diff --git a/Chapters/Motivation.tex b/Chapters/Motivation.tex index 7b90fd8..631cd28 100644 --- a/Chapters/Motivation.tex +++ b/Chapters/Motivation.tex @@ -21,27 +21,49 @@ rather than systematic evaluation. This observation revealed a clear need for rigorous, evidence-based comparison of Peer-to-Peer overlay VPN implementations. -This chapter introduces the Clan project, articulates its fundamental -objectives, outlines the key components, and examines the driving -factors motivating its development. +However, existing research on benchmarking peer-to-peer overlay networks +remains sparse. +One notable work from 2024, ``Full-mesh VPN performance evaluation +for a secure edge-cloud continuum'' \cite{kjorveziroski_full-mesh_2024}, +benchmarks a subset of available overlay VPNs but focuses primarily +on solutions with a central point of failure. +In contrast, this thesis evaluates more widely adopted VPNs +with an emphasis on fully decentralized architectures. +Furthermore, that study relied exclusively on iperf3 for performance measurement, +whereas our benchmark suite includes additional real-world workloads +to better reflect practical usage patterns. -Peer-to-peer (P2P) technologies and decentralization have undergone -significant growth and evolution in recent years. These technologies -form the backbone of various systems, including P2P Edge -Computing—particularly in the context of the Internet of Things -(IoT)—Content Delivery Networks (CDNs), and Blockchain platforms such -as Ethereum. P2P architectures enable more democratic, -censorship-resistant, and fault-tolerant systems by reducing reliance -on single points of failure \cite{shukla_towards_2021}. +A further motivation for this work was to create a fully automated +benchmarking framework capable of generating a public leaderboard, +similar in spirit to the js-framework-benchmark +(see Figure~\ref{fig:js-framework-benchmark}). +By providing an accessible web interface with regularly updated results, +we hope to encourage P2P VPN developers to optimize their implementations +in pursuit of top rankings. -However, to fully realize these benefits, a P2P system must deploy -its nodes across a diverse set of entities. Greater diversity in -hosting increases the network’s resilience to censorship and systemic failures. +\begin{figure}[H] + \centering + \includegraphics[width=1\textwidth]{Figures/krause-js-framework.png} + \caption{js-framework-benchmark results for Chrome 144.0 + \cite{krause_krausestjs-framework-benchmark_2026}} + \label{fig:js-framework-benchmark} +\end{figure} -Despite this, recent trends in Ethereum node hosting reveal a -significant reliance on centralized cloud providers. Notably, Amazon, -Hetzner, and OVH collectively host 70\% of all Ethereum nodes, as -illustrated in Figure \ref{fig:ethernodes_hosting}. +\subsection{The Case for Decentralized Self-Hosting} + +The need for reliable overlay VPNs extends beyond the Clan project. +Peer-to-peer architectures underpin a wide range of modern systems---from +IoT edge computing to content delivery networks and blockchain platforms +like Ethereum---enabling censorship-resistant, fault-tolerant infrastructure +by eliminating single points of failure \cite{shukla_towards_2021}. + +However, realizing these benefits requires distributing nodes across +diverse hosting entities. +In practice, this diversity remains elusive: +Amazon, Hetzner, and OVH collectively host 70\% of all Ethereum nodes +(see Figure~\ref{fig:ethernodes_hosting}), +concentrating nominally decentralized infrastructure within +a handful of providers subject to common regulatory jurisdictions. \begin{figure}[H] \centering @@ -51,73 +73,36 @@ illustrated in Figure \ref{fig:ethernodes_hosting}. \label{fig:ethernodes_hosting} \end{figure} -The centralized nature of these providers and their domicile within the -same regulatory jurisdiction—the United States—introduces vulnerability. -Such a configuration allows for possible governmental intervention, -which could lead to network shutdowns or manipulation by leveraging -control over these cloud services. - -The reliance on cloud-based solutions is largely attributed to their -ease of use and reliability, as self-hosting introduces several -technical and operational challenges, which include: +This centralization persists because self-hosting remains prohibitively complex. +Key challenges include: \begin{itemize} - \item \textbf{NAT Traversal:} Establishing direct connections - between peers located behind Network Address Translation (NAT) - devices is complex and often requires workarounds such as port - forwarding or relay servers. + \item \textbf{Network Connectivity:} + NAT traversal, dynamic IP addresses, and firewall configurations + require technical workarounds such as port forwarding, relay servers, + or Dynamic DNS services. - \item \textbf{Dynamic IP Addresses:} Peers often have non-static - (dynamic) IP addresses assigned by Internet Service Providers - (ISPs), which makes maintaining stable connections difficult - without additional solutions like Dynamic DNS services. + \item \textbf{Security:} + Operators must secure data in transit, authenticate connections, + and defend against attacks---responsibilities that cloud providers + typically abstract away. - \item \textbf{Data Reliability:} Ensuring data durability and - preventing loss due to hardware failures, system crashes, or - insufficient backup mechanisms can be a challenge for individual - users managing their own infrastructure. + \item \textbf{Reliability:} + Ensuring data durability, maintaining uptime during hardware failures + or power outages, and handling peer churn in dynamic networks + demand continuous attention. - \item \textbf{Security Concerns:} Self-hosted systems must be - protected from malicious actors, including securing data in - transit, authenticating connections, and mitigating attacks such - as Distributed Denial of Service (DDoS). - - \item \textbf{Maintenance Overhead:} Regular updates, hardware - repairs, and troubleshooting require time and effort, which may - discourage users unfamiliar with system administration. - - \item \textbf{Steep Learning Curve:} Non-technical users face a - high entry barrier, as hosting and configuring their own P2P - nodes often involve understanding complex networking and software - setup processes. - - \item \textbf{High Network Churn:} In dynamic P2P environments - where peers frequently join and leave, ensuring consistent - availability of services and maintaining network stability - present additional challenges. - - \item \textbf{Uptime and Availability:} Keeping self-hosted systems - online and operational 24/7 can be difficult, especially in - situations of power outages, hardware failures, or limited - internet connectivity. + \item \textbf{Operational Overhead:} + System administration tasks---updates, troubleshooting, configuration + management---present a steep learning curve for non-technical users. \end{itemize} -Recognizing this gap, the Clan project aims to address these -challenges by simplifying the process of self-hosting, making it as -straightforward, accessible, and reliable as using a cloud provider. -The project's vision is to empower users to deploy and manage their -own private P2P networks with minimal technical expertise, -significantly lowering the barrier to entry. - -As illustrated in Figure \ref{fig:vision-stages}, the proposed -solution includes a user-friendly web interface. This interface -allows users to design and customize their private P2P networks with -just a few clicks. To further simplify the process, the inclusion of -a Large Language Model (LLM) is envisioned to assist users throughout -the network creation process. The LLM would provide contextual -guidance, answer configuration-related queries, and help resolve -potential issues, thus making the system approachable for a wider -audience without requiring advanced technical skills. +The Clan project addresses these barriers by making self-hosting +as straightforward as using a cloud provider. +As illustrated in Figure~\ref{fig:vision-stages}, Clan envisions +a web interface that enables users to design and deploy private P2P networks +with minimal configuration, assisted by an integrated LLM +for contextual guidance and troubleshooting. \begin{figure}[h!] \centering diff --git a/master_citations.bib b/master_citations.bib index 116bc73..ae45556 100644 --- a/master_citations.bib +++ b/master_citations.bib @@ -254,46 +254,6 @@ - 2022 - Keep CALM and CRDT On.pdf:application/pdf}, } -@inproceedings{jeffery_amc_2023, - location = {New York, {NY}, {USA}}, - title = {{AMC}: Towards Trustworthy and Explorable {CRDT} - Applications with the Automerge Model Checker}, - isbn = {9798400700866}, - url = {https://dl.acm.org/doi/10.1145/3578358.3591326}, - doi = {10.1145/3578358.3591326}, - series = {{PaPoC} '23}, - shorttitle = {{AMC}}, - abstract = {Conflict-free Replicated Data Types ({CRDTs}) enable - local-first operations and asynchronous collaboration without the - need for always-on centralised services. {CRDTs} can have a high - overhead, so implementations need to be optimised, but this - optimisation can lead to bugs despite the use of test suites and - fuzzing. Furthermore, using {CRDTs} in applications is complex, - observing unexpected conflict resolution, issues synchronising - documents and difficulties implementing appropriate data models. - Automerge is a library, exposing a {JSON} {CRDT}, that sees users - having difficulties in modelling their problems, understanding - their edge cases and implementing applications correctly. We - introduce the Automerge Model Checker ({AMC}), empowering - application developers to check properties about their - implementations and explore them dynamically. {AMC} can check a - range of applications as well as being able to check properties - about the core of Automerge itself, helping to make more - trustworthy Automerge applications.{AMC} is available open-source - at github.com/jeffa5/automerge-model-checker.}, - pages = {44--50}, - booktitle = {Proceedings of the 10th Workshop on Principles and - Practice of Consistency for Distributed Data}, - publisher = {Association for Computing Machinery}, - author = {Jeffery, Andrew and Mortier, Richard}, - urldate = {2024-11-24}, - date = {2023}, - file = {Full Text - PDF:/home/lhebendanz/Zotero/storage/EEMPQUIR/Jeffery and Mortier - - 2023 - AMC Towards Trustworthy and Explorable CRDT Applications - with the Automerge Model Checker.pdf:application/pdf}, -} - @inproceedings{dolstra_nix_2004, location = {{USA}}, title = {Nix: A Safe and Policy-Free System for Software Deployment}, @@ -330,3 +290,378 @@ file = {ISPs - ethernodes.org - The Ethereum Network & Node Explorer:/home/lhebendanz/Zotero/storage/BH7E2FAL/Hosting.html:text/html}, } + +@article{kern_lost_2023, + title = {Lost in Simulation: Route Property in Mininet}, + url = + {https://www.net.in.tum.de/fileadmin/TUM/NET/NET-2023-06-1/NET-2023-06-1_03.pdf}, + doi = {10.2313/NET-2023-06-1_03}, + shorttitle = {Lost in Simulation}, + abstract = {The Mininet network emulator enables the comparison of + speed, delay, jitter and packet loss across different topologies. + It provides a Python {API} to instantiate almost arbitrary layouts + of networks and connections with attributes like predetermined + packet loss. We inspect linear and grid-like topologies and + discover that both share similar performance characteristics.}, + author = {Kern, Philipp}, + editora = {Architectures, Chair Of Network}, + editoratype = {collaborator}, + urldate = {2025-01-07}, + date = {2023}, + langid = {english}, + note = {Medium: {PDF} + Publisher: Chair of Network Architectures and Services, School of + Computation, Information and Technology, Technical University of Munich}, + file = {PDF:/home/lhebendanz/Zotero/storage/KSRTDLCA/Kern - 2023 - + Lost in Simulation Route Property in Mininet.pdf:application/pdf}, +} + +@article{savolainen_modeling_2019, + title = {Modeling the interplay of information seeking and + information sharing: A conceptual analysis}, + volume = {71}, + issn = {2050-3806}, + url = + {https://www.emerald.com/insight/content/doi/10.1108/ajim-10-2018-0266/full/html}, + doi = {10.1108/AJIM-10-2018-0266}, + shorttitle = {Modeling the interplay of information seeking and + information sharing}, + abstract = {The purpose of this paper is to contribute to the + creation of a holistic picture of information behavior by examining + the connections between information seeking and sharing.,Conceptual + analysis is used to focus on the ways in which the researchers have + modeled the interplay of information seeking and sharing. The study + draws on conceptual analysis of 27 key studies examining the above + issue, with a focus on the scrutiny of six major models for + information behavior.,Researchers have employed three main + approaches to model the relationships between information seeking + and sharing. The indirect approach conceptualizes information + seeking and sharing as discrete activities connected by an + intermediating factor, for example, information need. The + sequential approach assumes that information seeking precedes + information sharing. From the viewpoint of the interactive + approach, information seeking and sharing appear as mutually + related activities shaping each other iteratively or in a cyclical + manner. The interactive approach provides the most sophisticated + research perspective on the relationships of information seeking + and sharing and contributes to holistic understanding of human + information behavior.,As the study focuses on information seeking + and sharing, no attention is devoted to other activities + constitutive of information behavior, for example, information + use.,The study pioneers by providing an in-depth analysis of the + connections of information seeking and information sharing.}, + pages = {518--534}, + number = {4}, + journaltitle = {Aslib Journal of Information Management}, + author = {Savolainen, Reijo}, + urldate = {2025-01-24}, + date = {2019-06-18}, + langid = {english}, + note = {Publisher: Emerald Publishing Limited}, + file = {Full + Text:/home/lhebendanz/Zotero/storage/LK5QNLVT/Savolainen - 2019 - + Modeling the interplay of information seeking and information + sharing A conceptual + analysis.pdf:application/pdf;Snapshot:/home/lhebendanz/Zotero/storage/JMW3VDFN/html.html:text/html}, +} + +@online{noauthor_web_nodate, + title = {The Web of False Information: Rumors, Fake News, Hoaxes, + Clickbait, and Various Other Shenanigans: Journal of Data and + Information Quality: Vol 11, No 3}, + url = {https://dl.acm.org/doi/abs/10.1145/3309699}, + urldate = {2025-01-24}, + file = {PDF:/home/lhebendanz/Zotero/storage/95QKTBA7/The Web of + False Information Rumors, Fake News, Hoaxes, Clickbait, and Various + Other Shenanigans J.pdf:application/pdf;The Web of False + Information\: Rumors, Fake News, Hoaxes, Clickbait, and Various + Other Shenanigans\: Journal of Data and Information Quality\: Vol + 11, No 3:/home/lhebendanz/Zotero/storage/7A2CZ7A6/3309699.html:text/html}, +} + +@article{noauthor_systematic_2024, + title = {A Systematic Approach to Deal with Noisy Neighbour in + Cloud Infrastructure {\textbar} Request {PDF}}, + url = + {https://www.researchgate.net/publication/303741535_A_Systematic_Approach_to_Deal_with_Noisy_Neighbour_in_Cloud_Infrastructure}, + doi = {10.17485/ijst/2016/v9i19/89211}, + abstract = {Request {PDF} {\textbar} A Systematic Approach to Deal + with Noisy Neighbour in Cloud Infrastructure {\textbar} + Background/Objectives: One of the major challenges of the + multitenant cloud model is performance unpredictability because of + resource contention.... {\textbar} Find, read and cite all the + research you need on {ResearchGate}}, + journaltitle = {{ResearchGate}}, + urldate = {2025-02-19}, + date = {2024-10-22}, + langid = {english}, + file = {Full Text PDF:/home/lhebendanz/Zotero/storage/3HXVA58J/2024 + - A Systematic Approach to Deal with Noisy Neighbour in Cloud + Infrastructure Request + PDF.pdf:application/pdf;Snapshot:/home/lhebendanz/Zotero/storage/8KU7F7XX/303741535_A_Systematic_Approach_to_Deal_with_Noisy_Neighbour_in_Cloud_Infrastructure.html:text/html}, +} + +@online{noauthor_netzdg_nodate, + title = {{NetzDG} - Gesetz zur Verbesserung der Rechtsdurchsetzung + in sozialen Netzwerken}, + url = {https://www.gesetze-im-internet.de/netzdg/BJNR335210017.html}, + urldate = {2025-02-24}, + file = {NetzDG - Gesetz zur Verbesserung der Rechtsdurchsetzung in + sozialen + Netzwerken:/home/lhebendanz/Zotero/storage/VKPIEEDI/BJNR335210017.html:text/html}, +} + +@online{noauthor_packet_2025, + title = {Packet zum Gesetz über digitale Dienste {\textbar} + Gestaltung der digitalen Zukunft Europas}, + url = + {https://digital-strategy.ec.europa.eu/de/policies/digital-services-act-package}, + urldate = {2025-02-24}, + date = {2025-02-21}, + langid = {german}, + file = + {Snapshot:/home/lhebendanz/Zotero/storage/362VSA4E/digital-services-act-package.html:text/html}, +} + +@article{salmi_constructing_2003, + title = {Constructing Knowledge Societies: New Challenges for + Tertiary Education}, + volume = {28}, + issn = {0379-7724, 1469-8358}, + url = {https://www.tandfonline.com/doi/full/10.1080/0379772032000110125}, + doi = {10.1080/0379772032000110125}, + shorttitle = {Constructing Knowledge Societies}, + pages = {65--69}, + number = {1}, + journaltitle = {Higher Education in Europe}, + author = {Salmi, Jamil}, + urldate = {2025-02-26}, + date = {2003-04}, + langid = {english}, + file = {PDF:/home/lhebendanz/Zotero/storage/M7TSQ6XA/Salmi - 2003 - + Constructing Knowledge Societies New Challenges for Tertiary + Education.pdf:application/pdf}, +} + +@article{sahlberg_rethinking_2010, + title = {Rethinking accountability in a knowledge society}, + volume = {11}, + rights = {http://www.springer.com/tdm}, + issn = {1389-2843, 1573-1812}, + url = {http://link.springer.com/10.1007/s10833-008-9098-2}, + doi = {10.1007/s10833-008-9098-2}, + abstract = {Competition between schools combined with test-based + accountability to hold schools accountable for predetermined + knowledge standards have become a common solution in educational + change efforts to improve the performance of educational systems + around the world. This is happening as family and community social + capital declines in most parts of developed world. Increased + competition and individualism are not necessarily beneficial to + creating social capital in schools and their communities. This + article argues that: (1) the evidence remains controversial that + test-based accountability policies improve the quality and + efficiency of public education; (2) the current practice of + determining educational performance by using primarily standardized + knowledge tests as the main means of accountability is not a + necessary condition for much needed educational improvement; and + (3) there is growing evidence that increased high-stakes testing is + restricting students’ conceptual learning, engaging in creative + action and understanding innovation, all of which are essential + elements of contemporary schooling in a knowledge society. Finland + is used as an example to suggest that educational change should + rather contribute to increasing networking and social capital in + schools and in their communities through building trust and + strengthening collective responsibilities within and between + schools. This would create better prospects of worthwhile lifelong + learning in and out of schools. Based on this analysis, the article + concludes that education policies should be directed at promoting + more intelligent forms of accountability to meet external + accountability demands and to encourage cooperation rather than + competition among students, teachers and schools.}, + pages = {45--61}, + number = {1}, + journaltitle = {J Educ Change}, + author = {Sahlberg, Pasi}, + urldate = {2025-02-26}, + date = {2010-02}, + langid = {english}, + file = {PDF:/home/lhebendanz/Zotero/storage/Q7WXPVKN/Sahlberg - + 2010 - Rethinking accountability in a knowledge society.pdf:application/pdf}, +} + +@article{vanderlind_effects_2017, + title = {Effects of Mental Health on Student Learning}, + volume = {22}, + issn = {1087-0059}, + url = {https://eric.ed.gov/?id=EJ1154566}, + abstract = {Learning can be hindered by students' mental health. + Given the increased reports of mental health concerns among college + students, it is imperative that we understand how best to provide + supports to this population to help them learn and succeed. This is + particularly significant given the body of research that + demonstrates how mental illness may negatively affect student + success and degree persistence. In order to best serve this growing + population, there are possible supports that can be provided in the + classroom embedded into current practices and learning + opportunities for all students across the board. This article + addresses the connections between learning and mental health, + practical takeaways for practitioners, and directions for future research.}, + pages = {39--58}, + number = {2}, + journaltitle = {Learning Assistance Review}, + author = {{VanderLind}, Ren}, + urldate = {2025-02-26}, + date = {2017}, + langid = {english}, + note = {Publisher: National College Learning Center Association + {ERIC} Number: {EJ}1154566}, + keywords = {Academic Achievement, Anxiety, College Students, + Correlation, Depression (Psychology), Gender Differences, Learning, + Learning Theories, Mental Disorders, Mental Health, Metacognition, + Personality Traits, Success}, + file = {Full Text + PDF:/home/lhebendanz/Zotero/storage/SGNY7WPR/VanderLind - 2017 - + Effects of Mental Health on Student Learning.pdf:application/pdf}, +} + +@article{sinsebox_supervision_2020, + title = {Supervision and Evaluation Practices That Impact Teacher + Learning: A Case Study of Rural Teachers’ Perspectives}, + url = {https://fisherpub.sjf.edu/education_etd/474}, + shorttitle = {Supervision and Evaluation Practices That Impact + Teacher Learning}, + journaltitle = {Education Doctoral}, + author = {Sinsebox, Jennifer}, + date = {2020-12-01}, + file = {"Supervision and Evaluation Practices That Impact Teacher + Learning\: A C" by Jennifer L. + Sinsebox:/home/lhebendanz/Zotero/storage/HWJMQJ9Z/474.html:text/html}, +} + +@inproceedings{halkes_udp_2011, + title = {{UDP} {NAT} and firewall puncturing in the wild}, + volume = {6641}, + isbn = {978-3-642-20797-6}, + doi = {10.1007/978-3-642-20798-3_1}, + abstract = {Peer-to-Peer (P2P) networks work on the presumption + that all nodes in the network are connectable. However, {NAT} boxes and + firewalls prevent connections to many nodes on the Internet. For + {UDP} based protocols, the {UDP} hole-punching technique has + been proposed to mitigate this problem. + + This paper presents a study of the efficacy of {UDP} hole + punching on the Internet in the context of an actual P2P network. + To the best of our knowledge, no previous study has provided + similar measurements. Our results show that {UDP} hole punching + is an effective method to increase the connectability of peers on + the Internet: approximately 64\% of all peers are behind + a {NAT} box or firewall which should allow hole punching to work, + and more than 80\% of hole punching attempts between these + peers succeed.}, + pages = {1--12}, + author = {Halkes, Gertjan and Pouwelse, J.A.}, + date = {2011-06-01}, + file = {Full Text + PDF:/home/lhebendanz/Zotero/storage/VUJQDDIG/Halkes and Pouwelse - + 2011 - UDP NAT and firewall puncturing in the wild.pdf:application/pdf}, +} + +@article{mehrab_new_2025, + title = {A New Approach to Peer-to-Peer {VPN} Connectivity: + Achieving Seamless Communication Without Firewalls}, + shorttitle = {A New Approach to Peer-to-Peer {VPN} Connectivity}, + abstract = {This study presents a novel approach to peer-to-peer + Virtual Private Network ({VPN}) connectivity that eliminates + traditional firewall dependencies. As remote work and distributed + systems become increasingly prevalent, the limitations of + conventional {VPN} architectures-including performance bottlenecks, + complex configurations, and centralized points of failure-have + become more apparent. The research evaluates {ZeroTier}, a modern + network virtualization solution, against established {VPN} + technologies (Wireguard, Tailscale, and {OpenVPN}) across a + simulated environment of 100 globally distributed virtual nodes + over a 30-day period. Results demonstrate {ZeroTier}'s superior + performance across key metrics: 57\% faster connection + establishment than Wireguard, 45\% lower latency compared to + traditional solutions, higher throughput (875 Mbps for P2P + connections), reduced resource utilization, and a 94.8\% + first-attempt connection success rate. {ZeroTier} successfully + established direct P2P connections in 85\% of cases, significantly + outperforming competitors. The study details {ZeroTier}'s "Virtual + Layer 2 Ethernet" architecture, which combines centralized + coordination with decentralized communication and employs + sophisticated {NAT} traversal techniques to enable direct + device-to-device connections without complex firewall + configurations. This approach creates a flat, software-defined + network that spans multiple physical locations while maintaining + enterprise-grade security through end-to-end encryption.}, + author = {Mehrab, Abu}, + date = {2025-04-11}, + file = {Full Text + PDF:/home/lhebendanz/Zotero/storage/8T5JMBVF/Mehrab - 2025 - A New + Approach to Peer-to-Peer VPN Connectivity Achieving Seamless + Communication Without Firewalls.pdf:application/pdf}, +} + +@inproceedings{lackorzynski_comparative_2019, + title = {A Comparative Study on Virtual Private Networks for Future + Industrial Communication Systems}, + url = {https://ieeexplore.ieee.org/document/8758010}, + doi = {10.1109/WFCS.2019.8758010}, + abstract = {The future industrial networks will not be created from + scratch. Rather, they will grow from existing installations without + displacing legacy components. The secure integration of these + legacy machines and networks will become an important building + block in order to realize the vision of Industry 4.0. Secure and + high performance virtual private networks ({VPNs}) will be + necessary for that purpose.Therefore, we investigated and compared + various {VPN} solutions. Their performance was tested on multiple + hardware platforms ranging from very resource constrained to very + powerful. Non-functional aspects, relating around security, + manageability and ease of use, were discussed in order to assess + their suitability for future use cases.We arrive at clear + recommendations on which software {VPN} solutions to choose for + future industrial setups.}, + eventtitle = {2019 15th {IEEE} International Workshop on Factory + Communication Systems ({WFCS})}, + pages = {1--8}, + booktitle = {2019 15th {IEEE} International Workshop on Factory + Communication Systems ({WFCS})}, + author = {Lackorzynski, Tim and Köpsell, Stefan and Strufe, Thorsten}, + urldate = {2026-02-11}, + date = {2019-05}, + keywords = {Encryption, Hardware, industrial {IoT}, industrial + networks, Industry, Logic gates, network security, Production + facilities, secure transport, Software, tunneling, Virtual private + networks, {VPN}}, + file = {PDF:/home/lhebendanz/Zotero/storage/DWSF7ERP/Lackorzynski + et al. - 2019 - A Comparative Study on Virtual Private Networks for + Future Industrial Communication + Systems.pdf:application/pdf;Snapshot:/home/lhebendanz/Zotero/storage/PXWNAC6D/8758010.html:text/html}, +} + +@online{noauthor_nat_2026, + title = {{NAT} Traversal: How It Works}, + url = {https://dev.to/alakkadshaw/nat-traversal-how-it-works-4dnc}, + shorttitle = {{NAT} Traversal}, + abstract = {{NAT} traversal is the set of techniques that solves + this problem: discovering public addresses,...}, + titleaddon = {{DEV} Community}, + urldate = {2026-02-11}, + date = {2026-01-30}, + langid = {english}, + file = + {Snapshot:/home/lhebendanz/Zotero/storage/UHJQ84AV/nat-traversal-how-it-works-4dnc.html:text/html}, +} + +@software{krause_krausestjs-framework-benchmark_2026, + title = {krausest/js-framework-benchmark}, + rights = {Apache-2.0}, + url = {https://github.com/krausest/js-framework-benchmark}, + abstract = {A comparison of the performance of a few popular + javascript frameworks}, + author = {Krause, Stefan}, + urldate = {2026-02-11}, + date = {2026-02-11}, + note = {original-date: 2015-12-09T20:10:53Z}, +}