1. Trang chủ
  2. » Công Nghệ Thông Tin

Network Administration for the Solaris 9 Operating Environment SA-399 Student Guide phần 2 doc

60 240 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 60
Dung lượng 524,82 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Figure 3-1 Course Map Introducing the TCP/IP Model Introducing LANs and Their Components Describing Ethernet Interfaces Describing ARP and RARP Configuring the Network Interface Layer...

Trang 1

Describing Ethernet Interfaces

Upon completion of this module, you should be able to:

● Describe Ethernet concepts

● Describe Ethernet frames

● Use network utilities

The following course map shows how this module fits into the currentinstructional goal

Figure 3-1 Course Map

Introducing the TCP/IP Model

Introducing LANs and Their Components

Describing Ethernet Interfaces

Describing ARP and RARP

Configuring the Network Interface Layer

Trang 2

Introducing Ethernet Concepts

Ethernet was designed as a packet-switching LAN over broadcasttechnology Devices connect to the network and compete for access to ashared communications channel The IEEE 802.3 standard for Ethernetwas defined in 1985 Ethernet standards are implemented at the NetworkInterface layer of the TCP/IP protocol model

Major Ethernet Elements

The three major elements of Ethernet networks are:

● Ethernet packets are called frames These are units of data sentacross the network

● The Ethernet access method, CSMA/CD This method controlspacket transmission and information flow across the Ethernethardware

● Hardware cables, connectors, and circuitry These transfer data toand from systems across the network

CSMA/CD Access Method

Non-switched Ethernet uses a broadcast delivery mechanism in whicheach frame that is transmitted is heard by every station CSMA/CD is anarbitrary access method that provides a method to detect and recoverfrom simultaneous transmissions Each interface monitors the network for

a carrier signal (Carrier Sense) During a gap between transmissions, eachinterface has an equal chance to transmit data (Multiple Access) If twointerfaces try to transmit data at the same time, the transceiver circuitrydetects a transmit collision (Collision Detection) Both interfaces mustwait a short period of time before they attempt to resend data The waitperiod is determined by using an exponential back-off algorithm

Trang 3

Figure 3-2 shows how CSMA/CD accesses the network The figure

represents the CSMA/CD developed for the original Ethernet topology.Ethernet originally consisted of a single-wire, bidirectional backbone Thetheory of operation is still the same today, but Ethernet topologies usemore advanced components that allow a higher transmission rate

Figure 3-2 Structure of CSMA/CD

No No

Wait Back off exponentially.

Success.

Is there traffic on the network?

Trang 4

Full-Duplex and Half-Duplex Transmission

Full-duplex network transmission occurs when a system simultaneouslysends and receives data on a bidirectional network

Half-duplex network transmission occurs when a system either sends orreceives data on a bidirectional network The system cannot send andreceive data simultaneously

Full-duplex networking is more efficient than half-duplex networking.Ethernet Statistics

The netstatutility provides statistics on network-related information,such as the collision rate In a shared-media topology, collisions occurfrequently The more transmitting nodes there are on a network, thegreater the likelihood that collisions occur because of an increase innetwork traffic The collision rate increases exponentially until there isalmost no throughput of data

To display the current usage of the Ethernet interfaces, use thenetstat

command with the -ioption, for example:

sys11# netstat -i

Name Mtu Net/Dest Address Ipkts Ierrs Opkts Oerrs Collis Queue

lo0 8232 loopback localhost 52559 0 52559 0 0 0

hme0 1500 sys11ext sys11ext 18973 0 30292 0 0 0

qfe0 1500 sys11 sys11 8435 0 35795 0 0 0

sys11#

Collision Rates

Collisions occur when two or more systems attempt to transmit data onthe network at the same time Collision rates indicate the number ofcollisions that occur on a network Use collision rates to diagnose networkperformance problems that are caused by collisions on a network

To compute the collision rate, multiply 100 by the number of collisions,and divide the product by the total number of output packets

For example, assume that the netstatutility reports 12 collisions and

1302 output packets Calculate the collision rate as follows:

Trang 5

In general:

● Collision rates higher than 5 percent on a 10-Mbps Ethernet network,and 10 percent on a 100-Mbps Ethernet network, are the first

indication of network overload

● Faulty network cabling frequently causes collisions through electricalproblems Technical experts use special electronic equipment todetect the elements that cause a collision and to provide a solution

● Switches minimize collisions by limiting the collision domain to onesystem

Input and Output Errors

If the netstatutility reports large numbers (approximately 20 to

25 percent) of input or output errors on the network system, you canattribute the problem to one of the following reasons:

● Duplicate IP addresses used on the same network

Trang 6

Introducing Ethernet Frames

An Ethernet frame is a single unit of data transported across the LAN It is

a series of bits with a well-defined beginning and a well-defined end TheEthernet specification describes how bits are encoded on the cable andhow devices on the network detect the beginning and the end of atransmission

Ethernet Addresses

An Ethernet address is the device’s unique hardware address AnEthernet address is sometimes referred to as a media access control(MAC) address An Ethernet address is 48 bits long and is displayed as 12hexadecimal digits (six groups of two digits) separated by colons Anexample of an Ethernet address is 08:00:20:1e:56:7d

● The IEEE administers unique Ethernet addresses IEEE designatesthe first three octets as vendor-specific Most Sun systems begin withthe sequence 08:00:20 The Sun Enterprise™ 10000 and Sun

Fire™ 15K systems begin with 00:00:be, and the SunBlade

systems begin with00:03:ba Sun assigns the last three octets to theproducts it manufactures to ensure that each node on an Ethernetnetwork has a unique Ethernet address

● The IEEE specification enables the vendor to decide whether to usethe host-based addressing approach or the port-based addressingapproach By default, Sun uses host-based addressing on itsnetworks interface cards (NICs)

The network interface drivers in Sun systems obtain the Ethernetaddress for the Ethernet interface from a system’s hardware Forexample, desktop systems use the address in the nonvolatile randomaccess memory (NVRAM) chip, while some large server systemsobtain their address from a special board installed in the system Bydefault, all interface addresses on a system use just one Ethernetaddress, either the NVRAM or the special board, even though eachEthernet interface controller has a built-in Ethernet address

For systems configured to have more than one interface on the samephysical subnet, you need a unique Ethernet address that is different fromthe primary host-based assigned Ethernet address

There are three types of addresses: unicast, broadcast, and multicast

Trang 7

Unicast Addresses

Unicast addresses are used for one-to-one communication The systemuses a unicast address to send a message to another system on the localEthernet network You can use a system’s unique Ethernet address as aunicast address

Broadcast Addresses

A device uses a broadcast address to send messages to all systems on thelocal Ethernet network The Ethernet broadcast address is represented inthe form of all 1s in binary format and as ff:ff:ff:ff:ff:ffin

hexadecimal format When the Network Interface layer receives an

Ethernet frame with a destination address of all 1s, it passes the address tothe next layer for processing

Multicast Addresses

A system uses a multicast address to send a message to a subset of

systems on the local Ethernet In Ethernet multicast addressing, the value

of the first three octets determines if the address is multicast The lastthree octets determine the specific multicast’s group identity

Trang 8

Setting a Local Ethernet Address

In today’s network environments, many systems have multiple interfaces,often on the same subnet or collision domain Because an Ethernet

address targets systems, each interface on the same network or subnet ona

multi-interface system must have a unique Ethernet address Sun networkadapters have local Ethernet addresses encoded in their programmableread-only memories (PROMs)

To view the current host-based Ethernet address, perform the command attheokprompt:

ok banner

Sun Ultra 5/10 UPA/PCI (UltraSPARC-IIi 360MHz), No Keyboard

OpenBoot 3.19, 128 MB (50 ns) memory installed, Serial #12153379

Ethernet address 8:0:20:b9:72:23, Host ID: 80b97223

port-based Ethernet addresses

To view the contents of the EEPROM for the definition of the

local-mac-address?variable, perform the command:

sys11# eeprom local-mac-address?

local-mac-address?=false

Trang 9

You can set the local MAC address to true, which enables networkdrivers to use their own port-based addresses after reboot and not thesystem default host-based addressing by performing the command:

sys11# eeprom local-mac-address?=true

Theifconfig ethercommand can also configure port-based addressing.This might be necessary if the interface card cannot supply its own uniqueEthernet address You can change the interface Ethernet address of

8:0:20:f0:ac:61from a globally assigned Ethernet address to a locallyassigned address of0a:0:20:f0:ac:61by changing the seventh bit to 1,and assigning a local unique number to the last 3 bytes

To change the Ethernet address, perform the command:

sys11# ifconfig hme1 ether 0a:0:20:f0:ac:61

sys11#

To verify a change in the Ethernet address, perform the command:

sys11# ifconfig hme1

hme1: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 index 2 inet 192.168.30.31 netmask ffffff00 broadcast 192.168.30.255

Trang 10

Ethernet-II Frame Analysis

The Ethernet-II frame is a single unit of data transported through theLAN It is a series of bits with a definite beginning and a definite end TheEthernet specification describes how bits are encoded on the network andhow hosts on the network detect the beginning and the end of a

transmission The IEEE established the standard for the Ethernet-II frame.Figure 3-3 shows the Ethernet-II frame format

Figure 3-3 Ethernet-II Frame

Note – There are two common Ethernet frame formats: the Ethernet-II

format and the logical link control (LLC) format The primary difference isthat in the Ethernet-II format, the fourth field is a type field, while in theLLC format, the fourth field is a frame length field In the TCP/IP

environments, the Ethernet-II frame format is typically used

1500Bytes)

CRC

32 Bits

Trang 11

The information in each frame is necessary to receive and transmit data.Table 3-1 shows a description of each frame field.

Ethernet Frame Encapsulation

Encapsulation is the inclusion of one data structure within another datastructure so that the first data structure is temporarily transparent Data ispassed from the Application layer down to the Hardware layer whenmoving to other nodes on the network Each layer attaches control tags,called headers, to the data The header information aids in proper

delivery at the Network Interface, Internet, and Transport layers

Encapsulation maintains the atomic structure of each layer in the TCP/IPmodel

Table 3-1 Ethernet-II Frames

Field Description

Preamble The 64-bit Ethernet preamble field, composed of 1s and 0s,

used for synchronization Interface synchronization helpsthe receiving network interfaces determine where theEthernet frame begins

D addr The Ethernet address of the destination host

S addr The Ethernet address of the source host

Type The type of data encapsulated in the Ethernet frame (for

example: IP, ARP, RARP, and IPv6)

Data Information used by the upper-layer protocols

CRC Cyclic redundancy check used for error detection The

value is calculated based on frame contents by both thesending and the receiving hosts If the two values are notequivalent, the frame is discarded

Trang 12

Figure 3-4 shows how each layer in the TCP/IP model encapsulates datawith control information specific to that layer.

Figure 3-4 Ethernet-II Frame Encapsulation

Ethernet Header

Application

Data Application

Data

Trang 13

Maximum Transfer Units

The maximum transfer unit (MTU) is the largest amount of data that can

be transferred across a physical network The Ethernet MTU is hardwarespecific For a physical Ethernet interface, the MTU is 1500 bytes, whilethe MTU is 8232 bytes for a loopback interface The loopback interface is apseudo device that communicate or loops back to the host itself

Figure 3-5 shows how application data is broken down according to themaximum frame size across the LAN

Figure 3-5 Transportation of Data Across the Ethernet

Network Interface Layer 1500-byte Payload

Hardware Layer

Trang 14

Ethernet Frame Errors

Ethernet frames can be significantly damaged when they traverse anetwork When a host receives a frame, the Ethernet interface performsintegrity checking to verify Ethernet frame validity Table 3-2 shows some

of these error conditions

Table 3-2 Error Conditions Error Definition

Runts Packets that are less than 64 bytes are too short and are

discarded Runts are usually caused by collisions These can

be formed by poor wiring and electrical interference

Jabbers Packets that are greater than 1500 bytes (MTU) are too long

and are discarded These indicate that a device has electricalproblems

Long A frame that is between 1518 and 6000 bytes long, often

because of faulty hardware or software on the sendingsystem

Giant A frame that is more than 6000 bytes long, often because of

faulty hardware or software on the sending system

Bad CRC If the received packet fails the CRC, the packet is corrupted

and discarded This is also known as a frame check sequence(FCS) error

Trang 15

Using Network Utilities

The Solaris 9 OE includes many different utilities to help you configureand troubleshoot the system’s network interfaces

Using the snoop Utility

The superuser runs the snooputility to capture network packets and todisplay their contents to the screen Alternatively, you can capture packets

to a file as they are received, decreasing packet loss under high-trafficconditions You can use the snooputility to display the contents of thefile The snooputility displays packet data in one of three forms:

● Summary – This is the output mode when the-vor-Voptions arenot used on the command line

Only data that pertains to the highest-level protocol header isdisplayed For example, an NFS packet only displays NFSinformation The underlying remote procedure call (RPC), UDP, IP,and Ethernet frame header information are not displayed

To examine only broadcast frames on theqfe0interface using thesummary mode, enter the following:

sys11# snoop -d qfe0 broadcast

Using device /dev/qfe (promiscuous mode)

192.168.1.12 -> (broadcast) ARP C Who is 192.168.1.3, sys13 ?

sys11 -> 192.168.1.255 RIP R (2 destinations)

sys12 -> (broadcast) ARP C Who is 192.168.1.2, sys12 ?

sys12 -> (broadcast) ARP C Who is 192.168.1.1, sys11 ?

● Verbose – Invoked when the-voption is used on the command line.Multiple lines of output display for every protocol header in thenetwork packet

Trang 16

To examine only broadcast packets on theqfe0interface using theverbose mode, enter the following:

sys11# snoop -v -d qfe0 broadcast

Using device /dev/qfe (promiscuous mode)

ETHER: Ether Header

-ETHER:

ETHER: Packet 8 arrived at 13:18:44.01

ETHER: Packet size = 60 bytes

ETHER: Destination = ff:ff:ff:ff:ff:ff, (broadcast)

ETHER: Source = 8:0:20:90:b5:c7, Sun

ETHER: Ethertype = 0806 (ARP)

ETHER:

ARP: ARP/RARP Frame

-ARP:

ARP: Hardware type = 1

ARP: Protocol type = 0800 (IP)

ARP: Length of hardware address = 6 bytes

ARP: Length of protocol address = 4 bytes

ARP: Opcode 1 (ARP Request)

ARP: Sender's hardware address = 8:0:20:90:b5:c7

ARP: Sender's protocol address = 192.168.1.2, sys12

ARP: Target hardware address = ?

ARP: Target protocol address = 192.168.1.1, sys11

interface, perform the command:

sys11# snoop -d qfe0 -V 192.168.1.2

Using the /dev/qfe device (promiscuous mode)

sys12 -> sys11 ETHER Type=0800 (IP), size = 98 bytes

sys12 -> sys11 IP D=192.168.1.1 S=192.168.1.2 LEN=84, ID=48009, TOS=0x0, TTL=255 sys12 -> sys11 ICMP Echo request (ID: 345 Sequence number: 0)

sys11 -> sys12 ETHER Type=0800 (IP), size = 98 bytes

sys11 -> sys12 IP D=192.168.1.2 S=192.168.1.1 LEN=84, ID=45375, TOS=0x0, TTL=255 sys11 -> sys12 ICMP Echo reply (ID: 345 Sequence number: 0)

Trang 17

To capture this information to a file, perform the command:

sys11# snoop -d qfe0 -o /tmp/snooper 192.168.1.2

Using device /dev/qfe (promiscuous mode)

2 ^C

sys11#

To capture broadcast traffic on theqfe0interface, and store it in the

/tmp/snooperfile, perform the command:

# snoop -d qfe0 -o /tmp/snooper broadcast

While the snooputility is capturing information, a record counterdisplays the number of recorded packets You finish the capture bypressing Control-C The actual output of the snoopcommand is in adata-compressed format, and can only be read with the snoop -i

command

To read this format, perform the command:

sys11# snoop -i /tmp/snooper -V

1 0.00000 sys12 -> sys11 ETHER Type=0800 (IP), size = 98 bytes

1 0.00000 sys12 -> sys11 IP D=192.168.1.1 S=192.168.1.2 LEN=84, ID=48010, TOS=0x0, TTL=255

1 0.00000 sys12 -> sys11 ICMP Echo request (ID: 346 Sequence number: 0)

2 0.00010 sys11 -> sys12 ETHER Type=0800 (IP), size = 98 bytes

2 0.00010 sys11 -> sys12 IP D=192.168.1.2 S=192.168.1.1 LEN=84, ID=45376, TOS=0x0, TTL=255

2 0.00010 sys11 -> sys12 ICMP Echo reply (ID: 346 Sequence number: 0)

sys11#

To filter out specific protocols or portions of the network trace, pipe the

snoopcommand through the egrepcommand

For example, the egrep -iv 'nfs|ack|contin|ftp|ip'commandignores case (-i) and prints all lines except (-v) lines that contain thepatterns nfs,ack,contin,ftp, and ip

sys11# snoop -i /tmp/snooper -V | egrep -iv 'nfs|ack|contin|ftp|ip'

Trang 18

Using the netstat Utility

The netstatutility includes many options and is useful as a networktroubleshooting tool

To display the current usage of the Ethernet interfaces, use thenetstat

command with the -ioption:

sys11# netstat -i

Name Mtu Net/Dest Address Ipkts Ierrs Opkts Oerrs Collis Queue

lo0 8232 loopback localhost 83505 0 83505 0 0 0

hme0 1500 sys11ext sys11ext 21775 0 53541 0 0 0

qfe0 1500 sys11 sys11 9842 0 49105 0 0 0

sys11#

Table 3-3 shows the descriptions of the fields of thenetstatcommand

Table 3-3 ThenetstatField Descriptions

Name The name of the device (interface)

Net/Dest The network number The number can be resolved to a

name in the/etc/inet/networks file

Address The IP address for that interface The address can be

resolved to a name in the/etc/inet/hosts file

Ipkts/Ierrs Input packets and errors

Opkts/Oerrs Output packets and errors

Collis The number of collisions on this interface

Queue The number of packets that are waiting for

transmission

Trang 19

To display protocol-related statistics, use thenetstatcommand with the

Using the ndd Utility

You use the nddutility to examine and set many parameters associatedwith networking

To list the parameters for the hmedriver, perform the command:

# ndd /dev/hme \?

? (read only)

transceiver_inuse (read only)

link_status (read only)

link_speed (read only)

link_mode (read only)

ipg1 (read and write)

instance (read and write)

lance_mode (read and write)

ipg0 (read and write)

sys11#

Trang 20

The \?function prevents the shell from interpreting?as a specialcharacter Using the \?function lists all parameters for the driver andindicates whether the parameter is read-only or read/write You can readthe current parameter value or status information for the parameters thatare marked with at least a read; however, you may only change a value if

it is marked as read and write

You can adjust most parameters accessible through thenddutility withoutrebooting the system

The following example shows how to use thenddutility to examine thevalue of the link_speedparameter for thehme0interface Becausemultiplehmeinterfaces might exist, use the nddutility first to set the

instanceparameter Theinstanceparameter determines which hme

interface is addressed by the subsequentnddcommands

To set the instance to 0, perform the command:

# ndd -set /dev/hme instance 0

The output of1indicates that thehme0interface is currently running at

100 Mbps, and a value of 0 indicates that thehme0interface is running at

10 Mbps Thenddparameters are also available for other network devicesand protocols For example, to see which parameters are available forother drivers, perform the commands:

Trang 21

There are several trade-offs involved in setting driver parameters Becausethe Solaris 9 OE is preconfigured, changing most driver parameters

requires you to change the Solaris 9 OE configuration The default settingsare optimal for most situations Sun Microsystems does not encouragemaking parameter changes, because adjusting parameters can affectnormal system operation Sun might also change the names of parameters

in future versions of the Solaris 9 OE

You can set device driver parameters in two ways: by using the ndd

command or by using a startup shell script

● Use the nddutility to set parameters that are valid until you rebootthe system A good way to test parameter settings is by using the

nddutility interactively

● You can also use a startup shell script to set the nddparametersacross system reboots Include the appropriatenddcommand in asystem startup script, such as the/etc/init.d/inetinitfile or in acustomized script in the/etc/rc2.ddirectory Make a backup copy

of any scripts before you add thenddcommand

Trang 22

Exercise: Reviewing Ethernet Interfaces

In this exercise, you review many Ethernet concepts

Preparation

Refer to the lecture notes as necessary to perform the tasks listed

Tasks

Perform the following steps:

1 Match the terms to their definition

_ MTU a A general term that describes the unit

of data sent across a packet-switchingnetwork

_ Unicast b The process of passing data from layer

to layer in the protocol stack andadding header information to the data

at each layer _ Preamble c The field in the Ethernet frame that

describes the type of data beingcarried in the frame

_ Encapsulation d An address format that reaches a

specific host _ Packet e The field in an Ethernet frame used for

synchronization purposes _ Frame f The maximum number of bytes that

are contained in the payload section in

a Network Interface layer frame _ Type field g The unit of data sent from the

Ethernet interface to the Hardwarelayer

Trang 23

2 Open a terminal window, and perform the command:

4 In one terminal window, run thesnooputility on the defaultinterface to capture only broadcast frames Let this command run forthe next step

5 Using another terminal window, log in to another host on yoursubnet, and issue therupcommand

a Does the rupcommand issue broadcast frames?

Trang 24

Now you use different options of thesnooputility to provide differentamounts of output.

6 Stop thesnooputility that is currently running, and restart thesnoop

utility in the verbose mode Capture only the broadcast frames.Write the command that you use:

_

7 In the terminal window logged in to the remote host, issue therup

command again Observe the format of the output from the snoop

utility running in the verbose mode

8 Stop the snooputility, and run thesnooputility in the summaryverbose mode, capturing only broadcast frames

Write the command that you use:

_

9 In the terminal window that is logged in to the remote host, issue the

rupcommand again How do the two formats differ?

_

10 Log off the remote host, and quit all instances of thesnoop

command that you are running

Note – While you might not understand everything that you see in this

section of the exercise, you should at least become familiar with the ndd

command syntax, options, and output format The results of the exercisevary, depending on the type of network interface in the system

Trang 25

In this part of the exercise, you manipulate a specific interface on yoursystem.

11 Use the appropriate argument with thenddutility to make sure thatany instance information retrieved is for the primary network

interface

Write the command that you use:

_

12 Use the nddutility to determine the value of thelink_status

parameter of the primary network interface on your system A status

of0indicates that the interface is down A status of1indicates thatthe interface is up

Write the command that you use:

_

13 What command would you use to have the nddutility set yoursystem’slink_statusparameter to0?

_

14 Use the nddutility to determine the read/write attributes ofndd

parameters for your interface driver For example, if your system’sinterface is anhme0interface, use/dev/hmeas the parameter

Write the command that you use:

_

Do you expect your command from Step 13 to work if you entered it

at the command line as therootuser? Why?

Trang 26

Exercise Summary

?

!

Discussion – Take a few minutes to discuss the experiences, issues, or

discoveries that you had during the lab exercises

● Experiences

● Interpretations

● Conclusions

● Applications

Trang 27

Exercise Solutions

1 Match the terms to their definition

2 Open a terminal window, and perform the command:

f MTU a A general term that describes the unit

of data sent across a packet-switchingnetwork

d Unicast b The process of passing data from layer

to layer in the protocol stack andadding header information to the data

at each layer

e Preamble c The field in the Ethernet frame that

describes the type of data beingcarried in the frame

b Encapsulation d An address format that reaches a

specific host

a Packet e The field in an Ethernet frame used for

synchronization purposes

g Frame f The maximum number of bytes that

are contained in the payload section in

a Network Interface layer frame

c Type field g The unit of data sent from the

Ethernet interface to the Hardwarelayer

Trang 28

c Whichsnoopoption displays the most verbose output?

4 In one terminal window, run thesnooputility on the defaultinterface to capture only broadcast frames Let this command run forthe next step

# snoop broadcast

5 Using another terminal window, log in to another host on yoursubnet, and issue therupcommand

a Does therupcommand issue broadcast frames?

Yes, you will observe theruputility sending remote status (RSTAT) requests.

b Do you see the replies to therupcommand? Why?

No status replies are seen because the replies are sent to the host using

a unicast address.

c Do you see hosts in other subnets? Why?

No, because broadcast traffic is LAN specific.

Now you use different options of thesnooputility to provide differentamounts of output

6 Stop thesnooputility that is currently running, and restart thesnoop

utility in the verbose mode Capture only the broadcast frames

# snoop -v broadcast

7 In the terminal window logged in to the remote host, issue therup

command again Observe the format of the output from the snoop

utility running in the verbose mode

Trang 29

8 Stop the snooputility, and run thesnooputility in the summaryverbose mode, capturing only broadcast frames.

# snoop -V broadcast

9 In the terminal window that is logged in to the remote host, issue the

rupcommand again How do the two formats differ?

-vis verbose mode It prints packet headers in great detail This display consumes many lines per packet and should be used only on selected packets.

-Vis summary verbose mode This is halfway between the summary mode and verbose mode in degree of verbosity It displays a single summary line for each protocol layer in the packet instead of displaying multiple lines from each layer of encapsulation.

10 Log off the remote host, and quit all instances of the snoop

command that you are running

Note – While you might not understand everything that you see in this

section of the exercise, you should at least become familiar with the ndd

command syntax, options, and output format The results of the exercisevary, depending on the type of network interface in the system

In this part of the exercise, you manipulate a specific interface on yoursystem

11 Use the appropriate argument of thenddutility to make sure thatany instance information retrieved is for the primary networkinterface

# ndd -set /dev/hme instance 0

12 Use the nddutility to determine the value of thelink_status

parameter of the primary network interface on your system A status

of0indicates that the interface is down A status of1indicates thatthe interface is up

Trang 30

14 Use thenddutility to determine the read/write attributes ofndd

parameters for your interface driver For example, if your system’sinterface is an hme0interface, use/dev/hmeas the parameter

# ndd /dev/ device_of_interest \?

Do you expect your command from Step 13 to work if you entered it

at the command line as the rootuser? Why?

The command fails because thelink_statusparameter is read-only.

Ngày đăng: 12/08/2014, 22:21

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN