Home | History | Annotate | Download | only in url_request

Lines Matching defs:Server

6 // a) That a server experiencing overload will actually benefit from the
9 // b) That "well-behaved" clients of a server under DDoS attack actually
114 // Represents a web server in a simulation of a server under attack by
117 class Server : public DiscreteTimeSimulation::Actor {
119 Server(int max_queries_per_tick,
146 // We pretend the server fails for the next several ticks after it
159 // the server.
166 // queries seen by the server (assuming a front-end reverse proxy
168 // visualize the traffic spike seen by the server when it comes up,
294 DISALLOW_COPY_AND_ASSIGN(Server);
402 Server* server,
407 server_(server),
484 Server* const server_;
490 void SimulateAttack(Server* server,
501 // server at every tick of the simulation.
509 server,
524 server,
531 simulation.AddActor(server);
538 Server unprotected_server(30, 1.0);
541 Server protected_server(30, 1.0);
554 // server. Manual inspection of the traffic graphs will show this
571 VerboseOut("\nUnprotected server's results:\n\n");
574 VerboseOut("Protected server's results:\n\n");
579 "attackers attacking unprotected server.");
581 "normal clients making requests to unprotected server.");
583 "attackers attacking protected server.");
585 "normal clients making requests to protected server.");
596 // A server that never rejects requests, but will go down for maintenance.
597 Server server(std::numeric_limits<int>::max(), 1.0);
598 server.SetDowntime(start_downtime, duration);
607 throttler_entry.get(), average_client_interval, &server, NULL);
613 simulation.AddActor(&server);