271 |
Optimization of Remote ServiceSolution for large installations : Wireless LAN and WAN for ABB RoboticsStenbom, Håkan January 2011 (has links)
This report describes a thesis work carried out at ABB Robotics in Västerås. The objective of this thesis is to find technologies and equipments for wireless data transfer suitable for the present and future needs of ABB Robotics Remote Service for large installations in industrial environments. ABB Robotics has a Remote Service solution to securely gather information from robots, manage alarms and potentially execute remote commands by ABB Robotics. This solution consists of an intelligent Service Box plugged to the robot. This Service Box is also connected through GPRS or directly through Internet to create a secure VPN connection to a central Remote Service server. The Remote Service Box is well suited for small customers with 1-10 robots with plug and play installation, but show limitations at a larger scale of deployment due to equipment costs, network and installation complexity. A new Service Box is planned that will accommodate future added functionality to Remote Service. This Service Box will require new network solutions as the added functionality is depending on a higher bandwidth than the GPRS networks can deliver. I have surveyed most existing wireless networking technologies and analyzed them withrespect to function, cost and availability which provide a knowledge base that makes it possible to find suitable solutions. When the most suitable technologies are identified a survey was performed to find equipments that meet the requirements at the lowest cost. A new hierarchical network topology is proposed that will lead to cost savings by replacing multiple WAN connections in the present solution with a network switch and single WAN connection to Internet. As manufacturers of network equipments for industrial environments are relatively few, alternative solutions were also investigated in order to find the most cost effective solutions. The proposed network topology together with the data from the surveys lead to recommendations on using Wi-Fi in the wireless LAN and a 3G mobile network for the WAN connection to Internet, as well as recommendations on alternative network equipments that potentially can lead to substantial savings when the new network solutions are implemented.
|
272 |
Automatizované pěstování rostlin / Automated Plant GrowingŠvancer, Jan January 2017 (has links)
This thesis combines two current trends - the Internet of Things and Urban Agriculture. It describes technologies for wireless sensors communication in smart homes and hardware for their implementation. Based on these technologies smart hardware for automatic plants growing is implemented and connected to cloud with remote access via iOS mobile application.
|
273 |
Minimalizace vlivu rušení na bezdrátovou síť / Minimizing the effect of interference on wireless networkDoležal, Jan January 2008 (has links)
This thesis is concerned the technology with technologies of transfer through wireless devices. It is about possibilities of optimization of transfer in wireless net, especially of the reduction of interference influence. The first part is about theory and the standards development of wireless technology. There are methods and principles used in wireless technologies. The second part is a practical measuring and testing of an internal wireless net, with the emphasis being on the source of interference influence. Measuring was focused on interference between access points and was not about meteorological influence. It continues with theory and testing of interference of the microwave oven in our wireless net. Then, it is a practical demonstration of interference in an external environment. There are practical examples of interference between different providers’ nets on the same area and solutions to prevent or to cancel this interference. In next part of work the wireless net is parsed and described in a given territory. Here is described the way how to precede the reciprocal interference and eventually how this mutual disturbance suppress. Consequently, our net is optimized for customer growth and for today’s options of newer and more powerful components for wireless transfer. Finally there are two laboratory tasks. The first one is about practical measuring and testing of wireless net’s parameters and the second one is about simulation of wireless networks in the Opnet program.
|
274 |
Řízení invalidního vozíku / Control of a wheelchairVožda, Ondřej January 2013 (has links)
This thesis describes development of control algorithm for a wheelchair. Wheelchair should be capable of tracking and following a wall or a similar flat surface. Thesis is supposed to be an extension of the previous concept, whose purpose was to allow remote telepresence control of this wheelchair. SRF08 ultrasonic range finders are used to measure distance from the wall. Furthermore, image processing for mark detection is discussed. Purpose of these marks is to increase precision during final phase of the parking.
|
275 |
Telemetrie pro formuli Dragon IV / Telemetry for Dragon IV FormulaBezdíček, Jan January 2014 (has links)
The aim of this master's thesis was to design and construct complete telemetry system for the student formula Dragon IV constructed for international Formula Student competition. At first, the work deals with the measurement of the physical quantities, telemetry system and automotive sensors of the formula, their mutual communication and communication with the CAN bus. It also describes the procedure of hardware design including choosing right inertial sensors and a GPS module and their using in telemetry system. The work contains materials for production of two-layer printed circuit board extending the microcomputer BeagleBone Black on the inertial sensors and the GPS module. The bigger part of the telemetry system is the firmware for hardware and software for the computer user. Both written in programming language C++ and C# are included in this work as well. This user application serves for wireless receiving data from the hardware and their showing and logging. In addition this user application can be used for wireless hardware configuration. The final product is the complete telemetry system and it is suitable for selling to end customer.
|
276 |
Teleprezenčně autonomní robot pro průzkum nepřístupných oblastí / Telepresence Autonomous Robot for Exploration of Unapproachable AreasKrkavec, Martin January 2010 (has links)
The subject of this master's thesis was to get familiar with a robot developed at the Department of Intelligent Systems of FIT VUT Brno. The goal of this work was to design and then implement hardware and software improvements of the robot so it could be capable of telepresence exploration of a narrow cave using remote control, including autonomous return back to the entrance. Also suggest possible extensions for a further improvement of the robot.
|
277 |
Vestavný systém s komunikačním rozhraním NFC a Wi-Fi / Embedded System with Communication Interface NFC and Wi-FiBugár, Loránt January 2016 (has links)
This master’s thesis deals with communication system design via the NFC and Wi-Fi interface. The thesis has two basic goals. The first goal is to create a device that is capable of storing of data and its subsequent transfer via the NFC interface. The second aim is to utilize this device for measuring various physical variables. The IoT technology is employed to fulfill the aforementioned goal. IoT technology is capable of visualizing data in real time and make them accessible via the Internet. The result of this work is an universal device, that contains the most popular communication interfaces, such as I2C, SPI and that is capable of processing measurement data from digital, analogue, and wireless sensors.
|
278 |
Inteligentní komponenty chytré domácnosti - SmartFlat / SmartFlat peripherialsChytil, Jiří January 2016 (has links)
The theme of this thesis is the design of peripheral devices of a smart home SmartFlat and the design of communication interface for this system. Designed units are the humidity and temperature measuring unit, the unit of security and the smart socket unit for remote control, power measurement and power control. All units are designed for wired communicaton and also for wireless communication with control unit.
|
279 |
Simmulating and prototyping software definednetworking (SDN) using Mininet approach to optimise host communication in realistic programmable networking environmentZulu, Lindinkosi Lethukuthula 11 1900 (has links)
In this project, two tests were performed. On the first test, Mininet-WiFi was used to simulate a
Software Defined Network to demonstrate Mininet-WiFi’ s ability to be used as the Software
Defined Network emulator which can also be integrated to the existing network using a Network
Virtualized Function (NVF). A typical organization’s computer network was simulated which
consisted of a website hosted on the LAMP (Linux, Apache, MySQL, PHP) virtual machine, and
an F5 application delivery controller (ADC) which provided load balancing of requests sent to the
web applications. A website page request was sent from the virtual stations inside Mininet-WiFi.
The request was received by the application delivery controller, which then used round robin
technique to send the request to one of the web servers on the LAMP virtual machine. The web
server then returned the requested website to the requesting virtual stations using the simulated
virtual network. The significance of these results is that it presents Mininet-WiFi as an emulator,
which can be integrated into a real programmable networking environment offering a portable,
cost effective and easily deployable testing network, which can be run on a single computer. These
results are also beneficial to modern network deployments as the live network devices can also
communicate with the testing environment for the data center, cloud and mobile provides.
On the second test, a Software Defined Network was created in Mininet using python script. An
external interface was added to enable communication with the network outside of Mininet. The
amazon web services elastic computing cloud was used to host an OpenDaylight controller. This
controller is used as a control plane device for the virtual switch within Mininet. In order to test
the network, a webserver hosted on the Emulated Virtual Environment – Next Generation (EVENG)
software is connected to Mininet. EVE-NG is the Emulated Virtual Environment for
networking. It provides tools to be able to model virtual devices and interconnect them with other
virtual or physical devices. The OpenDaylight controller was able to create the flows to facilitate
communication between the hosts in Mininet and the webserver in the real-life network. / Electrical and Mining Engineering
|
280 |
A Comprehensive Taxonomy of Attacks and Mitigations in IoT Wi-Fi Networks : physical and data-link layerAlmjamai, Sarmed January 2022 (has links)
The number of Internet of Things (IoT) devices is rising and Wireless Fidelity (Wi-Fi) networks are still widely used in IoT networks. Security protocols such as Wi-Fi Protected Access 2 (WPA2) are still in use in most Wi-Fi networks, but Wi-Fi Protected Access 3 (WPA3) is making its way as the new security standard. These security protocols are crucial in Wi-Fi networks with energy and memory-constrained devices because of adversaries that could breach confidentiality, integrity, and availability of networks through various attacks. Many research papers exist on single Wi-Fi attacks, and the strengths and weaknesses of security protocols and Wi-Fi standards. This thesis aims to provide a detailed overview of Wi-Fi attacks and corresponding mitigation techniques against IoT Wi-Fi networks in a comprehensive taxonomy. In addition tools are mentioned for each Wi-Fi attack that allows, e.g., professionals or network administrators to test the chosen Wi-Fi attacks against their IoT networks. Four types of attack (categories) were defined, Man-in-the-Middle (MitM), Key-recovery, Traffic Decryption, and Denial of Service (DoS) attacks. A set of Wi-Fi attack features were defined and decribed. The features included the security protocol and security mode, the layer (physical or data-link) that an attack targets, and the network component interaction required to allow a Wi-Fi attack to execute successfully. In total, 20 Wi-Fi attacks were selected with relevance to IoT in Wi-Fi networks based on some criteria. Additonally, each Wi-Fi attack consist of a description of possible consequences/results an adversary can achieve, such as eavesdropping, data theft, key recovery, and many more. Flow charts were also added to give the reader a visual perspective on how an attack works. As a result, tables were created for each relevant security protocol and the Open Systems Interconnection (OSI) layers to create a overview of mitigations and available tools for each attack. Furthermore, WPA3 was discussed on how it solves some shortcomings of WPA2 but has vulnerabilities of it own that lie in the design of the 4-way and dragonfly handshake itself. In conclusion, development and proper vulnerability tests on the Wi-Fi standards and security protocols have to be conducted to improve and reduce the possibility of current and upcoming vulnerabilities.
|
Page generated in 0.0733 seconds