Border Gateway Protocol

In: Science

Submitted By swift4777
Words 355
Pages 2
Emerging Network Technologies

Border GatewayProtocol (BGP)

The Border Gateway Protocol (BGP), runs over TCP and is an inter-Autonomous System routing protocol. BGP is the only protocol that is designed to deal with a network of the Internet’s size, and the only protocol that can deal well with having multiple connections to unrelated routing domains. It is built on experience gained with EGP. The primary function of a BGP system is to exchange network reachability information with other
BGP systems. This network reachability information includes information on the list of Autonomous Systems that reachability information traverses. This information is sufficient to construct a graph of AS connectivity from which routing loops may be pruned and some policy decisions at the AS level may be enforced. BGP-4 provides a new set of mechanisms for supporting classless interdomain routing (CIDR). These mechanisms include support for advertising an IP prefix and eliminate the concept of network class within BGP. BGP-4 also introduces mechanisms which allow aggregation of routes, including aggregation of AS paths. The BGP is used mostly by ISP's to share information about different networks. BGP itself is a complex exterior routing protocol that is used in conjunction with autonomous systems. It is originally cataloged as RFC 1163.

There are several variations of the BGP protocol

* BGP4 * EBGP * IBGP * EGP

BGP4 is an enhanced version of BGP that performs special operations to reduce the size of the routing table. This includes the use of classless interdomain routing (CIDR).

IBGP is used "inside" an autonomous system. This works much like a "network neighborhood." IBGP is used inside the confines of its own autonomous System, but cannot be used in conjunction with a different…...

Similar Documents

On the Border

...Anthony Batista Professor Black ENGL 102 06-06-2012 On the Border Is protecting our borders necessary? For the sake of argument, we can all agree some level of protection is necessary. A hasty generalization, perhaps, but let’s continue nonetheless. The real question becomes-- to what extent should we secure our borders? Here is where we reach a fork in the river. On one side, you have the conservative right-wing view, pushing to secure our borders at all costs. On the other side, is the liberal left-wing view, advocating for leniency when it comes to securing our borders. Let’s start with the conservative viewpoint. In the article “At the Border, on the Night Watch”, Marc Lacey reports on decreased border crossings in the border town of Douglas, Arizona. For example, “no matter the dire rhetoric often heard in political circles, crossings at this stretch of border are nowhere near what they once were” (Lacey). This is a good example of a slippery slope fallacy appealing to the fear factor (i.e. claim that a certain way of thinking or acting will necessary lead to more of the same). Proponents for border patrol argue an increase in staffing serve as a deterrent to thwart border crossings and help to apprehend drug traffickers, which ignores the possibilities of lesser financial incentive due to a weaker U.S. economy for immigrants or perhaps, more attractive crossing routes elsewhere. Another argument of proponents is improved fencing. For example, “Douglas......

Words: 1184 - Pages: 5

Switches, Routers, and Gateways

...Switches, Routers, and Gateways Switches, routers and gateways are an essential part in a network. They all have the same basic functions, as they help control the flow of information between points on a network. It is important to know how each one in the flow of information. A router is common to many, especially in home networks. While connecting two or more networks, routers can do this whether these networks have the same or even different data link protocols, but the same network protocol. One advantage that a router has is that a router is capable of choosing the best route for the flow of information between networks, even if there are several possible routes. This is a result of the router knowing its own location within the network along with the packets final destination. The routing table, used by the router, identifies the best path. Another distinct advantage of a router is that it only deals with messages that are directly addressed to it. You will find that routers work on the Network Layer. Operating at the network layer, Gateways process messages using the network layer address. Interfacing between two or more dissimilar networks is what makes gateways more complex than routers. Although it’s usually different, Gateways do connect two or more networks that use different or the same data link and network protocols. This is accomplished by connecting with the same or even different kinds of cables. Gateways have also been known to operate on......

Words: 345 - Pages: 2

Routing Protocol Comparison

...Introduction 1 2.1 Industry Standard protocols vs. Proprietary protocols: 2 3.0 Technical Background 2 3.1 Types Of Routing Protocols 2 3.1.1 Static Routing 2 3.1.2 Distance Vector Protocols 3 3.1.3 Link-State Protocols 4 3.1.4 Advanced Distance Vector Protocol 5 3.1.5 Path Vector Protocols 5 4.0 Protocol Decision Criteria 5 5.0 OSPF 8 6.0 EIGRP 18 7.0 Analysis 21 8.0 Recommendation 22 9.0 References 23 9.1 URLs 23 9.1.1 OSPF 23 9.1.2 EIGRP 24 9.2 Books 24 9.2.1 OSPF 24 9.2.2 EIGRP 24 Executive Summary The network is based on the TCP/IP protocol, which permits the efficient routing of data packets based on their IP address. Cisco routers are used at various points in the network to control and forward the data. Alcatel OmniSwitch switch/routers are also used in the Site 2 facilities. At the current point a decision is being made by on whether to keep the existing Alcatel infrastructure in the Site 2 facility or migrate that equipment to similar Cisco equipment as exists in Site 1. The current Alcatel equipment is experiencing severe problems such as hardware failures, power supply failures, operating system memory leaks resulting in reboots. If the decision is made to upgrade the Alcatel switch/routers then an evaluation will need to be made on what the proper routing protocol should be running......

Words: 8531 - Pages: 35

Routing Protocol

...Introduction 1 2.1 Industry Standard protocols vs. Proprietary protocols: 2 3.0 Technical Background 2 3.1 Types Of Routing Protocols 2 3.1.1 Static Routing 2 3.1.2 Distance Vector Protocols 3 3.1.3 Link-State Protocols 4 3.1.4 Advanced Distance Vector Protocol 5 3.1.5 Path Vector Protocols 5 4.0 Protocol Decision Criteria 5 5.0 OSPF 8 6.0 EIGRP 18 7.0 Analysis 21 8.0 Recommendation 22 9.0 References 23 9.1 URLs 23 9.1.1 OSPF 23 9.1.2 EIGRP 24 9.2 Books 24 9.2.1 OSPF 24 9.2.2 EIGRP 24 Executive Summary The network is based on the TCP/IP protocol, which permits the efficient routing of data packets based on their IP address. Cisco routers are used at various points in the network to control and forward the data. Alcatel OmniSwitch switch/routers are also used in the Site 2 facilities. At the current point a decision is being made by on whether to keep the existing Alcatel infrastructure in the Site 2 facility or migrate that equipment to similar Cisco equipment as exists in Site 1. The current Alcatel equipment is experiencing severe problems such as hardware failures, power supply failures, operating system memory leaks resulting in reboots. If the decision is made to upgrade the Alcatel switch/routers then an evaluation will need to be made on what the proper routing protocol should be running......

Words: 8531 - Pages: 35

Protocols

...LAB 3.1-3.4 3.1.1 – WHAT WOULD HAPPEN IF WIRELESS DEVICES WERE NOT GOVERNED BY THE WI-FI ALLIANCE AND EACH VENDOR HAD ITS OWN STANDARDS AND PROTOCOLS? A. WIRELESS DEVICES WOULD HAVE DIFFICULTY COMMUNICATING. WHAT IS OKAY WITH ONE VENDOR MAY NOT BE OKAY WITH ANOTHER VENDOR. PRICES OF DEVICES AND CONNECTIONS WOULD ALSO CHANGE. 3.1.2 – GIVE AN EXAMPLE OF A MODEL THAT IS USED TO VISUALIZE SOMETHING THAT IS DIFFICULT TO OBSERVE OR PERCEIVE. A. CONNECTIONS REQUIRING ROUTER EQUIPMENT – HUBS, SWITCHES AND ROUTERS. 3.1.3 – WHAT ARE THE DIFFERENT LAYERS YOU THINK WOULD BE NECESSARY FOR COMMUNICATION TO BE MAPPED TO A MODEL? A. APPLICATION LAYER, PRESENTATION LAYER, SESSION LAYER, TRANSPORT LAYER, DATA LINK LAYER AND PHYSICAL LAYER. 3.1.4 – WHAT WILL HAPPEN IF A MODEL IS TOO GENERAL? TOO GRANULAR? A. THE MODEL WOULD NOT BE FLEXIBLE IF TOO GENERAL; IF TOO GRANULAR, A LOAD IMBALANCE WOULD OCCUR. 3.1 REVIEW – 1. WHY WOULD A 3-LAYER MODEL OF COMMUNICATION THAT HAS THE LAYERS PHYSICAL, NETWORK AND APPLICATIONS BE INSUFFICIENT TO ADEQUATELY DESCRIBE NETWORK COMMUNICATIONS? A. THE 7-LAYER COMMUNICATION MODEL WAS TESTED AND SUCCESSFULLY PROVEN TO WORK. IF A LAYER IS MISSING THE MODEL WILL NOT WORK PROPERLY. 2. WHAT IS THE HISTORY OF THE OSI REFERENCE MODEL? A. TO SERVE AS THE FOUNDATION OF THE ESTABLISHED WIDELY ADOPTED SUITE OF PROTOCOLS THAT ARE USED BY INTERNATIONAL INTERNETWORKS. 3. WHAT IS THE HISTORY OF THE TCP/IP MODEL? A. BOTH DEVELOPED TOGETHER (INTERNET AND TCP/IP)...

Words: 996 - Pages: 4

List of Protocols

...List of network protocols (OSI model) This article is about network protocols organized by OSI model. For network protocols organized by TCP/IP model, see Internet Protocol Suite. This is a list of network protocols, categorized by their nearest Open Systems Interconnection (OSI) model layers. This list is not exclusive to only the OSI protocol family. Many of these protocols are originally based on the Internet Protocol Suite (TCP/IP) and other models and they often do not fit neatly into OSI layers. The OSI model | 7 Application layer | 6 Presentation layer | 5 Session layer | 4 Transport layer | 3 Network layer | 2 Data link layer | * LLC sublayer * MAC sublayer | 1 Physical layer | * v * t * e | பொருளடக்கம் * 1 Layer 1 protocols (physical Layer) * 2 Layer 2 protocols (Data Link Layer) * 3 Layer +3 protocols * 4 Layer 3 protocols (Network Layer) * 5 Layer 3.5 protocols * 6 Layer 3+4 protocol suites * 7 Layer 4 protocols (Transport Layer) * 8 Layer 5 protocols (Session Layer) * 9 Other protocols * 10 Layer 7 protocols (Application Layer) * 11 Protocol description languages * 12 See also * 13 Further reading * 14 External links Layer 1 protocols (physical Layer) * Telephone network modems- V.92 * IRDA physical layer * USB physical layer * EIA RS-232, EIA-422, EIA-423, RS-449, RS-485 * Ethernet physical layer Including 10BASE-T, 10BASE2, 10BASE5, 100BASE-TX,......

Words: 1041 - Pages: 5

Protocols

...A protocol is a set of invisible compute rules that govern how an Internet document will be transmitted onto the screen. For two computers to communicate with one another, they must be able to understand one another through the same language. In order for computers to exchange information there must be a preexisting agreement as to how the information will be structured and how the sides will send and be received. The most important that defines the common networking protocols is the OSI known as Open Systems Interconnection. Introducing the TCP and the IP are two different protocols that are often linked together. The linking of several protocols is fairly common since the functions of different protocols may be complementary so that together they carry out particular tasks that are bases of operation layers. These suits of protocols are often used with many local area networks and carries out the basic operations of the Internet. Emailing also has its own set of protocols that has a variety of both for sending and receiving mail. The most common protocol for sending mail is the SMTP that is known for as Simple Mail Transfer Protocol. Then for receiving emails, the protocol being most commonly used is the Post Office Protocol, POP for short. Both the SMTP and the POP is used for managing the transmission for delivery of mail across the Internet. Web pages that are constructed to a standard method are called Hypertext Markup Language known as HTMO. The HTMP......

Words: 413 - Pages: 2

Protocols

...Protocols Just like wired and TCP/IP communications, wireless communications has its own set of protocols. These protocols exist to govern wireless communications for mobile phones, pagers, and other wireless devices (Protocols.com). Protocols that exist for wireless communications such as wireless session protocol, wireless transaction protocol, wireless transport layer security, and wireless datagram protocol each covering different aspects of the communications model (Protocols.com). Just like wired and TCP/IP communications, wired communication protocols exist in a wireless communications OSI model (Protocols.com). The wireless communications OSI model is divided into the following layers; application layer, session layer, transaction layer, security layer, transport layer (Protocols.com). Each layer of the wireless communications OSI model has is associated protocols. The necessity for different protocols for wireless communications comes from this “WAP Stack” which is the model for wireless data transfer (Protocols.com). Each layer of the model is governed by different protocols, and are divided as follows. * Application Layer Protocols * WAE or Wireless Application Environment * WTA or Wireless Telephony Application (Protocols.com) * Session Layer Protocols * WSP or Wireless Session Protocol (Protocols.com) * Transaction Layer Protocols * WTP or Wireless Transaction Protocol (Protocols.com) * Security Layer Protocols * WTLS or Wireless Transport Layer......

Words: 278 - Pages: 2

Protocols

...The four major protocols for circuit switching and packet switching are as follows: • X.25 • Frame Relay • ATM or Asynchronous Transfer Mode protocol • TCP/IP X.25 is probably one of the very first of packet switching protocols. It performs really well, especially considering how long it has been around. X.25 uses a virtual circuit approach, mainly using POTS or plain old telephone service lines, which are different from lines such as ISDN. The POTS lines are analog copper lines, so they can experience a lot of errors. But, once the lines have been connected, X.25 connections are really reliable. It's quite an efficient way to send packets across various data networks, with the X.25 protocol redundant error checking at each of the nodes. Frame relay is different because it doesn't require the need for analog wires or overhead wires like X.25 does. But this means that Frame Relay doesn't have the added framing and processing that X.25 has that provide guaranteed data transfers. It also doesn't have link to link reliability. So if a frame is corrupted, it is discarded, which is different than TCP as it detects and recovers any and all discarded frames. Asynchronous Transfer Mode protocol is used with either a coaxial cable, twisted pair, or fiber. ATM also takes advantage of a 53-btye cell, having 48 application bytes and 5 bytes are allocated for the ATM headers. ATM shows a lot more enhancements over Frame......

Words: 487 - Pages: 2

Borders

...James Baldwin High School Anselmo Anorve A Block April 29th, 2012 Borders Since 1790 to 2006, certain immigration policies have been put in place. Most which seem unfair to certain immigrants coming into the U.S., restricting them because of their race, lack of intelligence, or because they just didn’t have the right skills in order to work in the U.S. We will be focusing on 4 immigration policies overall. 2 racial based policies, like the Chinese Exclusion Act of 1882. The Chinese Exclusion Act prohibited Chinese immigrants from coming into the U.S. Also along with the Chinese Exclusion Act is the Naturalization Act of 1790. The Naturalization Act of 1790 only really focused on the U.S.’s need to bring in people with “good moral character” because the U.S. wanted to make their nation, to what they believed as “pure”. Also, 2 profession based policies, like the Immigration Reform and Control Act of 1986, which was a law that took away jobs from every single immigrant that was in the U.S. without proper documentation. Also, the Secure Fence Act of 2006 which is a law that allowed for a huge fence to be placed along the U.S.-Mexico border in order to prevent immigrants from Mexico from sneaking into the U.S. Based on these policies the Immigration Policies from 1790 to 2006 were unjustified because they limited certain immigrants from coming into......

Words: 4021 - Pages: 17

Borders

...Appendix 19 Executive Summary Borders Bookstore is a major leader in the book retail industry, with a differentiated strategy focusing on customer experience and a category management system. New technological growth such as the “Title Sleuth” and e-commerce capabilities allow Borders to stay competitive. The book retail industry is affected by the recent decline of the USA economy, though Borders continues to make a profit. Globalization and technology are factors of the industry, as well as dealing with large amounts of inventory. The competition is fierce and aggressive, consisting of Barnes and Noble, Amazon, Books-A-Million, independent book sellers, Wal-Mart, Target, and Sam’s Club. Rivalry among competitors is amplified between Borders and Barnes and Noble. Other forces, such as substitutes, buyers, suppliers, of the industry environment range in strength. Comparing Borders and Barnes and Noble’s financial data shows that Borders appears to be gaining more profits and using equity more advantageously than the competitor. Yet, Borders must not lose sight of its own weaknesses and threats. Focusing on strengths and opportunities, while improving weaknesses is key for Borders’ success. The value net for Borders is another consideration for the company. Although customers are the number one priority, Borders must realize the effect its decisions have on the stakeholders. Borders seems to be leading the market, and should......

Words: 3708 - Pages: 15

Protocols

...LAYER PROTOCOLS • IP (Internet Protocol) • ICMP (Internet Control Message Protocol) • ARP (Address Resolution Protocol) • RARP (Reverse Address Resolution Protocol) 4.7.1 The IP PROTOCOL • IP represents the heart of the Internet Protocol suite • Provides the main service of the layer: data transmission in connectionless mode – datagram IP Header Format IP Header Format (Including user data, this makes an IP packet) IP Header fields: • Version - Indicates the version of IP currently used (now 4); • IP Header Length - Indicates the datagram header length in 32-bit words (value = 5); • Type-of-service - Specifies how a particular upper-layer protocol would like the current datagram to be handled. Datagrams can be assigned various levels of importance through this field; • Total length - Specifies the length of the entire IP packet, including data and header, in bytes. • Identification - Contains an integer that identifies the current datagram (sequence number). This field is used for re-assembling the datagram fragments; • Flags - A 3-bit field for fragmentation control:  000 - last fragment;  001 - not last fragment;  010 - the fragmentation not allowed. • Fragment offset - measured in double-words (offset from main datagram); • Time-to-live - Maintains a counter that gradually decrements down to zero, at which point the datagram is discarded. This keeps packets from looping endlessly; • Protocol - Indicates which upper-layer protocol......

Words: 1379 - Pages: 6

Borders

...successes. Borders Group, Inc. was one of those companies whom were not successful in the business world. First founded in 1971 in Ann Arbor, Michigan by Tom and Louis Borders felt that their look of books would be transfer to the many people of Ann Arbor. The former Chairman and CEO Mike Edwards and former President Scott Henry were optimistic as well of this retail bookstore to grow and make money. With the idea of growth, Borders grew to 511 superstores in the United States by January 30, 2010 and 175 Waldenbooks Specialty Retail, which is subsidiaries company seem to show things were going good, Non the less in February 16, 2011, Borders applied for Chapter 11 bankruptcy. What could have happened in the short 40 years that would make this company lose it all? Even the mission and vision statements of Borders Groups cloud not save this company. The Mission statement was divided in to two parts: “Our Vision” and “Our Values” and their vision statement stated, “To create richer and more satisfying lives through knowledge and entertainment.” (Farfan, para 3). There could be much reason why Borders did not success has these articles states these are explanations on why: 1. It was too late to the Web. a. With growth of social media and shopping online Borders Books did not jump the chances to embrace the internet. Second, when it did open its online store it outsources to Amazon.com giving Amazon the chance to grow its business and given be able to buy out......

Words: 814 - Pages: 4

Borders

...Characteristics of Business Management The purpose of this paper is to show a comparison of two successful businesses. Borders Books and Amazon.com are two companies that both sold books but used different methods in operating their businesses. Even though they both were successful businesses, both companies had different leadership styles, visions and goals. Out of the two businesses, only one remain successful and present today. In this paper, I will show how both businesses started, how the leaders differ in leadership styles and techniques, and how Amazon continues to be a great success today. Description of the Businesses I will describe each business and how each business started. I will also describe three main challenges each company faced while establishing or running the business. Amazon.com was founded in 1994 by Jeff Bezos as an online bookstore. As CEO he has built it into the largest retailer on the web, selling everything from groceries to electronics and shoes. Jeff Bezos was working in a quantitive analysis group at an investment firm, when he saw an opportunity to sell books on the internet. In 1994 he went on a cross-country drive from New York to Seattle to start Amazon. He typed his business plan as he went. And he picked up $300,000 dollars from his parents in Fort Worth, Texas. He set up his business in his garage and began selling books via the internet. His business became worth $4.4 billion according to Forbes' latest billionaire...

Words: 1656 - Pages: 7

Gateway

...Recommendation In order to meet the stated objectives of four stops per hour and 5,000 deliveries per day, our official recommendation is that an investment in management systems will be absolutely necessary to achieve those goals. They simply cannot continue to achieve their growth targets with the incomplete system they have in place presently. CEO Claud Germain touts the company focus as one of logistical execution. An absolute requisite for excellence in logistics are analytics and support systems. Furthermore, Gateway as an e-tailer will need to enhance their purchasing systems and include mobile purchasing applications and software that further bolster the recommended technological improvements. Square is a good company to consider with iPad, iPhone, and android support built in with the hardware that attaches to those devices seamlessly. Dominque’s first option of extending driver shifts comes with a massive increase in potential problems. Having drivers on the road for extended periods of time provides the propensity for increases in accidents, mistakes in delivery and overall compounds the likelihood of human error to appear. The bottom line is tired and overworked drivers equal unsafe and unhappy drivers. This move would also require significant investment in staff support to ensure service levels would remain adequate. The second option was to bolster the RIMMS system to enhance the analytical capabilities to include profitability measures as well as......

Words: 1075 - Pages: 5