From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from alln-iport-2.cisco.com (alln-iport-2.cisco.com [173.37.142.89]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (Client CN "alln-iport.cisco.com", Issuer "HydrantID SSL ICA G2" (verified OK)) by huchra.bufferbloat.net (Postfix) with ESMTPS id A4EBC21F568 for ; Fri, 17 Apr 2015 09:18:39 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=1366; q=dns/txt; s=iport; t=1429287548; x=1430497148; h=from:to:subject:date:message-id:references:in-reply-to: content-transfer-encoding:mime-version; bh=fILQ3vn/ZiG2o8AFlRPQrM9JOzvIGUD+OpQd0Rl/Ufc=; b=S3V26/o+eM0t8h8UtGf+0jzFvoh/2FajGDWEz4bypzTnROGZv2uB4Ux6 19IWuHsGP5a6w0wK/oJG4YpmTWqkpfY7ohyKb8dte6K4CivKGGc0zP8aV NH1nltGbrpKUC4NitwnGpLic3PubPYFOk8JpBApxnxmpIjGaDMuISq73f o=; X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A0BUBABlMTFV/4ENJK1dgwyBLgXGFgmBRYYNAoFOOBQBAQEBAQEBfYQgAQEBBAECN0sEAgEIEQQBAQsUCQcoChQJCAIEARIIiCLIfwEBAQEBAQEBAQEBAQEBAQEBAQEBAReLKYRLOAaDEYEWAQSRIod0lzQiggMcgVBvgUR/AQEB X-IronPort-AV: E=Sophos;i="5.11,595,1422921600"; d="scan'208";a="142212465" Received: from alln-core-9.cisco.com ([173.36.13.129]) by alln-iport-2.cisco.com with ESMTP; 17 Apr 2015 16:18:39 +0000 Received: from xhc-rcd-x06.cisco.com (xhc-rcd-x06.cisco.com [173.37.183.80]) by alln-core-9.cisco.com (8.14.5/8.14.5) with ESMTP id t3HGIcRe027649 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Fri, 17 Apr 2015 16:18:38 GMT Received: from xmb-aln-x05.cisco.com ([169.254.11.175]) by xhc-rcd-x06.cisco.com ([173.37.183.80]) with mapi id 14.03.0195.001; Fri, 17 Apr 2015 11:18:38 -0500 From: "Bill Ver Steeg (versteb)" To: "Eggert, Lars" , bloat Thread-Topic: RRUL for netperf (bad hack) Thread-Index: AQHQeR03XD8sxAGfOUKDFaXFrUm+Tp1RYe+A Date: Fri, 17 Apr 2015 16:18:37 +0000 Message-ID: References: <880D8FBB-3C10-451D-8EB5-50D0A65B9704@netapp.com> In-Reply-To: <880D8FBB-3C10-451D-8EB5-50D0A65B9704@netapp.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [10.117.227.40] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Subject: Re: [Bloat] RRUL for netperf (bad hack) X-BeenThere: bloat@lists.bufferbloat.net X-Mailman-Version: 2.1.13 Precedence: list List-Id: General list for discussing Bufferbloat List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 17 Apr 2015 16:19:07 -0000 Lars- Iperf also has some one-way and two-way delay measurements (or at least the= version I used last year did). It also put timestamps in the payload of th= e packets. Bill Ver Steeg -----Original Message----- From: bloat-bounces@lists.bufferbloat.net [mailto:bloat-bounces@lists.buffe= rbloat.net] On Behalf Of Eggert, Lars Sent: Friday, April 17, 2015 10:46 AM To: bloat Subject: [Bloat] RRUL for netperf (bad hack) Hi, the attached patch is a horrible, horrible, HORRIBLE hack to add some sort = of RRUL testing into netperf. I needed something like this for some quick t= esting and thought maybe someone else can get some use out of it. (I was in= terested in the delay an application sees on top of a TCP stream, which is = not something Toke's excellent netperf-wrapper tool can currently do, AFAIK= .) I've only really used this with stream tests, and it only produces sensible= results with a specific request size such as "-r 16384" or something. And = I've only used this on Linux. Basically, this embeds a timeval into the test stream for each block, echoe= s it back to the sender, and then prints the application-level RTT seen. (I= t also prints a one-way delay, but that is only sensible to look at for clo= cks synchronized to an accuracy much better than the network delay.) Lars