From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail2.tohojo.dk (mail2.tohojo.dk [77.235.48.147]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by huchra.bufferbloat.net (Postfix) with ESMTPS id 4611F200111 for ; Mon, 27 Apr 2015 07:22:41 -0700 (PDT) X-Virus-Scanned: amavisd-new at mail2.tohojo.dk Received: by alrua-kau.kau.toke.dk (Postfix, from userid 1000) id 68AC0C4016E; Mon, 27 Apr 2015 16:22:25 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=toke.dk; s=201310; t=1430144546; bh=hwqLxHtueRx/MeYAKGO2vZ/wHME8/qx4dmHgxXUM5OM=; h=From:To:Cc:Subject:References:Date:In-Reply-To; b=fpp0egfP6oYDIdlYT9m/vrc4NWiHYwgj+DqjpoL4n8n5CWMMo3Y5yBUhR4tSOTac1 O3Up2SjZFkP7muO5/s3fPf+g6HouQbzwz00xgTSFxe3HAtsSjk5gputOvZlQ3L//K9 tKFfJLyoIz5525iBw5xGaAI7CIXiqXGd5/WTcHk0= From: =?utf-8?Q?Toke_H=C3=B8iland-J=C3=B8rgensen?= To: Neil Davies References: <72DB0260-F0DF-426F-A3F3-ECF5D8AF228F@pnsol.com> <877fsx3l5a.fsf@toke.dk> Date: Mon, 27 Apr 2015 16:22:25 +0200 In-Reply-To: (Neil Davies's message of "Mon, 27 Apr 2015 11:57:53 +0100") X-Clacks-Overhead: GNU Terry Pratchett Message-ID: <87d22p1wim.fsf@toke.dk> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Cc: bloat Subject: Re: [Bloat] Detecting bufferbloat from outside a node X-BeenThere: bloat@lists.bufferbloat.net X-Mailman-Version: 2.1.13 Precedence: list List-Id: General list for discussing Bufferbloat List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 27 Apr 2015 14:23:35 -0000 X-List-Received-Date: Mon, 27 Apr 2015 14:23:35 -0000 Neil Davies writes: > You'll find the way that =E2=88=86Q can be decomposed into basis set of = =E2=88=86Q|G, > =E2=88=86Q|S and =E2=88=86Q|V - helps work out which parts of the budget = get eaten up > by different elements of the network design/architecture. Right, I got that part. What I'm missing is how you define the actual measure for =E2=88=86Q -- but that is application dependent? E.g. for web s= ites it might be load time, for VoIP it might be MOS score? -Toke