pg3, ipg, pgset — send stream of UDP packets
ipg is not a program, it is script which should be sourced to bash. When sourced it loads module pg3 and exports a few of functions accessible from parent shell. These macros are pg to start packet injection and to get the results of run; and pgset to setup packet generator.
pgset can send the following commands to module pg3:
Name of Ethernet device to test. See warning below.
Size of packet to generate. The size includes all the headers: UDP, IP, MAC, but does not account for overhead internal to medium, i.e. FCS and various paddings.
Each packet will contain NUMBER of fragments. Maximal amount for linux-2.4 is 6. Far not all the devices support fragmented buffers.
Send stream of NUMBER of packets and stop after this.
Introduce artificial delay between packets of TIME microseconds.
Select IP destination where the stream is sent to. Beware, never set this address at random. pg3 is not a toy, it creates really tough stream. Default value is 0.0.0.0.
Select MAC destination where the stream is sent to. Default value is 00:00:00:00:00:00 in hope that this will not be received by any node on LAN.
Abort packet injection.
When output device is set to some random device different of hardware Ethernet device, pg3 will crash kernel.
Do not use it on VLAN, ethertap, VTUN and other devices, which emulate Ethernet not being real Ethernet in fact.
This can be used only by superuser.
This tool creates floods of packets which is unlikely to be handled even by high-end machines. For example, it saturates gigabit link with 60 byte packets when used with Intel's e1000. In face of such stream switches, routers and end hosts may deadlock, crash, explode. Use only in test lab environment.