Communication between devices should be based on predefined rules. These rules are called communication protocols. In this master thesis I am concerned with communication protocols, specially security protocols. Their design demand specialized tools, that will provide interactive simulations and security testing. I have described each of these tools in detail and mentioned about their properties, their pros and cons. In available tools I have implemented security protocols. The result is set of demonstration tasks that are usable in network courses at FIT VUT
Identifer | oai:union.ndltd.org:nusl.cz/oai:invenio.nusl.cz:237205 |
Date | January 2010 |
Creators | Mikuš, Peter |
Contributors | Trchalík, Roman, Očenášek, Pavel |
Publisher | Vysoké učení technické v Brně. Fakulta informačních technologií |
Source Sets | Czech ETDs |
Language | Czech |
Detected Language | English |
Type | info:eu-repo/semantics/masterThesis |
Rights | info:eu-repo/semantics/restrictedAccess |
Page generated in 0.0018 seconds