scispace - formally typeset
Search or ask a question

Which command do you use to view the number of errors that have occurred on a network interface? 

Answers from top 8 papers

More filters
Papers (8)Insight
Open accessProceedings ArticleDOI
23 May 2016
17 Citations
In this paper, we propose a self-reconfiguring IEEE 1687 network in which all instruments that have detected errors are automatically included in the scan path.
They show that errors occurred on all output pins of the microprocessor, and that both single and multiple bit errors were observed.
A study of error detection capabilities for random independent bit errors and burst errors reveals that XOR, two's complement addition, and Adler checksums are suboptimal for typical network use.
The proposed self-testing scheme achieves failure detection by periodically directing the control flow to go through only active software modules in order to detect errors that affect instructions in the local memory of the network interface.
Proceedings ArticleDOI
Ali Abur, Jun Zhu 
25 Jul 2010
9 Citations
Hence, errors associated with network parameters are not easily and commonly detected leading to varying degrees of inaccuracies in the results of network applications that rely on the network data base.
The obtained errors of received values are comparable to errors of counting devices used in the network.
Proceedings ArticleDOI
Khalid El-Arini, Kevin S. Killourhy 
22 Aug 2005
37 Citations
We present a detection algorithm based on this framework, and show that it is able to detect errors in the router configuration files of a university network.
Finally, the study identifies two mechanisms by which faults may propagate from the interface to other parts of the network; in one example, this propagation caused the interface's host computer to reboot, while another caused a remote interface in the network to hang.

Related Questions

What are the causes of Command and Scripting Interpreter network errors?5 answersCommand and scripting interpreter network errors can be caused by various factors. One possible cause is the misinterpretation of user input actions or gestures, which can lead to errors in the interpretation of the user's intention. Another cause can be the inconsistency between the syntax of a command in a script and the values attributed to the variables passed as arguments to that command. Additionally, errors can occur when input mechanisms must interpret the user's input, leading to problems for user learning. It is also important to note that error reduction techniques, such as repeating a command or increasing the length of the input, can help improve input mechanisms and reduce errors without negatively affecting learning or perceived effort.
What are the challenges in estimating software errors using logs?5 answersEstimating software errors using logs faces several challenges. Firstly, the content and format of logs can vary widely among different systems and components, making it difficult to standardize the analysis process. Secondly, the ad-hoc nature of log reports generated in the production setting often provides insufficient information for detailed failure diagnosis. Thirdly, the manual task of inserting proper logging statements in the source code is challenging, as missing important statements can hinder debugging efforts while excessive logging can increase system overhead. Additionally, the implementation of logging mechanisms lacks a systematic approach, leading to inaccurate logs that may compromise the validity of failure analysis. Lastly, the usage of logs in process mining for software analysis raises privacy concerns, as sensitive information and intellectual property may be exposed.
How do I know if my Internet modem is bad?9 answers
How do you check Internet history on a Chromebook?10 answers
How to view deleted signal messages?9 answers
Which command is used to trace path from one node to another in network?17 answers

See what other people are reading

What are the potential challenges and limitations associated with the implementation of these methodologies for renewable energy integration?
10 answers
What is the significance of symmetrical output voltage swing in power electronics systems?
4 answers
What is the significance of symmetrical output voltage swing in power electronics systems?
4 answers
How does learning at the research-policy-practice interface happen and influence stewardship;?
5 answers
How does learning at the research-policy-practice interface happen and influence stewardship;?
5 answers
How to build ML model genetator?
5 answers
To build an ML model generator, one can consider various approaches outlined in the provided contexts. Firstly, integrating a ML-FEM coupled model can accurately simulate and predict the transient behavior of faults in generators, enhancing protection schemes. Additionally, leveraging a hybrid gateway in a peripheral I/O device allows for dual domains, enabling communication between compute resources and hosts for ML applications. Furthermore, utilizing a deep auto-encoder model like MLP-SAE can predict gene expression changes based on genetic variants, showcasing the effectiveness of deep learning in genomics research. By amalgamating these insights, one can develop a robust ML model generator that incorporates advanced simulation techniques, domain-specific communication structures, and predictive genetic modeling methodologies.
How often does faults due to vibrations occur in ships?
5 answers
Faults due to vibrations in ships are a significant concern, with various studies shedding light on their occurrence. Research indicates that wave-induced vibrations can contribute up to 50% of fatigue damage in large ocean-going ships, emphasizing the impact of vibrations on ship structures. Additionally, equipment fault detection in engines for boats focuses on shock and vibration information, with a high probability (98%) of engine fault determination and 72% probability of fault detection. Furthermore, metal fatigue in vessels, caused by dynamic movement, has been diagnosed using vibration analysis, highlighting the importance of reliability engineering in detecting faults related to vibrations. Overall, these studies underscore the frequency and significance of faults attributed to vibrations in ships, necessitating effective monitoring and diagnostic strategies for ensuring maritime safety.
The period of fault transporting oil and gas?
5 answers
The period of fault transporting oil and gas varies based on the fault's development characteristics and hydrocarbon accumulation stages. In the Langgu Sag of the Bohai Bay Basin, faults like the F3 fault and Jiuzhou fault play crucial roles in transporting oil and gas during different periods. The F3 fault in the Langgu Sag primarily distributes strong oil and gas transport capacity in the eastern part. On the other hand, the Jiuzhou fault is identified as a significant oil-source fault with distinct hydrocarbon distribution characteristics along its strike, indicating different transport capacities in various fault segments. These faults, along with fault transport systems, control the migration and accumulation models of oil and gas vertically and through different strata, influencing the timing and efficiency of oil and gas transportation.
What is the period of time when the fault conducts oil and gas??
5 answers
The period when faults conduct oil and gas varies based on geological factors. In the Shiwu fault depression of the southern Songliao basin, petroleum accumulation occurred during three distinct periods: the end of the Denglouku Formation, the Quantou Formation-Nengjiang Formation period, and the end of the Nengjiang Formation. Similarly, in the Changling fault depression, gas accumulation took place during different phases in various tectonic units, such as the Yingcheng Formation and Denglouku Formation of Shuangtuozi structure, Haerjin structure, and the Quantou Formation of Fulongquan structure. These findings highlight the complex evolution of faults and the diverse periods when oil and gas activities occur, emphasizing the importance of understanding the geological history for effective resource exploration and development.
What are things infants can do alone without anybody's help?
5 answers
Infants can engage in various activities independently. They can vocalize when alone, showing comfort without needing a response from others. Additionally, infants can utilize self-help reading systems to listen to or watch related media information without assistance. Independent mobility is crucial for infants as it allows them to freely explore their environment, experiment with problem-solving, and develop executive functions. Furthermore, infants may exhibit unprovoked acts of force against others, potentially for exploration or pleasure, indicating early moral development opportunities. Lastly, infants like Celia can self-regulate and inhibit their impulses by using symbols like language and gestures to prevent themselves from touching potentially harmful objects, showcasing early self-control abilities.
What are the current research efforts aimed at improving the use of GPUs in high-integrity systems?
10 answers
Current research efforts to enhance the reliability and integrity of GPUs in high-integrity systems are multifaceted, addressing both hardware vulnerabilities and the integrity of computations, particularly in the context of machine learning models and cryptographic applications. One primary focus is on evaluating and mitigating GPU vulnerabilities through cross-layer reliability evaluations, which combine high-energy neutron beam experiments, fault simulation campaigns, and application profiling to accurately estimate GPU application failure rates. Novel hardening solutions, such as Reduced Precision Duplication With Comparison (RP-DWC) and dedicated software solutions for hardening Convolutional Neural Networks (CNNs), have been proposed to improve fault tolerance in HPC and safety-critical applications. Additionally, research has targeted the improvement of GPU DRAM error protection mechanisms. By analyzing the locality in multibit error patterns observed in high-energy neutron beam tests, novel ECC schemes have been developed. These schemes significantly decrease the silent data corruption (SDC) risk and the number of uncorrectable errors without additional redundancy or performance degradation, addressing the challenges posed by wide GPU DRAM interfaces and the impracticality of full-device correction through ECC. Efforts have also been made to validate the representativeness of fault simulation-based predictions for silent data corruptions against experimentally measured rates, thereby enhancing the reliability evaluation of GPU functional units. In the realm of computational integrity for machine learning models, techniques combining random verification of computation steps with systematic adjustments of DNN hyperparameters have been developed. These approaches aim to bridge the performance gap between trusted execution environments (TEE) and GPUs, ensuring high computational integrity without significant performance losses. For cryptographic applications, research has explored electro-magnetic (EM) side-channel vulnerabilities of GPU-based bitsliced AES implementations, proposing efficient multi-bit and multi-thread combinational analysis techniques to leverage the parallelism of GPUs for improved attack resistance. Lastly, dynamically configurable self-repairing mechanisms for mitigating the impact of permanent faults in GPGPUs and the development of the NVBitFI tool for fault injection into GPU programs highlight the ongoing efforts to ensure the reliability and integrity of GPUs in high-integrity systems.