Tech-invite3GPPspaceIETFspace
959493929190898887868584838281807978777675747372717069686766656463626160595857565554535251504948474645444342414039383736353433323130292827262524232221201918171615141312111009080706050403020100
in Index   Prev   Next

RFC 1470

FYI on a Network Management Tool Catalog: Tools for Monitoring and Debugging TCP/IP Internets and Interconnected Devices

Pages: 192
FYI 2
Obsoletes:  1147
Part 2 of 5 – Pages 35 to 79
First   Prev   Next

ToP   noToC   RFC1470 - Page 35   prevText
        LIMITATIONS
                none reported.

        HARDWARE REQUIRED
                None.  The ChameLAN 100 is a self-contained unit, and
                includes its own interface cards.  It installs
                into a network with standard interface
                connectors.

        SOFTWARE REQUIRED
                None.

        AVAILABILITY AND CONTACT POINT FOR INFORMATION ABOUT THIS TOOL
                The ChameLAN 100 product famil y is available
                commercially.  For more information or a free demo,
                call or write:

                1.800.tek.elec
                Tekelec
                26580 West Agoura Road
                Calabasas, CA 91302
                Phone:          818.880.5656
                Fax:            818.880.6993

                The ChameLAN 100 is listed on the GSA schedule.

        CONTACT POINT FOR CHANGES TO THIS CATALOG ENTRY
                Todd Koch
                Public Relations Specialist
                818.880.7718
                Internet:  todd.koch@tekelec.com
ToP   noToC   RFC1470 - Page 36
          Internet Tool Catalog                               CMU_SNMP

          NAME
               The CMU SNMP Distribution

          KEYWORDS
               manager, status; IP; NMS, SNMP; UNIX; free, sourcelib.

          ABSTRACT
               The CMU SNMP Distribution includes source code for an
               SNMP agent, several SNMP client applications, an ASN.1
               library, and supporting documentation.

               The agent compiles into about 10 KB of 68000 code.  The
               distribution includes a full agent that runs on a
               Kinetics FastPath2/3/4, and is built into the KIP
               appletalk/ethernet gateway.  The machine independent
               portions of this agent also run on CMU's IBM PC/AT
               based router.

               The applications are designed to be useful in the real
               world.  Information is collected and presented in a
               useful format and is suitable for everyday status
               monitoring.  Input and output are interpreted
               symbolically.  The tools can be used without
               referencing the RFCs.

          MECHANISM
               SNMP.

          CAVEATS
               None.

          BUGS
               None reported.  Send bug reports to
               sw0l+snmp@andrew.cmu.edu.  ("sw0l" is "ess double-you
               zero ell.")

          LIMITATIONS
               None reported.

          HARDWARE REQUIRED
               The KIP gateway agent runs on a Kinetics FastPath2/3/4.
               Otherwise, no restrictions.

          SOFTWARE REQUIRED
               The code was written with efficiency and portability in
               mind.  The applications compile and run on the follow-
ToP   noToC   RFC1470 - Page 37
               ing systems: IBM PC/RT running ACIS Release 3, Sun3/50
               running SUNOS 3.5, and the DEC microVax running Ultrix
               2.2.  They are expected to run on any system with a
               Berkeley socket interface.

          AVAILABILITY
               This distribution is copyrighted by CMU, but may be
               used and sold without permission.  Consult the copy-
               right notices for further information.  The distribu-
               tion is available by anonymous FTP from the host
               lancaster.andrew.cmu.edu (128.2.13.21) as the files
               pub/cmu-snmp.9.tar, and pub/kip-snmp.9.tar.  The former
               includes the libraries and the applications, and the
               latter is the KIP SNMP agent.

               Please direct questions, comments, and bug reports to
               sw0l+snmp@andrew.cmu.edu.  ("sw0l" is "ess double-you
               zero ell.")  If you pick up this package, please send a
               note to the above address, so that you may be notified
               of future enhancements/changes and additions to the set
               of applications (several are planned).
ToP   noToC   RFC1470 - Page 38
          Internet Tool Catalog            COMPUTER-SECURITY-CHECKLIST

          NAME
               Computer Security Checklist

          KEYWORDS
               security; DOS.

          ABSTRACT
               This program consists of 858 computer security ques-
               tions divided up in thirteen sections.  The program
               presents the questions to the user and records their
               responses.  After answering the questions in one of the
               thirteen sections, the user can generate a report from
               the questions and the user's answers.  The thirteen
               sections are: telecommunications security, physical
               access security, personnel security, systems develop-
               ment security, security awareness and training prac-
               tices, organizational and management security, data and
               program security, processing and operations security,
               ergonomics and error prevention, environmental secu-
               rity, and backup and recovery security.

               The questions are weighted as to their importance, and
               the report generator can sort the questions by weight.
               This way the most important issues can be tackled
               first.

          MECHANISM
               The questions are displayed on the screen and the user
               is prompted for a single keystroke reply.  When the end
               of one of the thirteen sections is reached, the answers
               are written to a disk file.  The question file and the
               answer file are merged to create the report file.

          CAVEATS
               None.

          BUGS
               None known.

          LIMITATIONS
               None reported.

          HARDWARE REQUIRED
               No restrictions.
ToP   noToC   RFC1470 - Page 39
          SOFTWARE REQUIRED
               DOS operating system.

          AVAILABILITY
               A commercial product available from:
                    C.D., Ltd.
                    P.O. Box 58363
                    Seattle, WA 98138
                    (206) 243-8700
ToP   noToC   RFC1470 - Page 40
        Internet Tool Catalog                           CMIP-LIBRARY

        NAME
                CMIP Library

        KEYWORDS
                manager; osi; cmis; unix; free, sourcelib.

        ABSTRACT

                The CMIP Library implements the functionality of the
                Common  Management Information Service/Protocol as in
                the full international standards (ISO 9595, ISO 9596)
                published in 1990. It is designed to work with the
                ISODE package and can act as a building block for the
                construction of CMIP-based agent and manager
                applications.

        MECHANISM
                The CMIP library uses ISO ROS, ACSE and ASN.1
                presentation, as implemented in ISODE, to provide its
                service.

        CAVEATS
                None.

        BUGS
                None known.

        LIMITATIONS
                None known.

        HARDWARE REQUIRED
                Has been tested on SUN 3 and SUN 4 architectures.

        SOFTWARE REQUIRED
                The ISODE protocol suite, BSD UNIX.

        AVAILABILITY
                The CMIP library and related management tools built
                upon it, known as OSIMIS (OSI Management Information
                Service), are publicly available from University
                College London, England via FTP and FTAM.  To obtain
                information regarding a copy send email to
                osimis-request@cs.ucl.ac.uk or call +44 71 380 7366.
ToP   noToC   RFC1470 - Page 41
          Internet Tool Catalog                            DECADDRS

          NAME
               decaddrs, decaroute, decnroute, xnsroutes, bridgetab

          KEYWORDS
               manager, map, routing; bridge, DECnet; NMS, SNMP; UNIX.

          ABSTRACT
               These commands display private MIB information from
               Wellfleet systems.  They retrieve and format for
               display values of one or several MIB variables from the
               Wellfleet Communications private enterprise MIB, using
               the SNMP (RFC1098).  In particular these tools are used
               to examine the non-IP modules (DECnet, XNS, and Bridg-
               ing) of a Wellfleet system.

               Decaddrs displays the DECnet configuration of a
               Wellfleet system acting as a DECnet router, showing the
               static parameters associated with each DECnet inter-
               face.  Decaroute and decnroute display the DECnet
               inter-area and intra-area routing tables (that is area
               routes and node routes).  Xnsroutes displays routes
               known to a Wellfleet system acting as an XNS router.
               Bridgetab displays the bridge forwarding table with the
               disposition of traffic arriving from or directed to
               each station known to the Wellfleet bridge module.  All
               these commands take an IP address as the argument and
               can specify an SNMP community for the retrieval.  One
               SNMP query is performed for each row of the table.
               Note that the Wellfleet system must be operating as an
               IP router for the SNMP to be accessible.

          MECHANISM
               Management information is exchanged by use of SNMP.

          CAVEATS
               None.

          BUGS
               None known.

          LIMITATIONS
               None reported.

          HARDWARE REQUIRED
               Distributed and supported for Sun 3 systems.
ToP   noToC   RFC1470 - Page 42
          SOFTWARE REQUIRED
               Distributed and supported for SunOS 3.5 and 4.x.

          AVAILABILITY
               Commercial product of:
                    Wellfleet Communications, Inc.
                    12 DeAngelo Drive
                    Bedford, MA 01730-2204
                    (617) 275-2400
ToP   noToC   RFC1470 - Page 43
          Internet Tool Catalog                                    DIG

          NAME
               DiG

          KEYWORDS
               status; DNS; spoof; UNIX; free.

          ABSTRACT
               DiG (domain information groper), is a command line tool
               which queries DNS servers in either an interactive or a
               batch mode.  It was developed to be more
               convenient/flexible than nslookup for gathering perfor-
               mance data and testing DNS servers.

          MECHANISM
               Dig is built on a slightly modified version of the bind
               resolver (release 4.8).

          CAVEATS
               none.

          BUGS
               None known.

          LIMITATIONS
               None reported.

          HARDWARE REQUIRED
               No restrictions.

          SOFTWARE REQUIRED
               BSD UNIX.

          AVAILABILITY
               DiG is available via anonymous FTP from venera.isi.edu
               in pub/dig.2.0.tar.Z.
ToP   noToC   RFC1470 - Page 44
        Internet Tool Catalog                  EMANATE_SNMP_RESEARCH

        NAME
                EMANATE: Enhanced MANagement Agent Through Extensions
                from SNMP Research.

        KEYWORDS
                alarm, control, manager, reference, security, status;
                bridge, Ethernet, FDDI, IP, OSI, ring, star;
                NMS, SNMP;
                sourcelib.

        ABSTRACT
                The EMANATE system provides a run-time extensible SNMP
                agent that dynamically reconfigures an agent's MIB
                without having to recompile, relink, or restart the
                agent.  An EMANATE capable SNMP agent can support zero,
                one, or many subagents and dynamically reconfigure to
                connect or disconnect those subagents' MIBs.

                The EMANATE system consists of several logically
                independent components and subsystems:

                o Master SNMP agent which contains an API to communicate
                  with subagents.
                o Subagents which implement various MIBS.
                o Subagent Developer's Kit which contains tools to assist
                  in the implementation of subagents.
                o EMANATE libraries which provide the API for the
                  subagent.

        MECHANISM
                A concise API allows a standard means of communication
                between the master and subagents.  System dependent
                mechanisms are employed for transfer of information
                between the master and subagents.

        CAVEATS
                None.

        BUGS
                None known.

        LIMITATIONS
                None reported.
ToP   noToC   RFC1470 - Page 45
        HARDWARE REQUIRED
                Multiple platforms including PC's, workstations, hosts,
                and servers are supported.  Contact SNMP Research for
                more details.

        SOFTWARE REQUIRED
                C compiler.

        AVAILABILITY AND CONTACT POINT FOR INFORMATION ABOUT THIS TOOL
                This is a commercial product available under license
                from:

                SNMP Research
                3001 Kimberlin Heights Road
                Knoxville, TN  37920-9716
                Attn:  John Southwood, Sales and Marketing
                (615) 573-1434 (Voice)  (615) 573-9197 (FAX)

        CONTACT POINT FOR CHANGES TO THIS CATALOG ENTRY
                users@seymour1.cs.utk.edu
ToP   noToC   RFC1470 - Page 46
          Internet Tool Catalog                          ETHERFIND_SUN

          NAME
               etherfind

          KEYWORDS
               traffic; ethernet, IP, NFS; eavesdrop; UNIX.

          ABSTRACT
               Etherfind examines the packets that traverse a network
               interface, and outputs a text file describing the
               traffic.  In the file, a single line of text describes
               a single packet: it contains values such as protocol
               type, length, source, and destination.  Etherfind can
               print out all packet traffic on the ethernet, or
               traffic for the local host.  Further packet filtering
               can be done on the basis of protocol: IP, ARP, RARP,
               ICMP, UDP, ND, TCP, and filtering can also be done
               based on the source, destination addresses as well as
               TCP and UDP port numbers.

          MECHANISM
               In usual operations, and by default, etherfind puts the
               interface in promiscuous mode.  In 4.3BSD UNIX and
               related OSs, it uses a Network Interface Tap (NIT) to
               obtain a copy of traffic on an ethernet interface.

          CAVEATS
               None.

          BUGS
               None known.

          LIMITATIONS
               Minimal protocol information is printed.  Can  only  be
               run by the super user.  The syntax is painful.

          HARDWARE REQUIRED
               Ethernet.

          SOFTWARE REQUIRED
               SunOS.

          AVAILABILITY
               Executable included in Sun  OS  "Networking  Tools  and
               Programs" software installation option.
ToP   noToC   RFC1470 - Page 47
         Internet Tool Catalog                         ETHERNET-CODES

        NAME
                ethernet-codes

        KEYWORDS
                reference;
                ethernet, fddi;
                ;
                ;
                ;

        ABSTRACT
                Mike Patton of MIT LCS has compiled a very
                comprehensive list of the IEEE numbers used on
                Ethernet and FDDI (with some permutation).
                This file contains collected information on the
                various codes used on IEEE 802.3 and EtherNet.
                There are three "pages": type codes, vendor
                codes, and the uses of multicast (including
                broadcast) addresses.

        MECHANISM
                FTP the file and use it like a secret decoder ring.

        CAVEATS
                Since this information is from collected wisdom,
                there are certainly omissions.

        BUGS
                Mike welcomes any further additions.
                They can be sent to a special mailbox that he has set up:

                        MAP=EtherNet-codes@LCS.MIT.Edu

        LIMITATIONS
                See caveats.

        HARDWARE REQUIRED
                No restrictions.

        SOFTWARE REQUIRED
                No restrictions.
ToP   noToC   RFC1470 - Page 48
        AVAILABILITY AND CONTACT POINT FOR INFORMATION ABOUT THIS TOOL
                The file is stored as flat, non-compressed ASCII text.
                It can be FTP'ed from:
                        ftp.lcs.mit.edu

                Retreive the file:
                        /pub/map/EtherNet-codes

        To submit additions or obtain further assistance, send email to:
                         MAP=EtherNet-codes@LCS.MIT.Edu

        CONTACT POINT FOR CHANGES TO THIS CATALOG ENTRY
                This entry maintained by the NOCtools editors.
                Send email to noctools-request@merit.edu
ToP   noToC   RFC1470 - Page 49
        Internet Tool Catalog                 GENERIC-MANAGED-SYSTEM

        NAME
                Generic Managed System

        KEYWORDS
                manager; osi; cmis; unix; free, sourcelib

        ABSTRACT
                The Generic Managed System (GMS) implements the
                functions that would be common to any OSI managed
                system. These include the parseing of CMIS requests,
                selection of managed objects according to the scoping
                and filtering rules, handling of notifications and
                event forwarding discriminators etc. The intention is
                that the implementors should use the GMS as a basis
                for their own managed object implementations. A
                support environment is provided to assist with this.

        MECHANISM
                The GMS uses the UCL CMIP library plus a library of
                C++ objects representing common managed objects and
                attribute types.

        CAVEATS
                The system is still experimental, is subject to change
                and is not yet well documented.

        BUGS
                See above.

        LIMITATIONS
                None known.

        HARDWARE REQUIRED
                Has been tested on SUN 3 and SUN 4 architectures.

        SOFTWARE REQUIRED
                The ISODE protocol suite, BSD UNIX, UCL CMIP Library,
                GNU C++ (g++).

        AVAILABILITY
                The CMIP library and related management tools built
                upon it, known as OSIMIS (OSI Management Information
                Service), are publicly available from University
                College London, England via FTP and FTAM.  To obtain
                information regarding a copy send email to
                osimis-request@cs.ucl.ac.uk or call +44 71 380 7366.
ToP   noToC   RFC1470 - Page 50
        Internet Tool Catalog                              GETETHERS

        NAME
                getethers

        KEYWORDS
                Traffic; Ethernet; Ping; UNIX; Free

        ABSTRACT
                Getethers runs through all addresses on an ethernet
                segment (a.b.c.1 to a.b.c.254) and pings each address,
                and then determines the ethernet address for that
                host.  It produces a list, in either plain ASCII, the
                file format for the Excelan Lanalyzer, or the file
                format for the Network General Sniffer, of
                hostname/ethernet address pairs for all hosts on the
                local nework.  The plain ASCII list optionally
                includes the vendor name of the ethernet card in
                each system, to aid in the determination of the
                identity of unknown systems.

        MECHANISM
                Getethers uses a raw IP socket to generate ICMP echo
                requests and receive ICMP echo replies, and then
                examines the kernel ARP table to determine the
                ethernet address of each responding system.

        CAVEATS
                Assumes that the ethernet it is looking at is either
                a Class C IP network, or part of a Class B IP network
                that is subnetted with a netmask of 255.255.255.0.
                (This is easy to change, but it's compiled in.)

        BUGS
                None known.

        LIMITATIONS
                None.

        HARDWARE REQUIRED
                Has been tested on Sun-3 and Sun-4 (SPARC) systems
                under SunOS 4.1.x, DEC VAXes under 4.3BSD.

        SOFTWARE REQUIRED
                Runs under SunOS 4.x and 4.3BSD; should be easy to
                port to any other Berkeley-like system.  Requires
                raw sockets and the ioctl calls to get at the ARP
                table.
ToP   noToC   RFC1470 - Page 51
        AVAILABILITY AND CONTACT POINT FOR INFORMATION ABOUT THIS TOOL
                Public domain, and freely distributable.  Available
                via anonymous FTP from harbor.ecn.purdue.edu; also has
                been posted to comp.sources.unix.  The current version
                is Version 1.4 from May 1992.

                Contact point:
                        Dave Curry
                        Purdue University
                        Engineering Computer Network
                        1285 Electrical Engineering Bldg.
                        West Lafayette, IN 47907-1285
                        davy@ecn.purdue.edu

        CONTACT POINT FOR CHANGES TO THIS CATALOG ENTRY
                        Dave Curry (see address above).
ToP   noToC   RFC1470 - Page 52
          Internet Tool Catalog                       GETONE_WELLFLEET

          NAME
               getone, getmany, getroute, getarp, getaddr, getif,
               getid.

          KEYWORDS
               manager, routing, status; IP; NMS, SNMP; UNIX.

          ABSTRACT
               These commands retrieve and format for display values
               of one or several MIB variables (RFC1066) using the
               SNMP (RFC1098).  Getone and getmany retrieve arbitrary
               MIB variables; getroute, getarp, getaddr, and getif
               retrieve and display tabular information (routing
               tables, ARP table, interface configuration, etc.), and
               getid retrieves and displays system name, identifica-
               tion and boot time.

               Getone <target> <mibvariable> retrieves and displays
               the value of the designated MIB variable from the
               specified target system.  The SNMP community name to be
               used for the retrieval can also be specified.  Getmany
               works similarly for groups of MIB variables rather than
               individual values.  The name of each variable, its
               value and its data type is displayed.  Getroute returns
               information from the ipRoutingTable MIB structure,
               displaying the retrieved information in an accessible
               format.  Getarp behaves similarly for the address
               translation table; getaddr for the ipAddressTable; and
               getif displays information from the interfaces table,
               supplemented with information from the ipAddressTable.
               Getid displays the system name, identification, ipFor-
               warding state, and the boot time and date.  All take a
               system name or IP address as an argument and can
               specify an SNMP community for the retrieval.  One SNMP
               query is performed for each row of the table.

          MECHANISM
               Queries SNMP agent(s).

          CAVEATS
               None.

          BUGS
               None known.
ToP   noToC   RFC1470 - Page 53
          LIMITATIONS
               None reported.

          HARDWARE REQUIRED
               Distributed and supported for Sun 3 systems.

          SOFTWARE REQUIRED
               Distributed and supported for SunOS 3.5 and 4.x.

          AVAILABILITY
               Commercial product of:
                    Wellfleet Communications, Inc.
                    12 DeAngelo Drive
                    Bedford, MA 01730-2204
                    (617) 275-2400
ToP   noToC   RFC1470 - Page 54
          Internet Tool Catalog                           HAMMER_ANVIL

          NAME
               hammer & anvil

          KEYWORDS
               benchmark, generator; IP; DOS; free.

          ABSTRACT
               Hammer and Anvil are the benchmarking programs for IP
               routers.  Using these tools, gateways have been tested
               for per-packet delay, router-generated traffic over-
               head, maximum sustained throughput, etc.

          MECHANISM
               Tests are performed on a gateway in an isolated
               testbed.  Hammer generates packets at controlled rates.
               It can set the length and interpacket interval of a
               packet stream.  Anvil counts packet arrivals.

          CAVEATS
               Hammer should not be run on a live network.

          BUGS
               None reported.

          LIMITATIONS
               Early versions of hammer could not produce inter-packet
               intervals shorter than 55 usec.

          HARDWARE REQUIRED
               Hammer runs on a PC/AT or compatible, and anvil
               requires a PC or clone.  Both use a Micom Interlan
               NI5210 for LAN interface.

          SOFTWARE REQUIRED
               MS-DOS.

          AVAILABILITY
               Hammer and anvil are copyrighted, though free.  Copies
               are available from pub/eutil on husc6.harvard.edu.
ToP   noToC   RFC1470 - Page 55
          Internet Tool Catalog                               HOPCHECK

          NAME
               hopcheck

          KEYWORDS
               routing; IP; ping; DOS; free.

          ABSTRACT
               Hopcheck is a tool that lists the gateways traversed by
               packets sent from the hopcheck-resident PC to a desti-
               nation.  Hopcheck uses the same mechanism as traceroute
               but is for use on IBM PC compatibles that have ethernet
               connections.  Hopcheck is part of a larger TCP/IP pack-
               age that is known as ka9q that is for use with packet
               radio.  Ka9q can coexist on a PC with other TCP/IP
               packages such as FTP Inc's PC/TCP, but must be used
               independently of other packages.  Ka9q was written by
               Phil Karn.  Hopcheck was added by Katie Stevens,
               dkstevens@ucdavis.edu.  Unlike traceroute, which
               requires a UNIX kernel mod, hopcheck will run on the
               standard, unmodified ka9q release.

          MECHANISM
               See the description in traceroute.

          CAVEATS
               See the description in traceroute.

          BUGS
               None known.

          HARDWARE REQUIRED
               IBM PC compatible with ethernet network interface card;
               ethernet card supported through FTP spec packet driver.

          SOFTWARE REQUIRED
               DOS.

          AVAILABILITY
               Free for radio amateurs and educational institutions;
               others should contact Phil Karn, karn@ka9q.bellcore.com.
               Available via anonymous FTP at ucdavis.edu, in the
               directory "dist/nethop".
ToP   noToC   RFC1470 - Page 56
          Internet Tool Catalog                         INTERNET_ROVER

          NAME
               Internet Rover

          KEYWORDS
               status; IP, SMTP; curses, ping, spoof; UNIX; free,
               sourcelib.

          ABSTRACT
               Internet Rover is a prototype network monitor that uses
               multiple protocol "modules" to test network functional-
               ity.  This package consists of two primary pieces of
               code: the data collector and the problem display.

               There is one data collector that performs a series of
               network tests, and maintains a list of problems with
               the network.  There can be many display processes all
               displaying the current list of problems which is useful
               in a multi-operator NOC.

               The display task uses curses, allowing many terminal
               types to display the problem file either locally or
               from a remote site.  Full source is provided.  The data
               collector is easily configured and extensible.  Contri-
               butions such as additional protocol modules, and shell
               script extensions are welcome.

          MECHANISM
               A configuration file contains a list of nodes,
               addresses, NodeUp? protocol test (ping in most cases),
               and a list of further tests to be performed if the node
               is in fact up.  Modules are included to test TELNET,
               FTP, and SMTP.  If the configuration contains a test
               that isn't recognized, a generic test is assumed, and a
               filename is checked for existence.  This way users can
               create scripts that create a file if there is a prob-
               lem, and the data collector simply checks the existence
               of that file to determine if there is problem.

          CAVEATS
               None.

          BUGS
               None known.
ToP   noToC   RFC1470 - Page 57
          LIMITATIONS
               This tool does not yet have the capability to  perform
               actions based on the result of the test.  Rather, it is
               intended for a multi-operator environment,  and  simply
               displays a list of what is wrong with the net.

          HARDWARE REQUIRED
               This software is known to run on Suns and IBM RTs.

          SOFTWARE REQUIRED
               Curses, 4.xBSD UNIX socket programming  libraries,  BSD
               ping.

          AVAILABILITY
               Full source available via anonymous FTP from merit.edu
               (35.1.1.42) in the ~ftp/pub/inetrover directory.
               Source and executables are public domain and can be
               freely distributed for non-commercial use.  This pack-
               age is unsupported, but bug reports and fixes may be
               sent to: wbn@merit.edu.
ToP   noToC   RFC1470 - Page 58
        Internet Tool Catalog                                 IOZONE

        NAME
                iozone

        KEYWORDS
                benchmark; nfs;; dos,hp,unix,vmx; free.

        ABSTRACT
                Software to assess the sequential file I/O capability
                of a system.  May be useful as reference to compare
                against results obtained when files are accessed via
                NFS, Andrew, etc.

        MECHANISM
                This test writes a X MEGABYTE sequential file in Y
                byte chunks, then rewinds it and reads it back.
                [The size of the file should be big enough to factor
                out the effect of any disk cache.].  Finally,
                IOZONE deletes the temporary file.  Options allow one to
                vary X and Y.  In addition, 'auto test' runs IOZONE
                repeatedly using record sizes from 512 to 8192 bytes
                (adjustable), and file sizes from 1 to 16 megabytes
                (adjustable).  It creates a table of results.

        CAVEATS
                The file is written (filling any cache buffers), and
                then read.  If the cache is >= X MB, then most if not
                all the reads will be satisfied from the cache.
                However, if it is less than or equal to
                .5X MB, then NONE of the reads will be satisfied from
                the cache.  This is becase after the file is written,
                a .5X MB cache will contain the upper .5 MB of the
                test file, but we will start reading
                from the beginning of the file (data which is no
                longer in the cache).

                In order for this to be a fair test, the length of the
                test file must be AT LEAST 2X the amount of disk cache
                memory for your system.  If not, you are really
                testing the speed at which your CPU
                can read blocks out of the cache (not a fair test).

        BUGS
                none known at this time.
ToP   noToC   RFC1470 - Page 59
        LIMITATIONS
                IOZONE does not normally test the raw I/O speed of
                your disk or system-em.  It tests the speed of
                sequential I/O to actual files.
                Therefore, this measurement factors in the efficiency
                of you  machines file system, operating system, C
                compiler, and C runtime library.  It produces a
                measurement which is the number of bytes
                per second that your system can read or write to a file.

        HARDWARE REQUIRED

                This program has been ported and tested on the
                following computer operating systems:

Vendor             Operating System    Notes on compiling IOzone
-----------------------------------------------------------------------
Apollo             Domain/OS           no cc switches -- BSD domain
AT&T               UNIX System V R4
AT&T 6386WGS       AT&T UNIX 5.3.2     define SYSTYPE_SYSV
Generic AT&T       UNIX System V R3    may need cc -DSVR3
Convergent         Unisys/AT&T SVR3   cc -DCONVERGENT -o iozone iozone.c
Digital Equipment  ULTRIX V4.1
Digital Equipment  VAX/VMS V5.4        see below **
Digital Equipment  VAX/VMS (POSIX)
Hewlett-Packard    HP-UX 7.05
IBM                AIX Ver. 3 rel. 1
Interactive        UNIX System V R3
Microsoft          MS-DOS 3.3          tested Borland, Microsoft C
MIPS               RISCos 4.52
NeXt               NeXt OS 2.x
OSF                OSF/1
Portable!          POSIX 1003.1-1988   may need to define _POSIX_SOURCE
QNX                QNX 4.0
SCO                UNIX System V/386 3.2.2
SCO                XENIX 2.3
SCO                XENIX 3.2
Silicon Graphics   UNIX                cc -DSGI -o iozone iozone.c
Sony Microsystems  UNIX                same as MIPS
Sun Microsystems   SUNOS 4.1.1
Tandem Computers   GUARDIAN 90          1. call the source file IOZONEC
                                        2. C/IN IOZONEC/IOZONE;RUNNABLE
                                        3. RUN IOZONE
Tandem Computers   Non-Stop UX

** for VMS, define iozone as a foreign command via this DCL command:

        $IOZONE :== $SYS$DISK:[]IOZONE.EXE
ToP   noToC   RFC1470 - Page 60
        this lets you pass the command line arguments to IOZONE

        SOFTWARE REQUIRED
                OS as shown in the hardware listing above.

        AVAILABILITY AND CONTACT POINT FOR INFORMATION ABOUT THIS TOOL
                Author: Bill Norcott
                        1060 Hyde Avenue
                        San Jose, CA  95129
                        norcott_bill@tandem.com

                Availability:
                        This tool has been posted to comp.sources.misc.
                        It is available from the usual archive sites.
                        Program can be located using ARCHIE or other
                        servers.

        CONTACT POINT FOR CHANGES TO THIS CATALOG ENTRY
                This entry is maintained by the noctools editors.
                Send email to noctools-request@merit.edu.
ToP   noToC   RFC1470 - Page 61
        Internet Tool Catalog                                 LADDIS

        NAME
                LADDIS

        KEYWORDS
                benchmark, generator;
                NFS;
                spoof;
                unix;
                free.

        ABSTRACT

                "LADDIS: A Multi-Vendor and Vendor-Neutral SPEC NFS
                Benchmark", Bruce Nelson, LADDIS Group & Auspex Systems.

                Over the past 24 months, engineers from Legato,
                Auspex, Data General, DEC, Interphase, and Sun
                (LADDIS) met regularly to create the LADDIS NFS
                benchmark: an unbiased, standard, vendor-independent,
                scalable NFS performance test.

                The purpose of the LADDIS benchmark is to give users a
                credible and undisputed test of NFS performance, and
                to give vendors a publishable standard performance
                measure that customers can use for load planning,
                system configuration, and equipment buying decisions.
                Toward this end, the LADDIS benchmark is being adopted
                by SPEC (the System Performance Evaluation
                Cooperative, creators of SPECmarks) as the first
                member of SPEC's System-level File Server (SFS)
                benchmark suite."

                "In particular, we have had unexpected interest from
                some router vendors in using LADDIS to both rate and
                stress-test IP routers. This is because LADDIS can
                send back-to-back full-size packet trains, and because
                it can generate a 90%-Ethernet util on simulated
                "real" NFS workloads, just like routers encounter in
                the real world. But LADDIS is for local Ethernet or
                FDDI nets only, not WAN."

        MECHANISM
                Generates NFS requests and measures responsiveness of
                the server.
ToP   noToC   RFC1470 - Page 62
        CAVEATS
                "LADDIS is not released yet by SPEC, although a free
                beta version, quite stable, is available now as
                PRE-LADDIS. So you might want to put PRE-LADDIS in
                your listing, noting that full LADDIS
                availability from SPEC is expected by the end of 1992."

        BUGS
                The licensee is requested to direct beta test comments
                via electronicmail to:
                "spec-preladdis-comments@riscee.pko.dec.com".

                This alias will forward all comments to the SPECSFS
                mailing list (which includes the LADDIS Group).

        LIMITATIONS
                LADDIS is for local Ethernet or FDDI nets only, not
                WAN.

        HARDWAE REQUIRED
                A host with LAN connectivity.  Presumably, a host with
                enough horsepower to generate an adequate work load.

        SOFTWARE REQUIRED
                LADDIS is a sophisticated Unix-based NFS traffic
                generator program.

        AVAILABILITY AND CONTACT POINT FOR INFORMATION ABOUT THIS TOOL
                Date: Mon, 10 Feb 92 13:12:20 PST
                From: bnelson (Bruce Nelson)

                Dear Person:

                The SPEC PRE-LADDIS beta test process became
                operational on Monday, February 3, 1992.  This email
                describes the process as announced during the LADDIS
                Group's presentation at UniForum '92 and
                also at Interop '91. The content of the beta test
                license and the license request process are consistent
                with the proposals approved by the SPEC Steering
                Committee at the January 1992 meeting in Milpitas,
                California.

                The SPEC PRE-LADDIS beta test will consist of one beta
                test version of PRE-LADDIS distributed ONLY by
                electronic mail. The SPEC PRE-LADDIS Beta test
                software is licensed by SPEC, not by the LADDIS
                Group.
ToP   noToC   RFC1470 - Page 63
                To obtain the PRE-LADDIS Beta test software, an
                individual must:

                1.  Request the SPEC PRE-LADDIS beta test License by
                    electronic mail to
                    "spec-preladdis-beta-test@riscee.pko.dec.com" with a
                    subject line of "Request SPEC PRE-LADDIS Beta Test
                    License".
                2.  Print a hardcopy of the license and sign.
                3.  Attach a cover letter written on the individual's
                    company letterhead requesting the PRE-LADDIS Beta
                    Test Kit.
                4.  U.S. Mail the signed license and cover letter to:
                       SPEC PRE-LADDIS Beta Test
                       c/o NCGA, 2722 Merrilee Drive, Suite 200
                       Fairfax, VA 22031

                After completing these steps, the SPEC PRE-LADDIS beta
                test kit will be emailed to the requestor from
                riscee.pko.dec.com. The licensee is requested to
                direct beta test comments via electronic mail
                to "spec-preladdis-comments@riscee.pko.dec.com". This
                alias will forward all comments to the SPECSFS mailing
                list (which includes the
                LADDIS Group).

                Note that PRE-LADDIS is ONLY available through
                electronic mail and ONLY through the process listed
                above in steps 1-4. If you do not have internet email
                available to you (which is unlikely if you are
                receiving THIS email), you must arrange delivery of
                PRE-LADDIS through some email-capable part of your
                organization, not through LADDIS members like Auspex,
                DEC, Sun, etc.

        CONTACT POINT FOR CHANGES TO THIS CATALOG ENTRY
                This entry is maintained by the NOCtools editors.
                Send E-mail to noctools-request@merit.edu.
ToP   noToC   RFC1470 - Page 64
          Internet Tool Catalog                             LAN_PATROL

          NAME
               LAN Patrol

          KEYWORDS
               security, traffic; ethernet, star; eavesdrop; DOS.

          ABSTRACT
               LAN Patrol is a full-featured network analyzer that
               provides essential information for effective fault and
               performance management.  It allows network managers to
               easily monitor user activity, find traffic overloads,
               plan for growth, test cable, uncover intruders, balance
               network services, and so on.  LAN Patrol uses state of
               the art data collection techniques to monitor all
               activity on a network, giving an accurate picture of
               how it is performing.

               LAN Patrol's reports can be saved as ASCII files to
               disk, and imported into spreadsheet or database pro-
               grams for further analysis.

          MECHANISM
               The LAN Patrol interface driver programs a standard
               interface card to capture all traffic on a network seg-
               ment.  The driver operates from the background of a
               standard PC, maintaining statistics for each station on
               the network.  The information can be viewed on the PC's
               screen, or as a user-defined report output either to
               file or printer.

          CAVEATS
               None.  Normal operation is completely passive, making
               LAN Patrol transparent to the network.

          BUGS
               None known.

          LIMITATIONS
               LAN Patrol can monitor up to 10,000 packets/sec on an
               AT class PC, and is limited to monitoring a maximum of
               1024 stations for intervals of up to 30 days.

               Because LAN Patrol operates at the physical level, it
               will only see traffic for the segment on which it is
               installed; it cannot see traffic across bridges.
ToP   noToC   RFC1470 - Page 65
          HARDWARE REQUIRED
               Computer: IBM PC/XT/AT, PS/2 Model 30, or compatible.
               Requires 512K memory and a hard drive or double-sided
               disk drive.

               Display: Color or monochrome text.  Color display
               allows color-coding of traffic information.

               Ethernet, StarLAN, LattisNet, or StarLAN 10 network
               interface card.

          SOFTWARE REQUIRED
               PC DOS, MS-DOS version 3.1 or greater.

          AVAILABILITY
               LAN Patrol many be purchased through  network  dealers,
               or directly from:
                    Legend Software, Inc.
                    Phone:  (201) 227-8771
                    FAX:    (201) 906-1151
ToP   noToC   RFC1470 - Page 66
        Internet Tool Catalog                               LANVista

        NAME
            LANVista

        KEYWORDS
            analyzer, benchmark, debugger, generator, manager, traffic;
            DECnet, Ethernet, IP, OSI, Ring; Eavesdrop, Proprietary;
            DOS, Standalone.

        ABSTRACT
            CXR/Digilog's LANVista family of protocol and statistical
            analyzers provide the tools to troubleshoot an Ethernet and
            Token Ring 4/16Mbps network.  LANVista lets you capture
            frames to RAM and or disk, generate traffic for stress
            testing, test your network cable for fault isolation, and
            decode all 7 layers of many popular protocol stacks.
            LANVista's 100 family offers exceptional price/performance
            and a wide range of options. Combined with an
            integrated upgrade path to the fully distributed LANVista
            200 system, the 100 line provides a  reasonably priced
            entry into LAN management and protocol analysis.

            All LANVista models are fully operable under Microsoft
            Windows. Under Windows, LANVista can be operated in
            the background, gathering data and alarms as other
            tasks are completed. Displayed data may easily be
            cut from LANVista and pasted into other Windows
            applications such as Excel, Lotus 1-2-3, Harvard
            Graphics, etc.

            The versatile LANVista family can also be remotely
            controlled through the use of PC Anywhere, Commute,
            Carbon Copy, or other PC remote control packages.
            This feature allows the use of "co-pilot" mode which
            enables an operator at the central site to guide and
            train a remote operator through network management or
            analysis tasks.

            All LANVista models provide features vital to effective
            network management and troubleshooting.  Basic
            capabilities include: Network database, statistics
            based on the entire network and on a node basis, Token
            Ring functional address statistics, Bridged  traffic
            statistics, Protocol statistics, logging of statistics
            to a printer or file of user definable alarms, Hardware
            Pre-Capture filtering, Post capture filtering, Playback of
            captured data, Traffic simulation and On-line context
ToP   noToC   RFC1470 - Page 67
            sensitive Help.

            Protocol Interpreters used for decoding network traffic
            supported by LANVista include: TCP/IP, DECnet, Banyan
            Vines, XNS/MS-Net, AppleTalk, IBM Token Ring, Novell,
            3Com 3+ Open, SNMP and OSI.

        MECHANISM
            LANVista is available in three forms.  A kit version which
            consists of a plug-in PC card and Master software, a self
            contained unit that packages the kit version in a portable
            PC, and a Distributed system.  The LANVista distributed
            system allows slave units placed anywhere in the world to
            be controlled from a single central location for
            centralized management of an enterprise network.
            LANVista's PC cards provides a physical interface to
            the LAN and frame preprocessing power.  The Master
            software controls the PC card, and the display and
            processing of information gathered from the network.

        CAVEATS
            Optimal performance of LANVista's master software is achieved
            with DOS 5.0 by utilizing RAMDRIVE.SYS, SMARTDRV.SYS and High
            memory.

        BUGS
            None Known.

        LIMITATIONS
            None Known.

        HARDWARE REQUIRED
            IBM PC AT, 386, 486 or compatible.

        SOFTWARE REQUIRED
            DOS

        AVAILABILITY AND CONTACT POINT FOR INFORMATION ABOUT THIS TOOL
            LANVista is available worldwide.  For information on a
            local sales representative contact:

                CXR/DIGILOG
                900 Business Center Drive
                Horsham, PA 19044
                Phone 1-800-DIGILOG
                FAX: 215-956-0108

            GSA schedule pricing is honored.
ToP   noToC   RFC1470 - Page 68
        CONTACT POINT FOR CHANGES TO THIS CATALOG ENTRY
            CXR/DIGILOG Help Desk 1-800-DIGILOG
            Send email to: lanvista@digilog.uucp
ToP   noToC   RFC1470 - Page 69
          Internet Tool Catalog                               LANPROBE

          NAME
               LanProbe -- the HP 4990S LanProbe Distributed Analysis
               System.

          KEYWORDS
               alarm, manager, map, status, traffic; ethernet; eaves-
               drop, NMS; proprietary.

          ABSTRACT
               The LanProbe distributed monitoring system performs
               remote and local monitoring of ethernet LANs in a pro-
               tocol and vendor independent manner.

               LanProbe discovers each active node on a segment and
               displays it on a map with its adapter card vendor name,
               ethernet address, and IP address.  Additional informa-
               tion about the nodes, such as equipment type and physi-
               cal location can be entered in to the data base by the
               user.

               When the NodeLocator option is used, data on the actual
               location of nodes is automatically entered and the map
               becomes an accurate representation of the physical lay-
               out of the segment.  Thereafter when a new node is
               installed and becomes active, or when a node is moved
               or becomes inactive, the change is detected and shown
               on the map in real time.  The system also provides the
               network manager with precise cable fault information
               displayed on the map.

               Traffic statistics are gathered and displayed and can
               be exported in (comma delimited) CSV format for further
               analysis.  Alerts can be set on user defined thres-
               holds.

               Trace provides a remote protocol analyzer capability
               with decodes for common protocols.

               Significant events (like power failure, cable breaks,
               new node on network, broadcast IP source address seen,
               etc.) are tracked in a log that is uploaded to Pro-
               beView periodically.

               ProbeView generates reports that can be manipulated by
               MSDOS based word processors, spreadsheets, and DBMS.
ToP   noToC   RFC1470 - Page 70
          MECHANISM
               The system consists of one or more LanProbe segment
               monitors and ProbeView software running under Microsoft
               Windows.  The LanProbe segment monitor attaches to the
               end of an ethernet segment and monitors all traffic.
               Attachment can be direct to a thin or thick coax cable,
               or via an external transceiver to fiber optic or twist-
               ed pair cabling.  Network data relating to the segment
               is transferred to a workstation running ProbeView via
               RS-232, ethernet, or a modem connection.

               ProbeView software, which runs on a PC/AT class works-
               tation, presents network information in graphical
               displays.

               The HP4992A NodeLocator option attaches to the opposite
               end of the cable from the HP4991A LanProbe segment mon-
               itor.  It automatically locates the position of nodes
               on the ethernet networks using coaxial cabling schemes.

          CAVEATS
               None.

          BUGS
               None known.

          LIMITATIONS
               None reported.

          HARDWARE REQUIRED
               HP 4991A LanProbe segment monitor
               HP 4992A NodeLocator (for optional capabilities)
               80386 based PC capable of running MS-Windows

          SOFTWARE REQUIRED
               HP 4990A ProbeView
               MSDOS 3.0 or higher and Microsoft Windows/286 2.1.

          AVAILABILITY
               A commercial product available from:
                    Hewlett-Packard Company
                    P.O. Box 10301,
                    Palo Alto, CA  94303-0890
ToP   noToC   RFC1470 - Page 71
          Internet Tool Catalog                               LANWATCH

          NAME
               LANWatch

          KEYWORDS
               alarm, analyzer, traffic; CHAOS, DECnet, DNS, ethernet,
               IP, OSI, ring, SMTP, star; eavesdrop; DOS; library,
               sourcelib.

          ABSTRACT
               LANWatch 2.0 is an inexpensive, powerful and flexible
               network analyzer that runs under DOS on personal com-
               puters and requires no hardware modifications to either
               the host or the network.  LANWatch is an invaluable
               tool for installing, troubleshooting, and monitoring
               local area networks, and for developing and debugging
               new protocols.  Network managers using LANWatch can
               inspect network traffic patterns and packet errors to
               isolate performance problems and bottlenecks.  Protocol
               developers can use LANWatch to inspect and verify
               proper protocol handling.  Since LANWatch is a
               software-only package which installs easily in existing
               PCs, network technicians and field service engineers
               can carry LANWatch in their briefcase for convenient
               network analysis at remote sites.

               LANWatch has two operating modes: Display and Examine.
               In Display Mode, LANWatch traces network traffic by
               displaying captured packets in real time.  Examine Mode
               allows you to scroll back through stored packets to
               inspect them in detail.  To select a subset of packets
               for display, storage or retrieval, there is an exten-
               sive set of built-in filters.  Using filters, LANWatch
               collects only packets of interest, saving the user from
               having to sort through all network traffic to isolate
               specific packets.  The built-in filters include alarm,
               trigger, capture, load, save and search.  They can be
               controlled separately to match on source or destination
               address, protocol, or packet contents at the hardware
               and transport layers.  LANWatch also includes suffi-
               cient source code so users can modify the existing
               filters and parsers or add new ones.

               The LANWatch distribution includes executables and
               source for several post-processors: a TCP protocol
               analyzer, a node-by-node traffic analyzer and a dump
               file listing tool.
ToP   noToC   RFC1470 - Page 72
          MECHANISM
               Uses many common PC network interfaces by placing them
               in promiscuous mode and capturing traffic.

          CAVEATS
               Most PC network interfaces will not capture 100% of the
               traffic on a fully-loaded network (primarily missing
               back-to-back packets).

          BUGS
               None known.

          LIMITATIONS
               LANWatch can't analyze what it doesn't see (see
               Caveats).

          HARDWARE REQUIRED
               LANWatch requires a PC or PS/2 with a supported network
               interface card.

          SOFTWARE REQUIRED
               LANWatch runs in DOS.  Modification of the supplied
               source code or creation of additional filters and
               parsers requires Microsoft C 5.1

          AVAILABILITY
               LANWatch is commercially available from FTP Software,
               Incorporated, 26 Princess Street, Wakefield, MA, 01880
               (617 246-0900).
ToP   noToC   RFC1470 - Page 73
          Internet Tool Catalog                               LLL_ENTM

          NAME
               ENTM -- Ethernet Traffic Monitor

          KEYWORDS
               traffic; ethernet, IP; eavesdrop; VMS; free.

          ABSTRACT
               ENTM is a screen-oriented utility that runs under
               VAX/VMS.  It monitors local ethernet traffic and
               displays either a real time or cumulative, histogram
               showing a percent breakdown of traffic by ethernet pro-
               tocol type.  The information in the display can be
               reported based on packet count or byte count.  The per-
               cent of broadcast, multicast and approximate lost pack-
               ets is reported as well.  The screen display is updated
               every three seconds.  Additionally, a real time, slid-
               ing history window may be displayed showing ethernet
               traffic patterns for the last five minutes.

               ENTM can also report IP traffic statistics by packet
               count or byte count.  The IP histograms reflect infor-
               mation collected at the TCP and UDP port level, includ-
               ing ICMP type/code combinations.  Both the ethernet and
               IP histograms may be sorted by ASCII protocol/port name
               or by percent-value.  All screen displays can be saved
               in a file for printing later.

          MECHANISM
               This utility simply places the ethernet controller in
               promiscuous mode and monitors the local area network
               traffic.  It preallocates 10 receive buffers and
               attempts to keep 22 reads pending on the ethernet dev-
               ice.

          CAVEATS
               Placing the ethernet controller in promiscuous mode may
               severly slow down a VAX system.  Depending on the speed
               of the VAX system and the amount of traffic on the  lo-
               cal  ethernet,  a large amount of CPU time may be spent
               on the Interrupt Stack.  Running this code on any  pro-
               duction system during operational hours is discouraged.

          BUGS
               Due to a bug in the VAX/VMS ethernet/802 device driver,
               IEEE  802 format packets may not always be detected.  A
               simple test is performed to "guess" which  packets  are
ToP   noToC   RFC1470 - Page 74
               in  IEEE  802  format (DSAP equal to SSAP).  Thus, some
               DSAP/SSAP pairs may be reported as  an  ethernet  type,
               while  valid ethernet types may be reported as IEEE 802
               packets.

               In some hardware configurations, placing an ethernet
               controller in promiscuous mode with automatic-restart
               enabled will hang the controller.  Our VAX 8650 hangs
               running this code, while our uVAX IIs and uVAX IIIs do
               not.

               Please report any additional bugs to the author at:
                    Allen Sturtevant
                    National Magnetic Fusion Energy Computer Center
                    Lawrence Livermore National Laboratory
                    P.O. Box 808; L-561
                    Livermore, CA  94550
                    Phone : (415) 422-8266
                    E-Mail: sturtevant@ccc.nmfecc.gov

          LIMITATIONS
               The user is required to have PHY_IO, TMPMBX and NETMBX
               privileges.  When activated, the program first checks
               that the user process as enough quotas remaining
               (BYTLM, BIOLM, ASTLM and PAGFLQUO) to successfully run
               the program without entering into an involuntary wait
               state.  Some quotas require a fairly generous setting.

               The contents of IEEE 802 packets are not examined.
               Only the presence of IEEE 802 packets on the wire is
               reported.

               The count of lost packets is approximated.  If, after
               each read completes on the ethernet device, the utility
               detects that it has no reads pending on that device,
               the lost packet counter is incremented by one.

               When the total number of bytes processed exceeds
               7fffffff hex, all counters are automatically reset to
               zero.

          HARDWARE REQUIRED
               A DEC ethernet controller.

          SOFTWARE REQUIRED
               VAX/VMS version V5.1+.
ToP   noToC   RFC1470 - Page 75
          AVAILABILITY
               For executables only,  FTP  to  the  ANONYMOUS  account
               (password  GUEST) on CCC.NMFECC.GOV and GET the follow-
               ing files:

               [ANONYMOUS.PROGRAMS.ENTM]ENTM.DOC     (ASCII text)
               [ANONYMOUS.PROGRAMS.ENTM]ENTM.EXE     (binary)
               [ANONYMOUS.PROGRAMS.ENTM]EN_TYPES.DAT (ASCII text)
               [ANONYMOUS.PROGRAMS.ENTM]IP_TYPES.DAT (ASCII text)
ToP   noToC   RFC1470 - Page 76
          Internet Tool Catalog                Interactive Network Map

          NAME
               map -- Interactive Network Map

          KEYWORDS
               manager, map; CHAOS, ethernet, IP, ring, star; NMS,
               ping, SNMP, X; UNIX; free, sourcelib.

          ABSTRACT
               Map draws a map of network connectivity and allows
               interactive examination of information about various
               components including whether hosts can be reached over
               the network.

               The program is supplied with complete source and is
               written in a modular fashion to make addition of dif-
               ferent protocols stacks, displays, or hardcopy devices
               relatively easy.  This is one of the reasons why the
               initial version supports at least two of each.  Contri-
               butions of additional drivers in any of these areas
               will be welcome as well as porting to additional plat-
               forms.

          MECHANISM
               Net components are pinged by use of ICMP echo and,
               optionally, CHAOS status requests and SNMP "gets."  The
               program initializes itself from static data stored in
               the file system and therefore does not need to access
               the network in order to get running (unless the static
               files are network mounted).

          CAVEATS
               As of publication, the tool is in beta release.

          BUGS
               Several minor nits, documented in distribution files.
               Bug discoveries should be reported by email to Bug-
               Map@LCS.MIT.Edu.

          LIMITATIONS
               See distribution file for an indepth discussion of sys-
               tem capabilities and potential.

          HARDWARE REQUIRED
               An X display is needed for interactive display of the
               map, non-graphical interaction is available in non-
               display mode.  For hardcopy output a PostScript or Tek-
ToP   noToC   RFC1470 - Page 77
               tronix 4692 printer is required.

          SOFTWARE REQUIRED
               BSD UNIX or related OS.  IP/ICMP is required;
               CHAOS/STATUS and SNMP can be used but are optional.
               X-Windows is required for interactive display of the
               map.

          AVAILABILITY
               The program is Copyright MIT.  It is available via
                anonymous FTP with a license making it free to use and
                distribute for non-commercial purposes.  FTP to host
                FTP.LCS.MIT.Edu, directory nets.  The complete
                distribution is in map.tar.Z and some short
                documentation files are there (as well as in the
                distribution).  Of most interest are ReadMe and Intro.

                To be added to the email forum that discusses the
                software, or for other administrative details, send a
                request to: MAP-Request@LCS.MIT.Edu
ToP   noToC   RFC1470 - Page 78
          Internet Tool Catalog                               MCONNECT

          NAME
               mconnect

          KEYWORDS
               status; SMTP; spoof; UNIX.

          ABSTRACT
               Mconnect allows an interactive session with a remote
               mailer.  Mail delivery problems can be diagnosed by
               connecting to the remote mailer and issuing SMTP com-
               mands directly.

          MECHANISM
               Opens a TCP connection to remote SMTP on port 25.  Pro-
               vides local line buffering and editing, which is the
               distinction between mconnect and a TELNET to port 25.

          CAVEATS
               None.

          BUGS
               None known.

          LIMITATIONS
               Mconnect is not a large improvement over using a TELNET
               connection to port 25.

          HARDWARE REQUIRED
               No restrictions.

          SOFTWARE REQUIRED
               BSD UNIX or related OS.

          AVAILABILITY
               Available with 4.xBSD UNIX and related operating sys-
               tems.
ToP   noToC   RFC1470 - Page 79
        Internet Tool Catalog                             MIB-BROWSER

        NAME
                MIB Browser

        KEYWORDS
                manager; osi; cmis, x; unix; free, sourcelib.

        ABSTRACT
                The MIB Browser is an X Windows HCI tool that allows
                you to "browse" through the objects in a Management
                Information Base (MIB). The browser is generic in that
                it can connect to a CMIS agent without having any
                prior knowledge of the structure of the MIB in the
                agent.

        MECHANISM
                CMIP is used to transfer the values of attributes
                between the managed system and the browser.

        CAVEATS
                None.

        BUGS
                Unexpected termination of the agent can cause browser
                to crash (ISODE bug!).

        HARDWARE REQUIRED
                Unix workstation, has been tested on SUN 3 and SUN 4
                architectures.

        SOFTWARE REQUIRED
                The ISODE protocol suite, BSD UNIX, X Windows, GNU C++
                (g++), Interviews (2.6).

        AVAILABILITY
                The CMIP library and related management tools built
                upon it, known as OSIMIS (OSI Management Information
                Service), are publicly available from University
                College London, England via FTP and FTAM.  To obtain
                information regarding a copy send email to
                osimis-request@cs.ucl.ac.uk or call +44 71 380 7366.


(next page on part 3)

Next Section