What is border gateway protocol, Computer Network Security

Border Gateway Protocol

It is a protocol needed to advertise the set of networks that can be achieved within an autonomous machine. BGP activates this information to be shared with the autonomous machine. This is newer than Exterior Gateway Protocol. Border Gateway Protocol is the protocol which creates basic routing decisions on the Internet. It performs a table of IP networks or 'prefixes' which define network reach-ability among autonomous systems. It is defined as a path vector protocol. BGP does not need traditional Interior Gateway Protocol metrics, but creates routing decisions based on way, network policies and/or principal-sets. For that reason, it is known as reach-ability protocol not the routing protocol.


2399_Border Gateway Protocol.png

Posted Date: 8/20/2012 3:16:50 AM | Location : United States

Related Discussions:- What is border gateway protocol, Assignment Help, Ask Question on What is border gateway protocol, Get Answer, Expert's Help, What is border gateway protocol Discussions

Write discussion on What is border gateway protocol
Your posts are moderated
Related Questions
Describe the important features of application layer. The features of the application layer are as follows. 1. Efficient User Interface Design is explained below: Appli

TOKEN RING Many LAN methods that are ring topology need token passing for synchronized access to the ring. The ring itself is acts as a single shared communication phase. Both

You are designing a Demilitarized zone for a large corporation. Using design best practice, and the information that you have learned so far, propose a design that will provide the

Question: (a) What do you understand by the term "integrity"? (b) Which type of attack denies authorized users access to network resources? (c) You have discovered tha

Problem 1: Discuss how TWO of the following gurus have contributed to the Quality Movement, highlighting the major points of their philosophies: (a) Edward Deming (b) Jose

Question 1: (a) Explain the operation of the "matchmaker" middle agent. (b) Describe why broker middle agents are more efficient in terms of the time taken for a service to

IPV6 NEXT HEADER It is given in the figure below:

Listing Assets in Order of Importance Weighting should be created for each category based on the answers to questions. The relative importance of each asset is calculated usin

Host-Based IDS A host-based IDS (HIDS) resides on a particular computer or server and monitors activity only on that system. HIDS also called as system integrity verifiers as th

Ask question #Minimum 100 words acceptwwwed#