new structure
This commit is contained in:
53
main.tex
53
main.tex
@@ -38,7 +38,7 @@
|
||||
% the table of contents
|
||||
%toctotoc, % Uncomment to add the main table of contents to the
|
||||
% table of contents
|
||||
%parskip, % Uncomment to add space between paragraphs
|
||||
parskip, % Add space between paragraphs and remove indentation
|
||||
%nohyperref, % Uncomment to not load the hyperref package
|
||||
headsepline, % Uncomment to get a line under the header
|
||||
chapterinoneline, % Place the chapter title next to the number on one line
|
||||
@@ -87,7 +87,7 @@
|
||||
% THESIS INFORMATION
|
||||
%----------------------------------------------------------------------------------------
|
||||
|
||||
\thesistitle{Decrypting the Overlay: A Reproducible Analysis of P2P
|
||||
\thesistitle{A Reproducible Analysis of P2P
|
||||
VPN Implementation and Overhead} % Your thesis title, this is used in the title
|
||||
% and abstract, print it elsewhere with \ttitle
|
||||
%\supervisor{\textsc{Ber Lorke}} % Your supervisor's name, this is
|
||||
@@ -224,41 +224,22 @@ and Management}} % Your department's name and URL, this is used in
|
||||
\begin{abstract}
|
||||
\addchaptertocentry{\abstractname} % Add the abstract to the table of contents
|
||||
|
||||
This thesis evaluates the performance and fault tolerance of
|
||||
peer-to-peer mesh VPNs through an automated, reproducible
|
||||
benchmarking framework
|
||||
built on the Clan deployment system.
|
||||
We establish a cloud API–independent, binary-reproducible environment
|
||||
for deploying and assessing various VPN implementations,
|
||||
including Tailscale (via Headscale), Hyprspace, Lighthouse, Tinc,
|
||||
and ZeroTier.
|
||||
|
||||
To simulate real-world network conditions, we employ four impairment profiles
|
||||
with varying degrees of packet loss, reordering, latency, and jitter.
|
||||
Our benchmark suite comprises RIST video streaming, Nix cache downloads,
|
||||
iperf3 throughput tests, QUIC transfers, and ping latency measurements.
|
||||
The experiments run on three machines interconnected at 1\,Gbps,
|
||||
each equipped with four CPU cores and eight threads.
|
||||
In total, we evaluate ten VPNs across seven benchmarks and four
|
||||
impairment profiles,
|
||||
yielding over 300 unique measurements.
|
||||
This thesis benchmarks peer-to-peer mesh VPNs using a reproducible,
|
||||
Nix-based framework built with a deployment system called Clan. We
|
||||
evaluate ten VPN implementations; including Tailscale (via
|
||||
Headscale), Hyprspace, Nebula, Tinc, and ZeroTier; under four
|
||||
network impairment profiles varying packet loss, reordering,
|
||||
latency, and jitter, yielding over 300 unique measurements across
|
||||
seven benchmarks.
|
||||
|
||||
Our analysis reveals that Tailscale outperforms the Linux kernel's
|
||||
default networking stack under degraded network conditions—a
|
||||
counterintuitive finding
|
||||
we investigate through source code analysis of packet handling,
|
||||
encryption schemes, and resilience mechanisms.
|
||||
This investigation also uncovered several critical security vulnerabilities
|
||||
across the evaluated VPNs.
|
||||
|
||||
We validate our hypotheses by re-running benchmarks with tuned
|
||||
Linux kernel parameters,
|
||||
demonstrating measurable improvements in network throughput.
|
||||
This work contributes to decentralized networking research
|
||||
by providing an extensible framework for reproducible P2P benchmarks,
|
||||
offering insights into mesh VPN implementation quality,
|
||||
and demonstrating that default Linux kernel settings are suboptimal
|
||||
for adverse network conditions.
|
||||
default networking stack under degraded conditions. and tuned
|
||||
congestion control: Reno over CUBIC, with RACK disabled to avoid
|
||||
spurious retransmits under reordering. We validate this
|
||||
hypothesis by re-running benchmarks with tuned kernel buffer
|
||||
parameters, demonstrating measurable throughput improvements. This
|
||||
investigation also uncovered several critical security
|
||||
vulnerabilities across the evaluated VPNs.
|
||||
|
||||
\end{abstract}
|
||||
|
||||
@@ -351,7 +332,7 @@ and Management}} % Your department's name and URL, this is used in
|
||||
% Uncomment the lines as you write the chapters
|
||||
\include{Chapters/Introduction}
|
||||
\include{Chapters/Methodology}
|
||||
|
||||
\include{Chapters/Preliminaries}
|
||||
|
||||
%\include{Chapters/Chapter1}
|
||||
%\include{Chapters/Chapter2}
|
||||
|
||||
Reference in New Issue
Block a user