DB2 Error规格严格

DB2 Error规格严格,第1张

http://www.cppblog.com/prayer/archive/2009/06/03/86679.html

http://www.paessler.com/

http://en.wikipedia.org/wiki/DB2_SQL_return_codes

http://jportal.iteye.com/category/38814

http://www.techrepublic.com/article/using-datagrams-in-java/5099670

http://stackoverflow.com/questions/6361741/some-java-datagram-socket-questions

To determine which ports are open, first Identify the services by using the
netstat command as follows:
ibmuser@lkasatcap1:/home/ibmuser>netstat -af inet
The last column of the netstat command output indicates the state of each
service. Services that are waiting for incoming connections are in the
LISTEN state.

ibmuser@lkasatcap1:/home/ibmuser>netstat -Aan | grep 6191
f1000e0000552bb0 tcp 0 0 *.6191 *.*
LISTEN

Get the PID
ibmuser@lkasatcap1:/home/ibmuser>rmsock f1000e0000552bb0 tcpcb
The socket 0x552808 is being held by proccess 3342730 (clcomd).

Get the actual process
ibmuser@lkasatcap1:/home/ibmuser>ps -ef | grep 3342730
root 3342730 1966366 0 Aug 07 - 0:26
/usr/es/sbin/cluster/clcomd -d

Get the Parent ID(PPID) of process
ibmuser@lkasatcap1:/home/ibmuser>ps -ef | grep 1966366
===

Another way is to use "lsof" command

Note:-lsof for AIX 6.1 resides on AIX Expansion Pack media.

Trace Port # & PID
ibmuser@lkasatcap1:/home/ibmuser>lsof | grep 161
snmpdv3ne 2294274 root 5u IPv6 0xf1000e0008caae00
0t0 UDP *:161

Get the actual process
ibmuser@lkasatcap1:/home/ibmuser>ps -ef | grep 2294274
root 2294274 1966366 0 Aug 07 - 0:07 /usr/sbin/snmpd

Get the PPID
ibmuser@lkasatcap1:/home/ibmuser>ps -ef | grep 1966366

http://blog.csdn.net/zougangx/article/details/6977936

单播、广播、组播

PING:

http://www.cyberciti.biz/tips/simple-linux-and-unix-system-monitoring-with-ping-command-and-scripts.html

http://blog.csdn.net/hjack/article/details/772494

欢迎分享,转载请注明来源:内存溢出

原文地址: http://outofmemory.cn/zaji/2088207.html

(0)
打赏 微信扫一扫 微信扫一扫 支付宝扫一扫 支付宝扫一扫
上一篇 2022-07-22
下一篇 2022-07-22

发表评论

登录后才能评论

评论列表(0条)

保存