“…The Tor experimentation tools and models described above have assisted researchers in exploring how changes to Tor's path selection [5,7,13,24,28,41,46,52,58,60,61,73,75], load balancing [22,27,31,34,40,53], traffic admission control [2,16,21,23,33,35,37,42,47,74], congestion control [4,20], and denial of service mechanisms [12,26,36,39,59] affect Tor performance and security [3]. The standard practice that has emerged from this work is to sample a single scaled-down Tor network model and use it to run experiments with standard Tor and each of a set of chosen configurations of the proposed performance-enhancing mechanism.…”