National Repository of Grey Literature 17 records found  1 - 10next  jump to record: Search took 0.00 seconds. 
Advanced Editor of VHDL Files
Kliment, Vojtěch ; Košař, Vlastimil (referee) ; Novotňák, Jiří (advisor)
This bachelor's thesis deals with an evolution of an application, with which the designer of digital systems can insert and connect components of VHDL entity easier. You can find an introduction to the VHDL language here and the ways how to design digital systems with VHDL. The reasons of using synthesizable templates will be described. Next part is a description of a design and an implementation of an editor, which makes it easy to design by an graphic interface.
Implementation of Network Security Algorithms in Home Router
Procházka, Tomáš ; Novotňák, Jiří (referee) ; Košař, Vlastimil (advisor)
This bachelor thesis briefly describes minimalist linux distribution OpenWRT and its installation in Linksys WAG160Nv2 router. It describes a selected router and it discusses a measuring procedure of a throughput, wich was chosen as a criterion for an evaluating the performance of the router. Furthermore, it examined the performance of the router using the original system and running OpenWRT. Design and implementation of interception algorithms, whose main purpose is to capture network traffic on the router, are described in the subsequent parts. Results are presented in the final part.
Application for Demonstration of Hash Algorithms SHA-1 and SHA-2
Siska, Josef ; Petrlík, Jiří (referee) ; Novotňák, Jiří (advisor)
In this thesis, the theory related to the hash algorithms SHA-1 and SHA-2 is presented, along with a description of possible implementation of an application that demonstrates how these algorithms work. The first part of this thesis describes the principles of construction of hash functions, their use and history of selected hash functions. The two following chapters present conventions and algorithms of the SHA-1 and SHA-2. The next chapter describes the general concepts related to the attacks on the hash functions and selected attacks are presented in more detail. The last two chapters outline the design and implementation of an application that was created as part of this work. In the end the evaluation of results of this thesis and proposals for its possible continuation are presented.
Hash Algorithms in FPGA
Novotňák, Jiří ; Vašíček, Zdeněk (referee) ; Šimek, Václav (advisor)
This work is dealing with the implementation of MD5 hash algorithm in programmable FPGA circuit on FITkit education platform. Practical results of our effort primarily include two entities - one of them is responsible for a quick computation of MD5 algorithm while the other one handles the communication tasks between FITkit and host enviroment via RS232 link and SLIP-like protocol. The demonstration of the capabilities consists of a simple application, which transfers the given file to FITkit and displays the result of MD5 computation in the application window on PC. Brief evaluation and number of ideas for future improvements are given in the conclusion.
Network Multiplayer Card Game
Kotásek, Marek ; Novotňák, Jiří (referee) ; Pospíchal, Petr (advisor)
The aim of this bachelor's thesis is design, implementation and testing of network multiplayer card game. Card game was chosen to be very popular poker variant -Texas Hold'em. First, necessary theoretical basis for creating network applications together with card game principles is described. Second part of this work goes into details of implementation and testing of developed application. The conclusion presents possible future enhancements of the program and further aim of development.
Network Attacks Detection Using Statistical Models with Netflow Data
Čegan, Jakub ; Košař, Vlastimil (referee) ; Novotňák, Jiří (advisor)
This diploma thesis describes several selected network attacks detection method using statistical models with NetFlow data. First are described several well known and threats for computer networks, which are easily detectable in the NetFlow data. Thesis also introduce and present the NetFlow technology including its protocol and architecture. The theoretical part of the thesis describes statistical methods with focus on the ASTUTE method, that can be used for an anomaly detection. Following part introduces tools used for method implementation as the NfSen plugins. Last parts of the thesis describe in detail implementation of the plugins and following plugins testing which included simulated network attacks.
Annotation of Network Traffic
Holakovský, Jan ; Novotňák, Jiří (referee) ; Žádník, Martin (advisor)
This thesis focuses on methods for network traffic classification. Furthermore the thesis analyzes the advantages and limitations of theese approaches. This work coveres development of a new tool for manual network traffic inspection and classification which uses a combination of selected classification approaches. At the end of this thesis results of conducted experiments are presented and some possible future improvements are proposed.
Implementation of Network Security Algorithms in Home Router
Procházka, Tomáš ; Novotňák, Jiří (referee) ; Košař, Vlastimil (advisor)
This bachelor thesis briefly describes minimalist linux distribution OpenWRT and its installation in Linksys WAG160Nv2 router. It describes a selected router and it discusses a measuring procedure of a throughput, wich was chosen as a criterion for an evaluating the performance of the router. Furthermore, it examined the performance of the router using the original system and running OpenWRT. Design and implementation of interception algorithms, whose main purpose is to capture network traffic on the router, are described in the subsequent parts. Results are presented in the final part.

National Repository of Grey Literature : 17 records found   1 - 10next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.