Lines Matching +full:kernel +full:- +full:side
1 # SPDX-License-Identifier: GPL-2.0-only
9 enlarging your kernel by about 2 KB. You need multicasting if you
23 The answer to this question won't directly affect the kernel:
28 forwarding in your kernel; you can do that by saying Y to "/proc
40 so-called IP spoofing, however it can pose problems if you use
42 than packets from that host to you) or if you operate a non-routing
52 <file:Documentation/networking/ip-sysctl.rst>.
71 address into account. Furthermore, the TOS (Type-Of-Service) field
89 equal "cost" and chooses one of them in a non-deterministic fashion
96 If you say Y here, which is recommended, then the kernel will print
100 handled by the klogd daemon which is responsible for kernel messages
107 bool "IP: kernel level autoconfiguration"
110 of the routing table during kernel boot, based on either information
111 supplied on the kernel command line or by BOOTP or RARP protocols.
127 does DHCP itself, providing all necessary information on the kernel
132 <file:Documentation/admin-guide/nfs/nfsroot.rst> for details.
144 does BOOTP itself, providing all necessary information on the kernel
147 Read <file:Documentation/admin-guide/nfs/nfsroot.rst> for details.
160 <file:Documentation/admin-guide/nfs/nfsroot.rst> for details.
173 mobile-IP facilities (allowing laptops to seamlessly move between
177 be inserted in and removed from the running kernel whenever you
247 bool "IP: PIM-SM version 1 support"
250 Kernel side support for Sparse Mode PIM (Protocol Independent
253 (pimd-v1). Please see <http://netweb.usc.edu/pim/> for more
256 Say Y if you want to use PIM-SM v1. Note that you can say N here if
260 bool "IP: PIM-SM version 2 support"
263 Kernel side support for Sparse Mode PIM version 2. In order to use
265 gated-5). This routing protocol is not used widely, so say N unless
272 flooding". This denial-of-service attack prevents legitimate remote
285 If you are SYN flooded, the source address reported by the kernel is
409 RFC 6056 3.3.4. Algorithm 4: Double-Hash Port Selection Algorithm.
485 BIC-TCP is a sender-side only change that ensures a linear RTT
487 bounded TCP-friendliness. The protocol combines two schemes
499 This is version 2.0 of BIC-TCP which uses a cubic growth function
501 See http://www.csc.ncsu.edu/faculty/rhee/export/bitcp/cubic-paper.pdf
507 TCP Westwood+ is a sender-side only modification of the TCP Reno
509 control. It is based on end-to-end bandwidth estimation to set
518 tristate "H-TCP"
521 H-TCP is a send-side only modifications of the TCP Reno
526 other Reno and H-TCP flows.
539 tristate "TCP-Hybla congestion control algorithm"
542 TCP-Hybla is a sender-side only change that eliminates penalization of
543 long-RTT, large-bandwidth connections, like when satellite legs are
551 TCP Vegas is a sender-side only change to TCP that anticipates
571 For further details see http://www.brakmo.org/networking/tcp-nv/
577 Scalable TCP is a sender-side only change to TCP which uses a
586 TCP Low Priority (TCP-LP), a distributed algorithm whose goal is
589 See http://www-ece.rice.edu/networks/TCP-LP/
595 TCP Veno is a sender-side only enhancement of TCP to obtain better
607 YeAH-TCP is a sender-side high-speed enabled TCP congestion control
620 TCP-Illinois is a sender-side modification of TCP Reno for
621 high speed long delay links. It uses round-trip-time to
633 provide multi-bit feedback to the end hosts. It is designed to provide:
635 - High burst tolerance (incast due to partition/aggregate),
636 - Low latency (short flows, queries),
637 - High throughput (continuous data updates, large file transfers) with
638 commodity, shallow-buffered switches.
647 http://simula.stanford.edu/~alizade/Site/DCTCP_files/dctcp-final.pdf
650 tristate "CAIA Delay-Gradient (CDG)"
653 CAIA Delay-Gradient (CDG) is a TCP congestion control that modifies
658 o Coexist with flows that use loss-based congestion control.
664 http://caia.swin.edu.au/cv/dahayes/content/networking2011-cdg-preprint.pdf
673 model of the bottleneck delivery rate and path round-trip propagation
676 coexist with flows that use loss-based congestion control, and can
752 depends on 64BIT # seq-number extension needs WRITE_ONCE(u64)
754 TCP-AO specifies the use of stronger Message Authentication Codes (MACs),
755 protects against replays for long-lived TCP connections, and