National Repository of Grey Literature 15 records found  1 - 10next  jump to record: Search took 0.01 seconds. 
Wireless PC controll
Macháček, Jiří ; Burian, František (referee) ; Macho, Tomáš (advisor)
This work deals with design of PC remote control, which is able to control computer with operating system Windows and Linux using Wifi connection. There was also created necessary support software for both operating systems. Communication was secured by ciphering algorithm.
Virtualization of operating systems
Král, Jan ; Malina, Lukáš (referee) ; Komosný, Dan (advisor)
The diploma thesis ’Virtualization of Operating Systems’ deals with a general description of virtualization technology and briefly discusses its use cases and advantages. The thesis also mentions examples of different types of virtualization technologies and tools, including more thorough description of the two technologies used for measurement: Docker and KVM. The second part of this thesis descibes the preparation, installation and configuration of all the tools and services that are necessary for measurement of the influence of the aforementioned virtualization technologies on network services running on the virtual machines, including analysis and discussion of the resulting data. Moreover, a custom application for fully automated measurement of the parameters of network services was created, and is also described in this thesis. The conclusion of this thesis summarizes and discusses the achieved results and acknowledges the influence of virtualization on network services, where the Docker application containers, which are with their low overhead comparable to a "bare" system without any virtualization, managed to achieve much better performance results than the traditional virtual machines on KVM.
New laboratory exercises in OMNeT++ simulation enviroment
Petrůj, Jakub ; Sládok, Ondřej (referee) ; Langhammer, Lukáš (advisor)
This Bachelor thesis illustrates a draft and creation of two lab exercises in a network simulation environment of OMNeT++ with INET Framework extension on behalf of Communication Technologie course. Initialy, simulated environment itself is defined and, including NED language and its modules, then the process of simulation and analysis of its results are presented and discused. Further more this work describes theoretical network knowledge required to create the simulation and treat its results. The first methodical part of this work compares HTTP, FTP, Telnet and VOIP protocols in simultaneous and non simultaneous running, with increased occurance of errors on line or its complete outage. The second methodical part of this work observes dynamic network configuration using DHCP protocol more in detail. Futhermore, this part studies the question of both non-efective and efective subnetting and handles issues concerning static adressing of network.
Multimode VHF Broadcasting Receiver
Hradňanský, Vladimír ; Ing. Vladimír Hubík, Ph.D, (referee) ; Šebesta, Jiří (advisor)
The aim of this work is to design a microprocessor-controlled multimode VHF radio can receive AM, FM and DAB. The first step is to become familiar with digital radio broadcasting DAB and RDS. Then we can proceed to the design of the receiver circuit solution using modern component base. Next it is necessary to write utility software and construct a prototype of receiver, verify its functionality and parameters. The result of the work is the multi-mode VHF broadcasting receiver controlled using touch screen display and supported by web management.
Configuration management for Cisco backbone network
Bartoš, Jan ; Pelka, Tomáš (referee) ; Polívka, Michal (advisor)
The main aim of the master thesis was to create an application for backbone network configuration management. The priority of the application was to be effective and easy to take. Program has to be able to communicate with network devices by remote control and to download and upload configuration files. The program has enable also availability verification for remote control. For this purpose the ICMP protocol was used. The remote control is provided by telnet protocol and the protocol TFTP has been chosen for file tranfers providing. The application is a multithreading application based on the Java programming language. The Java graphic library Swing was used for GUI creation. The application supports file versioning, the configuration of the program can be saved as a text file, which can be easy changed by user. The program and its features are described in the second part of this thesis. The first part deals with theoretical facts about the IP networks and remote control of the Cisco backbone network devices.
Automatic configuration of intermediate networking devices used in Cisco academy
Verner, Lukáš ; Jeřábek, Jan (referee) ; Komosný, Dan (advisor)
his semestral´s thesis deals with proposal and system implementation for automatic configuration of Cisco network devices. This system is called AutoConf and it is intended for distant copying configuration files from eagle-server to the switches and routers in Cisco academy laboratory. It is handled by web pages placed on eagle-server. In this system, user can create new laboratory exercises with configuration files for network devices and then these files could be used for configurations. Informations about done configurations are saved in relation database MySQL. Network devices which will be configured by system AutoConf have to be connected with eagle-server. To setup their connection settings was created decision-making mechanism. If it detects physical connection between network device and eagle-server before network device starts, it will set network device for communication with eagle-server.
Detection of Brute-Force Password Attack in Network Traffic
Hurta, Marek ; Grégr, Matěj (referee) ; Žádník, Martin (advisor)
This bachelor's thesis is aimed at monitoring of computer networks using IP flows. It describes NEMEA framework which is used for creating modules. These modules are able to detect network anomalies and attacks. Next part describes a few methods how SSH, RDP and Telnet protocols could be attacked. Following chapters analyze some types of attacks such as Dictionary or Brute-Force attack and tries to find their common characteristics. Based on this analysis, signature of attack is created. Proposed detection algorithm uses these signatures for computing detection thresholds which are used in histogram analysis. Finally, results of proposed detection algorithm are compared with the results from other known methods.
Multimode VHF Receiver
Hradňanský, Vladimír
The aim of this work is to design a microprocessor-controlled multimode VHF radio which can receive AM, FM and DAB. The design of the receiver circuits comes from the singlechip programmable defined radio Si4689 which covers all required modes. The control unit based on RTOS SC23 processor contains a firmware which ensures all needed function of the prototype. The firmware has been verified including testing of all parameters. A multi-mode FM radio, MP3 player and on-line radio stream player operated via touch green and remote control and supported web management is the final result of this work.
New laboratory exercises in OMNeT++ simulation enviroment
Petrůj, Jakub ; Sládok, Ondřej (referee) ; Langhammer, Lukáš (advisor)
This Bachelor thesis illustrates a draft and creation of two lab exercises in a network simulation environment of OMNeT++ with INET Framework extension on behalf of Communication Technologie course. Initialy, simulated environment itself is defined and, including NED language and its modules, then the process of simulation and analysis of its results are presented and discused. Further more this work describes theoretical network knowledge required to create the simulation and treat its results. The first methodical part of this work compares HTTP, FTP, Telnet and VOIP protocols in simultaneous and non simultaneous running, with increased occurance of errors on line or its complete outage. The second methodical part of this work observes dynamic network configuration using DHCP protocol more in detail. Futhermore, this part studies the question of both non-efective and efective subnetting and handles issues concerning static adressing of network.
Detection of Brute-Force Password Attack in Network Traffic
Hurta, Marek ; Grégr, Matěj (referee) ; Žádník, Martin (advisor)
This bachelor's thesis is aimed at monitoring of computer networks using IP flows. It describes NEMEA framework which is used for creating modules. These modules are able to detect network anomalies and attacks. Next part describes a few methods how SSH, RDP and Telnet protocols could be attacked. Following chapters analyze some types of attacks such as Dictionary or Brute-Force attack and tries to find their common characteristics. Based on this analysis, signature of attack is created. Proposed detection algorithm uses these signatures for computing detection thresholds which are used in histogram analysis. Finally, results of proposed detection algorithm are compared with the results from other known methods.

National Repository of Grey Literature : 15 records found   1 - 10next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.