[图书][B] IP Routing Protocols: Fundamentals and Distance-vector Routing Protocols

J Aweya - 2021 - taylorfrancis.com
This book focuses on the fundamental concepts of IP routing and distance-vector routing
protocols (RIPv2 and EIGRP). It discusses routing protocols from a practicing engineer's …

Automated fault localization in pipelines and electrical power transmission lines

D Hood, S Dahlfort - US Patent 9,164,065, 2015 - Google Patents
BACKGROUND Whether they carry gas, liquids or electrical energy, utility lines that span
geographic regions can fail for a number of reasons, including seismic events, windstorms …

High-precision time tagging for content synthesization

B Xing, YPE Wang - US Patent 9,094,907, 2015 - Google Patents
BACKGROUND Time keeping in computing systems requires information for synchronizing
the time with a world time keeping stan dard and a mechanism for accurately maintaining …

Mechanism for co-ordinated authentication key transition for IS-IS protocol

US Chunduri, W Lu, AC Lindem III - US Patent 8,995,667, 2015 - Google Patents
An automated key transition method is executed by a node in a network. The network
includes a set of nodes utilizing a current key identifier provided by a group key …

Packet processing method and network device

X Yang, X Zhang, Q Gao, BO Xie - US Patent 11,063,859, 2021 - Google Patents
Embodiments provide a packet processing method. In accordance with this method, a first
LSP packet can be received by a network device. The following determinations can be …

[PDF][PDF] Is-is path control and reservation

P Unbehagen, G Parsons, P Ashwood-Smith… - 2016 - rfc.fr
Abstract IEEE 802.1 Qca Path Control and Reservation (PCR) specifies explicit path control
via IS-IS in Layer 2 networks in order to move beyond the shortest path capabilities provided …

Suitability of Voice Recognition Within the IoT Environment

S Duraibi, F Alqahtani, F Sheldon… - Advances in Security …, 2021 - Springer
In this chapter, the usability of voice biometric authentication is investigated. In doing so, we
first studied the current status of Internet of Things [IoT] authentication technologies. We …

RFC 7981: IS-IS Extensions for Advertising Router Information

L Ginsberg, S Previdi, M Chen - 2016 - dl.acm.org
This document defines a new optional Intermediate System to Intermediate System (IS-IS)
TLV named CAPABILITY, formed of multiple sub-TLVs, which allows a router to announce its …

RFC 5709: OSPFv2 HMAC-SHA Cryptographic Authentication

M Bhatia, V Manral, M Fanto, R White, M Barnes, T Li… - 2009 - dl.acm.org
This document describes how the National Institute of Standards and Technology (NIST)
Secure Hash Standard family of algorithms can be used with OSPF version 2's built-in …

[PDF][PDF] Selection of Loop-Free Alternates for Multi-Homed Prefixes

J Tantsura, H Gredler - 2019 - dl.xkwy2018.com
Deployment experience gained from implementing algorithms to determine Loop-Free
Alternates (LFAs) for multi-homed prefixes (MHPs) has revealed some avenues for potential …