• Home
  • Raw
  • Download

Lines Matching refs:to

10 	  intend to participate in the MBONE, a high bandwidth network on top
13 <http://www.savetz.com/mbone/>. For most people, it's safe to say N.
18 If you intend to run your Linux box mostly as a router, i.e. as a
23 The answer to this question won't directly affect the kernel:
24 answering N will just cause the configurator to skip all the
28 forwarding in your kernel; you can do that by saying Y to "/proc
41 asymmetric routing (packets from you to a host take a different path
42 than packets from that host to you) or if you operate a non-routing
68 Normally, a router decides what to do with a received packet based
70 the Linux router will also be able to take the packet's source
84 Normally, the routing tables specify a single action to be taken in
86 however, it becomes possible to attach several actions to a packet
87 pattern, in effect specifying several alternative paths to travel
88 for those packets. The router considers all these paths to be of
112 You need to say Y only for diskless machines requiring network
113 access to boot (in which case you want to say Y to "Root file system
121 If you want your Linux box to mount its whole root file system (the
123 net via NFS and you want the IP address of your computer to be
130 If unsure, say Y. Note that if you want to use DHCP, a DHCP server
138 If you want your Linux box to mount its whole root file system (the
140 net via NFS and you want the IP address of your computer to be
146 want to use BOOTP, a BOOTP server must be operating on your network.
153 If you want your Linux box to mount its whole root file system (the
155 net via NFS and you want the IP address of your computer to be
158 here. Note that if you want to use RARP, a RARP server must be
171 can be useful if you want to make your (or some other) machine
172 appear on a different network than it physically is, or to use
173 mobile-IP facilities (allowing laptops to seamlessly move between
176 Saying Y to this option will produce two modules ( = code which can
183 This is helper module to demultiplex GRE packets on GRE version field criteria.
211 One application of GRE/IP is to construct a broadcast WAN (Wide Area
214 to do that, say Y here and to "IP multicast routing" below.
225 This is used if you want your machine to act as a router for IP
228 audio and video broadcasts. In order to do that, you would most
238 what to do with a multicast packet based on the source and
240 will also be able to take interfaces and packet marks into
252 because Cisco supports it. You need special software to use it
256 Say Y if you want to use PIM-SM v1. Note that you can say N here if
257 you just want to use Dense Mode PIM.
263 Kernel side support for Sparse Mode PIM version 2. In order to use
266 you want to play with it.
271 Normal TCP/IP networking is open to an attack known as "SYN
273 users from being able to connect to your computer during an ongoing
279 protocol known as "SYN cookies" to enable legitimate users to
280 continue to connect, even when your machine is under attack. There
281 is no need for the legitimate users to change their TCP/IP software;
282 SYN cookies work transparently to them. For technical information
283 about SYN cookies, check out <http://cr.yp.to/syncookies.html>.
286 likely to have been forged by the attacker; it is only reported as
287 an aid in tracing the packets to their actual source and should not
295 saying Y to "/proc file system support" and
312 encapsulating protocol. This can be used with xfrm mode tunnel to give
326 Foo over UDP allows any IP protocol to be directly encapsulated
329 and RSS) can be leveraged to provide better service.
337 When this option is enabled IP tunnels can be configured to use
375 only if this system really does IPsec and want to do it
433 bool "INET: allow privileged process to administratively close sockets"
439 ss) to close sockets opened by other processes. Closing a socket in
441 the socket and causes future socket calls to behave as if the socket
486 control. It is based on end-to-end bandwidth estimation to set
501 modeswitch to change the alpha and beta parameters of TCP Reno
502 based on network conditions and in a way so as to be fair with
510 A modification to TCP's congestion control mechanism for use
511 with large congestion windows. A table indicates how much to
528 TCP Vegas is a sender-side only change to TCP that anticipates
538 TCP NV is a follow up to TCP Vegas. It has been modified to deal with
545 when there is packet loss) due to fairness issues. One scenario when they
554 Scalable TCP is a sender-side only change to TCP which uses a
556 properties, though is known to have fairness issues.
564 to utilize only the excess network bandwidth as compared to the
572 TCP Veno is a sender-side only enhancement of TCP to obtain better
574 distinguishing to circumvent the difficult judgment of the packet loss
575 type. TCP Veno cuts down less congestion window in response to random
585 algorithm, which uses a mixed loss/delay approach to compute the
587 internal, RTT and Reno fairness, resilience to link loss while
598 high speed long delay links. It uses round-trip-time to
599 adjust the alpha and beta parameters to achieve a higher average
609 DCTCP leverages Explicit Congestion Notification (ECN) in the network to
610 provide multi-bit feedback to the end hosts. It is designed to provide:
612 - High burst tolerance (incast due to partition/aggregate),
631 the TCP sender in order to:
636 o Tolerate packet loss unrelated to congestion.
647 BBR (Bottleneck Bandwidth and RTT) TCP congestion control aims to
650 propagation delay. It tolerates packet loss and delay unrelated to
725 RFC2385 specifies a method of giving MD5 protection to TCP sessions.
726 Its main (only?) use is to protect BGP sessions between core routers