Sponsored Content
Full Discussion: Discovering Network Topology
Special Forums UNIX and Linux Applications Infrastructure Monitoring Discovering Network Topology Post 302414214 by nzeidat on Monday 19th of April 2010 12:45:33 PM
Old 04-19-2010
Lightbulb Topology discovery tool

Thank you sysgate for your reply.
I am not sure the first suggestion is feasible. This is a “controlled” project/deployment. The second suggestion is closer to what the team here seems to be marching towards, although the solution is still in the architecture phase, options are still being discussed. I am not sure, actually, whether RIP has any bearing on the solution (something I need to search). The group seems to agree that the solution needs to be implemented as part of the kernel (of a RT operating system, VxWorks) & that the solution takes the form of a “UDP or TCP socket based client/server model”. The “client kernel tasks” run on some workstations in the cluster of networks that make the environment. “Server kernel tasks” run on all routers. When a “client kernel task” is asked to find all possible paths between a pair of hosts and if that destination host is not on the local subnet, it turns around & asks that question to the “Server kernel task” running on its local router. If needed, routers will start communicating with each others asking each others the same question. Eventually, a router on the subnet where the destination address is reached and reply start going back. During the “reply back” phase buffers are getting populated with the interfaces, IP addresses, and other metrics, until the final reply reaches the host that initiated the request. The group thinks that the solution needs to be implemented in the network/IP layer and the lower.

I am not sure how this compares to the “traceroute, ping, SNMP, & DNS queries” solution you are suggesting. All these are applications on op of the network (IP) layer. Although they do similar things described in our “Client/Server” solution described above. !!!??? Any comments/thoughts??
 

6 More Discussions You Might Find Interesting

1. Cybersecurity

help with discovering bad passwords question

Is there of a scheme for discovering badly chosen user passwords from a Unix password file? Im not learning anything bad or trying to hack,this a question that was given to me in an information security seminar. Would password cracker be a correct answer? (1 Reply)
Discussion started by: jodders
1 Replies

2. IP Networking

ssh server is attachable from local network not from another network

hello i have a ubuntu ssh server that i can acess from any of my comnputers but only if they are on the same wireless network as the server. i tested trhis my tehtehring my samsung blackjack to my windows partition and installing openssh to windows it works when windows is on the wireless but no... (1 Reply)
Discussion started by: old noob
1 Replies

3. UNIX for Dummies Questions & Answers

discovering which ports are in use

I am trying to find a way to discover which ports are in use on a UNIX system. I cannot install lsof on it, and it looks like the telnet option is disabled. (7 Replies)
Discussion started by: dck133
7 Replies

4. UNIX for Dummies Questions & Answers

Network Topology Discovery

Hello All! New Unix admin here, with a bit of a problem I can't seem to get a straight answer to.. I've been tasked with mapping out the topology (with IPs/Hostnames) of networks...remotely. So, I have SSH access to firewalls, but that's about as far as I can get - how would I go about... (4 Replies)
Discussion started by: Tiyugro
4 Replies

5. Shell Programming and Scripting

Discovering TOP process on virtual machine

Hello, on my openvz server, i can output load averages of containers: Code: # vzlist -o laverage,ctid -H 0.00/0.00/0.00 130 0.10/0.10/0.10 150 2.26/2.28/2.28 190please which command/script to use so it outputs top 1 or 2 processes on the linux system with 2.26 laverage? i mean, i want... (1 Reply)
Discussion started by: postcd
1 Replies

6. Red Hat

Network becomes slow and return fast only after restart network

Hi, I have 2 machines in production environment: 1. redhat machine for application 2. DB machine (oracle) The application doing a lot of small read&writes from and to the DB machine. The problem is that after some few hours the network from the application to the DB becomes very slow and... (4 Replies)
Discussion started by: moshesa
4 Replies
srconfig(8)						      System Manager's Manual						       srconfig(8)

NAME
srconfig - Displays and controls source routing functions and parameters for communication on token ring networks SYNOPSIS
/usr/sbin/srconfig [options] OPTIONS
The options are case insensitive; use uppercase, lowercase, or any combination. The short form of each option is indicated by capital let- ters. For example -DElentry can be shortened to -de and -Enasr can be shortened to -e. Deletes the entry in the source routing database for the destination (target) node that has the address mac_address. This option requires superuser privileges. Disables the entry in the source routing database for the destination (target) node that has the address mac_address, marking the entry as Stale. The system attempts to update the entry through its route discovery process the next time it needs to communicate with this node. This option requires supe- ruser privileges. Displays whether source routing is enabled. If enabled, it also displays the following source routing attributes whose values you can set with the other srconfig options. Current Source Routing Aging Timer value Current Source Routing Discovery Timer value Current Source Routing Table size Displays the following counters that are associated with the source routing database: All Routes Explore (ARE) frames sent ARE frames received Route discovery failures Displays the entry for the node with address mac_address in the source rout- ing database. Each entry describes the current description of the best path to the node. There is no default value for mac_address. Dis- plays all entries in the source routing database. (See -re option.) Sets the value of the Source Routing Aging Timer, specifying the length of time a source routing table entry remains valid before being marked as invalid or Stale. If not set, the system default is 120 seconds. This option requires superuser privileges. Sets the value of the Source Routing Discovery Timer, specifying the amount of time a route discovery process can take before it terminates. If not set, the system default is 5 seconds. This option requires superuser privi- leges. Sets the maximum number of entries in the source routing database. The range of this parameter is a multiple of 256 from 1024 to 2048. If not set, the system default is 1024. This parameter can only be increased, not decreased. This option requires superuser privi- leges. Specifies that the MAC addresses are in non-canonical form. This option can be used with the -DElentry, -DISEntry, -REntry, and -RTable options only. Sets the source routing counters to zero. DESCRIPTION
The srconfig command reads and modifies entries in the your local system's source routing database. For every remote system on an extended token ring network with which your local system communicates, there exists a corresponding entry in your local system's source routing database. Each entry describes the path to the remote system on the network. Source routing is the mechanism by which data transmitted from your local node reaches remote systems on other token ring LANs. Your sys- tem maintains a source routing database so token ring adapters, for example tra0, can find the route a message is to take to a remote des- tination. The entries list the specific token ring LANs (and their interconnecting bridges) that the data is to traverse to the remote system. To maintain its source routing database, your system frequently executes a route discovery process to find the most efficient route to each remote system. The route discovery process and source routing itself are largely automatic. However, you can use the srconfig commands to manually change the source routing database entries. You need superuser privileges to use the srconfig options, except for the read options. EXAMPLES
To display all the entries in your source routing database, enter: srconfig -rt Target Node MAC Address 00-00-0C-01-08-E9 (ip = 130.180.4.3) Have Route Routing Information: SRF, length 8, direction 0,largest frame 4472 octets Route Descriptors: 021C 7FFC 0220 0000 0000 0000 0000 0000 Target Node MAC Address 00-00-C9-10-1B-F5 On Ring To display the source routing database entry that applies to a destination node with address 00-00-c9-10-4a-f3, enter: srconfig -re 00-00-c9-10-4a-f3 Target Node MAC Address 00-00-C9-10-4A-F3 On Ring To specify a time period of 10 seconds during which your system runs the route discovery process for its target nodes, enter: srconfig -setd 10 SEE ALSO
Network Administration Network Programmer's Guide srconfig(8)
All times are GMT -4. The time now is 07:45 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy