What is border gateway protocol, Computer Network Security

Border Gateway Protocol

It is a protocol needed to advertise the set of networks that can be achieved within an autonomous machine. BGP activates this information to be shared with the autonomous machine. This is newer than Exterior Gateway Protocol. Border Gateway Protocol is the protocol which creates basic routing decisions on the Internet. It performs a table of IP networks or 'prefixes' which define network reach-ability among autonomous systems. It is defined as a path vector protocol. BGP does not need traditional Interior Gateway Protocol metrics, but creates routing decisions based on way, network policies and/or principal-sets. For that reason, it is known as reach-ability protocol not the routing protocol.

 

2399_Border Gateway Protocol.png

Posted Date: 8/20/2012 3:16:50 AM | Location : United States







Related Discussions:- What is border gateway protocol, Assignment Help, Ask Question on What is border gateway protocol, Get Answer, Expert's Help, What is border gateway protocol Discussions

Write discussion on What is border gateway protocol
Your posts are moderated
Related Questions
Hello i have submitted an assignment and i am still waiting to know if it has been accepted or not the ref number is TicketID: EM201381BRY525CN, the due date is for monday 27th of

Question: (a) Which of the following is not a goal of security: i) detection ii) prevention iii) recovery iv) prosecution (b) You are an honest student. One day you

Question : (a) How does a 2-key rollover differ from the N-key rollover? (b) Why is isolation so important in interfacing? (c) Explain what is software debouncing.

what is relation ship between computer security goals?

Problem a) Give the destination IP address, upper layer protocol, TTL in decimal and header checksum in hexadecimal; the source port number and the destination port number in deci

Is standard TCP effective in mobile wireless networks that operate with the IEEE 802.11 wireless local area network protocol?Discuss the issue

Information and Network Security Part 1- Recovery of an encrypted `word' using a forward search attack. Complete and correct summary for part 1. Adequately commented, clea

MB Enterprise Systems Ltd based in Mauritius is a company specialized in application development with Europe as the main customer base. The company has implemented CMMI and has rec

attacks on crytography

Illustrate about TinySec Protocol TinySec is implemented on the link layer and addresses security requirements of the resource staffed nodes in the WSN based on the link layer