<?xml version="1.0" encoding="UTF-8"?>
<reference anchor="I-D.li-isis-error-lsp-processing" target="https://datatracker.ietf.org/doc/html/draft-li-isis-error-lsp-processing-03">
   <front>
      <title>Recommendations for LSP Checksum Calculation and Related Processing in multi-vendor Networks using Intermediate System to Intermediate System</title>
      <author initials="Z." surname="Li" fullname="Zhenqiang Li">
         <organization>China Mobile</organization>
      </author>
      <author initials="Y." surname="Qin" fullname="Yue Qin">
         <organization>China Mobile</organization>
      </author>
      <author initials="J." surname="Dong" fullname="Jie Dong">
         <organization>Huawei Technologies</organization>
      </author>
      <date month="March" day="7" year="2010" />
      <abstract>
	 <t>Recommendations for Interoperable Networks using Intermediate System
to Intermediate System (IS-IS) [RFC3719] highlights a number of
differences between the IS-IS protocol as described in ISO 10589 and
the protocol as it is deployed today.

This document outlines a number of differences found in the China
Mobile backbone network, which is constructed using routers from
several manufacturers.  These differences include LSP checksum
calculation, zero checksum LSP processing, zero remaining lifetime
LSP processing, and corrupt LSP processing.  This document is
intended to provide best current practices to facilitate
interoperability and maintain network stability.
	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-li-isis-error-lsp-processing-03" />
   
</reference>
