I am an intern for AAI Corporation for Summer 2012. The position I was hired for is for a Aerosonde-UAS Training Specialist. This internship is directly what I will be doing once I graduate with a degree in Unmanned Aircraft Systems. The hiring process went fairly smooth for me. I interviewed over the phone with my now head supervisor Ted. The interview went well and he was very flexible with me on starting later than the other interns, and most importantly letting me take the last two weeks off of July for military training. The process of doing paperwork and drug screening was straightforward except that it was hard to get a reply back from the company if I had a question.
I received my itinerary and instructions to Hunt Valley, MD in my email. This is AAI Corp. headquarters and where my orientation was. My work location is Fort Pickett, VA. Was a great flight and I flew first class to MD. Later I found out that AAI usually doesn’t do that but I got lucky as that was only available seating. Everything went smooth and I landed got my rental car and drove to my hotel in MD. I stayed at the Hilton Embassy Suites which was very nice for the first two days.
Day 1 of orientation we were greeted by the HR manager and she was very nice and welcomed everyone aboard. I was in a classroom of about 30 people most were full time hires and were a mix of different departments that were being hired. All the other interns were engineers except me. K-State students are the first to every be hired by AAI as flight operations interns. With that being said that is where my first major problem was. The interns were taken to go get badges and after that I was told to report to building 318 because they did not know where I was going to be working or what I should be doing. I waited for about 45 minutes in a lobby waiting for a secretary to contact my supervisor to find out what exactly I was to be doing. She was unable to contact him and I was told to go back with the other interns. I arrived back at the main headquarter building when I finally received a phone call from a lady that was doing the orientation with the full time hired Field Support Representatives (FSR). These are employees that are contractors for overseas work, flight operations, and aircraft maintenance. She told me that I would be treated just like the full time employees and go through orientation with them.
Orientation was interesting to go through with the FSR group. Of the 9 of us there I was the only intern, one was going to be an instructor and stay in VA, and the other 7 were all contractors going to Afghanistan. Most of the orientation focused on deployment training and readiness for Afghanistan. The rest of orientation focused on the pay system and how to do time-cards and expenditures. The system is very hard to navigate and is the biggest complaint I have about working here. The other interns from K-State were able to help me but it is still very difficult and is hated by all of us.
The third day was what I call the Rental Car Shuffle. The company isn’t able to get us rental cars long term in VA by using the rental cars we initially got from BWI airport. The FSR group of us had to drive back to BWI with our 4 cars. Rent 4 new cars drive them to Richmond Airport. Then return them and rent 4 more new cars for our final long term rental. I ended up with a Mazda 3 which is an alright car but it had couple dents in it and the guy at Hertz was kinda rude and not very helpful but I was able to fill the sheet out for the small dents.
The next two days was actual time working on simulators and helping students and assisting the instructors. I was very surprised by how much AAI is utilizing us as interns. On my second day working in VA I was already instructing new hires on how to fly the Aerosonde system. I was not expecting to be doing that so soon, but am glad that I will have the opportunity to gain this valuable experience. AAI is currently hiring on new instructors, but since they are short handed the three interns are filling in as instructors to the other new hires who have no experience on the Aerosonde system.
Overall week 1 went very well and I am comfortably in my hotel in Midlothian, VA at the Holiday Inn. It is a 45 minute drive to work but is well worth staying in Midlothian instead of middle of nowhere near Fort Pickett where I am working. I have been spending most my time this week hanging out at the other interns place which they are roommates in a two bedroom Executive Stay Apartments.
by: James Moore, Partners: Matt Balderree
Objectives: Download a program called Python and use it to setup and use a simple client/server system.
Equipment List: Mac Laptop. (USED THROUGHOUT LAB)
Notes and Observations: After downloading Python we edited the client.py and server.py files so that we could test messages between the client and server. The connections worked and we were able to send through client and see in server in Python. Initially in the beginning we had trouble getting it to work on Matt’s Mac, but came to the conclusion that Python doesn’t work well when using Mac OSX Lion. I was using older version of OSX Snow Leopard, and everything worked out fine and was able to communicate.
Questions: What is a networking socket? A socket is one endpoint of a two-way communication link between two programs running on the network. A socket is bound to a port number so that the TCP layer can identify the application that data is destined to be sent.
Which program should be started first? Why? The server should be started first in order for it to be listening to what port incoming messages are coming from.
What is a localhost? It is the local computer address or loopback address.
On which layer of the OSI model are TCP connections made? Layer 4: Transport Layer.
What protocol is expected on port 80? HTTP
Diagrams, Flowcharts, and Figures:
References: Lab handout
Conclusion: This lab allowed us to learn how client/servers communicate and how to setup a simple client server. The lab went fairly quick with most of our time trying to download the software and getting it to work on our computers. I’ve used a robust system called mIRC when I was in the military and this lab allowed me to understand how it works better.
Introduction to Networking
27 April, 12
James Moore and I are giving a video presentation on the capabilities of Unmanned Aerial Systems to aid in the creation of wireless networks that would cover both cellular, IP, and radio communications. We will also be discussing some of the risks of using unmanned aerial vehicles for illegal types of propagation and other illegal activities.
James put the video presentation together; he took the videos we found and edited them for content and for time. The videos themselves provide the narration with some transition slides separating the different segments. James and Matt, both worked on finding the reference material used for the project and the sources used. Matt put together the works cited page, paper summary, and will be the one introducing and answering questions.
THE VIDEO CAN BE FOUND AT THIS LINK:
- Bird, B. (Director). (2011). Mission: Impossible – Ghost Protocol [Motion Picture]. USA.
- Blitzer, W. (2011, August 31). Our interview on CNN. Retrieved 04 20, 2012, from YouTube.com: http://www.youtube.com/watch?v=EhFrbSZEjTg&feature=player_embedded
- Cook, J. (2011, August 24). The Scariest Hacks from Black Hat and Defcon. Retrieved 04 20, 2012, from Hackaday.com: http://hackaday.com/2011/08/24/the-scariest-hacks-from-black-hat-and-defcon/
- EPSTEIN, Z. (2012, 03 12). Flying drone swarm could bring free Wi-Fi access to protesters . Retrieved 04 20, 2012, from BGR.COM: http://www.bgr.com/2012/03/12/flying-drone-swarm-could-bring-free-wi-fi-access-to-protesters-video/
- Global Observer. (2012). Retrieved 04 20, 2012, from Aerovironment: http://www.avinc.com/globalobserver/missions/disaster_relief
- Hendren, J. (2011, 01 23). Eye in the Sky: Pentagon Tests New Spy Plane. Retrieved 04 20, 2012, from abcnew.com: http://abcnews.go.com/Technology/eye-sky-pentagon-tests-spy-plane/story?id=12744955&page=1#.T5c_W47IEob
- Iran airs footage of downed US drone. (2011, 12 08). Retrieved 04 20, 2012, from PRESSTV.IR: http://www.presstv.ir/detail/214542.html
- KOEBLER, J. (2012, 03 19). The Pirate Bay to Fly ‘Server Drones’ to Avoid Law Enforcement. Retrieved 04 20, 2012, from USNEWS AND WORLD REPORT: http://www.usnews.com/news/articles/2012/03/19/the-pirate-bay-to-fly-server-drones-to-avoid-law-enforcement
- McCullagh, D. (2011, August 04). Wireless drone sniffs Wi-Fi, Bluetooth, phone signals. Retrieved 04 20, 2012, from cnet.com: http://news.cnet.com/8301-31921_3-20088180-281/wireless-drone-sniffs-wi-fi-bluetooth-phone-signals/
- Severe Weather Drone View . (2011, 05 02). Retrieved 04 20, 2012, from YouTube: http://www.youtube.com/watch?v=nSMflN14MHE
by: James Moore, Partners: Matt Balderree, and class.
Objectives: Build a working network implementing subnetting. Create a network and assign IP addresses, Mask, and Gateways to computers. Use two routers interconnected together with at least three subnets.
Equipment List: Two Macbooks, Four PCs, Three Switches, Three Routers. (USED THROUGHOUT LAB)
Notes and Observations: We first started this lab by drawing out a topology planned diagram of all the Equipment and where each computer would connect to a switch and then into the router. This gave a good visualization of how everything would come together. On this diagram we assigned IP addresses, Mask, Gateway to the Computers, and created Subnet addresses for our subnetworks of two computer per switch. We showed where each switch would connect into the router via either: f0, e0, t0, f1. Then the two routers were interconnected so that both subnetworks were networked. The routers were manually configured.
Diagrams, Flowcharts, and Figures: Our network looked similar to the one below:
References: Lab handout
Conclusion: We were able as a class complete the lab fairly quickly. Once the topology diagram was complete running the cables and connecting everything went smoothly. Most of time was spent configuring the routers. We tested the network by pinging both the PCs on the far side subnetwork, and they were able to Ping our Macbooks on our subnetwork.
This week we focused on sub-netting. The practice of dividing a network into two or more networks is called subnetting.
Subnetting is the process of designating some high-order bits from the host part and grouping them with the network mask to form the subnet mask. This divides a network into smaller subnets. The following diagram modifies the example by moving 2 bits from the host part to the subnet mask to form a smaller subnet one fourth the previous size:
The following video shows how subnetting works:
This week I contributed to Diigo on the future of network security:
Aerovironment. (2012, 01 01). Aerovironment. Retrieved 04 04, 2012, from Avinc.com: http://www.avinc.com/globalobserver/
Bea, F. (2012, April 4). No wires, no laws, no limits: How a flying drone network could liberate the Internet from above. Retrieved April 7, 2012, from digitaltrends.com: http://www.digitaltrends.com/cool-tech/no-wires-no-laws-no-limits-how-a-flying-drone-network-could-liberate-the-internet-from-above/
Bing, B. (2008). Emerging Technologies in Wireless LANs: Theory, Design, and Deployment. Atlanta, GA: Cambridge. (Book)
defense-update.com. (2009). Airborne Communications Relay Could Become Primary Mission for Tactical UAVs. Retrieved April 7, 2012, from defense-update.com: http://defense-update.com/features/2010/january/airborne_relays_for_uavs_110110.html
Dong, A. I. (2010, 1 1). Performance Analysis of Mobile Ad Hoc Unmanned Aerial Vehicle Communication Networks with Directional Antennas. Retrieved 04 04, 2012, from http://www.hindawi.com: http://www.hindawi.com/journals/ijae/2010/874586/
Epstein, Z. (2012, March 12). Flying drone swarm could bring free Wi-Fi access to protesters. Retrieved April 7, 2012, from BGR.com: http://www.bgr.com/2012/03/12/flying-drone-swarm-could-bring-free-wi-fi-access-to-protesters-video/
Humphries, M. (2011, July 29). WASP: The Linux-powered flying spy drone that cracks Wi-Fi & GSM networks. Retrieved April 7, 2012, from geek.com: http://www.geek.com/articles/geek-pick/wasp-the-linux-powered-flying-spy-drone-that-cracks-wi-fi-gsm-netwokrs-20110729/
Menjivar, M. J. (2012, 02 01). PDF document. Retrieved 04 04, 2012, from nps.edu: http://faculty.nps.edu/cdprince/mwc/docs/Experiments/TNT-2012-02_WaveRelayReport_Ex0.pdf
Osborn, K. (2011, 07 06). ‘Aerial layer’ expands Army network during evaluation. Retrieved 04 04, 2012, from http://www.army.mil: http://www.army.mil/article/61171/_Aerial_layer__expands_Army_network_during_evaluation/
USNews. (2012, 03 19). USNews. Retrieved 04 04, 2012, from The Pirate Bay to Fly ‘Server Drones’ to Avoid Law Enforcement: http://www.usnews.com/news/articles/2012/03/19/the-pirate-bay-to-fly-server-drones-to-avoid-law-enforcement
Well this week was spring break. I did think more about my video topic that we will be doing a project on. For the video topic we are to make a video 5 minutes or less about a networking topic. I paired up with Matt Balderree, and decided to do my topic on something related to my career field and college major. So we will be doing airborne communications networks, focusing on unmanned drones and how they can provide communications and networking functions.
I also shared on diigo on airborne networks: