Date: Fri, 28 Sep 2001 08:32:18 +0200 From: Poul-Henning Kamp <phk@critter.freebsd.dk> To: "Louis A. Mamakos" <louie@TransSys.COM> Cc: Ronald G Minnich <rminnich@lanl.gov>, Andrew Gallatin <gallatin@cs.duke.edu>, hackers@FreeBSD.ORG Subject: Re: TCP&IP cksum offload on FreeBSD 4.2 Message-ID: <69917.1001658738@critter> In-Reply-To: Your message of "Thu, 27 Sep 2001 23:40:54 EDT." <200109280340.f8S3esZ71606@whizzo.transsys.com>
next in thread | previous in thread | raw e-mail | index | archive | help
In message <200109280340.f8S3esZ71606@whizzo.transsys.com>, "Louis A. Mamakos" writes: >The paper that someone mentioned earlier in this thread had some >statistics on various classes of errors. In a nutshell, they put >packet sniffers on 4 different networks, and collected traffic. For >each back packet (where the checksum and ethernet CRC differed), they >then looked for retransmissions of the same data, and tried to characterize >the different failure modes they observed. > >It's very interesting reading. Absolutely. We have a pretty big FreeBSD concentration at one of my customers and I was actually considering running their collector (if I can get my hands on it) just to see what the error rate is... -- Poul-Henning Kamp | UNIX since Zilog Zeus 3.20 phk@FreeBSD.ORG | TCP/IP since RFC 956 FreeBSD committer | BSD since 4.3-tahoe Never attribute to malice what can adequately be explained by incompetence. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?69917.1001658738>