From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from homiemail-a95.g.dreamhost.com (sub4.mail.dreamhost.com [69.163.253.135]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by lists.bufferbloat.net (Postfix) with ESMTPS id 7C2243B25E for ; Thu, 4 Aug 2016 11:29:18 -0400 (EDT) Received: from homiemail-a95.g.dreamhost.com (localhost [127.0.0.1]) by homiemail-a95.g.dreamhost.com (Postfix) with ESMTP id 70EBA1E9E7; Thu, 4 Aug 2016 08:29:17 -0700 (PDT) Received: from kmnimac.local (unknown [50.136.231.153]) (using TLSv1 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) (Authenticated sender: nichols@pollere.net) by homiemail-a95.g.dreamhost.com (Postfix) with ESMTPSA id 4CBA31E9E6; Thu, 4 Aug 2016 08:29:17 -0700 (PDT) To: bloat@lists.bufferbloat.net References: <84e6b7ab-b7e6-10c0-084a-bd5cb5d4b03f@taht.net> <595be984-efaa-8cbf-3376-1f29150e200d@pollere.com> <57A28F9D.8060506@swin.edu.au> Cc: aqm@ietf.org From: Kathleen Nichols Message-ID: <26a25e02-80fc-6555-10cb-5d9eadd54e5d@pollere.com> Date: Thu, 4 Aug 2016 08:29:16 -0700 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:45.0) Gecko/20100101 Thunderbird/45.2.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Subject: Re: [Bloat] [aqm] pie, codel, fq_pie, fq_codel tech report X-BeenThere: bloat@lists.bufferbloat.net X-Mailman-Version: 2.1.20 Precedence: list List-Id: General list for discussing Bufferbloat List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 04 Aug 2016 15:29:18 -0000 David, It is not necessarily "either-or". Tracking the forward progress of data sees lets you evaluate the effectiveness of the protocol, aqm, scheduling, and any other elements of the network. That doesn't mean other metrics can't be tracked. Kathie On 8/3/16 7:13 PM, David Lang wrote: > On Thu, 4 Aug 2016, grenville armitage wrote: >=20 >> Kathy, Dave, >> >> Thanks for the +ve comments! >> >> On 08/04/2016 03:03, Kathleen Nichols wrote: >>> Nicely laid out and reported, but I have a question for the authors. >>> At the >>> top of section II. D. it says: >>> "Instantaneous=E2=80=99 throughput is an approximation derived >>> from the actual bytes transferred during constant windows >>> of time." >>> >>> Is the "actual bytes transferred" the sum of the packet sizes through >>> the link or is it the actual advance in sequence number bytes? >> >> Simplistic sum of the IP payload lengths per unit time as seen at the >> destination's NIC. (We took the line of least resistance for this >> tech report. But yes, the advance of sequence num. per unit time would >> be a more precise estimate of the useful flow of bytes as experienced >> by the application.) >=20 > I would argue that bytes seen by the wire (or any router in the middle) > is a far more useful thing to track than what the application sees. >=20 > If one application is layered inside 5 different VPNs or other > encapsulation, while another is native on the wire, we care about the > fairness of how the wire is used. >=20 > If we have something like ATM where transmissions are in quantums, we > need to take this into account. >=20 > If we have something like wifi where a transmit slot is X overhead + > Y*bytes (where 2-3K * Y =3D X or worse), if you don't take the overhead > into account and just look at the application level data bytes passed > you end up with such a distorted picture of what's going on that it's > almost useless. >=20 > David Lang >=20 >=20 > _______________________________________________ > Bloat mailing list > Bloat@lists.bufferbloat.net > https://lists.bufferbloat.net/listinfo/bloat >=20