Recommendations for LSP Checksum Calculation and Related Processing in multi-vendor Networks using Intermediate System to Intermediate System
draft-li-isis-error-lsp-processing-03
Document | Type |
Expired Internet-Draft
(individual)
Expired & archived
|
|
---|---|---|---|
Authors | Zhenqiang Li , Yue Qin , Jie Dong | ||
Last updated | 2010-03-07 | ||
RFC stream | (None) | ||
Intended RFC status | (None) | ||
Formats | |||
Stream | Stream state | (No stream defined) | |
Consensus boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
Recommendations for Interoperable Networks using Intermediate System to Intermediate System (IS-IS) [RFC3719] highlights a number of differences between the IS-IS protocol as described in ISO 10589 and the protocol as it is deployed today. This document outlines a number of differences found in the China Mobile backbone network, which is constructed using routers from several manufacturers. These differences include LSP checksum calculation, zero checksum LSP processing, zero remaining lifetime LSP processing, and corrupt LSP processing. This document is intended to provide best current practices to facilitate interoperability and maintain network stability.
Authors
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)