• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 208
  • 16
  • 4
  • Tagged with
  • 232
  • 204
  • 42
  • 36
  • 32
  • 31
  • 27
  • 22
  • 18
  • 17
  • 17
  • 15
  • 15
  • 14
  • 14
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
51

Testování síťových služeb pomocí emulátoru rozsáhlé sítě WAN a simulátorů zátěže / Network service testing with WAN network emulator and load simulators

Kocáb, Marek January 2012 (has links)
The main task of this thesis was to explore the requirements of different telecommunications services on the network parameter, that are packet delay, packet loss, throughput, jitter. Make to test network service with WAN network emulator and load simulators. Next focus was to explore TCP congestion avoidance algorithms and focus on their throughput. The purpose of the first chapter is to introduce Quality of Service (QoS) for VoIP, video conversation, streaming audio, streaming video and data. The second chapter are to explore various types of delay, that are created from the sender through network device, transmission media to the recipient. The third chapter is to introduce NetDisturb application. It is application, that can emulate real properties of the data network and incoming traffic affect example packet delay, packet loss, bandwidth limit and so on. The key objectives of the fourth and fifth part is TCP protocol and TCP congestion avoidance algorithms. Hier are to introduce TCP protocol basic properties, congestion avoidance mechanisms and analysis of TCP congestion avoidance algorithms. In the practical part are created two laboratory exercises. First laboratory exercise is designed on the implementation QoS for various types of traffic. Second laboratory exercise is focused on the analysis TCP congestion avoidance algorithms and their throughput.
52

Laboratorní úlohy v prostředí OPNET pro předmět Komunikační technologie / Laboratory exercises in OPNET environmentfor Communication technolgies course

Kasper, Robin January 2012 (has links)
This master’s thesis deals with the design of laboratory exercises for the Communication Technologies course that is included in the second year of bachelor’s degree in Teleinformatics. This course represents first introduction of students with network protocols and technologies, therefore, the thesis deals with just the basic physical technologies, routing protocols and transport layer protocols. The introductory part of the thesis is devoted to theoretical knowledge to particular tasks. For the design of laboratory exercises is used OPNET environment, concretely its unpaid version IT Guru Academic Edition 9.1. The first task is focused on the differences in two basic transport protocols Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). The second task is orientated on the differences in the transmission network parameters using wireless networks and Ethernet technologies. In the third task the routing protocols Routing Information Protocol (RIP) a Open Shortest Path First (OSPF) are compared. These are protocols of a group Interior Gateway Protocol (IGP) that are characterized by the usage within a single autonomous system. The last exercise is aimed at Asynchronous Transfer Mode (ATM) and Frame Relay technologies, which are technologies used mainly in networks Wide Area Network (WAN). All devised exercises are accompanied by detailed instructions for students including supplementary questions and tasks leading to individual work and reflection. The thesis includes model solutions to these four exercises and CD where are inserted all programs source codes.
53

Simulační scénáře v prostředí IT Guru pro předmět Komunikační technologie / Simulation scenarios in IT Guru environment for Communication technology course

Rybka, Štěpán January 2013 (has links)
This thesis called Simulation scenarios in an IT Guru enviroment for Communication Technologies deals with the design of laboratory experiments for the above-mentioned subject. The first part is a theoretical introduction to the protocols. The practical part contains the tasks itself. The work includes four laboratory tasks with a detailed description of the work and an illustrative pictures. The first two tasks are focused on the application protocols, with which the user comes into contact with every day. The other two are focused on routing protocols, precisely the internal routing protocol IS-IS and BGP external routing protocol. A free version of simulation software OPNET Modeler and IT Guru enviroment version 9.1.A were used to create the work.
54

Brána pro překlad signalizačních zpráv pro videokonference / Signalling gateway for videoconferencing

Seifert, David January 2013 (has links)
Generally, the term gateway (gateway) in computer networks holds a node that connects two networks with different protocols. This thesis deals with the translation between two protocols, SIP protocol and WebSocket. This translation is the work first described theoretically and then work deals with the way this translation solutions using tools available on the Internet.
55

Statistické metody detekce anomálií datové komunikace / Statistical anomaly detection methods of data communication

Woidig, Eduard January 2015 (has links)
This thesis serves as a theoretical basis for a practical solution to the issue of the use of statistical methods for detecting anomalies in data traffic. The basic focus of anomaly detection data traffic is on the data attacks. Therefore, the main focus is the analysis of data attacks. Within the solving are data attacks sorted by protocols that attackers exploit for their own activities. Each section describes the protocol itself, its usage and behavior. For each protocol is gradually solved description of the attacks, including the methodology leading to the attack and penalties on an already compromised system or station. For the most serious attacks are outlined procedures for the detection and the potential defenses against them. These findings are summarized in the theoretical analysis, which should serve as a starting point for the practical part, which will be the analysis of real data traffic. The practical part is divided into several sections. The first of these describes the procedures for obtaining and preparing the samples to allow them to carry out further analysis. Further described herein are created scripts that are used for obtaining needed data from the recorded samples. These data are were analyzed in detail, using statistical methods such as time series and descriptive statistics. Subsequently acquired properties and monitored behavior is verified using artificial and real attacks, which is the original clean operation modified. Using a new analysis of the modified traffics compared with the original samples and an evaluation of whether it has been some kind of anomaly detected. The results and tracking are collectively summarized and evaluated in a separate chapter with a description of possible further attacks, which were not directly part of the test analysis.
56

Systém pro anonymní předávání zpráv / System for anonymous transmit of messages

Kislinger, Jan January 2014 (has links)
Diploma thesis deals with an anonymous transmit of messages using protocol for anonymous authentication. In first part, we introduce theoretical familiarization to the issues and description protocol for anonymous authentication. Further, it describes the suggestion of the communication between the client and the server. Finally, contains a description of the created system for anonymous transmit of messages, which consists of the server and clients, who can leave challenges on the server for other users and they obtains challenges from the server. The thesis explains how to start and control program. There are also discussed methods of computing verification values, encryption keys and messages and authentication of receivers.
57

Malá testovací teplotní komora / Small Temperature Test Chamber

Wolfshörndl, Robert January 2014 (has links)
This diploma thesis deals with the design of a small temperature test chamber. The first chapter is a study of temperature sensors suitable for realization of temperature chambers. The conclusion of this chapter is devoted to digital temperature sensor DS18B20. The second chapter deals with the principles and basic parameters of Peltier cells. In the third chapter design of individual electronic components of the temperature chamber is realized (circuit diagrams and PCBs), including a description of basic features of the microcontroller firmware. The fourth chapter is devoted to a description of the basic properties of the application software and a description of the communication protocol. The last two chapters deal with the construction of the temperature chamber and the results of final functional test.
58

Aplikace pro sběr dat ze sítě bezdrátových senzorů relativní vlhkosti vzduchu / Data Collecting Application in Wireless Sensor Network for Measuring Relative Humidity of Air

Procházka, Stanislav January 2014 (has links)
The master work is focused on the design and implementation of two parts of the system for measuring temperature and relative humidity. The system for measuring temperature and relative humidity consists of a network of wireless sensors, a ISM/Wifi converter and application which will collect, analyze and archive data. The design and implementation of ISM/Wifi converter as well as the design and implementation of application are described in this work. ISM/Wifi converter will be able to communicate with the network of wireless sensors through ISM/Wifi protocol and end device (the device with Android operating system) by means of IEEE 802.11 protocol. The application will be able to evaluate, to save and to present user the received data very clearly.
59

Návrh implementace IPv6 protokolu ve společnosti / IPv6 Protocol Implementation Concept in Company

Dvořák, Petr January 2014 (has links)
Diploma thesis is focused on IPv6 protocol implementation in real company´s enviroment. In the beginning we are introduced with theoretical knowledge about this protocol. After analysis of current state of XXX spol s r.o. we can use this knowledge in practical part of thesis for proposal of possible solutions including physical devices.
60

Polohová regulace motoru pomocí 8bit uP / Positional Motion Control by means of 8bit uP

Janda, Petr January 2010 (has links)
This thesis deals with positional control of DC motor Icla D065 of company SIG Positec Automation GmbH with aid of CAN-Bus and CANopen protocol. Individual parts describe general principle and standards of CAN-Bus and international normalized higher-level protocol CANopen for systems control. For control this motor was used microcontroller PIC18F4685 from company Microchip and developmental environment MPLAB® IDE. With used C language was made program for MCU control communication with a motor by support of CANopen protocol and its motion control. The result of this thesis will be used in solution of research project Intelligent Systems in Automation.

Page generated in 0.0401 seconds