Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 04 Jan 2000 19:01:05 -0700
From:      Wes Peters <wes@softweyr.com>
To:        Dan Davis <dand@eclipse.net>
Cc:        freebsd-net@freebsd.org
Subject:   Re: sniffing networks
Message-ID:  <3872A5E1.8EA69968@softweyr.com>
References:  <Pine.BSI.4.05L.10001041315010.6519-100000@mail.eclipse.net>

next in thread | previous in thread | raw e-mail | index | archive | help
Dan Davis wrote:
> 
> > According to a friend who has done some network monitoring tests this
> > is not as perfect a solution as it sounds.  He has observed packets
> > coming out ports other than the one where the destination system is
> > connected.  Still, everyone agrees it's far better than the old
> > dozens-of-machines-in-a-single-collision-domain method.
>
> Perhaps that's because the switch uses a fixed-size table for matching
> which destinations should be routed to each ports that is smaller
> than the number of destinations/ports actually in use.  Since the
> switch needs to operate so quickly, is it probable that such a
> switching table is actually in silicon or programmed into an FPGA?

Yes.  The NetGear FS-105 uses a 1K hash on the destination MAC address;
this is typical for layer-2 switches.

-- 
            "Where am I, and what am I doing in this handbasket?"

Wes Peters                                                         Softweyr LLC
wes@softweyr.com                                           http://softweyr.com/


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-net" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3872A5E1.8EA69968>