http://www.cppblog.com/prayer/archive/2009/06/03/86679.html
http://www.paessler.com/
http://en.wikipedia.org/wiki/DB2_SQL_return_codes
http://jportal.iteye.com/category/38814
http://www.techrepublic.com/article/using-datagrams-in-java/5099670
http://stackoverflow.com/questions/6361741/some-java-datagram-socket-questions
To determine which ports are open, first Identify the services by using the
netstat command as follows:
ibmuser@lkasatcap1:/home/ibmuser>netstat -af inet
The last column of the netstat command output indicates the state of each
service. Services that are waiting for incoming connections are in the
LISTEN state.
ibmuser@lkasatcap1:/home/ibmuser>netstat -Aan | grep 6191
f1000e0000552bb0 tcp 0 0 *.6191 *.*
LISTEN
Get the PID
ibmuser@lkasatcap1:/home/ibmuser>rmsock f1000e0000552bb0 tcpcb
The socket 0x552808 is being held by proccess 3342730 (clcomd).
Get the actual process
ibmuser@lkasatcap1:/home/ibmuser>ps -ef | grep 3342730
root 3342730 1966366 0 Aug 07 - 0:26
/usr/es/sbin/cluster/clcomd -d
Get the Parent ID(PPID) of process
ibmuser@lkasatcap1:/home/ibmuser>ps -ef | grep 1966366
===
Another way is to use "lsof" command
Note:-lsof for AIX 6.1 resides on AIX Expansion Pack media.
Trace Port # & PID
ibmuser@lkasatcap1:/home/ibmuser>lsof | grep 161
snmpdv3ne 2294274 root 5u IPv6 0xf1000e0008caae00
0t0 UDP *:161
Get the actual process
ibmuser@lkasatcap1:/home/ibmuser>ps -ef | grep 2294274
root 2294274 1966366 0 Aug 07 - 0:07 /usr/sbin/snmpd
Get the PPID
ibmuser@lkasatcap1:/home/ibmuser>ps -ef | grep 1966366
http://blog.csdn.net/zougangx/article/details/6977936
单播、广播、组播
PING:
http://www.cyberciti.biz/tips/simple-linux-and-unix-system-monitoring-with-ping-command-and-scripts.html
http://blog.csdn.net/hjack/article/details/772494
欢迎分享,转载请注明来源:内存溢出
评论列表(0条)