Creating a Linux Soft Switch

Environment: C on Linux Red Hat 7.3-2.4.18-3

Description

The Linux Soft Switch allows a computer to work as a switch on layer 2. It is designed to switch packets based on MAC addresses and forward them to the proper outgoing network interface(s).

Note: With this version (1.0), Soft Switch can support up to four hosts connected to the Linux Soft Switch host. It means that the Soft Switch host has at least two NICs and the max is four NICs.

Downloads

Download source - 98 Kb


Comments

  • Great, but how 'bout this?

    Posted by Legacy on 08/13/2003 12:00am

    Originally posted by: Nickolay

    Great work, I've dreamed about softswitch implemented on OS, But.. How about this problem.... For example if we try to apply some packet filters (i.e. port-blocking functions to your program), how it shoud be? Which functions of Libpcap/winpicap or just socket-base functions we should use? But the piece of code would be better!

    Thanks.

    Reply
  • Any photographs available, or any other help?

    Posted by Legacy on 08/04/2003 12:00am

    Originally posted by: Harshad Joshi

    Can you please include a photograph of actual implementation of this code alongwith its hardware?
    
    Please respond immediately!

    Reply
  • SoftSwitch on Windows environment?

    Posted by Legacy on 04/20/2003 12:00am

    Originally posted by: Paul Yeung

    Can this kind of ethernet softswitch be implemented on Windows platform? What will be the difficulties?

    • SoftSwitch on Windows environment?

      Posted by amshat on 06/29/2005 01:00pm

      i am also interested to install soft switch in windows? can we cooperat , thanks kind regards Am

      Reply
    Reply
Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • The 3rd Platform of computing, based around the four pillars of mobile computing, social media, big data and analytics, and cloud, is redefining what IT infrastructure needs to provide. Endpoint solutions must meet not only traditional data protection requirements, but also a new set of requirements driven by the explosion in mobile computing. This IDC white paper explores the customer challenges associated with safeguarding data residing on various endpoint devices, including laptops, tablets, and …

  • New IT trends to support worker mobility -- such as VDI and BYOD -- are quickly gaining interest and adoption. But just as with any new trend, there are concerns and pitfalls to avoid. Download this paper to learn the most important considerations to keep in mind for your VDI project.

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date