Sponsored Content
Full Discussion: Discovering Network Topology
Special Forums UNIX and Linux Applications Infrastructure Monitoring Discovering Network Topology Post 302414618 by nzeidat on Tuesday 20th of April 2010 02:32:26 PM
Old 04-20-2010
Dear sysdate,
I belive our methd is also going to be running on top of the IP layer. It will use IP type system calls to access entries in th Routing table to decide what interface(s) to take to further "travel" on the network to reach the dstination host. It might not use the exact same mechanisms that tracerout, ping, or DNS queries use, but something similar.

Can you think of a reason why such approach won't work?
 

6 More Discussions You Might Find Interesting

1. Cybersecurity

help with discovering bad passwords question

Is there of a scheme for discovering badly chosen user passwords from a Unix password file? Im not learning anything bad or trying to hack,this a question that was given to me in an information security seminar. Would password cracker be a correct answer? (1 Reply)
Discussion started by: jodders
1 Replies

2. IP Networking

ssh server is attachable from local network not from another network

hello i have a ubuntu ssh server that i can acess from any of my comnputers but only if they are on the same wireless network as the server. i tested trhis my tehtehring my samsung blackjack to my windows partition and installing openssh to windows it works when windows is on the wireless but no... (1 Reply)
Discussion started by: old noob
1 Replies

3. UNIX for Dummies Questions & Answers

discovering which ports are in use

I am trying to find a way to discover which ports are in use on a UNIX system. I cannot install lsof on it, and it looks like the telnet option is disabled. (7 Replies)
Discussion started by: dck133
7 Replies

4. UNIX for Dummies Questions & Answers

Network Topology Discovery

Hello All! New Unix admin here, with a bit of a problem I can't seem to get a straight answer to.. I've been tasked with mapping out the topology (with IPs/Hostnames) of networks...remotely. So, I have SSH access to firewalls, but that's about as far as I can get - how would I go about... (4 Replies)
Discussion started by: Tiyugro
4 Replies

5. Shell Programming and Scripting

Discovering TOP process on virtual machine

Hello, on my openvz server, i can output load averages of containers: Code: # vzlist -o laverage,ctid -H 0.00/0.00/0.00 130 0.10/0.10/0.10 150 2.26/2.28/2.28 190please which command/script to use so it outputs top 1 or 2 processes on the linux system with 2.26 laverage? i mean, i want... (1 Reply)
Discussion started by: postcd
1 Replies

6. Red Hat

Network becomes slow and return fast only after restart network

Hi, I have 2 machines in production environment: 1. redhat machine for application 2. DB machine (oracle) The application doing a lot of small read&writes from and to the DB machine. The problem is that after some few hours the network from the application to the DB becomes very slow and... (4 Replies)
Discussion started by: moshesa
4 Replies
Net::DNS::RR::EUI64(3)					User Contributed Perl Documentation				    Net::DNS::RR::EUI64(3)

NAME
Net::DNS::RR::EUI64 - DNS EUI64 resource record SYNOPSIS
use Net::DNS; $rr = new Net::DNS::RR('name IN EUI64 address'); $rr = new Net::DNS::RR( name => 'example.com', type => 'EUI64', address => '00-00-5e-ef-10-00-00-2a' ); DESCRIPTION
DNS resource records for 64-bit Extended Unique Identifier (EUI64). The EUI64 resource record is used to represent IEEE Extended Unique Identifiers used in various layer-2 networks, ethernet for example. EUI64 addresses SHOULD NOT be published in the public DNS. RFC7043 describes potentially severe privacy implications resulting from indiscriminate publication of link-layer addresses in the DNS. METHODS
The available methods are those inherited from the base class augmented by the type-specific methods defined in this package. Use of undocumented package features or direct access to internal data structures is discouraged and could result in program termination or other unpredictable behaviour. address The address field is a 8-octet layer-2 address in network byte order. The presentation format is hexadecimal separated by "-". COPYRIGHT
Copyright (c)2013 Dick Franks. All rights reserved. This program is free software; you may redistribute it and/or modify it under the same terms as Perl itself. Package template (c)2009,2012 O.M.Kolkman and R.W.Franks. SEE ALSO
perl, Net::DNS, Net::DNS::RR, RFC7043 perl v5.18.2 2014-01-16 Net::DNS::RR::EUI64(3)
All times are GMT -4. The time now is 09:09 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy