Relative Content

Tag Archive for analogy

Analogy for Thread Pools

I am working on an application which spawns a new thread per request. Sometimes the number of threads active on the machine at one time is in the high hundreds. It’s suspected that this is causing all sorts of problems. I would like to experiment with using thread pool instead to see if this improves work throughput. But first, I have to convince the powers that be to allow me the time.

is a DoS attack a good analogy of Dining Philosophers?

Let’s say that, instead philosophers, we have TCP/IP connections to a server, and instead forks we have the server’s TCP/IP avaliable ports. In this scenario, we don’t have a lot of connections competing for the ports: we have a few number of malicious connections that will take a lot of time to process, so they will take the awaliable ports and release them after a long time (from some minutes to several hours). In this scenario, actual non-attacking connections will “starve”.

is a DoS attack a good analogy of Dining Philosophers?

Let’s say that, instead philosophers, we have TCP/IP connections to a server, and instead forks we have the server’s TCP/IP avaliable ports. In this scenario, we don’t have a lot of connections competing for the ports: we have a few number of malicious connections that will take a lot of time to process, so they will take the awaliable ports and release them after a long time (from some minutes to several hours). In this scenario, actual non-attacking connections will “starve”.

is a DoS attack a good analogy of Dining Philosophers?

Let’s say that, instead philosophers, we have TCP/IP connections to a server, and instead forks we have the server’s TCP/IP avaliable ports. In this scenario, we don’t have a lot of connections competing for the ports: we have a few number of malicious connections that will take a lot of time to process, so they will take the awaliable ports and release them after a long time (from some minutes to several hours). In this scenario, actual non-attacking connections will “starve”.

is a DoS attack a good analogy of Dining Philosophers?

Let’s say that, instead philosophers, we have TCP/IP connections to a server, and instead forks we have the server’s TCP/IP avaliable ports. In this scenario, we don’t have a lot of connections competing for the ports: we have a few number of malicious connections that will take a lot of time to process, so they will take the awaliable ports and release them after a long time (from some minutes to several hours). In this scenario, actual non-attacking connections will “starve”.