From owner-freebsd-hackers Thu May 25 10:21:17 1995 Return-Path: hackers-owner Received: (from majordom@localhost) by freefall.cdrom.com (8.6.10/8.6.6) id KAA01356 for hackers-outgoing; Thu, 25 May 1995 10:21:17 -0700 Received: from ref.tfs.com (ref.tfs.com [140.145.254.251]) by freefall.cdrom.com (8.6.10/8.6.6) with ESMTP id KAA01350 for ; Thu, 25 May 1995 10:21:16 -0700 Received: (from phk@localhost) by ref.tfs.com (8.6.8/8.6.6) id KAA26940; Thu, 25 May 1995 10:21:11 -0700 From: Poul-Henning Kamp Message-Id: <199505251721.KAA26940@ref.tfs.com> Subject: Re: Speeding up your slip link To: pritc003@maroon.tc.umn.edu (Mike Pritchard) Date: Thu, 25 May 1995 10:21:11 -0700 (PDT) Cc: hackers@FreeBSD.org In-Reply-To: <199505251707.MAA00815@mpp.com> from "Mike Pritchard" at May 25, 95 12:07:29 pm Content-Type: text Content-Length: 956 Sender: hackers-owner@FreeBSD.org Precedence: bulk > Just in case anyone is interested, one way I found to squeeze a > few more bytes through your SLIP link is to set "tcp_extensions=NO" > in your /etc/sysconfig file. This disables the RFC1323 & RFC1644 > extensions, which are really intended for high speed links. > In fact, RFC1323 even suggests disabling it on slow links. > > If you don't normally connect to other hosts that support RFC1323 > and RFC1644 then you won't see any difference. To determine if > a host you are connecting to supports RFC1323, try examining > some traffic to/from that machine with "tcpdump". If it indicates > that the "timestamp" option was present, then it is sending > the extra RFC1323 data. I guess we really should have a "bandwidth" for each interface and link it to that... -- Poul-Henning Kamp -- TRW Financial Systems, Inc. 'All relevant people are pertinent' && 'All rude people are impertinent' => 'no rude people are relevant'