From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from Chamillionaire.breakpoint.cc (Chamillionaire.breakpoint.cc [IPv6:2001:4d88:1ffa:82:880:aa0:9009:64ae]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (Client did not present a certificate) by huchra.bufferbloat.net (Postfix) with ESMTPS id EC0E721F1FB for ; Fri, 18 Jan 2013 15:16:14 -0800 (PST) Received: from pfeifer by Chamillionaire.breakpoint.cc with local (Exim 4.72) (envelope-from ) id 1TwLAO-0007iu-Kj; Sat, 19 Jan 2013 00:16:08 +0100 Date: Sat, 19 Jan 2013 00:16:08 +0100 From: Hagen Paul Pfeifer To: Simon Leinen Message-ID: <20130118231607.GB3419@nuttenaction> References: <20130109033920.C47B95B2B40@lawyers.icir.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Key-Id: 98350C22 X-Key-Fingerprint: 490F 557B 6C48 6D7E 5706 2EA2 4A22 8D45 9835 0C22 X-GPG-Key: gpg --recv-keys --keyserver wwwkeys.eu.pgp.net 98350C22 User-Agent: Mutt/1.5.21 (2010-09-15) Cc: Shawn Ostermann , Toke =?iso-8859-1?Q?H=F8iland-J=F8rgensen?= , bloat@lists.bufferbloat.net Subject: Re: [Bloat] Passive RTT measurements [was: Re: Bufferbloat Paper] X-BeenThere: bloat@lists.bufferbloat.net X-Mailman-Version: 2.1.13 Precedence: list List-Id: General list for discussing Bufferbloat List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 18 Jan 2013 23:16:15 -0000 * Simon Leinen | 2013-01-17 15:03:55 [+0100]: >I have found that with "tcptrace -Z -lrn", I can extract lots of RTT >samples and also some per-connection statistics (which are useful but >not as detailed as I'd like to or as in your paper). This even works in >finite time, like a couple minutes per 100Mpacket trace of mostly HTTP >traffic taken near a popular archive server. As a bonus, it supports IPv6. Hey Simon, some years ago I started to develop a clean and easy expendable python application similar to tcptrace, called captcp: http://research.protocollabs.com/captcp/ Probably you should take a look at the source code, here the throughput module: https://github.com/hgn/captcp/blob/master/captcp.py#L2239 Simple python code, TCP streams are already splitted, the packet is also already parsed (all IP/TCP values) - you simple have to build your logic around and hook into pre_process_packet() or process_packet(). Cheers, Hagen