Robert Cole - Academia.edu (original) (raw)

Papers by Robert Cole

Research paper thumbnail of DYMO, SMF and REPORT MIBs

Three MIBs: • DYMO-MIB <draft-ietf-manet-dymo-mib-02.txt> [1] • SMF-MIB <draft-ietf-mane... more Three MIBs: • DYMO-MIB <draft-ietf-manet-dymo-mib-02.txt> [1] • SMF-MIB <draft-ietf-manet-smf-mib-00.txt> [2]

Bookmarks Related papers MentionsView impact

Research paper thumbnail of robust NETCONF <draft-cole-netconf-robust-config-02.txt

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Initial Studies on Worm Propagation in Manets for Future Army Combat Systems

This study presents an analysis of computer worm propagation in a Mobile Ad-hoc Network (MANET). ... more This study presents an analysis of computer worm propagation in a Mobile Ad-hoc Network (MANET). According to the recent DARPA BAA - Defense Against Cyber Attacks on MANETS (DARPA, 2004), "One of the most severe cyber threats is expected to be worms with arbitrary payload that can infect and satu- rate MANET-based networks on the order of seconds". Critical to

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Stochastic Modeling for Hybrid Network Simulations

Bookmarks Related papers MentionsView impact

Research paper thumbnail of An investigative analysis of information assurance issues associated with the GIG's P&P architecture

SPIE Proceedings, 2007

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Inter-Domain Routing with Multi-Dimensional QoS Requirements

MILCOM 2005 - 2005 IEEE Military Communications Conference

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Address-Identifier Mapping System for scalable routing

2009 IEEE Symposium on Computers and Communications, 2009

The main architectural problem with the current inter-domain routing model is the overloading of ... more The main architectural problem with the current inter-domain routing model is the overloading of IP addresses due to their use for identification, location, and forwarding. This makes it hard to support the need for multi-homing, traffic engineering, and mobility while maintaining address hierarchy that is essential for scalable routing. Thus, there is a need to separate identifiers from locators. In this paper we identify architectural and protocol changes in addressing and routing needed to provide major improvements in scalability. We design a corresponding protocol solution (Address-Identifier Mapping System-AIMS) based on separation of identification and addressing, and a mechanism for mapping ID to address.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Automated discovery of information services in heterogeneous distributed networks

MILCOM 2008 - 2008 IEEE Military Communications Conference, 2008

... Harshavardhana Applied Physics Laboratory Johns Hopkins University Laurel, MD, USA Abstract—T... more ... Harshavardhana Applied Physics Laboratory Johns Hopkins University Laurel, MD, USA Abstract—The Global Information Grid (GIG) will be com-prised of collections of different Service Capability Domains (SCDs). Each SCD offers a set of information services, such as Voice ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of DYMO and SMF MIBs

ietf.org

Bookmarks Related papers MentionsView impact

Research paper thumbnail of DYMO, SMF, NHDP and OLSR MIBs

ietf.org

Four MIBs related to MANET WG protocols:• DYMO MIB< ietf-manet-dymo-mib-02. txt>[1]• SMF MI... more Four MIBs related to MANET WG protocols:• DYMO MIB< ietf-manet-dymo-mib-02. txt>[1]• SMF MIB< ietf-cole-manet-smf-mib-02. txt>[2]• NHDP MIB< ietf-cole-manet-nhdp-mib-01. txt>[3]• OLSR MIB< ietf-cole-manet-olsr-mib-01. txt>[4]

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Comparative performance of interleaved and non-interleaved pipelining in ATM terminal adapters

Computer Networks and ISDN Systems, 1995

In this paper we compare the end-to-end delay performance of two service disciplines that an Asyn... more In this paper we compare the end-to-end delay performance of two service disciplines that an Asynchronous Transfer Mode (ATM) multiplexor can use to multiplex pipelined synchronous native protocol frames arriving over low speed access lines onto higher speed ATM trunks. The ATM multiplexor must convert native protocol frames on the access lines (typically hundreds of bytes in length) into ATM cells on the trunks (of fixed length 53 bytes) at the network access and the corresponding ATM (de)multiplexor must reassemble these multiple ATM cells into a bit continuous synchronous native protocol frame at the network egress.In one service discipline, the multiplexor (hereafter referred to as a terminal adaptor, or TA) pipelines one synchronous frame at a time onto the high speed trunk, waiting, if it needs to, for the successive ATM cells from this one synchronous frame to accumulate. This scheme introduces a larger queueing delay at the ingress TA but no playout delay is required at the egress TA. In the other scheme the TA interleaves the ATM cells from the various synchronous frames arriving concurrently over the low speed lines. An interleaving scheme has a smaller queueing delay, but introduces a large variability in the network insertion times of the ATM cells corresponding to a native protocol frame. Hence the egress TA must enforce a delay before playing out the original bit-synchronous native frame over a low speed line, so as to increase the probability that the ATM cells are available when required to properly reassemble the native synchronous frame into a bit continuous stream.Using an analytical model for the first scheme and a simulation model for the second scheme we analyze the end-to-end delay of a synchronous frame, and compare the mean end-to-end delay for various trunk speeds (TA-to-network switch) to “access” line speed ratios. We conclude that, for the cases studied in this paper, if this ratio is greater than or equal to 4 then, over the range of useful loading, interleaved pipelining typically yields smaller mean delays than noninterleaved pipelining. If the ratio is less than 4 then interleaving typically yields larger mean delays for native protocols due to increased playout delays at the egress TA.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Voice over IP performance monitoring

ACM SIGCOMM Computer Communication Review, 2001

We describe a method for monitoring Voice over IP (VoIP) applications based upon a reduction of t... more We describe a method for monitoring Voice over IP (VoIP) applications based upon a reduction of the ITU-T's E-Model to transport level, measurable quantities. In the process, 1) we identify the relevant transport level quantities, 2) we discuss the tradeoffs between placing the monitors within the VoIP gateways versus placement of the monitors within the transport path, and 3) we identify several areas where further work and consensus within the industry are required. We discover that the relevant transport level quantities are the delay, network packet loss and the decoder's de-jitter buffer packet loss. We find that an in-path monitor requires the definition of a reference de-jitter buffer implementation to estimate voice quality based upon observed transport measurements. Finally, we suggest that more studies are required, which evaluate the quality of various VoIP codecs in the presence of representative packet loss patterns.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Initial Studies on Worm Propagation in MANETS for Future Army Combat Systems

This study presents an analysis of computer worm propagation in a Mobile Ad-hoc Network (MANET). ... more This study presents an analysis of computer worm propagation in a Mobile Ad-hoc Network (MANET). According to the recent DARPA BAA - Defense Against Cyber Attacks on MANETS (DARPA, 2004), ”One of the most severe cyber threats is expected to be worms with ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of MANET network management and performance monitoring for NHDP and OLSRv2

2010 International Conference on Network and Service Management, 2010

Bookmarks Related papers MentionsView impact

Research paper thumbnail of DYMO, SMF and REPORT MIBs

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Using performance signatures and software rejuvenation for worm mitigation in tactical MANETs

Proceedings of the 6th international workshop on Software and performance - WOSP '07, 2007

Bookmarks Related papers MentionsView impact

Research paper thumbnail of On A Global Information Grid Simulation Platform for Investigations of End-to-End Performance

MILCOM 2005 - 2005 IEEE Military Communications Conference, 2005

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Impact Of Precedence Enabled Per Hop Behaviors on TCP Flows

MILCOM 2007 - IEEE Military Communications Conference, 2007

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Analysis of Multiple Trees on Path Discovery for Beacon-Based Routing Protocols

2007 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, 2007

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Dynamics of Learning Algorithms for the On-Demand Secure Byzantine Routing Protocol

Lecture Notes in Computer Science, 2006

Bookmarks Related papers MentionsView impact

Research paper thumbnail of DYMO, SMF and REPORT MIBs

Three MIBs: • DYMO-MIB <draft-ietf-manet-dymo-mib-02.txt> [1] • SMF-MIB <draft-ietf-mane... more Three MIBs: • DYMO-MIB <draft-ietf-manet-dymo-mib-02.txt> [1] • SMF-MIB <draft-ietf-manet-smf-mib-00.txt> [2]

Bookmarks Related papers MentionsView impact

Research paper thumbnail of robust NETCONF <draft-cole-netconf-robust-config-02.txt

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Initial Studies on Worm Propagation in Manets for Future Army Combat Systems

This study presents an analysis of computer worm propagation in a Mobile Ad-hoc Network (MANET). ... more This study presents an analysis of computer worm propagation in a Mobile Ad-hoc Network (MANET). According to the recent DARPA BAA - Defense Against Cyber Attacks on MANETS (DARPA, 2004), "One of the most severe cyber threats is expected to be worms with arbitrary payload that can infect and satu- rate MANET-based networks on the order of seconds". Critical to

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Stochastic Modeling for Hybrid Network Simulations

Bookmarks Related papers MentionsView impact

Research paper thumbnail of An investigative analysis of information assurance issues associated with the GIG's P&P architecture

SPIE Proceedings, 2007

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Inter-Domain Routing with Multi-Dimensional QoS Requirements

MILCOM 2005 - 2005 IEEE Military Communications Conference

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Address-Identifier Mapping System for scalable routing

2009 IEEE Symposium on Computers and Communications, 2009

The main architectural problem with the current inter-domain routing model is the overloading of ... more The main architectural problem with the current inter-domain routing model is the overloading of IP addresses due to their use for identification, location, and forwarding. This makes it hard to support the need for multi-homing, traffic engineering, and mobility while maintaining address hierarchy that is essential for scalable routing. Thus, there is a need to separate identifiers from locators. In this paper we identify architectural and protocol changes in addressing and routing needed to provide major improvements in scalability. We design a corresponding protocol solution (Address-Identifier Mapping System-AIMS) based on separation of identification and addressing, and a mechanism for mapping ID to address.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Automated discovery of information services in heterogeneous distributed networks

MILCOM 2008 - 2008 IEEE Military Communications Conference, 2008

... Harshavardhana Applied Physics Laboratory Johns Hopkins University Laurel, MD, USA Abstract—T... more ... Harshavardhana Applied Physics Laboratory Johns Hopkins University Laurel, MD, USA Abstract—The Global Information Grid (GIG) will be com-prised of collections of different Service Capability Domains (SCDs). Each SCD offers a set of information services, such as Voice ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of DYMO and SMF MIBs

ietf.org

Bookmarks Related papers MentionsView impact

Research paper thumbnail of DYMO, SMF, NHDP and OLSR MIBs

ietf.org

Four MIBs related to MANET WG protocols:• DYMO MIB< ietf-manet-dymo-mib-02. txt>[1]• SMF MI... more Four MIBs related to MANET WG protocols:• DYMO MIB< ietf-manet-dymo-mib-02. txt>[1]• SMF MIB< ietf-cole-manet-smf-mib-02. txt>[2]• NHDP MIB< ietf-cole-manet-nhdp-mib-01. txt>[3]• OLSR MIB< ietf-cole-manet-olsr-mib-01. txt>[4]

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Comparative performance of interleaved and non-interleaved pipelining in ATM terminal adapters

Computer Networks and ISDN Systems, 1995

In this paper we compare the end-to-end delay performance of two service disciplines that an Asyn... more In this paper we compare the end-to-end delay performance of two service disciplines that an Asynchronous Transfer Mode (ATM) multiplexor can use to multiplex pipelined synchronous native protocol frames arriving over low speed access lines onto higher speed ATM trunks. The ATM multiplexor must convert native protocol frames on the access lines (typically hundreds of bytes in length) into ATM cells on the trunks (of fixed length 53 bytes) at the network access and the corresponding ATM (de)multiplexor must reassemble these multiple ATM cells into a bit continuous synchronous native protocol frame at the network egress.In one service discipline, the multiplexor (hereafter referred to as a terminal adaptor, or TA) pipelines one synchronous frame at a time onto the high speed trunk, waiting, if it needs to, for the successive ATM cells from this one synchronous frame to accumulate. This scheme introduces a larger queueing delay at the ingress TA but no playout delay is required at the egress TA. In the other scheme the TA interleaves the ATM cells from the various synchronous frames arriving concurrently over the low speed lines. An interleaving scheme has a smaller queueing delay, but introduces a large variability in the network insertion times of the ATM cells corresponding to a native protocol frame. Hence the egress TA must enforce a delay before playing out the original bit-synchronous native frame over a low speed line, so as to increase the probability that the ATM cells are available when required to properly reassemble the native synchronous frame into a bit continuous stream.Using an analytical model for the first scheme and a simulation model for the second scheme we analyze the end-to-end delay of a synchronous frame, and compare the mean end-to-end delay for various trunk speeds (TA-to-network switch) to “access” line speed ratios. We conclude that, for the cases studied in this paper, if this ratio is greater than or equal to 4 then, over the range of useful loading, interleaved pipelining typically yields smaller mean delays than noninterleaved pipelining. If the ratio is less than 4 then interleaving typically yields larger mean delays for native protocols due to increased playout delays at the egress TA.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Voice over IP performance monitoring

ACM SIGCOMM Computer Communication Review, 2001

We describe a method for monitoring Voice over IP (VoIP) applications based upon a reduction of t... more We describe a method for monitoring Voice over IP (VoIP) applications based upon a reduction of the ITU-T's E-Model to transport level, measurable quantities. In the process, 1) we identify the relevant transport level quantities, 2) we discuss the tradeoffs between placing the monitors within the VoIP gateways versus placement of the monitors within the transport path, and 3) we identify several areas where further work and consensus within the industry are required. We discover that the relevant transport level quantities are the delay, network packet loss and the decoder's de-jitter buffer packet loss. We find that an in-path monitor requires the definition of a reference de-jitter buffer implementation to estimate voice quality based upon observed transport measurements. Finally, we suggest that more studies are required, which evaluate the quality of various VoIP codecs in the presence of representative packet loss patterns.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Initial Studies on Worm Propagation in MANETS for Future Army Combat Systems

This study presents an analysis of computer worm propagation in a Mobile Ad-hoc Network (MANET). ... more This study presents an analysis of computer worm propagation in a Mobile Ad-hoc Network (MANET). According to the recent DARPA BAA - Defense Against Cyber Attacks on MANETS (DARPA, 2004), ”One of the most severe cyber threats is expected to be worms with ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of MANET network management and performance monitoring for NHDP and OLSRv2

2010 International Conference on Network and Service Management, 2010

Bookmarks Related papers MentionsView impact

Research paper thumbnail of DYMO, SMF and REPORT MIBs

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Using performance signatures and software rejuvenation for worm mitigation in tactical MANETs

Proceedings of the 6th international workshop on Software and performance - WOSP '07, 2007

Bookmarks Related papers MentionsView impact

Research paper thumbnail of On A Global Information Grid Simulation Platform for Investigations of End-to-End Performance

MILCOM 2005 - 2005 IEEE Military Communications Conference, 2005

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Impact Of Precedence Enabled Per Hop Behaviors on TCP Flows

MILCOM 2007 - IEEE Military Communications Conference, 2007

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Analysis of Multiple Trees on Path Discovery for Beacon-Based Routing Protocols

2007 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, 2007

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Dynamics of Learning Algorithms for the On-Demand Secure Byzantine Routing Protocol

Lecture Notes in Computer Science, 2006

Bookmarks Related papers MentionsView impact