RFC 1142
This document is obsolete. Please refer to RFC 7142.

Network Working Group                                     D. Oran, Editor
Request for Comments: 1142                        Digital Equipment Corp.
                                                            February 1990


        OSI IS-IS Intra-domain Routing Protocol

Status of this Memo



   This RFC is a republication of ISO DP 10589 as a service to the
   Internet community.  This is not an Internet standard.
   Distribution of this memo is unlimited.


NOTE:  This is a bad ASCII version of this document.  The official
document is the PostScript file, which has the diagrams in place.
Please use the PostScript version of this memo.


ISO/IEC DIS 10589
 
Information technology Telecommunications and information exchange
between systems Interme diate system to Intermediate system
Intra-Domain routeing exchange protocol for use in Conjunction with
the Protocol for providing the Connectionless- mode Network Service
(ISO 8473) Technologies de l'information Communication de donnies et
ichange d'information entre systhmes Protocole intra-domain de routage
d'un systhme intermediare ` un systhme intermediare ` utiliser
conjointement avec le protocole fournissant le service de riseau en
mode sans connexion (ISO 8473) UDC 00000.000 : 000.0000000000
Descriptors:
 
Contents
Introduction iv
1 Scope and Field of Application 1
2 References 1
3 Definitions 2
4 Symbols and Abbreviations 3
5 Typographical Conventions 4
6 Overview of the Protocol 4
7 Subnetwork Independent Functions 9
8 Subnetwork Dependent Functions 35
9 Structure and Encoding of PDUs 47
10 System Environment 65
11 System Management 67
12 Conformance 95
Annex A PICS Proforma 99
Annex B Supporting Technical Material 105
Annex C Implementation Guidelines and Examples 109
Annex D Congestion Control and Avoidance 115
 
Introduction

This Protocol is one of a set of International Standards produced to
facilitate the interconnection of open systems. The set of standards
covers the services and protocols re quired to achieve such
interconnection.  This Protocol is positioned with respect to other
related standards by the layers defined in the ISO 7498 and by the
structure defined in the ISO 8648. In particular, it is a protocol of
the Network Layer. This protocol permits Intermediate Systems within a
routeing Domain to exchange configuration and routeing information to
facilitate the operation of the route ing and relaying functions of
the Network Layer.  The protocol is designed to operate in close
conjunction with ISO 9542 and ISO 8473.  ISO 9542 is used to establish
connectivity and reachability between End Systems and Inter mediate
Systems on individual Subnetworks. Data is carried by ISO 8473.  The
related algo rithms for route calculation and maintenance are also
described.  The intra-domain ISIS routeing protocol is intended to
support large routeing domains consisting of combinations of many
types of subnetworks. This includes point-to-point links, multipoint
links, X.25 subnetworks, and broadcast subnetworks such as ISO 8802
LANs.  In order to support large routeing domains, provision is made
for Intra-domain routeing to be organised hierarchically. A large
domain may be administratively divided into areas.  Each system
resides in exactly one area. Routeing within an area is referred to as
Level 1 routeing. Routeing between areas is referred to as Level 2
routeing.  Level 2 Intermediate systems keep track of the paths to
destination areas. Level 1 Intermediate systems keep track of the
routeing within their own area. For an NPDU destined to another area,
a Level 1 Intermediate system sends the NPDU to the nearest level 2 IS
in its own area, re gardless of what the destination area is. Then the
NPDU travels via level 2 routeing to the destination area, where it
again travels via level 1 routeing to the destination End System.
 
Information technology

Telecommunications and information exchange between systems
Intermediate system to Intermediate system Intra-Domain routeing
exchange protocol for use in Conjunction with the Protocol for
providing the Connectionless-mode Network Service (ISO 8473)
 
1 Scope and Field of Application

This International Standard specifies a protocol which is used by
Network Layer entities operating ISO 8473 in In termediate Systems to
maintain routeing information for the purpose of routeing within a
single routeing domain. The protocol herein described relies upon the
provision of a connectionless-mode underlying service.11See ISO 8473
and its Addendum 3 for the mechanisms necessary to realise this
service on subnetworks based on ISO 8208, ISO 8802, and the OSI Data
Link Service.
 
This Standard specifies:

a)procedures for the transmission of configuration and
routeing information between network entities resid
ing in Intermediate Systems within a single routeing
domain;

b)the encoding of the protocol data units used for the
transmission of the configuration and routeing infor
mation;

c)procedures for the correct interpretation of protocol
control information; and

d)the functional requirements for implementations
claiming conformance to this Standard.

The procedures are defined in terms of:

a)the interactions between Intermediate system Network
entities through the exchange of protocol data units;
and

b)the interactions between a Network entity and an un
derlying service provider through the exchange of
subnetwork service primitives.

c)the constraints on route determination which must be
observed by each Intermediate system when each has
a routeing information base which is consistent with
the others.
 
2 References

2.1  Normative References



The following standards contain provisions which, through reference in
this text, constitute provisions of this Interna tional Standard.  At
the time of publication, the editions in dicated were valid. All
standards are subject to revision, and parties to agreements based on
this International Stan dard are encouraged to investigate the
possibility of apply ing the most recent editions of the standards
listed below.  Members of IEC and ISO maintain registers of currently
valid International Standards.  ISO 7498:1984, Information processing
systems Open Systems Interconnection Basic Reference Model.  ISO
7498/Add.1:1984, Information processing systems Open Systems
Interconnection Basic Reference Model Addendum 1: Connectionless-mode
Transmission.  ISO 7498-3:1989, Information processing systems Open
Systems Interconnection Basic Reference Model Part 3: Naming and
Addressing.  ISO 7498-4:1989, Information processing systems Open
Systems Interconnection Basic Reference Model Part 4: Management
Framework.  ISO 8348:1987, Information processing systems Data
communications Network Service Definition.  ISO 8348/Add.1:1987,
Information processing systems Data communications Network Service
Definition Addendum 1: Connectionless-mode transmission.  ISO
8348/Add.2:1988, Information processing systems Data communications
Network Service Definition Addendum 2: Network layer addressing.  ISO
8473:1988, Information processing systems Data communications Protocol
for providing the connectionless-mode network service.  ISO
8473/Add.3:1989, Information processing systems Telecommunications and
information exchange between
systems  Protocol for providing the connectionless-
mode network service  Addendum 3: Provision of the
underlying service assumed by ISO 8473 over
subnetworks which provide the OSI data link service.
ISO 8648:1988,  Information processing systems  Open
Systems Interconnection  Internal organisation of the
Network Layer.
ISO 9542:1988, Information processing systems  Tele
communications and information exchange between sys
tems  End system to Intermediate system Routeing ex
change protocol for use in conjunction with the protocol
for providing the connectionless -mode network service
(ISO 8473).
ISO 8208:1984, Information processing systems  Data
communications  X.25 packet level protocol for Data
terminal equipment
ISO 8802:1988, Information processing systems  Tele
communications and information exchange between sys
tems  Local area networks.
ISO/TR 9575:1989, Information technology   Telecom
munications and information exchange between systems
 OSI Routeing Framework.
ISO/TR 9577:1990, Information technology   Telecom
munications and information exchange between systems
 Protocol Identification in the Network Layer.
ISO/IEC DIS 10165-4:, Information technology  Open
systems interconnection  Management Information Serv
ices  Structure of Management Information Part 4:
Guidelines for the Definition of Managed Objects.
ISO/IEC 10039:1990, IPS-T&IEBS  MAC Service Defini
tion.

2.2 Other References



The following references are helpful in describing some of
the routeing algorithms:

McQuillan, J. et. al., The New Routeing Algorithm for the
ARPANET, IEEE Transactions on Communications, May
1980.

Perlman, Radia, Fault-Tolerant Broadcast of Routeing In
formation, Computer Networks, Dec. 1983. Also in IEEE
INFOCOM 83, April 1983.

Aho, Hopcroft, and Ullman, Data Structures and Algo
rithms, P204208  Dijkstra algorithm.
 
3 Definitions

3.1 Reference Model definitions



This International Standard  makes use of the following
terms defined in ISO 7498:

a)Network Layer
b)Network Service access point
c)Network Service access point address
d)Network entity
e)Routeing
f)Network protocol
g)Network relay
h)Network protocol data unit

3.2 Network Layer architecture
definitions



This International Standard makes use of the following
terms defined in ISO 8648:


a)Subnetwork
b)End system
c)Intermediate system
d)Subnetwork service
e)Subnetwork Access Protocol
f)Subnetwork Dependent Convergence Protocol
g)Subnetwork Independent Convergence Protocol

3.3 Network Layer addressing
definitions



This International Standard makes use of the following
terms defined in ISO 8348/Add.2:


a)Subnetwork address
b)Subnetwork point of attachment
c)Network Entity Title
3.4 Local Area Network Definitions
 This International Standard makes use of the following
terms defined in ISO 8802:
a)Multi-destination address
b)Media access control
c)Broadcast medium
3.5 Routeing Framework Definitions
 This document makes use of the following terms defined in
ISO/TR 9575:
a)Administrative Domain
b)Routeing Domain
c)Hop
d)Black hole
 
 
3.6 Additional Definitions
For the purposes of this International Standard, the follow
ing definitions apply:
3.6.1  
Area: A routeing subdomain which maintains de
tailed routeing information about its own internal
composition, and also maintains routeing informa
tion which allows it to reach other routeing subdo
mains. It corresponds to the Level 1 subdomain.
3.6.2  
Neighbour: An adjacent system reachable by tra
versal of a single subnetwork by a PDU.
3.6.3  
Adjacency: A portion of the local routeing infor
mation which pertains to the reachability of a sin
gle neighbour ES or IS over a single circuit.
Adjacencies are used as input to the Decision Proc
ess for forming paths through the routeing domain.
A separate adjacency is created for each neighbour
on a circuit, and for each level of routeing (i.e.
level 1 and level 2) on a broadcast circuit.
3.6.4  
Circuit: The subset of the local routeing informa
tion base pertinent to a single local SNPA.
3.6.5  
Link: The communication path between two
neighbours.
A Link is up when communication is possible
between the two SNPAs.
3.6.6  
Designated IS: The Intermediate system on a
LAN which is designated to perform additional du
ties. In particular it generates Link State PDUs on
behalf of the LAN, treating the LAN as a
pseudonode.
3.6.7  
Pseudonode: Where a broadcast subnetwork has n
connected Intermediate systems, the broadcast
subnetwork itself is considered to be a
pseudonode.
The pseudonode has links to each of the n Interme
diate systems and each of the ISs has a single link
to the pseudonode (rather than n-1 links to each of
the other Intermediate systems). Link State PDUs
are generated on behalf of the pseudonode by the
Designated IS. This is depicted below in figure 1.
3.6.8  
Broadcast subnetwork: A subnetwork which sup
ports an arbitrary number of End systems and In
 
termediate systems and additionally is capable of
transmitting a single SNPDU to a subset of these
systems in response to a single SN_UNITDATA
request.  
3.6.9  
General topology subnetwork: A subnetwork
which supports an arbitrary number of End sys
tems and Intermediate systems, but does not sup
port a convenient multi-destination connectionless
trans

mission facility, as does a broadcast sub

net


work.
3.6.10  
Routeing Subdomain: a set of Intermediate sys
tems and End systems located within the same
Routeing domain.
3.6.11  
Level 2 Subdomain: the set of all Level 2 Inter
mediate systems in a Routeing domain.
4 Symbols and Abbreviations
4.1 Data Units
PDU Protocol Data Unit
SNSDU Subnetwork Service Data Unit
NSDU Network Service Data Unit
NPDU Network Protocol Data Unit
SNPDU Subnetwork Protocol Data Unit
 
4.2 Protocol Data Units
ESH PDU ISO 9542 End System Hello Protocol Data
Unit
ISH PDU ISO 9542 Intermediate System Hello Protocol
Data Unit
RD PDU ISO 9542 Redirect Protocol Data Unit
IIH Intermediate system to Intermediate system
Hello Protocol Data Unit
LSP Link State Protocol Data Unit
SNP Sequence Numbers Protocol Data Unit
CSNP Complete Sequence Numbers Protocol Data
Unit
PSNP Partial Sequence Numbers Protocol Data Unit
 
 
4.3 Addresses
AFI Authority and Format Indicator
DSP Domain Specific Part
IDI Initial Domain Identifier
IDP Initial Domain Part
NET Network Entity Title
NSAP Network Service Access Point
SNPA Subnetwork Point of Attachment
 
4.4 Miscellaneous
DA Dynamically Assigned
DED Dynamically Established Data link
DTE Data Terminal Equipment
ES End System
IS Intermediate System
L1 Level 1
L2 Level 2
LAN Local Area Network
MAC Media Access Control
NLPID Network Layer Protocol Identifier
PCI Protocol Control Information
QoS Quality of Service
SN Subnetwork
SNAcP Subnetwork Access Protocol
SNDCP Subnetwork Dependent Convergence Protocol
SNICP Subnetwork Independent Convergence Proto
col
SRM Send Routeing Message
SSN Send Sequence Numbers Message
SVC Switched Virtual Circuit
5 Typographical Conventions
This International Standard makes use of the following ty
pographical conventions:
a)Important terms and concepts appear in italic type
when introduced for the first time;
b)Protocol constants and management parameters appear
in sansSerif type with multiple words run together.
The first word is lower case, with the first character of
subsequent words capitalised;
c)Protocol field names appear in San Serif type with
each word capitalised.
d)Values of constants, parameters, and protocol fields
appear enclosed in double quotes.
 
6 Overview of the Protocol
6.1 System Types
There are the following types of system:
End Systems: These systems deliver NPDUs to other sys
tems and receive NPDUs from other systems, but do
not relay NPDUs. This International Standard does
not specify any additional End system functions be
yond those supplied by ISO 8473 and ISO 9542.
Level 1 Intermediate Systems: These systems deliver and
receive NPDUs from other systems, and relay
NPDUs from other source systems to other destina
tion systems. They route directly to systems within
their own area, and route towards a level 2 Interme
diate system when the destination system is in a dif
ferent area.
Level 2 Intermediate Systems: These systems act as Level 1
Intermediate systems in addition to acting as a sys
tem in the subdomain consisting of level 2 ISs. Sys
tems in the level 2 subdomain route towards a desti
nation area, or another routeing domain.
6.2 Subnetwork Types
There are two generic types of subnetworks supported.
a)broadcast subnetworks: These are multi-access
subnetworks that support the capability of addressing
a group of attached systems with a single NPDU, for
instance ISO 8802.3 LANs.
b)general topology subnetworks: These are modelled as
a set of point-to-point links each of which connects
exactly two systems.
There are several generic types of general topology
subnetworks:
1)multipoint links: These are links between more
than two  systems, where one system is a primary  
system, and the remaining systems are secondary
(or slave) systems. The primary is capable of direct
communication with any of the secondaries, but
the secondaries cannot communicate directly
among themselves.
2)permanent point-to-point links: These are links
that stay connected at all times (unless broken, or
turned off by system management), for instance
leased lines or private links.
3)dynamically established data links (DEDs): these
are links over connection oriented facilities, for in
stance X.25, X.21, ISDN, or PSTN networks.
Dynamically established data links can be used in one
of two ways:
i)static point-to-point (Static): The call is estab
lished upon system management action and
 
cleared only on system management action (or
failure).
ii)dynamically assigned (DA): The call is estab
lished upon receipt of traffic, and brought
down on timer expiration when idle. The ad
dress to which the call is to be established is  
determined dynamically from information in
the arriving NPDU(s). No ISIS routeing
PDUs are exchanged between ISs on a DA cir
cuit.
All subnetwork types are treated by the Subnetwork Inde
pendent functions as though they were connectionless
subnetworks, using the Subnetwork Dependent Conver
gence functions of ISO 8473 where necessary to provide a
connectionless subnetwork service. The  Subnetwork De
pendent functions do, however, operate differently on
connectionless and connection-oriented subnetworks.
6.3 Topologies
A single organisation may wish to divide its Administrative
Domain into a number of separate Routeing Domains.
This has certain advantages, as described in ISO/TR 9575.
Furthermore, it is desirable for an intra-domain routeing
protocol to aid in the operation of an inter-domain routeing
protocol, where such a protocol exists for interconnecting
multiple administrative domains.
In order to facilitate the construction of such multi-domain
topologies, provision is made for the entering of static
inter-domain routeing information. This information is pro
vided by a set of Reachable Address Prefixes entered by
System Management at the ISs which have links which
cross routeing domain boundaries. The prefix indicates that
any NSAPs whose NSAP address matches the prefix may
be reachable via  the SNPA with which the prefix is associ
ated. Where the subnetwork to which this SNPA is con
nected is a general topology subnetwork supporting dy
namically established data links, the prefix also has associ
ated with it the required subnetwork addressing
information, or an indication that it may be derived from
the destination NSAP address (for example, an X.121 DTE
address may sometimes be obtained from the IDI of the
NSAP address).
The Address Prefixes are handled by the level 2 routeing al
gorithm in the same way as information about a level 1 area
within the domain. NPDUs with a destination address
matching any of the prefixes present on any Level 2 Inter
mediate System within the domain can therefore be relayed
(using level 2 routeing) by that IS and delivered out of the
domain. (It is assumed that the routeing functions of the
other domain will then be able to deliver the NPDU to its
destination.)
6.4 Addresses
Within a routeing domain that conforms to this standard,
the Network entity titles of Intermediate systems shall be
structured as described in 7.1.1.
All systems shall be able to generate and forward data
PDUs containing NSAP addresses in any of the formats
specified by ISO 8348/Add.2. However,  NSAP addresses
 
of End systems should be structured as described in 7.1.1 in
order to take full advantage of ISIS routeing. Within such
a domain it is still possible for some End Systems to have
addresses assigned which do not conform to 7.1.1, provided
they meet the more general requirements of
ISO 8348/Add.2, but they may require additional configura
tion and be subject to inferior routeing performance.
6.5  Functional Organisation
The intra-domain ISIS routeing functions are divided into
two groups
-Subnetwork Independent Functions
-Subnetwork Dependent Functions
6.5.1 Subnetwork Independent Functions
The Subnetwork Independent Functions supply full-duplex
NPDU transmission between any pair of neighbour sys
tems. They are independent of the specific subnetwork or
data link service operating below them, except for recognis
ing two generic types of subnetworks:
-General Topology Subnetworks, which include
HDLC point-to-point, HDLC multipoint, and dynami
cally established data links (such as X.25, X.21, and
PSTN links), and  
-Broadcast Subnetworks, which include ISO 8802
LANs.
The following Subnetwork Independent Functions are iden
tified
-Routeing. The routeing function determines NPDU
paths. A path is the sequence of connected systems
and links between a source ES and a destination ES.
The combined knowledge of all the Network Layer
entities of all the Intermediate systems within a route
ing domain is used to ascertain the existence of a path,
and route the NPDU to its destination. The routeing
component at an Intermediate system has the follow
ing specific functions:
7It extracts and interprets the routeing PCI in an
NPDU.
7It performs NPDU forwarding based on the desti
nation address.
7It manages the characteristics of the path. If a sys
tem or link fails on a path, it finds an alternate
route.  
7It interfaces with the subnetwork dependent func
tions to receive reports concerning an SNPA
which has become unavailable, a system that has
failed, or the subsequent recovery of an SNPA or
system.  
7It informs the ISO 8473 error reporting function
when the forwarding function cannot relay an
NPDU, for instance when the destination is un
reachable or when the NPDU would have needed
 
to be segmented and the NPDU requested no seg
mentation.
-Congestion control. Congestion control manages the
resources used at each Intermediate system.
6.5.2 Subnetwork Dependent Functions
The subnetwork dependent functions mask the characteris
tics of the subnetwork or data link service from the
subnetwork independent functions. These include:
-Operation of the Intermediate system functions of
ISO 9542 on the particular subnetwork, in order to
7Determine neighbour Network entity title(s) and
SNPA address(es)
7Determine the SNPA address(s) of operational In
termediate systems
-Operation of the requisite Subnetwork Dependent
Convergence Function as defined in ISO 8473 and its
Addendum 3, in order to perform
7Data link initialisation
7Hop by hop fragmentation over subnetworks with
small maximum SNSDU sizes
7Call establishment and clearing on dynamically es
tablished data links
6.6 Design Goals
This International Standard supports the following design
requirements. The correspondence with the goals for OSI
routeing stated in ISO/TR 9575 are noted.
-Network Layer Protocol Compatibility. It is com
patible with ISO 8473 and ISO 9542. (See clause 7.5
of ISO/TR 9575),
-Simple End systems: It requires no changes to end
systems, nor any functions beyond those supplied by
ISO 8473 and ISO 9542. (See clause 7.2.1 of ISO/TR
9575),
-Multiple Organisations: It allows for multiple route
ing and administrative domains through the provision
of static routeing information at domain boundaries.
(See clause 7.3 of ISO/TR 9575),
-Deliverability It accepts and delivers NPDUs ad
dressed to reachable destinations and rejects NPDUs
addressed to destinations known to be unreachable.
-Adaptability. It adapts to topological changes within
the routeing domain, but not to traffic changes, except
potentially as indicated by local queue lengths. It
splits traffic load on multiple equivalent paths. (See
clause 7.7 of ISO/TR 9575),
-Promptness. The period of adaptation to topological
changes in the domain is a reasonable function of the
domain diameter (that is, the maximum logical dis
 
tance between End Systems within the domain) and
Data link speeds. (See clause 7.4 of ISO/TR 9575),
-Efficiency. It is both processing and memory effi
cient. It does not create excessive routeing traffic
overhead. (See clause 7.4 of ISO/TR 9575),
-Robustness. It recovers from transient errors such as
lost or temporarily incorrect routeing PDUs. It toler
ates imprecise parameter settings. (See clause 7.7 of
ISO/TR 9575),
-Stability. It stabilises in finite time to good routes,
provided no continuous topological changes or con
tinuous data base corruptions occur.
-System Management control. System Management
can control many routeing functions via parameter
changes, and inspect parameters, counters, and routes.
It will not, however, depend on system management
action for correct behaviour.
-Simplicity. It is sufficiently simple to permit perform
ance tuning and failure isolation.
-Maintainability. It provides mechanisms to detect,
isolate, and repair most common errors that may affect
the routeing computation and data bases. (See clause
7.8 of ISO/TR 9575),
-Heterogeneity. It operates over a mixture of network
and system types, communication technologies, and
topologies. It is capable of running over a wide variety
of subnetworks, including, but not limited to: ISO
8802 LANs, ISO 8208 and X.25 subnetworks, PSTN
networks, and the OSI Data Link Service. (See clause
7.1 of ISO/TR 9575),
-Extensibility. It accommodates increased routeing
functions, leaving earlier functions as a subset.
-Evolution. It allows orderly transition from algorithm
to algorithm without shutting down an entire domain.
-Deadlock Prevention. The congestion control compo
nent prevents buffer deadlock.
-Very Large Domains. With hierarchical routeing, and
a very large address space, domains of essentially un
limited size can be supported. (See clause 7.2 of
ISO/TR 9575),
-Area Partition Repair. It permits the utilisation of
level 2 paths to repair areas which become partitioned
due to failing level 1 links or ISs. (See clause 7.7 of
ISO/TR 9575),
-Determinism. Routes are a function only of the physi
cal topology, and not of history. In other words, the
same topology will always converge to the same set of
routes.
-Protection from Mis-delivery. The probability of  
mis-delivering a NPDU, i.e. delivering it to a Trans
port entity in the wrong End System, is extremely low.
 
-Availability. For domain topologies with cut set
greater than one, no single point of failure will parti
tion the domain. (See clause 7.7 of ISO/TR 9575),
-Service Classes. The service classes of transit delay,
expense22Expense is referred to as cost in ISO 8473. The latter term is
not used here because of possible confusion with the more general usage
of the term to
indicate path cost according to any routeing metric.
, and residual error probability of ISO 8473
are supported through the optional inclusion of multi
ple routeing metrics.
-Authentication. The protocol is capable of carrying
information to be used for the authentication of Inter
mediate systems in order to increase the security and
robustness of a routeing domain. The specific mecha
nism supported in this International Standard how
ever, only supports a weak form of authentication us
ing passwords, and thus is useful only for protection
against accidental misconfiguration errors and does
not protect against any serious security threat. In the
future, the algorithms may be enhanced to provide
stronger forms of authentication than can be provided
with passwords without needing to change the PDU
encoding or the protocol exchange machinery.
6.6.1 Non-Goals
The following are not within the design scope of the intra-
domain ISIS routeing protocol described in this Interna
tional Standard:
-Traffic adaptation. It does not automatically modify
routes based on global traffic load.
-Source-destination routeing. It does not determine
routes by source as well as destination.
-Guaranteed delivery. It  does not guarantee delivery
of all offered NPDUs.
-Level 2 Subdomain Partition Repair. It will not util
ise Level 1 paths to repair a level 2 subdomain parti
tion. For full logical connectivity to be available, a
connected level 2 subdomain is required.
-Equal treatment for all ES Implementations. The
End system poll function defined in 8.4.5 presumes
that End systems have implemented the Suggested ES
Configuration Timer option of ISO 9542. An End sys
tem which does not implement this option may experi
ence a temporary loss of connectivity following cer
tain types of topology changes on its local
subnetwork.
6.7 Environmental Requirements
For correct operation of the protocol, certain guarantees are
required from the local environment and the Data Link
Layer.
The required local environment guarantees are:
a)Resource allocation such that the certain minimum re
source guarantees can be met, including
 
1)memory (for code, data, and buffers)
2)processing;
See 12.2.5 for specific performance levels required for
conformance
b)A quota of buffers sufficient to perform routeing func
tions;
c)Access to a timer or notification of specific timer expi
ration; and
d)A very low probability of corrupting data.
The required subnetwork guarantees for point-to-point links
are:
a)Provision that both source and destination systems
complete start-up before PDU exchange can occur;
b)Detection of remote start-up;
c)Provision that no old PDUs be received after start-up
is complete;
d)Provision that no PDUs transmitted after a particular
startup is complete are delivered out of sequence;
e)Provision that failure to deliver a specific subnetwork
SDU will result in the timely disconnection of the
subnetwork connection in both directions and that this
failure will be reported to both systems;  and
f)Reporting of other subnetwork failures and degraded
subnetwork conditions.
The required subnetwork guarantees for broadcast links are:
a)Multicast capability, i.e., the ability to address a subset
of all connected systems with a single PDU;
b)The following events are low probability, which
means that they occur sufficiently rarely so as not to
impact performance, on the order of once per  thou
sand PDUs
1)Routeing PDU non-sequentiality,
2)Routeing PDU loss due to detected corruption; and
3)Receiver overrun;
c)The following events are very low probability,
which means performance will be impacted unless
they are extremely rare, on the order of less than one
event per four years
1)Delivery of NPDUs with undetected data corrup
tion; and
2)Non-transitive connectivity, i.e. where system A
can receive transmissions from systems B and C,
but system B cannot receive transmissions from
system C.
 
The following services are assumed to be not available
from broadcast links:
a)Reporting of failures and degraded subnetwork condi
tions that result in NPDU loss, for instance receiver
failure. The routeing functions are designed to account
for these failures.
6.8 Functional Organisation of
Subnetwork Independent
Components
The Subnetwork Independent Functions are broken down
into more specific functional components. These are de
scribed briefly in this sub-clause and in detail in clause 7.
This International Standard uses a functional decomposition
adapted from the model of routeing presented in clause 5.1
of ISO/TR 9575. The decomposition is not identical to that
in ISO/TR 9575, since that model is more general and not
specifically oriented toward a detailed description of intra-
domain routeing functions such as supplied by this proto
col.
 
The functional decomposition is shown below in figure 2.
6.8.1 Routeing
The routeing processes are:
-Decision Process
-Update Process
NOTE  this comprises both the Information Collection
and Information Distribution components identified in
ISO/TR 9575.
-Forwarding Process
-Receive Process
6.8.1.1 Decision Process
This process calculates routes to each destination in the do
main.  It is executed separately for level 1 and level 2 route
ing, and separately within each level for each of the route
ing metrics supported by the Intermediate system. It uses
the Link State Database, which consists of information
 
from the latest Link State PDUs from every other Interme
diate system in the area, to compute shortest paths from this
IS to all other systems in the area  9in figure 2. The
Link State Data Base is maintained by the Update Process.
Execution of the Decision Process results in the determina
tion of [circuit, neighbour] pairs (known as adjacencies),
which are stored in the appropriate Forwarding Information
base  10  and used by the Forwarding process as paths
along which to forward NPDUs.
Several of the parameters in the routeing data base that the
Decision Process uses are determined by the implementa
tion. These include:
-maximum number of Intermediate and End systems
within the IS's area;
-maximum number of Intermediate and End system
neighbours of the IS, etc.,
so that databases can be sized appropriately. Also parame
ters such as
-routeing metrics for each circuit; and
-timers
can be adjusted for enhanced performance. The complete
list of System Management set-able parameters is listed in
clause 11.
6.8.1.2 Update Process
This process constructs, receives and propagates Link State
PDUs. Each Link State PDU contains information about the
identity and routeing metric values of the  adjacencies of
the IS that originated the Link State PDU.
The Update Process receives Link State and Sequence
Numbers PDUs from the Receive Process  4in figure
2. It places new routeing information in the routeing infor
mation base 6 and propagates routeing information to
other Intermediate systems  7and 8 .
General characteristics of the Update Process are:
-Link State PDUs are generated  as a result of topologi
cal changes, and also periodically. They may also be
generated indirectly as a result of System Manage
ment actions (such as changing one of the routeing
metrics for a circuit).
-Level 1 Link State PDUs are propagated to all Inter
mediate systems within an area, but are not propa
gated out of an area.
-Level 2 Link State PDUs are propagated to all Level 2
Intermediate systems in the domain.
-Link State PDUs are not propagated outside of a do
main.
 
-The update process, through a set of System Manage
ment parameters, enforces an upper bound on the
amount of routeing traffic overhead it generates.
6.8.1.3 Forwarding Process
This process supplies and manages the buffers necessary to
support NPDU relaying to all destinations.
It receives, via the Receive Process, ISO 8473 PDUs to be
forwarded  5 in figure 2.
It performs a lookup in the appropriate33The appropriate Forwarding
Database is selected by choosing a routeing metric based on fields in
the QoS Maintenance option of ISO 8473.
 Forwarding Data
base  11  to determine the possible output adjacencies
to use for forwarding to a given destination, chooses one
adjacency  12, generates error indications to ISO 8473
 14 , and  signals ISO 9542 to issue Redirect PDUs  
13.
6.8.1.4 Receive Process
The Receive Process obtains its inputs from the following
sources
-received PDUs with the NPID of Intra-Domain route
ing  2 in figure 2,
-routeing information derived by the ESIS protocol
from the receipt of ISO 9542 PDUs  1;  and
-ISO 8473 data PDUs handed to the routeing function
by the ISO 8473 protocol machine  3.
It then performs the appropriate actions, which may involve
passing the PDU to some other function (e.g. to the For
warding Process for forwarding  5).
7 Subnetwork Independent
Functions
This clause describes the algorithms and associated data
bases used by the routeing functions. The managed objects
and attributes defined for System Management purposes are
described in clause 11.
The following processes and data bases are used internally
by the subnetwork independent functions. Following each
process or data base title, in parentheses, is the type of sys
tems which must keep the database. The system types are
L2 (level 2 Intermediate system), and L1 (level 1 Inter
mediate system). Note that a level 2 Intermediate system is
also a level 1 Intermediate system in its home area, so it
must keep level 1 databases as well as level 2 databases.
 
Processes:
-Decision Process (L2, L1)
-Update Process (L2, L1)
-Forwarding Process (L2, L1)
-Receive Process (L2, L1)
Databases:
-Level 1 Link State data base (L2, L1)
-Level 2 Link State data base (L2)
-Adjacency Database (L2, L1)
-Circuit Database (L2, L1)
-Level 1 Shortest Paths Database (L2, L1)
-Level 2 Shortest Paths Database (L2)
-Level 1 Forwarding Databases  one per routeing
metric  (L2, L1)
-Level 2 Forwarding Database  one per routeing
metric  (L2)
7.1 Addresses
The NSAP addresses and NETs of systems are variable
length quantities that conform to the requirements of ISO
8348/Add.2. The corresponding NPAI contained in ISO
8473 PDUs and in this protocol's PDUs (such as LSPs and
IIHs) must use the preferred binary encoding; the underly
ing syntax for this information may be either abstract binary
syntax or abstract decimal syntax. Any of the AFIs and
their corresponding DSP syntax may be used with this pro
tocol.
7.1.1 NPAI Of Systems Within A Routeing
Domain
Figure 3 illustrates the structure of an encoded NSAP ad
dress or NET.
 
The structure of the NPAI will be interpreted in the follow
ing way by the protocol described in this international stan
dard:
Area Address
address of one area within a routeing domain  a
variable length quantity consisting of the entire high-
order part of the NPAI, excluding the ID and SEL
fields, defined below.
ID System identifier  a variable length field from 1 to
8 octets (inclusive). Each routeing domain employ
ing this protocol shall select a single size for the ID
field and all Intermediate systems in the routeing do
main shall use this length for the system IDs of all
systems in the routeing domain.
The set of ID lengths supported by an implementa
tion is an implementation choice, provided that at
least one value in the permitted range can be ac
cepted. The routeing domain administrator must en
sure that all ISs included in a routeing domain are
able to use the ID length chosen for that domain.
SEL NSAP Selector  a 1-octet field which acts as a se
lector for the entity which is to receive the PDU(this
may be a Transport entity or the Intermediate system
Network entity itself). It is the least significant (last)
octet of the NPAI.
7.1.2 Deployment of Systems
For correct operation of the routeing protocol defined in
this international standard, systems deployed in a routeing
domain must meet the following requirements:
a)For all systems:
1)Each system in an area must have a unique sys
temID: that is, no two systems (IS or ES) in an
area can use the same ID value.
2)Each area address must be unique within the global
OSIE: that is, a given area address can be associ
ated with only one area.
3)All systems having a given value of area address
must be located in the same area.
 
b)Additional Requirements for Intermediate systems:
1)Each Level 2 Intermediate system within a route
ing domain must have a unique value for its ID
field: that is, no two level 2 ISs in a routeing do
main can have the same value in their ID fields.
c)Additional Requirements for End systems:
1)No two End systems in an area may have ad
dresses that match in all but the SEL fields.
d)An End system can be attached to a level 1 IS only if
its area address matches one of the entries in the adja
cent IS's manual

Area

Addresses parameter.
It is the responsibility of the routeing domain's administra
tive authority to enforce the requirements of 7.1.2. The pro
tocol defined in this international standard assumes that
these requirements are met, but has no means to verify
compliance with them.
7.1.3 Manual area addresses
The use of several synonymous area addresses by an IS is
accommodated through the use of the management parame
ter manual

Area

Addresses. This parameter is set locally
for each level 1 IS by system management; it contains a list
of all synonymous area addresses associated with the IS, in
cluding the IS's area address as contained in its own NET.
Each level 1 IS distributes its manual

Area

Addresses in
its Level 1 LSP's Area Addresses field, thus allowing
level 2 ISs to create a composite list of all area addresses
supported within a given area. Level 2 ISs in turn advertise
the composite list throughout the level 2 subdomain by in
cluding it in their Level 2 LSP's Area Addresses field,
thus distributing information on all the area addresses asso
ciated with the entire routeing domain. The procedures for
establishing an adjacency between two level 1 ISs require
that there be at least one area address in common between
their two manual

Area

Addresses lists, and the proce
dures for establishing an adjacency between a level 1 Is and
an End system require that the End system's area address
must match an entry in the IS's manual

Area

Addresses
list. Therefore, it is the responsibility of System Manage
ment to ensure that each area address associated with an IS
is included: in particular, system management must ensure
that the area addresses of all ESs and Level 1 ISs adjacent
to a given level 1 IS are included in that IS's manual


Area

Addresses list.
If the area address field for the destination address of an
8473 PDU  or for the next entry in its source routeing
field, when present  is not listed in the parameter area


Addresses of a level 1 IS receiving the PDU, then the
destination system does not reside in the IS's area. Such
PDUs will be routed by level-2 routeing.
7.1.4 Encoding of Level 2 Addresses
When a full NSAP address is encoded according to the pre
ferred binary encoding specified in ISO 8348/Add.2, the
 
IDI is padded with leading digits (if necessary) to obtain the
maximum IDP length specified for that AFI.
A Level 2 address prefix consists of a leading sub-string of
a full NSAP address, such that it matches a set of full
NSAP addresses that have the same leading sub-string.
However this truncation and matching is performed on the
NSAP represented by the abstract syntax of the NSAP ad
dress, not on the encoded (and hence padded) form.11An example of
prefix matching may be found in annex B, clause B.1.
 
Level 2 address prefixes are encoded in LSPs in the same
way as full NSAP addresses, except when the end of the
prefix falls within the IDP. In this case the prefix is directly
encoded as the string of semi-octets with no padding.
7.1.5 Comparison of Addresses
Unless otherwise stated, numerical comparison of addresses
shall be performed on the encoded form of the address, by
padding the shorter address with trailing zeros to the length
of the longer address, and then performing a numerical
comparison.
The addresses to which this precedure applies include
NSAP addresses, Network Entity Titles, and SNPA ad
dresses.
7.2 The Decision Process
This process uses the database of Link State information to
calculate the forwarding database(s), from which the for
warding process can know the proper next hop for each
NPDU. The Level 1 Link State Database is used for calcu
lating the Level 1 Forwarding Database(s), and the Level 2
Link State Database is used for calculating the Level 2 For
warding Database(s).
7.2.1 Input and output
INPUT
-Link State Database  This database is a set of infor
mation from the latest Link State PDUs from all
known Intermediate systems (within this area, for
Level 1, or within the level 2 subdomain, for Level 2).
This database is received from the Update Process.
-Notification of an Event  This is a signal from the
Update Process that a change to a link has occurred
somewhere in the domain.
 OUTPUT
-Level 1 Forwarding Databases  one per routeing
metric
-(Level 2 Intermediate systems only) Level 2 Forward
ing Databases   one per routeing metric
-(Level 2 Intermediate systems only) The Level 1 De
cision Process informs the Level 2 Update Process of
the ID of the Level 2 Intermediate system within the
area with lowest ID reachable with real level 1 links
 
(as opposed to a virtual link consisting of a path
through the level 2 subdomain)
-(Level 2 Intermediate systems only) If this Intermedi
ate system is the Partition Designated Level 2 Inter
mediate system in this partition, the Level 2 Decision
Process informs the Level 1 Update Process of the
values of the default routeing metric to and ID of the
partition designated level 2 Intermediate system in
each other partition of this area.
7.2.2 Routeing metrics
There are four routeing metrics defined, corresponding to
the four possible orthogonal qualities of service defined by
the QoS Maintenance field of ISO 8473. Each circuit ema
nating from an Intermediate system shall be assigned a
value for one or more of these metrics by System manage
ment. The four metrics are as follows:
a)Default metric: This is a metric understood by every
Intermediate system in the domain. Each circuit shall
have a positive integral value assigned for this metric.
The value may be associated with any objective func
tion of the circuit, but by convention is intended to
measure the capacity of the circuit for handling traffic,
for example, its throughput in bits-per-second.  Higher
values indicate a lower capacity.
b)Delay metric:  This metric measures the transit delay
of the associated circuit. It is an optional metric, which
if assigned to a circuit shall have a positive integral
value. Higher values indicate a longer transit delay.
c)Expense metric: This metric measures the monetary
cost of utilising the associated circuit. It is an optional
metric, which if assigned to a circuit shall have a posi
tive integral value22The path computation algorithm utilised in this
International Standard requires that all circuits be assigned a
positive value for a metric. Therefore, it is
not possible to represent a free circuit by a zero value of the expense
metric. By convention, the value 1 is used to indicate a free circuit.
. Higher values indicate a larger
monetary expense.
d)Error metric: This metric measures the residual error
probability of the associated circuit. It is an optional
metric, which if assigned to a circuit shall have a non-
zero value. Higher values indicate a larger probability
of undetected errors on the circuit.
NOTE - The decision process combines metric values by
simple addition.  It is important, therefore, that the values of
the metrics be chosen accordingly.
Every Intermediate system shall be capable of calculating
routes based on the default metric. Support of any or all of
the other metrics is optional. If an Intermediate system sup
ports the calculation of routes based on a metric, its update
process may report the metric value in the LSPs for the as
sociated circuit; otherwise, the IS shall not report the met
ric.
When calculating paths for one of the optional routeing
metrics, the decision process only utilises LSPs with a
value reported for the corresponding metric. If no value is
 
associated with a metric for any of the IS's circuits the sys
tem shall not calculate routes based on that metric.
NOTE - A consequence of the above is that a system reach
able via the default metric may not be reachable by another
metric.
See 7.4.2 for a description of how the forwarding process
selects one of these metrics based on the contents of the
ISO 8473 QoS Maintenance option.
Each of the four metrics described above may be of two
types: an  Internal metric or an External metric. Internal
metrics are used to describe links/routes to destinations in
ternal to the routeing domain. External metrics are used to
describe links/routes to destinations outside of the routeing
domain. These two types of metrics are not directly compa
rable, except the internal routes are always preferred over
external routes. In other words an internal route will always
be selected even if an external route with lower total cost
exists.
7.2.3 Broadcast Subnetworks
Instead of treating a broadcast subnetwork as a fully con
nected topology, the broadcast subnetwork is treated as a
pseudonode, with links to each attached system. Attached
systems shall only report their link to the pseudonode. The
designated Intermediate system, on behalf of the
pseudonode, shall construct Link State PDUs reporting the
links to all the systems on the broadcast subnetwork with a
zero value for each supported routeing metric33They are set to zero
metric values since they have already been assigned  metrics by the
link to the pseudonode. Assigning a non-zero value in the
pseudonode LSP would have the effect of doubling the actual value.
.
The pseudonode shall be identified by the sourceID of the
Designated Intermediate system, followed by a non-zero
pseudonodeID assigned by the Designated Intermediate
system. The pseudonodeID is locally unique to the Desig
nated Intermediate system.
Designated Intermediate systems are determined separately
for level 1 and level 2. They are known as the LAN Level 1
Designated IS and the LAN Level 2 Designated IS respec
tively. See 8.4.4.
An Intermediate system may resign as Designated Interme
diate System on a broadcast circuit either because it (or it's
SNPA on the broadcast subnetwork) is being shut down or
because some other Intermediate system of higher priority
has taken over that function. When an Intermediate system
resigns as Designated Intermediate System, it shall initiate a
network wide purge of its pseudonode Link State PDU(s)
by setting their Remaining Lifetime to zero and performing
the actions described in 7.3.16.4. A LAN Level 1 Desig
nated Intermediate System purges Level 1 Link State PDUs
and a LAN Level 2 Designated Intermediate System purges
Level 2 Link State PDUs.  An Intermediate system which
has resigned as both Level 1 and Level 2 Designated Inter
mediate System shall purge both sets of LSPs.
 
When an Intermediate system declares itself as designated
Intermediate system and it is in possession of a Link State
PDU of the same level issued by the previous Designated
Intermediate System for that circuit (if any), it shall initiate
a network wide purge of that (or those) Link State PDU(s)
as above.
7.2.4 Links
Two Intermediate systems are not considered neighbours
unless each reports the other as directly reachable over one
of their SNPAs. On a Connection-oriented subnetwork
(either point-to-point or general topology), the two Interme
diate systems in question shall ascertain their neighbour re
lationship when a connection is established and hello PDUs
exchanged. A malfunctioning IS might, however, report an
other IS to be a neighbour when in fact it is not. To detect
this class of failure the decision process checks that each
link reported as up in a LSP is so reported by both Inter
mediate systems. If an Intermediate system considers a link
down it shall not mention the link in its Link State PDUs.
On broadcast subnetworks, this class of failure shall be de
tected by the designated IS, which has the responsibility to
ascertain the set of Intermediate systems that can all com
municate on the subnetwork. The designated IS shall in
clude these Intermediate systems (and no others) in the
Link State PDU it generates for the pseudonode represent
ing the broadcast subnetwork.
7.2.5 Multiple LSPs for the same system
The Update process is capable of dividing a single logical
LSP into a number of separate PDUs for the purpose of
conserving link bandwidth and processing (see 7.3.4).  The
Decision Process, on the other hand, shall regard the LSP
with LSP Number zero in a special way. If the LSP with
LSP Number zero and remaining lifetime > 0, is not present
for a particular system then the Decision Process shall not
process any LSPs with non-zero LSP Number which may
be stored for that system.
The following information shall be taken only from the LSP
with LSP Number zero. Any values which may be present
in other LSPs for that system shall be disregarded by the
Decision Process.
a)The setting of the LSP Database Overload bit.
b)The value of the IS Type field.
c)The Area Addresses option.
7.2.6 Routeing Algorithm Overview
The routeing algorithm used by the Decision Process is a
shortest path first (SPF) algorithm. Instances of the algo
rithm are run independently and concurrently by all Inter
mediate systems in a routeing domain. Intra-Domain route
ing of a PDU occurs on a hop-by-hop basis: that is, the al
gorithm determines only the next hop, not the complete
path, that a data PDU will take to reach its destination. To
guarantee correct and consistent route computation by
every Intermediate system in a routeing domain, this Inter
national Standard depends on the following properties:
 
a)All Intermediate systems in the routeing domain con
verge to using identical topology information; and
b)Each Intermediate system in the routeing domain gen
erates the same set of routes from the same input to
pology and set of metrics.
The first property is necessary in order to prevent inconsis
tent, potentially looping paths. The second property is nec
essary to meet the goal of determinism stated in 6.6.
A system executes the SPF algorithm to find a set of legal
paths to a destination system in the routeing domain. The
set may consist of:
a)a single path of minimum metric sum: these are
termed minimum cost paths;
b)a set of paths of equal minimum metric sum: these are
termed equal minimum cost paths; or
c)a set of paths which will get a PDU closer to its desti
nation than the local system: these are called down
stream paths.
Paths which do not meet the above conditions are illegal
and shall not be used.
The Decision Process, in determining its paths, also ascer
tains the identity of the adjacency which lies on the first
hop to the destination on each path. These adjacencies are
used to form the Forwarding Database,  which the forward
ing process uses for relaying PDUs.
Separate route calculations are made for each pairing of a
level in the routeing hierarchy (i.e. L1 and L2) with a sup
ported routeing metric. Since there are four routeing metrics
and two levels some systems may execute multiple in
stances of the SPF algorithm. For example,
-if an IS is a L2 Intermediate system which supports all
four metrics and computes minimum cost paths for all
metrics, it would execute the SPF calculation eight
times.
-if an IS is a L1 Intermediate system which supports all
four metrics, and additionally computes downstream
paths, it would execute the algorithm  4 W (number of
neighbours + 1) times.
Any implementation of an SPF algorithm meeting both the
static and dynamic conformance requirements of clause 12
of this International Standard may be used. Recommended
implementations are described in detail in Annex C.
7.2.7 Removal of Excess Paths
When there are more than max

i

mum

Path

Splits legal
paths to a destination, this set shall be pruned until only
max

i

mum

Path

Splits remain. The Intermediate system
shall discriminate based upon:
NOTE - The precise precedence among the paths is speci
fied in order to meet the goal of determinism defined in 6.6.
 
-adjacency type: Paths associated with End system or
level 2 reachable address prefix adjacencies are re
tained in preference to other adjacencies
-metric sum: Paths having a lesser metric sum are re
tained in preference to paths having a greater metric
sum. By metric sum is understood the sum of the
metrics along the path to the destination.
-neighbour ID: where two or more paths are associ
ated with adjacencies of the same type, an adjacency
with a lower neighbour ID is retained in preference to
an adjacency with a higher neighbour id.
-circuit ID: where two or more paths are associated
with adjacencies of the same type, and same neigh
bour ID, an adjacency with a lower circuit ID is re
tained in preference to an adjacency with a higher cir
cuit ID, where circuit ID is the value of:
7ptPtCircuitID for non-broadcast circuits,
7l1CircuitID for broadcast circuits when running
the Level 1 Decision Process, and
7l2CircuitID for broadcast circuits when running
the Level 2 Decision Process.
-lANAddress: where two or more adjacencies are of
the same type, same neighbour ID, and same circuit
ID (e.g. a system with multiple LAN adapters on the
same circuit) an adjacency with a lower lANAddress
is retained in preference to an adjacency with a higher
lANAddress.
7.2.8 Robustness Checks
7.2.8.1 Computing Routes through Overloaded
Intermediate systems
The Decision Process shall not utilise a link to an Interme
diate system neighbour from an IS whose LSPs have the
LSP Database Overload indication set. Such paths may in
troduce loops since the overloaded IS does not have a com
plete routeing information base. The Decision Process shall,
however utilise the link to reach End system neighbours
since these paths are guaranteed to be non-looping.
7.2.8.2 Two-way connectivity check
The Decision Process shall not utilise a link between two
Intermediate Systems unless both ISs report the link.
NOTE - the check is not applicable to links to an End Sys
tem.
Reporting the link indicates that it has a defined value for at
least the default routeing metric. It is permissible for two
endpoints to report different defined values of the same
metric for the same link. In this case, routes may be asym
metric.
 
7.2.9 Construction of a Forwarding Database
The information that is needed in the forwarding database
for routeing metric k is the set of adjacencies for each sys
tem N.
7.2.9.1 Identification of Nearest Level 2 IS by a
Level 1 IS
Level 1 Intermediate systems need one additional piece of
information per routeing metric: the next hop to the nearest
level 2 Intermediate system according to that routeing met
ric. A level 1 IS shall ascertain the set, R, of attached
level 2 Intermediate system(s) for metric k such that the to
tal cost to R for metric k is minimal.
If there are more adjacencies in this set than max

i

mum


Path

Splits, then the IS shall remove excess adjacencies as
described in 7.2.7.
7.2.9.2 Setting the Attached Flag in Level 2
Intermediate Systems
If a level 2 Intermediate system discovers, after computing
the level 2 routes for metric k, that it cannot reach any other
areas using that metric, it shall:
-set AttachedFlag for metric k to False;
-regenerate its Level 1 LSP with LSP number zero; and
-compute the nearest level 2 Intermediate system for
metric k for insertion in the appropriate forwarding
database, according to the algorithm described in
7.2.9.1 for level 1 Intermediate systems.
NOTE - AttachedFlag for each metric k is examined by the
Update Process, so that it will report the value in the ATT
field of its Link State PDUs.
If a level 2 Intermediate system discovers, after computing
the level 2 routes for metric k, that it can reach at least one
other area using that metric, it shall
-set AttachedFlag for metric k to True;
-regenerate its Level 1 LSP with LSP number zero; and
-set the level 1 forwarding database entry for metric k
which corresponds to nearest level 2 Intermediate
system to Self.
7.2.10 Information for Repairing Partitioned
Areas
An area may become partitioned as a result of failure of one
or more links in the area. However, if each of the partitions
has a connection to the level 2 subdomain, it is possible to
repair the partition via the level 2 subdomain, provided that
the level 2 subdomain itself is not partitioned. This is illus
trated in Figure 4.
All the systems A  I, R and P are in the same area n.
When the link between D and E is broken, the area be
 
comes partitioned. Within each of the partitions the Parti
tion Designated Level 2 Intermediate system is selected
from among the level 2 Intermediate systems in that parti
tion. In the case of partition 1 this is P, and in the case of
partition 2 this is R. The level 1 repair path is then estab
lished between between these two level 2 Intermediate sys
tems. Note that the repaired link is now between P and R,
not between D and E.
The Partition Designated Level 2 Intermediate Systems re
pair the partition by forwarding NPDUs destined for other
partitions of the area through the level 2 subdomain. They
do this by acting in their capacity as Level 1 Intermediate
Systems and advertising in their Level 1 LSPs adjacencies
to each Partition Designated Level 2 Intermediate System
in the area. This adjacency is known as a Virtual Adja
cency or Virtual Link. Thus other Level 1 Intermediate
Systems in a partition calculate paths to the other partitions
through the Partition Designated Level 2 Intermediate Sys
tem. A Partition Designated Level 2 Intermediate System
forwards the Level 1 NPDUs through the level 2 subdomain
by encapsulating them in 8473 Data NPDUs with its Virtual
Network Entity Title as the source NSAP and the adja
cent Partition Designated Level 2 Intermediate System's
Virtual Network Entity Title as the destination NSAP. The
following sub-clauses describe this in more detail.
7.2.10.1 Partition Detection and Virtual Level 1
Link Creation
Partitions of a Level 1 area are detected by the Level 2 In
termediate System(s) operating within the area.  In order to
participate in the partition repair process, these Level 2 In
termediate systems must also act as Level 1 Intermediate
systems in the area. A partition of a given area exists when
ever two or more Level 2 ISs located in that area are re
ported in the L2 LSPs as being a Partition Designated
Level 2 IS. Conversely, when only one Level 2 IS in an
area is reported as being the Partition Designated Level 2
 
IS, then that area is not partitioned.  Partition repair is ac
complished by the Partition Designated Level 2 IS.  The
election of the Partition Designated Level 2 IS as described
in the next subsection must be done before the detection
and repair process can begin.
In order to repair a partition of a Level 1 area, the Partition
designated Level 2 IS creates a Virtual Network Entity to
represent the partition.  The Network Entity Title for this
virtual network entity shall be constructed from the first
listed area address from its Level 2 Link State PDU, and the
ID of the Partition Designated Level 2 IS.  The IS shall also
construct a virtual link (represented by a new Virtual Adja
cency managed object) to each Partition Designated Level 2
IS in the area, with the NET of the partition recorded in the
Identifier attribute.  The virtual links are the repair paths for
the partition.  They are reported by the Partition Designated
Level 2 IS into the entire Level 1 area by adding the ID of
each adjacent Partition Designated Level 2 IS to the In
termediate System Neighbours field of its Level 1 Link
State PDU.  The Virtual Flag shall be set True for these
Intermediate System neighbours.  The metric value for this
virtual link shall be the default metric value d(N) obtained
from this system's Level 2 PATHS database, where N is the
adjacent Partition Designated Level 2 IS via the Level 2
subdomain.
An Intermediate System which operates as the Partition
Designated Level 2 Intermediate System shall perform the
following steps after completing the Level 2 shortest path
computation in order to detect partitions in the Level 1 area
and create repair paths:
a)Examine Level 2 Link State PDUs of all Level 2 Inter
mediate systems. Search area

Addresses for any ad
dress that matches any of the addresses in partition


Area

Addresses. If a match is found, and the Parti
tion Designated Level 2 Intermediate system's ID
does not equal this system's ID, then inform the level
1 update process at this system of the identity of the
 
Partition Designated Level 2 Intermediate system, to
gether with the path cost for the default routeing met
ric to that Intermediate system.
b)Continue examining Level 2 LSPs until all Partition
Designated Level 2 Intermediate systems in other par
titions of this area are found, and inform the Level 1
Update Process of all of the other Partition Designated
Level 2 Intermediate systems in other partitions of this
area, so that
1)Level 1 Link State PDUs can be propagated to all
other Partition designated level 2 Intermediate sys
tems for this area (via the level 2 subdomain).
2)All the Partition Designated Level 2 Intermediate
systems for other partitions of this area can be re
ported as adjacencies in this system's Level 1 Link
State PDUs.
If a partition has healed, the IS shall destroy the associated
virtual network entity and virtual link by deleting the Vir
tual Adjacency.  The Partition Designated Level 2 IS de
tects a healed partition when another Partition Designated
Level 2 IS listed as a virtual link in its Level 1 Link State
PDU was not found after running the partition detection and
virtual link creation algorithm described above.
If such a Virtual Adjacency is created or destroyed, the IS
shall generate a partitionVirtualLinkChange notification.
7.2.10.2 Election of Partition Designated Level 2
Intermediate System
 The Partition Designated Level 2 IS is a Level 2 IS which:
-reports itself as attached by the default metric in its
LSPs;
-reports itself as implementing the partition repair op
tion;
-operates as a Level 1 IS in the area;
-is reachable via Level 1 routeing without traversing
any virtual links; and
-has the lowest ID
The election of the Partition Designated Level 2 IS is per
formed by running the decision process algorithm after the
Level 1 decision process has finished, and before the
Level 2 decision process to determine Level 2 paths is exe
cuted.  
In order to guarantee that the correct Partition Designated
Level 2 IS is elected, the decision process is run using only
the Level 1 LSPs for the area, and by examining only the
Intermediate System Neighbours whose Virtual Flag is
FALSE.  The results of this decision process is a set of all
the Level 1 Intermediate Systems in the area that can be
reached via Level 1, non-virtual link routeing.  From this
set, the Partition Designated Level 2 IS is selected by
choosing the IS for which
-IS Type (as reported in the Level 1 LSP) is Level 2
Intermediate System;
 
-ATT  indicates attached by the default metric;
-P indicates support for the partition repair option;  and
-ID is the lowest among the subset of attached Level 2
Intermediate Systems.
7.2.10.3 Computation of Partition area addresses
A Level 2 Intermediate System shall compute the set of
partition

Area

Addresses, which is the union of all
manual

area

Addresses as reported in the Level 1 Link
State PDUs of all Level 2 Intermediate systems reachable in
the partition by the traversal of non-virtual links.  If more
than max

i

mum

Area

Addresses are present, the Interme
diate system shall retain only those areas with numerically
lowest area address (as described in 7.1.5). If one of the lo
cal system's manual

Area

Addresses is so rejected the
notification manualAddressDroppedFromArea shall be
generated.
7.2.10.4 Encapsulation of NPDUs Across the
Virtual Link
All NPDUs sent over virtual links shall be encapsulated as
ISO 8473 Data NPDUs.  The encapsulating Data NPDU
shall contain the Virtual Network Entity Title of the Parti
tion Designated Level 2 IS that is forwarding the NPDU
over the virtual link in the Source Address field, and the
Virtual NET of the adjacent Partition Designated Level 2
IS in the Destination Address field.  The SEL field in
both NSAPs shall contain the IS-IS routeing selector
value.  The QoS Maintenance field of the outer PDU shall
be set to indicate forwarding via the default routeing metric
(see table 1 on page 32).  
For Data and  Error Report NPDUs the Segmentation
Permitted and Error Report flags and the Lifetime field  
of the outer NPDU shall be copied from the inner NPDU.  
When the inner NPDU is decapsulated, its Lifetime field  
shall be set to the value of the Lifetime field in the outer
NPDU.
For LSPs and SNPs the Segmentation Permitted flag
shall be set to True and the Error Report flag shall be set
to False.  The Lifetime field shall be set to 255.  When an
inner LSP is decapsulated, its remaining lifetime shall be
decremented by half the difference between 255 and the
value of the Lifetime field in the outer NPDU.
Data NPDUs shall not be fragmented before encapsulation,
unless the total length of the Data NPDU (including header)
exceeds 65535 octets.  In that case, the original Data NPDU
shall first be fragmented, then encapsulated.  In all cases,
the encapsulated Data NPDU may need to be fragmented
by ISO 8473 before transmission in which case it must be
reassembled and decapsulated by the destination Partition
Designated Level 2 IS.  The encapsulation is further de
scribed as part of the forwarding process in 7.4.3.2.  The
decapsulation is described as part of the Receive process in
7.4.4.
7.2.11 Computation of area addresses
A Level 1 or Level 2 Intermediate System shall compute
the values of area

Addresses (the set of area addresses
 
for this Level 1 area), by forming the union of the sets of
manual

area

Addresses reported in the Area Addresses
field of all Level 1 LSPs with LSP number zero in the local
Intermediate system's link state database.
NOTE - This includes all source systems, whether currently
reachable or not. It also includes the local Intermediate sys
tem's own Level 1 LSP with LSP number zero.  
NOTE - There is no requirement for this set to be updated
immediately on each change to the database contents. It is
permitted to defer the computation until the next running of
the Decision Process.  
If more than max

i

mum

Area

Addresses are present, the
Intermediate system shall retain only those areas with nu
merically lowest area address (as described in 7.1.5). If one
of the local system's manual

area

Addresses is rejected
the notification manual

Address

Dropped

From

Area shall
be generated.
7.2.12 Order of Preference of Routes
If an Intermediate system takes part in level 1 routeing, and
determines (by looking at the area address) that a given des
tination is reachable within its area, then that destination
will be reached exclusively by use of level 1 routeing. In
particular:
a)Level 1 routeing is always based on internal metrics.
b)Amongst routes in the area, routes on which the re
quested QoS (if any) is supported are always preferred
to routes on which the requested QoS is not supported.
c)Amongst routes in the area of the same QoS, the short
est routes are preferred. For determination of the
shortest path, if a route with specific QoS support is
available, then the specified QoS metric is used, other
wise the default metric is used.
d)Amongst routes of equal cost, load splitting may be
performed.
If an Intermediate system takes part in level 1 routeing,
does not take part in level 2 routeing, and determines (by
looking at the area address) that a given destination is not
reachable within its area, and at least one attached level 2
IS is reachable in the area, then that destination will be
reached by routeing to a level 2 Intermediate system as fol
lows:
a)Level 1 routeing is always based on internal metrics.
b)Amongst routes in the area to attached level 2 ISs,
routes on which the requested QoS (if any) is sup
ported are always preferred to routes on which the re
quested QoS is not supported.
c)Amongst routes in the area of the same QoS to at
tached level 2 ISs, the shortest route is preferred. For
determination of the shortest path, if a route on which
the specified QoS is available, then the specified QoS
metric is used, otherwise the default metric is used.
 
d)Amongst routes of equal cost, load splitting may be
performed.
If an Intermediate system takes part in level 2 routeing and
is attached, and the IS determines (by looking at the area
address) that a given destination is not reachable within its
area, then that destination will be reached as follows:
a)Routes on which the requested QoS (if any) is sup
ported are always preferred to routes on which the re
quested QoS is not supported.
b)Amongst routes of the same QoS, routes are priori
tised as follows:
1)Highest precedence: routes matching the area ad
dress of any area in the routeing domain
2)Medium precedence: Routes matching a reachable
address prefix with an internal metric. For destina
tions matching multiple reachable address prefix
entries all with internal metrics, the longest prefix
shall be preferred.
3)Lowest precedence: Routes matching a reachable
address prefix with an external metric. For destina
tions matching multiple reachable address prefix
entries all with external metrics, the longest prefix
shall be preferred.
c)For routes with equal precedence as specified above,
the shortest path shall be preferred. For determination
of the shortest path, a route supporting the specified
QoS is used if available; otherwise a route using the
default metric shall be used. Amongst routes of equal
cost, load splitting may be performed.
7.3 The Update Process
The Update Process is responsible for generating and
propagating Link State information reliably throughout the
routeing domain.
The Link State information is used by the Decision Process
to calculate routes.
7.3.1 Input and Output
INPUT
-Adjacency Database  maintained by the Subnetwork
Dependent Functions
-Reachable Address managed objects - maintained by
System Management
-Notification of Adjacency Database Change  notifi
cation by the Subnetwork Dependent Functions that
an adjacency has come up, gone down, or changed
cost. (Circuit up, Circuit down, Adjacency Up, Adja
cency Down, and Cost change events)
-AttachedFlag  (level 2 Intermediate systems only),
a flag computed by the Level 2 Decision Process indi
cating whether this system can reach (via level 2
routeing) other areas
 
-Link State PDUs  The Receive Process passes Link
State PDUs to the Update Process, along with an indi
cation of which adjacency it was received on.
-Sequence Numbers PDUs  The Receive Process
passes Sequence Numbers PDUs to the Update Proc
ess, along with an indication of which adjacency it
was received on.
-Other Partitions  The Level 2 Decision Process
makes available (to the Level 1 Update Process on a
Level 2 Intermediate system) a list of aPartition Desig
nated Level 2 Intermediate system, Level 2 default
metric valueq pairs, for other partitions of this area.
 OUTPUT
-Link State Database
-Signal to the Decision Process of an event, which is
either the receipt of a Link State PDU with different
information from the stored one, or the purging of a
Link State PDU from the database. The reception of a
Link State PDU which has a different sequence num
ber or Remaining Lifetime from one already stored in
the database, but has an identical variable length por
tion, shall not cause such an event.
NOTE - An implementation may compare the checksum of
the stored Link State PDU, modified according to the
change in sequence number, with the checksum of the re
ceived Link State PDU. If they differ, it may assume that the
variable length portions are different and an event signalled
to the Decision Process. However, if the checksums are the
same, an octet for octet comparison must be made in order
to determine whether or not to signal the event.
7.3.2 Generation of Local Link State
Information
The Update Process is responsible for constructing a set of
Link State PDUs. The purpose of these Link State PDUs is
to inform all the other Intermediate systems (in the area, in
the case of Level 1, or in the Level 2 subdomain, in the case
of Level 2), of the state of the links between the Intermedi
ate system that generated the PDUs and its neighbours.
The Update Process in an Intermediate system shall gener
ate one or more new Link State PDUs under the following
circumstances:
a)upon timer expiration;
b)when notified by the Subnetwork Dependent Func
tions of an Adjacency Database Change;
c)when a change to some Network Management charac
teristic would cause the information in the LSP to
change (for example, a change in manual

area


Addresses).
7.3.3 Use of Manual Routeing Information
Manual routeing information is routeing information en
tered by system management. It may be specified in two
forms.
 
a)Manual Adjacencies
b)Reachable Addresses
These are described in the following sub-clauses.
7.3.3.1 Manual Adjacencies
An End system adjacency may be created by System Man
agement. Such an adjacency is termed a manual End sys
tem adjacency. In order to create a manual End system ad
jacency, system managements shall specify:
a)the (set of) system IDs reachable over that adjacency;
and
b)the corresponding SNPA Address.
 These adjacencies shall appear as adjacencies with type
Manual, neighbourSystemType End system and  
state Up. Such adjacencies provide input to the Update
Process in a similar way to adjacencies created through the
operation of ISO 9542. When the state changes to Up the
adjacency information is included in the Intermediate Sys
tem's own Level 1 LSPs.
NOTE - Manual End system adjacencies shall not be in
cluded in a Level 1 LSPs issued on behalf of a pseudonode,
since that would presuppose that all Intermediate systems on
a broadcast subnetwork had the same set of manual adjacen
cies as defined for this circuit.
Metrics assigned to Manual adjacencies must be Internal
metrics.
7.3.3.2 Reachable Addresses
A Level 2 Intermediate system may have a number of
Reachable Address managed objects created by System
management. When a Reachable Address is in state On
and its parent Circuit is also in state On, the name and
each of its defined routeing metrics shall be included in
Level 2 LSPs generated by this system.
Metrics assigned to Reachable Address managed objects
may be either Internal or External.
A reachable address is considered to be active when all
the following conditions are true:
a)The parent circuit is in state On;
b)the Reachable Address is in state On; and
c)the parent circuit is of type broadcast or is in data link
state Running.
Whenever a reachable address changes from being inac
tive to active a signal shall be generated to the Update
process to cause it to include the Address Prefix of the
reachable address in the Level 2 LSPs generated by that
system as described in 7.3.9.
Whenever a reachable address changes from being active
to inactive, a signal shall be generated to the Update
 
process to cause it to cease including the Address Prefix of
the reachable address in the Level 2 LSPs.
7.3.4 Multiple LSPs
Because a Link State PDU is limited in size to Receive


LSP

Buffer

Size, it may not be possible to include infor
mation about all of a system's neighbours in a single LSP.
In such cases, a system may use multiple LSPs to convey
this information. Each LSP in the set carries the same
sourceID field (see clause 9), but sets its own LSP Num
ber field individually. Each of the several LSPs is handled
independently by the Update Process, thus allowing distri
bution of topology updates to be pipelined. However, the
Decision Process recognises that they all pertain to a com
mon originating system because they all use the same
sourceID.
NOTE - Even if the amount of information is small enough
to fit in a single LSP, a system may optionally choose to use
several LSPs to convey it; use of a single LSP in this situ
ation is not mandatory.
NOTE - In order to minimise the transmission of redundant
information, it is advisable for an IS to group Reachable  
Address Prefix information by the circuit with which it is as
sociated. Doing so will ensure that the minimum  number of
LSP fragments need be transmitted if a circuit to another
routeing domain changes state.
The maximum sized Level 1 or Level 2 LSP which may be
generated by a system is controlled by the values of the
management parameters originating

L1

LSP

Buf

fer

Size or
ori

ginat

ing

L2

LSP

Buffer

Size respectively.
NOTE - These parameters should be set consistently by sys
tem management. If this is not done, some adjacencies will
fail to initialise.
The IS shall treat the LSP with LSP Number zero in a spe
cial way, as follows:
a)The following fields are meaningful to the decision
process only when they are present in the LSP with
LSP Number zero:
1)The setting of the LSP Database Overload bit.
2)The value of the IS Type field.
3)The Area Addresses option. (This is only present
in the LSP with LSP Number zero, see below).
b)When the values of any of the above items are
changed, an Intermediate System shall re-issue the
LSP with LSP Number zero, to inform other Interme
diate Systems of the change. Other LSPs need not be
reissued.
Once a particular adjacency has been assigned to a particu
lar LSP Number, it is desirable that it not be moved to an
other LSP Number. This is because moving an adjacency
from one LSP to another can cause temporary loss of
 
connectivity to that system. This can occur if the new ver
sion of the LSP which originally contained information
about the adjacency (which now does not contain that infor
mation) is propagated before the new version of the other
LSP (which now contains the information about the adja
cency). In order to minimise the impact of this, the follow
ing restrictions are placed on the assignment of information
to LSPs.
a)The Area Addresses option field shall occur only in
the LSP with LSP Number  zero.
b)Intermediate System Neighbours options shall occur
after the Area Addresses option and before any End
System (or in the case of Level 2, Prefix) Neigh
bours options.
c)End System (or Prefix) Neighbour options (if any)
shall occur after any Area Address or Intermediate
System Neighbour options.
NOTE  In this context, after means at a higher octet
number from the start of the same LSP or in an LSP with
a higher LSP Number.
NOTE  An implementation is recommended to ensure
that the number of LSPs generated for a particular system
is within approximately 10% of the optimal number
which would be required if all LSPs were densely packed
with neighbour options. Where possible this should be
accomplished by re-using space in LSPs with a lower
LSP Number for new adjacencies. If it is necessary to
move an adjacency from one LSP to another, the
SRMflags (see 7.3.15) for the two new LSPs shall be
set as an atomic action.44If the two SRMflags are not set atomically, a
race condition will exist in which one of the two LSPs may be
propagated quickly, while the other waits for
an entire propagation cycle. If this occurs, adjacencies will be
falsely eliminated from the topology and routes may become unstable for
period of time
potentially as large as maximumLSPGeneratonInterval.
 
When some event requires changing the LSP information
for a system, the system shall reissue that (or those) LSPs
which would have different contents. It is not required to
reissue the unchanged LSPs. Thus a single End system ad
jacency change only requires the reissuing of the LSP con
taining the End System Neighbours option referring to
that adjacency. The parameters max

imum

LSP

Gen

er

a


tion

Int

er

val and minimumLSPGenerationInterval shall
apply to each LSP individually.
7.3.5 Periodic LSP Generation
The Update Process shall periodically re-generate and
propagate on every circuit with an IS adjacency of the ap
propriate level (by setting SRMflag on each circuit), all the
LSPs (Level 1 and/or Level 2) for the local system and any
pseudonodes for which it is responsible. The Intermediate
system shall re-generate each LSP at intervals of at most
max

i

mum

LSP

Gen

era

tion

Interval seconds, with jitter
applied as described in 10.1.
These LSPs may all be generated on expiration of a single
timer or alternatively separate timers may be kept for each
LSP Number and the individual LSP generated on expira
tion of this timer.
 
7.3.6 Event Driven LSP Generation
In addition to the periodic generation of LSPs, an Interme
diate system shall generate an LSP when an event occurs
which would cause the information content to change. The
following events may cause such a change.
-an Adjacency or Circuit Up/Down event
- a change in Circuit metric
-a change in Reachable Address metric
-a change in manual

Area

Addresses
-a change in systemID
-a change in Designated  Intermediate System status
-a change in the waiting status
When such an event occurs the IS shall re-generate changed
LSP(s) with a new sequence number. If the event necessi
tated the generation of an LSP which had not previously
been generated (for example, an adjacency Up event for
an adjacency which could not be accommodated in an exist
ing LSP), the sequence number shall be set to one. The IS
shall then propagate the LSP(s) on every circuit by setting
SRMflag for each circuit. The timer maximum

LSP

Gen


er

ation

Interval shall not be reset.
There is a hold-down timer (min

i

mum

LSP

Generation


Interval) on the generation of each individual LSP.
7.3.7 Generation of Level 1 LSPs
(non-pseudonode)
The Level 1 Link State PDU not generated on behalf of a
pseudonode contains the following information in its vari
able length fields.
-In the Area Addresses option the set of manual


Area

Addresses for this Intermediate System.
-In the Intermediate System Neighbours option  
the set of Intermediate system IDs of neighbouring In
termediate systems formed from:
7The set of neighbourSystemIDs with an ap
pended zero octet (indicating non-pseudonode)
from adjacencies in the state Up, on circuits of
type Point-Point, In or Out, with
xneighbourSystemType L1 Intermediate
System
xneighbourSystemType L2 Intermediate
System and adjacencyUsage Level 2 or
Level1 and 2.
The metrics shall be set to the values of Level 1
metrick of the circuit for each supported routeing
metric.
7The set of l1CircuitIDs for all circuits of type
Broadcast (i.e. the neighbouring pseudonode
IDs) .
 
The metrics shall be set to the values of Level 1
metrick of the circuit for each supported routeing
metric.
7The set of IDs with an appended zero octet derived
from the Network Entity Titles of all Virtual Adja
cencies of this IS. (Note that the Virtual Flag is set
when encoding these entries in the LSP  see
7.2.10.)
The default metric shall be set to the total cost to
the virtual NET for the default routeing metric.
The remaining metrics shall be set to the value in
dicating unsupported.
-In the End System Neighbours option  the set of
IDs of neighbouring End systems formed from:
7The systemID of the Intermediate System itself,
with a value of zero for all supported metrics.
7The set of endSystemIDs from all adjacencies
with type Auto-configured, in state Up, on
circuits of type Point-to-Point, In or Out,
with neighbourSystemType End system.
The metrics shall be set to the values of Level 1
metrick of the circuit for each supported routeing
metric.
7The set of endSystemIDs from all adjacencies
with type Manual in state Up, on all circuits.
The metrics shall be set to the values of Level 1
metrick of the circuit for each supported routeing
metric.
-In the Authentication Information field  if the
system's areaTransmitPassword is non-null, in
clude the Authentication Information field contain
ing an Authentication Type  of Password, and the
value of the areaTransmitPassword.
7.3.8 Generation of Level 1 Pseudonode LSPs
An IS shall generate a  Level 1 pseudonode Link State PDU
for each circuit for which this Intermediate System is the
Level 1 LAN Designated Intermediate System. The LSP
shall specify the following information in its variable length
fields. In all cases a value of zero shall be used for all sup
ported routeing metrics
-The Area Addresses option is not present.
Note - This information is not required since the set of
area addresses for the node issuing the pseudonode
LSP will already have been made available via its own
non-pseudonode LSP.
-In the Intermediate System Neighbours option  
the set of Intermediate System IDs of neighbouring In
termediate Systems on the circuit for which this
pseudonode LSP is being generated formed from:
7The Designated Intermediate System's own sys
temID with an appended zero octet (indicating
non-pseudonode).
 
7The set of neighbourSystemIDs with an ap
pended zero octet (indicating non-pseudonode)
from adjacencies on this circuit in the state Up,
with  
xneighbourSystemType L1 Intermediate
System
xL2 Intermediate System and adjacency
Usage Level 1.
-In the End System Neighbours option  the set of
IDs of neighbouring End systems formed from:
7The set of endSystemIDs from all adjacencies
with type Auto-configured, in state Up, on
the circuit for which this pseudonode is being gen
erated, with neighbourSystemType End sys
tem.
-In the Authentication Information field  if the
system's areaTransmitPassword is non-null, in
clude the Authentication Information field contain
ing an Authentication Type  of Password, and the
value of the areaTransmitPassword.
7.3.9 Generation of Level 2 LSPs
(non-pseudonode)
The Level 2 Link State PDU not generated on behalf of a
pseudonode contains the following information in its vari
able length fields:
-In the Area Addresses option  the set of area


Addresses for this Intermediate system computed as
described in 7.2.11.
-In the Partition Designated Level 2 IS option  the
ID of the Partition Designated Level 2 Intermediate
System for the partition.
-In the Intermediate System Neighbours option  
the set of Intermediate system IDs of neighbouring In
termediate systems formed from:
7The set of neighbourSystemIDs with an ap
pended zero octet (indicating non-pseudonode)
from adjacencies in the state Up, on circuits of
type Point-to-Point, In or Out, with neigh
bourSystemType L2 Intermediate System.
7The set of l2CircuitIDs for all circuits of type
Broadcast. (i.e. the neighbouring pseudonode
IDs)
The metric and metric type shall be set to the val
ues of Level 2 metrick of the circuit for each sup
ported routeing metric.
-In the Prefix Neighbours option  the set of vari
able length prefixes formed from:
7The set of names of all Reachable Address man
aged objects in state On, on all circuits in state
On.
 
The metrics shall be set to the values of Level 2  
metrick for the reachable address.
-In the Authentication Information field  if the
system's domainTransmitPassword is non-null,
include the Authentication Information field con
taining an Authentication Type  of Password, and
the value of the domainTransmitPassword.
7.3.10 Generation of Level 2 Pseudonode LSPs
A Level 2 pseudonode Link State PDU is generated for
each circuit for which this Intermediate System is the
Level 2 LAN Designated Intermediate System and contains
the following information in its variable length fields. In all
cases a value of zero shall be used for all supported route
ing metrics.
-The Area Addresses option is not present.
Note - This information is not required since the set of
area addresses for the node issuing the pseudonode
LSP will already have been made available via its own
non-pseudonode LSP.
-In the Intermediate System Neighbours option  
the set of Intermediate System IDs of neighbouring In
termediate Systems on the circuit for which this
pseudonode LSP is being generated formed from:
7The Designated Intermediate System's own sys
temID with an appended zero octet (indicating
non-pseudonode).
7The set of neighbourSystemIDs with an ap
pended zero octet (indicating non-pseudonode)
from adjacencies on this circuit in the state Up
with neighbourSystemType L2 Intermediate
System.
-The Prefix Neighbours option is not present.
-In the Authentication Information field  if the
system's domainTransmitPassword is non-null,
include the Authentication Information field con
taining an Authentication Type  of Password, and
the value of the domainTransmitPassword.
7.3.11 Generation of the Checksum
This International Standard makes use of the checksum
function defined in ISO 8473.
The source IS shall compute the LSP Checksum when the
LSP is generated. The checksum shall never be modified by
any other system. The checksum allows the detection of
memory corruptions and thus prevents both the use of in
correct routeing information and its further propagation by
the Update Process.
The checksum shall be computed over all fields in the LSP
which appear after the Remaining Lifetime field. This
field (and those appearing before it) are excluded so that the
LSP may be aged by systems without requiring re-
computation.
 
As an additional precaution against hardware failure, when
the source computes the Checksum, it shall start with the
two checksum variables (C0 and C1) initialised to what
they would be after computing for the systemID portion
(i.e. the first 6 octets) of its Source ID. (This value is com
puted and stored when the Network entity is enabled and
whenever systemID changes.) The IS shall then resume
Checksum computation on the contents of the PDU after
the first ID Length octets of the Source ID field.
NOTE - All Checksum calculations on the LSP are per
formed treating the Source ID field as the first octet. This
procedure prevents the source from accidentally sending out
Link State PDUs with some other system's ID as source.
7.3.12 Initiating Transmission
The IS shall store the generated Link State PDU in the Link
State Database, overwriting any previous Link State PDU
with the same LSP Number generated by this system. The
IS shall then set all SRMflags for that Link State PDU, in
dicating it is to be propagated on all circuits with Intermedi
ate System adjacencies.
An Intermediate system shall ensure (by reserving re
sources, or otherwise) that it will always be able to store
and internalise its own non-pseudonode zeroth LSP. In the
event that it is not capable of storing and internalising one
of its own LSPs it shall enter the overloaded state as de
scribed in 7.3.19.1.
NOTE - It is recommended that an Intermediate system en
sure (by reserving resources, or otherwise) that it will al
ways be able to store and internalise all its own (zero and
non-zero, pseudonode and non-pseudonode) LSPs.
7.3.13 Preservation of order
When an existing Link State PDU is re-transmitted (with
the same or a different sequence number), but with the
same information content (i.e. the variable length part) as a
result of there having been no changes in the local topology
databases, the order of the information in the variable
length part shall be the same as that in the previously trans
mitted LSP.
NOTE - If a sequence of changes result in the state of the
database returning to some previous value, there is no re
quirement to preserve the ordering. It is only required when
there have been no changes whatever. This allows the re
ceiver to detect that there has been no change in the infor
mation content by performing an octet for octet comparison
of the variable length part, and hence not re-run the decision
process.
7.3.14 Propagation of LSPs
The update process is responsible for propagating Link
State PDUs throughout the domain (or in the case of
Level 1, throughout the area).
The basic mechanism is flooding, in which each Intermedi
ate system propagates to all its neighbour Intermediate sys
tems except that neighbour from which it received the
PDU. Duplicates are detected and dropped.
 
Link state PDUs are received from the Receive Process.
The maximum size control PDU (Link State PDU or Se
quence Numbers PDU) which a system expects to receive
shall be Receive

LSP

Buffer

Size octets. (i.e. the Update
process must provide buffers of at least this size for the re
ception, storage and forwarding of received Link State
PDUs and Sequence Numbers PDUs.)  If a control PDU
larger than this size is received, it shall be treated as if it
had an invalid checksum (i.e. ignored by the Update Proc
ess and a corruptedLSPReceived notification generated).
Upon receipt of a Link State PDU the Update Process shall
perform the following functions:
a)Level 2 Link State PDUs shall be propagated on cir
cuits which have at least one Level 2 adjacency.
b)Level 1 Link State PDUs shall be propagated on cir
cuits which have at least one Level 1 adjacency or at
least one Level 2 adjacency not marked Level 2
only.
c)When propagating a Level 1 Link State PDU on a
broadcast subnetwork, the IS shall transmit to the
multi-destination subnetwork address AllL1IS.
d)When propagating a Level 2 Link State PDU on a
broadcast subnetwork, the IS shall transmit to the
multi-destination subnetwork address AllL2IS.
NOTE  When propagating a Link State PDU on a
general topology subnetwork the Data Link Address
is unambiguous (because Link State PDUs are not
propagated across Dynamically Assigned circuits).
e)An Intermediate system receiving a Link State PDU
with an incorrect LSP Checksum or with an invalid
PDU syntax shall
1)log a circuit notification, corruptedLSPRe
ceived,
2)overwrite the Checksum and Remaining Lifetime
with 0, and
3)treat the Link State PDU as though its Remaining
Lifetime had expired (see 7.3.16.4.)
f)A Intermediate system receiving a Link State PDU
which is new (as identified in 7.3.16) shall
1)store the Link State PDU into Link State database,
and
2)mark it as needing to be propagated upon all cir
cuits except that upon which it was received.
g)When a Intermediate system receives a Link State
PDU from source S, which it considers older than the
one stored in the database for S, it shall set the
SRMflag for S's Link State PDU associated with the
circuit from which the older Link State PDU was re
ceived. This indicates that the stored Link State PDU
needs to be sent on the link from which the older one
was received.
 
h)When a system receives a Link State PDU which is
the same (not newer or older) as the one stored, the In
termediate system shall
1)acknowledge it if necessary, as described in 7.3.17,
and
2)clear the SRMflag for that circuit for that Link
State PDU.
i)A Link State PDU received with a zero checksum
shall be treated as if the Remaining Lifetime were 0.
The age, if not 0, shall be overwritten with 0.
The Update Process scans the Link State Database for Link
State PDUs with SRMflags set. When one is found, pro
vided the timestamp lastSent indicates that it was propa
gated no more recently than min

i

mum

LSP

Trans

mis

sion


Int

er

val, the IS shall
a)transmit it on all circuits with SRMflags set, and
b)update lastSent.
7.3.15 Manipulation of SRM and SSN Flags
For each Link State PDU, and for each circuit over which
routeing messages are to be exchanged (i.e. not on DA cir
cuits), there are two flags:
Send Routeing Message (SRMflag)  if set, indicates that
Link State PDU should be transmitted on that cir
cuit.  On broadcast circuits SRMflag is cleared as
soon as the LSP has been transmitted, but on non-
broadcast circuits SRMflag is only cleared on recep
tion of a Link State PDU or Sequence Numbers
PDU as described below.
SRMflag shall never be set for an LSP with se
quence number zero, nor on a circuit whose exter
nalDomain attribute is True (See 7.3.15.2).
Send Sequence Numbers (SSNflag)  if set, indicates that
information about that Link State PDU should be in
cluded in a Partial Sequence Numbers PDU trans
mitted on that circuit.  When the Sequence Numbers
PDU has been transmitted SSNflag is cleared.  Note
that the Partial Sequence Numbers PDU serves as an
acknowledgement that a Link State PDU was re
ceived.
SSNflag shall never be set on a circuit whose ex
ternalDomain attribute is True.
7.3.15.1 Action on Receipt of a Link State PDU
 When a Link State PDU is received on a circuit C, the IS
shall perform the following functions
a)Perform the following PDU acceptance tests:
1)If the LSP was received over a circuit whose ex
ternalDomain attribute is True, the IS shall dis
card the PDU.
2)If the ID Length field of the PDU is not equal to
the value of the IS's routeingDomainIDLength,
 
the PDU shall be discarded and an iDField
LengthMismatch notification generated.
3)If this is a level 1 LSP, and the set of areaRe
ceivePasswords is non-null, then perform the
following tests:
i)If the PDU does not contain the Authentica
tion Information field then the PDU shall be
discarded and an authenticationFailure no
tification generated.
ii)If the PDU contains the Authentication In
formation field, but the Authentication
Type is not equal to Password, then the
PDU shall be accepted unless the IS imple
ments the authenticatiion procedure indicated
by the Authentication Type. In this case
whether the IS accepts or ignores the PDU is
outside the scope of this International Stan
dard.
iii)Otherwise, the IS shall compare the password
in the received PDU with the passwords in the
set of areaReceivePasswords, augmented
by the value of the areaTransmitPassword.
If the value in the PDU matches any of these
passwords, the IS shall accept the PDU for
further processing. If the value in the PDU
does not match any of the above values, then
the IS shall ignore the PDU and generate an
authenticationFailure notification.
4)If this is a level 2 LSP, and the set of domainRe
ceivePasswords is non-null, then perform the
following tests:
i)If the PDU does not contain the Authentica
tion Information field then the PDU shall be
discarded and an authenticationFailure no
tification generated.
ii)If the PDU contains the Authentication In
formation field, but the Authentication
Type is not equal to Password, then the
PDU shall be accepted unless the IS imple
ments the authenticatiion procedure indicated
by the Authentication Type. In this case
whether the IS accepts or ignores the PDU is
outside the scope of this International Stan
dard.
iii)Otherwise, the IS shall compare the password
in the received PDU with the passwords in the
set of domainReceivePasswords, aug
mented by the value of the domainTransmit
Password. If the value in the PDU matches
any of these passwords, the IS shall accept the
PDU for further processing. If the value in the
PDU does not match any of the above values,
then the IS shall ignore the PDU and generate
an authenticationFailure notification.
b)If the LSP has zero Remaining Lifetime, perform the
actions described in 7.3.16.4.
c)If the source S of the LSP is an IS or pseudonode for
which all but the last octet are equal to the systemID
 
of the receiving Intermediate System, and the receiv
ing Intermediate System does not have that LSP in its
database, or has that LSP, but no longer considers it to
be in the set of LSPs generated by this system (e.g. it
was generated by a previous incarnation of the sys
tem), then initiate a network wide purge of that LSP as
described in 7.3.16.4.
d)If the source S of the LSP is a system (pseudonode or
otherwise) for which the first ID Length octets are
equal to the systemID of the receiving Intermediate
system, and the receiving Intermediate system has an
LSP in the set of currently generated LSPs from that
source in its database (i.e. it is an LSP generated by
this Intermediate system), perform the actions de
scribed in 7.3.16.1.
e)Otherwise, (the source S is some other system),
1)If the LSP is newer than the one in the database, or
if an LSP from that source does not yet exist in the
database:
i)Store the new LSP in the database, overwriting
the existing database LSP for that source (if
any) with the received LSP.
ii)Set SRMflag for that LSP for all circuits
other than C.
iii)Clear SRMflag for C.
iv)If C is a non-broadcast circuit, set SSNflag
for that LSP for C.
v)Clear SSNflag for that LSP for the circuits
other than C.
2)If the LSP is equal to the one in the database (same
Sequence Number, Remaining Lifetimes both zero
or both non-zero, same checksums):
i)Clear SRMflag for C.
ii)If C is a non-broadcast circuit, set SSNflag
for that LSP for C.
3)If the LSP is older than the one in the database:
i)Set SRMflag for C.
ii)Clear SSNflag for C.
When storing a new LSP, the Intermediate system shall first
ensure that it has sufficient memory resources to both store
the LSP and generate whatever internal data structures will
be required to process the LSP by the Update Process.  If
these resources are not available the LSP shall be ignored.
It shall neither be stored nor acknowledged. When an LSP
is ignored for this reason the IS shall enter the Waiting
State. (See 7.3.19).
When attempting to store a new version of an existing LSP
(with the same LSPID), which has a length less than or
equal to that of the existing LSP, the existing LSP shall be
removed from the routeing information base and the new
LSP stored as a single atomic action. This ensures that such
an LSP (which may be carrying the LSP Database Overload
indication from an overloaded IS) will never be ignored as
a result of a lack of memory resources.
 
7.3.15.2 Action on Receipt of a Sequence Numbers
PDU
When a Sequence Numbers PDU (Complete or Partial, see
7.3.17) is received on circuit C the IS shall perform the fol
lowing functions:
a)Perform the following PDU acceptance tests:
1)If the SNP was received over a circuit whose ex
ternalDomain attribute is True, the IS shall dis
card the PDU.
2)If the ID Length field of the PDU is not equal to
the value of the IS's routeingDomainIDLength,
the PDU shall be discarded and an iDField


Length

Mismatch notification generated.
3)If this is a level 1 SNP and the set of areaRe
ceivePasswords is non-null, then perform the
following tests:
i)If the PDU does not contain the Authentica
tion Information field then the PDU shall be
discarded and an authenticationFailure no
tification generated.
ii)If the PDU contains the Authentication In
formation field, but the Authentication
Type is not equal to Password, then the
PDU shall be accepted unless the IS imple
ments the authenticatiion procedure indicated
by the Authentication Type. In this case
whether the IS accepts or ignores the PDU is
outside the scope of this International Stan
dard.
iii)Otherwise, the IS shall compare the password
in the received PDU with the passwords in the
set of areaReceivePasswords, augmented
by the value of the areaTransmitPassword.
If the value in the PDU matches any of these
passwords, the IS shall accept the PDU for
further processing. If the value in the PDU
does not match any of the above values, then
the IS shall ignore the PDU and generate an
authenticationFailure notification.
4)If this is a level 2 SNP, and the set of domainRe
ceivePasswords is non-null, then perform the
following tests:
i)If the PDU does not contain the Authentica
tion Information field then the PDU shall be
discarded and an authenticationFailure no
tification generated.
ii)If the PDU contains the Authentication In
formation field, but the Authentication
Type is not equal to Password, then the
PDU shall be accepted unless the IS imple
ments the authenticatiion procedure indicated
by the Authentication Type. In this case
whether the IS accepts or ignores the PDU is
outside the scope of this International Stan
dard.
 
iii)Otherwise, the IS shall compare the password
in the received PDU with the passwords in the
set of domainReceivePasswords, aug
mented by the value of the domainTransmit
Password. If the value in the PDU matches
any of these passwords, the IS shall accept the
PDU for further processing. If the value in the
PDU does not match any of the above values,
then the IS shall ignore the PDU and generate
an authenticationFailure notification.
b)For each LSP reported in the Sequence Numbers
PDU:
1)If the reported value equals the database value and
C is a non-broadcast circuit, Clear SRMflag for C
for that LSP.
2)If the reported value is older than the database
value, Clear SSNflag, and Set SRMflag.  
3)If the reported value is newer than the database
value, Set SSNflag, and if C is a non-broadcast
circuit Clear SRMflag.
4)If no database entry exists for the LSP, and the re
ported Remaining Lifetime, Checksum and Se
quence Number fields of the LSP are all non-
zero, create an entry with sequence number 0 (see
7.3.16.1), and set SSNflag for that entry and cir
cuit C.  Under no circumstances shall SRMflag be
set for such an LSP with zero sequence number.
NOTE - This is because possessing a zero sequence
number LSP is semantically equivalent to having no
information about that LSP.  If such LSPs were
propagated by setting SRMflag it would result in an
unnecessary consumption of both bandwidth and
memory resources.
c)If the Sequence Numbers PDU is a Complete Se
quence Numbers PDU, Set SRMflags for C for all
LSPs in the database (except those with zero sequence
number or zero remaining lifetime) with LSPIDs
within the range specified for the CSNP by the Start
LSPID and End LSPID fields, which were not men
tioned in the Complete Sequence Numbers PDU (i.e.
LSPs this system has, which the neighbour does not
claim to have).
7.3.15.3 Action on expiration of Complete SNP
Interval
The IS shall perform the following actions every
CompleteSNPInterval seconds for circuit C:
a)If C is a broadcast circuit, then
1)If this Intermediate system is a Level 1 Designated
Intermediate System on circuit C, transmit a com
plete set of Level 1 Complete Sequence Numbers
PDUs on circuit C. Ignore the setting of SSNflag
on Level 1 Link State PDUs.
If the value of the IS's areaTransmitPassword
is non-null, then the IS shall include the Authenti
cation Information field in the transmitted
 
CSNP, indicating an Authentication Type of
Password and containing the areaTransmit
Password as the authentication value.
2)If this Intermediate system is a Level 2 Designated
Intermediate System on circuit C, transmit a com
plete set of Level 2 Complete Sequence Numbers
PDUs on circuit C. Ignore the setting of SSNflag
on Level 2 Link State PDUs.
If the value of the IS's domainTransmitPass
word is non-null, then the IS shall include the
Authentication Information field in the trans
mitted CSNP, indicating an Authentication Type
of Password and containing the domainTrans
mitPassword as the authentication value.
A complete set of CSNPs is a set whose startLSPID
and endLSPID ranges cover the complete possible
range of LSPIDs. (i.e. there is no possible LSPID
value which does not appear within the range of one
of the CSNPs in the set).  Where more than one CSNP
is transmitted on a broadcast circuit, they shall be
separated by an interval of at least min

i

mum

Broad


cast

LSP

TransmissionInterval seconds.  
NOTE  An IS is permitted to transmit a small number
of CSNPs (no more than 10) with a shorter separation in
terval, (or even back to back), provided that no more
than 1000/minimum

Broad

cast

LSP

Trans

mis

sion

Int

er


val CSNPs are transmitted in any one second period.
b)Otherwise (C is a point to point circuit, including non-
DA DED circuits and virtual links), do nothing.
CSNPs are only transmitted on point to point circuits
at initialisation.
7.3.15.4 Action on expiration of Partial SNP
Interval
The maximum sized Level 1 or Level 2 PSNP which may
be generated by a system is controlled by the values of
originating

L1

LSP

Buf

fer

Size or  originating

L2

LSP


Buffer

Size respectively. An Intermediate system shall per
form the following actions every partialSNPInterval sec
onds for circuit C with jitter applied as described in 10.1:
a)If C is a broadcast circuit, then
1)If this Intermediate system is a Level 1 Intermedi
ate System or a Level 2 Intermediate System with
manual

L2

Only

Mode False, but is not a
Level 1 Designated Intermediate System on circuit
C, transmit a Level 1 Partial Sequence Numbers
PDU on circuit C, containing entries for as many
Level 1 Link State PDUs with SSNflag set as will
fit in the PDU, and then clear SSNflag for these
entries. To avoid the possibility of starvation, the
scan of the LSP database for those with SSNflag
set shall commence with the next LSP which was
not included in the previous scan. If there were no
Level 1 Link State PDUs with SSNflag set, do
not transmit a Level 1 Partial Sequence Numbers
PDU.
 
If the value of the IS's areaTransmitPassword
is non-null, then the IS shall include the Authenti
cation Information field in the transmitted
PSNP, indicating an Authentication Type of
Password and containing the areaTransmit
Password as the authentication value.
2)If this Intermediate system is a Level 2 Intermedi
ate System, but is not a Level 2 Designated Inter
mediate System on circuit C, transmit a Level 2
Partial Sequence Numbers PDU on circuit C, con
taining entries for as many Level 2 Link State
PDUs with SSNflag set as will fit in the PDU,
and then clear SSNflag for these entries. To avoid
the possibility of starvation, the scan of the LSP
database for those with SSNflag set shall com
mence with the next LSP which was not included
in the previous scan. If there were no Level 2 Link
State PDUs with SSNflag set, do not transmit a
Level 2 Partial Sequence Numbers PDU.
If the value of the IS's domainTransmitPass
word is non-null, then the IS shall include the
Authentication Information field in the trans
mitted PSNP, indicating an Authentication Type
of Password and containing the domainTrans
mitPassword as the authentication value.
b)Otherwise (C is a point to point circuit, including non-
DA DED circuits and virtual links)
1)If this system is a Level 1 Intermediate system,
transmit a Level 1 Partial Sequence Numbers PDU
on circuit C, containing entries for as many Level
1 Link State PDUs with SSNflag set as will fit in
the PDU, and then clear SSNflag for these en
tries. To avoid the possibility of starvation, the
scan of the LSP database for those with SSNflag
set shall commence with the next LSP which was
not included in the previous scan. If there were no
Level 1 Link State PDUs with SSNflag set, do
not transmit a Partial Sequence Numbers PDU.
If the value of the IS's areaTransmitPassword
is non-null, then the IS shall include the Authenti
cation Information field in the transmitted
PSNP, indicating an Authentication Type of
Password and containing the areaTransmit
Password as the authentication value.
2)If this system is a Level 2 Intermediate system,
transmit a Level 2 Partial Sequence Numbers PDU
on circuit C, containing entries for as many Level
2 Link State PDUs with SSNflag set as will fit in
the PDU, and then clear SSNflag for these en
tries. To avoid the possibility of starvation, the
scan of the LSP database for those with SSNflag
set shall commence with the next LSP which was
not included in the previous scan. If there were no
Level 2 Link State PDUs with SSNflag set, do
not transmit a Partial Sequence Numbers PDU.
If the value of the IS's domainTransmitPass
word is non-null, then the IS shall include the
Authentication Information field in the trans
mitted PSNP, indicating an Authentication Type
 
of Password and containing the domainTrans
mitPassword as the authentication value.
7.3.15.5 Action on expiration of Minimum LSP
Transmission Interval
An IS shall perform the following actions every min

i

mum


LSP

Trans

mis

sion

Int

er

val seconds with jitter applied as
described in 10.1.
a)For all Point to Point circuits C transmit all LSPs that
have SRMflag set on circuit C, but do not clear the
SRMflag. The SRMflag will subsequently be
cleared by receipt of a Complete or Partial Sequence
Numbers PDU.
The interval between two consecutive transmissions of the
same LSP shall be at least min

i

mum

LSP

Trans

mis

sion

Int


er

val. Clearly, this can only be achieved precisely by keep
ing a separate timer for each LSP. This would be an unwar
ranted overhead. Any technique which ensures the interval
will be between min

i

mum

LSP

Trans

mis

sion

Int

er

val and
2 * min

i

mum

LSP

Trans

mis

sion

Int

er

val is acceptable.  
7.3.15.6 Controlling the Rate of Transmission on
Broadcast Circuits
The attribute min

i

mum

Broad

cast

LSP

Trans

mis

sion


Inter

val indicates the minimum interval between PDU arri
vals which can be processed by the slowest Intermediate
System on the LAN.
Setting SRMflags on an LSP for a broadcast circuit does
not cause the LSP to be transmitted immediately. Instead
the Intermediate system shall scan the LSP database every
min

i

mum

Broad

cast

LSP

Trans

mis

sion

Int

er

val (with
jitter applied as described in 10.1), and from the set of LSPs
which have SRMflags set for this circuit, one LSP shall be
chosen at random. This LSP shall be multicast on the cir
cuit, and SRMflags cleared.
NOTE - In practice it would be very inefficient to scan the
whole database at this rate, particularly when only a few
LSPs had SRMflags set.  Implementations may require ad
ditional data structures in order to reduce this overhead.
NOTE - An IS is permitted to transmit a small number of
LSPs (no more than 10) with a shorter separation interval,
(or even back to back), provided that no more than
1000/min

i

mum

Broad

cast

LSP

Trans

mis

sion

Int

er

val LSPs
are transmitted in any one second period.
In addition, the presence of any LSPs which have been re
ceived on a particular circuit and are queued awaiting proc
essing shall inhibit transmission of LSPs on that circuit.
However, LSPs may be transmitted at a minimum rate of
one per second even in the presence of such a queue.
7.3.16 Determining the Latest Information
The Update Process is responsible for determining, given a
received link state PDU, whether that received PDU repre
sents new, old, or duplicate information with respect to
what is stored in the database.
 
It is also responsible for generating the information upon
which this determination is based, for assigning a sequence
number to its own Link State PDUs upon generation, and
for correctly adjusting the Remaining Lifetime field upon
broadcast of a link state PDU generated originally by any
system in the domain.
7.3.16.1 Sequence Numbers
The sequence number is a 4 octet unsigned value. Sequence
numbers shall increase from zero to (SequenceModulus
- 1). When a system initialises, it shall start with sequence
number 1 for its own Link State PDUs.55It starts with 1 rather than 0
so that the value 0 can be reserved to be guaranteed to be less than
the sequence number of any actually generated Link State
PDU. This is a useful property for Sequence Numbers PDUs.
  
The sequence numbers the Intermediate system generates
for its Link State PDUs with different values for LSP num
ber are independent. The algorithm for choosing the num
bers is the same, but operationally the numbers will not be
synchronised.
If an Intermediate system R somewhere in the domain has
information that the current sequence number for source S
is greater than that held by S, R will return to S a Link State
PDU for S with R's value for the sequence number. When S
receives this LSP it shall change its sequence number to be
the next number greater than the new one received, and
shall generate a link state PDU.
If an Intermediate system needs to increment its sequence
number, but the sequence number is already equal to
SequenceModulus  1, the notification attempt

To

Ex


ceed

Maximum

Se

quence

Num

ber shall be generated and
the Routeing Module shall be disabled for a period of at
least MaxAge + ZeroAgeLifetime, in order to be sure
that any versions of this LSP with the high sequence num
ber have expired. When it is re-enabled the IS shall start
again with sequence number 1.
7.3.16.2 LSP Confusion
It is possible for an LSP generated by a system in a previ
ous incarnation to be alive in the domain and have the same
sequence number as the current LSP.
To ensure database consistency among the Intermediate
Systems, it is essential to distinguish two such PDUs. This
is done efficiently by comparing the checksum on a re
ceived LSP with the one stored in memory.
If the sequence numbers match, but the checksums do not
and the LSP is not in the current set of LSPs generated by
the local system, then the system that notices the mismatch
shall treat the LSP as if its Remaining Lifetime had expired.
It shall store one of the copies of the LSP, with zero written
as the Remaining Lifetime, and flood the LSP.
If the LSP is in the current set of LSPs generated by the lo
cal system then the IS shall change the LSP's sequence
number to be the next number greater than that of the re
ceived LSP and regenerate the LSP.
 
7.3.16.3 Remaining Lifetime field
When the source generates a link state PDU, it shall set the
Remaining Lifetime to MaxAge.
When a system holds the information for some time before
successfully transmitting it to a neighbour, that system shall
decrement the Remaining Lifetime field according to the
holding time. Before transmitting a link state PDU to a
neighbour, a system shall decrement the Remaining Life
time in the PDU being transmitted by at least 1, or more
than 1  if the transit time to that neighbour is estimated to
be greater than one second. When the Remaining Lifetime
field reaches 0, the system shall purge that Link State PDU
from its database. In order to keep the Intermediate Sys
tems' databases synchronised, the purging of an LSP due to
Remaining Lifetime expiration is synchronised by flooding
an expired LSP. See 7.3.16.4.
If the RemainingLifetime of the received LSP is zero it
shall be processed as described in 7.3.16.4. If the Remain
ing Lifetime of the received LSP is non-zero, but there is an
LSP in the database with the same sequence number and
zero Remaining Lifetime, the LSP in the database shall be
considered most recent. Otherwise, the PDU with the larger
sequence number shall be considered the most recent.
If the value of Remaining Lifetime is greater than  
MaxAge, the LSP shall be processed as if there were a
checksum error.
7.3.16.4  LSP Expiration Synchronisation
When the Remaining Lifetime on an LSP in memory be
comes zero, the IS shall
a)set all SRMflags for that LSP, and
b)retain only the LSP header.
c)record the time at which the Remaining Lifetime for
this LSP became zero. When ZeroAgeLifetime has
elapsed since the LSP Remaining Lifetime became
zero, the LSP header shall be purged from the data
base.
NOTE - A check of the checksum of a zero Remaining Life
time LSP succeeds even though the data portion is not pre
sent
When a purge of an LSP with non-zero Remaining Lifetime
is initiated, the header shall be retained for MaxAge.
If an LSP from source S with zero Remaining Lifetime is
received on circuit C :
a)If no LSP from S is in memory, then the IS shall
1)send an acknowledgement of the LSP on circuit C,
but
2)shall not retain the LSP after the acknowledgement
has been sent.
 
b)If an LSP from S is in the database, then
1)If the received LSP is newer than the one in the da
tabase (i.e. received LSP has higher sequence
number, or same sequence number and database
LSP has non-zero Remaining Lifetime) the IS
shall:
i)overwrite the database LSP with the received
LSP, and note the time at which the zero Re
maining Lifetime LSP was received, so that
after ZeroAgeLifetime has elapsed, that LSP
can be purged from the database,  
ii)set SRMflag for that LSP for all circuits other
than C,
iii)clear SRMflag for C,
iv)if C is a non-broadcast circuit, set SSNflag
for that LSP for C, and
v)clear SSNflag for that LSP for the circuits
other than C.
2)If the received LSP is equal to the one in the data
base (i.e. same Sequence Number, Remaining
Lifetimes both zero) the IS shall:
i)clear SRMflag for C, and
ii)if C is a non-broadcast circuit, set SSNflag
for that LSP for C.
3)If the received LSP is older than the one in the da
tabase (i.e. received LSP has lower sequence num
ber) the IS shall:
i)set SRMflag for C, and
ii)clear SSNflag for C.
c)If this system (or pseudonode) is S and there is an un-
expired LSP from S (i.e. its own LSP) in memory,
then the IS:
1)shall not overwrite with the received LSP, but
2)shall change the sequence number of the un-
expired LSP from S as described in 7.3.16.1,
3)generate a new LSP; and
4)set SRMflag on all circuits.
7.3.17 Making the Update Reliable
The update process is responsible for making sure the latest
link state PDUs reach every reachable Intermediate System
in the domain.
On point-to-point links the Intermediate system shall send
an explicit acknowledgement encoded as a Partial Sequence
Numbers PDU (PSNP) containing the following informa
tion:
a)source's ID
b)PDU type (Level 1 or 2)
c)sequence number
 
d)Remaining Lifetime
e)checksum
This shall be done for all received link state PDUs which
are newer than the one in the database, or duplicates of the
one in the database. Link state PDUs which are older than
that stored in the database are answered instead by a newer
link state PDU, as specified in 7.3.14 above.
On broadcast links, instead of explicit acknowledgements
for each link state PDU by each Intermediate system, a spe
cial PDU known as a Complete Sequence Numbers PDU
(CSNP), shall be multicast periodically by the Designated
Intermediate System. The PDU shall contain a list of all
LSPs in the database, together with enough information so
that Intermediate systems receiving the CSNP can compare
with their LSP database to determine whether they and the
CSNP transmitter have synchronised LSP databases.  The
maximum sized Level 1 or Level 2 Sequence Numbers
PDU which may be generated by a system is controlled by
the values of originating

L1

LSP

Buf

fer

Size or originat
ingL2LSPBufferSize respectively. In practice, the infor
mation required to be transmitted in a single CSNP may be
greater than will fit in a single PDU. Therefore each CSNP
carries an inclusive range of LSPIDs to which it refers. The
complete set of information shall be conveyed by transmit
ting a series of individual CSNPs, each referring to a subset
of the complete range. The ranges of the complete set of
CSNPs shall be contiguous (though not necessarily trans
mitted in order) and shall cover the entire range of possible
LSPIDs.
The  LAN Level 1 Designated Intermediate System shall
periodically multicast complete sets of Level 1 CSNPs to
the multi-destination address AllL1ISs. The LAN Level 2
Designated Intermediate System shall periodically multicast
complete sets of Level 2 CSNPs to the multi-destination ad
dress AllL2ISs.
Absence of an LSPID from a Complete Sequence Numbers
PDU whose range includes that LSPID indicates total lack
of information about that LSPID.
If an Intermediate system, upon receipt of a Complete Se
quence Numbers PDU, detects that the transmitter was out
of date, the receiver shall multicast the missing information.
NOTE - Receipt of a link state PDU on a link is the same as
successfully transmitting the Link State PDU on that link, so
once the first Intermediate system responds, no others will,
unless they have already transmitted replies.
If an Intermediate system detects that the transmitter had
more up to date information, the receiving Intermediate sys
tem shall multicast a Partial Sequence Numbers PDU
(PSNP), containing information about LSPs for which it has
older information. This serves as an implicit request for the
missing information. Although the PSNP is multicast, only
the Designated Intermediate System of the appropriate level
shall respond to the PSNP.
NOTE - This is equivalent to the PSNP being transmitted di
rectly to the Designated Intermediate System, in that it
avoids each Intermediate System unnecessarily sending the
same LSP(s) in response. However, it has the advantage of
preserving the property that all routeing messages can be re
 
ceived on the multi-destination addresses, and hence by a
LAN adapter dedicated to the multi-destination address.
When a non-broadcast circuit (re)starts, the IS shall:
a)set SRMflag for that circuit on all LSPs, and
b)send a Complete set of Complete Sequence Numbers
PDUs on that circuit.
7.3.18 Validation of Databases
An Intermediate System shall not continue to operate for an
extended period with corrupted routeing information. The
IS shall therefore operate in a fail-stop manner. If a failure
is detected, the Intermediate system Network entity shall be
disabled until the failure is corrected. In the absence of an
implementation-specific method for ensuring this, the IS
shall perform the following checks at least every max

i


mum

LSPGenerationInterval seconds:
a)On expiration of this timer the IS shall re-check the
checksum of every LSP in the LSP database (except
those with a Remaining Lifetime of zero) in order to
detect corruption of the LSP while in memory. If the
checksum of any LSP is incorrect, the notification
corruptedLSPDetected shall be logged, and as a
minimum the entire Link State Database shall be de
leted and action taken to cause it to be re-acquired.
One way to achieve this is to disable and re-enable the
IS Network entity.
NOTE  On point to point links, this requires at least
that a CSNP be transmitted.
b)On completion of these checks the decision process
shall be notified of an event (even if any newly gener
ated LSPs have identical contents to the previous
ones). This causes the decision process to be run and
the forwarding databases re-computed, thus protecting
against possible corruption of the forwarding data
bases in memory, which would not otherwise be de
tected in a stable topology.
c)The IS shall reset the timer for a period of
maximumLSPGenerationInterval with jitter ap
plied as described in 10.1.
7.3.19 LSP Database Overload
As a result of network mis-configuration, or certain transi
tory conditions, it is possible that there may be insufficient
memory resources available to store a received Link State
PDU. When this occurs, an IS needs to take certain steps to
ensure that if its LSP database becomes inconsistent with
the other ISs', that these ISs do not rely on forwarding
paths through the overloaded IS.
7.3.19.1 Entering the Waiting State
When an LSP cannot be stored, the LSP shall be ignored
and Waiting State shall be entered. A timer shall be started
for waitingTime seconds, and the Intermediate System
shall generate and flood its own LSP with zero LSP number
with the LSP Database Overload Bit set. This prevents
 
this Intermediate system from being considered as a for
warding path by other Intermediate Systems.
It is possible that although there are sufficient resources to
store an LSP and permit the operation of the Update Proc
ess on that LSP, the Decision Process may subsequently re
quire further resources in order to complete. If these re
sources are not available, the Intermediate system shall then
(i.e. during the attempt to run the Decision Process) enter
Waiting State until such time as they are available and
waitingTime seconds have elapsed since the last LSP was
ignored by the Update Process.
An implementation shall partition the available memory re
sources between the Level 1 and Level 2 databases. An
overload condition can therefore exist independently for
Level 1 or Level 2 (or both). The status attributes l1State
and l2State indicate the condition for the Level 1 and
Level 2 databases respectively. On entering Level 1 Wait
ing State the IS shall generate the lSP

L1

Data

base

Over


load notification, and on entering Level 2 Waiting State
the IS shall generate the lSP

L2

Data

base

Over

load notifi
cation.
7.3.19.2 Actions in Level 1 Waiting State
While in Level 1 waiting state
a)If a Link State PDU cannot be stored, the IS shall ig
nore it and restart the timer for waitingTime seconds.
b)The IS shall continue to run the Decision and For
warding processes as normal.
c)When the waitingTime timer expires, the IS shall:
1)Generate an lSP

L1

Data

base

Over

load  (recov
ered) notification.
2)Clear the LSP Database Overload bit in its own
Level 1 LSP with zero LSP number and re-issue it.  
3)Set the l1State to On.
4)Resume normal operation.
7.3.19.3 Actions in Level 2 Waiting State
While in Level 2 waiting state
a)If a Link State PDU cannot be stored, the IS shall ig
nore it and restart the timer for waitingTime seconds.
b)The IS shall continue to run the Decision and For
warding processes as normal.
c)When the waitingTime timer expires, the IS shall:
1)Generate an lSP

L2

Data

base

Over

load  (recov
ered) notification.
2)Clear the LSP Database Overload bit in its own
Level 2 LSP with zero LSP number and re-issue it.  
3)Set the l2State to On.
4)Resume normal operation.
 
7.3.20 Use of the Link State Database
The only portion of the database relevant to the  Decision
Process is the data portion of the Link State PDUs.
The Update Process additionally uses the fields Sequence
Number, Remaining Lifetime, and variable SRMflag.
The Remaining Lifetimes in the stored link state PDUs can
either be periodically decremented, or converted upon re
ceipt into an internal timestamp, and converted back into a
Remaining Lifetime upon transmission.
7.3.20.1 Synchronisation with the Decision Process
Since the Update Process and the Decision Process share
the Link State Database, care must be taken that the Update
Process does not modify the Link State Database while the
Decision Process is running.
There are two approaches to this. In one approach, the De
cision Process signals when it is running. During this time,
the Update Process queues incoming Link State PDUs, and
does not write them into the Link State Database. If more
Link State PDUs arrive than can fit into the queue allotted
while the Decision Process is running, the Update Process
drops them and does not acknowledge them.
Another approach is to have two copies of the Link State
Database  one in which the Decision Process is comput
ing, and the other in which the Update Process initially cop
ies over the first database, and in which all new Link State
PDUs are written. Additionally, depending on the hashing
scheme, it is likely that a second copy of the address hash
table will be required, so that the Update Process can do a
rehash occasionally for efficiency.
When the Decision Process is ready to run again, it locks
the new copy of the Link State Database, leaving the Up
date Process to copy over the information into the first area,
and write new updates while the Decision Process runs
again.
The advantage of the first approach is that it takes less
memory. The advantage of the second approach is that Link
State PDUs will never need to be dropped.
NOTE - If the decision process is implemented according to
the specification in C.2, a finer level of parallelism is possi
ble, as described below.
 
Arrival of a Link State PDU for a system before that system
has been put into TENT is permitted. The new Link State
PDU is used when that system is eventually put into TENT.
Similarly, arrival of a new Link State PDU for a system af
ter that system has been put into PATHS is permitted. That
system has already been completely processed. The arrival
of the new Link State PDU is noted and the decision process
re-executed when the current execution has completed. An
in-progress execution of the decision process shall not be
abandoned, since this could prevent the decision process
from ever completing.
 
Arrival of a Link State PDU for a system between that sys
tem being put on TENT and being transferred to PATHS
shall be treated as equivalent to one of the previous two
cases (for example, by buffering, or taking some corrective
action).
 
7.3.20.2 Use of Buffers and Link Bandwidth
Implementations shall have a buffer management strategy
that does not prevent other clients of the buffering service
from acquiring buffers due to excessive use by the Update
Process. They shall also ensure that the Update Process
does not consume all the available bandwidth of links. In
particular no type of traffic should experience starvation for
longer than its acceptable latency. Acceptable latencies are
approximately as follows:
-Hello traffic  Hello timer W 0.5
-Data Traffic  10 seconds.
NOTE - The first of these requirements can be met by re
stricting the Update process to the use of a single buffer on
each circuit for transmission. This may also cause the sec
ond requirement to be met, depending on the processor
speed.
 
7.3.21 Parameters
MaxAge  This is the amount of time that may elapse
since the estimated origination of the stored Link
State PDU by the source before the LSP is consid
ered expired. The expired LSP can be deleted from
the database after a further ZeroAgeLifetime has
expired.  MaxAge shall be larger than maximum


LSP

Generation

Interval, so that a system is not
purged merely because of lack of events for report
ing Link State PDUs.
MaxAge is an architectural constant equal to 20
minutes.
ZeroAgeLifetime - This is the minimum amount of time
for which the header of an expired LSP shall be re
tained after it has been flooded with zero Remaining
Lifetime.  A very safe value for this would be
2 W MaxAge.  However all that is required is that
the header be retained until the zero Remaining Life
time LSP has been safely propagated to all the
neighbours.
ZeroAgeLifetime is an architectural constant with
a value of 1 minute.
maximumLSPGenerationInterval  This is the maxi
mum amount of time allowed to elapse between gen
eration of Link State PDUs by a source. It shall be
less than MaxAge.
Setting this parameter too fast adds overhead to the
algorithms (a lot of Link State PDUs). Setting this
parameter too slow (and not violating constraints)
causes the algorithm to wait a long time to recover
in the unlikely event that incorrect Link State infor
mation exists somewhere in the domain about the
system.
A reasonable setting is 15 minutes.
 
minimumLSPGenerationInterval  This is the minimum
time interval between generation of Link State
PDUs.  A source Intermediate system shall wait at
least this long before re-generating one of its own
Link State PDUs.
Setting this too large causes a delay in reporting new
information. Setting this too small allows too much
overhead.
A reasonable setting is 30 seconds.
min

i

mum

LSP

Trans

mis

sion

Int

er

val  This is the amount
of time an Intermediate system shall wait before fur
ther propagating another Link State PDU from the
same source system.
Setting this too large causes a delay in propagation
of routeing information and stabilisation of the
routeing algorithm. Setting this too small allows the
possibility that the routeing algorithm, under low
probability circumstances, will use too many re
sources (CPU and bandwidth).
Setting min

i

mum

LSP

Trans

mis

sion

Int

er

val greater
than minimumLSPGenerationInterval makes no
sense, because the source would be allowed to gen
erate LSPs more quickly than they'd be allowed to
be broadcast. Setting min

i

mum

LSP

Trans

mis

sion


Int

er

val smaller than min

i

mum

LSP

Generation


Inter

val is desirable to recover from lost LSPs.
A reasonable value is 5 seconds.
CompleteSNPInterval  This is the amount of time be
tween periodic transmissions of a complete set of
Sequence Number PDUs by the Designated Interme
diate system on a broadcast link. Setting this too low
slows down the convergence of the routeing algo
rithm when Link State PDUs are lost due to the
datagram environment of the Data Link layer on the
broadcast link.
Setting this too high results in extra control traffic
overhead.
A reasonable value is 10 seconds.
 
7.4 The Forwarding Process
The forwarding process is responsible both for transmitting
NPDUs originated by this system, and for forwarding
NPDUs originated by other systems
7.4.1 Input and Output
INPUT
-NPDUs from the ISO 8473 protocol machine
-PDUs from Update Process
-PDUs from Receive Process
-Forwarding Databases (Level 1 and 2)  one for each
routeing metric
OUTPUT
-PDUs to Data Link Layer
7.4.2 Routeing Metric Selection
The Forwarding process selects a forwarding database for
each NPDU to be relayed based on:
-the level at which the forwarding is to occur: level 1
or level 2; and
-a mapping of the ISO 8473 QoS Maintenance field
onto one of the Intermediate system's supported route
ing metrics.
The former selection is made by examining the Destination
Address field of the NPDU.
The latter selection is made as follows:
a)If the QoS Maintenance field is not present in the
NPDU, then the IS shall select the forwarding data
base calculated for the default metric.
b)If the QoS Maintenance field is present, the IS shall
examine bits 7 and 8 of the parameter value octet. If
these two bits specify any combination other than 1
1 (meaning globally unique QoS), then the IS shall
select the forwarding database calculated for the de
fault metric, otherwise
c)The IS shall select a forwarding database by mapping
the values of bits 3, 2 and 1 of the parameter value as
shown below in table 1 and shall proceed as follows:
1)If the IS does not support the selected routeing
metric, the IS shall forward based upon the default
metric;
2)If the forwarding database for one of the optional
routeing metrics is selected and the database either
does not contain an entry for the Destination Ad
dress in the NPDU being relayed, or contains an
entry indicating that the destination is unreachable
using that metric, then the IS shall attempt to for
ward based upon the default metric;
 
3)Otherwise, forward based on the selected optional
metric.
Table 1 - QoS Maintenance bits to routeing
metric mappingsSelected Routeing Metric
bit 3
bit 2
bit 1
expense metric
0
0
0
default metric
0
0
1
expense metric
0
1
0
delay  metric
1
0
0
error metric
0
1
1
delay metric
1
0
1
error metric
1
1
1
default metric
1
1
0
 
7.4.3 Forwarding Decision
7.4.3.1 Basic Operation
Let DEST = the Network Layer destination address of the
PDU to be forwarded, or the next entry in the source route
ing field, if present. It consists of sub-fields Area Address,
ID, and SEL.
NOTE - The SEL field in the destination address is not ex
amined by Intermediate Systems. It is used by End Systems
to select the proper Transport entity to which to deliver NS
DUs.
This system's (the one examining this PDU for proper for
warding decision) address consists of sub-fields area ad
dress  and ID.
a)If the local system type is a level 1 Intermediate sys
tem, or the local system type is a level 2 Intermediate
system and AttachedFlagk = False, then:
1)If the Area Address in the PDU to be forwarded
matches any one of the area addresses of this IS,
then consult the level 1 forwarding database to de
termine the adjacency which is the next hop on the
path to the NPDU's destination. Forward the
NPDU on this adjacency.
2)Otherwise, consult the level 1 forwarding database
to determine the adjacency which is the next hop
on the path to the nearest level 2 is in the area, and
forward the NPDU on this adjacency.
b)If the local system type is Level 2, and Attached
Flagk = True then:
1)If the Area Address in the PDU to be forwarded
matches any one of the area addresses of this IS,
 
then consult the level 1 forwarding database to de
termine the adjacency which is the next hop on the
path to the NPDU's destination. Forward the
NPDU on this adjacency.
2)Otherwise, consult the level 2 forwarding database
to determine the adjacency which is the next hop
on the path to the destination area, and forward the
NPDU on this adjacency.
7.4.3.2 Encapsulation for Partition Repair
If this Intermediate system is the Partition Designated
Level 2 IS for this partition, and the PDU is being for
warded onto the special adjacency to a Partition Designated
Level 2 Intermediate system in a different partition of this
area, encapsulate the complete PDU as the data field of a
data NPDU (i.e., with an additional layer of header), mak
ing this system the Source address and the other Partition
Designated Level 2 Intermediate system (obtained from the
identifier attribute of the Virtual Adjacency managed ob
ject) the Destination Address field in the outer PDU
header. Set the QoS Maintenance field of the outer PDU
to indicate forwarding via the default routeing metric (see
table 1). Then forward the encapsulated PDU onto an adja
cency ADJ, obtained by calling the Forward procedure, de
scribed below.
7.4.3.3 The Procedure Forward
This procedure chooses, from a Level 1 forwarding data
base  if level is level1, or from a Level 2 forwarding da
tabase  if level is level2, an adjacency on which to for
ward NPDUs for destination dest. A pointer to the adja
cency is returned in adj, and the procedure returns the value
True. A destination of 0 at level 1 selects the adjacency
for the nearest level 2 IS computed as described in 7.2.9.1.
If there are multiple possible adjacencies, as a result of mul
tiple minimum cost paths, then one of those adjacencies
shall be chosen. An implementation may chose the adja
cency at random, or may use the possible adjacencies in
round robin fashion.
If there is no entry in the selected forwarding database for
the address dest, and the NPDU originated from the a local
Transport entity  and the system has one or more Intermedi
ate System adjacencies, then one of those is chosen at ran
dom (or in round robin fashion) and the procedure returns
the value True. Otherwise the procedure returns the value
False.66This is done so that a system in the overloaded state will
still be able to originate or forward NPDUs. If a system with a partial
routeing information base
were prohibited from attempting to forward to an unknown destination,
system management would be unable to either communicate with this system, or
route through it, for the purpose of diagnosing and/or correcting the
underlying fault.
 
NOTE -  Since the local adjacency database is pre-loaded
into the decision process, there will always be an entry in
the forwarding database for destinations to which an adja
cency exists.
NOTE - The PDU to be forwarded may require fragmenta
tion, depending on which circuit it is to be forwarded over.
Generating Redirect PDUs
 
In addition to forwarding an NPDU, the IS shall inform the
local ISO 9542 protocol machine to generate a Redirect
PDU if the PDU is being forwarded onto the same circuit
from which it came, and if the source SNPA address of the
NPDU indicates that the NPDU was received from an End
System.
7.4.4 The Receive Process
The Receive Process is passed information from any of the
following sources.
-received PDUs with the NLPID of Intra-Domain
routeing,
-configuration information from the ISO 9542 protocol
machine,
-ISO 8473 data PDUs handed to the routeing function
by the ISO 8473 protocol machine.
When an area is partitioned, a level 2 path is used as a
level 1 link to repair the partitioned area. When this occurs,
all PDUs (between the neighbours which must utilise a
multi-hop path for communication) shall be encapsulated in
a data NPDU, addressed to the Intra-Domain routeing se
lector. Control traffic (LSPs, Sequence Numbers PDUs)
shall also be encapsulated, as well as data NPDUs that are
to be passed between the neighbours.
NOTE - It is not necessary to transmit encapsulated IIH
PDUs over a virtual link, since virtual adjacencies are estab
lished and monitored by the operation of the Decision Proc
ess and not the Subnetwork Dependent functions
The Receive Process shall perform the following functions:
-If it is a data NPDU, addressed to this system with
SEL = Intra-Domain routeing, then
7decapsulate the NPDU (remove the outer NPDU
header).
7If the decapsulated PDU is a data NPDU, move
the congestion indications to the decapsulated
NPDU, and pass it to the ISO 8473 protocol ma
chine.
7Otherwise, if the decapsulated PDU is not an ISO
8473 PDU, perform the following steps on the de
capsulated PDU:
-If it is a Link State PDU, pass it to the Update Process
-If it is a Sequence Numbers PDU, pass it to the Up
date Process
-If it is an IIH PDU, pass it to the appropriate
Subnetwork Dependent Function
-If it is a data NPDU or Error Report for another desti
nation, pass it to the Forwarding Process
-Otherwise, ignore the PDU
 
7.5 Routeing Parameters
The routeing parameters setable by System Management
are listed for each managed object in clause 11.
7.5.1 Architectural Constants
The architectural constants are described in Table 2.
 
Table 2 - Routeing architectural constantsName
Value
Description
MaxLinkMetric
63.
Maximum value of a routeing metric assign
able to a circuit
MaxPathMetric
1023.
Maximum total metric value for a complete
path
AllL1ISs
01-80-C2-00-00-14
The multi-destination address All Level 1 In
termediate Systems
AllL2ISs
01-80-C2-00-00-15
The multi-destination address All Level 2 In
termediate Systems
AllIntermediateSystems
09-00-2B-00-00-05
The multi-destination address All Intermedi
ate  Systems used by ISO 9542
ISO-SAP
FE
The SAP for ISO Network Layer on
ISO 8802-3 LANs
IntradomainRoute

ing-
PD
10000011
The Network Layer Protocol Discriminator
assigned by ISO/TR 9577 for this Protocol
IntradomainRouteing
Selector
0.
The NSAP selector for the Intermediate Sys
tem Network entity
SequenceModulus
232
Size of the sequence number space used by
the Update Process
ReceiveLSPBuffer

Size
1492.
The size of LSP which all Intermediate sys
tems must be capable of receiving.
MaxAge
1200.
Number of seconds before LSP considered ex
pired.
ZeroAgeLifetime
60.
Number of seconds that an LSP with zero Re
maining Lifetime shall be retained after
propagating a purge.
AllEndSystems
09-00-2B-00-00-04
The multi-destination address All End Sys
tems used by ISO 9542
Max

i

mum

Area


Addresses
3.
The maximum number of area addresses
which may exist for a single area.
HoldingMultiplier
3.
The number by which to multiply hello

Timer
to obtain Holding Timer for ISH PDUs and
for Point to Point IIH PDUs.
ISISHoldingMultiplier
10.
The number by which to multiply iSISHel
loTimer to obtain Holding Timer for Level 1
and Level 2 LAN IIH PDUs.
Jitter
25.
The percentage of jitter which is applied to the
generation of periodic PDUs.
 
 
8 Subnetwork Dependent
Functions
The Subnetwork Dependent Functions mask the charac
teristics of the different kinds of Subnetworks from the
Subnetwork Independent Routeing Functions. The only
two types of circuits the Subnetwork Independent Functions
recognise are broadcast and general topology.
The Subnetwork Dependent Functions include:
-The use of the ISO 8473 Subnetwork Dependent
Convergence Functions (SNDCF) so that this proto
col may transmit and receive PDUs over the same
subnetwork types, using the same techniques, as does
ISO 8473.
-Co-ordination with the operation of the ESIS proto
col (ISO 9542) in order to determine the Network
layer addresses (and on Broadcast subnetworks, the
subnetwork points of attachment) and identities (End
System or Intermediate System) of all adjacent neigh
bours. This information is held in the Adjacency data
base. It is used to construct Link State PDUs.
-The exchange of IIH PDUs. While it is possible for an
Intermediate System to identify that it has an Interme
diate System neighbour by the receipt of an ISO 9542
ISH PDU, there is no provision within ISO 9542 to in
dicate whether the neighbour is a Level 1 or a Level 2
Intermediate System. Specific PDUs (LAN Level 1,
LAN Level 2 and Point to point IIH PDUs) are de
fined to convey this information.
8.1 Multi-destination Circuits on ISs at
a Domain Boundary
Routeing information (e.g. Link State PDUs) is not ex
changed across a routeing domain boundary. All routeing
information relating to a circuit connected to another route
ing domain is therefore entered via the Reachable Address
managed objects. This information is disseminated to the
rest of the routeing domain via Link State PDUs as de
scribed in 7.3.3.2. This has the effect of causing NPDUs
destined for NSAPs which are included in the
addressPrefixes of the Reachable Addresses to be re
layed to that Intermediate System at the domain boundary.
On receipt of such an NPDU the Intermediate system shall
forward it onto the appropriate circuit, based on its own
Link State information. However in the case of multi-
destination subnetworks (such as an ISO 8208 subnetwork
using Dynamic Assignment, a broadcast subnetwork, or a
connectionless subnetwork) it is necessary to ascertain ad
ditional subnetwork dependent addressing information in
order to forward the NPDU to a suitable SNPA. (This may
be the target End system or an Intermediate system within
the other domain.)
In general the SNPA address to which an NPDU is to be
forwarded can be derived from the destination NSAP of the
NPDU. It may be possible to perform some algorithmic ma
nipulation of the NSAP address in order to derive the
SNPA address. However there may be some NSAPs where
 
this is not possible. In these cases it is necessary to have
pre-configured information relating an address prefix to a
particular SNPA address.
This is achieved by additional information contained in the
Reachable Address managed object. The mappingType
attribute may be specified as Manual, in which case a
particular SNPA address or set of SNPA addresses is speci
fied in the SNPA Address characteristic.  Alternatively the
name of an SNPA address extraction algorithm may be
specified.
8.2 Point to Point Subnetworks
This clause describes the identification of neighbours on
both point to point links and Static circuits.
The IS shall operate the ISO 9542 protocol, shall be able to
receive ISO 9542 ISH PDUs from other ISs, and shall store
the information so obtained in the adjacency database.
8.2.1 Receipt of ESH PDUs  Database of End
Systems
An IS shall enter an End system into the adjacency database
when an ESH PDU is received on a circuit. If an ESH PDU  
is received on the same circuit, but with a different NSAP
address, the new address shall be added to the adjacency,
with a separate timer. A single ESH PDU may contain more
than one NSAP address. When a new data link address or
NSAP address is added to the adjacency database, the IS
shall generate an adjacencyStateChange (Up) notifica
tion on that adjacency.
The IS shall set a timer for the value of Holding Time in
the received ESH PDU. If another ESH PDU is not re
ceived from the ES before that timer expires, the ES shall
be purged from the database, provided that the Subnetwork
Independent Functions associated with initialising the adja
cency have been completed. Otherwise the IS shall clear the
adjacency as soon as those functions are completed.
When the adjacency is cleared, the Subnetwork Independ
ent Functions shall be informed of an adjacencyState
Change (Down) notification, and the adjacency can be re-
used after the Subnetwork Independent Functions associ
ated with bringing down the adjacency have been com
pleted.
8.2.2 Receiving ISH PDUs by an Intermediate
System
On receipt of an ISH PDU by an Intermediate System, the
IS shall create an adjacency (with state Initialising and
neighbourSystemType Unknown), if one does not al
ready exist, and then perform the following actions:.
a)If the Adjacency state is Up  and the ID portion of
the NET field in the ISH PDU does not match the
neighbourID of the adjacency then the IS shall:
1)generate an adjacencyStateChange (Down) no
tification;
2)delete the adjacency; and
 
3)create a new adjacency with:
i)state set to Initialising, and
ii)neighbourSystemType set to Unknown.
4)perform the following actions..
b)If the Adjacency state is Initialising, and the
neighbourSystemType status is Intermediate Sys
tem, the ISH PDU shall be ignored.
c)If the Adjacency state is Initialising and the neigh
bourSystemType status is not Intermediate Sys
tem, a point to point IIH PDU shall be transmitted as
described in 8.2.3.
d)The neighbourSystemType status shall be set to In
termediate System indicating that the neighbour is an
Intermediate system, but the type (L1 or L2) is, as yet,
unknown.
8.2.3 Sending Point to Point IIH PDUs
An IS shall send Point-to-Point IIH PDUs on those Point-
to-Point circuits whose externalDomain attribute is set
False. The IIH shall be constructed and transmitted as
follows:
a)The Circuit Type field shall be set according to Ta
ble 3.
b)The Local Circuit ID field shall be set to a value as
signed by this Intermediate system when the circuit is
created. This value shall be unique among all the cir
cuits of this Intermediate system.
c)The first Point to Point IIH PDU (i.e. that transmitted
as a result of receiving an ISH PDU, rather than as a
result of timer expiration) shall be padded (with trail
ing PAD options containing arbitrary valued octets) so
that the SNSDU containing the IIH PDU has a length
of at least maxsize - 1 octets77The minimum length of PAD which may be
added is 2 octets, since that is the size of the option header. Where
possible the PDU should be padded to
maxsize, but if the PDU length is maxsize- 1 octets no padding is
possible (or required).
 where maxsize is the
maximum of
1)dataLinkBlocksize
2)originating

L1

LSP

Buf

fer

Size  
3)originatingL2LSPBufferSize
This is done to ensure that an adjacency will only be
formed between systems which are capable of ex
changing PDUs of length up to maxsize octets. In the
absence of this check, it would be possible for an adja
cency to exist with a lower maximum block size, with
 
the result that some LSPs and SNPs (i.e. those longer
than this maximum, but less than maxsize) would not
be exchanged.
NOTE - It is necessary for the manager to ensure that the
value of dataLinkBlocksize on a circuit which will be
used to form an Intermediate system to Intermediate sys
tem adjacency is set to a value greater than or equal to the
maximum of the LSPBufferSize characteristics listed
above. If this is not done, the adjacency will fail to initial
ise. It is not possible to enforce this requirement, since it
is not known until initialisation time whether or not the
neighbour on the circuit will be an End system or an In
termediate system. An End system adjacency may oper
ate with a lower value for dataLinkBlocksize.
d)If the value of the circuitTransmitPassword for the
circuit is non-null, then the IS shall include the
Authentication Information field in the transmitted
IIH PDU, indicating an Authentication Type of
Password and containing the circuitTransmit
Password as the authentication value.
8.2.4 Receiving Point to Point IIH PDUs
8.2.4.1 PDU Acceptance Tests
On receipt of a Point-to-Point IIH PDU, perform the fol
lowing PDU acceptance tests:
a)If the IIH PDU was received over a circuit whose ex
ternalDomain attribute is set True, the IS shall dis
card the PDU.
b)If the ID Length field of the PDU is not equal to the
value of the IS's routeingDomainIDLength, the
PDU shall be discarded and an iDFieldLengthMis
match notification generated.
c)If the set of  circuitReceivePasswords for this cir
cuit is non-null, then perform the following tests:
1)If the PDU does not contain the Authentication
Information field then the PDU shall be discarded
and an authenticationFailure notification gener
ated.
2)If the PDU contains the Authentication Infor
mation field, but the Authentication Type is not
equal to Password, then the PDU shall be ac
cepted unless the IS implements the authentica
tiion procedure indicated by the Authentication
 
Type. In this case whether the IS accepts or ig
nores the PDU is outside the scope of this Interna
tional Standard.
3)Otherwise, the IS shall compare the password in
the received PDU with the passwords in the set of
circuitReceivePasswords for the circuit on
which the PDU was received. If the value in the
PDU matches any of these passwords, the IS shall
accept the PDU for further processing. If the value
in the PDU does not match any of the circuitRe
ceivePasswords, then the IS shall ignore the
PDU and generate an authenticationFailure no
tification.
8.2.4.2 IIH PDU Processing
When a Point to Point IIH PDU is received by an Interme
diate system, the area addresses of the two Intermediate
Systems shall be compared to ascertain the validity of the
adjacency. If the two Intermediate systems have an area ad
dress in common, the adjacency is valid for all combina
tions of Intermediate system types (except where a Level 1
Intermediate system is connected to a Level 2 Intermediate
system with manualL2OnlyMode set True). However,
if they have no area address in common, the adjacency is
only valid if both Intermediate systems are Level 2, and the
IS shall mark the adjacency as Level 2 Only. This is de
scribed in more detail below.
On receipt of a Point to Point IIH PDU, each of the area ad
dresses from the PDU shall be compared with the set of
area addresses in the manual

Area

Addresses attribute.
a)If a match is detected between any pair the following
actions are taken.
1)If the local system is of iSType L1

Inter

mediate


Sys

tem the IS shall perform the action indicated
by Table 4.
 
2)If the local system is of iSType L2

Intermediate


System and the Circuit manualL2OnlyMode
has the value False, the IS shall perform the ac
tion indicated by Table 5.
3)If the local system is of iSType L2

Intermediate


System and the Circuit manualL2OnlyMode
has the value True, the IS shall perform the ac
tion indicated by Table 6.
b)If a no match is detected between any pair, the follow
ing actions shall be performed.
1)If the local system is of iSType L1

Inter

mediate


Sys

tem and the adjacency is not in state Up,
the IS shall delete the adjacency (if any) and gen
erate an initialisationFailure (Area Mismatch)
notification.
2)If the local system is of iSType L1

Inter

mediate


Sys

tem and the adjacency is in state Up, the IS
shall delete the adjacency  and generate an adja
cencyStateChange (Down  Area Mismatch)
notification .
3)If the local system is of iSType L2

Intermediate


System the IS shall perform the action indicated
by Table 7 (irrespective of the value of manu
alL2OnlyMode for this circuit).
c)If the action taken is Up, as detailed in the tables
referenced above, the IS shall compare the Source ID
field of the PDU with the local systemID.
1)If the local Intermediate system has the higher
Source ID, the IS shall set the Circuit CircuitID
status to the concatenation of the local systemID
and the Local Circuit ID (as sent in the Local Cir
cuit ID field of point to point IIH PDUs from this
Intermediate System) of this circuit.
 
2)If the remote Intermediate system has the higher
Source ID, the IS shall set the Circuit CircuitID
status to the concatenation of the remote system's
Source ID (from the Source ID field of the PDU),
and the remote system's Local Circuit ID (from the
Local Circuit ID field of the PDU).
3)If the two source IDs are the same (i.e. the system
is initialising to itself), the local systemID is used.
NOTE  The circuitID status is not used to generate
the Local Circuit ID to be sent in the Local Circuit
ID field of IIH PDUs transmitted by this Intermedi
ate system. The Local Circuit ID value is assigned
once, when the circuit is created and is not subse
quently changed.
d)If the action taken is Accept and the new value com
puted for the circuitID is different from that in the ex
isting adjacency, the IS shall
1)generate an adjacencyStateChange(Down) noti
fication, and
2)delete the adjacency.
e)If the action taken is Up or Accept the IS shall
1)copy the Adjacency neighbourAreas entries
from the PDU,
2)set the holdingTimer to the value of the Holding
Time from the PDU, and
 
3)set the neighbourSystemID to the value of the
Source ID from the PDU.
8.2.5 Monitoring Point-to-point Adjacencies
The IS shall keep a holding time (adjacency holding


Timer) for the point-to-point adjacency. The value of the
holding

Timer shall be set to the Holding Time as reported
in the Holding Timer field of the Pt-Pt IIH PDU. If a neigh
bour is not heard from in that time, the IS shall
a)purge it from the database; and
b)generate an adjacencyStateChange (Down) notifi
cation.
8.3 ISO 8208 Subnetworks
8.3.1 Network Layer Protocols
The way in which the underlying service assumed by ISO
8473 is provided for ISO 8208 subnetworks is described in
clause 8 of ISO 8473. This defines a set of Subnetwork De
pendent Convergence Functions (SNDCFs) that relate the
service provided by specific individual ISO-standard
subnetworks to the abstract underlying service defined in
clause 5.5 of ISO 8473. In particular 8.4.3 describes the
Subnetwork Dependent Convergence Functions used with
ISO 8208 Subnetworks.
 
8.3.2 SVC Establishment
8.3.2.1 Use of ISO 8473 Subnetwork Dependent
Convergence Functions
SVCs shall be established according to the procedures de
fined in the ISO 8208 Subnetwork Dependent Convergence
Functions of ISO 8473 (this may be on system management
action or on arrival of data depending on the type of cir
cuit). The Call Request shall contain a Protocol Discrimina
tor specifying ISO 8473 in the first octet of Call Userdata.
In the case of a static circuit, an SVC shall be established
only upon system management action. The IS shall use
neighbourSNPAAddress as the called SNPA address.
In the case of a DA circuit, the call establishment proce
dures are initiated by the arrival of traffic for the circuit.
8.3.2.2 Dynamically Assigned Circuits
A dynamically assigned circuit has multiple adjacencies,
and can therefore establish SVCs to multiple SNPAs. In
general the SNPA address to which a call is to be estab
lished can be derived from the NSAP to which an NPDU is
to be forwarded. In the case where all the NSAPs accessible
over the ISO 8208 subnetwork have IDIs which are their
SNPA addresses, the correct SNPA can be ascertained by
extracting the IDI. However there may be some NSAPs,
which it is required to reach over the ISO 8208 subnetwork,
whose IDI does not correspond to the SNPA address of
their point of attachment to the ISO 8208 subnetwork. The
IDI may refer to some other SNPA address which is sub-
optimally connected to the target NSAP (or not even con
nected at all), or the IDP may not contain an X.121 address
at all (e.g. ISO DCC scheme). In these cases the IS shall
have pre-configured information relating an IDP (or address
prefix) to a particular SNPA address to call.
This is achieved, as described in 8.1, by additional informa
tion contained in the Reachable Address managed object.
The address extraction algorithm may be specified to ex
tract the IDI portion where the IDI is the required X.121 ad
dress. An example of a set of Reachable Addresses is
shown in Table 8.
Table 8 - Example of address prefixesAddress Prefix


39
37 aaaaa
37
*
37 D
SNPA Address
123X
B
Y
Extract X.121 SNPA address
R, S, T
 
This is interpreted as follows:
a)For the ISO DCC prefix 39 123, call the SNPA ad
dress X.
 
b)For the X.121 IDI address prefix 37 aaaaa, don't
call aaaaa, but call B instead.
c)For all IDPs based on SNPAs with DNIC D (i.e. with
address prefix 37 D), call the address Y (which
would probably be a gateway to a subnetwork with
DNIC D).
d)For any other X.121 IDI (i.e. address prefix 37)  call
the SNPA whose address is used as the IDI.
e)Anything else (* in table 8)  call one of the SNPA
addresses R, S or T. These would typically be the
SNPA addresses of Level 2 Intermediate Systems
through which any other addresses could potentially
be reached.
NOTE - If a DA circuit is defined with a reachable address
prefix which includes the addresses reachable over a DCM
or STATIC circuit, the cost(s) for the DA circuit must be
greater than those of the STATIC circuit. If this is not the
case, the DA circuit may be used to establish a call to the re
mote SNPA supporting the STATIC circuit, which would
then (wrongly) assume it was the STATIC circuit.
8.3.2.3 Initiating Calls (Level 2 Intermediate
Systems)
When an NPDU is to be forwarded on a dynamically as
signed circuit, for destination NSAP address D, the IS shall:
a)Calculate D's subnetwork address, either as explicitly
stated in the circuit database, or as extracted from the
IDP.
1)If this system is an ES and there is an entry in the
RedirectCache or ReversePathCache for D, use the
subnetwork address in the cache entry.
2)If this system is an ES or Level 2 Intermediate sys
tem, and the address matches one of the listed
reachable address prefixes (including *, if pre
sent),  the subnetwork address is that specified ac
cording to the mappingType attribute (either
Manual, indicating that the set of addresses in
the sNPAAddresses attribute of that Reachable
Address are to be used, or Algorithm, indicating
that it is to be extracted from the IDP using the
specified algorithm). If multiple SNPA addresses
are specified, and there is already an adjacency up
to one of those SNPA addresses, then choose that
subnetwork address, otherwise choose the
subnetwork address with the oldest timestamp  as
described in 8.3.2.4.
3)If the address does not match one of the listed
reachable address prefixes (and there is no * en
try), invoke the ISO 8473 Discard PDU function.
b)Scan the adjacencies for one already open to D's
subnetwork address (i.e. reserveTimer has not yet
expired). If one is found, transmit the NPDU on that
adjacency.
c)If no adjacency has a call established to the required
subnetwork address, but there is a free adjacency, at
 
tempt to establish the call using that subnetwork ad
dress.
d)If there is no free adjacency invoke the ISO 8473 Dis
card PDU function.
NOTE  Where possible, when an adjacency is reserved
(when an SVC has been cleared as a result of the
idleTimer expiring, but the reserveTimer has not yet ex
pired), resources within the subnetwork service provider
should be reserved, in order to minimise the probability
that the adjacency will not be able to initiate a call when
required.
8.3.2.4 Call Attempt Failures
The Reachable Address managed objects may contain a set
of SNPA addresses, each of which has an associated time-
stamp. The time-stamps shall be initialised to infinitely
old.
Some of the SNPAs in this set may be unreachable. If a call
attempt fails to one of the SNPA addresses listed, the IS
shall mark that entry in the list with the time of the latest
failed attempt. When an SNPA address is to be chosen from
the list, the IS shall choose the one with the oldest time-
stamp , unless the oldest time-stamp is more recent than
recallTimer. If the oldest time-stamp is more recent than
recallTimer, all SNPAs in the set shall be assumed tempo
rarily unreachable and no call attempt is made. The IS shall
instead invoke the ISO 8473 Discard PDU function.
When attempting to establish a connection to a single spe
cific subnetwork address (not through one of a set of SNPA
addresses), if a call attempt to a particular SNPA address,
A, fails for any reason, the IS shall invoke the ISO 8473
Discard PDU function. Additionally the adjacency on
which the call attempt was placed shall be placed in
Failed state, and the recall timer set. Until it expires, the
IS shall not attempt call establishment for future NPDUs to
be forwarded over subnetwork address A, but instead the IS
shall invoke the ISO 8473 Discard PDU function.
When the recall timer expires, the IS shall free the adja
cency for calls to a different destination or retry attempts to
subnetwork address A.
NOTE - If an implementation can store the knowledge of
SNPA addresses that have failed along with the time since
the attempt was made in a location other than the adjacency
on which the call was attempted, then that adjacency can be
used for other calls.
8.3.3 Reverse Path Forwarding on DA Circuits
Where a subdomain is attached to a Connection-oriented
subnetwork by two or more SNPAs, the IDP for the ad
dresses within the subdomain may be chosen to be con
structed from the address of one of the points of attachment.
(It need not be. The whole subdomain could be multi-
homed by using both SNPA addresses, or some other IDP
could be chosen; e.g. ISO DCC.) Traffic to the subdomain
from some other SNPA will cause a call to be established to
the SNPA corresponding to the IDP of the addresses in the
subdomain. Traffic from the subdomain may use either of
the SNPAs depending on the routeing decisions made by
 
the subdomain. This is illustrated in the diagram below (fig
ure 5).
Figure 5 - B.xB.yC.zISO 8208 SubnetworkBACExample for reverse path
forwarding
The subdomain is attached to the connection-oriented
subnetwork via SNPAs A and B. The addresses on the
subdomain are constructed using the SNPA address of B as
the IDI. If traffic for C.z is sent from B.x, a call will be es
tablished from A to C. The reverse traffic from C.z to B.x
will cause another call to be established from C to B. Thus
two SVCs have been established where only one is re
quired.
This problem is prevented by the local system retaining a
cache (known as the ReversePathCache) of NSAP ad
dresses from which traffic has been received over each ad
jacency. When it has traffic to forward over the connection-
oriented subnetwork, the IS shall it first check to see if the
destination NSAP is in the cache of any of its adjacencies,
and if so forwards the traffic over that adjacency. An NSAP
shall only be added to the cache when the remote SNPA ad
dress of the adjacency over which it is received differs from
the SNPA address to be called which would be generated
by checking against the Circuit Reachable Addresses man
aged objects. If the cache is full, the IS shall overwrite the
least recently used entry. The ReversePathCache, if imple
mented, shall have a size of at least one entry. The IS shall
purge the cache when the adjacency is taken down (i.e.
when the reserve timer expires).
8.3.4 Use of ISO 9542 on ISO 8208
subnetworks
STATIC and DA circuits are equivalent to point to point
links, and as such permit the operation of ISO 9542 as de
scribed for point to point links in 8.2.
For DA circuits, it is impractical to use ISO 9542 to obtain
configuration information, such as the location of Interme
diate systems, since this would require calls to be estab
lished to all possible SNPA addresses.
The IS shall not send ISO 9542 ISH PDUs on a DA circuit.
The IS shall take no action on receipt of an ESH PDU or
ISH PDU, and the circuit shall complete initialisation with
out waiting  for their arrival.
The IS shall not send Point to point IIH PDU on DA cir
cuits. The IS shall ignore receipt of a point-point IIH PDU.
(This would only occur if a STATIC or DA circuit became
 
erroneously connected to an SVC being used for a DA cir
cuit.)
8.3.5 Interactions with the Update Process
A dynamically assigned circuit contains a list of <reachable
address prefix, cost, SNPA address> tuples. Also, each dy
namically assigned circuit has a specified call establishment
cost measured by call

Estab

lish

ment

Met

rick (where k in
dexes the four defined metrics). The call establishment cost
is always an internal metric, and is therefore directly com
parable with the reachable address metric only if the reach
able address metric is also internal.
When the circuit is enabled, the Subnetwork Dependent
functions in an Intermediate system shall report (to the Up
date Process) adjacency cost change events for all ad
dress prefixes in the circuit Reachable Address managed
object, together with the Reachable address metrick + Del
tak increment. If reachable address metrick is internal, then
Deltak = call

Estab

lish

ment

Met

rick. If reachable address
metrick is external, then Deltak = 0.
This causes this information to be included in subsequently
generated LSPs as described in 7.3.3.2.
Routeing PDUs (LSPs and Sequence number PDUs) shall
not be sent on dynamically assigned circuits.
NOTE - In the following sub-clauses, it is assumed that the
Reachable Addresses referenced are only those which have
been enabled (i.e. that have state On), and whose parent
circuit is also in state On.
8.3.5.1 Adjacency Creation
After an SVC to SNPA address D is successfully estab
lished and a new adjacency created for it (whether it was in
itiated by the local or the remote system), if call

Estab

lish


ment

Met

rickIncrement is greater than 0, the IS shall scan
the circuit Reachable Address managed objects for all
addressPrefixes listed with D as (one of) the sNPAAd
dress(es).
For Reachable Addresses with mappingType Algo
rithm, the IS shall construct an implied address prefix88i.e. some
address prefix which matches the addressPrefix of the Reachable
Address, and which would generate the SNPA Address D when the extrac
tion algorithm is applied
 
from the actual remote SNPA address D and the address ex
traction algorithm. The IS shall generate an Adjacency cost
change event for each such address prefix (both actual and
implied) with the Reachable Address metrick (without the
added call

Estab

lish

ment

Met

rickIncrement). This causes
information that those address prefixes are reachable with
the lower cost to be included in subsequently generated
LSPs. The effect of this is to encourage the use of already
established SVCs where possible.
8.3.5.2 Adjacency Deletion
When the adjacency with sNPAAddress D is freed (Re
serve Timer has expired, or the adjacency is deleted by Sys
tem Management action) then if call

Estab

lish

ment

Met


rickIncrement is greater than 0, the IS shall scan the Cir
 
cuit Reachable Address managed objects for all those with
mappingType Manual and (one of) their sNPAAd
dresses  equal to D. The IS shall generate Adjacency
cost change events to the Update Process for all such ad
dress prefixes with the Reachable Address metrick + Deltak
increment (where Deltak is the same as defined above). For
Reachable Addresses with mappingType X.121 for
which it is possible to construct an implied address prefix
as above, the IS shall generate an adjacencyState
Change notification for that implied prefix.
A cost change event shall only be generated when the count
of the number of subnetwork addresses which have an es
tablished SVC changes between 1 and 0.
8.3.5.3 Circuit Call Establishment Increment
Change
On a dynamically assigned circuit, when system manage
ment changes the Circuit call

Estab

lish

ment

Met


rickIncrement for that circuit, the IS shall generate adja
cency cost change events for all address prefixes affected
by the change (i.e. those for which calls are not currently
established).
The IS shall scan all the Reachable Address managed ob
jects of that Circuit. If the Reachable Address has
mappingType X.121, the IS shall generate an adja
cency cost change event for that name with the Reach
able Address metrick + the new value of Deltak. If  (based
on the new value of callEstab

lish

ment

Met

rickIncrement)
the Reachable Address has mappingType Manual, the
IS shall scan all the Adjacencies of the Circuit for an Adja
cency with sNPAAddress equal to (one of) the sN
PAAddresses of that Reachable Address. If no such adja
cency is found the IS shall generate an adjacency cost
change event for that name with the Reachable Address
metrick + the new value of Deltak (based on the new value
of callEstlishmentMetrickIncrement).
8.3.5.4 Reachable Address Cost Change
When the metrick characteristic of a Reachable Address in
state On is changed by system management, the IS shall
generate cost change events to the Update Process to reflect
this change.
If the Reachable Address has mappingType Manual,
the IS shall scan all the Adjacencies of the Circuit for an
Adjacency with sNPAAddress equal to (one of) the sN
PAAddresses of that Reachable Address. If one or more
such adjacencies are found, the IS shall generate an adja
cency cost change event for that name with the new
Reachable Address metrick. If no such adjacency is found
the IS shall generate an adjacency cost change event for
that name with the new Reachable Address metrick.
If the Reachable Address has mappingType X.121, the
IS shall generate an adjacency cost change event for that
name with the new Reachable Address metrick + Deltak
(based on the new value of call

Estab

lish

ment

Met

rick


Increment). In addition, for all Adjacencies of the Circuit
 
with an sNPAAddress for which an implied address pre
fix can be generated for this Reachable Address, the IS
shall generate an adjacency cost change event for that im
plied address prefix and the new Reachable Address met
rick.
8.3.5.5 Disabling a Reachable Address
When a Reachable Address managed object is disabled via
management action, the IS shall generate an  Adjacency
down event to the Update Process for the name of that
Reachable Address and also for any implied prefixes asso
ciated with that Reachable Address.
8.3.5.6 Enabling a Reachable Address
When a Reachable Address is enabled via system manage
ment action, the IS shall generate Adjacency cost change
events as described for Reachable Address cost change in
8.3.5.4 above.
8.4 Broadcast Subnetworks
8.4.1 Broadcast Subnetwork IIH PDUs
All Intermediate systems on broadcast circuits (both
Level 1 and Level 2) shall transmit LAN IIH PDUs as de
scribed in 8.4.3. Level 1 Intermediate systems shall transmit
only Level 1 LAN IIH PDUs. Level 2 Intermediate Systems
on circuits with manualL2OnlyMode set to the value
True, shall transmit only Level 2 LAN IIH PDUs.
Level 2 Intermediate systems on circuits with manu
alL2OnlyMode set to the value False, shall transmit
both.
Level n LAN IIH PDUs contain the transmitting Intermedi
ate system's ID, holding timer, Level n Priority and
manual

Area

Addresses, plus a list containing the lA
NAddresses of all the adjacencies of neighbourSystem
Type Ln Intermediate System (in state Initialising or
Up) on this circuit.
LAN IIH PDUs shall be padded (with trailing PAD options
containing arbitrary valued octets) so that the SNSDU con
taining the IIH PDU has a length of at least maxsize- 1 oc
tets99The minimum length of PAD which may be added is 2 octets, since
that is the size of the option header. Where possible the PDU should be padded to
maxsize, but if the PDU length is maxsize- 1 octets no padding is
possible (or required).
 where maxsize for Level 1 IIH PDUs is the maximum
of
-dataLinkBlocksize
-originating

L1

LSP

Buf

fer

Size
and for Level 2 IIH PDUs is the maximum of
-dataLinkBlocksize
-originatingL2LSPBufferSize
This is done to ensure that an adjacency will only be
formed between systems which are capable of exchanging
PDUs of length up to maxsize octets. In the absence of this
 
check, it would be possible for an adjacency to exist with a
lower maximum block size, with the result that some LSPs
and SNPs (i.e. those longer than this maximum, but less
than maxsize) would not be exchanged.
NOTE - An example of a topology where this could occur is
one where an extended LAN is constructed from LAN seg
ments with different maximum block sizes. If, as a result of
mis-configuration or some dynamic reconfiguration, a path
exists between two Intermediate systems on separate LAN
segments having a large maximum block size, which in
volves transit of a LAN segment with a smaller maximum
block size, loss of larger PDUs will occur if the Intermediate
systems continue to use the larger maximum block size. It is
better to refuse to bring up the adjacency in these circum
stances.
Level 1 Intermediate systems shall transmit Level 1 LAN
IIH PDUs to the multi-destination address AllL1ISs, and
also listen on that address. They shall also listen for ESH
PDUs on the multi-destination address AllIntermediateSys
tems. The list of neighbour Intermediate systems shall con
tain only Level 1 Intermediate Systems within the same
area. (i.e. Adjacencies of neighbourSystemType L1 In
termediate System.)
Level 2 Only Intermediate systems (i.e. Level 2 Intermedi
ate systems which have the Circuit manualL2OnlyMode
characteristic set to the value True) shall transmit Level 2
LAN IIH PDUs to the multi-destination address AllL2ISs,
and also listen on that address. The list of neighbour Inter
mediate systems shall contain only Level 2 Intermediate
systems. (i.e. Adjacencies of neighbourSystemType L2
Intermediate System.)
Level 2 Intermediate systems (with manualL2OnlyMode
False) shall perform both of the above actions. Separate
Level 1 and Level 2 LAN IIH PDUs shall be sent to the
multi-destination addresses AllL1ISs and AllL2ISs de
scribing the neighbour Intermediate systems for Level 1
and Level 2 respectively. Separate adjacencies shall be cre
ated by the receipt of Level 1 and Level 2 LAN IIH PDUs.
8.4.1.1 IIH PDU Acceptance Tests
On receipt of a Broadcast IIH PDU, perform the following
PDU acceptance tests:
a)If the IIH PDU was received over a circuit whose ex
ternalDomain attribute is True, the IS shall discard
the PDU.
b)If the ID Length field of the PDU is not equal to the
value of the IS's routeingDomainIDLength, the
PDU shall be discarded and an iDFieldLengthMis
match notification generated.
c)If the set of circuitReceivePasswords for this cir
cuit is non-null, then perform the following tests:
1)If the PDU does not contain the Authentication
Information field then the PDU shall be discarded
 
and an authenticationFailure notification gener
ated.
2)If the PDU contains the Authentication Infor
mation field, but the Authentication Type is not
equal to Password, then the PDU shall be ac
cepted unless the IS implements the authentica
tiion procedure indicated by the Authentication
Type. In this case whether the IS accepts or ig
nores the PDU is outside the scope of this Interna
tional Standard.
3)Otherwise, the IS shall compare the password in
the received PDU with the passwords in the set of
circuitReceivePasswords for the circuit on
which the PDU was received. If the value in the
PDU matches any of these passwords, the IS shall
accept the PDU for further processing. If the value
in the PDU does not match any of the circuitRe
ceivePasswords, then the IS shall ignore the
PDU and generate an authenticationFailure no
tification.
8.4.1.2 Receipt of Level 1 IIH PDUs
On receipt of a Level 1 LAN IIH PDU on the multi-
destination address AllL1ISs, the IS shall compare each of
the area addresses, from the received IIH PDU with the set
of area addresses in the manual

Area

Addresses charac
teristic. If a match is not found between any pair (i.e. the lo
cal and remote system have no area address in common),
the IS shall reject the adjacency and generate an initialisa
tionFailure (area mismatch) notification. Otherwise (a
match is found) the IS shall accept the adjacency and set the
Adjacency neighbourSystemType to L1 Intermediate
System.
8.4.1.3 Receipt of Level 2 IIH PDUs
On receipt of a Level 2 LAN IIH PDU on the multi-
destination address AllL2ISs, the IS shall accept the adja
cency, and set the Adjacency neighbourSystemType to
L2 Intermediate System.
8.4.1.4 Existing Adjacencies
When a Level n LAN IIH PDU (Level 1 or Level 2) is re
ceived from an Intermediate system for which there is al
ready an adjacency with
a)the Adjacency lANAddress equal to the MAC Source
address of the PDU, and
b)the Adjacency neighbourSystemID equal to the
Source ID field from the PDU and
c)the neighbourSystemType equal to Ln Intermedi
ate System,
the IS shall update the holding timer, LAN Priority and
neighbourAreas according to the values in the PDU.
 
8.4.1.5 New Adjacencies
When
a)a Level n LAN IIH PDU (Level 1 or Level 2) is re
ceived (from Intermediate system R), and
b)there is no adjacency for which the Adjacency lANAd
dress is equal to the MAC Source address of the
PDU; and
c)the Adjacency neighbourSystemID is equal to the
Source ID field from the PDU, and
d)neighbourSystemType is Ln Intermediate System,
the IS shall create a new adjacency. However, if there is in
sufficient space in the adjacency database, to permit the
creation of a new adjacency the IS shall instead perform the
actions described in 8.4.2.
The IS shall
a)set neighbourSystemType status to Ln Intermedi
ate System (where n is the level of the IIH PDU),  
b)set the holding timer, LAN Priority, neighbourID
and neighbourAreas according to the values in the
PDU., and
c)set the lANAddress according to the MAC source ad
dress of the PDU.
The IS shall set the state of the adjacency to initialising,
until it is known that the communication between this sys
tem and the source of the PDU (R) is two-way. However R
shall be included in future Level n LAN IIH PDUs trans
mitted by this system.
When R reports this circuit's lANAddress in its Level n
LAN IIH PDUs, the IS shall
a)set the adjacency's state to Up, and
b)generate an adjacencyStateChange (Up) notifica
tion.
The IS shall keep a separate Holding Time (Adjacency
holding

Timer) for each Ln Intermediate System adja
cency. The value of holding

Timer shall be set to the Hold
ing Time as reported in the Holding Timer field of the
Level n LAN IIH PDUs. If a neighbour is not heard from in
that time, the IS shall
a)purge it from the database; and
b)generate an adjacencyStateChange (Down) notifi
cation.
If a Level n LAN IIH PDU is received from neighbour N,
and this system's lANAddress is no longer in N's IIH
PDU, the IS shall
a)set the adjacency's state to initialising, and
 
b)generate an adjacencyStateChange (Down) notifi
cation.
8.4.2 Insufficient Space in Adjacency Database
If an IS needs to create a new Intermediate system adja
cency, but there is insufficient space in the adjacency data
base, the adjacency of neighbourSystemType Ln Inter
mediate System with lowest lANPriority (or if more than
one adjacency has the lowest priority, the adjacency with
the lowest lANAddress, from among those with the lowest
priority) shall be purged from the database. If the new adja
cency would have the lowest priority, it shall be ignored,
and a rejectedAdjacency notification generated.
If an old adjacency must be purged, the IS shall generate an
adjacencyStateChange (Down) notification for that adja
cency. After the Subnetwork Independent Functions issue
an adjacency down complete, the IS may create a new ad
jacency.
8.4.3 Transmission of LAN IIH PDUs
A Level 1 IS shall transmit a Level 1 LAN IIH PDU imme
diately when any circuit whose externalDomain attribute
is False has been enabled.  A Level 2 Intermediate Sys
tem shall transmit a Level 2 LAN IIH PDU. A Level 2 In
termediate System shall also transmit a Level 1 LAN IIH
PDU unless the circuit is marked as manualL2OnlyMode
True.
The IS shall also transmit a  LAN IIH PDU when at least 1
second has transpired since the last transmission of a LAN
IIH PDU of the same type on this circuit by this system
and:
a)iSIS

Hello

Timer seconds have elapsed1010Jitter is applied as described in 10.1.
 since the last
periodic LAN IIH PDU transmission
The Holding Time is set to ISISHoldingMultiplier W
iSIS

Hello

Timer. For a Designated Intermediate Sys
tem the value of dRISIS

Hello

Timer1111 In this case jitter is not applied, since it would result in
intervals of less than one second.
 is used instead
of iSISHelloTimer. The Holding Time for this PDU
shall therefore be set to ISISHoldingMultiplier W
dR

ISIS

Hello

Timer seconds. This permits failing
Designated Intermediate Systems to be detected more
rapidly,
or
b)the contents of the next IIH PDU to be transmitted
would differ from the contents of the previous IIH
PDU transmitted by this system, or
c)this system has determined that it is to become or re
sign as LAN Designated Intermediate System for that
level.
To minimise the possibility of the IIH PDU transmissions
of all Intermediate systems on the LAN becoming synchro
nised, the Hello Time timer shall only be reset when a IIH
 
PDU is transmitted as a result of timer expiration, or on be
coming or resigning as Designated Intermediate System.
Where an Intermediate system is transmitting both Level 1
and Level 2 LAN IIH PDUs, it shall maintain a separate
timer (separately jittered) for the transmission of the
Level 1 and Level 2 IIH PDUs. This avoids correlation be
tween the Level 1 and Level 2 IIH PDUs and allows the re
ception buffer requirements to be minimised.
If the value of the circuitTransmitPassword for the cir
cuit is non-null, then the IS shall include the Authentica
tion Information field in the transmitted IIH PDU, indicat
ing an Authentication Type of Password and contain
ing the circuitTransmitPassword as the authentication
value.
8.4.4 LAN Designated Intermediate Systems
A LAN Designated Intermediate System is the highest pri
ority Intermediate system in a particular set on the LAN,
with numerically highest MAC source lANAddress break
ing ties. (See 7.1.5 for how to compare LAN addresses.)
There are, in general, two LAN Designated Intermediate
Systems on each LAN, namely the LAN Level 1 Desig
nated Intermediate System and the LAN Level 2 Desig
nated Intermediate System. They are elected as follows.
a)Level 1 Intermediate systems elect the LAN Level 1
Designated Intermediate System.
b)Level 2 Only Intermediate systems (i.e. Level 2 Inter
mediate Systems which have the Circuit manual

L2


Only

Mode characteristic set to the value True)
elect the LAN Level 2 Designated Intermediate Sys
tem.
c)Level 2 Intermediate systems (with manu
alL2OnlyMode False) elect both the LAN Level 1
and LAN Level 2 Designated Intermediate Systems.
The set of Intermediate systems to be considered includes
the local Intermediate system, together with all Intermedi
ate systems of the appropriate type as follows.
a)For the LAN Level 1 Designated Intermediate System,
it is the set of Intermediate systems from which LAN
Level 1 IIH PDUs are received and to which Level 1
adjacencies exist in state Up. When the local sys
tem either becomes or resigns as LAN Level 1 Desig
nated Intermediate System, the IS shall generate a lan
Level1

Designated

Inter

mediate

Sys

tem

Change
notification. In addition, when it becomes LAN
Level 1 Designated Intermediate System, it shall per
form the following actions.
1)Generate and transmit Level 1 pseudonode LSPs
using the existing End system configuration.
 
2)Purge the Level 1 pseudonode LSPs issued by the
previous LAN Level 1 Designated Intermediate
System (if any) as described in 7.2.3.
3)Solicit the new End system configuration as de
scribed in 8.4.5.
b)For the LAN Level 2 Designated Intermediate System,
it is the set of Intermediate systems from which LAN
Level 2 IIH PDUs are received and to which Level 2
adjacencies exist in state Up. When the local sys
tem either becomes or resigns as LAN Level 2 Desig
nated Intermediate System, the IS shall generate a lan
Level2

Designated

Inter

mediate

System

Change
notification. In addition, when it becomes LAN
Level 2 Designated Intermediate System, it shall per
form the following actions.
1)Generate and transmit a Level 2 pseudonode LSP.
2)Purge the Level 2 pseudonode LSPs issued by the
previous LAN Level 2 Designated Intermediate
System (if any) as described in 7.2.3.
When an Intermediate system resigns as LAN Level 1 or
Level 2 Designated Intermediate System it shall perform
the actions on Link State PDUs described in 7.2.3.
When the broadcast circuit is enabled on an Intermediate
system the IS shall perform the following actions.
a)Commence sending IIH PDUs with the LAN ID field
set to the concatenation of its own systemID and its
locally assigned one octet Local Circuit ID.
b)Solicit the End system configuration as described in
8.4.5.
c)Start listening for ISO 9542 ISH PDUs and ESH
PDUs and acquire adjacencies as appropriate. Do not
run the Designated Intermediate System election proc
ess.
d)After waiting iSIS

Hello

Timer * 2 seconds, run the
Level 1 and or the Level 2 Designated Intermediate
System election process depending on the Intermedi
ate system type. This shall be run subsequently when
ever an IIH PDU is received or transmitted as de
scribed in 8.4.3. (For these purposes, the transmission
of the system's own IIH PDU is equivalent to receiv
ing it). If there has been no change to the information
on which the election is performed since the last time
it was run, the previous result can be assumed. The
relevant information is
1)the set of Intermediate system adjacency states,
2)the set of Intermediate System priorities (including
this system's) and
3)the existence (or otherwise) of at least one Up  
End system (not including Manual Adjacencies) or
Intermediate system adjacency on the circuit.
An Intermediate system shall not declare itself to be a LAN
Designated Intermediate system of any type until it has at
least one Up End system (not including Manual Adjacen
cies) or Intermediate system adjacency on the circuit. (This
 
prevents an Intermediate System which has a defective re
ceiver and is incapable of receiving any PDUs from errone
ously electing itself LAN Designated Intermediate System.)
The LAN ID field in the LAN IIH PDUs transmitted by this
system shall be set to the value of the LAN ID field reported
in the LAN IIH PDU (for the appropriate level) received
from the system which this system considers to be the Des
ignated Intermediate System. This value shall also be
passed to the Update Process, as the pseudonode ID, to en
able Link State PDUs to be issued for this system claiming
connectivity to the pseudonode.
If this system, as a result of the Designated Intermediate
System election process, considers itself to be designated
Intermediate System, the LAN ID field shall be set to the
concatenation of this system's own system ID and the lo
cally assigned one octet Local Circuit ID.
8.4.5 Soliciting the ES configuration
When there is a change in the topology or configuration of
the LAN (for example the partitioning of a LAN into two
segments by the failure of a repeater or bridge), it is desir
able for the (new) Designated Intermediate System to ac
quire the new End system configuration of the LAN as
quickly as possible in order that it may generate Link State
PDUs which accurately reflect the actual configuration.
This is achieved as follows.
When the circuit is enabled, or the Intermediate system de
tects a change in the set of Intermediate systems on the
LAN, or a change in the Designated Intermediate System
ID, the IS shall initiate a poll of the ES configuration by
performing the following actions.
a)Delay a random interval between 0 and iSIS

Hello


Timer seconds. (This is to avoid synchronisation with
other Intermediate systems which have detected the
change.)
b)If (and only if) an Intermediate System had been re
moved from the set of Intermediate systems on the
LAN, reset the entryRemainingTime field in the
endSystemIDs adjacency database record of all adja
cencies on this circuit to the value
(iSIS

Hello

Timer + pollESHelloRate) W
HoldingMultiplier
or the existing value whichever is the lower. (This
causes any End systems which are no longer present
on the LAN to be rapidly timed out, but not before
they have a chance to respond to the poll.)
c)Transmit HoldingMultiplier ISH PDUs for each NET
possessed by the Intermediate system with a Sug
gested ES Configuration Timer value of poll

ES


Hello

Rate at an interval between them of iSIS

Hello


Timer seconds and a holding time of hello

Timer *
HoldingMultiplier.
d)Resume sending ISH PDUs at intervals of hello


Timer seconds with a Suggested ES Configuration
Timer value of defaultESHelloTimer.
 
8.4.6 Receipt of ESH PDUs  Database of End
Systems
An IS shall enter an End system into the adjacency database
when an ESH PDU is received from a new data link ad
dress. If an ESH PDU is received with the same data link
address as a current adjacency, but with a different NSAP
address, the new address shall be added to the adjacency,
with a separate timer. A single ESH PDU may contain more
than one NSAP address. When a new data link address or
NSAP address is added to the adjacency database, the IS
shall generate an adjacencyStateChange (Up) notifica
tion on that adjacency.
The IS shall set a timer for the value of the Holding Time
field in the received ESH PDU. If another ESH PDU is not
received from the ES before that timer expires, the ES shall
be purged from the database, provided that the Subnetwork
Independent Functions associated with initialising the adja
cency have been completed. Otherwise the IS shall clear the
adjacency as soon as those functions are completed.
When the adjacency is cleared, the Subnetwork Independ
ent Functions shall be informed of an adjacencyState
Change (Down) notification, and the adjacency can be re-
used after the Subnetwork Independent Functions associ
ated with bringing down the adjacency have been com
pleted.
9 Structure and Encoding of PDUs
This clause describes the PDU formats of the Intra-Domain
Routeing protocol.
9.1 General encoding Rules
Octets in a PDU are numbered starting from 1, in increasing
order. Bits in a octet are numbered from 1 to 8, where bit 1
is the least significant bit and is pictured on the right. When
consecutive octets are used to represent a number, the lower
octet number has the most significant value.
Fields marked Reserved (or simply R) are transmitted as
zero, and ignored on receipt, unless otherwise noted.
Values are given in decimal. All numeric fields are un
signed integers, unless otherwise noted.
9.2 Encoding of Network Layer
Addresses
Network Layer addresses (NSAP addresses, NETs, area ad
dresses and Address Prefixes) are encoded in PDUs accord
ing to the preferred binary encoding specified in
ISO 8348/Add.2; the entire address, taken as a whole is rep
resented explicitly as a string of binary octets. This string is
conveyed in its entirety in the address fields of the PDUs.
The rules governing the generation of the preferred binary
encoding are described in ISO 8348/Add.2. The address so
generated is encoded with the most significant octet (i.e. the
AFI) of the address being the first octet transmitted, and the
more significant semi-octet of each pair of semi-octets in
 
the address is encoded in the more significant semi-octet of
each octet (i.e. in the high order 4 bits). Thus the address
/371234 is encoded as
Figure 6 - 111No. of Octets3
7
1
2
3
4
Address encoding example
9.3 Encoding of SNPA Addresses
SNPA addresses (e.g. lANAddress) shall be encoded ac
cording to the rules specified for the particular type of
subnetwork being used. In the case of an ISO 8802
subnetwork, the SNPA address is the MAC address defined
in ISO 10039, which is encoded according to the binary
representation of MAC addresses specified in ISO 10039.
9.4 PDU Types
The types of PDUs are:
-Level 1 LAN IS to IS Hello PDU
-Level 2 LAN IS to IS Hello PDU
-Point-to-Point IS to IS Hello PDU
-Level 1 Link State PDU
-Level 2 Link State PDU
-Level 1 Complete Sequence Numbers PDU
-Level 2 Complete Sequence Numbers PDU
-Level 1 Partial Sequence Numbers PDU
-Level 2 Partial Sequence Numbers PDU
These are described in the following subclauses.
 
9.5 Level 1 LAN IS to IS Hello PDU
This PDU is multicast by Intermediate systems on broad
cast circuits to the multi-destination address AllL1ISs.  
The purpose of this PDU is for Intermediate systems on
broadcast circuits to discover the identity of other Level 1
Intermediate systems on that circuit. Trailing Pad options
are inserted to make PDU Length equal to at least maxsize
- 1 where maxsize is the maximum of
-dataLinkBlocksize
-originating

L1

LSP

Buf

fer

Size
(see 8.4.1). 11No. of Octets1111111ID Length2ID Length +
121VARIABLEIntradomain Routeing
Protocol Discriminator
Length Indicator
Version/Protocol ID Extension
ID Length
PDU Type
R
R
R
Version
ECO
User ECO
Reserved/Circuit Type
Source ID
Holding Time
LAN ID
PDU Length
Priority
R
VARIABLE LENGTH FIELDS
 
-Intradomain Routeing Protocol Discriminator  
architectural constant
-Length Indicator  Length of the fixed header in oc
tets
-Version/Protocol ID Extension  1
-ID Length  Length of the ID field of NSAP ad
dresses and NETs used in this routeing domain. This
field shall take on one of the following values:
7An integer between 1 and 8, inclusive, indicating
an ID field of the corresponding length
7The value zero, which indicates a 6 octet ID field
length
7The value 255, whhich means a null ID field (i.e.
zero length)
 
All other values are illegal and shall not be used.
-PDU Type (bits 1 through 5)  15. Note bits 6, 7 and
8 are Reserved, which means they are transmitted as 0
and ignored on receipt.
-Version  1
-ECO  transmitted as zero, ignored on receipt
-User ECO  transmitted as zero, ignored on receipt
-Reserved/Circuit Type  Most significant 6 bits re
served (Transmitted as zero, ignored on receipt). Low
order bits (bits 1 and 2) indicate:
70  reserved value (if specified the entire PDU
shall be ignored)
71  Level 1 only
72  Level 2 only (sender is Level 2 Intermediate
system with manualL2OnlyMode set True for
this circuit, and will use this link only for Level 2
traffic)
73  both Level 1 and Level 2 (sender is Level 2 In
termediate system, and will use this link both for
Level 1 and Level 2 traffic)
NOTE  In a LAN Level 1 IIH PDU the Circuit
Type shall be either 1 or 3.
-Source ID  the system ID of transmitting Intermedi
ate system
-Holding Time  Holding Timer to be used for this In
termediate system
-PDU Length  Entire length of this PDU, in octets,
including header
-Reserved/Priority  Bit 8 reserved (Transmitted as
zero, ignored on receipt). Bits 1 through 7  priority
for being LAN Level 1 Designated Intermediate Sys
tem. Higher number has higher priority for being LAN
Level 1 Designated Intermediate System. Unsigned
integer.
-LAN ID  a field composed the system ID (18 octets)
of the LAN Level 1 Designated Intermediate System,
plus a low order octet assigned by LAN Level 1 Des
ignated Intermediate System. Copied from LAN
Level 1 Designated Intermediate System's IIH PDU.
-VARIABLE LENGTH FIELDS  fields of the form:11No. of OctetsLENGTHCODE
LENGTH
VALUE
 
Any codes in a received PDU that are not recognised
shall be ignored.
 
Currently defined codes are:
7Area Addresses  the set of manual

Area


Addresses of this Intermediate System.
xCODE  1
xLENGTH  total length of the value field.
xVALUE 1Address Length1Address LengthNo. of OctetsAddress Length
Area Address
Address Length
 
Area Address
 
7Address Length  Length of Area Ad
dress in octets.
7Area Address  Area address.
7Intermediate System Neighbours  This option
field can occur multiple times. The set of Interme
diate systems on this LAN to which adjacencies of
neighbourSystemType L1 Intermediate Sys
tem exist in state Up or Initialising (i.e.  
those from which Level 1 IIH PDUs have been
heard).
xCODE  6
xLENGTH  total length of the value field.
xVALUE 66No. of OctetsLAN Address
LAN Address
 
7LAN Address  6 octet MAC Address of
Intermediate System neighbour.
7Padding  This option may occur multiple times.
It is used to pad the PDU to at least maxsize - 1.
xCODE  8.
xLENGTH  total length of the value field (may
be zero).
xVALUE  LENGTH octets of arbitrary value.
7Authentication Information  information for
performing authentication of the originator of the
PDU.
xCODE  10.
xLENGTH  variable from 1254 octets
 
xVALUE 1VARIABLENo. of OctetsAuthentication Type
 
Authentication Value
 
7Authentication Type  a one octet iden
tifier for the type of authentication to be
carried out. The following values are de
fined:
0  RESERVED
1  Cleartext Password
2254  RESERVED
255  Routeing Domain private
authentication method
7Authentication Value  determined by
the value of the authentication type. If
Cleartext Password as defined in this Inter
national Standard is used, then the authenti
cation value is an octet string.
 
9.6 Level 2 LAN IS to IS Hello PDU
This PDU is multicast by Intermediate systems on broad
cast circuits to the multi-destination address AllL2ISs.  
The purpose of this PDU is for Intermediate systems on
broadcast circuits to discover the identity of other Level 2
Intermediate systems on that circuit. Trailing Pad options
are inserted to make PDU Length equal to at least maxsize
- 1 where
-dataLinkBlocksize
-originatingL2LSPBufferSize
(see 8.4.1). 11No. of Octets1111111ID Length2ID Length +
121VARIABLEIntradomain Routeing
Protocol Discriminator
Length Indicator
Version/Protocol ID Extension
ID Length
PDU Type
R
R
R
Version
ECO
User ECO
Reserved/Circuit Type
Source ID
Holding Time
LAN ID
PDU Length
Priority
R
VARIABLE LENGTH FIELDS
 
-Intradomain Routeing Protocol Discriminator  ar
chitectural constant
-Length Indicator  Length of fixed header in octets
-Version/Protocol ID Extension  1
-ID Length  Length of the ID field of NSAP ad
dresses and NETs used in this routeing domain. This
field shall take on one of the following values:
7An integer between 1 and 8, inclusive, indicating
an ID field of the corresponding length
7The value zero, which indicates a 6 octet ID field
length
7The value 255, whhich means a null ID field (i.e.
zero length)
All other values are illegal and shall not be used.
 
-PDU Type (bits 1 through 5)  16. Note bits 6, 7 and
8 are Reserved, which means they are transmitted as 0
and ignored on receipt.
-Version  1
-ECO  transmitted as zero, ignored on receipt
-User ECO  transmitted as zero, ignored on receipt
-Reserved/Circuit Type  Most significant 6 bits re
served (Transmitted as zero, ignored on receipt). Low
order bits (bits 1 and 2) indicate:
70  reserved value (if specified the entire PDU
shall be ignored)
71  Level 1 only
72  Level 2 only (sender is Level 2 Intermediate
System with manualL2OnlyMode set True for
this circuit, and will use this link only for Level 2
traffic)
73  both Level 1 and Level 2 (sender is Level 2 In
termediate System, and will use this link both for
Level 1 and Level 2 traffic)
NOTE  In a LAN Level 2 IIH PDU the Circuit Type
shall be either 2 or 3.
-Source ID  the system ID of transmitting Intermedi
ate System
-Holding Time  Holding Timer to be used for this In
termediate System
-PDU Length  Entire length of this PDU, in octets,
including header
-Reserved/Priority  Bit 8 reserved (Transmitted as
zero, ignored on receipt). Bits 1 through 7  priority
for being LAN Level 2 Designated Intermediate Sys
tem. Higher number has higher priority for being LAN
Level 2 Designated Intermediate System. Unsigned
integer.
-LAN ID  a field composed the system ID (18 octets)
of the LAN Level 1 Designated Intermediate System,
plus a low order octet assigned by LAN Level 1 Des
ignated Intermediate System. Copied from LAN
Level 1 Designated Intermediate System's IIH PDU.
-VARIABLE LENGTH FIELDS  fields of the form:11No. of OctetsLENGTHCODE
LENGTH
VALUE
 
Any codes in a received PDU that are not recognised
shall be ignored.
Currently defined codes are:
 
7Area addresses  the set of manual

Area


Addresses of this Intermediate system.
xCODE  1
xLENGTH  total length of the value field.
xVALUE 1Address Length1Address LengthNo. of OctetsAddress Length
Area Address
Address Length
 
Area Address
 
7Address Length  Length of area address
in octets.
7Area Address  Area address.
7Intermediate System Neighbours  This option
can occur multiple times. The set of Intermediate
systems on this LAN to which adjacencies of
neighbourSystemType L2 Intermediate Sys
tem exist in state Up or Initialising (i.e.  
those from which Level 2 IIH PDUs have been
heard).
xCODE  6
xLENGTH  total length of the value field.
xVALUE 66No. of OctetsLAN Address
LAN Address
 
xLAN Address  6 octet MAC Address of In
termediate System neighbour
7Padding  This option may occur multiple times.
It is used to pad the PDU to at least maxsize 1.
xCODE  8.
xLENGTH  total length of the value field (may
be zero).
xVALUE  LENGTH octets of arbitrary value.
7Authentication Information  information for
performing authentication of the originator of the
PDU.
xCODE  10.
xLENGTH  variable from 1254 octets
 
xVALUE 1VARIABLENo. of OctetsAuthentication Type
 
Authentication Value
 
7Authentication Type  a one octet iden
tifier for the type of authentication to be
carried out. The following values are de
fined:
0  RESERVED
1  Cleartext Password
2254  RESERVED
255  Routeing Domain private
authentication method
7Authentication Value  determined by
the value of the authentication type. If
Cleartext Password as defined in this Inter
national Standard is used, then the authenti
cation value is an octet string.
 
9.7 Point-to-Point IS to IS Hello PDU
This PDU is transmitted by Intermediate systems on non-
broadcast circuits, after receiving an ISH PDU from the
neighbour system. Its purpose is to determine whether the
neighbour is a Level 1 or a Level 2 Intermediate System.
Trailing pad options are inserted to make PDU Length
equal to at least maxsize  1 where maxsize is the maxi
mum of
-dataLinkBlocksize
-originating

L1

LSP

Buf

fer

Size
-originatingL2LSPBufferSize
(see 8.2.3).11No. of Octets1111111ID Length212VARIABLEIntradomain Routeing
Protocol Discriminator
Length Indicator
Version/Protocol ID Extension
ID Length
PDU Type
R
R
R
Version
ECO
User ECO
Reserved/Circuit Type
Source ID
Holding Time
Local Circuit ID
PDU Length
VARIABLE LENGTH FIELDS
 
-Intradomain Routeing Protocol Discriminator  
architectural constant
-Length Indicator  Length of fixed header in octets
-Version/Protocol ID Extension  1
-ID Length  Length of the ID field of NSAP ad
dresses and NETs used in this routeing domain. This
field shall take on one of the following values:
7An integer between 1 and 8, inclusive, indicating
an ID field of the corresponding length
7The value zero, which indicates a 6 octet ID field
length
7The value 255, whhich means a null ID field (i.e.
zero length)
All other values are illegal and shall not be used.
 
-PDU Type  (bits 1 through 5)  17. Note bits 6, 7
and 8 are Reserved, which means they are transmitted
as 0 and ignored on receipt.
-Version  1
-ECO  transmitted as zero, ignored on receipt
-User ECO  transmitted as zero, ignored on receipt
-Reserved/Circuit Type  Most significant 6 bits re
served (Transmitted as zero, ignored on receipt). Low
order bits (bits 1 and 2) indicate:
70  reserved value (if specified the entire PDU
shall be ignored)
71  Level 1 only
72  Level 2 only (sender is Level 2 Intermediate
system with manualL2OnlyMode set True for
this circuit, and will use this link only for Level 2
traffic)
73  both Level 1 and Level 2 (sender is Level 2 In
termediate system and will use this link both for
Level 1 and Level 2 traffic)
-Source ID  the system ID of transmitting Intermedi
ate system
-Holding Time  Holding Timer to be used for this In
termediate system
-PDU Length  Entire length of this PDU, in octets,
including header
-Local Circuit ID  1 octet unique ID assigned to this
circuit when it is created by this Intermediate system.
The actual ID by which the circuit is known to both
ends of the link is determined by the Intermediate sys
tem with the lower Source ID.
-VARIABLE LENGTH FIELDS  fields of the form:11No. of OctetsLENGTHCODE
LENGTH
VALUE
 
Any codes in a received PDU that are not recognised
shall be ignored.
Currently defined codes are:
7Area addresses  the set of manual

Area


Addresses of this Intermediate system
xCODE  1
xLENGTH  total length of the value field.
 
xVALUE 1Address Length1Address LengthNo. of OctetsAddress Length
Area Address
Address Length
Area Address
 
7Address Length  Length of area address
in octets.
7Area Address  Area address.
7Padding  This option may occur multiple times.
It is used to pad the PDU to at least maxsize 1.
xCODE  8.
xLENGTH  total length of the value field (may
be zero).
xVALUE  LENGTH octets of arbitrary value.
7Authentication Information  information for
performing authentication of the originator of the
PDU.
xCODE  10.
xLENGTH  variable from 1254 octets
xVALUE 1VARIABLENo. of OctetsAuthentication Type
 
Authentication Value
 
7Authentication Type  a one octet iden
tifier for the type of authentication to be
carried out. The following values are de
fined:
0  RESERVED
1  Cleartext Password
2254  RESERVED
255  Routeing Domain private
authentication method
7Authentication Value  determined by
the value of the authentication type. If
Cleartext Password as defined in this Inter
national Standard is used, then the authenti
cation value is an octet string.
 
9.8 Level 1 Link State PDU
Level 1 Link State PDUs are generated by Level 1 and
Level 2 Intermediate systems, and propagated throughout
an area. The contents of the Level 1 Link State PDU indi
cates the state of the adjacencies to neighbour Intermediate
Systems, or pseudonodes, and End systems of the Interme
diate system that originally generated the PDU.11No. of
Octets11111122ID Length + 214VARIABLE2Intradomain Routeing
Protocol Discriminator
Length Indicator
Version/Protocol ID Extension
ID Length
PDU Type
R
R
R
Version
ECO
User ECO
PDU Length
Remaining Lifetime
LSP ID
P
Sequence Number
VARIABLE LENGTH FIELDS
LSPDBOL
IS Type
 
Checksum
ATT
 
-Intradomain Routeing Protocol Discriminator  ar
chitectural constant
-Length Indicator  Length if fixed header in octets
-Version/Protocol ID Extension  1
-ID Length  Length of the ID field of NSAP ad
dresses and NETs used in this routeing domain. This
field shall take on one of the following values:
7An integer between 1 and 8, inclusive, indicating
an ID field of the corresponding length
7The value zero, which indicates a 6 octet ID field
length
7The value 255, whhich means a null ID field (i.e.
zero length)
All other values are illegal and shall not be used.
-PDU Type (bits 1 through 5)  18. Note bits 6, 7 and
8 are Reserved, which means they are transmitted as 0
and ignored on receipt.
-Version  1
-ECO  transmitted as zero, ignored on receipt
 
-User ECO  transmitted as zero, ignored on receipt
-PDU Length  Entire Length of this PDU, in octets,
including header
-Remaining Lifetime  Number of seconds before
LSP considered expired
-LSP ID  the system ID of the source of the Link
State PDU. It is structured as follows:ID Length1No. of Octets1Source ID
Pseudonode ID
LSP Number
 
-Sequence Number  sequence number of LSP
-Checksum  Checksum of contents of LSP from
Source ID to end. Checksum is computed as de
scribed in 7.3.11.
-P/ATT/LSPDBOL/IS Type
-P  Bit 8, indicates when set that the issuing Interme
diate System supports the Partition Repair optional
function.
7ATT - Bits 7-4 indicate, when set, that the issuing
Intermediate System is `attached' to other areas
using:
xBit 4 - the Default Metric
xBit 5 - the Delay Metric
xBit 6 - the Expense Metric
xBit 7 - the Error Metric.
7LSPDBOL  Bit 3  A value of 0 indicates no
LSP Database Overload, and a value of 1 indicates
that the LSP Database is Overloaded. An LSP with
this bit set will not be used by any decision proc
ess to calculate routes to another IS through the
originating system.
7IS Type  Bits 1 and 2 indicate the type of Inter
mediate System  One of the following values:
x0  Unused value
x1  ( i.e. bit 1 set) Level 1 Intermediate system
x2  Unused value
x3  (i.e. bits 1 and 2 set) Level 2 Intermediate
system.
-VARIABLE LENGTH FIELDS  fields of the form:11No. of OctetsLENGTHCODE
LENGTH
VALUE
 
 
Any codes in a received LSP that are not recognised
are ignored and passed through unchanged.
Currently defined codes are:
7Area Addresses  the set of manual

Area


Addresses of this Intermediate system.  For
LSPs not generated on behalf of the pseudonode
this option shall always be present in the LSP with
LSP number zero, and shall never be present in an
LSP with non-zero LSP number. It shall appear
before any Intermediate System Neighbours or
End System Neighbours options. This option
shall never be present in pseudonode LSPs.
xCODE  1
xLENGTH  total length of the value field.
xVALUE 1Address Length1Address LengthNo. of OctetsAddress Length
Area Address
Address Length
Area Address
 
7Address Length  Length of area address
in octets.
7Area Address  Area address.
7Intermediate System Neighbours  Intermedi
ate system and pseudonode neighbours.
This is permitted to appear multiple times, and in
an LSP with any LSP number. However, all the
Intermediate System Neighbours options
shall precede the End System Neighbours op
tions. i.e. they shall appear before any End system
Neighbour options in the same LSP and no End
system Neighbour options shall appear in an LSP
with lower LSP number.
xCODE  2.
xLENGTH  1. plus a multiple of 11.
 
xVALUE No. of Octets11ID Length + 11111ID Length + 1111Virtual Flag
Default Metric
Neighbour ID
Delay Metric
Expense Metric
Error Metric
I/E
0
I/E
S
I/E
S
I/E
S
Default Metric
Neighbour ID
Delay Metric
Expense Metric
Error Metric
I/E
0
I/E
S
I/E
S
I/E
S
 
 
7Virtual Flag is a Boolean. If equal to 1, this
indicates the link is really a Level 2 path to
repair an area partition. (Level 1 Intermedi
ate Systems would always report this octet
as 0 to all neighbours).
7Default Metric is the value of the default
metric for the link to the listed neighbour.
Bit 8  of this field is reserved. Bit 7 of this
field (marked I/E) indicates the metric type,
and shall contain the value 0, indicating
an Internal metric.
7Delay Metric is the value of the delay met
ric for the link to the listed neighbour.  If
this IS does not support this metric it shall
set the bit S to 1 to indicate that the met
ric is unsupported. Bit 7 of this field
(marked I/E) indicates the metric type, and
shall contain the value 0, indicating an
Internal metric.
7Expense Metric is the value of the ex
pense metric for the link to the listed neigh
bour.  If this IS does not support this metric
it shall set the bit S to 1 to indicate that
the metric is unsupported. Bit 7 of this field
(marked I/E) indicates the metric type, and
shall contain the value 0, indicating an
Internal metric.
7Error Metric is the value of the error metric
for the link to the listed neighbour.  If this
IS does not support this metric it shall set
the bit S to 1 to indicate that the metric is
unsupported. Bit 7 of this field (marked
I/E) indicates the metric type, and shall
contain the value 0, indicating an Internal
metric.
7Neighbour ID. For Intermediate System
neighbours, the first ID Length octets are
the neighbour's system ID, and the last oc
tet is 0. For pseudonode neighbours, the
first ID Length octets is the LAN Level 1
 
Designated Intermediate System's ID, and
the last octet is a non-zero quantity defined
by the LAN Level 1 Designated Intermedi
ate System.
7End System Neighbours  End system neigh
bours
This may appear multiple times, and in an LSP
with any LSP number. See the description of the
Intermediate System Neighbours option
above for the relative ordering constraints. Only
adjacencies with identical costs can appear in the
same list.
xCODE  3.
xLENGTH  4. plus a multiple of 6.
xVALUE ID LengthNo. of Octets1ID Length111Neighbour ID
Default Metric
Neighbour ID
Delay Metric
 
Expense Metric
 
Error Metric
I/E
 
0
 
I/E
 
S
 
I/E
 
S
 
I/E
S
 
7Default Metric is the value of the default
metric for the link to each of the listed
neighbours. Bit 8 of this field is reserved.
Bit 7 of this field (marked I/E) indicates the
metric type, and shall contain the value 0,
indicating an Internal metric.
7Delay Metric is the value of the delay met
ric for the link to each of the listed neigh
bours.  If this IS does not support this met
ric it shall set the bit S to 1 to indicate
that the metric is unsupported. Bit 7 of this
field (marked I/E) indicates the metric type,
and shall contain the value 0, indicating
an Internal metric.
7Expense Metric is the value of the ex
pense metric for the link to each of the
listed neighbours.  If this IS does not sup
port this metric it shall set the bit S to 1
to indicate that the metric is unsupported.
Bit 7 of this field (marked I/E) indicates the
metric type, and shall contain the value 0,
indicating an Internal metric.
7Error Metric is the value of the error metric
for the link to each of the listed neighbour.  
If this IS does not support this metric it
shall set the bit S to 1 to indicate that the
metric is unsupported. Bit 7 of this field
(marked I/E) indicates the metric type, and
shall contain the value 0, indicating an
Internal metric.
7Neighbour ID  system ID of End system
neighbour.
 
7Authentication Information  information for
performing authentication of the originator of the
PDU.
xCODE  10.
xLENGTH  variable from 1254 octets
xVALUE 1VARIABLENo. of OctetsAuthentication Type
 
Authentication Value
 
7Authentication Type  a one octet iden
tifier for the type of authentication to be
carried out. The following values are de
fined:
0  RESERVED
1  Cleartext Password
2254  RESERVED
255  Routeing Domain private
authentication method
7Authentication Value  determined by
the value of the authentication type. If
Cleartext Password as defined in this Inter
national Standard is used, then the authenti
cation value is an octet string.
 
9.9 Level 2 Link State PDU
Level 2 Link State PDUs are generated by Level 2 Interme
diate systems, and propagated throughout the level 2 do
main. The contents of the Level 2 Link State PDU indicates
the state of the adjacencies to neighbour Level 2 Intermedi
ate Systems, or pseudonodes, and to reachable address pre
fixes of the Intermediate system that originally generated
the PDU.11No. of Octets11111122ID Length + 214VARIABLE2Intradomain Routeing
Protocol Discriminator
 
Length Indicator
Version/Protocol ID Extension
ID Length
PDU Type
 
R
R
R
Version
ECO
User ECO
PDU Length
Remaining Lifetime
LSP ID
P
Sequence Number
VARIABLE LENGTH FIELDS
LSPDBOL
IS Type
 
Checksum
ATT
 
-Intradomain Routeing Protocol Discriminator  ar
chitectural constant
-Length Indicator  Length of fixed header in octets
-Version/Protocol ID Extension  1
-ID Length  Length of the ID field of NSAP ad
dresses and NETs used in this routeing domain. This
field shall take on one of the following values:
7An integer between 1 and 8, inclusive, indicating
an ID field of the corresponding length
7The value zero, which indicates a 6 octet ID field
length
7The value 255, whhich means a null ID field (i.e.
zero length)
All other values are illegal and shall not be used.
-PDU Type (bits 1 through 5)  20. Note bits 6, 7 and
8 are Reserved, which means they are transmitted as 0
and ignored on receipt.
-Version  1
-ECO  transmitted as zero, ignored on receipt
 
-User ECO  transmitted as zero, ignored on receipt
-PDU Length  Entire Length of this PDU, in octets,
including header.
-Remaining Lifetime  Number of seconds before
LSP considered expired
-LSP ID  the system ID of the source of the Link
State PDU. It is structured as follows:ID Length1No. of Octets1Source ID
Pseudonode ID
LSP Number
 
-Sequence Number  sequence number of LSP
-Checksum  Checksum of contents of LSP from
Source ID to end. Checksum is computed as de
scribed in 7.3.11.
-P/ATT/LSPDBOL/IS Type
7P  Bit 8, indicates when set that the issuing Inter
mediate System supports the Partition Repair op
tional function.
7ATT - Bits 7-4 indicate, when set, that the issuing
Intermediate System is `attached' to other areas
using:
xBit 4 - the Default Metric
xBit 5 - the Delay Metric
xBit 6 - the Expense Metric
xBit 7 - the Error Metric.
7LSPDBOL  Bit 3  A value of 0 indicates no
LSP Database Overload, and a value of 1 indicates
that the LSP Database is Overloaded. An LSP with
this bit set will not be used by any decision proc
ess to calculate routes to another IS through the
originating system.
7IS Type  Bits 1 and 2 indicate the type of Inter
mediate System  One of the following values:
x0  Unused value
x1  ( i.e. bit 1 set) Level 1 Intermediate system
x2  Unused value
x3  (i.e. bits 1 and 2 set) Level 2 Intermediate
system.
NOTE  In a Level 2 Link State PDU, IS Type
shall be 3.
 
-VARIABLE LENGTH FIELDS  fields of the form:11No. of OctetsLENGTHCODE
LENGTH
VALUE
 
Any codes in a received LSP that are not recognised
are ignored and passed through unchanged.
Currently defined codes are:
7Area Addresses  the set of partition

Area


Addresses of this Intermediate system.  For non-
pseudonode LSPs this option shall always be pre
sent in the LSP with LSP number zero, and shall
never be present in an LSP with non-zero LSP
number. It shall appear before any Intermediate
System Neighbours or Prefix Neighbours op
tions. This option shall never be present in
pseudonode LSPs.
xCODE  1
xLENGTH  total length of the value field.
xVALUE 1Address Length1Address LengthNo. of OctetsAddress Length
Area Address
Address Length
 
Area Address
 
7Address Length  Length of area address
in octets.
7Area Address  Area address.
7Partition Designated Level 2 Intermediate
System  ID of Designated Level 2 Intermediate
System for the partition. For non-pseudonode
LSPs issued by Intermediate Systems which sup
port the partition repair optional function this op
tion shall always be present in the LSP with LSP
number zero, and shall never be present in an LSP
with non-zero LSP number. It shall appear before
any Intermediate System Neighbours or Prefix
Neighbours options. This option shall never be
present in pseudonode LSPs.
xCODE  4.
xLENGTH  6
xVALUE  ID of Partition Designated Level 2
Intermediate System for the partition.
7Intermediate System Neighbours  Intermedi
ate system and pseudonode neighbours.
This is permitted to appear multiple times, and in
an LSP with any LSP number. However, all the
Intermediate System Neighbours options
 
shall precede the Prefix Neighbours options.
i.e. they shall appear before any Prefix Neighbour
options in the same LSP and no Prefix Neighbour
options shall appear in an LSP with lower LSP
number.
xCODE  2.
xLENGTH  1. plus a multiple of 11.
xVALUE No. of Octets11ID Length + 11111ID Length + 1111Virtual Flag
Default Metric
Neighbour ID
Delay Metric
Expense Metric
Error Metric
I/E
0
I/E
S
I/E
S
I/E
S
Default Metric
Neighbour ID
Delay Metric
Expense Metric
Error Metric
I/E
0
I/E
S
I/E
S
I/E
S
 
7Virtual Flag is a Boolean. If equal to 1, this
indicates the link is really a Level 2 path to
repair an area partition. (Level 1 Intermedi
ate Systems would always report this octet
as 0 to all neighbours).
7Default Metric is the value of the default
metric for the link to the listed neighbour.
Bit 8  of this field is reserved. Bit 7 of this
field (marked I/E) indicates the metric type,
and shall contain the value 0, indicating
an Internal metric.
7Delay Metric is the value of the delay met
ric for the link to the listed neighbour.  If
this IS does not support this metric it shall
set bit S to 1 to indicate that the metric is
unsupported. Bit 7 of this field (marked
I/E) indicates the metric type, and shall
contain the value 0, indicating an Internal
metric.
7Expense Metric is the value of the ex
pense metric for the link to the listed neigh
bour.  If this IS does not support this metric
it shall set bit S to 1 to indicate that the
metric is unsupported. Bit 7 of this field
(marked I/E) indicates the metric type, and
shall contain the value 0, indicating an
Internal metric.
7Error Metric is the value of the error metric
for the link to the listed neighbour.  If this
IS does not support this metric it shall set
bit S to 1 to indicate that the metric is un
supported. Bit 7 of this field (marked I/E)
 
indicates the metric type, and shall contain
the value 0, indicating an Internal metric.
7Neighbour ID. For Intermediate System
neighbours, the first ID Length octets are
the neighbour's system ID, and the last oc
tet is 0. For pseudonode neighbours, the
first ID Length octets is the LAN Level 1
Designated Intermediate System's ID, and
the last octet is a non-zero quantity defined
by the LAN Level 1 Designated Intermedi
ate System.
7Prefix Neighbours  reachable address prefix
neighbours
This may appear multiple times, and in an LSP
with any LSP number. See the description of the
Intermediate System Neighbours option
above for the relative ordering constraints. Only
adjacencies with identical costs can appear in the
same list.
xCODE  5.
xLENGTH  Total length of the VALUE field.
xVALUE 1iAddress Prefix Length /2y1No. of OctetsiAddress Prefix Length
/2y1111Address Prefix Length
Address Prefix
Address Prefix Length
 
Address Prefix
Default Metric
 
Delay Metric
 
Expense Metric
 
Error Metric
 
I/E
 
0
 
I/E
 
S
 
 
I/E
 
S
 
 
I/E
 
S
 
 
 
7Default Metric is the value of the default
metric for the link to each of the listed
neighbours. Bit 8 of this field is reserved.
Bit 7 (marked I/E) indicates the metric
type, and may be set to zero indicating an
internal metric, or may be set to 1 indicat
ing an external metric.
7Delay Metric is the value of the delay met
ric for the link to each of the listed neigh
bours.  If this IS does not support this met
ric it shall set the bit S to 1 to indicate
that the metric is unsupported. Bit 7
(marked I/E) indicates the metric type, and
may be set to zero indicating an internal
metric, or may be set to 1 indicating an ex
ternal metric.
7Expense Metric is the value of the ex
pense metric for the link to each of the
listed neighbours.  If this IS does not sup
port this metric it shall set the bit S to 1
to indicate that the metric is unsupported.
 
Bit 7 (marked I/E) indicates the metric
type, and may be set to zero indicating an
internal metric, or may be set to 1 indicat
ing an external metric.
7Error Metric is the value of the error metric
for the link to each of the listed neighbour.  
If this IS does not support this metric it
shall set the bit S to 1 to indicate that the
metric is unsupported. Bit 7 (marked I/E)
indicates the metric type, and may be set to
zero indicating an internal metric, or may
be set to 1 indicating an external metric.
7Address Prefix Length is the length in
semi-octets of the following prefix. A
length of zero indicates a prefix that
matches all NSAPs.
7Address Prefix is a reachable address pre
fix encoded as described in 7.1.4. If the
length in semi-octets is odd, the prefix is
padded out to an integral number of octets
with a trailing zero semi-octet.
Note that the area addresses listed in the Area Ad
dresses option of Level 2 Link State PDU with
LSP number zero, are understood to be reachable
address neighbours with cost 0. They are not listed
separately in the Prefix Neighbours options.
7Authentication Information  information for
performing authentication of the originator of the
PDU.
xCODE  10.
xLENGTH  variable from 1254 octets
xVALUE 1VARIABLENo. of OctetsAuthentication Type
 
Authentication Value
 
7Authentication Type  a one octet iden
tifier for the type of authentication to be
carried out. The following values are de
fined:
0  RESERVED
1  Cleartext Password
2254  RESERVED
255  Routeing Domain private
authentication method
7Authentication Value  determined by
the value of the authentication type. If
Cleartext Password as defined in this Inter
national Standard is used, then the authenti
cation value is an octet string.
 
9.10 Level 1 Complete Sequence
Numbers PDU11No. of Octets1111112ID Length + 1ID Length + 2ID Length +
2VARIABLEIntradomain Routeing
Protocol Discriminator
 
Length Indicator
Version/Protocol ID Extension
ID Length
PDU Type
 
R
R
R
Version
ECO
User ECO
PDU Length
Source ID
Start LSP ID
End LSP ID
VARIABLE LENGTH FIELDS
 
-Intradomain Routeing Protocol Discriminator  ar
chitectural constant
-Length Indicator  Length of fixed header in octets
-Version/Protocol ID Extension  1
-ID Length  Length of the ID field of NSAP ad
dresses and NETs used in this routeing domain. This
field shall take on one of the following values:
7An integer between 1 and 8, inclusive, indicating
an ID field of the corresponding length
7The value zero, which indicates a 6 octet ID field
length
7The value 255, whhich means a null ID field (i.e.
zero length)
All other values are illegal and shall not be used.
-PDU Type (bits 1 through 5)  24. Note bits 6, 7 and
8 are Reserved, which means they are transmitted as 0
and ignored on receipt.
-Version  1
-ECO  transmitted as zero, ignored on receipt
-User ECO  transmitted as zero, ignored on receipt
-PDU Length  Entire Length of this PDU, in octets,
including header
-Source ID  the system ID of Intermediate System
(with zero Circuit ID) generating this Sequence Num
bers PDU.
 
-Start LSP ID  the system ID of first LSP in the
range covered by this Complete Sequence Numbers
PDU.
-End LSP ID  the system ID of last LSP in the range
covered by this Complete Sequence Numbers PDU.
-VARIABLE LENGTH FIELDS  fields of the form:11No. of OctetsLENGTHCODE
LENGTH
VALUE
 
Any codes in a received CSNP that are not recognised
are ignored.
Currently defined codes are:
7LSP Entries  This may appear multiple times.
The option fields, if they appear more than once,
shall appear sorted into ascending LSPID order.
xCODE  9
xLENGTH  total length of the value field.
xVALUE  a list of LSP entries of the form:4No. of Octets2ID Length +
2242ID Length + 22LSP Sequence Number
Checksum
Remaining Lifetime
LSP ID
LSP Sequence Number
Checksum
Remaining Lifetime
LSP ID
 
7Remaining Lifetime  Remaining Life
time of LSP.
7LSP ID  system ID of the LSP to which
this entry refers.
7LSP Sequence Number  Sequence
number of LSP.
7Checksum  Checksum reported in LSP.
The entries shall be sorted into ascending
LSPID order (the LSP number octet of the
LSPID is the least significant octet).
7Authentication Information  information for
performing authentication of the originator of the
PDU.
xCODE  10.
xLENGTH  variable from 1254 octets
 
xVALUE 1VARIABLENo. of OctetsAuthentication Type
 
Authentication Value
 
7Authentication Type  a one octet iden
tifier for the type of authentication to be
carried out. The following values are de
fined:
0  RESERVED
1  Cleartext Password
2254  RESERVED
255  Routeing Domain private
authentication method
7Authentication Value  determined by
the value of the authentication type. If
Cleartext Password as defined in this Inter
national Standard is used, then the authenti
cation value is an octet string.
 
9.11 Level 2 Complete Sequence
Numbers PDU
11No. of Octets1111112ID Length + 1ID Length + 2ID Length +
2VARIABLEIntradomain Routeing
Protocol Discriminator
 
Length Indicator
Version/Protocol ID Extension
ID Length
PDU Type
 
R
R
R
Version
ECO
User ECO
PDU Length
Source ID
Start LSP ID
End LSP ID
VARIABLE LENGTH FIELDS
 
-Intradomain Routeing Protocol Discriminator  ar
chitectural constant
-Length Indicator  Length of fixed header in octets
-Version/Protocol ID Extension  1
-ID Length  Length of the ID field of NSAP ad
dresses and NETs used in this routeing domain. This
field shall take on one of the following values:
7An integer between 1 and 8, inclusive, indicating
an ID field of the corresponding length
7The value zero, which indicates a 6 octet ID field
length
7The value 255, whhich means a null ID field (i.e.
zero length)
All other values are illegal and shall not be used.
-PDU Type (bits 1 through 5)  25. Note bits 6, 7 and
8 are Reserved, which means they are transmitted as 0
and ignored on receipt.
-Version  1
-ECO  transmitted as zero, ignored on receipt
-User ECO  transmitted as zero, ignored on receipt
-PDU Length  Entire Length of this PDU, in octets,
including header
 
-Source ID  the system ID of Intermediate System
(with zero Circuit ID) generating this Sequence Num
bers PDU.
-Start LSP ID  the system ID of first LSP in the
range covered by this Complete Sequence Numbers
PDU.
-End LSP ID  the system ID of last LSP in the range
covered by this Complete Sequence Numbers PDU.
-VARIABLE LENGTH FIELDS  fields of the form:11No. of OctetsLENGTHCODE
LENGTH
VALUE
 
Any codes in a received CSNP that are not recognised
are ignored.
Currently defined codes are:
7LSP Entries  this may appear multiple times.
The option fields, if they appear more than once,
shall appear sorted into ascending LSPID order.
xCODE  9
xLENGTH  total length of the value field.
xVALUE  a list of LSP entries of the form:4No. of Octets2ID Length +
2242ID Length + 22LSP Sequence Number
Checksum
Remaining Lifetime
LSP ID
LSP Sequence Number
Checksum
Remaining Lifetime
LSP ID
 
7Remaining Lifetime  Remaining Life
time of LSP.
7LSP ID  the system ID of the LSP to
which this entry refers.
7LSP Sequence Number  Sequence
number of LSP.
7Checksum  Checksum reported in LSP.
The entries shall be sorted into ascending
LSPID order (the LSP number octet of the
LSPID is the least significant octet).
7Authentication Information  information for
performing authentication of the originator of the
PDU.
 
xCODE  10.
xLENGTH  variable from 1254 octets
xVALUE 1VARIABLENo. of OctetsAuthentication Type
 
Authentication Value
 
7Authentication Type  a one octet iden
tifier for the type of authentication to be
carried out. The following values are de
fined:
0  RESERVED
1  Cleartext Password
2254  RESERVED
255  Routeing Domain private
authentication method
7Authentication Value  determined by
the value of the authentication type. If
Cleartext Password as defined in this Inter
national Standard is used, then the authenti
cation value is an octet string.
 
9.12 Level 1 Partial Sequence Numbers
PDU
11No. of Octets1111112ID Length + 1VARIABLEIntradomain Routeing
Protocol Discriminator
 
Length Indicator
Version/Protocol ID Extension
ID Length
PDU Type
 
R
R
R
Version
ECO
User ECO
PDU Length
Source ID
VARIABLE LENGTH FIELDS
 
-Intradomain Routeing Protocol Discriminator  ar
chitectural constant
-Length Indicator  Length of fixed header in octets
-Version/Protocol ID Extension  1
-ID Length  Length of the ID field of NSAP ad
dresses and NETs used in this routeing domain. This
field shall take on one of the following values:
7An integer between 1 and 8, inclusive, indicating
an ID field of the corresponding length
7The value zero, which indicates a 6 octet ID field
length
7The value 255, whhich means a null ID field (i.e.
zero length)
All other values are illegal and shall not be used.
-PDU Type (bits 1 through 5)  26. Note bits 6, 7 and
8 are Reserved, which means they are transmitted as 0
and ignored on receipt.
-Version  1
-ECO  transmitted as zero, ignored on receipt
-User ECO  transmitted as zero, ignored on receipt
-PDU Length  Entire Length of this PDU, in octets,
including header
-Source ID  the system ID of Intermediate system
(with zero Circuit ID) generating this Sequence Num
bers PDU.
 
-VARIABLE LENGTH FIELDS  fields of the form:11No. of OctetsLENGTHCODE
LENGTH
VALUE
 
Any codes in a received PSNP that are not recognised
are ignored.
Currently defined codes are:
7LSP Entries  this may appear multiple times.
The option fields, if they appear more than once,
shall appear sorted into ascending LSPID order.
xCODE  9
xLENGTH  total length of the value field.
xVALUE  a list of LSP entries of the form:4No. of Octets2ID Length +
2242ID Length + 22LSP Sequence Number
Checksum
Remaining Lifetime
LSP ID
LSP Sequence Number
Checksum
Remaining Lifetime
LSP ID
 
7Remaining Lifetime  Remaining Life
time of LSP.
7LSP ID  the system ID of the LSP to
which this entry refers.
7LSP Sequence Number  Sequence
number of LSP.
7Checksum  Checksum reported in LSP.
The entries shall be sorted into ascending
LSPID order (the LSP number octet of the
LSPID is the least significant octet).
7Authentication Information  information for
performing authentication of the originator of the
PDU.
xCODE  10.
xLENGTH  variable from 1254 octets
 
xVALUE 1VARIABLENo. of OctetsAuthentication Type
 
Authentication Value
 
7Authentication Type  a one octet iden
tifier for the type of authentication to be
carried out. The following values are de
fined:
0  RESERVED
1  Cleartext Password
2254  RESERVED
255  Routeing Domain private
authentication method
7Authentication Value  determined by
the value of the authentication type. If
Cleartext Password as defined in this Inter
national Standard is used, then the authenti
cation value is an octet string.
 
9.13 Level 2 Partial Sequence Numbers
PDU
11No. of Octets1111112ID Length + 1VARIABLEIntradomain Routeing
Protocol Discriminator
 
Length Indicator
Version/Protocol ID Extension
ID Length
PDU Type
 
R
R
R
Version
ECO
User ECO
PDU Length
Source ID
VARIABLE LENGTH FIELDS
 
-Intradomain Routeing Protocol Discriminator  ar
chitectural constant
-Length Indicator  Length of fixed header in octets
-Version/Protocol ID Extension  1
-ID Length  Length of the ID field of NSAP ad
dresses and NETs used in this routeing domain. This
field shall take on one of the following values:
7An integer between 1 and 8, inclusive, indicating
an ID field of the corresponding length
7The value zero, which indicates a 6 octet ID field
length
7The value 255, whhich means a null ID field (i.e.
zero length)
All other values are illegal and shall not be used.
-PDU Type (bits 1 through 5)  27. Note bits 6, 7 and
8 are Reserved, which means they are transmitted as 0
and ignored on receipt.
-Version  1
-ECO  transmitted as zero, ignored on receipt
-User ECO  transmitted as zero, ignored on receipt
-PDU Length  Entire Length of this PDU, in octets,
including header
-Source ID  the system ID of Intermediate system
(with zero Circuit ID) generating this Sequence Num
bers PDU.
 
-VARIABLE LENGTH FIELDS  fields of the form:11No. of OctetsLENGTHCODE
LENGTH
VALUE
 
Any codes in a received PSNP that are not recognised
are ignored.
Currently defined codes are:
7LSP Entries  this may appear multiple times.
The option fields, if they appear more than once,
shall appear sorted into ascending LSPID order.
xCODE  9
xLENGTH  total length of the value field.
xVALUE  a list of LSP entries of the form:4No. of Octets2ID Length +
2242ID Length + 22LSP Sequence Number
Checksum
Remaining Lifetime
LSP ID
LSP Sequence Number
Checksum
Remaining Lifetime
LSP ID
 
7Remaining Lifetime  Remaining Life
time of LSP.
7LSP ID  the system ID of the LSP to
which this entry refers.
7LSP Sequence Number  Sequence
number of LSP.
7Checksum  Checksum reported in LSP.
The entries shall be sorted into ascending
LSPID order (the LSP number octet of the
LSPID is the least significant octet).
7Authentication Information  information for
performing authentication of the originator of the
PDU.
xCODE  10.
xLENGTH  variable from 1254 octets
 
xVALUE 1VARIABLENo. of OctetsAuthentication Type
 
Authentication Value
 
7Authentication Type  a one octet iden
tifier for the type of authentication to be
carried out. The following values are de
fined:
0  RESERVED
1  Cleartext Password
2254  RESERVED
255  Routeing Domain private
authentication method
7Authentication Value  determined by
the value of the authentication type. If
Cleartext Password as defined in this Inter
national Standard is used, then the authenti
cation value is an octet string.
 
10 System Environment
10.1 Generating Jitter on Timers
When PDUs are transmitted as a result of timer expiration,
there is a danger that the timers of individual systems may
become synchronised. The result of this is that the traffic
distribution will contain peaks. Where there are a large
number of synchronised systems, this can cause overload
ing of both the transmission medium and the systems re
ceiving the PDUs. In order to prevent this from occurring,
all periodic timers, the expiration of which can cause the
transmission of PDUs, shall have jitter introduced as de
fined in the following algorithm.
CONSTANT
Jitter = 25;
(* The percentage jitter as defined in the architectural
constant Jitter *)
Resolution = 100;
(* The timer resolution in milliseconds *)
 
PROCEDURE Random(max : Integer): Integer;
 (* This procedure delivers a Uniformly distributed
random integer R such that 0 < R < max  *)
 
PROCEDURE
DefineJitteredTimer(baseTimeValueInSeconds: Integer;
expirationAction : Procedure);
 
VAR
baseTimeValue, maximumTimeModifier, waitTime :
Integer;
nextexpiration : Time;
 
BEGIN
baseTimeValue := baseTimeValueInSeconds * 1000 /
Resolution;
maximumTimeModifier := baseTimeValue * Jitter /
100; (* Compute maximum possible jitter *)
WHILE running DO
BEGIN
(* First compute next expiration time *)
randomTimeModifier :=
Random(maximumTimeModifier);
waitTime := baseTimeValue -
randomTimeModifier;
nextexpiration := CurrentTime + waitTime;
(* Then perform expiration Action *)
expirationAction;
WaitUntil(nextexpiration);
END (* of Loop *)
END (* of DefineJitteredTimer *)
Thus the call DefineJitteredTimer(HelloTime, SendHel
loPDU); where HelloTime is 10 seconds, will cause the
action SendHelloPDU to be performed at random inter
vals of between 7.5 and 10 seconds. The essential point of
this algorithm is that the value of randomTimeModifier is
randomised within the inner loop. Note that the new expira
tion time is set immediately on expiration of the last inter
val, rather than when the expiration action has been com
pleted.
 
The time resolution shall be less than or equal to 100 milli
seconds. It is recommended to be less than or equal to 10
milliseconds. The time resolution is the maximum interval
that can elapse without there being any change in the value
of the timer. The periodic transmission period shall be ran
dom or pseudo-random in the specified range, with uniform
distribution across similar implementations.
10.2 Resolution of Timers
All timers specified in units of seconds shall have a resolu
tion of no less than 11 second.
All timers specified in units of milliseconds shall have a
resolution of no less than 110 milliseconds
10.3 Requirements on the Operation of
ISO 9542
This International Standard places certain requirements on
the use of ISO 9542 by Intermediate systems which go be
yond those mandatory requirements stated in the
conformance clause of ISO 9542. These requirements are:
a)The IS shall operate the Configuration Information
functions on all types of subnetworks supported by the
IS. This includes the reception of ESH PDUs, and the
reception and transmission of ISH PDUs.
b)The IS shall enable the All Intermediate Systems
multi-destination subnetwork address.
 
 
11 System Management
11.1 General
The operation of the Intra-domain ISIS routeing functions
may be monitored and controlled using System Manage
ment. This clause is the management specification for ISO
10589 in the GDMO notation as defined in ISO 10165-4.
11.1.1 Naming Hierarchy
The containment hierarchy for ISO 10589 is illustrated be
low in figure
8NetworkVirtualAdjacencyAdjacencyDestinationSystemDestinationAreaCircuit
ReachableAddressEntityCLNS(ISO 10589 Package)(ISO 10589
Package)ManualAdjacencyLevel 2 OnlyFigure 8 - Containment and Naming Hierarchy
 
.
11.1.2 Resetting of Timers
Many of the attributes defined herein represent the values
of timers. They specify the interval between certain events
in the operation of the routeing state machines. If the value
of one of these characteristics is changed to a new value t
while the routeing state machine is in operation the imple
mentation shall take the necessary actions to ensure that for
any time interval which was in progress when the corre
sponding attribute was changed, the next expiration of that
interval takes place t seconds from the original start of that
interval, or immediately, whichever is the later.
 
Where this action is necessary it is indicated in the applica
ble behaviour clause of the GDMO.  See 11.2.16
11.1.3 Resource Limiting Characteristics
Certain attributes place limits on some resource, such as
max

imum

SVC

Adjacencies. In general, implementa
tions may allocate memory resources up to this limit when
the managed object is enabled and it may be impossible to
change the allocation without first disabling and re-enabling
the corresponding Network entity. Therefore this Interna
tional Standard only requires that system management shall
be able to change these attributes when the managed object
is disabled (i.e. in the state off).
However some implementations may be able to change the
allocation of resources without first disabling the Network
entity. In this case it is permitted to increase the value of
the characteristic at any time, but it shall not be decreased
below the currently used value of the resource. For exam
ple, maximumSVCAdjacencies shall not be decreased
below the current number of SVCs which have been cre
ated.
Characteristics of this type are indicated in the behaviour
clause of the GDMO.  See 11.2.16.
 
11.2 GDMO Definition
11.2.1 Name Bindings
iSO10589-NB NAME BINDING
SUBORDINATE OBJECT CLASS cLNS;
NAMED BY
SUPERIOR OBJECT CLASS
"ISO/IEC xxxxx":networkEntity;
WITH ATTRIBUTE
"ISO/IEC xxxxx":cLNS-MO-Name;
CREATE with-automatic-instance-naming
iSO10589-NB-p1;
DELETE only-if-no-contained-objects;
REGISTERED AS {ISO10589-ISIS.nboi iSO10589-NB
(1)};
 
level1ISO10589Circuit-NB NAME BINDING
SUBORDINATE OBJECT CLASS circuit;
NAMED BY
SUPERIOR OBJECT CLASS cLNS;
WITH ATTRIBUTE
"ISO/IEC xxxxx":circuit-MO-Name;
CREATE with-reference-object  
iSO10589Circuit-MO-p1;
DELETE only-if-no-contained-objects;
REGISTERED AS {ISO10589-ISIS.nboi
level1ISO10589Circuit-NB (2)};
 
destinationSystem-NB NAME BINDING
SUBORDINATE OBJECT CLASS destinationSystem;
NAMED BY
SUPERIOR OBJECT CLASS cLNS;
WITH ATTRIBUTE networkEntityTitle;
REGISTERED AS {ISO10589-ISIS.nboi
destinationSystem-NB (3)};
 
destinationArea-NB NAME BINDING
SUBORDINATE OBJECT CLASS destinationArea;
NAMED BY
SUPERIOR OBJECT CLASS cLNS;
WITH ATTRIBUTE addressPrefix;
BEHAVIOUR destinationArea-NB-B BEHAVIOUR
DEFINED AS This name binding is only applicable
where the superior object has an iSType of Level2;;
REGISTERED AS {ISO10589-ISIS.nboi
destinationArea-NB (4)};
 
virtualAdjacency-NB NAME BINDING
SUBORDINATE OBJECT CLASS virtualAdjacency;
NAMED BY
SUPERIOR OBJECT CLASS cLNS;
WITH ATTRIBUTE networkEntityTitle;
BEHAVIOUR virtualAdjacency-NB-B BEHAVIOUR
DEFINED AS This name binding is only applicable
where the superior  object has an iSType of Level2;;
REGISTERED AS {ISO10589-ISIS.nboi
virtualAdjacency-NB (5)};
 
 
reachableAddress-NB NAME BINDING
SUBORDINATE OBJECT CLASS reachableAddress;
NAMED BY
SUPERIOR OBJECT CLASS circuit;
WITH ATTRIBUTE addressPrefix;
BEHAVIOUR reachableAddress-NB-B BEHAVIOUR
DEFINED AS This name binding is only applicable
where the superior object of the Circuit instance is
an object  with iSType level2IS;;
CREATE with-reference-object  reachableAddressP1
reachableAddressP2;
DELETE only-if-no-contained-objects;
REGISTERED AS {ISO10589-ISIS.nboi
reachableAddress-NB (6)};
 
adjacency-NB NAME BINDING
SUBORDINATE OBJECT CLASS adjacency;
NAMED BY
SUPERIOR OBJECT CLASS circuit;
WITH ATTRIBUTE adjacencyName;
REGISTERED AS {ISO10589-ISIS.nboi adjacency-NB
(7)};
 
manualAdjacency-NB NAME BINDING
SUBORDINATE OBJECT CLASS manualAdjacency;
NAMED BY
SUPERIOR OBJECT CLASS circuit;
WITH ATTRIBUTE adjacencyName;
BEHAVIOUR manualAdjacency-NB-B BEHAVIOUR
DEFINED AS When an instance name is specified in
the CREATE operation, that value shall be used for
the adjacencyName, otherwise automatic instance
naming shall be used;;
CREATE with-reference-object,
with-automatic-instance-naming
manualAdjacencyP1  manualAdjacencyP2;
DELETE only-if-no-contained-objects;
REGISTERED AS {ISO10589-ISIS.nboi
manualAdjacency-NB (8)};
 
 
11.2.2 The CLNS Managed Object for ISO
10589
cLNS MANAGED OBJECT CLASS
DERIVED FROM "ISO/IEC xxxx":cLNS;
-- To be replaced by the number of the network layer
MO definitions when assigned.
CONDITIONAL PACKAGES
level1ISO10589Package
PRESENT IF The Intermediate System is a Level 1
Intermediate System,
level2ISO10589Package
PRESENT IF The Intermediate System is a Level 2
Intermediate System (i.e. the value of iSType is
Level2),
partitionRepairPackage
PRESENT IF The Intermediate System is a Level 2
Intermediate System and the partition repair option
is implemented,
level1AuthenticationPackage
PRESENT IF The authentication procedures are im
plemented,
level2AuthenticationPackage
PRESENT IF The Intermediate System is a Level 2
Intermediate System and the authentication proce
dures are implemented;
REGISTERED AS {ISO10589-ISIS.moi cLNS (1)};
 
level1ISO10589Package PACKAGE
ATTRIBUTES
version GET,
iSType GET,
maximumPathSplits
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.maximumPathSplits-Default
PERMITTED VALUES
ISO10589-ISIS.MaximumPathSplits-Permitted
GET-REPLACE,
maximumBuffers
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.maximumBuffers-Default
PERMITTED VALUES
ISO10589-ISIS.MaximumBuffers-Permitted
GET-REPLACE,
minimumLSPTransmissionInterval
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.minimumLSPTransmissionInterval-
Default
PERMITTED VALUES
ISO10589-ISIS.MinimumLSPTransmissionInterval-
Permitted
GET-REPLACE,
maximumLSPGenerationInterval
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.maximumLSPGenerationInterval-D
efault
PERMITTED VALUES
ISO10589-ISIS.MaximumLSPGenerationInterval-Pe
rmitted
GET-REPLACE,
minimumBroadcastLSPTransmissionInterval
REPLACE-WITH-DEFAULT
 
DEFAULT VALUE
ISO10589-ISIS.minimumBroadcastLSPTransmissio
nInterval-Default
PERMITTED VALUES
ISO10589-ISIS.MinimumBroadcastLSPTransmissio
nInterval-Permitted
GET-REPLACE,
-- Note this is defined for all Circuits, but would only
be required if one of them were a broadcast Circuit
completeSNPInterval
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.completeSNPInterval-Default
PERMITTED VALUES
ISO10589-ISIS.CompleteSNPInterval-Permitted
GET-REPLACE,
-- Ditto
originatingL1LSPBufferSize
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.originatingL1LSPBufferSize-Defaul
t
PERMITTED VALUES
ISO10589-ISIS.OriginatingL1LSPBufferSize-Permit
ted
GET-REPLACE,
-- Note: redirectHoldingTime moved to
ISO9542ISPackage
manualAreaAddresses
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.manualAreaAddresses-Default
PERMITTED VALUES
ISO10589-ISIS.ManualAreaAddresses-Permitted
GET ADD-REMOVE,
minimumLSPGenerationInterval
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.minimumLSPGenerationInterval-De
fault
PERMITTED VALUES
ISO10589-ISIS.MinimumLSPGenerationInterval-Pe
rmitted
GET-REPLACE,
defaultESHelloTimer
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.defaultESHelloTime-Default
PERMITTED VALUES
ISO10589-ISIS.DefaultESHelloTime-Permitted
GET-REPLACE,
pollESHelloRate
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.pollESHelloRate-Default
PERMITTED VALUES
ISO10589-ISIS.PollESHelloRate-Permitted
GET-REPLACE,
partialSNPInterval
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.partialSNPInterval-Default
PERMITTED VALUES
ISO10589-ISIS.PartialSNPInterval-Permitted
GET-REPLACE,
waitingTime
REPLACE-WITH-DEFAULT
 
DEFAULT VALUE
ISO10589-ISIS.waitingTime-Default
PERMITTED VALUES
ISO10589-ISIS.WaitingTime-Permitted
GET-REPLACE,
dRISISHelloTimer
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.dRISISHelloTimer-Default
PERMITTED VALUES
ISO10589-ISIS.DRISISHelloTimer-Permitted
GET-REPLACE,
l1State GET,
areaAddresses GET,
-- PDUFormatErrors now in network layer MO
corruptedLSPsDetected GET,
lSPL1DatabaseOverloads GET,
manualAddressesDroppedFromArea GET,
attemptsToExceedMaximumSequenceNumber GET,
sequenceNumberSkips GET,
ownLSPPurges GET,
iDFieldLengthMismatches GET;
ATTRIBUTE GROUPS
counters
-- PDUFormatErrors now in Network Layer MO
corruptedLSPsDetected
lSPL1DatabaseOverloads
manualAddressesDroppedFromArea
attemptsToExceedMaximumSequenceNumber
sequenceNumberSkips
ownLSPPurges
iDFieldLengthMismatches;
-- activate and deactivate actions now in Network Layer
MO
NOTIFICATIONS
"ISO/IEC xxxxx":pduFormatError
notificationReceivingAdjacency,
-- extra parameter for ISO 10589
corruptedLSPDetected,
lSPL1DatabaseOverload,
manualAddressDroppedFromArea,
attemptToExceedMaximumSequenceNumber,
sequenceNumberSkip,
ownLSPPurge,
iDFieldLengthMismatch;
REGISTERED AS {ISO10589-ISIS.poi
level1ISO10589Package (1)};
 
level2ISO10589Package PACKAGE
ATTRIBUTES
originatingL2LSPBufferSize
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.originatingL2LSPBufferSize-Defaul
t
PERMITTED VALUES
ISO10589-ISIS.OriginatingL2LSPBufferSize-Permit
ted
GET-REPLACE,
l2State GET,
lSPL2DatabaseOverloads GET;
ATTRIBUTE GROUPS
counters
lSPL2DatabaseOverloads;
NOTIFICATIONS
lSPL2DatabaseOverload;
 
REGISTERED AS {ISO10589-ISIS.poi
level2ISO10589Package (2)};
 
partitionRepairPackage PACKAGE
BEHAVIOUR DEFINITIONS partitionRepairPackage-B
BEHAVIOUR
DEFINED AS Present when the partition repair option
is implemented;;
ATTRIBUTES
maximumVirtualAdjacencies
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.maximumVirtualAdjacencies-Defau
lt
PERMITTED VALUES
ISO10589-ISIS.MaximumVirtualAdjacencies-Permi
tted
GET-REPLACE,
partitionAreaAddresses GET,
partitionDesignatedL2IntermediateSystem GET,
partitionVirtualLinkChanges GET;
ATTRIBUTE GROUPS
counters
partitionVirtualLinkChanges;
NOTIFICATIONS
partitionVirtualLinkChange;
REGISTERED AS {ISO10589-ISIS.poi
partitionRepairPackage (3)};
 
level1AuthenticationPackage PACKAGE
BEHAVIOUR DEFINITIONS
level1AuthenticationPackage-B BEHAVIOUR
DEFINED AS Present when the authentication proce
dures option is implemented;;
ATTRIBUTES
areaTransmitPassword
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.password-Default
GET-REPLACE,
areaReceivePasswords
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.passwords-Default
GET-REPLACE
ADD-REMOVE,
authenticationFailures
GET;
ATTRIBUTE GROUPS
counters
authenticationFailures;
NOTIFICATIONS
authenticationFailure;
REGISTERED AS {ISO10589-ISIS.poi
level1AuthenticationPackage (4)};
 
level2AuthenticationPackage PACKAGE
BEHAVIOUR DEFINITIONS
level2AuthenticationPackage-B BEHAVIOUR
DEFINED AS Present when the authentication proce
dures option is implemented and the value of the
iSType attribute is Level2;;
ATTRIBUTES
domainTransmitPassword
REPLACE-WITH-DEFAULT
 
DEFAULT VALUE
ISO10589-ISIS.password-Default
GET-REPLACE,
domainReceivePasswords
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.passwords-Default
GET-REPLACE
ADD-REMOVE;
REGISTERED AS {ISO10589-ISIS.poi
level2AuthenticationPackage (5)};
 
11.2.3 The Circuit Managed Object for ISO
10589
circuit MANAGED OBJECT CLASS
DERIVED FROM "ISO/IEC xxxx":circuit;
-- xxxx to be replaced with the number of the network
layer managed object definitions when one is
assigned
CONDITIONAL PACKAGES
level1ISO10589CircuitPackage
PRESENT IF the Circuit is a level 1 ISO 10589 Cir
cuit,
level1ISO10589BroadcastCircuitPackage
PRESENT IF the Circuit is a level 1 ISO 10589
broadcast Circuit,
level1ISO10589PtToPtCircuitPackage
PRESENT IF the Circuit is a level 1 ISO 10589 Point
to Point Circuit,
level2ISO10589DACircuitPackage
PRESENT IF the Circuit is a level 2 ISO 10589 X.25
DA Circuit,
level1ISO10589StaticCircuitPackage
PRESENT IF the Circuit is a level 1 ISO10589 X.25
STATIC Circuit (IN or OUT),
level1ISO10589StaticOutCircuitPackage
PRESENT IF the Circuit is a level1 ISO 10589 X.25
STATIC OUT SNAP,
level2ISO10589CircuitPackage
PRESENT IF the IS is a Level2 ISO 10589 IS,
level2ISO10589BroadcastCircuitPackage
PRESENT IF the Circuit is a level 1 ISO 10589
broadcast Circuit and the IS is a L2 IS,
dACircuitCallEstablishmentMetricIncrementPackage
PRESENT IF the Circuit is an X.25 DA circuit and
support is implemented for call establishement met
ric increment values greater than zero,
circuitAuthenticationPackage
PRESENT IF the authentication procedures are im
plemented on this IS;
REGISTERED AS {ISO10589-ISIS.moi circuit (2)};
 
level1ISO10589CircuitPackage PACKAGE
ATTRIBUTES
type GET,
helloTimer
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.helloTimer-Default
PERMITTED VALUES
ISO10589-ISIS.HelloTimer-Permitted
GET-REPLACE,
l1DefaultMetric
REPLACE-WITH-DEFAULT
 
DEFAULT VALUE
ISO10589-ISIS.defaultMetric-Default
PERMITTED VALUES
ISO10589-ISIS.DefaultMetric-Permitted
GET-REPLACE,
l1DelayMetric
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.optionalMetric-Default
PERMITTED VALUES
ISO10589-ISIS.OptionalMetric-Permitted
GET-REPLACE,
l1ExpenseMetric
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.optionalMetric-Default
PERMITTED VALUES
ISO10589-ISIS.OptionalMetric-Permitted
GET-REPLACE,
l1ErrorMetric
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.optionalMetric-Default
PERMITTED VALUES
ISO10589-ISIS.OptionalMetric-Permitted
GET-REPLACE,
externalDomain
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.externalDomain-Default
GET-REPLACE,
circuitChanges GET,
changesInAdjacencyState GET,
initializationFailures GET,
rejectedAdjacencies GET,
controlPDUsSent GET,
controlPDUsReceived GET,
iDFieldLengthMismatches GET;
ATTRIBUTE GROUPS
counters
circuitChanges
changesInAdjacencyState
initializationFailures
rejectedAdjacencies
controlPDUsSent
controlPDUsReceived
iDFieldLengthMismatches;
-- Note: activate and deactivate are now imported from
the network layer definition of circuit MO
NOTIFICATIONS
circuitChange,
adjacencyStateChange,
initializationFailure,
rejectedAdjacency,
iDFieldLengthMismatch;
REGISTERED AS {ISO10589-ISIS.poi
level1ISO10589CircuitPackage (6)};
 
level1ISO10589BroadcastCircuitPackage PACKAGE
BEHAVIOUR DEFINITIONS
level1BroadcastCircuitPackage-B BEHAVIOUR
DEFINED AS Present when the Circuit is of type
Broadcast;;
ATTRIBUTES
iSISHelloTimer
REPLACE-WITH-DEFAULT
 
DEFAULT VALUE
ISO10589-ISIS.iSISHelloTimer-Default
PERMITTED VALUES
ISO10589-ISIS.ISISHelloTimer-Permitted
GET-REPLACE,
l1IntermediateSystemPriority
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.l1IntermediateSystemPriority-Defau
lt
PERMITTED VALUES
ISO10589-ISIS.L1IntermediateSystemPriority-Perm
itted
GET-REPLACE,
l1CircuitID GET,
l1DesignatedIntermediateSystem GET,
lanL1DesignatedIntermediateSystemChanges GET;
ATTRIBUTE GROUPS
counters
lanL1DesignatedIntermediateSystemChanges;
NOTIFICATIONS
lanL1DesignatedIntermediateSystemChange;
REGISTERED AS {ISO10589-ISIS.poi
level1ISO10589BroadcastCircuitPackage (7)};
 
level1ISO10589PtToPtCircuitPackage PACKAGE
BEHAVIOUR DEFINITIONS
level1PtToPtCircuitPackage-B BEHAVIOUR
DEFINED AS Present when the Circuit is of type Pt
ToPt;;
ATTRIBUTES
ptPtCircuitID GET;
REGISTERED AS {ISO10589-ISIS.poi
level1ISO10589PtToPtCircuitPackage (8)};
 
dACircuitCallEstablishmentMetricIncrementPackage
PACKAGE
BEHAVIOUR DEFINITIONS
dACircuitCallEstablishmentMetricIncrementPackag
e-B BEHAVIOUR
DEFINED AS Present when values of call establish
ment metric increment greater than zero are sup
ported and the parent iS MO has iSType Level2;;
ATTRIBUTES
callEstablishmentDefaultMetricIncrement
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.callEstablishmentMetricIncrement-
Default
PERMITTED VALUES
ISO10589-ISIS.CallEstablishmentMetricIncrement-
Permitted
GET-REPLACE,
callEstablishmentDelayMetricIncrement
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.callEstablishmentMetricIncrement-
Default
PERMITTED VALUES
ISO10589-ISIS.CallEstablishmentMetricIncrement-
Permitted
GET-REPLACE,
callEstablishmentExpenseMetricIncrement
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.callEstablishmentMetricIncrement-
 
Default
PERMITTED VALUES
ISO10589-ISIS.CallEstablishmentMetricIncrement-
Permitted
GET-REPLACE,
callEstablishmentErrorMetricIncrement
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.callEstablishmentMetricIncrement-
Default
PERMITTED VALUES
ISO10589-ISIS.CallEstablishmentMetricIncrement-
Permitted
GET-REPLACE;
REGISTERED AS {ISO10589-ISIS.poi
dACircuitCallEstablishmentMetricIncrementPackag
e (9)};
 
level2ISO10589DACircuitPackage PACKAGE
BEHAVIOUR DEFINITIONS
level2ISO10589DACircuitPackage-B
BEHAVIOUR
DEFINED AS Present when the Circuit is of type DA,
and the IS is operating as a L2 IS;;
-- Note: a DA Circuit is only permitted on an L2 IS
ATTRIBUTES
recallTimer
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.recallTimer-Default
PERMITTED VALUES
ISO10589-ISIS.RecallTimer-Permitted
GET-REPLACE,
idleTimer
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.idleTimer-Default
PERMITTED VALUES
ISO10589-ISIS.IdleTimer-Permitted
GET-REPLACE,
initialMinimumTimer
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.initialMinimumTimer-Default
PERMITTED VALUES
ISO10589-ISIS.InitialMinimumTimer-Permitted
GET-REPLACE,
reserveTimer
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.reserveTimer-Default
PERMITTED VALUES
ISO10589-ISIS.ReserveTimer-Permitted
GET-REPLACE,
maximumSVCAdjacencies
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.maximumSVCAdjacencies-Default
PERMITTED VALUES
ISO10589-ISIS.MaximumSVCAdjacencies-Permitte
d
GET-REPLACE,
reservedAdjacency
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.reservedAdjacency-Default
 
GET-REPLACE,
-- Note: it is not clear that this attribute is required
callsPlaced GET,
callsFailed GET,
timesExceededMaximumSVCAdjacencies GET;
ATTRIBUTE GROUPS
counters
callsPlaced
callsFailed
timesExceededMaximumSVCAdjacencies;
NOTIFICATIONS
exceededMaximumSVCAdjacencies;
REGISTERED AS {ISO10589-ISIS.poi
level2ISO10589DACircuitPackage (10)};
 
level1ISO10589StaticCircuitPackage PACKAGE
BEHAVIOUR DEFINITIONS
level1StaticCircuitPackage-B BEHAVIOUR
DEFINED AS Present when the Circuit is of type
Static;;
ATTRIBUTES
neighbourSNPAAddress
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.neighbourSNPAAddress-Default
GET-REPLACE,
-- Note: should this be handled by an X.25 IVMO?
ptPtCircuitID GET;
REGISTERED AS {ISO10589-ISIS.poi
level1ISO10589StaticCircuitPackage (11)};
 
level1ISO10589StaticOutCircuitPackage PACKAGE
BEHAVIOUR DEFINITIONS
level1StsticOutCircuitPackage-B BEHAVIOUR
DEFINED AS Present when the Circuit is of type Static
Out;;
ATTRIBUTES
recallTimer
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.recallTimer-Default
PERMITTED VALUES
ISO10589-ISIS.RecallTimer-Permitted
GET-REPLACE,
maximumCallAttempts
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.maximumCallAttempts-Default
PERMITTED VALUES
ISO10589-ISIS.MaximumCallAttempts-Permitted
GET-REPLACE,
callsPlaced GET,
callsFailed GET,
timesExceededMaximumCallAttempts GET;
ATTRIBUTE GROUPS
counters
callsPlaced
callsFailed
timesExceededMaximumCallAttempts;
NOTIFICATIONS
exceededMaximumCallAttempts ;
REGISTERED AS {ISO10589-ISIS.poi
level1ISO10589StaticOutCircuitPackage (12)};
 
 
level2ISO10589CircuitPackage PACKAGE
BEHAVIOUR DEFINITIONS level2CircuitPackage-B
BEHAVIOUR
DEFINED AS Present when IS is an L2 IS;;
ATTRIBUTES
l2DefaultMetric
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.defaultMetric-Default
PERMITTED VALUES
ISO10589-ISIS.DefaultMetric-Permitted
GET-REPLACE,
l2DelayMetric
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.optionalMetric-Default
PERMITTED VALUES
ISO10589-ISIS.OptionalMetric-Permitted
GET-REPLACE,
l2ExpenseMetric
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.optionalMetric-Default
PERMITTED VALUES
ISO10589-ISIS.OptionalMetric-Permitted
GET-REPLACE,
l2ErrorMetric
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.optionalMetric-Default
PERMITTED VALUES
ISO10589-ISIS.OptionalMetric-Permitted
GET-REPLACE,
manualL2OnlyMode
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.manualL2OnlyMode-Default
GET-REPLACE;
REGISTERED AS {ISO10589-ISIS.poi
level2ISO10589CircuitPackage (13)};
 
level2ISO10589BroadcastCircuitPackage PACKAGE
BEHAVIOUR DEFINITIONS
level2BroadcastCircuitPackage-B BEHAVIOUR
DEFINED AS Present when the Circuit is of type
Broadcast and the IS is an L2 IS;;
ATTRIBUTES
l2IntermediateSystemPriority
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.l2IntermediateSystemPriority-Defau
lt
PERMITTED VALUES
ISO10589-ISIS.L2IntermediateSystemPriority-Perm
itted
GET-REPLACE,
l2CircuitID GET,
l2DesignatedIntermediateSystem GET,
lanL2DesignatedIntermediateSystemChanges GET;
ATTRIBUTE GROUPS
counters
lanL2DesignatedIntermediateSystemChanges;
NOTIFICATIONS
lanL2DesignatedIntermediateSystemChange;
REGISTERED AS {ISO10589-ISIS.poi
level2ISO10589BroadcastCircuitPackage (14)};
 
 
circuitAuthenticationPackage PACKAGE
BEHAVIOUR DEFINITIONS
circuitAuthenticationPackage-B BEHAVIOUR
DEFINED AS Present when the authentication proce
dures option is implemented;;
ATTRIBUTES
circuitTransmitPassword
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.password-Default
GET-REPLACE,
circuitReceivePasswords
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.passwords-Default
GET-REPLACE
ADD-REMOVE,
authenticationFailures GET;
ATTRIBUTE GROUPS
counters
authenticationFailures;
NOTIFICATIONS
authenticationFailure;
REGISTERED AS {ISO10589-ISIS.poi
circuitAuthenticationPackage (15)};
 
11.2.4 The Adjacency managed Object
adjacency MANAGED OBJECT CLASS
DERIVED FROM "ISO/IEC 10165-2":top;
CHARACTERIZED BY adjacencyPackage PACKAGE
ATTRIBUTES
adjacencyName GET,
adjacencyState GET;
-- Note: this is NOT operational state
;;
CONDITIONAL PACKAGES
broadcastAdjacencyPackage
PRESENT IF the parent Circuit is of type broadcast,
dAAdjacencyPackage
PRESENT IF the parent Circuit is of type DA,
ptToPtAdjacencyPackage
PRESENT IF the parent Circuit is of type PtToPt or
STATIC,
iSAdjacencyPackage
PRESENT IF the adjacency is to an IS (i.e the
neighbourSystemType is Intermediate System L1
Intermediate System or L2 Intermediate System),
broadcastISAdjacencyPackage
PRESENT IF the parent Circuit is of type broadcast
and is to an IS as above,
eSAdjacencyPackage
PRESENT IF the adjacency is to an ES (i.e. the
neighbourSystemType is EndSystem;
REGISTERED AS {ISO10589-ISIS.moi adjacency (3)};
 
 
broadcastAdjacencyPackage PACKAGE
BEHAVIOUR DEFINITIONS
broadcastAdjacencyPackage-B BEHAVIOUR
DEFINED AS present if the parent Circuit is of type
broadcast;;
ATTRIBUTES
neighbourLANAddress GET,
neighbourSystemType GET;
REGISTERED AS {ISO10589-ISIS.poi
broadcastAdjacencyPackage (16)};
 
dAAdjacencyPackage PACKAGE
BEHAVIOUR DEFINITIONS dAAdjacencyPackage-B
BEHAVIOUR
DEFINED AS present if the parent Circuit is of type
DA;;
ATTRIBUTES
sNPAAddress GET;
REGISTERED AS {ISO10589-ISIS.poi
dAAdjacencyPackage (17)};
 
ptToPtAdjacencyPackage PACKAGE
BEHAVIOUR DEFINITIONS
ptToPtAdjacencyPackage-B BEHAVIOUR
DEFINED AS present if the parent Circuit is of type
PtToPt;;
ATTRIBUTES
neighbourSystemType GET;
REGISTERED AS {ISO10589-ISIS.poi
ptToPtAdjacencyPackage (18)};
 
iSAdjacencyPackage PACKAGE
BEHAVIOUR DEFINITIONS iSAdjacencyPackage-B
BEHAVIOUR
DEFINED AS present if the adjacency is to an IS;;
ATTRIBUTES
adjacencyUsageType GET,
neighbourSystemID GET,
neighbourAreas GET,
holdingTimer GET;
REGISTERED AS {ISO10589-ISIS.poi
iSAdjacencyPackage (19)};
 
broadcastISAdjacencyPackage PACKAGE
BEHAVIOUR DEFINITIONS
broadcastISAdjacencyPackage-B BEHAVIOUR
DEFINED AS present if the parent Circuit is of type
broadcast and the adjacency is to an IS;;
ATTRIBUTES
lANPriority GET;
REGISTERED AS {ISO10589-ISIS.poi
broadcastISAdjacencyPackage (20)};
 
eSAdjacencyPackage PACKAGE
BEHAVIOUR DEFINITIONS eSAdjacencyPackage-B
BEHAVIOUR
DEFINED AS present if the adjacency is to an ES;;
ATTRIBUTES
endSystemIDs GET;
REGISTERED AS {ISO10589-ISIS.poi
eSAdjacencyPackage (21)};
 
 
11.2.5 The Manual Adjacency Managed
Object
manualAdjacency MANAGED OBJECT CLASS
DERIVED FROM "ISO/IEC 10165-2":top;
CHARACTERIZED BY manualAdjacencyPackage
PACKAGE
ATTRIBUTES
adjacencyName GET,
neighbourLANAddress GET,
endSystemIDs GET;
;;
REGISTERED AS {ISO10589-ISIS.moi
manualAdjacency (4)};
 
11.2.6 The Virtual Adjacency managed Object
virtualAdjacency MANAGED OBJECT CLASS
DERIVED FROM "ISO/IEC 10165-2":top;
CHARACTERIZED BY virtualAdjacencyPackage
PACKAGE
ATTRIBUTES
networkEntityTitle GET,
metric GET;
;;
REGISTERED AS {ISO10589-ISIS.moi virtualAdjacency
(5)};
 
11.2.7 The Destination Managed Object
-- The destination MO class is never instantiated. It exists
only to allow the destinationSystem and
destinationArea MO classes to be derived from it.
destination MANAGED OBJECT CLASS
DERIVED FROM "ISO/IEC 10165-2":top;
CHARACTERIZED BY destinationPackage
PACKAGE
ATTRIBUTES
defaultMetricPathCost GET,
defaultMetricOutputAdjacencies GET,
delayMetricPathCost GET,
delayMetricOutputAdjacencies GET,
expenseMetricPathCost GET,
expenseMetricOutputAdjacencies GET,
errorMetricPathCost GET,
errorMetricOutputAdjacencies GET;
;; -- no need for an object ID since it is never
instantiated, but GDMO  needs one
REGISTERED AS {ISO10589-ISIS.moi destination (6)};
 
11.2.8 The Destination System Managed
Object
destinationSystem MANAGED OBJECT CLASS
DERIVED FROM destination;
CHARACTERIZED BY destinationSystemPackage
PACKAGE
ATTRIBUTES
networkEntityTitle GET;
;;
REGISTERED AS {ISO10589-ISIS.moi
destinationSystem (7)};
 
 
11.2.9 The Destination Area Managed Object
destinationArea MANAGED OBJECT CLASS
DERIVED FROM destination;
CHARACTERIZED BY destinationAreaPackage
PACKAGE
ATTRIBUTES
addressPrefix GET;
;;
REGISTERED AS {ISO10589-ISIS.moi destinationArea
(8)};
 
11.2.10 The Reachable Address Managed
Object
reachableAddress MANAGED OBJECT CLASS
DERIVED FROM "ISO/IEC 10165-2":top;
CHARACTERIZED BY reachableAddressPackage
PACKAGE
ATTRIBUTES
addressPrefix GET,
defaultMetric
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.defaultMetric-Default
PERMITTED VALUES
ISO10589-ISIS.DefaultMetric-Permitted
GET-REPLACE,
delayMetric
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.optionalMetric-Default
PERMITTED VALUES
ISO10589-ISIS.OptionalMetric-Permitted
GET-REPLACE,
expenseMetric
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.optionalMetric-Default
PERMITTED VALUES
ISO10589-ISIS.OptionalMetric-Permitted
GET-REPLACE,
errorMetric
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.optionalMetric-Default
PERMITTED VALUES
ISO10589-ISIS.OptionalMetric-Permitted
GET-REPLACE,
defaultMetricType
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.metricType-Default
GET-REPLACE,
delayMetricType
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.metricType-Default
GET-REPLACE,
expenseMetricType
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.metricType-Default
GET-REPLACE,
errorMetricType
 
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.metricType-Default
GET-REPLACE,
"ISO/IEC 10165-2":operationalState GET;
ACTIONS
activate,
deactivate;
;;
CONDITIONAL PACKAGES
mappingRAPackage
PRESENT IF the parent Circuit is of type broadcast
or DA,
broadcastRAPackage
PRESENT IF the parent Circuit is of type broadcast
and the value of mappingType is `manual',
dARAPackage
PRESENT IF the parent Circuit is of type DA and
the value of mappingType is `manual';
REGISTERED AS {ISO10589-ISIS.moi
reachableAddress (9)};
 
mappingRAPackage PACKAGE
BEHAVIOUR DEFINITIONS mappingRAPackage-B
BEHAVIOUR
DEFINED AS When present, the NSAP to Circuit
mapping is controlled by the value of the map
pingType attribute;;
ATTRIBUTES
mappingType GET;
REGISTERED AS {ISO10589-ISIS.poi
mappingRAPackage (22)};
 
broadcastRAPackage PACKAGE
BEHAVIOUR DEFINITIONS broadcastRAPackage-B
BEHAVIOUR
DEFINED AS When present, the remote SNPA address
is determined by the value of the lANAddress attrib
ute;;
ATTRIBUTES
lANAddress
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.lANAddress-Default
GET-REPLACE;
REGISTERED AS {ISO10589-ISIS.poi
broadcastRAPackage (23)};
 
dARAPackage PACKAGE
BEHAVIOUR DEFINITIONS dARAPackage-B
BEHAVIOUR
DEFINED AS When present, the remote SNPA address
is determined by the value of the sNPAAddresses at
tribute;;
ATTRIBUTES
sNPAAddresses
REPLACE-WITH-DEFAULT
DEFAULT VALUE
ISO10589-ISIS.sNPAAddresses-Default
GET-REPLACE;
REGISTERED AS {ISO10589-ISIS.poi dARAPackage
(24)};
 
 
11.2.11 Attribute Definitions
version ATTRIBUTE
WITH ATTRIBUTE SYNTAX ISO10589-ISIS.Version;
MATCHES FOR Equality, Ordering;
BEHAVIOUR version-B BEHAVIOUR
DEFINED AS The version number of this International
Standard to which the implementation conforms;;
REGISTERED AS {ISO10589-ISIS.aoi version (1)};
 
iSType ATTRIBUTE
WITH ATTRIBUTE SYNTAX ISO10589-ISIS.ISType;
MATCHES FOR Equality;
BEHAVIOUR iSType-B BEHAVIOUR
DEFINED AS The type of this Intermediate System.  
The value of this attribute is only settable via the
create parameter;;
REGISTERED AS {ISO10589-ISIS.aoi iSType (2)};
 
maximumPathSplits ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.MaximumPathSplits;
MATCHES FOR Equality, Ordering;
BEHAVIOUR maximumPathSplits-B BEHAVIOUR
DEFINED AS Maximum number of paths with equal
routeing metric value which it is permitted to split
between;,
replaceOnlyWhileDisabled-B;
PARAMETERS constraintViolation;
REGISTERED AS {ISO10589-ISIS.aoi
maximumPathSplits (3)};
 
maximumBuffers ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.MaximumBuffers;
MATCHES FOR Equality, Ordering;
BEHAVIOUR maximumBuffers-B BEHAVIOUR
DEFINED AS Maximum guaranteed number of buffers
for forwarding. This is the number of forwarding
buffers that is to be reserved, more may be used if
they are available. (See clause D.1.1);,
resourceLimiting-B;
PARAMETERS constraintViolation;
REGISTERED AS {ISO10589-ISIS.aoi maximumBuffers
(4)};
 
minimumLSPTransmissionInterval ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.MinimumLSPTransmissionInterval;
MATCHES FOR Equality, Ordering;
BEHAVIOUR minimumLSPTransmissionInterval-B
BEHAVIOUR
DEFINED AS Minimum interval, in seconds, between
re- transmissions of an LSP;,
resettingTimer-B;
REGISTERED AS {ISO10589-ISIS.aoi
minimumLSPTransmissionInterval (5)};
 
 
maximumLSPGenerationInterval ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.MaximumLSPGenerationInterval;
MATCHES FOR Equality, Ordering;
BEHAVIOUR maximumLSPGenerationInterval-B
BEHAVIOUR
DEFINED AS Maximum interval, in seconds, between
generated LSPs by this system;,
resettingTimer-B;
REGISTERED AS {ISO10589-ISIS.aoi
maximumLSPGenerationInterval (6)};
 
minimumBroadcastLSPTransmissionInterval ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.MinimumBroadcastLSPTransmissio
nInterval;
MATCHES FOR Equality, Ordering;
BEHAVIOUR
minimumBroadcastLSPTransmissionInterval-B
BEHAVIOUR
DEFINED AS Minimum interval, in milliseconds, be
tween transmission of LSPs on a broadcast circuit
(See clause 7.3.15.6);,
resettingTimer-B;
REGISTERED AS {ISO10589-ISIS.aoi
minimumBroadcastLSPTransmissionInterval (7)};
 
completeSNPInterval ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.CompleteSNPInterval;
MATCHES FOR Equality, Ordering;
BEHAVIOUR completeSNPInterval-B BEHAVIOUR
DEFINED AS Interval, in seconds, between generation
of Complete Sequence Numbers PDUs by a Desig
nated Intermediate System on a broadcast circuit;,
resettingTimer-B;
REGISTERED AS {ISO10589-ISIS.aoi
completeSNPInterval (8)};
 
originatingL1LSPBufferSize ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.OriginatingLSPBufferSize;
MATCHES FOR Equality, Ordering;
BEHAVIOUR originatingL1LSPBufferSize-B
BEHAVIOUR
DEFINED AS The maximum size of Level 1 LSPs and
SNPs originated by this system;,
replaceOnlyWhileDisabled-B;
PARAMETERS constraintViolation;
REGISTERED AS {ISO10589-ISIS.aoi
originatingL1LSPBufferSize (9)};
 
manualAreaAddresses ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.AreaAddresses;
MATCHES FOR Equality, Set Comparison, Set
Intersection;
BEHAVIOUR manualAreaAddresses-B BEHAVIOUR
DEFINED AS Area Addresses to be used for this Inter
mediate System. At least one value must be sup
plied. The maximum number of Area Addresses
which may exist in the set is MaximumAreaAd
dresses;;
REGISTERED AS {ISO10589-ISIS.aoi
manualAreaAddresses (10)};
 
 
minimumLSPGenerationInterval ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.MinimumLSPGenerationInterval;
MATCHES FOR Equality, Ordering;
BEHAVIOUR minimumLSPGenerationInterval-B
BEHAVIOUR
DEFINED AS Maximum interval in seconds between
successive generation of LSPs with the same LSPID
by this IS;,
resettingTimer-B;
REGISTERED AS {ISO10589-ISIS.aoi
minimumLSPGenerationInterval (11)};
 
defaultESHelloTimer ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.DefaultESHelloTimer;
MATCHES FOR Equality, Ordering;
BEHAVIOUR defaultESHelloTimer-B BEHAVIOUR
DEFINED AS The value to be used for the suggested
ES configuration timer in ISH PDUs when not solic
iting the ES configuration;;
REGISTERED AS {ISO10589-ISIS.aoi
defaultESHelloTimer (12)};
 
pollESHelloRate ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.PollESHelloRate;
MATCHES FOR Equality, Ordering;
BEHAVIOUR pollESHelloRate-B BEHAVIOUR
DEFINED AS The value to be used for the suggested
ES configuration timer in ISH PDUs when soliciting
the ES configuration;;
REGISTERED AS {ISO10589-ISIS.aoi pollESHelloRate
(13)};
 
partialSNPInterval ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.PartialSNPInterval;
MATCHES FOR Equality, Ordering;
BEHAVIOUR partialSNPInterval-B BEHAVIOUR
DEFINED AS Minimum interval between sending Par
tial Sequence Number PDUs;,
resettingTimer-B;
REGISTERED AS {ISO10589-ISIS.aoi
partialSNPInterval (14)};
 
waitingTime ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.WaitingTime;
MATCHES FOR Equality, Ordering;
BEHAVIOUR waitingTime-B BEHAVIOUR
DEFINED AS Number of seconds to delay in waiting
state before entering On state;,
resettingTimer-B;
REGISTERED AS {ISO10589-ISIS.aoi waitingTime
(15)};
 
 
dRISISHelloTimer ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.DRISISHelloTimer;
MATCHES FOR Equality, Ordering;
BEHAVIOUR dRISISHelloTimer-B BEHAVIOUR
DEFINED AS The interval in seconds between the
generation of IIH PDUs by the designated IS on a
LAN;,
resettingTimer-B;
REGISTERED AS {ISO10589-ISIS.aoi
dRISISHelloTimer (16)};
 
l1State ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.DatabaseState;
MATCHES FOR Equality;
BEHAVIOUR l1State-B BEHAVIOUR
DEFINED AS The state of the Level 1 database;;
REGISTERED AS {ISO10589-ISIS.aoi l1State (17)};
 
areaAddresses ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.AreaAddresses;
MATCHES FOR Equality, Set Comparison, Set
Intersection;
BEHAVIOUR areaAddresses-B BEHAVIOUR
DEFINED AS The union of the sets of manualAreaAd
dresses reported in all Level 1 Link State PDUs re
ceived by this Intermediate System;;
REGISTERED AS {ISO10589-ISIS.aoi areaAddresses
(18)};
 
corruptedLSPsDetected ATTRIBUTE
DERIVED FROM nonWrappingCounter;
BEHAVIOUR corruptedLSPsDetected-B BEHAVIOUR
DEFINED AS Number of Corrupted LSP Detected
events generated;;
REGISTERED AS {ISO10589-ISIS.aoi
corruptedLSPsDetected (19)};
 
lSPL1DatabaseOverloads ATTRIBUTE
DERIVED FROM nonWrappingCounter;
BEHAVIOUR lSPL1DatabaseOverloads-B
BEHAVIOUR
DEFINED AS Number of times the LSP L1 Database
Overload event has been generated;;
REGISTERED AS {ISO10589-ISIS.aoi
lSPL1DatabaseOverloads (20)};
 
manualAddressesDroppedFromArea ATTRIBUTE
DERIVED FROM nonWrappingCounter;
BEHAVIOUR manualAddressesDroppedFromArea-B
BEHAVIOUR
DEFINED AS Number of times the Manual Addresses
Dropped From Area event has been generated;;
REGISTERED AS {ISO10589-ISIS.aoi
manualAddressesDroppedFromArea (21)};
 
 
attemptsToExceedMaximumSequenceNumber
ATTRIBUTE
DERIVED FROM nonWrappingCounter;
BEHAVIOUR
attemptsToExceedMaximumSequenceNumber-B
BEHAVIOUR
DEFINED AS Number of times the Attempt To Exceed
Maximum Sequence Number event has been
generated;;
REGISTERED AS {ISO10589-ISIS.aoi
attemptsToExceedMaximumSequenceNumber
(22)};
 
sequenceNumberSkips ATTRIBUTE
DERIVED FROM nonWrappingCounter;
BEHAVIOUR sequenceNumberSkips-B BEHAVIOUR
DEFINED AS Number of times the Sequence Number
Skipped event has been generated;;
REGISTERED AS {ISO10589-ISIS.aoi
sequenceNumberSkips (23)};
 
ownLSPPurges ATTRIBUTE
DERIVED FROM nonWrappingCounter;
BEHAVIOUR ownLSPPurges-B BEHAVIOUR
DEFINED AS Number of times the Own LSP Purged
event has been generated;;
REGISTERED AS {ISO10589-ISIS.aoi ownLSPPurges
(24)};
 
iDFieldLengthMismatches ATTRIBUTE
DERIVED FROM nonWrappingCounter;
BEHAVIOUR iDFieldLengthMismatches-B
BEHAVIOUR
DEFINED AS Number of times the iDFieldLengthMis
match event has been generated;;
REGISTERED AS {ISO10589-ISIS.aoi
iDFieldLengthMismatches (25)};
 
originatingL2LSPBufferSize ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.OriginatingLSPBufferSize;
MATCHES FOR Equality, Ordering;
BEHAVIOUR originatingL2LSPBufferSize-B
BEHAVIOUR
DEFINED AS The maximum size of Level 2 LSPs and
SNPs originated by this system;,
replaceOnlyWhileDisabled-B;
PARAMETERS constraintViolation;
REGISTERED AS {ISO10589-ISIS.aoi
originatingL2LSPBufferSize (26)};
 
maximumVirtualAdjacencies ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.MaximumVirtualAdjacencies;
MATCHES FOR Equality, Ordering;
BEHAVIOUR maximumVirtualAdjacencies-B
BEHAVIOUR
DEFINED AS Maximum number of Virtual Adjacen
cies which may be created to repair partitioned
Level 1 domains;;
REGISTERED AS {ISO10589-ISIS.aoi
maximumVirtualAdjacencies (27)};
 
 
l2State ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.DatabaseState;
MATCHES FOR Equality, Ordering;
BEHAVIOUR l2State-B BEHAVIOUR
DEFINED AS The state of the Level 2 database;;
REGISTERED AS {ISO10589-ISIS.aoi l2State (28)};
 
partitionAreaAddresses ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.AreaAddresses;
MATCHES FOR Equality, Set Comparison, Set
Intersection;
BEHAVIOUR partitionAreaAddresses-B BEHAVIOUR
DEFINED AS The set union of all manualAreaAd
dresses of all Intermediate systems in the partition
reachable by non-virtual links (calculated from their
Level 1 LSPs);;
REGISTERED AS {ISO10589-ISIS.aoi
partitionAreaAddresses (29)};
 
partitionDesignatedL2IntermediateSystem ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.SystemID;
MATCHES FOR Equality;
BEHAVIOUR
partitionDesignatedL2IntermediateSystem-B
BEHAVIOUR
DEFINED AS The ID of the Partition Designated
Level 2 Intermediate System for this system;;
REGISTERED AS {ISO10589-ISIS.aoi
partitionDesignatedL2IntermediateSystem (30)};
 
partitionVirtualLinkChanges ATTRIBUTE
DERIVED FROM nonWrappingCounter;
BEHAVIOUR partitionVirtualLinkChanges-B
BEHAVIOUR
DEFINED AS Number of times the Partition Virtual
Link Change Notification has been generated;;
REGISTERED AS {ISO10589-ISIS.aoi
partitionVirtualLinkChanges (31)};
 
lSPL2DatabaseOverloads ATTRIBUTE
DERIVED FROM nonWrappingCounter;
BEHAVIOUR lSPL2DatabaseOverloads-B
BEHAVIOUR
DEFINED AS Number of times the LSP L2 Database
Overload event has been generated;;
REGISTERED AS {ISO10589-ISIS.aoi
lSPL2DatabaseOverloads (32)};
 
type ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.CircuitType;
MATCHES FOR Equality;
BEHAVIOUR type-B BEHAVIOUR
DEFINED AS The type of the circuit. This attribute
may only be set when the Circuit is created. Subse
quently it is read-only;;
REGISTERED AS {ISO10589-ISIS.aoi type (33)};
 
 
helloTimer ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.HelloTimer;
MATCHES FOR Equality, Ordering;
BEHAVIOUR helloTimer-B BEHAVIOUR
DEFINED AS The period, in seconds, between ISH
PDUs;,
resettingTimer-B;
REGISTERED AS {ISO10589-ISIS.aoi helloTimer (34)};
 
l1DefaultMetric ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.HopMetric;
MATCHES FOR Equality, Ordering;
BEHAVIOUR l1defaultMetric-B BEHAVIOUR
DEFINED AS The default metric value of this circuit
for Level 1 traffic. The value of zero is reserved to
indicate that this metric is not supported;;
REGISTERED AS {ISO10589-ISIS.aoi l1DefaultMetric
(35)};
 
l1DelayMetric ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.HopMetric;
MATCHES FOR Equality, Ordering;
BEHAVIOUR l1DelayMetric-B BEHAVIOUR
DEFINED AS The delay metric value of this circuit for
Level 1 traffic. The value of zero is reserved to indi
cate that this metric is not supported;;
REGISTERED AS {ISO10589-ISIS.aoi l1DelayMetric
(36)};
 
l1ExpenseMetric ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.HopMetric;
MATCHES FOR Equality, Ordering;
BEHAVIOUR l1ExpenseMetric-B BEHAVIOUR
DEFINED AS The expense metric value of this circuit
for Level 1 traffic. The value of zero is reserved to
indicate that this metric is not supported;;
REGISTERED AS {ISO10589-ISIS.aoi l1ExpenseMetric
(37)};
 
l1ErrorMetric ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.HopMetric;
MATCHES FOR Equality, Ordering;
BEHAVIOUR l1ErrorMetric-B BEHAVIOUR
DEFINED AS The error metric value of this circuit for
Level 1 traffic. The value of zero is reserved to indi
cate that this metric is not supported;;
REGISTERED AS {ISO10589-ISIS.aoi l1ErrorMetric
(38)};
 
circuitChanges ATTRIBUTE
DERIVED FROM nonWrappingCounter;
BEHAVIOUR circuitChanges-B BEHAVIOUR
DEFINED AS Number of times this Circuit state
changed between On and Off and vice versa;;
REGISTERED AS {ISO10589-ISIS.aoi circuitChanges
(39)};
 
 
changesInAdjacencyState ATTRIBUTE
DERIVED FROM nonWrappingCounter;
BEHAVIOUR changesInAdjacencyState-B
BEHAVIOUR
DEFINED AS Number of Adjacency State Change
events generated;;
REGISTERED AS {ISO10589-ISIS.aoi
changesInAdjacencyState (40)};
 
initializationFailures ATTRIBUTE
DERIVED FROM nonWrappingCounter;
BEHAVIOUR initializationFailures-B BEHAVIOUR
DEFINED AS Number of Initialization Failure events
generated;;
REGISTERED AS {ISO10589-ISIS.aoi
initializationFailures (41)};
 
rejectedAdjacencies ATTRIBUTE
DERIVED FROM nonWrappingCounter;
BEHAVIOUR rejectedAdjacencies-B BEHAVIOUR
DEFINED AS Number of Rejected Adjacency events
generated;;
REGISTERED AS {ISO10589-ISIS.aoi
rejectedAdjacencies (42)};
 
controlPDUsSent ATTRIBUTE
DERIVED FROM nonWrappingCounter;
BEHAVIOUR controlPDUsSent-B BEHAVIOUR
DEFINED AS Number of control PDUs sent on this
circuit;;
REGISTERED AS {ISO10589-ISIS.aoi controlPDUsSent
(43)};
 
controlPDUsReceived ATTRIBUTE
DERIVED FROM nonWrappingCounter;
BEHAVIOUR controlPDUsReceived-B BEHAVIOUR
DEFINED AS Number of control PDUs received on
this circuit;;
REGISTERED AS {ISO10589-ISIS.aoi
controlPDUsReceived (44)};
 
iSISHelloTimer ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.ISISHelloTimer;
MATCHES FOR Equality, Ordering;
BEHAVIOUR iSISHelloTimer-B BEHAVIOUR
DEFINED AS The period, in seconds, between LAN
Level 1 and Level 2 IIH PDUs.  It is also used as the
period between ISH PDUs when polling the ES con
figuration;,
resettingTimer-B;
REGISTERED AS {ISO10589-ISIS.aoi iSISHelloTimer
(45)};
 
externalDomain ATTRIBUTE
WITH ATTRIBUTE SYNTAX ISO10589-ISIS.Boolean;
MATCHES FOR Equality;
BEHAVIOUR externalDomain-B BEHAVIOUR
DEFINED AS If TRUE, suppress notmal transmission
of and interpretation of Intra-domain ISIS PDUs on
this circuit.;;
REGISTERED AS {ISO10589-ISIS.aoi externalDomain
(46)};
 
 
l1IntermediateSystemPriority ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.IntermediateSystemPriority;
MATCHES FOR Equality, Ordering;
BEHAVIOUR l1IntermediateSystemPriority-B
BEHAVIOUR
DEFINED AS Priority for becoming LAN Level 1
Designated Intermediate System;;
REGISTERED AS {ISO10589-ISIS.aoi
l1IntermediateSystemPriority (47)};
 
l1CircuitID ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.CircuitID;
MATCHES FOR Equality;
BEHAVIOUR l1CircuitID-B BEHAVIOUR
DEFINED AS The  LAN ID allocated by the LAN
Level 1 Designated Intermediate System. Where this
system is not aware of the value (because it is not
participating in the Level 1 Designated Intermediate
System election), this attribute has the value which
would be proposed for this circuit. (i.e. the concate
nation of the local system ID and the one octet local
Circuit ID for this circuit.;;
REGISTERED AS {ISO10589-ISIS.aoi l1CircuitID
(48)};
 
l1DesignatedIntermediateSystem ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.SystemID;
MATCHES FOR Equality;
BEHAVIOUR l1DesignatedIntermediateSystem-B
BEHAVIOUR
DEFINED AS The ID  of the LAN Level 1 Designated
Intermediate System on this circuit. If, for any rea
son this system is not partaking in the relevant Des
ignated Intermediate System election process, then
the value returned is zero;;
REGISTERED AS {ISO10589-ISIS.aoi
l1DesignatedIntermediateSystem (49)};
 
lanL1DesignatedIntermediateSystemChanges
ATTRIBUTE
DERIVED FROM nonWrappingCounter;
BEHAVIOUR
lanL1DesignatedIntermediateSystemChanges-B
BEHAVIOUR
DEFINED AS Number of LAN L1 Designated Inter
mediate System Change events generated;;
REGISTERED AS {ISO10589-ISIS.aoi
lanL1DesignatedIntermediateSystemChanges (50)};
 
 
ptPtCircuitID ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.CircuitID;
MATCHES FOR Equality;
BEHAVIOUR ptPtCircuitID-B BEHAVIOUR
DEFINED AS The ID of the circuit allocated during
initialization. If no value has been negotiated (either
because the adjacency is to an End system, or
because initialization has not yet successfully
completed), this attribute has the value which would
be proposed for this circuit. (i.e. the concatenation of
the local system ID and the one octet local Circuit
ID for this circuit.;;
REGISTERED AS {ISO10589-ISIS.aoi ptPtCircuitID
(51)};
 
callEstablishmentDefaultMetricIncrement ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.MetricIncrement;
MATCHES FOR Equality, Ordering;
BEHAVIOUR
callEstablishmentDefaultMetricIncrement-B
BEHAVIOUR
DEFINED AS Additional value to be reported for the
default metric value of unestablished DA adjacen
cies;;
REGISTERED AS {ISO10589-ISIS.aoi
callEstablishmentDefaultMetricIncrement (52)};
 
callEstablishmentDelayMetricIncrement ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.MetricIncrement;
MATCHES FOR Equality, Ordering;
BEHAVIOUR
callEstablishmentDelayMetricIncrement-B
BEHAVIOUR
DEFINED AS Additional value to be reported for the
delay metric value of unestablished DA adjacen
cies;;
REGISTERED AS {ISO10589-ISIS.aoi
callEstablishmentDelayMetricIncrement (53)};
 
callEstablishmentExpenseMetricIncrement ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.MetricIncrement;
MATCHES FOR Equality, Ordering;
BEHAVIOUR
callEstablishmentExpenseMetricIncrement-B
BEHAVIOUR
DEFINED AS Additional value to be reported for the
Expense metric value of unestablished DA adjacen
cies;;
REGISTERED AS {ISO10589-ISIS.aoi
callEstablishmentExpenseMetricIncrement (54)};
 
callEstablishmentErrorMetricIncrement ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.MetricIncrement;
MATCHES FOR Equality, Ordering;
BEHAVIOUR callEstablishmentErrorMetricIncrement-B
BEHAVIOUR
DEFINED AS Additional value to be reported for the
Error metric value of unestablished DA adjacencies;;
REGISTERED AS {ISO10589-ISIS.aoi
callEstablishmentErrorMetricIncrement (55)};
 
 
recallTimer ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.RecallTimer;
MATCHES FOR Equality, Ordering;
BEHAVIOUR recallTimer-B BEHAVIOUR
DEFINED AS Number of seconds that must elapse be
tween a call failure on a DED circuit and a recall;,
resettingTimer-B;
REGISTERED AS {ISO10589-ISIS.aoi recallTimer
(56)};
 
idleTimer ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.IdleTimer;
MATCHES FOR Equality, Ordering;
BEHAVIOUR idleTimer-B BEHAVIOUR
DEFINED AS Number of seconds of idle time before
call is cleared;,
resettingTimer-B;
REGISTERED AS {ISO10589-ISIS.aoi idleTimer (57)};
 
initialMinimumTimer ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.InitialMinimumTimer;
MATCHES FOR Equality, Ordering;
BEHAVIOUR initialMinimumTimer-B BEHAVIOUR
DEFINED AS Number of seconds that a call remains
connected after being established, irrespective of
traffic. (Note. This should be set small enough so
that the call is cleared before the start of the next
charging interval.);,
resettingTimer-B;
REGISTERED AS {ISO10589-ISIS.aoi
initialMinimumTimer (58)};
 
reserveTimer ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.ReserveTimer;
MATCHES FOR Equality, Ordering;
BEHAVIOUR reserveTimer-B BEHAVIOUR
DEFINED AS Number of seconds, after call is cleared
due to lack of traffic, during which the SVC remains
reserved for the previous SNPA address;,
resettingTimer-B;
REGISTERED AS {ISO10589-ISIS.aoi reserveTimer
(59)};
 
maximumSVCAdjacencies ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.MaximumSVCAdjacencies;
MATCHES FOR Equality, Ordering;
BEHAVIOUR maximumSVCAdjacencies-B
BEHAVIOUR
DEFINED AS Number of Adjacencies to reserve for
SVCs for this circuit. This is the maximum number
of simultaneous calls which are possible on this cir
cuit;,
resourceLimiting-B;
PARAMETERS constraintViolation;
REGISTERED AS {ISO10589-ISIS.aoi
maximumSVCAdjacencies (60)};
 
 
reservedAdjacency ATTRIBUTE
WITH ATTRIBUTE SYNTAX ISO10589-ISIS.Boolean;
MATCHES FOR Equality;
BEHAVIOUR reservedAdjacency-B BEHAVIOUR
DEFINED AS When True, indicates that one SVC
must be reserved for a connection to an Intermediate
System;,
replaceOnlyWhileDisabled-B;
PARAMETERS constraintViolation;
REGISTERED AS {ISO10589-ISIS.aoi
reservedAdjacency (61)};
 
callsPlaced ATTRIBUTE
DERIVED FROM nonWrappingCounter;
BEHAVIOUR callsPlaced-B BEHAVIOUR
DEFINED AS Number of Call attempts (successful or
unsuccessful);;
REGISTERED AS {ISO10589-ISIS.aoi callsPlaced (62)};
 
callsFailed ATTRIBUTE
DERIVED FROM nonWrappingCounter;
BEHAVIOUR callsFailed-B BEHAVIOUR
DEFINED AS Number of Unsuccessful Call attempts;;
REGISTERED AS {ISO10589-ISIS.aoi callsFailed (63)};
 
timesExceededMaximumSVCAdjacencies ATTRIBUTE
DERIVED FROM nonWrappingCounter;
BEHAVIOUR
timesExceededMaximumSVCAdjacencies-B
BEHAVIOUR
DEFINED AS Number of Exceeded Maximum SVC
Adjacencies events generated;;
REGISTERED AS {ISO10589-ISIS.aoi
timesExceededMaximumSVCAdjacencies (64)};
 
neighbourSNPAAddress ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.SNPAAddress;
MATCHES FOR Equality;
BEHAVIOUR neighbourSNPAAddress-B
BEHAVIOUR
DEFINED AS SNPA Address to call, or SNPA Ad
dress from which to accept call;;
REGISTERED AS {ISO10589-ISIS.aoi
neighbourSNPAAddress (65)};
 
maximumCallAttempts ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.MaximumCallAttempts;
MATCHES FOR Equality, Ordering;
BEHAVIOUR maximumCallAttempts-B BEHAVIOUR
DEFINED AS Maximum number of successive call
failures before halting. (A value of zero means infi
nite retries.;;
REGISTERED AS {ISO10589-ISIS.aoi
maximumCallAttempts (66)};
 
timesExceededMaximumCallAttempts ATTRIBUTE
DERIVED FROM nonWrappingCounter;
BEHAVIOUR timesExceededMaximumCallAttempts-B
 
BEHAVIOUR
DEFINED AS Number of Exceeded Maximum Call
Attempts events generated;;
REGISTERED AS {ISO10589-ISIS.aoi
timesExceededMaximumCallAttempts (67)};
 
l2DefaultMetric ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.HopMetric;
MATCHES FOR Equality, Ordering;
BEHAVIOUR l2defaultMetric-B BEHAVIOUR
DEFINED AS The default metric value of this circuit
for Level 2 traffic. The value of zero is reserved to
indicate that this metric is not supported;;
REGISTERED AS {ISO10589-ISIS.aoi l2DefaultMetric
(68)};
 
l2DelayMetric ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.HopMetric;
MATCHES FOR Equality, Ordering;
BEHAVIOUR l2DelayMetric-B BEHAVIOUR
DEFINED AS The delay metric value of this circuit for
Level 2 traffic. The value of zero is reserved to indi
cate that this metric is not supported;;
REGISTERED AS {ISO10589-ISIS.aoi l2DelayMetric
(69)};
 
l2ExpenseMetric ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.HopMetric;
MATCHES FOR Equality, Ordering;
BEHAVIOUR l2ExpenseMetric-B BEHAVIOUR
DEFINED AS The expense metric value of this circuit
for Level 2 traffic. The value of zero is reserved to
indicate that this metric is not supported;;
REGISTERED AS {ISO10589-ISIS.aoi l2ExpenseMetric
(70)};
 
l2ErrorMetric ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.HopMetric;
MATCHES FOR Equality, Ordering;
BEHAVIOUR l2ErrorMetric-B BEHAVIOUR
DEFINED AS The error metric value of this circuit for
Level 2 traffic. The value of zero is reserved to indi
cate that this metric is not supported;;
REGISTERED AS {ISO10589-ISIS.aoi l2ErrorMetric
(71)};
 
manualL2OnlyMode ATTRIBUTE
WITH ATTRIBUTE SYNTAX ISO10589-ISIS.Boolean;
MATCHES FOR Equality;
BEHAVIOUR manualL2OnlyMode-B BEHAVIOUR
DEFINED AS When True, indicates that this Circuit is
to be used only for Level 2;,
replaceOnlyWhileDisabled-B;
PARAMETERS constraintViolation;
REGISTERED AS {ISO10589-ISIS.aoi
manualL2OnlyMode (72)};
 
 
l2IntermediateSystemPriority ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.IntermediateSystemPriority;
MATCHES FOR Equality, Ordering;
BEHAVIOUR l2IntermediateSystemPriority-B
BEHAVIOUR
DEFINED AS Priority for becoming LAN Level 2
Designated Intermediate System;;
REGISTERED AS {ISO10589-ISIS.aoi
l2IntermediateSystemPriority (73)};
 
l2CircuitID ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.CircuitID;
MATCHES FOR Equality;
BEHAVIOUR l2CircuitID-B BEHAVIOUR
DEFINED AS The LAN ID allocated by the LAN
Level 2 Designated Intermediate System. Where this
system is not aware of the value (because it is not
participating in the Level 2 Designated Intermediate
System election), this attribute has the value which
would be proposed for this circuit. (i.e. the concate
nation of the local system ID and the one octet local
Circuit ID for this circuit.;;
REGISTERED AS {ISO10589-ISIS.aoi l2CircuitID
(74)};
 
l2DesignatedIntermediateSystem ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.SystemID;
MATCHES FOR Equality;
BEHAVIOUR l2DesignatedIntermediateSystem-B
BEHAVIOUR
DEFINED AS The ID  of the LAN Level 2 Designated
Intermediate System on this circuit. If, for any rea
son this system is not partaking in the relevant Des
ignated Intermediate System election process, then
the value returned is ;;
REGISTERED AS {ISO10589-ISIS.aoi
l2DesignatedIntermediateSystem (75)};
 
lanL2DesignatedIntermediateSystemChanges
ATTRIBUTE
DERIVED FROM nonWrappingCounter;
BEHAVIOUR
lanL2DesignatedIntermediateSystemChanges-B
BEHAVIOUR
DEFINED AS Number of LAN L2 Designated Inter
mediate System Change events generated;;
REGISTERED AS {ISO10589-ISIS.aoi
lanL2DesignatedIntermediateSystemChanges (76)};
 
adjacencyName ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.GraphicString;
MATCHES FOR Equality, Substrings;
 
BEHAVIOUR adjacencyName-B BEHAVIOUR
DEFINED AS A string which is the Identifier for the
Adjacency and which is unique amongst the set of
Adjacencies maintained for this Circuit. If this is a
manually created adjacency (i.e. the type is Manual)
it is set by the System Manager when the Adjacency
is created, otherwise it is generated by the imple
mentation such that it is unique. The set of identifier
containing the leading string "Auto" are reserved for
Automatic Adjacencies. An attempt to create a Man
ual Adjacency with such an identifier will cause an
exception to be raised;;
REGISTERED AS {ISO10589-ISIS.aoi adjacencyName
(77)};
 
adjacencyState ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.AdjacencyState;
MATCHES FOR Equality;
BEHAVIOUR adjacencyState-B BEHAVIOUR
DEFINED AS The state of the adjacency;;
REGISTERED AS {ISO10589-ISIS.aoi adjacencyState
(78)};
 
neighbourLANAddress ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.LANAddress;
MATCHES FOR Equality;
BEHAVIOUR neighbourLANAddress-B BEHAVIOUR
DEFINED AS The MAC address of the neighbour sys
tem on a broadcast circuit;,
replaceOnlyWhileDisabled-B;
PARAMETERS constraintViolation;
REGISTERED AS {ISO10589-ISIS.aoi
neighbourLANAddress (79)};
 
neighbourSystemType ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.NeighbourSystemType;
MATCHES FOR Equality;
BEHAVIOUR neighbourSystemType-B BEHAVIOUR
DEFINED AS The type of the neighbour system  one
of: Unknown End system Intermediate system L1
Intermediate system L2 Intermediate system;;
REGISTERED AS {ISO10589-ISIS.aoi
neighbourSystemType (80)};
 
sNPAAddress ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.SNPAAddress;
MATCHES FOR Equality;
BEHAVIOUR sNPAAddress-B BEHAVIOUR
DEFINED AS The SNPA Address of the neighbour
system on an X.25 circuit;,
replaceOnlyWhileDisabled-B;
PARAMETERS constraintViolation;
REGISTERED AS {ISO10589-ISIS.aoi sNPAAddress
(81)};
 
 
adjacencyUsageType ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.AdjacencyUsageType;
MATCHES FOR Equality;
BEHAVIOUR level-B BEHAVIOUR
DEFINED AS The usage of the Adjacency.  An
Adjacency of type Level 1" will be used for Level 1
traffic only.  An adjacency of type Level 2" will be
used for Level 2 traffic only. An adjacency of type
Level 1 and 2" will be used for both Level 1 and
Level 2 traffic. There may be two adjacencies (of
types Level 1" and Level 2" between the same pair
of Intermediate Systems.;;
REGISTERED AS {ISO10589-ISIS.aoi
adjacencyUsageType (82)};
 
neighbourSystemID ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.SystemID;
MATCHES FOR Equality;
BEHAVIOUR neighbourSystemID-B BEHAVIOUR
DEFINED AS The SystemID of the neighbouring In
termediate system from the Source ID field of the
neighbour's IIH PDU. The Intermediate System ID
for this neighbour is derived by appending zero to
this value.;;
REGISTERED AS {ISO10589-ISIS.aoi
neighbourSystemID (83)};
 
neighbourAreas ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.AreaAddresses;
MATCHES FOR Equality, Set Comparison, Set
Intersection;
BEHAVIOUR neighbourAreas-B BEHAVIOUR
DEFINED AS This contains the Area Addresses of a
neighbour Intermediate System from the IIH PDU.;;
REGISTERED AS {ISO10589-ISIS.aoi neighbourAreas
(84)};
 
holdingTimer ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.HoldingTimer;
MATCHES FOR Equality, Ordering;
BEHAVIOUR holdingTimer-B BEHAVIOUR
DEFINED AS Holding time for this adjacency updated
from the IIH PDUs;;
REGISTERED AS {ISO10589-ISIS.aoi holdingTimer
(85)};
 
lANPriority ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.IntermediateSystemPriority;
MATCHES FOR Equality, Ordering;
BEHAVIOUR lANPriority-B BEHAVIOUR
DEFINED AS Priority of neighbour on this adjacency
for becoming LAN Level 1 Designated Intermediate
System if adjacencyType is L1 Intermediate System
or LAN Level 2 Designated Intermediate System if
adjacencyType is L2 Intermediate System;;
REGISTERED AS {ISO10589-ISIS.aoi lANPriority
(86)};
 
 
endSystemIDs ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.EndSystemIDs;
MATCHES FOR Equality, Set Comparison, Set
Intersection;
BEHAVIOUR endSystemIDs-B BEHAVIOUR
DEFINED AS This contains the system ID(s) of a
neighbour End system. Where (in a Intermediate
System) an adjacency has been created manually,
these will be the set of IDs given in the manualIDs
parameter of the create directive.;;
REGISTERED AS {ISO10589-ISIS.aoi endSystemIDs
(87)};
 
networkEntityTitle ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.NetworkEntityTitle;
MATCHES FOR Equality, Ordering;
BEHAVIOUR networkEntityTitle-B BEHAVIOUR
DEFINED AS The Network entity Title which is the
destination of a Virtual link being used to repair a
partitioned Level 1 area (see clause 7.2.10);;
REGISTERED AS {ISO10589-ISIS.aoi
networkEntityTitle (88)};
 
metric ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.PathMetric;
MATCHES FOR Equality, Ordering;
BEHAVIOUR metric-B BEHAVIOUR
DEFINED AS Cost of least cost L2 path(s) to destina
tion area based on the default metric;;
REGISTERED AS {ISO10589-ISIS.aoi metric (89)};
 
defaultMetricPathCost ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.PathMetric;
MATCHES FOR Equality, Ordering;
BEHAVIOUR defaultMetricPathCost-B BEHAVIOUR
DEFINED AS Cost of least cost path(s) using the de
fault metric to destination;;
REGISTERED AS {ISO10589-ISIS.aoi
defaultMetricPathCost (90)};
 
defaultMetricOutputAdjacencies ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.OutputAdjacencies;
MATCHES FOR Equality, Set Comparison, Set
Intersection;
BEHAVIOUR defaultMetricOutputAdjacencies-B
BEHAVIOUR
DEFINED AS The set of Adjacency (or Reachable Ad
dress) managed object identifiers representing the
forwarding decisions based upon the default metric
for the destination;;
REGISTERED AS {ISO10589-ISIS.aoi
defaultMetricOutputAdjacencies (91)};
 
delayMetricPathCost ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.PathMetric;
MATCHES FOR Equality, Ordering;
 
BEHAVIOUR delayMetricPathCost-B BEHAVIOUR
DEFINED AS Cost of least cost path(s) using the delay
metric to destination;;
REGISTERED AS {ISO10589-ISIS.aoi
delayMetricPathCost (92)};
 
delayMetricOutputAdjacencies ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.OutputAdjacencies;
MATCHES FOR Equality, Set Comparison, Set
Intersection;
BEHAVIOUR delayMetricOutputAdjacencies-B
BEHAVIOUR
DEFINED AS The set of Adjacency (or Reachable Ad
dress) managed object identifiers representing the
forwarding decisions based upon the delay metric
for the destination;;
REGISTERED AS {ISO10589-ISIS.aoi
delayMetricOutputAdjacencies (93)};
 
expenseMetricPathCost ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.PathMetric;
MATCHES FOR Equality, Ordering;
BEHAVIOUR expenseMetricPathCost-B BEHAVIOUR
DEFINED AS Cost of least cost path(s) using the ex
pense metric to destination;;
REGISTERED AS {ISO10589-ISIS.aoi
expenseMetricPathCost (94)};
 
expenseMetricOutputAdjacencies ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.OutputAdjacencies;
MATCHES FOR Equality, Set Comparison, Set
Intersection;
BEHAVIOUR expenseMetricOutputAdjacencies-B
BEHAVIOUR
DEFINED AS The set of Adjacency (or Reachable Ad
dress) managed object identifiers representing the
forwarding decisions based upon the expense metric
for the destination;;
REGISTERED AS {ISO10589-ISIS.aoi
expenseMetricOutputAdjacencies (95)};
 
errorMetricPathCost ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.PathMetric;
MATCHES FOR Equality, Ordering;
BEHAVIOUR errorMetricPathCost-B BEHAVIOUR
DEFINED AS Cost of least cost path(s) using the error
metric to destination;;
REGISTERED AS {ISO10589-ISIS.aoi
errorMetricPathCost (96)};
 
errorMetricOutputAdjacencies ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.OutputAdjacencies;
MATCHES FOR Equality, Set Comparison, Set
Intersection;
BEHAVIOUR errorMetricOutputAdjacencies-B
 
BEHAVIOUR
DEFINED AS The set of Adjacency (or Reachable Ad
dress) managed object identifiers representing the
forwarding decisions based upon the error metric for
the destination;;
REGISTERED AS {ISO10589-ISIS.aoi
errorMetricOutputAdjacencies (97)};
 
addressPrefix ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.AddressPrefix;
MATCHES FOR Equality, Substrings;
BEHAVIOUR addressPrefix-B BEHAVIOUR
DEFINED AS An Area Address (or prefix) of a desti
nation area;;
REGISTERED AS {ISO10589-ISIS.aoi addressPrefix
(98)};
 
defaultMetric ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.HopMetric;
MATCHES FOR Equality, Ordering;
BEHAVIOUR defaultMetric-B BEHAVIOUR
DEFINED AS The default metric value for reaching
the specified prefix over this Circuit. If this attribute
is changed while both the Reachable Address and
the Circuit are Enabled (i.e. state On), the actions
described in clause 8.3.5.4 must be taken. The value
of zero is reserved to indicate that this metric is not
supported;;
REGISTERED AS {ISO10589-ISIS.aoi defaultMetric
(99)};
 
delayMetric ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.HopMetric;
MATCHES FOR Equality, Ordering;
BEHAVIOUR delayMetric-B BEHAVIOUR
DEFINED AS The delay metric value for reaching the
specified prefix over this Circuit.BEHAVIOURIf
this attribute is changed while both the Reachable
Address and the Circuit are Enabled (i.e. state On),
the actions described in clause 8.3.5.4 must be taken.
The value of zero is reserved to indicate that this
metric is not supported;;
REGISTERED AS {ISO10589-ISIS.aoi delayMetric
(100)};
 
expenseMetric ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.HopMetric;
MATCHES FOR Equality, Ordering;
BEHAVIOUR expenseMetric-B BEHAVIOUR
DEFINED AS The expense metric value for reaching
the specified prefix over this Circuit. If this attribute
is changed while both the Reachable Address and
the Circuit are Enabled (i.e. state On), the actions
described in clause 8.3.5.4 must be taken. The value
of zero is reserved to indicate that this metric is not
supported;;
REGISTERED AS {ISO10589-ISIS.aoi expenseMetric
(101)};
 
 
errorMetric ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.HopMetric;
MATCHES FOR Equality, Ordering;
BEHAVIOUR errorMetric-B BEHAVIOUR
DEFINED AS The error metric value for reaching the
specified prefix over this Circuit. If this attribute is
changed while both the Reachable Address and the
Circuit are Enabled (i.e. state On), the actions de
scribed in clause 8.3.5.4 must be taken. The value of
zero is reserved to indicate that this metric is not
supported;;
REGISTERED AS {ISO10589-ISIS.aoi errorMetric
(102)};
 
defaultMetricType ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.MetricType;
MATCHES FOR Equality;
BEHAVIOUR defaultMetricType-B BEHAVIOUR
DEFINED AS Indicates whether the default metric is
internal or external;;
REGISTERED AS {ISO10589-ISIS.aoi
defaultMetricType (103)};
 
delayMetricType ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.MetricType;
MATCHES FOR Equality;
BEHAVIOUR delayMetricType-B BEHAVIOUR
DEFINED AS Indicates whether the delay metric is in
ternal or external;;
REGISTERED AS {ISO10589-ISIS.aoi delayMetricType
(104)};
 
expenseMetricType ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.MetricType;
MATCHES FOR Equality;
BEHAVIOUR expenseMetricType-B BEHAVIOUR
DEFINED AS Indicates whether the expense metric is
internal or external;;
REGISTERED AS {ISO10589-ISIS.aoi
expenseMetricType (105)};
 
errorMetricType ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.MetricType;
MATCHES FOR Equality;
BEHAVIOUR errorMetricType-B BEHAVIOUR
DEFINED AS Indicates whether the error metric is in
ternal or extternal;;
REGISTERED AS {ISO10589-ISIS.aoi errorMetricType
(106)};
 
mappingType ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.MappingType;
MATCHES FOR Equality;
 
BEHAVIOUR mappingType-B BEHAVIOUR
DEFINED AS The type of mapping to be employed to
ascertain the SNPA Address to which a call should
be placed for this prefix. X.121 indicates that the
X.121 address extraction algorithm is to be em
ployed. This will extract the SNPA address from the
IDI of an X.121 format IDP of the NSAP address to
which the NPDU is to be forwarded. Manual indi
cates that the set of addresses in the sNPAAddresses
or LANAddresses characteristic are to be used. For
Broadcast circuits, only the value Manual is permit
ted;;
REGISTERED AS {ISO10589-ISIS.aoi mappingType
(107)};
 
lANAddress ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.LANAddress;
MATCHES FOR Equality;
BEHAVIOUR lANAddress-B BEHAVIOUR
DEFINED AS Asingle LAN addresses to which an
NPDU may be directed in order to reach an address
which matches the address prefix of the Reachable
Address. An exception is raised if an attempt is
made to enable the Reachable Address with the de
fault value;;
REGISTERED AS {ISO10589-ISIS.aoi lANAddress
(108)};
 
sNPAAddresses ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.SNPAAddresses;
MATCHES FOR Equality;
BEHAVIOUR sNPAAddresses-B BEHAVIOUR
DEFINED AS A set of SNPA addresses to which a call
may be directed in order to reach an address which
matches the address prefix of the Reachable Ad
dress. Associated with each SNPA Address, but not
visible to System Management, is a variable lastFail
ure of Type BinaryAbsoluteTime;;
REGISTERED AS {ISO10589-ISIS.aoi sNPAAddresses
(109)};
 
nonWrappingCounter ATTRIBUTE
WITH ATTRIBUTE SYNTAX  
ISO10589-ISIS.NonWrappingCounter;
MATCHES FOR Equality, Ordering;
BEHAVIOUR nonWrappingCounter-B BEHAVIOUR
DEFINED AS Non-replaceable, non-wrapping
counter;;
-- This attibute is only defined in order to allow other
counter attributes to be derived from it.
REGISTERED AS {ISO10589-ISIS.aoi
nonWrappingCounter (110)};
 
areaTransmitPassword ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.Password;
MATCHES FOR Equality;
BEHAVIOUR areaTransmitPassword-B BEHAVIOUR
DEFINED AS The value to be used as a transmit pass
word in Level 1 LSP, and SNP PDUs transmitted by
this Intermediate System;;
REGISTERED AS {ISO10589-ISIS.aoi
areaTransmitPassword (111)};
 
 
areaReceivePasswords ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.Passwords;
MATCHES FOR Equality;
BEHAVIOUR areaReceivePasswords-B BEHAVIOUR
DEFINED AS The values to be used as receive pass
words to check the receipt of Level 1 LSP, and SNP
PDUs;;
REGISTERED AS {ISO10589-ISIS.aoi
areaReceivePasswords (112)};
 
domainTransmitPassword ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.Password;
MATCHES FOR Equality;
BEHAVIOUR domainTransmitPassword-B
BEHAVIOUR
DEFINED AS The value to be used as a transmit pass
word in Level 2 LSP, and SNP PDUs transmitted by
this Intermediate System;;
REGISTERED AS {ISO10589-ISIS.aoi
domainTransmitPassword (113)};
 
domainReceivePasswords ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.Passwords;
MATCHES FOR Equality;
BEHAVIOUR domainReceivePasswords-B
BEHAVIOUR
DEFINED AS The values to be used as receive pass
words to check the receipt of Level 2 LSP, and SNP
PDUs;;
REGISTERED AS {ISO10589-ISIS.aoi
domainReceivePasswords (114)};
 
circuitTransmitPassword ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.Password;
MATCHES FOR Equality;
BEHAVIOUR circuitTransmitPassword-B
BEHAVIOUR
DEFINED AS The value to be used as a transmit pass
word in IIH PDUs transmitted by this Intermediate
System;;
REGISTERED AS {ISO10589-ISIS.aoi
circuitTransmitPassword (115)};
 
circuitReceivePasswords ATTRIBUTE
WITH ATTRIBUTE SYNTAX
ISO10589-ISIS.Passwords;
MATCHES FOR Equality;
BEHAVIOUR circuitReceivePasswords-B
BEHAVIOUR
DEFINED AS The values to be used as receive pass
words to check the receipt of IIH PDUs;;
REGISTERED AS {ISO10589-ISIS.aoi
circuitReceivePasswords (116)};
 
authenticationFailures ATTRIBUTE
DERIVED FROM nonWrappingCounter;
 
BEHAVIOUR authenticationFailures-B BEHAVIOUR
DEFINED AS Count of authentication Failure notifica
tions generated;;
REGISTERED AS {ISO10589-ISIS.aoi
authenticationFailures (117)};
 
11.2.12 Notification Definitions
-- Note pduFormatError notification now included in
Network layer definitions
corruptedLSPDetected NOTIFICATION
BEHAVIOUR corruptedLSPDetected-B BEHAVIOUR
DEFINED AS The Corrupted LSP Detected Notifica
tion is generated when a corrupted Link State PDU
is detected in memory.  The occurance of this event
is counted by the corruptedLSPsDetected counter.;;
MODE NON-CONFIRMED;
WITH INFORMATION SYNTAX
ISO10589-ISIS.NotificationInfo;
REGISTERED AS {ISO10589-ISIS.noi
corruptedLSPDetected (1)};
 
lSPL1DatabaseOverload NOTIFICATION
BEHAVIOUR lSPL1DatabaseOverload-B
BEHAVIOUR
DEFINED AS The LSP L1 Database Overload Notifi
cation is generated when the l1State of the system
changes between On and Waiting or Waiting and
On. The stateChange argument is set to indicate the
resulting state, and in the case of Waiting the sour
ceID is set to indicate the source of the LSP which
precipitated the overload.  The occurance of this
event is counted by the lSPL1DatabaseOverloads
counter.;;
MODE NON-CONFIRMED;
PARAMETERS
notificationOverloadStateChange,
notificationSourceID;
WITH INFORMATION SYNTAX
ISO10589-ISIS.NotificationInfo;
REGISTERED AS {ISO10589-ISIS.noi
lSPL1DatabaseOverload (2)};
 
manualAddressDroppedFromArea NOTIFICATION
BEHAVIOUR manualAddressDroppedFromArea-B
BEHAVIOUR
DEFINED AS The Manual Address Dropped From
Area Notification is generated when one of the man
ualAreaAddresses (specified on this system) is ig
nored when computing partitionAreaAddresses or
areaAddresses because there are more than Maximu
mAreaAddresses distinct Area Addresses. The
areaAddress argument is set to the ignored Area Ad
dress. It is generated once for each Area Address in
manualAreaAddresses which is dropped. It is not
logged again for that Area Address until after it has
been reinstated into areaAddresses (i.e. it is only the
action of dropping the Area Address and not the
state of being dropped, which causes the event to be
generated). The occurance of this event is counted
by the manualAddressDroppedFromAreas counter.;;
MODE NON-CONFIRMED;
PARAMETERS
notificationAreaAddress;
WITH INFORMATION SYNTAX
 
ISO10589-ISIS.NotificationInfo;
REGISTERED AS {ISO10589-ISIS.noi
manualAddressDroppedFromArea (3)};
 
attemptToExceedMaximumSequenceNumber
NOTIFICATION
BEHAVIOUR
attemptToExceedMaximumSequenceNumber-B
BEHAVIOUR
DEFINED AS The Attempt To Exceed Maximum Se
quence Number Notification is generated when an
attempt is made to increment the sequence number
of an LSP beyond the maximum sequence number.
Following the generation of this event the operation
of the Routeing state machine shall be disabled for at
least (MaxAge + ZeroAgeLifetime) seconds.  The
occurance of this event is counted by the
attemptsToExceedMaximumSequenceNumber
counter.;;
MODE NON-CONFIRMED;
WITH INFORMATION SYNTAX
ISO10589-ISIS.NotificationInfo;
REGISTERED AS {ISO10589-ISIS.noi
attemptToExceedMaximumSequenceNumber (4)};
 
sequenceNumberSkip NOTIFICATION
BEHAVIOUR sequenceNumberSkip-B BEHAVIOUR
DEFINED AS The Sequence Number Skipped Notifi
cation is generated when the sequence number of an
LSP is incremented by more than one.  The occur
ance of this event is counted by the sequenceNum
berSkips counter.;;
MODE NON-CONFIRMED;
WITH INFORMATION SYNTAX
ISO10589-ISIS.NotificationInfo;
REGISTERED AS {ISO10589-ISIS.noi
sequenceNumberSkip (5)};
 
ownLSPPurge NOTIFICATION
BEHAVIOUR ownLSPPurge-B BEHAVIOUR
DEFINED AS The Own LSP Purged Notification is
generated when a zero aged copy of a system's own
LSP is received from some other system. This repre
sents an erroneous attempt to purge the local sys
tem's LSP.  The occurance of this event is counted
by the ownLSPPurges counter.;;
MODE NON-CONFIRMED;
WITH INFORMATION SYNTAX
ISO10589-ISIS.NotificationInfo;
REGISTERED AS {ISO10589-ISIS.noi ownLSPPurge
(6)};
 
partitionVirtualLinkChange NOTIFICATION
BEHAVIOUR partitionVirtualLinkChange-B
BEHAVIOUR
DEFINED AS The Partition Virtual Link Change Noti
fication is generated when a virtual link (for the pur
poses of Level 1 partition repair) is either created or
deleted. The relative order of events relating to the
same Virtual Link must be preserved.  The occur
ance of this event is counted by the partitionVirtual
LinkChanges counter.;;
MODE NON-CONFIRMED;
PARAMETERS
notificationVirtualLinkChange,
 
notificationVirtualLinkAddress;
WITH INFORMATION SYNTAX
ISO10589-ISIS.NotificationInfo;
REGISTERED AS {ISO10589-ISIS.noi
partitionVirtualLinkChange (7)};
 
lSPL2DatabaseOverload NOTIFICATION
BEHAVIOUR lSPL2DatabaseOverload-B
BEHAVIOUR
DEFINED AS The LSP L2 Database Overload Notifi
cation is generated when the l2State of the system
changes between On and Waiting or Waiting and
On. The stateChange argument is set to indicate the
resulting state, and in the case of Waiting the sour
ceID is set to indicate the source of the LSP which
precipitated the overload.  The occurance of this
event is counted by the lSPL2DatabaseOverloads
counter.;;
MODE NON-CONFIRMED;
PARAMETERS
notificationOverloadStateChange,
notificationSourceID;
WITH INFORMATION SYNTAX
ISO10589-ISIS.NotificationInfo;
REGISTERED AS {ISO10589-ISIS.noi
lSPL2DatabaseOverload (8)};
 
iDFieldLengthMismatch NOTIFICATION
BEHAVIOUR iDFieldLengthMismatch-B
BEHAVIOUR
DEFINED AS The iDFieldLengthMismatch Notifica
tion is generated when a PDU is received with a dif
ferent value for ID field length to that of the
receiving Intermediate system. The occurance of this
event is counted by the iDFieldLengthMismatches
counter.;;
MODE NON-CONFIRMED;
PARAMETERS
notificationIDLength,
notificationSourceID;
WITH INFORMATION SYNTAX
ISO10589-ISIS.NotificationInfo;
REGISTERED AS {ISO10589-ISIS.noi
iDFieldLengthMismatch (9)};
 
circuitChange NOTIFICATION
BEHAVIOUR circuitChange-B BEHAVIOUR
DEFINED AS The Circuit Change Notification is gen
erated when the state of the Circuit changes from On
to Off or from Off to On. The relative order of
events relating to the same Circuit must be pre
served.  The occurance of this event is counted by
the circuitChanges counter.;;
MODE NON-CONFIRMED;
PARAMETERS
notificationNewCircuitState;
WITH INFORMATION SYNTAX
ISO10589-ISIS.NotificationInfo;
REGISTERED AS {ISO10589-ISIS.noi circuitChange
(10)};
 
 
adjacencyStateChange NOTIFICATION
BEHAVIOUR adjacencyStateChange-B BEHAVIOUR
DEFINED AS The Adjacency State Change Notifica
tion is generated when the state of an Adjacency on
the Circuit changes from Up to Down or Down to
Up (in the latter case the Reason argument is omit
ted). For these purposes the states Up and
Up/dormant are considered to be Up, and any other
state is considered to be Down. The relative order of
events relating to the same Adjacency must be pre
served.  The occurance of this event is counted by
the adjacencyStateChanges counter.;;
MODE NON-CONFIRMED;
PARAMETERS
notificationAdjacentSystem,
notificationNewAdjacencyState,
notificationReason,
notificationPDUHeader,
notificationCalledAddress,
notificationVersion;
WITH INFORMATION SYNTAX
ISO10589-ISIS.NotificationInfo;
REGISTERED AS {ISO10589-ISIS.noi
adjacencyStateChange (11)};
 
initializationFailure NOTIFICATION
BEHAVIOUR initializationFailure-B BEHAVIOUR
DEFINED AS The Initialisation Failure Notification is
generated when an attempt to initialise with an adja
cent system fails as a result of either Version Skew
or Area Mismatch. In the case of Version Skew, the
Adjacent system argument is not present.   The oc
curance of this event is counted by the initialization
Failures counter.;;
MODE NON-CONFIRMED;
PARAMETERS
notificationAdjacentSystem,
notificationReason,
notificationPDUHeader,
notificationCalledAddress,
notificationVersion;
WITH INFORMATION SYNTAX
ISO10589-ISIS.NotificationInfo;
REGISTERED AS {ISO10589-ISIS.noi
initializationFailure (12)};
 
rejectedAdjacency NOTIFICATION
BEHAVIOUR rejectedAdjacency-B BEHAVIOUR
DEFINED AS The Rejected Adjacency Notification is
generated when an attempt to create a new adja
cency is rejected, because of a lack of resources.  
The occurance of this event is counted by the reject
edAdjacencies counter.;;
MODE NON-CONFIRMED;
PARAMETERS
notificationAdjacentSystem,
notificationReason,
notificationPDUHeader,
notificationCalledAddress,
notificationVersion;
WITH INFORMATION SYNTAX
ISO10589-ISIS.NotificationInfo;
REGISTERED AS {ISO10589-ISIS.noi
rejectedAdjacency (13)};
 
 
lanL1DesignatedIntermediateSystemChange
NOTIFICATION
BEHAVIOUR
lanL1DesignatedIntermediateSystemChange-B
BEHAVIOUR
DEFINED AS The LAN L1 Designated Intermediate
System Change Notification is generated when the
local system either elects itself or resigns as being
the LAN L1 Designated Intermediate System on this
circuit. The relative order of these events must be
preserved. The occurance of this event is counted by
the lanL1DesignatedIntermediateSystemChanges
counter.;;
MODE NON-CONFIRMED;
PARAMETERS
notificationDesignatedIntermediateSystemChange;
WITH INFORMATION SYNTAX
ISO10589-ISIS.NotificationInfo;
REGISTERED AS {ISO10589-ISIS.noi
lanL1DesignatedIntermediateSystemChange (14)};
 
exceededMaximumSVCAdjacencies NOTIFICATION
BEHAVIOUR exceededMaximumSVCAdjacencies-B
BEHAVIOUR
DEFINED AS The Exceeded Maximum SVC Adjacen
cies Notification is generated when there is no free
adjacency on which to establish an SVC for a new
destination.(see clause 8.3.2.3)  The occurance of
this event is counted by the
timesExceededMaximumSVCAdjacencies counter.;;
MODE NON-CONFIRMED;
WITH INFORMATION SYNTAX
ISO10589-ISIS.NotificationInfo;
REGISTERED AS {ISO10589-ISIS.noi
exceededMaximumSVCAdjacencies (15)};
 
exceededMaximumCallAttempts NOTIFICATION
BEHAVIOUR exceededMaximumCallAttempts-B
BEHAVIOUR
DEFINED AS The Exceeded Maximum Call Attempts
Notification is generated when recallCount becomes
equal to maximumCallAttempts.  The occurance of
this event is counted by the timesExceededMaxi
mumCallAttempts counter.;;
MODE NON-CONFIRMED;
WITH INFORMATION SYNTAX
ISO10589-ISIS.NotificationInfo;
REGISTERED AS {ISO10589-ISIS.noi
exceededMaximumCallAttempts (16)};
 
lanL2DesignatedIntermediateSystemChange
NOTIFICATION
BEHAVIOUR
lanL2DesignatedIntermediateSystemChange-B
BEHAVIOUR
DEFINED AS The LAN L2 Designated Intermediate
System Change Notification is generated when the
local system either elects itself or resigns as being
the LAN L2 Designated Intermediate System on this
circuit. The relative order of these events must be
preserved. The occurance of this event is counted by
the lanL2DesignatedIntermediateSystemChanges
counter.;;
MODE NON-CONFIRMED;
 
PARAMETERS
notificationDesignatedIntermediateSystemChange;
WITH INFORMATION SYNTAX
ISO10589-ISIS.NotificationInfo;
REGISTERED AS {ISO10589-ISIS.noi
lanL2DesignatedIntermediateSystemChange (17)};
 
authenticationFailure NOTIFICATION
BEHAVIOUR authenticationFailure-B BEHAVIOUR
DEFINED AS Generated when a PDU is received with
an incorrect Authentication information field;;
MODE NON-CONFIRMED;
PARAMETERS
notificationAdjacentSystem;
WITH INFORMATION SYNTAX
ISO10589-ISIS.NotificationInfo;
REGISTERED AS {ISO10589-ISIS.noi
authenticationFailure (18)};
 
11.2.13 Action Definitions
-- Note:  The following actions have been proposed (in
SC21 N4977) for inclusion in  DMI.  Until such time
as this is completed, the definitions of these actions
are given here.
--
activate ACTION
BEHAVIOUR activate-B BEHAVIOUR
DEFINED AS Sets OperationalState to `enabled' and
commences operation;;
MODE CONFIRMED;
PARAMETERS successResponse, failureResponse,
failureReason;
WITH INFORMATION SYNTAX
ISO10589-ISIS.ActionInfo;
WITH REPLY SYNTAX ISO10589-ISIS.ActionReply;
REGISTERED AS {ISO10589-ISIS.acoi activate (1)};
 
deactivate ACTION
BEHAVIOUR deactivate-B BEHAVIOUR
DEFINED AS Sets OperationalState to `disabled' and
ceases operation;;
MODE CONFIRMED;
PARAMETERS successResponse, failureResponse,
failureReason;
WITH INFORMATION SYNTAX
ISO10589-ISIS.ActionInfo;
WITH REPLY SYNTAX ISO10589-ISIS.ActionReply;
REGISTERED AS {ISO10589-ISIS.acoi deactivate (2)};
 
11.2.14 Parameter Definitions
iSO10589-NB-p1 PARAMETER
CONTEXT CREATE-INFO;
WITH SYNTAX ISO10589-ISIS.ISType;
BEHAVIOUR iSO10589-NB-p1-B BEHAVIOUR
DEFINED AS The value to be given to the iStype at
tribute on MO creation. This parameter is manda
tory;;
REGISTERED AS {ISO10589-ISIS.proi
iSO10589-NB-p1 (1)};
 
 
iSO10589Circuit-MO-p1 PARAMETER
CONTEXT CREATE-INFO;
WITH SYNTAX ISO10589-ISIS.CircuitType;
BEHAVIOUR iSO10589Circuit-MO-p1-B
BEHAVIOUR
DEFINED AS The value to be given to the type attrib
ute on MO creation. This parameter is mandatory;;
REGISTERED AS {ISO10589-ISIS.proi
iSO10589Circuit-MO-p1 (2)};
 
reachableAddressP1 PARAMETER
CONTEXT CREATE-INFO;
WITH SYNTAX ISO10589-ISIS.AddressPrefix;
BEHAVIOUR reachableAddressp1-B BEHAVIOUR
DEFINED AS The value to be given to the addressPre
fix attribute on MO creation. This parameter is man
datory;;
REGISTERED AS {ISO10589-ISIS.proi
reachableAddressP1 (3)};
 
reachableAddressP2 PARAMETER
CONTEXT CREATE-INFO;
WITH SYNTAX ISO10589-ISIS.MappingType;
BEHAVIOUR reachableAddressp2-B BEHAVIOUR
DEFINED AS The value to be given to the map
pingType attribute on MO creation. This parameter
is only permitted when the `type' of the parent cir
cuit is either `broadcast' or `DA'.  In those cases the
default value is `manual';;
REGISTERED AS {ISO10589-ISIS.proi
reachableAddressP2 (4)};
 
manualAdjacencyP1 PARAMETER
CONTEXT CREATE-INFO;
WITH SYNTAX ISO10589-ISIS.LANAddress;
BEHAVIOUR manualAdjacencyP1-B BEHAVIOUR
DEFINED AS The value to be given to the lANAd
dress attribute on MO creation;;
REGISTERED AS {ISO10589-ISIS.proi
manualAdjacencyP1 (5)};
 
manualAdjacencyP2 PARAMETER
CONTEXT CREATE-INFO;
WITH SYNTAX ISO10589-ISIS.EndSystemIDs;
BEHAVIOUR manualAdjacencyP2-B BEHAVIOUR
DEFINED AS The value to be given to the endSys
temIDs attribute on MO creation;;
REGISTERED AS {ISO10589-ISIS.proi
manualAdjacencyP2 (6)};
 
successResponse PARAMETER
CONTEXT ACTION-REPLY;
WITH SYNTAX ISO10589-ISIS.ResponseCode;
BEHAVIOUR successResponse-B BEHAVIOUR
DEFINED AS Returned in the responseCode field of
an ActionReply when the action has completed suc
cessfully.;;
REGISTERED AS {ISO10589-ISIS.proi successResponse
(7)};
 
failureResponse PARAMETER
CONTEXT ACTION-REPLY;
WITH SYNTAX ISO10589-ISIS.ResponseCode;
 
BEHAVIOUR failureResponse-B BEHAVIOUR
DEFINED AS Returned in the responseCode field of
an ActionReply when the action failed to complete.
The failureReason parameter is returned with this re
sponseCode, giving additional information;;
REGISTERED AS {ISO10589-ISIS.proi failureResponse
(8)};
 
failureReason PARAMETER
CONTEXT ACTION-REPLY;
WITH SYNTAX ISO10589-ISIS.ActionFailureReason;
BEHAVIOUR failureReason-B BEHAVIOUR
DEFINED AS Gives the reason why an entity failed to
activate or deactivate.;;
REGISTERED AS {ISO10589-ISIS.proi failureReason
(9)};
 
constraintViolation PARAMETER
CONTEXT SPECIFIC-ERROR;
WITH SYNTAX
ISO10589-ISIS.ConstraintViolationReason;
BEHAVIOUR constraintViolation-B BEHAVIOUR
DEFINED AS The specific error returned on failure of
a REPLACE operation when the MO prohibits such
operations under certain conditions, for example
while the MO is in the disabled operational state.;;
REGISTERED AS {ISO10589-ISIS.proi
constraintViolation (10)};
 
notificationReceivingAdjacency PARAMETER
CONTEXT EVENT-INFO;
WITH SYNTAX  
ISO10589-ISIS.LocalDistinguishedName;
BEHAVIOUR notificationReceivingAdjacency-B
BEHAVIOUR
DEFINED AS The local managed object name of the
adjacency upon which the NPDU was received;;
REGISTERED AS {ISO10589-ISIS.proi
notificationReceivingAdjacency (11)};
 
notificationIDLength PARAMETER
CONTEXT EVENT-INFO;
WITH SYNTAX  ISO10589-ISIS.IDLength;
BEHAVIOUR notificationIDLength-B BEHAVIOUR
DEFINED AS The IDLength specified in the ignored
PDU;;
REGISTERED AS {ISO10589-ISIS.proi
notificationIDLength (12)};
 
notificationAreaAddress PARAMETER
CONTEXT EVENT-INFO;
WITH SYNTAX ISO10589-ISIS.AreaAddress;
BEHAVIOUR notificationAreaAddress-B BEHAVIOUR
DEFINED AS The Area Address which caused Maxi
mumAreaAddresses to be exceeded;;
REGISTERED AS {ISO10589-ISIS.proi
notificationAreaAddress (13)};
 
notificationSourceID PARAMETER
CONTEXT EVENT-INFO;
WITH SYNTAX ISO10589-ISIS.SourceID;
 
BEHAVIOUR notificationSourceID-B BEHAVIOUR
DEFINED AS The source ID of the LSP;;
REGISTERED AS {ISO10589-ISIS.proi
notificationSourceID (14)};
 
notificationVirtualLinkChange PARAMETER
CONTEXT EVENT-INFO;
WITH SYNTAX ISO10589-ISIS.VirtualLinkChange;
BEHAVIOUR notificationVirtualLinkChange-B
BEHAVIOUR
DEFINED AS This indicates whether the event was
genrated as a result of the creation or deletion of a
Virtual Link between two Level 2 Intermediate Sys
tems.;;
REGISTERED AS {ISO10589-ISIS.proi
notificationVirtualLinkChange (15)};
 
notificationVirtualLinkAddress PARAMETER
CONTEXT EVENT-INFO;
WITH SYNTAX ISO10589-ISIS.NetworkEntityTitle;
BEHAVIOUR notificationVirtualLinkAddress-B
BEHAVIOUR
DEFINED AS The Network Entity Title of the Level 2
Intermediate System at the remote end of the virtual
link;;
REGISTERED AS {ISO10589-ISIS.proi
notificationVirtualLinkAddress (16)};
 
notificationNewCircuitState PARAMETER
CONTEXT EVENT-INFO;
WITH SYNTAX ISO10589-ISIS.NewCircuitState;
BEHAVIOUR notificationNewCircuitState-B
BEHAVIOUR
DEFINED AS The direction of the Circuit state change
specified as the resulting state. i.e. a change from On
to Off is specified as Off;;
REGISTERED AS {ISO10589-ISIS.proi
notificationNewCircuitState (17)};
 
notificationNewAdjacencyState PARAMETER
CONTEXT EVENT-INFO;
WITH SYNTAX ISO10589-ISIS.NewAdjacencyState;
BEHAVIOUR notificationNewAdjacencyState-B
BEHAVIOUR
DEFINED AS The direction of the Adjacency state
change specified as the resulting state.  i.e. a change
from Up to Down is specified as Down.  Any state
other than Up is considered to be Down.;;
REGISTERED AS {ISO10589-ISIS.proi
notificationNewAdjacencyState (18)};
 
notificationAdjacentSystem PARAMETER
CONTEXT EVENT-INFO;
WITH SYNTAX ISO10589-ISIS.SystemID;
BEHAVIOUR notificationAdjacentSystem-B
BEHAVIOUR
DEFINED AS The system ID of the adjacent system;;
REGISTERED AS {ISO10589-ISIS.proi
notificationAdjacentSystem (19)};
 
notificationReason PARAMETER
CONTEXT EVENT-INFO;
WITH SYNTAX ISO10589-ISIS.Reason;
 
BEHAVIOUR notificationReason-B BEHAVIOUR
DEFINED AS The associated Reason;;
REGISTERED AS {ISO10589-ISIS.proi
notificationReason (20)};
 
notificationPDUHeader PARAMETER
CONTEXT EVENT-INFO;
WITH SYNTAX ISO10589-ISIS.PDUHeader;
BEHAVIOUR notificationPDUHeader-B BEHAVIOUR
DEFINED AS The header of the PDU which caused
the notification;;
REGISTERED AS {ISO10589-ISIS.proi
notificationPDUHeader (21)};
 
notificationCalledAddress PARAMETER
CONTEXT EVENT-INFO;
WITH SYNTAX ISO10589-ISIS.SNPAAddress;
BEHAVIOUR notificationCalledAddres-B
BEHAVIOUR
DEFINED AS The SNPA Address which was being
called when the Adjacency was taken down as a re
sult of a call reject;;
REGISTERED AS {ISO10589-ISIS.proi
notificationCalledAddress (22)};
 
notificationVersion PARAMETER
CONTEXT EVENT-INFO;
WITH SYNTAX ISO10589-ISIS.Version;
BEHAVIOUR notificationVersion-B BEHAVIOUR
DEFINED AS The version number reported by the
other system;;
REGISTERED AS {ISO10589-ISIS.proi
notificationVersion (23)};
 
notificationDesignatedIntermediateSystemChange
PARAMETER
CONTEXT EVENT-INFO;
WITH SYNTAX ISO10589-ISIS.DesignatedISChange;
BEHAVIOUR
notificationDesignatedIntermediateSystemChange-B
BEHAVIOUR
DEFINED AS The direction of the change in Desig
nated Intermediate System status of this system;;
REGISTERED AS {ISO10589-ISIS.proi
notificationDesignatedIntermediateSystemChange
(24)};
 
notificationOverloadStateChange PARAMETER
CONTEXT EVENT-INFO;
WITH SYNTAX ISO10589-ISIS.OverloadStateChange;
BEHAVIOUR notificationOverloadStateChange-B
BEHAVIOUR
DEFINED AS The direction of the change in Overload
status;;
REGISTERED AS {ISO10589-ISIS.proi
notificationOverloadStateChange (25)};
 
11.2.15 Attribute Groups
counters ATTRIBUTE GROUP
DESCRIPTION  The group of all counters;
REGISTERED AS  {ISO10589-ISIS.agoi counters (1)};
 
 
11.2.16 Behaviour Definitions
resettingTimer-B BEHAVIOUR
DEFINED AS This attribute specifies the interval be
tween certain events in the operation of the protocol
state machine.  If the value of this attribute is
changed to a new value t  while the protocol state
machine is in operation, the implementation shall
take the necessary steps to ensure that for any time
interval which was in progress when the correspond
ing attribute was changed, the next expiration of the
that interval takes place t seconds from the original
start of that interval, or immediately, whichever is
later. The precision with which this time shall be im
plemented shall be  the same as that associated with
the basic operation of the timer attribute;
 
replaceOnlyWhileDisabled-B BEHAVIOUR
DEFINED AS This attribute shall only permit the RE
PLACE operation to be performed on it while the
MO is in the Disabled Operational State.  An at
tempt to perform a REPLACE operation while the
MO is in the Enabled Operation State shall fail with
the generation of the constraintViolation specific er
ror.;
 
resourceLimiting-B BEHAVIOUR
DEFINED AS This attribute places limits on some re
source".  In general implementations may allocate
reources up to this limit when the managed object is
enabled and it may be impossible to change the allo
cation without first disabling and re-enabling the
managed object.  Therefore this International Stan
dard only requires that it shall be possible to perform
a REPLACE operation on this attribute while the
MO is disabled.  However some implementations
may be able to to change the allocation of resources
without first disabling the MO.  In this case it is per
mitted to increase the value of the atribute at any
time, but it shall not be decreased below the cur
rently used" value of the resource. Where an at
tempt to perform a REPLACE operation fails either
because the MO is enabled, or because an attempt
has been made to decrease the value, the REPLACE
operation shall fail with the generation of the con
straintViolation specific error.;
11.2.17 ASN1 Modules
ISO10589-ISIS{tbd1}
DEFINITIONS ::= BEGIN
-- object identifier definitions
sc6 OBJECT IDENTIFIER ::= {joint-iso-ccitt sc6(?)}
-- value to be assigned by SC21 secretariat
isisoi OBJECT IDENTIFIER ::= {sc6 iSO10589(?)}
-- value to be assigned by SC6 secretariat
moi OBJECT IDENTIFIER ::= {isisoi objectClass (3)}
poi OBJECT IDENTIFIER ::= {isisoi package (4)}
proi OBJECT IDENTIFIER ::= {isisoi parameter (5)}
nboi OBJECT IDENTIFIER ::= {isisoi nameBinding (6)}
aoi OBJECT IDENTIFIER ::= {isisoi attribute (7)}
agoi OBJECT IDENTIFIER ::= {isisoi attributeGroup
(8)}
acoi OBJECT IDENTIFIER ::= {isisoi action (10)}
noi OBJECT IDENTIFIER ::= {isisoi notification (11)}
 
 
ActionFailureReason ::= ENUMERATED{
reason1(0),
reason2(1)}
-- Note: actual reasons TBS
ActionInfo ::= SET OF Parameter
ActionReply ::= SEQUENCE{
responseCode OBJECT IDENTIFIER,
responseArgs SET OF Parameter OPTIONAL}
AddressPrefix ::=  OCTETSTRING(SIZE(0..20))
AdjacencyState ::= ENUMERATED{
initializing(0),
up(1),
failed(2)}-- was 4 in N5821 , is it required at all?
AreaAddress ::=  OCTETSTRING(SIZE(1..20))
AreaAddresses ::= SET OF AreaAddress
Boolean ::= BOOLEAN
CircuitID ::=  OCTETSTRING(SIZE(1..10))
CompleteSNPInterval ::= INTEGER(1..600)
ConstraintViolationReason ::= OBJECT IDENTIFIER;
DRISISHelloTimer ::= INTEGER(1..65535)
DatabaseState ::= ENUMERATED{
off(0),
on(1),
waiting(2)}
DesignatedISChange ::= ENUMERATED{
resigned(0),
elected(1)}
DefaultESHelloTimer ::= INTEGER(1..65535)
EndSystemIDs ::= SET OF SystemID
GraphicString ::=  GRAPHICSTRING
HelloTimer ::= INTEGER(1..65535)
HoldingTimer ::= INTEGER(1..65535)
HopMetric ::= INTEGER(0..63)
ISISHelloTimer ::= INTEGER(1..65535)
IDLength ::= INTEGER(0..9)
IdleTimer ::= INTEGER(1..65535)
InitialMinimumTimer ::= INTEGER(1..65535)
IntermediateSystemPriority ::= INTEGER(1..127)
ISType ::= ENUMERATED{
level1IS(1),
level2IS(2)}
LANAddress ::=  OCTETSTRING(SIZE(6))
AdjacencyUsageType::= ENUMERATED{
undefined(0),
level1(1),
level2(2),
level1and2(3)}
LocalDistinguishedName ::= CMIP-1.ObjectInstance
-- A suitable free standing definition is requred
LSPID ::=  OCTETSTRING(SIZE(2..11))
MappingType ::= ENUMERATED{
manual(0),
x121(1)}
MaximumBuffers ::= INTEGER(1..65535)
MaximumCallAttempts ::= INTEGER(1..65535)
MaximumLSPGenerationInterval ::= INTEGER(1..65535)
MaximumPathSplits ::= INTEGER(1..32)
MaximumSVCAdjacencies ::= INTEGER(1..65535)
MaximumVirtualAdjacencies ::= INTEGER(0..32)
MetricIncrement ::= INTEGER(0..63)
MetricType ::= ENUMERATED{
internal(0),
external(1)}
MinimumBroadcastLSPTransmissionInterval ::=
INTEGER(1..65535)
MinimumLSPGenerationInterval ::= INTEGER(1..65535)
MinimumLSPTransmissionInterval ::=
 
INTEGER(1..65535)
NeighbourSystemType ::= ENUMERATED{
unknown(0),
endSystem(1),
intermediateSystem(2),
l1IntermediateSystem(3),
l2IntermediateSystem(4)}
NetworkEntityTitle ::=  OCTETSTRING(SIZE(1..19))
NewAdjacencyState ::= ENUMERATED{
down(0),
up(1)}
NewCircuitState ::= ENUMERATED{
off(0),
on(1)}
NonWrappingCounter ::= INTEGER(0..264-1)
NotificationInfo ::= SET OF Parameter
NSAPAddress ::=  OCTETSTRING(SIZE(1..20))
OctetString ::=  OCTETSTRING
OriginatingLSPBufferSize ::= INTEGER(512..1492)
OutputAdjacencies ::= SET OF LocalDistinguishedName
OverloadStateChange ::= ENUMERATED{
on(0),
waiting(1)}
Parameter ::= SEQUENCE{
paramIdOBJECT IDENTIFIER,
paramInfoANY DEFINED BY paramID}
PartialSNPInterval ::= INTEGER(1..65535)
Password ::=  OCTETSTRING(SIZE(0..254)
Passwords ::= SET OF Password
PathMetric ::= INTEGER(0..1023)
PDUHeader ::=  OCTETSTRING(SIZE(0..255))
PollESHelloRate ::= INTEGER(1..65535)
Reason ::= ENUMERATED{
holdingTimerExpired(0),
checksumError(1),
oneWayConnectivity(2),
callRejected(3),
reserveTimerExpired(4),
circuitDisabled(5),
versionSkew(6),
areaMismatch(7),
maximumBroadcastIntermediateSystemsExceeded(8),
maximumBroadcastEndSystemsExceeded(9),
wrongSystemType(10)}
ResponseCode ::= OBJECT IDENTIFIER
RecallTimer ::= INTEGER(1..65535)
ReserveTimer ::= INTEGER(1..65535)
SNPAAddress ::=  
NUMERICSTRING(FROM("0"|"1"|"2"|"3"|"4"|"5"|
"6"|"7"|"8"|"9"))(SIZE(0..15))
-- Up to 15 Digits 0..9
SNPAAddresses ::= SET OF SNPAAddress
CircuitType ::= ENUMERATED{
broadcast(0),
ptToPt(1),
staticIN(2),
staticOut(3),
dA(4)}
SourceID ::=  OCTETSTRING(SIZE(1..10))
SystemID ::=  OCTETSTRING(SIZE(0..9))
VirtualLinkChange ::= ENUMERATED{
deleted(0),
created(1)}
Version ::=  GRAPHICSTRING
WaitingTime ::= INTEGER(1..65535)
maximumPathSplits-Default INTEGER ::= 2
MaximumPathSplits-Permitted ::= INTEGER(1..32)
 
maximumBuffers-Default INTEGER ::= ImpSpecific
MaximumBuffers-Permitted ::= INTEGER(1..ImpSpecific)
minimumLSPTransmissionInterval-Default INTEGER ::=
5
MinimumLSPTransmissionInterval-Permitted ::=
INTEGER(5..30)
maximumLSPGenerationInterval-Default INTEGER ::=
900
MaximumLSPGenerationInterval-Permitted ::=
INTEGER(60..900)
minimumBroadcastLSPTransmissionInterval-Default
INTEGER ::=33
MinimumBroadcastLSPTransmissionInterval-Permitted ::=
INTEGER(1..65535)
completeSNPInterval-Default INTEGER ::= 10
CompleteSNPInterval-Permitted ::= INTEGER(1..600)
originatingL1LSPBufferSize-Default INTEGER ::=
receiveLSPBufferSize
OriginatingL1LSPBufferSize-Permitted ::=
INTEGER(512..receiveLSPBufferSize)
manualAreaAddresses-Default AreaAddresses ::= {}
ManualAreaAddresses-Permitted ::= AreaAddresses
(SIZE(0..MaximumAreaAddresses))
minimumLSPGenerationInterval-Default INTEGER ::= 30
MinimumLSPGenerationInterval-Permitted ::=
INTEGER(5..300)
defaultESHelloTime-Default INTEGER ::= 600
DefaultESHelloTime-Permitted ::= INTEGER(1..65535)
pollESHelloRate-Default INTEGER ::= 50
PollESHelloRate-Permitted ::= INTEGER(1..65535)
partialSNPInterval-Default INTEGER ::= 2
PartialSNPInterval-Permitted ::= INTEGER(1..65535)
waitingTime-Default INTEGER ::= 60
WaitingTime-Permitted ::= INTEGER(1..65535)
dRISISHelloTimer-Default INTEGER ::= 1
DRISISHelloTimer-Permitted ::=  INTEGER(1..65535)
originatingL2LSPBufferSize-Default INTEGER ::=
receiveLSPBufferSize
OriginatingL2LSPBufferSize-Permitted ::=
INTEGER(512..receiveLSPBufferSize)
maximumVirtualAdjacencies-Default INTEGER ::= 2
MaximumVirtualAdjacencies-Permitted ::=
INTEGER(0..32)
helloTimer-Default INTEGER ::= 10
HelloTimer-Permitted ::= INTEGER(1..21845)
defaultMetric-Default INTEGER ::= 20
DefaultMetric-Permitted ::= INTEGER(1..MaxLinkMetric)
optionalMetric-Default INTEGER ::= 0
OptionalMetric-Permitted ::=
INTEGER(0..MaxLinkMetric)
metricType-Default MetricType ::= Internal
iSISHelloTimer-Default INTEGER ::= 3
ISISHelloTimer-Permitted ::= INTEGER(1..21845)
externalDomain-Default BOOLEAN ::= TRUE
l1IntermediateSystemPriority-Default INTEGER ::= 64
L1IntermediateSystemPriority-Permitted ::=
INTEGER(1..127)
callEstablishmentMetricIncrement-Default INTEGER ::= 0
CallEstablishmentMetricIncrement-Permitted ::=
INTEGER(0..MaxLinkMetric)
idleTimer-Default INTEGER ::= 30
IdleTimer-Permitted ::= INTEGER(0..65535)
initialMinimumTimer-Default INTEGER ::= 55
InitialMinimumTimer-Permitted ::= INTEGER(1..65535)
reserveTimer-Default INTEGER ::= 600
ReserveTimer-Permitted ::= INTEGER(1..65535)
maximumSVCAdjacencies-Default INTEGER ::= 1
 
MaximumSVCAdjacencies-Permitted ::=
INTEGER(1..65535)
reservedAdjacency-Default BOOLEAN ::= FALSE
neighbourSNPAAddress-Default INTEGER ::= 0
recallTimer-Default INTEGER ::= 60
RecallTimer-Permitted ::= INTEGER(0..65535)
maximumCallAttempts-Default INTEGER ::= 10
MaximumCallAttempts-Permitted ::= INTEGER(0..255)
manualL2OnlyMode-Default BOOLEAN ::= FALSE
l2IntermediateSystemPriority-Default INTEGER ::= 64
L2IntermediateSystemPriority-Permitted ::=
INTEGER(1..127)
lANAddress-Default LANAddress ::= 000000000000
sNPAAddresses-Default SNPAAddresses::= {}
password-Default Password ::= {}
passwords-Default Passwords ::= {} -- The empty set
END

12 Conformance
12.1 Static Conformance Requirements
12.1.1 Protocol Implementation Conformance
Statement
A Protocol Implementation Conformance Statement (PICS)
shall be completed in respect of any claim for conformance
of an implementation to this International Standard: the
PICS shall be produced in accordance with the relevant
PICS pro-forma in Annex A.
12.1.2 Static Conformance for all ISs
A system claiming conformance to this International Stan
dard shall be capable of:
a)calculating a single minimum cost route to each desti
nation according to 7.2.6 for the default metric speci
fied in 7.2.2;
b)utilising Link State information from a system only
when an LSP with LSP number 0 and remaining life
time>0 is present according to 7.2.5;
c)removing excess paths according to 7.2.7
d)performing the robustness checks according to 7.2.8;
e)constructing a forwarding database according to 7.2.9;
f)if (and only if) Area Partition Repair is supported,
1)performing the operations according to 7.2.10;
2)performing the encapsulation operations in the for
warding process according to 7.4.3.2; and
3)performing the decapsulation operations in the re
ceive process according to 7.4.4;
TEMPORARY NOTE  may need to reor
ganise clause 7.4.4 in order to make it crystal
clear what is required in the receive process in
the presence/absence of partition repair
g)computing area addresses according to 7.2.11;
h)generating local Link State information as required by
7.3.2;
i)including information from Manual Adjacencies ac
cording to 7.3.3.1;
j)if (and only if) Reachable Addresses are supported, in
cluding information from Reachable Addresses ac
cording to 7.3.3.2;
k)generating multiple LSPs according to 7.3.4;
l)generating LSPs periodically according to 7.3.5;
m)generating LSPs on the occurrence of events accord
ing to 7.3.6;
 
n)generating an LSP checksum according to 7.3.11;
o)operating the Update Process according to 7.3.12
7.3.17 including controlling the rate of LSP transmis
sion only for each broadcast circuit (if any) according
to 7.3.15.6;
p)operating the LSP database overload procedures ac
cording to 7.3.19.1;
q)selecting the appropriate forwarding database accord
ing to 7.4.2;
r)forwarding ISO 8473 PDUs according to 7.4.3.1 and
7.4.3.3;
s)operating the receive process according to 7.4.4;
TEMPORARY NOTE  item 1 of the second bulleted
list is only required if you implement partition repair.
We need to reorganise the structure so we can pull
this out.
t)performing on each supported Point-to-Point circuit (if
any):
1)forming and maintaining adjacencies according to
8.2;
u)performing on each supported ISO 8208 circuit (if
any)
1)SVC establishment according to 8.3.2.1 using the
network layer protocols according to 8.3.1;
2)If  Reachable Addresses are supported, the opera
tions specified in 8.3.2.2  8.3.5.6.
3)If call

Estab

lish

ment

Met

ricIncrement greater
than zero are supported, the operations specified in
8.3.5.3.
4)If the Reverse Path Cache is supported, the opera
tions specified in 8.3.3
v)performing on each supported broadcast circuit (if
any)
1)the pseudonode operations according to 7.2.3;
2)controlling the rate of LSP transmission according
to 7.3.15.6;
3)the operations specified in  8.4.18.4.4 and 8.4.6;
4)the operations specified in 8.4.5.
w)constructing and correctly parsing all PDUs according
to clause 9;
x)providing a system environment in accordance with
clause 10;
y)being managed via the system management attributes
defined in clause 11. For all attributes referenced inthe
normative text, the default value (if any) shall be sup
ported. Other values shall be supported if referenced
in a  REQUIRED VALUES clause of the GDMO
definition;
 
z)If authentication procedures are implemented:
1)the authentication field processing functions of
clauses 7.3.77.3.10, 7.3.15.17.3.15.4, 8.2.3
8.2.4, and 8.4.1.1;
2)the Authentication Information field of the
PDU in clauses 9.59.13.
12.1.3  Static Conformance Requirements for
level 1 ISs
A system claiming conformance to this International Stan
dard as a level 1 IS shall conform to the requirements of
12.1.2 and in addition shall be capable of
a)identifying the nearest Level 2 IS according to 7.2.9.1;
b)generating Level 1 LSPs according to 7.3.7;
c)generating Level 1 pseudonode LSPs for each sup
ported broadcast circuit (if any) according to 7.3.8;
d)performing the actions in Level 1 Waiting State ac
cording to 7.3.19.2
12.1.4 Static Conformance Requirements for
level 2 ISs
A system claiming conformance to this International Stan
dard as a level 2 IS shall conform to the requirements of
12.1.2 and in addition shall be capable of
a)setting the attached flag according to 7.2.9.2;
b)generating Level 2 LSPs according to 7.3.9;
c)generating Level 2 pseudonode LSPs for each sup
ported broadcast circuit (if any) according to 7.3.10;
d)performing the actions in Level 2 Waiting State ac
cording to 7.3.19.3.
12.2 Dynamic Conformance
12.2.1 Receive Process Conformance
Requirements
Any protocol function supported shall be implemented in
accordance with 7.4.4.
12.2.2 Update Process Conformance
Requirements
Any protocol function supported shall be implemented in
accordance with 7.3 and its subclauses.
Any PDU transmitted shall be constructed in accordance
with the appropriate subclauses of 9.
 
12.2.3 Decision Process Conformance
Requirements
Any protocol function supported shall be implemented in
accordance with 7.2 and its subclauses.
12.2.4 Forwarding Process Conformance
Requirements
Any protocol function supported shall be implemented in
accordance with 7.4  and its subclauses.
12.2.5 Performance Requirements
This International Standard requires that the following per
formance criteria be met. These requirements apply regard
less of other demands on the system; if an Intermediate sys
tem has other tasks as well, those will only get resources
not required to meet these criteria.
Each Intermediate system implementation shall specify (in
its PICS):
a)the maximum number of other Intermediate systems it
can handle. (For L1 Intermediate systems that means
Intermediate systems in the area; for L2 Intermediate
systems that is the sum of Intermediate systems in the
area and Intermediate systems in the L2 subdomain.)
Call this limit N.
b)the maximum supported forwarding rate in ISO 8473
PDUs per second.
12.2.5.1 Performance requirements on the Update
process
The implementation shall guarantee the update process
enough resources to process N LSPs per 30 seconds. (Re
sources = CPU, memory, buffers, etc.)
In a stable topology the arrival of a single new LSP on a
circuit shall result in the propagation of that new LSP over
the other circuits of the IS within one second, irrespective
of the forwarding load for ISO 8473 data PDUs.    
12.2.5.2 Performance requirement on the Decision
process  
The implementation shall guarantee the decision process
enough resources to complete (i.e. start to finish) within 5
seconds, in a stable topology while forwarding at the maxi
mum rate. (For L2 Intermediate Systems, this applies to the
two levels together, not each level separately.)    
12.2.5.3 Reception and Processing of PDUs
An ideal Intermediate system would be able to correctly
process all PDUs, both control and data, with which it was
presented, while simultaneously running the decision proc
ess and responding to management requests. However, in
the implementations of real Intermediate systems some
compromises must be made. The way in which these com
promises are made can dramatically affect the correctness
 
of operation of the Intermediate system. The following gen
eral principles apply.
a)A stable topology should result in stable routes when
forwarding at the maximum rated forwarding rate.
b)Some forwarding progress should always be made (al
beit over incorrect routes) even in the presence of a
maximally unstable topology.
In order to further characterise the required behaviour, it is
necessary to identify the following types of traffic.
a)IIH traffic. This traffic is important for maintaining In
termediate system adjacencies and hence the Interme
diate system topology. In order to prevent gratuitous
topology changes it is essential that Intermediate sys
tem adjacencies are not caused to go down errone
ously. In order to achieve this no more than
ISISHoldingMultiplier - 1 IIH PDUs may be
dropped between any pair of Intermediate systems. A
safer requirement is that no IIH PDUs are dropped.
The rate of arrival of IIH PDUs is approximately con
stant and is limited on Pointto-Point links to 1/iSIS


Hello

Timer and on LANs to a value of approxi
mately 2(n/iSIS

Hello

Timer) + 2, where n is the
number of Intermediate systems on the LAN (assum
ing the worst case that they are all Level 2 Intermedi
ate systems).
b)ESH PDU traffic. This traffic is important for main
taining End system adjacencies, and has relatively low
processing latency. As with IIH PDUs, loss of End
system adjacencies will cause gratuitous topology
changes which will result in extra control traffic.
The rate of arrival of ESH PDUs on Pointto-Point
links is limited to approximately 1/Default

ES

Hello


Timer under all conditions. On LANs the background
rate is approximately n/DefaultESHelloTimer
where n is the number of End systems on the LAN.
The maximum rate during polling is limited to ap
proximately n/pollESHelloRate averaged over a pe
riod of about 2 minutes. (Note that the actual peak ar
rival rate over a small interval may be much higher
than this.)
c)LSP (and SNP) traffic. This traffic will be
retransmitted indefinitely by the update process if it is
dropped, so there is no requirement to be able to proc
ess every received PDU. However, if a substantial
proportion are lost, the rate of convergence to correct
routes will be affected, and bandwidth and processing
power will be wasted.
On Point-to-Point links the peak rate of arrival is lim
ited only by the speed of the data link and the other
traffic flowing on that link. The maximum average
rate is determined by the topology.
On LANs the rate is limited at a first approximation to
a maximum rate of  1000/min

i

mum

Broad

cast

LSP


Trans

mis

sion

Int

er

val, however it is possible that
this may be multiplied by a factor of up to n, where n
is the number of Intermediate systems on the LAN, for
 
short periods. A Intermediate system shall be able to
receive and process at least the former rate without
loss, even if presented with LSPs at the higher rate.
(i.e. it is permitted to drop LSPs, but must process at
least 1000/min

i

mum

Broad

cast

LSP

Trans

mis

sion


Int

er

val per second of those presented.)
The maximum background rate of LSP traffic (for a
stable topology) is dependent on the maximum sup
ported configuration size and the settings of
maximumLSPGenerationInterval. For these pur
poses the default value of 900 seconds can be as
sumed. The number of LSPs per second is then very
approximately (n1 + n2 +ne/x)/900 where n1 is the
number of level 1 Intermediate systems, n2 the num
ber of level 2 Intermediate systems, ne the number of
End system IDs and x the number of ID which can be
fitted into a single LSP.
NOTE  This gives a value around 1 per second for
typical maximum configurations of:
4000 IDs
100 L1 Intermediate systems per area
400 L2 Intermediate systems.
d)Data Traffic. This is theoretically unlimited and can
arrive at the maximum data rate of the Pointto-Point
link or LAN (for ISO 8802.3 this is 14,000 PDUs per
second). In practice it will be limited by the operation
of the congestion avoidance and control algorithms,
but owing to the relatively slow response time of these
algorithms, substantial peaks are likely to occur.
An Intermediate system shall state in its PICS its
maximum forwarding rate. This shall be quoted under
at least the following conditions.
1)A stable topology of maximum size.
2)A maximally unstable topology. This figure shall
be non-zero, but may reasonably be as low as 1
PDU per second.
The following constraints must be met.
a)The implementation shall be capable of receiving the
maximum rate of ISH PDUs without loss whenever
the following conditions hold
1)The data forwarding traffic rate averaged over any
period of one second does not exceed the rate
which the implementation claims to support
2)The ESH and LSP rates do not exceed the back
ground (stable topology) rate.
b)If it is unavoidable that PDUs are dropped, it is a goal
that the order of retaining PDUs shall be as follows
(i.e. It is least desirable for IIH PDUs to be dropped).
1)IIH PDUs
2)ESH PDUs
3)LSPs and SNPs
4)data PDUs.
 
However, no class of traffic shall be completely
starved. One way to achieve this is to allocate a queue
of suitable length to each class of traffic and place the
PDUs onto the appropriate queue as they arrive. If the
queue is full the PDUs are discarded. Processor re
sources shall be allocated to the queues to ensure that
they all make progress with the same priorities as
above. This model assumes that an implementation is
capable of receiving PDUs and selecting their correct
queue at the maximum possible data rate (14,000
PDUs per second for a LAN). If this is not the case,
reception of data traffic at a rate greater than some
limit (which must be greater than the maximum rated
limit) will cause loss of some IIH PDUs even in a sta
ble topology. This limit shall be quoted in the PICS if
it exists.
NOTE - Starting from the stable topology condition at maxi
mum data forwarding rate, an increase in the arrival rate of
data PDUs will initially only cause some data NPDUs to be
lost. As the rate of arrival of data NPDUs is further in
creased a point may be reached at which random PDUs are
dropped. This is the rate which must be quoted in the PICS
12.2.5.4 Transmission
Sufficient processor resources shall be allocated to the
transmission process to enable it to keep pace with recep
tion for each PDU type. Where prioritisation is required, the
same order as for reception of PDU types applies.
 
 
Annex A
PICS Proforma
(This annex is normative)
 
A.1 Introduction
The supplier of a protocol implementation which is claimed
to conform to International Standard ISO 10589, whether as
a level 1 or level 2 Intermediate system implementation,
shall complete the applicable Protocol Implementation
Conformance Statement (PICS) proforma.
A completed PICS proforma is the PICS for the implemen
tation in question. The PICS is a statement of which capa
bilities and options of the protocol have been implemented.
The PICS can have a number of uses, including use:
-by the protocol implementor, as a check-list to reduce
the risk of failure to conform to the standard through
oversight;
-by the supplier and acquirer  or potential acquirer
 of the implementation, as a detailed indication of
the capabilities of the implementation, stated relative
to the common basis for understanding provided by
the standard PICS proforma;
-by the user  or potential user  of the implementa
tion, as a basis for initially checking the possibility of
interworking with another implementation (note that,
while interworking can never be guaranteed, failure to
interwork can often be predicted from incompatible
PICS's);
-by a protocol tester, as the basis for selecting appropri
ate tests against which to assess the claim for
conformance of the implementation.
A.2 Abbreviations and Special Symbols
A.2.1 Status-related symbols
M mandatory
O optional
O.<n> optional, but support of at least one of the
group of options labelled by the same numeral
<n> is required.
X prohibited
not applicable
c.<p> conditional requirement, according to condi
tion <p>
 
 
A.3 Instructions for Completing the
PICS Proformas
A.3.1 General structure of the PICS proforma
The first part of the PICS proforma  Implementation
Identification and Protocol Summary  is to be completed
as indicated with the information necessary to identify fully
both the supplier and the implementation.
The main part of the PICS proforma is a fixed-format ques
tionnaire divided into subclauses each containing a group of
individual items. Answers to the questionnaire items are to
be provided in the rightmost column, either by simply
marking an answer to indicate a restricted choice (usually
Yes or No), or by entering a value or a set or range of val
ues. (Note that there are some items where two or more
choices from a set of possible answers can apply: all rele
vant choices are to be marked.)
Each item is identified by an item reference in the first col
umn; the second column contains the question to be an
swered; the third column contains the reference or refer
ences to the material that specifies the item in the main
body of the standard. the remaining columns record the
status of the item  whether support is mandatory, optional
or conditional  and provide the space for the answers: see
A.3.4  below.
A supplier may also provide  or be required to provide  
further information, categorised as either Additional Infor
mation or Exception Information. When present, each kind
of further information is to be provided in a further sub
clause of items labelled A<i> or X<i> respectively for
cross-referencing purposes, where <i> is any unambiguous
identification for the item (e.g. simply a number): there are
no other restrictions on its format and presentation.
A completed PICS proforma, including any Additional In
formation and Exception Information, is the Protocol Im
plementation Conformance Statement for the implementa
tion in question.
NOTE - Where an implementation is capable of being con
figured in more than one way, a single PICS may be able to
describe all such configurations. However, the supplier has
the choice of providing more than one PICS, each covering
some subset of the implementation's configuration capabili
ties, in case this makes for easier and clearer presentation of
the information.
A.3.2 Additional Information
Items of Additional Information allow a supplier to provide
further information intended to assist the interpretation of
the PICS. It is not intended or expected that a large quantity
will be supplied, and a PICS can be considered complete
 
without any such information. Examples might be an out
line of the ways in which a (single) implementation can be
set up to operate in a variety of environments and configu
rations.
References to items of Additional information may be en
tered next to any answer in the questionnaire, and may be
included in items of Exception Information.
A.3.3 Exception Information
It may occasionally happen that a supplier will wish to an
swer an item with mandatory or prohibited status (after any
conditions have been applied) in a way that conflicts with
the indicated requirement. No pre-printed answer will be
found in the Support column for this, but the Supplier may
write the desired answer into the Support column. If this is
done, the supplier is required to provide an item of Excep
tion Information containing the appropriate rationale, and a
cross-reference from the inserted answer to the Exception
item.
An implementation for which an Exception item is required
in this way does not conform to ISO 10589.
NOTE - A possible reason for the situation described above
is that a defect report is being progressed, which is expected
to change the requirement that is not met by the implemen
tation.
A.3.4 Conditional Status
A.3.4.1 Conditional items
The PICS proforma contains a number of conditional items.
These are items for which the status  mandatory, optional
or prohibited  that applies is dependent upon whether or
not certain other items are supported, or upon the values
supported for other items. In many cases, whether or not the
item applies at all is conditional in this way, as well as the
status when the item does apply.
Individual conditional items are indicated by a conditional
symbol in the Status column as described in A.3.4.2 below.
Where a group of items are subject to the same condition
for applicability, a separate preliminary question about the
condition appears at the head of the group, with an instruc
tion to skip to a later point in the questionnaire if the Not
Applicable answer is selected.
A.3.4.2 Conditional symbols and conditions
A conditional symbol is of the form c.<n> or c.G<n> where
<n> is a numeral. For the first form, the numeral identifies
a condition appearing in a list at the end of the subclause
containing the item. For the second form, c.G<n>, the nu
meral identifies a condition appearing in the list of global
conditions at the end of the PICS.
A simple condition is of the form:if <p> then <s1> else <s2>
 
where <p> is a predicate (see A.3.4.3 below), and <s1> and
<s2> are either basic status symbols (M,O,O.<n>, or X) or
 
the symbol . An extended condition is of the formif <p1> then <s1> else <s2>
else if <p2> then <s2>
[else if <p3> ...]
else <sn>
 
where <p1> etc. are predicates and <s1> etc. are basic
status symbols or .
The status symbol applicable to an item governed by a sim
ple condition is <s1> if the predicate of the condition is
true, and <s2> otherwise; the status symbol applicable to an
item governed by an extended condition is <si> where <pi>
is the first true predicate, if any, in the sequence <p1>,
<p2>..., and <sn> if no predicate is true.
A.3.4.3 Predicates
A simple predicate in a condition is either
a)a single item reference; or
b)a relation containing a comparison operator (=, <, etc.)
with one (or both) of its operands being an item refer
ence for an item taking numerical values as its answer.
In case (a) the predicate is true if the item referred to is
marked as supported, and false otherwise. In case (b), the
predicate is true if the relation holds when each item refer
ence is replaced by the value entered in the Support column
as answer to the item referred to.
Compound predicates are boolean expressions constructed
by combining simple predicates using the boolean operators
AND, OR and NOT, and parentheses, in the usual way. A
compound predicate is true if and only if the boolean ex
pression evaluates to true when the simple predicates are in
terpreted as described above.
Items whose references are used in predicates are indicated
by an asterisk in the Item column.
A.3.4.4 Answering conditional items
To answer a conditional item, the predicate(s) of the condi
tion is (are) evaluated as described in A.3.4.3 above, and
the applicable status symbol is determined as described in
A.3.4.2. If the status symbol is  this indicates that the
item is to be marked in this case; otherwise, the Support
column is to be completed in the usual way.
When two or more basic status symbols appear in a condi
tion for an item, the Support column for the item contains
one line for each such symbol, labelled by the relevant sym
bol. the answer for the item is to be marked in the line la
belled by the symbol selected according to the value of the
condition (unselected lines may be crossed out for added
clarity).
For example, in the item illustrated below, the N/A column
would be marked if neither predicate were true; the answer
 
line labelled M: would be marked if item A4 was marked as supported,
and the answer line labelled O: would be marked if
the condition including items D1 and B52 applied.Item
 
References
Status
N/A
Support
H3
Is ... supported?
42.3(d)
C.1
 
M: Yes  
O:  Yes    No
C.1if A4 then M
else if D1 AND (B52 < 3) then O else
 
 
A.4 Identification
A.4.1 Implementation IdentificationSupplierContact point for
queriesabout this PICSImplementation Name(s)and Version(s)Operating
systemName(s and Version(s)Other Hardware and Operating
SystemsClaimedSystem Name(s)(if different)Notes:
a)Only the first three items are required for all implementations; others may be
completed as appropriate in meeting the requirements for full identification.
b)The terms Name and Version should be interpreted appropriately to correspond
with a supplier's terminology (using, e.g., Type, Series, Model)
 
A.4.2 Protocol Summary: ISO 10589:19xxProtocol VersionAddenda
Implemented(if applicable)AmmendmentsImplementedDate of StatementHave
any Exception items been required (see A.3.3)? No Yes
(The answer Yes means that the implementation does not conform to ISO 10589)
 
 
PICS Proforma: Item
 
References
Status
N/A
Support
AllIS
Are all basic ISIS routeing functions
implemented?
12.1.2
M
 
M: Yes  
 
C.1if L2IS then O else
C.2if 8208 then O else
PartitionRe
pair
Is Level 1 Partition Repair imple
mented?
12.1.2.f
C.1
 
O:  Yes    No
L1IS
Are Level 1 ISIS routeing functions
implemented?
12.1.3
M
 
M: Yes  
L2IS
Are Level 2 ISIS routeing functions
implemented?
12.1.4
O
 
O:  Yes    No
PtPt
Are point-to-point circuits imple
mented?
12.1.2.t
O.1
 
O:  Yes    No
8208
Are ISO 8208  circuits implemented?
12.1.2.u
O.1
 
O:  Yes    No
LAN
Are broadcast  circuits implemented?
12.1.2.v
O.1
 
O:  Yes    No
EqualCost
Paths
Is computation of equal minimum cost
paths implemented?
7.2.6
O
 
O:  Yes    No
Downstream
Is computation of downstream routes
implemented?
7.2.6
O
 
O:  Yes    No
DelayMetric
Is path computation based on the delay
metric implemented?
7.2.2
O
 
O:  Yes    No
ExpenseMet
ric
Is path computation based on the Ex
pense metric implemented?
7.2.2
O
 
O:  Yes    No
Prefixes
Are Reachable Address Prefixes imple
mented?
12.1.2.j
C.1
 
O:  Yes    No
Forward


ingRate
How many ISO 8473 PDUs can the im
plementation forward per second?
12.2.5.1.b
M
 
           PDUs/sec            
L2 ISCount
How many Level 2 ISs does the imple
mentation support?
12.2.5.1.
C.1
 
N =            
call

Estab

lish


ment

Met


ricIncrement
Are non-zero values of the call

Estab


lish

ment

Met

ricIncrement supported?
12.1.2.u.3
C.2
 
O:  Yes    No
L1 ISCount
How many Level 1 ISs does the imple
mentation support?
12.2.5.1.
M
 
N =            
ReversePath
Cache
Is the 8208 Reverse Path Cache sup
ported?
12.1.2.u.4
C.2
 
O:  Yes    No
ErrorMetric
Is path computation based on the Error
metric implemented?
7.2.2
O
 
O:  Yes    No
ISO 10589:19xx
 
PICS Proforma: Item
 
References
Status
N/A
Support
C.1if L2IS then O else
C.2if 8208 then O else
ID field
Length
What values of the routeingDomain


ID

Length are supported by this imple
mentation?
7.1.1
M
 
Values =            
Is the value Se
table by System
Man

agement?
Yes    No
PDU Authen
tication
Is PDU Authentication based on Pass
words implemented?
12.1.2.z
O
 
O:  Yes    No
ISO 10589:19xx (continued)
 
Annex B
Supporting Technical Material
(This annex is informative)
 
B.1 Matching of Address Prefixes
The following example shows how address prefixes may be
matched according to the rules defined in 7.1.4.
The prefix
37-123
matches both the full NSAP addresses
37-1234::AF< and
37-123::AF<
which are encoded as
3700000000001234AF< and
3700000000000123AF<
respectively.
This can be achieved by first converting the address to be
compared to an internal decoded form (i.e. any padding, as
indicated by the particular AFI, is removed), which corre
sponds to the external representation of the address. The
position of the end of the IDP must be marked, since it can
no longer be deduced. This is done by inserting the semi-
octet F after the last semi-octet of the IDP. (There can be
no confusion, since the abstract syntax of the IDP is deci
mal digits).
Thus the examples above become in decoded form
371234FAF< and
37123FAF<
 and the prefix 37-123 matches as a leading sub-string of
both of them.
For comparison purposes the prefix is converted to the in
ternal decoded form as above.
B.2 Addressing and Routeing
In order to ensure the unambiguous identification of Net
work and Transport entities across the entire OSIE, some
form of address administration is mandatory. ISO
8348/Add.2 specifies a hierarchical structure for network
addresses, with a number of top-level domains responsible
for administering addresses on a world-wide basis. These
address registration authorities in turn delegate to sub-
authorities the task of administering portions of the address
space. There is a natural tendency to repeat this sub-
division to a relatively fine level of granularity in order to
ease the task of each sub-authority, and to assign responsi
bility for addresses to the most localised administrative
 
body feasible. This results in (at least in theory) reduced
costs of address administration and reduced danger of mas
sive address duplication through administrative error. Fur
thermore, political factors come into play which require the
creation of sub-authorities in order to give competing inter
ests the impression of hierarchical parity. For example at
the top level of the ISO geographic address space, every
country is assigned an equally-sized portion of the address
space even though some countries are small and might in
practice never want to undertake administration of their
own addresses. Other examples abound at lower levels of
the hierarchy, where divisions of a corporation each wish to
operate as an independent address assignment authority
even though this is inefficient operationally and may waste
monumental amounts of potential address space.
If network topologies and traffic matrices aligned naturally
with the hierarchical organisation of address administration
authorities, this profligate use of hierarchy would pose little
problem, given the large size (20 octets) of the N-address
space. Unfortunately, this is not usually the case, especially
at higher levels of the hierarchy. Network topologies may
cross address administration boundaries in many cases, for
example:
-Multi-national Corporations with a backbone network
that spans several countries
-Community-of-interest networks, such as academic or
research networks, which span organisations and ge
ographies
-Military networks, which follow treaty alignments
rather than geographic or national administrations
-Corporate networks where divisions at times operate
as part of a contractor's network, such as with trade
consortia or government procurements.
These kinds of networks also exhibit rich internal topolo
gies and large scale (105 systems), which require sophisti
cated routeing technology such as that provided by this In
ternational Standard. In order to deploy such networks ef
fectively, a considerable amount of address space must be
left over for assignment in a way which produces efficient
routes without undue consumption of memory and
bandwidth for routeing overhead11This is just a fancy way of saying
that hierarchical routing, with its natural effect on address
assignment, is a mandatory requirement for such net
works.
.
Similarly important is the inter-connection of these net
works via Inter-domain routeing technology. If all of the as
signment flexibility of the addressing scheme is exhausted
in purely administrative hierarchy (at the high-order end of
the address) and in Intra-Domain routeing assignment (at
the low end of the address) there may be little or no address
 
space left to customise to the needs of inter-domain routing.
The considerations for how addresses may be structured for
the Intra- and Inter-domain cases are discussed in more de
tail in the following two clauses.
B.2.1 Address Structure for Intra-domain
Routeing
The IS-IS Intra-domain routeing protocol uses a preferred
addressing scheme. There are a number of reasons the de
signers of this protocol chose to specify a single address
structure, rather than leaving the matter entirely open to the
address assignment authorities and the routeing domain ad
ministrators:
a)If one address structure is very common and known a
priori, the forwarding functions can be made much
faster;
b)If part of the address is known to be assigned locally
to an end system, then the routeing can be simpler, use
less memory, and be potentially faster, by not having
to discriminate based on that portion of the address.
c)If part of the address can be designated as globally
unique by itself (as opposed to only the entire address
having this property) a number of benefits accrue:
1)Errors in address administration causing duplicate
addresses become much less likely
2)Automatic and dynamic NSAP address assignment
becomes feasible without global knowledge or
synchronisation
3)Routeing on this part of the address can be made
simple and fast, since no address collisions will oc
cur in the forwarding database.
d)If a part of the address can be reserved for assignment
purely on the basis of topological efficiency (as op
posed to political or address administration ease), hier
archical routeing becomes much more memory and
bandwidth efficient, since the addresses and the topol
ogy are in close correspondence.
e)If an upper bound can be placed on the amount of ad
dress space consumed by the Intra-domain routeing
 
scheme, then the use of address space by Inter-domain
routeing can be made correspondingly more flexible.
The preferred address format of the Intra-domain ISIS
protocol achieves these goals by being structured into two
fixed-sized fields as follows shown in figure 91#ID#81Used by level 1
routeingKey:Used by level 2 routeingID
SEL
HO-DSP
IDP
IDP Initial Domain Part
HO-DSP High Order Domain Specific Part
ID System Identifier
SEL NSAP Selector
Figure 9 - Preferred Address Format
 
 below:
The field marked IDP in the figure is precisely the IDP
specified in  ISO 8348/Add.2. The field marked HO-DSP
is that portion of the DSP from ISO 8348/Add.2 whose
structure, assignment, and meaning are not specified or
constrained by the Intra-domain ISIS routeing protocol.
However, the design presumes that the routeing domain ad
ministrator has at least some flexibility in assigning a por
tion of the HO-DSP field. The purpose and usage of the
fields specified by the Intra-domain ISIS routeing protocol
is explained in the following paragraphs.
B.2.1.1 The IDP + HO-DSP
Since the Intra-domain ISIS protocol is customised for op
eration with ISO 8473, all addresses are specified to use the
preferred binary encoding of ISO 8348/Add.2.
B.2.1.2 The Selector (SEL) Field
The SEL field is intended for two purposes. Its main use is
to allow for multiple higher-layer entities in End systems
(such as multiple transport entities) for those systems which
need this capability. This allows up to 256 NSAPs in a sin
gle End system. The advantage of reserving this field exclu
sively for local system administration the Intra-domain
routing functions need not store routeing information about,
nor even look at this field. If each individual NSAP were
represented explicitly in routing tables, the size of these ta
bles would grow with the number of NSAPs, rather than
with the number of End systems. Since Intra-domain rout
ing routes to systems, explicit recording of each NSAP
brings no efficiency benefit and potentially consumes large
amounts of memory in the Intermediate systems.
A second use for the SEL field is in Intermediate systems.
Certain ISIS functions require that PDUs be encapsulated
and sent to the Network Entity in an Intermediate system
rather than to an NSAP and upward to a Transport entity.
An example of this is the Partition Repair function of this
International Standard. In order to use a level 2 path as if it
were a single subnetwork in a level 1 area, PDUs are encap
 
sulated and addressed to an IS on the other side of the parti
tion11This is a gross oversimplification for the purpose of
illustrating the need for the SEL field. See 7.2.10.
.  By reserving certain values of the SEL field in Inter
mediate systems for direct addressing of Intermediate sys
tem Network entities, the normal addressing and relaying
functions of other Intermediate systems can be transpar
ently used for such purposes.
B.2.1.3 The Identifier (ID) Field
The ID field is a flat, large identifier space for identifying
OSI systems. The purpose of this field is to allow very fast,
simple routeing to a large (but not unconstrained) number
of End systems in a routeing domain. The Intra-Domain IS
IS protocol uses this field for routeing within a area. While
this field is only required to be unambiguous within a single
area, if the values are chosen to be globally unambiguous
the Intra-domain ISIS design can exploit this fact in the
following ways.
First, a certain amount of parallelism can be obtained dur
ing relaying. An IS can be simultaneously processing the ID
field along with other fields (i.e. IDP, HO-DSP). If the ID
is found in the forwarding table, the IS can initiate forward
ing while checking to make sure that the other fields have
the expected value. Conversely, if the ID is not found the
IS can assume that either the addressed NSAP is unreach
able or exists only in some other area or routeing domain.
In the case where the ID is not globally unique, the for
warding table can indicate this fact and relaying delayed
until the entire address is analysed and the route looked up.
Second, a considerable savings can be obtained in manual
address administration for all systems in the routeing do
main. If the ID is chosen from the ISO 8802 48-bit address
space, the ID is known to be globally unique. Furthermore,
since LAN systems conforming to ISO 8802 often have
their 48-bit MAC address stored in ROM locally, each sys
tem can be guaranteed to have a globally unambiguous
NET and NSAP(s) without centralised address administra
tion at the area level.22Note, however, that the use of the ISO 8802
addresses does not avoid the necessity to run ISO 9542 or to maintain
tables mapping NSAP addresses to
MAC (i.e. SNPA) addresses on the ISO 8802 subnetwork. This is because
there is no guarantee that a particular MAC address is always enabled (the LAN
controller may be turned off) or that a system has only a single MAC address.
  This not only eliminates administra
tive overhead, but also drastically reduces the possibility of
duplicate NSAP addresses, which are illegal, difficult to di
agnose, and often extremely difficult to isolate.
An alternative to a large, flat space for the lowest level of
routeing would be to hierarchically subdivide this field to
allow more levels of routeing within a single routeing do
main. The designers of the Intra-domain ISIS protocol
considered that this would lead to an inferior routeing archi
tecture, since:
a)The cost of memory in the ISs was sufficiently reason
able that large (e.g. 104 system) areas were quite fea
sible, thus requiring at least 2 octets per level to ad
dress
b)Two levels of routeing within a routeing domain were
sufficient (allowing domains of 106107 systems) be
cause it was unlikely that a single organisation would
wish to operate and manage a routeing domain much
larger than that.
 
c)Administrative boundaries often become the dominant
concern once routeing domains reach a certain size.
d)The additional burdens and potential for error in man
ual address assignment were deemed serious enough
to permit the use of a large, flat space.
B.3 Use of the HO-DSP field in
Intra-domain routeing
Use of a portion of the HO-DSP field provides for hierar
chical routeing within a routeing domain. A value is as
signed to a set of ISs in order to group the ISs into a single
area for the usual benefits of hierarchical routeing:
a)Limiting the size of routeing tables in the ISs;
b)conserving bandwidth by hierarchical summarisation
of routeing information;
c)designating portions of the network which are to have
optimal routeing within themselves; and
d)moderate firewalling of portions of the routeing do
main from failures in other portions.
It is important to note that the assignment of HO-DSP val
ues is intended to provide the routeing domain administra
tor with a mechanism to optimise the routeing within a
large routeing domain. The Intra-domain ISIS designers
did not intend the HO-DSP to be entirely consumed by
many levels of address registration authority. Reserving the
assignment of a portion of the HO-DSP field to the route
ing domain administrator also allows the administrator to
start with a single assigned IDP+HO-DSP and run the
routing domain as a single area. As the routeing domain
grows, the routeing domain administrator can then add ar
eas without the need to go back to the address administra
tion authority for further assignments. Areas can be added
and re-assigned within the routeing domain without involv
ing the external address administration authority.
A useful field to reserve as part of the HO-DSP would be 2
octets,permitting up to 65,536 areas in a routeing domain.
This is viewed as a reasonable compromise between route
ing domain size and address space consumption. The field
may be specified as flat for the same reasons that the ID
field may be flat.
B.3.1 Addressing considerations for
Inter-domain Routeing
It is in the Inter-domain arena where the goals of routeing
efficiency and administrative independence collide most
strongly. Although the OSI Routeing Framework explicitly
gives priority in Inter-domain routeing to considerations of
autonomy and firewalls over efficiency, it must be feasible
to construct an Inter-Domain topology that both produces
isolable domains and relays data at acceptable cost. Since
 
no routeing information is exchanged across domain
boundaries with static routeing, the practicality of a given
Inter-domain topology is essentially determined by the size
of the routeing tables that are present at the boundary ISs. If
these tables become too large, the memory needed to store
them, the processing needed to search them, and the
bandwidth needed to transmit them  within the routeing do
main all combine to disallow certain forms of
interconnection.
Inter-domain routeing primarily computes routes to other
routeing domains33This International Standard also uses static
Inter-domain tables for routeing to individual End systems across
dynamically assigned circuits, and also to
End systems whose addresses do not conform to the address construction rules.
. If there is no correspondence between
the address registration hierarchy and the organisation of
routeing domains (and their interconnection) then the task
of static table maintenance quickly becomes a nightmare,
since each and every routeing domain in the OSIE would
need a table entry potentially at every boundary IS of every
other routeing domain. Luckily, there is some reason to be
lieve that a natural correspondence exists, since at least at
the global level the address registration authorities fall
within certain topological regions. For example, most of the
routeing domains which obtained their IDP+HO-DSP
from a hierarchy of French authorities are likely to reside in
France and be more strongly connected with other routeing
domains in France that with routeing domains in other
countries.
There are enough exceptions to this rule, however, to be a
cause for concern. The scenarios cited in B.2 all exist today
and may be expected to remain common for the foreseeable
future. Consider as a practical case the High Energy Phys
ics Network (HEPnet), which contains some 17000 End
systems, and an unknown number of intermediate systems44The number of
ISs is hard to estimate since some ISs and links are in fact shared
with other networks, such as the similarly organised NASA Space
Physics network, or SPAN.
.
This network operates as a single routeing domain in order
to provide a known set of services to a known community
of users, and is funded and cost-justified on this basis. This
network is international in scope (at least 10 countries in
North America, Europe, and the far east) and yet its topol
ogy does not map well onto existing national boundaries.
Connectivity is richer between CERN and FERMIlab, for
example than between many points within the U.S.
More importantly, this network has rich connectivity with a
number of other networks, including the PDNs of the vari
ous countries, the NSFnet in the U.S., the international
ESnet (Energy Sciences Network), the general research
Internet, and military networks in the U.S. and elsewhere.
None of these other networks shares a logical part of the
NSAP address hierarchy with HEPnet55It is conceivable that ISO would
sanction such networks by assigning a top-level IDI from the ISO
non-geographic AFI, but this is unlikely and would
only exacerbate the problem if many such networks were assigned
top-level registrations.
 .  If the only method
of routing from the HEPnet to these other networks was to
place each within one and only one of the existing registra
tion authorities, and to build static tables showing these re
lationships, the tables would clearly grow as O(n2).
It seems therefore, that some means must be available to as
sign addresses in a way that captures the Inter-Domain to
pology, and which co-exists cleanly with both the adminis
trative needs of the registration authorities, and the algo
rithms employed  by both the Intra- and Inter-domain
 
routeing protocols. As alluded to in an earlier clause, it
seems prudent to leave some portion of the address space
(most likely from the HO-DSP part) sufficiently undefined
and flexible that various Inter-domain topologies may be
efficiently constructed.
 
Annex C
Implementation Guidelines and Examples
(This annex is informative)
 
C.1  Routeing Databases
Each database contains records as defined in the following
sub-clauses. The following datatypes are defined.
FROM CommonMgmt IMPORT NSAPAddress,
AddressPrefix, BinaryAbsoluteTime;
PDU Type
  
lspID = ARRAY [0..7] OF Octet;
systemID = ARRAY [0..5] OF Octet;
octetTimeStamp = BinaryAbsoluteTime;
 
C.1.1 Level 1 Link State Database
This database is kept by Level 1 and Level 2 Intermediate
Systems, and consists of the latest Level 1 Link State PDUs
from each Intermediate System (or pseudonode) in the area.
The Level 1 Link State PDU lists Level 1 links to the Inter
mediate System that originally generated the Link State
PDU.
RECORD
adr: lspID; (* 8 octet ID of LSP originator
*)  
type: (Level1IntermediateSystem,
AttachedLevel2IntermediateSystem,
UnattachedLevel2IntermediateSystem);  
seqnum: [0..SequenceModulus  1];  
LSPage: [0..MaxAge]; (*Remaining Lifetime *)  
 
expirationTime: TimeStamp;
(*Time at which LSP age
became zero (see 7.3.16.4). *)
SRMflags: ARRAY[1..(maximumCircuits +
maximumVirtualAdjacencies)]
OF BOOLEAN;
(*Indicates this LSP to be sent on this circuit. Note
that level 2 Intermediate systems may send level 1
LSPs to other partitions (if any exist). Only one level
2 Intermediate system per partition does this. For
level 1 Intermediate Systems the array is just
maximumCircuits long. *)
SSNflags: ARRAY[1..maximumCircuits +
maximumVirtualAdjacencies]
OF BOOLEAN;
(*Indicates that information about this LSP shall be
included in the next partial sequence number PDU
transmitted on this circuit. *)
POINTER TO LSP; (*The received LSP *)
END;
 
C.1.2 Level 2 Link State Database
This database is kept by Level 2 Intermediate Systems, and
consists of the latest Level 2 Link State PDUs from each
Level 2 Intermediate System (or pseudonode) in the do
main.  The Level 2 Link State PDU lists Level 2 links to the
Intermediate System that originally generated the Link
State PDU.
RECORD  
adr: lspID;  (* 8 octet ID of LSP originator *)  
type: (AttachedLevel2IntermediateSystem,
UnattachedLevel2IntermediateSystem);  
seqnum: [0..SequenceModulus  1];  
LSPage: [0..MaxAge];  (*Remaining Lifetime *)  
expirationTime: TimeStamp;
(*Time at which LSP age
became zero (see 7.3.16.4). *)
SRMflags: ARRAY[1..(maximumCircuits)] OF
BOOLEAN;
(*Indicates this LSP to be sent on this circuit. *)
SSNflags: ARRAY[1..maximumCircuits] OF
BOOLEAN;
(*Indicates that information about this LSP must be
included in the next partial sequence number PDU
transmitted on this circuit. *)
POINTER TO LSP; (*The received LSP *)
END;
C.1.3 Adjacency Database
 This database is kept by all systems. Its purpose is to keep
track of neighbours.
For Intermediate systems, the adjacency database comprises
a database with an entry for each:
-Adjacency on a Point to Point circuit.
-Broadcast Intermediate System Adjacency. (Note that
both a Level 1 and a Level 2 adjacency can exist be
tween the same pair of systems.)
-Broadcast End system Adjacency.
-potential SVC on a DED circuit (max

i

mum

SVC


Adja

cencies for a DA circuit, or 1 for a Static cir
cuit).
-Virtual Link Adjacency.
Each entry contains the parameters in Clause 11 for the Ad
jacency managed object. It also contains the variable used
to store the remaining holding time for each Adjacency
IDEntry and NETEntry entry, as defined below.
 
IDEntry =  RECORD
ID: systemID;
(* The 6 octet System ID of a neighbour End system
extracted from the SOURCE ADDRESS field of its
ESH PDUs. *)
entryRemainingTime: Unsigned [1..65535]
(* The remaining holding time in seconds for this
entry.  This value is not accessible to system
management. An implementation may choose to
implement the timer rules without an explicit
remainingTime being maintained. For example by
the use of asynchronous timers. It is present here in
order to permit a consistent description of the timer
rules. *)
END
 
NETEntry =  RECORD
NET: NetworkEntityTitle;
(* The NET of a neighbour Intermediate system
as reported in its IIH PDUs. *)
entryRemainingTime: Unsigned [1..65535]
 (* The remaining holding time in seconds for this
entry.  This value is not accessible to system
management.  An implementation may choose to
implement the timer rules without an explicit
remainingTime being maintained.  For example by
the use of asynchronous timers. It is present here in
order to permit a consistent description of the timer
rules. *)
END;
C.1.4 Circuit Database
This database is kept by all systems. Its purpose is to keep
information about a circuit. It comprises an AR
RAY[1..maximumCircuits].
Each entry contains the parameters in Clause 11 for a Cir
cuit managed object (see 11.3). It also contains the remain
ingHelloTime (WordUnsigned [1..65535] seconds) vari
able for the Circuit. This variable not accessible to system
management. An implementation may choose to implement
the timer rules without an explicit remainingHelloTime
being maintained. For example by the use of asynchronous
timers. It is present here in order to permit a consistent de
scription of the timer rules. Additionally, for Circuits of
type  X.25 Static Outgoing or X.25 DA, it contains the
recallCount (Unsigned[0..255]) variable for the Circuit.
This variable is not accessible to system management. It
used to keep track of recall attempts.
C.1.5 Level 1 Shortest Paths Database
This database is kept by Level 1 and Level 2 Intermediate
Systems (unless each circuit is Level 2 Only).  It is com
puted by the Level 1 Decision Process, using the Level 1
Link State Database. The Level 1 Forwarding Database is a
subset of this database.
RECORD
adr: systemId; (*6 octet ID of destination system *)
cost: [1..MaxPathMetric];
(*Cost of best path to destination system *)
adjacencies: ARRAY[1..max

i

mum

Path

Splits]
OF POINTER TO Adjacency;
 
(*Pointer to adjacency for forwarding to system adr
*)
END;
C.1.6 Level 2 Shortest Paths Database
This database is kept by Level 2 Intermediate Systems. It is
computed by the Level 2 Decision Process, using the
Level 2 Link State Database. The Level 2 Forwarding Data
base is a subset of this database.
RECORD
adr: AddressPrefix; (*destination prefix *)
cost: [1..MaxPathMetric];
(*Cost of best path to destination prefix *)
adjacencies: ARRAY[1..max

i

mum

Path

Splits]
OF  POINTER TO Adjacency;
(*Pointer to adjacency for forwarding to prefix adr
*)
END;
 
C.1.7 Level 1 Forwarding Database
This database is kept by Level 1 and Level 2 Intermediate
Systems (unless each circuit is Level 2 Only).  It is used
to determine where to forward a data NPDU with destina
tion within this system's area. It is also used to determine
how to reach a Level 2 Intermediate System within the area,
for data PDUs with destinations outside this system's area.
RECORD  
adr:systemId;
(*6 octet ID of destination system. Destination
0 is special, meaningnearest level 2
Intermediate system *)
splits: [0..max

i

mum

Path

Splits];
(* Number of valid output adj's for reachingadr
(0 indicates it is unreachable) *)
nextHop: ARRAY[1..max

i

mum

Path

Splits] OF
POINTER TO adjacency;
(*Pointer to adjacency for forwarding to destination
system *)
END;
 
C.1.8 Level 2 Forwarding Database
This database is kept by Level 2 Intermediate systems. It is
used to determine where to forward a data NPDU with des
tination outside this system's area.
RECORD  
adr: AddressPrefix; (*address of destination area.
*)
splits: [0..max

i

mum

Path

Splits];
(*Number of valid output adj's for reaching adr
(0 indicates it is unreachable) *)
nextHop: ARRAY[1..max

i

mum

Path

Splits] OF
POINTER TO adjacency;  
(*Pointer to adjacency for forwarding to destination
area. *)
END;
 
 
C.2 SPF Algorithm for Computing
Equal Cost Paths
An algorithm invented by Dijkstra (see references) known
as shortest path first (SPF), is used as the basis for the
route calculation. It has a computational complexity of the
square of the number of nodes, which can be decreased to
the number of links in the domain times the log of the num
ber of nodes for sparse networks (networks which are not
highly connected).
A number of additional optimisations are possible:
a)If the routeing metric is defined over a small finite
field (as in this International Standard), the factor of
log n may be removed by using data structures which
maintain a separate list of systems for each value of
the metric rather than sorting the systems by logical
distance.
b)Updates can be performed incrementally without re
quiring a complete recalculation. However, a full up
date must be done periodically to recover from data
corruption, and studies suggest that with a very small
number of link changes (perhaps 2) the expected com
putation complexity of the incremental update exceeds
the complete recalculation. Thus, this International
Standard specifies the algorithm only for the full up
date.
c)If only End system LSP information has changed, it is
not necessary to re-compute the entire Dijkstra tree for
the IS. If the proper data structures exist, End Systems
may be attached and detached as leaves of the tree and
their forwarding information base entries altered as
appropriate
The original SPF algorithm does not support load splitting
over multiple paths. The algorithm in this International
Standard does permit load splitting by identifying a set of
equal cost paths to each destination rather than a single
least cost path.
C.2.1 Databases
PATHS  This represents an a

cyclic directed graph of
shortest paths from the system S performing the cal
culation. It is stored as a set of triples of the form
aN,d(N),{Adj(N)}q, where:
N is a system Identifier. In the level 1 algorithm, N is
a 7 octet ID. For a non-pseudonode it is the 6 octet
system ID, with a 0 appended octet.  For a
pseudonode it is a true 7 octet quantity, comprised of
the 6 octet Designated Intermediate System ID and
the extra octet assigned by the Designated Interme
diate System.  In the level 2 algorithm it is either a
7 octet Intermediate System or pseudonode ID (as in
the level 1 algorithm), or it is a variable length ad
dress prefix (which will always be a leaf, i.e. End
system, in PATHS).
d(N) is N's distance from S (i.e. the total metric
value from N to S).
 
{Adj(N)} is a set of valid adjacencies that S may use
for forwarding to N.
When a system is placed on PATHS, the path(s)
designated by its position in the graph is guaranteed
to be a shortest path.
TENT  This is a list of triples of the form
aN,d(N),{Adj(N)}q, where N, d(N) and {Adj(N)} are
as defined above for PATHS.
TENT can intuitively be thought of as a tentative
placement of a system in PATHS. In other words,
the triple aN,x,{A}q in TENT means that if N were
placed in PATHS, d(N) would be x, but N cannot be
placed on PATHS until it is guaranteed that no path
shorter than x exists.
The triple aN,x,{A,B}q in TENT means that if N
were placed in PATHS, d(N) would be x via either
adjacency A or B
NOTE - As described above, (see 7.2.6), it is suggested that
the implementation keep the database TENT as a set of lists
of triples of the form a*,Dist,*q, for each possible distance
Dist.  In addition it is necessary to be able to process those
systems which are pseudonodes before any non-
pseudonodes at the same distance Dist.
C.2.2 Use of Metrics in the SPF Calculation
Internal metrics are not comparable to external metrics.
Therefore, the cost of the path from N to S for external
routes (routes to destinations outside of the routing domain)
may include both internal and external metrics. The cost of
the path from N to S (called d(N) below in database
PATHS) may therefore be maintained as a two-
dimensioned vector quantity (specifying internal and exter
nal metric values). In incrementing d(N) by 1, if the internal
metric value is less than the maximum value
MaxPathMetric, then the internal metric value is incre
mented by one and the external metric value left un
changed; if the internal metric value is equal to the maxi
mum value MaxPathMetric, then the internal metric value
is set to 0 and the external metric value is incremented by 1.
Note that this can be implemented in a straightforward
manner by maintaining the external metric as the high order
bits of the distance.
NOTE - In the code of the algorithm below, the current path
length is held in a variable tentlength. This variable is a
two-dimensional quantity tentlength=(internal,external)
and is used for comparing the current path length with d(N)
as described above.
C.2.3 Overview of the Algorithm
The basic algorithm, which builds PATHS from scratch,
starts out by putting the system doing the computation on
PATHS (no shorter path to SELF can possibly exist).  
TENT is then pre-loaded from the local adjacency data
base.
Note that a system is not placed in PATHS unless no
shorter path to that system exists. When a system N is
placed in PATHS, the path to each neighbour M of N,
 
through N, is examined, as the path to N plus the link from
N to M. If aM,*,*q is in PATHS, this new path will be
longer, and thus ignored.
If aM,*,*q is in TENT, and the new path is shorter, the old
entry is removed from TENT and the new path is placed in
TENT. If the new path is the same length as the one in
TENT, then the set of potential adjacencies {adj(M)}  is set
to the union of the old set (in TENT) and the new set
{adj(N)}. If M is not in TENT, then the path is added to
TENT.
Next the algorithm finds the triple aN,x,{Adj(N)}q in
TENT, with minimal x.
NOTE - This is done efficiently because of the optimisation
described above. When the list of triples for distance Dist is
exhausted, the algorithm then increments Dist until it finds a
list with a triple of the form a*,Dist,*q.
N is placed in PATHS. We know that no path to N can be
shorter than x at this point because all paths through sys
tems already in PATHS have already been considered, and
paths through systems in TENT will have to be greater than
x because x is minimal in TENT.
When TENT is empty, PATHS is complete.
C.2.4 The Algorithm
The Decison Process Algorithm must be run once for each
supported routeing metric.  A Level 1 Intermediate System
runs the algorithm using the Level 1 LSP database to com
pute Level 1 paths.  In addition a Level 2 Intermediate Sys
tem runs the algorithm using the Level 2 LSP database to
compute Level 2 paths.
If this system is a Level 2 Intermediate System which sup
ports the partition repair optional function the Decision
Process algorithm for computing Level 1 paths must be run
twice for the default  metric.  The first execution is done to
determine which of the area's manual

Area

Addresses
are reachable in this partition, and elect a Partition Desig
nated Level 2 Intermediate System for the partition.  The
Partition Designated Level 2 Intermediate System will de
termine if the area is partitioned and will create virtual
Level 1 links to the other Partition Designated Level 2 In
termediate Systems in the area in order to repair the Level 1
partition.  This is further described in 7.2.10.
Step 0:  Initialise TENT and PATHS to empty.  Initialise
tentlength to (0,0).
(tentlength is the pathlength of elements in TENT
we are examining.)
a)Add aSELF, 0, Wq to PATHS, where W is a special
value indicating traffic to SELF is passed up to Trans
port (rather than forwarded).
b)Now pre-load TENT with the local adjacency data
base. (Each entry made to TENT must be marked as
being either an End system or an Intermediate System
to enable the check at the end of Step 2 to be made
correctly.) For each adjacency Adj(N), (including
Manual Adjacencies, or for Level 2 enabled Reach
 
able Addresses) on enabled circuits, to system N of
SELF in state Up, compute
d(N) = cost of the parent circuit of the adjacency
(N), obtained from metrick, where k = one of de
fault metric, delay metric, monetary metric, er
ror metric.
Adj(N) =  the adjacency number of the adjacency
to N
c)If a triple aN,x,{Adj(M)}q is in TENT,  then:
If x = d(N), then Adj(M) , {Adj(M)} H Adj(N).
d)If there are now more adjacencies in {Adj(M)} than
max

i

mum

Path

Splits, then remove excess adjacen
cies as described in 7.2.7.
e)If x < d(N), do nothing.
f)If x > d(N),  remove aN,x,{Adj(M)}q from TENT and
add  the triple aN,d(N),Adj(N)q.
g)If no triple aN, x,{Adj(M)}q is in TENT, then add aN,
d(N),Adj(N)q to TENT.
h)Now add any systems to which the local Intermediate
system does not have adjacencies, but which are men
tioned in neighbouring pseudonode LSPs. The adja
cency for such systems is set to that of the Designated
Intermediate System.
i)For all broadcast circuits in state On, find the LSP
with LSP number zero and with the first  7 octets of
LSPID equal to the LnCircuitID for that circuit (i.e.
pseudonode LSP for that circuit). If it is present, for
all the neighbours N reported in all the LSPs of this
pseudonode which do not exist in TENT add an entry
aN,d(N),Adj(N)q to TENT, where
d(N) = metrick of the circuit.
Adj(N) = the adjacency number of the adjacency to the
DR.
j)Go to Step 2.
Step 1: Examine the zeroth Link State PDU of P, the sys
tem just placed on PATHS (i.e. the Link State PDU with
the same first 7 octets of LSPID as P, and LSP number
zero).
a)If this LSP is present, and the LSP Database Over
load bit is clear, then for each LSP of P (i.e. all the
Link State PDUs with the same first 7 octets of LSPID
as P, irrespective of the value of LSP number) com
pute
dist(P,N) = d(P) + metrick(P,N).
 
for each neighbour N (both Intermediate System and
End system) of the system P. If the LSP Database
Overload bit is set, only consider the End system
neighbours of the system P. d(P) is the second ele
ment of the triple
 
aP,d(P),{Adj(P)q
 
and metrick(P,N) is the cost of the link from P to N as
reported in P's Link State PDU
b)If dist(P,N) > MaxPathMetric, then do nothing.
c)If aN,d(N),{Adj(N)}q is in  PATHS, then do nothing.
NOTE  d(N) must be less than dist(P,N), or else N
would not have been put into PATHS. An additional san
ity check may be done here to ensure d(N) is in fact less
than dist(P,N).
d)If a triple aN,x,{Adj(N)}q is in TENT,  then:
1)If x = dist(P,N), then Adj(N) , {Adj(N)} H
Adj(P).
2)If there are now more adjacencies in {Adj(N)} than
max

i

mum

Path

Splits, then remove excess adja
cencies, as described in 7.2.7.
3)If x < dist(P,N), do nothing.
4)If x > dist(P,N),  remove aN,x,{Adj(N)}q from
TENT and add  aN,dist(P,N),{Adj(P)}q.
e)If no triple aN, x,{Adj(N)}q is in TENT, then add aN,
dist(P,N),{P}q to TENT.
Step 2: If TENT is empty, stop, else:
a)Find the element aP,x,{Adj(P)}q,  with minimal x as
follows:
1)If an element a*,tentlength,*q remains in TENT  
in the list for tentlength, choose that element. If
there are  more than one elements in the list for
tentlength, choose one of  the elements (if any)
for a system which is a pseudonode in preference  
to one for a non-pseudonode. If there are no more
elements in the list  for tentlength increment ten
tlength and repeat  Step 2.
2)Remove aP,tentlength,{Adj(P)}q from TENT.
3)Add aP,d(P),{Adj(P)}q  to PATHS.
4)If this is the Level 2 Decision Process running, and
the system just added to PATHS listed itself as
Partition Designated Level 2 Intermediate system,
then additionally add aAREA.P, d(P), {adj(P)}q to
PATHS, where AREA.P is the Network Entity
Title of the other end of the Virtual Link, obtained
by taking the first AREA listed in P's Level 2 LSP
and appending P's ID.
5)If the system just added to PATHS was an End
system, go to Step 2, Else go to Step 1.
NOTE - In the Level 2 context, the End systems are the
set of Reachable Address Prefixes and the set of area ad
dresses with zero cost.
 
C.3 Forwarding Process
C.3.1 Example pseudo-code for the forwarding
procedure described in 7.4.3
This procedure chooses, from the Level 1 forwarding data
base  if level is level1, or from the Level 2 forwarding
database  if level is level2, an adjacency on which to for
ward PDUs for destination dest. A pointer to the adjacency
is returned in adj, and the procedure returns the value
True. If no suitable adjacency exists the procedure returns
the value False, in which case a call should be made to
Drop(Destination Address Unreachable, octetNumber).
If queue length values are available to the forwarding proc
ess, the minimal queue length of all candidate circuits is
chosen, otherwise, they are used in round robin fashion.
PROCEDURE Forward(
level: (level1, level2),  
dest: NetworkLayerAddress,
VAR adj: POINTER TO adjacency) :
BOOLEAN
 
VAR  
adjArray: ARRAY OF
ForwardingDatabaseRecords;
temp, index, minQueue: CARDINAL;
 
BEGIN
(*Set adjArray to appropriate database} *)
IF level = level1 THEN
adjArray := level1ForwardingDatabase
ELSE
adjArray := level2ForwardingDatabase
END;
 (*Perform appropriate hashing function to obtain an
index into the database *)
 IF Hash(level, dest, index) THEN
IF adjArray[index].splits > 0 THEN
(*Find minimum queue size for all equal cost
paths *)
minQueue := MaxUnsigned;
temp := adjArray[index].lastChosen + 1;
(*start off after last time *)
FOR i := 1 TO adjArray[index].splits DO
(*for all equal cost paths to dest *)
IF temp > adjArray[index].splits THEN
(*after end of valid entries, wrap to first
*)
temp := 1
ELSE
temp := temp + 1
END;
IF
QueueSize(adjArray[index].nextHop[temp])
< minQueue THEN
minQueue :=
QueueSize(adjArray[index].nextHop[tem
p]);
adj := adjArray[index].nextHop[temp];
adjArray[index].lastChosen := temp;
END;
Forward := true
END;
 
ELSE
Forward := false (*There must be at least one
valid output adjacency *)
END
ELSE
Forward := false (*Hash returned destination
unknown *)
END
END forward;
 
 
Annex D
Congestion Control and Avoidance
(This annex is informative)
 
D.1 Congestion Control
The transmit management subroutine handles congestion
control. Transmit management consists of the following
components:
Square root limiter. Reduces buffer occupancy
time per PDU by using a square root limiter algo
rithm. The square root limiter also queues PDUs for
an output circuit, and prevents buffer deadlock by
discarding PDUs when the buffer pool is exhausted.
Clause D.1.1 specifies the Square Root Limiter
Process.
Originating PDU limiter. Limits originating NPDU
traffic when necessary to ensure that transit NPDUs
are not rejected. An originating NPDU is an NPDU
resulting from an NSDU from the Transport at this
ES. A transit NPDU is an NPDU from another sys
tem to be relayed to another destination ES.
Flusher. Flushes PDUs queued for an adjacency that
has gone down.
Information for higher layer (Transport) congestion control
procedures is provided by the setting of the congestion ex
perienced bit in the forwarded data NPDUs.
D.1.1 Square Root Limiter
The square root limiter discards a data NPDU by calling the
ISO 8473 discard PDU function with the reason  PDU
Discarded due to Congestion when the number of data
NPDUs on the circuit output queue exceeds the discard
threshold, Ud.  Ud is given as follows:=
where:
Nb = Number of Routeing Layer buffers
(maximumBuffers) for all output circuits.
Nc = Number of active output circuits (i.e. Circuits in state
On).
The output queue is a queue of buffers containing data
NPDUs which have been output to that circuit by the for
warding process, and which have not yet been transmitted
by the circuit. It does not include NPDUs which are held
by the data link layer for the purpose of retransmission.
Where a data NPDU is to be fragmented by this Intermedi
ate system over this circuit, each fragment shall occupy a
 
separate buffer and shall be counted as such in the queue
length. If the addition of all the buffers required for the
fragmentation of a single input data NPDU would cause the
discard threshold for that queue to be exceeded, it is recom
mended that all those fragments (including those which
could be added without causing the threshold to be ex
ceeded) be discarded.
D.1.2 Originating PDU Limiter
TEMPORARY NOTE - Strictly this function is an End Sys
tem function. However it is closely coupled to the routeing
function, particularly in the case of real systems which are
performing the functions of both an Intermediate System
and an End System (i.e. systems which can both initiate and
terminate data NPDUs and perform relaying functions).
Therefore, until a more appropriate location for this infor
mation can be determined, this function is described here.
The originating PDU limiter first distinguishes between
originating NPDUs and transit NPDUs. It then imposes a
limit on the number of buffers that originating NPDUs can
occupy on a per circuit basis. In times of heavy load, origi
nating NPDUs may be rejected while transit NPDUs con
tinue to be routed. This is done because originating NPDUs
have a relatively short wait, whereas transit NPDUs, if re
jected, have a long wait  a transport retransmission period.
The originating PDU limiter accepts as input:
-An NSDU received from Transport Layer
-A transmit complete signal from the circuit for an ISO
8473 Data PDU.
The originating PDU limiter produces the following as out
put:
-PDU accepted
-PDU rejected
-Modifications to originating PDU counter
There is a counter, N, and an originating PDU limit,
originatingQueueLimit, for each active output circuit.
Each N is initialised to 0. The originatingQueueLimit is
set by management to the number of buffers necessary to
prevent the circuit from idling.
D.1.3 Flusher
The flusher ensures that no NPDU is queued on a circuit
whose state is not ON, or on a non-existent adjacency, or
one whose state is not  Up.
 
D.2 Congestion Avoidance
D.2.1 Buffer Management
The Forwarding Process supplies and manages the buffers
necessary for relaying. PDUs shall be discarded if buffer
thresholds are exceeded. If the average queue length on the
input circuit or the forwarding processor or the output cir
cuit exceeds QueueThreshold, the congestion experi
enced bit shall be set in the QoS maintenance option of the
forwarded data PDU (provided the QoS maintenance option
is present).
 

Security Considerations

  Security issues are not discussed in this memo.

Author's Address



   David R. Oran
   Digital Equipment Corporation
   LKG 1-2/a 19
   550 King Street
   Littleton, MA 01460

   Email: Oran@Oran.enet.dec.com

   Phone:  (508) 4866-7377