Border Gateway Protocol: Origin Misconfigurations And Effects

2116 words - 8 pages

Introduction
The Internet is a highly unstable and non-reliable network which requires a strong routing protocol. There are about 493870 routes on the Internet and the number is increasing every day (CIDR Report). Border Gateway Protocol (BGP) is the exterior gateway routing protocol used for routing over the Internet worldwide. BGP exchanges routing information between autonomous systems over the Internet. An autonomous system (AS) can be defined as network or group of routers that implement the same routing policy (Halabi, 96). Routes are announced by the AS to its connecting AS and are thus advertised further.
Even though BGP is a stable protocol, various issues such as delayed convergence, instability, inbound and outbound policy changes continuously occur in the Internet (Mahajan, Wetherall, and Anderson 1). The issues can either occur due to misconfigurations, software bugs, and faulty hardware. Misconfiguration errors such as wrong prefix advertisement, wrong attributes, incorrect policy filters occur while advertising routes to the Internet. Such errors can lead to an outage of the Internet scaling from a short time span to even days.
In this paper, the causes of misconfigurations from the origin AS are discussed. The paper further explores the probable effects of such misconfigurations on the Internet routing table and connectivity, followed by a few real life incidents that caused the Internet to shut down. The paper concludes with discussing various methods that have been proposed earlier to prevent or at least localize the effects of such misconfigurations.

Overview of BGP
BGP is a special case of distance vector protocol called the path vector protocol used for routing between autonomous systems (Halabi, 102). Two types of BGP exists: (1) eBGP which acts as Exterior Gateway Protocol and is used for routing between two AS and (2) iBGP which acts as an Interior gateway Protocol and is used for routing within an AS (Halabi 126). BGP forms a peer connection between the two routers using a TCP session before exchanging routing information (Halabi 103,126). After the peer connection is established, the tow BGP routers exchanges routing information along with their attributes.
BGP attributes include parameters such as next hop address, local preference, MED values, and AS_Path. BGP routing policy uses the attributes for determining the best path to the destination (Halabi 168). AS_Path is one of the major attributes in the BGP decision process. AS_Path is a list of all the AS in path to reach the destination (Halabi 154). Whenever a route is advertised by an AS, it appends the AS number in the AS_Path field and then forwards the route (Halabi 154, 155). The right most AS number in the AS_Path is the origin AS, which generates the route in the BGP network. The less number of AS in the AS_Path, the better the route (Halabi 168).
The first factor that BGP checks in its decision process is whether the advertised route has a...

Find Another Essay On Border Gateway Protocol: Origin Misconfigurations and Effects

The Cause,Effects,and Prevention of Childhood Obesity - Eastern Gateway Community English 101 - eassey

1831 words - 8 pages Running head: THE CAUSE, EFFECTS, AND PREVENTION OF CHILDHOOD OBESITY 1 THE CAUSE, EFFECTS, AND PREVENTION OF CHILDHOOD OBESITY 3 The Cause, Effects, and Prevention of Childhood Obesity Chrystal Graham Professor Kastner English 102 Abstract Obesity is a health epidemic that has dire consequences for America’s health, especially for children. The causes contributing to this epidemic include sedentary life styles, caloric intake, and major changes

Understanding TCP/IP Essay

1732 words - 7 pages the destination address is the address of a host on the directly attached network, the packet is passed to a gateway for delivery. Deciding which gateway to use is called routing. Gateways and routers make the routing decision for each individual packet.Move data between the Network Access Layer and the Host-to-Host Transport Layer. When IP receives a datagram, the correct host-to-host transport layer protocol is selected by using the unique

Enhanced Interior Gateway Routing Protocol

653 words - 3 pages Enhanced Interior Gateway Routing Protocol Enhanced Interior Gateway Routing Protocol is a distance vector routing protocol, where a router shares information with neighboring routers about the network in an autonomous system and shares only the information that neighboring routers don’t have instead of the whole message. It is an enhanced version of Interior Gateway Routing Protocol, both of them uses the same distant vector technology and

Incorporating Congestion Control in BGP considering its Economic & Policy Effects

1375 words - 6 pages I. Research Question and Problem Setting The Border Gateway Protocol (BGP) is responsible for communication between different Autonomous Systems (AS). The Internet is comprised of a large number of Autonomous Systems (AS) and exchanging routing information between two or more AS is achieved using BGP. Inter-domain routing in the Internet is carried out majorly by one protocol – Border Gateway Protocol (BGP). BGP is a distance-vector protocol

IP security

1417 words - 6 pages ESP: Access control prevents unauthorized use of a resource such as the network behind a security gateway. (A security gateway is an intermediate system such as a router or firewall that interfaces two networks and provides security services for the hosts on the internal side.) Connectionless integrity detects any modification to data within individual IP packets, regardless of their position in a data stream. Data origin authentication

A Beginner's Guide to Hacking - Part 1

1755 words - 7 pages Access Server109 POP2110 POP3115 Simple File Transfer Protocol (SFTP)118 SQL Services119 Newsgroup (NNTP)137 NetBIOS Name Service139 NetBIOS Datagram Service143 Interim Mail Access Protocol (IMAP)150 NetBIOS Session Service156 SQL Server161 SNMP179 Border Gateway Protocol (BGP)190 Gateway Access Control Protocol (GACP)194 Internet Relay Chat (IRC)197 Directory Location Service (DLS)389 Lightweight Directory Access Protocol (LDAP)396 Novell

Open Shortest Path First

707 words - 3 pages Open Shortest Path First is one of the link-state routing protocol used in the Internet Protocol networks developed explicitly for TCP/IP Internet Environment. It is an Interior Gateway Routing Protocol defined in RFCs 1245, 1247, 1253 and 1583. The features of the OSPF protocol are as follows • Provides authentication of routing messages. • Enables load balancing by allowing traffic to be split evenly across routes with equal cost. • Type-of

Routers

7329 words - 29 pages Information Protocol · IGRP - Interior Gateway Routing Protocol · EIGRP - Enhanced Interior Gateway Routing Protocol · OSPF Two types of routing protocols are the Exterior Gateway Protocols (EGPs) and the Interior Gateway Protocols (IGPs). Exterior Gateway Protocols route data between autonomous systems. An example of an EGP is BGP (Border Gateway Protocol), the primary exterior routing protocol of the Internet. Can you think of an example where an

The Routing Information Protocol ( RIP )

2649 words - 11 pages information for the purpose of computing routes. BASIC ALGORITHM/DISTANCE VECTOR ALGORITHM: RIP was designed to work with moderate sized networks, which used pretty much the same technology. It was not intended to work complex network systems. RIP is widely used for routing traffic in the global Internet and is an interior gateway protocol (IGP), which means that it performs routing within a single autonomous system. On the Internet, an

US mexico border culture and economy history

2617 words - 10 pages changed nationality with no given consent. It is difficult to gauge the personal effects of this, as no personal accounts are available to reference. One can only imagine that after a three year war Mexicans would hardly be welcomed with open arms by their new fellow compatriots and must have experienced prejudice. This did however lead to an economic upturn in the area and caused migration to both sides of the border. U.S. Government and business

Networking Fundamentals; Behind the scene

2853 words - 11 pages protocol suits solve the problem by provide remote access to an electronic mailbox using an included protocol known as the Post Office Protocol (POP). Additional server is required on the computer to run the POP protocol. User runs e-mail software becomes a client of the POP server and allows not just the ability to access; view but also storing the incoming e-mails that either directly from an original sender or a mail gateway. Hotmail, MSN

Similar Essays

Border Gateway Protocol Essay

725 words - 3 pages The protocol I chose to write about is the Border Gateway Protocol because it is the main protocol used to operate the internet and recommended protocol for Cisco design certifications. The BGP protocol is an inter-autonomous protocol; which means it is for connecting separate large networks, such as a college network to a corporate network or the internet. Due to the large number of routes and connection this protocol must manage; it uses very

The Creation Of Border Gateway Protocol

1238 words - 5 pages Border Gateway Protocol (BGP), being a dynamic routing protocol, exchanges routes between BGP neighbors, which is sometimes called “peers”. The main aim behind the creation of this protocol was to expand and replace Exterior Gateway Protocol (EGP). Occasionally, BGP is described as a reachability protocol rather than a routing protocol. BGP is a Path Vector Protocol (PVP), which aims at maintaining paths to different hosts, networks and gateway

Potential Effects Of The Eritrean And Ethiopian Border Conflict

1313 words - 5 pages The long-standing border conflict between the African nations of Eritrea and Ethiopia greatly contribute to the overall destabilization in the Horn of Africa (HOA). The United States (US) and Great Britain have historically appreciated the strategic importance of Ethiopia, and the US offered its support by attempting to broker long-term treaties in order to end the conflicts (Lyon, 2006). Despite these efforts the region remains in flux; many

The Origin And Effects Of World War Ii

1986 words - 8 pages the idea operation Himmler. Himmler’s plan was to take a man from one of their concentration camps and dress him in a polish uniform. After that they took him to the border of Poland and Germany to a small town called Gleiwitz. After that Himmler had a Nazi soldier shoot him dead. This made it look like a Polish attack on a nearby German radio station. The Germans used this incident as an excuse to attack Poland. Early the next morning