National Repository of Grey Literature 55 records found  beginprevious36 - 45next  jump to record: Search took 0.01 seconds. 
Application for Adaptible Packet Decoding in Wireless Networks
Piska, Vojtěch ; Botta, Miroslav (referee) ; Šimek, Milan (advisor)
In this semestral thesis are described basic technics for developing web applications. Thesis contains structure of application for packet decoding. There is detailed description of function each parts. Some draft for improvments of application in bachelor thesis are also included.
Analysis of Sharing Networks
Blažek, Libor ; Mašek, Pavel (referee) ; Horváth, Tomáš (advisor)
The aim of the thesis is the design and implementation of the protocol in OPNET Modeler. In this work will be developed all the elements have been used no default settings. In the first chapters, making simulation are defined packets. Another chapter consists of a block diagram of workstations, which are assigned to function blocks. The central process is created by the process model, also for the router. The individual elements are inserted into a variety of elements and subsequently used in the simulation. Connection is a new service that has been defined separately. One of the simulations will be created on a smaller scale and the other on a global scale with more features.
Cluster analysis of data traffic
Nagyová, Simona ; Martinásek, Zdeněk (referee) ; Blažek, Petr (advisor)
This thesis is meant to present the methods of cluster analysis, their use for detecting network traffic anomalies. It deals with various types of cyber attacks particularly DoS (DDoS) attacks. It contains a list of well-known DoS attacks. Also includes a program in Python, using the k-means method for detection of anomalous traffic.
Graphical Tool for Packet Generation
Mareš, Martin ; Bartoš, Václav (referee) ; Puš, Viktor (advisor)
This bachelor's thesis is about network packet generators. The first part is devoted to communication theory in computer networks from the perspective of TCP/IP architecture. The second part describes the results of search for currently available tools. The third part is devoted to design and implementation of own tool with graphical user interface for packets generation. The tool is designed object-oriented with an emphasis on ease of future expansion. The application concept includes also tools for generating dynamically changing series of packets to simulate network flows. The designed tool is implemented using the programming language C++ and the Qt framework. The last part contains an evaluation of results and comparison with the already available solutions.
Identifying P2P Users Using Traffic Analysis
Jalsovszky, Zoltán ; Tobola, Jiří (referee) ; Žádník, Martin (advisor)
Bachelor's thesis deals with methods of detection of P2P users like BitTorrent, DC++, Gnutella and others. An application was created, which is able to detect these users using multiple ways. This method combines analysis of packet payload and analysis of network traffic and flows, so more exact detection is possible. Application is written in C++ programming language, and is built on open-source tool L7-filter.
User Oriented QoS System
Plchot, Oldřich ; Matoušek, Petr (referee) ; Kašpárek, Tomáš (advisor)
This master's thesis deals with the possibilities how to guarantee the quality of service in the area of computer networks using a GNU/Linux operating system. This work compares and evaluates tools which are necessary to guarantee the quality of service. The goal of this work is to discuss the advantages and disadvantages of these tools and to design a system which handles the problem of quality of service. Designed system uses a heuristics, which allows the user to set up the quality of service system without studying specific properties of communication protocols on the network or application layer. This work also includes a theoretical introduction into the quality of service and computer networks.
Probability-based model for network traffic
Bednár, Peter ; Jelínek, Mojmír (referee) ; Molnár, Karol (advisor)
This work identifies several basic types of traffic in IP networks and describes main features. The basic network services such as HTTP, VoIP and electronic mail are discussed focusing mainly on HTTP and VoIP probability-based models for network traffic which are applied to the software simulation of real network.
Design and realization of client application for cooperation with ONET Modeler
Polak, Martin ; Jelínek, Mojmír (referee) ; Molnár, Karol (advisor)
The bachelor thesis „Design and realization of client application for cooperation with OPNET Modeler“ is about trying to bring a client to easier and better communication with the server. Open new opportunities for effective work in the network. Goal of this work is to interconnect two communication stations, which will together communivate. OPNET communicates with an external program which redirects the data to the network layer. The work describes the individual steps in creating a model client. Part of the work is introduction to the OPNET Modeler simulation environment, whereupon it is tied together a detailed desciption of programming of an external application.
Network element project by means of neural network
Pokorný, Petr ; Krček, Petr (referee) ; Šťastný, Jiří (advisor)
The diploma thesis deal with a priority network switch whose model was made in programming environment Matlab - Simulink. Problem of optimal switching is solved by Hopfield’s artificial neural network. Produce of the diploma thesis is a model of packet switch and time-severity comparison of optimalization problem solved with or without artificial neural network. The thesis was developed in research project MSM 0021630529 Intelligent Systems in Automation.
Security protocols in practice
Milfajt, Jiří ; Koutný, Martin (referee) ; Pelka, Tomáš (advisor)
This bachelor's thesis maps the most used AAA protocols in these days. These protocols include RADIUS, TACACS+, DIAMETER and KERBEROS. The first part considers its main signs. Then there is describes basic communication between user and server. The thesis also compares each protocol by its advantages, disadvantages and its possible security weaknesses. The second part is dedicated to configuration of RADIUS and KERBEROS protocol.

National Repository of Grey Literature : 55 records found   beginprevious36 - 45next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.