[Bloat] [Cerowrt-devel] Ubiquiti Launches a Speed Test Network
Toke Høiland-Jørgensen
toke at toke.dk
Fri Sep 6 18:50:01 EDT 2019
Sebastian Moeller <moeller0 at gmx.de> writes:
> Hi Toke,
>
>
>> On Sep 6, 2019, at 19:59, Toke Høiland-Jørgensen <toke at toke.dk> wrote:
>>
>> Sebastian Moeller <moeller0 at gmx.de> writes:
>>
>>> Hi Toke,
>>>
>>>> On Sep 6, 2019, at 10:27, Toke Høiland-Jørgensen <toke at toke.dk> wrote:
>>>>
>>>> Mikael Abrahamsson <swmike at swm.pp.se> writes:
>>>>
>>>>> On Wed, 4 Sep 2019, Matt Taggart wrote:
>>>>>
>>>>>> So an interesting idea but they have some things they could improve.
>>>>>
>>>>> I've been considering what one should run in parallel with the speed test
>>>>> to get an impression if the speedtest impacts performance of other flows /
>>>>> realtime flows, similar to what dslreports speedtest does.
>>>>>
>>>>> I've considered running one or several simulated voip calls (50pps) and
>>>>> record RTT, PDV, packet loss etc for this session.
>>>>>
>>>>> It would be interesting to hear any suggestions people have for a fairly
>>>>> simple codebase that does this that can be included in these kinds of test
>>>>> clients (both server and client end, and of course one that protects
>>>>> against reflection attacks etc).
>>>>>
>>>>> iperf3 can be used for this, but from what I can see the iperf3 server
>>>>> code isn't very friendly to multiple parallel tests or even resilient
>>>>> against hung clients that doesn't close the test nicely.
>>>>>
>>>>> I also considered using WebRTC or VoIP libraries, does anyone know what
>>>>> RTT/PDV/packet loss data can be extracted from some common ones?
>>>>
>>>> Pete coded up this wonderful tool for UDP-based latency testing; it's
>>>> even supported in Flent, and available on some (all?) the public-facing
>>>> servers:
>>>>
>>>> https://github.com/heistp/irtt
>>>
>>> This reminds of a tangentially related question, do we/could we
>>> actually write the requested DSCP into the packet payloads so we could
>>> see/display dscp bleaching/remapping packets experience during
>>> transit? For irtt, ping and even netperf TCP/UDP flows?
>>
>> irtt could definitely do this; not sure if it does. Ping and Netperf,
>> probably not...
>
> From man ping (on linux):
> -p pattern
> You may specify up to 16 ``pad'' bytes to fill out the packet you send. This is useful for diagnosing data-depen‐
> dent problems in a network. For example, -p ff will cause the sent packet to be filled with all ones.
>
> From man ping (macosx 10.14):
> -p pattern
> You may specify up to 16 ``pad'' bytes to fill out the packet you send. This is useful for diagnosing
> data-dependent problems in a network. For example, ``-p ff'' will cause the sent packet to be filled
> with all ones.
Yeah, but you can't read back the output...
> With fping I come up empty
>
> From man netperf (not sure how this wirks for servers):
> -F fill_file
> Pre-fill the send buffers with data from the named file. This is intended to provide a means for avoid-
> ing buffers that are filled with data which is trivially easy to compress. A good choice for a file that
> should be present on any system is this manpage - netperf.man. Other files may be provided as part of
> the distribution.:
> (so this would require us to distribute/generate 63 files for each dscp?)
We're already using -F /dev/urandom to prevent the netperf data from
being compressible... And also, this cannot be read back.
> From irtt help client:
> --fill=fill fill payload with given data (default none)
> none: leave payload as all zeroes
> rand: use random bytes from Go's math.rand
> pattern:XX: use repeating pattern of hex (default 69727474)
> --fill-one fill only once and repeat for all packets
> --sfill=fill request server fill (default not specified)
> see options for --fill
> server must support and allow this fill with --allow-fills
As above, we're doing --fill=rand today.
> This might actually work, and if it required a packetdump to compare
> DSCP and intended DSCP that would already be much better than what we
> have today, no?
Well, I'm sorta skeptical that anyone would actually look at those
packet dumps ;)
More information about the Bloat
mailing list