Searched refs:burst (Results 1 - 25 of 31) sorted by relevance

12

/external/iproute2/tc/
H A Dtc_red.h5 extern int tc_red_eval_ewma(unsigned qmin, unsigned burst, unsigned avpkt);
H A Dtc_red.c50 burst + 1 - qmin/avpkt < (1-(1-W)^burst)/W
53 int tc_red_eval_ewma(unsigned qmin, unsigned burst, unsigned avpkt) argument
57 double a = (double)burst + 1 - (double)qmin/avpkt;
60 fprintf(stderr, "tc_red_eval_ewma() burst %u is too small ?"
61 " Try burst %u\n", burst, 1 + qmin/avpkt);
65 if (a <= (1 - pow(1-W, burst))/W)
H A Dq_choke.c31 fprintf(stderr, " [ min PACKETS ] [ max PACKETS ] [ burst PACKETS ]\n");
38 unsigned burst = 0; local
77 } else if (strcmp(*argv, "burst") == 0) {
79 if (get_unsigned(&burst, *argv, 0)) {
80 fprintf(stderr, "Illegal \"burst\"\n");
119 if (!burst)
120 burst = (2 * opt.qth_min + opt.qth_max) / 3;
132 wlog = tc_red_eval_ewma(opt.qth_min*avpkt, burst, avpkt);
138 fprintf(stderr, "CHOKE: WARNING. Burst %d seems to be too large.\n", burst);
H A Dq_red.c31 fprintf(stderr, "Usage: ... red limit BYTES [min BYTES] [max BYTES] avpkt BYTES [burst PACKETS]\n");
39 unsigned burst = 0; local
69 } else if (strcmp(*argv, "burst") == 0) {
71 if (get_unsigned(&burst, *argv, 0)) {
72 fprintf(stderr, "Illegal \"burst\"\n");
127 if (!burst)
128 burst = (2 * opt.qth_min + opt.qth_max) / (3 * avpkt);
129 if ((wlog = tc_red_eval_ewma(opt.qth_min, burst, avpkt)) < 0) {
134 fprintf(stderr, "RED: WARNING. Burst %d seems to be too large.\n", burst);
H A Dq_sfq.c34 fprintf(stderr, " [ avpkt BYTES ] [ burst PACKETS ] [ probability P ]\n");
42 unsigned int burst = 0; local
120 } else if (strcmp(*argv, "burst") == 0) {
122 if (get_unsigned(&burst, *argv, 0)) {
123 fprintf(stderr, "Illegal \"burst\"\n");
170 if (!burst)
171 burst = (2 * opt.qth_min + opt.qth_max) / (3 * avpkt);
183 wlog = tc_red_eval_ewma(opt.qth_min, burst, avpkt);
189 fprintf(stderr, "SFQ: WARNING. Burst %u seems to be too large.\n", burst);
H A Dq_gred.c42 fprintf(stderr, " avpkt BYTES burst PACKETS probability PROBABILITY "
122 unsigned burst = 0; local
173 } else if (strcmp(*argv, "burst") == 0) {
175 if (get_unsigned(&burst, *argv, 0)) {
176 fprintf(stderr, "Illegal \"burst\"\n");
226 if (!burst) {
227 burst = (2 * opt.qth_min + opt.qth_max) / (3 * avpkt);
228 fprintf(stderr, "GRED: set burst to %u\n", burst);
231 if ((wlog = tc_red_eval_ewma(opt.qth_min, burst, avpk
[all...]
H A Dm_police.c37 fprintf(stderr, "Usage: ... police rate BPS burst BYTES[/BYTES] [ mtu BYTES[/BYTES] ]\n");
159 } else if (matches(*argv, "burst") == 0 ||
164 fprintf(stderr, "Double \"buffer/burst\" spec\n");
263 fprintf(stderr, "\"burst\" requires \"rate\".\n");
284 p.burst = tc_calc_xmittime(p.rate.rate, buffer);
348 buffer = tc_calc_xmitsize(p->rate.rate, p->burst);
349 fprintf(f, "burst %s ", sprint_size(buffer, b1));
352 fprintf(f, "[%08x] ", p->burst);
/external/iptables/include/linux/netfilter/
H A Dxt_limit.h15 __u32 burst; /* Period multiplier for upper limit. */ member in struct:xt_rateinfo
H A Dxt_hashlimit.h29 __u32 burst; /* Period multiplier for upper limit. */ member in struct:hashlimit_cfg
53 __u32 burst; /* Period multiplier for upper limit. */ member in struct:hashlimit_cfg1
/external/kernel-headers/original/uapi/linux/netfilter/
H A Dxt_limit.h15 __u32 burst; /* Period multiplier for upper limit. */ member in struct:xt_rateinfo
H A Dxt_hashlimit.h30 __u32 burst; /* Period multiplier for upper limit. */ member in struct:hashlimit_cfg
54 __u32 burst; /* Period multiplier for upper limit. */ member in struct:hashlimit_cfg1
/external/kernel-headers/original/uapi/linux/netfilter_bridge/
H A Debt_limit.h16 __u32 burst; /* Period multiplier for upper limit. */ member in struct:ebt_limit_info
/external/iptables/extensions/
H A Dlibxt_limit.c31 "--limit-burst number number to match in a burst, default %u\n",
37 {.name = "limit-burst", .id = O_BURST, .type = XTTYPE_UINT32,
38 .flags = XTOPT_PUT, XTOPT_POINTER(struct xt_rateinfo, burst),
85 r->burst = XT_LIMIT_BURST;
90 if (r->avg*r->burst/r->burst != r->avg)
92 "Sorry: burst too large for that avg rate.\n");
143 printf(" burst %u", r->burst);
[all...]
H A Dlibxt_hashlimit.c48 "[--hashlimit-burst <num>] number to match in a burst, default %u\n"
88 " --hashlimit-burst <num> number to match in a burst, default %u\n"
100 {.name = "hashlimit-burst", .id = O_BURST, .type = XTTYPE_UINT32,
102 XTOPT_POINTER(s, cfg.burst)},
133 {.name = "hashlimit-burst", .id = O_BURST, .type = XTTYPE_STRING},
180 "\"--hashlimit-burst\", or out of range (1-%u).", XT_HASHLIMIT_BURST_MAX);
183 static uint32_t parse_burst(const char *burst, struct xt_hashlimit_mtinfo1 *info) argument
188 if (!xtables_strtoul(burst,
410 uint32_t burst = 0; local
465 print_bytes(uint32_t avg, uint32_t burst, const char *prefix) argument
[all...]
/external/chromium_org/net/quic/congestion_control/
H A Dhybrid_slow_start_test.cc57 // we expect to be able to send a burst of 30 packet before we trigger the
62 for (int burst = 0; burst < kMaxLoopCount; ++burst) {
89 // Will not trigger since our lowest RTT in our burst is the same as the long
100 // Expect to trigger since all packets in this burst was above the long term
/external/iproute2/examples/
H A DSYN-DoS.rate.limit36 police rate 1kbit burst 40 mtu 9k drop flowid :1
/external/linux-tools-perf/perf-3.12.0/arch/metag/lib/
H A Dmemset.S59 ! This does a byte structured burst of up to 7 bytes
63 ! D1Ar5 should be burst size (<= D1Ar3)
/external/iproute2/examples/diffserv/
H A DEdge238 # Allow up to at least 60 packets to burst (assuming maximum packet
44 police rate 1500kbit burst 90k mtu 9k drop flowid :1
/external/iproute2/include/linux/
H A Dpkt_cls.h129 __u32 burst; member in struct:tc_police
/external/libnl/include/linux/
H A Dpkt_cls.h132 __u32 burst; member in struct:tc_police
/external/kernel-headers/original/uapi/linux/
H A Dpkt_cls.h129 __u32 burst; member in struct:tc_police
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dap_config.h148 int burst; /* maximum burst time in 0.1 ms, i.e., 10 = 1 ms */ member in struct:hostapd_tx_queue_params
/external/wpa_supplicant_8/src/ap/
H A Dap_config.h148 int burst; /* maximum burst time in 0.1 ms, i.e., 10 = 1 ms */ member in struct:hostapd_tx_queue_params
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dap_config.h148 int burst; /* maximum burst time in 0.1 ms, i.e., 10 = 1 ms */ member in struct:hostapd_tx_queue_params
/external/iproute2/doc/
H A Dip-tunnels.tex436 rate 128Kbit burst 4K limit 10K
438 will limit tunneled traffic to 128Kbit with maximal burst size of 4K

Completed in 310 milliseconds

12