RFC 1264 (rfc1264) - Page 2 of 8
Internet Engineering Task Force Internet Routing Protocol Standardization Criteria
Alternative Format: Original Text Document
RFC 1264 Routing Protocol Criteria October 1991
Routing protocols are complex, widely distributed, real-time
algorithms. They are difficult to implement and to test. Even
though a protocol may work in one environment with one
implementation, that does not ensure that it will work in a different
environment with multiple vendors. A routing protocol may work well
within a range of topologies and number of networks and routers, but
may fail when an unforeseen limit is reached. The result is that
even with considerable operational experience, it is hard to
guarantee that the protocol is mature enough for widespread
deployment.
The Internet is currently growing at an exponential rate. Routing
protocols and the management of internet addressing are key elements
in the successful operation the Internet. It is important that new
routing protocols be designed to support this rapid growth.
3.0 General Requirements
1) Documents specifying the Protocol and its Usage. This may be
one or more documents. The specifications for the routing
protocol must be well written such that independent,
interoperable implementations can be developed solely based on
the specification. For example, it should be possible to
develop an interoperable implementation without consulting the
original developers of the routing protocol.
2) A Management Information Base (MIB) must be written for the
protocol. Routing protocols, like all other internet protocols,
need a MIB defined so they can be remotely managed.
3) A security architecture of the protocol must be defined. The
security architecture must include mechanisms for authenticating
routing messages and may include other forms of protection.
4) Generally, a number of interoperable implementations must
exist. At least two must be written independently.
5) There must be evidence that all features of the protocol have
been tested, running between at least two implementations. This
must include that all of the security features have been
demonstrated to operate, and that the mechanisms defined in the
protocol actually provide the intended protection.
6) There must be operational experience with the routing
protocol. The level of operational experience required is
dependent on which level of standardization is requested. All
significant features of the protocol must be exercised. In the
case of an Interior Gateway Protocol (IGP), both interior and
Hinden