From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail.toke.dk (mail.toke.dk [IPv6:2a0c:4d80:42:2001::664]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by lists.bufferbloat.net (Postfix) with ESMTPS id 182E73B29D for ; Sat, 27 Feb 2021 11:49:42 -0500 (EST) From: Toke =?utf-8?Q?H=C3=B8iland-J=C3=B8rgensen?= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=toke.dk; s=20161023; t=1614444581; bh=W6aKniL3T2a0NUB1dloYBXWELBiJY5k+G79Yt3gaf4E=; h=From:To:Cc:Subject:In-Reply-To:References:Date:From; b=kKgwaWDGgNCX2EmSuS0Sj2INe32XrvIU5lOmsUeL9x2VuF9OqpfQujimuVVPmSemX 9RtXCmrZ+69u/wYXUNp76GO8czAQe5HEZkXkvxLBjYhWbiJJBnoBzUu4mqAJ/Zd4fn OZJcye2HVYKZKvgztt2GyYvMPPNwh0W2yycQodIupDg2u4xhRkMHfuFIEC/zgg67nU pXwR+BO7ydMNTcRhShIxVac6QaINBOO9oCS1co7apZ5d/er9Dpmu4AfQLL9bqo296p PPTmxBJxoF90yqEOJIeDeboK/QOcinphDpHejv39avxLsLGf2EMumNJtSEuBlAbVPN Uf5gdo3Iieo7Q== To: Jason Iannone Cc: bloat , Simon Sundberg In-Reply-To: References: <87a6rs145a.fsf@toke.dk> <87blc6zghv.fsf@toke.dk> <87k0qtxzz0.fsf@toke.dk> Date: Sat, 27 Feb 2021 17:49:41 +0100 X-Clacks-Overhead: GNU Terry Pratchett Message-ID: <87eeh1xxp6.fsf@toke.dk> MIME-Version: 1.0 Content-Type: text/plain Subject: Re: [Bloat] Trouble Installing PPing in MacOS X-BeenThere: bloat@lists.bufferbloat.net X-Mailman-Version: 2.1.20 Precedence: list List-Id: General list for discussing Bufferbloat List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 27 Feb 2021 16:49:42 -0000 Jason Iannone writes: > Ideally, always on monitoring and export at the PE. An incremental first > step in an adhoc off box tester, maybe deployed with the perfsonar suite. Right. Are any of those boxes Linux-based? Otherwise the BPF implementation is not much use to you :) > Meaningfully visualizing the output seems challenging. Do you have any > insights on that part? No concrete plans yet, but the obvious thing that comes to mind is looking for latency variation within flows, possibly correlating it with rate. I tried to do something with the Measurement Labs NDT dataset some years back: https://dl.acm.org/doi/10.1145/2999572.2999603 For a middlebox monitor, the most interesting for identifying possible interventions is to figure out which path the data corresponds to. Depends a little on the network topology and the position of the middlebox what would be a good way to do that... -Toke