SMPP Testing & Development

SMPP Development

The following libraries are available for adding SMPP protocol support to an application:

 C++ cpp-smpp [others]
 C# SMPP.NET [others]
 Go gosmpp [others]
 Java OpenSMPP [others]
 Node.js node-smpp [others]
 Perl Net-SMPP [others]
 PHP php-smpp [others]
 Python python-smpp [others]
 Ruby ruby-smpp [others]

SMPP Testing

The following services can be used to test (i) an application that supports SMPP for sending SMS, receiving SMS or both, or (ii) the extent of SMPP support of an SMS gateway or Short Message Service Center:

Capturing SMPP packets using tshark/wireshark

Performing a packet capture of an SMPP session can be helpful in diagnosing problems. Wireshark and tshark can be used to capture the SMPP session and display the PDUs.

If tshark is not installed on your machine then run one of the following (or equivalent) to install:

sudo yum install wireshark

sudo apt install tshark

To perform a capture, where TCP port 2775 is being used for SMPP:

tshark -i eth0 port 2775 -Y smpp.command_id!=0

(alternatively, tshark -i eth0 port 2775 )

Example command output:

$ sudo tshark -i eth0 port 2775 -Y smpp.command_id!=0
Capturing on 'eth0'
455 23.400286671 35.176.139.169 -> 172.31.39.100 SMPP 107 SMPP Bind_receiver
457 23.400600221 172.31.39.100 -> 35.176.139.169 SMPP 98 SMPP Bind_receiver - resp: "Ok"
460 23.410763283 35.176.139.169 -> 172.31.39.100 SMPP 82 SMPP Unbind
461 23.410930297 172.31.39.100 -> 35.176.139.169 SMPP 82 SMPP Unbind - resp: "Ok"

Use the following to capture to file (/tmp/s.pcap) so you can view later in Wireshark:

tshark -i eth0 -w /tmp/s.pcap port 2775

Copyright © 2019 SMPP.org


Privacy Policy | Home