Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

tcpspray(1) [debian man page]

TCPSPRAY(1)						      General Commands Manual						       TCPSPRAY(1)

NAME
tcpspray - print average throughput for a tcp connection SYNOPSIS
tcpspray [ -v ] [ -e ] [ -h ] [ -b blksize ] [ -n nblks ] [ -f filename ] hostname DESCRIPTION
tcpspray sends data to either the discard or echo TCP service on the specified host and prints the average throughput. OPTIONS
-v Prints a dot for each block sent. Will also print a backspace for each block received in echo mode. Note: the I/O required for this option will affect the throughput rates. -e Use the TCP echo service instead of discard (the default) and print throughput rates for both transmission and reception. -h Print a usage description. -b blksize Sets the size of a block (the internal buffer) in bytes. Defaults to 1024. -n nblks Sets the number of blocks to transfer. Defaults to 100. -f filename Copy the contents of the specified file into the internal buffer (sized by -b option). The buffer is zeroed by default. If the file is larger than the buffer, only the first blksize bytes will be used. If the file is smaller than the buffer, the remaining bytes are zeroed. This option is useful in determining the relationship of the data transferred to throughput. E.g., if data compression is used on any of the intermediate links comprising the TCP connection, preloading the buffer with a text file will produce greater throughput than with a file that has already been compressed. -d delay Sets the time in microseconds to wait between successive buffer transmissions. The default is no delay. SEE ALSO
ping(8), spray(8) AUTHOR
Greg Christy (gmc@quotron.com) 23 October 1991 TCPSPRAY(1)

Check Out this Related Man Page

TCPSPRAY(1)							   User's Manual						       TCPSPRAY(1)

NAME
tcpspray - TCP/IP bandwidth measurement tool (Discard and Echo client) SYNOPSIS
tcpspray [-46ev] [-b block_size] [-d wait_us] [ -f filename] [-n count] <hostname> [port] DESCRIPTON
tcpspray uses the Discard resp. Echo protocol (RFC 863 resp. RFC 862) to perform bandwidth measurements of TCP sessions between the local system, and a Discard resp. Echo server. Unix-based hosts can provide a Discard and/or Echo servers with the Internet super-server inetd. On Windows NT, the simple network proto- cols optional component will do the same. The name or address of the server node must be specified. tcpspray will automatically try to use IPv6 when available. If not, or if it fails, it will fallback to IPv4. However, tcpspray4 resp. tcpspray6 only try to use IPv4 resp. IPv6. OPTIONS
-4 or --ipv4 Force usage of TCP over IPv4. -6 or --ipv6 Force usage of TCP over IPv6. -b block_size or --bsize block_size Send block of the specified byte size (default: 1024). -d wait_us or --delay wait_us Waits for the given amount of microseconds after any given was sent before attempting to send the next one. There is no delay by default. -e or --echo Use the Echo protocol instead of Discard. tcpspray will measure the time required to send data and receive it back, instead of sim- ply sending it. -f filename or --fill filename Read data from the specified file to fill sent blocks with. If the file is smaller than the size of blocks, or if no file were spec- ified, the remaining trailing bytes are all set to zero. -h or --help Display some help and exit. -n block_count or --count block_count Send the specified amount of data blocks for the measurements (default: 100). -V or --version Display program version and license and exit. -v or --verbose Display more verbose informations. In particular, tcpspray will print a dot each time a block is sent. If the Echo protocol is used (option -e), dots will be erased as data is received back. DIAGNOSTICS
If you get no response while you know the remote host is up, it is most likely that it has no Discard/Echo service running, or that these services are blocked by a firewall. Running tcptraceroute6(8) resp. tcptraceroute(8) toward the IPv6 resp. IPv4 remote host might help detecting such a situation. SECURITY
tcpspray does not require any privilege to run. SEE ALSO
tcp(7), inetd(8), tcptraceroute6(8), tcptraceroute(8) AUTHOR
Remi Denis-Courmont <remi at remlab dot net> $Id: tcpspray.1 658 2010-10-31 20:56:30Z remi $ http://www.remlab.net/ndisc6/ tcpspray $Date: 2010-10-31 22:56:30 +0200 (dim. 31 oct. 2010) $ TCPSPRAY(1)
Man Page