The sys admin's daily grind – Trickle
If your data traffic suffers from congestion at times, don't worry. Now you can shoot down programs that are heavy on traffic to free up the inflow and outflow.
I am over 40 years old and am starting to mellow in my old age. No, I'm only joking; certain phenomena still drive me up the wall. For example, when I am using SSH on a server to edit a configuration file and the bandwidth is so pathetic that the landing zone is a matter of luck when you try to position the cursor – that really makes me mad.
I know, I know, today even a line to a Black Forest village has enough bandwidth for an SSH connection, if you have exclusive access. Because hell, as Sartre already knew, is other people: In my case, it's the HTTP connections that are pushing my poor little SSH to the edge. I could turn to Mosh , but that helps with shaky connections rather than crowded lines. My remedy for traffic jams goes by the name of trickle  .
This traffic-shaping tool uses
LD_PRELOAD to redirect some standard library calls, such as
socket() and therefore only works with dynamically linked binaries. However, that practically includes all programs that the typical user deploys to eat up bandwidth. In the simplest case, I might even be one of these users myself; then, I can practice self-restraint when calling traffic-producing programs. To this end, I can start Firefox, for example, with:
trickle -u 32 -d 256 firefox
This command limits the upload speed (
-u) to 100KBps and the download speed (
-d) to 300KBps. Beware: These are actually kilobytes, not bits. I can also reduce speed in one direction only, if I am not worried about the other direction. Figure 1 shows the successful application of a download limit to 2Mbps.
Trickle's boons naturally only occur to me when the download is already running and the SSH session hangs. Luckily, trickle has a daemon mode. Therefore, I launch trickle when I boot the machine with
trickled -u 32 -d 256
Of course, the values must be adapted to match the available bandwidth. When launched, the trickle daemon searches for
/etc/trickled.conf, which can look like Listing 1. It assigns certain protocols a priority and does some tweaking.
[ssh] Priority = 1 Time-Smoothing = 0.1 Length-Smoothing = 1 [ftp] Priority = 5 Time-Smoothing=3 Length-Smoothing=5 [www] Priority = 10 Time-Smoothing = 8 Length-Smoothing = 10
The values that follow
Length-Smoothing determine how great the fluctuations can be over a certain interval. The smaller the value, the greater the benefits are for interactive protocols such as SSH. With larger values, sometimes a major outlier is permissible in both upward and downward directions. Trickle has some disadvantages compared with real traffic shaping, but it's fine for home use – maybe I really am getting soft.
- "Charly's Column: Mosh" by Charly Kühnast. Linux Magazine, November 2013, pg. 46: http://www.linuxpromagazine.com/Issues/2013/156/Charly-s-Column-Mosh
- Trickle: http://monkey.org/~marius/pages/?page=trickle
- "Traffic shaping with Trickle" by Oliver Frommel. Linux Magazine, January 2006, pg. 70: http://www.linux-magazine.com/Issues/2006/62/Traffic-shaping-with-Trickle
Buy this article as PDF
A new study says it is possible to unmask 81% of TOR users.
Redmond joins the revolution by turning the .NET Core Runtime into a GitHub project.
Users only had 7 hours to update before the intrusions started.
It's official: The new web arrives
Kernel king admits his tone has alienated volunteers, but says the demands of the process require directness.
New flaw in an old encryption scheme leaves the experts scrambling to disable SSL 3
Lennart Poettering wants to change the way Linux developers talk to each other.
Enterprise giant frees itself from ink and home PCs (and visa versa).
Mozilla’s product think tank sinks silently into history.
TODO group will focus on open source tools in large-scale environments.