Sponsored Content
Top Forums Shell Programming and Scripting Send/receive file through serial using minicom Post 302912850 by achenle on Tuesday 12th of August 2014 07:52:45 AM
Old 08-12-2014
OK, this doesn't directly answer your question, but why ping test any network connection before trying to use it? That's like checking a car for a trailer hitch before taking it to pick up a gallon of milk at 7-11 - it's completely irrelevant to what you're trying to do. Sure, a positive result tells you the car is there, but it doesn't tell you the car works. And a negative result tells you only that there's no trailer hitch - the car could still be there working just fine to boot.

Networks can be and are configured to block explorations such as pings. Hosts can be and are configured to not respond to pings. Networks can also and often are configured to block SSH or FTP sessions, so even if a ping is successful that's not proof an SSH session will connect.

If you're going to use a network-based service, just use the damn thing. A successful ping prior to trying such a service doesn't mean the service works, and a failed ping doesn't mean it won't.
 

10 More Discussions You Might Find Interesting

1. IP Networking

Tcp Ip Send Receive Server Program

Requirements: A server program should read a file and send the message to the client . if the file is not there, then switch to the receive part of the same program and receive any messages from the socket. If no messages to receive then switch to send part of the program to... (2 Replies)
Discussion started by: Rajeshsu
2 Replies

2. Programming

how i can transfer and receive file in any format over serial port

helo i m using fedora core 6 o.s. i want to develop application using c,c++ which transfer file in any format(like pdf,txt,doc etc) over the serial port and i want to receive the same file from the serial port please guide me. amit (4 Replies)
Discussion started by: amitpansuria
4 Replies

3. Linux

how to test for serial commonication??(minicom)

I am testing for serial comm.......... I got suggestion of minicom.... but when i fire minicom... then i get the following error... minicom minicom: WARNING: configuration file not found, using defaults Device /dev/modem access failed: No such file or directory. I am using fedora 6 ,... (3 Replies)
Discussion started by: arunchaudhary19
3 Replies

4. Shell Programming and Scripting

Minicom runscript: How to send escape character ( \ )

Please can any of you address my query which I dont find in the runscript MAN page and other results on google. I am using minicom scripts to configure my uboot environment. I have to send a string which contains the escape character ( \ ) itself as follows send "set bootcmd bootm cp.b... (1 Reply)
Discussion started by: rkhanna
1 Replies

5. UNIX for Dummies Questions & Answers

I can send but cannot receive mail with unix?

Hi all, First post! I have just discovered that I can use unix to send mail to a mail address. I normally use entourage for my mail. This unix mail is very intriguing to me, but something is not working... I tried the search, but could not find the answer... This works: (in terminal)... (1 Reply)
Discussion started by: bjorn
1 Replies

6. UNIX for Dummies Questions & Answers

Can send but not receive email

Hi, One of the users in our company can send but not receive email. We are using SENDMAIL in conjunction with procmail. The funny thing is that all his sent email is in his /var/spool/mail but the email client does not pick anything up! He is using IMAP. Anyone see have any ideas? (2 Replies)
Discussion started by: mojoman
2 Replies

7. Programming

Send/Receive buffer size??

Dear friends, How do I find the TCP send and receive buffer size? (1 Reply)
Discussion started by: nagalenoj
1 Replies

8. Shell Programming and Scripting

How to monitor send/receive bytes

Hello, I need to create a script to monitor sent/received packets for a period of time (the period of time will be a users input) and write the result to some txt file. Is there any command (don`t want to use any 3rd party sw) what I can use? I`m using Solaris 10. Thank you (14 Replies)
Discussion started by: msojka77
14 Replies

9. Shell Programming and Scripting

Send Receive Mails

Hi All, I am writing one script to automate one long process. In this process we need to upload some input files and download some output files. So , I want to automate this upload and download by using mail functionality. I want to trigger this script when I am sending mail to server. I know... (0 Replies)
Discussion started by: NirajThakar
0 Replies

10. Solaris

zfs send receive performance issues

I 'm trying to clone a zfs file system pool/u01 to a new file system called newpool/u01 using following commands zfs list zfs snapshot pool/u01@new zfs send pool/u01@new | zfs -F receive newpool/u01 Its a 100G file system snapshot and copied to same server on different pool and... (9 Replies)
Discussion started by: fugitive
9 Replies
Smokeping_probes_TelnetIOSPing(3)				     SmokePing					 Smokeping_probes_TelnetIOSPing(3)

NAME
Smokeping::probes::TelnetIOSPing - Cisco IOS Probe for SmokePing SYNOPSIS
*** Probes *** +TelnetIOSPing forks = 5 offset = 50% packetsize = 56 step = 300 timeout = 15 # The following variables can be overridden in each target section iospass = password # mandatory iosuser = user # mandatory pings = 5 psource = 192.168.2.129 source = 192.168.2.1 # mandatory # [...] *** Targets *** probe = TelnetIOSPing # if this should be the default probe # [...] + mytarget # probe = TelnetIOSPing # if the default probe is something else host = my.host iospass = password # mandatory iosuser = user # mandatory pings = 5 psource = 192.168.2.129 source = 192.168.2.1 # mandatory DESCRIPTION
Integrates Cisco IOS as a probe into smokeping. Uses the telnet protocol to run a ping from an IOS device (source) to another device (host). This probe basically uses the "extended ping" of the Cisco IOS. You have the option to specify which interface the ping is sourced from as well. VARIABLES
Supported probe-specific variables: forks Run this many concurrent processes at maximum Example value: 5 Default value: 5 offset If you run many probes concurrently you may want to prevent them from hitting your network all at the same time. Using the probe- specific offset parameter you can change the point in time when each probe will be run. Offset is specified in % of total interval, or alternatively as 'random', and the offset from the 'General' section is used if nothing is specified here. Note that this does NOT influence the rrds itself, it is just a matter of when data acqusition is initiated. (This variable is only applicable if the variable 'concurrentprobes' is set in the 'General' section.) Example value: 50% packetsize The (optional) packetsize option lets you configure the packetsize for the pings sent. Default value: 56 step Duration of the base interval that this probe should use, if different from the one specified in the 'Database' section. Note that the step in the RRD files is fixed when they are originally generated, and if you change the step parameter afterwards, you'll have to delete the old RRD files or somehow convert them. (This variable is only applicable if the variable 'concurrentprobes' is set in the 'General' section.) Example value: 300 timeout How long a single 'ping' takes at maximum Example value: 15 Default value: 5 Supported target-specific variables: iospass The iospass option allows you to specify the password for the username specified with the option iosuser. Example value: password This setting is mandatory. iosuser The iosuser option allows you to specify a username that has ping capability on the IOS Device. Example value: user This setting is mandatory. pings How many pings should be sent to each target, if different from the global value specified in the Database section. Note that the number of pings in the RRD files is fixed when they are originally generated, and if you change this parameter afterwards, you'll have to delete the old RRD files or somehow convert them. Example value: 5 psource The (optional) psource option specifies an alternate IP address or Interface from which you wish to source your pings from. Routers can have many many IP addresses, and interfaces. When you ping from a router you have the ability to choose which interface and/or which IP address the ping is sourced from. Specifying an IP/interface does not necessarily specify the interface from which the ping will leave, but will specify which address the packet(s) appear to come from. If this option is left out the IOS Device will source the packet automatically based on routing and/or metrics. If this doesn't make sense to you then just leave it out. Example value: 192.168.2.129 source The source option specifies the IOS device to which we telnet. This is an IP address of an IOS Device that you/your server: 1) Have the ability to telnet to 2) Have a valid username and password for Example value: 192.168.2.1 This setting is mandatory. AUTHORS
John A Jackson <geonjay@infoave.net> based HEAVILY on Smokeping::probes::IOSPing by Paul J Murphy <paul@murph.org> based on Smokeping::probes::FPing by Tobias Oetiker <tobi@oetiker.ch> NOTES
IOS configuration The IOS device should have a username/password configured, as well as the ability to connect to the VTY(s). eg: ! username smokeping privilege 5 password 0 SmokepingPassword ! line vty 0 4 login local transport input telnet ! Some IOS devices have a maximum of 5 VTYs available, so be careful not to hit a limit with the 'forks' variable. Requirements This module requires the Net::Telnet module for perl. This is usually included on most newer OSs which include perl. Debugging There is some VERY rudimentary debugging code built into this module (it's based on the debugging code written into Net::Telnet). It will log information into three files "TIPreturn", "TIPoutlog", and "TIPdump". These files will be written out into your current working directory (CWD). You can change the names of these files to something with more meaning to you. Password authentication You should be advised that the authentication method of telnet uses clear text transmissions...meaning that without proper network security measures someone could sniff your username and password off the network. I may attempt to incorporate SSH in a future version of this module, but it is very doubtful. Right now SSH adds a LOT of processing overhead to a router, and isn't incredibly easy to implement in perl. Having said this, don't be too scared of telnet. Remember, the original IOSPing module used RSH, which is even more scary to use from a security perspective. Ping packet size The FPing manpage has the following to say on the topic of ping packet size: Number of bytes of ping data to send. The minimum size (normally 12) allows room for the data that fping needs to do its work (sequence number, timestamp). The reported received data size includes the IP header (normally 20 bytes) and ICMP header (8 bytes), so the minimum total size is 40 bytes. Default is 56, as in ping. Maximum is the theoretical maximum IP datagram size (64K), though most systems limit this to a smaller, system-dependent number. 2.6.8 2013-03-17 Smokeping_probes_TelnetIOSPing(3)
All times are GMT -4. The time now is 11:44 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy