$ src/h2load -n100000 -c1000 -m100 https://127.0.0.1:8443/
progress: 10% done
progress: 20% done
progress: 30% done
progress: 40% done
progress: 50% done
progress: 60% done
progress: 70% done
progress: 80% done
progress: 90% done
progress: 100% done
finished in 11 sec, 939 millisec and 837 microsec, 8375 req/s, 8931 kbytes/s
requests: 100000 total, 100000 started, 100000 done, 100000 succeeded, 0 failed, 0 errored
status codes: 100000 2xx, 0 3xx, 0 4xx, 0 5xx
traffic: 111773815 bytes total, 599031 bytes headers, 108600000 bytes data
" -n100000 -c1000 -m100" means that generate total 100,000 requests, using 1,000 concurrent clients (HTTP/2 or SPDY sessions), with 100 max concurrent streams.
At the moment, h2load is built on top of the nghttp2 library and its version is now draft-10, which means it cannot be used against other implementations, which are still draft-09. But after IETF meeting, httpbis will publish next implementation draft-11, then we can use this tool for testing. I fixed several bugs with this stress tool, so it is worth trying out.
When the moral authority of middleboxes is eroded, arguments by their
developers to allow unfettered access to the plaintext of traffic
that traverses those boxes may be called into question.
As an industry, we should look for other mechanisms to provide
legitimate third-party value."
Specifically, it is easy as a practitioner to take a quick look at academic work to see what core nuggets it might carry - but to dismiss the larger project as built on a series of unrealistic assumptions. (which is not to say the work isn't valuable - just not in the same context)
WRT these projects, especially Sprout, if you're the kind of person who has bothered to click read more on this post and you took the tl;dr; summary approach to these works the first time around I suspect you'll find the experience of taking a second look worthwhile.
http://alfalfa.mit.edu/ and http://web.mit.edu/remy/
I participated for two days last week in the joint W3C/IETF (IAB) workshop on Strengthening the Internet against Pervasive Monitoring (aka STRINT) .
Now that the IETF has declared pervasive monitoring of the Internet to be a technical attack the
goal of the...
You can see discussion at http://email@example.com/msg11510.html.
- Worcester Polytechnic InstituteComputer Science, 1992 - 1996
- Mozilla CorporationEngineer for Networking, 2010 - present
- PenBay NetworksOwner, 2008
- IBMEngineering Manager, 2005 - 2007
- DataPowerEngineer, 2002 - 2005
- AppliedTheoryEngineer, 1996 - 2002
- NYSERNetEngineer, 1994 - 1996
Scaling Existing Lock-based Applications with Lock Elision
Enabling existing lock-based programs to achieve performance benefits of nonblocking synchronization.
The Human Genome Project Wasn’t Overhyped. The Payoff Just Took Time | X...
People in the tech industry often like to say that we overestimate the short-term impact of new technology and underestimate the longer-term
Domain Sharding revisited | High Performance Web Sites
Domain Sharding revisited. September 5, 2013 10:41 am | 4 Comments. With the adoption of SPDY and progress on HTTP 2.0, I hear some people r
Yahoo adds HTTPS support to Yahoo mail - The H Security: News and Features
Yahoo has quietly begun to enable HTTPS support for Yahoo Mail, but it's still only an opt-in option for users who wish to protect their pri
[Phoronix] Firefox 18.0 Lets Loose IonMonkey Compiler
Phoronix is the leading technology website for Linux hardware reviews, open-source news, Linux benchmarks, open-source benchmarks, distribut
Program tuning as a resource allocation problem at Andi Kleen's blog
Tilting at windmills and other endeavors
A fix for an 11-year-old bug in the build system | Nicholas Nethercote
A fix for an 11-year-old bug in the build system. Posted on January 5, 2012 by Nicholas Nethercote| 4 Comments. I have noticed for months th
Reminder: visit the Ada Initiative feminist hacker lounge at PyCon this ...
At this year's annual USA Python conference — PyCon in Santa Clara, California, March 15–17 — the Ada Initiative will have a booth in the Ex
MWC 2013, Firefox OS, and More Web API Evolution | Brendan Eich
Last week started with a bang, with Mozilla's Firefox OS launch at Mobile World Congress 2013. We announced that Firefox OS had won the supp
Crimeware Author Funds Exploit Buying Spree — Krebs on Security
The author of Blackhole, an exploit kit that booby-traps hacked Web sites to serve malware, has done so well for himself renting his creatio
Q&A: How to combine 2 wireless routers on one home network? (2Wire &...
Hi everyone, nice to have a forum dedicated to wireless technologyI have a nice robust 2Wire 1800HG Wireless DSL router that i have successf