Check out the new USENIX Web site.

Home About USENIX Events Membership Publications Students
USENIX Technical Program - Paper - Proceedings of the Third Symposium on Operating Systems Design and Implementation    [Technical Program]

Pp. 59–72 of the Proceedings
Next Previous Previous Contents References


Contents

1 Introduction
2 Architecture
2.1 Configurability
2.2 Path Abstraction
2.3 Protection Domains
2.4 Accounting for Resource Usage
2.5 Specifying Resource Limits
2.6 Remarks
3 Implementation
3.1 Paths
3.2 Threads
3.3 IOBuffers
4 Performance
4.1 Configurations
4.1.1 Web Server
4.1.2 Load
4.1.3 Hardware
4.2 Accounting and Protection Overhead
4.3 Micro-Experiments
4.3.1 Accounting Accuracy
4.3.2 Killing a Path
4.4 Defending Against Attacks
4.4.1 SYN Attack
4.4.2 QoS Stream
4.4.3 CGI Attack
4.4.4 Remarks
5 Related Work
6 Conclusions


Next Previous Previous Contents References

This paper was originally published in the Proceedings of the Third Symposium on Operating Systems Design and Implementation, February 22-25, 1999, New Orleans, Louisiana, USA
Last changed: 26 Mar 2002 ml
Technical Program
Symposium Index
USENIX home