What is border gateway protocol, Computer Network Security

Border Gateway Protocol

It is a protocol needed to advertise the set of networks that can be achieved within an autonomous machine. BGP activates this information to be shared with the autonomous machine. This is newer than Exterior Gateway Protocol. Border Gateway Protocol is the protocol which creates basic routing decisions on the Internet. It performs a table of IP networks or 'prefixes' which define network reach-ability among autonomous systems. It is defined as a path vector protocol. BGP does not need traditional Interior Gateway Protocol metrics, but creates routing decisions based on way, network policies and/or principal-sets. For that reason, it is known as reach-ability protocol not the routing protocol.

 

2399_Border Gateway Protocol.png

Posted Date: 8/20/2012 3:16:50 AM | Location : United States







Related Discussions:- What is border gateway protocol, Assignment Help, Ask Question on What is border gateway protocol, Get Answer, Expert's Help, What is border gateway protocol Discussions

Write discussion on What is border gateway protocol
Your posts are moderated
Related Questions
Question 1: (a) Explain the operation of the "matchmaker" middle agent. (b) Describe why broker middle agents are more efficient in terms of the time taken for a service to

IPV6 NEXT HEADER It is given in the figure below:

UDP INTERACTION  UDP follows four kinds of interaction 1-to-1: One application can interact with one application. 1-to-many: One application can interact with many

QUESTION (a) Describe the role of DNS root servers in the Internet network. (b) What do you understand by the handover concept in a mobile network? (c) List five meth

Question: (a) Explain the following security services: Confidentiality, Availability. (b) Which attack will be used to bypass even the best physical and logical security m

Government funding has been given to a university consortium establishing a repository of resources for school teachers. They have engaged you to develop a search facility for teac

Question: a) Explain what you understand by the term brute force attack, giving an example of such an attack b) Briefly outline the concept of Caesar cipher and identify a

QUESTION a) Determine the RTT (round trip time) between a client requesting a web page of 1024 bytes in size from an internal web server on a 100 Base-T Ethernet. Consider a o

(a) Using the extended Euclidean algorithm, find the multiplicative inverse of 504 mod 67. (b) Decrypt the following ciphertext, which has been encrypted using Caesar cipher:

Question: The Wired Equivalent Privacy (WEP) standard was created in order to give wireless networks safety and security features similar to that of wired networks. (a) L