Talk:Flooding (computer networking)
This article is rated Start-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | ||||||||||||||
|
Are any ideas of this algorithm used in TCP/IP or UDP
editIf any ideas of flooding algorithm to some extend are used in TCP or UDP, please specify to what extend they are used and how. I believe some ideas of flooding algorithm are in fact used in TCP and UDP and it would be good to know the contrubution of this algorithm for most common protocols. —Preceding unsigned comment added by 206.3.139.2 (talk) 18:50, 22 February 2008 (UTC)
Merger proposal
editThis is basically the same thing as Flooding_algorithm, which is a much more complete article. L3prador (talk) 04:20, 5 May 2008 (UTC)
- I have moved all network-specific content from Flooding algorithm to here. --Kvng (talk) 15:40, 22 January 2012 (UTC)
Other
editI went ahead and removed the cleanup tag after fixing (what I believe to be) all the grammar and spelling mistakes. I also fixed the formatting to make it more consistent with Wikipedia's guidelines. I tried to reference Ping floods and Denial of service attacks, but I realize this whole article could use some more material, hence the expert tag. Maura Dailey 20:15, 16 November 2006 (UTC)
Animated GIF
editThe second animation is working only if you watch the GIF file directly, and not from the actual article. — Preceding unsigned comment added by Ore4444 (talk • contribs) 07:47, 12 June 2012 (UTC)
Flood search routing
editIs this distinct enough from flood search routing to keep separate articles for both? The latter article seems to be primarily concerned with telephony rather than datacomm.--Srleffler (talk) 03:51, 13 August 2014 (UTC)