Lines Matching refs:to

9 	  When the kernel has several packets to send out over a network
10 device, it has to decide which ones to send first, which ones to
11 delay, and which ones to drop. This is the job of the queueing
12 disciplines, several different algorithms for how to do this
17 able to choose from among several alternative algorithms which can
18 then be attached to different network devices. This is useful for
20 need a certain minimum data flow rate, or if you need to limit the
22 This code is considered to be experimental.
30 This Quality of Service (QoS) support will enable you to use
32 (RSVP) on your Linux router if you also say Y to the corresponding
36 If you say Y here and to "/proc file system" below, you will be able
37 to read status information about packet schedulers from the file
41 can say Y to as many as you like. If unsure, say N now.
50 Say Y here if you want to use the Class-Based Queueing (CBQ) packet
58 say Y here. Then say Y to all the queueing algorithms below that you
59 want to use as leaf disciplines.
67 Say Y here if you want to use the Hierarchical Token Buckets (HTB)
72 HTB is very similar to CBQ regarding its goals however is has
81 Say Y here if you want to use the Hierarchical Fair Service Curve
91 Say Y here if you want to use the ATM pseudo-scheduler. This
94 the flow(s) it is handling to a given virtual circuit.
104 Say Y here if you want to use an n-band priority queue packet
113 Say Y here if you want to use an n-band queue packet scheduler
114 to support devices that have multiple hardware transmit queues.
122 Say Y here if you want to use the Random Early Detection (RED)
133 Say Y here if you want to use the Stochastic Fair Blue (SFB)
144 Say Y here if you want to use the Stochastic Fairness Queueing (SFQ)
155 Say Y here if you want to use the True Link Equalizer (TLE) packet
167 Say Y here if you want to use the Token Bucket Filter (TBF) packet
178 Say Y here if you want to use the Generic Random Early Detection
189 Say Y if you want to schedule packets according to the
191 Technical information on this method, with pointers to associated
200 Say Y if you want to emulate network delay, loss, and packet
201 re-ordering. This is often useful to simulate networks when
212 Say Y here if you want to use the Deficit Round Robin (DRR) packet
223 Say Y here if you want to use the Multi-queue Priority scheduler.
224 This scheduler allows QOS to be offloaded on NICs that have support
235 Say Y here if you want to use the CHOKe packet scheduler (CHOose
237 flows). This is a variation of RED which trys to penalize flows
246 Say Y here if you want to use the Quick Fair Queueing Scheduler (QFQ)
257 Say Y here if you want to use the Controlled Delay (CODEL)
268 Say Y here if you want to use the FQ Controlled Delay (FQ_CODEL)
279 Say Y here if you want to use the FQ packet scheduling algorithm.
281 FQ does flow separation, and is able to respect pacing requirements
293 Say Y here if you want to use the Heavy-Hitter Filter (HHF)
302 Say Y here if you want to use the Proportional Integral controller
317 Say Y here if you want to use classifiers for incoming packets.
327 This queuing discipline allows userspace to plug/unplug a network
330 causes following packets to enqueue until a dequeue command arrives
331 over netlink, causing the plug to be removed and resuming the normal
336 command, only packets up to the first plug are released for delivery.
337 The Remus HA project uses this module to enable speculative execution
338 of virtual machines by allowing the generated network output to be rolled
341 For more information, please refer to <http://wiki.xenproject.org/wiki/Remus>
344 want to protect Xen guests with Remus.
358 Say Y here if you want to be able to classify packets using
368 Say Y here if you want to be able to classify packets based on
370 to implement Differentiated Services together with DSMARK.
381 If you say Y here, you will be able to classify packets
382 according to the route table entry they matched.
391 If you say Y here, you will be able to classify packets
392 according to netfilter/firewall marks.
401 Say Y here to be able to classify packets using a universal
411 Say Y here to make u32 gather additional statistics useful for
418 Say Y here to be able to use netfilter marks as u32 key.
424 The Resource Reservation Protocol (RSVP) permits end systems to
428 Say Y here if you want to be able to classify outgoing packets based
438 The Resource Reservation Protocol (RSVP) permits end systems to
442 Say Y here if you want to be able to classify outgoing packets based
452 If you say Y here, you will be able to classify packets based on
465 Say Y here if you want to classify packets based on the control
475 If you say Y here, you will be able to classify packets based on
476 programmable BPF (JIT'ed) filters as an alternative to ematches.
485 If you say Y here, you will be able to classify packets based on
495 Say Y here if you want to use extended matches on top of classifiers
501 A recent version of the iproute2 package is required to use
518 Say Y here if you want to be able to classify packets based on
528 Say Y here if you want to be able to classify packets based on
538 Say Y here if you want to be able to classify packets using
548 Say Y here if you want to be able to classify packets based on
563 Say Y here if you want to be able to classify packets based on
573 Say Y here if you want to be able to classify CAN frames based
583 Say Y here if you want to be able to classify packets based on
592 Say Y here if you want to use traffic control actions. Actions
593 get attached to classifiers and are invoked after a successful
594 classification. They are used to overwrite the classification
597 A recent version of the iproute2 package is required to use
604 Say Y here if you want to do traffic policing, i.e. strict
615 Say Y here to take generic actions such as dropping and
625 Say Y here to use the generic action randomly or deterministically.
631 Say Y here to allow packets to be mirrored or redirected to
641 Say Y here to be able to invoke iptables targets after successful
651 Say Y here to do stateless NAT on IPv4 packets. You should use
661 Say Y here if you want to mangle the content of packets.
670 Say Y here to add a simple action for demonstration purposes.
673 to the console for every packet that passes by.
684 Say Y here to change skb priority or queue_mapping settings.
695 Say Y here to update some common checksum after some direct
705 Say Y here to push or pop vlan headers.
716 Say Y here to execute BPF code on packets. The BPF code will decide
729 Say Y here to allow retrieving of conn mark
740 Say Y here to extend the u32 and fw classifier to support
742 likely to disappear in favour of the metadata ematch.