Sponsored Content
Full Discussion: How many hosts per subnet
Special Forums IP Networking How many hosts per subnet Post 302458669 by Corona688 on Friday 1st of October 2010 11:25:59 AM
Old 10-01-2010
Quote:
Originally Posted by Aia
Understandable! However I was under the impression that the hosts of a segment would be constantly broadcasting among them even if not much is actually "user generated traffic". Do I have the wrong impression?
Whether their traffic is all or even mostly broadcast depends entirely on what they're doing. If something's spewing broadcast video or disk images etc. to the network you'll obviously have a lot of broadcast. If you've got a hundred people running web browsers the traffic will be almost all non-broadcast. (Yes, there will be little bits of broadcast all the time, ARP requests and DHCP traffic and service announcements and all that, but these shouldn't amount to much.) Lacking my crystal ball, I really can't say whether you can put that many hosts on a subnet for what they're doing.
Quote:
Nevertheless, I wish to not miss the opportunity to ask you: by what rules could I come to the conclusion that the network is heavy on traffic?
The amount of available bandwidth versus the amount of used bandwidth, both between hosts and upstream/downstream.

Last edited by Corona688; 10-01-2010 at 12:31 PM..
This User Gave Thanks to Corona688 For This Post:
 

10 More Discussions You Might Find Interesting

1. IP Networking

Subnet mask

Hi, I have about 30 computers for users with subnet mask x.x.x.0, and 25 computers for workers with s.m. x.x.x.128. My server has a s.m. x.x.x.128 so with workers computers I can see my server and all the computers in that s.m., but I can't see the server from the users computers and I need to see... (7 Replies)
Discussion started by: Z0DiaC
7 Replies

2. UNIX for Dummies Questions & Answers

hosts.allow & hosts.deny

Hi! Im trying to use host.allow & host.deny to resrtic access to my sun machine, but it doesnt seem to work... I want to allow full access from certain IPīs (ssh,http,ftp,etc...) but deny all kind of conections from outsideworld, the way that im doing that is: hosts.allow ALL:127.0.0.1... (2 Replies)
Discussion started by: Sorrento
2 Replies

3. Shell Programming and Scripting

ip address and subnet comparing

Hmmm, tough question for me, so I put it here. I am trying to use shell script or mysql to do the following thing. tableA, in which all are single ips. sip ------- 1.2.3.4 8.8.8.8 123.3.32.1 .... and tableB, a list of our group subnets. subnet --------- 1.0.0.0/8 20.0.1.0/24 (2 Replies)
Discussion started by: fedora
2 Replies

4. UNIX for Dummies Questions & Answers

Hosts.allow and hosts.deny

Hello everyone, This is my first posts and I did search for a questions but did not find a question that answered my question unless of course I overlooked it. I'm running Solaris 8. I use ssh for the users but I have a user called "chatterbox" that uses telnet but I need for chatterbox to... (1 Reply)
Discussion started by: huddlestonsnk
1 Replies

5. IP Networking

Migrating existing Subnet to a new subnet and changing ip addresses in UNIX

Hi, My project needs to migrate the existing Subnet (255.255.255.0) to a new subnet and change the ipaddresses (currently C class). How can I do that. I need some information. John (0 Replies)
Discussion started by: johnmarsh
0 Replies

6. IP Networking

How do I figure out the subnet?

Hi, How do I get subnet from this: 10.252.0.138/25 Tnx (2 Replies)
Discussion started by: mehrdad68
2 Replies

7. IP Networking

2 ip from one subnet my isp

Hi. my english is not so good. sorry. i have some problem. My isp give me second ip from subnet. One network is working, but secong don't. fxp0 - my network dc0 - network isp (that working) re0 - network isp (don't working) i try use ng_one2many, but it's don't working ngctl mkpeer... (0 Replies)
Discussion started by: kil
0 Replies

8. Linux

Ping check failed from Nagios master server on windows hosts in the same subnet

Hello All, We have added a windows host and its config files to Nagios master server and wanted to do a ping check alone at the moment however, the nagios master server identifies the host in its GUI and immediately disappears can anyone let me know the right approach to this one, We want to... (2 Replies)
Discussion started by: lovesaikrishna
2 Replies

9. AIX

aix tcp wrappers hosts.allow hosts.deny?

hi all just installed the netsec.options.tcpwrapper from expansion pack, which used to be a rpm, for my aix 6.1 test box. it is so unpredictable. i set up the hosts.deny as suggested for all and allow the sshd for specific ip addresses/hostnames. the tcpdchk says the hosts allowed and... (0 Replies)
Discussion started by: wf201626
0 Replies

10. Solaris

How to copy a tar file on a series of remote hosts and untar it on those hosts?

Am trying to copy a tar file onto a series of remote hosts and untar it at the destination. Need to do this without having to do multiple ssh. Actions to perform within a single ssh session via shell script - copy a file - untar at destination (remote host) OS : Linux RHEL6 (3 Replies)
Discussion started by: sankasu
3 Replies
rwhod(8c)																 rwhod(8c)

Name
       rwhod - system status server

Syntax
       /etc/rwhod [ -b ] [ -l ]

Description
       The  command  is the server which maintains the database used by the and programs.  Its operation is predicated on the ability to broadcast
       messages on a network.

       The command operates as both a producer and consumer of status information.  As a producer of information it periodically queries the state
       of the system and constructs status messages which are broadcast on a network.

       As a consumer of information, listens for the status messages of the other servers, validating them, then recording them in a collection of
       files located in the directory

       The server transmits and receives messages at the port indicated in the rwho service specification. For more information, see The  messages
       sent and received, take the following form:
       struct  outmp {
	       char    out_line[8];	  /* tty name */
	       char    out_name[8];	  /* user id */
	       long    out_time;	  /* time on */
       };
       struct  whod {
	       char    wd_vers;
	       char    wd_type;
	       char    wd_fill[2];
	       int     wd_sendtime;
	       int     wd_recvtime;
	       char    wd_hostname[32];
	       int     wd_loadav[3];
	       int     wd_boottime;
	       struct  whoent {
		       struct  outmp we_utmp;
		       int     we_idle;
	       } wd_we[1024 / sizeof (struct whoent)];
       };
       All  fields  are converted to network byte order prior to transmission.	The load averages are calculated by the program and represent load
       averages over the 5, 10, and 15 minute intervals prior to a server's transmission.  They are multiplied by 100  for  representation  as	an
       integer.   The  host name included is the name returned by the system call, with any trailing domain name omitted.  The array at the end of
       the message contains information about the users logged in to the sending machine.  This information includes the contents of the entry for
       each active terminal line and a value indicating the time since a character was last received on the terminal line.

       Messages  received by the server are discarded unless they originated at a server's port.  In addition, if the host's name, as specified in
       the message, contains any unprintable ASCII characters, the message is discarded.  Valid messages received by are  placed  in  files  named
       whod.fIhostname in the directory These files contain only the most recent message in the format previously described.

       Status  messages are generated approximately once every 3 minutes.  The command performs an on every 30 minutes to guard against the possi-
       bility that this file is not the system image currently operating.

Options
       -b   Sets the broadcast only mode. Sends outgoing packets, but ignores incoming ones.

       -l   Sets the listen only mode. Collects incoming packets from the network, but does not broadcast data.

Restrictions
       Because the daemon sends its information in broadcast packets it generates a large amount of network traffic.  On large networks the  extra
       traffic	may  be  objectionable.   Therefore,  the  daemon is disabled by default.  To make use of the daemon for both the local and remote
       hosts, remove the comment symbols (#) from in front of the lines specifying in the file.

       If the daemon is not running on a remote machine, the machine may incorrectly appear to be down when you use the command to  determine  its
       status.	See the reference page for more information.

       If  a  system  has  more  than 40 users logged in at once, the number of users displayed by the and commands is incorrect.  Users who login
       after the fortieth user, will fail to appear in the output of the and commands. This is because the  maximum  size  limit  of  an  Ethernet
       packet is 1500 bytes, and the daemon must broadcast its information in a single packet.

See Also
       ruptime(1c), rwho(1c)

																	 rwhod(8c)
All times are GMT -4. The time now is 08:54 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy