Roger Dingledine commited on 2010-09-21 06:05:46
Zeige 1 geänderte Dateien mit 13 Einfügungen und 0 Löschungen.
| ... | ... |
@@ -134,6 +134,19 @@ etc. Here are some example projects:</p> |
| 134 | 134 |
|
| 135 | 135 |
<ul> |
| 136 | 136 |
|
| 137 |
+<li>If we prevent the really loud users from using too much of the Tor |
|
| 138 |
+network, how much can it help? We've instrumented Tor's entry relays |
|
| 139 |
+so they can rate-limit connections from users, and we've instrumented |
|
| 140 |
+the directory authorities so they can change the rate-limiting |
|
| 141 |
+parameters globally across the network. Which parameter values improve |
|
| 142 |
+performance for the Tor network as a whole? How should relays adapt |
|
| 143 |
+their rate-limiting parameters based on their capacity and based on |
|
| 144 |
+the network load they see, and what rate-limiting algorithms will work |
|
| 145 |
+best? See the <a |
|
| 146 |
+href="https://blog.torproject.org/blog/research-problem-adaptive-throttling-tor-clients-entry-guards">blog |
|
| 147 |
+post</a> for details. |
|
| 148 |
+</li> |
|
| 149 |
+ |
|
| 137 | 150 |
<li>Right now Tor clients are willing to reuse a given circuit for ten |
| 138 | 151 |
minutes after it's first used. The goal is to avoid loading down the |
| 139 | 152 |
network with too many circuit creations, yet to also avoid having |
| 140 | 153 |