RFC 1264 (rfc1264): Internet Engineering Task Force Internet Routing Protocol Standardization Criteria – RFC Database – eLook.org

RFC 1264 (rfc1264) – Page 2 of 8

Internet Engineering Task Force Internet Routing Protocol Standardization Criteria

Alternative Format: Original Text Document

RFC 1264               Routing Protocol Criteria            October 1991


   Routing protocols are complex, widely distributed, real-time
   algorithms.  They are difficult to implement and to test.  Even
   though a protocol may work in one environment with one
   implementation, that does not ensure that it will work in a different
   environment with multiple vendors.  A routing protocol may work well
   within a range of topologies and number of networks and routers, but
   may fail when an unforeseen limit is reached.  The result is that
   even with considerable operational experience, it is hard to
   guarantee that the protocol is mature enough for widespread
   deployment.

   The Internet is currently growing at an exponential rate.  Routing
   protocols and the management of internet addressing are key elements
   in the successful operation the Internet.  It is important that new
   routing protocols be designed to support this rapid growth.

3.0 General Requirements

   1) Documents specifying the Protocol and its Usage.  This may be
      one or more documents.  The specifications for the routing
      protocol must be well written such that independent,
      interoperable implementations can be developed solely based on
      the specification.  For example, it should be possible to
      develop an interoperable implementation without consulting the
      original developers of the routing protocol.

   2) A Management Information Base (MIB) must be written for the
      protocol.  Routing protocols, like all other internet protocols,
      need a MIB defined so they can be remotely managed.

   3) A security architecture of the protocol must be defined.  The
      security architecture must include mechanisms for authenticating
      routing messages and may include other forms of protection.

   4) Generally, a number of interoperable implementations must
      exist.  At least two must be written independently.

   5) There must be evidence that all features of the protocol have
      been tested, running between at least two implementations.  This
      must include that all of the security features have been
      demonstrated to operate, and that the mechanisms defined in the
      protocol actually provide the intended protection.

   6) There must be operational experience with the routing
      protocol.  The level of operational experience required is
      dependent on which level of standardization is requested.  All
      significant features of the protocol must be exercised.  In the
      case of an Interior Gateway Protocol (IGP), both interior and



Hinden
Read More
2 weeks ago
40
2 weeks ago
28
2 weeks ago
30

New Casinos
Download the latest version of Dragon Tiger online casino APK for Android! Enjoy safe, free gameplay and unleash your luck in this thrilling card game.
Explore Mascot Gaming's top online casinos and gaming slots! Discover exciting bonuses, thrilling casino games, and the best mascot gaming slots for 2024!
Best online casino games on Banger.casino! Play on mobile apps or desktop and win real money. ✓ Get your welcome bonus +125% UP TO €250 right now!

© Copyright 2024 | Elook.org