National Repository of Grey Literature 269 records found  previous11 - 20nextend  jump to record: Search took 0.01 seconds. 
CACHE Memory Design for Network Applications
Soľanka, Lukáš ; Martínek, Tomáš (referee) ; Kořenek, Jan (advisor)
This thesis deals with design and implementation of generic cache memory for a wide range of network applications. Firstly, aspects with influence on performance are discussed. Then architecture is proposed and implemented with respect to the given technology. The main selectable parameters of  the design are: data path width, line size, associativity, number of lines  and replacement policy. Cache is also pipelined and therefore is able to process one request for reading or writing every clock cycle. The resulting component has been thoroughly simulated to verify its functionality and finally, its operation has also been tested in hardware on the Combo6X  board.
User and Device Metadata Collection from the Darkweb
Gula, Ján ; Matoušek, Petr (referee) ; Veselý, Vladimír (advisor)
This bachelor's thesis solves the problem of anonymization on the Internet, that is widely used for dealing with illegal substances. This problem drives law enforcement agencies to be interested in web pages that represent markets with forbidden content which are hidden behind anonymity networks. My goal is to focus on the biggest markets with such content and to gather as much information as possible about subjects that posture on similar types of web pages either as sellers or as buyers. I have resolved the given problem by choosing the most impactful markets according to the number of users signed in. I have become one of the users and applied algorithms for data scraping to get information from web pages into a structured form that is more suitable for a deeper analysis. The results of this thesis will help law enforcement agencies with the analysis of metadata of users that commit illegal activities as they will not have to manually search through the illegal markets, and they will have all available data summed up in a structured form in a database. Unifying data into a structured form will help speeding up the investigation and address the biggest drug sellers.
Optical Convertors
Chleboun, Jan ; Dostál, Otto (referee) ; Filka, Miloslav (advisor)
Optical converters are used in various types of optical networks to provide end-users of data and voice services and also allow reception of television broadcasting, which is transmitted through optical media. The current trend is the construction of FTTH networks (Fiber To The Home), which, thanks to optical fibre, have reduced the speed or capacity, as in the case with metallic networks. The proposal is the need to consider positive and negative factors associated with building of concrete network with a specified number of users and location. Each network consists of passive and active components. Passive can be used for transmission of information, therefore they are mainly elements transmission medium. Active part includes elements for sending and receiving information transmitted by optical media. Transmitters vary their technical implementation, quality and reliability. This obviously affects the price of both active and passive parts. The cost of the operation of the network are also increased with demands of control. The advantage is the efficient management, which is guaranteed by return of the cost to build a FTTH network. Optical network with a system of remote management converters is a new trend of optical communications.
HW and SW for Ethernet-to-IEEE802.15.4 bridge
Růžička, Tomáš ; Štohl, Radek (referee) ; Fiedler, Petr (advisor)
In this work we deal with the converter, to serve as a bridge between the two protocols. These protocols are Ethernet and wireless IEEE 802.15.4 protocol. Wireless part of this work, however, I simulated via serial RS 232nd After Ehternetu can send data via TCP or UPD protocol. First is the need for a converter to connect to the network and then create a packet. Finally, it is necessary to also address the views received and sent data via Ethernet and the RS-232.
Evaluation of entropy sources in common computers
Bafrnec, Matúš ; Zeman, Václav (referee) ; Burda, Karel (advisor)
This thesis is focused on entropy sources and their evaluation. It includes a brief introduction to the information theory, description of entropy sources, their parameters and characteristics and methods of evaluation based on the NIST organisation standard SP 800-90B. The following part of the thesis is dedicated to the description of two created programs and evaluation and comparison of entropy sources. Additionally, the last part describes the usage of hash functions in association with entropy sources.
Project documentation for the design of data networks
Gajdošík, Ivo ; Mišurec, Jiří (referee) ; Mrákava, Petr (advisor)
This Master’s thesis deals with project of blueprints for installation of data cabling in specific building following regulations. Theoretical part describes basic overview of used regulations and principles of data networks with focus on Ethernet and Wi-Fi standards. Separated chapters cover passive layer of data networks and computer-aided-design. Practical part contains implementational and architectural drawing of data network project in multipurpose building. According to these plans the project could be realized.
Management and Monitoring System for Computer Lab
Kudláček, Marek ; Zeman, Kryštof (referee) ; Mašek, Pavel (advisor)
This master's thesis deals with a system for PC mass management and monitoring. There is a brief description of Puppet, Chef and Ansible, which are tools enabling this functionality. The overall system issues are solved by Ansible. This thesis also includes a script created for a classroom’s remote management according to a beforehand fixed assignment. The system enables remote installation and configuration of applications, creation of users, editing the files, update of the system and many more. A web application was created for this system. Through this application, the system can be controlled via web browser, both from local and public network. Practical examples of the issue dealt with is also part of the thesis.
Secure Network Based on Virtual Next-Generation Firewall
Varmus, Pavol ; Burda, Karel (referee) ; Malina, Lukáš (advisor)
The bachelors thesis aims to study the issue of security of the networks that use firewalls. The next goal is to evaluate the characteristics of a different types of firewalls and to summarize its results. The other object is to design a small or medium sized network with description of best practice. The main objective of the thesis is to design a lecture task for students to test with a step-by-step solution. This task is for students to undertand the importance of firewalls as a network protection service tools and to try out different types of filters for maintainin network security. The task ends with a practical stress test made by a network attack in order to see its resistance to the attack.
Optimization of network flow monitoring
Žádník, Martin ; Lhotka,, Ladislav (referee) ; Matoušek, Radomil (referee) ; Sekanina, Lukáš (advisor)
The thesis deals with optimization of network flow monitoring. Flow-based network traffic processing, that is, processing packets based on some state information associated to the flows which the packets belong to, is a key enabler for a variety of network services and applications. The number of simultaneous flows increases with the growing number of new services and applications. It has become a challenge to keep a state per each flow in a network device processing high speed traffic. A flow table, a structure with flow states, must be stored in a memory hierarchy. The memory closest to the processing is known as a flow cache. Flow cache management plays an important role in terms of its effective utilization, which affects the performance of the whole system. This thesis focuses on an automated design of cache replacement policy optimized to a deployment on particular networks. A genetic algorithm is proposed to automate this process. The genetic algorithm generates and evaluates evolved replacement policies by a simulation on obtained traffic traces. The proposed algorithm is evaluated by designing replacement policies for two variations of the cache management problem. The first variation is an evolution of the replacement policy with an overall low number of state evictions from the flow cache. The second variation represents an evolution of the replacement policy with a low number of evictions belonging to large flows only. Optimized replacement policies for both variations are found while experimenting with various encoding of the replacement policy and genetic operators. The newly evolved replacement policies achieve better results than other tested policies. The evolved replacement policy lowers the overall amount of evictions by ten percent in comparison with the best compared policy. The evolved replacement policy focusing on large flows lowers the amount of their evictions two times. Moreover, no eviction occurs for most of the large flows (over 90%). The evolved replacement policy offers better resilience against flooding the flow cache with large amount of short flows which are typical side effects of scanning or distributed denial of service activities. An extension of the replacement policy is also proposed. The extension complements the replacement policy with an additional information extracted from packet headers. The results show further decrease in the number of evictions when the extension is used.
Multiplayer game for Android platform
Martinák, Andrej ; Bartoň, Radek (referee) ; Žák, Pavel (advisor)
This bachelor thesis deals with issues of real-time multiplayer mobile games development on Android platform. First chapters are devoted to the analysis of this platform and its possibilities of applications development. This is followed by the description of differenent approaches used for multiplayer game development. Part of the thesis describes different technologies, that were analyzed and then used for implementation of a 2D real-time fighting game and a server. The thesis contains the description of the game design, implementation and testing processes of the application.

National Repository of Grey Literature : 269 records found   previous11 - 20nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.