next up previous
Next: Peer credentials Up: Using VNET+ Previous: Using VNET+

RAW sockets

Unlike on standard Linux systems, where opening a RAW socket lets you see all network traffic, on PlanetLab, your visibility is limited to the traffic that belongs to you. The traffic that belongs to you includes the packets you transmit, the packets that are addressed to TCP and UDP ports that you have bound to, and the packets that are related to other traffic you have sent out. An example of the last case is an ICMP ECHO reply, which may be related to an ICMP ECHO request that you sent out. It is this association that allows the ``ping'' program to work in a slice.

In most cases, you do not have to do anything special to be able to be able to sniff these packets. The rule of thumb is that if you can receive a given packet using an ordinary protocol socket, then you should be able to see the packet using RAW sockets. There are however, two packet types that you can receive using RAW sockets that you cannot receive using ordinary sockets. These are:


next up previous
Next: Peer credentials Up: Using VNET+ Previous: Using VNET+
2008-09-17