Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Tcl 8.5 Network Programming

You're reading from   Tcl 8.5 Network Programming Learn Tcl and you‚Äôll never look back when it comes to developing network-aware applications. This book is the perfect way in, taking you from the basics to more advanced topics in easy, logical steps.

Arrow left icon
Product type Paperback
Published in Jul 2010
Publisher Packt
ISBN-13 9781849510967
Length 588 pages
Edition 1st Edition
Languages
Tools
Concepts
Arrow right icon
Toc

Table of Contents (18) Chapters Close

Tcl 8.5 Network Programming
Credits
About the Authors
About the Reviewers
1. Preface
1. Introducing Tcl FREE CHAPTER 2. Advanced Tcl Features 3. Tcl Standalone Binaries 4. Troubleshooting Tcl applications 5. Data Storage 6. Networking in Tcl 7. Using Common Internet Services 8. Using Additional Internet Services 9. Learning SNMP 10. Web Programming in Tcl 11. TclHttpd in Client-Server Applications 12. SOAP and XML-RPC 13. SSL and Security

Chapter 9. Learning SNMP

In this chapter, we'll learn about the Simple Network Management Protocol (SNMP), which is often used for monitoring and gathering information from various devices; such as routers, gateways, printers, and many other types of equipment. We'll start by introducing SNMP and the various concepts surrounding it, which will be useful for readers who do not have much experience with SNMP.

We'll talk about the Tcl package Scotty, which handles SNMP, and how it can be used to query information from within our application. It also provides a Tk-based GUI application that can be used for inspecting devices, discovering systems within our network, and browsing data that can be retrieved over SNMP.

We'll show how Scotty can be used for retrieving SNMP values, and mapping between raw values and readable representations. You will also learn how to set any values that a particular device allows us to set.

This chapter also talks about SNMP traps and how they can be both sent and...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image