based on my limited knowledge,
There are 2 kind of n/w sniffing.
1)passive sniffing
2)active sniffing
What you want is fall to the 2nd category, because of the way switch /hub-switch work.
Somehow you have to redirect the traffic in your switched lan to your computer, this is known as Man In The Middle(MITM) attack. I think it's related to arp poisoning/spoofing.
And then Your computer must be capable to do ip forwarding and something like that.
I had tried passive sniffing successfully on simple LAN that using old-hub sometimes ago. Tried it with ettercap and wireshark.
But for active sniffing ,currently I don't have the strong drive to do it.Need More hard work...maybe sometime later
But there are some tools you can use to explore sniffing switch lan. It's not that cutting edge method.
This is not exhausted list.
For win:
cain & abel
For lin:
ettercap
dsniff
thc parasite
wireshark( maybe? )
Oh...and try it in your own n/w! Trying this kind of stuff in office or public LAN might be illegal.
Let us know your result