Lines Matching +full:foo +full:- +full:over +full:- +full:udp

1 # SPDX-License-Identifier: GPL-2.0-only
40 so-called IP spoofing, however it can pose problems if you use
42 than packets from that host to you) or if you operate a non-routing
52 <file:Documentation/networking/ip-sysctl.rst>.
71 address into account. Furthermore, the TOS (Type-Of-Service) field
89 equal "cost" and chooses one of them in a non-deterministic fashion
122 one containing the directory /) from some other computer over the
132 <file:Documentation/admin-guide/nfs/nfsroot.rst> for details.
139 one containing the directory /) from some other computer over the
147 Read <file:Documentation/admin-guide/nfs/nfsroot.rst> for details.
154 one containing the directory /) from some other computer over the
160 <file:Documentation/admin-guide/nfs/nfsroot.rst> for details.
168 another protocol and sending it over a channel that understands the
173 mobile-IP facilities (allowing laptops to seamlessly move between
193 tristate "IP: GRE tunnels over IP"
198 another protocol and sending it over a channel that understands the
201 encapsulating of IPv4 or IPv6 over existing IPv4 infrastructure.
208 bool "IP: broadcast GRE over IP"
213 Network), but can be distributed all over the Internet. If you want
247 bool "IP: PIM-SM version 1 support"
253 (pimd-v1). Please see <http://netweb.usc.edu/pim/> for more
256 Say Y if you want to use PIM-SM v1. Note that you can say N here if
260 bool "IP: PIM-SM version 2 support"
265 gated-5). This routing protocol is not used widely, so say N unless
272 flooding". This denial-of-service attack prevents legitimate remote
312 another protocol and sending it over a channel that understands the
323 tristate "IP: Foo (IP protocols) over UDP"
326 Foo over UDP allows any IP protocol to be directly encapsulated
327 over UDP include tunnels (IPIP, GRE, SIT). By encapsulating in UDP
328 network mechanisms and optimizations for UDP (such as ECMP
390 Support for RFC 8229 encapsulation of ESP and IKE over
410 RFC 6056 3.3.4. Algorithm 4: Double-Hash Port Selection Algorithm.
441 tristate "UDP: socket monitoring interface"
445 Support for UDP socket monitoring interface used by the ss tool.
486 BIC-TCP is a sender-side only change that ensures a linear RTT
488 bounded TCP-friendliness. The protocol combines two schemes
500 This is version 2.0 of BIC-TCP which uses a cubic growth function
502 See http://www.csc.ncsu.edu/faculty/rhee/export/bitcp/cubic-paper.pdf
508 TCP Westwood+ is a sender-side only modification of the TCP Reno
510 control. It is based on end-to-end bandwidth estimation to set
516 wired networks and throughput over wireless links.
519 tristate "H-TCP"
522 H-TCP is a send-side only modifications of the TCP Reno
527 other Reno and H-TCP flows.
540 tristate "TCP-Hybla congestion control algorithm"
543 TCP-Hybla is a sender-side only change that eliminates penalization of
544 long-RTT, large-bandwidth connections, like when satellite legs are
552 TCP Vegas is a sender-side only change to TCP that anticipates
572 For further details see http://www.brakmo.org/networking/tcp-nv/
578 Scalable TCP is a sender-side only change to TCP which uses a
587 TCP Low Priority (TCP-LP), a distributed algorithm whose goal is
590 See http://www-ece.rice.edu/networks/TCP-LP/
596 TCP Veno is a sender-side only enhancement of TCP to obtain better
597 throughput over wireless networks. TCP Veno makes use of state
608 YeAH-TCP is a sender-side high-speed enabled TCP congestion control
621 TCP-Illinois is a sender-side modification of TCP Reno for
622 high speed long delay links. It uses round-trip-time to
634 provide multi-bit feedback to the end hosts. It is designed to provide:
636 - High burst tolerance (incast due to partition/aggregate),
637 - Low latency (short flows, queries),
638 - High throughput (continuous data updates, large file transfers) with
639 commodity, shallow-buffered switches.
648 http://simula.stanford.edu/~alizade/Site/DCTCP_files/dctcp-final.pdf
651 tristate "CAIA Delay-Gradient (CDG)"
654 CAIA Delay-Gradient (CDG) is a TCP congestion control that modifies
659 o Coexist with flows that use loss-based congestion control.
665 http://caia.swin.edu.au/cv/dahayes/content/networking2011-cdg-preprint.pdf
674 model of the bottleneck delivery rate and path round-trip propagation
676 can operate over LAN, WAN, cellular, wifi, or cable modem links. It can
677 coexist with flows that use loss-based congestion control, and can
752 depends on 64BIT && IPV6 != m # seq-number extension needs WRITE_ONCE(u64)
754 TCP-AO specifies the use of stronger Message Authentication Codes (MACs),
755 protects against replays for long-lived TCP connections, and