From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail.toke.dk (mail.toke.dk [52.28.52.200]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by lists.bufferbloat.net (Postfix) with ESMTPS id A37473CB3A for ; Tue, 23 Jan 2018 06:30:13 -0500 (EST) From: Toke =?utf-8?Q?H=C3=B8iland-J=C3=B8rgensen?= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=toke.dk; s=20161023; t=1516707007; bh=tMjZdxNySfUsEcGZyguHwwc5RaAOSijvEBmO8OH3a2c=; h=From:To:Subject:In-Reply-To:References:Date:From; b=QLRxSbjYwQqzZJxGgkoADITsTp6g3Nz2Jd3GQX6hBeGR+MYuN+TqsNgfTCJpHmIC0 2w5yzyZsjA72r5Ym4/8p8PllxEpxDJXoGQcPbl+oYMcepqNF7i1ckc++uKr71lfxVR uwnTvUA6ziYQk4xCxnuoKcKWziYeqmJqHNF04rvrVkn0785QgGVyGbNIrTFqoZmi7a 0w8/3LmNRLBpqe1u+9GDWTbSGhBsbZeauoX4nNHltxdtzycUtLrw+sFLcektFPYyb7 THNt25vvvKa/ZFhrI9ryqp13uATY+yL/jT5qPmdnci12Nd/6nsNU7BR/GZCWvdru5F AV2yO7JwSqrRw== To: Siavash Eghlimi , bloat-devel@lists.bufferbloat.net Subject: Re: Help me get started (II) In-Reply-To: References: Date: Tue, 23 Jan 2018 12:30:06 +0100 X-Clacks-Overhead: GNU Terry Pratchett Message-ID: <87tvvc7qyp.fsf@toke.dk> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable X-BeenThere: bloat-devel@lists.bufferbloat.net X-Mailman-Version: 2.1.20 Precedence: list List-Id: "Developers working on AQM, device drivers, and networking stacks" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 23 Jan 2018 11:30:13 -0000 Siavash Eghlimi writes: > Dear contributors, > > Hi. I already did a post, and got A LOT of help from a > Mr.H=C3=B8iland-J=C3=B8rgensen, if I'm not wrong. first I wanted to thank= all of you; > and HIM, in particular. You're welcome ;) > Second, it was suggested to me to so some measurements AND to choose a > more specific area (Aspect) of bufferbloat. Well, I did some > measurements and some research just to get an idea of how it works... > Can't say I completely get it yet, but I'm getting there :) > > also, I chose a more detailed aspect of bufferbloat; "Low-layer > network protocols' design and their impact on buffering (ex: WiFi > networks can't do aggregation without some buffering)" > > Since I wanna do a Thesis on it, and use Linux as a tool to understand > networking and do programming, I found resources on Linux and its > network stack. > > What I need now is specific resources on the ASPECT of bufferbloat > that I chose. where should I go? what should I read? how to get into > it? I don't wanna dive into it blindly. I want to do this RIGHT. and > because of the Thesis, time is of the essence. also, I really wanna do > something to help the community, HOPEFULLY. Well, first question would be: What did you measure, and what did that show? Was there something there you thought was interesting that you want to explore further? And what did you read already? :) -Toke