From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail2.tohojo.dk (mail2.tohojo.dk [77.235.48.147]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by huchra.bufferbloat.net (Postfix) with ESMTPS id 679B921F22E for ; Mon, 27 Apr 2015 02:57:49 -0700 (PDT) X-Virus-Scanned: amavisd-new at mail2.tohojo.dk Received: by alrua-kau.kau.toke.dk (Postfix, from userid 1000) id 02CD5C40135; Mon, 27 Apr 2015 11:57:41 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=toke.dk; s=201310; t=1430128661; bh=EFQP9MtE72rYyeqK6/FMnicTyKln8IgvSHA+e//oKgM=; h=From:To:Cc:Subject:References:Date:In-Reply-To; b=fJfE0BABOZ3yfaldVnG8Jg9VoKhewIdh5GRCk0VTMkB3tLesZRhHm/wVs09xLFRkQ tGSsdKUOiWl5WS+VZGS2k2TjXcHx3sCmJN5y6zuHS5tYWwUkpcBWDF7JV29fpA5Qpz p+mI2oQfA75m1w16DMRFdu06TxUuYFqST42YY5o8= From: =?utf-8?Q?Toke_H=C3=B8iland-J=C3=B8rgensen?= To: Paolo Valente References: Date: Mon, 27 Apr 2015 11:57:40 +0200 In-Reply-To: (Paolo Valente's message of "Mon, 27 Apr 2015 11:48:44 +0200") X-Clacks-Overhead: GNU Terry Pratchett Message-ID: <87r3r53ncb.fsf@toke.dk> MIME-Version: 1.0 Content-Type: text/plain Cc: bloat Subject: Re: [Bloat] Detecting bufferbloat from outside a node X-BeenThere: bloat@lists.bufferbloat.net X-Mailman-Version: 2.1.13 Precedence: list List-Id: General list for discussing Bufferbloat List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 27 Apr 2015 09:58:17 -0000 Paolo Valente writes: > a network-monitoring company got curious about bufferbloat issues and > asked me to investigate a little bit the following issue (quite > interesting in my opinion). Is it possible to detect, from outside a > node, if the node is bufferbloated? In particular, the only action > allowed would be to observe the packets entering and leaving the node > (plus, of course, their timing). Sure. Just measure the timing when the network is unloaded and compare it to when it is loaded to capacity. We do that all the time. The details of course depend on what you define by a 'node', what role it plays in the network (does it forward or originate packets?), and what control you have over the traffic flowing through it. :) -Toke