Talk:Flooding (computer networking)
![]() | Computing: Networking Start‑class Low‑importance | ||||||||||||
|
Are any ideas of this algorithm used in TCP/IP or UDP
If any ideas of flooding algorithm to some extend are used in TCP or UDP, please specify to what extend they are used and how. I believe some ideas of flooding algorithm are in fact used in TCP and UDP and it would be good to know the contrubution of this algorithm for most common protocols. —Preceding unsigned comment added by 206.3.139.2 (talk) 18:50, 22 February 2008 (UTC)
Merger proposal
This is basically the same thing as Flooding_algorithm, which is a much more complete article. L3prador (talk) 04:20, 5 May 2008 (UTC)
- I have moved all network-specific content from Flooding algorithm to here. --Kvng (talk) 15:40, 22 January 2012 (UTC)
Other
I went ahead and removed the cleanup tag after fixing (what I believe to be) all the grammar and spelling mistakes. I also fixed the formatting to make it more consistent with Wikipedia's guidelines. I tried to reference Ping floods and Denial of service attacks, but I realize this whole article could use some more material, hence the expert tag. Maura Dailey 20:15, 16 November 2006 (UTC)