10-01-2010
Quote:
Understandable! However I was under the impression that the hosts of a segment would be constantly broadcasting among them even if not much is actually "user generated traffic". Do I have the wrong impression?
Whether their traffic is all or even mostly broadcast depends
entirely on what they're doing. If something's spewing broadcast video or disk images etc. to the network you'll obviously have a lot of broadcast. If you've got a hundred people running web browsers the traffic will be almost all non-broadcast. (Yes, there will be
little bits of broadcast all the time, ARP requests and DHCP traffic and service announcements and all that, but these shouldn't amount to much.) Lacking my crystal ball, I really can't say whether you can put that many hosts on a subnet for what they're doing.
Quote:
Nevertheless, I wish to not miss the opportunity to ask you: by what rules could I come to the conclusion that the network is heavy on traffic?
The amount of available bandwidth versus the amount of used bandwidth, both between hosts and upstream/downstream.
Last edited by Corona688; 10-01-2010 at 12:31 PM..
This User Gave Thanks to Corona688 For This Post:
10 More Discussions You Might Find Interesting
1. IP Networking
Hi,
I have about 30 computers for users with subnet mask x.x.x.0, and 25 computers for workers with s.m. x.x.x.128. My server has a s.m. x.x.x.128 so with workers computers I can see my server and all the computers in that s.m., but I can't see the server from the users computers and I need to see... (7 Replies)
Discussion started by: Z0DiaC
7 Replies
2. UNIX for Dummies Questions & Answers
Hi!
Im trying to use host.allow & host.deny to resrtic access to my sun machine, but it doesnt seem to work... I want to allow full access from certain IPīs (ssh,http,ftp,etc...) but deny all kind of conections from outsideworld, the way that im doing that is:
hosts.allow
ALL:127.0.0.1... (2 Replies)
Discussion started by: Sorrento
2 Replies
3. Shell Programming and Scripting
Hmmm, tough question for me, so I put it here.
I am trying to use shell script or mysql to do the following thing.
tableA, in which all are single ips.
sip
-------
1.2.3.4
8.8.8.8
123.3.32.1
....
and tableB, a list of our group subnets.
subnet
---------
1.0.0.0/8
20.0.1.0/24 (2 Replies)
Discussion started by: fedora
2 Replies
4. UNIX for Dummies Questions & Answers
Hello everyone,
This is my first posts and I did search for a questions but did not find a question that answered my question unless of course I overlooked it.
I'm running Solaris 8. I use ssh for the users but I have a user called "chatterbox" that uses telnet but I need for chatterbox to... (1 Reply)
Discussion started by: huddlestonsnk
1 Replies
5. IP Networking
Hi,
My project needs to migrate the existing Subnet (255.255.255.0) to a new subnet and change the ipaddresses (currently C class). How can I do that. I need some information.
John (0 Replies)
Discussion started by: johnmarsh
0 Replies
6. IP Networking
Hi,
How do I get subnet from this:
10.252.0.138/25
Tnx (2 Replies)
Discussion started by: mehrdad68
2 Replies
7. IP Networking
Hi. my english is not so good. sorry.
i have some problem. My isp give me second ip from subnet. One network is working, but secong don't.
fxp0 - my network
dc0 - network isp (that working)
re0 - network isp (don't working)
i try use ng_one2many, but it's don't working
ngctl mkpeer... (0 Replies)
Discussion started by: kil
0 Replies
8. Linux
Hello All,
We have added a windows host and its config files to Nagios master server and wanted to do a ping check alone at the moment however, the nagios master server identifies the host in its GUI and immediately disappears can anyone let me know the right approach to this one, We want to... (2 Replies)
Discussion started by: lovesaikrishna
2 Replies
9. AIX
hi all
just installed the netsec.options.tcpwrapper from expansion pack, which used to be a rpm, for my aix 6.1 test box.
it is so unpredictable. i set up the hosts.deny as suggested for all and allow the sshd for specific ip addresses/hostnames.
the tcpdchk says the hosts allowed and... (0 Replies)
Discussion started by: wf201626
0 Replies
10. Solaris
Am trying to copy a tar file onto a series of remote hosts and untar it at the destination. Need to do this without having to do multiple ssh.
Actions to perform within a single ssh session via shell script
- copy a file
- untar at destination (remote host)
OS : Linux RHEL6 (3 Replies)
Discussion started by: sankasu
3 Replies
rwhod(8c) rwhod(8c)
Name
rwhod - system status server
Syntax
/etc/rwhod [ -b ] [ -l ]
Description
The command is the server which maintains the database used by the and programs. Its operation is predicated on the ability to broadcast
messages on a network.
The command operates as both a producer and consumer of status information. As a producer of information it periodically queries the state
of the system and constructs status messages which are broadcast on a network.
As a consumer of information, listens for the status messages of the other servers, validating them, then recording them in a collection of
files located in the directory
The server transmits and receives messages at the port indicated in the rwho service specification. For more information, see The messages
sent and received, take the following form:
struct outmp {
char out_line[8]; /* tty name */
char out_name[8]; /* user id */
long out_time; /* time on */
};
struct whod {
char wd_vers;
char wd_type;
char wd_fill[2];
int wd_sendtime;
int wd_recvtime;
char wd_hostname[32];
int wd_loadav[3];
int wd_boottime;
struct whoent {
struct outmp we_utmp;
int we_idle;
} wd_we[1024 / sizeof (struct whoent)];
};
All fields are converted to network byte order prior to transmission. The load averages are calculated by the program and represent load
averages over the 5, 10, and 15 minute intervals prior to a server's transmission. They are multiplied by 100 for representation as an
integer. The host name included is the name returned by the system call, with any trailing domain name omitted. The array at the end of
the message contains information about the users logged in to the sending machine. This information includes the contents of the entry for
each active terminal line and a value indicating the time since a character was last received on the terminal line.
Messages received by the server are discarded unless they originated at a server's port. In addition, if the host's name, as specified in
the message, contains any unprintable ASCII characters, the message is discarded. Valid messages received by are placed in files named
whod.fIhostname in the directory These files contain only the most recent message in the format previously described.
Status messages are generated approximately once every 3 minutes. The command performs an on every 30 minutes to guard against the possi-
bility that this file is not the system image currently operating.
Options
-b Sets the broadcast only mode. Sends outgoing packets, but ignores incoming ones.
-l Sets the listen only mode. Collects incoming packets from the network, but does not broadcast data.
Restrictions
Because the daemon sends its information in broadcast packets it generates a large amount of network traffic. On large networks the extra
traffic may be objectionable. Therefore, the daemon is disabled by default. To make use of the daemon for both the local and remote
hosts, remove the comment symbols (#) from in front of the lines specifying in the file.
If the daemon is not running on a remote machine, the machine may incorrectly appear to be down when you use the command to determine its
status. See the reference page for more information.
If a system has more than 40 users logged in at once, the number of users displayed by the and commands is incorrect. Users who login
after the fortieth user, will fail to appear in the output of the and commands. This is because the maximum size limit of an Ethernet
packet is 1500 bytes, and the daemon must broadcast its information in a single packet.
See Also
ruptime(1c), rwho(1c)
rwhod(8c)