Previous Topic: ISR

Next Topic: Status of ISR

ISR Planning

Before you activate ISR connections throughout the network, establish a plan for processing data in the ISR capable environments. Consider the following factors:

Message Loop Protection

When data exchange takes place using ISR, the following rules apply:

This protection is applied to avoid the possibility of one or more messages being continually sent from region to region in a message loop.

However, in some configurations, a message, sourced from outside a group of connected regions, could bypass the rules and enter a message loop. Always be aware of this possibility when planning your ISR connections. Some conversations provide additional protection against such an occurrence.