Creating a Linux Soft Switch

Environment: C on Linux Red Hat 7.3-2.4.18-3

Description

The Linux Soft Switch allows a computer to work as a switch on layer 2. It is designed to switch packets based on MAC addresses and forward them to the proper outgoing network interface(s).

Note: With this version (1.0), Soft Switch can support up to four hosts connected to the Linux Soft Switch host. It means that the Soft Switch host has at least two NICs and the max is four NICs.

Downloads

Download source - 98 Kb


Comments

  • Great, but how 'bout this?

    Posted by Legacy on 08/13/2003 12:00am

    Originally posted by: Nickolay

    Great work, I've dreamed about softswitch implemented on OS, But.. How about this problem.... For example if we try to apply some packet filters (i.e. port-blocking functions to your program), how it shoud be? Which functions of Libpcap/winpicap or just socket-base functions we should use? But the piece of code would be better!

    Thanks.

    Reply
  • Any photographs available, or any other help?

    Posted by Legacy on 08/04/2003 12:00am

    Originally posted by: Harshad Joshi

    Can you please include a photograph of actual implementation of this code alongwith its hardware?
    
    Please respond immediately!

    Reply
  • SoftSwitch on Windows environment?

    Posted by Legacy on 04/20/2003 12:00am

    Originally posted by: Paul Yeung

    Can this kind of ethernet softswitch be implemented on Windows platform? What will be the difficulties?

    • SoftSwitch on Windows environment?

      Posted by amshat on 06/29/2005 01:00pm

      i am also interested to install soft switch in windows? can we cooperat , thanks kind regards Am

      Reply
    Reply
Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • When individual departments procure cloud service for their own use, they usually don't consider the hazardous organization-wide implications. Read this paper to learn best practices for setting up an internal, IT-based cloud brokerage function that service the entire organization. Find out how this approach enables you to retain top-down visibility and control of network security and manage the impact of cloud traffic on your WAN.

  • Following an IT incident through to resolution is more than just acknowledging an alert and restarting a server. The recent State of On-Call Report found that it takes most companies an average of 10-30 minutes to resolve an incident with an average of 5 people involved. Imagine how much money and time companies are spending to deal with incident resolution. But what if you had a tool that offered solutions baked in? Or a tool that sent alerts to the right person or team every time? These are the kind of …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date