SlideShare a Scribd company logo
Pt. Ravishankar Shukla University Raipur (C.G.)
A
Presentation
on
BGP(Border Gateway Protocol)
Session 2016-17
Submitted by
NUTAN SINGH
Roll No. 24
INTRODUCTION OF ROUTING PROTOCOL
ROUTING PROTOCOLS RIP, OSPF, BGP
OVERVIEW OF BGP
WHEN TO USE BGP AND WHEN NOT TO USE BGP
ESTABLISHING ADJACENCIES WITH NEIGHBOURS
 MESSAGE TYPE IN BGP
ROUTE SELECTION DECISION PROCESS
BGP PATH ATTRIBUTES
CONFIGURING OSPF
ADVANTAGES
DISADVANTAGES
CONCLUSION
REFERENCES
2
Routing is the process that a router uses to forward packets
toward the destination network.
processes for sharing route information allows
routers to communicate with other routers to update and
maintain the routing tables
Examples of routing protocols that support the IP routed
protocol are:
RIP, IGRP,OSPF, BGP, and EIGRP.
Most routing algorithms can be classified into one of two
categories:
• distance vector
• link-state 3
4
BGP stand for Border Gateway Protocol.very to big organization
can use BGP.
Having two or more internet connection.
CLID routing protocol.
Create loop free inter domain routing between Autonomous
Systems (AS). {1-65512: Private; 65513 – 65535: Public}
An AS is a set of routers under a single technical administration.
Two BGP flavors: IBGP & EBGP
 - IBGP work in same AS
 - EBGP work in different AS.
BGP used TCP port 179 and maintains neighbor or peer
relationships
It’s an application layer protocol
BGP describes the path by using Attributes
5
• BGP finds the best path to a network by using the best AS-path
• Exchange of loop-free routing information is guaranteed.
• Updates sent once every 5 sec for IBGP peer & once every 30 sec for
EBGP.
• TCP used for reliability.
• Protocol Type: Path vector.
• EBGP: AD 20
• IBGP: AD 200
• Open standard Protocol
• Supported protocols: IPv4, IPv6
• BGP sends full routing updates at the start of the session.
• Incremental & triggered updates
• Timers: Hello (60 sec)
• Authentication: None, MD5
6
Use BGP
 when the effects of BGP are well understood and one of the following
conditions exist:
The AS allows packets to transit through it to reach another AS (transit
AS).
The AS has multiple connections to other AS’s.
The flow of traffic entering or exiting the AS must be manipulated. This
is policy based routing and based on attributes.
Do not use BGP
A single connection to the Internet or another AS
No concern for routing policy or routing selection
A lack of memory or processing power on your routers to handle constant
BGP updates
A limited understanding of route filtering and BGP path selection process
Low bandwidth between AS’s
7
8
9
10
Before establishing a BGP peer connection the two neighbors must
perform the standard TCP three-way handshake and open a TCP
connection to port 179.
After the TCP session is established, BGP peers exchanges several
messages to open and confirm connection parameters and to send BGP
routing information.
All BGP messages are unicast to the one neighbor over the TCP
connection.
There are four BGP message types:
11
Connect State:
Waits for successful TCP negotiation with peer.
BGP does not spend much time in this state if the TCP session has been
successfully established.
Sends Open message to peer and changes state to Open Sent.
Open Sent State:
BGP listens for an Open message from its peer.
Once the message has been received, the router checks the validity of the Open
message.
If there is no error, a Keepalive message is sent, various timers are set and the
state is changed to Open Confirm.
12
13
Open Confirm State:
The peer is listening for a Keepalive message from its peer.
Established State:
The peers send Update messages to exchange information about each route
being advertised to the BGP peer.
If there is any error in the Update message then a Notification message is sent
to the peer, and BGP transitions back to the idle state.
Active State:
If the router was unable to establish a successful TCP session, then it ends up in
the Active state.
Consider only routes with no AS loops and a valid next hop,
and then:
1. Highest weight (local to router).
2. Highest local preference (global within AS).
4. Shortest AS path.
5. Lowest origin code (IGP < EGP < incomplete).
7. EBGP path over IBGP path.
8. The path through the closest IGP neighbor.
9. Oldest route for EBGP paths.
10. The path with the lowest neighbor BGP router ID.
11. The path with the lowest neighbor IP address.
14
Well-known attributes
- Must be recognized by all compliant BGP implementations. Are
propagated to other neighbors
• Well-known mandatory attributes
- Must be present in all update messages
• Well-known discretionary attributes
- May be present in update messages
15
• AS path: Well-known mandatory. A list of autonomous
systems that a route has traversed:
• Next-hop: Well-known mandatory. The IP address of the
next AS to reach a given network
• Origin: Well-known mandatory. The origin attribute
informs all AS in the internetwork how the prefixes were
introduced into BGP.
16
Syntax:-
Example:-
Router(config)# router ospf 1
Router(config-router)# network 10.0.0.0 0.255.255.255
area 0
17
BGP is a path vector routing protocol.
Defined in RFC 1772
BGP is a distance vector routing protocol,
in that it relies on downstream neighbors to
pass along routes from their routing table.
BGP uses a list of AS numbers through
which a packet must pass to reach a
destination.
18
· BGP converges slowly.
· Not used in single connection to the Internet.
19
The protocol designed by Standard protocol system. It’s work
on top of layer 3.it’s a best routing protocol for link state
routing protocol . that is used on a big network ISP for reliable
network establishment.
20
https://www.wikipedia.com/BGP
https://drive.google.com/about
https://www.CCNP CISCO.com/BGP protocol
www.netmetric-solutions.com
21
22
23

More Related Content

What's hot

BGP (border gateway routing protocol)
BGP (border gateway routing protocol)BGP (border gateway routing protocol)
BGP (border gateway routing protocol)
Netwax Lab
 
How BGP Works
How BGP WorksHow BGP Works
How BGP Works
ThousandEyes
 
Overview of Spanning Tree Protocol
Overview of Spanning Tree ProtocolOverview of Spanning Tree Protocol
Overview of Spanning Tree Protocol
Arash Foroughi
 
An Overview of Border Gateway Protocol (BGP)
An Overview of Border Gateway Protocol (BGP)An Overview of Border Gateway Protocol (BGP)
An Overview of Border Gateway Protocol (BGP)Jasim Alam
 
Spanning tree protocol (stp)
Spanning tree protocol (stp)Spanning tree protocol (stp)
Spanning tree protocol (stp)
RaghulR21
 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocol
Muuluu
 
Rip presentation
Rip presentationRip presentation
Rip presentation
Ebrahim AlRahawe
 
IP Multicasting
IP MulticastingIP Multicasting
IP Multicasting
Tharindu Kumara
 
Border Gatway Protocol
Border Gatway ProtocolBorder Gatway Protocol
Border Gatway Protocol
Shashank Asthana
 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocol
Muhammad Arshad
 
Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)
Respa Peter
 
bgp protocol
 bgp protocol bgp protocol
bgp protocol
Sukanya Sanyal
 
Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)
Varinder Singh Walia
 
RIP Routing Information Protocol Extreme Networks
RIP Routing Information Protocol Extreme NetworksRIP Routing Information Protocol Extreme Networks
RIP Routing Information Protocol Extreme Networks
Dani Royman Simanjuntak
 
Routing Protocols
Routing ProtocolsRouting Protocols
Routing Protocols
NetProtocol Xpert
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information ProtocolKashif Latif
 
BGP Multihoming Techniques
BGP Multihoming TechniquesBGP Multihoming Techniques
BGP Multihoming Techniques
APNIC
 

What's hot (20)

BGP (border gateway routing protocol)
BGP (border gateway routing protocol)BGP (border gateway routing protocol)
BGP (border gateway routing protocol)
 
How BGP Works
How BGP WorksHow BGP Works
How BGP Works
 
Overview of Spanning Tree Protocol
Overview of Spanning Tree ProtocolOverview of Spanning Tree Protocol
Overview of Spanning Tree Protocol
 
An Overview of Border Gateway Protocol (BGP)
An Overview of Border Gateway Protocol (BGP)An Overview of Border Gateway Protocol (BGP)
An Overview of Border Gateway Protocol (BGP)
 
Spanning tree protocol (stp)
Spanning tree protocol (stp)Spanning tree protocol (stp)
Spanning tree protocol (stp)
 
Ether channel fundamentals
Ether channel fundamentalsEther channel fundamentals
Ether channel fundamentals
 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocol
 
Rip presentation
Rip presentationRip presentation
Rip presentation
 
IP Multicasting
IP MulticastingIP Multicasting
IP Multicasting
 
Border Gatway Protocol
Border Gatway ProtocolBorder Gatway Protocol
Border Gatway Protocol
 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocol
 
Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)
 
bgp protocol
 bgp protocol bgp protocol
bgp protocol
 
Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)
 
RIP Routing Information Protocol Extreme Networks
RIP Routing Information Protocol Extreme NetworksRIP Routing Information Protocol Extreme Networks
RIP Routing Information Protocol Extreme Networks
 
Routing Protocols
Routing ProtocolsRouting Protocols
Routing Protocols
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information Protocol
 
BGP Multihoming Techniques
BGP Multihoming TechniquesBGP Multihoming Techniques
BGP Multihoming Techniques
 
Eigrp.ppt
Eigrp.pptEigrp.ppt
Eigrp.ppt
 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
 

Similar to Border Gateway Protocol (BGP)

Bgp Toc
Bgp TocBgp Toc
Bgp Toc
bigb0206
 
Bgp
BgpBgp
Cisco BGP Exam 642-661 Review Notes
Cisco BGP Exam 642-661 Review NotesCisco BGP Exam 642-661 Review Notes
Cisco BGP Exam 642-661 Review Notes
Duane Bodle
 
CCNP ROUTE V7 CH7
CCNP ROUTE V7 CH7CCNP ROUTE V7 CH7
CCNP ROUTE V7 CH7
Chaing Ravuth
 
Study Notes BGP Exam
Study Notes BGP ExamStudy Notes BGP Exam
Study Notes BGP Exam
Duane Bodle
 
Bgp
BgpBgp
Bgp attribute-case study
Bgp attribute-case studyBgp attribute-case study
Bgp attribute-case study
SalvatoreFILORIZZO
 
Cisco ccnp 642-902 practice tests for quick preparation
Cisco ccnp 642-902 practice tests for quick preparationCisco ccnp 642-902 practice tests for quick preparation
Cisco ccnp 642-902 practice tests for quick preparation
Cisco-642-902
 
PLNOG15: BGP New Advanced Features - Piotr Wojciechowski
PLNOG15: BGP New Advanced Features - Piotr WojciechowskiPLNOG15: BGP New Advanced Features - Piotr Wojciechowski
PLNOG15: BGP New Advanced Features - Piotr Wojciechowski
PROIDEA
 
Routing algorithms
Routing algorithmsRouting algorithms
Routing algorithms
MoctardOLOULADE
 
Computer network (14)
Computer network (14)Computer network (14)
Computer network (14)
NYversity
 
IPv6 Routing.pdf
IPv6 Routing.pdfIPv6 Routing.pdf
IPv6 Routing.pdf
niran10
 
Qs.pptx
Qs.pptxQs.pptx
All in one q & ans
All in one q & ansAll in one q & ans
All in one q & ansRavi Kodoli
 
SANOG23-BGP-Techniques.pdf
SANOG23-BGP-Techniques.pdfSANOG23-BGP-Techniques.pdf
SANOG23-BGP-Techniques.pdf
GhulamIbneGhulam
 
Bgp training
Bgp trainingBgp training
Bgp training
Aun Haider
 
CCNP Route 642 902 BGP
CCNP Route 642 902 BGPCCNP Route 642 902 BGP
CCNP Route 642 902 BGP
IT Tech
 
10 routing-bgp
10 routing-bgp10 routing-bgp
10 routing-bgp
Olivier Bonaventure
 

Similar to Border Gateway Protocol (BGP) (20)

Bgp Toc
Bgp TocBgp Toc
Bgp Toc
 
Bgp
BgpBgp
Bgp
 
Cisco BGP Exam 642-661 Review Notes
Cisco BGP Exam 642-661 Review NotesCisco BGP Exam 642-661 Review Notes
Cisco BGP Exam 642-661 Review Notes
 
CCNP ROUTE V7 CH7
CCNP ROUTE V7 CH7CCNP ROUTE V7 CH7
CCNP ROUTE V7 CH7
 
Study Notes BGP Exam
Study Notes BGP ExamStudy Notes BGP Exam
Study Notes BGP Exam
 
BGP.pdf
BGP.pdfBGP.pdf
BGP.pdf
 
Bgp
BgpBgp
Bgp
 
Bgp attribute-case study
Bgp attribute-case studyBgp attribute-case study
Bgp attribute-case study
 
BGP
BGPBGP
BGP
 
Cisco ccnp 642-902 practice tests for quick preparation
Cisco ccnp 642-902 practice tests for quick preparationCisco ccnp 642-902 practice tests for quick preparation
Cisco ccnp 642-902 practice tests for quick preparation
 
PLNOG15: BGP New Advanced Features - Piotr Wojciechowski
PLNOG15: BGP New Advanced Features - Piotr WojciechowskiPLNOG15: BGP New Advanced Features - Piotr Wojciechowski
PLNOG15: BGP New Advanced Features - Piotr Wojciechowski
 
Routing algorithms
Routing algorithmsRouting algorithms
Routing algorithms
 
Computer network (14)
Computer network (14)Computer network (14)
Computer network (14)
 
IPv6 Routing.pdf
IPv6 Routing.pdfIPv6 Routing.pdf
IPv6 Routing.pdf
 
Qs.pptx
Qs.pptxQs.pptx
Qs.pptx
 
All in one q & ans
All in one q & ansAll in one q & ans
All in one q & ans
 
SANOG23-BGP-Techniques.pdf
SANOG23-BGP-Techniques.pdfSANOG23-BGP-Techniques.pdf
SANOG23-BGP-Techniques.pdf
 
Bgp training
Bgp trainingBgp training
Bgp training
 
CCNP Route 642 902 BGP
CCNP Route 642 902 BGPCCNP Route 642 902 BGP
CCNP Route 642 902 BGP
 
10 routing-bgp
10 routing-bgp10 routing-bgp
10 routing-bgp
 

Recently uploaded

To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 

Recently uploaded (20)

To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 

Border Gateway Protocol (BGP)

  • 1. Pt. Ravishankar Shukla University Raipur (C.G.) A Presentation on BGP(Border Gateway Protocol) Session 2016-17 Submitted by NUTAN SINGH Roll No. 24
  • 2. INTRODUCTION OF ROUTING PROTOCOL ROUTING PROTOCOLS RIP, OSPF, BGP OVERVIEW OF BGP WHEN TO USE BGP AND WHEN NOT TO USE BGP ESTABLISHING ADJACENCIES WITH NEIGHBOURS  MESSAGE TYPE IN BGP ROUTE SELECTION DECISION PROCESS BGP PATH ATTRIBUTES CONFIGURING OSPF ADVANTAGES DISADVANTAGES CONCLUSION REFERENCES 2
  • 3. Routing is the process that a router uses to forward packets toward the destination network. processes for sharing route information allows routers to communicate with other routers to update and maintain the routing tables Examples of routing protocols that support the IP routed protocol are: RIP, IGRP,OSPF, BGP, and EIGRP. Most routing algorithms can be classified into one of two categories: • distance vector • link-state 3
  • 4. 4
  • 5. BGP stand for Border Gateway Protocol.very to big organization can use BGP. Having two or more internet connection. CLID routing protocol. Create loop free inter domain routing between Autonomous Systems (AS). {1-65512: Private; 65513 – 65535: Public} An AS is a set of routers under a single technical administration. Two BGP flavors: IBGP & EBGP  - IBGP work in same AS  - EBGP work in different AS. BGP used TCP port 179 and maintains neighbor or peer relationships It’s an application layer protocol BGP describes the path by using Attributes 5
  • 6. • BGP finds the best path to a network by using the best AS-path • Exchange of loop-free routing information is guaranteed. • Updates sent once every 5 sec for IBGP peer & once every 30 sec for EBGP. • TCP used for reliability. • Protocol Type: Path vector. • EBGP: AD 20 • IBGP: AD 200 • Open standard Protocol • Supported protocols: IPv4, IPv6 • BGP sends full routing updates at the start of the session. • Incremental & triggered updates • Timers: Hello (60 sec) • Authentication: None, MD5 6
  • 7. Use BGP  when the effects of BGP are well understood and one of the following conditions exist: The AS allows packets to transit through it to reach another AS (transit AS). The AS has multiple connections to other AS’s. The flow of traffic entering or exiting the AS must be manipulated. This is policy based routing and based on attributes. Do not use BGP A single connection to the Internet or another AS No concern for routing policy or routing selection A lack of memory or processing power on your routers to handle constant BGP updates A limited understanding of route filtering and BGP path selection process Low bandwidth between AS’s 7
  • 8. 8
  • 9. 9
  • 10. 10
  • 11. Before establishing a BGP peer connection the two neighbors must perform the standard TCP three-way handshake and open a TCP connection to port 179. After the TCP session is established, BGP peers exchanges several messages to open and confirm connection parameters and to send BGP routing information. All BGP messages are unicast to the one neighbor over the TCP connection. There are four BGP message types: 11
  • 12. Connect State: Waits for successful TCP negotiation with peer. BGP does not spend much time in this state if the TCP session has been successfully established. Sends Open message to peer and changes state to Open Sent. Open Sent State: BGP listens for an Open message from its peer. Once the message has been received, the router checks the validity of the Open message. If there is no error, a Keepalive message is sent, various timers are set and the state is changed to Open Confirm. 12
  • 13. 13 Open Confirm State: The peer is listening for a Keepalive message from its peer. Established State: The peers send Update messages to exchange information about each route being advertised to the BGP peer. If there is any error in the Update message then a Notification message is sent to the peer, and BGP transitions back to the idle state. Active State: If the router was unable to establish a successful TCP session, then it ends up in the Active state.
  • 14. Consider only routes with no AS loops and a valid next hop, and then: 1. Highest weight (local to router). 2. Highest local preference (global within AS). 4. Shortest AS path. 5. Lowest origin code (IGP < EGP < incomplete). 7. EBGP path over IBGP path. 8. The path through the closest IGP neighbor. 9. Oldest route for EBGP paths. 10. The path with the lowest neighbor BGP router ID. 11. The path with the lowest neighbor IP address. 14
  • 15. Well-known attributes - Must be recognized by all compliant BGP implementations. Are propagated to other neighbors • Well-known mandatory attributes - Must be present in all update messages • Well-known discretionary attributes - May be present in update messages 15
  • 16. • AS path: Well-known mandatory. A list of autonomous systems that a route has traversed: • Next-hop: Well-known mandatory. The IP address of the next AS to reach a given network • Origin: Well-known mandatory. The origin attribute informs all AS in the internetwork how the prefixes were introduced into BGP. 16
  • 17. Syntax:- Example:- Router(config)# router ospf 1 Router(config-router)# network 10.0.0.0 0.255.255.255 area 0 17
  • 18. BGP is a path vector routing protocol. Defined in RFC 1772 BGP is a distance vector routing protocol, in that it relies on downstream neighbors to pass along routes from their routing table. BGP uses a list of AS numbers through which a packet must pass to reach a destination. 18
  • 19. · BGP converges slowly. · Not used in single connection to the Internet. 19
  • 20. The protocol designed by Standard protocol system. It’s work on top of layer 3.it’s a best routing protocol for link state routing protocol . that is used on a big network ISP for reliable network establishment. 20
  • 22. 22
  • 23. 23