Misplaced Pages

Promiscuous traffic

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
For the network card configuration, see Promiscuous mode.

In computer networking, promiscuous traffic, or cross-talking, describes situations where a receiver configured to receive a particular data stream receives that data stream and others.

In particular, in multicast socket networking, an example of promiscuous traffic is when a socket configured to listen on a specific multicast address group A with a specific port P, noted A:P, receives traffic from A:P but also from another multicast source. For instance, a socket is configured to receive traffic from the multicast group address 203.0.113.70, port 36000 (noted 203.0.113.70:36000), but receives traffic from both 203.0.113.70:36000 and 203.0.113.71:36000.

This type of promiscuous traffic, due to a lack of address filtering, has been a recurring issue with certain Unix and Linux kernels, but has never been reported on Microsoft Windows operating systems post Windows XP.

Another form of promiscuous traffic occurs when two different applications happen to listen on the same group address. As the former type of promiscuous traffic (lack of address filtering) can be considered a bug at the operating system level, the latter reflects global configuration issues.

References

  1. Inspired from the electronics term crosstalk
  2. Red Hat Bug 231899 – multicast incorrect handling – https://bugzilla.redhat.com/show_bug.cgi?id=231899
  3. Sun Microsystems forum – Multicast socket problem – http://forums.sun.com/thread.jspa?threadID=566608

External links


Stub icon

This computer networking article is a stub. You can help Misplaced Pages by expanding it.

Categories: