Robert Cole - Academia.edu (original) (raw)
Papers by Robert Cole
Three MIBs: • DYMO-MIB <draft-ietf-manet-dymo-mib-02.txt> [1] • SMF-MIB <draft-ietf-mane... more Three MIBs: • DYMO-MIB <draft-ietf-manet-dymo-mib-02.txt> [1] • SMF-MIB <draft-ietf-manet-smf-mib-00.txt> [2]
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
This study presents an analysis of computer worm propagation in a Mobile Ad-hoc Network (MANET). ... more This study presents an analysis of computer worm propagation in a Mobile Ad-hoc Network (MANET). According to the recent DARPA BAA - Defense Against Cyber Attacks on MANETS (DARPA, 2004), "One of the most severe cyber threats is expected to be worms with arbitrary payload that can infect and satu- rate MANET-based networks on the order of seconds". Critical to
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
SPIE Proceedings, 2007
Bookmarks Related papers MentionsView impact
MILCOM 2005 - 2005 IEEE Military Communications Conference
Bookmarks Related papers MentionsView impact
2009 IEEE Symposium on Computers and Communications, 2009
The main architectural problem with the current inter-domain routing model is the overloading of ... more The main architectural problem with the current inter-domain routing model is the overloading of IP addresses due to their use for identification, location, and forwarding. This makes it hard to support the need for multi-homing, traffic engineering, and mobility while maintaining address hierarchy that is essential for scalable routing. Thus, there is a need to separate identifiers from locators. In this paper we identify architectural and protocol changes in addressing and routing needed to provide major improvements in scalability. We design a corresponding protocol solution (Address-Identifier Mapping System-AIMS) based on separation of identification and addressing, and a mechanism for mapping ID to address.
Bookmarks Related papers MentionsView impact
MILCOM 2008 - 2008 IEEE Military Communications Conference, 2008
... Harshavardhana Applied Physics Laboratory Johns Hopkins University Laurel, MD, USA AbstractT... more ... Harshavardhana Applied Physics Laboratory Johns Hopkins University Laurel, MD, USA AbstractThe Global Information Grid (GIG) will be com-prised of collections of different Service Capability Domains (SCDs). Each SCD offers a set of information services, such as Voice ...
Bookmarks Related papers MentionsView impact
ietf.org
Bookmarks Related papers MentionsView impact
ietf.org
Four MIBs related to MANET WG protocols:• DYMO MIB< ietf-manet-dymo-mib-02. txt>[1]• SMF MI... more Four MIBs related to MANET WG protocols:• DYMO MIB< ietf-manet-dymo-mib-02. txt>[1]• SMF MIB< ietf-cole-manet-smf-mib-02. txt>[2]• NHDP MIB< ietf-cole-manet-nhdp-mib-01. txt>[3]• OLSR MIB< ietf-cole-manet-olsr-mib-01. txt>[4]
Bookmarks Related papers MentionsView impact
Computer Networks and ISDN Systems, 1995
In this paper we compare the end-to-end delay performance of two service disciplines that an Asyn... more In this paper we compare the end-to-end delay performance of two service disciplines that an Asynchronous Transfer Mode (ATM) multiplexor can use to multiplex pipelined synchronous native protocol frames arriving over low speed access lines onto higher speed ATM trunks. The ATM multiplexor must convert native protocol frames on the access lines (typically hundreds of bytes in length) into ATM cells on the trunks (of fixed length 53 bytes) at the network access and the corresponding ATM (de)multiplexor must reassemble these multiple ATM cells into a bit continuous synchronous native protocol frame at the network egress.In one service discipline, the multiplexor (hereafter referred to as a terminal adaptor, or TA) pipelines one synchronous frame at a time onto the high speed trunk, waiting, if it needs to, for the successive ATM cells from this one synchronous frame to accumulate. This scheme introduces a larger queueing delay at the ingress TA but no playout delay is required at the egress TA. In the other scheme the TA interleaves the ATM cells from the various synchronous frames arriving concurrently over the low speed lines. An interleaving scheme has a smaller queueing delay, but introduces a large variability in the network insertion times of the ATM cells corresponding to a native protocol frame. Hence the egress TA must enforce a delay before playing out the original bit-synchronous native frame over a low speed line, so as to increase the probability that the ATM cells are available when required to properly reassemble the native synchronous frame into a bit continuous stream.Using an analytical model for the first scheme and a simulation model for the second scheme we analyze the end-to-end delay of a synchronous frame, and compare the mean end-to-end delay for various trunk speeds (TA-to-network switch) to “access” line speed ratios. We conclude that, for the cases studied in this paper, if this ratio is greater than or equal to 4 then, over the range of useful loading, interleaved pipelining typically yields smaller mean delays than noninterleaved pipelining. If the ratio is less than 4 then interleaving typically yields larger mean delays for native protocols due to increased playout delays at the egress TA.
Bookmarks Related papers MentionsView impact
ACM SIGCOMM Computer Communication Review, 2001
We describe a method for monitoring Voice over IP (VoIP) applications based upon a reduction of t... more We describe a method for monitoring Voice over IP (VoIP) applications based upon a reduction of the ITU-T's E-Model to transport level, measurable quantities. In the process, 1) we identify the relevant transport level quantities, 2) we discuss the tradeoffs between placing the monitors within the VoIP gateways versus placement of the monitors within the transport path, and 3) we identify several areas where further work and consensus within the industry are required. We discover that the relevant transport level quantities are the delay, network packet loss and the decoder's de-jitter buffer packet loss. We find that an in-path monitor requires the definition of a reference de-jitter buffer implementation to estimate voice quality based upon observed transport measurements. Finally, we suggest that more studies are required, which evaluate the quality of various VoIP codecs in the presence of representative packet loss patterns.
Bookmarks Related papers MentionsView impact
This study presents an analysis of computer worm propagation in a Mobile Ad-hoc Network (MANET). ... more This study presents an analysis of computer worm propagation in a Mobile Ad-hoc Network (MANET). According to the recent DARPA BAA - Defense Against Cyber Attacks on MANETS (DARPA, 2004), One of the most severe cyber threats is expected to be worms with ...
Bookmarks Related papers MentionsView impact
2010 International Conference on Network and Service Management, 2010
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Proceedings of the 6th international workshop on Software and performance - WOSP '07, 2007
Bookmarks Related papers MentionsView impact
MILCOM 2005 - 2005 IEEE Military Communications Conference, 2005
Bookmarks Related papers MentionsView impact
MILCOM 2007 - IEEE Military Communications Conference, 2007
Bookmarks Related papers MentionsView impact
2007 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, 2007
Bookmarks Related papers MentionsView impact
Lecture Notes in Computer Science, 2006
Bookmarks Related papers MentionsView impact
Three MIBs: • DYMO-MIB <draft-ietf-manet-dymo-mib-02.txt> [1] • SMF-MIB <draft-ietf-mane... more Three MIBs: • DYMO-MIB <draft-ietf-manet-dymo-mib-02.txt> [1] • SMF-MIB <draft-ietf-manet-smf-mib-00.txt> [2]
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
This study presents an analysis of computer worm propagation in a Mobile Ad-hoc Network (MANET). ... more This study presents an analysis of computer worm propagation in a Mobile Ad-hoc Network (MANET). According to the recent DARPA BAA - Defense Against Cyber Attacks on MANETS (DARPA, 2004), "One of the most severe cyber threats is expected to be worms with arbitrary payload that can infect and satu- rate MANET-based networks on the order of seconds". Critical to
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
SPIE Proceedings, 2007
Bookmarks Related papers MentionsView impact
MILCOM 2005 - 2005 IEEE Military Communications Conference
Bookmarks Related papers MentionsView impact
2009 IEEE Symposium on Computers and Communications, 2009
The main architectural problem with the current inter-domain routing model is the overloading of ... more The main architectural problem with the current inter-domain routing model is the overloading of IP addresses due to their use for identification, location, and forwarding. This makes it hard to support the need for multi-homing, traffic engineering, and mobility while maintaining address hierarchy that is essential for scalable routing. Thus, there is a need to separate identifiers from locators. In this paper we identify architectural and protocol changes in addressing and routing needed to provide major improvements in scalability. We design a corresponding protocol solution (Address-Identifier Mapping System-AIMS) based on separation of identification and addressing, and a mechanism for mapping ID to address.
Bookmarks Related papers MentionsView impact
MILCOM 2008 - 2008 IEEE Military Communications Conference, 2008
... Harshavardhana Applied Physics Laboratory Johns Hopkins University Laurel, MD, USA AbstractT... more ... Harshavardhana Applied Physics Laboratory Johns Hopkins University Laurel, MD, USA AbstractThe Global Information Grid (GIG) will be com-prised of collections of different Service Capability Domains (SCDs). Each SCD offers a set of information services, such as Voice ...
Bookmarks Related papers MentionsView impact
ietf.org
Bookmarks Related papers MentionsView impact
ietf.org
Four MIBs related to MANET WG protocols:• DYMO MIB< ietf-manet-dymo-mib-02. txt>[1]• SMF MI... more Four MIBs related to MANET WG protocols:• DYMO MIB< ietf-manet-dymo-mib-02. txt>[1]• SMF MIB< ietf-cole-manet-smf-mib-02. txt>[2]• NHDP MIB< ietf-cole-manet-nhdp-mib-01. txt>[3]• OLSR MIB< ietf-cole-manet-olsr-mib-01. txt>[4]
Bookmarks Related papers MentionsView impact
Computer Networks and ISDN Systems, 1995
In this paper we compare the end-to-end delay performance of two service disciplines that an Asyn... more In this paper we compare the end-to-end delay performance of two service disciplines that an Asynchronous Transfer Mode (ATM) multiplexor can use to multiplex pipelined synchronous native protocol frames arriving over low speed access lines onto higher speed ATM trunks. The ATM multiplexor must convert native protocol frames on the access lines (typically hundreds of bytes in length) into ATM cells on the trunks (of fixed length 53 bytes) at the network access and the corresponding ATM (de)multiplexor must reassemble these multiple ATM cells into a bit continuous synchronous native protocol frame at the network egress.In one service discipline, the multiplexor (hereafter referred to as a terminal adaptor, or TA) pipelines one synchronous frame at a time onto the high speed trunk, waiting, if it needs to, for the successive ATM cells from this one synchronous frame to accumulate. This scheme introduces a larger queueing delay at the ingress TA but no playout delay is required at the egress TA. In the other scheme the TA interleaves the ATM cells from the various synchronous frames arriving concurrently over the low speed lines. An interleaving scheme has a smaller queueing delay, but introduces a large variability in the network insertion times of the ATM cells corresponding to a native protocol frame. Hence the egress TA must enforce a delay before playing out the original bit-synchronous native frame over a low speed line, so as to increase the probability that the ATM cells are available when required to properly reassemble the native synchronous frame into a bit continuous stream.Using an analytical model for the first scheme and a simulation model for the second scheme we analyze the end-to-end delay of a synchronous frame, and compare the mean end-to-end delay for various trunk speeds (TA-to-network switch) to “access” line speed ratios. We conclude that, for the cases studied in this paper, if this ratio is greater than or equal to 4 then, over the range of useful loading, interleaved pipelining typically yields smaller mean delays than noninterleaved pipelining. If the ratio is less than 4 then interleaving typically yields larger mean delays for native protocols due to increased playout delays at the egress TA.
Bookmarks Related papers MentionsView impact
ACM SIGCOMM Computer Communication Review, 2001
We describe a method for monitoring Voice over IP (VoIP) applications based upon a reduction of t... more We describe a method for monitoring Voice over IP (VoIP) applications based upon a reduction of the ITU-T's E-Model to transport level, measurable quantities. In the process, 1) we identify the relevant transport level quantities, 2) we discuss the tradeoffs between placing the monitors within the VoIP gateways versus placement of the monitors within the transport path, and 3) we identify several areas where further work and consensus within the industry are required. We discover that the relevant transport level quantities are the delay, network packet loss and the decoder's de-jitter buffer packet loss. We find that an in-path monitor requires the definition of a reference de-jitter buffer implementation to estimate voice quality based upon observed transport measurements. Finally, we suggest that more studies are required, which evaluate the quality of various VoIP codecs in the presence of representative packet loss patterns.
Bookmarks Related papers MentionsView impact
This study presents an analysis of computer worm propagation in a Mobile Ad-hoc Network (MANET). ... more This study presents an analysis of computer worm propagation in a Mobile Ad-hoc Network (MANET). According to the recent DARPA BAA - Defense Against Cyber Attacks on MANETS (DARPA, 2004), One of the most severe cyber threats is expected to be worms with ...
Bookmarks Related papers MentionsView impact
2010 International Conference on Network and Service Management, 2010
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Proceedings of the 6th international workshop on Software and performance - WOSP '07, 2007
Bookmarks Related papers MentionsView impact
MILCOM 2005 - 2005 IEEE Military Communications Conference, 2005
Bookmarks Related papers MentionsView impact
MILCOM 2007 - IEEE Military Communications Conference, 2007
Bookmarks Related papers MentionsView impact
2007 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, 2007
Bookmarks Related papers MentionsView impact
Lecture Notes in Computer Science, 2006
Bookmarks Related papers MentionsView impact