Recommendations for Interoperable Networks using Intermediate System to Intermediate System (IS-IS)
نویسنده
چکیده
Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract This document discusses a number of differences between the Intermediate System to Intermediate System (IS-IS) protocol as described in ISO 10589 and the protocol as it is deployed today. These differences are discussed as a service to those implementing, testing, and deploying the IS-IS Protocol. A companion document discusses differences between the protocol described in RFC 1195 and the protocol as it is deployed today for routing IP traffic.
منابع مشابه
Securing AODV routing protocol against the black hole attack using Firefly algorithm
Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...
متن کاملAn Investigation of the Composition of Iran's Import Demand: Capital, Intermediate and Consumer Goods during 1978-2004
The objective of this study has been to develop a typical specification of the Almost Ideal Demand System (AIDS) for Iranâs composition of imports including capital, intermediate and consumer goods. Accordingly, we first test the hypotheses that import demand is homothetic, homogeneous, symmetric, and depends on domestic prices. Then, we estimate the long-run elasticities of the composition o...
متن کاملA model for the dynamical study of food-chain system considering interference of top predator in a polluted environment
The modeling investigation in this paper discusses the system level effects of a toxicant on a three species food chain system. In the models, we have assumed that the presence of top predator reduces the predatory ability of the intermediate predator. The stability analysis of the models is carried out and the sufficient conditions for the existence and extinction of the populations under the ...
متن کاملبهبود پروتکل AODV جهت مقابله با حملات کرمچاله در شبکههای اقتضایی
Mobile Ad hoc Networks (MANET) are vulnerable to both active and passive attacks. The wormhole attack is one of the most severe security attacks in wireless ad hoc networks, an attack that can be mounted on a wide range of wireless network protocols without compromising any cryptographic quantity or network node. In Wormhole attacks, one malicious node tunnels packets from its location to the ...
متن کاملIT System-based Instruction vs. Traditional Instruction of Teaching Reading Comprehension: A case of low-intermediate EFL learners
Abstract The present study was an attempt to investigate the effect of IT system-based instruction vs. traditional instruction of teaching English on Iranian low-intermediate EFL learners’ reading comprehension ability in a smart school in Tonekabon, Mazandaran, Iran. To collect the data, 60 low-intermediate high school learners took part in the study. As to the homogeneity of the participants,...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- RFC
دوره 3719 شماره
صفحات -
تاریخ انتشار 2004