What is border gateway protocol, Computer Network Security

Border Gateway Protocol

It is a protocol needed to advertise the set of networks that can be achieved within an autonomous machine. BGP activates this information to be shared with the autonomous machine. This is newer than Exterior Gateway Protocol. Border Gateway Protocol is the protocol which creates basic routing decisions on the Internet. It performs a table of IP networks or 'prefixes' which define network reach-ability among autonomous systems. It is defined as a path vector protocol. BGP does not need traditional Interior Gateway Protocol metrics, but creates routing decisions based on way, network policies and/or principal-sets. For that reason, it is known as reach-ability protocol not the routing protocol.

 

2399_Border Gateway Protocol.png

Posted Date: 8/20/2012 3:16:50 AM | Location : United States







Related Discussions:- What is border gateway protocol, Assignment Help, Ask Question on What is border gateway protocol, Get Answer, Expert's Help, What is border gateway protocol Discussions

Write discussion on What is border gateway protocol
Your posts are moderated
Related Questions
'Near Field Communication' (NFC) technologies are expected to become commonplace in the near future. Some relevant features are these: A suitable device (such as a mobile pho


Designing and coding of Job search mechanism: Project Title: FREEHIVE (Sep 2005- Nov 2006) Role             : Developer Domain         : Social Network Client

FRAGMENT IDENTIFICATION: IDENT field in every fragment matches IDENT field in real datagram. Fragments from different datagrams may arrive out of order and still be saved out.

Application Gateways / firewall The application level firewall is installed on a dedicated computer; also called as a proxy server. These servers can store the recently accessed

Question 1 The speech act theory is used as the model for communication among computational agents. Locution, illocution, and perlocution are the 3 aspects of this theory Using

Using the selected approach, you should then conduct an audit or review of the information security issues associated with the use of computing facility and report on the findings.

Management of Classified Data Management of classified data comprises of its storage, distribution, portability, and destruction of classified data. All information which is not

Question 1: (a) (i) Radio waves are subject to several propagation problems. Name any three of them. (ii) A Wi-Fi receiver requires a signal power of 50mW to operate correc

FRAGMENTATION Fragmentation information is kept in different extension header.  Every fragment has base header and fragmentation header. Whole datagram including original hea