Visual Logging and Interpretation of Buffer Sizing Experiments
Purvi Goel and Sarah Jobalia Twenty years ago, Appenzeller et al. challenged the “rule of thumb” for buffer sizing, B = RTT x C. The old rule of thumb had […]
Purvi Goel and Sarah Jobalia Twenty years ago, Appenzeller et al. challenged the “rule of thumb” for buffer sizing, B = RTT x C. The old rule of thumb had […]
This report documents our attempt to reproduce the results of the “Restructuring endpoint congestion control” paper. While we were able to successfully reproduce the findings from the paper, we encountered […]
This report documents the reproduction of Methodically Modeling the Tor Network for CS 244. While the techniques for generating Tor network models have evolved since 2012, the model presented in […]
In this paper, we reproduce the main findings of Scafida: A Scale-Free Network Inspired Data Center Architecture. The paper proposes and evaluates Scafida, a datacenter topology that breaks the symmetry […]
Privacy over the internet is a critical issue worldwide, as more and more of the world executes business and personal transactions over the internet. Tor is a network layer that […]
Bandwidth availability, device count increases and new applications such as machine learning have resulted in a steady growth of cloud computing needs, that data centers are required to answer. Among […]
We examine the ways in which congestion control schemes vary across different real network scenarios, and quantify the complexity of variations. Using measurement data from the Pantheon of Congestion Control, […]
Reproducing and Performance Testing Kademlia Distributed hash tables (DHTs) have become a widely used construct of many distributed systems, offering optimal addition/removal of nodes with minimal work and the ability […]