National Repository of Grey Literature 142 records found  beginprevious123 - 132next  jump to record: Search took 0.00 seconds. 
System for Remote Monitoring of Electrical Values
Kvasnička, Pavel ; Kněžík, Jan (referee) ; Drahanský, Martin (advisor)
The work deals with the measurement of electrical quantities, distribution of data across the Ethernet network into the Internet and intelligent selection of the required values to be transmitted and stored on a central node. The work describes the communication protocols in scale that is necessary for implementation, discussed the requirements for computational resources and microcontroller control is proposed by flowcharts. Attached are source codes in C programming language for microcontroller and PHP scripts for storing and presenting data on Web server.
Interception of Modern Encrypted Protocols
Marček, Ján ; Korček, Pavol (referee) ; Kajan, Michal (advisor)
This thesis deals with the introduction to the security mechanism.The procedure explains the basic concepts, principles of cryptography and security of modern protocols and basic principles that are used for information transmission network. The work also describes the most common types of attacks targeting the eavesdropping of communication. The result is a design of the eavesdropping and the implementation of an attack on the secure communication of the SSL protocol..The attacker uses a false certificate and attacks based on poisoning the ARP and DNS tables for this purpose. The thesis discusses the principles of the SSL protocol and methodology of attacks on the ARP and DNS tables.
Network Game: Destroy the Submarine
Kovačič, Dušan ; Herout, Adam (referee) ; Szőke, Igor (advisor)
The goal of this bachelor's thesis Network game: Destroy the submarine is to analyze and implement network architecture and solve all the problems connected with it. In final version, the created program uses client-server network architecture. Both subjects are communicating with complex network protocol. For effective data the virtual connection over UDP protocol is established. Minor part of this study solves graphical problems and received data displaying. For this purpose, there are different frequenc ies used for data handlings and techniques that provide better game experience.
Automatic Transport Protocol Detection in Captured Communication
Lazárek, Zbyněk ; Kmeť, Martin (referee) ; Pluskal, Jan (advisor)
The aim of this bachelor thesis is to create a library in C#, which will be able to automatically detect transport protocols in a captured network traffic. This library can recognize a transport protocol in tunnel traffic without the knowledge of tunneling protocol. The~thesis describes the unique signatures of TCP / IP protocols on which the automatic detection is based. Furthermore, it is described how the detection works. The conclusion is~subjected to automatic detection tests, which are designed to review its performance and efficiency.
Network applications in .NET Framework
Koch, Michal ; Morský, Ondřej (referee) ; Lattenberg, Ivo (advisor)
The thesis deals with the programming of network applications using .NET Framework. C# is a programming language. The thesis consists of four parts. The first part is devoted to web services, their characteristics, practical publications and web service client which is the the most common case of use of this service. The second part deals with client-client communication. As an example a simple messages sending is shown here on which are explained the principles how to create this type of application and what classes are available. The third part deals with the communication clientserver. An server application is created to connect multiple clients and send their requirements and server response them. The last part is devoted to encrypted communication. The model client-client is extended to asymmetric encryption. The thesis contains also tutorial videos which show a simple ASP.NET application development and its connection to the web service or ASP.NET application that supports HTTPS protocol and the necessary IIS configuration.
Security analysis of network protocols
Bednařík, Jan ; Sobotka, Jiří (referee) ; Hajný, Jan (advisor)
The aim of my bachalor’s thesis is security of net protocols analysis. Because of the huge number of net protocols, I’ve decided to choose only a few of them to describe. My task is to describe the TCP/IP model structure in term of security, so I have chosen to devide my thesis into two separate parts. The first part contains describtions of particular TCP/IP layers and adumbration of possibilities of securing. The second part contains more accurate describtions of some chosen protocols, mostly the case of their security. At the close of my work it is my task to describe some utilities and methods which can be used to accomplish an successful attack on chosen net protocols. I have chosen protocols HTTP, FTP and SSL. As the utilities I have chosen programs Wireshark, Brutus and SSLSTRIP.
Temperature measurement with data transfer via WLAN
Müller, David ; Číž, Radim (referee) ; Lattenberg, Ivo (advisor)
This diploma thesis deals with the design of temperature sensor and display units, which communicate via a WLAN network. The theoretical part provides an overview of various methods of temperature measurement including several specific types of temperature sensors, and also introduces the WLAN standard as well as TCP and UDP protocols. The design solution is focuses first on the system architecture and design of the communication protocol, followed by the implementation of both types of equipment, starting with selection of components, through design diagrams and printed circuit board patterns, up to production and commissioning. The following parts of this thesis deal with the design of programs for the controlling microcontroller units of both units and the configuration application for PC.
Data-flow Control on Transport Layer
Pánek, Michal ; Komosný, Dan (referee) ; Koton, Jaroslav (advisor)
In order to easily send data between two end elements without congestion, methods that suitably control flow of date and evaluate possible overload state are necessary. One such method is to control the data flow directly on the transport layer. This layer offers a range of mechanisms dedicated to deal with this issue. The aim of this paper is divided into three parts. The first part describes the integration of transport layer TCP/IP model, and the ability to process TCP data stream. The second part describes methods to manage congestion, their integration by usage environment. It mainly focuses on methods of TCP Reno and TCP Vegas. Their simulation and analysis on transmission the data stream stream. The third part deals with the analysis in detail of TCP Vegas. Analyzes possible parameters for alpha a beta within the TCP Vegas, and a combination of TCP Vegas and TCP Reno.
Laboratory exercises in NS3 enviroment for Advanced communication technology course
Vadkerti, Gabriel ; Mašek, Pavel (referee) ; Langhammer, Lukáš (advisor)
This master thesis deals with creating laboratory exercises for students in simulator NS-3, where the IPv4 and IPv6 protocols, unicast and multicast transmission types, quality of services in wireless networks, furthermore protocols TCP and UDP are analyzed. The first section describes the NS-3 network simulator, the Eclipse development environment and the method how to connect them. In the next section protocols IPv4 and IPv6 are presented, the structure of the headers and the technique of fragmentation are described in detail. Based on this a laboratory exercise is created which deals with comparison of protocols IPv4 and IPv6. In the next section the types of transmissions are described, furthermore the multicast transmission type is explained more in detail. In the next practical section the second laboratory exercise is created, which deals with comparison of unicast and multicast transmission types. The subject of the following section is ensuring quality of services in data networks, the EDCA access method is discussed more in detail. In the next section the EDCA access method is implemented in a simulation as a laboratory exercise, in which the impact of the access category of EDCA to different transmission parameters is investigated. The next section deals with protocols TCP and UDP, furthermore with the structure of their headers. In the last section a laboratory exercise is created, in which the properties of the protocols TCP and UDP are compared.
Collection of laboratory works for demonstration of computer attacks
Plašil, Matouš ; Ležák, Petr (referee) ; Burda, Karel (advisor)
Diploma thesis describes published attacks on computers and computer networks. Principles of footprinting such as availability check, OS detection, port scanning were described. Next part explains attacks on confidentiality, integrity and availability. In the practical part were created four laboratory tasks and a virtual environment which allowed testing of ARP spoofing, DNS spoofing, SSL strip, Cross-site scripting, SQL injection, flooding attacks (TCP, ICMP, UDP), TCP reset and attack on operating system using backdoor with Metasploit framework. In practical part were also created video samples with attacks and documentation for teachers.

National Repository of Grey Literature : 142 records found   beginprevious123 - 132next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.