From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-wy0-f171.google.com (mail-wy0-f171.google.com [74.125.82.171]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority" (verified OK)) by huchra.bufferbloat.net (Postfix) with ESMTPS id 6555B200A92 for ; Wed, 8 Jun 2011 08:24:41 -0700 (PDT) Received: by wyb32 with SMTP id 32so656727wyb.16 for ; Wed, 08 Jun 2011 08:45:10 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:subject:from:to:cc:in-reply-to:references :content-type:date:message-id:mime-version:x-mailer :content-transfer-encoding; bh=JQECwvaL8Xx8s9kPYaBphMLGb+w/9MMlvG2hTGzXVzY=; b=Zy3lE+7TKNXML70QyuNMd6T6ggIlZz8Ll9T5SqhP2Rxni9I0pG0itt3GxMCt2uNRQv CHsz5CLgyYAGbGmxwfe79Xn0wyNB3Vvv42Z9hQB/HyWABjsV6L4v7BHbgGi0FatN04y0 GE0vIJGKAWlPyr+M8lp3FAnmFIAIAi3muLCTI= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=subject:from:to:cc:in-reply-to:references:content-type:date :message-id:mime-version:x-mailer:content-transfer-encoding; b=tat8ifZ0sUkLMyyq1W6e19Tesr1EKiYJbLo0Mlpc0phkqFIX6ESolTu+zI9ezX6t06 OZNg9ZIY3QGsdpidfK/jHpc8GIMRD1lStOcRiViCxINMFHpiDmElXQKjLihSGEE+H+7O qGdCYqPXlq4499K5AL75zkoMQSWsPfvo6wp60= Received: by 10.227.152.132 with SMTP id g4mr7598627wbw.24.1307547910827; Wed, 08 Jun 2011 08:45:10 -0700 (PDT) Received: from [10.150.51.210] (gw0.net.jmsp.net [212.23.165.14]) by mx.google.com with ESMTPS id en1sm511505wbb.18.2011.06.08.08.45.09 (version=SSLv3 cipher=OTHER); Wed, 08 Jun 2011 08:45:09 -0700 (PDT) From: Eric Dumazet To: jdb@comx.dk In-Reply-To: <1307546871.20906.223.camel@probook> References: <1307537773.3057.17.camel@edumazet-laptop> <1307545032.3057.45.camel@edumazet-laptop> <1307546871.20906.223.camel@probook> Content-Type: text/plain; charset="UTF-8" Date: Wed, 08 Jun 2011 17:45:08 +0200 Message-ID: <1307547908.3057.53.camel@edumazet-laptop> Mime-Version: 1.0 X-Mailer: Evolution 2.32.2 Content-Transfer-Encoding: 8bit Cc: Thomas Graf , bloat Subject: Re: [Bloat] Notes about hacking on AQMs X-BeenThere: bloat@lists.bufferbloat.net X-Mailman-Version: 2.1.13 Precedence: list List-Id: General list for discussing Bufferbloat List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 08 Jun 2011 15:24:41 -0000 Le mercredi 08 juin 2011 à 11:27 -0400, Jesper Dangaard Brouer a écrit : > While this is a good coding approach, the end result is that nobody is > using this stuff, because "tc" is so difficult to use, and its error > feedback is so lousy that you will never figure out your small syntax > errors. > Well, I agree its really hard to even use 10% of tc features, but isnt human brain has the same problem ? ;) Most people playing with AQM setups are using scripts, or even script generators for complex/dynamic cases.