1989
DOI: 10.17487/rfc1131
|View full text |Cite
|
Sign up to set email alerts
|

OSPF specification

Abstract: All OSPF protocol exchanges are authenticated. The OSPF packet header (see Section A.2) includes an authentication type field, and 64-bits of data used by the appropriate authentication scheme (determined by the type field). The authentication type is configurable on a per-area basis. Additional authentication data is configurable on a perinterface basis. For example, if an area uses a simple password scheme for authentication, a separate password may be configured for each network contained in the area. Authe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2001
2001
2012
2012

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 42 publications
(19 citation statements)
references
References 0 publications
0
19
0
Order By: Relevance
“…The field of address is expanded to 6 octets and only physical ports numbers are used to identify interfaces. RIP [7], OSPF [8] and other protocols could be transformed into E6RIP, E6OSPF and so on. E6-IP gateways can work on the base of NAT [9] or proxy-server technology.…”
Section: An Example Of E6 Networkmentioning
confidence: 99%
“…The field of address is expanded to 6 octets and only physical ports numbers are used to identify interfaces. RIP [7], OSPF [8] and other protocols could be transformed into E6RIP, E6OSPF and so on. E6-IP gateways can work on the base of NAT [9] or proxy-server technology.…”
Section: An Example Of E6 Networkmentioning
confidence: 99%
“…For non-active destinations in the network, a popular link state routing algorithm like OSPF2 [16,17] can do the route calculation. Because, in our routing scheme, each initiating active destination(server) takes charge of its route recomputations, the updating of routes to each active destination is uncorrelated.…”
Section: Basic Ideamentioning
confidence: 99%
“…The bandwidth calculation is based on the aggregate traffic of the neighborhood and is performed on the MAC Layer. AQOR proposes to use HELLO-packets [32] to keep an updated view of the neighborhood. It reserves bandwidth on each node along a path that is being used by the source.…”
Section: Related Workmentioning
confidence: 99%
“…The admission control analyzes the available bandwidth to allow the selection of an MPR by a new node. They use HELLO Message format [32] with a willingness field, which indicates how willing a MN is to be a MPR point.…”
Section: Related Workmentioning
confidence: 99%