Cluster Network Information AR-Cluster User Manual

Several commands are available to display information pertaining to the DX cluster network. Most of the SHOW commands default to the users call if no call is specified in the command.


The SHOW/CONFIGURATION command displays the physical configuration of the DX cluster network. The nodes are listed along with the users connected to each node. An optional parameter at the end of the command can be used to show the configuration of just one node.



show/configuration k8smc


The SHOW/NODES command displays a list of DX cluster nodes connected in the network.




The SHOW/USERS command displays a list of users connected to the node. A call displayed in parentheses () signifies that user is not present at his station (see SET/NOHERE command). An asterisk by the call signifies that the station is in Conference Mode.




The SHOW/CLUSTER command displays the number of nodes in the current cluster configuration, the number of local users, the total number of users, and the uptime for the node.




The SHOW/UPTIME command displays the uptime for the node.




The SH/LOG command displays the log data for the station showing dates and times when the station logged onto and logged out of the cluster.




show/log k5pi

show/log/10 k5ab


The SH/LOG command displays the version of the AR-Cluster software





Keeping the Network Clean


A George Carlin's 7 words (plus a few others) you can 't say on TV filter is active to keep things G rated. The Carlin filter is applied to user spots as well as spots coming in from other nodes on the network. Spots coming in on the network get dumped if they contain restricted language. If any of the Carlin words are contained in a user announcement, the user gets a message:

Your DX/WX/announce was aborted since it contains restricted language.


Additionally, AR-Cluster has advanced protocol for tracking questionable spots across the network. Spots for DX, Announcement, TALK, WWV, and WX can be traced by sysops back to their source. The trace commands generate special protocol walks the network back to the source of the spot. The route of the spot will then be displayed to the sysop along with the user or node that generated the spot. If a user is telneting into a node, his Internet address will also be displayed. This capability has been very successful in tracking interference to the cluster network.