2008
DOI: 10.1145/1394441.1394444
|View full text |Cite
|
Sign up to set email alerts
|

A stateless approach to connection-oriented protocols

Abstract: Traditional operating system interfaces and network protocol implementations force some system state to be kept on both sides of a connection. This state ties the connection to its endpoints, impedes transparent failover, permits denial-of-service attacks, and limits scalability. This article introduces a novel TCP-like transport protocol and a new interface to replace sockets that together enable all state to be kept on one endpoint, allowing the other endpoint, typically the server, to operate without any pe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0
7

Year Published

2011
2011
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 12 publications
(24 citation statements)
references
References 27 publications
(22 reference statements)
0
17
0
7
Order By: Relevance
“…After a thorough analysis of the paper [6] we have implemented the original model of the Trickles protocol. This model was used for constructing the network model, which is shown in Fig.…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…After a thorough analysis of the paper [6] we have implemented the original model of the Trickles protocol. This model was used for constructing the network model, which is shown in Fig.…”
Section: Resultsmentioning
confidence: 99%
“…The Trickles protocol was proposed in 2005 at Cornell University, USA [6].The main difference of Trickles protocol from TCP protocols is keeping of all of control parameters on the client side, while the backend does not store information about the transport connection. Transport protocol operating on this principle from server to client will be called asymmetric protocol or unallocated connection state.…”
Section: Asymmetric Transport Protocolmentioning
confidence: 99%
See 2 more Smart Citations
“…Two Bloom filters of identical size and using the same family of hash functions are used to simplify the periodic purge operation [113]. The counting variant (CBF) is used in [114] to provide a lightweight route verification mechanism that enables a router to discover route failures and inconsistencies between advertised Internet routes and the actual paths taken by the data.…”
Section: E Securitymentioning
confidence: 99%