RIP Version 2 Carrying Additional Information

نویسنده

  • Gary Scott Malkin
چکیده

This document specifies an extension of the Routing Information Protocol (RIP), as defined in [1,2], to expand the amount of useful information carried in RIP messages and to add a measure of security. This memo obsoletes RFC 1388, which specifies an update to the "Routing Information Protocol" STD 34, RFC 1058. The RIP-2 protocol analysis is documented in RFC 1721 [4]. The RIP-2 applicability statement is document in RFC 1722 [5]. The RIP-2 MIB description is defined in RFC 1724 [3]. This memo obsoletes RFC 1389. Acknowledgements I would like to thank the IETF ripv2 Working Group for their help in improving the RIP-2 protocol. Malkin [Page 1] RFC1723 RFC.net Page 2 of 10 RFC 1723 RIP Version 2 November 1994

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Assessing Tumor Progression Factors by Somatic Gene Transfer into a Mouse Model: Bcl-xL Promotes Islet Tumor Cell Invasion

Tumors develop through multiple stages, implicating multiple effectors, but the tools to assess how candidate genes contribute to stepwise tumor progression have been limited. We have developed a novel system in which progression of phenotypes in a mouse model of pancreatic islet cell tumorigenesis can be used to measure the effects of genes introduced by cell-type-specific infection with retro...

متن کامل

Managing Complexity of Designing Routing Protocols Using a Middleware Approach

Designing and architecting new routing protocols is an expensive task, because they are complex systems managing distributed network state, in order to create and maintain the routing databases. Existing routing protocol implementations are compact, bundling together a database, an optimal path calculation algorithm and a network state distribution mechanism. The aim of this paper is to present...

متن کامل

Secure Routing Protocols Using Consistency Checks and S-RIP

Internet routing infrastructures are vulnerable to various attacks due to the lack of strong authentication mechanisms, software vulnerabilities/misconfiguration, and the risky assumption of a trustworthy and cooperative environment. Existing solutions do not solve the problem because they neither validate factual correctness of routing updates nor support incremental deployment. In this paper,...

متن کامل

Numerical modelling of induced rip currents by discontinuous submerged breakwaters

Submerged breakwaters are one of the shore protective structures. Any discontinuity in these breakwaters causes changes on current parameters including speed and water surface profile. In this paper, discontinuous submerged breakwaters were modelled to investigate the changes in the wave and flow pattern.To investigate the phenomenon, three models including a shore with constant slope, a shore ...

متن کامل

Summary of Cryptographic Authentication Algorithm Implementation Requirements for Routing Protocols

The routing protocols Open Shortest Path First version 2 (OSPFv2), Intermediate System to Intermediate System (IS-IS), and Routing Information Protocol (RIP) currently define cleartext and MD5 (Message Digest 5) methods for authenticating protocol packets. Recently, effort has been made to add support for the SHA (Secure Hash Algorithm) family of hash functions for the purpose of authenticating...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • RFC

دوره 1388  شماره 

صفحات  -

تاریخ انتشار 1993