Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Douglas C. Montgomery is active.

Publication


Featured researches published by Douglas C. Montgomery.


Lecture Notes in Computer Science | 2000

A Reliable Message Delivery Protocol for Mobile Agents

Mudumbai Ranganathan; M Bednarek; Douglas C. Montgomery

The abstractions and protocol mechanisms that form the basis for inter-agent communications can significantly impact the overall design and effectiveness of Mobile Agent systems. We present the design and performance analysis of a reliable communication mechanism for Mobile Agent systems. Our protocols are presented in the context of a Mobile Agent system called AGNI . We have developed AGNI communication mechanisms that offer reliable peer-to-peer communications, and that are integrated with our agent location tracking infrastructure to enable efficient, failure-resistant networking among highly mobile systems. We have analyzed the design parameters of our protocols using an in-situ simulation approach with validation through measurement of our prototype implementation in real distributed systems. Our system assumptions are simple and general enough to make our results applicable to other Agent systems that may adopt our protocols and/or design principles.


Journal of Multivariate Analysis | 1999

Mobile Streams: a middleware for reconfigurable distributed scripting

Mudumbai Ranganathan; Virginie Schaal; Virginie Galtier; Douglas C. Montgomery

A large class of distributed applications follow an event-driven or reactive paradigm. Such applications can benefit from mobile agent technology by making it easy to add reconfigurability, extensibility and failure resilience features at an application level. We present the design of middleware for building reactive, extensible, reconfigurable distributed systems, based upon an abstraction which we call Mobile Streams. Using our system, a distributed, event-driven application can be scripted from a single point of control and dynamically extended and reconfigured while it is executing. Our system is suitable for building a wide variety of applications; for example, distributed testing, conferencing and control-oriented applications. We illustrate the use of our system by presenting example applications.


Computer Communications | 2017

Design and analysis of optimization algorithms to minimize cryptographic processing in BGP security protocols

Vinay Sriram; Douglas C. Montgomery

The Internet is subject to attacks due to vulnerabilities in its routing protocols. One proposed approach to attain greater security is to cryptographically protect network reachability announcements exchanged between Border Gateway Protocol (BGP) routers. This study proposes and evaluates the performance and efficiency of various optimization algorithms for validation of digitally signed BGP updates. In particular, this investigation focuses on the BGPSEC (BGP with SECurity extensions) protocol, currently under consideration for standardization in the Internet Engineering Task Force. We analyze three basic BGPSEC update processing algorithms: Unoptimized, Cache Common Segments (CCS) optimization, and Best Path Only (BPO) optimization. We further propose and study cache management schemes to be used in conjunction with the CCS and BPO algorithms. The performance metrics used in the analyses are: (1) routing table convergence time after BGPSEC peering reset or router reboot events and (2) peak-second signature verification workload. Both analytical modeling and detailed trace-driven simulation were performed. Results show that the BPO algorithm is 330% to 628% faster than the unoptimized algorithm for routing table convergence in a typical Internet core-facing provider edge router.


Special Publication (NIST SP) - 800-54 | 2007

Border Gateway Protocol Security

David R. Kuhn; Kotikalapudi Sriram; Douglas C. Montgomery


Archive | 2005

Characterizing the Risks and Costs of BGP Insecurity/Security

Douglas C. Montgomery; Kotikalapudi Sriram; Oliver Borchert; Okhee Kim; David R. Kuhn


symposium on cloud computing | 2017

vPROM: vSwitch Enhanced Programmable Measurement in SDN

Yang Guo; Douglas C. Montgomery; Kotikalapudi Sriram; An Wang; Songqing Chen; Fang Hao; T. V. Lakshman


Archive | 2009

Performance Comparisons of BGP Anomaly Detection and Robustness Algorithms

Kotikalapudi Sriram; Douglas C. Montgomery; Oliver Borchert; Patrick Gleichmann; Okhee Kim


Archive | 2008

Architectural Considerations for Mapping Distribution Protocols

Kotikalapudi Sriram; Young-Tak Kim; Douglas C. Montgomery


Archive | 2007

SP 800-54. Border Gateway Protocol Security

D. Richard Kuhn; Kotikalapudi Sriram; Douglas C. Montgomery


Archive | 2006

Programmable Active Services for SIP | NIST

Jean Deruelle; Mudumbai Ranganathan; Douglas C. Montgomery

Collaboration


Dive into the Douglas C. Montgomery's collaboration.

Top Co-Authors

Avatar

Okhee Kim

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

Oliver Borchert

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

Mudumbai Ranganathan

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

An Wang

George Mason University

View shared research outputs
Top Co-Authors

Avatar

D. Richard Kuhn

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

M Bednarek

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge