National Repository of Grey Literature 143 records found  beginprevious21 - 30nextend  jump to record: Search took 0.01 seconds. 
Automated Testing of OS Linux Protocol Stack Behaviour During Congestion
Tomašov, Adrián ; Grégr, Matěj (referee) ; Lichtner, Ondrej (advisor)
Táto práca sa zaoberá štúdiom a simuláciou zahltenej siete v laboratorných podmienkach a následne automatizovaným testovaním protokolového zásobníka v operačnom systéme Linux na tejto sieti. Na základe sady experimentov zistíme, aký dopad na správanie protokolového zasobníku má zahltenie siete. Následne bude popísaný spôsob simulácie a emulácie takejto siete fyzickým zariadením. Výstupom tejto práce budú rôzne konfigurácie strojov a emulátorov pre zahltenie siete, a k ním priložená sada meraní s vyhodnotením výsledkov. Tieto konfigurácie budú použité v automatizovanom testovaní jadra operačného systému Linux, aby sa chyby vo vývoji a pri implementácii sieťových protokolov a ovládačov pre sieťové karty našli rýchlejšie.
FITKit Virtualization
Vavruša, Marek ; Korček, Pavol (referee) ; Vašíček, Zdeněk (advisor)
Thesis presents a method of FITkit hardware platform virtualization. First part describes an extension of the libkitclient library to support virtual devices and discusses a protocol design for FITkit device sharing in the IP networks. The protocol is extended to offer an automatic device discovery in local network based on UDP multicast. The second part of the thesis presents an architecture for a remote compilation of FITkit platform binaries and the implementation in the fcmake and QDevKit. The last chapter summarizes implemented tools and presents possible future extensions.
Laboratory Demonstrator for LPWA Technologies Enabling the Communication via the Lightweight M2M (LWM2M) Protocol
Dvořák, Radim ; Štůsek, Martin (referee) ; Mašek, Pavel (advisor)
As the number of wireless devices rises, so does the demand for reliable data transmission. To ensure the reliability of data transfers with such devices, suitable wireless technology, and a suitable transmission protocol have to be chosen according to the device capabilities and requirements. This thesis describes LPWA (Low-Power Wide-Area) technologies currently available on the market, both on licensed spectrum and non-licensed spectrum, focusing on licensed spectrum technologies (Narrowband Internet of Things, LTE-M) and also commonly used M2M enabled protocols for IoT devices. Furthermore, it compares those protocols from the communication parameters and data traffic perspectives with focus on overheads that further increase the amount of data transmitted but are necessary to ensure reliable data transmission. Lastly, it focuses on LWM2M protocol describing it to the detail and describes an LWM2M C++ library created as part of this thesis. In addition, a laboratory demonstrator was created utilizing this library.
Application of simulation model of access network
Szymeczek, Andrzej ; Sládok, Ondřej (referee) ; Grenar, David (advisor)
The topic of the diploma thesis is " Application of simulation model of access network". The aim of the thesis was to create a part of the access network in which were tested simulations for TCP and UDP traffic. The theoretical part of the thesis deals with general information about the GNS3 program and the possibilities which this program allows. The next part of the thesis describes the Mikrotik RouterOS program, which was used in the topology. The next section describes the types of routing in IP networks, as well as the types of packet delivery. The practical part deals with the creation of test topologies and verification of the performance of the simulation tool. Furthermore, the practical part deals with the programming of a network generator for TCP and UDP traffic in the network. The generator was created by using a Bash script and a combination of the dd and nc commands. At the end, the thesis describes the results of simulations in terms of transmission speed, network throughput, packet size distribution and in the case of TCP also bidirectional delay – RTT.
Streaming of 3D Geometry over Network
Rozehnal, Jaroslav ; Beran, Vítězslav (referee) ; Přibyl, Jaroslav (advisor)
This thesis is oriented on problematics of streaming 3D geometrics over network. Main importance is seen in efectivity of streaming, for what there is presented special protocol, working over protocol UDP, and adaptation of Level of Detail. For visualization of transmitted geometry trivial graphical engine is developed. In the end there are presented results of tests, oriented on protocol's efectivness.
CIP industrial protocol simulation
Molent, Michal ; Musil, Petr (referee) ; Blažek, Petr (advisor)
The thesis is about industrial automatic CIP protocol, which belongs to SCADA systems. The first part is focused on basic principles of CIP protocol and on analysis of two protocols (EtherNET/IP and DeviceNet), which are based on CIP protocol. The second part deals with designing scenarios for a simulation. The simulation of one-way communication, two-way communication with help of reads from the console and two-way real time communication between Raspberries PI 3B+. The third part deals with a realization of the simulation, a start-up and a function of predefined scenarios and graphic interface. The fourth part deals with analysis network communication in situations, which occur during a protocol EtherNet/IP simulation.
CAN sniffer
Skalický, Jakub ; Jílek, Tomáš (referee) ; Burian, František (advisor)
This bachelor thesis deals with creating CAN Bus sniffer witch sending data to PC by Ethernet. The main parts of developed PCB are microcontroller SMT32F407VGT6 by STMicroelectronics and Ethernet PHY KSZ8051MLL. In theoretical part you can find ARM and STM32F407VGTE information followed by Ethernet and UDP protocol introduction. The end of theoretical part is about CAN bus. Practical part is about design of board, developing it and measuring parameters of board. The end part of this thesis describes changes of software. Firstly there are described changes of firmware for add support of CanShark board. Followed is described adding of new functionality of canshark-gui PC application.
Serial Data concentrator in VHDL
Řeháček, Tomáš ; Valach, Soběslav (referee) ; Burian, František (advisor)
In the bachelor’s thesis text there are summarized basics of VHDL language, ISE Webpack development environment is described. Also the way of communication and properties of serial unit are described as well as Ethernet standard properties and the way of communication via MII interface. Hardware used for the data concentrator design is briefly introduced in the next part. At the end of the thesis there is analysis of the data concentrator design for data transmission from serial unit to Ethernet using protocols UDP/IP.
Measuring of data communication parameters in computer networks
Šeda, Pavel ; Hošek, Jiří (referee) ; Skořepa, Michal (advisor)
Master‘s thesis is focused on basic characteristics of data transmissions in computer networks. In forepart I digestedly described basic characteristics computer networks, metods of their measurement and valuation. Computer networks type LAN as well as wireless computer networks Wifi, are mentioned. In second part I realized my own proposition of basic characteristics measurement. This proposition is used for SW applications development. Main goal of these applications is measurement of packet delay, packet jitter, paket loss and available bandwidth. I described details of SW applications and realized measurement of real computer networks in the end.
Security of VoIP protocols
Novotný, František ; Číka, Petr (referee) ; Krajsa, Ondřej (advisor)
This bachelor dissertation deals with the VoIP (Voice over Internet Protocol) safety. The most used transport and signal protocols employing this technology are presented first. Two extended protocols, SIP (Session Initiation Protocol) and IAX (Inter-Asterisk eXchange Protocol), as well as open source Asterisk, which is closely connected with these protocols, are shown in detail. After that, methods, attacks and threats able to assure secure transfer in the use of VoIP among users are described. Afterwards the practical part of this essay, divided into two parts, is presented. In the first part, a passive attack in the form of tapping is demonstrated, and in the second, active attacks are described which take the form of forced cancellations and forwarded calls between two communicating users. With both attacks, safety measures that could effectively prevent against their potential attacking are proposed. In the closing part, the VoIP safety is evaluated for securing a quality connection between users communicating through it.

National Repository of Grey Literature : 143 records found   beginprevious21 - 30nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.