[squid-users] POST upload splits tcp stream in many small 39byte sized pakets

Squid admin squid at aws-it.at
Wed Oct 21 09:53:22 UTC 2015


  Dear Alex,

unfortunately not really fixed.

The upload speed using squid 4.0.1 with this patch has bettered significant
but is far away from squid 3.4.x performance.

The used test client can reach a maximum upload speed of 115 MBIT if the
apache server is directly reachable.
If a SQUID 3.4.X PROXY is inbetween, the speed is also 115MBIT but only
16MBIT when USING SQUID 4.0.1

TcpSegmentOffloading has been turned off for this dump:
(Note: turning off TSO to see the real packet sizes the measured speeds are
nearly the same.)

11:28:24.917866 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [S], seq
3288613551, win 29200, options [mss 1460,sackOK,TS val 104477831 ecr
0,nop,wscale 7], length 0
11:28:24.918225 IP 10.1.1.19.81 > 10.1.1.210.49321: Flags [S.], seq
2608168273, ack 3288613552, win 14480, options [mss 1460,sackOK,TS val
1398719113 ecr 104477831,nop,wscale 7], length 0
11:28:24.918256 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], ack 1, win
229, options [nop,nop,TS val 104477831 ecr 1398719113], length 0
11:28:24.922831 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [P.], seq 1:583,
ack 1, win 229, options [nop,nop,TS val 104477832 ecr 1398719113], length
582
11:28:24.923118 IP 10.1.1.19.81 > 10.1.1.210.49321: Flags [.], ack 583, win
123, options [nop,nop,TS val 1398719114 ecr 104477832], length 0
11:28:24.924689 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
583:2031, ack 1, win 229, options [nop,nop,TS val 104477833 ecr
1398719114], length 1448
11:28:24.924694 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
2031:3479, ack 1, win 229, options [nop,nop,TS val 104477833 ecr
1398719114], length 1448
11:28:24.924699 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
3479:4927, ack 1, win 229, options [nop,nop,TS val 104477833 ecr
1398719114], length 1448
11:28:24.924701 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
4927:6375, ack 1, win 229, options [nop,nop,TS val 104477833 ecr
1398719114], length 1448
11:28:24.924703 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
6375:7823, ack 1, win 229, options [nop,nop,TS val 104477833 ecr
1398719114], length 1448
11:28:24.924719 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
7823:9271, ack 1, win 229, options [nop,nop,TS val 104477833 ecr
1398719114], length 1448
11:28:24.924720 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
9271:10719, ack 1, win 229, options [nop,nop,TS val 104477833 ecr
1398719114], length 1448
11:28:24.924722 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
10719:12167, ack 1, win 229, options [nop,nop,TS val 104477833 ecr
1398719114], length 1448
11:28:24.924724 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
12167:13615, ack 1, win 229, options [nop,nop,TS val 104477833 ecr
1398719114], length 1448
11:28:24.924726 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [P.], seq
13615:15063, ack 1, win 229, options [nop,nop,TS val 104477833 ecr
1398719114], length 1448
11:28:24.924930 IP 10.1.1.19.81 > 10.1.1.210.49321: Flags [.], ack 7823,
win 236, options [nop,nop,TS val 1398719115 ecr 104477833], length 0
11:28:24.924949 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
15063:16511, ack 1, win 229, options [nop,nop,TS val 104477833 ecr
1398719115], length 1448
11:28:24.924955 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [P.], seq
16511:17477, ack 1, win 229, options [nop,nop,TS val 104477833 ecr
1398719115], length 966
11:28:24.924971 IP 10.1.1.19.81 > 10.1.1.210.49321: Flags [.], ack 15063,
win 275, options [nop,nop,TS val 1398719115 ecr 104477833], length 0
11:28:24.925125 IP 10.1.1.19.81 > 10.1.1.210.49321: Flags [.], ack 17477,
win 261, options [nop,nop,TS val 1398719115 ecr 104477833], length 0
11:28:24.926496 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [P.], seq
17477:17516, ack 1, win 229, options [nop,nop,TS val 104477833 ecr
1398719115], length 39
11:28:24.926586 IP 10.1.1.19.81 > 10.1.1.210.49321: Flags [.], ack 17516,
win 331, options [nop,nop,TS val 1398719115 ecr 104477833], length 0
11:28:24.928261 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
17516:18964, ack 1, win 229, options [nop,nop,TS val 104477834 ecr
1398719115], length 1448
11:28:24.928266 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
18964:20412, ack 1, win 229, options [nop,nop,TS val 104477834 ecr
1398719115], length 1448
11:28:24.928274 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [P.], seq
20412:21611, ack 1, win 229, options [nop,nop,TS val 104477834 ecr
1398719115], length 1199
11:28:24.928481 IP 10.1.1.19.81 > 10.1.1.210.49321: Flags [.], ack 21611,
win 321, options [nop,nop,TS val 1398719116 ecr 104477834], length 0
11:28:24.930037 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
21611:23059, ack 1, win 229, options [nop,nop,TS val 104477834 ecr
1398719116], length 1448
11:28:24.930041 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
23059:24507, ack 1, win 229, options [nop,nop,TS val 104477834 ecr
1398719116], length 1448
11:28:24.930048 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [P.], seq
24507:25706, ack 1, win 229, options [nop,nop,TS val 104477834 ecr
1398719116], length 1199
11:28:24.930376 IP 10.1.1.19.81 > 10.1.1.210.49321: Flags [.], ack 25706,
win 321, options [nop,nop,TS val 1398719116 ecr 104477834], length 0
11:28:24.931861 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
25706:27154, ack 1, win 229, options [nop,nop,TS val 104477834 ecr
1398719116], length 1448
11:28:24.931868 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
27154:28602, ack 1, win 229, options [nop,nop,TS val 104477834 ecr
1398719116], length 1448
11:28:24.931874 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [P.], seq
28602:29801, ack 1, win 229, options [nop,nop,TS val 104477834 ecr
1398719116], length 1199
11:28:24.932217 IP 10.1.1.19.81 > 10.1.1.210.49321: Flags [.], ack 29801,
win 321, options [nop,nop,TS val 1398719117 ecr 104477834], length 0
11:28:24.933652 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
29801:31249, ack 1, win 229, options [nop,nop,TS val 104477835 ecr
1398719117], length 1448
11:28:24.933659 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
31249:32697, ack 1, win 229, options [nop,nop,TS val 104477835 ecr
1398719117], length 1448
11:28:24.933665 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [P.], seq
32697:33896, ack 1, win 229, options [nop,nop,TS val 104477835 ecr
1398719117], length 1199
11:28:24.933990 IP 10.1.1.19.81 > 10.1.1.210.49321: Flags [.], ack 33896,
win 321, options [nop,nop,TS val 1398719117 ecr 104477835], length 0
11:28:24.935423 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
33896:35344, ack 1, win 229, options [nop,nop,TS val 104477835 ecr
1398719117], length 1448
11:28:24.935427 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
35344:36792, ack 1, win 229, options [nop,nop,TS val 104477835 ecr
1398719117], length 1448
11:28:24.935435 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [P.], seq
36792:37991, ack 1, win 229, options [nop,nop,TS val 104477835 ecr
1398719117], length 1199
11:28:24.935755 IP 10.1.1.19.81 > 10.1.1.210.49321: Flags [.], ack 37991,
win 321, options [nop,nop,TS val 1398719117 ecr 104477835], length 0
11:28:24.937203 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
37991:39439, ack 1, win 229, options [nop,nop,TS val 104477836 ecr
1398719117], length 1448
11:28:24.937207 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
39439:40887, ack 1, win 229, options [nop,nop,TS val 104477836 ecr
1398719117], length 1448
11:28:24.937214 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [P.], seq
40887:42086, ack 1, win 229, options [nop,nop,TS val 104477836 ecr
1398719117], length 1199
11:28:24.937543 IP 10.1.1.19.81 > 10.1.1.210.49321: Flags [.], ack 42086,
win 321, options [nop,nop,TS val 1398719118 ecr 104477836], length 0
11:28:24.938968 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
42086:43534, ack 1, win 229, options [nop,nop,TS val 104477836 ecr
1398719118], length 1448
11:28:24.938972 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
43534:44982, ack 1, win 229, options [nop,nop,TS val 104477836 ecr
1398719118], length 1448
11:28:24.938979 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [P.], seq
44982:46181, ack 1, win 229, options [nop,nop,TS val 104477836 ecr
1398719118], length 1199
11:28:24.939305 IP 10.1.1.19.81 > 10.1.1.210.49321: Flags [.], ack 46181,
win 321, options [nop,nop,TS val 1398719118 ecr 104477836], length 0
11:28:24.940740 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
46181:47629, ack 1, win 229, options [nop,nop,TS val 104477837 ecr
1398719118], length 1448
11:28:24.940744 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
47629:49077, ack 1, win 229, options [nop,nop,TS val 104477837 ecr
1398719118], length 1448
11:28:24.940752 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [P.], seq
49077:50276, ack 1, win 229, options [nop,nop,TS val 104477837 ecr
1398719118], length 1199
11:28:24.941083 IP 10.1.1.19.81 > 10.1.1.210.49321: Flags [.], ack 50276,
win 321, options [nop,nop,TS val 1398719119 ecr 104477837], length 0
11:28:24.942574 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
50276:51724, ack 1, win 229, options [nop,nop,TS val 104477837 ecr
1398719119], length 1448
11:28:24.942581 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
51724:53172, ack 1, win 229, options [nop,nop,TS val 104477837 ecr
1398719119], length 1448
11:28:24.942586 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [P.], seq
53172:54371, ack 1, win 229, options [nop,nop,TS val 104477837 ecr
1398719119], length 1199
11:28:24.942914 IP 10.1.1.19.81 > 10.1.1.210.49321: Flags [.], ack 54371,
win 321, options [nop,nop,TS val 1398719119 ecr 104477837], length 0
11:28:24.944446 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
54371:55819, ack 1, win 229, options [nop,nop,TS val 104477838 ecr
1398719119], length 1448
11:28:24.944453 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
55819:57267, ack 1, win 229, options [nop,nop,TS val 104477838 ecr
1398719119], length 1448
11:28:24.944458 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [P.], seq
57267:58466, ack 1, win 229, options [nop,nop,TS val 104477838 ecr
1398719119], length 1199
11:28:24.944673 IP 10.1.1.19.81 > 10.1.1.210.49321: Flags [.], ack 58466,
win 321, options [nop,nop,TS val 1398719120 ecr 104477838], length 0
11:28:24.946252 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
58466:59914, ack 1, win 229, options [nop,nop,TS val 104477838 ecr
1398719120], length 1448
11:28:24.946257 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
59914:61362, ack 1, win 229, options [nop,nop,TS val 104477838 ecr
1398719120], length 1448
11:28:24.946262 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [P.], seq
61362:62561, ack 1, win 229, options [nop,nop,TS val 104477838 ecr
1398719120], length 1199
11:28:24.946592 IP 10.1.1.19.81 > 10.1.1.210.49321: Flags [.], ack 62561,
win 321, options [nop,nop,TS val 1398719120 ecr 104477838], length 0
11:28:24.948021 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
62561:64009, ack 1, win 229, options [nop,nop,TS val 104477838 ecr
1398719120], length 1448
11:28:24.948028 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
64009:65457, ack 1, win 229, options [nop,nop,TS val 104477838 ecr
1398719120], length 1448
11:28:24.948034 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [P.], seq
65457:66656, ack 1, win 229, options [nop,nop,TS val 104477838 ecr
1398719120], length 1199
11:28:24.948363 IP 10.1.1.19.81 > 10.1.1.210.49321: Flags [.], ack 66656,
win 321, options [nop,nop,TS val 1398719121 ecr 104477838], length 0
11:28:24.949803 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
66656:68104, ack 1, win 229, options [nop,nop,TS val 104477839 ecr
1398719121], length 1448
11:28:24.949810 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
68104:69552, ack 1, win 229, options [nop,nop,TS val 104477839 ecr
1398719121], length 1448
11:28:24.949816 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [P.], seq
69552:70751, ack 1, win 229, options [nop,nop,TS val 104477839 ecr
1398719121], length 1199
11:28:24.950151 IP 10.1.1.19.81 > 10.1.1.210.49321: Flags [.], ack 70751,
win 321, options [nop,nop,TS val 1398719121 ecr 104477839], length 0
11:28:24.951555 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
70751:72199, ack 1, win 229, options [nop,nop,TS val 104477839 ecr
1398719121], length 1448
11:28:24.951562 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
72199:73647, ack 1, win 229, options [nop,nop,TS val 104477839 ecr
1398719121], length 1448
11:28:24.951568 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [P.], seq
73647:74846, ack 1, win 229, options [nop,nop,TS val 104477839 ecr
1398719121], length 1199
11:28:24.953407 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
74846:76294, ack 1, win 229, options [nop,nop,TS val 104477840 ecr
1398719121], length 1448
11:28:24.953411 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
76294:77742, ack 1, win 229, options [nop,nop,TS val 104477840 ecr
1398719121], length 1448
11:28:24.953417 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [P.], seq
77742:78941, ack 1, win 229, options [nop,nop,TS val 104477840 ecr
1398719121], length 1199
11:28:24.955184 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
78941:80389, ack 1, win 229, options [nop,nop,TS val 104477840 ecr
1398719121], length 1448
11:28:24.955188 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
80389:81837, ack 1, win 229, options [nop,nop,TS val 104477840 ecr
1398719121], length 1448
11:28:24.955194 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [P.], seq
81837:83036, ack 1, win 229, options [nop,nop,TS val 104477840 ecr
1398719121], length 1199
11:28:24.964134 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [P.], seq
81837:83036, ack 1, win 229, options [nop,nop,TS val 104477843 ecr
1398719121], length 1199
11:28:24.964345 IP 10.1.1.19.81 > 10.1.1.210.49321: Flags [.], ack 83036,
win 258, options [nop,nop,TS val 1398719125 ecr 104477839,nop,nop,sack 1
{81837:83036}], length 0
11:28:24.965169 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
83036:84484, ack 1, win 229, options [nop,nop,TS val 104477843 ecr
1398719125], length 1448
11:28:24.965173 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
84484:85932, ack 1, win 229, options [nop,nop,TS val 104477843 ecr
1398719125], length 1448
11:28:24.965183 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [P.], seq
85932:87131, ack 1, win 229, options [nop,nop,TS val 104477843 ecr
1398719125], length 1199
11:28:24.965516 IP 10.1.1.19.81 > 10.1.1.210.49321: Flags [.], ack 87131,
win 237, options [nop,nop,TS val 1398719125 ecr 104477843], length 0
11:28:24.967403 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
87131:88579, ack 1, win 229, options [nop,nop,TS val 104477843 ecr
1398719125], length 1448
11:28:24.967410 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
88579:90027, ack 1, win 229, options [nop,nop,TS val 104477843 ecr
1398719125], length 1448
11:28:24.967413 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
90027:91475, ack 1, win 229, options [nop,nop,TS val 104477843 ecr
1398719125], length 1448
11:28:24.967419 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
91475:92923, ack 1, win 229, options [nop,nop,TS val 104477843 ecr
1398719125], length 1448
11:28:24.967421 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
92923:94371, ack 1, win 229, options [nop,nop,TS val 104477843 ecr
1398719125], length 1448
11:28:24.967423 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
94371:95819, ack 1, win 229, options [nop,nop,TS val 104477843 ecr
1398719125], length 1448
11:28:24.967425 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
95819:97267, ack 1, win 229, options [nop,nop,TS val 104477843 ecr
1398719125], length 1448
11:28:24.967788 IP 10.1.1.19.81 > 10.1.1.210.49321: Flags [.], ack 97267,
win 192, options [nop,nop,TS val 1398719125 ecr 104477843], length 0
11:28:24.967812 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
97267:98715, ack 1, win 229, options [nop,nop,TS val 104477843 ecr
1398719125], length 1448
11:28:24.967815 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
98715:100163, ack 1, win 229, options [nop,nop,TS val 104477843 ecr
1398719125], length 1448
11:28:24.967816 IP 10.1.1.210.49321 > 10.1.1.19.81: Flags [.], seq
100163:101611, ack 1, win 229, options [nop,nop,TS val 104477843 ecr
1398719125], length 1448

Today I will test also 3.5.10 with patch.

BR, Toni

Zitat von Alex Rousskov <rousskov at measurement-factory.com>:

> On 10/20/2015 07:49 AM, Squid admin wrote:
>
>> Unfortunately on uploading a big test file (unencrypted POST) to apache
>> webserver using a squid proxy (V 3.5.10 or 4.0.1) the upstream pakets
>> get slized into thousands of small 39 byte sized pakets.
>
> Does bug 4353 patch help in your case?
>
> http://bugs.squid-cache.org/show_bug.cgi?id=4353
> Alex.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.squid-cache.org/pipermail/squid-users/attachments/20151021/49dbd624/attachment-0001.html>


More information about the squid-users mailing list