CS 244 ’20: Methodically Modeling Tor
This report documents the reproduction of Methodically Modeling the Tor Network for CS 244. While the techniques for generating Tor network models have evolved since 2012, the model presented in […]
CS 244 ’20: Reproducing Scafida: A Scale-free Network Inspired Datacenter Topology
In this paper, we reproduce the main findings of Scafida: A Scale-Free Network Inspired Data Center Architecture. The paper proposes and evaluates Scafida, a datacenter topology that breaks the symmetry […]
CS 244 ’20: Reproducing “Large Scale Simulation of Tor” in Shadow
Privacy over the internet is a critical issue worldwide, as more and more of the world executes business and personal transactions over the internet. Tor is a network layer that […]
CS 244 ’20: Reproducing Sparrow
Bandwidth availability, device count increases and new applications such as machine learning have resulted in a steady growth of cloud computing needs, that data centers are required to answer. Among […]
CS 244 ’20: Quantifying the Variation in Congestion Control Performance on Pantheon Paths and Emulators
We examine the ways in which congestion control schemes vary across different real network scenarios, and quantify the complexity of variations. Using measurement data from the Pantheon of Congestion Control, […]
CS 244 ’20: Reproducing and Performance Testing Kademlia
Reproducing and Performance Testing Kademlia Distributed hash tables (DHTs) have become a widely used construct of many distributed systems, offering optimal addition/removal of nodes with minimal work and the ability […]
CS 244 ’20: Reproducing Fat-Tree
CS 244 ’20: Reproducing “Multi-Resource Fair queuing for Packet Processing”
Middleboxes are prevalent in today’s network, providing functions such as VPN, WAN optimization, and firewall. Different middleboxes require different hardware and software resources for their specialized functions. For example, IPSec […]
CS 244 ’20: An Internet Wide View of Internet Wide Scanning Reproduction
Our project reproduces the work contributed in the paper An Internet-Wide View of Internet-Wide Scanning [2]. In this paper, the authors took a look at a large amount of network […]