Coverage Problem in Mobile Robotics
Visual SLAM - An Introduction
Simulataneous Localization and Mapping - An Introduction
Motion Planning in Robotics
Sampling-based Motion Planning
SSH or secured shell is a network protocol to communicate between multiple machines securely. Any system administration service, data transfer and control operation can be performed over SSH. The access through a command-line interface to another machine's shell (I use bash on Ubuntu) is the most general mode of interaction. It is a secure channel that commnunicates using a client-server architecture. The default TCP port used is 22 but others can also be used.
This article is a location to aggregate all the methods commonly used for shell access, SSH-key deployment for repositories and account, SSH-tunneling, file transfer over SSH and using SSH in VS Code IDE for software development on other machines on the local network. All discussions in this article are made for SSH protocol version 2.
The home/user/.ssh. folder in Linux machines stores all the important configurations and security keys. The most common files configuration files are config, authorized_keys and known_hosts.
SSH Command Line Access
SSH command line access is the simplest method for machines to communiate. Common SSH client software include Putty (Windows & Linux), OpenSSH (I used this on Ubuntu), WinSCP (Windows) and CyberDuck (Mac) among others. The basic commands for command-line access are:
ssh <machine_username>@<machine_ip_address>
ssh <machine_username>@<machine_ip_address> -p <port_number>
ssh <machine_username>@<machine_ip_address> -i <identity_file>
Handling SSH Keys
SSH keys are primarily public and private keys with the default names id_rsa and id_rsa.pub. These keys are responsible for establishment of the identity and and credentials of the machine.
The basic commands to manage SSH keys are:
ssh-keygen
ssh-keygen -t <rsa | dsa | ecdsa | ed25519> -b <number bits>
ssh-keygen -f <filename>
ssh-keygen -f <filename>
GRAPHS
MATRICES
Matrices in Robotics
STACK
Stacks in Robotics
When a Depth-First Search is implemented, the children of the node being explored are all pushed into a stack and popped when explored.
MORE ABOUT USE OF STACKS.
QUEUE
IF YOU LIKED THE ARTICLE, DON'T FORGET TO LEAVE A REACTION OR A COMMENT!