473,396 Members | 1,998 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,396 software developers and data experts.

Secure MultiRobot Management

Hi,
I am currently doing my final year project "Secure mobile Robot
Management" . I have done the theoretical aspects of it till now and
now thinking of coding it .

I would like to code in Python , but i am new to Python Network
Programming .
Some of features of my project are:

1. Each robot can send data to any other robot.
2. Each robot can receive data from any other robot.
3. Every Robot has atleast 1 other bot in its communication range.
4. maximum size of a data packet is limited to 35 bytes
5. each mobile robot maintains a table with routes
6. all the routes stored in the routing table include a ï¬eld named
life-time.
7. Route Discovery Process initiated if there is no known route to
other bot.
8. There is no server over here .
9. every bot should be able to process the data from other bots and
both multicast/unicast
need to be supported.

Assume the environment is gridded mesh and bots exploring the area.
They need to perform a set of tasks (assume finding some locations
which are dangerous or smthing like that).

My main concern is how to go about modifying the headers such that
everything fits in 35bytes .
I would like to know how to proceed and if any links or resources in
this regard. How to modify the headers ? ie. all in 35 bytes .

Thank You,
Raja.

Sep 22 '06 #1
0 732

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

18
by: | last post by:
Please help. After a number of wrong turns and experiments I need advice on login management system to secure our web pages without inconveniencing our visitors or our internal staff. What I...
7
by: Seth | last post by:
I have noticed that the id of my session object changes when I switch from a non-secure to a secure connection. What I'm trying to do: I have a cookie that is built on the non-secure side of...
12
by: infini.g | last post by:
Hey, I was just wondering if / how would it be possible to create secure sessions for a website using Python CGI... I thought of using cookies, and things looked promising for a while; I could...
31
by: Fredrik Tolf | last post by:
Hi List! I was thinking about secure Python code execution, and I'd really appreciate some comments from those who know Python better than I do. I was thinking that maybe it could be possible...
0
by: rb | last post by:
I'm writing an application that should have few pages secure (signin, account management etc) and a bunch of pages that are "public" (http, non-secure). I thought that because the way...
0
by: David Gempton | last post by:
Hi all. I just want to make you aware of an exciting new piece of software that is available from www.ttc4it.co.nz I think you'll be interested in the software because it has been developed in...
68
by: Jack | last post by:
http://www.open-std.org/jtc1/sc22/wg14/ http://www.open-std.org/jtc1/sc22/wg14/www/docs/n1135.pdf Has anyone gone through this? Is this useful? Will it make it to the next standard?
0
by: ALEAALDOUS | last post by:
Hi folks, Go and get a copy of Secure Auditor which is a unified digital risk management solution and provides 30 tools in 1 package. It performs scan and audit windows, oracle, Cisco router and...
46
by: RAZZ | last post by:
Hello, Can anyone suggest me solution? I Need to manage different types of documents (doc,xls,ppt etc) in server. I have folder structure to maintain these documents in server. Say folder1 is...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.