OSPF and IS-IS: Choosing an IGP for Large-Scale Networks: Choosing an IGP for Large-Scale Networks

Index

[A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Z]

AAA (authentication, authorization, and accounting),

Abramson, Norman,

ABRs (area border routers),

accessing policies,

Acknowledgment packet,

acknowledgments

     LSAs

     LSPs

acquiring RIDs,

addresses

     BGP summarization

    IPv6

         formats,

         representations,

     IS-IS summarization

     NSAP

     OSPF summarization

     stateless autoconfiguration

adjacencies, 2nd

     IS-IS

         broadcast networks,

         point-to-point networks,

     neighbors

     OSPF

     point-to-point over Ethernet

     routers

administration (RIDs),

Advanced Research Projects Agency (ARPA),

Advertising Routers,

AFI (Authority and Format Identifier),

age of the LSA in seconds,

aging,

AID (area ID),

     IS-IS

     multiple

algorithms

     Bellman-Ford 2nd

     Dijkstra 2nd

     DUAL

     Ford-Fulkerson

     metric calculation

     SPF 2nd

         delay,

         equal-cost multipath,

         iSPF calculations,

         partial route calculations,

announcement headers,

ANSI (American National Standards Institute),

Anycast addresses,

Application-Specific Integrated Circuits (ASICs),

applications, virtual links,

architecture, message types,

archives,

Area Address TLVs, 2nd

area border routers (ABRs),

area ID (AID),

     IS-IS

     multiple

areas, 2nd

     backbones

    design

         BGP,

         IS-IS,

         OSPF,

         reliability,

         scalability,

     fragmentation

     Inter-Area Prefix LSAs

     Inter-Area Router LSAs

     Intra-Area Prefix LSAs

     IS-IS

     nonbackbone

     OSPF

     overloading

     partitioned

     stubs

         not-so-stubby,

         totally stubby,

ARPA (Advanced Research Projects Agency),

ARPA Network (ARPANET), 2nd

AS (autonomous system), 2nd

AS-External LSAs, 2nd

ASBRs (autonomous system boundary routers), 2nd

     Summary LSAs

ASICs (Application-Specific Integrated Circuits),

attacks

     DoS

     routing protocols

authentication,

     IS-IS

     OSPF

authentication, authorization, and accounting. [See AAA]

Authority and Format Identifier (AFI),

autoconfiguration, stateless addresses,

autonomous system (AS), 2nd

autonomous system boundary routers (ASBRs), 2nd

     Summary LSAs

Категории