Network Troubleshooting Tools

Total Page:16

File Type:pdf, Size:1020Kb

Network Troubleshooting Tools Network Troubleshooting Tools Network Troubleshooting Tools Joseph D. Sloan Beijing • Cambridge • Farnham • Köln • Paris • Sebastopol • Taipei • Tokyo Network Troubleshooting Tools by Joseph D. Sloan Copyright © 2001 O’Reilly & Associates, Inc. All rights reserved. Printed in the United States of America. Published by O’Reilly & Associates, Inc., 101 Morris Street, Sebastopol, CA 95472. Editors: Robert Denn and Mike Loukides Production Editor: Catherine Morris Cover Designer: Emma Colby Printing History: August 2001: First Edition. Nutshell Handbook, the Nutshell Handbook logo, and the O’Reilly logo are registered trademarks of O’Reilly & Associates, Inc. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O’Reilly & Associates, Inc. was aware of a trademark claim, the designations have been printed in caps or initial caps. The association between the image of a basilisk and network troubleshooting is a trademark of O’Reilly & Associates, Inc. While every precaution has been taken in the preparation of this book, the publisher assumes no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein. Library of Congress Cataloging-in-Publication Data Sloan, Joe. Network Troubleshooting Tools / Joe Sloan.--1st ed. p. cm. Includes bibliographical references and index. ISBN 0-596-00186-X 1. Computer networks--Maintenance and repair 2. Computer networks--Management. I. Title. TK5105.5 .S557 2001 004.6--dc21 2001035422 [C] [3/02] Table of Contents Preface ..................................................................................................................... ix 1. Network Management and Troubleshooting .................................. 1 General Approaches to Troubleshooting ....................................................... 2 Need for Troubleshooting Tools ..................................................................... 5 Troubleshooting and Management ................................................................. 6 2. Host Configurations ............................................................................... 18 Utilities ............................................................................................................ 20 System Configuration Files ............................................................................ 35 Microsoft Windows ........................................................................................ 42 3. Connectivity Testing .............................................................................. 45 Cabling ............................................................................................................ 45 Testing Adapters ............................................................................................ 52 Software Testing with ping ............................................................................ 53 Microsoft Windows ........................................................................................ 69 4. Path Characteristics ............................................................................... 71 Path Discovery with traceroute ..................................................................... 71 Path Performance ........................................................................................... 79 Microsoft Windows ........................................................................................ 97 5. Packet Capture ....................................................................................... 100 Traffic Capture Tools ................................................................................... 100 Access to Traffic ........................................................................................... 101 v Oracle 8i Internal Services for Waits, Latches, Locks, and Memory, eMatter Edition Copyright © 2007 O’Reilly & Associates, Inc. All rights reserved. vi Table of Contents Capturing Data ............................................................................................. 103 tcpdump ....................................................................................................... 104 Analysis Tools .............................................................................................. 118 Packet Analyzers .......................................................................................... 124 Dark Side of Packet Capture ....................................................................... 129 Microsoft Windows ...................................................................................... 131 6. Device Discovery and Mapping ...................................................... 134 Troubleshooting Versus Management ........................................................ 134 Device Discovery ......................................................................................... 137 Device Identification .................................................................................... 144 Scripts ........................................................................................................... 149 Mapping or Diagramming ........................................................................... 151 Politics and Security ..................................................................................... 156 Microsoft Windows ...................................................................................... 158 7. Device Monitoring with SNMP ........................................................ 160 Overview of SNMP ....................................................................................... 160 SNMP-Based Management Tools ................................................................. 165 Non-SNMP Approaches ............................................................................... 190 Microsoft Windows ...................................................................................... 190 8. Performance Measurement Tools ................................................... 194 What, When, and Where ............................................................................. 194 Host-Monitoring Tools ................................................................................. 196 Point-Monitoring Tools ................................................................................ 197 Network-Monitoring Tools .......................................................................... 205 RMON ........................................................................................................... 216 Microsoft Windows ...................................................................................... 219 9. Testing Connectivity Protocols ......................................................... 224 Packet Injection Tools ................................................................................. 224 Network Emulators and Simulators ............................................................. 235 Microsoft Windows ...................................................................................... 238 10. Application-Level Tools ....................................................................... 239 Application-Protocols Tools ........................................................................ 239 Microsoft Windows ...................................................................................... 254 Oracle 8i Internal Services for Waits, Latches, Locks, and Memory, eMatter Edition Copyright © 2007 O’Reilly & Associates, Inc. All rights reserved. Table of Contents vii 11. Miscellaneous Tools ............................................................................. 255 Communications Tools ................................................................................ 255 Log Files and Auditing ................................................................................. 260 NTP ............................................................................................................... 267 Security Tools ............................................................................................... 269 Microsoft Windows ...................................................................................... 270 12. Troubleshooting Strategies ................................................................ 273 Generic Troubleshooting ............................................................................. 273 Task-Specific Troubleshooting .................................................................... 277 A. Software Sources ................................................................................... 289 B. Resources and References ................................................................. 305 Index .................................................................................................................... 317 Oracle 8i Internal Services for Waits, Latches, Locks, and Memory, eMatter Edition Copyright © 2007 O’Reilly & Associates, Inc. All rights reserved. Preface Preface This book is not a general introduction to network troubleshooting. Rather, it is about one aspect of troubleshooting—information collection. This book is a tuto- rial introduction to tools and techniques for collecting information about com- puter networks. It should be particularly useful when dealing with network problems, but the tools and techniques it describes are not limited
Recommended publications
  • The Risks Digest Index to Volume 11
    The Risks Digest Index to Volume 11 Search RISKS using swish-e Forum on Risks to the Public in Computers and Related Systems ACM Committee on Computers and Public Policy, Peter G. Neumann, moderator Index to Volume 11 Sunday, 30 June 1991 Issue 01 (4 February 1991) Re: Enterprising Vending Machines (Allan Meers) Re: Risks of automatic flight (Henry Spencer) Re: Voting by Phone & public-key cryptography (Evan Ravitz) Re: Random Voting IDs and Bogus Votes (Vote by Phone) (Mike Beede)) Re: Patriots ... (Steve Mitchell, Steven Philipson, Michael H. Riddle, Clifford Johnson) Re: Man-in-the-loop on SDI (Henry Spencer) Re: Broadcast local area networks ... (Curt Sampson, Donald Lindsay, John Stanley, Jerry Leichter) Issue 02 (5 February 1991) Bogus draft notices are computer generated (Jonathan Rice) People working at home on important tasks (Mike Albaugh) Predicting system reliability (Martyn Thomas) Re: Patriots (Steven Markus Woodcock, Mark Levison) Hungry copiers (another run-in with technology) (Scott Wilson) Re: Enterprising Vending Machines (Dave Curry) Broadcast LANs (Peter da Silva, Scott Hinckley) Issue 03 (6 February 1991) Tube Tragedy (Pete Mellor) New Zealand Computer Error Holds Up Funds (Gligor Tashkovich) "Inquiry into cash machine fraud" (Stella Page) Quick n' easy access to Fidelity account info (Carol Springs) Re: Enterprising Vending Machines (Mark Jackson) RISKS of no escape paths (Geoff Kuenning) A risky gas pump (Bob Grumbine) Electronic traffic signs endanger motorists... (Rich Snider) Re: Predicting system reliability (Richard P. Taylor) The new California licenses (Chris Hibbert) Phone Voting -- Really a Problem? (Michael Barnett, Dave Smith) Re: Electronic cash completely replacing cash (Barry Wright) Issue 04 (7 February 1991) Subway door accidents (Mark Brader) http://catless.ncl.ac.uk/Risks/index.11.html[2011-06-11 08:17:52] The Risks Digest Index to Volume 11 "Virus" destroys part of Mass.
    [Show full text]
  • Cisco Unity Express Virtual 9.0 COSI Licences
    Open Source Used In Cisco Unity Express Virtual 9.0 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices. Text Part Number: 78EE117C99-133317509 Open Source Used In Cisco Unity Express Virtual 9.0 1 This document contains licenses and notices for open source software used in this product. With respect to the free/open source software listed in this document, if you have any questions or wish to receive a copy of any source code to which you may be entitled under the applicable free/open source license(s) (such as the GNU Lesser/General Public License), please contact us at [email protected]. In your requests please include the following reference number 78EE117C99-133317509 Contents 1.1 Activation 1.1 1.1 1.1.1 Available under license 1.2 Apache Commons Collections 3.1 1.2.1 Available under license 1.3 Apache Commons Digester 1.8.1 1.3.1 Available under license 1.4 Apache Commons Logging 1.1. 1.4.1 Available under license 1.5 Apache Xerces 1.4.4 1.5.1 Notifications 1.5.2 Available under license 1.6 apache-log4j 1.2.15 1.6.1 Available under license 1.7 apache-xerces 2.9.1 1.7.1 Available under license 1.8 ASM 3.1 1.8.1 Available under license 1.9 bash 2.05b 1.9.1 Available under license 1.10 BCEL 5.1 1.10.1 Notifications 1.10.2 Available under license 1.11 bcprov-jdk14 1.21 1.11.1 Available under license 1.12 beepcore 0.9.08 1.12.1 Notifications Open Source Used In Cisco Unity Express Virtual
    [Show full text]
  • Name Server Operations Guide for BIND Release 4.9.5
    Name Server Operations Guide for BIND Release 4.9.5 Releases from 4.9 Paul Vixie1 <[email protected]> Internet Software Consortium La Honda, CA Releases through 4.8.3 Kevin J. Dunlap2 Michael J. Karels Computer Systems Research Group Computer Science Division Department of Electrical Engineering and Computer Sciences University of California Berkeley, CA 94720 1. Introduction The Berkeley Internet Name Domain (BIND) implements an Internet name server for BSD-derived operating systems. The BIND consists of a server (or ‘‘daemon’’) called named and a resolver library. A name server is a network service that enables clients to name resources or objects and share this information with other objects in the network. This in effect is a distributed data base system for objects in a computer network. The BIND server runs in the background, servicing queries on a well known network port. The standard port for UDP and TCP is specified in /etc/services. The resolver is a set of routines residing in a system library that provides the interface that programs can use to access the domain name services. BIND is fully integrated into BSD (4.3 and later releases) network programs for use in storing and retrieving host names and address. The system administrator can configure the system to use BIND 1 This author was employed by Digital Equipment Corporation’s Network Systems Laboratory during the development and re- lease of BIND 4.9. Release 4.9.2 was sponsored by Vixie Enterprises. Releases from 4.9.3 were sponsored by the Internet Software Consortium. 2 This author was an employee of Digital Equipment Corporation’s ULTRIX Engineering Advanced Development Group and was on loan to CSRG when this work was done.
    [Show full text]
  • An Analysis of the Internet Virus of November 1988 
    With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988 Mark W. Eichin and Jon A. Rochlis Massachusetts Institute of Technology 77 Massachusetts Avenue, E40-311 Cambridge, MA 02139 February 9, 1989 Abstract computer, it attempted to break into other machines on the network. This paper is an analysis of that virus program In early November 1988 the Internet, a collection of net- and of the reaction of the Internet community to the attack. works consisting of 60,000 host computers implementing the TCP/IP protocol suite, was attacked by a virus, a pro- gram which broke into computers on the network and which spread from one machine to another. This paper is a de- tailed analysis of the virus programitself, as well as the re- 1.1 Organization actions of the besieged Internet community. We discuss the structure of the actual program, as well as the strategies the virus used to reproduce itself. We present the chronology In Section 1 we discuss the categorization of the program of events as seen by our team at MIT, one of a handful of which attacked the Internet, the goals of the teams work- groups around the country working to take apart the virus, ing on isolating the virus and the methods they employed, and summarize what the virus did and did not actually do. in an attempt to discover its secrets and to learn the net- In Section 2 we discuss in more detail the strategies it em- work’s vulnerabilities. We describe the lessons that this ployed, the specific attacks it used, and the effective and incident has taught the Internet community and topics for future consideration and resolution.
    [Show full text]
  • History of the Root Server System
    RSSAC023: History of the Root Server System A Report from the ICANN Root Server System Advisory Committee (RSSAC) 4 November 2016 History of the Root Server System Preface This is a report to the Internet community from the ICANN Root Server System Advisory Committee (RSSAC). In this report, the RSSAC gives an overview of the organizational history of the root server system. The RSSAC advises the Internet community and ICANN Board of Directors on matters relating to the operation, administration, security and integrity of the Internet’s Root Server System. The RSSAC’s responsibilities include: • Communicating with the technical and ICANN communities on matters relating to the operation of the root servers and their multiple instances. • Gathering and articulating requirements to offer to those engaged in technical revisions of the protocols and common best practices related to the operation of DNS servers. • Engaging in ongoing threat assessment and risk analysis of the Root Server System. • Recommending necessary audit activity to assess the current status of root servers and the root zone. Contributors to this report are listed at end of this document. 2 RSSAC023 History of the Root Server System Table of Contents 1. Introduction ................................................................................................................. 5 2. History of Root Servers .............................................................................................. 5 2.1. Root Servers in Early Days of the DNS (1983–1986) ........................................ 5 2.2. Expanding Root Service for MILNET and NSFNET (1986–1990) ................... 7 2.3. Expanding Root Service Outside North America (1991) ................................. 10 2.4. DDN-NIC Changes to Network Solutions (1991–1992) .................................. 11 2.5. InterNIC (1993) ................................................................................................ 12 2.6. Renaming Root Servers to root-servers.net (1995) ..........................................
    [Show full text]
  • An Analysis of the Internet Virus of November 1988
    With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988 Mark W. Eichin and Jon A. Rochlis Massachusetts Institute of Technology 77 Massachusetts Avenue, E40-311 Cambridge, MA 02139 February 9, 1989 Abstract computer, it attempted to break into other machines on the network. This paper is an analysis of that virus program In early November 1988 the Internet, a collection of net- and of the reaction of the Internet community to the attack. works consisting of 60,000 host computers implementing the TCP/IP protocol suite, was attacked by a virus, a pro- gram which broke into computers on the network and which spread from one machine to another. This paper is a de- tailed analysis of the virus programitself, as well as the re- 1.1 Organization actions of the besieged Internet community. We discuss the structure of the actual program, as well as the strategies the virus used to reproduce itself. We present the chronology In Section 1 we discuss the categorization of the program of events as seen by our team at MIT, one of a handful of which attacked the Internet, the goals of the teams work- groups around the country working to take apart the virus, ing on isolating the virus and the methods they employed, and summarize what the virus did and did not actually do. in an attempt to discover its secrets and to learn the net- In Section 2 we discuss in more detail the strategies it em- work’s vulnerabilities. We describe the lessons that this ployed, the specific attacks it used, and the effective and incident has taught the Internet community and topics for future consideration and resolution.
    [Show full text]
  • List of Programmers 1 List of Programmers
    List of programmers 1 List of programmers This list is incomplete. This is a list of programmers notable for their contributions to software, either as original author or architect, or for later additions. A • Michael Abrash - Popularized Mode X for DOS. This allows for faster video refresh and square pixels. • Scott Adams - one of earliest developers of CP/M and DOS games • Leonard Adleman - co-creator of RSA algorithm (the A in the name stands for Adleman), coined the term computer virus • Alfred Aho - co-creator of AWK (the A in the name stands for Aho), and main author of famous Dragon book • JJ Allaire - creator of ColdFusion Application Server, ColdFusion Markup Language • Paul Allen - Altair BASIC, Applesoft BASIC, co-founded Microsoft • Eric Allman - sendmail, syslog • Marc Andreessen - co-creator of Mosaic, co-founder of Netscape • Bill Atkinson - QuickDraw, HyperCard B • John Backus - FORTRAN, BNF • Richard Bartle - MUD, with Roy Trubshaw, creator of MUDs • Brian Behlendorf - Apache • Kent Beck - Created Extreme Programming and co-creator of JUnit • Donald Becker - Linux Ethernet drivers, Beowulf clustering • Doug Bell - Dungeon Master series of computer games • Fabrice Bellard - Creator of FFMPEG open codec library, QEMU virtualization tools • Tim Berners-Lee - inventor of World Wide Web • Daniel J. Bernstein - djbdns, qmail • Eric Bina - co-creator of Mosaic web browser • Marc Blank - co-creator of Zork • Joshua Bloch - core Java language designer, lead the Java collections framework project • Bert Bos - author of Argo web browser, co-author of Cascading Style Sheets • David Bradley - coder on the IBM PC project team who wrote the Control-Alt-Delete keyboard handler, embedded in all PC-compatible BIOSes • Andrew Braybrook - video games Paradroid and Uridium • Larry Breed - co-developer of APL\360 • Jack E.
    [Show full text]
  • OSS Disclosure
    Tape Automation Scalar i6000, Firmware Release I11 (660Q) Open Source Software Licenses Open Source Software (OSS) Licenses for: Scalar i6000 Firmware Release I11 (660Q). The firmware/software contained in the Scalar i6000 is an aggregate of vendor proprietary pro- grams as well as third party programs, including Open Source Software (OSS). Use of OSS is subject to designated license terms and the following OSS license disclosure lists all open source components and their respective, applicable licenses that are part of the tape library firmware. All software that is designated as OSS may be copied, distributed, and/or modified in accordance with the terms and conditions of its respective license(s). Additionally, for some OSS you are entitled to obtain the corresponding OSS source files as required by the respective and applicable license terms. While GNU General Public License ("GPL") and GNU Lesser General Public Li- cense ("LGPL") licensed OSS requires that the sources be made available, Quantum makes all tape library firmware integrated OSS source files, whether licensed as GPL, LGPL or otherwise, available upon request. Please refer to the Scalar i6000 Open Source License CD (part number 3- 01638-xx) when making such request. For contact information, see Getting More Information. LTO tape drives installed in the library may also include OSS components. For a complete list- ing of respective OSS packages and applicable OSS license information included in LTO tape drives, as well as instructions to obtain source files pursuant to applicable license requirements, please reference the Tape Automation disclosure listings under the Open Source Information link at www.quantum.com/support.
    [Show full text]
  • Copyright and Licensing Guide
    WatchGuard System Manager, Fireware v12.3 Dimension v2.1.1 Copyright and Licensing Guide All Firebox models Revised: December 2018 Updated for: Fireware v12.3 and Dimension 2.1.1 Notice to Users Information in this guide is subject to change without notice. No part of this guide may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the express written permission of WatchGuard Technologies, Inc. Copyright© 1998–2018 WatchGuard Technologies, Inc. All rights reserved. All trademarks or trade names mentioned herein, if any, are the property of their respective owners. ABOUT WATCHGUARD WatchGuard® Technologies, Inc. is a global leader in network security, providing best- ADDRESS in-class Unified Threat Management, Next Generation Firewall, secure Wi-Fi, and 505 Fifth Avenue South network intelligence products and services to more than 75,000 customers worldwide. Suite 500 The company’s mission is to make enterprise-grade security accessible to companies of Seattle, WA 98104 all types and sizes through simplicity, making WatchGuard an ideal solution for SUPPORT Distributed Enterprises and SMBs. WatchGuard is headquartered in Seattle, www.watchguard.com/support Washington, with offices throughout North America, Europe, Asia Pacific, and Latin U.S. and Canada +877.232.3531 America. To learn more, visit WatchGuard.com. All Other Countries +1.206.521.3575 For additional information, promotions and updates, follow WatchGuard on Twitter, SALES @WatchGuard on Facebook, or on the LinkedIn Company page. Also, visit our InfoSec U.S. and Canada +1.800.734.9905 blog, Secplicity, for real-time information about the latest threats and how to cope with All Other Countries +1.206.613.0895 them at www.secplicity.org.
    [Show full text]
  • Open Source Software License Summary CP 443-5 Extended
    LICENSE CONDITIONS AND COPYRIGHT NOTICES CP 443-5 Extended License Summary CP443-5 DX05 - V7.1 1.1 Overview Open Source Component Acknowledgements License and Copyrights [Yes/No] glibc YES - glibc: License and Copyrights busybox YES - busybox: License and Copyrights Linux Kernel YES - Linux Kernel: License and Copyrights Adeos-Ipipe Kernel Adeos-Ipipe Kernel Patch: License YES - Patch and Copyrights gdb - 6.8-mingw gdb - 6.8-mingw (6.8.3): License and YES - (6.8.3) Copyrights 1.2 Open Source Software - glibc Enclosed you will find the license condtions and copyright notices applicable for glibc. License Conditions Sun RPC is a product of Sun Microsystems, Inc. and is provided for unrestricted use provided that this legend is included on all tape media and as a part of the software program in whole or part. Users may copy or modify Sun RPC without charge, but are not authorized to license or distribute it to anyone else except as part of a product or program developed by the user. SUN RPC IS PROVIDED AS IS WITH NO WARRANTIES OF ANY KIND INCLUDING THE WARRANTIES OF DESIGN, MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE, OR ARISING FROM A COURSE OF DEALING, USAGE OR TRADE PRACTICE. Sun RPC is provided with no support and without any obligation on the part of Sun Microsystems, Inc. to assist in its use, correction, modification or enhancement. SUN MICROSYSTEMS, INC. SHALL HAVE NO LIABILITY WITH RESPECT TO THE INFRINGEMENT OF COPYRIGHTS, TRADE SECRETS OR ANY PATENTS BY SUN RPC OR ANY PART THEREOF. In no event will Sun Microsystems, Inc.
    [Show full text]
  • Software License Conditions for Fujitsu SPARC M12 and Fujitsu M10/SPARC M10 for XSCF Firmware
    Software License Conditions for Fujitsu SPARC M12 and Fujitsu M10/SPARC M10 For XSCF Firmware ソフトウェアライセンス使用許諾条件 XSCF ファームウェア向け Manual Code: C120-L001-06XA March 2017 Software License Conditions/ソフト ウェアライセンス使用許諾条件 Some of the software functions explained in the Fujitsu SPARC M12 and Fujitsu M10/SPARC M10 are licensed under public licenses (GNU Public License (GPL), GNU Lesser General Public License (LGPL), and others). This document lists these public licenses and conditions. Fujitsu SPARC M12 is sold as SPARC M12 by Fujitsu in Japan. Fujitsu SPARC M12 and SPARC M12 are identical products. Fujitsu M10 is sold as SPARC M10 by Fujitsu in Japan. Fujitsu M10 and SPARC M10 are identical products. SPARC M12/M10 で説明している機能は、GPL、LGPL などのソフトウェアを使用し ています。 本書では、それらのライセンス使用許諾条件を記載します。 なお、SPARC M12は、Fujitsu SPARC M12という製品名でも販売されています。 SPARC M12とFujitsu SPARC M12は、同一製品です。 また、SPARC M10 システムは、Fujitsu M10という製品名でも販売されています。 SPARC M10 システムとFujitsu M10は、同一製品です。 Copyright © 2012, 2017, Fujitsu Limited. All rights reserved. 1 2 Software License Conditions for Fujitsu SPARC M12 and Fujitsu M10/SPARC M10 ・ March 2017 GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989, 1991 Free Software Foundation, Inc. 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users.
    [Show full text]
  • BRL-CAD Tutorial Series: Volume I – Overview and Installation
    BRL-CAD Tutorial Series: Volume I – Overview and Installation by Lee A. Butler and Eric W. Edwards ARL-SR-113 February 2002 Approved for public release; distribution is unlimited. The findings in this report are not to be construed as an official Department of the Army position unless so designated by other authorized documents. Citation of manufacturer’s or trade names does not constitute an official endorsement or approval of the use thereof. Destroy this report when it is no longer needed. Do not return it to the originator. !"#$%&'(')"*+%,)-.")/."$ Aberdeen Proving Ground, MD 21005-5068 !&,01&0223% %%%%%%%%4'-"5)"$%6776 BRL-CAD Tutorial Series: Volume I – Overview and Installation Lee A. Butler Survivability/Lethality Analysis Directorate, ARL Eric W. Edwards SURVICE Engineering Company Approved for public release; distribution is unlimited. !-(/")*/ Since 1979, the U.S. Army Research Laboratory has been developing and distributing the BRL-CAD constructive solid geometry (CSG) modeling package for a wide range of military and industrial applications. The package includes a large collection of tools and utilities including an interactive geometry editor, raytracing and generic framebuffer libraries, a network-distributed image- processing and signal-processing capability, and an embedded scripting language. As part of this effort, a multivolume tutorial series is being developed to assist users in the many features of the BRL-CAD package. The “Overview and Installation” guide, which is the first volume in the series, addresses the background, purpose, and strengths of the package; the libraries and utilities included within it; platform-specific installation instructions; and information about bugs and updates. Other volumes focus on advanced features, individual utilities, and programming.
    [Show full text]