DragonFly On-Line Manual Pages
SC_ALLY(1) DragonFly General Commands Manual SC_ALLY(1)
NAME
sc_ally - scamper driver to run Ally on a list of candidate aliases.
SYNOPSIS
sc_ally [-?D] [-i infile] [-o outfile] [-p port] [-U unix-socket]
[-f fudge] [-i probe-wait] [-q attempts] [-t logfile]
[-w waittime]
DESCRIPTION
The sc_ally utility provides the ability to connect to a running
scamper(1) instance and have a set of IPv4 address-pairs tested for
aliases using the Ally technique. For each address pair in the file,
sc_ally establishes which probe methods (UDP, TCP-ack, ICMP-echo) solicit
an incrementing IP-ID value, and then uses the Ally technique on pairs
where a probe method is able to obtain an incrementing IP-ID for both
addresses. The output is written to a warts file. The options are as
follows:
-? prints a list of command line options and a synopsis of each.
-D causes sc_ally to detach and become a daemon.
-i infile
specifies the name of the input file which consists of a sequence
of IPv4 address-pairs, one pair per line.
-o outfile
specifies the name of the output file to be written. The output
file will use the warts format.
-p port
specifies the port on the local host where scamper(1) is
accepting control socket connections.
-U unix-socket
specifies the name of a unix domain socket where scamper(1) is
accepting control socket connections.
-f fudge
specifies the fudge factor to use when (1) inferring if IPIDs are
assigned from a counter, and (2) inferring if two addresses share
the same counter.
-i probe-wait
specifies the inter-probe gap for both ping and Ally
measurements, in milliseconds. The default is 1000ms (1 second);
the minimum is 200ms, and the maximum is 2000ms.
-q attempts
specifies the number of times to try Ally when one of the
addresses is unresponsive.
-t logfile
specifies the name of a file to log output from sc_ally generated
at run time.
-w waittime
specifies the minimum length of time, in seconds, to wait between
completing a measurement to a particular IP address and issuing
the next.
EXAMPLE
Given a set of IPv4-address pairs in a file named infile.txt:
192.0.2.1 192.0.32.10
192.0.2.2 192.0.31.8
192.0.2.3 192.0.30.64
and a scamper(1) daemon listening on port 31337, then these address-pairs
can be tested for aliases using
sc_ally -i infile.txt -o outfile.warts -p 31337
SEE ALSO
N. Spring, R. Mahajan, and D. Wetherall, Measuring ISP topologies with
Rocketfuel, Proc. ACM SIGCOMM 2002. scamper(1), sc_wartsdump(1),
sc_warts2text(1)
AUTHORS
sc_ally is written by Matthew Luckie <mjl@luckie.org.nz>.
DragonFly 6.5-DEVELOPMENT March 1, 2011 DragonFly 6.5-DEVELOPMENT