Darken, Christian J.
MetadataShow full item record
This thesis investigated the current infrastructure for web-based simulations using the DIS network protocol. The main technologies studied were WebSockets, WebRTC and WebGL. This thesis sought readily available means to establish networks for interchanging DIS message (PDUs), so the WebSocket gateway server from Open-DIS project was used to construct a Client-Server structure and PeerJS API was used to construct a peer-to-peer structure. WebGL was used to create a scene and render 3D models in browsers. A first-person-shooter tank game was used as a test application with both WebSocket and WebRTC infrastructures. Experiments in this thesis included measuring the rate of sending and receiving DIS packets and analysis of the tank game by profiling tools. All the experiments were run on Chrome and Firefox browsers in a closed network. The experimental results showed that both WebSocket and WebRTC infrastructures were competent enough to support web-based DIS simulation. The results also found the significant differences of performance between Chrome and Firefox. Currently, the best performance is provided by the combination of Firefox using the WebRTC framework. The analysis of the tank game showed that most of the browser’s computational resources were spent on the WebGL graphics, with only a small percentage of the resources expended on exchanging DIS packets.
RightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Showing items related by title, author, creator and subject.
Bending strength test and evaluation of a transtibial prosthetic socket fabricated by selective laser sintering Brooks, Amanda Joyce (2004-05);Transtibial prosthetic sockets made using selective laser sintering (SLS) of Duraform (™) PA have no documented failure data. In order to produce prostheses with safe weight and usage limits, a non-standard bending test ...
ANALYSIS OF CLIENT-SIDE ATTACKS THROUGH DRIVE-BY HONEYPOTS Foley, Brian A. (Monterey, CA; Naval Postgraduate School, 2022-12);Client-side cyberattacks on Web browsers are becoming more common relative to server-side cyberattacks. This work tested the ability of the honeypot (decoy) client software Thug to detect malicious or compromised servers ...
Information systems strategic planning for Kosovo Peace keeping force Altinsoy, Nuh. (Monterey, California. Naval Postgraduate School, 2001-09);This thesis presents a model of a detailed information strategic planning for a military organization. The model includes the analysis and design of a network and a three-tier client server system. The network analysis ...