1991
DOI: 10.17487/rfc1247
|View full text |Cite
|
Sign up to set email alerts
|

OSPF Version 2

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
83
0

Year Published

2002
2002
2022
2022

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 159 publications
(84 citation statements)
references
References 0 publications
0
83
0
Order By: Relevance
“…On the other hand, our protocol is a link state protocol which includes bandwidth and load in its final decisions. There are many link state protocols described in the literature [1,9,14,17,24,28]. We considered OSPF as a well known and most used protocol addressed to wired networks.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…On the other hand, our protocol is a link state protocol which includes bandwidth and load in its final decisions. There are many link state protocols described in the literature [1,9,14,17,24,28]. We considered OSPF as a well known and most used protocol addressed to wired networks.…”
Section: Resultsmentioning
confidence: 99%
“…The routing algorithm proposed in this paper is based on link state routing protocols [10,11,24,28,44]. Considering the number of hops, bandwidth, load and delay we have created a new metric.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…The OSPF-TE routing protocol [5] is used to periodically flood the link state information to the MPLS routers (nodes). The link state information includes up/down status, ) changes by a given predetermined percentage (15% in this study) since the last update.…”
Section: B Open Shortest Path First (Ospf) Routing Protocolmentioning
confidence: 99%
“…Unfortunately, the traditional routing protocols on wired networks e.g. Route Information Protocol (RIP) [1], Open Shortest Path First (OSPF) [2] or Intermediate System to Intermediate System (IS-IS) [3] cannot be effectively operated on them due to the characteristics on ad hoc networks i.e. bandwidth-constrained, power-constrained and highly dynamic topology.…”
Section: Introductionmentioning
confidence: 99%