National Repository of Grey Literature 49 records found  1 - 10nextend  jump to record: Search took 0.00 seconds. 
Dependency of the Convergence Rate Mean Extent of Variation on the Repetitions Number in Weakly Connected Topologies
Kenyeres, Martin ; Novotný, Bohumil
This paper deals with the stochastic distributed algorithm – the push-sum protocol. We examine the effect of experiments repetitions on the mean of the convergence rates quantities. The main goal of the executed experiments is to show how many repetitions of the push-sum protocol are necessary to achieve a statistically credible representative of the obtained set of data. Within this paper, we have focused on weakly connected structures.
Dependency of the Convergence Rate Mean Extent of Variation on the Repetitions Number in Strongly Connected Topologies
Kenyeres, Martin ; Novotný, Bohumil
This paper deals with the stochastic distributed algorithm – the push-sum protocol. We examine the effect of experiments repetitions on the mean of the convergence rates quantities. The main goal of the executed experiments is to show how many repetitions of the push-sum protocol are necessary to achieve a statistically credible representative of the obtained set of data. Within this paper, we have focused on strongly connected structures.
Applications Development for Software Defined Networks
Piska, Vojtěch ; Novotný, Bohumil (referee) ; Škorpil, Vladislav (advisor)
In this diploma thesis is described new network architecture also known as software defined networks. In first part of work are explained and described tasks of individual architecture layers. Work includes discussion about advantages and disadvantages of these networks. In next part is described OpenFlow protocol which allows to controller communicate with underlying hardware devices. Last part contains proposal of laboratory excercises which demonstrate SDN technology.
Analysis of wireless network traffic
Guznar, Martin ; Kubánková, Anna (referee) ; Novotný, Bohumil (advisor)
This work solves the VoIP call switching system android with standard Long Term Evolution (LTE) on the IEEE 802.11 standard without losing the connection. In the theoretical part they are described in detail the various standards, protocols, their description and their interconnection. The proposed test will be in the system android with ongoing VoIP call. The outcome should be a capital loss graph Wi-Fi signal and follow your phone’s connection to LTE through a local provider, and all this without losing the connection and interruption of that ongoing VoIP call. The results of this study make it possible to determine how and under what circumstances will switch network from Wi-Fi to LTE and how it happened. Furthermore also obtain data that take place between a precise description of the procedure soft handoff.
Analysis of Converged Networks by Simulations
Gardáš, Vít ; Novotný, Bohumil (referee) ; Škorpil, Vladislav (advisor)
The primary purpose of this study is to analyze converged high-speed networks with the usage of Matlab and Simuling. To set problematic area in the field of high-speed networks and solve this problem by creating a model of measurement and simulation of this model. A laboratory exercise is afterwards created on the specific problem.
Switches security risks
Halaška, Peter ; Novotný, Bohumil (referee) ; Sobek, Jiří (advisor)
The aim of this thesis was to study and subsequently process issues of securing switches operating at the data link layer of OSI/ISO model. Map individual switch attacks with their review. On the basis of this information realize chosen attacks with presented results.
Adaptation of access networks for advanced networking technologies
Frollo, Martin ; Škorpil, Vladislav (referee) ; Novotný, Bohumil (advisor)
The bachelor thesis is focusing on the real-time services running in packet networks and problems that may arise while they are running. Specifically it is focused on the technology of VoIP service. There are many different signaling protocols to support this service. Among others, the SIP protocol is very widespread. In addition of the connection it is necessary to ensure the transmission of voice data. That is the task of the RTP protocol. This service and also others for which time is critical with increasing constraints on networks it needs to be frequently given the priority over traditional services like downloading files, and more. VoIP service has certain requirements for transmission parameters that must be followed for optimal function. They are for example, packet loss, one-way delay and delay variation. Most problematic is to ensure the optimal operation of the service on slower transmission routes. That is why it was necessary to establish mechanisms capable of real-time services to ensure sufficient network capacity to meet end user. These are, for example technologies of integrated services or differentiated services. At the present time, however, the technology of integrated services is not very widespread because of its inefficiency. On assembled telephone network made from available components in the laboratory, there are analyzed and confirmed some of the distinctive features and characteristics of the SIP protocol. Furthermore, measurements confirmed sufficient network capacity for VoIP service of the used network and parameters affecting security of the QoS have been evaluated.
Remote devices control using modern communication methods
Motoshin, Ivan ; Škorpil, Vladislav (referee) ; Novotný, Bohumil (advisor)
This master thesis deals with the proposal of smart home device. As a part of the work is analyzing of devices on the market, theoretical learning methods of remote control and selection optimal solution for creating own smart home device. As a result of the master thesis is making and testing created device.
Analysis of Cryptographic Algorithms 802.11
Vojtíšek, Jindřich ; Sobek, Jiří (referee) ; Novotný, Bohumil (advisor)
This work deals with wireless standard 802.11, primaly about security algorithms used in them. Further there is made analysis of algorithms WEP, WPA and WPA2. This algorithms are described how coding by them works and for easier understandig are added block schemes of their principles. In practical part is realized algorithms WEP, WPA and WPA2 in program Matlab simulink. Model is complemented by graphs which shows how data changes when comming throught this systems.
Attacks on Standard 802.11
Burian, Vojtěch ; Horváth, Tomáš (referee) ; Novotný, Bohumil (advisor)
Thesis is concerned about standard 802.11 especially wireless network security in historical and in current way. First part is focused on WEP secured wireless network problematics. Consequently, in different point of view we are focused on network security which was developed recently, for example WPA and WPA2 security. It will be marked the basic functioning and brief overview of standard 802.11, introduction to the known attacks on wireless network security and also indicate the main mistakes. Many older devices have only WEP security. Therefore, in this thesis is designed better and more coherent system of security of the WEP protocol. As well modern methods of security WPA and WPA2 are included. Second part is focused on the simulation of attack on security networks. In this part the problematic with beaking security WEP, WPA and WPA2 is discussed.

National Repository of Grey Literature : 49 records found   1 - 10nextend  jump to record:
See also: similar author names
13 Novotny, Bohumil
1 Novotný, B.
2 Novotný, Břetislav
Interested in being notified about new results for this query?
Subscribe to the RSS feed.