From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from presunto.switch.ch (presunto.switch.ch [IPv6:2001:620:0:1b::9b]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by huchra.bufferbloat.net (Postfix) with ESMTPS id 1304421F1F4 for ; Thu, 17 Jan 2013 06:04:31 -0800 (PST) Received: from surlej.switch.ch (surlej.switch.ch [IPv6:2001:620:0:e::69]) by presunto.switch.ch (8.14.3/8.14.3/Debian-9.4) with ESMTP id r0HE3uZZ027648 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Thu, 17 Jan 2013 15:03:57 +0100 Received: from user-23-22.vpn.switch.ch ([130.59.23.22] helo=Simons-MacBook-Air-33230.local) by surlej.switch.ch with esmtpsa (TLSv1:AES128-SHA:128) (Exim 4.72) (envelope-from ) id 1Tvq4S-0000B2-Ib; Thu, 17 Jan 2013 15:03:56 +0100 From: Simon Leinen To: mallman@icir.org In-Reply-To: <20130109033920.C47B95B2B40@lawyers.icir.org> (Mark Allman's message of "Tue, 08 Jan 2013 22:39:20 -0500") References: <20130109033920.C47B95B2B40@lawyers.icir.org> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/24.2.92 (darwin) X-Face: 1Nk*r=:$IBBb8|TyRB'2WSY6u:BzMO7N)#id#-4_}MsU5?vTI?dez|JiutW4sKBLjp.l7, F 7QOld^hORRtpCUj)!cP]gtK_SyK5FW(+o"!or:v^C^]OxX^3+IPd\z, @ttmwYVO7l`6OXXYR` Date: Thu, 17 Jan 2013 15:03:55 +0100 Message-ID: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable X-Spam-Score: undef - relay 2001:620:0:e::69 marked with skip_spam_scan X-CanIt-Geo: ip=2001:620:0:e::69; country=CH X-CanItPRO-Stream: switch-ch:outbound (inherits from switch-ch:default, base:default) X-Canit-Stats-ID: Bayes signature not available X-Scanned-By: CanIt (www . roaringpenguin . com) Cc: Shawn Ostermann , Toke =?utf-8?Q?H=C3=B8iland-J=C3=B8rgensen?= , bloat@lists.bufferbloat.net Subject: [Bloat] Passive RTT measurements [was: Re: Bufferbloat Paper] X-BeenThere: bloat@lists.bufferbloat.net X-Mailman-Version: 2.1.13 Precedence: list List-Id: General list for discussing Bufferbloat List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 17 Jan 2013 14:04:32 -0000 [CC'ing Shawn as the author of tcptrace] Mark Allman writes: [Toke H=C3=B8iland-J=C3=B8rgensen:] >> Incidentally, are the data extraction scripts available somewhere? >> Might be worthwhile to distribute them as some kind of tool that >> people with interesting vantage points could apply to get useful data? > Well, they are not readily available. I used a non-public extension > to Bro (that is not mine) to get the RTT samples. I have found that with "tcptrace -Z -lrn", I can extract lots of RTT samples and also some per-connection statistics (which are useful but not as detailed as I'd like to or as in your paper). This even works in finite time, like a couple minutes per 100Mpacket trace of mostly HTTP traffic taken near a popular archive server. As a bonus, it supports IPv6. So it seems that tcptrace (6.6.7) does *almost* what we need. But you probably have reasons why you haven't extended Bro rather than using tcptrace (possibly after improving it somehow). Care to elaborate? Maybe we can add the necessary improvements to tcptrace and make it even more awesome. (I'm sure Bro is awesome too, I'm just not as familiar with it.) > So, that is a sticking point. And, then there is a ball of goop to > analyze those. If folks have a place they can monitor and are > interested in doing so, please contact me. * raises hand * > I can probably get this in shape enough to give you. But, I doubt > I'll be able to somehow package this for general consumption any time > soon. Understood. --=20 Simon.