new structure

This commit is contained in:
2026-02-24 18:36:34 +01:00
parent f1049f51f2
commit 6f3b6ffa07
3 changed files with 567 additions and 342 deletions

View File

@@ -38,7 +38,7 @@
% the table of contents
%toctotoc, % Uncomment to add the main table of contents to the
% table of contents
%parskip, % Uncomment to add space between paragraphs
parskip, % Add space between paragraphs and remove indentation
%nohyperref, % Uncomment to not load the hyperref package
headsepline, % Uncomment to get a line under the header
chapterinoneline, % Place the chapter title next to the number on one line
@@ -87,7 +87,7 @@
% THESIS INFORMATION
%----------------------------------------------------------------------------------------
\thesistitle{Decrypting the Overlay: A Reproducible Analysis of P2P
\thesistitle{A Reproducible Analysis of P2P
VPN Implementation and Overhead} % Your thesis title, this is used in the title
% and abstract, print it elsewhere with \ttitle
%\supervisor{\textsc{Ber Lorke}} % Your supervisor's name, this is
@@ -224,41 +224,22 @@ and Management}} % Your department's name and URL, this is used in
\begin{abstract}
\addchaptertocentry{\abstractname} % Add the abstract to the table of contents
This thesis evaluates the performance and fault tolerance of
peer-to-peer mesh VPNs through an automated, reproducible
benchmarking framework
built on the Clan deployment system.
We establish a cloud APIindependent, binary-reproducible environment
for deploying and assessing various VPN implementations,
including Tailscale (via Headscale), Hyprspace, Lighthouse, Tinc,
and ZeroTier.
To simulate real-world network conditions, we employ four impairment profiles
with varying degrees of packet loss, reordering, latency, and jitter.
Our benchmark suite comprises RIST video streaming, Nix cache downloads,
iperf3 throughput tests, QUIC transfers, and ping latency measurements.
The experiments run on three machines interconnected at 1\,Gbps,
each equipped with four CPU cores and eight threads.
In total, we evaluate ten VPNs across seven benchmarks and four
impairment profiles,
yielding over 300 unique measurements.
This thesis benchmarks peer-to-peer mesh VPNs using a reproducible,
Nix-based framework built with a deployment system called Clan. We
evaluate ten VPN implementations; including Tailscale (via
Headscale), Hyprspace, Nebula, Tinc, and ZeroTier; under four
network impairment profiles varying packet loss, reordering,
latency, and jitter, yielding over 300 unique measurements across
seven benchmarks.
Our analysis reveals that Tailscale outperforms the Linux kernel's
default networking stack under degraded network conditions—a
counterintuitive finding
we investigate through source code analysis of packet handling,
encryption schemes, and resilience mechanisms.
This investigation also uncovered several critical security vulnerabilities
across the evaluated VPNs.
We validate our hypotheses by re-running benchmarks with tuned
Linux kernel parameters,
demonstrating measurable improvements in network throughput.
This work contributes to decentralized networking research
by providing an extensible framework for reproducible P2P benchmarks,
offering insights into mesh VPN implementation quality,
and demonstrating that default Linux kernel settings are suboptimal
for adverse network conditions.
default networking stack under degraded conditions. and tuned
congestion control: Reno over CUBIC, with RACK disabled to avoid
spurious retransmits under reordering. We validate this
hypothesis by re-running benchmarks with tuned kernel buffer
parameters, demonstrating measurable throughput improvements. This
investigation also uncovered several critical security
vulnerabilities across the evaluated VPNs.
\end{abstract}
@@ -351,7 +332,7 @@ and Management}} % Your department's name and URL, this is used in
% Uncomment the lines as you write the chapters
\include{Chapters/Introduction}
\include{Chapters/Methodology}
\include{Chapters/Preliminaries}
%\include{Chapters/Chapter1}
%\include{Chapters/Chapter2}