11-30-2011
You asked.
Do not use link-state algorithms (like dijkstra) or distance vector alogrithms (like Bellman-Ford) for an inter-domain problem. There are serious problems with them once you leave a domain; they work okay inside a domain only.
Before you waste your time see if RFC 1322 isn't what you want:
RFC 1322 - A Unified Approach to Inter-Domain Routing
It has links to algorithms I think.
9 More Discussions You Might Find Interesting
1. Programming
Hi
I search an exemple of scheduling Feedback algorithm, or help about how to create one.
Thanks (0 Replies)
Discussion started by: messier79
0 Replies
2. Solaris
I am tryin to change the sort fields in mainframes to the equivalent in Unix. I have a large datafile of which i extract only the specified fields ... cut them ... write it into another file with a delimiter... and sort based on these fields... then match these fields to those from input file ...... (1 Reply)
Discussion started by: bourne
1 Replies
3. Shell Programming and Scripting
PID USERNAME SIZE RSS STATE PRI NICE TIME CPU PROCESS/NLWP
21444 tomusr 213M 61M sleep 29 10 1:20:46 0.1% java/43
21249 root 93M 44M sleep 29 10 1:07:19 0.2% java/56
is there anyway i can use a command to get the total of the SIZE? 306M (Derive from... (5 Replies)
Discussion started by: filthymonk
5 Replies
4. UNIX for Advanced & Expert Users
A) produce an algorithm in pseudocode and a flowchart that gets n from the user and calculate their sum.
B) Write an algorithm in pseudocode and a flowchart that gets number x from he user and calculates x5 ( X to the power of %5). Calculate by using multiplication.
... (1 Reply)
Discussion started by: delsega
1 Replies
5. Programming
Hi guys , in my study book from which I re-learn C is task to generate all possible characters combination from numbers entered by the user. I know this algorithm must use combinatorics to calculate all permutations. Problem is how to implement algortihm.
// This program reads the four numbers... (0 Replies)
Discussion started by: solaris_user
0 Replies
6. Homework & Coursework Questions
Give a counter example such that the following heuristic algorithm, for the 2-tape problem, doesn't always produce the best solution:
Algorithm:
Sort {Xi} in descending order.
Place files in tapes one at a time.
For a file being considered, assign the file to the smaller tape.
Thanks in... (1 Reply)
Discussion started by: sureshcisco
1 Replies
7. UNIX for Dummies Questions & Answers
i'm doing banker's algorithm..
got some error there but i cant fix it..
please help!!
#!/bin/bash
echo "enter no.of resources: "
read n1
echo -n "enter the max no .of resources for each type: "
for(( i=0; i <$n1; i++ ))
do
read ${t}
done
echo -n "enter no .of... (1 Reply)
Discussion started by: syah
1 Replies
8. Homework & Coursework Questions
Use and complete the template provided. The entire template must be completed. If you don't, your post may be deleted!
1. The problem statement, all variables and given/known data:
shell scripts to simulate Banker’s algorithm on a collection of processes (process details are entered as inputs... (4 Replies)
Discussion started by: syah
4 Replies
9. Shell Programming and Scripting
I have a requirement of masking few specific fields in the UNIX file. The details are as following-
File is fixed length file with each record of 250 charater length.
2 fields needs to be masked – the positions are 21:30 and 110:120
The character by character making needs to be done which... (5 Replies)
Discussion started by: n78298
5 Replies
LEARN ABOUT OSX
makepercentrelay
MAKEPERCENTRELAY(8) Double Precision, Inc. MAKEPERCENTRELAY(8)
NAME
makepercentrelay - Build a list of %-relayed domains
SYNOPSIS
makepercentrelay
DESCRIPTION
makepercentrelay reads /etc/courier/esmtppercentrelay.dir and creates /etc/courier/esmtppercentrelay.dat which is a binary database file.
The files /etc/courier/esmtppercentrelay and /etc/courier/esmtppercentrelay.dat specify a list of "percent-hack" domains.
/etc/courier/esmtppercentrelay is a plain text file, containing one domain per line. The Courier mail server loads the contents of
/etc/courier/esmtppercentrelay into memory, so if you have a lot of domains, you will want to use the binary database file. The
makepercentrelay command reads /etc/courier/esmtppercentrelay.dir, which can be either a plain text file itself, or a directory containing
plain text files. All files in the subdirectory are concatenated, and the binary database file is created from the result.
the Courier mail server can use both /etc/courier/esmtppercentrelay and /etc/courier/esmtppercentrelay.dat at the same time. Usually you
would put a couple of your most frequent domains in /etc/courier/esmtppercentrelay, then put the rest in
/etc/courier/esmtppercentrelay.dir, and use makepercentrelay to turn it into a database file.
"percent-hack" domains are a list of domains for which the Courier mail server accepts mail via ESMTP addressed as
"local%percent.hack.domain@local.domain", where "percent.hack.domain" is a domain found in /etc/courier/esmtppercentrelay or
/etc/courier/esmtppercentrelay.dat, and "local.domain" is any domain found in /etc/courier/locals. The Courier mail server removes the
local domain, and rewrites the address as "local@percent.hack.domain", then attempts to deliver it.
The percent hack applies only to mail received via ESMTP. The Courier mail server does not check this list of domains if the message is
received via any other way (such as by running /usr/bin/sendmail directly from the command line). "percent.hack.domain" would likely to be
a domain that the Courier mail server knows how to handle via some other means. It might be an entry in /etc/courier/aliases, or an entry
in /etc/courier/esmtproutes.
SEE ALSO
esmtpd(8)[1], makealiases(8)[2].
AUTHOR
Sam Varshavchik
Author
NOTES
1. esmtpd(8)
[set $man.base.url.for.relative.links]/esmtpd.html
2. makealiases(8)
[set $man.base.url.for.relative.links]/makealiases.html
Courier Mail Server 08/30/2011 MAKEPERCENTRELAY(8)