A PROTOCOL DATA UNIT FOR TRAINING SIMULATED COMMAND FORCES

Size: px
Start display at page:

Download "A PROTOCOL DATA UNIT FOR TRAINING SIMULATED COMMAND FORCES"

Transcription

1 A PROTOCOL DATA UNIT FOR TRAINING SIMULATED COMMAND FORCES Kenneth E. Frosch, Elizabeth L. White, J. Mark Pullen C 3 I Center and Department of Computer Science George Mason University 4400 University Drive Fairfax, VA kfrosch@cne.gmu.edu KEYWORDS Protocol Data Unit, Command Forces, Knowledge Acquisition ABSTRACT The emergence of command forces (CFORs) as a simulated entity within a DIS simulation requires effective interfaces between existing learning systems and simulation applications. Existing methods utilize programmers and knowledge engineers to encode the knowledge of a subject matter expert (SME) into a knowledge base. However, there are no interfaces that integrate existing learning systems with a DIS application that would provide effective and efficient knowledge acquisition by allowing the SME to directly instruct the learning system. We have integrated Disciple, a machine learning system, with ModSAF to provide this direct interface for the SME. This integration extends the familiar graphical interface of ModSAF to include the tools necessary for the SME to instruct an agent through demonstration. A new experimental PDU was developed to provide the communication mechanism and common data format for the two applications to communicate. An overview of this integration, the design issues and architecture of the interface, and the format and protocol of the new PDU are discussed in this paper. 1.0 INTRODUCTION As CGF technology has advanced sufficiently to allow CFORs[4] to be created and deployed in a simulation, learning and knowledge acquisition have become critical issues. The high degree of human behavior that the CFOR must represent increases these needs. While a lot of work is currently being performed in the area of learning and human behavior for CGF, it has been found to be very difficult to interface these learning systems to existing DIS applications. Individually, however, learning systems and simulation applications are readily extensible. While existing approaches use knowledge engineers to encode the expertise of an SME, our approach utilizes a common simulation interface to build and adapt a suitable knowledge base through teaching by demonstration.[2] This method involves a SME that interfaces directly with the CFOR agent in order to instruct it, without the intervention of a knowledge engineer. This allows the instructor to use an interface that is familiar and the same techniques to teach the computerized agent as he/she would for a human student. The emphasis for this approach is on apprenticeship learning rather than knowledge acquisition. Apprenticeship learning adapts knowledge that has already been given or learned to increase the knowledge base. Our system, Virtual Commander (VCDR), is an interface between an apprenticeship learning system, Disciple, and ModSAF, a DIS application. The combined system, pictured in Figure 1, presents an efficient manner for teaching complex behavior to an agent through demonstration. The VCDR approach provides a rich interaction between the SME and the agent, which is necessary to create more powerful agents required for CFORs. The SME uses the GUI interface of ModSAF enhanced with a teaching interface as a front-end for the Disciple learning system.

2 Workstation A Workstation B Subject Matter Expert ModSAF Agent Libraries Editor Libraries Agent-Disciple Problem Solving Functions Learning Functions Interface Libraries Interface Functions Figure 1: Virtual Commander Design This interface between Disciple and ModSAF was implemented using an experimental PDU. The PDU provides the communications mechanism and the data format necessary to have the application communicate effectively in a distributed fashion. This paper describes the development of this PDU and the protocol used between the two applications. Section 2.0 begins by giving an overview of the design and architecture of Virtual Commander. In Section 3.0, the requirements for the Virtual Commander interface and the PDU are discussed. The format and protocol of the VCDR PDU are detailed in Section 4.0. Finally, an example of the interaction of ModSAF and Disciple using the new PDU is given in Section VIRTUAL COMMANDER The Virtual Commander system is an approach to solving the problem of knowledge acquisition for CFORs. VCDR is an instructable agent which utilizes programming by demonstration[5] and machine learning techniques to allow a SME to teach an agent. Programming by demonstration systems give an end user the ability to create programs by demonstrating their action. The implementation of Virtual Commander is an interface between ModSAF and Disciple[6]. Disciple is a machine learning system written in Lisp that runs on a typical Unix workstation. It employs multistrategy learning, combining explanation-based, analogical, and example-based methods with knowledge acquisition to learn from an SME. Figure 1 depicts the design and architecture of Virtual Commander. The system consists of several major components residing on distributed workstations. These parts include ModSAF, libdisciple, SME editors, Disciple, a DIS front-end, and the VCDR API. Since Disciple is written in Lisp strictly for learning purposes, it did not have the capability to send or receive network traffic. Using the foreign function interface of Lisp, a DIS front-end was written in C that implemented a network interface to handle DIS PDUs. An API was developed on top of the foreign function interface for Disciple to access the functions in the DIS front-end. For ModSAF, a series of GUI editors were created for the SME to use as an interface to instruct Disciple. The appropriate data is then passed through the new libdisciple library and transported in the VCDR PDU. Responses from Disciple are caught by ModSAF and passed to the appropriate Network VCDR Editor libdisciple ModSAF DIS PDUs Disciple VCDR API DIS Front-end DIS PDUs Figure 1: Virtual Commander Architecture

3 PDU handler in libdisciple, which would update the editors for the SME or instantiate entities and represent them on the plan view display (PVD). 3.0 INTERFACE DESIGN ISSUES AND PDU REQUIREMENTS The method to be chosen as an interface between this DIS application and learning system was determined based on the analysis of several important factors.[7] Our design and implementation is driven by three significant factors: real-time performance, data representation, and control of the learning cycle. The initial concern addressed in this implementation was the difficulty of integrating an application that relies on real-time delivery of data (ModSAF) and one that does not (Disciple). The performance or latency issue was important since ModSAF, a DIS application, typically requires real-time transmission of data. The ModSAF/Disciple interface does not require this type of service, however. In fact, due to the algorithms involved in the various learning phases of Disciple, it would be difficult to achieve real-time response from Disciple. Therefore, the concern about realtime performance is how to construct a non-real-time communication that does not cause perceptible delay in ModSAF. Due to the fact that both applications are computationally intensive it made sense to distribute their execution across multiple machines. This introduces the need to either develop a proprietary protocol or use an existing standard protocol. Using DIS PDUs as the communications mechanism between ModSAF and Disciple is effective for several reasons. First of all, it makes use of the existing communications functions within ModSAF. By doing so, the processing of the VCDR PDUs is handled in the same way as other existing PDUs. To do this a definition of the PDU structure was added to ModSAF s libpduapi library and callback function was registered that would pass the VCDR PDUs to the proper function for processing.[3] Using these functions from ModSAF provides a seamless integration of the new PDU. It permits ModSAF to execute non-blocking network operations to Disciple and allows it to continue operation without noticeable interruption. A client-server Remote Procedure Call (RPC) would not provide this. A second issue was the format in which the data would be communicated between the applications. While ModSAF stores its data in a Persistent Object (PO) database, Disciple represents its data in the form of a semantic network. In order for the two systems to communicate, a common format was constructed as the VCDR PDU. The message within the PDU is data extracted from either the PO database or from Disciple s semantic network. The experimental PDU format was developed and introduced into ModSAF. By utilizing DIS PDUs to perform the messaging for the VCDR system, we can use a messaging infrastructure already established for DIS. The final issue was the need to move the control interface from Disciple to ModSAF. Originally, the steps taken by the SME to teach Disciple were selected from a menu presented by the Disciple software in Lisp, based on which phase of the learning process was being executed. When introducing the GUI editor into ModSAF, the control mechanism was transferred to ModSAF. A new library, libdisciple, was built into ModSAF to implement the control features needed. The resulting interface is much more natural to its intended user. The interaction of the SME with Disciple is governed by a protocol that is based on the different phases of the learning by demonstration cycle. 4.0 VCDR PDU FORMAT AND PROTOCOL The PDU resulting from the requirements discussed above is pictured in Table 1. This is the format as it is defined in ModSAF. In this section, the format and function of the PDU and its functions are described The DIS 2.03 header that is at the beginning of the VCDR PDU contains elements such as version number and PDU kind. The PDU kind is a number associated with each DIS PDU. For example, the entity state PDU (ESPDU) has a PDU kind of 1. For Description Size (bits) DIS 2.03 header 96 Message ID 32 Fragment number 32 Learning phase 32 Message type 32 Message length 32 Message 8*length Table 1: Virtual Commander Experimental DIS 2.03 PDU Format

4 the VCDR PDU an arbitrary number was chosen, 172. This number is used to reference the PDU format within the libpduapi database. The fields of primary interest in the PDU are the message, message type, and learning phase. All data sent between ModSAF and Disciple is composed in the message field as an ASCII string. This string forms the common data format shared by the two applications. The message length field simply denotes how long the message is. Depending on the action performed by the SME messages may contain examples, variables, explanation, or rules. The combination of message type and learning phase fields specifies what the contents of the message field represent. The contents of the phase and type fields of the VCDR PDU describe the request-reply protocol used to implement control of the learning process. Table 2 shows these values which govern the interaction between Disciple and ModSAF. The phases correspond to separate functions within the learning by demonstration process. The message type further describes the PDU and is used to trigger a response in the learning functions of Disciple. Evennumbered types indicate a message originating from ModSAF sent to Disciple, while odd-numbered types denote Disciple sending a message to ModSAF. Some of the types simply represent acknowledgment that the previous PDU was received. Typically, though, a response from Disciple implicitly is an acknowledgment of the prior request. Their is also a need to denote negative acknowledgments, NAKs, when a message missing. Adding this functionality to the interface is currently under development. In this case, the message type field will contain a negative value. A message is recognized as missing when two messages are received when their message IDs are not consecutive. When this occurs the last message will be dropped and a NAK sent to the sender with the missing message ID. The sender will resume sending packets beginning with the missing message. To avoid the re-execution of duplicate requests by Disciple the protocol will adhere to an at most once semantic. In other words, both applications will be ensured that Disciple will fulfill the request only once, or if an error occurs, then not at all. The message ID, in conjunction with the fragment number field, is also used in the fragmentation and assembly of VCDR PDUs that contain large Specification of Initial Scenario Phases Phase 0 - Give Initial Example Type 0 - Select Example Template Type 1 - Send Acknowledgement of Template Type 2 - Select Initial Example Type 3 - Send Acknowledgement of Initial Example Phase 1 - Give Initial Explanations Type 0 - Select Variable to Generate Explanations from Type 1 - Send List of Explanations Type 2 - Select Explanation(s) Type 3 - Send Acknowledgement of Explanations Phase 2 - Quit Initial Signal Phases Type 0 - Quit Specification of initial Type 1 - Send Acknowledgement of Quit Learning through Experimentation Phases Phase 3 - Experimentation Search Parameters Type 0 - Select Variable(s) to Fix Type 1 - Send Acknowledgement Fixed Type Quit Search Phase Type Send Acknowledgement of Quit Phase 4 - Generate Experimentation Example Type 0 - Request Example to be Generated Type 1 - Send Example Phase 5 - Give Experimentation Example Type 0 - Specify Example Type 0 - Send Acknowledgement of Example Phase 6 - Classify Experimentation Example Type 0 - Classify Example Type 1 - Send Acknowledgement of Classification Phase 7 - Explain Mistake in Experimentation Type 0 - Select Variable to Generate Explanations from Type 1 - Send List of Explanations Type 2 - Select Explanation(s) Type 3 - Send Acknowledgement of Explanations Type 4 - Select Variable to Blame Type 5 - Send Acknowledgement Type Quit Explanation Phase Type Send Acknowledgement Phase 8 - Quit Experimentation Signal Phases Type 0 - Quit Experimentation Type 1 - Send Acknowledgement of Quit Table 2: Virtual Commander Learning by Demonstration Protocol

5 typedef struct vcdr_pdu { uint32 msg_id; uint32 fn; VCDR_PHASE phase; int32 type; uint32 msg_length; char message[max_length]; } VCDRPDU; Table 3: C-style Header for VCDR PDU messages. Since the strings shared between Disciple and ModSAF may be very long, it may need to be broken into several parts before sending, and then reassembled after receiving them. In ModSAF, there is a global variable that represents the largest PDU size, pa_mtu. If a VCDR PDU is larger than that value, the message field is segmented into separate PDUs. The message ID will remain the same for each PDU of a message fragment, but the fragment number will be incremented for each. A sentinel value is used in the fragment number field to represent that is the last PDU, or the only one, for a given message. The corresponding ANSI C structure that is used to manipulate the PDU contents is shown in Table 3. For this prototype, 32-bit integers are used for all numeric fields. However, for most of those fields msg_id, fn, type, and msg_length 32 bits is not necessary. The VCDR_PHASE enumerated type is a definition of the values used in the phase field that correspond to the phases described in Table VCDR PDU EXAMPLE With Virtual Commander, an SME teaches an agent through the ModSAF GUI. The actions taken by the SME are transported to the Disciple learning system via the newly defined VCDR PDU. To illustrate the interaction of the SME and the Virtual Commander system as well as the underlying protocol of the VCDR PDU an example teaching session is given in this section. Figure 2 gives a detailed representation of this request-reply conversation highlighting the use of the phase and type fields as well as how the negative acknowledgment is used to recover from lost messages. To begin the learning process, the SME demonstrates to the VCDR agent how to perform a new task or carry out a new mission. Using the existing unit and task editors within ModSAF as the SME normally would to create a sequence of tasks, the SME programs the agent. This created task is given as the initial example of the mission to the learning system. The libdisciple library then extracts from the PO database of ModSAF the data relevant to the mission. This data is stored as an ASCII string and transported to Disciple in the message field of the VCDR PDU. The corresponding phase and message type is 0 and 2, respectively. After processing this message, Disciple will then respond with a list of variables that it generated from the mission. The variables may refer to things such as companies, areas of responsibility, or other aspects of the mission. This response also serves as an implicit acknowledgment of the request. In all responses from Disciple it will use the same message ID as the incoming request. Likewise, the phase value is the same as well. The message type field will be set to 3 for this response. The teaching process continues by the SME explaining the important features of the mission. The SME does so by repeatedly selecting variables for which Disciple will generate a list of explanations. The corresponding phase and field values for the SME request to select variables are 1 and 0. Disciple will then respond with a list of explanations about that variable using the same phase but a type of 1. From the received list of explanations, the SME will select those which are relevant for the mission. A VCDR PDU is sent with this input, a phase of 1, and a type of 2, to Disciple. Disciple processes that input and returns an explicit acknowledgment. At this point the SME may continue the explanation process by selecting addition variables or send a quit message to signal Disciple that the specification phase is complete. The phase for the quit signal is 2 with the types for the ModSAF message and the Disciple acknowledgment being 0 and 1, respectively. The learning through experimentation phases (3-8) continue using the phase and type fields in the same manner. In these phases, the learning system may be asked by the SME to attempt to perform the same mission on a different terrain perhaps. For each computer generated solution, the SME is asked to evaluate and classify it as correct or incorrect. Using the ModSAF GUI, the SME can correct the agent if it does not perform the mission appropriately. The

6 Msg 1, Phase 1, Type 0 ModSAF Disciple Msg 0, Phase 0, Type 2 Time Msg 0, Phase 0, Type 3 Message Lost Next input from SME, but no response yet from Disciple Msg 1, Phase 1, Type NAK Msg 1, Phase 1, Type 1 Resends lost message Figure 2: Protocol Interaction Between Applications SME does so by again selecting variables and explanations as to why the solution was incorrect. These explanations are incorporated by Disciple to refine the plausible version space for valid solution. After the teaching session is complete, the VCDR agent will have learned how to perform this type of mission. The learning system will have created a rule specifying how to select tasks and assign task parameters for this mission. The learning system will then be able to perform the learned mission when asked by the SME, without the SME programming the behavior. In the case where a message is lost, the receiving application will use a NAK to signal the sending application to resend the missing packet. In Figure 2, a message containing a list of explanations, in response to a selected variable from the SME, from Disciple has been lost, possibly due to a network problem. In the meantime the SME may have already input the next action to the learning system. In this instance, ModSAF will send a NAK for the retransmission of that missing message. Disciple will then reissue the last response again without reexecuting the operation, adhering to the at-mostonce policy. 6.0 SUMMARY To represent more complex human behaviors in DIS simulations, it is well known that effective learning and knowledge acquisition will be necessary. In addition, the ability for a SME to directly build this knowledge base without the need for a knowledge engineer to translate the information into the system is a effective method. The Virtual Commander Protocol Data Unit provides the interprocess communication mechanism for learning system to interoperate with a DIS application. Extensions to ModSAF provide a familiar interface for the SME to instruct the learning system efficiently. Although this interface presents a communication method using DIS PDUs, this combination of Disciple and ModSAF could use the High Level Architecture's Run-Time Infrastructure. The goal of the RTI is to provide services to create interoperable components such as DIS applications and C 4 I systems. In any case the need for knowledge acquisition for intelligent agents will require an

7 integration of a learning system to the DIS simulation. A direct interface for an SME, like the VCDR PDU, presents an effective solution for this interface. 7.0 ACKNOWLEDGMENT This research was conducted in the Center for Excellence in Command, Control, Communications and Intelligence and the Computer Science Department at George Mason University. The authors wish to thank Dr. Michael Hieb, currently with SAIC, for his support and assistance with Disciple. 8.0 REFERENCES [1] Cypher, A. (Ed.), "Watch What I Do: Programming by Demonstration," MIT Press, Cambridge, MA, [2] Hieb, M.R., Tecuci, G., Pullen, J.M. (1996). Virtual Commander An Instructable ModSAF Agent, 6 th Conference on Computer Generated Forces and Behavioral Representation. [3] Loral Advanced Distributed Simulation (1995). ModSAF 2.0 Developer s Kit. [4] Salisbury, M.R., Booker, L.B., Seidel, D.W. and Dahmann, J.S., Implementation of Command Forces (CFOR) Simulation, 5 th Conference on Computer Generated Forces and Behavioral Representation, [5] Tambe, M., Johnson, W. L., Jones, R.M., Koss, F., Laird, J.E, Rosenbloom, P.S., and Schwamb, K., Intelligent Agents for Interactive Simulation Environments. AI Magazine, 16(1), Spring, [6] Tecuci, G., "DISCPLE: A Theory, Methodology, and System for Learning Expert Knowledge," Ph.D. Thesis, University of Paris South. [7] White, E.L., Frosch, K.E., Laviano, V.P., Hieb, M.R., Pullen, J.M. (1996), Interfacing External Decision Processes to DIS Applications, 6 th Conference on Computer Generated Forces and Behavioral Representation. 9.0 ABOUT THE AUTHORS Ken Frosch is a Graduate Research Assistant in the C 3 I Center at George Mason University. He is currently on leave of absence from Lockheed Martin Federal Systems where he has been a Systems Engineer since He received his B.S. in Computer Science and Mathematics from the University of Wisconsin - Madison in Elizabeth White is an Assistant Professor of Computer Science at GMU. She received M.S. and Ph.D. degrees in Computer Science from the University of Maryland in 1990 and 1996, respectively, and a B.S. degree from the College of William and Mary in J. Mark Pullen is Associate Professor of Computer Science and member of the C 3 I Center at GMU. Dr. Pullen was with the Defense Advanced Research Projects Agency (DARPA) from 1986 to 1992, where he was Program Manager for Advanced Computing, Networking and Distributed Simulation.

APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE

APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE William Stallings F.1 TCP/IP LAYERS... 2 F.2 TCP AND UDP... 4 F.3 OPERATION OF TCP/IP... 6 F.4 TCP/IP APPLICATIONS... 10 Copyright 2014 Supplement to Computer

More information

Unit-II Programming and Problem Solving (BE1/4 CSE-2)

Unit-II Programming and Problem Solving (BE1/4 CSE-2) Unit-II Programming and Problem Solving (BE1/4 CSE-2) Problem Solving: Algorithm: It is a part of the plan for the computer program. An algorithm is an effective procedure for solving a problem in a finite

More information

Performance Issues for the Light-Weight RTI

Performance Issues for the Light-Weight RTI Performance Issues for the Light-Weight RTI J. Mark Pullen and Nagesh Kakarlamudi Department of Computer Science and C 3 I Center George Mason University Fairfax, VA 030 {mpullen,nkakarla}@gmu.edu Keywords:

More information

RTI Performance on Shared Memory and Message Passing Architectures

RTI Performance on Shared Memory and Message Passing Architectures RTI Performance on Shared Memory and Message Passing Architectures Steve L. Ferenci Richard Fujimoto, PhD College Of Computing Georgia Institute of Technology Atlanta, GA 3332-28 {ferenci,fujimoto}@cc.gatech.edu

More information

IP Mobility vs. Session Mobility

IP Mobility vs. Session Mobility IP Mobility vs. Session Mobility Securing wireless communication is a formidable task, something that many companies are rapidly learning the hard way. IP level solutions become extremely cumbersome when

More information

Category: Informational MITRE Corporation M. Pullen George Mason University August 1994

Category: Informational MITRE Corporation M. Pullen George Mason University August 1994 Network Working Group Request for Comments: 1667 Category: Informational S. Symington D. Wood M. Pullen George Mason University August 1994 Status of this Memo Modeling and Simulation Requirements for

More information

ANSI E Architecture for Control Networks Device Management Protocol Entertainment Services and Technology Association Abstract

ANSI E Architecture for Control Networks Device Management Protocol  Entertainment Services and Technology Association Abstract ANSI E1.17-2006 Architecture for Control Networks Device Management Protocol This document forms part of ANSI E1.17-2006, Entertainment Technology - Architecture for Control Networks, which was approved

More information

An Architecture for Web-Services Based Interest Management in Real Time Distributed Simulation

An Architecture for Web-Services Based Interest Management in Real Time Distributed Simulation An Architecture for Web-Services Based Interest Management in Real Time Distributed Simulation Mark Pullen and Priscilla McAndrews George Mason University C3I Center Katherine Morse and Ryan Brunton SAIC

More information

Internetworking Models The OSI Reference Model

Internetworking Models The OSI Reference Model Internetworking Models When networks first came into being, computers could typically communicate only with computers from the same manufacturer. In the late 1970s, the Open Systems Interconnection (OSI)

More information

The Transport Layer. Part 1

The Transport Layer. Part 1 The Transport Layer Part 1 2 OVERVIEW Part 1 User Datagram Protocol Transmission Control Protocol ARQ protocols Part 2 TCP congestion control Mowgli XTP SCTP WAP 3 Transport Layer Protocols Connect applications

More information

CS-461 Internetworking. Dr. Mohamed Aboutabl

CS-461 Internetworking. Dr. Mohamed Aboutabl CS-461 Internetworking Dr. Mohamed Aboutabl http://www.cs.jmu.edu/users/aboutams The McGraw-Hill Companies, Inc., 2000 1 Chapter 1 Introduction The McGraw-Hill Companies, Inc., 2000 2 Internet today Network

More information

Content Management for the Defense Intelligence Enterprise

Content Management for the Defense Intelligence Enterprise Gilbane Beacon Guidance on Content Strategies, Practices and Technologies Content Management for the Defense Intelligence Enterprise How XML and the Digital Production Process Transform Information Sharing

More information

Textbook Charles Petzold, Programming Windows, 5th edition, Microsoft Press. References - other textbooks or materials none

Textbook Charles Petzold, Programming Windows, 5th edition, Microsoft Press. References - other textbooks or materials none CS351 Systems Programming Last Updated - 03/01/02 Course Manager Dr. Phil Dickens, Assistant Professor 3 credit hours; required for CS & CPE; 100 min. lecture & 100 min. lab each week Current Catalog Description

More information

An Intelligent Tutoring System Prototype for Learning to Program Java TM

An Intelligent Tutoring System Prototype for Learning to Program Java TM An Intelligent Tutoring System Prototype for Learning to Program Java TM Edward R. Sykes School of Computing and Information Management, Sheridan College 430 Trafalgar Road, Oakville, Ont., Canada, L6H

More information

Sequence Number. Acknowledgment Number. Data

Sequence Number. Acknowledgment Number. Data CS 455 TCP, Page 1 Transport Layer, Part II Transmission Control Protocol These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make

More information

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications Data and Computer Communications Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based s 1 Need For Protocol Architecture data exchange can involve complex procedures better if task broken into subtasks

More information

Computer Networks. Introduction to Network. Dr. Adel Gaafar Abd Elrahim

Computer Networks. Introduction to Network. Dr. Adel Gaafar Abd Elrahim Computer Networks Introduction to Network Dr. Adel Gaafar Abd Elrahim A Communications Model Source generates data to be transmitted Transmitter Converts data into transmittable signals Transmission System

More information

UNIT IV -- TRANSPORT LAYER

UNIT IV -- TRANSPORT LAYER UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission

More information

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Network Models The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding and developing computer-to-computer communication

More information

ELEN Network Fundamentals Lecture 15

ELEN Network Fundamentals Lecture 15 ELEN 4017 Network Fundamentals Lecture 15 Purpose of lecture Chapter 3: Transport Layer Reliable data transfer Developing a reliable protocol Reliability implies: No data is corrupted (flipped bits) Data

More information

A Protocol Independent Compression Algorithm (PICA)

A Protocol Independent Compression Algorithm (PICA) A Protocol Independent Compression Algorithm (PICA) Daniel J. Van Hook (dvanhook@ll.mit.edu) James O. Calvin (jcalvin@ll.mit.edu) Dr. Duncan C. Miller (dmiller@ll.mit.edu) MIT Lincoln Laboratory 244 Wood

More information

Basic Protocols and Error Control Mechanisms

Basic Protocols and Error Control Mechanisms Basic Protocols and Error Control Mechanisms Nicola Dragoni Embedded Systems Engineering DTU Compute ACK/NACK Protocol Polling Protocol PAR Protocol Exchange of State Information Two-Way Handshake Protocol

More information

Subnet Multicast for Delivery of One-to-Many Multicast Applications

Subnet Multicast for Delivery of One-to-Many Multicast Applications Subnet Multicast for Delivery of One-to-Many Multicast Applications We propose a new delivery scheme for one-to-many multicast applications such as webcasting service used for the web-based broadcasting

More information

The Joint Live Virtual Constructive Data Translator Framework Interoperability for a Seamless Joint Training Environment

The Joint Live Virtual Constructive Data Translator Framework Interoperability for a Seamless Joint Training Environment Framework Interoperability for a Seamless Joint Training Environment Warren Bizub Technical Division Chief US Joint Forces Command Joint Warfighting Center warren.bizub@jfcom.mil Derek Bryan Experimentation

More information

3. Quality of Service

3. Quality of Service 3. Quality of Service Usage Applications Learning & Teaching Design User Interfaces Services Content Process ing Security... Documents Synchronization Group Communi cations Systems Databases Programming

More information

Network Working Group. Category: Standards Track March 2001

Network Working Group. Category: Standards Track March 2001 Network Working Group M. Rose Request For Comments: 3080 Invisible Worlds, Inc. Category: Standards Track March 2001 Status of this Memo The Blocks Extensible Exchange Protocol Core This document specifies

More information

A Tutorial on Agent Based Software Engineering

A Tutorial on Agent Based Software Engineering A tutorial report for SENG 609.22 Agent Based Software Engineering Course Instructor: Dr. Behrouz H. Far A Tutorial on Agent Based Software Engineering Qun Zhou December, 2002 Abstract Agent oriented software

More information

The Client Server Model and Software Design

The Client Server Model and Software Design The Client Server Model and Software Design Prof. Chuan-Ming Liu Computer Science and Information Engineering National Taipei University of Technology Taipei, TAIWAN MCSE Lab, NTUT, TAIWAN 1 Introduction

More information

Network Working Group

Network Working Group Network Working Group Request for Comments: 2961 Category: Standards Track L. Berger LabN Consulting, LLC D. Gan Juniper Networks, Inc. G. Swallow Cisco Systems, Inc. P. Pan Juniper Networks, Inc. F. Tommasi

More information

A DEMONSTRATION TRANSFER OF REMOTELY SENSED DATA UTILIZING THE STANDARD FORMAT FOR THE TRANSFER OF GEOCODED POLYGON DATA

A DEMONSTRATION TRANSFER OF REMOTELY SENSED DATA UTILIZING THE STANDARD FORMAT FOR THE TRANSFER OF GEOCODED POLYGON DATA Part 2: Issues and Problems Relating to Cartographic Data Use, Exchange and Transfer A DEMONSTRATION TRANSFER OF REMOTELY SENSED DATA UTILIZING THE STANDARD FORMAT FOR THE TRANSFER OF GEOCODED POLYGON

More information

Minsoo Ryu. College of Information and Communications Hanyang University.

Minsoo Ryu. College of Information and Communications Hanyang University. Software Reuse and Component-Based Software Engineering Minsoo Ryu College of Information and Communications Hanyang University msryu@hanyang.ac.kr Software Reuse Contents Components CBSE (Component-Based

More information

Private Overlay Multicast for Support of First Responders Defense Threat Reduction Agency Experimentation Laboratory (DEL)

Private Overlay Multicast for Support of First Responders Defense Threat Reduction Agency Experimentation Laboratory (DEL) Private Overlay Multicast for Support of First Responders Defense Threat Reduction Agency Experimentation Laboratory (DEL) Dennis M. Moen, J. Mark Pullen George Mason University dmoen@gmu.edu mpullen@gmu.edu

More information

Migrating Linux Device Drivers to a Microkernel POSIX RTOS: A Case Study. David Donohoe Senior Software Developer QNX Software Systems

Migrating Linux Device Drivers to a Microkernel POSIX RTOS: A Case Study. David Donohoe Senior Software Developer QNX Software Systems to a Microkernel POSIX RTOS: A Case Study David Donohoe Senior Software Developer Introduction Porting Linux applications to a commercial OS can be surprisingly straightforward, provided the OS is based

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

DISTRIBUTED COMPUTER SYSTEMS

DISTRIBUTED COMPUTER SYSTEMS DISTRIBUTED COMPUTER SYSTEMS Communication Fundamental REMOTE PROCEDURE CALL Dr. Jack Lange Computer Science Department University of Pittsburgh Fall 2015 Outline Communication Architecture Fundamentals

More information

TCP/IP Packet Identifier

TCP/IP Packet Identifier Software Requirement Specification Requested by: Mr. Ken Swarner Systems Administrator Computer Science Department of Siena College TCP/IP Packet Identifier EdgeTech Development Always on the cutting edge

More information

Lecture (03) Network Model

Lecture (03) Network Model ١ Lecture (03) Network Model By: Dr. Ahmed ElShafee Agenda Layering concept History Discovering the network layers Application Layer same layer interaction concept; Transport Layer Adjacent layer interaction

More information

Java EE 6: Develop Business Components with JMS & EJBs

Java EE 6: Develop Business Components with JMS & EJBs Oracle University Contact Us: + 38516306373 Java EE 6: Develop Business Components with JMS & EJBs Duration: 4 Days What you will learn This Java EE 6: Develop Business Components with JMS & EJBs training

More information

Exhibit A Preliminary Claim Constructions and Extrinsic Evidence

Exhibit A Preliminary Claim Constructions and Extrinsic Evidence Jointly Proposed Claim Construction Terms Exhibit A Preliminary Claim Constructions and Extrinsic Evidence Claim Term Proposed Construction(s) Extrinsic Evidence 1. fast-path processing / slow-path processing

More information

Remote Invocation. 1. Introduction 2. Remote Method Invocation (RMI) 3. RMI Invocation Semantics

Remote Invocation. 1. Introduction 2. Remote Method Invocation (RMI) 3. RMI Invocation Semantics Remote Invocation Nicola Dragoni Embedded Systems Engineering DTU Informatics 1. Introduction 2. Remote Method Invocation (RMI) 3. RMI Invocation Semantics From the First Lecture (Architectural Models)...

More information

Dr. Kenneth E. Nidiffer. Class Syllabus for SWE 625 Fall 2018

Dr. Kenneth E. Nidiffer. Class Syllabus for SWE 625 Fall 2018 Dr. Kenneth E. Nidiffer Managing and Leading Software Projects Software Engineering 625 Volgenau School of Information Technology and Engineering George Mason University Class Syllabus for SWE 625 Fall

More information

Loops / Repetition Statements

Loops / Repetition Statements Loops / Repetition Statements Repetition statements allow us to execute a statement multiple times Often they are referred to as loops C has three kinds of repetition statements: the while loop the for

More information

ROBUST TCP: AN IMPROVEMENT ON TCP PROTOCOL

ROBUST TCP: AN IMPROVEMENT ON TCP PROTOCOL ROBUST TCP: AN IMPROVEMENT ON TCP PROTOCOL SEIFEDDINE KADRY 1, ISSA KAMAR 1, ALI KALAKECH 2, MOHAMAD SMAILI 1 1 Lebanese University - Faculty of Science, Lebanon 1 Lebanese University - Faculty of Business,

More information

The TCP Protocol Stack

The TCP Protocol Stack The TCP Protocol Stack Michael Brockway February 16, 2018 Introduction - Layered archtecture Networking software is desgined in a layered fashion The bottom layer is the services offered by the underlying

More information

Implementation of DDM in the MAK High Performance RTI

Implementation of DDM in the MAK High Performance RTI Implementation of DDM in the MAK High Performance RTI Douglas D. Wood 185 Alewife Brook Parkway Cambridge, MA 02138 dwood@mak.com Keywords: HLA, RTI, DDM ABSTRACT: The HLA data distribution management

More information

CSE 489/589 Programming Assignment 2

CSE 489/589 Programming Assignment 2 CSE 489/589 Programming Assignment 2 Objective In a given simulator, implement three reliable data transport protocols: Alternating-Bit (ABT), Go-Back-N (GBN), and Selective- Repeat (SR). 2 Outline Part

More information

Loops / Repetition Statements. There are three loop constructs in C. Example 2: Grade of several students. Example 1: Fixing Bad Keyboard Input

Loops / Repetition Statements. There are three loop constructs in C. Example 2: Grade of several students. Example 1: Fixing Bad Keyboard Input Loops / Repetition Statements Repetition s allow us to execute a multiple times Often they are referred to as loops C has three kinds of repetition s: the while loop the for loop the do loop The programmer

More information

Programming Assignment 3: Transmission Control Protocol

Programming Assignment 3: Transmission Control Protocol CS 640 Introduction to Computer Networks Spring 2005 http://www.cs.wisc.edu/ suman/courses/640/s05 Programming Assignment 3: Transmission Control Protocol Assigned: March 28,2005 Due: April 15, 2005, 11:59pm

More information

CS 640 Introduction to Computer Networks Spring 2009

CS 640 Introduction to Computer Networks Spring 2009 CS 640 Introduction to Computer Networks Spring 2009 http://pages.cs.wisc.edu/~suman/courses/wiki/doku.php?id=640-spring2009 Programming Assignment 3: Transmission Control Protocol Assigned: March 26,

More information

SIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP) Irma Aslanishvili, Tariel Khvedelidze

SIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP) Irma Aslanishvili, Tariel Khvedelidze 80 SIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP) Irma Aslanishvili, Tariel Khvedelidze Abstract: Ad hoc Networks are complex distributed systems that consist of wireless mobile or static nodes that

More information

Obsoletes: RFC 930 February 1989

Obsoletes: RFC 930 February 1989 Network Working Group J. VanBokkelen Request for Comments: 1091 FTP Software, Inc. Obsoletes: RFC 930 February 1989 Status of This Memo Telnet Terminal-Type Option This RFC specifies a standard for the

More information

Request for Comments: 938 February 1985

Request for Comments: 938 February 1985 Network Working Group Request for Comments: 938 Trudy Miller ACC February 1985 Functional and Interface Specification STATUS OF THIS MEMO This RFC is being distributed to members of the DARPA research

More information

Model-Solver Integration in Decision Support Systems: A Web Services Approach

Model-Solver Integration in Decision Support Systems: A Web Services Approach Model-Solver Integration in Decision Support Systems: A Web Services Approach Keun-Woo Lee a, *, Soon-Young Huh a a Graduate School of Management, Korea Advanced Institute of Science and Technology 207-43

More information

CS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring Lecture 21: Network Protocols (and 2 Phase Commit)

CS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring Lecture 21: Network Protocols (and 2 Phase Commit) CS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring 2003 Lecture 21: Network Protocols (and 2 Phase Commit) 21.0 Main Point Protocol: agreement between two parties as to

More information

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided. 223 Chapter 19 Inter mediate TCP The Transmission Control Protocol/Internet Protocol (TCP/IP) suite of protocols was developed as part of the research that the Defense Advanced Research Projects Agency

More information

HLA has yet to make any significant impact in other simulation modelling areas such as business, health, manufacturing, and transportation.

HLA has yet to make any significant impact in other simulation modelling areas such as business, health, manufacturing, and transportation. Interoperating COTS Simulation Modelling Packages: A Call for the Standardisation of Entity Representation in the High Level Architecture Object Model Template Simon J E Taylor Centre for Applied Simulation

More information

Introduction. Analytic simulation. Time Management

Introduction. Analytic simulation. Time Management XMSF Workshop Monterey, CA Position Paper Kalyan S. Perumalla, Ph.D. College of Computing, Georgia Tech http://www.cc.gatech.edu/~kalyan August 19, 2002 Introduction The following are some of the authors

More information

A Plexos International Network Operating Technology May 2006

A Plexos International Network Operating Technology May 2006 A Plexos International Network Operating Technology May 2006 BY 4664 Jamestown Ave, Suite 325 Baton Rouge, LA 70808 225.218.8002 1.0 Introduction. is a software environment comprised of proven technologies

More information

CCNA R&S: Introduction to Networks. Chapter 7: The Transport Layer

CCNA R&S: Introduction to Networks. Chapter 7: The Transport Layer CCNA R&S: Introduction to Networks Chapter 7: The Transport Layer Frank Schneemann 7.0.1.1 Introduction 7.0.1.2 Class Activity - We Need to Talk Game 7.1.1.1 Role of the Transport Layer The primary responsibilities

More information

CSC 4900 Computer Networks: End-to-End Design

CSC 4900 Computer Networks: End-to-End Design CSC 4900 Computer Networks: End-to-End Design Professor Henry Carter Fall 2017 Villanova University Department of Computing Sciences Review In the last two lectures, we discussed the fundamentals of networking

More information

Introduction to Protocols

Introduction to Protocols Chapter 6 Introduction to Protocols 1 Chapter 6 Introduction to Protocols What is a Network Protocol? A protocol is a set of rules that governs the communications between computers on a network. These

More information

C Refresher, Advance C, Coding Standard, Misra C Compliance & Real-time Programming

C Refresher, Advance C, Coding Standard, Misra C Compliance & Real-time Programming C Refresher, Advance C, Coding Standard, Misra C Compliance & Real-time Programming Course Overview This course transforms an IT-Professional or a Student into an expert C Programming Person with concepts

More information

MODELS OF DISTRIBUTED SYSTEMS

MODELS OF DISTRIBUTED SYSTEMS Distributed Systems Fö 2/3-1 Distributed Systems Fö 2/3-2 MODELS OF DISTRIBUTED SYSTEMS Basic Elements 1. Architectural Models 2. Interaction Models Resources in a distributed system are shared between

More information

Defining Networks with the OSI Model. Module 2

Defining Networks with the OSI Model. Module 2 Defining Networks with the OSI Model Module 2 Objectives Skills Concepts Objective Domain Description Objective Domain Number Understanding OSI Basics Defining the Communications Subnetwork Defining the

More information

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer

More information

CCNA 1 Chapter 7 v5.0 Exam Answers 2013

CCNA 1 Chapter 7 v5.0 Exam Answers 2013 CCNA 1 Chapter 7 v5.0 Exam Answers 2013 1 A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the

More information

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dodda Sunitha Dr.A.Nagaraju Dr. G.Narsimha Assistant Professor of IT Dept. Central University

More information

Comprehensive Guide to Evaluating Event Stream Processing Engines

Comprehensive Guide to Evaluating Event Stream Processing Engines Comprehensive Guide to Evaluating Event Stream Processing Engines i Copyright 2006 Coral8, Inc. All rights reserved worldwide. Worldwide Headquarters: Coral8, Inc. 82 Pioneer Way, Suite 106 Mountain View,

More information

Network Layer, Part 1 Internet Architecture. History

Network Layer, Part 1 Internet Architecture. History Network Layer, Part 1 Internet Architecture These slides are created by Dr. Huang of George Mason University. Students registered in Dr. Huang s courses at GMU can make a single machine readable copy and

More information

Costas Tsatsoulis and Julian Holtzman. Lawrence Applied Research Corporation (LARC) Lawrence, KS

Costas Tsatsoulis and Julian Holtzman. Lawrence Applied Research Corporation (LARC) Lawrence, KS From: Proceedings of the Twelfth International FLAIRS Conference. Copyright 1999, AAAI (www.aaai.org). All rights reserved. Generating Satellite Control Schedules Using Case-Based Scheduling Costas Tsatsoulis

More information

Computer Networks with Internet Technology William Stallings. Chapter 2 Protocols and the TCP/IP Protocol Suite

Computer Networks with Internet Technology William Stallings. Chapter 2 Protocols and the TCP/IP Protocol Suite Computer Networks with Internet Technology William Stallings Chapter 2 Protocols and the TCP/IP Protocol Suite Need For Protocol Architecture E.g. File transfer Source must activate comms. Path or inform

More information

Distributed Systems 8. Remote Procedure Calls

Distributed Systems 8. Remote Procedure Calls Distributed Systems 8. Remote Procedure Calls Paul Krzyzanowski pxk@cs.rutgers.edu 10/1/2012 1 Problems with the sockets API The sockets interface forces a read/write mechanism Programming is often easier

More information

NGI-FOM over RTI-NG and SMRP: Lessons Learned

NGI-FOM over RTI-NG and SMRP: Lessons Learned NGI-FOM over RTI-NG and SMRP: Lessons Learned J. Mark Pullen, Robert Simon, Fei Zhao and oan Sun Chang Department of Computer Science and C 3 I Center George Mason University, Fairfax VA 22030 {mpullen,

More information

Data and Computer Communications. Protocols and Architecture

Data and Computer Communications. Protocols and Architecture Data and Computer Communications Protocols and Architecture Characteristics Direct or indirect Monolithic or structured Symmetric or asymmetric Standard or nonstandard Means of Communication Direct or

More information

Lecture (03) Networking Model (TCP/IP) Networking Standard (OSI) cont.,..

Lecture (03) Networking Model (TCP/IP) Networking Standard (OSI) cont.,.. Lecture (03) Networking Model (TCP/IP) Networking Standard (OSI) cont.,.. By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU : Fall 2014, Computer Networks II Agenda TCP/IP suite Data Encapsulation OSI History

More information

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist

More information

School of Engineering Department of Computer and Communication Engineering Semester: Fall Course: CENG415 Communication Networks

School of Engineering Department of Computer and Communication Engineering Semester: Fall Course: CENG415 Communication Networks School of Engineering Department of Computer and Communication Engineering Semester: Fall 2012 2013 Course: CENG415 Communication Networks Instructors: Mr Houssam Ramlaoui, Dr Majd Ghareeb, Dr Michel Nahas,

More information

Combining the Power of DAVE and SIMULINK

Combining the Power of DAVE and SIMULINK Combining the Power of DAVE and SIMULINK From a High Level Model to Embedded Implementation Pedro Costa Infineon Munich, Germany pedro.costa@infineon.com Abstract In a modern real-time control system,

More information

Application: Electronic Mail

Application: Electronic Mail Content Application: Electronic Mail Linda Wu Email system model protocol MIME extensions Mail access protocols (CMPT 471 2003-3) Reference: chapter 27 Notes-19 CMPT 471 2003-3 2 Email System Model Client-

More information

Inventory Visibility and Interoperability Tool. TECHNICAL REPORT WD.B (Part 3 of 4)

Inventory Visibility and Interoperability Tool. TECHNICAL REPORT WD.B (Part 3 of 4) Apolon IV/I Tool User Guide Inventory Visibility and Interoperability Tool Faculty of Organizational Sciences TECHNICAL REPORT WD.B.5.7.4 (Part 3 of 4) B5.10 Inventory Visibility Sub-Project: Apolon An

More information

The Simulation of the VAPS XT Cockpit Display and Control System Based on the Integrated Data Distribution Network

The Simulation of the VAPS XT Cockpit Display and Control System Based on the Integrated Data Distribution Network The Simulation of the VAPS XT Cockpit Display and Control System Based on the Integrated Data Distribution Network Jia Liu and Tianjiang An Abstract Focus on the problems existed in the topologies of the

More information

An Object-Oriented HLA Simulation Study

An Object-Oriented HLA Simulation Study BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 15, No 5 Special Issue on Control in Transportation Systems Sofia 2015 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.1515/cait-2015-0022

More information

Mesh-Based Content Routing Using XML

Mesh-Based Content Routing Using XML Outline Mesh-Based Content Routing Using XML Alex C. Snoeren, Kenneth Conley, and David K. Gifford MIT Laboratory for Computer Science Presented by: Jie Mao CS295-1 Fall 2005 2 Outline Motivation Motivation

More information

Information Collection and Survey Infrastructure, APIs, and Software Tools for Agent-based Systems (An Overview of JADE)

Information Collection and Survey Infrastructure, APIs, and Software Tools for Agent-based Systems (An Overview of JADE) Course Number: SENG 609.22 Session: Fall, 2003 Document Name: Infrastructure, APIs, and Software tools for agent-based system (An Overview of JADE) Course Name: Agent-based Software Engineering Department:

More information

Automation of Semantic Web based Digital Library using Unified Modeling Language Minal Bhise 1 1

Automation of Semantic Web based Digital Library using Unified Modeling Language Minal Bhise 1 1 Automation of Semantic Web based Digital Library using Unified Modeling Language Minal Bhise 1 1 Dhirubhai Ambani Institute for Information and Communication Technology, Gandhinagar, Gujarat, India Email:

More information

Lesson 2-3: The IEEE x MAC Layer

Lesson 2-3: The IEEE x MAC Layer Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes

More information

Nabto Serial Link Protocol

Nabto Serial Link Protocol Nabto Serial Link Protocol Nabto TM Nabto Serial Link Protocol Page 1 of 22 Contents Vocabulary... 4 Introduction... 5 Access Control... 5 Connection type... 5 Access Control List... 5 Protocol details...

More information

CMSC 322 Computer Networks Applications and End-To- End

CMSC 322 Computer Networks Applications and End-To- End CMSC 322 Computer Networks Applications and End-To- End Professor Doug Szajda CMSC 332: Computer Networks Announcements Project 2 has been posted and is due Monday, February 8 (No extension!) Homework

More information

Kakadu and Java. David Taubman, UNSW June 3, 2003

Kakadu and Java. David Taubman, UNSW June 3, 2003 Kakadu and Java David Taubman, UNSW June 3, 2003 1 Brief Summary The Kakadu software framework is implemented in C++ using a fairly rigorous object oriented design strategy. All classes which are intended

More information

Data and Computer Communications

Data and Computer Communications Data and Computer Communications Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications Eighth Edition by William Stallings Chap2: 1 Need For Protocol Architecture data exchange can involve

More information

Lecture 10: Protocol Design

Lecture 10: Protocol Design Lecture 10: Protocol Design Prof. Shervin Shirmohammadi SITE, University of Ottawa Fall 2005 CEG 4183 10-1 Introduction TCP and UDP are generic protocols: They fulfill the needs of a wide range of applications

More information

Transport Layer. Application / Transport Interface. Transport Layer Services. Transport Layer Connections

Transport Layer. Application / Transport Interface. Transport Layer Services. Transport Layer Connections Application / Transport Interface Application requests service from transport layer Transport Layer Application Layer Prepare Transport service requirements Data for transport Local endpoint node address

More information

! High Level Architecture (HLA): Background. ! Rules. ! Interface Specification. Maria Hybinette, UGA. ! SIMNET (SIMulator NETworking) ( )

! High Level Architecture (HLA): Background. ! Rules. ! Interface Specification. Maria Hybinette, UGA. ! SIMNET (SIMulator NETworking) ( ) Outline CSCI 8220 Parallel & Distributed Simulation PDES: Distributed Virtual Environments Introduction High Level Architecture! High Level Architecture (HLA): Background! Rules! Interface Specification»

More information

AN AGENT BASED INTELLIGENT TUTORING SYSTEM FOR PARAMETER PASSING IN JAVA PROGRAMMING

AN AGENT BASED INTELLIGENT TUTORING SYSTEM FOR PARAMETER PASSING IN JAVA PROGRAMMING AN AGENT BASED INTELLIGENT TUTORING SYSTEM FOR PARAMETER PASSING IN JAVA PROGRAMMING 1 Samy Abu Naser 1 Associate Prof., Faculty of Engineering &Information Technology, Al-Azhar University, Gaza, Palestine

More information

Communication. Distributed Systems Santa Clara University 2016

Communication. Distributed Systems Santa Clara University 2016 Communication Distributed Systems Santa Clara University 2016 Protocol Stack Each layer has its own protocol Can make changes at one layer without changing layers above or below Use well defined interfaces

More information

Computer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan

Computer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan Computer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan Chapter3: OSI Reference Model: Network Software: Network

More information

Universal Model Framework -- An Introduction

Universal Model Framework -- An Introduction Universal Model Framework -- An Introduction By Visible Systems Corporation www.visible.com This document provides an introductory description of the Universal Model Framework an overview of its construct

More information

CSC 4900 Computer Networks:

CSC 4900 Computer Networks: CSC 4900 Computer Networks: Email Professor Henry Carter Fall 2017 Villanova University Department of Computing Sciences Review Last week we talked about design principles, and the application protocols

More information

2.0.3 attributes: A named property of a class that describes the range of values that the class or its instances (i.e., objects) may hold.

2.0.3 attributes: A named property of a class that describes the range of values that the class or its instances (i.e., objects) may hold. T0/04-023 revision 2 Date: September 06, 2005 To: T0 Committee (SCSI) From: George Penokie (IBM/Tivoli) Subject: SAM-4: Converting to UML part Overview The current SCSI architecture follows no particular

More information

Part VI. Appendixes. Appendix A OSI Model and Internet Protocols Appendix B About the CD

Part VI. Appendixes. Appendix A OSI Model and Internet Protocols Appendix B About the CD Part VI Appendixes Appendix A OSI Model and Internet Protocols Appendix B About the CD OSI Model and Internet Protocols APPENDIX A In this appendix, you will Learn about the OSI model Review the network

More information