A PROTOCOL DATA UNIT FOR TRAINING SIMULATED COMMAND FORCES
|
|
- Oliver Mason
- 6 years ago
- Views:
Transcription
1 A PROTOCOL DATA UNIT FOR TRAINING SIMULATED COMMAND FORCES Kenneth E. Frosch, Elizabeth L. White, J. Mark Pullen C 3 I Center and Department of Computer Science George Mason University 4400 University Drive Fairfax, VA kfrosch@cne.gmu.edu KEYWORDS Protocol Data Unit, Command Forces, Knowledge Acquisition ABSTRACT The emergence of command forces (CFORs) as a simulated entity within a DIS simulation requires effective interfaces between existing learning systems and simulation applications. Existing methods utilize programmers and knowledge engineers to encode the knowledge of a subject matter expert (SME) into a knowledge base. However, there are no interfaces that integrate existing learning systems with a DIS application that would provide effective and efficient knowledge acquisition by allowing the SME to directly instruct the learning system. We have integrated Disciple, a machine learning system, with ModSAF to provide this direct interface for the SME. This integration extends the familiar graphical interface of ModSAF to include the tools necessary for the SME to instruct an agent through demonstration. A new experimental PDU was developed to provide the communication mechanism and common data format for the two applications to communicate. An overview of this integration, the design issues and architecture of the interface, and the format and protocol of the new PDU are discussed in this paper. 1.0 INTRODUCTION As CGF technology has advanced sufficiently to allow CFORs[4] to be created and deployed in a simulation, learning and knowledge acquisition have become critical issues. The high degree of human behavior that the CFOR must represent increases these needs. While a lot of work is currently being performed in the area of learning and human behavior for CGF, it has been found to be very difficult to interface these learning systems to existing DIS applications. Individually, however, learning systems and simulation applications are readily extensible. While existing approaches use knowledge engineers to encode the expertise of an SME, our approach utilizes a common simulation interface to build and adapt a suitable knowledge base through teaching by demonstration.[2] This method involves a SME that interfaces directly with the CFOR agent in order to instruct it, without the intervention of a knowledge engineer. This allows the instructor to use an interface that is familiar and the same techniques to teach the computerized agent as he/she would for a human student. The emphasis for this approach is on apprenticeship learning rather than knowledge acquisition. Apprenticeship learning adapts knowledge that has already been given or learned to increase the knowledge base. Our system, Virtual Commander (VCDR), is an interface between an apprenticeship learning system, Disciple, and ModSAF, a DIS application. The combined system, pictured in Figure 1, presents an efficient manner for teaching complex behavior to an agent through demonstration. The VCDR approach provides a rich interaction between the SME and the agent, which is necessary to create more powerful agents required for CFORs. The SME uses the GUI interface of ModSAF enhanced with a teaching interface as a front-end for the Disciple learning system.
2 Workstation A Workstation B Subject Matter Expert ModSAF Agent Libraries Editor Libraries Agent-Disciple Problem Solving Functions Learning Functions Interface Libraries Interface Functions Figure 1: Virtual Commander Design This interface between Disciple and ModSAF was implemented using an experimental PDU. The PDU provides the communications mechanism and the data format necessary to have the application communicate effectively in a distributed fashion. This paper describes the development of this PDU and the protocol used between the two applications. Section 2.0 begins by giving an overview of the design and architecture of Virtual Commander. In Section 3.0, the requirements for the Virtual Commander interface and the PDU are discussed. The format and protocol of the VCDR PDU are detailed in Section 4.0. Finally, an example of the interaction of ModSAF and Disciple using the new PDU is given in Section VIRTUAL COMMANDER The Virtual Commander system is an approach to solving the problem of knowledge acquisition for CFORs. VCDR is an instructable agent which utilizes programming by demonstration[5] and machine learning techniques to allow a SME to teach an agent. Programming by demonstration systems give an end user the ability to create programs by demonstrating their action. The implementation of Virtual Commander is an interface between ModSAF and Disciple[6]. Disciple is a machine learning system written in Lisp that runs on a typical Unix workstation. It employs multistrategy learning, combining explanation-based, analogical, and example-based methods with knowledge acquisition to learn from an SME. Figure 1 depicts the design and architecture of Virtual Commander. The system consists of several major components residing on distributed workstations. These parts include ModSAF, libdisciple, SME editors, Disciple, a DIS front-end, and the VCDR API. Since Disciple is written in Lisp strictly for learning purposes, it did not have the capability to send or receive network traffic. Using the foreign function interface of Lisp, a DIS front-end was written in C that implemented a network interface to handle DIS PDUs. An API was developed on top of the foreign function interface for Disciple to access the functions in the DIS front-end. For ModSAF, a series of GUI editors were created for the SME to use as an interface to instruct Disciple. The appropriate data is then passed through the new libdisciple library and transported in the VCDR PDU. Responses from Disciple are caught by ModSAF and passed to the appropriate Network VCDR Editor libdisciple ModSAF DIS PDUs Disciple VCDR API DIS Front-end DIS PDUs Figure 1: Virtual Commander Architecture
3 PDU handler in libdisciple, which would update the editors for the SME or instantiate entities and represent them on the plan view display (PVD). 3.0 INTERFACE DESIGN ISSUES AND PDU REQUIREMENTS The method to be chosen as an interface between this DIS application and learning system was determined based on the analysis of several important factors.[7] Our design and implementation is driven by three significant factors: real-time performance, data representation, and control of the learning cycle. The initial concern addressed in this implementation was the difficulty of integrating an application that relies on real-time delivery of data (ModSAF) and one that does not (Disciple). The performance or latency issue was important since ModSAF, a DIS application, typically requires real-time transmission of data. The ModSAF/Disciple interface does not require this type of service, however. In fact, due to the algorithms involved in the various learning phases of Disciple, it would be difficult to achieve real-time response from Disciple. Therefore, the concern about realtime performance is how to construct a non-real-time communication that does not cause perceptible delay in ModSAF. Due to the fact that both applications are computationally intensive it made sense to distribute their execution across multiple machines. This introduces the need to either develop a proprietary protocol or use an existing standard protocol. Using DIS PDUs as the communications mechanism between ModSAF and Disciple is effective for several reasons. First of all, it makes use of the existing communications functions within ModSAF. By doing so, the processing of the VCDR PDUs is handled in the same way as other existing PDUs. To do this a definition of the PDU structure was added to ModSAF s libpduapi library and callback function was registered that would pass the VCDR PDUs to the proper function for processing.[3] Using these functions from ModSAF provides a seamless integration of the new PDU. It permits ModSAF to execute non-blocking network operations to Disciple and allows it to continue operation without noticeable interruption. A client-server Remote Procedure Call (RPC) would not provide this. A second issue was the format in which the data would be communicated between the applications. While ModSAF stores its data in a Persistent Object (PO) database, Disciple represents its data in the form of a semantic network. In order for the two systems to communicate, a common format was constructed as the VCDR PDU. The message within the PDU is data extracted from either the PO database or from Disciple s semantic network. The experimental PDU format was developed and introduced into ModSAF. By utilizing DIS PDUs to perform the messaging for the VCDR system, we can use a messaging infrastructure already established for DIS. The final issue was the need to move the control interface from Disciple to ModSAF. Originally, the steps taken by the SME to teach Disciple were selected from a menu presented by the Disciple software in Lisp, based on which phase of the learning process was being executed. When introducing the GUI editor into ModSAF, the control mechanism was transferred to ModSAF. A new library, libdisciple, was built into ModSAF to implement the control features needed. The resulting interface is much more natural to its intended user. The interaction of the SME with Disciple is governed by a protocol that is based on the different phases of the learning by demonstration cycle. 4.0 VCDR PDU FORMAT AND PROTOCOL The PDU resulting from the requirements discussed above is pictured in Table 1. This is the format as it is defined in ModSAF. In this section, the format and function of the PDU and its functions are described The DIS 2.03 header that is at the beginning of the VCDR PDU contains elements such as version number and PDU kind. The PDU kind is a number associated with each DIS PDU. For example, the entity state PDU (ESPDU) has a PDU kind of 1. For Description Size (bits) DIS 2.03 header 96 Message ID 32 Fragment number 32 Learning phase 32 Message type 32 Message length 32 Message 8*length Table 1: Virtual Commander Experimental DIS 2.03 PDU Format
4 the VCDR PDU an arbitrary number was chosen, 172. This number is used to reference the PDU format within the libpduapi database. The fields of primary interest in the PDU are the message, message type, and learning phase. All data sent between ModSAF and Disciple is composed in the message field as an ASCII string. This string forms the common data format shared by the two applications. The message length field simply denotes how long the message is. Depending on the action performed by the SME messages may contain examples, variables, explanation, or rules. The combination of message type and learning phase fields specifies what the contents of the message field represent. The contents of the phase and type fields of the VCDR PDU describe the request-reply protocol used to implement control of the learning process. Table 2 shows these values which govern the interaction between Disciple and ModSAF. The phases correspond to separate functions within the learning by demonstration process. The message type further describes the PDU and is used to trigger a response in the learning functions of Disciple. Evennumbered types indicate a message originating from ModSAF sent to Disciple, while odd-numbered types denote Disciple sending a message to ModSAF. Some of the types simply represent acknowledgment that the previous PDU was received. Typically, though, a response from Disciple implicitly is an acknowledgment of the prior request. Their is also a need to denote negative acknowledgments, NAKs, when a message missing. Adding this functionality to the interface is currently under development. In this case, the message type field will contain a negative value. A message is recognized as missing when two messages are received when their message IDs are not consecutive. When this occurs the last message will be dropped and a NAK sent to the sender with the missing message ID. The sender will resume sending packets beginning with the missing message. To avoid the re-execution of duplicate requests by Disciple the protocol will adhere to an at most once semantic. In other words, both applications will be ensured that Disciple will fulfill the request only once, or if an error occurs, then not at all. The message ID, in conjunction with the fragment number field, is also used in the fragmentation and assembly of VCDR PDUs that contain large Specification of Initial Scenario Phases Phase 0 - Give Initial Example Type 0 - Select Example Template Type 1 - Send Acknowledgement of Template Type 2 - Select Initial Example Type 3 - Send Acknowledgement of Initial Example Phase 1 - Give Initial Explanations Type 0 - Select Variable to Generate Explanations from Type 1 - Send List of Explanations Type 2 - Select Explanation(s) Type 3 - Send Acknowledgement of Explanations Phase 2 - Quit Initial Signal Phases Type 0 - Quit Specification of initial Type 1 - Send Acknowledgement of Quit Learning through Experimentation Phases Phase 3 - Experimentation Search Parameters Type 0 - Select Variable(s) to Fix Type 1 - Send Acknowledgement Fixed Type Quit Search Phase Type Send Acknowledgement of Quit Phase 4 - Generate Experimentation Example Type 0 - Request Example to be Generated Type 1 - Send Example Phase 5 - Give Experimentation Example Type 0 - Specify Example Type 0 - Send Acknowledgement of Example Phase 6 - Classify Experimentation Example Type 0 - Classify Example Type 1 - Send Acknowledgement of Classification Phase 7 - Explain Mistake in Experimentation Type 0 - Select Variable to Generate Explanations from Type 1 - Send List of Explanations Type 2 - Select Explanation(s) Type 3 - Send Acknowledgement of Explanations Type 4 - Select Variable to Blame Type 5 - Send Acknowledgement Type Quit Explanation Phase Type Send Acknowledgement Phase 8 - Quit Experimentation Signal Phases Type 0 - Quit Experimentation Type 1 - Send Acknowledgement of Quit Table 2: Virtual Commander Learning by Demonstration Protocol
5 typedef struct vcdr_pdu { uint32 msg_id; uint32 fn; VCDR_PHASE phase; int32 type; uint32 msg_length; char message[max_length]; } VCDRPDU; Table 3: C-style Header for VCDR PDU messages. Since the strings shared between Disciple and ModSAF may be very long, it may need to be broken into several parts before sending, and then reassembled after receiving them. In ModSAF, there is a global variable that represents the largest PDU size, pa_mtu. If a VCDR PDU is larger than that value, the message field is segmented into separate PDUs. The message ID will remain the same for each PDU of a message fragment, but the fragment number will be incremented for each. A sentinel value is used in the fragment number field to represent that is the last PDU, or the only one, for a given message. The corresponding ANSI C structure that is used to manipulate the PDU contents is shown in Table 3. For this prototype, 32-bit integers are used for all numeric fields. However, for most of those fields msg_id, fn, type, and msg_length 32 bits is not necessary. The VCDR_PHASE enumerated type is a definition of the values used in the phase field that correspond to the phases described in Table VCDR PDU EXAMPLE With Virtual Commander, an SME teaches an agent through the ModSAF GUI. The actions taken by the SME are transported to the Disciple learning system via the newly defined VCDR PDU. To illustrate the interaction of the SME and the Virtual Commander system as well as the underlying protocol of the VCDR PDU an example teaching session is given in this section. Figure 2 gives a detailed representation of this request-reply conversation highlighting the use of the phase and type fields as well as how the negative acknowledgment is used to recover from lost messages. To begin the learning process, the SME demonstrates to the VCDR agent how to perform a new task or carry out a new mission. Using the existing unit and task editors within ModSAF as the SME normally would to create a sequence of tasks, the SME programs the agent. This created task is given as the initial example of the mission to the learning system. The libdisciple library then extracts from the PO database of ModSAF the data relevant to the mission. This data is stored as an ASCII string and transported to Disciple in the message field of the VCDR PDU. The corresponding phase and message type is 0 and 2, respectively. After processing this message, Disciple will then respond with a list of variables that it generated from the mission. The variables may refer to things such as companies, areas of responsibility, or other aspects of the mission. This response also serves as an implicit acknowledgment of the request. In all responses from Disciple it will use the same message ID as the incoming request. Likewise, the phase value is the same as well. The message type field will be set to 3 for this response. The teaching process continues by the SME explaining the important features of the mission. The SME does so by repeatedly selecting variables for which Disciple will generate a list of explanations. The corresponding phase and field values for the SME request to select variables are 1 and 0. Disciple will then respond with a list of explanations about that variable using the same phase but a type of 1. From the received list of explanations, the SME will select those which are relevant for the mission. A VCDR PDU is sent with this input, a phase of 1, and a type of 2, to Disciple. Disciple processes that input and returns an explicit acknowledgment. At this point the SME may continue the explanation process by selecting addition variables or send a quit message to signal Disciple that the specification phase is complete. The phase for the quit signal is 2 with the types for the ModSAF message and the Disciple acknowledgment being 0 and 1, respectively. The learning through experimentation phases (3-8) continue using the phase and type fields in the same manner. In these phases, the learning system may be asked by the SME to attempt to perform the same mission on a different terrain perhaps. For each computer generated solution, the SME is asked to evaluate and classify it as correct or incorrect. Using the ModSAF GUI, the SME can correct the agent if it does not perform the mission appropriately. The
6 Msg 1, Phase 1, Type 0 ModSAF Disciple Msg 0, Phase 0, Type 2 Time Msg 0, Phase 0, Type 3 Message Lost Next input from SME, but no response yet from Disciple Msg 1, Phase 1, Type NAK Msg 1, Phase 1, Type 1 Resends lost message Figure 2: Protocol Interaction Between Applications SME does so by again selecting variables and explanations as to why the solution was incorrect. These explanations are incorporated by Disciple to refine the plausible version space for valid solution. After the teaching session is complete, the VCDR agent will have learned how to perform this type of mission. The learning system will have created a rule specifying how to select tasks and assign task parameters for this mission. The learning system will then be able to perform the learned mission when asked by the SME, without the SME programming the behavior. In the case where a message is lost, the receiving application will use a NAK to signal the sending application to resend the missing packet. In Figure 2, a message containing a list of explanations, in response to a selected variable from the SME, from Disciple has been lost, possibly due to a network problem. In the meantime the SME may have already input the next action to the learning system. In this instance, ModSAF will send a NAK for the retransmission of that missing message. Disciple will then reissue the last response again without reexecuting the operation, adhering to the at-mostonce policy. 6.0 SUMMARY To represent more complex human behaviors in DIS simulations, it is well known that effective learning and knowledge acquisition will be necessary. In addition, the ability for a SME to directly build this knowledge base without the need for a knowledge engineer to translate the information into the system is a effective method. The Virtual Commander Protocol Data Unit provides the interprocess communication mechanism for learning system to interoperate with a DIS application. Extensions to ModSAF provide a familiar interface for the SME to instruct the learning system efficiently. Although this interface presents a communication method using DIS PDUs, this combination of Disciple and ModSAF could use the High Level Architecture's Run-Time Infrastructure. The goal of the RTI is to provide services to create interoperable components such as DIS applications and C 4 I systems. In any case the need for knowledge acquisition for intelligent agents will require an
7 integration of a learning system to the DIS simulation. A direct interface for an SME, like the VCDR PDU, presents an effective solution for this interface. 7.0 ACKNOWLEDGMENT This research was conducted in the Center for Excellence in Command, Control, Communications and Intelligence and the Computer Science Department at George Mason University. The authors wish to thank Dr. Michael Hieb, currently with SAIC, for his support and assistance with Disciple. 8.0 REFERENCES [1] Cypher, A. (Ed.), "Watch What I Do: Programming by Demonstration," MIT Press, Cambridge, MA, [2] Hieb, M.R., Tecuci, G., Pullen, J.M. (1996). Virtual Commander An Instructable ModSAF Agent, 6 th Conference on Computer Generated Forces and Behavioral Representation. [3] Loral Advanced Distributed Simulation (1995). ModSAF 2.0 Developer s Kit. [4] Salisbury, M.R., Booker, L.B., Seidel, D.W. and Dahmann, J.S., Implementation of Command Forces (CFOR) Simulation, 5 th Conference on Computer Generated Forces and Behavioral Representation, [5] Tambe, M., Johnson, W. L., Jones, R.M., Koss, F., Laird, J.E, Rosenbloom, P.S., and Schwamb, K., Intelligent Agents for Interactive Simulation Environments. AI Magazine, 16(1), Spring, [6] Tecuci, G., "DISCPLE: A Theory, Methodology, and System for Learning Expert Knowledge," Ph.D. Thesis, University of Paris South. [7] White, E.L., Frosch, K.E., Laviano, V.P., Hieb, M.R., Pullen, J.M. (1996), Interfacing External Decision Processes to DIS Applications, 6 th Conference on Computer Generated Forces and Behavioral Representation. 9.0 ABOUT THE AUTHORS Ken Frosch is a Graduate Research Assistant in the C 3 I Center at George Mason University. He is currently on leave of absence from Lockheed Martin Federal Systems where he has been a Systems Engineer since He received his B.S. in Computer Science and Mathematics from the University of Wisconsin - Madison in Elizabeth White is an Assistant Professor of Computer Science at GMU. She received M.S. and Ph.D. degrees in Computer Science from the University of Maryland in 1990 and 1996, respectively, and a B.S. degree from the College of William and Mary in J. Mark Pullen is Associate Professor of Computer Science and member of the C 3 I Center at GMU. Dr. Pullen was with the Defense Advanced Research Projects Agency (DARPA) from 1986 to 1992, where he was Program Manager for Advanced Computing, Networking and Distributed Simulation.
APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE
APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE William Stallings F.1 TCP/IP LAYERS... 2 F.2 TCP AND UDP... 4 F.3 OPERATION OF TCP/IP... 6 F.4 TCP/IP APPLICATIONS... 10 Copyright 2014 Supplement to Computer
More informationUnit-II Programming and Problem Solving (BE1/4 CSE-2)
Unit-II Programming and Problem Solving (BE1/4 CSE-2) Problem Solving: Algorithm: It is a part of the plan for the computer program. An algorithm is an effective procedure for solving a problem in a finite
More informationPerformance Issues for the Light-Weight RTI
Performance Issues for the Light-Weight RTI J. Mark Pullen and Nagesh Kakarlamudi Department of Computer Science and C 3 I Center George Mason University Fairfax, VA 030 {mpullen,nkakarla}@gmu.edu Keywords:
More informationRTI Performance on Shared Memory and Message Passing Architectures
RTI Performance on Shared Memory and Message Passing Architectures Steve L. Ferenci Richard Fujimoto, PhD College Of Computing Georgia Institute of Technology Atlanta, GA 3332-28 {ferenci,fujimoto}@cc.gatech.edu
More informationIP Mobility vs. Session Mobility
IP Mobility vs. Session Mobility Securing wireless communication is a formidable task, something that many companies are rapidly learning the hard way. IP level solutions become extremely cumbersome when
More informationCategory: Informational MITRE Corporation M. Pullen George Mason University August 1994
Network Working Group Request for Comments: 1667 Category: Informational S. Symington D. Wood M. Pullen George Mason University August 1994 Status of this Memo Modeling and Simulation Requirements for
More informationANSI E Architecture for Control Networks Device Management Protocol Entertainment Services and Technology Association Abstract
ANSI E1.17-2006 Architecture for Control Networks Device Management Protocol This document forms part of ANSI E1.17-2006, Entertainment Technology - Architecture for Control Networks, which was approved
More informationAn Architecture for Web-Services Based Interest Management in Real Time Distributed Simulation
An Architecture for Web-Services Based Interest Management in Real Time Distributed Simulation Mark Pullen and Priscilla McAndrews George Mason University C3I Center Katherine Morse and Ryan Brunton SAIC
More informationInternetworking Models The OSI Reference Model
Internetworking Models When networks first came into being, computers could typically communicate only with computers from the same manufacturer. In the late 1970s, the Open Systems Interconnection (OSI)
More informationThe Transport Layer. Part 1
The Transport Layer Part 1 2 OVERVIEW Part 1 User Datagram Protocol Transmission Control Protocol ARQ protocols Part 2 TCP congestion control Mowgli XTP SCTP WAP 3 Transport Layer Protocols Connect applications
More informationCS-461 Internetworking. Dr. Mohamed Aboutabl
CS-461 Internetworking Dr. Mohamed Aboutabl http://www.cs.jmu.edu/users/aboutams The McGraw-Hill Companies, Inc., 2000 1 Chapter 1 Introduction The McGraw-Hill Companies, Inc., 2000 2 Internet today Network
More informationContent Management for the Defense Intelligence Enterprise
Gilbane Beacon Guidance on Content Strategies, Practices and Technologies Content Management for the Defense Intelligence Enterprise How XML and the Digital Production Process Transform Information Sharing
More informationTextbook Charles Petzold, Programming Windows, 5th edition, Microsoft Press. References - other textbooks or materials none
CS351 Systems Programming Last Updated - 03/01/02 Course Manager Dr. Phil Dickens, Assistant Professor 3 credit hours; required for CS & CPE; 100 min. lecture & 100 min. lab each week Current Catalog Description
More informationAn Intelligent Tutoring System Prototype for Learning to Program Java TM
An Intelligent Tutoring System Prototype for Learning to Program Java TM Edward R. Sykes School of Computing and Information Management, Sheridan College 430 Trafalgar Road, Oakville, Ont., Canada, L6H
More informationSequence Number. Acknowledgment Number. Data
CS 455 TCP, Page 1 Transport Layer, Part II Transmission Control Protocol These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make
More informationData and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications
Data and Computer Communications Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based s 1 Need For Protocol Architecture data exchange can involve complex procedures better if task broken into subtasks
More informationComputer Networks. Introduction to Network. Dr. Adel Gaafar Abd Elrahim
Computer Networks Introduction to Network Dr. Adel Gaafar Abd Elrahim A Communications Model Source generates data to be transmitted Transmitter Converts data into transmittable signals Transmission System
More informationUNIT IV -- TRANSPORT LAYER
UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission
More informationThe OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).
Network Models The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding and developing computer-to-computer communication
More informationELEN Network Fundamentals Lecture 15
ELEN 4017 Network Fundamentals Lecture 15 Purpose of lecture Chapter 3: Transport Layer Reliable data transfer Developing a reliable protocol Reliability implies: No data is corrupted (flipped bits) Data
More informationA Protocol Independent Compression Algorithm (PICA)
A Protocol Independent Compression Algorithm (PICA) Daniel J. Van Hook (dvanhook@ll.mit.edu) James O. Calvin (jcalvin@ll.mit.edu) Dr. Duncan C. Miller (dmiller@ll.mit.edu) MIT Lincoln Laboratory 244 Wood
More informationBasic Protocols and Error Control Mechanisms
Basic Protocols and Error Control Mechanisms Nicola Dragoni Embedded Systems Engineering DTU Compute ACK/NACK Protocol Polling Protocol PAR Protocol Exchange of State Information Two-Way Handshake Protocol
More informationSubnet Multicast for Delivery of One-to-Many Multicast Applications
Subnet Multicast for Delivery of One-to-Many Multicast Applications We propose a new delivery scheme for one-to-many multicast applications such as webcasting service used for the web-based broadcasting
More informationThe Joint Live Virtual Constructive Data Translator Framework Interoperability for a Seamless Joint Training Environment
Framework Interoperability for a Seamless Joint Training Environment Warren Bizub Technical Division Chief US Joint Forces Command Joint Warfighting Center warren.bizub@jfcom.mil Derek Bryan Experimentation
More information3. Quality of Service
3. Quality of Service Usage Applications Learning & Teaching Design User Interfaces Services Content Process ing Security... Documents Synchronization Group Communi cations Systems Databases Programming
More informationNetwork Working Group. Category: Standards Track March 2001
Network Working Group M. Rose Request For Comments: 3080 Invisible Worlds, Inc. Category: Standards Track March 2001 Status of this Memo The Blocks Extensible Exchange Protocol Core This document specifies
More informationA Tutorial on Agent Based Software Engineering
A tutorial report for SENG 609.22 Agent Based Software Engineering Course Instructor: Dr. Behrouz H. Far A Tutorial on Agent Based Software Engineering Qun Zhou December, 2002 Abstract Agent oriented software
More informationThe Client Server Model and Software Design
The Client Server Model and Software Design Prof. Chuan-Ming Liu Computer Science and Information Engineering National Taipei University of Technology Taipei, TAIWAN MCSE Lab, NTUT, TAIWAN 1 Introduction
More informationNetwork Working Group
Network Working Group Request for Comments: 2961 Category: Standards Track L. Berger LabN Consulting, LLC D. Gan Juniper Networks, Inc. G. Swallow Cisco Systems, Inc. P. Pan Juniper Networks, Inc. F. Tommasi
More informationA DEMONSTRATION TRANSFER OF REMOTELY SENSED DATA UTILIZING THE STANDARD FORMAT FOR THE TRANSFER OF GEOCODED POLYGON DATA
Part 2: Issues and Problems Relating to Cartographic Data Use, Exchange and Transfer A DEMONSTRATION TRANSFER OF REMOTELY SENSED DATA UTILIZING THE STANDARD FORMAT FOR THE TRANSFER OF GEOCODED POLYGON
More informationMinsoo Ryu. College of Information and Communications Hanyang University.
Software Reuse and Component-Based Software Engineering Minsoo Ryu College of Information and Communications Hanyang University msryu@hanyang.ac.kr Software Reuse Contents Components CBSE (Component-Based
More informationPrivate Overlay Multicast for Support of First Responders Defense Threat Reduction Agency Experimentation Laboratory (DEL)
Private Overlay Multicast for Support of First Responders Defense Threat Reduction Agency Experimentation Laboratory (DEL) Dennis M. Moen, J. Mark Pullen George Mason University dmoen@gmu.edu mpullen@gmu.edu
More informationMigrating Linux Device Drivers to a Microkernel POSIX RTOS: A Case Study. David Donohoe Senior Software Developer QNX Software Systems
to a Microkernel POSIX RTOS: A Case Study David Donohoe Senior Software Developer Introduction Porting Linux applications to a commercial OS can be surprisingly straightforward, provided the OS is based
More informationChapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet
Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties
More informationDISTRIBUTED COMPUTER SYSTEMS
DISTRIBUTED COMPUTER SYSTEMS Communication Fundamental REMOTE PROCEDURE CALL Dr. Jack Lange Computer Science Department University of Pittsburgh Fall 2015 Outline Communication Architecture Fundamentals
More informationTCP/IP Packet Identifier
Software Requirement Specification Requested by: Mr. Ken Swarner Systems Administrator Computer Science Department of Siena College TCP/IP Packet Identifier EdgeTech Development Always on the cutting edge
More informationLecture (03) Network Model
١ Lecture (03) Network Model By: Dr. Ahmed ElShafee Agenda Layering concept History Discovering the network layers Application Layer same layer interaction concept; Transport Layer Adjacent layer interaction
More informationJava EE 6: Develop Business Components with JMS & EJBs
Oracle University Contact Us: + 38516306373 Java EE 6: Develop Business Components with JMS & EJBs Duration: 4 Days What you will learn This Java EE 6: Develop Business Components with JMS & EJBs training
More informationExhibit A Preliminary Claim Constructions and Extrinsic Evidence
Jointly Proposed Claim Construction Terms Exhibit A Preliminary Claim Constructions and Extrinsic Evidence Claim Term Proposed Construction(s) Extrinsic Evidence 1. fast-path processing / slow-path processing
More informationRemote Invocation. 1. Introduction 2. Remote Method Invocation (RMI) 3. RMI Invocation Semantics
Remote Invocation Nicola Dragoni Embedded Systems Engineering DTU Informatics 1. Introduction 2. Remote Method Invocation (RMI) 3. RMI Invocation Semantics From the First Lecture (Architectural Models)...
More informationDr. Kenneth E. Nidiffer. Class Syllabus for SWE 625 Fall 2018
Dr. Kenneth E. Nidiffer Managing and Leading Software Projects Software Engineering 625 Volgenau School of Information Technology and Engineering George Mason University Class Syllabus for SWE 625 Fall
More informationLoops / Repetition Statements
Loops / Repetition Statements Repetition statements allow us to execute a statement multiple times Often they are referred to as loops C has three kinds of repetition statements: the while loop the for
More informationROBUST TCP: AN IMPROVEMENT ON TCP PROTOCOL
ROBUST TCP: AN IMPROVEMENT ON TCP PROTOCOL SEIFEDDINE KADRY 1, ISSA KAMAR 1, ALI KALAKECH 2, MOHAMAD SMAILI 1 1 Lebanese University - Faculty of Science, Lebanon 1 Lebanese University - Faculty of Business,
More informationThe TCP Protocol Stack
The TCP Protocol Stack Michael Brockway February 16, 2018 Introduction - Layered archtecture Networking software is desgined in a layered fashion The bottom layer is the services offered by the underlying
More informationImplementation of DDM in the MAK High Performance RTI
Implementation of DDM in the MAK High Performance RTI Douglas D. Wood 185 Alewife Brook Parkway Cambridge, MA 02138 dwood@mak.com Keywords: HLA, RTI, DDM ABSTRACT: The HLA data distribution management
More informationCSE 489/589 Programming Assignment 2
CSE 489/589 Programming Assignment 2 Objective In a given simulator, implement three reliable data transport protocols: Alternating-Bit (ABT), Go-Back-N (GBN), and Selective- Repeat (SR). 2 Outline Part
More informationLoops / Repetition Statements. There are three loop constructs in C. Example 2: Grade of several students. Example 1: Fixing Bad Keyboard Input
Loops / Repetition Statements Repetition s allow us to execute a multiple times Often they are referred to as loops C has three kinds of repetition s: the while loop the for loop the do loop The programmer
More informationProgramming Assignment 3: Transmission Control Protocol
CS 640 Introduction to Computer Networks Spring 2005 http://www.cs.wisc.edu/ suman/courses/640/s05 Programming Assignment 3: Transmission Control Protocol Assigned: March 28,2005 Due: April 15, 2005, 11:59pm
More informationCS 640 Introduction to Computer Networks Spring 2009
CS 640 Introduction to Computer Networks Spring 2009 http://pages.cs.wisc.edu/~suman/courses/wiki/doku.php?id=640-spring2009 Programming Assignment 3: Transmission Control Protocol Assigned: March 26,
More informationSIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP) Irma Aslanishvili, Tariel Khvedelidze
80 SIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP) Irma Aslanishvili, Tariel Khvedelidze Abstract: Ad hoc Networks are complex distributed systems that consist of wireless mobile or static nodes that
More informationObsoletes: RFC 930 February 1989
Network Working Group J. VanBokkelen Request for Comments: 1091 FTP Software, Inc. Obsoletes: RFC 930 February 1989 Status of This Memo Telnet Terminal-Type Option This RFC specifies a standard for the
More informationRequest for Comments: 938 February 1985
Network Working Group Request for Comments: 938 Trudy Miller ACC February 1985 Functional and Interface Specification STATUS OF THIS MEMO This RFC is being distributed to members of the DARPA research
More informationModel-Solver Integration in Decision Support Systems: A Web Services Approach
Model-Solver Integration in Decision Support Systems: A Web Services Approach Keun-Woo Lee a, *, Soon-Young Huh a a Graduate School of Management, Korea Advanced Institute of Science and Technology 207-43
More informationCS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring Lecture 21: Network Protocols (and 2 Phase Commit)
CS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring 2003 Lecture 21: Network Protocols (and 2 Phase Commit) 21.0 Main Point Protocol: agreement between two parties as to
More informationConcept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.
223 Chapter 19 Inter mediate TCP The Transmission Control Protocol/Internet Protocol (TCP/IP) suite of protocols was developed as part of the research that the Defense Advanced Research Projects Agency
More informationHLA has yet to make any significant impact in other simulation modelling areas such as business, health, manufacturing, and transportation.
Interoperating COTS Simulation Modelling Packages: A Call for the Standardisation of Entity Representation in the High Level Architecture Object Model Template Simon J E Taylor Centre for Applied Simulation
More informationIntroduction. Analytic simulation. Time Management
XMSF Workshop Monterey, CA Position Paper Kalyan S. Perumalla, Ph.D. College of Computing, Georgia Tech http://www.cc.gatech.edu/~kalyan August 19, 2002 Introduction The following are some of the authors
More informationA Plexos International Network Operating Technology May 2006
A Plexos International Network Operating Technology May 2006 BY 4664 Jamestown Ave, Suite 325 Baton Rouge, LA 70808 225.218.8002 1.0 Introduction. is a software environment comprised of proven technologies
More informationCCNA R&S: Introduction to Networks. Chapter 7: The Transport Layer
CCNA R&S: Introduction to Networks Chapter 7: The Transport Layer Frank Schneemann 7.0.1.1 Introduction 7.0.1.2 Class Activity - We Need to Talk Game 7.1.1.1 Role of the Transport Layer The primary responsibilities
More informationCSC 4900 Computer Networks: End-to-End Design
CSC 4900 Computer Networks: End-to-End Design Professor Henry Carter Fall 2017 Villanova University Department of Computing Sciences Review In the last two lectures, we discussed the fundamentals of networking
More informationIntroduction to Protocols
Chapter 6 Introduction to Protocols 1 Chapter 6 Introduction to Protocols What is a Network Protocol? A protocol is a set of rules that governs the communications between computers on a network. These
More informationC Refresher, Advance C, Coding Standard, Misra C Compliance & Real-time Programming
C Refresher, Advance C, Coding Standard, Misra C Compliance & Real-time Programming Course Overview This course transforms an IT-Professional or a Student into an expert C Programming Person with concepts
More informationMODELS OF DISTRIBUTED SYSTEMS
Distributed Systems Fö 2/3-1 Distributed Systems Fö 2/3-2 MODELS OF DISTRIBUTED SYSTEMS Basic Elements 1. Architectural Models 2. Interaction Models Resources in a distributed system are shared between
More informationDefining Networks with the OSI Model. Module 2
Defining Networks with the OSI Model Module 2 Objectives Skills Concepts Objective Domain Description Objective Domain Number Understanding OSI Basics Defining the Communications Subnetwork Defining the
More informationA COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET
ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer
More informationCCNA 1 Chapter 7 v5.0 Exam Answers 2013
CCNA 1 Chapter 7 v5.0 Exam Answers 2013 1 A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the
More informationDynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks
Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dodda Sunitha Dr.A.Nagaraju Dr. G.Narsimha Assistant Professor of IT Dept. Central University
More informationComprehensive Guide to Evaluating Event Stream Processing Engines
Comprehensive Guide to Evaluating Event Stream Processing Engines i Copyright 2006 Coral8, Inc. All rights reserved worldwide. Worldwide Headquarters: Coral8, Inc. 82 Pioneer Way, Suite 106 Mountain View,
More informationNetwork Layer, Part 1 Internet Architecture. History
Network Layer, Part 1 Internet Architecture These slides are created by Dr. Huang of George Mason University. Students registered in Dr. Huang s courses at GMU can make a single machine readable copy and
More informationCostas Tsatsoulis and Julian Holtzman. Lawrence Applied Research Corporation (LARC) Lawrence, KS
From: Proceedings of the Twelfth International FLAIRS Conference. Copyright 1999, AAAI (www.aaai.org). All rights reserved. Generating Satellite Control Schedules Using Case-Based Scheduling Costas Tsatsoulis
More informationComputer Networks with Internet Technology William Stallings. Chapter 2 Protocols and the TCP/IP Protocol Suite
Computer Networks with Internet Technology William Stallings Chapter 2 Protocols and the TCP/IP Protocol Suite Need For Protocol Architecture E.g. File transfer Source must activate comms. Path or inform
More informationDistributed Systems 8. Remote Procedure Calls
Distributed Systems 8. Remote Procedure Calls Paul Krzyzanowski pxk@cs.rutgers.edu 10/1/2012 1 Problems with the sockets API The sockets interface forces a read/write mechanism Programming is often easier
More informationNGI-FOM over RTI-NG and SMRP: Lessons Learned
NGI-FOM over RTI-NG and SMRP: Lessons Learned J. Mark Pullen, Robert Simon, Fei Zhao and oan Sun Chang Department of Computer Science and C 3 I Center George Mason University, Fairfax VA 22030 {mpullen,
More informationData and Computer Communications. Protocols and Architecture
Data and Computer Communications Protocols and Architecture Characteristics Direct or indirect Monolithic or structured Symmetric or asymmetric Standard or nonstandard Means of Communication Direct or
More informationLecture (03) Networking Model (TCP/IP) Networking Standard (OSI) cont.,..
Lecture (03) Networking Model (TCP/IP) Networking Standard (OSI) cont.,.. By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU : Fall 2014, Computer Networks II Agenda TCP/IP suite Data Encapsulation OSI History
More informationIP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia
IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist
More informationSchool of Engineering Department of Computer and Communication Engineering Semester: Fall Course: CENG415 Communication Networks
School of Engineering Department of Computer and Communication Engineering Semester: Fall 2012 2013 Course: CENG415 Communication Networks Instructors: Mr Houssam Ramlaoui, Dr Majd Ghareeb, Dr Michel Nahas,
More informationCombining the Power of DAVE and SIMULINK
Combining the Power of DAVE and SIMULINK From a High Level Model to Embedded Implementation Pedro Costa Infineon Munich, Germany pedro.costa@infineon.com Abstract In a modern real-time control system,
More informationApplication: Electronic Mail
Content Application: Electronic Mail Linda Wu Email system model protocol MIME extensions Mail access protocols (CMPT 471 2003-3) Reference: chapter 27 Notes-19 CMPT 471 2003-3 2 Email System Model Client-
More informationInventory Visibility and Interoperability Tool. TECHNICAL REPORT WD.B (Part 3 of 4)
Apolon IV/I Tool User Guide Inventory Visibility and Interoperability Tool Faculty of Organizational Sciences TECHNICAL REPORT WD.B.5.7.4 (Part 3 of 4) B5.10 Inventory Visibility Sub-Project: Apolon An
More informationThe Simulation of the VAPS XT Cockpit Display and Control System Based on the Integrated Data Distribution Network
The Simulation of the VAPS XT Cockpit Display and Control System Based on the Integrated Data Distribution Network Jia Liu and Tianjiang An Abstract Focus on the problems existed in the topologies of the
More informationAn Object-Oriented HLA Simulation Study
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 15, No 5 Special Issue on Control in Transportation Systems Sofia 2015 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.1515/cait-2015-0022
More informationMesh-Based Content Routing Using XML
Outline Mesh-Based Content Routing Using XML Alex C. Snoeren, Kenneth Conley, and David K. Gifford MIT Laboratory for Computer Science Presented by: Jie Mao CS295-1 Fall 2005 2 Outline Motivation Motivation
More informationInformation Collection and Survey Infrastructure, APIs, and Software Tools for Agent-based Systems (An Overview of JADE)
Course Number: SENG 609.22 Session: Fall, 2003 Document Name: Infrastructure, APIs, and Software tools for agent-based system (An Overview of JADE) Course Name: Agent-based Software Engineering Department:
More informationAutomation of Semantic Web based Digital Library using Unified Modeling Language Minal Bhise 1 1
Automation of Semantic Web based Digital Library using Unified Modeling Language Minal Bhise 1 1 Dhirubhai Ambani Institute for Information and Communication Technology, Gandhinagar, Gujarat, India Email:
More informationLesson 2-3: The IEEE x MAC Layer
Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes
More informationNabto Serial Link Protocol
Nabto Serial Link Protocol Nabto TM Nabto Serial Link Protocol Page 1 of 22 Contents Vocabulary... 4 Introduction... 5 Access Control... 5 Connection type... 5 Access Control List... 5 Protocol details...
More informationCMSC 322 Computer Networks Applications and End-To- End
CMSC 322 Computer Networks Applications and End-To- End Professor Doug Szajda CMSC 332: Computer Networks Announcements Project 2 has been posted and is due Monday, February 8 (No extension!) Homework
More informationKakadu and Java. David Taubman, UNSW June 3, 2003
Kakadu and Java David Taubman, UNSW June 3, 2003 1 Brief Summary The Kakadu software framework is implemented in C++ using a fairly rigorous object oriented design strategy. All classes which are intended
More informationData and Computer Communications
Data and Computer Communications Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications Eighth Edition by William Stallings Chap2: 1 Need For Protocol Architecture data exchange can involve
More informationLecture 10: Protocol Design
Lecture 10: Protocol Design Prof. Shervin Shirmohammadi SITE, University of Ottawa Fall 2005 CEG 4183 10-1 Introduction TCP and UDP are generic protocols: They fulfill the needs of a wide range of applications
More informationTransport Layer. Application / Transport Interface. Transport Layer Services. Transport Layer Connections
Application / Transport Interface Application requests service from transport layer Transport Layer Application Layer Prepare Transport service requirements Data for transport Local endpoint node address
More information! High Level Architecture (HLA): Background. ! Rules. ! Interface Specification. Maria Hybinette, UGA. ! SIMNET (SIMulator NETworking) ( )
Outline CSCI 8220 Parallel & Distributed Simulation PDES: Distributed Virtual Environments Introduction High Level Architecture! High Level Architecture (HLA): Background! Rules! Interface Specification»
More informationAN AGENT BASED INTELLIGENT TUTORING SYSTEM FOR PARAMETER PASSING IN JAVA PROGRAMMING
AN AGENT BASED INTELLIGENT TUTORING SYSTEM FOR PARAMETER PASSING IN JAVA PROGRAMMING 1 Samy Abu Naser 1 Associate Prof., Faculty of Engineering &Information Technology, Al-Azhar University, Gaza, Palestine
More informationCommunication. Distributed Systems Santa Clara University 2016
Communication Distributed Systems Santa Clara University 2016 Protocol Stack Each layer has its own protocol Can make changes at one layer without changing layers above or below Use well defined interfaces
More informationComputer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan
Computer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan Chapter3: OSI Reference Model: Network Software: Network
More informationUniversal Model Framework -- An Introduction
Universal Model Framework -- An Introduction By Visible Systems Corporation www.visible.com This document provides an introductory description of the Universal Model Framework an overview of its construct
More informationCSC 4900 Computer Networks:
CSC 4900 Computer Networks: Email Professor Henry Carter Fall 2017 Villanova University Department of Computing Sciences Review Last week we talked about design principles, and the application protocols
More information2.0.3 attributes: A named property of a class that describes the range of values that the class or its instances (i.e., objects) may hold.
T0/04-023 revision 2 Date: September 06, 2005 To: T0 Committee (SCSI) From: George Penokie (IBM/Tivoli) Subject: SAM-4: Converting to UML part Overview The current SCSI architecture follows no particular
More informationPart VI. Appendixes. Appendix A OSI Model and Internet Protocols Appendix B About the CD
Part VI Appendixes Appendix A OSI Model and Internet Protocols Appendix B About the CD OSI Model and Internet Protocols APPENDIX A In this appendix, you will Learn about the OSI model Review the network
More information