[Winpcap-users] WinPCAP packets capture delay..

Alimjan Kuramshin alimjankuramshin at gmail.com
Mon Sep 20 20:58:21 PDT 2010


Hello, Gianluca!

Thanks for reply. Maximum delay, and it's not gone away from test to test, is about 2-5 ms.. within 10000 packets and about ~15 ms maximum
value within 1000000 packets. And, i guess, very important thing, that is delay present in all of the test, doesn't meter how many times i've
run the test. 

Many thanks, bye.

21.09.2010, в 3:38, Gianluca Varenni написал(а):

> Alimjan,
>  
> what is the result that you get with this test?
>  
> GV
> 
> From: Alimjan Kuramshin
> Sent: Saturday, September 18, 2010 2:32 PM
> To: winpcap-users at winpcap.org
> Subject: [Winpcap-users] WinPCAP packets capture delay..
> 
> Hello!
> 
> Gianluca, can u run this code on Your machine and running the Wireshark save the log and send it to me, please..
> Is there any delays, i mean delays between the packets that Wireshark (winpcap) capture?
> 
> P.S. code from WinPcap documentation, sending packets, not one, but 10000 (or 1000000)..
> 
> #include <stdlib.h>
> #include <stdio.h>
> 
> #include <pcap.h>
> 
> 
> void main(int argc, char **argv)
> {
> pcap_t *fp;
> char errbuf[PCAP_ERRBUF_SIZE];
> u_char packet[100];
> int i;
> volatile int n_pkts = 10000; // 1000000
> 
>     /* Check the validity of the command line */
>     if (argc != 2)
>     {
>         printf("usage: %s interface (e.g. 'rpcap://eth0')", argv[0]);
>         return;
>     }
>     
>     /* Open the output device */
>     if ( (fp= pcap_open(argv[1],            // name of the device
>                         65536,                // portion of the packet to capture (only the first 100 bytes)
>                         PCAP_OPENFLAG_PROMISCUOUS,  // promiscuous mode
>                         1000,               // read timeout
>                         NULL,               // authentication on the remote machine
>                         errbuf              // error buffer
>                         ) ) == NULL)
>     {
>         fprintf(stderr,"\nUnable to open the adapter. %s is not supported by WinPcap\n", argv[1]);
>         return;
>     }
> 
>     /* Supposing to be on ethernet, set mac destination to 1:1:1:1:1:1 */
>     packet[0]=1;
>     packet[1]=1;
>     packet[2]=1;
>     packet[3]=1;
>     packet[4]=1;
>     packet[5]=1;
>     
>     /* set mac source to 2:2:2:2:2:2 */
>     packet[6]=2;
>     packet[7]=2;
>     packet[8]=2;
>     packet[9]=2;
>     packet[10]=2;
>     packet[11]=2;
>     
>     /* Fill the rest of the packet */
>     for(i=12;i<100;i++)
>     {
>         packet[i]=(u_char)i;
>     }
> 
>     while (n_pkts--)
>     /* Send down the packet */
>     if (pcap_sendpacket(fp, packet, 100 /* size */) != 0)
>     {
>         fprintf(stderr,"\nError sending the packet: %s\n", pcap_geterr(fp));
>         return;
>     }
> 
>     return;
> }
> /* EOF */
> Thanks, bye..
> 
> 
> 
> 
> _______________________________________________
> Winpcap-users mailing list
> Winpcap-users at winpcap.org
> https://www.winpcap.org/mailman/listinfo/winpcap-users
> _______________________________________________
> Winpcap-users mailing list
> Winpcap-users at winpcap.org
> https://www.winpcap.org/mailman/listinfo/winpcap-users

-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://www.winpcap.org/pipermail/winpcap-users/attachments/20100921/dbd9f6f4/attachment-0001.htm 


More information about the Winpcap-users mailing list