National Repository of Grey Literature 406 records found  beginprevious375 - 384nextend  jump to record: Search took 0.01 seconds. 
High availability Microsoft Sql Server
Pyszko, Pavel ; Lattenberg, Ivo (referee) ; Zeman, Václav (advisor)
The thesis contains a complete theoretical overview of high availability technologies in Microsoft SQL Server. For each technology, guidance is provided for the deployment of technologies. Technologies are analyzed from a security perspective, they are determined advantages and disadvantages of using technology in practice and is determined the optimal variant of use of the technology. High availability technology are compared with each other and is given the availability of individual technologies in versions of MS SQL Server. The thesis contains three scenarios with practical examples of using technology for high availability in practice. It provides an analysis of high-availability features in Oracle and are subsequently compared high availability features in Oracle environments with high availability technology in MS SQL Server.
Crosstalk analysis and modelling
Novotný, František ; Mišurec, Jiří (referee) ; Zeman, Václav (advisor)
The thesis concerns the problem of interference modelling for xDSL technologies and Ethernet. The introduction describes the origin of crosstalk, that arise during the operation of the systems and the physical properties of the lines, therefore, the next section describes the properties of the primary and secondary parameters of the homogenous line and their modelling. In order to achieve higher data rates on the metallic line, systems with larger frequency spectrum are applied, resulting in a greater attenuation of the line. This issue and the characteristics determination of the transmission systems are subjects of the mathematical models, which are divided according to the modelling of primary or secondary parameters. The main goal of this work is to describe the effects which influence the performance of data transfer via xDSL and Ethernet technology focusing on internal and external disturbances acting on the cable lines. This is the crosstalk at the near and far end, adaptive white noise, radio frequency interference RFI and impulse noise. Following part of the thesis deals with the properties of xDSL technologies, specifically ADSL2+ and VDSL2 and Ethernet. Another aim is to design applications which enable to test the performance of xDSL and Ethernet transmission systems with its own award simulations interference. The conclusion describes the design and implementation of laboratory experiments for measuring of the efficiency and spectral properties of xDSL. The proposed laboratory protocols are annexed to this thesis, including the measured waveforms.
Performance and security testing of network applications
Matej, Michal ; Martinásek, Zdeněk (referee) ; Zeman, Václav (advisor)
The aim of this Master's thesis is to design and to implement the security test in considering a resistance of the device under test to the effects of the distributed denial of service attack DDoS SYN Flood. After processing the test results is developed a protocol about security test of the device under test. In this thesis are tested two devices, namely CISCO ASA5510 firewall and a server with the specified name Server. The theoretical part of the thesis discusses the primary types of network attacks such as reconnaissance, gain access and denial of service attacks. Explained the concept of DoS and its principle, further types of DoS attacks and distributed denial of service attacks DDoS.
Queueing theory utilization in packet network design and optimization process
Rýzner, Zdeněk ; Zeman, Václav (referee) ; Novotný, Vít (advisor)
This master's thesis deals with queueing theory and its application in designing node models in packet-switched network. There are described general principles of designing queueing theory models and its mathematical background. Further simulator of packet delay in network was created. This application implements two described models - M/M/1 and M/G/1. Application can be used for simulating network nodes and obtaining basic network characteristics like packet delay or packet loss. Next, lab exercise was created, in that exercise students familiarize themselves with basic concepts of queueing theory and examine both analytical and simulation approach to solving queueing systems.
Control of electronic systems via web interface
Dufek, Ladislav ; Šilhavý, Pavel (referee) ; Zeman, Václav (advisor)
This master thesis goes into problematics of design of an electronic device control system and its realization. First of all its overall conception is specified and potential hardware platforms are analyzed afterwards. Based on this analysis the system’s final conception is drawn up, the device’s circuit layout is created and finally a functional prototype is manufactured. The later part of this thesis describes the software accessories and tools. The principles of a chosen operating system, management application and webbased interface are described along with the problems of authentization to solve. The proposed solutions for the authentization-specific tasks gave rise to the final implementation of the authentization methods and techniques.
Model of computer network in MATLAB/SIMULINK environment
Zedníček, Petr ; Zeman, Václav (referee) ; Kolka, Zdeněk (advisor)
The bachelor thesis deals with simulation of TCP protocol behaviour in Wireless optical environment. The thesis examines the various parameters of the protocol and evaluates their response to the transmission speed. The key objectives of the thesis are the introduction to the problems of communication, specially the description of the transport layer architecture, TCP / IP and congestion management mechanism NewReno. A large part of the thesis is devoted to modelling communication points and a model of optical wireless connections. The results will be applicable to create a new communication protocol for Wireless optical environment.
Methods of measuring bit rates
Franc, Jan ; Mišurec, Jiří (referee) ; Zeman, Václav (advisor)
Study and basic benchmarking methodology description of network connections based on the IP was the objective of bachelor work. I resulted above all from RFC standards, by which are directed most of Internet protocols. Particular procedures for testing are explained in RFC 2544. On the basis of parameters analysis, I suggested conception and gave shape to web application which allows identify referenced basic transfer parameters of Internet connection (downstream, upstream, latency, scattering of connection speed). Application doesn’t require no add-ons and modules on user side. It is built on server programming language PHP with usage of relational MySQL database, in which are stored data. Client scripting language JavaScript is also used. Application offers measuring of mentioned parameters both to visitors and to registered users. Matter of course is user registration; work with history of carried out measuring, sending private messages between registered users. Above whole application exists administrator account.
Cryptographic modules for network protection
Tenora, Lukáš ; Pust, Radim (referee) ; Zeman, Václav (advisor)
This work deals with virtual private network (VPN) and authentication. The first section gives the modern cryptographic methods, the work of dealing with problems of authentication and authentication of objects and the issue of VPN. The second part describes the implementation of its own secure network-based technology company SafeNet.
Digital signature
Vaverka, Aleš ; Lambertová, Petra (referee) ; Zeman, Václav (advisor)
Digital signature, the subject of this semester paper, is nowadays very up-to-date. The still rising capabilities of the internet and the vision of lowering the amounts of paper documentation made it necessary to develop a way of signing documents which are transferred through the internet. This is supposed to be equally safe and unassailable as the handwritten signature. This method is called the digital signature. The paper focuses on the explanation of the essential terms connected to digital signature, such as certificate, certification authority, authentication, but in particular on the elementary cryption algorithms, further on applications that make use of digital signature, e.g. post services and electronic banking. In the final chapter, the positive and negative aspects of the electronic signature are discussed.
NiCd, NiMH and Li-ion accumulator charger supplied and controlled via USB
Nosek, Petr ; Mišurec, Jiří (referee) ; Zeman, Václav (advisor)
Deals with analysis and battery charging NiCd, NiMH, Li-Ion through a series of microcontroller from Atmel AVR controlled and powered from a PC via USB. Part is devoted to the characteristics of the USB interface and software capabilities to the enumeration AVR microcontroller. It also contains the basic characteristics of charged batteries, including the known methods of charging. The second half of the tehesis then provides a complete design and implementation of battery chargers, which consists of electronic parts, ATMEGA168 microcontroller program and the program for the PC. Presents circuit diagram of the charger and flowcharts of the main features of the program. The result of this thesis is functional battery charger above types. Attachments include a proposal DPS, a full circuit diagram and the charge and discharge characteristics of cells. The thesis is also referred to annex to the optical disk. Here it is mainly programs for microcontroller and PC. They are listed here as well as individual projects for AVR Studio, Borland Builder C + + and Eagle, which was created by chargers.

National Repository of Grey Literature : 406 records found   beginprevious375 - 384nextend  jump to record:
See also: similar author names
5 ZEMAN, Vít
1 Zeman, Vladimír
1 Zeman, Vlastimil
8 Zeman, Vojtěch
5 Zeman, Vít
Interested in being notified about new results for this query?
Subscribe to the RSS feed.