Todd Arnold

ORCID: 0000-0002-2676-1575
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software-Defined Networks and 5G
  • Caching and Content Delivery
  • Network Traffic and Congestion Control
  • Cryptographic Implementations and Security
  • Internet Traffic Analysis and Secure E-voting
  • Wireless Networks and Protocols
  • Chaos-based Image/Signal Encryption
  • Mobile Ad Hoc Networks
  • Peer-to-Peer Network Technologies
  • Vehicular Ad Hoc Networks (VANETs)
  • Cryptography and Residue Arithmetic
  • Context-Aware Activity Recognition Systems
  • Cryptography and Data Security
  • Cloud Computing and Resource Management
  • Security and Verification in Computing
  • Advanced Optical Network Technologies
  • Advanced Computational Techniques and Applications
  • Education and Military Integration
  • Online Learning and Analytics
  • Power Systems and Technologies
  • Industrial Automation and Control Systems
  • Age of Information Optimization
  • Network Packet Processing and Optimization
  • Image and Video Quality Assessment
  • Mobile Agent-Based Network Management

United States Military Academy
2013-2025

Columbia University
2018-2021

IBM (United States)
2004-2012

Pennsylvania State University
2008

The Tier-1 ISPs have been considered the Internet's backbone since dawn of modern Internet 30 years ago, as they guarantee global reachability. However, their influence and importance are waning flattening decreases demand for transit services increases private interconnections. Conversely, major cloud providers -- Amazon, Google, IBM, Microsoft-- gaining in more hosted on infrastructures. They ardently support rapidly expanding footprints, which enables them to bypass other large reach many...

10.1145/3419394.3423613 article EN 2020-10-23

Recently, some researchers have performed extensive experiments to study the feasibility and performance of vehicle drive-thru access roadside points (APs). The demonstrate that duration connectivity AP is limited. A has an area high signal strength near AP, but experiences poor link quality when entering or exiting coverage area. Since a spends large portion connection time in this area, data throughput can be significantly reduced. This problem been identified several works, viable...

10.1145/1410043.1410055 article EN 2008-09-15

Large cloud providers including AWS, Azure, and Google Cloud offer two tiers of network services to their customers: one class uses the providers' private wide area networks (WAN-transit) carry a customer's traffic as much possible, other public internet (inet-transit). Little is known about how each provider configures its different transit services, well these work, whether quality those can be further improved. In this we conduct large-scale study answer questions. Using RIPE Atlas probes...

10.1145/3711705 article EN cc-by Proceedings of the ACM on Measurement and Analysis of Computing Systems 2025-03-06

IBM has designed special cryptographic processors for its servers more than 25 years. These began as very simple devices, but over time the requirements have become increasingly complex, and there been a never-ending demand increased speed. This paper describes PCIXCC, new coprocessor introduced in z990 server. In many ways, PCIXCC is watershed design. For first time, single product satisfies all across server platforms. It offers performance demanded by today's Web servers, it supports...

10.1147/rd.483.0475 article EN IBM Journal of Research and Development 2004-05-01

Internet routing research has long been hindered by obstacles to executing the wide class of experiments necessary characterize problems and opportunities, evaluate candidate solutions. Prior works proposed a platform that would provide with control an Internet-connected AS. However, because BGP does not natively support multiplexing or requisite security policies for building such platform, prior were ultimately unable realize this vision.

10.1145/3359989.3365414 article EN 2019-12-03

In vehicular Ad-hoc networks (VANETs), vehicles can gain short connections to the Internet by using wireless access points (AP). A significant part of connection time is required for acquiring an IP address via dynamic host configuration protocol (DHCP). Depending on a vehicle's speed and AP coverage area, DHCP consume up 100 percent available time. We propose Passing Protocol reduce overhead obtaining under one-tenth second. This done without modifying either or software. explore scalable...

10.1109/percom.2008.80 article EN 2008-03-01

The construction of private WANs by cloud providers enables them to extend their networks more locations and establish direct connectivity with end user ISPs. Tenants the benefit from this proximity users, which is supposed provide improved performance bypassing public Internet. However, impact providers' not widely understood.To isolate a WAN, we measure globally distributed vantage points two large providers, comparing when using worldwide WAN instead benefits are universal. While 48% our...

10.1109/infocom41043.2020.9155428 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2020-07-01

To mitigate IPv4 exhaustion, IPv6 provides expanded address space, and NAT allows a single public to suffice for many devices assigned private space. Even though has greatly extended the shelf-life of IPv4, some networks need more space than what is officially allocated by IANA due their size and/or network management practices. Some these resort using squat , term operations community uses large blocks organizations but historically never announced Internet. While squatting IP addresses an...

10.1145/3594255.3594260 article EN ACM SIGCOMM Computer Communication Review 2023-01-01

Online services all seek to provide their customers with the best Quality of Experience (QoE) possible. Milliseconds delay can cause users abandon a cat video or move onto different shopping site, which translates into lost revenue. Thus, minimizing latency between and content is crucial. To reduce latency, cloud providers have built massive, global networks. However, networks must interact customer ISPs via BGP, has no concept performance.

10.1145/3365609.3365865 article EN 2019-11-08

This paper provides an overview of the 4765 cryptographic coprocessor hardware and firmware architecture, its key design features, IBM System z® secure software stack. The for solution is shared across all server platforms offering acceleration in a highly programmable environment designed to meet most stringent security requirements. Its internal can be easily updated new standards requirements, as well customer-specific functionality. It allows updates customization executed with zero...

10.1147/jrd.2011.2178736 article EN IBM Journal of Research and Development 2012-01-01

New business opportunities for cloud, analytics, mobile, and social applications depend on a secure computing infrastructure. The introduction of the IBM 4767 cryptographic coprocessor continues leadership in marketplace security. 4767/Crypto Express5S is versatile solution, offering three modes operations z13™ System: 1) Accelerator, 2) Common Cryptographic Architecture (CCA) Coprocessor, 3) Enterprise PKCS #11 (public-key cryptography standard) Coprocessor. highly programmable environment...

10.1147/jrd.2015.2430071 article EN IBM Journal of Research and Development 2015-07-01

Information technology courses often require the use of software and hardware to support classroom learning. These systems can assist in achieving learning objectives for a course through problems laboratory exercises. The procurement maintenance these be challenge even well resourced organizations. In this paper we discuss how virtual machines relieve organizations some their resource burdens while effectively provide examples that is currently done at United States Military Academy.

10.1145/2512276.2512287 article EN 2013-10-02

Despite efforts from cloud and content providers to lower latency acceptable levels for current future services (e.g., augmented reality or gaming), there are still opportunities improvement. A major reason that traffic engineering challenged is the Internet's inter-domain routing protocol, Border Gateway Protocol, oblivious any performance metric, circuitous pervasive. In this work, we propose two implementation modifications networks can leverage make BGP latency-aware reduce excessive...

10.48550/arxiv.2410.13019 preprint EN arXiv (Cornell University) 2024-10-16

IBM has offered hardware-based cryptographic processors for its mainframe computers nearly thirty years. Over that period, continued to update both the hardware and software, providing added features, higher performance, greater physical security, improved management features. This commitment continues with System z9™, as demonstrated by two improvements described in this paper. The first part of paper describes enhancements z9 configure control second a new method coprocessors securely...

10.1147/rd.511.0087 article EN IBM Journal of Research and Development 2007-01-01

One of the impediments in performing Internet routing research is lack infrastructure capable supporting experiments with both control and realism. Measurement experimentation platforms provide minimal over routing, limited connectivity, restrict what operations are available. Meanwhile, proprietary nature policies stymies simulations from providing

10.1145/3234200.3234247 article EN 2018-08-07
Coming Soon ...