Application-Level Survivable Software: rFTP Proof-of-Concept
نویسندگان
چکیده
Application-level survivability, the ability to reconfigure an application to transparently maintain services when part of a system becomes unavailable, is the most flexible and comprehensive approach to supporting mission fulfillment since it can provide assurance over all lower layers within a networked system. We have developed Resumable FTP, an application based on RFC 959, which has the ability to resume the download of a file after the download has been interrupted by users or by lower layers (loss of connection). We present the design and experimental use of rFTP and conclude with future directions for work in application-layer survivability.
منابع مشابه
A systematic review of repetitive functional task practice with modelling of resource use, costs and effectiveness.
OBJECTIVES To determine whether repetitive functional task practice (RFTP) after stroke improves limb-specific or global function or activities of daily living and whether treatment effects are dependent on the amount of practice, or the type or timing of the intervention. Also to provide estimates of the cost-effectiveness of RFTP. DATA SOURCES The main electronic databases were searched fro...
متن کاملA Fast Strategy to Find Solution for Survivable Multicommodity Network
This paper proposes an immediately efficient method, based on Benders Decomposition (BD), for solving the survivable capacitated network design problem. This problem involves selecting a set of arcs for building a survivable network at a minimum cost and within a satisfied flow. The system is subject to failure and capacity restriction. To solve this problem, the BD was initially proposed with ...
متن کاملToward Survivable Intrusion-Tolerant Open-Source SCADA
As vital components of critical infrastructure, SCADA systems must continue to operate correctly and at their expected level of performance at all times. However, current SCADA systems are vulnerable to intrusions, and even a single compromise can cause catastrophic consequences. We present the architecture of and initial steps toward the first intrusion-tolerant open-source SCADA system that i...
متن کاملThe Software Value Chain as an Analytical Framework for the Software Industry and Its Exemplary Application for Vertical Integration Measurement
The value chain concept disaggregates a firm into the various activities it performs. Abstracting from the firm-level this concept has also been applied to industries as a whole. In this paper we conceptualize a software specific value chain and provide a first proof of concept. Our approach aggregates and unifies findings from a literature review on industry-level value chains, software value ...
متن کاملDesign and testbed evaluation of RDMA-based middleware for high-performance data transfer applications
Providing high-speed data transfer is vital to various data-intensive applications supported by data center networks. We design a middleware layer of high-speed communication based on Remote Direct Memory Access (RDMA) that serves as the common substrate to accelerate various data transfer tools, such as FTP, HTTP, file copy, sync and remote file I/O. This middleware offers better end-to-end ba...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2001