Recommendations for Interoperable Networks using Intermediate System to Intermediate System (IS-IS)

نویسنده

  • Jeff Parker
چکیده

Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract This document discusses a number of differences between the Intermediate System to Intermediate System (IS-IS) protocol as described in ISO 10589 and the protocol as it is deployed today. These differences are discussed as a service to those implementing, testing, and deploying the IS-IS Protocol. A companion document discusses differences between the protocol described in RFC 1195 and the protocol as it is deployed today for routing IP traffic.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Securing AODV routing protocol against the black hole attack using Firefly algorithm

Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...

متن کامل

An Investigation of the Composition of Iran's Import Demand: Capital, Intermediate and Consumer Goods during 1978-2004

The objective of this study has been to develop a typical specification of the Almost Ideal Demand System (AIDS) for Iran’s composition of imports including capital, intermediate and consumer goods. Accordingly, we first test the hypotheses that import demand is homothetic, homogeneous, symmetric, and depends on domestic prices. Then, we estimate the long-run elasticities of the composition o...

متن کامل

A model for the dynamical study of food-chain system considering interference of top predator in a polluted environment

The modeling investigation in this paper discusses the system level effects of a toxicant on a three species food chain system. In the models, we have assumed that the presence of top predator reduces the predatory ability of the intermediate predator. The stability analysis of the models is carried out and the sufficient conditions for the existence and extinction of the populations under the ...

متن کامل

بهبود پروتکل AODV جهت مقابله با حملات کرم‌چاله در شبکه‌های اقتضایی

Mobile Ad hoc Networks (MANET) are vulnerable to both active and passive attacks. The wormhole attack is one of the most severe security attacks in wireless ad hoc networks, an attack that can be mounted on a wide range of wireless network protocols without compromising any cryptographic quantity or network node.  In Wormhole attacks, one malicious node tunnels packets from its location to the ...

متن کامل

IT System-based Instruction vs. Traditional Instruction of Teaching Reading Comprehension: A case of low-intermediate EFL learners

Abstract The present study was an attempt to investigate the effect of IT system-based instruction vs. traditional instruction of teaching English on Iranian low-intermediate EFL learners’ reading comprehension ability in a smart school in Tonekabon, Mazandaran, Iran. To collect the data, 60 low-intermediate high school learners took part in the study. As to the homogeneity of the participants,...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • RFC

دوره 3719  شماره 

صفحات  -

تاریخ انتشار 2004