diff options
author | Roger Dingledine <arma@torproject.org> | 2004-02-01 03:09:32 +0000 |
---|---|---|
committer | Roger Dingledine <arma@torproject.org> | 2004-02-01 03:09:32 +0000 |
commit | 43efb87bbc8dca14cb6f5ecb2efada8573451cb0 (patch) | |
tree | bc161f1b18076b891bceeddfafe5357a6da25b48 /doc | |
parent | 9cf13103dc9c59b803d7a986b7aa5278390f375e (diff) | |
download | tor-43efb87bbc8dca14cb6f5ecb2efada8573451cb0.tar.gz tor-43efb87bbc8dca14cb6f5ecb2efada8573451cb0.zip |
stretch the figure a bit more
svn:r1047
Diffstat (limited to 'doc')
-rw-r--r-- | doc/tor-design.tex | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/doc/tor-design.tex b/doc/tor-design.tex index e25e980ac8..34bac4e930 100644 --- a/doc/tor-design.tex +++ b/doc/tor-design.tex @@ -647,7 +647,7 @@ without delaying streams and thereby harming user experience.\\ \begin{figure}[h] \centering -\mbox{\epsfig{figure=interaction,width=8cm}} +\mbox{\epsfig{figure=interaction,width=8.75cm}} \caption{Alice builds a two-hop circuit and begins fetching a web page.} \label{fig:interaction} \end{figure} @@ -896,8 +896,8 @@ receive a bad hash. \SubSection{Rate limiting and fairness} \label{subsec:rate-limit} -Volunteers are generally more willing to run services that can limit -their own bandwidth usage. To accommodate them, Tor servers use a +Volunteers are more willing to run services that can limit +their bandwidth usage. To accommodate them, Tor servers use a token bucket approach~\cite{tannenbaum96} to enforce a long-term average rate of incoming bytes, while still permitting short-term bursts above the allowed bandwidth. @@ -1801,7 +1801,7 @@ our overall usability. We thank Peter Palfrader, Geoff Goodell, Adam Shostack, Joseph Sokol-Margolis, John Bashinski, and Zack Brown for editing and comments; - Matej Pfajfar, Andrei Serjantov, Marc Rennhard: for design discussions. + Matej Pfajfar, Andrei Serjantov, Marc Rennhard for design discussions; Bram Cohen for congestion control discussions; Adam Back for suggesting telescoping circuits; and Cathy Meadows for formal analysis of the \emph{extend} protocol. |