National Repository of Grey Literature 44 records found  previous11 - 20nextend  jump to record: Search took 0.00 seconds. 
Autonomous vehicle convoy control system architecture based on ROS framework
Buchta, Hynek ; Růžička, Michal (referee) ; Věchet, Stanislav (advisor)
This thesis deals with the problematics of designing control system for convoy of autonomous vehicles using software tools offered as part of the ROS framework, which must take into account possible future implementations of various types of sensors. Designed system is realized on a single-board computer Pi 3 platform, the Raspberry company product. The main input sense is camera stream connected via USB interface. Another important part of the system is a wireless network module allowing communication between vehicles in the convoy as well as remote access to each of them. The engines are directly controlled by a mbed LPC1768 microcontroller communicating through serial link.
Laboratory scenarios describing DNS system
Sakala, Peter ; Langhammer, Lukáš (referee) ; Jeřábek, Jan (advisor)
The master’s thesis deals with Domain Name System (DNS) and its practical use. It describes hierarchy of domain names, resource record types, protocol used, as well as DNSSEC extension. The most utilized implementations of authoritative and recursive DNS servers are presented. Virtualization, containers and other tools with potential use in labs are described. Two lab scenarios in virtualized environment with instructions for students were designed and developed in this thesis.
Design and realization of navigation system for mobile robot Bender II
Venc, Luboš ; Růžička, Michal (referee) ; Věchet, Stanislav (advisor)
This project is a guide to the navigation system realization, which is designed for a navigation inside of a building. Because of already existing libraries for the work with laser scanners, and prepared navigation package, the robotic operation system, ROS, had been selected. Therefore, the main sensor for a space orientation is the laser scanner SICK LMS2xx.
Technology for comprehensive support of multimedia services in heterogeneous networks
Dosoudil, Petr ; Krkoš, Radko (referee) ; Novotný, Vít (advisor)
The theses explains the Evolution Packet System (EPS) and subsystem IP Multimedia Subsystem (IMS). It also informs how these systems cooperate and through which interfaces the main data and signals between these two technologies are transfered. The thesis includes practical section, in which installation and configuration of sections of the IMS system including its "core", and application and medial server. For verification of the functionality of the system, two dissimilar clients are installed, and emulator WAN is applied for simulation of Internet. The product of the theses is the design of the laboratory exercise drafted in such a way that it can be solved by students less knowledgeable of the issues.
Wireless communication analysis using software defined radio
Štrajt, Martin ; Štůsek, Martin (referee) ; Pokorný, Jiří (advisor)
The work deals with the use of software-defined radio as a probe for monitoring the operation of wireless communication according to the IEEE 802.11a/g standard. In the theoretical introduction, the concept of software-defined radio as a hardware device with software programmable circuits enabling the transmission or reception of signals in theoretically any frequency band is introduced. The introduction also contains adescription of selected devices and the IEEE 802.11 protocol with its most used additionsand modulations. In the first part of the practical part of the work, wireless communication is capturedusing a wireless network card in monitoring mode. The intercepted communication was decrypted and this decrypted traffic was compared with the data captured by the probe within the network. These results then served as acomparative basis for software-defined radio capturing. The focus of this work is to verify the capabilities of software-defined radio and its use for sniffing wireless communicationin the frequency band 2.4 GHz and 5 GHz. The attempt to use a software-defined radio here results from the scalability and adaptability that a wireless card cannot offer due to fixed hardware parameters. LimeSDR mini, LimeSDR and bladeRF 2.0 devices were used for capture. First, the configuration of the operating system, the installation of drivers and programs for control and work with selected devices are described. After verifying the functionality of the software-defined radio, a model of a signal decoder with the parameters of the IEEE 802.11g standard captured from the radio spectrum was put into operation. Finally, the data streams captured by the software-defined radio and the wireless network card were compared side by side. The results showed that the software-defined radio in the used configuration captures only a part of the total volume of transmitted frames.
Laboratory exercises explaining the principles of network technologies and protocols
Hricko, Tomáš ; Jeřábek, Jan (referee) ; Langhammer, Lukáš (advisor)
The aim of this diploma thesis is to create two exercises for students. The first exercise is concerned with comparison of transport protocols TCP and UDP. The second exercise is concerned with comparison of routing protocols OSPF and RIP. The first part describes used simulation environment. The next part describes the operating system used in routers. The following part describes the procedure of installing virtual machines. The next part consists of theory of protocols TCP, UDP, OSPF and RIP. The last two chapters are the laboratory exercises.
Secure Remote Computer Management System
Heško, Peter ; Hranický, Radek (referee) ; Polčák, Libor (advisor)
Deployment and management of remote systems poses several problems. Their administration and monitoring is much faster and more cost-effective when done remotely than when physical access to the system is required. Software that allows this is in many cases not freely available or has limited functionality. In this work I deal with the analysis of available solutions and then design and implementation of an application that combines all the required features. The result is software that provides secure access to and monitoring of remote computers running Ubuntu 16.04.
Applied automation between security network components in operational networks
Škoda, Jakub ; Benedikt, Jan (referee) ; Kubánková, Anna (advisor)
Tato práce se zabývá studiem možností automatizace v síťové bezpečnosti. Identifikuje konkrétní manuální pracovní postup a navrhne možnosti, jak tento pracovní postup zautomatizovat a tím nahradit zastaralý manuální postup. V novém automatizovaném pracovním postupu byly použity nástroje Cisco Umbrella pro hlášení a hodnocení DNS pro koncová zařízení. Tyto nástroje byly použity k vytvoření nové bezpečnostní metriky – chování. Chování koncového bodu se pak použije u vybraného případu použití vzdáleného přístupu VPN. Namísto použití compliance kontroly před navázáním připojení VPN, se použije chování koncového bodu.
GNU/Linux Administration Tool for Attached Display Devices
Klang, Petr ; Procházka, Boris (referee) ; Kněžík, Jan (advisor)
The aim of this thesis is to create an application for monitor administration in GNU/Linux system which would be able to save the set configuration and recall that setting later. When a new monitor is connected, the application evaluates all configurations and chooses the most convenient one. The application is run after the screen manager has been started. The thesis is also concerned with the selection of suitable tools, description of implementation, and testing.
Security of Linux OS
Polách, Milan ; Vychodil, Petr (referee) ; Vymazal, Michal (advisor)
This thesis is focused on the possibility of better networking security operating system GNU/Linux with an appropriate set of rules Netfilter. There was established a program to allow easy configuration of rules for IP Address versions 4 and 6. This program not only allows to set individual rules, but also interfere with the newly required service and decide, how it will be further worked with. The first is the theoretical part describes the network communication with the model TCP/IP, the following is the introduction of Netfilter and outlining the local security. The practical part describes the various technologies and methods used for programming. The result of this work is easy to use program to set firewall rules for IP Address versions 6 with the possibility of deciding on the new established network traffic. The program is designed for new users of the operating system, who want to better secure their computer without the knowledge of Netfilter.

National Repository of Grey Literature : 44 records found   previous11 - 20nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.