Border Gateway Protocol Essay

725 words - 3 pages

The protocol I chose to write about is the Border Gateway Protocol because it is the main protocol used to operate the internet and recommended protocol for Cisco design certifications. The BGP protocol is an inter-autonomous protocol; which means it is for connecting separate large networks, such as a college network to a corporate network or the internet. Due to the large number of routes and connection this protocol must manage; it uses very many features, or attributes, to achieve this. Cisco defines these attributes as weight, local preference, multi-exit discriminator, origin, AS_path, next hop, and community. These attributes are used to discover networks and determine the best path to use for sending packets to those networks.
BGP was designed in accordance with RFC 1771, which was started in October of 1991 and published in March of 1995. In January of 2006 RFC 1771 was made obsolete by RFC 4271 which contains the updated information about BGP. These RFCs, along with a quite a few more, describe the design and operation of BGP. Cisco uses a much smaller paper to give a basic rundown of BGP, plus they carry an extensive library of web pages to go more in depth. To get a basic understanding of BGP we need to look at the attributes that make it work.
The first attribute we will look at is called the weight attribute. This is a Cisco proprietary attribute, so it is not found with other vendors. This attribute simply assigns a weight value to any know routes on an individual router. This value is not passed on to any other routers. Each router can have its own independent weight values for any known routes. If two separate routes to the same network are known, the one that has the highest assigned weight value will be the preferred route.
The local preference attribute is used to determine the best exit point for an autonomous system (AS). This value is shared by all the routers in the AS to select the best interfaces and routers for reaching known networks. Each known network may exit on any router in the AS, or all on one router in the AS. The route is determined by which...

Find Another Essay On Border Gateway Protocol

Developing Wireless Communications to Space Essay

2646 words - 11 pages structure of satellites interconnecting LANs. This includes multiple space based data relay satellites. The third part is implementing a new overlay a new protocol concept called bundling to tie together the Internets. This is based on a routing concept in which multiple messages will be bundled and sent through a series of Internets. The problem with this is not the same as here on earth. Here it is billions of users competing for bandwidth

Design of communication systems Essay

5286 words - 21 pages assigned an address from the specified pool to the host.Figure 25We can see a detailed diagram of the process at the screenshot below, where the DHCP packets that were used for this particular address assignment, are described.Figure 26Border Gateway Protocol (BGP)The Border Gateway Protocol (BGP) is an inter-autonomous system routing protocol. BGP is used to exchange routing information for the Internet and is the protocol used between Internet

Virtual Private Network

4581 words - 18 pages tunneling and encapsulation (Fowler, D. 1999). According to Mairs, J. (2002), tunneling is a technique of transferring data across two similar networks over an intermediate network. The process of encapsulation refers to the process of enclosing one type of data packet into a packet of another protocol before being sent through the Internet. For example, in an Internet-based VPN, packets in a VPN protocol are encapsulated within an IP packet before

Executive Roles and Responsibilities

2455 words - 10 pages , compromised infrastructure, DNS and Border Gateway Protocol route hijacking were also mentioned, but only 4% to 7% said these posed significant threats." The ability to recover from a crisis and return to normal operations can save a company millions in revenue, recovery standing and potential consumer confidence is paramount. When you really think about it we live in a pretty trusting but unforgiving society when it comes to economic

Australian Internet Service Providers Study

1515 words - 6 pages Australia, Hong Kong, Singapore, and the United Kindom.xxxii Telstra’s global satellite coverage is delivered through three terrestrially interconnected teleports in Sydney, Perth, and Hong Kong. Satellite space is leased from providers such as Intelsat, New Skies, and PanAmSat, each offering fully redundant 24/7 operations.xxxii Telstra’s terrestrial connectivity, along with any other ISP, is possible only by way of BGP, or Border Gateway

Global Automotive Corporation

2975 words - 12 pages Chicago, will use MCI's OC 3 service for their network backbone to the internet. MCI provides Packet-Over SONET encapsulation technology allowing for greater bandwidth and flexibility (MCI). GAC suggest the use of MCI's Shadow OC 3 "that provides an automatic back-up connection in the event of primary OC 3 failure. The second OC 3 is provisioned from customer premises to MCI's Internet backbone, and Border Gateway Protocol (BGP) which is used to

Reality and Illusion in Shakespeare's Hamlet - Reality, Appearance and Deception

896 words - 4 pages Reality and Illusion in Hamlet   Shakespeare’s play, Hamlet, begins with the appearance of a ghost, an apparition, possibly a hallucination. Thus, from the beginning, Shakespeare presents the air of uncertainty, of the unnatural, which drives the action of the play and develops in the protagonist as a struggle to clarify what only seems to be absolute and what is actually reality. Hamlet's mind, therefore, becomes the central force of the

Sub-plots in Hamlet

1118 words - 4 pages Sub-plots in Hamlet   There are many things that critics say make Hamlet a "Great Work," one of which is the way that Shakespeare masterfully incorporates so many sub-plots into the story, and ties them all into the main plot of Hamlet’s revenge of his father’s murder. By the end of Act I, not only is the main plot identified, but many other sub-plots are introduced. Among the sub-plots are trust in the Ghost of King Hamlet, Fortinbras, and

Hamlet as Victim and Hero

1301 words - 5 pages Hamlet as Victim and Hero      Hamlet, Prince of Denmark, a Shakespearean tragedy, tells the story of Prince Hamlet, who gained the knowledge of a terrible incident that his kingdom had suffered. Claudius, the king of Denmark and Hamlet's uncle, had killed his own brother, the king, who was also the father of Hamlet, and married his brother's widow. Hamlet suffered these traumas to a severe degree, and his only relief was to defeat his

Essay on Light and Dark in Antigone

1188 words - 5 pages Use of Light and Dark in Antigone   The "Golden Age" of Greece is noted for its many contributions to the creative world, especially in its development of the play. These performances strived to emphasize Greek morals, and were produced principally for this purpose. Antigone, by Sophocles, is typical. The moral focused on in Antigone is the conflict between physis (nature) and nomos (law), with physis ultimately presiding over nomos

charant Creon as the Main Character of Antigone

1231 words - 5 pages Creon as the Main Character of Antigone   Throughout the Greek play Antigone by Sophocles, there exists a dispute as to who should receive the designation of main character. Antigone, the daughter of the cursed King Oedipus, as well as Creon, stately king of Thebes, both appear as the key figures in this historic play. I believe that Creon, king of Thebes, should be considered the main character in this work of Greek theater. Three

Similar Essays

Border Gateway Protocol: Origin Misconfigurations And Effects

2116 words - 8 pages Introduction The Internet is a highly unstable and non-reliable network which requires a strong routing protocol. There are about 493870 routes on the Internet and the number is increasing every day (CIDR Report). Border Gateway Protocol (BGP) is the exterior gateway routing protocol used for routing over the Internet worldwide. BGP exchanges routing information between autonomous systems over the Internet. An autonomous system (AS) can be

A Beginner's Guide To Hacking Part 1

1755 words - 7 pages Access Server109 POP2110 POP3115 Simple File Transfer Protocol (SFTP)118 SQL Services119 Newsgroup (NNTP)137 NetBIOS Name Service139 NetBIOS Datagram Service143 Interim Mail Access Protocol (IMAP)150 NetBIOS Session Service156 SQL Server161 SNMP179 Border Gateway Protocol (BGP)190 Gateway Access Control Protocol (GACP)194 Internet Relay Chat (IRC)197 Directory Location Service (DLS)389 Lightweight Directory Access Protocol (LDAP)396 Novell

Routers Essay

7329 words - 29 pages Information Protocol · IGRP - Interior Gateway Routing Protocol · EIGRP - Enhanced Interior Gateway Routing Protocol · OSPF Two types of routing protocols are the Exterior Gateway Protocols (EGPs) and the Interior Gateway Protocols (IGPs). Exterior Gateway Protocols route data between autonomous systems. An example of an EGP is BGP (Border Gateway Protocol), the primary exterior routing protocol of the Internet. Can you think of an example where an

Incorporating Congestion Control In Bgp Considering Its Economic & Policy Effects

1375 words - 6 pages I. Research Question and Problem Setting The Border Gateway Protocol (BGP) is responsible for communication between different Autonomous Systems (AS). The Internet is comprised of a large number of Autonomous Systems (AS) and exchanging routing information between two or more AS is achieved using BGP. Inter-domain routing in the Internet is carried out majorly by one protocol – Border Gateway Protocol (BGP). BGP is a distance-vector protocol