new structure

This commit is contained in:
2026-02-24 18:36:34 +01:00
parent f1049f51f2
commit 6f3b6ffa07
3 changed files with 567 additions and 342 deletions

View File

@@ -2,6 +2,8 @@
\label{Introduction}
TODO
\subsection{Motivation}
Peer-to-peer architectures promise censorship-resistant, fault-tolerant
@@ -174,30 +176,12 @@ in pursuit of top rankings.
\label{fig:vision-stages}
\end{figure}
\subsection{Research Contribution}
TODO
\subsection{Related Work}
\subsubsection{Nix: A Safe and Policy-Free System for Software Deployment}
Nix addresses significant issues in software deployment by utilizing
cryptographic hashes to ensure unique paths for component instances
\cite{dolstra_nix_2004}. Features such as concurrent installation of
multiple versions, atomic upgrades, and safe garbage collection make
Nix a flexible deployment system. This work uses Nix to ensure that
all VPN builds and system configurations are deterministic.
\subsubsection{NixOS: A Purely Functional Linux Distribution}
NixOS extends Nix principles to Linux system configuration
\cite{dolstra_nixos_2008}. System configurations are reproducible and
isolated from stateful interactions typical in imperative package
management. This property is essential for ensuring identical test
environments across benchmark runs.
\subsubsection{A Comparative Study on Virtual Private Networks}
Lackorzynski et al.\ \cite{lackorzynski_comparative_2019} evaluate
@@ -226,26 +210,5 @@ This thesis extends their work in several ways:
\item Fully reproducible experimental framework via Nix/NixOS/Clan
\end{itemize}
\subsubsection{UDP NAT and Firewall Puncturing in the Wild}
Halkes and Pouwelse~\cite{halkes_udp_2011} measure UDP hole punching
efficacy on a live P2P network using the Tribler BitTorrent client.
Their study finds that 79\% of peers are unreachable due to NAT or
firewall restrictions, yet 64\% reside behind configurations amenable
to hole punching. Among compatible peers, over 80\% of puncturing
attempts succeed, establishing hole punching as a practical NAT
traversal technique. Their timeout measurements further indicate that
keep-alive messages must be sent at least every 55 seconds to maintain
open NAT mappings.
These findings directly inform the evaluation criteria for this thesis.
All mesh VPNs tested rely on UDP hole punching for NAT traversal;
the 80\% success rate sets a baseline expectation, while the 55-second
timeout informs analysis of each implementation's keep-alive behavior
during source code review.
\subsubsection{An Overview of Packet Reordering in TCP}
TODO \cite{leung_overview_2007}
\subsubsection{Performance Evaluation of TCP over QUIC Tunnels}
TODO \cite{guo_implementation_2025}
TODO \cite{guo_implementation_2025}