Home
last modified time | relevance | path

Searched refs:network (Results 1 – 25 of 34) sorted by relevance

12

/net/ipx/
DKconfig23 <ftp://ibiblio.org/pub/Linux/system/network/daemons/> or
31 network, say N.
34 bool "IPX: Full internal IPX network"
37 Every IPX network has an address that identifies it. Sometimes it is
38 useful to give an IPX "network" address to your Linux box as well
42 "network" inside your box and to assign an IPX address to this
43 network. Say Y here if you want to do this; read the IPX-HOWTO at
46 The full internal IPX network enables you to allocate sockets on
47 different virtual nodes of the internal network. This is done by
50 to 0 when binding a socket on the primary network. In this case the
[all …]
Dipx_route.c48 int ipxrtr_add_route(__be32 network, struct ipx_interface *intrfc, in ipxrtr_add_route() argument
55 rt = ipxrtr_lookup(network); in ipxrtr_add_route()
73 rt->ir_net = network; in ipxrtr_add_route()
/net/x25/
DKconfig8 X.25 is a set of standardized network protocols, similar in scope to
9 frame relay; the one physical line from your box to the X.25 network
12 network. Governments, banks, and other organizations tend to use it
25 One connects to an X.25 network either with a dedicated network card
/net/batman-adv/
DKconfig28 network, as well as a throughput based metric.
50 mesh networks. If you think that your network does not need
58 This option enables network coding, a mechanism that aims to
59 increase the overall network throughput by fusing multiple
63 network coding work.
64 If you think that your network does not need this feature you
DMakefile39 batman-adv-$(CONFIG_BATMAN_ADV_NC) += network-coding.o
/net/
DKconfig101 This enables security marking of network packets, similar
112 This allows timestamping of network packets by PHYs with
121 Netfilter is a framework for filtering and mangling network packets
125 a firewall protecting a local network from the Internet. The type of
127 filter", which means that it can reject individual network packets
130 bothersome to set up; it inspects the network traffic much more
139 the gateway to the Internet for a local network of machines without
141 of the computers on your local network wants to send something to
150 run globally visible servers from within a masqueraded local network
155 the local network tries to connect to an outside host, your Linux
[all …]
/net/netfilter/ipset/
DKconfig32 can store IPv4 addresses (or network addresse) from a range.
59 can store arbitrary IPv4 or IPv6 addresses (or network addresses)
98 network address/prefix triples in a set.
125 one can store IPv4/IPv6 network address/prefix elements in a set.
134 one can store IPv4/IPv6 network address/prefix pairs in a set.
143 one can store IPv4/IPv6 network address/prefix and
153 one can store IPv4/IPv6 network address/prefix and
/net/atm/
DKconfig13 In order to participate in an ATM network, your Linux box needs an
27 network, you will typically either say Y here or to "LAN Emulation
45 network. Besides operating as a normal ATM end station client, Linux
56 enhancing overall network performance.
/net/ipv4/
DKconfig9 intend to participate in the MBONE, a high bandwidth network on top
18 computer that forwards and redistributes network packets, say Y; you
37 for their source address doesn't match the network interface they're
113 You need to say Y only for diskless machines requiring network
115 on NFS" as well), because all other machines configure the network
127 the boot ROM of your network card was designed for booting Linux and
132 must be operating on your network. Read
144 the boot ROM of your network card was designed for booting Linux and
147 want to use BOOTP, a BOOTP server must be operating on your network.
160 operating on your network. Read
[all …]
/net/packet/
DKconfig9 directly with network devices without an intermediate network
/net/can/
DKconfig2 # Controller Area Network (CAN) network layer core configuration
13 More information on the CAN network protocol family PF_CAN
50 CAN frames can be routed between CAN network interfaces (one hop).
/net/netfilter/ipvs/
DKconfig116 The robin-robin scheduling algorithm simply directs network
125 The weighted robin-robin scheduling algorithm directs network
138 The least-connection scheduling algorithm directs network
148 The weighted least-connection scheduling algorithm directs network
158 The weighted failover scheduling algorithm directs network
168 The weighted overflow scheduling algorithm directs network
211 The destination hashing scheduling algorithm assigns network
221 The source hashing scheduling algorithm assigns network
231 The shortest expected delay scheduling algorithm assigns network
/net/unix/
DKconfig10 accessing network connections. Many commonly used programs such as
12 machine is not connected to any network. Unless you are working on
/net/hsr/
DKconfig11 and it must be connected as a node in a ring network together with
16 instant fail-over network. Each HSR node in the ring acts like a
/net/mac80211/
DKconfig220 is taking part in a mesh network).
233 is taking part in a mesh network).
246 is taking part in a mesh network).
259 mesh network).
270 mesh network).
281 mesh network).
/net/l2tp/
DKconfig16 intervening network in a way that is as transparent as
59 packet-oriented data network (e.g., over IP). L2TP, as
98 across an IP network [RFC3931].
/net/ncsi/
DKconfig10 support. Enable this only if your system connects to a network
/net/sctp/
DKconfig19 connectionless packet network such as IP. It offers the following
29 -- network-level fault tolerance through supporting of multi-
/net/netlabel/
DKconfig11 NetLabel provides support for explicit network packet labeling
/net/dcb/
DKconfig11 NICs and switches to support network traffic with differing
/net/lapb/
DKconfig13 Usually, LAPB is used with specialized X.21 network cards, but Linux
/net/sched/
DKconfig9 When the kernel has several packets to send out over a network
18 then be attached to different network devices. This is useful for
19 example if some of your network devices are real time devices that
179 (GRED) packet scheduling algorithm for some of your network devices
200 Say Y if you want to emulate network delay, loss, and packet
330 tristate "Plug network traffic until release (PLUG)"
333 This queuing discipline allows userspace to plug/unplug a network
340 This module also provides a generic "network output buffering"
344 of virtual machines by allowing the generated network output to be rolled
/net/ipv6/
DKconfig29 are placed in a multi-homed network.
103 ILA is a mechanism to do network virtualization without
194 IPv4 encapsulation in order to transit IPv4-only network
/net/rxrpc/
DKconfig27 its network transport.
/net/decnet/
DKconfig35 network link driver", "Routing messages" and "Network packet

12