Ill take a look again to see if I can divine the DLT
type being reported.
Re: traffic stats -- yes as far as buckets: 1504-2500
3500-6500 and 6500+ would be good breaks for me --
though my application may not be the best to use as
the example. Anyone else have thoughts?
On another note related to my use of the tool -- I am
adding a custom non-IP protocol (the one generating
the jumbos) for tracking and stats. I think I have it
all hacked in but am failing miserably with graph.c --
I am getting complaints e.g.):
graph.c: In function 'hostTrafficDistrib':
graph.c:846: warning: declaration of `theHost' shadows
a parameter
graph.c:590: warning: shadow declaration is here
graph.c:946: warning: declaration of `dataSent'
shadows a parameter
graph.c:590: warning: shadow declaration is here
graph.c:846: warning: no previous prototype for
`hostFragmentDistrib'
graph.c:846: warning: declaration of
`hostFragmentDistrib' shadows a global declaration
etc. ad nauseum. Per my previous post my C is not so
good. I used stp as the sample non-IP proto to add in
support for my ether proto (0x63).
Any ideas what I am doing wrong?
Thanks!
-wP
--- Burton Strauss <[EMAIL PROTECTED]> wrote:
> The basic DLT message is INFO, so it should appear
> at -t 3 or higher:
>
> traceEvent(CONST_TRACE_INFO, "DLT: Device %d [%s]
> is %d, mtu %d, header
> %d",
> deviceId,
> myGlobals.device[deviceId].name,
> myGlobals.device[deviceId].datalink,
> myGlobals.device[deviceId].mtuSize,
>
> myGlobals.device[deviceId].headerSize);
>
> $ grep DLT: /var/log/ntopdevel
> Apr 8 11:39:46 tigger devel[3162]: DLT: Device 0
> [eth1] is 1, mtu 1514,
> header 14
> Apr 8 11:39:46 tigger devel[3162]: DLT: Device 1
> [eth2] is 1, mtu 1514,
> header 14
>
>
> The larger value won't hurt anything that I can see.
>
>
> Except for dns sniffing (and most servers won't be
> sending jumbos), ntop
> rarely goes in more than a handful of bytes, even in
> the deep packet
> inspection routines.
>
> The code in pbuf.c just reports it (if you have set
> the option) and then
> truncates the packet:
>
> (length > myGlobals.device[deviceId].mtuSize) )
> {
> /* Sanity check */
>
> if(myGlobals.runningPref.enableSuspiciousPacketDump)
> {
> traceEvent(CONST_TRACE_WARNING, "Packet # %u
> too long (len = %u)!",
> (unsigned
> int)myGlobals.device[deviceId].ethernetPkts.value,
> (unsigned int)length);
> dumpSuspiciousPacket(actualDeviceId);
> }
>
> /* Fix below courtesy of Andreas Pfaller
> <[EMAIL PROTECTED]> */
> length = myGlobals.device[deviceId].mtuSize;
>
>
incrementTrafficCounter(&myGlobals.device[actualDeviceId].rcvdPktStats.tooLo
> ng, 1);
> }
>
>
>
> Obviously part of the problem is we can't tell if
> the NIC we are using to
> monitor will accept jumbo frames. We could simply
> reset to 9K if we see one
> over 1500... (1504 for VLANs). Or is it 64K???
> That's one issue. Another
> is whether we can figure out from the interface what
> MTU for the device is -
> some skulking seems to show that the call SIOCGIFMTU
> isn't always
> available...
>
> And it might be nice to add a few more buckets to
> trafficStats.html to
> report on Jumbos. What would be good break points?
>
> -----Burton
>
__________________________________
Do you Yahoo!?
Yahoo! Personals - Better first dates. More second dates.
http://personals.yahoo.com
_______________________________________________
Ntop-dev mailing list
[email protected]
http://listgateway.unipi.it/mailman/listinfo/ntop-dev