Darren Reed writes: > > Similarly, I don't think it's a great idea to push the end-to-end > > checksum generation or verification down into hardware that's further > > away from the endpoint, nor is it in the long term good to add more > > complexity to the system, but that's exactly what the feature we're > > talking about does. > > > > I think it's a fair bet to say we'll be back here again. > > It is sentiments like this that make me wish for a method to > control which features are enabled, individually, per NIC > that doesn't involve editting driver.conf files.
Though it'd be nice to have any reasonable mechanism to "tune" these things -- particularly so in emergencies when bugs are found -- I don't think that this is something that ought to be exposed as an administrative interface that we *expect* users to encounter. In other words, we're talking about internal system design here, not administrative features. -- James Carlson, Solaris Networking <[EMAIL PROTECTED]> Sun Microsystems / 1 Network Drive 71.232W Vox +1 781 442 2084 MS UBUR02-212 / Burlington MA 01803-2757 42.496N Fax +1 781 442 1677 _______________________________________________ networking-discuss mailing list [email protected]
