Skip to main content

Recommendations for LSP Checksum Calculation and Related Processing in multi-vendor Networks using Intermediate System to Intermediate System
draft-li-isis-error-lsp-processing-03

Document Type Expired Internet-Draft (individual)
Expired & archived
Authors Zhenqiang Li , Yue Qin , Jie Dong
Last updated 2010-03-07
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

Recommendations for Interoperable Networks using Intermediate System to Intermediate System (IS-IS) [RFC3719] highlights a number of differences between the IS-IS protocol as described in ISO 10589 and the protocol as it is deployed today. This document outlines a number of differences found in the China Mobile backbone network, which is constructed using routers from several manufacturers. These differences include LSP checksum calculation, zero checksum LSP processing, zero remaining lifetime LSP processing, and corrupt LSP processing. This document is intended to provide best current practices to facilitate interoperability and maintain network stability.

Authors

Zhenqiang Li
Yue Qin
Jie Dong

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)