read the documents and the default configurations, its there, if you care to 
read them all



root@darkwater:[Wed May 11 09:54:28]:[/opt/kannel/sbin]$ ./fakesmsc --help
2011-05-11 09:54:36 [28905] [0] PANIC:
Usage: fakesmsc [-H host] [-r port] [-i interval] [-m max] [-z <type>] <msg> ...

* 'host' and 'port' define bearerbox connection (default localhost:10000),
* 'interval' is time in seconds (floats allowed) between generated messages,
* 'max' is the total number sent (-1, default, means unlimited),
* <type> bitmask of which elements to add randomized numbers for MO messages,
*        1: src no, 2: recv no, 4: last text element,
*        where the given static elements in <msg> are used as constant prefixes,
* <msg> is message to send, if several are given, they are sent randomly.

msg format: "sender receiver type(text/data/udh/route) [udhdata|route] msgdata"

Type "text" means plaintext msgdata, "data" urlcoded, "udh" urlcoded udh+msg
and "route" means smsbox-id routed plaintext msgdata
Examples:

fakesmsc -m 1 "123 345 udh %04udh%3f message+data+here"
fakesmsc -m 1 "123 345 route smsbox1 message+data+here"
fakesmsc -i 0.01 -m 1000 "123 345 text nop" "1 2 text another message here"
fakesmsc -z 7 -m 1000 "123<rand> 345<rand> text nop <rand>"

Server replies are shown in the same message format.

send 10000 fakes with some random text as digits from 1 to 25
root@darkwater:[Wed May 11 09:52:03]:[/opt/kannel/sbin]$ cat 
ops-2011-05.10000.fake.sh
#/bin/sh
#
echo "non active !!! open and fix "
#./fakesmsc -z 1 -i 0 -m 10000 \
"34622 4444 text 1" \
"34622 4444 text 2"  \
"34622 4444 text 3"  \
"34622 4444 text 4"  \
"34622 4444 text 5"  \
"34622 4444 text 6"  \
"34622 4444 text 7"  \
"34622 4444 text 8"  \
"34622 4444 text 9"  \
"34622 4444 text 10"  \
"34622 4444 text 11"  \
"34622 4444 text 12"  \
"34622 4444 text 13"  \
"34622 4444 text 14"  \
"34622 4444 text 15"  \
"34622 4444 text 16"  \
"34622 4444 text 17"  \
"34622 4444 text 18"  \
"34622 4444 text 19"  \
"34622 4444 text 20"  \
"34622 4444 text 21"  \
"34622 4444 text 22"  \
"34622 4444 text 23"  \
"34622 4444 text 24"  \
"34622 4444 text 25"  \



On 05/11/11 08:47, Deborah Pisani wrote:
> Hi Nikos,
> 
> We have already been through the User Guide.  It does not include
> anything on how to start fakesmsc and make it listen on a specified
> port.
> 
> Best Regards,
> 
> 
> Deborah and Andrew
> 
> -----Original Message-----
> From: Nikos Balkanas [mailto:[email protected]] 
> Sent: 10 May 2011 19:58
> To: Deborah Pisani; [email protected]
> Subject: Re: Fake SMSC
> 
> Please read UG.
> 
> BR,
> Nikos
> ----- Original Message ----- 
> From: "Deborah Pisani" <[email protected]>
> To: "Nikos Balkanas" <[email protected]>; <[email protected]>
> Sent: Tuesday, May 10, 2011 6:49 PM
> Subject: RE: Fake SMSC
> 
> 
> Hi Nikos,
> 
> Thank you for the reply.  Is there a specific switch which can be used
> when starting up fakesmsc to set the fakesmsc listening port (e.g.
> 2948)?
> 
> Best Regards,
> 
> 
> Deborah
> 
> -----Original Message-----
> From: Nikos Balkanas [mailto:[email protected]] 
> Sent: 10 May 2011 17:42
> To: Deborah Pisani; [email protected]
> Subject: Re: Fake SMSC
> 
> Yes, you can use fake smsc to test PPG. You can assign any available
> port to 
> FAKE smsc, but that refers to the port listening for the fakesmsc
> client, 
> not bearerbox. Fake SMSc needs the client, fakesmsc, connected to work.
> 
> BR,
> Nikos
> ----- Original Message ----- 
> From: Deborah Pisani
> To: [email protected]
> Sent: Tuesday, May 10, 2011 3:41 PM
> Subject: Fake SMSC
> 
> 
> Hello,
> 
> 
> We are trying to use the Fake SMSC to test WAP Push.  Is this possible
> and, 
> if yes, does this mean that the Fake SMSC has to be configured to run on
> 
> port 2948 to receive the WAP Push via Bearerbox?
> 
> Thank you.
> 
> 
> Best Regards,
> 
> 
> Deborah and Andrew 
> 
> 
> 
> 

Reply via email to