了解arp请求tcpdump

当桥A上的一个docker集装箱A在桥B上ping一个docker集装箱B时,我注意到下面的tcp转储。

集装箱A:10.0.0.3 / 02:42:0:00:00:03

集装箱B:10.0.0.4 / 02:42:0:00:00:04

我不明白在下面的转储是为什么有一个ARP请求“谁拥有”与src和目标MAC地址? 而且我在任何地方都看不到arp-reply。 从哪里得到目标MAC地址? 集装箱B甚至不在集装箱A的同一座桥上

这是src容器eth0的eth0上的tcpdump。

root@nginx-rc-8sqxl:/# tcpdump -nei eth0 tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes 00:34:02.048458 02:42:0a:00:00:03 > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 42: Request who-has 10.0.0.4 tell 10.0.0.3, length 28 00:34:02.048799 02:42:0a:00:00:03 > 02:42:0a:00:00:04, ethertype ARP (0x0806), length 42: Request who-has 10.0.0.4 tell 10.0.0.3, length 28 00:34:03.044847 02:42:0a:00:00:03 > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 42: Request who-has 10.0.0.4 tell 10.0.0.3, length 28 00:34:03.044880 02:42:0a:00:00:03 > 02:42:0a:00:00:04, ethertype ARP (0x0806), length 42: Request who-has 10.0.0.4 tell 10.0.0.3, length 28 00:34:04.044852 02:42:0a:00:00:03 > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 42: Request who-has 10.0.0.4 tell 10.0.0.3, length 28 00:34:04.044886 02:42:0a:00:00:03 > 02:42:0a:00:00:04, ethertype ARP (0x0806), length 42: Request who-has 10.0.0.4 tell 10.0.0.3, length 28