Service Traceroute: Tracing Paths of Application Flows Ivan Morandi

Total Page:16

File Type:pdf, Size:1020Kb

Service Traceroute: Tracing Paths of Application Flows Ivan Morandi Service traceroute: Tracing Paths of Application Flows Ivan Morandi To cite this version: Ivan Morandi. Service traceroute: Tracing Paths of Application Flows. Networking and Internet Architecture [cs.NI]. 2018. hal-01888618 HAL Id: hal-01888618 https://hal.inria.fr/hal-01888618 Submitted on 5 Oct 2018 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Service traceroute: Tracing Paths of Application Flows Ivan Morandi Supervisors: Renata Teixeira, Timur Friedman Advisor: Francesco Bronzino Inria / UPMC Sorbonne University, Paris ABSTRACT Luckie et al. [7] have shown that depending on the Traceroute is often used to help diagnose when users experi- traceroute probing method (ICMP, UDP, and TCP) the ence issues with Internet applications or services. Unfortu- set of reached destinations and discovered links differ. nately, probes issued by classic traceroute tools differ from The authors explain these differences by the presence application traffic and hence can be treated differently by of middleboxes in the path such as load balancers and middleboxes within the network. This paper proposes a new firewalls that make forwarding decisions based on flow traceroute tool, called Service traceroute. Service tracer- characteristics. These results imply that diagnosing is- oute leverages the idea from paratrace, which passively lis- sues on application flows must ensure that traceroute tens to application traffic to then issue traceroute probes that probes have the same characteristics as the application's pretend to be part of the application flow. We extend this idea packets. to work for modern Internet services with support for auto- This paper develops a traceroute tool, called Service matically identifying application flows, for tracing of multi- traceroute, to allow discovering the paths of individual ple concurrent flows as well as for UDP flows. We imple- application flows. Service traceroute passively listens ment command-line and library versions of Service tracer- to application traffic to then issue probes that pretend oute, which we release as open source. This paper also to be part of the application flow. Some traceroute presents a calibration and an evaluation of Service traceroute tools (for instance, paratrace [4], TCP sidecar [10], and when tracing paths traversed by Web downloads from the 0trace [3]) already enable probes to piggyback on TCP top-1000 Alexa websites and by video sessions from Twitch connections. These tools observe an active TCP con- and Youtube. The goal of the calibration is to find the best nection to then insert traceroute probes that resemble parameters of Service traceroute for each application. Our retransmitted packets. TCP sidecar was developed for evaluation shows that Service traceroute has no negative side topology mapping, whereas paratrace and 0trace for effect on the vast majority of downloads, but that in some tracing pass a firewall. As such, they lack of two im- rare cases it can cause application flows to abort or increase portant features in application debugging. The identi- flow completion times. In addition, the evaluation shows fication of the application flows to trace as they require that Service traceroute obtains different paths in at least 30% as input the destination IP address and the destination of paths when compared with a standard traceroute. Using port to detect the target application flow, and the sup- the same source and destination ports as the target applica- port for tracing paths of modern application sessions, tion flow to analyze for standard traceroute’s probes, Service which fetch content over multiple flows that change traceroute still obtains different paths in at least 7% of ana- dynamically over time. In addition, these tools lack lyzed paths. the support for tracing application flows using UDP as transport protocol, which are increasing thanks to the 1. INTRODUCTION adoption of QUIC protocol [5] in new services as well as in popular services like Youtube. Our work makes Internet services and applications rely on highly dis- the following contributions. First, we develop and im- tributed infrastructures to deliver content. When ap- plement Service traceroute (x2), which we will release plications stop working or when their performance de- as open source software. Service traceroute is capa- grades, service providers and more sophisticated users ble of identifying application flows to probe and trac- often resort to traceroute to narrow down the likely lo- ing the paths of multiple concurrent flows of both TCP cation of the problem. Traceroute issues probes with and UDP flows. For example, a user may simply spec- increasing TTL to force routers along the path towards ify trace `Youtube' and Service traceroute will identify a destination to issue an ICMP time exceeded message Youtube flows and then trace all of their paths. Ser- back to the source, which iteratively reveals the IP ad- vice traceroute is configurable to cover a large variety dresses of routers in the path [2]. of Internet services. Traceroute, however, may fail to reveal the exact path Our second contribution is the calibration of Service that a given application flow traverses. For example, 1 traceroute for two popular Internet services: video and 2.1 Observation of target application flow web pages, in particular, the top-1000 Alexa websites as Service traceroute passively observes traffic travers- well as Twitch and Youtube video streaming. The goal ing a network interface to search for packets with the of the calibration is to find the parameters of Service flow-id of the target application flows2. One novelty of traceroute with the best trade-off between the prob- Service traceroute is that it takes a set of target applica- ing network overhead and the amount of information tion flows as input, in contrast with previous tools which gathered. The problem of Service traceroute is that ap- can only trace the path traversed by one single applica- plication flows may close before Service traceroute ends tion flow. Users can either explicitly specify one or more the tracing, and hence middleboxes along the path may target application flows or they can simply specify a ser- discard Service traceroute's probes. vice. Service traceroute uses a database of signatures of We then use the configurations with the best trade- known services to inspect DNS packets in real-time and off for the third contribution: evaluate Service tracer- identify flows that match the target service. We release oute. We focus the evaluation on the same Internet ser- the DB as open source, so users can contribute to add or vices used during the calibration. One issue with piggy- update the signatures in the database. We define as sig- backing probes with application traffic is that we may nature the set of IP addresses and domains correspond- hurt application performance. Our evaluation shows ing to a specific service. For instance, `google.com' or that in the vast majority of cases, Service traceroute the corresponding IP addresses can be used in the sig- has no side-effect on the target application (x5). For a nature to detect Google services. Our current database few websites, however, application flows get reset when has signatures for popular video streaming services such running with Service traceroute. This result indicates as Netflix, Youtube, and Twitch. Web pages are not in- that piggybacking traceroute probes within application cluded in the database as Service traceroute can iden- flows requires careful calibration to avoid hurting user tify web flows simply from the domain or the host name experience. Finally, we compare Service traceroute with given as input. For additional flexibility, it is possible 0Trace, which also embeds probes within a target appli- to easily add ad-hoc domains and IP addresses via com- cation flow, and with Paris Traceroute, which launches mand line parameters or through the library API. a new flow for probing (x6). Our comparison with Paris traceroute shows differences in 37% of paths with 2.2 Path tracing Twitch, 9% with Youtube and 7% with web pages, even Only once it identifies a packet belonging to the tar- when running Paris traceroute with the same ports as get application flow, Service traceroute will start the the target application flow. We noticed that in some tracing phase. This phase works as classic traceroute paths with web pages and Youtube videos, middleboxes implementations sending probes with increasing TTL, discard UDP and TCP probes of Paris Traceroute be- but Service traceroute creates a probe that takes the fore they reach the destination. form of an empty TCP acknowledgement that copies the 5-tuple of the flow as well as its sequence number 2. TOOL DESIGN AND IMPLEMENTATION and acknowledgement number (similar to paratrace and Service traceroute follows the same high-level logic 0trace). We rely on the flow-id plus the IPID field to as paratrace or 0trace. Given a target application flow, match issued probes with the corresponding ICMP re- which we define as the application flow whose path sponses. We note this is sufficient to correctly identify we aim to trace, Service traceroute proceeds with two probes even when tracing multiple concurrent target ap- main phases. The first phase is the passive observa- plication flows. The maximum number of concurrent tion of a target application flow to define the content of target application flows varies based on the used con- the probes. Then, the active injection of TTL-limited figuration as the IPID field is dynamically sliced based probes within the application flow.
Recommended publications
  • Cisco Telepresence Codec SX20 API Reference Guide
    Cisco TelePresence SX20 Codec API Reference Guide Software version TC6.1 April 2013 Application Programmer Interface (API) Reference Guide Cisco TelePresence SX20 Codec D14949.03 SX20 Codec API Reference Guide TC6.1, April 2013. 1 Copyright © 2013 Cisco Systems, Inc. All rights reserved. Cisco TelePresence SX20 Codec API Reference Guide What’s in this guide? Table of Contents Introduction Using HTTP ....................................................................... 20 Getting status and configurations ................................. 20 TA - ToC - Hidden About this guide .................................................................. 4 The top menu bar and the entries in the Table of Sending commands and configurations ........................ 20 text anchor User documentation ........................................................ 4 Contents are all hyperlinks, just click on them to Using HTTP POST ......................................................... 20 go to the topic. About the API Feedback from codec over HTTP ......................................21 Registering for feedback ................................................21 API fundamentals ................................................................ 9 Translating from terminal mode to XML ......................... 22 We recommend you visit our web site regularly for Connecting to the API ..................................................... 9 updated versions of the user documentation. Go to: Password ........................................................................
    [Show full text]
  • Blue Coat SGOS Command Line Interface Reference, Version 4.2.3
    Blue Coat® Systems ProxySG™ Command Line Interface Reference Version SGOS 4.2.3 Blue Coat ProxySG Command Line Interface Reference Contact Information Blue Coat Systems Inc. 420 North Mary Ave Sunnyvale, CA 94085-4121 http://www.bluecoat.com/support/contact.html [email protected] http://www.bluecoat.com For concerns or feedback about the documentation: [email protected] Copyright© 1999-2006 Blue Coat Systems, Inc. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified, decompiled, disassembled, published or distributed, in whole or in part, or translated to any electronic medium or other means without the written consent of Blue Coat Systems, Inc. All right, title and interest in and to the Software and documentation are and shall remain the exclusive property of Blue Coat Systems, Inc. and its licensors. ProxySG™, ProxyAV™, CacheOS™, SGOS™, Spyware Interceptor™, Scope™, RA Connector™, RA Manager™, Remote Access™ are trademarks of Blue Coat Systems, Inc. and CacheFlow®, Blue Coat®, Accelerating The Internet®, WinProxy®, AccessNow®, Ositis®, Powering Internet Management®, The Ultimate Internet Sharing Solution®, Permeo®, Permeo Technologies, Inc.®, and the Permeo logo are registered trademarks of Blue Coat Systems, Inc. All other trademarks contained in this document and in the Software are the property of their respective owners. BLUE COAT SYSTEMS, INC. DISCLAIMS ALL WARRANTIES, CONDITIONS OR OTHER TERMS, EXPRESS OR IMPLIED, STATUTORY OR OTHERWISE, ON SOFTWARE AND DOCUMENTATION FURNISHED HEREUNDER INCLUDING WITHOUT LIMITATION THE WARRANTIES OF DESIGN, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL BLUE COAT SYSTEMS, INC., ITS SUPPLIERS OR ITS LICENSORS BE LIABLE FOR ANY DAMAGES, WHETHER ARISING IN TORT, CONTRACT OR ANY OTHER LEGAL THEORY EVEN IF BLUE COAT SYSTEMS, INC.
    [Show full text]
  • LAB MANUAL for Computer Network
    LAB MANUAL for Computer Network CSE-310 F Computer Network Lab L T P - - 3 Class Work : 25 Marks Exam : 25 MARKS Total : 50 Marks This course provides students with hands on training regarding the design, troubleshooting, modeling and evaluation of computer networks. In this course, students are going to experiment in a real test-bed networking environment, and learn about network design and troubleshooting topics and tools such as: network addressing, Address Resolution Protocol (ARP), basic troubleshooting tools (e.g. ping, ICMP), IP routing (e,g, RIP), route discovery (e.g. traceroute), TCP and UDP, IP fragmentation and many others. Student will also be introduced to the network modeling and simulation, and they will have the opportunity to build some simple networking models using the tool and perform simulations that will help them evaluate their design approaches and expected network performance. S.No Experiment 1 Study of different types of Network cables and Practically implement the cross-wired cable and straight through cable using clamping tool. 2 Study of Network Devices in Detail. 3 Study of network IP. 4 Connect the computers in Local Area Network. 5 Study of basic network command and Network configuration commands. 6 Configure a Network topology using packet tracer software. 7 Configure a Network topology using packet tracer software. 8 Configure a Network using Distance Vector Routing protocol. 9 Configure Network using Link State Vector Routing protocol. Hardware and Software Requirement Hardware Requirement RJ-45 connector, Climping Tool, Twisted pair Cable Software Requirement Command Prompt And Packet Tracer. EXPERIMENT-1 Aim: Study of different types of Network cables and Practically implement the cross-wired cable and straight through cable using clamping tool.
    [Show full text]
  • RFS7000 Series RF Switch CLI Reference Guide MOTOROLA and the Stylized M Logo Are Registered in the US Patent & Trademark Office
    RFS7000 Series RF Switch CLI Reference Guide MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. Symbol is a registered trademark of Symbol Technologies, Inc. All other product or service names are the property of their respective owners. © Motorola, Inc. 2007. All rights reserved. About This Guide This preface introduces the RFS7000 Series CLI Reference Guide and contains the following sections: • Who Should Use this Guide • How to Use this Guide • Conventions Used in this Guide • Motorola Service Information Who Should Use this Guide The RFS7000 Series CLI Reference Guide is intended for system administrators responsible for the implementing, configuring, and maintaining the RFS7000 using the switch command line interface (CLI). It also serves as a reference for configuring and modifying most common system settings. The administrator must be familiar with wireless technologies, network concepts, ethernet concepts, as well as IP addressing and SNMP concepts. How to Use this Guide This guide helps you implement, configure, and administer the RFS7000 Switch and associated network elements. This guide is organized into the following sections: Table 1 Quick Reference on How This Guide Is Organized Chapter Jump to this section if you want to... Chapter 1, “Introduction” Review the overall feature-set of the RFS7000 Switch, as well as the many configuration options available. Chapter 2, “Common Commands” Summarize the commands common amongst many contexts and instance contexts within the RFS7000 Switch CLI. Chapter 3, “User Exec Commands” Summarize the User Exec commands within the RFS7000 Switch CLI. Chapter 4, “Privileged Exec Commands” Summarize the Priv Exec commands within the RFS7000 Switch CLI.
    [Show full text]
  • Stinger® Administration Guide
    Stinger® Administration Guide Part Number: 363-217-010R9.9.1 For software version 9.9.1 June, 2006 Copyright © 2002-2006 Lucent Technologies Inc. All rights reserved. This material is protected by the copyright laws of the United States and other countries. It may not be reproduced, distributed, or altered in any fashion by any entity (either internal or external to Lucent Technologies), except in accordance with applicable agreements, contracts, or licensing, without the express written consent of Lucent Technologies. For permission to reproduce or distribute, please email your request to [email protected]. Notice Every effort was made to ensure that the information in this document was complete and accurate at the time of printing, but information is subject to change. For latest information, refer to online product documentation at www.lucent.com/support. This product may utilize zlib for the execution of certain compression functions. (C) 1995-2002 Jean-loup Gailly and Mark Adler. Provided "AS IS" without warranty of any kind. European Community (EC) RTTE compliance Hereby, Lucent Technologies, declares that the equipment documented in this publication is in compliance with the essential require- ments and other relevant provisions of the Radio and Telecommunications Technical Equipment (RTTE) Directive 1999/5/EC. To view the official Declaration of Conformity certificate for this equipment, according to EN 45014, access the Lucent INS online documentation library at http://www.lucentdocs.com/ins. Safety, compliance, and warranty Information Before handling any Lucent Access Networks hardware product, read the Edge Access and Broadband Access Safety and Compliance Guide included in your product package.
    [Show full text]
  • Freebsd Command Reference
    FreeBSD command reference Command structure Each line you type at the Unix shell consists of a command optionally followed by some arguments , e.g. ls -l /etc/passwd | | | cmd arg1 arg2 Almost all commands are just programs in the filesystem, e.g. "ls" is actually /bin/ls. A few are built- in to the shell. All commands and filenames are case-sensitive. Unless told otherwise, the command will run in the "foreground" - that is, you won't be returned to the shell prompt until it has finished. You can press Ctrl + C to terminate it. Colour code command [args...] Command which shows information command [args...] Command which modifies your current session or system settings, but changes will be lost when you exit your shell or reboot command [args...] Command which permanently affects the state of your system Getting out of trouble ^C (Ctrl-C) Terminate the current command ^U (Ctrl-U) Clear to start of line reset Reset terminal settings. If in xterm, try Ctrl+Middle mouse button stty sane and select "Do Full Reset" exit Exit from the shell logout ESC :q! ENTER Quit from vi without saving Finding documentation man cmd Show manual page for command "cmd". If a page with the same man 5 cmd name exists in multiple sections, you can give the section number, man -a cmd or -a to show pages from all sections. man -k str Search for string"str" in the manual index man hier Description of directory structure cd /usr/share/doc; ls Browse system documentation and examples. Note especially cd /usr/share/examples; ls /usr/share/doc/en/books/handbook/index.html cd /usr/local/share/doc; ls Browse package documentation and examples cd /usr/local/share/examples On the web: www.freebsd.org Includes handbook, searchable mailing list archives System status Alt-F1 ..
    [Show full text]
  • The Linux Command Line
    The Linux Command Line Second Internet Edition William E. Shotts, Jr. A LinuxCommand.org Book Copyright ©2008-2013, William E. Shotts, Jr. This work is licensed under the Creative Commons Attribution-Noncommercial-No De- rivative Works 3.0 United States License. To view a copy of this license, visit the link above or send a letter to Creative Commons, 171 Second Street, Suite 300, San Fran- cisco, California, 94105, USA. Linux® is the registered trademark of Linus Torvalds. All other trademarks belong to their respective owners. This book is part of the LinuxCommand.org project, a site for Linux education and advo- cacy devoted to helping users of legacy operating systems migrate into the future. You may contact the LinuxCommand.org project at http://linuxcommand.org. This book is also available in printed form, published by No Starch Press and may be purchased wherever fine books are sold. No Starch Press also offers this book in elec- tronic formats for most popular e-readers: http://nostarch.com/tlcl.htm Release History Version Date Description 13.07 July 6, 2013 Second Internet Edition. 09.12 December 14, 2009 First Internet Edition. 09.11 November 19, 2009 Fourth draft with almost all reviewer feedback incorporated and edited through chapter 37. 09.10 October 3, 2009 Third draft with revised table formatting, partial application of reviewers feedback and edited through chapter 18. 09.08 August 12, 2009 Second draft incorporating the first editing pass. 09.07 July 18, 2009 Completed first draft. Table of Contents Introduction....................................................................................................xvi
    [Show full text]
  • Forcepoint Appliances Command Line Interface (CLI) Guide
    Forcepoint Appliances Command Line Interface (CLI) Guide V Series, X Series, & Virtual Appliances v8.4.x ©2018, Forcepoint All rights reserved. 10900-A Stonelake Blvd, Quarry Oaks 1, Suite 350, Austin TX 78759 Published 2018 Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint. Raytheon is a registered trademark of Raytheon Company. All other trademarks used in this document are the property of their respective owners. This document may not, in whole or in part, be copied, photocopied, reproduced, translated, or reduced to any electronic medium or machine- readable form without prior consent in writing from Forcepoint. Every effort has been made to ensure the accuracy of this manual. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice. Contents Topic 1 Forcepoint Appliances Command Line Interface . .1 Conventions . .1 Logon and authentication . .2 CLI modes and account privileges . .2 Basic account management . .3 Command syntax. .9 Help for CLI commands . .9 System configuration . .10 Time and date . .11 Host name and description . .14 User certificates. .15 Filestore definition and file save commands. .16 Appliance interface configuration. .18 Appliance vswitch configuration . .29 Content Gateway Decryption Port Mirroring (DPM) . .29 Static routes. .31 Appliance status . .35 SNMP monitoring (polling) . .35 SNMP traps and queries . .38 Module-specific commands .
    [Show full text]
  • LESSON 2 ESSENTIAL COMMANDS Lesson 2: Essential Commands
    LESSON 2 ESSENTIAL COMMANDS Lesson 2: Essential Commands WARNING The Hacker Highschool Project is a learning tool and as with any learning tool there are dangers. Some lessons, if abused, may result in physical injury. Some additional dangers may also exist where there is not enough research on possible effects of emanations from particular technologies. Students using these lessons should be supervised yet encouraged to learn, try, and do. However ISECOM cannot accept responsibility for how any information herein is abused. The following lessons and workbooks are open and publicly available under the following terms and conditions of ISECOM: All works in the Hacker Highschool Project are provided for non-commercial use with elementary school students, junior high school students, and high school students whether in a public institution, private institution, or a part of home-schooling. These materials may not be reproduced for sale in any form. The provision of any class, course, training, or camp with these materials for which a fee is charged is expressly forbidden without a license, including college classes, university classes, trade-school classes, summer or computer camps, and similar. To purchase a license, visit the LICENSE section of the HHS web page at http://www.hackerhighschool.org/licensing.html. The Hacker Highschool Project Project is an open community effort and if you find value in this project, we ask that you support us through the purchase of a license, a donation, or sponsorship. 2 Lesson 2: Essential Commands Table
    [Show full text]
  • Traceroute Mac Traceroute Mac
    2] Chapter 2 Catalyst 3560 Switch Cisco IOS Commands traceroute mac traceroute mac Use the traceroute mac privileged EXEC command to display the Layer 2 path taken by the packets from the specified source MAC address to the specified destination MAC address. traceroute mac [interface interface-id] {source-mac-address} [interface interface-id] {destination-mac-address} [vlan vlan-id] [detail] Syntax Description interface interface-id (Optional) Specify an interface on the source or destination switch. source-mac-address Specify the MAC address of the source switch in hexadecimal format. destination-mac-address Specify the MAC address of the destination switch in hexadecimal format. vlan vlan-id (Optional) Specify the VLAN on which to trace the Layer 2 path that the packets take from the source switch to the destination switch. Valid VLAN IDs are from 1 to 4094. detail (Optional) Specify that detailed information appears. Defaults There is no default. Command Modes Privileged EXEC Command History Release Modification 12.1(19)EA1 This command was first introduced. Usage Guidelines For Layer 2 traceroute to function properly, Cisco Discovery Protocol (CDP) must be enabled on all the switches in the network. Do not disable CDP. When the switch detects a device in the Layer 2 path that does not support Layer 2 traceroute, the switch continues to send Layer 2 trace queries and lets them time out. The maximum number of hops identified in the path is ten. Layer 2 traceroute supports only unicast traffic. If you specify a multicast source or destination MAC address, the physical path is not identified, and an error message appears.
    [Show full text]
  • Version Oct 2009 Page 1 of 3 in Order to Assist in Troubleshooting, We Will Need a Traceroute from One Or More of the Affected M
    -- Slow response time or cannot access application at all but LeadMaster is up -- In order to assist in troubleshooting, we will need a traceroute from one or more of the affected machines. The traceroute should be run from an affected machine when they are experiencing slow response time. Please refer to the information below for instructions on running a traceroute. About Response Time Slow response time can be the result of a number of different problems. There could be congestion on the internet between you and us that slows down your connection to us. To determine whether this is the problem, perform a traceroute test as described below to figure out if you are just experiencing bad internet connectivity, and not a problem with any of our servers. Please follow the steps below to run a series of three traceroute tests to display the response time of the hops necessary for data to travel from your local system over the internet to our data center as well as details on the response time for each hop. The traceroute should be run when you are experiencing slowness, as it is a “real time” snapshot of the routing and response time. A. Run a Traceroute 1. Go to the command (DOS) prompt. - In Windows XP, go to Start>Run; type "command" (without the quotes) and click OK - In Windows 2000 click Start>Run; type: “cmd.exe” (without the quotes) and click OK. - In Windows 95/98 click Start>Programs; then click the "MsDos Prompt" icon. - In some Windows systems, you may need to go to Start>Programs>Accessories and look for the selection called Command Prompt 2.
    [Show full text]
  • IBM I: TCP/IP Troubleshooting • a Default Route (*DFTROUTE) Allows Packets to Travel to Hosts That Are Not Directly Connected to Your Network
    IBM i Version 7.2 Networking TCP/IP troubleshooting IBM Note Before using this information and the product it supports, read the information in “Notices” on page 71. This document may contain references to Licensed Internal Code. Licensed Internal Code is Machine Code and is licensed to you under the terms of the IBM License Agreement for Machine Code. © Copyright International Business Machines Corporation 1997, 2013. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents TCP/IP troubleshooting......................................................................................... 1 PDF file for TCP/IP troubleshooting............................................................................................................ 1 Troubleshooting tools and techniques........................................................................................................1 Tools to verify your network structure...................................................................................................1 Tools for tracing data and jobs.............................................................................................................15 Troubleshooting tips............................................................................................................................ 31 Advanced troubleshooting tools..........................................................................................................66 Troubleshooting problems related
    [Show full text]