National Repository of Grey Literature 24 records found  previous5 - 14next  jump to record: Search took 0.00 seconds. 
Quality of services support in the end applications
Zelinka, Jiří ; Novotný, Vít (referee) ; Hošek, Jiří (advisor)
The topic of this diploma thesis has been chosen for a discussion and implementation of quality of service on the application and link layer of the OSI model. At the beginning of this thesis the general parameters and basic technologies of the OSI model network layer has been explained. This part was chosen as a resource for explanation of the basic parameters in the quality of services. Basic part is followed by the introduction to the Ethernet technology, which became as a ground for the real model in this diploma thesis. As a part of this section has been written a block which contains a analysis of quality of services in the Ethernet, which means the implementation of IEEE 802.1Q/p. This analysis is followed by structured descrition of the controlling and functionality of quality of services parameters on the link layer with the system tool in the Windows XP, description of Win XP link layer drivers and its modification with system tool tcmon. The end of the theoretical part is represented by introduction to the implementation of quality of service in the wireless networks especially the 802.11e standard. At the beginning of the practical part is specified the description of the topology design which is dedicated to the quality of services implementation. This section is developed to well-founded analysis of applications which were used during topology creating. The last segment of this thesis is dedicated to evolving the practical informations which were obtained during the measurement.
Design of methodology for vulnerability assesment
Pecl, David ; Martinásek, Zdeněk (referee) ; Gerlich, Tomáš (advisor)
The thesis deals with the assessment of security vulnerabilities. The aim of this work is to create a new method of vulnerability assessment, which will better prioritize critical vulnerabilities and reflect parameters that are not used in currently used methods. Firstly, it describes the common methods used to assess vulnerabilities and the parameters used in each method. The first described method is the Common Vulnerability Scoring System for which are described all three types of scores. The second analysed method is OWASP Risk Rating Methodology. The second part is devoted to the design of the own method, which aims to assess vulnerabilities that it is easier to identify those with high priority. The method is based on three groups of parameters. The first group describes the technical assessment of the vulnerability, the second is based on the requirements to ensure the confidentiality, integrity and availability of the asset and the third group of parameters evaluates the implemented security measures. All three groups of parameters are important for prioritization. Parameters describing the vulnerability are divided into permanent and up-to-date, where the most important up-to-date parameter are Threat Intelligence and easy of exploitation. The parameters of the impact on confidentiality, integrity and availability are linked to the priority of the asset, and to the evaluation of security measures, which increase the protection of confidentiality, integrity and availability. The priority of the asset and the quality of the countermeasures are assessed based on questionnaires, which are submitted to the owners of the examined assets as part of the vulnerability assessment. In the third part of the thesis, the method is compared with the currently widely used the Common Vulnerability Scoring System. The strengths of the proposed method are shown in several examples. The effectiveness of prioritization is based primarily on the priority of the asset and the security measures in place. The method was practically tested in a laboratory environment, where vulnerabilities were made on several different assets. These vulnerabilities were assessed using the proposed method, the priority of the asset and the quality of the measures were considered, and everything was included in the priority of vulnerability. This testing confirmed that the method more effectively prioritizes vulnerabilities that are easily exploitable, recently exploited by an attacker, and found on assets with minimal protection and higher priority.
Design of Switch Used in Modern Communication Networks
Mojžiš, Ľubomír ; Novotný, Bohumil (referee) ; Škorpil, Vladislav (advisor)
This diploma thesis deals with switching components of modern communication networks. A switch architecture focused on the quality of service is described in this paper and there are two switch models designed and simulated in the simulating program MATLAB-SIMULINK. The first model is based on classic switching and the other one is controlled by neural network. A laboratory exercise suitable for communication networks education is created in this paper on the basis of designed models.
Testing of QoS support in experimental data network
Fogl, Miroslav ; Škorpil, Vladislav (referee) ; Novotný, Vít (advisor)
This work deals with the qualitative requirements on services in IP networks based on technology Ethernet. We describe basic methods for imposing quality control mechanisms on services within networks. We elaborate on the ways, in which packets can be handled, overload controlled and transfer speed in network elements limited. Attention is given also to the Network Layer and Link Layer. Based on concrete specifications of network devices in UTKO laboratory an experimental network was designed and constructed. Network consisting of routers and switches linked several servers with client stations. Various types of data transfers (VoIP, HTTP, FTP, video) were generated. Several techniques for handling packets with different priorities were verified and compared. We observed that, in situations when connections are under full load, implementation of QoS support in the network becomes very important. This observation was confirmed by measurements. We also measured the parameters of the system during simulations of various situations, such as overload of a connection due to unsolicited operations or failure of a connection between routers. In order to guarantee the quality of services it is necessary to create a domain, in which rules are consistently observed in all network elements.
Time management podle typologie osobnosti
Váša, Jan
The aim of the diploma thesis is to find out whether there is a dependence between personality typology and work with time management. For this purpose, quantitative and qualitative research is used. Research questions and hypotheses are established in the work, based on data from a questionnaire survey, according to which addiction is confirmed or refuted. Based on the results, time management methods are proposed for individual MBTI personality typologies.
European Union information policy at the time of the Bangemann's activities in comparison with USA
Mikanová, Helena ; Vlasák, Rudolf (advisor) ; Očko, Petr (referee)
(in English) The thesis "Information Policy of European Union in Bangemann's activities period in comparison with USA" is devoted to the Information policy issue applied by the European Union and the United States of America. The thesis structure is defined at the earliest; afterwards the basic terms are followed. The thesis describes the European Union history, which provides context needed to be able to understand the European Union Information policy. The description and evaluation of the European Information policy in Bangemann's activities period in comparison with USA in the same time period and the possibility of mutual utilization of pros of the Information policy of both countries is the aim of this thesis. The following part is occupied with the comparison of EU and USA Information policy at the beginning of 21st century.
Design of methodology for vulnerability assesment
Pecl, David ; Martinásek, Zdeněk (referee) ; Gerlich, Tomáš (advisor)
The thesis deals with the assessment of security vulnerabilities. The aim of this work is to create a new method of vulnerability assessment, which will better prioritize critical vulnerabilities and reflect parameters that are not used in currently used methods. Firstly, it describes the common methods used to assess vulnerabilities and the parameters used in each method. The first described method is the Common Vulnerability Scoring System for which are described all three types of scores. The second analysed method is OWASP Risk Rating Methodology. The second part is devoted to the design of the own method, which aims to assess vulnerabilities that it is easier to identify those with high priority. The method is based on three groups of parameters. The first group describes the technical assessment of the vulnerability, the second is based on the requirements to ensure the confidentiality, integrity and availability of the asset and the third group of parameters evaluates the implemented security measures. All three groups of parameters are important for prioritization. Parameters describing the vulnerability are divided into permanent and up-to-date, where the most important up-to-date parameter are Threat Intelligence and easy of exploitation. The parameters of the impact on confidentiality, integrity and availability are linked to the priority of the asset, and to the evaluation of security measures, which increase the protection of confidentiality, integrity and availability. The priority of the asset and the quality of the countermeasures are assessed based on questionnaires, which are submitted to the owners of the examined assets as part of the vulnerability assessment. In the third part of the thesis, the method is compared with the currently widely used the Common Vulnerability Scoring System. The strengths of the proposed method are shown in several examples. The effectiveness of prioritization is based primarily on the priority of the asset and the security measures in place. The method was practically tested in a laboratory environment, where vulnerabilities were made on several different assets. These vulnerabilities were assessed using the proposed method, the priority of the asset and the quality of the measures were considered, and everything was included in the priority of vulnerability. This testing confirmed that the method more effectively prioritizes vulnerabilities that are easily exploitable, recently exploited by an attacker, and found on assets with minimal protection and higher priority.
Suggestions on Improvement of the Corporate Culture iof the Company HILTI CZECH REPUBLIC corporation
Cirková, Jana ; Radil, Jan (referee) ; Pokorný, Jiří (advisor)
This Diploma Thesis analyses an important part of the corporate culture in HILTI Czech Republic, particularly working and private life area balance. It contains improvement suggestions in time management sphere, so the employees work more effective and not only stand the test without detriment to family life and leisure time activities in the hard reality of nowadays, but also being successful.
Time Management as one of the managerial competencies
Nováková, Jana ; Vrzáček, Petr (advisor) ; Rabiňáková, Dana (referee)
This diploma thesis deals with the topic of time management as one of the managerial competencies needed to successfully perform managerial work. The diploma thesis shows a theoretical point of this theme, its application in practice and empirici research. The main aim of diploma thesis is to show to managers the possibilities of such self- assessment may be carried out in the field of time management, discover their strengths and weaknesses in this area and find potential opportunities for development. To develop the empirical part of diploma thesis I chose technique of management shadowing, method of 360degree feedback and Competency Based Interview. Into the research I have included three manager women of non-profit and profit organizations. The research resulted serious and less serious individual shortcomings in the theme of in time management. The most serious shortcomings may include reluctance to delegate tasks, which is due to a lack of confidence in the ability of colleagues and subordinates managers, and inability to reject the request due to a sense of guilt against the applicant. The empirical part revealed to the manageress their weakest point in time management and the potential development in this area. Manageress also tried the techniques that can diagnose their current level of...
European Union information policy at the time of the Bangemann's activities in comparison with USA
Mikanová, Helena ; Vlasák, Rudolf (advisor) ; Očko, Petr (referee)
(in English) The thesis "Information Policy of European Union in Bangemann's activities period in comparison with USA" is devoted to the Information policy issue applied by the European Union and the United States of America. The thesis structure is defined at the earliest; afterwards the basic terms are followed. The thesis describes the European Union history, which provides context needed to be able to understand the European Union Information policy. The description and evaluation of the European Information policy in Bangemann's activities period in comparison with USA in the same time period and the possibility of mutual utilization of pros of the Information policy of both countries is the aim of this thesis. The following part is occupied with the comparison of EU and USA Information policy at the beginning of 21st century.

National Repository of Grey Literature : 24 records found   previous5 - 14next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.