do a traceroute from your desktop to the "good" server and then do the same from your desktop to the "bad" server ... traceroute result should end at the ip address of the good server and get lost somewhere before the bad server ... use tracert on windows ...
Hi Everyone,
I have installed open solaris 10 on one of the x86 machines available but inspite of configuring the IP i am unable to access the machine through the network.
Can anyone please help me wih the settings required to access the machine across the network.Its really Urg..Any help is... (13 Replies)
Hi everyone-
I'm relatively new to UNIX (Primarily Oracle background), wondering if anyone can help me.
I did not configure Oracle Database Control (Web-Based admin interface) on the Database Server (HP-UX), however it is running and the URL is configured with an internal IP, which users have... (4 Replies)
Hi All,
I have an application which I wanted to install on one solaris server instead of installing it on 6 solaris servers and then users should be able to access this application via one of those 6 servers. I think NFS is one of the option. Is there any other way we can invoke this application... (6 Replies)
Hi,
I'm a italian student. For my thesis I develop a gateway with protocol 6lowpan.
For that I must access to network interface to develope my personal stack based on standard 802.15.4.
Can you help me? I need an explanation for that. (0 Replies)
Hi,
I would like to create an application with HTML front end in Unix.
I am working on enterprise Unix server, so I could not install any add ons or software in my machine. but still i have super user permissions. I can change the permissions as i wish. I have built a small application with... (1 Reply)
Hello,
I installed Jboss EAP 6 on a remote Linux server in standalone mode, and deployed a HelloWorld war file successfully.
Opened a browser on my PC and pointed to http://127.0.0.1:8080/filename. I can see “Hello World!” on my browser. However, if the browser points to http://server's... (3 Replies)
I attempted to update Python on my CentOS 5.6 VM and have encountered some issues after then. Initially yum wouldn't work, but I have resolved that.
However, now I am unable to access the Network Configuration section under setup.
When I do select this option I see this at the command line:
... (2 Replies)
Dear all experts here,
:)
I would like to install a proxy server on Linux server to perform solely to control the access of Web server.
In this case, some of my vendor asked me to try Squid and I have installed it onto my Linux server.
I would like know how can I set the configuration to... (1 Reply)
Discussion started by: kwliew999
1 Replies
LEARN ABOUT DEBIAN
sc_tracediff
SC_TRACEDIFF(1) BSD General Commands Manual SC_TRACEDIFF(1)NAME
sc_tracediff -- display traceroute paths where the path has changed.
SYNOPSIS
sc_tracediff [-a] [-m method] [-n] file1.warts file2.warts
DESCRIPTION
The sc_tracediff utility displays pairs of traceroutes to a destination where the path has changed. It takes two warts files as input and
displays paths where a hop differs by its address. The options are as follows:
-a dump all traceroute pairs regardless of whether they have changed.
-m method
specifies the method used to match pairs of traceroutes together. If dst is specified, traceroutes are matched if the destination IP
address of both traces are the same. If userid is specified, traceroutes are matched if the userid field of both traces are the
same. If dstuserid is specified, traceroutes are matched if the destination IP address and userid fields are the same. By default,
the destination IP address is used.
-n names should be reported instead of IP addresses, where possible.
sc_tracediff can be useful in network monitoring to identify when a forward IP path has changed. In this scenario, it is recommended that
Paris traceroute is used with the same UDP source and destination ports for each execution of scamper so that only paths that have changed
are identified, not merely alternate paths visible due to per-flow load-balancing. By default scamper uses a source port based on the
process ID, which will change with each execution of scamper.
EXAMPLES
The command:
scamper -O warts -o file1.warts -c 'trace -P udp-paris -s 31337' -f list.txt
collects the forward IP paths towards a set of IP addresses found in list.txt using 31337 as the UDP source port value. If the above command
is adjusted to subsequently collect file2.warts, then we can identify paths that have subsequently changed with the command:
sc_tracediff file1.warts file2.warts
If Paris traceroute with ICMP probes is preferred, then the following invocation of scamper is appropriate:
scamper -O warts -o file1.warts -c 'trace -P icmp-paris -d 31337' -f list.txt
In this case, scamper uses 31337 as the ICMP checksum value in each probe.
SEE ALSO scamper(1),
B. Augustin, X. Cuvellier, B. Orgogozo, F. Viger, T. Friedman, M. Latapy, C. Magnien, and R. Teixeira, Avoiding traceroute anomalies with
Paris traceroute, Proc. ACM/SIGCOMM Internet Measurement Conference 2006.
AUTHOR
sc_tracediff is written by Matthew Luckie <mjl@luckie.org.nz>.
BSD April 21, 2011 BSD