1993
DOI: 10.1016/0169-7552(93)90021-u
|View full text |Cite
|
Sign up to set email alerts
|

A timer-based connection management protocol with synchronized clocks and its verification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

1994
1994
1997
1997

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(9 citation statements)
references
References 10 publications
0
9
0
Order By: Relevance
“…The only drawback with the SC protocols is N's dependence on I, if one is concerned about exceedingly long-lived incarnations, say, of the order of days. If we assume that the probability of two successive connections having identical modulo-N client and server incarnation numbers is negligible (this probability is the same as for 3-way handshakes and is 1 N 2 under reasonable assumptions of incarnation lifetimes), then the following bound which does not depend on I su ces: (T2')…”
Section: (T1) C S > W C and R S > W C And W C > W S And R C > W S And R C > C And R S > Smentioning
confidence: 99%
See 2 more Smart Citations
“…The only drawback with the SC protocols is N's dependence on I, if one is concerned about exceedingly long-lived incarnations, say, of the order of days. If we assume that the probability of two successive connections having identical modulo-N client and server incarnation numbers is negligible (this probability is the same as for 3-way handshakes and is 1 N 2 under reasonable assumptions of incarnation lifetimes), then the following bound which does not depend on I su ces: (T2')…”
Section: (T1) C S > W C and R S > W C And W C > W S And R C > W S And R C > C And R S > Smentioning
confidence: 99%
“…Consider a client-server pair. The server caches an incarnation number x of a client in two ways: (1) if it becomes open to client incarnation x as a result of a 3-way handshake; and (2) if it receives a connection request from the client with incarnation number x when its cache has a value y < x (whether or not the server accepts the request). In both cases, the cacheing of x signi es that the server has not connected previously to incarnation x or to any later incarnation of the client.…”
Section: Protocol Sc1: Unbounded Incarnation Numbersmentioning
confidence: 99%
See 1 more Smart Citation
“…Timer-based mechanisms for connection management appear in [3,5,11,23,24], and their comparison with the handshake mechanism for connection management is discussed. Other work considers verification of specific connection management pro-tocols, e.g., [8-10, 13, 14].…”
Section: Introductionmentioning
confidence: 99%
“…The difference between CM protocols lies in the way of assigning the IDs to requests and the way of storing the set of old IDs. Several protocols have been proposed recently which are able to open connections without the three-way handshake such as CMSC (Biersack and Feldmeier, 1993), Delta-t (Fletcher and Watson, 1978), and SCMP (Liskov et al, 1991).…”
Section: Introductionmentioning
confidence: 99%