Hi,
Explaining you,following the first trace example you provided:
"r 0.010709017 _66_ RTR --- 0 gpsr 37 [0 ffffffff 8 800] ------- [8:255
-1:255 32 0]"
Field 1:- [s|r|D]: s -- sent, r -- received, D -- dropped
Field 2:- The time when the action happened
Field 3:- The node where the action (as specified in field 1) took place .
Field 4:- LAYERS:
AGT -- application,
RTR -- routing,
LL -- link layer (ARP is done here)
IFQ -- outgoing packet queue (between link and mac
layer)
MAC -- mac,
PHY -- physical
Field 6:- Sequence number of the packet
Field 5:- The packet type:
gpsr--Greedy Perimeter Stateless Routing
cbr -- CBR data stream packet
DSR -- DSR routing packet (control packet generated by
routing)
RTS -- RTS packet generated by MAC 802.11
ARP -- link layer ARP packet
Field 7:- Size in bytes
Field 8 and 9:-
[a b c d]: a -- the packet duration in mac layer header
b -- the mac address of destination
c -- the mac address of source
d -- the mac type of the packet body
flags:
[......]: [
source node ip : port_number
destination node ip (-1 means broadcast) :
port_number
ip header ttl
ip of next hop (0 means node 0 or broadcast)
]
Hope this will help,
Regards,
Vineet
Biswa Mohan Acharya wrote:
> Dear Friends
> I have a large trace file of which few lines I am giving here. Plz let
> me know what are the fields, bcz as per the manual it is some thing
> different.
> Thanks.
> Biswa
>
> r 0.010709017 _66_ RTR --- 0 gpsr 37 [0 ffffffff 8 800] -------
> [8:255 -1:255 32 0]
> r 0.010709019 _59_ RTR --- 0 gpsr 37 [0 ffffffff 8 800] -------
> [8:255 -1:255 32 0]
> s 0.018029165 _32_ RTR --- 1 gpsr 37 [0 0 0 0] ------- [32:255 -1:255 32 0]
> r 0.019449172 _31_ RTR --- 1 gpsr 37 [0 ffffffff 20 800] -------
> [32:255 -1:255 32 0]
> r 0.019449192 _45_ RTR --- 1 gpsr 37 [0 ffffffff 20 800] -------
> [32:255 -1:255 32 0]
>
>
**************************************************************************************************
E-mail Confidentiality Notice and Disclaimer.
This e-mail and any files transmitted with it are confidential and are intended
solely for the use
of the individual or entity to which they are addressed. Access to this e-mail
by anyone else is
unauthorised. If you are not the intended recipient, any disclosure, copying,
distribution or any
action taken or omitted to be taken in reliance on it, is prohibited. E-mail
messages are not
necessarily secure. Hitachi does not accept responsibility for any changes made
to this message
after it was sent.
Hitachi checks outgoing e-mail messages for the presence of computer viruses.
**************************************************************************************************