Sponsored Content
Top Forums UNIX for Advanced & Expert Users Wether does it successful or unreachable? Post 302572013 by liklstar on Wednesday 9th of November 2011 12:51:13 AM
Old 11-09-2011
Wether does it successful or unreachable?

Hi, all:

How can I check what happen with my own NIC driver which response "successful" when local PC "ping" a remote linux PC but "unreachable" when it "ping" a remote windows XP PC? My writed driver runs in linux 3.0.4 kernel.


thanks!
li, kunlun
 

10 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

Can I find wether a particular file exist and size greater than zero...help please

Can I find wether a particular file exist and size greater than zero in one line command. similar to this if && something in one if test .... e.g. if 1.) is it possible ? ... if yes how 2.) what would be the return type in case there is success or failure. I mean if both are... (4 Replies)
Discussion started by: guhas
4 Replies

2. Cybersecurity

Host unreachable

I have inherited a Sun Ultra-1, running sunOS 5.8 While on this machine, I cannot ping www.yahoo.com I cannot ping this machine from withing our lan. I do not have an static IP for this machine and used Iconfig hme0 auto-dhcp start. All is well, It seems to me that the previous owner,... (1 Reply)
Discussion started by: defense
1 Replies

3. UNIX for Dummies Questions & Answers

Notification if server unreachable?

Is it possible for a group of servers to monitor each other and then send an alert if one of them is no longer 'alive'? Or if its easier have one server that monitors the other five and then sends an alert. If so how would this be done? Thanks (3 Replies)
Discussion started by: Sepia
3 Replies

4. Linux

Linux Port Unreachable

All, I have to servers (NT and REL4). We can access the application on NT from Linux but we cannot access the applications on Linux when accessed from NT. The applicaiton is running on Linux with some IP:Port. When we try to access that application from NT, it says that the port is... (1 Reply)
Discussion started by: The One
1 Replies

5. UNIX for Dummies Questions & Answers

checking wether an input is using letters of the alphabet

afternoon forums. I need to get a way of testing as to wether an inputed character is part of the english alphabet. i have come up with the following code but its not working at all. until '] do echo This is not a Letter done any help would be beneficial to me. (1 Reply)
Discussion started by: strasner
1 Replies

6. UNIX for Dummies Questions & Answers

checking wether an inputed character is already in a variable

Hi, i have a variable which holds a variety of letters. eg, var=qwertyuiop what i want to do is determine wether an inputed letter is already stored inside the variable, so i can say to enter a new one. i have been playing around using tr and grep but nothing seems to work at all. ... (2 Replies)
Discussion started by: castillo
2 Replies

7. Shell Programming and Scripting

how to judge wether a url is valid or not using awk

rt 3ks:confused: (6 Replies)
Discussion started by: rainboisterous
6 Replies

8. Post Here to Contact Site Administrators and Moderators

Image/JS hoster down or unreachable

Apparently (at least) 2 of the servers responsible for serving the static images and the JavaScript are down or otherwise unreachable. Affected are www.unix.com and www.unix.com, while www.unix.com is still up. A check on this website confirmed it. Checked as of 2010-06-16 08:11 UTC. (13 Replies)
Discussion started by: pludi
13 Replies

9. UNIX for Dummies Questions & Answers

[Ubuntu] some contents unreachable

Hello, I'm using Ubuntu, and when I check "/"(root directory)'s properties. The window says "some contents unreachable". What is the "some contents"? http://i.imgur.com/UWn8Q.png (2 Replies)
Discussion started by: hz_i3
2 Replies

10. Solaris

Installadm - network in unreachable

Seems to wanboot ok but then fails to connect to server. What do I need to check? {0} ok boot net - install Boot device: /pci@300/pci@1/pci@0/pci@1/network@0 File and args: - install 1G link up <time unavailable> wanboot info: WAN boot messages->console <time unavailable>... (2 Replies)
Discussion started by: psychocandy
2 Replies
fping(8)						      System Manager's Manual							  fping(8)

NAME
fping - send ICMP ECHO_REQUEST packets to network hosts SYNOPSIS
fping [ options ] [ systems... ] DESCRIPTION
fping is a program like ping(8) which uses the Internet Control Message Protocol (ICMP) echo request to determine if a target host is responding. fping differs from ping in that you can specify any number of targets on the command line, or specify a file containing the lists of targets to ping. Instead of sending to one target until it times out or replies, fping will send out a ping packet and move on to the next target in a round-robin fashion. In the default mode, if a target replies, it is noted and removed from the list of targets to check; if a target does not respond within a certain time limit and/or retry limit it is designated as unreachable. fping also supports sending a specified number of pings to a tar- get, or looping indefinitely (as in ping ). Unlike ping, fping is meant to be used in scripts, so its output is designed to be easy to parse. OPTIONS
-a Show systems that are alive. -A Display targets by address rather than DNS name. -bn Number of bytes of ping data to send. The minimum size (normally 12) allows room for the data that fping needs to do its work (sequence number, timestamp). The reported received data size includes the IP header (normally 20 bytes) and ICMP header (8 bytes), so the minimum total size is 40 bytes. Default is 56, as in ping. Maximum is the theoretical maximum IP datagram size(64K), though most systems limit this to a smaller, system-dependent number. -Bn In the default mode, fping sends several requests to a target before giving up, waiting longer for a reply on each successive request. This parameter is the value by which the wait time is multiplied on each successive request; it must be entered as a floating-point number (x.y). The default is 1.5. -c Number of request packets to send to each target. In this mode, a line is displayed for each received response (this can suppressed with -q or -Q). Also, statistics about responses for each target are displayed when all requests have been sent (or when inter- rupted). -C Similar to -c, but the per-target statistics are displayed in a format designed for automated response-time statistics gathering. For example: % fping -C 5 -q somehost somehost : 91.7 37.0 29.2 - 36.8 shows the response time in milliseconds for each of the five requests, with the "-" indicating that no response was received to the fourth request. -d Use DNS to lookup address of return ping packet. This allows you to give fping a list of IP addresses as input and print hostnames in the output. -e Show elapsed (round-trip) time of packets. -f Read list of targets from a file. This option can only be used by the root user. Regular users should pipe in the file via stdin: % fping < targets_file -g Generate a target list from a supplied IP netmask, or a starting and ending IP. Specify the netmask or start/end in the targets por- tion of the command line. If a network with netmask is given, the network and broadcast addresses will be excluded. ex. To ping the network 192.168.1.0/24, the specified command line could look like either: fping -g 192.168.1.0/24 or fping -g 192.168.1.1 192.168.1.254 -h Print usage message. -in The minimum amount of time (in milliseconds) between sending a ping packet to any target (default is 25). -l Loop sending packets to each target indefinitely. Can be interrupted with Ctrl-C; statistics about responses for each target are then displayed. -m Send pings to each of a target host's multiple interfaces. -n Same as -d. -p In looping or counting modes (-l, -c, or -C), this parameter sets the time in milliseconds that fping waits between successive packets to an individual target. Default is 1000. -q Quiet. Don't show per-target results, just set final exit status. -Qn Like -q, but show summary results every n seconds. -rn Retry limit (default 3). This is the number of times an attempt at pinging a target will be made, not including the first try. -s Print cumulative statistics upon exit. -Saddr Set source address. -Iif Set the interface (requires SO_BINDTODEVICE support) -tn Initial target timeout in milliseconds (default 500). In the default mode, this is the amount of time that fping waits for a response to its first request. Successive timeouts are multiplied by the backoff factor. -Tn Ignored (for compatibility with fping 2.4). -u Show targets that are unreachable. -Tn Set the typ of service flag (TOS). n can be either decimal or hexadecimal(0xh) format. -v Print fping version information. -Hn Set the IP TTL field (time to live hops). EXAMPLES
The following perl script will check a list of hosts and send mail if any are unreachable. It uses the open2 function which allows a pro- gram to be opened for reading and writing. fping does not start pinging the list of systems until it reads EOF, which it gets after INPUT is closed. Sure the open2 usage is not needed in this example, but it's a good open2 example none the less. #!/usr/bin/perl require 'open2.pl'; $MAILTO = "root"; $pid = &open2("OUTPUT","INPUT","/usr/local/bin/fping -u"); @check=("slapshot","foo","foobar"); foreach(@check) { print INPUT "$_ "; } close(INPUT); @output=<OUTPUT>; if ($#output != -1) { chop($date=`date`); open(MAIL,"|mail -s 'unreachable systems' $MAILTO"); print MAIL " The following systems are unreachable as of: $date "; print MAIL @output; close MAIL; } Another good example is when you want to perform an action only on hosts that are currently reachable. #!/usr/bin/perl $hosts_to_backup = `cat /etc/hosts.backup | fping -a`; foreach $host (split(/ /,$hosts_to_backup)) { # do it } AUTHORS
Roland J. Schemers III, Stanford University, concept and versions 1.x RL "Bob" Morgan, Stanford University, versions 2.x David Papp, versions 2.3x and up, David Schweikert, versions 3.0 and up fping website: http://www.fping.org DIAGNOSTICS
Exit status is 0 if all the hosts are reachable, 1 if some hosts were unreachable, 2 if any IP addresses were not found, 3 for invalid com- mand line arguments, and 4 for a system call failure. BUGS
Ha! If we knew of any we would have fixed them! RESTRICTIONS
If certain options are used (i.e, a low value for -i and -t, and a high value for -r) it is possible to flood the network. This program must be installed as setuid root in order to open up a raw socket, or must be run by root. In order to stop mere mortals from hosing the network (when fping is installed setuid root) , normal users can't specify the following: -i n where n < 10 msec -r n where n > 20 -t n where n < 250 msec SEE ALSO
netstat(1), ping(8), ifconfig(8c) fping(8)
All times are GMT -4. The time now is 12:58 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy