Hi Steve,
Thank's for your answer. I have done exactly the same test than you:
- Small changes in perf/remote_thr.cpp file
- Compile it and run it
- Look at tcpdump output
but on my Red Hat4 host, tcpdump is desperately silent.
I have tried on my Ubuntu 12.04 with zeromq 3.2.3 using OpenPGM 5.1.118
and 5.2.122 and obviously both cases run fine.
From what I understand from the result of your lsb_release command,
your RHE4 host is 64 bits. Mine is 32. Could it be the reason
of the problem?
Is it the way I have compiled zeromq for RHE4 (previously reported)
which results in this issue?
Here is the result of lsb_release -a on my host
LSB Version:
:core-3.0-ia32:core-3.0-noarch:graphics-3.0-ia32:graphics-3.0-noarch
Distributor ID: RedHatEnterpriseWS
Description: Red Hat Enterprise Linux WS release 4 (Nahant Update 6)
Release: 4
Codename: NahantUpdate6
Thank's for your help
Emmanuel
On 04/06/2013 17:56, Steven McCoy wrote:
On 4 June 2013 07:17, Emmanuel TAUREL <[email protected]
<mailto:[email protected]>> wrote:
Any help appreciated. Thank's in advance
Modify the stock remote_thr.cpp to use a ZMQ_PUB socket then define a
rate limit slightly higher than the default,
s = zmq_socket (ctx, ZMQ_PUB);
if (!s) {
printf ("error in zmq_socket: %s\n", zmq_strerror (errno));
return -1;
}
// Add your socket options here.
// For example ZMQ_RATE, ZMQ_RECOVERY_IVL and ZMQ_MCAST_LOOP for PGM.
int rate = 10 * 1000;
rc = zmq_setsockopt (s, ZMQ_RATE, (void*)&rate, sizeof (rate));
if (rc != 0) {
printf ("error in zmq_setsockopt: %s\n", zmq_strerror (errno));
return -1;
}
Running the following,
[steve-o@nylabdev4 perf]$ *./remote_thr
"epgm://eth0;239.192.0.30:6030 <http://239.192.0.30:6030>" 100 10*
Warn: ToS/DSCP setting requires CAP_NET_ADMIN or ADMIN capability.
[steve-o@nylabdev4 perf]$ lsb_release -a
LSB Version:
:core-3.0-amd64:core-3.0-noarch:graphics-3.0-amd64:graphics-3.0-noarch
Distributor ID: RedHatEnterpriseAS
Description: Red Hat Enterprise Linux AS release 4 (Nahant Update 8)
Release: 4
Codename: NahantUpdate8
Whilst,
[steve-o@nylabdev4 ~]$ *sudo /usr/sbin/tcpdump port 6030*
Password:
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), capture size 96 bytes
11:55:26.013107 IP nylabdev4.36877 > 239.192.0.30.6030: UDP, length 36
11:55:26.013439 IP nylabdev4.36877 > 239.192.0.30.6030: UDP, length 36
11:55:26.013444 IP nylabdev4.36877 > 239.192.0.30.6030: UDP, length 36
11:55:26.013498 IP nylabdev4.38468 > 239.192.0.30.6030: UDP, length 1048
11:55:26.113495 IP nylabdev4.36877 > 239.192.0.30.6030: UDP, length 36
11:55:26.213494 IP nylabdev4.36877 > 239.192.0.30.6030: UDP, length 36
11:55:26.313494 IP nylabdev4.36877 > 239.192.0.30.6030: UDP, length 36
11:55:26.413493 IP nylabdev4.36877 > 239.192.0.30.6030: UDP, length 36
11:55:26.513495 IP nylabdev4.36877 > 239.192.0.30.6030: UDP, length 36
11:55:27.813499 IP nylabdev4.36877 > 239.192.0.30.6030: UDP, length 36
10 packets captured
10 packets received by filter
0 packets dropped by kernel
--
Steve-o
_______________________________________________
zeromq-dev mailing list
[email protected]
http://lists.zeromq.org/mailman/listinfo/zeromq-dev