dnsperf | DNS Performance Testing Tools | DNS library

 by   DNS-OARC C Version: v2.11.2 License: Apache-2.0

kandi X-RAY | dnsperf Summary

kandi X-RAY | dnsperf Summary

dnsperf is a C library typically used in Networking, DNS applications. dnsperf has no bugs, it has no vulnerabilities, it has a Permissive License and it has low support. You can download it from GitHub.

dnsperf and resperf are free tools developed by Nominum/Akamai (2006-2018) and DNS-OARC (since 2019) that make it simple to gather accurate latency and throughput metrics for Domain Name Service (DNS). These tools are easy-to-use and simulate typical Internet, so network operators can benchmark their naming and addressing infrastructure and plan for upgrades. The latest version of the dnsperf and resperf can be used with test files that include IPv6 queries. dnsperf "self-paces" the DNS query load to simulate network conditions. New features in dnsperf improve the precision of latency measurements and allow for per packet per-query latency reporting is possible. dnsperf is now multithreaded, multiple dnsperf clients can be supported in multicore systems (each client requires two cores). The output of dnsperf has also been improved so it is more concise and useful. Latency data can be used to make detailed graphs, so it is simple for network operators to take advantage of the data. resperf systematically increases the query rate and monitors the response rate to simulate caching DNS services. See also the dnsperf(1) and resperf(1) man pages.
Support
    Quality
      Security
        License
          Reuse

            kandi-support Support

              dnsperf has a low active ecosystem.
              It has 314 star(s) with 58 fork(s). There are 18 watchers for this library.
              OutlinedDot
              It had no major release in the last 12 months.
              There are 6 open issues and 41 have been closed. On average issues are closed in 90 days. There are 3 open pull requests and 0 closed requests.
              It has a neutral sentiment in the developer community.
              The latest version of dnsperf is v2.11.2

            kandi-Quality Quality

              dnsperf has 0 bugs and 0 code smells.

            kandi-Security Security

              dnsperf has no vulnerabilities reported, and its dependent libraries have no vulnerabilities reported.
              dnsperf code analysis shows 0 unresolved vulnerabilities.
              There are 0 security hotspots that need review.

            kandi-License License

              dnsperf is licensed under the Apache-2.0 License. This license is Permissive.
              Permissive licenses have the least restrictions, and you can use them in most projects.

            kandi-Reuse Reuse

              dnsperf releases are available to install and integrate.
              Installation instructions are not available. Examples and code snippets are available.
              It has 50 lines of code, 0 functions and 2 files.
              It has low code complexity. Code complexity directly impacts maintainability of the code.

            Top functions reviewed by kandi - BETA

            kandi's functional review helps you automatically verify the functionalities of the libraries and avoid rework.
            Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of dnsperf
            Get all kandi verified functions for this library.

            dnsperf Key Features

            No Key Features are available at this moment for dnsperf.

            dnsperf Examples and Code Snippets

            No Code Snippets are available at this moment for dnsperf.

            Community Discussions

            QUESTION

            I have a question with option in DNSperf tool in Linux
            Asked 2020-Feb-19 at 09:30

            I tried to use the DNSperf tool that is the benchmark testing tool for an authoritative name server in Linux. This tool has various features to provide the result in many aspects. But I would like to know some options like -c and -q. I tried to observe it from the source code in C. But I don't get it.

            -c from the manual, it's written that

            -c clients Enables the local server to act as multiple clients and specifies the number of clients represented by this server. The server sends requests from multiple sockets. By default, the local server acts as a single client.

            In fact, it's just trying to send many queries as many internal threads from the source code. And the maximum of the inputted value in -c option must not exceed 256 that means the length of the socket should not exceed 256?

            And two: I'm also curious about the -q option, it's written that

            -q num_queries Sets the maximum number of outstanding requests. When this value is reached, dnsperf stops sending requests until either response is received or its requests time out. The default value is 100.

            What is the trigger runs the number reaches 100? I don't understand about this and I tried to seek out from the source code, it's quite too complex.

            Could everyone help me to understand it? I know my question is quite ambiguous, but I'm not sure how to exactly ask the right way about this so please help me.

            ...

            ANSWER

            Answered 2020-Feb-19 at 09:30

            "-c" option specifies how many local source ports to use when doing queries. This is default to 1. So, you will see all queries using only one source port. Maximum value 256 means that you can use a max of 256 unique src ports to send DNS queries.

            "-q" is the queue limit. There can be at most this many queries in the dnsperf queue when it stops generating new queries.

            So, if the DNS server is slower than usual and takes a longer time to respond, dnsperf will only generate "-q" number of queries and wait for responses.

            For example, if you set "-q" to 100, dnsperf will generate at most 100 queries and wait for their responses or timeout. If it gets 5 responses, it will generate 5 new queries, and again the queue will be full at 100. If the dns server is fast, it may happen that the queue limit of 100 is never reached, and dnsperf will make DNS queries as fast as possible.

            Be aware that using a high value for -c and -q will also likely increase the memory usage of dnsperf tool in certain network conditions.

            Source https://stackoverflow.com/questions/60286335

            Community Discussions, Code Snippets contain sources that include Stack Exchange Network

            Vulnerabilities

            No vulnerabilities reported

            Install dnsperf

            You can download it from GitHub.

            Support

            For any new features, suggestions and bugs create an issue on GitHub. If you have any questions check and ask questions on community page Stack Overflow .
            Find more information at:

            Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items

            Find more libraries

            Stay Updated

            Subscribe to our newsletter for trending solutions and developer bootcamps

            Agree to Sign up and Terms & Conditions

            Share this Page

            share link

            Explore Related Topics

            Consider Popular DNS Libraries

            AdGuardHome

            by AdguardTeam

            coredns

            by coredns

            sealos

            by fanux

            sshuttle

            by sshuttle

            dns

            by miekg

            Try Top Libraries by DNS-OARC

            PacketQ

            by DNS-OARCJavaScript

            flamethrower

            by DNS-OARCC++

            dnscap

            by DNS-OARCC

            dsc

            by DNS-OARCC

            dnsjit

            by DNS-OARCC