Lines Matching refs:of

11 	  of the Internet which carries audio and video broadcasts. More
60 Keep track of statistics on structure of FIB TRIE table.
72 of the packet can be used for routing decisions as well.
88 for those packets. The router considers all these paths to be of
89 equal "cost" and chooses one of them in a non-deterministic fashion
98 received packets which look strange and could be evidence of an
109 This enables automatic configuration of IP addresses of devices and
110 of the routing table during kernel boot, based on either information
123 net via NFS and you want the IP address of your computer to be
126 the boot ROM of your network card was designed for booting Linux and
140 net via NFS and you want the IP address of your computer to be
143 the boot ROM of your network card was designed for booting Linux and
155 net via NFS and you want the IP address of your computer to be
167 Tunneling means encapsulating data of one protocol type within
170 encapsulation of IP within IP, which sounds kind of pointless, but
197 Tunneling means encapsulating data of one protocol type within
201 encapsulating of IPv4 or IPv6 over existing IPv4 infrastructure.
211 One application of GRE/IP is to construct a broadcast WAN (Wide Area
227 MBONE, a high bandwidth network on top of the Internet which carries
241 account and run multiple instances of userspace daemons
272 flooding". This denial-of-service attack prevents legitimate remote
277 SYN cookies provide protection against this type of attack. If you
311 Tunneling means encapsulating data of one protocol type within
314 the notion of a secure tunnel for IPSEC and then use routing protocol
332 bool "IP: FOU encapsulation of IP tunnels"
336 Allow configuration of FOU or GUE encapsulation for IP tunnels.
348 implementations of the algorithms that RFC 8221 lists as MUST be
351 implementations of any needed algorithms when available.
363 implementations of the algorithms that RFC 8221 lists as MUST be
366 implementations of any needed algorithms when available.
390 Support for RFC 8229 encapsulation of ESP and IKE over
406 int "INET: Source port perturbation table size (as power of 2)" if EXPERT
409 Source port perturbation table size (as power of 2) for
472 Support for selection of various TCP congestion control
500 This is version 2.0 of BIC-TCP which uses a cubic growth function
508 TCP Westwood+ is a sender-side only modification of the TCP Reno
509 protocol stack that optimizes the performance of TCP congestion
522 H-TCP is a send-side only modifications of the TCP Reno
523 protocol stack that optimizes the performance of TCP
525 modeswitch to change the alpha and beta parameters of TCP Reno
543 TCP-Hybla is a sender-side only change that eliminates penalization of
553 the onset of congestion by estimating the bandwidth. TCP Vegas
565 instead of linearly.
589 ``fair share`` of bandwidth as targeted by TCP.
596 TCP Veno is a sender-side only enhancement of TCP to obtain better
597 throughput over wireless networks. TCP Veno makes use of state
598 distinguishing to circumvent the difficult judgment of the packet loss
621 TCP-Illinois is a sender-side modification of TCP Reno for
658 o Back off with an average probability that is independent of the RTT.
674 model of the bottleneck delivery rate and path round-trip propagation
754 TCP-AO specifies the use of stronger Message Authentication Codes (MACs),
756 provides more details on the association of security with TCP
767 RFC2385 specifies a method of giving MD5 protection to TCP sessions.