Solved

Anyone here use the TTCP program before?

Posted on 2004-09-26
5
342 Views
Last Modified: 2010-04-21
I cant find any good documentation that explains the commands. I'm running it this way.

On the receiver:
ttcp -rs -l1024 -n10 -p4444


On the sender:
ttcp -ts -l1024 -n10 -p4444 dest_ip_here


Can anyone tell me what the -l switch and the -n switch do?  (in layman terms). I know it has something to do with packet length. Right?
Also, feel free to elaborate and give any pertinent info you think may help.
thanks
0
Comment
Question by:dissolved
  • 3
  • 2
5 Comments
 
LVL 38

Expert Comment

by:yuzh
ID: 12157735
-l    length of bufs written to network (default 1024)
-n   number of bufs written to network (-s only, default 1024)

see http://sd.wareonearth.com/~phil/net/ttcp/ for more details.

also:
man ttcp



0
 

Author Comment

by:dissolved
ID: 12159131
so -l is the amount of data we're writing to the other machine? and -n is the amount of times we're writing the data?
0
 
LVL 38

Accepted Solution

by:
yuzh earned 500 total points
ID: 12159807
-l is the amount of data we're writing to the network
-n  is the number of times the buffer will be transmitted.

Here's a better doc:
http://support.countryday.net/TTCP/Default.htm
0
 

Author Comment

by:dissolved
ID: 12161642
Thanks, just for clarifications sake:

-l is the amount of data we're writing to the network PER PACKET?

-n is the number of times this data is being sent?  I know you said the number of times the buffer will be transmitted. But is that the same thing as sending it? (since it will go in the sender's receive buffer anyway)?

Thanks man
0
 
LVL 38

Expert Comment

by:yuzh
ID: 12166219
yes.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
how to check for shares on aix 1 66
ftpcommand 2 56
How to clone solaris 10 machine 33 113
Image not there 4 44
When you do backups in the Solaris Operating System, the file system must be inactive. Otherwise, the output may be inconsistent. A file system is inactive when it's unmounted or it's write-locked by the operating system. Although the fssnap utility…
This tech tip describes how to install the Solaris Operating System from a tape backup that was created using the Solaris flash archive utility. I have used this procedure on the Solaris 8 and 9 OS, and it shoudl also work well on the Solaris 10 rel…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
This video shows how to set up a shell script to accept a positional parameter when called, pass that to a SQL script, accept the output from the statement back and then manipulate it in the Shell.

910 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

24 Experts available now in Live!

Get 1:1 Help Now