From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail.tohojo.dk (mail.tohojo.dk [188.40.53.186]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by huchra.bufferbloat.net (Postfix) with ESMTPS id DDDD921F17B; Mon, 26 Nov 2012 15:21:31 -0800 (PST) Received: from alrua-laptop.borgediget.toke.dk (1809ds4-ro.0.fullrate.dk [90.184.46.60]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.tohojo.dk (Postfix) with ESMTPSA id 9FC911EC060F; Tue, 27 Nov 2012 00:21:29 +0100 (CET) Received: by alrua-laptop.borgediget.toke.dk (Postfix, from userid 1000) id 7AFCB93A; Tue, 27 Nov 2012 00:21:28 +0100 (CET) From: =?utf-8?Q?Toke_H=C3=B8iland-J=C3=B8rgensen?= To: Dave Taht References: <20121123221842.GD2829@linux.vnet.ibm.com> <87a9u7amon.fsf@toke.dk> <87txscm2lm.fsf@toke.dk> Date: Tue, 27 Nov 2012 00:21:23 +0100 In-Reply-To: <87txscm2lm.fsf@toke.dk> ("Toke =?utf-8?Q?H=C3=B8iland-J?= =?utf-8?Q?=C3=B8rgensen=22's?= message of "Mon, 26 Nov 2012 23:16:53 +0100") Message-ID: <87obiklzm4.fsf@toke.dk> User-Agent: Gnus/5.130006 (Ma Gnus v0.6) Emacs/24.2 (gnu/linux) MIME-Version: 1.0 Content-Type: multipart/signed; boundary="=-=-="; micalg=pgp-sha256; protocol="application/pgp-signature" X-Mailman-Approved-At: Mon, 26 Nov 2012 16:52:30 -0800 Cc: Paolo Valente , codel@lists.bufferbloat.net, cerowrt-devel@lists.bufferbloat.net, bloat , paulmck@linux.vnet.ibm.com, David Woodhouse , John Crispin Subject: Re: [Bloat] FQ_Codel lwn draft article review X-BeenThere: bloat@lists.bufferbloat.net X-Mailman-Version: 2.1.13 Precedence: list List-Id: General list for discussing Bufferbloat List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 26 Nov 2012 23:21:32 -0000 --=-=-= Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Toke H=C3=B8iland-J=C3=B8rgensen writes: > The latter should be pretty straight forward, I suppose. And if I recall > correctly, you did want to measure the upstream jitter? Following up on this, I've created a proof of concept python script that starts an iperf server in the background, parses the output, and presents a command line interface that dumps the parsed data in json format when asked for a transfer ID (source port number). The script is available here: https://github.com/tohojo/netperf-wrapper/blob/master/misc/iperf-server.py It should be pretty easy to make it listen to a socket instead and allow clients to request 'their' data. If anyone thinks this will be useful, I'll be happy to poke some more at it. :) =2DToke =2D-=20 Toke H=C3=B8iland-J=C3=B8rgensen toke@toke.dk --=-=-= Content-Type: application/pgp-signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.19 (GNU/Linux) iQEcBAEBCAAGBQJQs/lzAAoJEENeEGz1+utPWGkIAJap1ShleNErvTvEqptSwHdN lMIC1/xcYwAGjKxyE7E06vJMhqZ/U0Pkaf54Hddhb1W4RjLbobZ4LvNXpfLCbqLp WpMINLtbG/ZGMR0i5OowJ0PDPUjaj6BZU+mz04NEld8bnZRDOZWd5Ifz5jYDhwOB DumGLckmQcTEaMs5i/D4Fa07YttSow6gx7ZZi0dZ20mrwZvTD2JuN+roupWuV7q2 UabkW3lW3T9QyPFPmZOZ6hJVTY3pda60GM9094/fCkuJBCI3IQpS2NXByknKzDCJ ORgfUEYX07K4jcaB+yDtLLnjKyBL2xTEkRGDNeoNQ7+5L86fSlHWJaFUYyT3HKg= =3QgI -----END PGP SIGNATURE----- --=-=-=--