Introduction What Is Mtcp?

Total Page:16

File Type:pdf, Size:1020Kb

Introduction What Is Mtcp? Good news, everyone! User Documentation Version: 2020-03-07 M. Brutman ([email protected]) http://www.brutman.com/mTCP/ Table of Contents Introduction and Setup Introduction..............................................................................................................................................................8 What is mTCP?...................................................................................................................................................8 Features...............................................................................................................................................................8 Tested machines/environments...........................................................................................................................9 Licensing...........................................................................................................................................................10 Packaging..........................................................................................................................................................10 Binaries.....................................................................................................................................................................10 Documentation..........................................................................................................................................................11 Support and contact information.......................................................................................................................11 Setup......................................................................................................................................................................12 Introduction.......................................................................................................................................................12 Hardware setup..................................................................................................................................................12 Packet drivers............................................................................................................................................................12 Loading the packet driver..........................................................................................................................................13 Sample packet driver command lines........................................................................................................................14 Finding packet drivers...............................................................................................................................................14 Creating the mTCP configuration file...............................................................................................................15 Creating the minimal configuration file for use with DHCP.....................................................................................15 Setting your own networking parameters using static configuration.........................................................................16 Networking related configuration parameters...................................................................................................16 Other configuration parameters.........................................................................................................................18 Advanced topics................................................................................................................................................20 The MTU setting.......................................................................................................................................................20 SLIP and PPP notes...................................................................................................................................................21 How the configuration file works..............................................................................................................................22 mTCP and Virtual Environments...........................................................................................................................24 DOSBox............................................................................................................................................................24 VirtualBox.........................................................................................................................................................24 VMWare Player.................................................................................................................................................25 SwsVpkt............................................................................................................................................................25 mTCP Applications DHCP client...........................................................................................................................................................28 Introduction.......................................................................................................................................................28 Special hardware or software requirements:.....................................................................................................28 Setup instructions..............................................................................................................................................28 Using DHCP......................................................................................................................................................29 DHCP lease duration.........................................................................................................................................29 DHCP failures...................................................................................................................................................30 Configuration parameters..................................................................................................................................30 Parameters provided by the DHCP server:................................................................................................................30 Configuration parameters:.........................................................................................................................................31 Recent changes..................................................................................................................................................31 DNSTest.................................................................................................................................................................32 Introduction.......................................................................................................................................................32 Special hardware or software requirements:.....................................................................................................32 Setup instructions..............................................................................................................................................32 Using DNSTest..................................................................................................................................................32 Recent changes..................................................................................................................................................33 FTP client...............................................................................................................................................................34 Introduction.......................................................................................................................................................34 Special hardware or software requirements:.....................................................................................................34 Using FTP.........................................................................................................................................................34 ASCII vs. BINARY transfers............................................................................................................................35 FTP transfer modes...........................................................................................................................................36 DOS filename limitations..................................................................................................................................36 Filenames and Quoting.....................................................................................................................................37 Command line editing.......................................................................................................................................37 Scripting support...............................................................................................................................................37 Advanced Configuration Parameters................................................................................................................38 Recent changes..................................................................................................................................................39
Recommended publications
  • Fastbuild: Accelerating Docker Image Building for Efficient Development
    FastBuild: Accelerating Docker Image Building for Efficient Development and Deployment of Container Zhuo Huang1, Song Wu1∗, Song Jiang2 and Hai Jin1 1National Engineering Research Center for Big Data Technology and System 1Services Computing Technology and System Lab, Cluster and Grid Computing Lab 1School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, 430074, China 2Department of Computer Science and Engineering, University of Texas at Arlington, Texas 76019, U.S 1 fhuangzhuo, wusong, [email protected] [email protected] Abstract—Docker containers have been increasingly adopted is especially desired in a DevOps environment where frequent on various computing platforms to provide a lightweight vir- deployments occur. In the meantime, DevOps also requires tualized execution environment. Compared to virtual machines, repeated adjustments and testing of container images. An this technology can often reduce the launch time from a few minutes to less than 10 seconds, assuming the Docker image image is often iteratively re-built before and after a container is has been locally available. However, Docker images are highly launched from it. To support flexible customization of images, customizable, and are mostly built at runtime from a remote Docker adopts a mechanism to build images at the client side. base image by running instructions in a script (the Dockerfile). An image can be built by running a Dockerfile, which is During the instruction execution, a large number of input files a script containing instructions for building an image, from may have to be retrieved via the Internet. The image building may be an iterative process as one may need to repeatedly modify a base image that provides basic and highly customizable the Dockerfile until a desired image composition is received.
    [Show full text]
  • Pipenightdreams Osgcal-Doc Mumudvb Mpg123-Alsa Tbb
    pipenightdreams osgcal-doc mumudvb mpg123-alsa tbb-examples libgammu4-dbg gcc-4.1-doc snort-rules-default davical cutmp3 libevolution5.0-cil aspell-am python-gobject-doc openoffice.org-l10n-mn libc6-xen xserver-xorg trophy-data t38modem pioneers-console libnb-platform10-java libgtkglext1-ruby libboost-wave1.39-dev drgenius bfbtester libchromexvmcpro1 isdnutils-xtools ubuntuone-client openoffice.org2-math openoffice.org-l10n-lt lsb-cxx-ia32 kdeartwork-emoticons-kde4 wmpuzzle trafshow python-plplot lx-gdb link-monitor-applet libscm-dev liblog-agent-logger-perl libccrtp-doc libclass-throwable-perl kde-i18n-csb jack-jconv hamradio-menus coinor-libvol-doc msx-emulator bitbake nabi language-pack-gnome-zh libpaperg popularity-contest xracer-tools xfont-nexus opendrim-lmp-baseserver libvorbisfile-ruby liblinebreak-doc libgfcui-2.0-0c2a-dbg libblacs-mpi-dev dict-freedict-spa-eng blender-ogrexml aspell-da x11-apps openoffice.org-l10n-lv openoffice.org-l10n-nl pnmtopng libodbcinstq1 libhsqldb-java-doc libmono-addins-gui0.2-cil sg3-utils linux-backports-modules-alsa-2.6.31-19-generic yorick-yeti-gsl python-pymssql plasma-widget-cpuload mcpp gpsim-lcd cl-csv libhtml-clean-perl asterisk-dbg apt-dater-dbg libgnome-mag1-dev language-pack-gnome-yo python-crypto svn-autoreleasedeb sugar-terminal-activity mii-diag maria-doc libplexus-component-api-java-doc libhugs-hgl-bundled libchipcard-libgwenhywfar47-plugins libghc6-random-dev freefem3d ezmlm cakephp-scripts aspell-ar ara-byte not+sparc openoffice.org-l10n-nn linux-backports-modules-karmic-generic-pae
    [Show full text]
  • 8.2.4 High-Fidelity Prototyping
    8.2 Prototyping and construction 245 I Drive car to gas pump Take nozzle from pump ... and put it ~ntothe car's gas tank Squeeze trigger on Replace nozzle Pay cash~er the nozzle until when tank is full tank is full Figure 8.4 A storyboard depicting how to fill a car with gas. Wizard of Oz Another low-fidelity prototyping method called Wizard of Oz assumes that you have a software-based prototype. In this technique, the user sits at a computer screen and interacts with the software as though interacting with the product. In fact, however, the computer is connected to another ma- chine where a human operator sits and simulates the software's response to the user. The method takes its name from the classic story of the little girl who is swept away in a storm and finds herself in the Land of Oz (Baum and Denslow, 1900). 8.2.4 High-fidelity prototyping High-fidelity prototyping uses materials that you would expect to be in the final product and produces a prototype that looks much more like the final thing. For example, a prototype of a software system developed in Visual Basic is higher fi- delity than a paper-based mockup; a molded piece of plastic with a dummy key- board is a higher-fidelity prototype of the PalmPilot than the lump of wood. If you are to build a prototype in software, then clearly you need a software tool to support this. Common prototyping tools include Macromedia Director, Vi- sual Basic, and Smalltalk.
    [Show full text]
  • Technical Notes All Changes in Fedora 13
    Fedora 13 Technical Notes All changes in Fedora 13 Edited by The Fedora Docs Team Copyright © 2010 Red Hat, Inc. and others. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. The original authors of this document, and Red Hat, designate the Fedora Project as the "Attribution Party" for purposes of CC-BY-SA. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. For guidelines on the permitted uses of the Fedora trademarks, refer to https:// fedoraproject.org/wiki/Legal:Trademark_guidelines. Linux® is the registered trademark of Linus Torvalds in the United States and other countries. Java® is a registered trademark of Oracle and/or its affiliates. XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. All other trademarks are the property of their respective owners. Abstract This document lists all changed packages between Fedora 12 and Fedora 13.
    [Show full text]
  • (Computer-Mediated) Communication
    Submitted by Dipl-Ing. Robert Ecker Submitted at Analysis of Computer- Department of Telecooperation Mediated Discourses Supervisor and First Examiner Univ.-Prof. Mag. Dr. Focusing on Automated Gabriele Anderst-Kotsis Second Examiner Detection and Guessing o. Univ.-Prof. Dipl.-Ing. Dr. Michael Schrefl of Structural Sender- August 2017 Receiver Relations Doctoral Thesis to obtain the academic degree of Doktor der technischen Wissenschaften in the Doctoral Program Technische Wissenschaften JOHANNES KEPLER UNIVERSITY LINZ Altenbergerstraße 69 4040 Linz, Osterreich¨ www.jku.at DVR 0093696 Kurzfassung Formen der computervermittelten Kommunikation (CvK) sind allgegenwärtig und beein- flussen unser Leben täglich. Facebook, Myspace, Skype, Twitter, WhatsApp und YouTube produzieren große Mengen an Daten - ideal für Analysen. Automatisierte Tools für die Diskursanalyse verarbeiten diese enormen Mengen an computervermittelten Diskursen schnell. Diese Dissertation beschreibt die Entwicklung und Struktur einer Software- Architektur für ein automatisiertes Tool, das computervermittelte Diskurse analysiert, um die Frage “Wer kommuniziert mit wem?” zu jedem Zeitpunkt zu beantworten. Die Zuweisung von Empfängern zu jeder einzelnen Nachricht ist ein wichtiger Schritt. Direkte Adressierung hilft, wird aber nicht in jeder Nachricht verwendet. Populäre Kommunikationsmodelle und die am weitesten verbreiteten CvK-Systeme werden untersucht. Das zugrunde liegende Kommunikationsmodell verdeutlicht die wesentlichen Elemente von CvK und zeigt, wie diese Kommunikation
    [Show full text]
  • Table of Contents
    Contents 1 Table of Contents Foreword 0 Part I Welcome to mIRC 5 Part II Connect to a Server 5 1 Connection Issues................................................................................................................................... 6 Part III Join a Channel 6 1 Channels List................................................................................................................................... 8 Part IV Chat Privately 9 Part V Send and Receive Files 9 1 Accepting Files................................................................................................................................... 11 Part VI Change Colors 12 1 Control Codes................................................................................................................................... 12 Part VII Options 14 1 Connect ................................................................................................................................... 14 Servers .......................................................................................................................................................... 15 Options .......................................................................................................................................................... 16 Identd .......................................................................................................................................................... 18 Proxy .........................................................................................................................................................
    [Show full text]
  • How to Install the IRC Bouncer ZNC on Linux Debian and How to Use It with MIRC
    How To Install The IRC Bouncer ZNC On Linux Debian And How To Use It With MIRC How To Install The IRC Bouncer ZNC On Linux Debian And How To Use It With MIRC 1 / 4 2 / 4 ZNC is an advanced IRC bouncer that can establish such a permanent ... The default install includes SSL setup for secure web access, using a .... How to connect via mIRC (Windows) Add the IP address of your server, the port is the one you chose in the –makeconf step. As a password use “username:password”. E.g. if you made a user in the –makeconf step named “tiq” with the password “tiqtiq”, type into the password field “tiq:tiqtiq”.. Binary packages and builds of WeeChat are available for installation as well as the source code for self compilation. This includes most Linux distributions and .... To create new wiki account, please join us on #znc at freenode and ask ... an advanced IRC bouncer that is left connected so an IRC client can ... Or you can try testing version, using nightly tarball or Git. Older versions can be found here. Several distros provide ZNC as a package, look at Installation page .... ZNC is an IRC network bouncer software. ... If you have finished all of the above steps, you have successfully installed ZNC on Ubuntu Linux! ... Note which port you have told ZNC to use because you will connect to ZNC .... Many avid IRC users use an IRC bouncer, a proxy service that keeps you ... explains how to install ZNC on Fedora and how to configure an IRC ...
    [Show full text]
  • Apache-Ivy Wordgrinder Nethogs Qtfm Fcgi Enblend-Enfuse
    eric Ted fsvs kegs ht tome wmii ttcp ess stgit nut heyu lshw 0th tiger ecl r+e vcp glfw trf sage p6f aris gq dstat vice glpk kvirc scite lyx yagf cim fdm atop slock fann G8$ fmit tkcvs pev bip vym fbida fyre yate yturl ogre owfs aide sdcv ncdu srm ack .eex ddd exim .wm ibam siege eagle xlt xclip gts .pilot atool xskat faust qucs gcal nrpe gavl tintin ruff wdfs spin wink vde+ ldns xpad qxkb kile ent gocr uae rssh gpac p0v qpdf pudb mew cc e afuse igal+ naim lurc xsel fcgi qtfm sphinx vmpk libsmi aterm lxsplit cgit librcd fuseiso squi gnugo spotify verilog kasumi pattern liboop latrace quassel gaupol firehol hydra emoc fi mo brlcad bashdb nginx d en+ xvnkb snappy gemrb bigloo sqlite+ shorten tcludp stardict rss-glx astyle yespl hatari loopy amrwb wally id3tool 3proxy d.ango cvsps cbmfs ledger beaver bsddb3 pptpd comgt x.obs abook gauche lxinput povray peg-e icecat toilet curtain gtypist hping3 clam wmdl splint fribid rope ssmtp grisbi crystal logpp ggobi ccrypt snes>x snack culmus libtirpc loemu herrie iripdb dosbox 8yro0 unhide tclvfs dtach varnish knock tracker kforth gbdfed tvtime netatop 8y,wt blake+ qmmp cgoban nexui kdesvn xrestop ifstatus xforms gtklife gmrun pwgen httrack prelink trrnt ip qlipper audiere ssdeep biew waon catdoc icecast uif+iso mirage epdfview tools meld subtle parcellite fusesmb gp+fasta alsa-tools pekwm viewnior mailman memuse hylafax= pydblite sloccount cdwrite uemacs hddtemp wxGT) adom .ulius qrencode usbmon openscap irssi!otr rss-guard psftools anacron mongodb nero-aac gem+tg gambas3 rsnapshot file-roller schedtool
    [Show full text]
  • Irc Software for Mac
    Irc software for mac click here to download Mac IRC clients are all grown up and have entered the new era of free cloud computing and the Mac App Store. Most apps in this list are free or just a few dollars. This is a radical change from just a few years ago, when the best apps were shareware worth $30 or more. All of these apps are stable and usable, and that ​Colloquy · ​Textual · ​Snak. Tab, Complete nickname. Ctrl+Tab Opt+Space, Move to the next unread channel. Ctrl+Shift+Tab Opt+Shift+Space, Move to the previous unread channel. Opt+Tab, Move back to the previously selected channel. Cmd+Up/Down Cmd+Opt+Up/Down Cmd+{/}, Move to the previous/next active channel. Ctrl+Up/Down, Move to. Traditionally, chat clients on the Mac have been anything but glamorous. Colloquy is an advanced IRC, SILC & ICB client which aims to fill this void. By adhering to Mac OS X interface conventions, Colloquy has the look and feel of a quality Mac application. AppleScript. A powerful dictionary for easy scripting. IRC, SILC. Get the answer to "What are the best IRC clients for Mac?" See a list of the top 8 options and learn their pros and cons. Textual is an IRC client created specifically for macOS. I've read good things about Colloquy but i was hoping to get some info from someone with some first hand knowledge. Thanks! Hey all, I'm just wondering what is a good IRC client for Mac. I use it sometimes but don't really use it too much.
    [Show full text]
  • Cyber-Workfield
    Cyber-workfield Uncovering the spectrum during COVID-19 confinement 2020 Design anthropology ​ ​ Patricia Saco Atanes Introduction About this study There are multiple reasons, occasional and personal, that have led me to choose this community over others. On the one hand, the physical limitation of this stage of confinement as a result of the COVID-19 has completely reduced my options for field work ​ ​ outdoors. On the other hand, my son's recent diagnosis with Aperger’s has opened a ​ ​ new door in my life towards a new way of seeing and understanding things, both for him and for me. The one and the other have led me to enter an online IRC community, with ​ ​ the main goal of better understanding how is their day-to-day reality, and get support for my day-to-day. Goal The main purpose of this project is to understand the relationship of this community with a specific object, which in this case will be the chat, as a ​ ​ ​ ​ virtual physical object for interaction. Dedication & technical details We will consider this chat anonymous, and we will call it #autism. ​ ​ The study has taken place from March 28 to May 9, 2020, covering more than ​ ​ 1 month, with an average interaction of 18 hours per week, which lays on, more than 80 hours of participation. ​ ​ The interactions have been spaced at different times of the day and with ​ ​ different groups of users in order to have a complete view of the experience, especially taking into account the different locations of its users. ​ ​ Uncovering the spectrum during COVID-19 confinement ​ ​Patricia Saco Ethical statement I am not showing any kind of private data like nicknames, real names, IPs or ​ ​ chatroom names in this report just to respect all of the people that have been helping me and supporting me during the last month and a half.
    [Show full text]
  • Limnoria Documentation
    Limnoria Documentation The Limnoria/Gribble/Supybot contributors Sep 20, 2021 Contents 1 User Guide 3 1.1 Installing Limnoria on GNU/Linux and UNIX (FreeBSD, macOS, . )................3 1.2 Installing Limnoria on Windows.....................................6 1.3 Getting Started with Limnoria/Supybot.................................8 1.4 Configuration............................................... 13 1.5 Identifying the bot to services...................................... 16 1.6 Capabilities................................................ 19 1.7 Security in Limnoria........................................... 23 1.8 Using the HTTP server.......................................... 25 1.9 Restarting the bot automatically..................................... 27 1.10 Frequently Asked Questions....................................... 29 2 Plugin Developer Guide 35 2.1 Writing Your First Limnoria Plugin................................... 35 2.2 Using commands.wrap to parse your command’s arguments...................... 43 2.3 Style Guidelines............................................. 51 2.4 Advanced Plugin Config......................................... 53 2.5 Advanced Plugin Testing......................................... 61 2.6 Distributing plugins........................................... 65 2.7 Using Supybot’s utils module...................................... 68 2.8 Capabilities................................................ 74 2.9 Special methods and catching events.................................. 75 2.10 Using Limnoria’s HTTP server
    [Show full text]
  • Fastbuild: Accelerating Docker Image Building for Efficient Development
    FastBuild: Accelerating Docker Image Building for Efficient Development and Deployment of Container Zhuo Huang1, Song Wu1∗, Song Jiang2 and Hai Jin1 1National Engineering Research Center for Big Data Technology and System 1Services Computing Technology and System Lab, Cluster and Grid Computing Lab 1School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, 430074, China 2Department of Computer Science and Engineering, University of Texas at Arlington, Texas 76019, U.S 1 fhuangzhuo, wusong, [email protected] [email protected] Abstract—Docker containers have been increasingly adopted is especially desired in a DevOps environment where frequent on various computing platforms to provide a lightweight vir- deployments occur. In the meantime, DevOps also requires tualized execution environment. Compared to virtual machines, repeated adjustments and testing of container images. An this technology can often reduce the launch time from a few minutes to less than 10 seconds, assuming the Docker image image is often iteratively re-built before and after a container has been locally available. However, Docker images are highly is launched from it. To support flexible customization of customizable, and are mostly built at run time from a remote images, Docker adopts a mechanism to build images at the base image by running instructions in a script (the Dockerfile). client side. An image can be built by running a Dockerfile, During the instruction execution, a large number of input files a script containing instructions for building an image, from may have to be retrieved via the Internet. The image building may be an iterative process as one may need to repeatedly modify the a base image that provides basic and highly customizable Dockerfile until a desired image composition is received.
    [Show full text]