Unix/Linux Go Back    

CentOS 7.0 - man page for packet.pkt (centos section 1)

Linux & Unix Commands - Search Man Pages
Man Page or Keyword Search:   man
Select Man Page Set:       apropos Keyword Search (sections above)

PACKET.PKT(1)				 packet.pkt 1.0.1			    PACKET.PKT(1)

       packet.pkt - Pkt module

       Provides the object for a packet and the string representation of the packet.  This object
       has an attribute for each of the layers in the  packet  so  each  layer	can  be  accessed
       directly  instead  of going through each layer. To access the nfs layer object you can use
       'x.nfs' instead of using 'x.ethernet.ip.tcp.rpc.nfs' which would very cumbersome  to  use.
       Also, since NFS can be used with either TCP or UDP it would be harder to to access the nfs
       object independently or the protocol.

       Packet object attributes:
	       record	= Record information (frame number, etc.)
	       ethernet = ETHERNET II (RFC 894) object
	       ip	= IPv4 object
	       tcp	= TCP object
	       rpc	= RPC object
	       nfs	= NFS object

   class Pkt(baseobj.BaseObj)
       Packet object

	   from packet.pkt import Pkt

	   x = Pkt()

       Methods defined here:

	      String representation of object

	      The representation depends on the verbose level set by debug_repr().  If set  to	0
	      the  generic  object representation is returned.	If set to 1 the representation of
	      is condensed into a single line.	It contains, the frame number, IP source and des-
	      tination and/or the last layer:
		  '1 0.386615 -> TCP 2049 -> 708, seq: 3395733180, ack:
	      3294169773, ACK,SYN'
		  '5 0.530957 00:0c:29:54:09:ef -> ff:ff:ff:ff:ff:ff, type: 0x806'
		  '19	0.434370   ->   NFS   v4	 COMPOUND4   call

	      If set to 2 the representation of the object is a line for each layer:
		       RECORD:	 frame 19 @ 0.434370 secs, 238 bytes on wire, 238 bytes captured
		       ETHERNET: 00:0c:29:54:09:ef -> e4:ce:8f:58:9f:f4, type: 0x800(IPv4)
		       IP: ->, protocol: 6(TCP), len: 224
		       TCP:	 src port 708 -> dst port 2049, seq: 3294170673, ack: 3395734137,
	      len: 172, flags: ACK,PSH
		       RPC:	  CALL(0),  program:  100003,  version:  4,  procedure:  1,  xid:
		       NFS:		COMPOUND4args(tag='',	     minorversion=1,	   argar-
	      ray=[nfs_argop4(argop=OP_SEQUENCE, ...), ...])


       No known bugs.

       Jorge Mora (mora@netapp.com)

NFStest 1.0.2				  10 April 2013 			    PACKET.PKT(1)
Unix & Linux Commands & Man Pages : ©2000 - 2018 Unix and Linux Forums

All times are GMT -4. The time now is 10:14 PM.