spray(8) System Manager's Manual spray(8)NAME
spray - Spray packets
SYNOPSIS
/usr/sbin/spray [-c count] [-d delay] [-l length] [-t nettype] host
OPTIONS
Specifies how many packets to send. The default value of count is the number of packets required to make the total stream size 100000
bytes. Specifies how many microseconds to pause between sending each packet. The default is 0. The length parameter is the numbers of
bytes in the Ethernet packet that holds the RPC call message. Since the data is encoded using XDR, and XDR only deals with 32 bit quanti-
ties, not all values of length are possible, and spray rounds up to the nearest possible value. When length is greater than 1514, then the
RPC call can no longer be encapsulated in one Ethernet packet, so the length field no longer has a simple correspondence to Ethernet packet
size. The default value of length is 86 bytes (the size of the RPC and UDP headers). Specify class of transports. Defaults to netpath.
See rpc(3) for a description of supported classes.
DESCRIPTION
The spray command uses RPC to send a one-way stream of packets to the specified host and reports how many were received, as well as the
transfer rate. The host argument can be either a name or an Internet address.
A remote host only responds if it is running the sprayd daemon, which is normally started up from inetd(8).
The spray command is not useful as a networking benchmark. The spray command can report a large number of packets dropped when the drops
were caused by spray sending packets faster than they can be buffered locally (before the packets get to the network medium).
SEE ALSO
Routines: rpc(3)spray(8)
Check Out this Related Man Page
rpc.sprayd(1M) System Administration Commands rpc.sprayd(1M)NAME
rpc.sprayd, sprayd - spray server
SYNOPSIS
/usr/lib/netsvc/spray/rpc.sprayd
DESCRIPTION
rpc.sprayd is a server that records the packets sent by spray(1M). The rpc.sprayd daemon may be started by inetd(1M) or listen(1M).
The service provided by rpc.sprayd is not useful as a networking benchmark as it uses unreliable connectionless transports, (udp for exam-
ple). It can report a large number of packets dropped when the drops were caused by the program sending packets faster than they can be
buffered locally (before the packets get to the network medium).
ATTRIBUTES
See attributes(5) for descriptions of the following attributes:
+-----------------------------+-----------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+-----------------------------+-----------------------------+
|Availability |SUNWrcmds |
+-----------------------------+-----------------------------+
SEE ALSO svcs(1), inetadm(1M), inetd(1M)listen(1M), pmadm(1M), sacadm(1M), spray(1M), svcadm(1M), attributes(5), smf(5)NOTES
The rpc.sprayd service is managed by the service management facility, smf(5), under the service identifier:
svc:/network/rpc/spray:default
Administrative actions on this service, such as enabling, disabling, or requesting restart, can be performed using svcadm(1M). Responsibil-
ity for initiating and restarting this service is delegated to inetd(1M). Use inetadm(1M) to make configuration changes and to view config-
uration information for this service. The service's status can be queried using the svcs(1) command.
SunOS 5.10 4 Nov 2004 rpc.sprayd(1M)
If you have used snort to build a folder list of computers IP and their packets is there a tcp stream follow application that can be used to re-build the packets? Like ethereal? (1 Reply)
Hello ,
I need to convert X.25 packets to IP packets how should i proceed .......... Please help me , regarding this matter or atleast suggest me some material which can be read regarding this .
Bye (2 Replies)
I have to send a file to mainframe and before sending it, I have to execute the quote command to set the record length.
Since the file is dynamic, I do not know what the maximum size of a line could be.
Currently, I use the following function to get the Max Column Count. Since I use "sed" it... (2 Replies)
I am developing a client-server application. All communication is UDP based. I am sending 1000 packets per second. Every packet having size 15 bytes. At receiving end many packets lost. Please tell me if there any solution for this problem or it is actually problem with UDP. (1 Reply)
I trying to send and receive OSPF packets. I am using RAW Sockets(socket(AF_INET, SOCK_RAW, IPPROTO_OSPF)) to do this.
I am successfully able to send an OSPF Hello packet however I am not able to receive a OSPF packet if I have not sent an OSPF packet earlier on the RAW SOCKET.
Scenario:
... (3 Replies)
Is there any importance of LS length in DB exchange packet of OSPF protocol as its should be always be 20 bytes. Is this length to be ignored (2 Replies)
Hello,
I am currently trying to limit incoming UDP length 20 packets on a per IP basis to 5 a second using IPTables on a Linux machine (CentOS 5.2).
Basically, if an IP is sending more than 5 length 20 UDP packet a second to the local machine, I would like the machine to drop the excess... (1 Reply)
Hello
I need to send some packets to check connection. Packets will be catch by snoop. Is there any Sun tool to send some packets on selected IP and Port?
Thx (1 Reply)
Greetings everyone,
I've been using OpenWRT for some time primarly for research in the University. I've also started with some basic network programming (sending UDP packets for instance). But since most of the available tutorials on unix network programming are more related to ethernet... (4 Replies)
I am trying to find a command which could be used to get more details on the network traffic size of packets, number of packets, speed.
This might help me resolve some database issues.
Thanks in advance for your help
PS this will be a test from the webserver to the database server (1 Reply)
hello,
can anyone suggest how to delay the incoming packets ??
or how the packets are prossed inside the kernal and a way to make the packets wait a while??
it wud be vry helpful
regards
sameer (7 Replies)
How to make a log that will log all ips that connect to the server or send packets? And how to block an ip that make packets flood and try to DDoS? Thanks. (1 Reply)