You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
\caption{Engine operation latencies on log scale ($\mu$s). Tool dispatch, failure classification, and circuit breaker checks complete in sub-microsecond time. Schema discovery (50 tables) is the slowest operation at $\sim$5\,ms due to per-table PRAGMA queries.}
The \texttt{connections} table stores 10 fields per connection at approximately 200--500 bytes per row depending on metadata size. The \texttt{profiles} table stores JSON-serialized Connection Souls with unbounded growth per connection but bounded error histories (100 entries, Section~\ref{sec:souls}). Health check history is indexed by connection ID and timestamp for efficient range queries.
667
+
668
+
\subsection{Capacity Analysis}
669
+
670
+
Table~\ref{tab:capacity} projects real-world storage requirements. Even in enterprise scenarios with thousands of connections, the SQLite database remains practical within a 100\,MB budget for years of operation.
\noindent\scriptsize Conns = configured connections. Checks/D = health checks per day. Enterprise scenarios benefit from periodic health check pruning (retain last 30 days).
Figure~\ref{fig:radar} visualizes the multi-dimensional comparison from Table~\ref{tab:related} as a radar chart across six dimensions. AgenticConnect is the only system that provides complete coverage across protocol breadth, authentication management, failure learning, and MCP access simultaneously.
699
+
700
+
\begin{figure}[h]
701
+
\centering
702
+
\begin{tikzpicture}[scale=0.75]
703
+
\node[font=\tiny, align=center] at (90:3.2) {Protocols};
704
+
\node[font=\tiny, align=center] at (30:3.2) {Auth};
705
+
\node[font=\tiny, align=center] at (-30:3.2) {Retry};
706
+
\node[font=\tiny, align=center] at (-90:3.2) {Learning};
707
+
\node[font=\tiny, align=center] at (-150:3.2) {MCP};
708
+
\node[font=\tiny, align=center] at (150:3.2) {Independence};
Beyond the micro-benchmarks of Section~\ref{sec:evaluation}, we conducted four phases of end-to-end validation testing the complete MCP pipeline---from JSON-RPC request through tool dispatch and engine execution to response serialization.
745
+
746
+
\subsection{Phase 1: Type Foundation}
747
+
748
+
14~tests validate the MCP type system: JSON-RPC request parsing (valid, invalid, null ID, missing params), response serialization (success and error paths), tool definition schema compliance, and error code constants. The \texttt{TOOL\_NOT\_FOUND} error code ($-32803$) is verified to be distinct from \texttt{METHOD\_NOT\_FOUND} ($-32601$) per the MCP Quality Standard.
749
+
750
+
\subsection{Phase 2: Tool Execution}
751
+
752
+
24~tests exercise every tool group with a real in-memory \texttt{SessionManager}. Protocol detection tests verify URL parsing (\texttt{https://} $\to$ HTTPS, \texttt{ssh://} $\to$ SSH) and port-based detection. Retry tests verify failure classification (HTTP 429 $\to$ RateLimit, 404 $\to$ Permanent). Webhook tests verify HMAC-SHA256 signature generation and verification with both correct and incorrect secrets. Database tests verify SQLite connection, schema discovery, and query execution through the MCP interface.
\item\textbf{Sentinel status}: multi-connection health aggregation.
769
+
\item\textbf{All 11 groups dispatch}: one tool from each group, verifying no panics.
770
+
\end{enumerate}
771
+
772
+
\subsection{Protocol Detection Accuracy}
773
+
774
+
Table~\ref{tab:detect} reports protocol detection accuracy across the three strategies. URL scheme parsing is deterministic (100\% for known schemes). Port-based detection covers 12 well-known ports. Banner-based detection was validated against 5 known server greeting patterns.
775
+
776
+
\begin{table}[h]
777
+
\caption{Protocol detection accuracy by strategy.}
The combined three-tier strategy achieves $>$98\% accuracy on known protocols. The remaining 2\% consists of non-standard port assignments where banner analysis is the only viable strategy, and the banner format is atypical (e.g., custom Redis forks that modify the greeting).
794
+
795
+
\subsection{Paper Claim Validation}
796
+
797
+
20~dedicated tests verify every quantitative claim in this paper:
798
+
799
+
\begin{itemize}[nosep, leftmargin=*]
800
+
\item 18 protocol families (enumerated and tested)
801
+
\item 8 authentication methods (instantiated and named)
802
+
\item 5 failure classes with correct classification for all HTTP status codes
803
+
\item AES-256-GCM roundtrip with zero corruption
804
+
\item Circuit breaker opens after exactly $N{=}5$ failures
0 commit comments