basic technologies of the OSI model network layer has been explained. This part was chosen as a resource for explanation of the basic parameters in the quality of services. Basic part is followed by the introduction to the Ethernet technology, which became as a ground for the real model in this diploma thesis. As a part of this section has been written a block which contains a analysis of quality of services in the Ethernet, which means the implementation of IEEE 802.1Q/p. This analysis is followed by structured descrition of the controlling and functionality of quality of services parameters on the link layer with the system tool in the Windows XP, description of Win XP link layer drivers and its modification with system tool tcmon. The end of the theoretical part is represented by introduction to the implementation of quality of service in the wireless networks especially the 802.11e standard. At the beginning of the practical part is specified the description of the topology design which is dedicated to the quality of services implementation. This section is developed to well-founded analysis of applications which were used during topology creating. The last segment of this thesis is dedicated to evolving the practical informations which were obtained during the measurement.
Design of methodology for vulnerability assesment
Pecl, David ; Martinásek, Zdeněk (referee) ; Gerlich, Tomáš (advisor)
The thesis deals with the assessment of security vulnerabilities. The aim of this work is to create a new method of vulnerability assessment, which will better prioritize critical vulnerabilities and reflect parameters that are not used in currently used methods. Firstly, it describes the common methods used to assess vulnerabilities and the parameters used in each method. The first described method is the Common Vulnerability Scoring System for which are described all three types of scores. The second analysed method is OWASP Risk Rating Methodology. The second part is devoted to the design of the own method, which aims to assess vulnerabilities that it is easier to identify those with high priority. The method is based on three groups of parameters. The first group describes the technical assessment of the vulnerability, the second is based on the requirements to ensure the confidentiality, integrity and availability of the asset and the third group of parameters evaluates the implemented security measures. All three groups of parameters are important for prioritization. Parameters describing the vulnerability are divided into permanent and up-to-date, where the most important up-to-date parameter are Threat Intelligence and easy of exploitation. The parameters of the impact on confidentiality, integrity and availability are linked to the priority of the asset, and to the evaluation of security measures, which increase the protection of confidentiality, integrity and availability. The priority of the asset and the quality of the countermeasures are assessed based on questionnaires, which are submitted to the owners of the examined assets as part of the vulnerability assessment. In the third part of the thesis, the method is compared with the currently widely used the Common Vulnerability Scoring System. The strengths of the proposed method are shown in several examples. The effectiveness of prioritization is based primarily on the priority of the asset and the security measures in place. The method was practically tested in a laboratory environment, where vulnerabilities were made on several different assets. These vulnerabilities were assessed using the proposed method, the priority of the asset and the quality of the measures were considered, and everything was included in the priority of vulnerability. This testing confirmed that the method more effectively prioritizes vulnerabilities that are easily exploitable, recently exploited by an attacker, and found on assets with minimal protection and higher priority.
Design of Switch Used in Modern Communication Networks
Mojžiš, Ľubomír ; Novotný, Bohumil (referee) ; Škorpil, Vladislav (advisor)
This diploma thesis deals with switching components of modern communication networks. A switch architecture focused on the quality of service is described in this paper and there are two switch models designed and simulated in the simulating program MATLAB-SIMULINK. The first model is based on classic switching and the other one is controlled by neural network. A laboratory exercise suitable for communication networks education is created in this paper on the basis of designed models.
Testing of QoS support in experimental data network
Fogl, Miroslav ; Škorpil, Vladislav (referee) ; Novotný, Vít (advisor)
This work deals with the qualitative requirements on services in IP networks based on technology Ethernet. We describe basic methods for imposing quality control mechanisms on services within networks. We elaborate on the ways, in which packets can be handled, overload controlled and transfer speed in network elements limited. Attention is given also to the Network Layer and Link Layer. Based on concrete specifications of network devices in UTKO laboratory an experimental network was designed and constructed. Network consisting of routers and switches linked several servers with client stations. Various types of data transfers (VoIP, HTTP, FTP, video) were generated. Several techniques for handling packets with different priorities were verified and compared. We observed that, in situations when connections are under full load, implementation of QoS support in the network becomes very important. This observation was confirmed by measurements. We also measured the parameters of the system during simulations of various situations, such as overload of a connection due to unsolicited operations or failure of a connection between routers. In order to guarantee the quality of services it is necessary to create a domain, in which rules are consistently observed in all network elements.
Time management podle typologie osobnosti
Váša, Jan
The aim of the diploma thesis is to find out whether there is a dependence between personality typology and work with time management. For this purpose, quantitative and qualitative research is used. Research questions and hypotheses are established in the work, based on data from a questionnaire survey, according to which addiction is confirmed or refuted. Based on the results, time management methods are proposed for individual MBTI personality typologies.

National Repository of Grey Literature : 56 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.