Talk:Flooding algorithm
Appearance
This is horribly oversimplified.
Are any ideas of this algorithm used in TCP/IP or UDP
If any ideas of flooding algorithm to some extend are used in TCP or UDP, please specify to what extend they are used and how. I believe some ideas of flooding algorithm are in fact used in TCP and UDP and it would be good to know the contrubution of this algorithm for most common protocols.