[Make-wifi-fast] [Cake] Flent results for point-to-point Wi-Fi on LEDE/OM2P-HS available
peteheist at gmail.com
Thu Feb 16 04:17:06 EST 2017
> On Feb 16, 2017, at 9:42 AM, Sebastian Moeller <moeller0 at gmx.de> wrote:
>> On Feb 16, 2017, at 08:57, Pete Heist <peteheist at gmail.com> wrote:
>> [… discussion about DSCP to WMM classes mapping]
>> This always makes me wonder what’s to keep someone from just marking all their traffic 0x7 and stomping over everyone else.
> I have a gut feeling that an AP in a untrusted/hostile environment should monitor the usage of the 4 different WMM classes and step up their class accordingly. That is in an environment where there is a lot of AC_VO or AC_VI traffic the AP should elevate its normal data packets priority to match as not too be drowned out by the other senders. Sort of a reciprocal tit-for-tat approach, with the goal that the AP will keep access to a decent share of airtime. But since I am a layman in these matters, I might be out to lunch on this…
At first I was thinking to just remove diffserv markings entirely, say with Cake’s besteffort flag, but I think that “good” and “otherwise unknowing” users would suffer, which I think in FreeNet is a vast majority of users.
I think the challenge might be what metric to use to know when classes are being abused. Maybe roughly if dscp_value * bytes_transferred exceeds some threshold in some given period of time, that would work. Best effort wouldn’t affect this metric so they can use this class all they want, and if someone just uses their connection for typical VoIP usage, the threshold shouldn’t be exceeded. Only when a lot of data is transferred per period of time in higher classes would they exceed the threshold.
For now, we could just measure this (with iptables?) and send an admin email when the threshold is exceeded, then automate a strategy to combat it if needed. But I bet most users in a community WISP, if notified, would just try to help fix the problem… :)
More information about the Make-wifi-fast