Lines Matching +full:loss +full:- +full:of +full:- +full:signal
1 # SPDX-License-Identifier: GPL-2.0-only
11 of the Internet which carries audio and video broadcasts. More
40 so-called IP spoofing, however it can pose problems if you use
42 than packets from that host to you) or if you operate a non-routing
52 <file:Documentation/networking/ip-sysctl.rst>.
60 Keep track of statistics on structure of FIB TRIE table.
71 address into account. Furthermore, the TOS (Type-Of-Service) field
72 of the packet can be used for routing decisions as well.
88 for those packets. The router considers all these paths to be of
89 equal "cost" and chooses one of them in a non-deterministic fashion
98 received packets which look strange and could be evidence of an
109 This enables automatic configuration of IP addresses of devices and
110 of the routing table during kernel boot, based on either information
123 net via NFS and you want the IP address of your computer to be
126 the boot ROM of your network card was designed for booting Linux and
132 <file:Documentation/admin-guide/nfs/nfsroot.rst> for details.
140 net via NFS and you want the IP address of your computer to be
143 the boot ROM of your network card was designed for booting Linux and
147 Read <file:Documentation/admin-guide/nfs/nfsroot.rst> for details.
155 net via NFS and you want the IP address of your computer to be
160 <file:Documentation/admin-guide/nfs/nfsroot.rst> for details.
167 Tunneling means encapsulating data of one protocol type within
170 encapsulation of IP within IP, which sounds kind of pointless, but
173 mobile-IP facilities (allowing laptops to seamlessly move between
197 Tunneling means encapsulating data of one protocol type within
201 encapsulating of IPv4 or IPv6 over existing IPv4 infrastructure.
211 One application of GRE/IP is to construct a broadcast WAN (Wide Area
227 MBONE, a high bandwidth network on top of the Internet which carries
241 account and run multiple instances of userspace daemons
247 bool "IP: PIM-SM version 1 support"
253 (pimd-v1). Please see <http://netweb.usc.edu/pim/> for more
256 Say Y if you want to use PIM-SM v1. Note that you can say N here if
260 bool "IP: PIM-SM version 2 support"
265 gated-5). This routing protocol is not used widely, so say N unless
272 flooding". This denial-of-service attack prevents legitimate remote
277 SYN cookies provide protection against this type of attack. If you
311 Tunneling means encapsulating data of one protocol type within
314 the notion of a secure tunnel for IPSEC and then use routing protocol
332 bool "IP: FOU encapsulation of IP tunnels"
336 Allow configuration of FOU or GUE encapsulation for IP tunnels.
348 implementations of the algorithms that RFC 8221 lists as MUST be
351 implementations of any needed algorithms when available.
363 implementations of the algorithms that RFC 8221 lists as MUST be
366 implementations of any needed algorithms when available.
390 Support for RFC 8229 encapsulation of ESP and IKE over
406 int "INET: Source port perturbation table size (as power of 2)" if EXPERT
409 Source port perturbation table size (as power of 2) for
410 RFC 6056 3.3.4. Algorithm 4: Double-Hash Port Selection Algorithm.
472 Support for selection of various TCP congestion control
486 BIC-TCP is a sender-side only change that ensures a linear RTT
488 bounded TCP-friendliness. The protocol combines two schemes
500 This is version 2.0 of BIC-TCP which uses a cubic growth function
502 See http://www.csc.ncsu.edu/faculty/rhee/export/bitcp/cubic-paper.pdf
508 TCP Westwood+ is a sender-side only modification of the TCP Reno
509 protocol stack that optimizes the performance of TCP congestion
510 control. It is based on end-to-end bandwidth estimation to set
519 tristate "H-TCP"
522 H-TCP is a send-side only modifications of the TCP Reno
523 protocol stack that optimizes the performance of TCP
525 modeswitch to change the alpha and beta parameters of TCP Reno
527 other Reno and H-TCP flows.
540 tristate "TCP-Hybla congestion control algorithm"
543 TCP-Hybla is a sender-side only change that eliminates penalization of
544 long-RTT, large-bandwidth connections, like when satellite legs are
552 TCP Vegas is a sender-side only change to TCP that anticipates
553 the onset of congestion by estimating the bandwidth. TCP Vegas
555 window. TCP Vegas should provide less packet loss, but it is
565 instead of linearly.
569 when there is packet loss) due to fairness issues. One scenario when they
572 For further details see http://www.brakmo.org/networking/tcp-nv/
578 Scalable TCP is a sender-side only change to TCP which uses a
587 TCP Low Priority (TCP-LP), a distributed algorithm whose goal is
589 ``fair share`` of bandwidth as targeted by TCP.
590 See http://www-ece.rice.edu/networks/TCP-LP/
596 TCP Veno is a sender-side only enhancement of TCP to obtain better
597 throughput over wireless networks. TCP Veno makes use of state
598 distinguishing to circumvent the difficult judgment of the packet loss
600 loss packets.
608 YeAH-TCP is a sender-side high-speed enabled TCP congestion control
609 algorithm, which uses a mixed loss/delay approach to compute the
611 internal, RTT and Reno fairness, resilience to link loss while
621 TCP-Illinois is a sender-side modification of TCP Reno for
622 high speed long delay links. It uses round-trip-time to
634 provide multi-bit feedback to the end hosts. It is designed to provide:
636 - High burst tolerance (incast due to partition/aggregate),
637 - Low latency (short flows, queries),
638 - High throughput (continuous data updates, large file transfers) with
639 commodity, shallow-buffered switches.
648 http://simula.stanford.edu/~alizade/Site/DCTCP_files/dctcp-final.pdf
651 tristate "CAIA Delay-Gradient (CDG)"
654 CAIA Delay-Gradient (CDG) is a TCP congestion control that modifies
657 o Use the delay gradient as a congestion signal.
658 o Back off with an average probability that is independent of the RTT.
659 o Coexist with flows that use loss-based congestion control.
660 o Tolerate packet loss unrelated to congestion.
665 http://caia.swin.edu.au/cv/dahayes/content/networking2011-cdg-preprint.pdf
674 model of the bottleneck delivery rate and path round-trip propagation
675 delay. It tolerates packet loss and delay unrelated to congestion. It
677 coexist with flows that use loss-based congestion control, and can
679 AQM schemes that do not provide a delay signal. It requires the fq
752 depends on 64BIT && IPV6 != m # seq-number extension needs WRITE_ONCE(u64)
754 TCP-AO specifies the use of stronger Message Authentication Codes (MACs),
755 protects against replays for long-lived TCP connections, and
756 provides more details on the association of security with TCP
767 RFC2385 specifies a method of giving MD5 protection to TCP sessions.