Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer An
DOI: 10.1109/infcom.2001.916715
|View full text |Cite
|
Sign up to set email alerts
|

Wrapping server-side TCP to mask connection failures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

1
55
0

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 72 publications
(56 citation statements)
references
References 3 publications
1
55
0
Order By: Relevance
“…These components are the Encapsulation Node (EN) and the Decapsulation Node (DN) 1 . The EN typically runs on a client device, such as a smartphone or a laptop, and initiates a connection to the DN.…”
Section: Traditional Encapsulation Systemsmentioning
confidence: 99%
See 1 more Smart Citation
“…These components are the Encapsulation Node (EN) and the Decapsulation Node (DN) 1 . The EN typically runs on a client device, such as a smartphone or a laptop, and initiates a connection to the DN.…”
Section: Traditional Encapsulation Systemsmentioning
confidence: 99%
“…This solution, named Fault-Tolerant Transmission Control Protocol (FT-TCP) [1] [31], combines traditional IP failover protocols with a new component that sits both above and below the existing TCP stack to intercept all packets being send and received using TCP. It logs all packets to a data store that is shared amongst all the hosts in the cluster.…”
Section: Traditional Encapsulation Failovermentioning
confidence: 99%
“…Specifically, request packets are acknowledged only after they are stored redundantly (logged) so that they can be obtained even after a failure of a server host (Aghdaie and Tamir, 2001;Aghdaie and Tamir, 2002;Alvisi et al, 2001). Since the server may be non-deterministic, none of the packets of a reply can be sent to the client unless the entire reply is safely stored (logged) so that its transmission can proceed despite a failure of a server host (Aghdaie and Tamir, 2001;Aghdaie and Tamir, 2002).…”
Section: Coral Architecturementioning
confidence: 99%
“…Since the server may be non-deterministic, none of the packets of a reply can be sent to the client unless the entire reply is safely stored (logged) so that its transmission can proceed despite a failure of a server host (Aghdaie and Tamir, 2001;Aghdaie and Tamir, 2002). The logging of requests can be done at the level of TCP packets (Alvisi et al, 2001) or at the level of HTTP requests (Aghdaie and Tamir, 2001;Aghdaie and Tamir, 2002). If request logging is done at the level of HTTP requests, the requests can be matched with logged replies so that a request will never be reprocessed following failure if the reply has already been logged (Aghdaie and Tamir, 2001;Aghdaie and Tamir, 2002).…”
Section: Coral Architecturementioning
confidence: 99%
See 1 more Smart Citation