2010-01-29 82 views
2

我正在使用RJ45連接本地網絡的嵌入式設備,以及系統發送ARP請求以瞭解網關的MAC地址時,根本沒有答案。爲什麼我沒有收到來自ARP請求的答覆?

如果我清除Windows上的arp表,Windows會詢問完全相同的ARP請求並獲得答案!

我嗅探了數據包,請求數據包內唯一的區別是數據包末尾的嵌入式設備上有一個0尾部,目標MAC地址是ff:ff:ff:ff:ff:ff其中窗口一個是00:00:00:00:00:00(維基百科似乎說它應該是ffffffffff)

我試圖更改mac地址,以防我的網關因arp垃圾郵件而禁止mac,但它不會什麼都不會改變。我也試着用DHCP IP和靜態IP,同樣的問題...

的Windows包:

 
Frame 1 (42 bytes on wire, 42 bytes captured) 
    Frame is marked: False 
    Arrival Time: Jan 29, 2010 12:05:49.775534000 
    Time delta from previous packet: -77.580549000 seconds 
    Time since reference or first frame: 6354.738379000 seconds 
    Frame Number: 1 
    Packet Length: 42 bytes 
    Capture Length: 42 bytes 
    Protocols in frame: eth:arp 
Ethernet II, Src: 00:1e:8c:b5:d0:00, Dst: ff:ff:ff:ff:ff:ff 
    Type: ARP (0x0806) 

Address Resolution Protocol (request) 
    Hardware type: Ethernet (0x0001) 
    Protocol type: IP (0x0800) 
    Hardware size: 6 
    Protocol size: 4 
    Opcode: request (0x0001) 
    Sender MAC address: 00:1e:8c:b5:d0:00 (00:1e:8c:b5:d0:00) 
    Sender IP address: 192.168.0.14 (192.168.0.14) 
    Target MAC address: 00:00:00:00:00:00 (00:00:00:00:00:00) 
    Target IP address: 192.168.0.1 (192.168.0.1) 

0000: FF FF FF FF FF FF 00 1E 8C B5 D0 00 08 06 00 01 ................ 
0010: 08 00 06 04 00 01 00 1E 8C B5 D0 00 C0 A8 00 0E ................ 
0020: 00 00 00 00 00 00 C0 A8 00 01     ..........  

嵌入式設備的分組:

 
Frame 1 (60 bytes on wire, 60 bytes captured) 
    Frame is marked: False 
    Arrival Time: Jan 29, 2010 12:07:04.257748000 
    Time delta from previous packet: -3.098335000 seconds 
    Time since reference or first frame: 6429.220593000 seconds 
    Frame Number: 1 
    Packet Length: 60 bytes 
    Capture Length: 60 bytes 
    Protocols in frame: eth:arp 
Ethernet II, Src: 00:04:a3:12:34:05, Dst: ff:ff:ff:ff:ff:ff 
    Type: ARP (0x0806) 
    Trailer: 000000000000000000000000000000000000 
Address Resolution Protocol (request) 
    Hardware type: Ethernet (0x0001) 
    Protocol type: IP (0x0800) 
    Hardware size: 6 
    Protocol size: 4 
    Opcode: request (0x0001) 
    Sender MAC address: 00:04:a3:12:34:05 (00:04:a3:12:34:05) 
    Sender IP address: 192.168.0.129 (192.168.0.129) 
    Target MAC address: ff:ff:ff:ff:ff:ff (ff:ff:ff:ff:ff:ff) 
    Target IP address: 192.168.0.1 (192.168.0.1) 

0000: FF FF FF FF FF FF 00 04 A3 12 34 05 08 06 00 01 ..........4..... 
0010: 08 00 06 04 00 01 00 04 A3 12 34 05 C0 A8 00 81 ..........4..... 
0020: FF FF FF FF FF FF C0 A8 00 01 00 00 00 00 00 00 ................ 
0030: 00 00 00 00 00 00 00 00 00 00 00 00    ............  
+0

你確定你的網絡不使用vlan或類似的東西(隧道?)?您的Windows數據包小於64字節,這是包含crc的以太網幀的最小長度。一些nics /驅動程序會剝離掉這樣的圖層,並且您不會在wireshark中看到它。 – nos 2010-01-29 12:07:09

+0

沒有vlan。這只是一個互聯網盒(freebox)與我的電腦,並在箱子上rj45(作爲路由器)作爲嵌入盒 由於我在同一臺PC上嗅探,也許wireshark(packetyzer事實上)刪除預告片。 – acemtp 2010-01-29 12:58:54

+0

我也有一些非常奇怪的行爲,如: - 當我的電腦ping圖片時,它工作2次,超時後(LED仍然每秒閃爍) - 當它試圖通過DHCP獲取IP時,它詢問N次(其中N是隨機的),從網關獲得答案,發送請求,接收ACK但不驗證DHCP並要求另一時間... 您有想法嗎? – acemtp 2010-01-29 16:58:59

回答

0

事實上,這是一個與TX問題極性反轉並導致這些問題。

我顛倒了極性,現在它完美的工作。

相關問題