Promiscuous traffic: Difference between revisions
←Created page with '{{New unreviewed article|source=ArticleWizard|date={{subst:CURRENTMONTHNAME}} {{subst:CURRENTYEAR}}}} In computer networks, '''Promiscuous Traffic''' , or '''Cross...' |
m typo |
||
Line 5: | Line 5: | ||
This type of promiscuous traffic, due to a lack of address filtering, has been a recurring issue with certain Linux / Unix kernels <ref>Red Hat Bug 231899 - multicast incorrect handling - https://bugzilla.redhat.com/show_bug.cgi?id=231899</ref> <ref>Sun Microsystems forum - Multicast socket problem - http://forums.sun.com/thread.jspa?threadID=566608</ref>, but never reported on Microsoft Windows operating systems post Windows XP. |
This type of promiscuous traffic, due to a lack of address filtering, has been a recurring issue with certain Linux / Unix kernels <ref>Red Hat Bug 231899 - multicast incorrect handling - https://bugzilla.redhat.com/show_bug.cgi?id=231899</ref> <ref>Sun Microsystems forum - Multicast socket problem - http://forums.sun.com/thread.jspa?threadID=566608</ref>, but never reported on Microsoft Windows operating systems post Windows XP. |
||
Another form of promiscuous traffic occurs when two different applications happen to listen on the same group address. As the former type of promiscuous traffic (lack of address filtering) can be considered a bug at the operating system level, the |
Another form of promiscuous traffic occurs when two different applications happen to listen on the same group address. As the former type of promiscuous traffic (lack of address filtering) can be considered a bug at the operating system level, the latter reflects global configuration issues. |
||
Revision as of 19:28, 12 November 2009
Template:New unreviewed article
In computer networks, Promiscuous Traffic , or Cross Talking [1], describes situations where a receiver configured to receive a particular data stream receives that data stream and others. In particular, in Multicast socket networking, an example of promiscuous traffic is when a socket configured to listen on a specific multicast address group A with a specific port P, noted A:P, receives traffic from A:P but also from another multicast source. For instance, a socket is configured to receive traffic from the multicast group address 234.234.7.70 , port 36000 (noted 234.234.7.70:36000) , but receives traffic from both 234.234.7.70:36000 and 234.234.7.71:36000 .
This type of promiscuous traffic, due to a lack of address filtering, has been a recurring issue with certain Linux / Unix kernels [2] [3], but never reported on Microsoft Windows operating systems post Windows XP.
Another form of promiscuous traffic occurs when two different applications happen to listen on the same group address. As the former type of promiscuous traffic (lack of address filtering) can be considered a bug at the operating system level, the latter reflects global configuration issues.
Note:
Promiscuous traffic refers to data traffic over a computer network ; This is not to be confused with promiscuous mode which refers to a particular network card configuration.
References
- ^ inspired from the electronics term Crosstalk_(electronics)
- ^ Red Hat Bug 231899 - multicast incorrect handling - https://bugzilla.redhat.com/show_bug.cgi?id=231899
- ^ Sun Microsystems forum - Multicast socket problem - http://forums.sun.com/thread.jspa?threadID=566608
External links
- Tool to detect promiscuous traffic with the JBoss product
- Cross talking between clusters with same multicast ports but different multicast addresses
- multicast: same port, different IP address? this thread relates of a practical case where a developer wants to use several addresses with a same port.