Creating a Linux Soft Switch

Environment: C on Linux Red Hat 7.3-2.4.18-3

Description

The Linux Soft Switch allows a computer to work as a switch on layer 2. It is designed to switch packets based on MAC addresses and forward them to the proper outgoing network interface(s).

Note: With this version (1.0), Soft Switch can support up to four hosts connected to the Linux Soft Switch host. It means that the Soft Switch host has at least two NICs and the max is four NICs.

Downloads

Download source - 98 Kb


Comments

  • Great, but how 'bout this?

    Posted by Legacy on 08/13/2003 12:00am

    Originally posted by: Nickolay

    Great work, I've dreamed about softswitch implemented on OS, But.. How about this problem.... For example if we try to apply some packet filters (i.e. port-blocking functions to your program), how it shoud be? Which functions of Libpcap/winpicap or just socket-base functions we should use? But the piece of code would be better!

    Thanks.

    Reply
  • Any photographs available, or any other help?

    Posted by Legacy on 08/04/2003 12:00am

    Originally posted by: Harshad Joshi

    Can you please include a photograph of actual implementation of this code alongwith its hardware?
    
    Please respond immediately!

    Reply
  • SoftSwitch on Windows environment?

    Posted by Legacy on 04/20/2003 12:00am

    Originally posted by: Paul Yeung

    Can this kind of ethernet softswitch be implemented on Windows platform? What will be the difficulties?

    • SoftSwitch on Windows environment?

      Posted by amshat on 06/29/2005 01:00pm

      i am also interested to install soft switch in windows? can we cooperat , thanks kind regards Am

      Reply
    Reply
Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Although much publicity around computer security points to hackers and other outside attacks, insider threats can be particularly insidious and dangerous, whether caused by malice or employee negligence. In this report, you learn the eight most significant cybersecurity threats that could impact your organization (at any time), Forbes cited internal threats as No. 3, noting that internal attacks can be "the most devastating" due to the amount of damage privileged users can inflict and the type of data they can …

  • Companies undertaking an IT project need to find the right balance between cost and functionality. It's important to start by determining whether to build a solution from scratch, buy an out-of-the-box solution, or a combination of both. In reality, most projects will require some system tailoring to meet business requirements. Decision-makers must understand how much software development is enough and craft a detailed implementation plan to ensure the project's success. This white paper examines the different …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date