Skip to Content.
Sympa Menu

ndt-users - RE: [discussion] S2C throughput test: Received wrong type of the message

Subject: ndt-users list created

List archive

RE: [discussion] S2C throughput test: Received wrong type of the message


Chronological Thread 
  • From: "Gholmieh, Nathalie" <>
  • To: "''" <>
  • Cc: "''" <>
  • Subject: RE: [discussion] S2C throughput test: Received wrong type of the message
  • Date: Wed, 7 Oct 2009 10:16:43 -0700
  • Accept-language: en-US
  • Acceptlanguage: en-US

Hi Rich-

 

thanks for answering.

 

I am running NDT 3.5.6

 

I made the modification to testoptions.c then rebuilt and installed, no change.
I still get this error message with the remote client:

 

“S2C throughput test: ERROR MSG: Server (S2C throughput test): Invalid S2C throughput received

S2C throughput test FAILED!”

 

I do receive throughput values though for C2S and S2C tests:

 

running 10s outbound test (client to server) . . . . .  938.70 Mb/s

 <------------------------->

 <-- S2C throughput test -->

  -- port: 3003

running 10s inbound test (server to client) . . . . . . 937.04 Mb/s

 

Attached is the debug 6 server output.

 

Nathalie~

From: [mailto:] On Behalf Of Richard Carlson
Sent: Wednesday, October 07, 2009 9:17 AM
To:
Cc:
Subject: Re: [discussion] S2C throughput test: Received wrong type of the message

 

Nathalie;

 

This discussion should continue on the ndt-users list, instead of on the web100 discussion list.

 

There is a bug in the NDT 3.5.0 server.  The simplest thing is to update to the latest NDT package.  The other option is to manually fix this bug by

1) edit the src/testoption.c file

2) around line 734 you will see the text  /* wait(NULL); */  (this is a comment in 'C'

3) remove the "/*" and "*/" characters (so the wait() command is now active)

3) save the file, and rebuild/reinstall things.

 

This should resolve the 2nd problem.  I will need to dig into the 1st problem, when running from localhost.

 

Rich

 

On Oct 6, 2009, at 4:23 PM, Gholmieh, Nathalie wrote:



Hi-

 

 

 

I have searched the ndt-users discussion list, and none of the answers that I have read and tried seem to remove the error messages that I am getting when launching a NDT test. I probably am missing something. I am getting different error messages for different web100clts:

 

If I run a NDT test from the web100clt on the same host as the server I get the following output (server debug6 messages for this session are in localhosttest-* text file attached):

 

[root@Merlin ndt-3.5.6]# web100clt -n merlin.ucsd.edu -dddd

Testing network path for configuration and performance problems  --  Using IPv4 address

Requesting test suite:

 > Middlebox test

 > Simple firewall test

 > C2S throughput test

 > S2C throughput test

 > New Client, impliments queuing feedback

 <-- Middlebox test -->

  -- port: 3003

Checking for Middleboxes . . . . . . . . . . . . . . . . . .  CWND limited speed = 259671.70 kbps

Done

 <-------------------->

 <-- Simple firewall test -->

checking for firewalls . . . . . . . . . . . . . . . . . . .

  -- port: 33225

  -- time: 1

  -- oport: 57729

Done

 <-------------------------->

 <-- C2S throughput test -->

  -- port: 3002

running 10s outbound test (client to server) . . . . .  10208.68 Mb/s

 <------------------------->

 <-- S2C throughput test -->

  -- port: 3003

running 10s inbound test (server to client) . . . . . . 3059.12 Mb/s

 <------------------------->

Server unable to determine bottleneck link type.

Alarm: Duplex Mismatch condition detected. Switch=Full and Host=Half

Information [S2C]: Packet queuing detected: 69.20% (local buffers)

Server 'merlin.ucsd.edu' is not behind a firewall. [Connection to the ephemeral port was successful]

Client is not behind a firewall. [Connection to the ephemeral port was successful]

Packet size is preserved End-to-End

Server IP addresses are preserved End-to-End

Client IP addresses are preserved End-to-End

[root@Merlin ndt-3.5.6]#

 

 

If the client is on a remote NDT host (version 3.5.0), I get the following error message (server debug6 messages for this session are in remotehosttest-* text file attached):

 

[ngholmieh@thunderbird apps]$ web100clt -n merlin.ucsd.edu -dddd

Testing network path for configuration and performance problems  --  Using IPv4 address

Requesting test suite:

 > Middlebox test

 > Simple firewall test

 > C2S throughput test

 > S2C throughput test

WARNING: NDT server has different version number (3.5.6)

 <-- Middlebox test -->

  -- port: 3003

Checking for Middleboxes . . . . . . . . . . . . . . . . . .  CWND limited speed = 47459.39 kbps

Done

 <-------------------->

 <-- Simple firewall test -->

checking for firewalls . . . . . . . . . . . . . . . . . . .

  -- port: 52941

  -- time: 1

  -- oport: 42867

Done

 <-------------------------->

 <-- C2S throughput test -->

  -- port: 3002

running 10s outbound test (client to server) . . . . .  938.75 Mb/s

 <------------------------->

 <-- S2C throughput test -->

  -- port: 3003

running 10s inbound test (server to client) . . . . . . 894.61 Mb/s

S2C throughput test: ERROR MSG: Server (S2C throughput test): Invalid S2C throughput received

S2C throughput test FAILED!

Server 'merlin.ucsd.edu' is not behind a firewall. [Connection to the ephemeral port was successful]

Client is not behind a firewall. [Connection to the ephemeral port was successful]

Information: Network Middlebox is modifying MSS variable (changed to 1444)

Server IP addresses are preserved End-to-End

Client IP addresses are preserved End-to-End

[ngholmieh@thunderbird apps]$

 

 

 

web100srv command that I used is:

web100srv --snaplog --tcpdump -a -dddddd -4

 

These are the software versions that I am using:

ndt-3.5.6

linux kernel-2.6.30 + web100-2.5.25-200906151113 & web100_userland-1.7

tcpdump-4.0.0

libpcap-1.0.0

 

Any ideas are well appreciated.

 

Thanks in advance!

 

 

Nathalie~

 

<localhosttest-web100srv-debug6.txt><remotehosttest-web100srv-debug6.txt>

_______________________________________________
Web100-discussion mailing list

https://lists.psc.edu/mailman/listinfo/web100-discussion

To UNSUBSCRIBE visit https://lists.psc.edu/mailman/unsubscribe/web100-discussion

 

Richard Carlson

1000 Oakbrook Dr

Ann Arbor, MI  48104

 

P: 734-352-7043

C: 630-251-4572

 

ANL/Internet2 NDT ver 3.5.6
Variables file = /usr/local/ndt/web100_variables
log file = /usr/local/ndt/web100srv.log
Admin file = /usr/local/ndt/admin.html
Debug level set to 6

Send buffer initialized to 16384, Receive buffer initialized to 87380
server ready on port 3001
web100_init() read 69 variables from file
Web100 variables line received

Initial counter Values Totalcnt = 0, Total Mismatch = 0, Total Bad Cables = 0
Updated counter values Totalcnt = 1, Total Mismatch = 0, Total Bad Cables = 0
Individual counts = [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0]
Web100 variables line received

Initial counter Values Totalcnt = 1, Total Mismatch = 0, Total Bad Cables = 0
Updated counter values Totalcnt = 2, Total Mismatch = 0, Total Bad Cables = 0
Individual counts = [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 2, 0, 0, 0, 0, 0]
Web100 variables line received

Initial counter Values Totalcnt = 2, Total Mismatch = 0, Total Bad Cables = 0
Updated counter values Totalcnt = 3, Total Mismatch = 0, Total Bad Cables = 0
Individual counts = [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 0, 0]
Web100 variables line received

Initial counter Values Totalcnt = 3, Total Mismatch = 0, Total Bad Cables = 0
Updated counter values Totalcnt = 4, Total Mismatch = 0, Total Bad Cables = 0
Individual counts = [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 4, 0, 0, 0, 0, 0]
Web100 variables line received

Initial counter Values Totalcnt = 4, Total Mismatch = 0, Total Bad Cables = 0
Updated counter values Totalcnt = 5, Total Mismatch = 0, Total Bad Cables = 0
Individual counts = [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 5, 0, 0, 0, 0, 0]
Web100 variables line received

Initial counter Values Totalcnt = 5, Total Mismatch = 0, Total Bad Cables = 0
Updated counter values Totalcnt = 6, Total Mismatch = 0, Total Bad Cables = 0
Individual counts = [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 6, 0, 0, 0, 0, 0]
Web100 variables line received

Initial counter Values Totalcnt = 6, Total Mismatch = 0, Total Bad Cables = 0
Updated counter values Totalcnt = 7, Total Mismatch = 0, Total Bad Cables = 0
Individual counts = [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 6, 0, 0, 0, 0, 0]
Web100 variables line received

Initial counter Values Totalcnt = 7, Total Mismatch = 0, Total Bad Cables = 0
Updated counter values Totalcnt = 8, Total Mismatch = 0, Total Bad Cables = 0
Individual counts = [1, 0, 0, 0, 0, 0, 0, 1, 0, 0, 6, 0, 0, 0, 0, 0]
Web100 variables line received

Initial counter Values Totalcnt = 8, Total Mismatch = 0, Total Bad Cables = 0
Updated counter values Totalcnt = 9, Total Mismatch = 0, Total Bad Cables = 0
Individual counts = [2, 0, 0, 0, 0, 0, 0, 1, 0, 0, 6, 0, 0, 0, 0, 0]
Web100 variables line received

Initial counter Values Totalcnt = 9, Total Mismatch = 0, Total Bad Cables = 0
Updated counter values Totalcnt = 10, Total Mismatch = 0, Total Bad Cables = 0
Individual counts = [2, 0, 0, 0, 0, 0, 0, 2, 0, 0, 6, 0, 0, 0, 0, 0]
Web100 variables line received

Initial counter Values Totalcnt = 10, Total Mismatch = 0, Total Bad Cables = 0
Updated counter values Totalcnt = 11, Total Mismatch = 0, Total Bad Cables = 0
Individual counts = [3, 0, 0, 0, 0, 0, 0, 2, 0, 0, 6, 0, 0, 0, 0, 0]
Web100 variables line received

Initial counter Values Totalcnt = 11, Total Mismatch = 0, Total Bad Cables = 0
Updated counter values Totalcnt = 12, Total Mismatch = 0, Total Bad Cables = 0
Individual counts = [3, 0, 0, 0, 0, 0, 0, 3, 0, 0, 6, 0, 0, 0, 0, 0]
Web100 variables line received

Initial counter Values Totalcnt = 12, Total Mismatch = 0, Total Bad Cables = 0
Updated counter values Totalcnt = 13, Total Mismatch = 0, Total Bad Cables = 0
Individual counts = [3, 0, 0, 0, 0, 0, 0, 4, 0, 0, 6, 0, 0, 0, 0, 0]
Web100 variables line received

Initial counter Values Totalcnt = 13, Total Mismatch = 0, Total Bad Cables = 0
Updated counter values Totalcnt = 14, Total Mismatch = 0, Total Bad Cables = 0
Individual counts = [3, 0, 0, 0, 0, 0, 0, 5, 0, 0, 6, 0, 0, 0, 0, 0]
Web100 variables line received

Initial counter Values Totalcnt = 14, Total Mismatch = 0, Total Bad Cables = 0
Updated counter values Totalcnt = 15, Total Mismatch = 0, Total Bad Cables = 0
Individual counts = [3, 0, 0, 0, 0, 0, 0, 6, 0, 0, 6, 0, 0, 0, 0, 0]
Web100 variables line received

Initial counter Values Totalcnt = 15, Total Mismatch = 0, Total Bad Cables = 0
Updated counter values Totalcnt = 16, Total Mismatch = 0, Total Bad Cables = 0
Individual counts = [3, 0, 0, 0, 0, 0, 0, 7, 0, 0, 6, 0, 0, 0, 0, 0]
Web100 variables line received

Initial counter Values Totalcnt = 16, Total Mismatch = 0, Total Bad Cables = 0
Updated counter values Totalcnt = 17, Total Mismatch = 0, Total Bad Cables = 0
Individual counts = [3, 0, 0, 0, 0, 0, 0, 8, 0, 0, 6, 0, 0, 0, 0, 0]
Web100 variables line received

Initial counter Values Totalcnt = 17, Total Mismatch = 0, Total Bad Cables = 0
Updated counter values Totalcnt = 18, Total Mismatch = 0, Total Bad Cables = 0
Individual counts = [3, 0, 0, 0, 0, 0, 0, 9, 0, 0, 6, 0, 0, 0, 0, 0]
Web100 variables line received

Initial counter Values Totalcnt = 18, Total Mismatch = 0, Total Bad Cables = 0
Updated counter values Totalcnt = 19, Total Mismatch = 0, Total Bad Cables = 0
Individual counts = [4, 0, 0, 0, 0, 0, 0, 9, 0, 0, 6, 0, 0, 0, 0, 0]
Web100 variables line received

Initial counter Values Totalcnt = 19, Total Mismatch = 0, Total Bad Cables = 0
Updated counter values Totalcnt = 20, Total Mismatch = 1, Total Bad Cables = 0
Individual counts = [5, 0, 0, 0, 0, 0, 0, 9, 0, 0, 6, 0, 0, 0, 0, 0]
Web100 variables line received

Initial counter Values Totalcnt = 20, Total Mismatch = 1, Total Bad Cables = 0
Updated counter values Totalcnt = 21, Total Mismatch = 1, Total Bad Cables = 0
Individual counts = [5, 0, 0, 0, 0, 0, 0, 10, 0, 0, 6, 0, 0, 0, 0, 0]
Web100 variables line received

Initial counter Values Totalcnt = 21, Total Mismatch = 1, Total Bad Cables = 0
Updated counter values Totalcnt = 22, Total Mismatch = 2, Total Bad Cables = 0
Individual counts = [6, 0, 0, 0, 0, 0, 0, 10, 0, 0, 6, 0, 0, 0, 0, 0]
Web100 variables line received

Initial counter Values Totalcnt = 22, Total Mismatch = 2, Total Bad Cables = 0
Updated counter values Totalcnt = 23, Total Mismatch = 2, Total Bad Cables = 0
Individual counts = [6, 0, 0, 0, 0, 0, 0, 11, 0, 0, 6, 0, 0, 0, 0, 0]
Web100 variables line received

Initial counter Values Totalcnt = 23, Total Mismatch = 2, Total Bad Cables = 0
Updated counter values Totalcnt = 24, Total Mismatch = 3, Total Bad Cables = 0
Individual counts = [7, 0, 0, 0, 0, 0, 0, 11, 0, 0, 6, 0, 0, 0, 0, 0]
Web100 variables line received

Initial counter Values Totalcnt = 24, Total Mismatch = 3, Total Bad Cables = 0
Updated counter values Totalcnt = 25, Total Mismatch = 3, Total Bad Cables = 0
Individual counts = [8, 0, 0, 0, 0, 0, 0, 11, 0, 0, 6, 0, 0, 0, 0, 0]
Web100 variables line received

Initial counter Values Totalcnt = 25, Total Mismatch = 3, Total Bad Cables = 0
Updated counter values Totalcnt = 26, Total Mismatch = 4, Total Bad Cables = 0
Individual counts = [9, 0, 0, 0, 0, 0, 0, 11, 0, 0, 6, 0, 0, 0, 0, 0]
Web100 variables line received

Initial counter Values Totalcnt = 26, Total Mismatch = 4, Total Bad Cables = 0
Updated counter values Totalcnt = 27, Total Mismatch = 5, Total Bad Cables = 0
Individual counts = [10, 0, 0, 0, 0, 0, 0, 11, 0, 0, 6, 0, 0, 0, 0, 0]
Web100 variables line received

Initial counter Values Totalcnt = 27, Total Mismatch = 5, Total Bad Cables = 0
Updated counter values Totalcnt = 28, Total Mismatch = 5, Total Bad Cables = 0
Individual counts = [10, 0, 0, 0, 0, 0, 0, 12, 0, 0, 6, 0, 0, 0, 0, 0]
Web100 variables line received

Initial counter Values Totalcnt = 28, Total Mismatch = 5, Total Bad Cables = 0
Updated counter values Totalcnt = 29, Total Mismatch = 6, Total Bad Cables = 0
Individual counts = [11, 0, 0, 0, 0, 0, 0, 12, 0, 0, 6, 0, 0, 0, 0, 0]
Web100 variables line received

Initial counter Values Totalcnt = 29, Total Mismatch = 6, Total Bad Cables = 0
Updated counter values Totalcnt = 30, Total Mismatch = 6, Total Bad Cables = 0
Individual counts = [11, 0, 0, 0, 0, 0, 0, 13, 0, 0, 6, 0, 0, 0, 0, 0]
Web100 variables line received

Initial counter Values Totalcnt = 30, Total Mismatch = 6, Total Bad Cables = 0
Updated counter values Totalcnt = 31, Total Mismatch = 6, Total Bad Cables = 0
Individual counts = [11, 0, 0, 0, 0, 0, 0, 14, 0, 0, 6, 0, 0, 0, 0, 0]
Web100 variables line received

Initial counter Values Totalcnt = 31, Total Mismatch = 6, Total Bad Cables = 0
Updated counter values Totalcnt = 32, Total Mismatch = 6, Total Bad Cables = 0
Individual counts = [11, 0, 0, 0, 0, 0, 0, 15, 0, 0, 6, 0, 0, 0, 0, 0]
Web100 variables line received

Initial counter Values Totalcnt = 32, Total Mismatch = 6, Total Bad Cables = 0
Updated counter values Totalcnt = 33, Total Mismatch = 6, Total Bad Cables = 0
Individual counts = [11, 0, 0, 0, 0, 0, 0, 16, 0, 0, 6, 0, 0, 0, 0, 0]
Web100 variables line received

Initial counter Values Totalcnt = 33, Total Mismatch = 6, Total Bad Cables = 0
Updated counter values Totalcnt = 34, Total Mismatch = 6, Total Bad Cables = 0
Individual counts = [11, 0, 0, 0, 0, 0, 0, 17, 0, 0, 6, 0, 0, 0, 0, 0]
Web100 variables line received

Initial counter Values Totalcnt = 34, Total Mismatch = 6, Total Bad Cables = 0
Updated counter values Totalcnt = 35, Total Mismatch = 6, Total Bad Cables = 0
Individual counts = [11, 0, 0, 0, 0, 0, 0, 18, 0, 0, 6, 0, 0, 0, 0, 0]
Signal 17 received by process 18182
successfully locked '/tmp/view.string' for updating
sending
'3228882,0,16356807,410326,35,6,0,11,0,0,0,0,0,0,18,0,0,6,0,0,0,0,0,Oct 6
20:53:12,Oct 7 16:33:57' to tmp file
Generated iflist with device=eth0 and if_speed=7
nothing in queue
Timer not running, waiting for new connection


















New connection received, waiting for accept() to complete
New connection received from [132.239.252.252].
Parent process spawned child = 18187
Parent thinks pipe() returned fd0=6, fd1=7
Child thinks pipe() returned fd0=6, fd1=7 for pid=0
<<< recv_msg: type=2, len=1
initialize_tests returned old/new client = 0, test_suite = 1 8 2 4
Incrementing waiting variable now = 1
Telling client 18187 testing will begin now
>>> send_msg: type=1, len=1
Queue pointer = 18187, testing = 1, waiting = 1, zombie_check = 0Got 'go'
signal from parent, ready to start testing

Waiting for new connection, timer running
extracting test_suite ' 1 8 2 4' and t_opts 'f' from buff 'go 15 1 8 2 4'
Child process 18187 started
>>> send_msg: type=2, len=6
run_test() routine, asking for test_suite = 1 8 2 4
>>> send_msg: type=2, len=8
Starting test suite:
> Middlebox test
> Simple firewall test
> C2S throughput test
> S2C throughput test
<-- Middlebox test -->
KillHung(): returned non-0 response, nothing to kill or kill failed

Send buffer initialized to 16384, Receive buffer initialized to 87380
-- port: 3003
>>> send_msg: type=3, len=4
Looking for Web100 data on socketid 6
Server: 132.239.252.68;3003 Client: 132.239.252.252;33837 1444;7;7;
Sending 1444 Byte packets over the network
Setting Cwnd Limit to 2888 octets
Signal 17 received by process 18187
now = 1254935532 Process started at 1254935529, run time = 3
Timer expired while waiting for a new connection
Queue pointer = 18187, testing = 1, waiting = 1, zombie_check = 0
Waiting for new connection, timer running
>>> send_msg: type=5, len=40
<<< recv_msg: type=5, len=5
CWND limited throughput = 47781 kbps (47781)
>>> send_msg: type=6, len=0
<-------------------->
<-- Simple firewall test -->

Send buffer initialized to 16384, Receive buffer initialized to 87380
-- port: 41458
-- time: 1
>>> send_msg: type=3, len=7
<<< recv_msg: type=5, len=5
-- oport: 35551
>>> send_msg: type=4, len=0

Send buffer initialized to 16384, Receive buffer initialized to 87380
>>> send_msg: type=5, len=20
<<< recv_msg: type=5, len=20
>>> send_msg: type=5, len=1
>>> send_msg: type=6, len=0
<-------------------------->
<-- C2S throughput test -->

Send buffer initialized to 16384, Receive buffer initialized to 87380
-- port: 3002
listening for Inet connection on testOptions->c2ssockfd, fd=3
Sending 'GO' signal, to tell client to head for the next test
>>> send_msg: type=3, len=4
C2S test Child thinks pipe() returned fd0=8, fd1=9
now = 1254935535 Process started at 1254935529, run time = 6
Timer expired while waiting for a new connection
Queue pointer = 18187, testing = 1, waiting = 1, zombie_check = 0
Waiting for new connection, timer running
Unknown address family=17 found
IPv4 interface found address=132.239.252.68
IPv4 address match, setting device to 'eth0'
Opening network interface 'eth0' for packet-pair timing
pcap_open_live() returned pointer 0x66ca30
installing pkt filter for 'host 132.239.252.252 and port 40680'
Initial pkt src data = 64d9e4
Creating trace file for connection
Opening
'/usr/local/ndt/serverdata/2009/10/07/20091007T17:12:09.743194000Z_132.239.252.252:40680.c2s_ndttrace'
log fine
C2S test Parent thinks pipe() returned fd0=8, fd1=9
c2s_snaplog file:
/usr/local/ndt/serverdata/2009/10/07/20091007T17:12:09.743194000Z_132.239.252.252:40680.c2s_snaplog

>>> send_msg: type=4, len=0
New IPv4 packet trace started -- initializing counters
now = 1254935538 Process started at 1254935529, run time = 9
Timer expired while waiting for a new connection
Queue pointer = 18187, testing = 1, waiting = 1, zombie_check = 0
Waiting for new connection, timer running
now = 1254935541 Process started at 1254935529, run time = 12
Timer expired while waiting for a new connection
Queue pointer = 18187, testing = 1, waiting = 1, zombie_check = 0
Waiting for new connection, timer running
now = 1254935544 Process started at 1254935529, run time = 15
Timer expired while waiting for a new connection
Queue pointer = 18187, testing = 1, waiting = 1, zombie_check = 0
Waiting for new connection, timer running
now = 1254935547 Process started at 1254935529, run time = 18
Timer expired while waiting for a new connection
Queue pointer = 18187, testing = 1, waiting = 1, zombie_check = 0
Waiting for new connection, timer running
938703 kbps outbound
>>> send_msg: type=5, len=6
Signal USR1(10) sent to child [18190]
Signal 10 received by process 18190
DEBUG, caught SIGUSR1, setting sig1 flag to force exit
Received SIGUSRx signal terminating data collection loop for pid=18190
Sending pkt-pair data back to parent on pipe 8, 9
fwd.saddr = fcfcef84:40680, rev.saddr = 44fcef84:3002
11:12:17.813585 132.239.252.252:40680 --> 132.239.252.68:3002 Collected
pkt-pair data max = 555356
wrote 128 bytes: link counters are ' 1 0 0 0 3 398 131795 2026 113983 555356
77 8739 301.85 0 0 0 1 0 7'
#$#$#$#$ pcap routine says window increases = 0, decreases = 0, no change = 0
11:12:17.813585 132.239.252.68:3002 --> 132.239.252.252:40680 Collected
pkt-pair data max = 96413
wrote 128 bytes: link counters are ' 0 0 1 0 3 3 7073 96413 30981 5536 21463
95 1169.71 12646 8019 140903 0 21463 7'
#$#$#$#$ pcap routine says window increases = 12646, decreases = 8019, no
change = 140903
128 bytes read ' 1 0 0 0 3 398 131795 2026 113983 555356 77 8739 301.85 0 0
0 1 0 7' from monitor pipe
128 bytes read ' 0 0 1 0 3 3 7073 96413 30981 5536 21463 95 1169.71 12646
8019 140903 0 21463 7' from monitor pipe
>>> send_msg: type=6, len=0
Finished reading pkt-pair data from network, process 18190 should terminate
now
Signal 11 received by process 18190
DEBUG, caught SIGSEGV signal and terminated process (18190)
Signal 17 received by process 18187
<------------------------->
<-- S2C throughput test -->

Send buffer initialized to 16384, Receive buffer initialized to 87380
-- port: 3003
>>> send_msg: type=3, len=4
waiting for data on testOptions->s2csockfd
S2C test Child thinks pipe() returned fd0=8, fd1=9
Unknown address family=17 found
IPv4 interface found address=132.239.252.68
IPv4 address match, setting device to 'eth0'
Opening network interface 'eth0' for packet-pair timing
pcap_open_live() returned pointer 0x6718d0
installing pkt filter for 'host 132.239.252.252 and port 33840'
Initial pkt src data = 64d9e4
Creating trace file for connection
Opening
'/usr/local/ndt/serverdata/2009/10/07/20091007T17:12:09.743194000Z_132.239.252.252:33840.s2c_ndttrace'
log fine
snaplog file:
/usr/local/ndt/serverdata/2009/10/07/20091007T17:12:09.743194000Z_132.239.252.252:33840.s2c_snaplog

Signal 17 received by process 18187
>>> send_msg: type=4, len=0
New IPv4 packet trace started -- initializing counters
now = 1254935550 Process started at 1254935529, run time = 21
Timer expired while waiting for a new connection
Queue pointer = 18187, testing = 1, waiting = 1, zombie_check = 0
Waiting for new connection, timer running
now = 1254935553 Process started at 1254935529, run time = 24
Timer expired while waiting for a new connection
Queue pointer = 18187, testing = 1, waiting = 1, zombie_check = 0
Waiting for new connection, timer running
now = 1254935556 Process started at 1254935529, run time = 27
Timer expired while waiting for a new connection
Queue pointer = 18187, testing = 1, waiting = 1, zombie_check = 0
Waiting for new connection, timer running
>>> send_msg: type=5, len=25
sent 1174568960 bytes to client in 10.00 seconds
Buffer control counters Total = 143380, new data = 0, Draining Queue = 0
Signal USR2(12) sent to child [18194]
Signal 12 received by process 18194
DEBUG, caught SIGUSR2, setting sig2 flag to force exit
Received SIGUSRx signal terminating data collection loop for pid=18194
Sending pkt-pair data back to parent on pipe 8, 9
fwd.saddr = 44fcef84:3003, rev.saddr = fcfcef84:33840
11:12:27.930484 132.239.252.68:3003 --> 132.239.252.252:33840 Collected
pkt-pair data max = 25125
wrote 128 bytes: link counters are ' 1 0 7 14 398 20 2395 164 447 528 14
25125 141.19 0 0 0 1 0 7'
#$#$#$#$ pcap routine says window increases = 0, decreases = 0, no change = 0
11:12:27.930484 132.239.252.252:33840 --> 132.239.252.68:3003 Collected
pkt-pair data max = 80800
wrote 128 bytes: link counters are ' 0 0 1 0 1 22 9395 80800 9185 8445 1274
8190 801.69 23947 25544 67822 0 1274 7'
#$#$#$#$ pcap routine says window increases = 23947, decreases = 25544, no
change = 67822
Read ' 1 0 7 14 398 20 2395 164 447 528 14 25125 141.19 0 0 0 1 0 7' from
monitor pipe
Read ' 0 0 1 0 1 22 9395 80800 9185 8445 1274 8190 801.69 23947 25544 67822
0 1274 7' from monitor pipe
939217 kbps inbound
libweb100: warning: accessing depricated variable AckPktsIn
Variable 0 (AckPktsIn): web100_snap_read(): invalid arguments
libweb100: warning: accessing depricated variable AckPktsOut
Variable 1 (AckPktsOut): web100_snap_read(): invalid arguments
Variable 2 (BytesRetrans): web100_snap_read(): invalid arguments
Variable 3 (CongAvoid): web100_snap_read(): invalid arguments
Variable 4 (CongestionOverCount): web100_snap_read(): invalid arguments
Variable 5 (CongestionSignals): web100_snap_read(): invalid arguments
Variable 6 (CountRTT): web100_snap_read(): invalid arguments
Variable 7 (CurCwnd): web100_snap_read(): invalid arguments
>>> send_msg: type=5, len=13
CurMSS: 1448
Variable 9 (CurRTO): web100_snap_read(): invalid arguments
Variable 10 (CurRwinRcvd): web100_snap_read(): invalid arguments
Variable 11 (CurRwinSent): web100_snap_read(): invalid arguments
Variable 12 (CurSsthresh): web100_snap_read(): invalid arguments
Variable 13 (CwndRestores) not found in KIS
Variable 14 (DSACKDups): web100_snap_read(): invalid arguments
Variable 15 (DataBytesIn): web100_snap_read(): invalid arguments
Variable 16 (DataBytesOut): web100_snap_read(): invalid arguments
Variable 17 (DataPktsIn): web100_snap_read(): invalid arguments
Variable 18 (DataPktsOut): web100_snap_read(): invalid arguments
Variable 19 (DupAcksIn): web100_snap_read(): invalid arguments
Variable 20 (ECNEnabled): web100_snap_read(): invalid arguments
Variable 21 (FastRetran): web100_snap_read(): invalid arguments
Variable 22 (MaxCaCwnd) not found in KIS
Variable 23 (MaxCwnd): web100_snap_read(): invalid arguments
Variable 24 (MaxMSS): web100_snap_read(): invalid arguments
Variable 25 (MaxRTO): web100_snap_read(): invalid arguments
Variable 26 (MaxRTT): web100_snap_read(): invalid arguments
Variable 27 (MaxRwinRcvd): web100_snap_read(): invalid arguments
Variable 28 (MaxRwinSent): web100_snap_read(): invalid arguments
Variable 29 (MaxSsthresh): web100_snap_read(): invalid arguments
Variable 30 (MaxSaCwnd) not found in KIS
Variable 31 (MinMSS): web100_snap_read(): invalid arguments
Variable 32 (MinRTO): web100_snap_read(): invalid arguments
Variable 33 (MinRTT): web100_snap_read(): invalid arguments
Variable 34 (MinRwinRcvd): web100_snap_read(): invalid arguments
Variable 35 (MinRwinSent): web100_snap_read(): invalid arguments
Variable 36 (NagleEnabled): web100_snap_read(): invalid arguments
Variable 37 (OtherReductions): web100_snap_read(): invalid arguments
Variable 38 (PktsIn): web100_snap_read(): invalid arguments
Variable 39 (PktsOut): web100_snap_read(): invalid arguments
Variable 40 (PktsRetrans): web100_snap_read(): invalid arguments
>>> send_msg: type=5, len=16
X_Rcvbuf: 87380
Variable 42 (RcvWinScale): web100_snap_read(): invalid arguments
Variable 43 (SACKEnabled): web100_snap_read(): invalid arguments
Variable 44 (SACKsRcvd): web100_snap_read(): invalid arguments
Variable 45 (SendStall): web100_snap_read(): invalid arguments
Variable 46 (SlowStart): web100_snap_read(): invalid arguments
Variable 47 (SampleRTT): web100_snap_read(): invalid arguments
Variable 48 (SmoothedRTT): web100_snap_read(): invalid arguments
>>> send_msg: type=5, len=18
X_Sndbuf: 4194304
Variable 50 (SndWinScale): web100_snap_read(): invalid arguments
Variable 51 (SndLimTimeRwin): web100_snap_read(): invalid arguments
Variable 52 (SndLimTimeCwnd): web100_snap_read(): invalid arguments
Variable 53 (SndLimTimeSender): web100_snap_read(): invalid arguments
Variable 54 (SndLimTransRwin): web100_snap_read(): invalid arguments
Variable 55 (SndLimTransCwnd): web100_snap_read(): invalid arguments
Variable 56 (SndLimTransSender): web100_snap_read(): invalid arguments
Variable 57 (SndLimBytesRwin): web100_snap_read(): invalid arguments
Variable 58 (SndLimBytesCwnd): web100_snap_read(): invalid arguments
Variable 59 (SndLimBytesSender): web100_snap_read(): invalid arguments
Variable 60 (SubsequentTimeouts): web100_snap_read(): invalid arguments
Variable 61 (SumRTT): web100_snap_read(): invalid arguments
Variable 62 (Timeouts): web100_snap_read(): invalid arguments
Variable 63 (TimestampsEnabled): web100_snap_read(): invalid arguments
Variable 64 (WinScaleRcvd): web100_snap_read(): invalid arguments
Variable 65 (WinScaleSent): web100_snap_read(): invalid arguments
Variable 66 (DupAcksOut): web100_snap_read(): invalid arguments
Variable 67 (StartTimeUsec): web100_snap_read(): invalid arguments
Variable 68 (Duration): web100_snap_read(): invalid arguments
>>> send_msg: type=5, len=18
AckPktsIn: 117313
>>> send_msg: type=5, len=14
AckPktsOut: 0
>>> send_msg: type=5, len=20
BytesRetrans: 34080
>>> send_msg: type=5, len=13
CongAvoid: 0
>>> send_msg: type=5, len=23
CongestionOverCount: 0
>>> send_msg: type=5, len=21
CongestionSignals: 4
>>> send_msg: type=5, len=17
CountRTT: 116040
>>> send_msg: type=5, len=17
CurCwnd: 2659976
Variable 8 (CurMSS): web100_snap_read(): invalid arguments
>>> send_msg: type=5, len=12
CurRTO: 223
>>> send_msg: type=5, len=21
CurRwinRcvd: 3137536
>>> send_msg: type=5, len=18
CurRwinSent: 5888
>>> send_msg: type=5, len=21
CurSsthresh: 2237160
Variable 13 (CwndRestores) not found in KIS
>>> send_msg: type=5, len=13
DSACKDups: 0
>>> send_msg: type=5, len=15
DataBytesIn: 0
>>> send_msg: type=5, len=25
DataBytesOut: 1175535232
>>> send_msg: type=5, len=14
DataPktsIn: 0
>>> send_msg: type=5, len=20
DataPktsOut: 811304
>>> send_msg: type=5, len=16
DupAcksIn: 1274
>>> send_msg: type=5, len=14
ECNEnabled: 0
>>> send_msg: type=5, len=14
FastRetran: 4
Variable 22 (MaxCaCwnd) not found in KIS
>>> send_msg: type=5, len=17
MaxCwnd: 3207320
>>> send_msg: type=5, len=13
MaxMSS: 1448
>>> send_msg: type=5, len=12
MaxRTO: 227
>>> send_msg: type=5, len=11
MaxRTT: 27
>>> send_msg: type=5, len=21
MaxRwinRcvd: 3145728
>>> send_msg: type=5, len=18
MaxRwinSent: 5888
>>> send_msg: type=5, len=21
MaxSsthresh: 2506488
Variable 30 (MaxSaCwnd) not found in KIS
>>> send_msg: type=5, len=13
MinMSS: 1448
>>> send_msg: type=5, len=12
MinRTO: 201
>>> send_msg: type=5, len=10
MinRTT: 0
>>> send_msg: type=5, len=19
MinRwinRcvd: 17920
>>> send_msg: type=5, len=18
MinRwinSent: 5792
>>> send_msg: type=5, len=16
NagleEnabled: 1
>>> send_msg: type=5, len=19
OtherReductions: 8
>>> send_msg: type=5, len=15
PktsIn: 117313
>>> send_msg: type=5, len=16
PktsOut: 811304
>>> send_msg: type=5, len=16
PktsRetrans: 26
Variable 41 (X_Rcvbuf): web100_snap_read(): invalid arguments
>>> send_msg: type=5, len=15
RcvWinScale: 7
>>> send_msg: type=5, len=15
SACKEnabled: 3
>>> send_msg: type=5, len=16
SACKsRcvd: 1289
>>> send_msg: type=5, len=13
SendStall: 0
>>> send_msg: type=5, len=13
SlowStart: 0
>>> send_msg: type=5, len=14
SampleRTT: 23
>>> send_msg: type=5, len=16
SmoothedRTT: 23
Variable 49 (X_Sndbuf): web100_snap_read(): invalid arguments
>>> send_msg: type=5, len=15
SndWinScale: 7
>>> send_msg: type=5, len=22
SndLimTimeRwin: 88949
>>> send_msg: type=5, len=23
SndLimTimeCwnd: 229092
>>> send_msg: type=5, len=26
SndLimTimeSender: 9758371
>>> send_msg: type=5, len=21
SndLimTransRwin: 464
>>> send_msg: type=5, len=22
SndLimTransCwnd: 2382
>>> send_msg: type=5, len=24
SndLimTransSender: 2815
>>> send_msg: type=5, len=26
SndLimBytesRwin: 17080304
>>> send_msg: type=5, len=27
SndLimBytesCwnd: 125957144
>>> send_msg: type=5, len=30
SndLimBytesSender: 1032497784
>>> send_msg: type=5, len=22
SubsequentTimeouts: 0
>>> send_msg: type=5, len=16
SumRTT: 2629524
>>> send_msg: type=5, len=12
Timeouts: 0
>>> send_msg: type=5, len=21
TimestampsEnabled: 1
>>> send_msg: type=5, len=16
WinScaleRcvd: 7
>>> send_msg: type=5, len=16
WinScaleSent: 7
>>> send_msg: type=5, len=14
DupAcksOut: 0
>>> send_msg: type=5, len=22
StartTimeUsec: 859600
>>> send_msg: type=5, len=19
Duration: 10079341
Finished reading pkt-pair data from network, process 18194 should terminate
now
Signal 11 received by process 18194
DEBUG, caught SIGSEGV signal and terminated process (18194)
Signal 17 received by process 18187
Protocol error!
>>> send_msg: type=7, len=61
S2C throughput test FAILED!
Finished testing C2S = 938.70 Mbps, S2C = 0.00 Mbps
Client --> Server data detects link = OC-12
Client <-- Server Ack's detect link = Gigabit Ethernet
Server --> Client data detects link = OC-12
Server <-- Client Ack's detect link = Gigabit Ethernet
CWND limited test = 47781.00 while unlimited = 0.00
Better throughput when CWND is limited, may be duplex mismatch
>>> send_msg: type=8, len=42
>>> send_msg: type=8, len=74
>>> send_msg: type=8, len=86
>>> send_msg: type=8, len=79
>>> send_msg: type=8, len=84
>>> send_msg: type=8, len=53
>>> send_msg: type=9, len=0
Opened
'/usr/local/ndt/serverdata/2009/10/07/20091007T17:12:09.743194000Z_132.239.252.252:44140.meta'
metadata log file
Updating admin_view variables: Total count = 35
Initial counter Values Totalcnt = 35, Total Mismatch = 6, Total Bad Cables = 0
Updated counter values Totalcnt = 36, Total Mismatch = 6, Total Bad Cables = 0
Individual counts = [11, 0, 0, 0, 0, 0, 0, 19, 0, 0, 6, 0, 0, 0, 0, 0]
Signal 17 received by process 18187
successfully locked '/tmp/view.string' for updating
sending '3228882,0,16356807,0,36,6,0,11,0,0,0,0,0,0,19,0,0,6,0,0,0,0,0,Oct 6
20:53:12,Oct 7 17:12:09' to tmp file
Successfully returned from run_test() routine
Signal 17 received by process 18182
now = 1254935557 Process started at 1254935529, run time = 28
Select exited with rc = -1
Queue pointer = 18187, testing = 1, waiting = 1, zombie_check = 0
Received SIGCHLD signal for active web100srv process [18182]
wait3() returned 0 for PID=18187
wexitstatus = '0'
Attempting to clean up child 18187, head pid = 18187
Child process 18187 causing head pointer modification
Removing Child from head, decrementing waiting now = 0
Timer not running, waiting for new connection






Archive powered by MHonArc 2.6.16.

Top of Page