Date: Tue, 04 Jan 2000 19:01:05 -0700 From: Wes Peters <wes@softweyr.com> To: Dan Davis <dand@eclipse.net> Cc: freebsd-net@freebsd.org Subject: Re: sniffing networks Message-ID: <3872A5E1.8EA69968@softweyr.com> References: <Pine.BSI.4.05L.10001041315010.6519-100000@mail.eclipse.net>
next in thread | previous in thread | raw e-mail | index | archive | help
Dan Davis wrote: > > > According to a friend who has done some network monitoring tests this > > is not as perfect a solution as it sounds. He has observed packets > > coming out ports other than the one where the destination system is > > connected. Still, everyone agrees it's far better than the old > > dozens-of-machines-in-a-single-collision-domain method. > > Perhaps that's because the switch uses a fixed-size table for matching > which destinations should be routed to each ports that is smaller > than the number of destinations/ports actually in use. Since the > switch needs to operate so quickly, is it probable that such a > switching table is actually in silicon or programmed into an FPGA? Yes. The NetGear FS-105 uses a 1K hash on the destination MAC address; this is typical for layer-2 switches. -- "Where am I, and what am I doing in this handbasket?" Wes Peters Softweyr LLC wes@softweyr.com http://softweyr.com/ To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-net" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3872A5E1.8EA69968>