National Repository of Grey Literature 35 records found  1 - 10nextend  jump to record: Search took 0.02 seconds. 
Economics System Security Solution
Krčmárik, Branislav ; Plch, Edward (referee) ; Ondrák, Viktor (advisor)
The essay describes analysing the present situation of securing a network of the System4u company and how it was applied to detect attacks to the system. The chosen IDS has been an open source program named Snort.
Design and implementation of network collector
Bošeľa, Jaroslav ; Horváth, Tomáš (referee) ; Oujezský, Václav (advisor)
This master’s thesis deals with description of information protocol of network flow, mainly definition of Cisco NetFlow version 9. Describes it’s features, message format and attributes of transmitted data. The thesis is primarly focused onto NetFlow v9 transmitted template, which defines fileds and data in consecutive data flow. The essence of the thesis consists in implementation of simple NetFlow v9 parser, which has been programmed in Python prog.language, it’s tests of captured UDP data from file and port capture testing on development server in lab. There is a possibility of saving captured and parsed data into prepared database within implementation as output from capturing.
Traffic generator of industrial protocols
Šnajdr, Václav ; Blažek, Petr (referee) ; Martinásek, Zdeněk (advisor)
This bachelor thesis deals with generating data traffic of industrial SCADA protocols and their implementation into JMeter tool. This tool can be expanded with plugins. Three protocols DNP3, IEC61850 and IEC60870-5 are described in the theoretical part. The practical part is devoted to the design and implementation of the DNP3 protocol module and partly to the design of the IEC61850 protocol. The DNP3 module has been functionally tested. There is also an attempt to obtain the TASE.2 library.
Laboratory exercises in Riverbed Modeler simulation environment
Lojek, Stanislav ; Bečková, Zuzana (referee) ; Langhammer, Lukáš (advisor)
This semestral thesis deals with the creation of a laboratory exercise for the course of Communication Technology. This course is designed for Teleinformatics in bachelor's degree program and should provide students with basic knowledge of network protocols and technologies. For this reason, the thesis deals with basic transport protocols, protocols for transmission via backbone networks and network layer protocols. The introductory part introduces the OPNET design environment, more precisely its free version of Riverbed Modeler Academic Edition 17.5, where the design of the laboratory exercises is done. The second part is a necessary theory to the exercises. The lab exercise is focused on differences in TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) protocols. The second laboratory exercises is focused on technologies for transmission mainly on WAN (Wide Area Network) namely ATM (Asynchronous Transfer Mode) and Frame Relay. The last proposed exercises deals with the two most prominent Internet protocols that are used for communications IPv4 (Internet Protocol version 4) and IPv6 (Internet Protocol version 6) protocols. Guides for students have been created for this task, and at the end of each part, the complementary tasks and questions are given to students in oder to test the gained knowledge of the discussed issues.
The tribological evaluation of frictional co-parts for centrifugal pumps
Obručník, Daniel ; Forejt, Miloslav (referee) ; Osička, Karel (advisor)
These Graduation Theses solve effects of tribological behaviour of materials pairs on the basic of the SIGMA GROUP a.s. requirements. For available materials there was a target to design tribological pairs and check their behaviour.
Safe Cryptography Algorithms
Mahdal, Jakub ; Hanáček, Petr (referee) ; Chmelař, Petr (advisor)
This thesis brings a reader an overview about historical and modern world of cryptographic methods, as well evaluates actual state of cryptographic algorithm progressions, which are used in applications nowadays. The aim of the work describes common symmetric, asymmetric encryption methods, cryptographic hash functions and as well pseudorandom number generators, authentication protocols and protocols for building VPNs. This document also shows the basics of the successful modern cryptanalysis and reveals algorithms that shouldn't be used and which algorithms are vulnerable. The reader will be also recommended an overview of cryptographic algorithms that are expected to stay safe in the future.
Laboratory exercise for RTG imaging systems
Kuchař, Otakar ; Macíček, Ondřej (referee) ; Mézl, Martin (advisor)
The aim of this Bachelor thesis is to study the X-ray and computed tomography. The theoretical section explains the basic physical principles, elementary particle, atom and ionizing. The following parts of the thesis deal with topics from the origin and various types of X-ray, to interaction of X-ray with tissue and X-ray detection. For computed tomography the thesis also explains data collection, the reconstruction of image using simple back projection, filtered back projection and algebraic reconstruction. In the practical part are analysed several measurements which were taken in the X-ray chamber designed for educational purposes by Leybold. The topics solve the attenuation of X-rays depending on the type and thickness of the material and the spectrum of the X-ray radiation. In the field of computerized tomography solve tasks as the change of contrast, parameters of acquisition and methods for reconstruction. The work includes prepared sample solutions to a laboratory experiments.
Rule-Driven Protocol Analyzer
Jurnečka, Peter ; Zbořil, František (referee) ; Hanáček, Petr (advisor)
The master Thesis deals with an overview of issues necessary for design of custom network analyzer. Describes the existing solutions, provides the theoretical background needed for design of custom analyzer and describes the structure of implemented system. A separate part of the work is devoted to the specification of Metamodel used to modeling of communication protocols and compiler of models modeled with the Metamodel.
Secure communication in systems using restricted devices
Michálek, Tomáš ; Martinásek, Zdeněk (referee) ; Malina, Lukáš (advisor)
This thesis presents the usability and analysis of cryptographic methods on devices with low computing power and low memory capacity. The thesis describes different methods and shows examples of their usability in practice. According to certain parameters of security methods, such as code size and memory size it is selected and compared symetric ciphers and authentication codes. There are also described some security protocols and possible attacks. The next part includes a comparison of ciphers and chosen candidates are tested on our microcontroller. In the end there are propose, implemented and analyzed security protocols.
Wireless transmission of diagnostic data from the vehicle
Tuchyňa, Juraj ; Lattenberg, Ivo (referee) ; Krajsa, Ondřej (advisor)
The main purpose of this project is to analyse used protocols in vehicles available under the OBD II specifications. In the project we will also focus on processing diagnostic data. We will design device for vehicle diagnostic. This device will be able to send processed data on external web server via Internet network. Obtained data will be saved on data server. Building of functional receiver will be the major part of master´s thesis.

National Repository of Grey Literature : 35 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.