National Repository of Grey Literature 151 records found  beginprevious142 - 151  jump to record: Search took 0.00 seconds. 
Analysis of distributed control protocols for indistrial applications
Horych, Vladimír ; Zezula, Radek (referee) ; Koutný, Martin (advisor)
This master's thesis deals with distributed control protocols for industrial applications. It explains term distributed control system, control protocol and it is dealing with properties, frame structures and ways of communication within CAN, Modbus, IEC60870-5-101 and DLMS protocols. This thesis includes informations, which are in most cases difficult to find. Second part of the thesis is dedicated to education system. This part is contained by information about protocols and their layers based on ISO/OSI model, pictures of structure of messages, knowledge test and an application based on JavaScript language. This JavaScript application emulates behavior of workstations, which are using communication based on IEC 60870-5-101 protocol. This application can set various conditions for influence of message transfer. These conditions are setting way of message transfer, data availability, filling of workstation’s buffer or intentional damage of message's content. It also contains a large amount of context help, activated after moving mouse cursor over most of application's elements. Even visitor without great knowledge of distributed control systems should understand how this protocol works, thanks to these context help and messages printed in lower part of the application. The conclusion of this work is aimed to positive and negative features and comparison of mentioned control protocols.
Realization and implemention of RDS message management software
Heralt, Jiří ; Zezula, Radek (referee) ; Koutný, Martin (advisor)
The purpose of this work was realization and implementation of two applications for the management of Radio Data System (RDS) messages. These applications will be subsequently used in the Czech Radio Ostrava to support two RDS services, namely the Traffic - Announcement Identification and Radiotext. Both applications are secured against unauthorized use by incompetent users through a password - protected access, access rights and encryption of passwords in initialization files. The text of this work is divided into three parts. The first describes the system RDS and services provided by it and implementation of RDS in the Czech Radio Ostrava. The second part deals with the realization of both applications and the last part describes the implementation itself. The work shows all applications windows. Work also includes all the flow charts. The list of all broken down by subroutines is given in the appendix.
Graph theory - implementation of selected problems
Stráník, František ; Rajmic, Pavel (referee) ; Koutný, Martin (advisor)
This work is intended on identification with basic problems from the graphs theory area. There are the basic conceptions as well more complicated problems described. The one part of this work is specialized in working of individual types of graphs. It starts with single linked list through double linked list after as much as trees which represented the simplest graphs textures. The other part of this work devotes to the whole graph and describes more complicated problems and their resolution from the theory graphs area. Among these problems belongs to searching in graphs help by Depth First Search and Breadth First Search methods. Then searching the shortest way help by the specific algorithms as are: Dijkstra´s algorithm, Floyd-Warshall´s algorithm and Bellman-Ford´s algorithm. The last part is devoted to problems with searching minimal frames of graphs with usage Kruskal´s algorithm, Jarnik´s algorithm and Boruvka´s algorithm methods.
Implementation of network protocol into network simulator 2 environment
Janiga, Robin ; Mlýnek, Petr (referee) ; Koutný, Martin (advisor)
This thesis describes a protocol for the multiple data collection system and his implementation into Network Simulator 2 environment. The system defines two communication units. CU central unit and measuring unit MU. The units operate according to the rules defined by communication protocol. The content of this work is as follows. At the beginning is described the simulation tool, namely a system NS-2 and a tool for visualization of simulation results, the NAM. This is followed by a description of the proposed protocol, his principle of functions, units description and communication messages. The method of communication between units. Mainly was described the multicast and the types of multicast ASM and SSM. Additionally, was described the principle of unicast communication. This is followed by chapter describing methods of enlargement simulator. Adding an own protocol and support of multicast communication SSM. Adding a new protocol is represented by programming a new agent, a new application and a new protocol header definition. In this chapter are also described the necessary changes in the source files that are need to the recompilation. The main objective of this thesis is own implementation of the proposed protocol. In the programming language C++ were created two agents who represent a central and a measuring unit. These agents were compiled into a simulator and by using a simple script have been tested for functionality. The simulation script define MU 200 and one unit CU. Conclusion of work is devoted to simulation the load line between the central unit and "access" node. It was examined whether the use the method of cumulative acknowledgement saves the transmission capacity of line compared to normal method acknowledgement.
The controlling of peripherals by the web interface of 8-bit microprpcessor system
Majerčík, Miloš ; Lattenberg, Ivo (referee) ; Koutný, Martin (advisor)
This diploma thesis deals with description and subsequent implementation of web interface and control device for selected periphery devices through the use of processor module RabbitCore RCM3700 which is based on microprocessor Rabbit 3000. The importance of web interface based control is currently raised because of higher customers’ claims. Interactivity of these devices contains wide range of services, from simple event communication by text messages to complex driving systems for home which create the base of intelligent house. The customer can choose either the complete and more expensive solution or self-created one. There are two possible ways of creation. The first way is through the use of personal computer. The second one, more complex but also more effective, is by single-chip microprocessor. In this thesis the second one way is used. The module with processor with build-in web interface was used. Description and the way of control are given for this module and also for selected periphery devices, the LCD and digital temperature sensors. At the end the hardware and software part of control device is designed on the basis of gained information. The thesis contains also its brief description.
Monitoring of GSM network
Trávníček, Tomáš ; Krajsa, Ondřej (referee) ; Koutný, Martin (advisor)
This master’s thesis is focused on problems of monitoring GSM network using a mobile phone. Problems are analyzed on a theoretic basis with a description of available network parameters. Then the thesis offers a description of existing application environments providing a user with given data about the network. The main part of this work describes a development of application compiling queue data from mobile network and GPS, and creates output data illustrating signal strength in selected areas. The work also includes extensive measuring in select areas together with an evaluation of the processed data.
Security of wireless computer networks IEEE 802.11
Škodák, Jaroslav ; Jeřábek, Jan (referee) ; Koutný, Martin (advisor)
This work describes available and used standards, protocols and mechanisms used to secure IEEE 802.11 wireless networks. In the next section are listed vulnerabilities and possible attacks against different types of security. The principles of individual attacks on authentication, WEP security and WPA/WPA2 personal mode are described and realized using various software especially linux program aircrack-ng. Password for WEP security is obtained by passive eavesdropping data, using ARP replay injection and by creating own frames. The last two methods are used to generate traffic on the network, which is captured and then used to derive the WEP password. By injecting ARP frames, password was found in the number 60 000 captured frames and about 180 000 frames of data was needed for passive method. Decryption of WEP frame was done by fragment and KoreK chopchop attacks. This decrypted frame could be used to create fake frames and obtain WEP password. Brute force attack is realized for security WPA (WPA2) personal mode (often due to lack of strong password) by comparing password (passphrase) from password list. Speed of comparing is about 200 passwords/s.
Implementation of certification authority and digital signature
Troják, Martin ; Koutný, Martin (referee) ; Lambertová, Petra (advisor)
This master´s thesis deals with problems of certification authorities and digital signature. There are analyzed principles of digital certificates and certification authorities. It describes the the most widely used cryptosystems and hash functions, which are used in communications with certificates and digital signature. Analysis is focused on Public key infrastructure standard, which describes rules of creating of certification authority and digital signature. There is also described detailed principle of digital signature. Next chapters deals with studying of protocol SSL, principles of functions and usage of SSL. Practical part of this thesis realizes certification authority and information system. There is shown used software and configuration of it. Last part describes procedures during using aplication and her realization.
Implementation of modular web based application
Suchý, Petr ; Koutný, Martin (referee) ; Pelka, Tomáš (advisor)
Diploma thesis Implementation of modular web based application deals with web modular systems. The aim of web modular system is to allow creating universal web presentation without necessity of creation new systems. Diploma thesis is devided into couple parts. Advantages of modular solution of web systems are highlighted in the first part and after that is analyzed the current situation of this problem. In the next part is designed own web modular system above all its kernel, modules and data model. In the final part is described own implementation of own designed system. The most stress is layed on security of the system. In the conclusion is summed up own solution and its most advantages.
Secure peer-to-peer communication system
Eliáš, Luboš ; Koutný, Martin (referee) ; Cvrk, Lubomír (advisor)
The main aim of this master's thesis is to implement a common, secure and peer-to-peer communication system. The system has ability to automatically establish and run a secure end-to-end connection. It has this ability even if a network address translator is in the way to the destination system, without need of any explicit configuration of this translator. The security procedures of this system are in a transparent manner masked from individual applications, which had to solve this challenge in their own way. A responsibility for a security is delegate to an application-independent subsystem working within the core of an operating system. The security of this subsystem is based on capturing the outbound and inbound IP packets and their authentication and encryption. The system was successfully implemented in MS Windows XP operating system, in programming language C++. Transfer rate of communication tunnel in different network bandwidth speeds was measured. Result shows, that in the case of use the system on standard PC sold nowadays is practically no decrease of the transfer rate in comparison to a common channel.

National Repository of Grey Literature : 151 records found   beginprevious142 - 151  jump to record:
See also: similar author names
2 Koutný, Marek
6 Koutný, Michal
4 Koutný, Miroslav
Interested in being notified about new results for this query?
Subscribe to the RSS feed.