What is border gateway protocol, Computer Network Security

Border Gateway Protocol

It is a protocol needed to advertise the set of networks that can be achieved within an autonomous machine. BGP activates this information to be shared with the autonomous machine. This is newer than Exterior Gateway Protocol. Border Gateway Protocol is the protocol which creates basic routing decisions on the Internet. It performs a table of IP networks or 'prefixes' which define network reach-ability among autonomous systems. It is defined as a path vector protocol. BGP does not need traditional Interior Gateway Protocol metrics, but creates routing decisions based on way, network policies and/or principal-sets. For that reason, it is known as reach-ability protocol not the routing protocol.

 

2399_Border Gateway Protocol.png

Posted Date: 8/20/2012 3:16:50 AM | Location : United States







Related Discussions:- What is border gateway protocol, Assignment Help, Ask Question on What is border gateway protocol, Get Answer, Expert's Help, What is border gateway protocol Discussions

Write discussion on What is border gateway protocol
Your posts are moderated
Related Questions
Consider a computer system with three users: Alice, Bob and Cindy. Alice owns the file alicerc, and Bob and Cindy can read it. Cindy can read and write the file bobrc, which Bob ow

Re: Website Google Ranking Hello! Hope you are doing well. I discovered some major issues in your website which might be the cause for the Google Penalties and poor search ranki

Hybrid Cryptography Systems This makes use of different cryptography systems. Except digital certificates, pure asymmetric key encryption is not used extensively. Asymmetric enc

Ask You have been asked by a new client to assist in setting up a new computer for her coffee shop. She has just purchased the newest Apple computer from an online site. Should wou

Q. Attacks on wireless network WSN are vulnerable to attacks which compromise the integrity of the WSN nodes by decreasing the nodes' fault tolerance capabilities, data distrib

Network security has become much more complex than ever before. New types and sources of network security threats, always-on high-speed Internet connections, wireless networking, a

Detect each visit to www.google.com that is made by the machine. o Send an alert when an activity relating to network chat is detected. o Send an alert when an attempt is made for

TRAP AND TRACE SYSTEMS Trap and Trace Systems use techniques to detect an intrusion and trace it back to its source. Trap comprises of honey pot or padded cell and alarm. The dr

#Under what circumstances would the use of a SecSDLC be more appropriate than an SDLC?

INFORMATION SECURITY POLICY PRACTICES AND STANDARDS Management from all the communities of interest should consider policies as basis for all information security efforts. Polic