Home | History | Annotate | Download | only in net
      1 // Copyright (c) 2011 The Chromium Authors. All rights reserved.
      2 // Use of this source code is governed by a BSD-style license that can be
      3 // found in the LICENSE file.
      4 
      5 #include "chrome/browser/net/predictor_api.h"
      6 
      7 #include <map>
      8 #include <string>
      9 
     10 #include "base/lazy_instance.h"
     11 #include "base/metrics/field_trial.h"
     12 #include "base/stl_util-inl.h"
     13 #include "base/string_number_conversions.h"
     14 #include "base/synchronization/waitable_event.h"
     15 #include "base/threading/thread.h"
     16 #include "base/values.h"
     17 #include "chrome/browser/browser_process.h"
     18 #include "chrome/browser/io_thread.h"
     19 #include "chrome/browser/net/preconnect.h"
     20 #include "chrome/browser/net/referrer.h"
     21 #include "chrome/browser/net/url_info.h"
     22 #include "chrome/browser/prefs/browser_prefs.h"
     23 #include "chrome/browser/prefs/pref_service.h"
     24 #include "chrome/browser/prefs/scoped_user_pref_update.h"
     25 #include "chrome/browser/prefs/session_startup_pref.h"
     26 #include "chrome/browser/profiles/profile.h"
     27 #include "chrome/browser/ui/browser.h"
     28 #include "chrome/common/pref_names.h"
     29 #include "content/browser/browser_thread.h"
     30 #include "content/common/notification_registrar.h"
     31 #include "content/common/notification_service.h"
     32 #include "net/base/host_resolver.h"
     33 #include "net/base/host_resolver_impl.h"
     34 
     35 using base::Time;
     36 using base::TimeDelta;
     37 
     38 namespace chrome_browser_net {
     39 
     40 static void DnsPrefetchMotivatedList(const UrlList& urls,
     41                                      UrlInfo::ResolutionMotivation motivation);
     42 
     43 static UrlList GetPredictedUrlListAtStartup(PrefService* user_prefs,
     44                                             PrefService* local_state);
     45 
     46 // Given that the underlying Chromium resolver defaults to a total maximum of
     47 // 8 paralell resolutions, we will avoid any chance of starving navigational
     48 // resolutions by limiting the number of paralell speculative resolutions.
     49 // TODO(jar): Move this limitation into the resolver.
     50 // static
     51 const size_t PredictorInit::kMaxSpeculativeParallelResolves = 3;
     52 
     53 // To control our congestion avoidance system, which discards a queue when
     54 // resolutions are "taking too long," we need an expected resolution time.
     55 // Common average is in the range of 300-500ms.
     56 static const int kExpectedResolutionTimeMs = 500;
     57 
     58 // To control the congestion avoidance system, we need an estimate of how many
     59 // speculative requests may arrive at once.  Since we currently only keep 8
     60 // subresource names for each frame, we'll use that as our basis.  Note that
     61 // when scanning search results lists, we might actually get 10 at a time, and
     62 // wikipedia can often supply (during a page scan) upwards of 50.  In those odd
     63 // cases, we may discard some of the later speculative requests mistakenly
     64 // assuming that the resolutions took too long.
     65 static const int kTypicalSpeculativeGroupSize = 8;
     66 
     67 // The next constant specifies an amount of queueing delay that is "too large,"
     68 // and indicative of problems with resolutions (perhaps due to an overloaded
     69 // router, or such).  When we exceed this delay, congestion avoidance will kick
     70 // in and all speculations in the queue will be discarded.
     71 // static
     72 const int PredictorInit::kMaxSpeculativeResolveQueueDelayMs =
     73     (kExpectedResolutionTimeMs * kTypicalSpeculativeGroupSize) /
     74     kMaxSpeculativeParallelResolves;
     75 
     76 // A version number for prefs that are saved. This should be incremented when
     77 // we change the format so that we discard old data.
     78 static const int kPredictorStartupFormatVersion = 1;
     79 
     80 // There will only be one instance ever created of the following Observer class.
     81 // The InitialObserver lives on the IO thread, and monitors navigations made by
     82 // the network stack.  This is only used to identify startup time resolutions
     83 // (for re-resolution during our next process startup).
     84 // TODO(jar): Consider preconnecting at startup, which may be faster than
     85 // waiting for render process to start and request a connection.
     86 class InitialObserver {
     87  public:
     88   // Recording of when we observed each navigation.
     89   typedef std::map<GURL, base::TimeTicks> FirstNavigations;
     90 
     91   // Potentially add a new URL to our startup list.
     92   void Append(const GURL& url);
     93 
     94   // Get an HTML version of our current planned first_navigations_.
     95   void GetFirstResolutionsHtml(std::string* output);
     96 
     97   // Persist the current first_navigations_ for storage in a list.
     98   void GetInitialDnsResolutionList(ListValue* startup_list);
     99 
    100   // Discards all initial loading history.
    101   void DiscardInitialNavigationHistory() { first_navigations_.clear(); }
    102 
    103  private:
    104   // List of the first N URL resolutions observed in this run.
    105   FirstNavigations first_navigations_;
    106 
    107   // The number of URLs we'll save for pre-resolving at next startup.
    108   static const size_t kStartupResolutionCount = 10;
    109 };
    110 
    111 // TODO(willchan): Look at killing this global.
    112 static InitialObserver* g_initial_observer = NULL;
    113 
    114 //------------------------------------------------------------------------------
    115 // This section contains all the globally accessable API entry points for the
    116 // DNS Prefetching feature.
    117 //------------------------------------------------------------------------------
    118 
    119 // Status of speculative DNS resolution and speculative TCP/IP connection
    120 // feature.
    121 static bool predictor_enabled = true;
    122 
    123 // Cached inverted copy of the off_the_record pref.
    124 static bool on_the_record_switch = true;
    125 
    126 // Enable/disable Dns prefetch activity (either via command line, or via pref).
    127 void EnablePredictor(bool enable) {
    128   // NOTE: this is invoked on the UI thread.
    129   predictor_enabled = enable;
    130 }
    131 
    132 void OnTheRecord(bool enable) {
    133   DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
    134   if (on_the_record_switch == enable)
    135     return;
    136   on_the_record_switch = enable;
    137   if (on_the_record_switch)
    138     g_browser_process->io_thread()->ChangedToOnTheRecord();
    139 }
    140 
    141 void DiscardInitialNavigationHistory() {
    142   DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO));
    143   if (g_initial_observer)
    144     g_initial_observer->DiscardInitialNavigationHistory();
    145 }
    146 
    147 void RegisterUserPrefs(PrefService* user_prefs) {
    148   user_prefs->RegisterListPref(prefs::kDnsPrefetchingStartupList);
    149   user_prefs->RegisterListPref(prefs::kDnsPrefetchingHostReferralList);
    150 }
    151 
    152 // When enabled, we use the following instance to service all requests in the
    153 // browser process.
    154 // TODO(willchan): Look at killing this.
    155 static Predictor* g_predictor = NULL;
    156 
    157 // This API is only used in the browser process.
    158 // It is called from an IPC message originating in the renderer.  It currently
    159 // includes both Page-Scan, and Link-Hover prefetching.
    160 // TODO(jar): Separate out link-hover prefetching, and page-scan results.
    161 void DnsPrefetchList(const NameList& hostnames) {
    162   // TODO(jar): Push GURL transport further back into renderer, but this will
    163   // require a Webkit change in the observer :-/.
    164   UrlList urls;
    165   for (NameList::const_iterator it = hostnames.begin();
    166        it < hostnames.end();
    167        ++it) {
    168     urls.push_back(GURL("http://" + *it + ":80"));
    169   }
    170 
    171   DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO));
    172   DnsPrefetchMotivatedList(urls, UrlInfo::PAGE_SCAN_MOTIVATED);
    173 }
    174 
    175 static void DnsPrefetchMotivatedList(
    176     const UrlList& urls,
    177     UrlInfo::ResolutionMotivation motivation) {
    178   DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI) ||
    179          BrowserThread::CurrentlyOn(BrowserThread::IO));
    180   if (!predictor_enabled || NULL == g_predictor)
    181     return;
    182 
    183   if (BrowserThread::CurrentlyOn(BrowserThread::IO)) {
    184     g_predictor->ResolveList(urls, motivation);
    185   } else {
    186     BrowserThread::PostTask(
    187         BrowserThread::IO,
    188         FROM_HERE,
    189         NewRunnableMethod(g_predictor,
    190                           &Predictor::ResolveList, urls, motivation));
    191   }
    192 }
    193 
    194 // This API is used by the autocomplete popup box (where URLs are typed).
    195 void AnticipateOmniboxUrl(const GURL& url, bool preconnectable) {
    196   DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
    197   if (!predictor_enabled || NULL == g_predictor)
    198     return;
    199   if (!url.is_valid() || !url.has_host())
    200     return;
    201 
    202   g_predictor->AnticipateOmniboxUrl(url, preconnectable);
    203 }
    204 
    205 void PreconnectUrlAndSubresources(const GURL& url) {
    206   if (!predictor_enabled || NULL == g_predictor)
    207     return;
    208   if (!url.is_valid() || !url.has_host())
    209     return;
    210 
    211   g_predictor->PreconnectUrlAndSubresources(url);
    212 }
    213 
    214 
    215 //------------------------------------------------------------------------------
    216 // This section intermingles prefetch results with actual browser HTTP
    217 // network activity.  It supports calculating of the benefit of a prefetch, as
    218 // well as recording what prefetched hostname resolutions might be potentially
    219 // helpful during the next chrome-startup.
    220 //------------------------------------------------------------------------------
    221 
    222 void PredictFrameSubresources(const GURL& url) {
    223   DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO));
    224   if (!predictor_enabled || NULL == g_predictor)
    225     return;
    226   g_predictor->PredictFrameSubresources(url);
    227 }
    228 
    229 void LearnAboutInitialNavigation(const GURL& url) {
    230   DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO));
    231   if (!predictor_enabled || NULL == g_initial_observer )
    232     return;
    233   g_initial_observer->Append(url);
    234 }
    235 
    236 void LearnFromNavigation(const GURL& referring_url, const GURL& target_url) {
    237   DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO));
    238   if (!predictor_enabled || NULL == g_predictor)
    239     return;
    240   g_predictor->LearnFromNavigation(referring_url, target_url);
    241 }
    242 
    243 // The observer class needs to connect starts and finishes of HTTP network
    244 // resolutions.  We use the following type for that map.
    245 typedef std::map<int, UrlInfo> ObservedResolutionMap;
    246 
    247 //------------------------------------------------------------------------------
    248 // Member definitions for InitialObserver class.
    249 
    250 void InitialObserver::Append(const GURL& url) {
    251   DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO));
    252 
    253   if (!on_the_record_switch || NULL == g_predictor)
    254     return;
    255   if (kStartupResolutionCount <= first_navigations_.size())
    256     return;
    257 
    258   if (url.SchemeIs("http") || url.SchemeIs("https")) {
    259     const GURL url_without_path(Predictor::CanonicalizeUrl(url));
    260     if (first_navigations_.find(url_without_path) == first_navigations_.end())
    261       first_navigations_[url_without_path] = base::TimeTicks::Now();
    262   }
    263 }
    264 
    265 void InitialObserver::GetInitialDnsResolutionList(ListValue* startup_list) {
    266   DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO));
    267   DCHECK(startup_list);
    268   startup_list->Clear();
    269   DCHECK_EQ(0u, startup_list->GetSize());
    270   startup_list->Append(new FundamentalValue(kPredictorStartupFormatVersion));
    271   for (FirstNavigations::iterator it = first_navigations_.begin();
    272        it != first_navigations_.end();
    273        ++it) {
    274     DCHECK(it->first == Predictor::CanonicalizeUrl(it->first));
    275     startup_list->Append(new StringValue(it->first.spec()));
    276   }
    277 }
    278 
    279 void InitialObserver::GetFirstResolutionsHtml(std::string* output) {
    280   DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO));
    281 
    282   UrlInfo::UrlInfoTable resolution_list;
    283   {
    284     for (FirstNavigations::iterator it(first_navigations_.begin());
    285          it != first_navigations_.end();
    286          it++) {
    287       UrlInfo info;
    288       info.SetUrl(it->first);
    289       info.set_time(it->second);
    290       resolution_list.push_back(info);
    291     }
    292   }
    293   UrlInfo::GetHtmlTable(resolution_list,
    294       "Future startups will prefetch DNS records for ", false, output);
    295 }
    296 
    297 //------------------------------------------------------------------------------
    298 // Support observer to detect opening and closing of OffTheRecord windows.
    299 // This object lives on the UI thread.
    300 
    301 class OffTheRecordObserver : public NotificationObserver {
    302  public:
    303   void Register() {
    304     // TODO(pkasting): This test should not be necessary.  See crbug.com/12475.
    305     if (registrar_.IsEmpty()) {
    306       registrar_.Add(this, NotificationType::BROWSER_CLOSED,
    307                      NotificationService::AllSources());
    308       registrar_.Add(this, NotificationType::BROWSER_OPENED,
    309                      NotificationService::AllSources());
    310     }
    311   }
    312 
    313   void Observe(NotificationType type, const NotificationSource& source,
    314                const NotificationDetails& details) {
    315     switch (type.value) {
    316       case NotificationType::BROWSER_OPENED:
    317         if (!Source<Browser>(source)->profile()->IsOffTheRecord())
    318           break;
    319         ++count_off_the_record_windows_;
    320         OnTheRecord(false);
    321         break;
    322 
    323       case NotificationType::BROWSER_CLOSED:
    324         if (!Source<Browser>(source)->profile()->IsOffTheRecord())
    325         break;  // Ignore ordinary windows.
    326         DCHECK_LT(0, count_off_the_record_windows_);
    327         if (0 >= count_off_the_record_windows_)  // Defensive coding.
    328           break;
    329         if (--count_off_the_record_windows_)
    330           break;  // Still some windows are incognito.
    331         OnTheRecord(true);
    332         break;
    333 
    334       default:
    335         break;
    336     }
    337   }
    338 
    339  private:
    340   friend struct base::DefaultLazyInstanceTraits<OffTheRecordObserver>;
    341 
    342   OffTheRecordObserver() : count_off_the_record_windows_(0) {}
    343   ~OffTheRecordObserver() {}
    344 
    345   NotificationRegistrar registrar_;
    346   int count_off_the_record_windows_;
    347 
    348   DISALLOW_COPY_AND_ASSIGN(OffTheRecordObserver);
    349 };
    350 
    351 static base::LazyInstance<OffTheRecordObserver> g_off_the_record_observer(
    352     base::LINKER_INITIALIZED);
    353 
    354 //------------------------------------------------------------------------------
    355 // This section supports the about:dns page.
    356 //------------------------------------------------------------------------------
    357 
    358 // Provide global support for the about:dns page.
    359 void PredictorGetHtmlInfo(std::string* output) {
    360   DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO));
    361 
    362   output->append("<html><head><title>About DNS</title>"
    363                  // We'd like the following no-cache... but it doesn't work.
    364                  // "<META HTTP-EQUIV=\"Pragma\" CONTENT=\"no-cache\">"
    365                  "</head><body>");
    366   if (!predictor_enabled  || NULL == g_predictor) {
    367     output->append("DNS pre-resolution and TCP pre-connection is disabled.");
    368   } else {
    369     if (!on_the_record_switch) {
    370       output->append("Incognito mode is active in a window.");
    371     } else {
    372       // List items fetched at startup.
    373       if (g_initial_observer)
    374         g_initial_observer->GetFirstResolutionsHtml(output);
    375       // Show list of subresource predictions and stats.
    376       g_predictor->GetHtmlReferrerLists(output);
    377       // Show list of prediction results.
    378       g_predictor->GetHtmlInfo(output);
    379     }
    380   }
    381   output->append("</body></html>");
    382 }
    383 
    384 void ClearPredictorCache() {
    385   DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO));
    386   if (!predictor_enabled || NULL == g_predictor)
    387     return;
    388   g_predictor->DiscardAllResults();
    389 }
    390 
    391 //------------------------------------------------------------------------------
    392 // This section intializes global DNS prefetch services.
    393 //------------------------------------------------------------------------------
    394 
    395 static void InitNetworkPredictor(TimeDelta max_dns_queue_delay,
    396                                  size_t max_parallel_resolves,
    397                                  PrefService* user_prefs,
    398                                  PrefService* local_state,
    399                                  bool preconnect_enabled) {
    400   DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
    401 
    402   bool prefetching_enabled =
    403       user_prefs->GetBoolean(prefs::kNetworkPredictionEnabled);
    404 
    405   // Gather the list of hostnames to prefetch on startup.
    406   UrlList urls =
    407       GetPredictedUrlListAtStartup(user_prefs, local_state);
    408 
    409   ListValue* referral_list =
    410       static_cast<ListValue*>(user_prefs->GetList(
    411           prefs::kDnsPrefetchingHostReferralList)->DeepCopy());
    412 
    413   // Remove obsolete preferences from local state if necessary.
    414   int current_version =
    415       local_state->GetInteger(prefs::kMultipleProfilePrefMigration);
    416   if ((current_version & browser::DNS_PREFS) == 0) {
    417     local_state->RegisterListPref(prefs::kDnsStartupPrefetchList);
    418     local_state->RegisterListPref(prefs::kDnsHostReferralList);
    419     local_state->ClearPref(prefs::kDnsStartupPrefetchList);
    420     local_state->ClearPref(prefs::kDnsHostReferralList);
    421     local_state->SetInteger(prefs::kMultipleProfilePrefMigration,
    422         current_version | browser::DNS_PREFS);
    423   }
    424 
    425   g_browser_process->io_thread()->InitNetworkPredictor(
    426       prefetching_enabled, max_dns_queue_delay, max_parallel_resolves, urls,
    427       referral_list, preconnect_enabled);
    428 }
    429 
    430 void FinalizePredictorInitialization(
    431     Predictor* global_predictor,
    432     const UrlList& startup_urls,
    433     ListValue* referral_list) {
    434   DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO));
    435   g_predictor = global_predictor;
    436   g_initial_observer = new InitialObserver();
    437 
    438   // Prefetch these hostnames on startup.
    439   DnsPrefetchMotivatedList(startup_urls,
    440                            UrlInfo::STARTUP_LIST_MOTIVATED);
    441   g_predictor->DeserializeReferrersThenDelete(referral_list);
    442 }
    443 
    444 void FreePredictorResources() {
    445   DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO));
    446   g_predictor = NULL;  // Owned and released by io_thread.cc.
    447   delete g_initial_observer;
    448   g_initial_observer = NULL;
    449 }
    450 
    451 //------------------------------------------------------------------------------
    452 // Functions to handle saving of hostnames from one session to the next, to
    453 // expedite startup times.
    454 
    455 static void SaveDnsPrefetchStateForNextStartupAndTrimOnIOThread(
    456     ListValue* startup_list,
    457     ListValue* referral_list,
    458     base::WaitableEvent* completion) {
    459   DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO));
    460 
    461   if (NULL == g_predictor) {
    462     completion->Signal();
    463     return;
    464   }
    465 
    466   if (g_initial_observer)
    467     g_initial_observer->GetInitialDnsResolutionList(startup_list);
    468 
    469   // Do at least one trim at shutdown, in case the user wasn't running long
    470   // enough to do any regular trimming of referrers.
    471   g_predictor->TrimReferrersNow();
    472   g_predictor->SerializeReferrers(referral_list);
    473 
    474   completion->Signal();
    475 }
    476 
    477 void SavePredictorStateForNextStartupAndTrim(PrefService* prefs) {
    478   DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
    479 
    480   if (!predictor_enabled || g_predictor == NULL)
    481     return;
    482 
    483   base::WaitableEvent completion(true, false);
    484 
    485   ListPrefUpdate update_startup_list(prefs, prefs::kDnsPrefetchingStartupList);
    486   ListPrefUpdate update_referral_list(prefs,
    487                                       prefs::kDnsPrefetchingHostReferralList);
    488   bool posted = BrowserThread::PostTask(
    489       BrowserThread::IO,
    490       FROM_HERE,
    491       NewRunnableFunction(SaveDnsPrefetchStateForNextStartupAndTrimOnIOThread,
    492           update_startup_list.Get(),
    493           update_referral_list.Get(),
    494           &completion));
    495 
    496   // TODO(jar): Synchronous waiting for the IO thread is a potential source
    497   // to deadlocks and should be investigated. See http://crbug.com/78451.
    498   DCHECK(posted);
    499   if (posted)
    500     completion.Wait();
    501 }
    502 
    503 static UrlList GetPredictedUrlListAtStartup(PrefService* user_prefs,
    504                                             PrefService* local_state) {
    505   DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
    506   UrlList urls;
    507   // Recall list of URLs we learned about during last session.
    508   // This may catch secondary hostnames, pulled in by the homepages.  It will
    509   // also catch more of the "primary" home pages, since that was (presumably)
    510   // rendered first (and will be rendered first this time too).
    511   const ListValue* startup_list =
    512       user_prefs->GetList(prefs::kDnsPrefetchingStartupList);
    513 
    514   if (startup_list) {
    515     ListValue::const_iterator it = startup_list->begin();
    516     int format_version = -1;
    517     if (it != startup_list->end() &&
    518         (*it)->GetAsInteger(&format_version) &&
    519         format_version == kPredictorStartupFormatVersion) {
    520       ++it;
    521       for (; it != startup_list->end(); ++it) {
    522         std::string url_spec;
    523         if (!(*it)->GetAsString(&url_spec)) {
    524           LOG(DFATAL);
    525           break;  // Format incompatibility.
    526         }
    527         GURL url(url_spec);
    528         if (!url.has_host() || !url.has_scheme()) {
    529           LOG(DFATAL);
    530           break;  // Format incompatibility.
    531         }
    532 
    533         urls.push_back(url);
    534       }
    535     }
    536   }
    537 
    538   // Prepare for any static home page(s) the user has in prefs.  The user may
    539   // have a LOT of tab's specified, so we may as well try to warm them all.
    540   SessionStartupPref tab_start_pref =
    541       SessionStartupPref::GetStartupPref(user_prefs);
    542   if (SessionStartupPref::URLS == tab_start_pref.type) {
    543     for (size_t i = 0; i < tab_start_pref.urls.size(); i++) {
    544       GURL gurl = tab_start_pref.urls[i];
    545       if (!gurl.is_valid() || gurl.SchemeIsFile() || gurl.host().empty())
    546         continue;
    547       if (gurl.SchemeIs("http") || gurl.SchemeIs("https"))
    548         urls.push_back(gurl.GetWithEmptyPath());
    549     }
    550   }
    551 
    552   if (urls.empty())
    553     urls.push_back(GURL("http://www.google.com:80"));
    554 
    555   return urls;
    556 }
    557 
    558 //------------------------------------------------------------------------------
    559 // Methods for the helper class that is used to startup and teardown the whole
    560 // g_predictor system (both DNS pre-resolution and TCP/IP pre-connection).
    561 
    562 PredictorInit::PredictorInit(PrefService* user_prefs,
    563                              PrefService* local_state,
    564                              bool preconnect_enabled) {
    565   DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
    566   // Set up a field trial to see what disabling DNS pre-resolution does to
    567   // latency of page loads.
    568   base::FieldTrial::Probability kDivisor = 1000;
    569   // For each option (i.e., non-default), we have a fixed probability.
    570   base::FieldTrial::Probability kProbabilityPerGroup = 100;  // 10% probability.
    571 
    572   // After June 30, 2011 builds, it will always be in default group
    573   // (default_enabled_prefetch).
    574   trial_ = new base::FieldTrial("DnsImpact", kDivisor,
    575                                 "default_enabled_prefetch", 2011, 6, 30);
    576 
    577   // First option is to disable prefetching completely.
    578   int disabled_prefetch = trial_->AppendGroup("disabled_prefetch",
    579                                               kProbabilityPerGroup);
    580 
    581   // We're running two experiments at the same time.  The first set of trials
    582   // modulates the delay-time until we declare a congestion event (and purge
    583   // our queue).  The second modulates the number of concurrent resolutions
    584   // we do at any time.  Users are in exactly one trial (or the default) during
    585   // any one run, and hence only one experiment at a time.
    586   // Experiment 1:
    587   // Set congestion detection at 250, 500, or 750ms, rather than the 1 second
    588   // default.
    589   int max_250ms_prefetch = trial_->AppendGroup("max_250ms_queue_prefetch",
    590                                                kProbabilityPerGroup);
    591   int max_500ms_prefetch = trial_->AppendGroup("max_500ms_queue_prefetch",
    592                                                kProbabilityPerGroup);
    593   int max_750ms_prefetch = trial_->AppendGroup("max_750ms_queue_prefetch",
    594                                                kProbabilityPerGroup);
    595   // Set congestion detection at 2 seconds instead of the 1 second default.
    596   int max_2s_prefetch = trial_->AppendGroup("max_2s_queue_prefetch",
    597                                             kProbabilityPerGroup);
    598   // Experiment 2:
    599   // Set max simultaneous resoultions to 2, 4, or 6, and scale the congestion
    600   // limit proportionally (so we don't impact average probability of asserting
    601   // congesion very much).
    602   int max_2_concurrent_prefetch = trial_->AppendGroup(
    603       "max_2 concurrent_prefetch", kProbabilityPerGroup);
    604   int max_4_concurrent_prefetch = trial_->AppendGroup(
    605       "max_4 concurrent_prefetch", kProbabilityPerGroup);
    606   int max_6_concurrent_prefetch = trial_->AppendGroup(
    607       "max_6 concurrent_prefetch", kProbabilityPerGroup);
    608 
    609   // We will register the incognito observer regardless of whether prefetching
    610   // is enabled, as it is also used to clear the host cache.
    611   g_off_the_record_observer.Get().Register();
    612 
    613   if (trial_->group() != disabled_prefetch) {
    614     // Initialize the DNS prefetch system.
    615     size_t max_parallel_resolves = kMaxSpeculativeParallelResolves;
    616     int max_queueing_delay_ms = kMaxSpeculativeResolveQueueDelayMs;
    617 
    618     if (trial_->group() == max_2_concurrent_prefetch)
    619       max_parallel_resolves = 2;
    620     else if (trial_->group() == max_4_concurrent_prefetch)
    621       max_parallel_resolves = 4;
    622     else if (trial_->group() == max_6_concurrent_prefetch)
    623       max_parallel_resolves = 6;
    624 
    625     if (trial_->group() == max_250ms_prefetch) {
    626       max_queueing_delay_ms =
    627          (250 * kTypicalSpeculativeGroupSize) /  max_parallel_resolves;
    628     } else if (trial_->group() == max_500ms_prefetch) {
    629       max_queueing_delay_ms =
    630           (500 * kTypicalSpeculativeGroupSize) /  max_parallel_resolves;
    631     } else if (trial_->group() == max_750ms_prefetch) {
    632       max_queueing_delay_ms =
    633           (750 * kTypicalSpeculativeGroupSize) /  max_parallel_resolves;
    634     } else if (trial_->group() == max_2s_prefetch) {
    635       max_queueing_delay_ms =
    636           (2000 * kTypicalSpeculativeGroupSize) /  max_parallel_resolves;
    637     }
    638 
    639     TimeDelta max_queueing_delay(
    640         TimeDelta::FromMilliseconds(max_queueing_delay_ms));
    641 
    642     DCHECK(!g_predictor);
    643     InitNetworkPredictor(max_queueing_delay, max_parallel_resolves, user_prefs,
    644                          local_state, preconnect_enabled);
    645   }
    646 }
    647 
    648 PredictorInit::~PredictorInit() {
    649 }
    650 
    651 }  // namespace chrome_browser_net
    652