Ви не можете вибрати більше 25 тем Теми мають розпочинатися з літери або цифри, можуть містити дефіси (-) і не повинні перевищувати 35 символів.

1300 lines
44KB

  1. #!/usr/bin/env python3
  2. # Master: ptpd -i {PTP Interface des Masters} -M -u {IP des Slaves}
  3. # Slave: ptpd -i {PTP Interface des Slaves} -s -u {IP des Masters}
  4. import json
  5. import requests
  6. import os
  7. import re
  8. import socket
  9. import subprocess
  10. import asyncio
  11. import serial
  12. from argparse import ArgumentParser
  13. from datetime import datetime
  14. from threading import Thread
  15. from time import sleep
  16. # {} for interface
  17. GET_IPV4_SHELL_COMMAND = "ip a | grep {} | grep inet | cut -d' ' -f6 | cut -d'/' -f1"
  18. NR_CQI_COMMAND = b'AT+QNWCFG="nr5g_csi"\r\n'
  19. NR_SERVINGCELL_COMMAND = b'AT+QENG="servingcell"\r\n'
  20. NR_EN_DC_STATUS_COMMAND = b"AT+QENDC\r\n"
  21. NR_SERIAL_RESPOND_TIME = 0.5 # s
  22. CMD_TIME_EPOCH = "date +%s"
  23. TIMEOUT_OFFSET = 10.0
  24. WAIT_AFTER_IPERF = 5.0
  25. modem_serial_obj = None
  26. gps_serial_obj = None
  27. class ProcessHandler:
  28. def __init__(self):
  29. self.processList = []
  30. def add_process(self, process, logfile=None):
  31. if logfile is not None:
  32. self.processList.append(dict(process=process, logfile=logfile))
  33. else:
  34. self.processList.append(process)
  35. def kill_all(self):
  36. for p in self.processList:
  37. if isinstance(p, dict):
  38. p["logfile"].close()
  39. p["process"].kill()
  40. else:
  41. p.kill()
  42. def parse_var(s):
  43. """
  44. Parse a key, value pair, separated by '='
  45. That's the reverse of ShellArgs.
  46. On the command line (argparse) a declaration will typically look like:
  47. foo=hello
  48. or
  49. foo="hello world"
  50. """
  51. items = s.split("=")
  52. key = items[0].strip() # we remove blanks around keys, as is logical
  53. value = ""
  54. if len(items) > 1:
  55. # rejoin the rest:
  56. value = "=".join(items[1:])
  57. return (key, value)
  58. def parse_vars(items):
  59. """
  60. Parse a series of key-value pairs and return a dictionary
  61. """
  62. d = {}
  63. if items:
  64. for item in items:
  65. key, value = parse_var(item)
  66. d[key] = value
  67. return d
  68. def write_to_file(filepath, content, overwrite=False):
  69. mode = None
  70. if overwrite:
  71. mode = "w"
  72. else:
  73. mode = "a"
  74. try:
  75. f = open(filepath, mode)
  76. f.write(content)
  77. f.close()
  78. except IOError:
  79. print_message("ERROR: Could not write to file: {}".format(filepath))
  80. # For none blocking filewrite
  81. def background_write_to_file(filepath, content, overwrite=False):
  82. thread = Thread(
  83. target=write_to_file,
  84. args=(
  85. filepath,
  86. content,
  87. overwrite,
  88. ),
  89. )
  90. thread.start()
  91. def execute_tcp_dump(processHandler, interface, outputfile, ws_filter, flags=[]):
  92. cmd = ["tcpdump", "-i" + interface, "-U", "-w", outputfile, ws_filter]
  93. if len(flags) > 0:
  94. # insert after -U
  95. n = 3
  96. for flag in flags:
  97. cmd.insert(n, flag)
  98. n += 1
  99. process = subprocess.Popen(cmd, stdout=subprocess.PIPE)
  100. processHandler.add_process(process)
  101. def save_tcp_trace(processHandler, filename, sender_ip, port):
  102. cmd_uptime = ["cat", "/proc/uptime"]
  103. logfile = open(filename, "a")
  104. subprocess.call(cmd_uptime, stdout=logfile)
  105. # /sys/kernel/debug/tracing/events/tcp/tcp_probe/enable
  106. cmd = ["cat", "/sys/kernel/debug/tracing/trace_pipe"]
  107. process = subprocess.Popen(cmd, stdout=logfile)
  108. processHandler.add_process(process, logfile=logfile)
  109. def get_ip_from_interface(interface):
  110. c = GET_IPV4_SHELL_COMMAND.format(interface)
  111. ip = (
  112. subprocess.check_output(c, shell=True)
  113. .decode("utf-8")
  114. .replace(" ", "")
  115. .replace("\n", "")
  116. )
  117. return ip
  118. def config2json(args):
  119. config = vars(args).copy()
  120. # parse the key-value pairs from set arg
  121. set_args = parse_vars(args.set)
  122. config["set"] = set_args
  123. # delete not used keys
  124. del config["interface"]
  125. del config["server"]
  126. del config["client"]
  127. del config["folder"]
  128. return bytes(json.dumps(config), "utf-8")
  129. def json2config(json_string):
  130. return json.loads(json_string)
  131. def print_message(m):
  132. print("[{}]\t{}".format(datetime.now().strftime("%Y-%m-%d %H:%M:%S"), m))
  133. def deactivate_hystart():
  134. print_message("Deactivate HyStart")
  135. os.system('echo "0" > /sys/module/tcp_cubic/parameters/hystart')
  136. def activate_hystart():
  137. print_message("Activate HyStart")
  138. os.system('echo "1" > /sys/module/tcp_cubic/parameters/hystart')
  139. def is_hystart_activated():
  140. return (
  141. int(
  142. subprocess.check_output(
  143. "cat /sys/module/tcp_cubic/parameters/hystart", shell=True
  144. )
  145. )
  146. == 1
  147. )
  148. def is_tcp_probe_enabled():
  149. return (
  150. int(
  151. subprocess.check_output(
  152. "cat /sys/kernel/debug/tracing/events/tcp/tcp_probe/enable", shell=True
  153. )
  154. )
  155. == 1
  156. )
  157. def disable_tso(interface):
  158. os.system("ethtool -K {} tx off sg off tso off gro off".format(interface))
  159. def enable_tcp_probe():
  160. os.system("echo '1' > /sys/kernel/debug/tracing/events/tcp/tcp_probe/enable")
  161. def set_default_receive_window():
  162. print_message("Set receive window to default values")
  163. os.system('echo "212992" > /proc/sys/net/core/rmem_max')
  164. os.system('echo "212992" > /proc/sys/net/core/rmem_default')
  165. os.system('echo "4096 131072 6291456" > /proc/sys/net/ipv4/tcp_rmem')
  166. def raise_receive_window():
  167. print_message("Multiply receive windows by factor 10")
  168. os.system('echo "2129920" > /proc/sys/net/core/rmem_max')
  169. os.system('echo "2129920" > /proc/sys/net/core/rmem_default')
  170. os.system('echo "40960 1310720 62914560" > /proc/sys/net/ipv4/tcp_rmem')
  171. def monitor_serial(ser, output_file):
  172. run_cmds = [NR_CQI_COMMAND, NR_SERVINGCELL_COMMAND, NR_EN_DC_STATUS_COMMAND]
  173. try:
  174. while ser.is_open:
  175. response = subprocess.check_output(CMD_TIME_EPOCH, shell=True).decode(
  176. "utf-8"
  177. )
  178. for cmd in run_cmds:
  179. ser.write(cmd)
  180. sleep(NR_SERIAL_RESPOND_TIME)
  181. response += ser.read(ser.inWaiting()).decode("utf-8")
  182. response = (
  183. response.replace("\n", ";")
  184. .replace("\r", "")
  185. .replace(";;OK", ";")
  186. .replace(";;", ";")
  187. )
  188. write_to_file(output_file, response + "\n")
  189. except:
  190. if not ser.is_open:
  191. print_message("Serial port is closed. Exit monitoring thread.")
  192. else:
  193. print_message(
  194. "Something went wrong while monitoring serial interface. Exit monitoring thread."
  195. )
  196. return
  197. def start_serial_monitoring(ser, baudrate, folder, prefix):
  198. global modem_serial_obj
  199. print_message("Opening serial port for {}".format(ser))
  200. modem_serial_obj = serial.Serial(
  201. port=ser,
  202. baudrate=baudrate,
  203. )
  204. modem_serial_obj.isOpen()
  205. ser_filepath = "{}{}_serial_monitor_output.txt".format(
  206. folder, prefix
  207. )
  208. ser_thread = Thread(
  209. target=monitor_serial,
  210. args=(
  211. modem_serial_obj,
  212. ser_filepath,
  213. ),
  214. )
  215. ser_thread.start()
  216. def is_serial_monitoring_running():
  217. return modem_serial_obj.is_open
  218. def start_gps_monitoring(gps, baudrate, folder, prefix):
  219. global gps_serial_obj
  220. print_message("Opening GPS serial port for {}".format(gps))
  221. gps_serial_obj = serial.Serial(
  222. gps,
  223. baudrate=baudrate,
  224. )
  225. gps_ser_filepath = "{}{}_gps.nmea".format(
  226. folder, prefix
  227. )
  228. gps_ser_thread = Thread(
  229. target=monitor_gps,
  230. args=(
  231. gps_serial_obj,
  232. gps_ser_filepath,
  233. ),
  234. )
  235. gps_ser_thread.start()
  236. def monitor_gps(ser, output_file):
  237. ser.flushInput()
  238. ser.flushOutput()
  239. # skip first maybe uncompleted line
  240. ser.readline()
  241. try:
  242. while ser.is_open:
  243. nmea_sentence = ser.readline() # GPRMC
  244. nmea_str = nmea_sentence.decode("utf-8")
  245. if nmea_str.startswith("$GPRMC"):
  246. write_to_file(output_file, nmea_str)
  247. except:
  248. if not ser.is_open:
  249. print_message("GPS serial port is closed. Exit monitoring thread.")
  250. else:
  251. print_message(
  252. "Something went wrong while monitoring GPS serial interface. Exit monitoring thread."
  253. )
  254. return
  255. def connect_moden(provider="telekom"):
  256. print_message("Connect modem with provider {} ...".format(provider))
  257. os.system("/root/connect-modem.py -l {}".format(provider))
  258. print_message("...done")
  259. def reconnect_modem(provider="telekom", hard=False):
  260. global modem_serial_obj
  261. print_message("Reonnect modem with provider {} ...".format(provider))
  262. if hard:
  263. print_message("Performing HARD reconnect...")
  264. try:
  265. if modem_serial_obj.is_open:
  266. modem_serial_obj.write(b'at+COPS?\r\n')
  267. sleep(NR_SERIAL_RESPOND_TIME)
  268. modem_serial_obj.write(b'AT+QENG="servingcell"\r\n')
  269. sleep(NR_SERIAL_RESPOND_TIME)
  270. except:
  271. if not modem_serial_obj.is_open:
  272. print_message("Serial port is closed.")
  273. else:
  274. print_message(
  275. "Something went wrong while writing to serial."
  276. )
  277. else:
  278. os.system("/root/connect-modem.py -s")
  279. sleep(5)
  280. os.system("/root/connect-modem.py -l {}".format(provider))
  281. print_message("...done")
  282. def is_modem_connected():
  283. timeout = 5
  284. try:
  285. request = requests.get("http://130.75.73.69", timeout=timeout)
  286. return True
  287. except (requests.ConnectionError, requests.Timeout) as exception:
  288. pass
  289. return False
  290. class Server:
  291. def __init__(self, config):
  292. self.config = config
  293. def measure(self):
  294. print("Received config:")
  295. print(self.config)
  296. print_message("Start measurement")
  297. if self.config["bandwidth"]:
  298. self.bandwidth()
  299. elif self.config["drx"]:
  300. self.drx()
  301. elif self.config["harq"]:
  302. self.harq()
  303. elif self.config["cbr"]:
  304. self.cbr()
  305. elif self.config["tcp_parallel"]:
  306. self.tcp_parallel_flows()
  307. else:
  308. print_message("Nothing to do on server side.")
  309. def drx(self):
  310. print_message("DRX nothing to do on server side.")
  311. def harq(self):
  312. print_message("HARQ nothing to do on server side.")
  313. def bandwidth(self):
  314. server_is_sender = False
  315. if "server_is_sender" in self.config["set"]:
  316. server_is_sender = self.config["set"]["server_is_sender"]
  317. print_message("Server is sender: {}".format(server_is_sender))
  318. tcp_algo = list()
  319. if "algo" in self.config["set"]:
  320. for s in self.config["set"]["algo"].split(","):
  321. tcp_algo.append(s)
  322. print_message("Using {} for TCP transmissions.".format(s))
  323. else:
  324. tcp_algo.append("cubic")
  325. print_message("Using {} for TCP transmissions.".format(tcp_algo[0]))
  326. alternate_hystart = False
  327. if "alternate_hystart" in self.config["set"]:
  328. if self.config["set"]["alternate_hystart"] == "true":
  329. alternate_hystart = True
  330. time = "10"
  331. if "time" in self.config["set"]:
  332. time = self.config["set"]["time"]
  333. # prevent address already in use
  334. sleep(2)
  335. ws_filter = ""
  336. congestion_control_index = 0
  337. if server_is_sender:
  338. # server sends
  339. if not is_tcp_probe_enabled():
  340. print_message("tcp probe is not enabled!")
  341. enable_tcp_probe()
  342. print_message("tcp probe is now enabled")
  343. for n in range(1, self.config["number_of_measurements"] + 1):
  344. print_message(
  345. "{} of {}".format(n, self.config["number_of_measurements"])
  346. )
  347. print_message(
  348. "Using {} for congestion control".format(
  349. tcp_algo[congestion_control_index]
  350. )
  351. )
  352. iperf_command = [
  353. "iperf3",
  354. "-s",
  355. "--port",
  356. str(self.config["port"]),
  357. "--one-off",
  358. ]
  359. filepath_tcp_trace = "{}{}_bandwidth_reverse_{}_{}_{}.txt".format(
  360. self.config["folder"], self.config["prefix"], "tcp", "tcp_trace", n
  361. )
  362. save_tcp_trace(
  363. processHandler,
  364. filepath_tcp_trace,
  365. self.config["server"],
  366. self.config["port"],
  367. )
  368. subprocess.call(iperf_command)
  369. processHandler.kill_all()
  370. congestion_control_index = (congestion_control_index + 1) % len(
  371. tcp_algo
  372. )
  373. else:
  374. # client sends
  375. ws_filter = "{} and port {}".format("tcp", self.config["port"])
  376. print_message("Use ws filter: {}".format(ws_filter))
  377. name_option = ""
  378. state_counter = 0
  379. for n in range(1, self.config["number_of_measurements"] + 1):
  380. print_message(
  381. "Measurement {} of {}".format(
  382. n, self.config["number_of_measurements"]
  383. )
  384. )
  385. tcpdump_flags = []
  386. if alternate_hystart:
  387. if state_counter == 0:
  388. tcp_algo = "cubic"
  389. raise_receive_window()
  390. name_option = "_cubic_slowstart_raise_"
  391. state_counter = 1
  392. elif state_counter == 1:
  393. tcp_algo = "cubic"
  394. set_default_receive_window()
  395. name_option = "_cubic_hystart_default_"
  396. state_counter = 2
  397. elif state_counter == 2:
  398. tcp_algo = "bbr"
  399. raise_receive_window()
  400. name_option = "_bbr_raise_"
  401. state_counter = 3
  402. elif state_counter == 3:
  403. tcp_algo = "bbr"
  404. set_default_receive_window()
  405. name_option = "_bbr_default_"
  406. state_counter = 0
  407. else:
  408. name_option = ""
  409. filepath = "{}{}{}_bandwidth_{}_{}_{}.pcap".format(
  410. self.config["folder"],
  411. self.config["prefix"],
  412. name_option,
  413. "tcp",
  414. tcp_algo[congestion_control_index],
  415. n,
  416. )
  417. tcpdump_flags.append("-s96")
  418. thread = Thread(
  419. target=execute_tcp_dump,
  420. args=(
  421. processHandler,
  422. args.interface,
  423. filepath,
  424. ws_filter,
  425. tcpdump_flags,
  426. ),
  427. )
  428. thread.start()
  429. sleep(2)
  430. iperf_command = [
  431. "iperf3",
  432. "-s",
  433. "--port",
  434. str(self.config["port"]),
  435. "--one-off",
  436. ]
  437. subprocess.call(iperf_command)
  438. sleep(WAIT_AFTER_IPERF)
  439. processHandler.kill_all()
  440. congestion_control_index = (congestion_control_index + 1) % len(
  441. tcp_algo
  442. )
  443. def cbr(self):
  444. use_reverse_mode = False
  445. if "reverse" in self.config["set"]:
  446. use_reverse_mode = self.config["set"]["reverse"] == "true"
  447. print_message("Use reverse mode: {}".format(use_reverse_mode))
  448. # bitrate is only used for filenames on server side
  449. bitrate = "1M"
  450. if "bitrate" in self.config["set"]:
  451. bitrate = self.config["set"]["bitrate"]
  452. sleep_time = 60.0
  453. if "sleep" in self.config["set"]:
  454. sleep_time = float(self.config["set"]["sleep"])
  455. print_message("Sleep time for each measurement: {}s".format(sleep_time))
  456. # build wireshark filter
  457. if use_reverse_mode:
  458. ws_filter = "{} and src {}".format("udp", self.config["server"])
  459. else:
  460. ws_filter = "{} and dst {} and port {}".format(
  461. "udp", self.config["server"], self.config["port"]
  462. )
  463. print_message("Use ws filter: {}".format(ws_filter))
  464. # build iperf3 command
  465. iperf_command = [
  466. "iperf3",
  467. "-s",
  468. "--port",
  469. str(self.config["port"]),
  470. "--one-off",
  471. ]
  472. for n in range(1, self.config["number_of_measurements"] + 1):
  473. print_message("{} of {}".format(n, self.config["number_of_measurements"]))
  474. sleep(sleep_time)
  475. pcap_filepath = "{}{}_cbr_server_{}_bitrate{}_{}.pcap".format(
  476. self.config["folder"],
  477. self.config["prefix"],
  478. "sender" if use_reverse_mode else "receiver",
  479. bitrate,
  480. n,
  481. )
  482. thread = Thread(
  483. target=execute_tcp_dump,
  484. args=(
  485. processHandler,
  486. self.config["interface"],
  487. pcap_filepath,
  488. ws_filter,
  489. ),
  490. )
  491. thread.start()
  492. sleep(1)
  493. subprocess.call(iperf_command)
  494. sleep(1)
  495. processHandler.kill_all()
  496. def tcp_parallel_flows(self):
  497. # for n in range(1, (self.config["number_of_measurements"] * 2) + 1):
  498. # print_message(
  499. # "Measurement {} of {}".format(
  500. # n, self.config["number_of_measurements"]
  501. # )
  502. # )
  503. sleep(4)
  504. iperf_command = [
  505. "iperf3",
  506. "-s",
  507. "--port",
  508. str(self.config["port"]),
  509. # "--one-off",
  510. ]
  511. subprocess.call(iperf_command)
  512. class Client:
  513. def __init__(self, config):
  514. self.config = config
  515. def measure(self):
  516. print("Config:")
  517. print(self.config)
  518. sleep(1)
  519. print_message("Start measurement")
  520. if self.config["serial"] is not None:
  521. start_serial_monitoring(self.config["serial"], self.config["baudrate"], self.config["folder"], self.config["prefix"])
  522. if self.config["gps"] is not None:
  523. start_gps_monitoring(self.config["gps"], self.config["gps_baudrate"], self.config["folder"], self.config["prefix"])
  524. if self.config["bandwidth"]:
  525. self.bandwidth()
  526. elif self.config["drx"]:
  527. self.drx()
  528. elif self.config["harq"]:
  529. self.harq()
  530. elif self.config["cbr"]:
  531. self.cbr()
  532. elif self.config["tcp_parallel"]:
  533. self.tcp_parallel_flows()
  534. elif self.config["ping"]:
  535. self.ping()
  536. if modem_serial_obj is not None:
  537. print_message("Closing serial port...")
  538. modem_serial_obj.close()
  539. sleep(2)
  540. print_message("done...")
  541. if gps_serial_obj is not None:
  542. print_message("Closing GPS serial port...")
  543. gps_serial_obj.close()
  544. sleep(2)
  545. print_message("done...")
  546. def ping(self):
  547. c = "ping {} -I {} -i {} -c {}".format(
  548. self.config["server"],
  549. self.config["interface"],
  550. 0,
  551. self.config["number_of_measurements"],
  552. )
  553. command = [c]
  554. print_message(
  555. "Start sending {} pings with nog gap.".format(
  556. self.config["number_of_measurements"]
  557. )
  558. )
  559. ping_out = subprocess.check_output(command, shell=True).decode("utf-8")
  560. filepath = "{}{}_ping_no_gap.txt".format(
  561. self.config["folder"], self.config["prefix"]
  562. )
  563. print_message("Write measured pings to: {}".format(filepath))
  564. write_to_file(filepath, ping_out)
  565. def drx(self):
  566. # send ICMP pings to server and increase the gab
  567. # check for set args
  568. if "pre_ping" in self.config["set"]:
  569. is_pre_ping_enabled = (
  570. True if self.config["set"]["pre_ping"] == "true" else False
  571. )
  572. else:
  573. is_pre_ping_enabled = False
  574. if "intervals" in self.config["set"]:
  575. intervals = []
  576. interval_ranges = self.config["set"]["intervals"].split(",")
  577. for interval_range in interval_ranges:
  578. start, end, increase = [float(x) for x in interval_range.split(":")]
  579. curr = start
  580. while curr <= end:
  581. intervals.append(curr)
  582. curr += increase
  583. else:
  584. intervals = []
  585. filepath = "{}{}_ping_drx_raw.txt".format(
  586. self.config["folder"], self.config["prefix"]
  587. )
  588. if is_pre_ping_enabled:
  589. print_message("Send pre pings.")
  590. c = "ping {} -I {} -i {} -c {}".format(
  591. self.config["server"],
  592. self.config["interface"],
  593. intervals[0],
  594. self.config["number_of_measurements"],
  595. )
  596. command = [c]
  597. subprocess.check_output(command, shell=True)
  598. else:
  599. print_message("Preping is disabled. Wait 60s for drx-long-sleep...")
  600. sleep(60)
  601. for i in intervals:
  602. current = i
  603. if not is_pre_ping_enabled:
  604. sleep(current)
  605. c = "echo 'gap={}s' && ping {} -I {} -i {} -c {} && echo ';;;'".format(
  606. current,
  607. self.config["server"],
  608. self.config["interface"],
  609. current,
  610. self.config["number_of_measurements"],
  611. )
  612. command = [c]
  613. print_message("ping with {}s gap".format(current))
  614. background_write_to_file(
  615. filepath,
  616. subprocess.check_output(command, shell=True).decode("utf-8"),
  617. )
  618. # Read raw out and format it to csv
  619. regex = r"gap=(.*)s|64 bytes from (.*\..*\..*\..*) icmp_seq=(\d+) ttl=(\d+) time=(.*) ms"
  620. filepath = "{}{}_ping_drx_raw.txt".format(
  621. self.config["folder"], self.config["prefix"]
  622. )
  623. print_message("Format script output")
  624. f = open(filepath, "r")
  625. raw = f.read()
  626. f.close()
  627. lines = raw.split("\n")
  628. csv_out = "n,gap,rtt\n"
  629. n = 1
  630. gap = ""
  631. for l in lines:
  632. match = re.match(regex, l)
  633. if match:
  634. if match.group(5):
  635. time = match.group(5)
  636. csv_out = csv_out + "{},{},{}\n".format(n, gap, time)
  637. n += 1
  638. else:
  639. gap = match.group(1)
  640. filepath = "{}{}_ping_drx.csv".format(
  641. self.config["folder"], self.config["prefix"]
  642. )
  643. print_message("Write file {}".format(filepath))
  644. write_to_file(filepath, csv_out)
  645. def harq(self):
  646. ws_filter = "tcp[tcpflags] & (tcp-syn) != 0"
  647. print_message("Use ws filter: {}".format(ws_filter))
  648. filepath = "{}{}_{}_tcp_handshakes_http_client.pcap".format(
  649. self.config["folder"],
  650. self.config["prefix"],
  651. self.config["number_of_measurements"],
  652. )
  653. thread = Thread(
  654. target=execute_tcp_dump,
  655. args=(
  656. processHandler,
  657. self.config["interface"],
  658. filepath,
  659. ws_filter,
  660. ),
  661. )
  662. thread.start()
  663. sleep(5)
  664. for n in range(1, self.config["number_of_measurements"] + 1):
  665. print_message("{} of {}".format(n, self.config["number_of_measurements"]))
  666. requests.get("http://{}".format(self.config["server"]))
  667. sleep(5)
  668. processHandler.kill_all()
  669. def bandwidth(self):
  670. server_is_sender = False
  671. if "server_is_sender" in self.config["set"]:
  672. server_is_sender = self.config["set"]["server_is_sender"] == "true"
  673. print_message("Server is sender: {}".format(server_is_sender))
  674. tcp_algo = list()
  675. if "algo" in self.config["set"]:
  676. for s in self.config["set"]["algo"].split(","):
  677. tcp_algo.append(s)
  678. print_message("Using {} for TCP transmissions.".format(s))
  679. else:
  680. tcp_algo.append("cubic")
  681. print_message("Using {} for TCP transmissions.".format(tcp_algo[0]))
  682. alternate_hystart = False
  683. if "alternate_hystart" in self.config["set"]:
  684. if self.config["set"]["alternate_hystart"] == "true":
  685. alternate_hystart = True
  686. print_message("Alternate between HyStart and Slowstart for Cubic.")
  687. time = "10"
  688. if "time" in self.config["set"]:
  689. time = self.config["set"]["time"]
  690. sleep(2)
  691. congestion_control_index = 0
  692. if server_is_sender:
  693. # server is sending
  694. ws_filter = "{} and port {}".format("tcp", self.config["port"])
  695. print_message("Use ws filter: {}".format(ws_filter))
  696. for n in range(1, self.config["number_of_measurements"] + 1):
  697. reconnect_count = 0
  698. if not is_modem_connected():
  699. background_write_to_file(
  700. filepath="{}{}_reconnect.log".format(
  701. self.config["folder"], self.config["prefix"]
  702. ),
  703. content='{}\n'.format(datetime.timestamp(datetime.now())),
  704. )
  705. reconnect_modem()
  706. sleep(2)
  707. if not is_serial_monitoring_running():
  708. start_serial_monitoring()
  709. print_message(
  710. "{} of {}".format(n, self.config["number_of_measurements"])
  711. )
  712. print_message(
  713. "Using {} for congestion control".format(
  714. tcp_algo[congestion_control_index]
  715. )
  716. )
  717. tcpdump_flags = []
  718. filepath = "{}{}_bandwidth_reverse_{}_{}_{}.pcap".format(
  719. self.config["folder"],
  720. self.config["prefix"],
  721. "tcp",
  722. tcp_algo[congestion_control_index],
  723. n,
  724. )
  725. tcpdump_flags.append("-s96")
  726. thread = Thread(
  727. target=execute_tcp_dump,
  728. args=(
  729. processHandler,
  730. self.config["interface"],
  731. filepath,
  732. ws_filter,
  733. tcpdump_flags,
  734. ),
  735. )
  736. thread.start()
  737. sleep(5)
  738. iperf_command = [
  739. "iperf3",
  740. "-c",
  741. self.config["server"],
  742. "-R",
  743. "-t",
  744. time,
  745. "-C",
  746. tcp_algo[congestion_control_index],
  747. ]
  748. is_measurement_done = False
  749. iperf_return = 0
  750. while not is_measurement_done or iperf_return != 0:
  751. if iperf_return != 0:
  752. background_write_to_file(
  753. filepath="{}{}_reconnect.log".format(
  754. self.config["folder"], self.config["prefix"]
  755. ),
  756. content='{}\n'.format(datetime.timestamp(datetime.now())),
  757. )
  758. reconnect_modem(hard=reconnect_count > 5)
  759. reconnect_count += 1
  760. sleep(2)
  761. if not is_serial_monitoring_running():
  762. start_serial_monitoring()
  763. try:
  764. try:
  765. iperf_return = subprocess.call(
  766. iperf_command, timeout=float(time) + TIMEOUT_OFFSET
  767. )
  768. except:
  769. print_message("iPerf timed out...")
  770. background_write_to_file(
  771. filepath="{}{}_reconnect.log".format(
  772. self.config["folder"], self.config["prefix"]
  773. ),
  774. content='{}\n'.format(datetime.timestamp(datetime.now())),
  775. )
  776. reconnect_modem()
  777. except KeyboardInterrupt:
  778. exit()
  779. is_measurement_done = True
  780. sleep(4)
  781. processHandler.kill_all()
  782. congestion_control_index = (congestion_control_index + 1) % len(
  783. tcp_algo
  784. )
  785. else:
  786. # client is sending
  787. state_counter = 0
  788. name_option = ""
  789. if not is_tcp_probe_enabled():
  790. print_message("tcp probe is not enabled!")
  791. enable_tcp_probe()
  792. print_message("tcp probe is now enabled")
  793. for n in range(1, self.config["number_of_measurements"] + 1):
  794. reconnect_count = 0
  795. if not is_modem_connected():
  796. background_write_to_file(
  797. filepath="{}{}_reconnect.log".format(
  798. self.config["folder"], self.config["prefix"]
  799. ),
  800. content='{}\n'.format(datetime.timestamp(datetime.now())),
  801. )
  802. reconnect_modem()
  803. sleep(2)
  804. if not is_serial_monitoring_running():
  805. start_serial_monitoring()
  806. print_message(
  807. "{} of {}".format(n, self.config["number_of_measurements"])
  808. )
  809. iperf_command = ["iperf3", "-c", self.config["server"], "-t", time]
  810. if alternate_hystart:
  811. if state_counter == 0:
  812. tcp_algo = "cubic"
  813. deactivate_hystart()
  814. name_option = "_cubic_slowstart_raise_"
  815. state_counter = 1
  816. elif state_counter == 1:
  817. tcp_algo = "cubic"
  818. activate_hystart()
  819. name_option = "_cubic_hystart_default_"
  820. state_counter = 2
  821. elif state_counter == 2:
  822. tcp_algo = "bbr"
  823. deactivate_hystart()
  824. name_option = "_bbr_raise_"
  825. state_counter = 3
  826. elif state_counter == 3:
  827. tcp_algo = "bbr"
  828. activate_hystart()
  829. name_option = "_bbr_default_"
  830. state_counter = 0
  831. iperf_command.append("-C")
  832. iperf_command.append(tcp_algo[congestion_control_index])
  833. filepath_tcp_trace = "{}{}_bandwidth_{}_{}_{}.txt".format(
  834. self.config["folder"], self.config["prefix"], "tcp", "tcp_trace", n
  835. )
  836. save_tcp_trace(
  837. processHandler,
  838. filepath_tcp_trace,
  839. self.config["client"],
  840. self.config["port"],
  841. )
  842. sleep(2)
  843. is_measurement_done = False
  844. iperf_return = 0
  845. while not is_measurement_done or iperf_return != 0:
  846. if iperf_return != 0:
  847. background_write_to_file(
  848. filepath="{}{}_reconnect.log".format(
  849. self.config["folder"], self.config["prefix"]
  850. ),
  851. content='{}\n'.format(datetime.timestamp(datetime.now())),
  852. )
  853. reconnect_modem(hard=reconnect_count > 5)
  854. reconnect_count += 1
  855. sleep(2)
  856. if not is_serial_monitoring_running():
  857. start_serial_monitoring()
  858. try:
  859. try:
  860. iperf_return = subprocess.call(
  861. iperf_command, timeout=float(time) + TIMEOUT_OFFSET
  862. )
  863. except:
  864. print_message("iPerf timed out...")
  865. background_write_to_file(
  866. filepath="{}{}_reconnect.log".format(
  867. self.config["folder"], self.config["prefix"]
  868. ),
  869. content='{}\n'.format(datetime.timestamp(datetime.now())),
  870. )
  871. reconnect_modem()
  872. except KeyboardInterrupt:
  873. exit()
  874. is_measurement_done = True
  875. processHandler.kill_all()
  876. congestion_control_index = (congestion_control_index + 1) % len(
  877. tcp_algo
  878. )
  879. sleep(WAIT_AFTER_IPERF + 2)
  880. def cbr(self):
  881. bitrate = "1M"
  882. if "bitrate" in self.config["set"]:
  883. bitrate = self.config["set"]["bitrate"]
  884. print("Set bitrate to {}.".format(bitrate))
  885. time = "2"
  886. if "time" in self.config["set"]:
  887. time = self.config["set"]["time"]
  888. use_reverse_mode = False
  889. if "reverse" in self.config["set"]:
  890. use_reverse_mode = self.config["set"]["reverse"] == "true"
  891. print_message("Use reverse mode: {}".format(use_reverse_mode))
  892. sleep_time = 60.0
  893. if "sleep" in self.config["set"]:
  894. sleep_time = float(self.config["set"]["sleep"])
  895. print_message("Sleep time for each measurement: {}s".format(sleep_time))
  896. # build wireshark filter
  897. if use_reverse_mode:
  898. ws_filter = "{} and dst {}".format("udp", self.config["client"])
  899. else:
  900. ws_filter = "{} and src {} and port {}".format(
  901. "udp", self.config["client"], self.config["port"]
  902. )
  903. print_message("Use ws filter: {}".format(ws_filter))
  904. # build iperf3 command
  905. iperf_command = [
  906. "iperf3",
  907. "-c",
  908. self.config["server"],
  909. "-t",
  910. time,
  911. "--udp",
  912. "-b",
  913. bitrate,
  914. ]
  915. if use_reverse_mode:
  916. iperf_command.append("-R")
  917. for n in range(1, self.config["number_of_measurements"] + 1):
  918. print_message("{} of {}".format(n, self.config["number_of_measurements"]))
  919. sleep(sleep_time)
  920. pcap_filepath = "{}{}_cbr_client_{}_bitrate{}_{}.pcap".format(
  921. self.config["folder"],
  922. self.config["prefix"],
  923. "receiver" if use_reverse_mode else "sender",
  924. bitrate,
  925. n,
  926. )
  927. thread = Thread(
  928. target=execute_tcp_dump,
  929. args=(
  930. processHandler,
  931. self.config["interface"],
  932. pcap_filepath,
  933. ws_filter,
  934. ),
  935. )
  936. thread.start()
  937. sleep(2)
  938. subprocess.call(iperf_command)
  939. sleep(2)
  940. processHandler.kill_all()
  941. def tcp_parallel_flows(self):
  942. tcp_algo = "cubic"
  943. if "algo" in self.config["set"]:
  944. tcp_algo = self.config["set"]["algo"]
  945. print_message("Using {} for tcp.".format(tcp_algo))
  946. time = "12"
  947. if "time" in self.config["set"]:
  948. time = self.config["set"]["time"]
  949. start = "1"
  950. if "start" in self.config["set"]:
  951. start = self.config["set"]["start"]
  952. end = "2"
  953. if "end" in self.config["set"]:
  954. end = self.config["set"]["end"]
  955. # build flow seq
  956. flows = []
  957. runs = []
  958. for i in range(int(start), int(end) + 1):
  959. flows.append(i)
  960. flows.append(i)
  961. for i in range(1, self.config["number_of_measurements"] + 1):
  962. runs.append(i)
  963. runs.append(i)
  964. print_message(
  965. "{} to {} flows, with {} runs.".format(
  966. start, end, self.config["number_of_measurements"]
  967. )
  968. )
  969. sleep(5)
  970. for flow in flows:
  971. for run in runs:
  972. if tcp_algo == "cubic":
  973. tcp_algo = "bbr"
  974. else:
  975. tcp_algo = "cubic"
  976. filepath = "{}{}_{}parallel_tcp_{}_flows_{}.txt".format(
  977. self.config["folder"], self.config["prefix"], flow, tcp_algo, run
  978. )
  979. c = "iperf3 -c {} -t {} -C {} -P {}".format(
  980. self.config["server"], time, tcp_algo, flow
  981. )
  982. iperf_command = [c]
  983. print_message("{} parallel {} flows".format(flow, tcp_algo))
  984. retry = True
  985. while retry:
  986. try:
  987. out = subprocess.check_output(iperf_command, shell=True).decode(
  988. "utf-8"
  989. )
  990. write_to_file(filepath, out)
  991. retry = False
  992. except:
  993. print("iPerf Error.\t{}".format(iperf_command))
  994. sleep(1)
  995. if retry:
  996. print_message("Retry in 5s")
  997. sleep(5)
  998. async def start_server(args):
  999. # get configuration from client
  1000. print_message("Start Server")
  1001. config = None
  1002. ip = get_ip_from_interface(args.interface)
  1003. s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
  1004. s.setblocking(True)
  1005. s.bind((ip, args.port))
  1006. s.listen(1)
  1007. conn, addr = s.accept()
  1008. print_message("Got connection from {}".format(addr))
  1009. while True:
  1010. data = conn.recv(1024)
  1011. if not data:
  1012. break
  1013. config = json2config(data.decode("utf-8"))
  1014. conn.close()
  1015. s.close()
  1016. # add interface and ip to config
  1017. config["interface"] = args.interface
  1018. config["client"] = addr[0]
  1019. config["server"] = ip
  1020. config["folder"] = args.folder
  1021. server = Server(config)
  1022. server.measure()
  1023. async def start_client(args):
  1024. if not is_modem_connected():
  1025. connect_moden()
  1026. s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
  1027. s.connect((args.client, args.port))
  1028. s.send(config2json(args))
  1029. s.close()
  1030. print("Config send.")
  1031. # overwrite ip
  1032. config = vars(args).copy()
  1033. config["server"] = args.client
  1034. config["client"] = get_ip_from_interface(args.interface)
  1035. new_set = dict()
  1036. if config["set"] is not None:
  1037. for pair in config["set"]:
  1038. tmp = pair.split("=")
  1039. new_set[tmp[0]] = tmp[1]
  1040. config["set"] = new_set
  1041. client = Client(config)
  1042. client.measure()
  1043. if __name__ == "__main__":
  1044. now = datetime.now()
  1045. processHandler = ProcessHandler()
  1046. parser = ArgumentParser()
  1047. # common arguments
  1048. # required
  1049. parser.add_argument("-i", "--interface", required=True, help="Interface.")
  1050. # optional
  1051. parser.add_argument("-p", "--port", default=5201, type=int, help="Port.")
  1052. parser.add_argument(
  1053. "-f",
  1054. "--folder",
  1055. default=os.path.dirname(os.path.realpath(__file__)) + "/",
  1056. help="Folder for the pcap files.",
  1057. )
  1058. # server exclusive arguments
  1059. parser.add_argument(
  1060. "-s",
  1061. "--server",
  1062. action="store_true",
  1063. default=False,
  1064. help="Starts the script in server mode.",
  1065. )
  1066. # client exclusive arguments
  1067. parser.add_argument(
  1068. "-c",
  1069. "--client",
  1070. default=None,
  1071. help="Start in client mode and set the server IPv4 address.",
  1072. )
  1073. parser.add_argument(
  1074. "--prefix", default=now.strftime("%Y-%m-%d"), help="Prefix on filename."
  1075. )
  1076. parser.add_argument(
  1077. "--set",
  1078. metavar="KEY=VALUE",
  1079. nargs="+",
  1080. help="Set a number of key-value pairs "
  1081. "(do not put spaces before or after the = sign). "
  1082. "If a value contains spaces, you should define "
  1083. "it with double quotes: "
  1084. 'foo="this is a sentence". Note that '
  1085. "values are always treated as strings.",
  1086. )
  1087. parser.add_argument(
  1088. "-n",
  1089. "--number_of_measurements",
  1090. type=int,
  1091. default=10,
  1092. help="Number of measurements",
  1093. )
  1094. parser.add_argument(
  1095. "--ping",
  1096. action="store_true",
  1097. default=False,
  1098. help="Sending ICMP pings.",
  1099. )
  1100. parser.add_argument(
  1101. "--bandwidth",
  1102. action="store_true",
  1103. default=False,
  1104. help="Measure greedy tcp throughput with iperf3."
  1105. "Use the --set flag for: "
  1106. "server_is_sender=false if enable server is sending."
  1107. "algo=cubic set tcp algorithm. Can be a comma separated string for multiple congestion control algorithms."
  1108. "alternate_hystart=false if enabled alternate reproduce every Cubic measurement wicht and without HyStart (Also raises the receive window.). "
  1109. "time=10 length of transmission in seconds.",
  1110. )
  1111. parser.add_argument(
  1112. "--tcp_parallel",
  1113. action="store_true",
  1114. default=False,
  1115. help="Measure greedy tcp throughput with parallel tcp flows. Alternate between bbr and cubic."
  1116. "Use the --set flag for: "
  1117. "start=1 Start value for flows "
  1118. "end=2 End value for flows "
  1119. "time=12 transmission time. ",
  1120. )
  1121. parser.add_argument(
  1122. "--cbr",
  1123. action="store_true",
  1124. default=False,
  1125. help="Measure Udp CBR traffic."
  1126. "Use the --set flag for: "
  1127. "reverse=false enable reverse mode. Server is sending. "
  1128. "bitrate=1M target bitrate in bits/sec (0 for unlimited) "
  1129. "[KMG] indicates options that support a K/M/G suffix for kilo-, mega-, or giga-. "
  1130. "time=2 time in seconds to transmit for. "
  1131. "sleep=60 sleep before each cbr traffic in seconds. ",
  1132. )
  1133. parser.add_argument(
  1134. "--drx",
  1135. action="store_true",
  1136. default=False,
  1137. help="Measure RTTs with ping tool. To detect DRX cycles. "
  1138. "Use the --set flag for: "
  1139. "intervals=start:end:increase,start2:end2:increase2... set intervals for gaps, end is inclusive, "
  1140. "values in [s]. At least one interval is required. E.g.: 0:3:1 creates values [0,1,2,3]"
  1141. "pre_ping=false if enabled pings are send before measurements to set device in continuous reception mode. ",
  1142. )
  1143. parser.add_argument(
  1144. "--harq",
  1145. action="store_true",
  1146. default=False,
  1147. help="Captures http transmissions on client side.",
  1148. )
  1149. parser.add_argument(
  1150. "--serial",
  1151. default=None,
  1152. help="Serial device e.g. /dev/ttyUSB2",
  1153. )
  1154. parser.add_argument(
  1155. "--baudrate",
  1156. default=115200,
  1157. type=int,
  1158. help="Serial device baudrate",
  1159. )
  1160. parser.add_argument(
  1161. "--gps",
  1162. default=None,
  1163. help="GPS serial device e.g. /dev/serial/by-id/usb-u-blox_AG_-_www.u-blox.com_u-blox_5_-_GPS_Receiver-if00",
  1164. )
  1165. parser.add_argument(
  1166. "--gps_baudrate",
  1167. default=38400,
  1168. type=int,
  1169. help="GPS serial device baudrate",
  1170. )
  1171. args = parser.parse_args()
  1172. disable_tso(args.interface)
  1173. if args.server:
  1174. asyncio.run(start_server(args))
  1175. elif args.client is not None:
  1176. asyncio.run(start_client(args))