SlideShare a Scribd company logo
1 of 23
Created by:-
Sandhu Khushbir
Singh
BCA 3 Year
79 A
 A network is a collection of computers,
servers, mainframes, network devices,
peripherals, or other devices connected to
one another to allow the sharing of data. An
excellent example of a network is
the Internet which connects millions of
people all over the world.
 To communicate from one network to
another network the IP Address plays an
important role.
 An Internet Protocol address (IP address) is a
numerical label assigned to each device
connected to a computer network that uses
the Internet Protocol for communication.
 Two version – ipv4 = 32 bit, ipv6= 128 bits.
 ROUTER
A router is a networking device that
forwards data packets between computer
networks.
 Routing protocols are the set of rules used by
the routers to communicate between source
& destination.
 This protocols finds the best path to send the
packet from source to destination.
Types of
routing
protocol
Static routing
protocol
Default
routing
protocol
Dynamic Routing
Protocol
Interior
Gateway
Protocol
Distance
Vector
RIP
RIPV1 RIPV2
Link State
OSPF EIGRP
Exterior
Gateway
Protocol
BGP
 Static routing ,when an administrator manually assigns
the path from source to destination network. This is
feasible in small networks, but not in large networks.
 Advantages:- – No overhead on router CPU.
– No bandwidth usage between links.
– Security (only administrator add routes.)
 Disadvantages:-– All link will be down on a link failure.
– Not practical on large networks.
– Administrator must update all routes.
 This is the method where the router is
configured to send all packets towards a single
router (next hop). It doesn’t matter to which
network the packet belongs, it is forwarded out
to router which is configured for default
routing.
 Advantages:- – No overhead on router CPU. –
-No bandwidth usage between links.
– Security (only administrator add routes.)
 Disadvantages:- – All link will be down on a link failure.
– Not practical on large networks.
– Administrator must update all routes.
 Dynamic Routing is the process in which routing tables
are automatically updates by routing table of each
neighbor. – Dynamically discover & maintains routes.-
calculates routes
 Advantages – Less work in maintaining the configuration
when adding & deleting networks.
– Protocols automatically react to the topology changes.
– Configuration is less-prone.
 Disadvantages – Routers resource are used.
– More administrator knowledge is required for configuration
IGP EGP
 IGP stands for Interior
Gateway Protocol.
 This is a routing
protocol that is used to
exchange routing
information within an
autonomous system
(AS).
 Examples- RIP, IGRP,
EIGRP, OSPF.
 EGP stands for Exterior
Gateway Protocol.
 It is used to transfer
the data packets
between two different
autonomous systems.
 Examples- BGP
Autonomous System :- It is group of IP networks
which has a single and clearly defined policy
 These protocols selects the best path in the basis
of hop counts to reach a destination network in
the particular direction. Here one router counts as
a one hop .
Characteristics:-
 Updates Frequently
 Each Router is only aware of its immediate neighbors.
 Slow convergence.
 Make create routing loops.
 Easy to configure.
A. RIP is true distance vector routing protocol
B. Uses hop count metric
C. Supports 15 hop-count limit
D. AD value is 120.
E. Supports classful networks and version 2 support classless.
F. Works well in small network.
G. Sends complete routing table at every 30 seconds.
H. It uses Bellman-Ford algorithm to measure hop count
 Disadvantages:-
 Generate Traffic
 As full routing table is exchange it create
security issue.
Configuration
Link state routing is a technique in which each router
shares the knowledge of its neighborhood with every
other router in the internetwork.
 Characteristics:-
 Updates are event triggered.
 Each router is aware of all other routers in the area.
 Fast convergence.
 More difficult to configure.
 Updates require less bandwidth.
 Example - OSPF
 OSPF stands for Open Shortest Path First.
 This works by using the Dijkstra algorithm
 It has unlimited Hop count. And in this area number is provide
 It is the open source protocol
 AD value is 110.
 Supports classless network.
 Supports VLSM/CIDR & has unlimited hop counts.
 Supports hierarchical network
 It has two packets 1. Hello packet 2. LSA Packet.
 It has 3 types of tables 1. Neighbor table 2. Topology table
3.Routing table.
• It makes internet work.
• Standardized exterior gateway protocol.
• Designed to exchange routing and reach ability of info b/w
autonomous systems.
• Often classified as a path vector protocol.
• BGP makes routing decisions based on paths , n/w policies or rule –
sets configured by a n/w administrator & is involved in making core
routing decisions.
• BGP makes use of routing within an autonomous
system(AS).
• It is one the most complex and difficult to configure
protocol but its emphasis on security and scalability makes
its usage essential.
Router1(config)# bgp 1
Router1 (config-router)# Network 10.0.14.1 remote-as 4
Router1 (config-router)# Network 10.0.15.1 remote-as 5
THANK
YOU…….

More Related Content

What's hot (20)

Overview of Spanning Tree Protocol
Overview of Spanning Tree ProtocolOverview of Spanning Tree Protocol
Overview of Spanning Tree Protocol
 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocol
 
Ospf.ppt
Ospf.pptOspf.ppt
Ospf.ppt
 
Bgp protocol
Bgp protocolBgp protocol
Bgp protocol
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information Protocol
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IP
 
IP Multicasting
IP MulticastingIP Multicasting
IP Multicasting
 
03 ospf
03 ospf 03 ospf
03 ospf
 
OSPF
OSPF OSPF
OSPF
 
Igmp presentation
Igmp presentationIgmp presentation
Igmp presentation
 
Ospf
 Ospf Ospf
Ospf
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
 
Eigrp.ppt
Eigrp.pptEigrp.ppt
Eigrp.ppt
 
6 understanding DHCP
6 understanding DHCP6 understanding DHCP
6 understanding DHCP
 
Ccnp presentation [Day 1-3] Class
Ccnp presentation [Day 1-3] ClassCcnp presentation [Day 1-3] Class
Ccnp presentation [Day 1-3] Class
 
Telnet & SSH Configuration
Telnet & SSH ConfigurationTelnet & SSH Configuration
Telnet & SSH Configuration
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)
 
Spanning Tree Protocol
Spanning Tree ProtocolSpanning Tree Protocol
Spanning Tree Protocol
 

Similar to Routing Protocols

All in one q & ans
All in one q & ansAll in one q & ans
All in one q & ansRavi Kodoli
 
Basic Introduction to Technology (networking).pdf
Basic Introduction to Technology (networking).pdfBasic Introduction to Technology (networking).pdf
Basic Introduction to Technology (networking).pdftthind
 
Routing protocols.pptx
Routing protocols.pptxRouting protocols.pptx
Routing protocols.pptxMNSUAM
 
Lecture number 5 Theory.pdf(machine learning)
Lecture  number  5 Theory.pdf(machine learning)Lecture  number  5 Theory.pdf(machine learning)
Lecture number 5 Theory.pdf(machine learning)ZainabShahzad9
 
IPv6 Routing.pdf
IPv6 Routing.pdfIPv6 Routing.pdf
IPv6 Routing.pdfniran10
 
3 ip routing eigrp
3 ip routing eigrp3 ip routing eigrp
3 ip routing eigrpSagarR24
 
Basic networking
Basic networkingBasic networking
Basic networkingajeeshr3
 
Final Presentation on the Network layer
Final Presentation on the Network layerFinal Presentation on the Network layer
Final Presentation on the Network layerZee Haak
 
Chapter 06 - Routing
Chapter 06 - RoutingChapter 06 - Routing
Chapter 06 - Routingphanleson
 
Layer3protocols
Layer3protocolsLayer3protocols
Layer3protocolsassinha
 
ConfigureTwo networks principle
ConfigureTwo networks principleConfigureTwo networks principle
ConfigureTwo networks principleDrAlneami
 

Similar to Routing Protocols (20)

Dynamic routing
Dynamic routingDynamic routing
Dynamic routing
 
All in one q & ans
All in one q & ansAll in one q & ans
All in one q & ans
 
Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)
 
Basic Introduction to Technology (networking).pdf
Basic Introduction to Technology (networking).pdfBasic Introduction to Technology (networking).pdf
Basic Introduction to Technology (networking).pdf
 
C0343015019
C0343015019C0343015019
C0343015019
 
Qs.pptx
Qs.pptxQs.pptx
Qs.pptx
 
1Routing Basics.pdf
1Routing Basics.pdf1Routing Basics.pdf
1Routing Basics.pdf
 
Routing protocols.pptx
Routing protocols.pptxRouting protocols.pptx
Routing protocols.pptx
 
Lecture number 5 Theory.pdf(machine learning)
Lecture  number  5 Theory.pdf(machine learning)Lecture  number  5 Theory.pdf(machine learning)
Lecture number 5 Theory.pdf(machine learning)
 
IPv6 Routing.pdf
IPv6 Routing.pdfIPv6 Routing.pdf
IPv6 Routing.pdf
 
Dynamic routing
Dynamic routingDynamic routing
Dynamic routing
 
Arun project-Final
Arun project-FinalArun project-Final
Arun project-Final
 
3 ip routing eigrp
3 ip routing eigrp3 ip routing eigrp
3 ip routing eigrp
 
ROUTING
ROUTINGROUTING
ROUTING
 
Basic networking
Basic networkingBasic networking
Basic networking
 
Final Presentation on the Network layer
Final Presentation on the Network layerFinal Presentation on the Network layer
Final Presentation on the Network layer
 
Chapter 06 - Routing
Chapter 06 - RoutingChapter 06 - Routing
Chapter 06 - Routing
 
PACE-IT: Introduction to Routing Protocols - N10 006
PACE-IT: Introduction to Routing Protocols - N10 006PACE-IT: Introduction to Routing Protocols - N10 006
PACE-IT: Introduction to Routing Protocols - N10 006
 
Layer3protocols
Layer3protocolsLayer3protocols
Layer3protocols
 
ConfigureTwo networks principle
ConfigureTwo networks principleConfigureTwo networks principle
ConfigureTwo networks principle
 

Recently uploaded

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Recently uploaded (20)

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Routing Protocols

  • 2.  A network is a collection of computers, servers, mainframes, network devices, peripherals, or other devices connected to one another to allow the sharing of data. An excellent example of a network is the Internet which connects millions of people all over the world.
  • 3.
  • 4.  To communicate from one network to another network the IP Address plays an important role.  An Internet Protocol address (IP address) is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.  Two version – ipv4 = 32 bit, ipv6= 128 bits.
  • 5.  ROUTER A router is a networking device that forwards data packets between computer networks.
  • 6.  Routing protocols are the set of rules used by the routers to communicate between source & destination.  This protocols finds the best path to send the packet from source to destination.
  • 7. Types of routing protocol Static routing protocol Default routing protocol Dynamic Routing Protocol Interior Gateway Protocol Distance Vector RIP RIPV1 RIPV2 Link State OSPF EIGRP Exterior Gateway Protocol BGP
  • 8.  Static routing ,when an administrator manually assigns the path from source to destination network. This is feasible in small networks, but not in large networks.  Advantages:- – No overhead on router CPU. – No bandwidth usage between links. – Security (only administrator add routes.)  Disadvantages:-– All link will be down on a link failure. – Not practical on large networks. – Administrator must update all routes.
  • 9.
  • 10.  This is the method where the router is configured to send all packets towards a single router (next hop). It doesn’t matter to which network the packet belongs, it is forwarded out to router which is configured for default routing.  Advantages:- – No overhead on router CPU. – -No bandwidth usage between links. – Security (only administrator add routes.)  Disadvantages:- – All link will be down on a link failure. – Not practical on large networks. – Administrator must update all routes.
  • 11.
  • 12.  Dynamic Routing is the process in which routing tables are automatically updates by routing table of each neighbor. – Dynamically discover & maintains routes.- calculates routes  Advantages – Less work in maintaining the configuration when adding & deleting networks. – Protocols automatically react to the topology changes. – Configuration is less-prone.  Disadvantages – Routers resource are used. – More administrator knowledge is required for configuration
  • 13. IGP EGP  IGP stands for Interior Gateway Protocol.  This is a routing protocol that is used to exchange routing information within an autonomous system (AS).  Examples- RIP, IGRP, EIGRP, OSPF.  EGP stands for Exterior Gateway Protocol.  It is used to transfer the data packets between two different autonomous systems.  Examples- BGP Autonomous System :- It is group of IP networks which has a single and clearly defined policy
  • 14.  These protocols selects the best path in the basis of hop counts to reach a destination network in the particular direction. Here one router counts as a one hop . Characteristics:-  Updates Frequently  Each Router is only aware of its immediate neighbors.  Slow convergence.  Make create routing loops.  Easy to configure.
  • 15. A. RIP is true distance vector routing protocol B. Uses hop count metric C. Supports 15 hop-count limit D. AD value is 120. E. Supports classful networks and version 2 support classless. F. Works well in small network. G. Sends complete routing table at every 30 seconds. H. It uses Bellman-Ford algorithm to measure hop count  Disadvantages:-  Generate Traffic  As full routing table is exchange it create security issue.
  • 17. Link state routing is a technique in which each router shares the knowledge of its neighborhood with every other router in the internetwork.  Characteristics:-  Updates are event triggered.  Each router is aware of all other routers in the area.  Fast convergence.  More difficult to configure.  Updates require less bandwidth.  Example - OSPF
  • 18.  OSPF stands for Open Shortest Path First.  This works by using the Dijkstra algorithm  It has unlimited Hop count. And in this area number is provide  It is the open source protocol  AD value is 110.  Supports classless network.  Supports VLSM/CIDR & has unlimited hop counts.  Supports hierarchical network  It has two packets 1. Hello packet 2. LSA Packet.  It has 3 types of tables 1. Neighbor table 2. Topology table 3.Routing table.
  • 19.
  • 20.
  • 21. • It makes internet work. • Standardized exterior gateway protocol. • Designed to exchange routing and reach ability of info b/w autonomous systems. • Often classified as a path vector protocol. • BGP makes routing decisions based on paths , n/w policies or rule – sets configured by a n/w administrator & is involved in making core routing decisions. • BGP makes use of routing within an autonomous system(AS). • It is one the most complex and difficult to configure protocol but its emphasis on security and scalability makes its usage essential.
  • 22. Router1(config)# bgp 1 Router1 (config-router)# Network 10.0.14.1 remote-as 4 Router1 (config-router)# Network 10.0.15.1 remote-as 5