亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? rfc2453.txt

?? <VC++網絡游戲建摸與實現>源代碼
?? TXT
?? 第 1 頁 / 共 5 頁
字號:
Network Working Group                                          G. MalkinRequest for Comments: 2453                                  Bay NetworksObsoletes: 1723, 1388                                      November 1998STD: 56Category: Standards Track                             RIP Version 2Status of this Memo   This document specifies an Internet standards track protocol for the   Internet community, and requests discussion and suggestions for   improvements.  Please refer to the current edition of the "Internet   Official Protocol Standards" (STD 1) for the standardization state   and status of this protocol.  Distribution of this memo is unlimited.Copyright Notice   Copyright (C) The Internet Society (1998).  All Rights Reserved.Abstract   This document specifies an extension of the Routing Information   Protocol (RIP), as defined in [1], to expand the amount of useful   information carried in RIP messages and to add a measure of security.   A companion document will define the SNMP MIB objects for RIP-2 [2].   An additional document will define cryptographic security   improvements for RIP-2 [3].Acknowledgements   I would like to thank the IETF RIP Working Group for their help in   improving the RIP-2 protocol. Much of the text for the background   discussions about distance vector protocols and some of the   descriptions of the operation of RIP were taken from "Routing   Information Protocol" by C. Hedrick [1]. Some of the final editing on   the document was done by Scott Bradner.Malkin                      Standards Track                     [Page 1]RFC 2453                     RIP Version 2                 November 1998Table of Contents   1.  Justification  . . . . . . . . . . . . . . . . . . . . . . . .  3   2.  Current RIP  . . . . . . . . . . . . . . . . . . . . . . . . .  3   3.  Basic Protocol . . . . . . . . . . . . . . . . . . . . . . . .  3   3.1   Introduction   . . . . . . . . . . . . . . . . . . . . . . .  3   3.2   Limitations of the Protocol  . . . . . . . . . . . . . . . .  5   3.3.  Organization of this document  . . . . . . . . . . . . . . .  6   3.4   Distance Vector Algorithms . . . . . . . . . . . . . . . . .  6   3.4.1    Dealing with changes in topology  . . . . . . . . . . . . 12   3.4.2    Preventing instability  . . . . . . . . . . . . . . . . . 13   3.4.3    Split horizon . . . . . . . . . . . . . . . . . . . . . . 15   3.4.4    Triggered updates . . . . . . . . . . . . . . . . . . . . 17   3.5   Protocol Specification   . . . . . . . . . . . . . . . . . . 18   3.6   Message Format . . . . . . . . . . . . . . . . . . . . . . . 20   3.7   Addressing Considerations  . . . . . . . . . . . . . . . . . 22   3.8   Timers . . . . . . . . . . . . . . . . . . . . . . . . . . . 24   3.9   Input Processing . . . . . . . . . . . . . . . . . . . . . . 25   3.9.1    Request Messages  . . . . . . . . . . . . . . . . . . . . 25   3.9.2    Response Messages . . . . . . . . . . . . . . . . . . . . 26   3.10  Output Processing  . . . . . . . . . . . . . . . . . . . . . 28   3.10.1   Triggered Updates . . . . . . . . . . . . . . . . . . . . 29   3.10.2   Generating Response Messages. . . . . . . . . . . . . . . 30   4.  Protocol Extensions  . . . . . . . . . . . . . . . . . . . . . 31   4.1   Authentication . . . . . . . . . . . . . . . . . . . . . . . 31   4.2   Route Tag  . . . . . . . . . . . . . . . . . . . . . . . . . 32   4.3   Subnet Mask  . . . . . . . . . . . . . . . . . . . . . . . . 32   4.4   Next Hop . . . . . . . . . . . . . . . . . . . . . . . . . . 33   4.5   Multicasting . . . . . . . . . . . . . . . . . . . . . . . . 33   4.6   Queries  . . . . . . . . . . . . . . . . . . . . . . . . . . 33   5.  Compatibility  . . . . . . . . . . . . . . . . . . . . . . . . 34   5.1   Compatibility Switch . . . . . . . . . . . . . . . . . . . . 34   5.2   Authentication . . . . . . . . . . . . . . . . . . . . . . . 34   5.3   Larger Infinity  . . . . . . . . . . . . . . . . . . . . . . 35   5.4   Addressless Links  . . . . . . . . . . . . . . . . . . . . . 35   6.  Interaction between version 1 and version 2  . . . . . . . . . 35   7.  Security Considerations  . . . . . . . . . . . . . . . . . . . 36   Appendices . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37   References . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37   Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 38   Full Copyright Statement . . . . . . . . . . . . . . . . . . . . . 39Malkin                      Standards Track                     [Page 2]RFC 2453                     RIP Version 2                 November 19981.  Justification   With the advent of OSPF and IS-IS, there are those who believe that   RIP is obsolete.  While it is true that the newer IGP routing   protocols are far superior to RIP, RIP does have some advantages.   Primarily, in a small network, RIP has very little overhead in terms   of bandwidth used and configuration and management time.  RIP is also   very easy to implement, especially in relation to the newer IGPs.   Additionally, there are many, many more RIP implementations in the   field than OSPF and IS-IS combined.  It is likely to remain that way   for some years yet.   Given that RIP will be useful in many environments for some period of   time, it is reasonable to increase RIP's usefulness.  This is   especially true since the gain is far greater than the expense of the   change.2. Current RIP   The current RIP-1 message contains the minimal amount of information   necessary for routers to route messages through a network.  It also   contains a large amount of unused space, owing to its origins.   The current RIP-1 protocol does not consider autonomous systems and   IGP/EGP interactions, subnetting [11], and authentication since   implementations of these postdate RIP-1.  The lack of subnet masks is   a particularly serious problem for routers since they need a subnet   mask to know how to determine a route.  If a RIP-1 route is a network   route (all non-network bits 0), the subnet mask equals the network   mask.  However, if some of the non-network bits are set, the router   cannot determine the subnet mask.  Worse still, the router cannot   determine if the RIP-1 route is a subnet route or a host route.   Currently, some routers simply choose the subnet mask of the   interface over which the route was learned and determine the route   type from that.3.  Basic Protocol3.1 Introduction   RIP is a routing protocol based on the Bellman-Ford (or distance   vector) algorithm.  This algorithm has been used for routing   computations in computer networks since the early days of the   ARPANET.  The particular packet formats and protocol described here   are based on the program "routed," which is included with the   Berkeley distribution of Unix.Malkin                      Standards Track                     [Page 3]RFC 2453                     RIP Version 2                 November 1998   In an international network, such as the Internet, it is very   unlikely that a single routing protocol will used for the entire   network.  Rather, the network will be organized as a collection of   Autonomous Systems (AS), each of which will, in general, be   administered by a single entity.  Each AS will have its own routing   technology, which may differ among AS's.  The routing protocol used   within an AS is referred to as an Interior Gateway Protocol (IGP).  A   separate protocol, called an Exterior Gateway Protocol (EGP), is used   to transfer routing information among the AS's.  RIP was designed to   work as an IGP in moderate-size AS's.  It is not intended for use in   more complex environments.  For information on the context into which   RIP-1 is expected to fit, see Braden and Postel [6].   RIP uses one of a class of routing algorithms known as Distance   Vector algorithms.  The earliest description of this class of   algorithms known to the author is in Ford and Fulkerson [8].  Because   of this, they are sometimes known as Ford-Fulkerson algorithms.  The   term Bellman-Ford is also used, and derives from the fact that the   formulation is based on Bellman's equation [4].  The presentation in   this document is closely based on [5].  This document contains a   protocol specification.  For an introduction to the mathematics of   routing algorithms, see [1].  The basic algorithms used by this   protocol were used in computer routing as early as 1969 in the   ARPANET.  However, the specific ancestry of this protocol is within   the Xerox network protocols.  The PUP protocols [7] used the Gateway   Information Protocol to exchange routing information.  A somewhat   updated version of this protocol was adopted for the Xerox Network   Systems (XNS) architecture, with the name Routing Information   Protocol [9].  Berkeley's routed is largely the same as the Routing   Information Protocol, with XNS addresses replaced by a more general   address format capable of handling IPv4 and other types of address,   and with routing updates limited to one every 30 seconds.  Because of   this similarity, the term Routing Information Protocol (or just RIP)   is used to refer to both the XNS protocol and the protocol used by   routed.   RIP is intended for use within the IP-based Internet.  The Internet   is organized into a number of networks connected by special purpose   gateways known as routers.  The networks may be either point-to-point   links or more complex networks such as Ethernet or token ring.  Hosts   and routers are presented with IP datagrams addressed to some host.   Routing is the method by which the host or router decides where to   send the datagram.  It may be able to send the datagram directly to   the destination, if that destination is on one of the networks that   are directly connected to the host or router.  However, the   interesting case is when the destination is not directly reachable.Malkin                      Standards Track                     [Page 4]RFC 2453                     RIP Version 2                 November 1998   In this case, the host or router attempts to send the datagram to a   router that is nearer the destination.  The goal of a routing   protocol is very simple: It is to supply the information that is   needed to do routing.3.2 Limitations of the Protocol   This protocol does not solve every possible routing problem.  As   mentioned above, it is primary intended for use as an IGP in networks   of moderate size.  In addition, the following specific limitations   are be mentioned:   - The protocol is limited to networks whose longest path (the     network's diameter) is 15 hops.  The designers believe that the     basic protocol design is inappropriate for larger networks.  Note     that this statement of the limit assumes that a cost of 1 is used     for each network.  This is the way RIP is normally configured.  If     the system administrator chooses to use larger costs, the upper     bound of 15 can easily become a problem.   - The protocol depends upon "counting to infinity" to resolve certain     unusual situations. (This will be explained in the next section.)     If the system of networks has several hundred networks, and a     routing loop was formed involving all of them, the resolution of     the loop would require either much time (if the frequency of     routing updates were limited) or bandwidth (if updates were sent     whenever changes were detected).  Such a loop would consume a large     amount of network bandwidth before the loop was corrected.  We     believe that in realistic cases, this will not be a problem except     on slow lines.  Even then, the problem will be fairly unusual,     since various precautions are taken that should prevent these     problems in most cases.   - This protocol uses fixed "metrics" to compare alternative routes.     It is not appropriate for situations where routes need to be chosen

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
中文字幕欧美日韩一区| 欧美日韩不卡在线| 中文字幕va一区二区三区| 国产精品正在播放| 国产精品素人视频| 91视视频在线观看入口直接观看www | 色哟哟一区二区在线观看| 一区二区三区不卡在线观看 | 国产中文字幕一区| 国产欧美精品日韩区二区麻豆天美| 国产精品综合一区二区三区| 国产日韩高清在线| 色诱视频网站一区| 日本亚洲天堂网| 久久久久久久综合日本| 91日韩在线专区| 日韩成人免费电影| 中文字幕欧美国产| 色综合久久久久综合| 丝袜美腿亚洲色图| 久久精品夜色噜噜亚洲a∨| www.99精品| 喷白浆一区二区| 国产精品国产三级国产a| 欧美日韩一区二区三区在线看| 免费一区二区视频| 国产精品另类一区| 欧美福利电影网| 成人午夜激情在线| 奇米色777欧美一区二区| 亚洲视频每日更新| 日韩欧美亚洲国产另类| 岛国av在线一区| 午夜久久福利影院| 国产精品午夜久久| 日韩一区二区影院| 一本色道久久综合狠狠躁的推荐| 美女视频黄频大全不卡视频在线播放| 国产亚洲综合性久久久影院| 日本一区二区三级电影在线观看| 日本高清不卡视频| 国产盗摄一区二区| 日本中文字幕一区二区视频| 中文字幕一区二区三区在线播放 | 欧美一区二区三级| 色综合中文字幕国产 | 国产精品夜夜爽| 五月天欧美精品| 亚洲免费视频中文字幕| 国产日韩视频一区二区三区| 欧美日韩中字一区| 91在线观看成人| 国产成人av电影在线观看| 肉肉av福利一精品导航| 亚洲欧美日韩中文播放 | 一区二区成人在线| 欧美激情中文不卡| www亚洲一区| 日韩视频不卡中文| 777色狠狠一区二区三区| 91麻豆视频网站| 91在线云播放| 不卡高清视频专区| 成人开心网精品视频| 黑人精品欧美一区二区蜜桃| 免播放器亚洲一区| 青青国产91久久久久久| 亚洲永久免费视频| 亚洲综合色婷婷| 一区二区三区蜜桃网| 自拍偷拍国产精品| 1024成人网| 亚洲日本欧美天堂| 亚洲欧美日韩一区二区 | 亚洲一区二区三区三| 亚洲免费视频成人| 亚洲综合另类小说| 亚洲图片欧美色图| 亚洲成人av一区二区三区| 亚洲成在人线免费| 人人超碰91尤物精品国产| 视频一区二区国产| 麻豆精品国产91久久久久久| 免费高清在线一区| 久久99国产精品免费| 国产一区二区三区高清播放| 国产毛片精品国产一区二区三区| 91麻豆精品国产综合久久久久久| 欧美性猛交一区二区三区精品| 欧美视频一二三区| 在线播放中文一区| 日韩免费观看高清完整版在线观看| 日韩美女视频一区二区在线观看| 精品99久久久久久| 中文字幕日本乱码精品影院| 日韩一区在线播放| 亚洲电影一级片| 久久se这里有精品| 成人免费视频app| 欧洲一区二区av| 精品国产凹凸成av人网站| 久久久久97国产精华液好用吗| 国产精品久久久久久久久晋中| 亚洲精品欧美专区| 久久精品国产网站| 99re热这里只有精品免费视频| 欧美三级视频在线观看| 日韩精品在线网站| 国产精品国产三级国产普通话蜜臀| 亚洲精品写真福利| 黄网站免费久久| 日本乱码高清不卡字幕| 日韩免费高清电影| 亚洲欧美日韩国产手机在线| 午夜电影网一区| 成人av一区二区三区| 欧美日韩国产高清一区| 国产无人区一区二区三区| 亚洲激情图片一区| 国产成人综合精品三级| 欧美视频中文字幕| 日本一区二区三区高清不卡| 无吗不卡中文字幕| av在线不卡观看免费观看| 欧美一区二区三区色| 国产精品久久久久久久久图文区| 日韩国产在线观看| 99re免费视频精品全部| 精品福利二区三区| 日精品一区二区| 99久久精品国产一区| 精品第一国产综合精品aⅴ| 亚洲一级片在线观看| 成人午夜又粗又硬又大| 精品乱人伦小说| 午夜精品久久久久久久久| 91免费在线看| 国产日韩成人精品| 看片的网站亚洲| 欧美日韩一级视频| 一片黄亚洲嫩模| 99久久免费视频.com| 欧美精品一区二区三区高清aⅴ| 一区二区三区色| 色综合天天视频在线观看| 久久影院午夜片一区| 美女视频一区二区三区| 欧美日韩免费观看一区二区三区| 中日韩av电影| 国产黑丝在线一区二区三区| 欧美一区二区三区爱爱| 午夜精品福利在线| 亚洲人123区| 国产.精品.日韩.另类.中文.在线.播放| 日韩一区二区在线观看视频播放| 亚洲高清免费在线| 91激情五月电影| 伊人色综合久久天天人手人婷| 成人av在线观| 国产精品久久国产精麻豆99网站| 国产一区二区在线电影| 欧美精品一区视频| 国产伦精品一区二区三区在线观看 | 青青草原综合久久大伊人精品| 91精彩视频在线观看| 亚洲乱码精品一二三四区日韩在线| 成人国产亚洲欧美成人综合网| 国产丝袜欧美中文另类| 国产一区二区三区四区五区美女| 日韩欧美色综合网站| 久久er99精品| 久久久噜噜噜久久人人看| 国产久卡久卡久卡久卡视频精品| 精品国产污网站| 国产乱码精品一区二区三区五月婷| 久久亚洲影视婷婷| 国产激情视频一区二区三区欧美| 国产欧美日韩亚州综合| av爱爱亚洲一区| 一级精品视频在线观看宜春院| 欧美日韩国产另类一区| 欧美aa在线视频| 久久蜜桃一区二区| 91丨国产丨九色丨pron| 亚洲综合在线免费观看| 欧美精品18+| 极品瑜伽女神91| 国产精品毛片久久久久久| 一本到不卡免费一区二区| 午夜激情综合网| 久久九九全国免费| 91啪亚洲精品| 美国精品在线观看| 中文字幕在线不卡视频| 在线一区二区三区| 麻豆国产欧美日韩综合精品二区| 欧美激情艳妇裸体舞| 欧美日韩在线精品一区二区三区激情| 日韩精品91亚洲二区在线观看| www久久精品|