From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-wm0-x229.google.com (mail-wm0-x229.google.com [IPv6:2a00:1450:400c:c09::229]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by lists.bufferbloat.net (Postfix) with ESMTPS id E24653B2A4 for ; Wed, 4 Jan 2017 19:49:49 -0500 (EST) Received: by mail-wm0-x229.google.com with SMTP id a197so420661177wmd.0 for ; Wed, 04 Jan 2017 16:49:49 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=6whZBuOX973VocAWAovdOT8FTmefZeZNZnC/2WYN/Kk=; b=nkB8x2SlNb4JZMRkAxKjDYw/NLweokGXd12TAeutGZJdAsGx7IFYgQOit18JpruRsA K4XBnzF4sjj+QeCOkrHjXkVAONrZXbrvedmYonRGlfy7FWK3d4FoRqITjERaqG1Ax5Zk Xy6hn0lU5GXe5b7Ilsmw2xgufcU7UJT346N0fmJ4c+pdexD/wJ4yQqJm0ZmUBhkKsBsp Ihdn4vYwPyJvRftqAp8sSc1E+hNdUuMa3GBXg3wsSAw8tFHpJqAg49hDALSb7Dx00a8H JSOqVaVinxjwbyKCghnd+32TJAVKcS2j6m34Zm3B/drnVO49jrtgli0X+oMTub0Er4yK iuzA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=6whZBuOX973VocAWAovdOT8FTmefZeZNZnC/2WYN/Kk=; b=gwwnWM+w6T2NyvFa622+apdKOCLdS7uR5p81NPRNGDJ1MPqbGn49WsXcmtRr1t48qz FmpbknVjGjKjZNXQLBP0ERnt4UHp9r4VEpYGRImHkDFQPEj615ERVOJ5BkKhgoPkmYAO FbBxR6teiIHxrXn7vXiGYjYWo8QKI4Pya3wyglhJMaVRrje8AyuZPSDYFn+WqdUPr5un +vje5cYCiEKSYSEv5b+oOuCdIIB9jTq2VQ6hP4tqhIL6ldUGvT3/ION43YtslSfcLCCE fyGxsgil2eJQB17tw9Ref01W/HkajMQrCI4OBv7fkpy39W8+GrbxRZuR3NlG6Xy1fuVk z5nw== X-Gm-Message-State: AIkVDXJPSTAaFkMD5jWJEClBoT/FMHFJ0cvES5Qz0S/mNpy4Pe7Uv6ss+fIj412xvPDs3YrRfqeWRwyuzKZrMg== X-Received: by 10.28.94.10 with SMTP id s10mr182318wmb.1.1483577388704; Wed, 04 Jan 2017 16:49:48 -0800 (PST) MIME-Version: 1.0 References: <0336DE7E-A69C-4F1B-ADB7-0AE81DD8A657@gmail.com> In-Reply-To: <0336DE7E-A69C-4F1B-ADB7-0AE81DD8A657@gmail.com> From: Aaron Wood Date: Thu, 05 Jan 2017 00:49:37 +0000 Message-ID: To: Jonathan Morton Cc: Dave Taht , "cerowrt-devel@lists.bufferbloat.net" Content-Type: multipart/alternative; boundary=001a114692924028eb05454e47f2 Subject: Re: [Cerowrt-devel] gaming routers... X-BeenThere: cerowrt-devel@lists.bufferbloat.net X-Mailman-Version: 2.1.20 Precedence: list List-Id: Development issues regarding the cerowrt test router project List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 05 Jan 2017 00:49:50 -0000 --001a114692924028eb05454e47f2 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable 'It=E2=80=99s looking at MACs all right, but not the way you suggest. It=E2= =80=99s just classifying certain vendor IDs as =E2=80=9Cvoice=E2=80=9D by default, and l= eaving the rest at =E2=80=9Cbest effort=E2=80=9D.' That's what I meant to imply, using the vendor I'd of the mac to separate the traffic, reusing the "voice" QoS handling. -Aaron On Wed, Jan 4, 2017 at 13:57 Jonathan Morton wrote: > > > On 4 Jan, 2017, at 23:45, Aaron Wood wrote: > > > > "but it has revealed that the WRT32X is designed to automatically detec= t > computers using the Killer-line of network adapters, indicating it's > probably a gaming-focused PC from a company like Alienware, MSI, or Razer > that requires priority access to the home's internet. It does the same > thing for an Xbox as well, if console gaming is more your thing.=E2=80=9D > > In other words, they=E2=80=99re aware of the (user level) problem, but th= ey still > don=E2=80=99t really =E2=80=9Cget it=E2=80=9D at a technical solution lev= el. And they call it > =E2=80=9Csecret sauce=E2=80=9D and hide the details, because they don=E2= =80=99t want competitors to > copy them. > > > Or it's looking at the mac ids of the devices, and queuing them > separately, with higher priority, but throttled to a percentage of overal= l > bandwidth. Much like the Cisco recommendations for voip traffic using EF= . > > It=E2=80=99s looking at MACs all right, but not the way you suggest. It= =E2=80=99s just > classifying certain vendor IDs as =E2=80=9Cvoice=E2=80=9D by default, and= leaving the rest > at =E2=80=9Cbest effort=E2=80=9D. > > It would however be very interesting to see whether we can measure the > differences between this approach and the ath9k work - purely to illumina= te > whether the proprietary or open-source approaches are more effective in > practice. > > - Jonathan Morton > > --001a114692924028eb05454e47f2 Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: quoted-printable 'It=E2=80=99s looking at MACs all right, but not the way you suggest. = It=E2=80=99s just classifying certain vendor IDs as =E2=80=9Cvoice=E2=80=9D= by default, and leaving the rest at =E2=80=9Cbest effort=E2=80=9D.'
That's what I meant to imply, using the vendor I'd of the mac = to separate the traffic, reusing the "voice" QoS handling.
-Aaron
On Wed, Jan 4, 2017= at 13:57 Jonathan Morton <chro= matix99@gmail.com> wrote:
> On 4 Jan, 2017, at 23:45, Aaron Wood <woody77@gmail.com> wro= te:
>
> "but it has revealed that the WRT32X is designed to automatically= detect computers using the Killer-line of network adapters, indicating it&= #39;s probably a gaming-focused PC from a company like Alienware, MSI, or R= azer that requires priority access to the home's internet. It does the = same thing for an Xbox as well, if console gaming is more your thing.=E2=80= =9D

In other words, they=E2=80=99re aware of the (user level) problem, but they= still don=E2=80=99t really =E2=80=9Cget it=E2=80=9D at a technical solutio= n level.=C2=A0 And they call it =E2=80=9Csecret sauce=E2=80=9D and hide the= details, because they don=E2=80=99t want competitors to copy them.

> Or it's looking at the mac ids of the devices, and queuing them se= parately, with higher priority, but throttled to a percentage of overall ba= ndwidth.=C2=A0 Much like the Cisco recommendations for voip traffic using E= F.

It=E2=80=99s looking at MACs all right, but not the way you suggest.=C2=A0 = It=E2=80=99s just classifying certain vendor IDs as =E2=80=9Cvoice=E2=80=9D= by default, and leaving the rest at =E2=80=9Cbest effort=E2=80=9D.

It would however be very interesting to see whether we can measure the diff= erences between this approach and the ath9k work - purely to illuminate whe= ther the proprietary or open-source approaches are more effective in practi= ce.

=C2=A0- Jonathan Morton

--001a114692924028eb05454e47f2--