StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Use of the Border Gateway Protocol - Essay Example

Cite this document
Summary
The essay "Use of the Border Gateway Protocol" focuses on the critical analysis of the major issues in the use of the Border Gateway Protocol (BGP), the routing protocol that necessitates the Internet to operate. The address provided on the Internet is not in comparison as hierarchical…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.8% of users find it useful
Use of the Border Gateway Protocol
Read Text Preview

Extract of sample "Use of the Border Gateway Protocol"

BGP is frequently the protocol but into consideration between gateway hosts contained in the Internet. The routing board comprises a list of known routers with the addresses each router can reach, and a cost metric allied with the path of an independent router resulting in the best available route to be selected (Randy, 2003).

Hosts that have BGP links by the use of Transmission Control Protocol (TCP) which sends updated router board information only when one host has spotted a change. Here only the affected part of such a routing board is sent. BGP links to automatically functioning local networks by the use of Internal BGP as it is not compatible with IGP. The routers contained the automatic network thus upholding two routing boards: an interior gateway protocol and an IBGP. This results in easy-to-use Unrestricted Inter-Domain Routing (UIDR). This is a way to have more addresses in the network than using the current IP address assignment system (Clark, 2003).

Egypt was able to efficiently detach itself from the internet system by pulling its usual visible routes contained in the BGP routing board. The IP addresses identifying computers linked to the internet through Egypt’s ISPs were fundamentally detached from the world connection system. This resulted in computers in Egypt being compared to houses that have no mailboxes, not on any map. Hence the other connection to the downstream countries was unaffected (Tim, 1999).

This was facilitated as a BGP ‘advertise’ the native address prefixes to adjoining networks. This made routers to identify where to send packet data with a specified endpoint address. Almost 3,500 Egyptian prefixes at this time were not advertised this made it possible to make them appear missing from the routing board of BGP routers around the globe but not necessarily affecting the other countries' connection. That meant that routers in this case longer knew where to direct packets addressed to IP addresses contained in the detached prefixes—even though all their cables are in good working condition (Beijnum, 2002).

Since the disconnection of the internet in Egypt involved the removal of more than 3,500 Border Gateway Protocol (BGP) routes, this could not have disconnected the downstream countries as the BGP only cuts the connection between the computer in mention and the connection to the outside world not necessarily cutting the entire connection. This was the reason that made other countries connected and the cables connecting the downstream countries and Egypt to the world passed through Egypt with only a diversion to Egypt servers.

This meant that the countries downstream did not have a direct connection with Egypt hence after Egypt shutting down its system there was no effect on them as the BGP only allows the disconnection of the system with the server.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Networking Essay Example | Topics and Well Written Essays - 500 words - 2”, n.d.)
Networking Essay Example | Topics and Well Written Essays - 500 words - 2. Retrieved from https://studentshare.org/information-technology/1681378-networking
(Networking Essay Example | Topics and Well Written Essays - 500 Words - 2)
Networking Essay Example | Topics and Well Written Essays - 500 Words - 2. https://studentshare.org/information-technology/1681378-networking.
“Networking Essay Example | Topics and Well Written Essays - 500 Words - 2”, n.d. https://studentshare.org/information-technology/1681378-networking.
  • Cited: 0 times

CHECK THESE SAMPLES OF Use of the Border Gateway Protocol

TCP/IP Security Threats and Attack Methods

In places where the reliability factor of the data stream service is not so relevant as compared to other features such as reduced latency, it is common to witness the use of User Datagram Protocol (UDP).... The 'Internet protocol Suite' is one such set of communication protocols and is popularly known as TCP/IP.... The name, 'TCP/IP' is derived from two of the most integral protocols within the suite and stands for: the Transmission Control protocol (TCP) and the Internet protocol (IP)....
20 Pages (5000 words) Report

Internetworking IpV6 vs IpV4: Compare and Contrast

The paper analyses the similarities and differences that exists between the two versions of internetworking protocol; IPv4 and IPv6 while stating their major characteristics, advantages as well as their limitations.... A new version of the internetworking protocol, IPv6, was designed to address the service and scalability shortcomings of the previous version, IPv4.... Unfortunately, machines and systems designed to one protocol cannot directly communicate with another machine designed to the other protocol due to the incompatibility between the two protocols....
17 Pages (4250 words) Research Paper

Anatomy of an Internet Routing Protocol

This protocol is most useful as an 'interior gateway protocol'.... It is also knows as Interior gateway protocol (IGP).... Therefore, in this article easy, simple and alternative technique is illustrated exclusively of the use of calculators, software, tables, and others in order to understand subnetting.... In fact, this article is made for the readers who are supposed to have some knowledge regarding the use of subnetting, IP addressing and the function of a subnet mask....
13 Pages (3250 words) Coursework

Evaluation of Routing Protocols

This protocol is most useful as an “interior gateway protocol”.... It is also knows as Interior gateway protocol (IGP).... The following sections contains advantages and disadvantages of each routing protocol specified along with its administrative distance, metrics, periodic updates, triggered updates, partial updates, VSLM / CIDR subnet masking and algorithms.... s per network dictionary it is defined as “Routing Information protocol (RIP) is a standard for exchange of routing information among gateways and hosts....
8 Pages (2000 words) Essay

Web Security

There are several protocols, which are used in this network layer commonly known as internet protocol (Blaze et al, 1996; Blaze et al, 1999).... In many cases, the standard protocol technique, which is employed by the IPSEC, involves summarizing a coded network layer-packet, which is usually placed on a standard network packet, which normally makes the encryption more vivid to the transitional protuberances, which must process packet headers for the drive of routing....
6 Pages (1500 words) Essay

Study of protocols in a VoIP network

Voice over Internet protocol (VoIP) refers to the transmission technology used in delivering voice communications over IP networks such as the Internet or other IP-based networks.... Services like call forwarding, conference calling, voicemail, contact management and directory assistance were later added and paved the way for the creation of a new revolutionary technology - Voice over Internet protocol or VoIP.... A gateway refers to the equipment used to provide connectivity between an H....
16 Pages (4000 words) Essay

Network Infrastructure Basics

This often constitutes a group of protocols that function as a unit, and they are referred to as protocol suite.... An internet protocol suite is referred to as TCP/IP and is the widely used protocol suite.... There are numerous TCP/IP protocol suites, and the wider category include web browsing, security protocols, file transfer, E-mail, network services, network management, transport protocols, and control protocols.... The TCP/IP protocol suite works independently of the physical network architecture (Dye, McDonald, and Rufi, 2008)....
4 Pages (1000 words) Assignment

Design Internet Services Providers Network

For example, even though customers to customers have different preferences for the path they would like to use, today's Internet Services Providers (ISPs) are not able to provide such customized services.... This report "Design Internet Services Providers Network" discusses the commercialization of the internet, it has received phenomenal success and exponential growth....
6 Pages (1500 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us