Lines Matching refs:to
10 intend to participate in the MBONE, a high bandwidth network on top
13 <https://www.savetz.com/mbone/>. For most people, it's safe to say N.
18 If you intend to run your Linux box mostly as a router, i.e. as a
23 The answer to this question won't directly affect the kernel:
24 answering N will just cause the configurator to skip all the
28 forwarding in your kernel; you can do that by saying Y to "/proc
41 asymmetric routing (packets from you to a host take a different path
42 than packets from that host to you) or if you operate a non-routing
68 Normally, a router decides what to do with a received packet based
70 the Linux router will also be able to take the packet's source
84 Normally, the routing tables specify a single action to be taken in
86 however, it becomes possible to attach several actions to a packet
87 pattern, in effect specifying several alternative paths to travel
88 for those packets. The router considers all these paths to be of
112 You need to say Y only for diskless machines requiring network
113 access to boot (in which case you want to say Y to "Root file system
121 If you want your Linux box to mount its whole root file system (the
123 net via NFS and you want the IP address of your computer to be
130 If unsure, say Y. Note that if you want to use DHCP, a DHCP server
138 If you want your Linux box to mount its whole root file system (the
140 net via NFS and you want the IP address of your computer to be
146 want to use BOOTP, a BOOTP server must be operating on your network.
153 If you want your Linux box to mount its whole root file system (the
155 net via NFS and you want the IP address of your computer to be
158 here. Note that if you want to use RARP, a RARP server must be
171 can be useful if you want to make your (or some other) machine
172 appear on a different network than it physically is, or to use
173 mobile-IP facilities (allowing laptops to seamlessly move between
176 Saying Y to this option will produce two modules ( = code which can
183 This is helper module to demultiplex GRE packets on GRE version field criteria.
211 One application of GRE/IP is to construct a broadcast WAN (Wide Area
214 to do that, say Y here and to "IP multicast routing" below.
225 This is used if you want your machine to act as a router for IP
228 audio and video broadcasts. In order to do that, you would most
238 what to do with a multicast packet based on the source and
240 will also be able to take interfaces and packet marks into
252 because Cisco supports it. You need special software to use it
256 Say Y if you want to use PIM-SM v1. Note that you can say N here if
257 you just want to use Dense Mode PIM.
263 Kernel side support for Sparse Mode PIM version 2. In order to use
266 you want to play with it.
271 Normal TCP/IP networking is open to an attack known as "SYN
273 users from being able to connect to your computer during an ongoing
279 protocol known as "SYN cookies" to enable legitimate users to
280 continue to connect, even when your machine is under attack. There
281 is no need for the legitimate users to change their TCP/IP software;
282 SYN cookies work transparently to them. For technical information
283 about SYN cookies, check out <https://cr.yp.to/syncookies.html>.
286 likely to have been forged by the attacker; it is only reported as
287 an aid in tracing the packets to their actual source and should not
295 saying Y to "/proc file system support" and
313 encapsulating protocol. This can be used with xfrm mode tunnel to give
327 Foo over UDP allows any IP protocol to be directly encapsulated
330 and RSS) can be leveraged to provide better service.
338 When this option is enabled IP tunnels can be configured to use
350 implemented. If you need any other algorithms, you'll need to enable
365 implemented. If you need any other algorithms, you'll need to enable
378 only if this system really does IPsec and want to do it
458 bool "INET: allow privileged process to administratively close sockets"
464 ss) to close sockets opened by other processes. Closing a socket in
466 the socket and causes future socket calls to behave as if the socket
511 control. It is based on end-to-end bandwidth estimation to set
526 modeswitch to change the alpha and beta parameters of TCP Reno
527 based on network conditions and in a way so as to be fair with
535 A modification to TCP's congestion control mechanism for use
536 with large congestion windows. A table indicates how much to
553 TCP Vegas is a sender-side only change to TCP that anticipates
563 TCP NV is a follow up to TCP Vegas. It has been modified to deal with
570 when there is packet loss) due to fairness issues. One scenario when they
579 Scalable TCP is a sender-side only change to TCP which uses a
581 properties, though is known to have fairness issues.
589 to utilize only the excess network bandwidth as compared to the
597 TCP Veno is a sender-side only enhancement of TCP to obtain better
599 distinguishing to circumvent the difficult judgment of the packet loss
600 type. TCP Veno cuts down less congestion window in response to random
610 algorithm, which uses a mixed loss/delay approach to compute the
612 internal, RTT and Reno fairness, resilience to link loss while
623 high speed long delay links. It uses round-trip-time to
624 adjust the alpha and beta parameters to achieve a higher average
634 DCTCP leverages Explicit Congestion Notification (ECN) in the network to
635 provide multi-bit feedback to the end hosts. It is designed to provide:
637 - High burst tolerance (incast due to partition/aggregate),
656 the TCP sender in order to:
661 o Tolerate packet loss unrelated to congestion.
672 BBR (Bottleneck Bandwidth and RTT) TCP congestion control aims to
675 delay. It tolerates packet loss and delay unrelated to congestion. It
750 RFC2385 specifies a method of giving MD5 protection to TCP sessions.
751 Its main (only?) use is to protect BGP sessions between core routers