Compare commits
3 Commits
6f4f0af8b0
...
ae3d6b2749
| Author | SHA1 | Date | |
|---|---|---|---|
| ae3d6b2749 | |||
| 9bba7cdfd2 | |||
| 230dfef15d |
@@ -2,46 +2,23 @@
|
|||||||
|
|
||||||
\label{Motivation}
|
\label{Motivation}
|
||||||
|
|
||||||
This thesis emerged from two interconnected research directions.
|
Peer-to-peer architectures promise censorship-resistant, fault-tolerant
|
||||||
The initial focus was the Clan deployment framework,
|
infrastructure by eliminating single points of failure \cite{shukla_towards_2021}.
|
||||||
which leverages Nix and NixOS to eliminate
|
These architectures underpin a growing range of systems---from IoT edge computing
|
||||||
entire classes of errors prevalent in contemporary infrastructure deployment.
|
and content delivery networks to blockchain platforms like Ethereum.
|
||||||
By doing so, Clan reduces operational overhead to a degree
|
Yet realizing these benefits requires distributing nodes across
|
||||||
where a single administrator can reliably self-host
|
genuinely diverse hosting entities.
|
||||||
complex distributed services at scale.
|
|
||||||
|
|
||||||
During the development of the Clan framework,
|
In practice, this diversity remains illusory.
|
||||||
which depends heavily on overlay VPNs for secure peer connectivity,
|
Amazon, Hetzner, and OVH collectively host 70\% of all Ethereum nodes
|
||||||
a recurring challenge became apparent:
|
(see Figure~\ref{fig:ethernodes_hosting}),
|
||||||
practitioners held divergent preferences for mesh VPN solutions,
|
concentrating nominally decentralized infrastructure
|
||||||
each citing different edge cases where their chosen VPN
|
within a handful of cloud providers.
|
||||||
proved unreliable or lacked essential features.
|
More concerning, these providers operate under overlapping regulatory jurisdictions,
|
||||||
These discussions, however, were largely grounded in anecdotal evidence
|
predominantly the United States and the European Union.
|
||||||
rather than systematic evaluation.
|
This concentration undermines technical sovereignty:
|
||||||
This observation revealed a clear need for
|
a single governmental action could compel service termination,
|
||||||
rigorous, evidence-based comparison of Peer-to-Peer overlay VPN implementations.
|
data disclosure, or traffic manipulation across a majority of the network.
|
||||||
|
|
||||||
This chapter introduces the Clan project, articulates its fundamental
|
|
||||||
objectives, outlines the key components, and examines the driving
|
|
||||||
factors motivating its development.
|
|
||||||
|
|
||||||
Peer-to-peer (P2P) technologies and decentralization have undergone
|
|
||||||
significant growth and evolution in recent years. These technologies
|
|
||||||
form the backbone of various systems, including P2P Edge
|
|
||||||
Computing—particularly in the context of the Internet of Things
|
|
||||||
(IoT)—Content Delivery Networks (CDNs), and Blockchain platforms such
|
|
||||||
as Ethereum. P2P architectures enable more democratic,
|
|
||||||
censorship-resistant, and fault-tolerant systems by reducing reliance
|
|
||||||
on single points of failure \cite{shukla_towards_2021}.
|
|
||||||
|
|
||||||
However, to fully realize these benefits, a P2P system must deploy
|
|
||||||
its nodes across a diverse set of entities. Greater diversity in
|
|
||||||
hosting increases the network’s resilience to censorship and systemic failures.
|
|
||||||
|
|
||||||
Despite this, recent trends in Ethereum node hosting reveal a
|
|
||||||
significant reliance on centralized cloud providers. Notably, Amazon,
|
|
||||||
Hetzner, and OVH collectively host 70\% of all Ethereum nodes, as
|
|
||||||
illustrated in Figure \ref{fig:ethernodes_hosting}.
|
|
||||||
|
|
||||||
\begin{figure}[H]
|
\begin{figure}[H]
|
||||||
\centering
|
\centering
|
||||||
@@ -51,75 +28,78 @@ illustrated in Figure \ref{fig:ethernodes_hosting}.
|
|||||||
\label{fig:ethernodes_hosting}
|
\label{fig:ethernodes_hosting}
|
||||||
\end{figure}
|
\end{figure}
|
||||||
|
|
||||||
The centralized nature of these providers and their domicile within the
|
Why does this centralization persist despite the explicit goals of decentralization?
|
||||||
same regulatory jurisdiction—the United States—introduces vulnerability.
|
The answer lies in the practical barriers to self-hosting.
|
||||||
Such a configuration allows for possible governmental intervention,
|
Cloud providers offer static IP addresses and publicly routable endpoints,
|
||||||
which could lead to network shutdowns or manipulation by leveraging
|
eliminating the networking complexity that plagues residential and
|
||||||
control over these cloud services.
|
small-office deployments.
|
||||||
|
Most internet-connected devices sit behind Network Address Translation (NAT),
|
||||||
|
which prevents incoming connections without explicit port forwarding
|
||||||
|
or relay infrastructure.
|
||||||
|
Combined with dynamic IP assignments from ISPs, maintaining stable peer connectivity
|
||||||
|
from self-hosted infrastructure traditionally required significant technical expertise.
|
||||||
|
|
||||||
The reliance on cloud-based solutions is largely attributed to their
|
Overlay VPNs offer a solution to this fundamental barrier.
|
||||||
ease of use and reliability, as self-hosting introduces several
|
By establishing encrypted tunnels that traverse NAT boundaries,
|
||||||
technical and operational challenges, which include:
|
mesh VPNs enable direct peer-to-peer connectivity without requiring
|
||||||
|
static IP addresses or manual firewall configuration.
|
||||||
|
Each node receives a stable virtual address within the overlay network,
|
||||||
|
regardless of its underlying network topology.
|
||||||
|
This capability is transformative:
|
||||||
|
it allows a device behind consumer-grade NAT to participate
|
||||||
|
as a first-class peer in a distributed system,
|
||||||
|
removing the primary technical advantage that cloud providers hold.
|
||||||
|
|
||||||
\begin{itemize}
|
The Clan deployment framework builds on this foundation.
|
||||||
\item \textbf{NAT Traversal:} Establishing direct connections
|
Clan leverages Nix and NixOS to eliminate entire classes of
|
||||||
between peers located behind Network Address Translation (NAT)
|
configuration errors prevalent in contemporary infrastructure deployment,
|
||||||
devices is complex and often requires workarounds such as port
|
reducing operational overhead to a degree where a single administrator
|
||||||
forwarding or relay servers.
|
can reliably self-host complex distributed services.
|
||||||
|
Overlay VPNs are central to Clan's architecture,
|
||||||
|
providing the secure peer connectivity that enables nodes
|
||||||
|
to form cohesive networks regardless of their physical location or NAT situation.
|
||||||
|
As illustrated in Figure~\ref{fig:vision-stages}, Clan envisions
|
||||||
|
a web interface that enables users to design and deploy private P2P networks
|
||||||
|
with minimal configuration, assisted by an integrated LLM
|
||||||
|
for contextual guidance and troubleshooting.
|
||||||
|
|
||||||
\item \textbf{Dynamic IP Addresses:} Peers often have non-static
|
During the development of Clan, a recurring challenge became apparent:
|
||||||
(dynamic) IP addresses assigned by Internet Service Providers
|
practitioners held divergent preferences for mesh VPN solutions,
|
||||||
(ISPs), which makes maintaining stable connections difficult
|
each citing different edge cases where their chosen VPN
|
||||||
without additional solutions like Dynamic DNS services.
|
proved unreliable or lacked essential features.
|
||||||
|
These discussions were largely grounded in anecdotal evidence
|
||||||
|
rather than systematic evaluation.
|
||||||
|
This observation revealed a clear need for rigorous,
|
||||||
|
evidence-based comparison of peer-to-peer overlay VPN implementations.
|
||||||
|
|
||||||
\item \textbf{Data Reliability:} Ensuring data durability and
|
Existing research on this topic remains sparse.
|
||||||
preventing loss due to hardware failures, system crashes, or
|
One notable work from 2024, ``Full-mesh VPN performance evaluation
|
||||||
insufficient backup mechanisms can be a challenge for individual
|
for a secure edge-cloud continuum'' \cite{kjorveziroski_full-mesh_2024},
|
||||||
users managing their own infrastructure.
|
benchmarks a subset of overlay VPNs but focuses primarily
|
||||||
|
on solutions with a central point of failure.
|
||||||
|
In contrast, this thesis evaluates more widely adopted mesh VPNs
|
||||||
|
with an emphasis on fully decentralized architectures.
|
||||||
|
Furthermore, that study relied exclusively on iperf3 for performance measurement,
|
||||||
|
whereas our benchmark suite includes real-world workloads
|
||||||
|
to better reflect practical usage patterns.
|
||||||
|
|
||||||
\item \textbf{Security Concerns:} Self-hosted systems must be
|
A further motivation was to create a fully automated benchmarking framework
|
||||||
protected from malicious actors, including securing data in
|
capable of generating a public leaderboard,
|
||||||
transit, authenticating connections, and mitigating attacks such
|
similar in spirit to the js-framework-benchmark
|
||||||
as Distributed Denial of Service (DDoS).
|
(see Figure~\ref{fig:js-framework-benchmark}).
|
||||||
|
By providing an accessible web interface with regularly updated results,
|
||||||
|
we hope to encourage P2P VPN developers to optimize their implementations
|
||||||
|
in pursuit of top rankings.
|
||||||
|
|
||||||
\item \textbf{Maintenance Overhead:} Regular updates, hardware
|
\begin{figure}[H]
|
||||||
repairs, and troubleshooting require time and effort, which may
|
\centering
|
||||||
discourage users unfamiliar with system administration.
|
\includegraphics[width=1\textwidth]{Figures/krause-js-framework.png}
|
||||||
|
\caption{js-framework-benchmark results for Chrome 144.0
|
||||||
|
\cite{krause_krausestjs-framework-benchmark_2026}}
|
||||||
|
\label{fig:js-framework-benchmark}
|
||||||
|
\end{figure}
|
||||||
|
|
||||||
\item \textbf{Steep Learning Curve:} Non-technical users face a
|
\begin{figure}[h]
|
||||||
high entry barrier, as hosting and configuring their own P2P
|
|
||||||
nodes often involve understanding complex networking and software
|
|
||||||
setup processes.
|
|
||||||
|
|
||||||
\item \textbf{High Network Churn:} In dynamic P2P environments
|
|
||||||
where peers frequently join and leave, ensuring consistent
|
|
||||||
availability of services and maintaining network stability
|
|
||||||
present additional challenges.
|
|
||||||
|
|
||||||
\item \textbf{Uptime and Availability:} Keeping self-hosted systems
|
|
||||||
online and operational 24/7 can be difficult, especially in
|
|
||||||
situations of power outages, hardware failures, or limited
|
|
||||||
internet connectivity.
|
|
||||||
\end{itemize}
|
|
||||||
|
|
||||||
Recognizing this gap, the Clan project aims to address these
|
|
||||||
challenges by simplifying the process of self-hosting, making it as
|
|
||||||
straightforward, accessible, and reliable as using a cloud provider.
|
|
||||||
The project's vision is to empower users to deploy and manage their
|
|
||||||
own private P2P networks with minimal technical expertise,
|
|
||||||
significantly lowering the barrier to entry.
|
|
||||||
|
|
||||||
As illustrated in Figure \ref{fig:vision-stages}, the proposed
|
|
||||||
solution includes a user-friendly web interface. This interface
|
|
||||||
allows users to design and customize their private P2P networks with
|
|
||||||
just a few clicks. To further simplify the process, the inclusion of
|
|
||||||
a Large Language Model (LLM) is envisioned to assist users throughout
|
|
||||||
the network creation process. The LLM would provide contextual
|
|
||||||
guidance, answer configuration-related queries, and help resolve
|
|
||||||
potential issues, thus making the system approachable for a wider
|
|
||||||
audience without requiring advanced technical skills.
|
|
||||||
|
|
||||||
\begin{figure}[h!]
|
|
||||||
\centering
|
\centering
|
||||||
|
|
||||||
% Row 1
|
% Row 1
|
||||||
|
|||||||
BIN
Figures/krause-js-framework.png
Normal file
BIN
Figures/krause-js-framework.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 175 KiB |
@@ -254,46 +254,6 @@
|
|||||||
- 2022 - Keep CALM and CRDT On.pdf:application/pdf},
|
- 2022 - Keep CALM and CRDT On.pdf:application/pdf},
|
||||||
}
|
}
|
||||||
|
|
||||||
@inproceedings{jeffery_amc_2023,
|
|
||||||
location = {New York, {NY}, {USA}},
|
|
||||||
title = {{AMC}: Towards Trustworthy and Explorable {CRDT}
|
|
||||||
Applications with the Automerge Model Checker},
|
|
||||||
isbn = {9798400700866},
|
|
||||||
url = {https://dl.acm.org/doi/10.1145/3578358.3591326},
|
|
||||||
doi = {10.1145/3578358.3591326},
|
|
||||||
series = {{PaPoC} '23},
|
|
||||||
shorttitle = {{AMC}},
|
|
||||||
abstract = {Conflict-free Replicated Data Types ({CRDTs}) enable
|
|
||||||
local-first operations and asynchronous collaboration without the
|
|
||||||
need for always-on centralised services. {CRDTs} can have a high
|
|
||||||
overhead, so implementations need to be optimised, but this
|
|
||||||
optimisation can lead to bugs despite the use of test suites and
|
|
||||||
fuzzing. Furthermore, using {CRDTs} in applications is complex,
|
|
||||||
observing unexpected conflict resolution, issues synchronising
|
|
||||||
documents and difficulties implementing appropriate data models.
|
|
||||||
Automerge is a library, exposing a {JSON} {CRDT}, that sees users
|
|
||||||
having difficulties in modelling their problems, understanding
|
|
||||||
their edge cases and implementing applications correctly. We
|
|
||||||
introduce the Automerge Model Checker ({AMC}), empowering
|
|
||||||
application developers to check properties about their
|
|
||||||
implementations and explore them dynamically. {AMC} can check a
|
|
||||||
range of applications as well as being able to check properties
|
|
||||||
about the core of Automerge itself, helping to make more
|
|
||||||
trustworthy Automerge applications.{AMC} is available open-source
|
|
||||||
at github.com/jeffa5/automerge-model-checker.},
|
|
||||||
pages = {44--50},
|
|
||||||
booktitle = {Proceedings of the 10th Workshop on Principles and
|
|
||||||
Practice of Consistency for Distributed Data},
|
|
||||||
publisher = {Association for Computing Machinery},
|
|
||||||
author = {Jeffery, Andrew and Mortier, Richard},
|
|
||||||
urldate = {2024-11-24},
|
|
||||||
date = {2023},
|
|
||||||
file = {Full Text
|
|
||||||
PDF:/home/lhebendanz/Zotero/storage/EEMPQUIR/Jeffery and Mortier -
|
|
||||||
2023 - AMC Towards Trustworthy and Explorable CRDT Applications
|
|
||||||
with the Automerge Model Checker.pdf:application/pdf},
|
|
||||||
}
|
|
||||||
|
|
||||||
@inproceedings{dolstra_nix_2004,
|
@inproceedings{dolstra_nix_2004,
|
||||||
location = {{USA}},
|
location = {{USA}},
|
||||||
title = {Nix: A Safe and Policy-Free System for Software Deployment},
|
title = {Nix: A Safe and Policy-Free System for Software Deployment},
|
||||||
@@ -330,3 +290,378 @@
|
|||||||
file = {ISPs - ethernodes.org - The Ethereum Network & Node
|
file = {ISPs - ethernodes.org - The Ethereum Network & Node
|
||||||
Explorer:/home/lhebendanz/Zotero/storage/BH7E2FAL/Hosting.html:text/html},
|
Explorer:/home/lhebendanz/Zotero/storage/BH7E2FAL/Hosting.html:text/html},
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@article{kern_lost_2023,
|
||||||
|
title = {Lost in Simulation: Route Property in Mininet},
|
||||||
|
url =
|
||||||
|
{https://www.net.in.tum.de/fileadmin/TUM/NET/NET-2023-06-1/NET-2023-06-1_03.pdf},
|
||||||
|
doi = {10.2313/NET-2023-06-1_03},
|
||||||
|
shorttitle = {Lost in Simulation},
|
||||||
|
abstract = {The Mininet network emulator enables the comparison of
|
||||||
|
speed, delay, jitter and packet loss across different topologies.
|
||||||
|
It provides a Python {API} to instantiate almost arbitrary layouts
|
||||||
|
of networks and connections with attributes like predetermined
|
||||||
|
packet loss. We inspect linear and grid-like topologies and
|
||||||
|
discover that both share similar performance characteristics.},
|
||||||
|
author = {Kern, Philipp},
|
||||||
|
editora = {Architectures, Chair Of Network},
|
||||||
|
editoratype = {collaborator},
|
||||||
|
urldate = {2025-01-07},
|
||||||
|
date = {2023},
|
||||||
|
langid = {english},
|
||||||
|
note = {Medium: {PDF}
|
||||||
|
Publisher: Chair of Network Architectures and Services, School of
|
||||||
|
Computation, Information and Technology, Technical University of Munich},
|
||||||
|
file = {PDF:/home/lhebendanz/Zotero/storage/KSRTDLCA/Kern - 2023 -
|
||||||
|
Lost in Simulation Route Property in Mininet.pdf:application/pdf},
|
||||||
|
}
|
||||||
|
|
||||||
|
@article{savolainen_modeling_2019,
|
||||||
|
title = {Modeling the interplay of information seeking and
|
||||||
|
information sharing: A conceptual analysis},
|
||||||
|
volume = {71},
|
||||||
|
issn = {2050-3806},
|
||||||
|
url =
|
||||||
|
{https://www.emerald.com/insight/content/doi/10.1108/ajim-10-2018-0266/full/html},
|
||||||
|
doi = {10.1108/AJIM-10-2018-0266},
|
||||||
|
shorttitle = {Modeling the interplay of information seeking and
|
||||||
|
information sharing},
|
||||||
|
abstract = {The purpose of this paper is to contribute to the
|
||||||
|
creation of a holistic picture of information behavior by examining
|
||||||
|
the connections between information seeking and sharing.,Conceptual
|
||||||
|
analysis is used to focus on the ways in which the researchers have
|
||||||
|
modeled the interplay of information seeking and sharing. The study
|
||||||
|
draws on conceptual analysis of 27 key studies examining the above
|
||||||
|
issue, with a focus on the scrutiny of six major models for
|
||||||
|
information behavior.,Researchers have employed three main
|
||||||
|
approaches to model the relationships between information seeking
|
||||||
|
and sharing. The indirect approach conceptualizes information
|
||||||
|
seeking and sharing as discrete activities connected by an
|
||||||
|
intermediating factor, for example, information need. The
|
||||||
|
sequential approach assumes that information seeking precedes
|
||||||
|
information sharing. From the viewpoint of the interactive
|
||||||
|
approach, information seeking and sharing appear as mutually
|
||||||
|
related activities shaping each other iteratively or in a cyclical
|
||||||
|
manner. The interactive approach provides the most sophisticated
|
||||||
|
research perspective on the relationships of information seeking
|
||||||
|
and sharing and contributes to holistic understanding of human
|
||||||
|
information behavior.,As the study focuses on information seeking
|
||||||
|
and sharing, no attention is devoted to other activities
|
||||||
|
constitutive of information behavior, for example, information
|
||||||
|
use.,The study pioneers by providing an in-depth analysis of the
|
||||||
|
connections of information seeking and information sharing.},
|
||||||
|
pages = {518--534},
|
||||||
|
number = {4},
|
||||||
|
journaltitle = {Aslib Journal of Information Management},
|
||||||
|
author = {Savolainen, Reijo},
|
||||||
|
urldate = {2025-01-24},
|
||||||
|
date = {2019-06-18},
|
||||||
|
langid = {english},
|
||||||
|
note = {Publisher: Emerald Publishing Limited},
|
||||||
|
file = {Full
|
||||||
|
Text:/home/lhebendanz/Zotero/storage/LK5QNLVT/Savolainen - 2019 -
|
||||||
|
Modeling the interplay of information seeking and information
|
||||||
|
sharing A conceptual
|
||||||
|
analysis.pdf:application/pdf;Snapshot:/home/lhebendanz/Zotero/storage/JMW3VDFN/html.html:text/html},
|
||||||
|
}
|
||||||
|
|
||||||
|
@online{noauthor_web_nodate,
|
||||||
|
title = {The Web of False Information: Rumors, Fake News, Hoaxes,
|
||||||
|
Clickbait, and Various Other Shenanigans: Journal of Data and
|
||||||
|
Information Quality: Vol 11, No 3},
|
||||||
|
url = {https://dl.acm.org/doi/abs/10.1145/3309699},
|
||||||
|
urldate = {2025-01-24},
|
||||||
|
file = {PDF:/home/lhebendanz/Zotero/storage/95QKTBA7/The Web of
|
||||||
|
False Information Rumors, Fake News, Hoaxes, Clickbait, and Various
|
||||||
|
Other Shenanigans J.pdf:application/pdf;The Web of False
|
||||||
|
Information\: Rumors, Fake News, Hoaxes, Clickbait, and Various
|
||||||
|
Other Shenanigans\: Journal of Data and Information Quality\: Vol
|
||||||
|
11, No 3:/home/lhebendanz/Zotero/storage/7A2CZ7A6/3309699.html:text/html},
|
||||||
|
}
|
||||||
|
|
||||||
|
@article{noauthor_systematic_2024,
|
||||||
|
title = {A Systematic Approach to Deal with Noisy Neighbour in
|
||||||
|
Cloud Infrastructure {\textbar} Request {PDF}},
|
||||||
|
url =
|
||||||
|
{https://www.researchgate.net/publication/303741535_A_Systematic_Approach_to_Deal_with_Noisy_Neighbour_in_Cloud_Infrastructure},
|
||||||
|
doi = {10.17485/ijst/2016/v9i19/89211},
|
||||||
|
abstract = {Request {PDF} {\textbar} A Systematic Approach to Deal
|
||||||
|
with Noisy Neighbour in Cloud Infrastructure {\textbar}
|
||||||
|
Background/Objectives: One of the major challenges of the
|
||||||
|
multitenant cloud model is performance unpredictability because of
|
||||||
|
resource contention.... {\textbar} Find, read and cite all the
|
||||||
|
research you need on {ResearchGate}},
|
||||||
|
journaltitle = {{ResearchGate}},
|
||||||
|
urldate = {2025-02-19},
|
||||||
|
date = {2024-10-22},
|
||||||
|
langid = {english},
|
||||||
|
file = {Full Text PDF:/home/lhebendanz/Zotero/storage/3HXVA58J/2024
|
||||||
|
- A Systematic Approach to Deal with Noisy Neighbour in Cloud
|
||||||
|
Infrastructure Request
|
||||||
|
PDF.pdf:application/pdf;Snapshot:/home/lhebendanz/Zotero/storage/8KU7F7XX/303741535_A_Systematic_Approach_to_Deal_with_Noisy_Neighbour_in_Cloud_Infrastructure.html:text/html},
|
||||||
|
}
|
||||||
|
|
||||||
|
@online{noauthor_netzdg_nodate,
|
||||||
|
title = {{NetzDG} - Gesetz zur Verbesserung der Rechtsdurchsetzung
|
||||||
|
in sozialen Netzwerken},
|
||||||
|
url = {https://www.gesetze-im-internet.de/netzdg/BJNR335210017.html},
|
||||||
|
urldate = {2025-02-24},
|
||||||
|
file = {NetzDG - Gesetz zur Verbesserung der Rechtsdurchsetzung in
|
||||||
|
sozialen
|
||||||
|
Netzwerken:/home/lhebendanz/Zotero/storage/VKPIEEDI/BJNR335210017.html:text/html},
|
||||||
|
}
|
||||||
|
|
||||||
|
@online{noauthor_packet_2025,
|
||||||
|
title = {Packet zum Gesetz über digitale Dienste {\textbar}
|
||||||
|
Gestaltung der digitalen Zukunft Europas},
|
||||||
|
url =
|
||||||
|
{https://digital-strategy.ec.europa.eu/de/policies/digital-services-act-package},
|
||||||
|
urldate = {2025-02-24},
|
||||||
|
date = {2025-02-21},
|
||||||
|
langid = {german},
|
||||||
|
file =
|
||||||
|
{Snapshot:/home/lhebendanz/Zotero/storage/362VSA4E/digital-services-act-package.html:text/html},
|
||||||
|
}
|
||||||
|
|
||||||
|
@article{salmi_constructing_2003,
|
||||||
|
title = {Constructing Knowledge Societies: New Challenges for
|
||||||
|
Tertiary Education},
|
||||||
|
volume = {28},
|
||||||
|
issn = {0379-7724, 1469-8358},
|
||||||
|
url = {https://www.tandfonline.com/doi/full/10.1080/0379772032000110125},
|
||||||
|
doi = {10.1080/0379772032000110125},
|
||||||
|
shorttitle = {Constructing Knowledge Societies},
|
||||||
|
pages = {65--69},
|
||||||
|
number = {1},
|
||||||
|
journaltitle = {Higher Education in Europe},
|
||||||
|
author = {Salmi, Jamil},
|
||||||
|
urldate = {2025-02-26},
|
||||||
|
date = {2003-04},
|
||||||
|
langid = {english},
|
||||||
|
file = {PDF:/home/lhebendanz/Zotero/storage/M7TSQ6XA/Salmi - 2003 -
|
||||||
|
Constructing Knowledge Societies New Challenges for Tertiary
|
||||||
|
Education.pdf:application/pdf},
|
||||||
|
}
|
||||||
|
|
||||||
|
@article{sahlberg_rethinking_2010,
|
||||||
|
title = {Rethinking accountability in a knowledge society},
|
||||||
|
volume = {11},
|
||||||
|
rights = {http://www.springer.com/tdm},
|
||||||
|
issn = {1389-2843, 1573-1812},
|
||||||
|
url = {http://link.springer.com/10.1007/s10833-008-9098-2},
|
||||||
|
doi = {10.1007/s10833-008-9098-2},
|
||||||
|
abstract = {Competition between schools combined with test-based
|
||||||
|
accountability to hold schools accountable for predetermined
|
||||||
|
knowledge standards have become a common solution in educational
|
||||||
|
change efforts to improve the performance of educational systems
|
||||||
|
around the world. This is happening as family and community social
|
||||||
|
capital declines in most parts of developed world. Increased
|
||||||
|
competition and individualism are not necessarily beneficial to
|
||||||
|
creating social capital in schools and their communities. This
|
||||||
|
article argues that: (1) the evidence remains controversial that
|
||||||
|
test-based accountability policies improve the quality and
|
||||||
|
efficiency of public education; (2) the current practice of
|
||||||
|
determining educational performance by using primarily standardized
|
||||||
|
knowledge tests as the main means of accountability is not a
|
||||||
|
necessary condition for much needed educational improvement; and
|
||||||
|
(3) there is growing evidence that increased high-stakes testing is
|
||||||
|
restricting students’ conceptual learning, engaging in creative
|
||||||
|
action and understanding innovation, all of which are essential
|
||||||
|
elements of contemporary schooling in a knowledge society. Finland
|
||||||
|
is used as an example to suggest that educational change should
|
||||||
|
rather contribute to increasing networking and social capital in
|
||||||
|
schools and in their communities through building trust and
|
||||||
|
strengthening collective responsibilities within and between
|
||||||
|
schools. This would create better prospects of worthwhile lifelong
|
||||||
|
learning in and out of schools. Based on this analysis, the article
|
||||||
|
concludes that education policies should be directed at promoting
|
||||||
|
more intelligent forms of accountability to meet external
|
||||||
|
accountability demands and to encourage cooperation rather than
|
||||||
|
competition among students, teachers and schools.},
|
||||||
|
pages = {45--61},
|
||||||
|
number = {1},
|
||||||
|
journaltitle = {J Educ Change},
|
||||||
|
author = {Sahlberg, Pasi},
|
||||||
|
urldate = {2025-02-26},
|
||||||
|
date = {2010-02},
|
||||||
|
langid = {english},
|
||||||
|
file = {PDF:/home/lhebendanz/Zotero/storage/Q7WXPVKN/Sahlberg -
|
||||||
|
2010 - Rethinking accountability in a knowledge society.pdf:application/pdf},
|
||||||
|
}
|
||||||
|
|
||||||
|
@article{vanderlind_effects_2017,
|
||||||
|
title = {Effects of Mental Health on Student Learning},
|
||||||
|
volume = {22},
|
||||||
|
issn = {1087-0059},
|
||||||
|
url = {https://eric.ed.gov/?id=EJ1154566},
|
||||||
|
abstract = {Learning can be hindered by students' mental health.
|
||||||
|
Given the increased reports of mental health concerns among college
|
||||||
|
students, it is imperative that we understand how best to provide
|
||||||
|
supports to this population to help them learn and succeed. This is
|
||||||
|
particularly significant given the body of research that
|
||||||
|
demonstrates how mental illness may negatively affect student
|
||||||
|
success and degree persistence. In order to best serve this growing
|
||||||
|
population, there are possible supports that can be provided in the
|
||||||
|
classroom embedded into current practices and learning
|
||||||
|
opportunities for all students across the board. This article
|
||||||
|
addresses the connections between learning and mental health,
|
||||||
|
practical takeaways for practitioners, and directions for future research.},
|
||||||
|
pages = {39--58},
|
||||||
|
number = {2},
|
||||||
|
journaltitle = {Learning Assistance Review},
|
||||||
|
author = {{VanderLind}, Ren},
|
||||||
|
urldate = {2025-02-26},
|
||||||
|
date = {2017},
|
||||||
|
langid = {english},
|
||||||
|
note = {Publisher: National College Learning Center Association
|
||||||
|
{ERIC} Number: {EJ}1154566},
|
||||||
|
keywords = {Academic Achievement, Anxiety, College Students,
|
||||||
|
Correlation, Depression (Psychology), Gender Differences, Learning,
|
||||||
|
Learning Theories, Mental Disorders, Mental Health, Metacognition,
|
||||||
|
Personality Traits, Success},
|
||||||
|
file = {Full Text
|
||||||
|
PDF:/home/lhebendanz/Zotero/storage/SGNY7WPR/VanderLind - 2017 -
|
||||||
|
Effects of Mental Health on Student Learning.pdf:application/pdf},
|
||||||
|
}
|
||||||
|
|
||||||
|
@article{sinsebox_supervision_2020,
|
||||||
|
title = {Supervision and Evaluation Practices That Impact Teacher
|
||||||
|
Learning: A Case Study of Rural Teachers’ Perspectives},
|
||||||
|
url = {https://fisherpub.sjf.edu/education_etd/474},
|
||||||
|
shorttitle = {Supervision and Evaluation Practices That Impact
|
||||||
|
Teacher Learning},
|
||||||
|
journaltitle = {Education Doctoral},
|
||||||
|
author = {Sinsebox, Jennifer},
|
||||||
|
date = {2020-12-01},
|
||||||
|
file = {"Supervision and Evaluation Practices That Impact Teacher
|
||||||
|
Learning\: A C" by Jennifer L.
|
||||||
|
Sinsebox:/home/lhebendanz/Zotero/storage/HWJMQJ9Z/474.html:text/html},
|
||||||
|
}
|
||||||
|
|
||||||
|
@inproceedings{halkes_udp_2011,
|
||||||
|
title = {{UDP} {NAT} and firewall puncturing in the wild},
|
||||||
|
volume = {6641},
|
||||||
|
isbn = {978-3-642-20797-6},
|
||||||
|
doi = {10.1007/978-3-642-20798-3_1},
|
||||||
|
abstract = {Peer-to-Peer (P2P) networks work on the presumption
|
||||||
|
that all nodes in the network are connectable. However, {NAT} boxes and
|
||||||
|
firewalls prevent connections to many nodes on the Internet. For
|
||||||
|
{UDP} based protocols, the {UDP} hole-punching technique has
|
||||||
|
been proposed to mitigate this problem.
|
||||||
|
|
||||||
|
This paper presents a study of the efficacy of {UDP} hole
|
||||||
|
punching on the Internet in the context of an actual P2P network.
|
||||||
|
To the best of our knowledge, no previous study has provided
|
||||||
|
similar measurements. Our results show that {UDP} hole punching
|
||||||
|
is an effective method to increase the connectability of peers on
|
||||||
|
the Internet: approximately 64\% of all peers are behind
|
||||||
|
a {NAT} box or firewall which should allow hole punching to work,
|
||||||
|
and more than 80\% of hole punching attempts between these
|
||||||
|
peers succeed.},
|
||||||
|
pages = {1--12},
|
||||||
|
author = {Halkes, Gertjan and Pouwelse, J.A.},
|
||||||
|
date = {2011-06-01},
|
||||||
|
file = {Full Text
|
||||||
|
PDF:/home/lhebendanz/Zotero/storage/VUJQDDIG/Halkes and Pouwelse -
|
||||||
|
2011 - UDP NAT and firewall puncturing in the wild.pdf:application/pdf},
|
||||||
|
}
|
||||||
|
|
||||||
|
@article{mehrab_new_2025,
|
||||||
|
title = {A New Approach to Peer-to-Peer {VPN} Connectivity:
|
||||||
|
Achieving Seamless Communication Without Firewalls},
|
||||||
|
shorttitle = {A New Approach to Peer-to-Peer {VPN} Connectivity},
|
||||||
|
abstract = {This study presents a novel approach to peer-to-peer
|
||||||
|
Virtual Private Network ({VPN}) connectivity that eliminates
|
||||||
|
traditional firewall dependencies. As remote work and distributed
|
||||||
|
systems become increasingly prevalent, the limitations of
|
||||||
|
conventional {VPN} architectures-including performance bottlenecks,
|
||||||
|
complex configurations, and centralized points of failure-have
|
||||||
|
become more apparent. The research evaluates {ZeroTier}, a modern
|
||||||
|
network virtualization solution, against established {VPN}
|
||||||
|
technologies (Wireguard, Tailscale, and {OpenVPN}) across a
|
||||||
|
simulated environment of 100 globally distributed virtual nodes
|
||||||
|
over a 30-day period. Results demonstrate {ZeroTier}'s superior
|
||||||
|
performance across key metrics: 57\% faster connection
|
||||||
|
establishment than Wireguard, 45\% lower latency compared to
|
||||||
|
traditional solutions, higher throughput (875 Mbps for P2P
|
||||||
|
connections), reduced resource utilization, and a 94.8\%
|
||||||
|
first-attempt connection success rate. {ZeroTier} successfully
|
||||||
|
established direct P2P connections in 85\% of cases, significantly
|
||||||
|
outperforming competitors. The study details {ZeroTier}'s "Virtual
|
||||||
|
Layer 2 Ethernet" architecture, which combines centralized
|
||||||
|
coordination with decentralized communication and employs
|
||||||
|
sophisticated {NAT} traversal techniques to enable direct
|
||||||
|
device-to-device connections without complex firewall
|
||||||
|
configurations. This approach creates a flat, software-defined
|
||||||
|
network that spans multiple physical locations while maintaining
|
||||||
|
enterprise-grade security through end-to-end encryption.},
|
||||||
|
author = {Mehrab, Abu},
|
||||||
|
date = {2025-04-11},
|
||||||
|
file = {Full Text
|
||||||
|
PDF:/home/lhebendanz/Zotero/storage/8T5JMBVF/Mehrab - 2025 - A New
|
||||||
|
Approach to Peer-to-Peer VPN Connectivity Achieving Seamless
|
||||||
|
Communication Without Firewalls.pdf:application/pdf},
|
||||||
|
}
|
||||||
|
|
||||||
|
@inproceedings{lackorzynski_comparative_2019,
|
||||||
|
title = {A Comparative Study on Virtual Private Networks for Future
|
||||||
|
Industrial Communication Systems},
|
||||||
|
url = {https://ieeexplore.ieee.org/document/8758010},
|
||||||
|
doi = {10.1109/WFCS.2019.8758010},
|
||||||
|
abstract = {The future industrial networks will not be created from
|
||||||
|
scratch. Rather, they will grow from existing installations without
|
||||||
|
displacing legacy components. The secure integration of these
|
||||||
|
legacy machines and networks will become an important building
|
||||||
|
block in order to realize the vision of Industry 4.0. Secure and
|
||||||
|
high performance virtual private networks ({VPNs}) will be
|
||||||
|
necessary for that purpose.Therefore, we investigated and compared
|
||||||
|
various {VPN} solutions. Their performance was tested on multiple
|
||||||
|
hardware platforms ranging from very resource constrained to very
|
||||||
|
powerful. Non-functional aspects, relating around security,
|
||||||
|
manageability and ease of use, were discussed in order to assess
|
||||||
|
their suitability for future use cases.We arrive at clear
|
||||||
|
recommendations on which software {VPN} solutions to choose for
|
||||||
|
future industrial setups.},
|
||||||
|
eventtitle = {2019 15th {IEEE} International Workshop on Factory
|
||||||
|
Communication Systems ({WFCS})},
|
||||||
|
pages = {1--8},
|
||||||
|
booktitle = {2019 15th {IEEE} International Workshop on Factory
|
||||||
|
Communication Systems ({WFCS})},
|
||||||
|
author = {Lackorzynski, Tim and Köpsell, Stefan and Strufe, Thorsten},
|
||||||
|
urldate = {2026-02-11},
|
||||||
|
date = {2019-05},
|
||||||
|
keywords = {Encryption, Hardware, industrial {IoT}, industrial
|
||||||
|
networks, Industry, Logic gates, network security, Production
|
||||||
|
facilities, secure transport, Software, tunneling, Virtual private
|
||||||
|
networks, {VPN}},
|
||||||
|
file = {PDF:/home/lhebendanz/Zotero/storage/DWSF7ERP/Lackorzynski
|
||||||
|
et al. - 2019 - A Comparative Study on Virtual Private Networks for
|
||||||
|
Future Industrial Communication
|
||||||
|
Systems.pdf:application/pdf;Snapshot:/home/lhebendanz/Zotero/storage/PXWNAC6D/8758010.html:text/html},
|
||||||
|
}
|
||||||
|
|
||||||
|
@online{noauthor_nat_2026,
|
||||||
|
title = {{NAT} Traversal: How It Works},
|
||||||
|
url = {https://dev.to/alakkadshaw/nat-traversal-how-it-works-4dnc},
|
||||||
|
shorttitle = {{NAT} Traversal},
|
||||||
|
abstract = {{NAT} traversal is the set of techniques that solves
|
||||||
|
this problem: discovering public addresses,...},
|
||||||
|
titleaddon = {{DEV} Community},
|
||||||
|
urldate = {2026-02-11},
|
||||||
|
date = {2026-01-30},
|
||||||
|
langid = {english},
|
||||||
|
file =
|
||||||
|
{Snapshot:/home/lhebendanz/Zotero/storage/UHJQ84AV/nat-traversal-how-it-works-4dnc.html:text/html},
|
||||||
|
}
|
||||||
|
|
||||||
|
@software{krause_krausestjs-framework-benchmark_2026,
|
||||||
|
title = {krausest/js-framework-benchmark},
|
||||||
|
rights = {Apache-2.0},
|
||||||
|
url = {https://github.com/krausest/js-framework-benchmark},
|
||||||
|
abstract = {A comparison of the performance of a few popular
|
||||||
|
javascript frameworks},
|
||||||
|
author = {Krause, Stefan},
|
||||||
|
urldate = {2026-02-11},
|
||||||
|
date = {2026-02-11},
|
||||||
|
note = {original-date: 2015-12-09T20:10:53Z},
|
||||||
|
}
|
||||||
|
|||||||
Reference in New Issue
Block a user