• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 496
  • 208
  • 135
  • 93
  • 75
  • 74
  • 48
  • 41
  • 28
  • 18
  • 16
  • 16
  • 15
  • 14
  • 10
  • Tagged with
  • 1373
  • 491
  • 354
  • 353
  • 252
  • 191
  • 167
  • 150
  • 150
  • 116
  • 116
  • 112
  • 101
  • 99
  • 97
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1071

Penetrační testování ANC / Penetration testing of ANC

Dušek, Jakub January 2021 (has links)
This diploma thesis deals with the evaluation of a security solution that was recently deployed by a British company renting office space. This validation system is based on a database of MAC addresses, a database of clients and active filtering of connected devices. The first part explains the concepts of computer network, VLAN and basic concepts needed to understand the function of dynamic assignment of VLAN and IP addresses. The second part is devoted to measurements based on hypotheses, according to which measures are proposed in the last part to solve these security problems.
1072

Programování procesorů v 32- nebo 64-bitových operačních systémech / Programming of processors in 32- or 64-bit operation systems

Rášo, Ondřej January 2008 (has links)
Main topic of this thesis is Win32 application programming interface and symbolic instructions programming language. It can be divided into four parts. First part sums the basics of 32-bit programming in symbolic instructions language in Windows. Second part describes the Win32 resources for computer intercommunication. Third part presents, describes and comments selected problems in symbolic instructions language.Last part covers a creation of an example application. This application and its parts will be the content of computer exercises in VUT Brno FEEC subject Počítače a jejich periferie.
1073

IP Multimedia Subsystem / IP Multimedia Subsystem

Bendíček, Martin January 2008 (has links)
This Master’s thesis deals with IMS architecture problems. This thesis describes its creation and progress, also structure of this architecture is mentioned. Text of this thesis describes function of the most important parts of the architecture, such as Proxy-CSCF, Interrogating-CSCF, Serving-CSCF and HSS. IMS architecture uses SIP protocol for establishment, maintenance and closing session and Diameter protocol for network management functions. That is why this thesis also describes characteristics of these two protocols. Next part of the thesis is focused on Open-source platform Open IMS Core and its installation. Open IMS Core platform was developed for testing IMS technologies within an internal project at the Fraunhofer Institute FOKUS in Berlin. Nowadays it is used by major part of vendors and providers for testing their products and services. As a main theme of this thesis, there was made a simple network, which consists of three users. This network is established on fundamentals of IMS and it was made in Open IMS Core. So in one chapter is outlined a process of its creation. There is described a process of adding a user list to database server HSS. In the next part there are mentioned some information about setup of virtual IMS terminal. Eventually there are shown some possibilities of how to catch traffic in the network. In this chapter there are also state diagrams, which describe a process of registration of IMS terminal and also a process of establishment, maintenance and closing session.
1074

Návrh, správa a analýza SSM multicastové sítě / Design, administration and analysis of SSM multicast network

Žák, Jakub January 2008 (has links)
My thesis deals with the Multicast transfer in IP networks and it describes distribution technology of packets with special focus on Multicast technology. The thesis is devoted to the principles of Multicast including the description of scheme, protocol Multicast distribution, registration in the Multicast groups and finally the advantages and disadvantages of the Multicast transfer. Further in the thesis is described in details the Source Specific Multicast technology (SSM) that comes from multicast. There is a description how this technology Works and its implementation in the network equipment including the user side. This part of the thesis also deals with so called Distribution Trees that are used as multicast distribution via the IP networks like for example Internet. Based on the knowledge of the Multicast was created the network to spread the multimedia data with support of Multicast and SSM. The network is designed based on the Cisco system equipment as is: Cisco Content Engine 566, Cisco IP/TV broadcast server and router 1812. This multimedia network provides many services including the live TV broadcast and video channels. In this network using the multicast distribution of packets was done an analysis by protocol analyzer unit WIreshark and Finisar. This protocol analyzer unit allows us to compare the efficiency of multimedia data transfer between the Unicast, Multicast and SSM.
1075

Odolnost komunikační jednotky LAN proti útokům z Internetu / LAN communication unit resistivity against Internet origination attacks

Valach, Michal January 2009 (has links)
This thesis is focused on crypto-module RCM 3700, which is used for encrypted data transmission. Following work analyses basic network protocols and some sort of attacks in Ethernet network. The main goal of these attacks is to collect information and services about the device and to analyze transmitted data. Based on these information attacks can be done more precisely than without them. The main target of these attacks is the denial of particulary service or data abuse. Furthermore, in the diploma thesis configuration of router CISCO 2801 is applied in order to improve the LAN security. The deveploment board, which includes reset function, supplied circuit and interface for RS 232, was designed for crypto-module RCM 3700.
1076

Návrh, realizace a simulace síťových protokolů v NS2 / Design, realization and simulation of network protocols in NS2

Zvolenský, Daniel January 2010 (has links)
The aim of this work is to become familiar with simulation environment Network Simulator 2, study the problems of sensor networks and their support in the simulator and implement the selected protocol and verify its funcitonality in a practical simulation.
1077

Hardwarový interface pro databázový server / HW interface of database server

Janů, Petr January 2011 (has links)
The aim of master's thesis is implementation of hardware interface database server. Interface will be collecting data at installation place. Interface will be connected to a remote MySQL server using an Ethernet network and saving data received by serial line in a database.
1078

Dohledový systém pro Internet Protocol Multimedia Subsystem / Surveillance system for Internet Protocol Multimedia Subsystem

Švec, Michal January 2013 (has links)
The master’s thesis describes IMS (IP Multimedia Subsystem) in terms of IMS core ele- ments (functional description, different implementation, signaling etc.) Communication protocols SIP and DIAMETER, together with SNMP protocol, which is used for collecting data are briefly described in this thesis.Thesis is also describing various IMS projects to- gether with Open IMS project, for whom was this surveillance system designed. Next part deals with architecture design of surveillance system along with management options implemented in surveillance system for users and administrators. The main part of master’s thesis deals with the description of the surveillance system for the experimental school Open IMS network and describes the remote configuration of core elements and monitoring of network traffic, together with the monitoring servers performance. The most of the data in the designed surveillance system are processed into graphs, which are regularly updated. The final part of master’s thesis describes the configuration and implementation of monitoring tools MRTG and NfSen that were used in created web based surveillance system.
1079

Hlasová služba v integrovaných sítích / Voice Service in Integrated Networks

Yeftsifeyeu, Aliaksandr January 2014 (has links)
The master’s thesis presents routing protocols, SIP handshake, describes modern VoIP networks and its features. Thesis is primary focused on networks with integrated MPLS. The most known advantages and disadvantages were described of modern network based on such technology. Further, networks and a router with installed Cisco Call Manager Express 7.1 were configured, which is provided by CISCO. For recreating of fully working telephone network IP PBX10 has been used from SMC Networks. For connection between different phones within these integrated networks, SIP trunk was configured on SMC PBX10 as well as on router, which is connecting three configured Cisco IP phones. Each phone has its own number according to the dial plan. For calls from one network to another the special pattern has been established, so the number of each caller can be easily identified by added digit. On one of the CISCO routers was shown a configuration of MPLS and OSPF protocols. With an analyzer VePAL TX300e, the lab network has been measured to analyze QoS parameters of the network according to standard RFC 2544. Thesis also gives references to lab devices, which have been used accordingly to the work.
1080

Hra piškvorky pomocí 2D manipulátoru / Tic-tac-toe game by 2D manipulator

Maléř, Martin January 2015 (has links)
This master’s thesis deals with the renewal of electrical equipment of 2D manipulator and putting it into operation. It contains a description of the machine, used components and their connections. It describes the principle of two communication buses, which are used for machine control. Next part is devoted to the safety analysis of the machine. Following chapters describe developing of a control program and designing of a visualization.

Page generated in 0.0556 seconds