RFC 3786 (rfc3786) - Page 1 of 14


Extending the Number of Intermediate System to Intermediate System (IS-IS) Link State PDU (LSP) Fragments Beyond the 256 Limit



Alternative Format: Original Text Document



Network Working Group                                        A. Hermelin
Request for Comments: 3786                                 Montilio Inc.
Category: Informational                                       S. Previdi
                                                                M. Shand
                                                           Cisco Systems
                                                                May 2004


                        Extending the Number of
          Intermediate System to Intermediate System (IS-IS)
          Link State PDU (LSP) Fragments Beyond the 256 Limit

Status of this Memo

   This memo provides information for the Internet community.  It does
   not specify an Internet standard of any kind.  Distribution of this
   memo is unlimited.

Copyright Notice

   Copyright (C) The Internet Society (2004).  All Rights Reserved.

Abstract

   This document describes a mechanism that allows a system to originate
   more than 256 Link State PDU (LSP) fragments, a limit set by the
   original Intermediate System to Intermediate System (IS-IS) Routing
   protocol, as described in ISO/IEC 10589.  This mechanism can be used
   in IP-only, OSI-only, and dual routers.

Table of Contents

   1.  Introduction .................................................  2
       1.1.  Keywords ...............................................  2
       1.2.  Definitions of Commonly Used Terms .....................  2
       1.3.  Operation Modes ........................................  3
       1.4.  Overview ...............................................  4
   2.  IS Alias ID TLV (IS-A) .......................................  5
   3.  Generating LSPs ..............................................  6
       3.1.  Both Operation Modes ...................................  6
       3.2.  Operation Mode 1 Additives .............................  8
   4.  Purging Extended LSP Fragments ............................... 10
   5.  Modifications to LSP handling in SPF ......................... 10
   6.  Forming Adjacencies .......................................... 11
   7.  Interoperating between extension-capable and non-capable ISs . 11
   8.  Security Considerations ...................................... 12
   9.  Acknowledgements ............................................. 12




Hermelin, et al.             Informational