Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses and Dissertations

2008

Computer network protocols

Articles 1 - 2 of 2

Full-Text Articles in Physical Sciences and Mathematics

A Novel Communications Protocol Using Geographic Routing For Swarming Uavs Performing A Search Mission, Robert L. Lidowski Mar 2008

A Novel Communications Protocol Using Geographic Routing For Swarming Uavs Performing A Search Mission, Robert L. Lidowski

Theses and Dissertations

This research develops the UAV Search Mission Protocol (USMP) for swarming UAVs and determines the protocol's effect on search mission performance. It is hypothesized that geographically routing USMP messages improves search performance by providing geography-dependent data to locations where it impacts search decisions. It is also proposed that the swarm can use data collected by the geographic routing protocol to accurately determine UAV locations and avoid sending explicit location updates. The hypothesis is tested by developing several USMP designs that are combined with the Greedy Perimeter Stateless Routing (GPSR) protocol and a search mission swarm logic into a single network …


Dynamic Protocol Reverse Engineering A Grammatical Inference Approach, Mark E. Deyoung Mar 2008

Dynamic Protocol Reverse Engineering A Grammatical Inference Approach, Mark E. Deyoung

Theses and Dissertations

Round trip engineering of software from source code and reverse engineering of software from binary files have both been extensively studied and the state-of-practice have documented tools and techniques. Forward engineering of protocols has also been extensively studied and there are firmly established techniques for generating correct protocols. While observation of protocol behavior for performance testing has been studied and techniques established, reverse engineering of protocol control flow from observations of protocol behavior has not received the same level of attention. State-of-practice in reverse engineering the control flow of computer network protocols is comprised of mostly ad hoc approaches. We …