Date: Tue, 04 Jan 2000 19:01:05 -0700 From: Wes Peters <wes@softweyr.com> To: Dan Davis <dand@eclipse.net> Cc: freebsd-net@freebsd.org Subject: Re: sniffing networks Message-ID: <3872A5E1.8EA69968@softweyr.com> References: <Pine.BSI.4.05L.10001041315010.6519-100000@mail.eclipse.net>
next in thread | previous in thread | raw e-mail | index | archive | help
Dan Davis wrote:
>
> > According to a friend who has done some network monitoring tests this
> > is not as perfect a solution as it sounds. He has observed packets
> > coming out ports other than the one where the destination system is
> > connected. Still, everyone agrees it's far better than the old
> > dozens-of-machines-in-a-single-collision-domain method.
>
> Perhaps that's because the switch uses a fixed-size table for matching
> which destinations should be routed to each ports that is smaller
> than the number of destinations/ports actually in use. Since the
> switch needs to operate so quickly, is it probable that such a
> switching table is actually in silicon or programmed into an FPGA?
Yes. The NetGear FS-105 uses a 1K hash on the destination MAC address;
this is typical for layer-2 switches.
--
"Where am I, and what am I doing in this handbasket?"
Wes Peters Softweyr LLC
wes@softweyr.com http://softweyr.com/
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-net" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3872A5E1.8EA69968>
