Roger Dingledine commited on 2010-09-21 06:05:46
Zeige 1 geänderte Dateien mit 13 Einfügungen und 0 Löschungen.
... | ... |
@@ -134,6 +134,19 @@ etc. Here are some example projects:</p> |
134 | 134 |
|
135 | 135 |
<ul> |
136 | 136 |
|
137 |
+<li>If we prevent the really loud users from using too much of the Tor |
|
138 |
+network, how much can it help? We've instrumented Tor's entry relays |
|
139 |
+so they can rate-limit connections from users, and we've instrumented |
|
140 |
+the directory authorities so they can change the rate-limiting |
|
141 |
+parameters globally across the network. Which parameter values improve |
|
142 |
+performance for the Tor network as a whole? How should relays adapt |
|
143 |
+their rate-limiting parameters based on their capacity and based on |
|
144 |
+the network load they see, and what rate-limiting algorithms will work |
|
145 |
+best? See the <a |
|
146 |
+href="https://blog.torproject.org/blog/research-problem-adaptive-throttling-tor-clients-entry-guards">blog |
|
147 |
+post</a> for details. |
|
148 |
+</li> |
|
149 |
+ |
|
137 | 150 |
<li>Right now Tor clients are willing to reuse a given circuit for ten |
138 | 151 |
minutes after it's first used. The goal is to avoid loading down the |
139 | 152 |
network with too many circuit creations, yet to also avoid having |
140 | 153 |