]>
Commit | Line | Data |
---|---|---|
ac2f15b3 A |
1 | .\" |
2 | .\" Copyright (c) 1994 James A. Jegers | |
3 | .\" All rights reserved. | |
4 | .\" | |
5 | .\" Redistribution and use in source and binary forms, with or without | |
6 | .\" modification, are permitted provided that the following conditions | |
7 | .\" are met: | |
8 | .\" 1. Redistributions of source code must retain the above copyright | |
9 | .\" notice, this list of conditions and the following disclaimer. | |
10 | .\" 2. The name of the author may not be used to endorse or promote products | |
11 | .\" derived from this software without specific prior written permission | |
12 | .\" | |
13 | .\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR | |
14 | .\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES | |
15 | .\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. | |
16 | .\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, | |
17 | .\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | |
18 | .\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, | |
19 | .\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY | |
20 | .\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT | |
21 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF | |
22 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | |
23 | .\" | |
24 | .Dd July 10, 1995 | |
25 | .Dt SPRAY 8 | |
26 | .Os | |
27 | .Sh NAME | |
28 | .Nm spray | |
29 | .Nd send many packets to host | |
30 | .Sh SYNOPSIS | |
31 | .Nm spray | |
32 | .Op Fl c Ar count | |
33 | .Op Fl d Ar delay | |
34 | .Op Fl l Ar length | |
35 | .Ar host | |
36 | \&... | |
37 | .Sh DESCRIPTION | |
38 | .Nm Spray | |
39 | sends multiple RPC packets to | |
40 | .Ar host | |
41 | and records how many of them were correctly received and how long it took. | |
42 | .Pp | |
43 | The options are as follows: | |
44 | .Bl -tag -width indent | |
45 | .It Fl c Ar count | |
46 | Send | |
47 | .Ar count | |
48 | packets. | |
49 | .It Fl d Ar delay | |
50 | Pause | |
51 | .Ar delay | |
52 | microseconds between sending each packet. | |
53 | .It Fl l Ar length | |
54 | Set the length of the packet that holds the RPC call message to | |
55 | .Ar length | |
56 | bytes. | |
57 | Not all values of | |
58 | .Ar length | |
59 | are possible because RPC data is encoded using XDR. | |
60 | .Nm Spray | |
61 | rounds up to the nearest possible value. | |
62 | .El | |
63 | .Pp | |
64 | .Nm Spray | |
65 | is intended for use in network testing, measurement, and management. | |
66 | This command | |
67 | .Bf -emphasis | |
68 | can be very hard on a network and should be used with caution. | |
69 | .Ef | |
70 | .Pp | |
71 | .Sh SEE ALSO | |
72 | .Xr netstat 1 , | |
73 | .Xr ifconfig 8 , | |
b8dff150 | 74 | .Xr ping 8 |