National Repository of Grey Literature 81 records found  1 - 10nextend  jump to record: Search took 0.00 seconds. 
Computer network design for the school building
Marčišák, Petr ; Novotný, Milan (referee) ; Ondrák, Viktor (advisor)
My Bachelor thesis deals with the design of the computer network for the school building block . The main reason is increase number of requests for connection to the school network or internet and also demands of the modern education.
Multimedia Services in Mobile Networks
Kovář, Petr ; Molnár, Karol (advisor)
Long time ago, there were developed methods which can allow fast exchange of information at the longest distance possible. Until recent time, the possibilities of long way communications were very limited. There were technological and financial limitations mainly. With telegraph, telephone and the newest – computer networks invention, the telecommunication services became cheaper and much more comprehensive. With accession and high scale spread of internet, the role of communications is much more important. The most actual trend is mobile internet and connected multimedia networks and their instant accessibility from anywhere. On the first side there are classical telecommunication networks as GSM, UMTS, on the other side there is very strong alternative in shape of WiMAX and WiFi networks combination. For the usage of multimedia services in that networks is very important to handle their prefferization over other traffic, which is very difficult task even on wireless media. For the finding of new processes and methods, which can allow it, there is, at fist, the need for highly accurate and authentic mathematical models. In this doctoral thesis is mapped actual state of the art and proposed the new mathematical model of Distribution Coordination Function, which is much-frequent used as access method in 802.11 networks, Wi-Fi.
Wireless Security and Surveillance System
Výborný, Jiří ; Frýza, Tomáš (referee) ; Prokopec, Jan (advisor)
This Master’s thesis deals with design and construction of a wireless security and surveillance system in ZigBee wireless networks (IEEE802.15.4). The design consists of creating a star network topology with intended monitoring of home area via end device boards paired with coordinator board, which provides basic networking functionality. End device is used to send data from a temperature sensor DS1631 and magnetic reed switches to coordinator. ZigBee module ZDM-A1281-A2 made by MeshNetics company embedded on each board contains a micro controller ATMega1281 and a transceiver AT86RF230 working in a 2,4GHz frequency band. System is able to notice of any door or window move actions and too high temperature. The non-fully functional ZigBee stack, which is called an Open MAC software, based on MAC (Media Access Control ) layer and PHY (Physical) layer from MeshNetics, has been used to develop the user software. Open MAC consists of three application samples in C code. One of them was modified by the user for an application of communication between the module and sensors. The same design with module RC2204AT made by Radiocrafts company was tested as well, but it couldn’t be executed. All developed boards have been constructed and tested via Terminal PC program.
Universal wireless communication link using ZigBee modules
Kyselý, Tomáš ; Vychodil, Josef (referee) ; Prokeš, Aleš (advisor)
The work deals with the transmission of information via wireless ZigBee 802.15.4 standard. It describes the function, method and determination of this technology, the transmission system and security of information between ZigBee devices. It also shows the ability to connect ZigBee module to the computer, configure it for use on the network and comunicating in the network. Finally proposes the simplest diagram and PCB for the application.
Implementation of Quality of Service into Wireless Networks
Kaman, Štěpán ; Růčka, Lukáš (referee) ; Škorpil, Vladislav (advisor)
Wireless networks are currently the frequent access connection to the local network or the Internet. Until 2005 there was no support in the 802.11 standard priority data and the use of multimedia services in these networks is problematic. Thesis deals with the standard IEEE 802.11 standard and quality of service support including IEEE 802.11e. They discussed methods of access to transmission medium, differences in the MAC sublayer, the reader issues in the transmission of priority data and the requirements for these data. In Opnet Modeler was created wireless network with access points and stations on which they are carried out simulations at different strain of transmitted data. It studied the difference in the use of DCF and EDCF method, used in the network with QoS support. In particular, it examined the behavior of priority voice and video data in both networks. The focus is on key parameters such as throughput, dropping data, packet loss, delay, jitter and the size of broadcasting front. The measured data are analyzed, and differences in the network without the support and promoting the quality of services are compared and evaluated. Part of this work is the role of laboratory in the Opnet Modeler.
Security of wireless computer networks
Jelínek, Martin ; Pelka, Tomáš (referee) ; Doležel, Radek (advisor)
The master's thesis deals with the issue of Wireless Local Area Network (WLAN) from the viewpoint of the security and functional principle of security mechanisms. The transition to the issue concerning the security is accompanied by the methods of wireless data transmission operating on the level of physical layer (FHSS, DSSS, OFDM, MIMO), which is followed by the summary of individual 802.11 standards. The next part deals with the issue of shared transmission medium (CSMA/CA), influence of interference and correcting mechanisms (RTS/CTS). Within the security, the principles of the authentication along with the commonly used methods of security (WEP, WPA, WPA2) are described in detail. The first part concerning security deals with the security in the form of the WEP protocol, which is considered insufficient nowadays and points out the imperfect implementation and the consequent risks. The following part describes the security in the form of WPA which eliminates the implementation weaknesses of the previous WEP security protocol. The description of commonly used mechanisms of authentication (PSK, 802.1x), required temporary key management (PTK, GTK), data integrity (MIC) and encryption which uses TKIP protocol are also included. The last part, possible WLAN security, is aimed at the full support of 802.11i standard, which is called WPA2 (sometimes RSN). That part describes the basic encryption security element CCMP, which is based on the AES block cipher modes. The practical part of the thesis deals with the security verification of current wireless networks. In the process of verification the accessible HW means and programming tools of Open Source Software (OSS) are used. By means of verification it has been pointed out that there are possible security risks resulting from the security method which has been used. Also several recommendations how to reduce the security risks of the used method to minimum are mentioned.
Wireless Fidelity Networks
Jäger, Vítězslav ; Plchot, Oldřich (referee) ; Koch, Miloš (advisor)
Purpose of my Bachelor‘s thesis is to inform about general problems of wireless networks. My work is giving overview about using standards. It Analyzes the most common of them and focuses on their architecture and safety. Part of my work will be a creation of the wireless network for needs of a high school.
The Use of GPU to Searching for the Secured Wireless Network Keys
Tyrala, Radek ; Pospíchal, Petr (referee) ; Jaroš, Jiří (advisor)
This bachelor thesis proposes an analysis of wireless networks security with a particular focus on Wi-Fi type networks. In order to define the central elements of the thesis, let us follow a description of the main steps, namely: The characteristics of the currently applied security standards are provided together with a discussion of their weak points. A somewhat closer insight is offered into the WPA2 security standard as well as into the related breaking possibilities. A description is realized of the principle of dictionary attacks and their acceleration using parallel processing on the GPU. Another important point presented consists in a comparison of the GPU and CPU performance for an application implementing dictionary attack on wireless networks protected with the 802.11i standard.
Automated Attacks on WiFi Networks with Low Detectability and Defense Against Them
Klusáček, Jan ; Vrána, Roman (referee) ; Orsák, Michal (advisor)
The goal of this bachelor's thesis is to create a tool which can be used for automated Wi-Fi attacks. All types of Wi-Fi security are described, with attacks, which can be used on specific security type. Existing tools used for hacking are described further, of which several are included to the final tool.
Analysis of Wireless Signal Coverage
Šimek, Petr ; Šimek, Václav (referee) ; Očenášek, Pavel (advisor)
This master's thesis describes process of design and development of the system for calculating the coverage of wireless networks, it is implemented as a web portal and written in the Java programming language. The text of the thesis describes the work with the used platforms, a description of the ITU-R calculation method P.1812, which is used for calculation electric field strength and basic information about electromagnetic waves. The main function of the system is to calculate and display coverage of wireless networks and customer management information.

National Repository of Grey Literature : 81 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.