[Make-wifi-fast] mesh deployment with ath9k driver changes
Pete Heist
pete at heistp.net
Wed Jul 4 17:47:30 EDT 2018
> On Jun 30, 2018, at 9:14 PM, bkil <bkil.hu+Aq at gmail.com> wrote:
>
> Dear Pete,
>
> We understand that you are reluctant to share full radiotap wlan
> traces due to privacy reasons and collecting them would strain your
> infrastructure still a bit more.
Thanks for this idea (creative scripts as well!) but I think even the appearance of sharing the packet traces of guests might cause a problem, so I probably won’t be able to.
> Although we can probably give more informed advice based on the
> traces, as a stop gap measure until you finish cabling, you may
> consider traffic shaping of the clients to improve QoS. For example,
> you may put a hard bandwidth cap on each client (or only those coming
> from an AP in question), prioritize HTTP & VoIP traffic and reduce P2P
> traffic, depending on what is the biggest data hog.
I've been playing with that recently actually. I wasn’t able to leave it restricted for long before, but just now I set the per-station limit to 6mbit down / 2mbit up. Some people may not be pleased :), but let’s see what it does for a few days.
One thing I’m surprised by is the amount of data going through the VO queue (view in fixed width font for sanity):
root at Cabin_28:/sys/kernel/debug/ieee80211/phy0/ath9k# cat xmit
BE BK VI VO
MPDUs Queued: 218711 5303 435 12846236
MPDUs Completed: 18355992 37807 1672 89811026
MPDUs XRetried: 68553 2409 258 2393713
Aggregates: 28796699 262349 2232 0
AMPDUs Queued HW: 0 0 0 0
AMPDUs Completed: 295460430 2306820 317102 0
AMPDUs Retried: 11666516 120541 3006 0
AMPDUs XRetried: 394366 7493 500 0
TXERR Filtered: 198118 1152 41 1202
FIFO Underrun: 86 0 0 2237
TXOP Exceeded: 0 0 0 0
TXTIMER Expiry: 0 0 0 0
DESC CFG Error: 407 0 0 74
DATA Underrun: 4 0 0 1
DELIM Underrun: 617 0 0 20
TX-Pkts-All: 314279341 2354529 319532 92204739
TX-Bytes-All: 643508167 2628424750 1190327282061782753
HW-put-tx-buf: 94881437 1449351 315153 86013757
HW-tx-start: 0 0 0 0
HW-tx-proc-desc: 96148496 1449537 314472 92007898
TX-Failed: 0 0 0 0
And in the aqm driver support I’m not sure what fq_overmemory signifies (Toke may know that) or if the other stats are within the expected ranges for this amount of traffic.
root at Cabin_28:/sys/kernel/debug/ieee80211/phy0# cat aqm
access name value
R fq_flows_cnt 4096
R fq_backlog 0
R fq_overlimit 1716333
R fq_overmemory 58786914
R fq_collisions 4100715
R fq_memory_usage 0
RW fq_memory_limit 4194304
RW fq_limit 8192
> Also, could you by any chance set up monitoring of some addition
> metrics, like CPU usage, I/O wait, load average and memory usage on
> your nodes?
Here’s a snapshot of a gateway AP that’s under typical contentious load in the evening:
Mem: 26908K used, 33628K free, 228K shrd, 356K buff, 4368K cached
CPU: 8% usr 19% sys 0% nic 42% idle 0% io 0% irq 29% sirq
Load average: 0.32 0.20 0.22 1/62 12265
Servicing software interrupts is always a larger portion of the time, which might be expected.
> N.b.: It's a pity that networking trace anonymization tools aren't up
> to the challenge. Simple MAC randomization or hashing with data
> omission would be just fine for such a use case.
I’m also surprised I don’t see an obvious tool to randomize MACs. In the case of releasing captures of guest traffic without asking their permission though, I’m not sure any technical measures would be enough to erase the perception problem, but pseudonymization of all possible identifying values would theoretically satisfy GDPR requirements, for example. After that, it would be extremely difficult (maybe not impossible) without extensive external knowledge to identify users from their traffic.
More information about the Make-wifi-fast
mailing list