National Repository of Grey Literature 49 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
A guide to designing optimal method of backup for big volumes of data
Bartoňová, Veronika ; Vychodil, Petr (referee) ; Burda, Karel (advisor)
This diploma thesis deals with backup for big volumes of data. Data backup is a overlooked area of information technology and the data can be lost by trivial user error or breakdown on any components. In this thesis is discussed theory of backup - archive bit and his behavior based on various type of backup (full, incremental, differential or combination thereof), duration and frequency of backups or the point of ultimate recovery. In addition there are mentioned rotation schemes Round-Robin, GFS and Tower of Hanoi, where are described their principles and graphic diagram of rotation. In chapter Strategy of backup describes the backup strategy via choosing the right choice, taking into technical and economic parameters. Impact analysis, which is explained also in this chapter, describes the important moments in data recovery. For select the optimal strategy is necessary to consider not only the whole capacity of the backup data, but also the size of the backup window for data storage or storage location. In chapter Media storage you can acquainted with all backup media and their technical parameters that are available on the market and can be used for data backup. In section Guide methodology of large volumes of data backup is designed a backup plan with the necessary inputs for the actual implementation of the backup. The design methodology puts emphasis on regular backups and check their location. On practical demonstration is shown that the rotation scheme Tower of Hanoi are among the smallest need for backup media. A part of this thesis is also design of methodology for backup small amounts of data.
QoS assurance in wireless networks
Dvořák, Filip ; Vychodil, Petr (referee) ; Vymazal, Michal (advisor)
The bachelor´s work deals with wireless network WiFi and describes basic standards and their supplements. This work is divided into two parts - theoretical and practical. The first part of the work is applied to theoretic description of the best known standards IEEE 802.11 and detailed description of standard 802.11e. The second part of the work takes an interest in proposal and influence of service Wireless Multimedia in wireless network both in real world and in simulation program Opnet Modeler. Obtained results of the measurement are described and summarized in the conclusion.
Telecommunication Education Environment and its Optimal Usage
Al Salman, Ahmed Nasser M ; Vychodil, Petr (referee) ; Škorpil, Vladislav (advisor)
Students in introductory communication theory classes can benefit from a well-planned laboratory component. Such that TIMS lap equipments which can handle a wide variety of experiments ranging from analog baseband to pass-band digital communications. These papers describe three advanced laboratory tasks with their optimized manuals designed by Al Salman Ahmed at Brno University of technology. Two are based on the simulation software TutorTIMS to implement Eye patterns, Signal Constellations, and the third is based on the Biskit hardware to implement Quadrature phase shift keying (QPSK).
Design of CISCO network analysis by VePAL TX300 Analyzer
Ťápal, Tomáš ; Vychodil, Petr (referee) ; Škorpil, Vladislav (advisor)
This bachelor´s work consists of describing the network Cisco, possibilities of network analysis with analyzer VePAL TX300 and Sunset MTT, creation of manual for the analyzer VePAL TX300 and draft three laboratory exercises. The first exercise analyzes transmission parameters of the network Cisco. The second exercise compares parameters of two different types of routers. The third exercise analysis VoIP and IPTV services, especially qualitative parameters.
Wireless networks security analysis
Szőcs, Juraj ; Vychodil, Petr (referee) ; Vymazal, Michal (advisor)
This master’s thesis deals with analysis of security in wireless networks. There are desc- ribed various methods of security systems, such as WEP, TKIP and CCMP. There is also realization of attacks against the wireless network and there is analysis of security weaknesses. Then there are discussed possible defense mechanisms. Part of this work was also analysis of local security in certain areas and evaluation of their security.
Effective utilization of converged network
Nesveda, Marek ; Vychodil, Petr (referee) ; Škorpil, Vladislav (advisor)
The Master´s thesis deals with the field of converged networks and their effective utilization, focusing specifically on telematic networks. For modelling of a specific application, the field of vehicle telematics has been chosen. The thesis consists of two series of simulations performed in Opnet Modeler network simulator. The first theoretic part gave an overview of protocols used in converged networks, with a more detailed description of routing protocols. The attention also centred on the mechanisms for assuring the quality of service in IP. The subsequent practical part consisted in creating the simulation of a converged telematic network in Opnet Modeler network simulator, configuration of scenarios for assuring QoS using RSVP and DSCP protocols and the simulation itself. The results of the simulations for both scenarios were compared and represented in graphic form. The second theoretic part described queueing disciplines, as well as congestion control and congestion avoidance mechanisms. The corresponding practical part compared FIFO, PQ and WFQ queueing algorithms within the same simulated converged telematic network, using DSCP protocol scenario, which gave much better results in the first series of simulations. Again, the results of the simulations were compared and represented in graphic form.
Wireless networks security and possible attacks on these networks
Vlček, Peter ; Vymazal, Michal (referee) ; Vychodil, Petr (advisor)
The first of the main objectives of this work was to examine and study the different types of attacks on wireless networks. This work is focused on the most commonly occurring types of attacks such as WEP/WPA/WPA2 cracking, a Man in the Middle attack (MIM), Dictionary attacks, MAC spoofing and finally Denial of Service attacks. Description of individual attacks is also accompanied by detailed instructions on how to carry out these attacks on the Windows platform. It is described how to detect various attacks and identified. It is then implemented software that is able to identify possible risk of selected types of attacks. This software belongs to a group of wireless intrusion prevention system (WIDS). It focuses on attacks WEP/WPA/WPA2 type of cracking, Dictionary attacks and MAC spoofing. For the implementation of defense against attack by a Man in the Middle (MIM) and Denial of Service attack would need special monitoring equipment.
Potential application of neural networks in network elements
Babnič, Patrik ; Vymazal, Michal (referee) ; Vychodil, Petr (advisor)
The goal was to get acquainted with the problems of network elements to describe neural networks that can be used to manage such a feature. The theoretical part deals with the neural networks from their inception to the present. It focuses mainly on the network, witch can be used for management control. These are the two network: Hopfield network and Kohonen network. The practical part deals with the network element model and ist implementation. It contains a practical element model using a neural network, witch is controlled by a network element.
Wireless and mobile UMTS networks simulation using QoS
Zapletal, Lukáš ; Vychodil, Petr (referee) ; Vymazal, Michal (advisor)
Diplomová práce je psána v angličtině a věnuje se standardu IEEE 802.11e, obsahujícím podporu kvality služeb a taky pojednává o kvalitě služeb QoS (Quality of Service) v systému UMTS. Rozebrány jsou hlavní teoretické pilíře daných mechanizmů a praktická část se zabývá simulacemi síťových modelů. Standard 802.11e objasňuje propojení vrstev na fyzické úrovni a zmiňuje metody přístupu k přenosovému médiu DCF, PCF, HCF, EDCA, HCCA. Dále přístupové kategorie a také odlišnosti v MAC podvrstvě, je rozebrána problematika při přenosu prioritních dat na základě identifikátorů. Vzpomenuta je taky struktura formátu rámce a techniky s rozprostřeným spektrem. Časové limity pro doručení prioritních dat a požadavky kladené na tyto data je možné snadno srovnat v tabulkách. Problematika kvality služeb je velice komplexní záležitost, nicméně jsou rozebrány základní klíčové parametry jako koncové zpoždění, jitter, zahazování dat, propustnost, velikost front a hodnota MOS. Zmíněny jsou i mechanizmy integrovaných RSVP a diferencovaných služeb pro zajištění QoS. U systému třetí generace UMTS je objasněna architektura a společná kooperace se systémem GSM. Vzájemné propojení obou sítí je zřejmé z obrázků. Zvýšený zájem je věnován vrstvovému modelu a funkcím RRM pro zajištění QoS. Objasněny jsou různé druhy předávání hovorů, tzv. Handover Control a funkce Admission Control. Rozebrány jsou jednotlivé třídy provozu Conversational, Streaming, Interactive a Background. Praktická část se odehrává v simulačním prostředí programu OPNET Modeler. Byly vytvořeny dva modely s různými scénáři pro srovnání zajištění QoS. Model objasňující princip standardu IEEE 802.11e obsahuje dvě bezdrátové sítě s přístupovými body a stanicemi, na kterých jsou sledovány simulace s různým zatížením přenášených dat. Pro porovnání výsledků je zkoumán rozdíl při použití metody HCF v síti s podporou QoS. Model UMTS sítě obsahuje základnové stanice Node B s možností vysílání do tří sektorů. Mobilní účastník pohybující se po trajektorii představuje princip funkce Softer Handover. Konfrontace mezi scénáři je zastoupena kompresí záhlaví pomocí funkce PDCP a rozlišení Type of Service. Obzvláště je sledováno chování prioritních dat hlasu a videa u obou sítí. Naměřená data zastupují grafy a průběhy výsledních charakteristik. Analýza diskutuje odlišnosti u sítě bez podpory a s podporou kvality služeb. Rozdíly jsou porovnány a vyhodnoceny dle metodiky QoS. Součástí práce je i řešení problémů při návrhu UMTS sítě a podány jsou taky užitečné tipy a návrhy na jejich odstranění. Projekty v simulačním softwaru jsou popsány dle postupu vyhotovení, avšak hloubka podrobností je potlačena. Detaily nejsou rozebírány, protože se očekává pokročilá znalost mechanizmů a jistá dávka zkušeností s programem.
Nitrogen saturation of tissuesNitrogen saturation of tissues
Petrák, Tomáš ; Hasmanda, Martin (referee) ; Vychodil, Petr (advisor)
The goal of this semestral thesis was to create an Android application able to plan a dive with a breathing apparatus. In the calculations air is used as the breathing mixture. The aplication is able to draw the dive graph and display the decompression tables.

National Repository of Grey Literature : 49 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.