Affiliation:
1. Humboldt University of Berlin, Germany
Abstract
Internet anonymity systems, like for instance Tor, are in widespread use today. Technically they are realized as overlays, i. e., they add another instance of routing, forwarding, and transport functionality on top of the Internet protocol stack. This has important (and often subtle) implications, as overlay and underlay may interact. Far too often, existing designs neglect this. Consequently, they suffer from performance issues that are hard to track down and fix. The existing body of work in this area often takes a quite narrow view, tweaking the design in order to improve one specific aspect. The behavior of the interacting underlay and overlay transport layers is complex, though, and often causes unexpected-and unexplored-side effects. Therefore, we show that so far considered combinations of overlay and underlay protocols cannot deliver good throughput, latency, and fairness at the same time, and we establish guidelines for a future, better suited transport layer design.
Publisher
Association for Computing Machinery (ACM)
Subject
Computer Networks and Communications,Hardware and Architecture,Software
Reference24 articles.
1. LASTor: A Low-Latency AS-Aware Tor Client
2. B. Cohen. BEP 3: The Bittorrent Protocol Specification Jan. 2008. http://bittorrent.org/beps/bep_0003.html. B. Cohen. BEP 3: The Bittorrent Protocol Specification Jan. 2008. http://bittorrent.org/beps/bep_0003.html.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献