Skip to content
This repository

HTTPS clone URL

Subversion checkout URL

You can clone with HTTPS or Subversion.

Download ZIP
Browse code

cleaning up.

  • Loading branch information...
commit 719c088449ccd6242a33c8938785afbaa71c75a7 1 parent 1dbb8c3
Jacques Uber authored
5 Notes.mkd
Source Rendered
... ... @@ -0,0 +1,5 @@
  1 +Comprise:
  2 +These parts comprise the stapler.
  3 +
  4 +Composed of:
  5 +The stapler is composed of these parts.
53 Proposal/Draft2/sample.tex
... ... @@ -1,9 +1,9 @@
1   -\documentclass[letterpaper,12pt]{texMemo}
  1 +\documentclass[letterpaper,13pt]{texMemo}
2 2 \usepackage[american]{babel}
3 3 \usepackage{natbib}
4 4 \usepackage{setspace}
5 5
6   -\memoto{Roby Conner, Writing 327 InstrucTor}
  6 +\memoto{Roby Conner, Writing 327 Instructor}
7 7 \memofrom{Jacques Uber, Oregon State University Student}
8 8 \memodate{Feb 12, 2012}
9 9 \memosubject{Proposal to investigate imporovements to Tor}
@@ -17,11 +17,12 @@
17 17 \maketitle
18 18 %\section*{Introduction}
19 19
20   -It is my goal to investigate how engineers are working to improve latency and congestion issues in Tor.
  20 +It is my goal to investigate how engineers are working to improve latency and congestion issues in
  21 +Tor.
21 22
22 23 The literature review will include all scholarly articles on Tor found via the Academic Search
23   -Premier database using the keywords Tor, Improvements, Congestion, Fair, Timing Attacks,
24   -Anonymity and published between the years 2009 and 2012.
  24 +Premier, IEEE, and ACM databases using the keywords Tor, Improvements, Congestion, Fair, Timing
  25 +Attacks, Anonymity and published between the years 2009 and 2012.
25 26
26 27 \subsubsection*{Organization}
27 28 There will be three section in the document. The first section will introduce core concepts used to
@@ -31,36 +32,35 @@ \subsubsection*{Organization}
31 32 \section*{Background}
32 33
33 34 \subsection*{What is Tor?}
34   - Tor is an overlay network that enables users to use the Internet anonymously. Tor was originally
35   - developed by the Navy and is used by militaries, journalist, law enforcement, activists, and the
36   - average internet user \citep[2]{Tor:web}. To ensure a user's privacy and anonymity Tor uses multiple
37   - layers of encryption while routing cells of data and is sometimes referred to as the "Onion
38   - Router". By building circuits between multiple nodes, a user routes her traffic through the
39   - network. Tor is an overlay network. This means that packets are routed and scheduled. While the
40   - majority of networks are packet switched, Tor is built on a circuit switching scheme.
  35 + Tor is enables users to use the Internet anonymously. Tor was originally developed by the Navy
  36 + and is used by militaries, journalist, law enforcement, activists, and the average internet user
  37 + \citep[2]{Tor:web}. To ensure a user's privacy and anonymity Tor uses multiple layers of
  38 + encryption while routing cells of data. By building circuits between multiple nodes, a user
  39 + routes her traffic through the network. Tor is an overlay network. This means that packets are
  40 + routed and scheduled. While the Internet is packet switched, Tor is built on a circuit switching
  41 + scheme.
41 42
42 43 \subsection*{Why is Tor important?}
43   - Tor has many legitimate uses. ONI, the OpenNet Initiative, reported that "the Middle East and
44   - North Africa is one of the most heavily censored regions in the world". It also claimed that it
45   - "conducted tests for technical Internet filtering in all of the countries in the Middle East and
46   - North Africa between 2008 and 2009. Test results prove that the governments and Internet service
47   - providers (ISPs) censor content deemed politically sensitive; critical of governments, leaders
48   - or ruling families; morally offensive; or in violation of public ethics and order."
49   - (\citeauthor[6]{ONI}) Tor can bypass these filters ensuring a freedom of speech and freedom of
50   - expression on the Internet.
  44 + ONI, the OpenNet Initiative, reported that "the Middle East and North Africa is one of the most
  45 + heavily censored regions in the world". It also claimed that it "conducted tests for technical
  46 + Internet filtering in all of the countries in the Middle East and North Africa between 2008 and
  47 + 2009. Test results prove that the governments and Internet service providers (ISPs) censor
  48 + content deemed politically sensitive; critical of governments, leaders or ruling families;
  49 + morally offensive; or in violation of public ethics and order" (\citeauthor[6]{ONI}). Tor can
  50 + bypass these filters ensuring freedom of speech and expression on the Internet.
  51 +
  52 +\section*{Research Plan}
  53 +
51 54
52 55 \subsection*{Congestion and Delay}
53 56 As of 2010 users on the Tor network have experienced network delay. \citeauthor[]{delay} ask the
54   - questions: why is there delay in the network, and where is the delay taking place? The Tor
55   - routers, as opposed to the proxies or the target service, seemed to be the cause. "Router delays
  57 + questions: why is there delay in the network, and where is the delay taking place? "Router delays
56 58 are the principal contributors to delays in Tor. Some routers frequently introduce delays as
57 59 high as a few seconds" (\citeauthor[3]{delay}). They used log files from network nodes that they
58 60 controlled to measure "Total Delay" while making sure that delay caused by the target service was not
59 61 included in the timing data.
60 62
61   -
62   -\section*{Research Plan}
63   -
  63 + \subsection*{Causes}
64 64 Different protocols can cause congestion more than others. This is the focus of
65 65 \citeauthor{analysis}. There is concern that bulk transfer protocols, like FTP (File Transfer
66 66 Protocol) and P2P (Peer to Peer) protocols, are causing latency sensitive protocols, like ssh
@@ -72,11 +72,12 @@ \section*{Research Plan}
72 72 to latency sensitive protocols. This is not possible on the Tor network. The encryption that
73 73 gives anonymity also stops the use of QoS (Quality of Service) mechanisms.
74 74
  75 + \subsection*{Scheduler}
75 76 Reworking how Tor schedules traffic is a possible solution to Congestion. When deciding when to
76 77 forward a cell, a Tor Onion Router treats all data equally. Also, a Router will forward data for
77 78 multiple circuits and it uses a Round Robin algorithm to determine which circuit it will
78 79 service. This means that a circuit with data that tends to come in bursts will have the same
79   - priority as a circuit that contains a relatively continuous flow of data through it. This is not
  80 + priority as a circuit that contains a relatively continuous flow of data. This is not
80 81 optimal because data that comes in bursts is usually sensitive to latency and should take
81 82 priority over traffic that appears continuous (\citeauthor[2]{unfair}). There have been
82 83 multiple scheduling schemes proposed to replace the Round Robin scheduler. A large part my literature
71 Proposal/Informal_Report.tex
... ... @@ -1,71 +0,0 @@
1   -\documentclass[letterpaper,11pt]{texMemo}
2   -
3   -\usepackage{graphicx}
4   -
5   -%\memotitle{Memorandum}
6   -\memoto{Roby Conner, Writing 327 Instructor}
7   -\memofrom{Jacques Uber, Oregon State University Student}
8   -\memodate{Feb 12, 2012}
9   -\memosubject{Proposal to investigate imporovements to Tor}
10   -\memologo{Memorandum}
11   -
12   -\begin{document}
13   -\maketitle
14   -
15   -\section{Introduction}
16   -
17   -I will investigate how engineers are working to improve Tor. Specifically, I will focus on the
18   -improvements to latency and congestion, and the methods used to improve user anonymity.
19   -
20   -Scope – Use the following statement and fill in the blanks with your
21   -information
22   -
23   - The literature review will include all scholarly articles on Tor found via the Academic Search
24   - Premier database using the keywords Tor, Improvements, Congestion, Fair, Timing Attacks,
25   - Anonymity and published between the years 2009 and 2012.
26   -
27   - There will be three section in the document. The first section will introduce core concepts used
28   - to implement Tor. The second will investigate techniques used to compromise user
29   - anonymity. The third will investigate network latency and congestion.
30   -
31   -\section{Background}
32   -
33   - o The bulk of your research will go here to explain the context, significance,
34   - and source of the problem you intend to research. You must cite all
35   - information taken from your research.
36   -
37   -
38   - o Discuss history of the problem/topic
39   -
40   - o Demonstrate the need for the research
41   - Research Plan
42   -
43   - o The literature review will address the following research questions. Restate
44   - them to reflect your specific topic.
45   -
46   -  What trends in research methods or results can be identified in the
47   - literature?
48   -
49   -  Are there identifiable controversies within the literature?
50   -
51   -  Are there identifiable weaknesses in the methods or conclusions in the
52   - literature?
53   -
54   -  What areas/topics for future research are recommended in the
55   - literature?
56   -
57   - o Minimum of six (6) sources (peer-reviewed articles from academic, trade, or
58   - scientific journals)
59   -
60   -  Include a brief description of each article (Title, author, topic)
61   -
62   -  1-2 sentences should describe why the article is included
63   -
64   -\section{Research Plan}
65   -Conclusion
66   - o Summary of Key Points
67   -
68   - o Request for Action/Approval
69   - Works Cited Page (MLA formatted)
70   -
71   -\end{document}

0 comments on commit 719c088

Please sign in to comment.
Something went wrong with that request. Please try again.