In this presentation we will present our OpenSource product netTransformer and how did we used it in order to track the Bulgarian Internet network evolution from year 2001 till now!
Tracking Bulgarian Internet Evolution process
For the purpose we have used:
https://github.com/iTransformers/netTransformer
https://github.com/iTransformers/javaMrt2Graphml
The document discusses different types of network analysis including social network analysis, semantic network analysis, and neural network analysis. It provides examples of how each has been used to analyze communication networks, language use in documents, and cognitive structures. Specific techniques are described like social network surveys, semantic network software, and the Galileo model for analyzing attitudes.
This document discusses BGP and its evolution. It notes that BGP is proven to scale with internet traffic growth and many services are moving to use BGP. It also provides an overview of SDN and how Cisco sees BGP being used as an abstraction method through its approach of abstraction and orchestration using APIs. Key points covered include BGP's simplicity, extensibility, high availability and role in transporting various services.
Whats so special about 512?, by Geoff Huston [APNIC 38 / APOPS 3]APNIC
The document discusses how the growth of routing tables poses challenges for routers. It summarizes BGP routing statistics that show IPv4 routing tables growing at around 10% per year while IPv6 tables grow faster at 20-40% per year. While overall growth is manageable now, projections estimate IPv4 tables could reach 1 million entries by 2024. Router memory technologies like TCAM have limitations in capacity, cost and power that may be strained by future growth. Memory and processing speeds will also need to improve to sustain higher link speeds, potentially requiring changes to routing protocols or packet formats. In summary, routing table and traffic growth trends pose technical challenges for router scaling that may require innovative solutions if unchecked.
BGP Flowspec (RFC5575) Case study and DiscussionAPNIC
BGP Flowspec is a technique for distributing flow specification rules via BGP. It allows an ISP to dynamically distribute filtering and redirection rules to mitigate DDoS attacks. The document discusses several real-world use cases where BGP Flowspec was deployed to successfully block large DDoS attacks in a targeted manner without affecting legitimate traffic. However, interoperability between vendors and scalability challenges remain open issues requiring further work and testing.
IPv6 IAB/IETF Activities Report as presented by Cathy Aronson at ARIN's Public Policy and Members Meeting in April 2014. All ARIN 33 presentations are posted online at: https://www.arin.net/ARIN33_materials
Routing Security, Another Elephant in the RoomRIPE NCC
The document discusses routing security issues with the Border Gateway Protocol (BGP) and potential solutions. It notes that BGP was created without security in mind, leaving it vulnerable to hijacking and leaks. Current approaches like RPKI and ROAs provide some protections but have limitations. Future solutions may combine approaches like RPKI, ASPA, and BGPSEC, though ensuring global deployment remains a challenge. The document examines statistics on ROA signing to evaluate progress and outlines educational resources for improving routing security.
Tracking Bulgarian Internet Evolution process
For the purpose we have used:
https://github.com/iTransformers/netTransformer
https://github.com/iTransformers/javaMrt2Graphml
The document discusses different types of network analysis including social network analysis, semantic network analysis, and neural network analysis. It provides examples of how each has been used to analyze communication networks, language use in documents, and cognitive structures. Specific techniques are described like social network surveys, semantic network software, and the Galileo model for analyzing attitudes.
This document discusses BGP and its evolution. It notes that BGP is proven to scale with internet traffic growth and many services are moving to use BGP. It also provides an overview of SDN and how Cisco sees BGP being used as an abstraction method through its approach of abstraction and orchestration using APIs. Key points covered include BGP's simplicity, extensibility, high availability and role in transporting various services.
Whats so special about 512?, by Geoff Huston [APNIC 38 / APOPS 3]APNIC
The document discusses how the growth of routing tables poses challenges for routers. It summarizes BGP routing statistics that show IPv4 routing tables growing at around 10% per year while IPv6 tables grow faster at 20-40% per year. While overall growth is manageable now, projections estimate IPv4 tables could reach 1 million entries by 2024. Router memory technologies like TCAM have limitations in capacity, cost and power that may be strained by future growth. Memory and processing speeds will also need to improve to sustain higher link speeds, potentially requiring changes to routing protocols or packet formats. In summary, routing table and traffic growth trends pose technical challenges for router scaling that may require innovative solutions if unchecked.
BGP Flowspec (RFC5575) Case study and DiscussionAPNIC
BGP Flowspec is a technique for distributing flow specification rules via BGP. It allows an ISP to dynamically distribute filtering and redirection rules to mitigate DDoS attacks. The document discusses several real-world use cases where BGP Flowspec was deployed to successfully block large DDoS attacks in a targeted manner without affecting legitimate traffic. However, interoperability between vendors and scalability challenges remain open issues requiring further work and testing.
IPv6 IAB/IETF Activities Report as presented by Cathy Aronson at ARIN's Public Policy and Members Meeting in April 2014. All ARIN 33 presentations are posted online at: https://www.arin.net/ARIN33_materials
Routing Security, Another Elephant in the RoomRIPE NCC
The document discusses routing security issues with the Border Gateway Protocol (BGP) and potential solutions. It notes that BGP was created without security in mind, leaving it vulnerable to hijacking and leaks. Current approaches like RPKI and ROAs provide some protections but have limitations. Future solutions may combine approaches like RPKI, ASPA, and BGPSEC, though ensuring global deployment remains a challenge. The document examines statistics on ROA signing to evaluate progress and outlines educational resources for improving routing security.
Respond 3 of your colleagues postings in one or more of the fol.docxaryan532920
Respond 3 of your colleagues' postings in one or more of the following ways:
· Ask a probing question.
· Share an insight from having read your colleague’s posting.
· Offer and support an opinion.
· Validate an idea with your own experience.
· Make a suggestion.
· Expand on your colleague’s posting.
Student #1
Routing protocols can be the Interior Gateway Protocol (IGP), which is for you internal networks and the exterior routing protocol is Exterior Gateway Protocol (EGP). This protocol maintains the routing information for networks (external) to your network. It only knows how to deliver data outside your network. EGP does not know how to deliver data within your network. Border Gateway Protocol (BGP) is the only EGP in use today. BGP is the routing protocol for the Internet.
Open Shortest Path First (OSPF) is starting to become the popular interior routing protocol (Tiso, 2011). If designing a new network, I would recommend OSPF or EIGRP because of the popularity, flexibility, and fast convergence. Reason I say OSPF is because there is not limitation on the hop count like there is with RIP (15). OSPF uses IP multicast to send link-state updates ("Cisco," 2014). Updates sent when routing changes occur instead of periodically. Better convergence since routing changes is instantaneously and not periodically.
My experience with OSPF occurred back in 2003 when a team I was working with was task to put in a new video teleconference network for an intelligence agency that consisted of over 250 rooms moving from H.320 to H.323. The network would consist of CONUS and OCONUS. Fourteen years later, equipment has been upgraded routers, switches, endpoints, etc. but the same routing protocol still used.
References
Cisco Networking Academy's Introduction to Routing Dynamically. (2014). Retrieved from http://www.ciscopress.com/articles/article.asp?p=2180210&seqNum=7
Tiso, J. (2011). Designing Cisco Network Service Architectures (ARCH): Developing an Optimum Design for Layer 3 (CCDP). Retrieved from http://www.ciscopress.com/articles/article.asp?p=1763921&seqNum=6
Student #2
Enhanced Interior Gateway Routing Protocol (EIGRP) is Cisco's proprietary routing protocol, based on IGRP. EIGRP is a distance-vector routing protocol, with optimizations to minimize routing instability incurred after topology changes, and the use of bandwidth and processing power in the router. Routers that support EIGRP will automatically redistribute route information to IGRP neighbours by converting the 32-bit EIGRP metric to the 24-bit IGRP metric. Most of the routing optimizations are based on the Diffusing Update Algorithm (DUAL), which guarantees loop-free operation and provides fast router convergence.
Origin: Based only on Cisco’s implementation, not an Internet RFC
Type of protocol: Hybrid distance vector
Metric: Delay, bandwidth, reliability, and load, using the Diffusing Update Algorithm (DUAL)
Methodology: Sends hello packets every ...
BGP: Whats so special about the number 512?GeoffHuston
It was reported that parts of the Internet crashed when the number of routes in the Internet's Inter-domain routing table (BGP) exceeded 512K routes. This presentation looks at the growth of the Internet's routing table and how this correlates to the capacity and speed of memory in hardware routers.
The document discusses how the number 512 relates to routing table sizes on Cisco and Brocade networking equipment. It analyzes growth trends in IPv4 and IPv6 BGP routing tables based on historical data. While absolute sizes are increasing, the annual growth rates have slowed slightly. Projections indicate routing tables could continue growing within the capabilities of current router technologies for the foreseeable future if trends continue.
IPv4 addresses are nearly exhausted while IPv6 provides a vast address space to support continued Internet growth. While IPv4 and IPv6 can coexist, IPv6 adoption is needed as the only sustainable solution. Global metrics show increasing IPv6 deployment over time through allocations, routing entries, and user access, though challenges remain around applications, skills, and justification. RIRs and IETF are committed to IPv6 to maintain the openness and development of the Internet.
The document discusses routing security and the importance of filtering in the global routing system. It provides context on how the border gateway protocol (BGP) was originally designed based on trust between networks. This makes the system vulnerable to hijacking and route leaks. The document recommends filtering routes according to registries to prevent invalid route advertisements and limit the number of routes accepted from peers. It analyzes the status of routing security in South Asia and Bangladesh, providing an example of why filtering is important to avoid unintended route advertisements.
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it
This chapter discusses implementing Border Gateway Protocol (BGP) solutions for Internet Service Provider (ISP) connectivity. It begins with an overview of BGP terminology such as autonomous systems (AS), AS numbers, and BGP peers. The chapter then covers basic BGP configuration and operation, including the exchange of routing information between BGP peers in different ASes. It also discusses considerations for connecting an enterprise network to an ISP, such as addressing, link types, redundancy, and routing protocols.
BSides: BGP Hijacking and Secure Internet RoutingAPNIC
The document provides an introduction to internet routing, BGP hijacking, and the Resource Public Key Infrastructure (RPKI) system for securing internet routing. It discusses how BGP works and how hijacks can occur when more specific routes are announced. The document then summarizes the RPKI framework for validating route origins using Route Origin Authorizations (ROAs) and filtering routes based on their validation state. It provides examples of implementing RPKI on routers to help secure internet routing.
This document summarizes an update on IPv6 activity in CERNET2 that was presented on March 5, 2015. It discusses that CERNET2 has had a pure IPv6 backbone since 2003 connecting over 600 universities. IPv6 related research and experiments are conducted on CERNET2. Traffic statistics from January 2015 show backbone traffic exceeding 40Gbps and 10Gbps in some locations. The document also discusses challenges with scaling the DNS root server system and efforts to address this through techniques like anycasting and expanding the number of root server operators.
Topic: Border Gateway Protocol (BGP)
Outline:
# Introduction
# History
# Current version
# Uses
# Operation
# BGP infrastructure
# Problems
# Success
Introduction
BGP: The Border Gateway Protocol (BGP) is the protocol used throughout the Internet to exchange routing information between networks. It is the language spoken by routers on the Internet to determine how packets can be sent from one router to another to reach their final destination. BGP has worked extremely well and continues to be protocol that makes the Internet work.
History
Date Text
1994-08-15 Concluded group
1992-05-30 Changed milestone "Post the specfication of BGP 4 as an Internet-Draft.", resolved as "Done"
1991-08-30 Changed milestone "Post an Internet-Draft specifying multicast extensions to BGP.", resolved as "Done"
1990-05-01 Changed milestone "Develop a MIB for BGP Version 3.", resolved as "Done"
1990-05-01 Changed milestone "Complete development of Version 2 of the Border Gateway Protocol (BGP).", resolved as "Done"
1989-01-01 Started group
Current version
The current version of BGP is version 4 (BGP4) codified in RFC 4271 since 2006. Early versions of the protocol are widely considered obsolete and are rarely supported. RFC 4271, which went through more than 20 drafts, is based on the earlier RFC 1771 version 4. The RFC 4271 version corrected a number of errors, clarified ambiguities and brought the RFC much closer to industry practices. Version 4 of BGP has been in use on the Internet since 1994. The major enhancement in version 4 was support for Classless Inter-Domain Routing and use of route aggregation to decrease the size of routing.
Uses
Most Internet service providers must use BGP to establish routing between one another (especially if they are multihomed). Compare this with Signaling System 7(SS7), which is the inter-provider core call setup protocol on the PSTN.
Very large private IP networks use BGP internally. An example would be the joining of a number of large OSPE (Open Shortest Path First) networks where OSPF by itself would not scale to size. Another reason to use BGP is multihoming a network for better redundancy, either to multiple access points of a single ISP or to multiple ISPs.
Operation
When BGP runs between two peers in the same autonomous system (AS), it is referred to as Internal BGP (iBGP or Interior Border Gateway Protocol). When it runs between different autonomous systems, it is called External BGP (EBGP or Exterior Border Gateway Protocol).
Finite-state machines
BGP state machine
In order to make decisions in its operations with peers, a BGP peer uses a simple finite state machine (FSM) that consists of six states: Idle; Connect; Active; OpenSent; OpenConfirm; and Established. For each peer-to-peer session, a BGP implementation maintains a state variable that tracks which of these six states the session is in. The BGP defines the messages that each peer should exc
This document summarizes a research paper that compares the performance of three routing protocols - EIGRP, OSPF, and RIP. The researchers designed identical network topologies to implement each protocol in Cisco Packet Tracer and OPNET simulations. They measured convergence duration and traffic sent to analyze differences. Simulation results showed that EIGRP had the fastest convergence time when links failed or recovered. OSPF generated the most initial traffic as it fully maps the network. EIGRP and OSPF used bandwidth more efficiently than RIP. The researchers concluded that EIGRP is generally the best choice for networks due to its fast convergence and efficient bandwidth usage.
- Activities in Indonesia for World IPv6 Day included events at ITB university, the INHERENT research network, and the Indonesia IPv6 Forum.
- At ITB, an IPv6-only video streaming server and website were set up and tested. Brocade's IPv6 load balancer was also evaluated. The sites saw viewers from across Indonesia and other countries.
- INHERENT deployed an IPv6 tunnel broker to provide prefixes to its network but most traffic still went through Hurricane Electric tunnels.
- The IPv6 Forum event in Bandung featured vendor presentations and helped Telkom set up dual-stack sites.
- Recommendations included creating reverse DNS for IPv6 addresses, more regular
The document discusses BGP (Border Gateway Protocol) and provides an overview of BGP configuration and a lab exercise. It begins with an introduction to BGP and the differences between iBGP and eBGP. Requirements for BGP configuration are outlined along with key commands. Finally, a lab diagram and steps for setting up BGP between two routers are described.
Антон Меркушов – инструктор SkillFactory, опытный сетевой инженер и сертифицированный профессионал Cisco – о современных технологиях и протоколах, необходимых при расширении сети.
Why don't we have REAL IP to the Edge in Buildings?Memoori
Slides from a Q&A Webinar with Tony Marshallsay, CME at Omrania. We take a deep dive into how we can Improve Networking in Building Management Systems by taking IPv6 to the Edge.
The document discusses BGP traffic and its recurrence behavior. It describes how BGP traffic can be analyzed at different levels, from aggregate traffic related to all unstable autonomous systems, to traffic related to individual prefixes within unstable autonomous systems. The document also outlines that BGP traffic occurs in two forms: BGP volume, which is the amount of traffic; and BGP route flapping, which is the instability of routes over time.
This document describes a technique called simple virtual aggregation that can save router memory by suppressing more specific routes in the Routing Information Base (RIB) and Forwarding Information Base (FIB) if they have the same next hop as the default route. It monitors the default route in the BGP table and suppresses installation of specific routes with the same next hop, reducing the number of routes in RIB/FIB. Testing on a Cisco 3825 router showed this reduced the memory used by BGP and RIB/FIB from 230MB to 73MB. The technique is based on an IETF draft and can help smaller routers avoid running out of data plane memory due to many internet routes.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
More Related Content
Similar to Tracking network evolution process with netTransformer & Bulgarian Internet BGP Peering evolution from 2001 till now
Respond 3 of your colleagues postings in one or more of the fol.docxaryan532920
Respond 3 of your colleagues' postings in one or more of the following ways:
· Ask a probing question.
· Share an insight from having read your colleague’s posting.
· Offer and support an opinion.
· Validate an idea with your own experience.
· Make a suggestion.
· Expand on your colleague’s posting.
Student #1
Routing protocols can be the Interior Gateway Protocol (IGP), which is for you internal networks and the exterior routing protocol is Exterior Gateway Protocol (EGP). This protocol maintains the routing information for networks (external) to your network. It only knows how to deliver data outside your network. EGP does not know how to deliver data within your network. Border Gateway Protocol (BGP) is the only EGP in use today. BGP is the routing protocol for the Internet.
Open Shortest Path First (OSPF) is starting to become the popular interior routing protocol (Tiso, 2011). If designing a new network, I would recommend OSPF or EIGRP because of the popularity, flexibility, and fast convergence. Reason I say OSPF is because there is not limitation on the hop count like there is with RIP (15). OSPF uses IP multicast to send link-state updates ("Cisco," 2014). Updates sent when routing changes occur instead of periodically. Better convergence since routing changes is instantaneously and not periodically.
My experience with OSPF occurred back in 2003 when a team I was working with was task to put in a new video teleconference network for an intelligence agency that consisted of over 250 rooms moving from H.320 to H.323. The network would consist of CONUS and OCONUS. Fourteen years later, equipment has been upgraded routers, switches, endpoints, etc. but the same routing protocol still used.
References
Cisco Networking Academy's Introduction to Routing Dynamically. (2014). Retrieved from http://www.ciscopress.com/articles/article.asp?p=2180210&seqNum=7
Tiso, J. (2011). Designing Cisco Network Service Architectures (ARCH): Developing an Optimum Design for Layer 3 (CCDP). Retrieved from http://www.ciscopress.com/articles/article.asp?p=1763921&seqNum=6
Student #2
Enhanced Interior Gateway Routing Protocol (EIGRP) is Cisco's proprietary routing protocol, based on IGRP. EIGRP is a distance-vector routing protocol, with optimizations to minimize routing instability incurred after topology changes, and the use of bandwidth and processing power in the router. Routers that support EIGRP will automatically redistribute route information to IGRP neighbours by converting the 32-bit EIGRP metric to the 24-bit IGRP metric. Most of the routing optimizations are based on the Diffusing Update Algorithm (DUAL), which guarantees loop-free operation and provides fast router convergence.
Origin: Based only on Cisco’s implementation, not an Internet RFC
Type of protocol: Hybrid distance vector
Metric: Delay, bandwidth, reliability, and load, using the Diffusing Update Algorithm (DUAL)
Methodology: Sends hello packets every ...
BGP: Whats so special about the number 512?GeoffHuston
It was reported that parts of the Internet crashed when the number of routes in the Internet's Inter-domain routing table (BGP) exceeded 512K routes. This presentation looks at the growth of the Internet's routing table and how this correlates to the capacity and speed of memory in hardware routers.
The document discusses how the number 512 relates to routing table sizes on Cisco and Brocade networking equipment. It analyzes growth trends in IPv4 and IPv6 BGP routing tables based on historical data. While absolute sizes are increasing, the annual growth rates have slowed slightly. Projections indicate routing tables could continue growing within the capabilities of current router technologies for the foreseeable future if trends continue.
IPv4 addresses are nearly exhausted while IPv6 provides a vast address space to support continued Internet growth. While IPv4 and IPv6 can coexist, IPv6 adoption is needed as the only sustainable solution. Global metrics show increasing IPv6 deployment over time through allocations, routing entries, and user access, though challenges remain around applications, skills, and justification. RIRs and IETF are committed to IPv6 to maintain the openness and development of the Internet.
The document discusses routing security and the importance of filtering in the global routing system. It provides context on how the border gateway protocol (BGP) was originally designed based on trust between networks. This makes the system vulnerable to hijacking and route leaks. The document recommends filtering routes according to registries to prevent invalid route advertisements and limit the number of routes accepted from peers. It analyzes the status of routing security in South Asia and Bangladesh, providing an example of why filtering is important to avoid unintended route advertisements.
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it
This chapter discusses implementing Border Gateway Protocol (BGP) solutions for Internet Service Provider (ISP) connectivity. It begins with an overview of BGP terminology such as autonomous systems (AS), AS numbers, and BGP peers. The chapter then covers basic BGP configuration and operation, including the exchange of routing information between BGP peers in different ASes. It also discusses considerations for connecting an enterprise network to an ISP, such as addressing, link types, redundancy, and routing protocols.
BSides: BGP Hijacking and Secure Internet RoutingAPNIC
The document provides an introduction to internet routing, BGP hijacking, and the Resource Public Key Infrastructure (RPKI) system for securing internet routing. It discusses how BGP works and how hijacks can occur when more specific routes are announced. The document then summarizes the RPKI framework for validating route origins using Route Origin Authorizations (ROAs) and filtering routes based on their validation state. It provides examples of implementing RPKI on routers to help secure internet routing.
This document summarizes an update on IPv6 activity in CERNET2 that was presented on March 5, 2015. It discusses that CERNET2 has had a pure IPv6 backbone since 2003 connecting over 600 universities. IPv6 related research and experiments are conducted on CERNET2. Traffic statistics from January 2015 show backbone traffic exceeding 40Gbps and 10Gbps in some locations. The document also discusses challenges with scaling the DNS root server system and efforts to address this through techniques like anycasting and expanding the number of root server operators.
Topic: Border Gateway Protocol (BGP)
Outline:
# Introduction
# History
# Current version
# Uses
# Operation
# BGP infrastructure
# Problems
# Success
Introduction
BGP: The Border Gateway Protocol (BGP) is the protocol used throughout the Internet to exchange routing information between networks. It is the language spoken by routers on the Internet to determine how packets can be sent from one router to another to reach their final destination. BGP has worked extremely well and continues to be protocol that makes the Internet work.
History
Date Text
1994-08-15 Concluded group
1992-05-30 Changed milestone "Post the specfication of BGP 4 as an Internet-Draft.", resolved as "Done"
1991-08-30 Changed milestone "Post an Internet-Draft specifying multicast extensions to BGP.", resolved as "Done"
1990-05-01 Changed milestone "Develop a MIB for BGP Version 3.", resolved as "Done"
1990-05-01 Changed milestone "Complete development of Version 2 of the Border Gateway Protocol (BGP).", resolved as "Done"
1989-01-01 Started group
Current version
The current version of BGP is version 4 (BGP4) codified in RFC 4271 since 2006. Early versions of the protocol are widely considered obsolete and are rarely supported. RFC 4271, which went through more than 20 drafts, is based on the earlier RFC 1771 version 4. The RFC 4271 version corrected a number of errors, clarified ambiguities and brought the RFC much closer to industry practices. Version 4 of BGP has been in use on the Internet since 1994. The major enhancement in version 4 was support for Classless Inter-Domain Routing and use of route aggregation to decrease the size of routing.
Uses
Most Internet service providers must use BGP to establish routing between one another (especially if they are multihomed). Compare this with Signaling System 7(SS7), which is the inter-provider core call setup protocol on the PSTN.
Very large private IP networks use BGP internally. An example would be the joining of a number of large OSPE (Open Shortest Path First) networks where OSPF by itself would not scale to size. Another reason to use BGP is multihoming a network for better redundancy, either to multiple access points of a single ISP or to multiple ISPs.
Operation
When BGP runs between two peers in the same autonomous system (AS), it is referred to as Internal BGP (iBGP or Interior Border Gateway Protocol). When it runs between different autonomous systems, it is called External BGP (EBGP or Exterior Border Gateway Protocol).
Finite-state machines
BGP state machine
In order to make decisions in its operations with peers, a BGP peer uses a simple finite state machine (FSM) that consists of six states: Idle; Connect; Active; OpenSent; OpenConfirm; and Established. For each peer-to-peer session, a BGP implementation maintains a state variable that tracks which of these six states the session is in. The BGP defines the messages that each peer should exc
This document summarizes a research paper that compares the performance of three routing protocols - EIGRP, OSPF, and RIP. The researchers designed identical network topologies to implement each protocol in Cisco Packet Tracer and OPNET simulations. They measured convergence duration and traffic sent to analyze differences. Simulation results showed that EIGRP had the fastest convergence time when links failed or recovered. OSPF generated the most initial traffic as it fully maps the network. EIGRP and OSPF used bandwidth more efficiently than RIP. The researchers concluded that EIGRP is generally the best choice for networks due to its fast convergence and efficient bandwidth usage.
- Activities in Indonesia for World IPv6 Day included events at ITB university, the INHERENT research network, and the Indonesia IPv6 Forum.
- At ITB, an IPv6-only video streaming server and website were set up and tested. Brocade's IPv6 load balancer was also evaluated. The sites saw viewers from across Indonesia and other countries.
- INHERENT deployed an IPv6 tunnel broker to provide prefixes to its network but most traffic still went through Hurricane Electric tunnels.
- The IPv6 Forum event in Bandung featured vendor presentations and helped Telkom set up dual-stack sites.
- Recommendations included creating reverse DNS for IPv6 addresses, more regular
The document discusses BGP (Border Gateway Protocol) and provides an overview of BGP configuration and a lab exercise. It begins with an introduction to BGP and the differences between iBGP and eBGP. Requirements for BGP configuration are outlined along with key commands. Finally, a lab diagram and steps for setting up BGP between two routers are described.
Антон Меркушов – инструктор SkillFactory, опытный сетевой инженер и сертифицированный профессионал Cisco – о современных технологиях и протоколах, необходимых при расширении сети.
Why don't we have REAL IP to the Edge in Buildings?Memoori
Slides from a Q&A Webinar with Tony Marshallsay, CME at Omrania. We take a deep dive into how we can Improve Networking in Building Management Systems by taking IPv6 to the Edge.
The document discusses BGP traffic and its recurrence behavior. It describes how BGP traffic can be analyzed at different levels, from aggregate traffic related to all unstable autonomous systems, to traffic related to individual prefixes within unstable autonomous systems. The document also outlines that BGP traffic occurs in two forms: BGP volume, which is the amount of traffic; and BGP route flapping, which is the instability of routes over time.
This document describes a technique called simple virtual aggregation that can save router memory by suppressing more specific routes in the Routing Information Base (RIB) and Forwarding Information Base (FIB) if they have the same next hop as the default route. It monitors the default route in the BGP table and suppresses installation of specific routes with the same next hop, reducing the number of routes in RIB/FIB. Testing on a Cisco 3825 router showed this reduced the memory used by BGP and RIB/FIB from 230MB to 73MB. The technique is based on an IETF draft and can help smaller routers avoid running out of data plane memory due to many internet routes.
Similar to Tracking network evolution process with netTransformer & Bulgarian Internet BGP Peering evolution from 2001 till now (20)
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Tracking network evolution process with netTransformer & Bulgarian Internet BGP Peering evolution from 2001 till now
1. OpenFest 2014
Tracking network evolution process with
netTransformer
Bulgarian Internet BGP Peering evolution from 2001 till now
Nikolay Milovanov
Vasil Yordanov
https://github.com/iTransformers
2. Network evolution in nutshell
• Network evolution could be expressed as:
– Topology changes:
• Appearance, disappearance of nodes or links
• Changes in network diameter
• Changes in node ranks
• Changes in clustarization and giant components
– Changes in node/edge properties
• Appearance of new metadata
• Disappearance of such
• Changes in node/edge metadata values
– All the above reflects changes in the law as per which network
evolves :
• An example of such law is Barbatsi and Albert law – e.g human
networks evolve as per power law
3. Examples for evolving networks
• Internet
• WWW
• Social
• Bio
• Communication
• Networks of SA components and connectors
• Knowing the law will allow us to predict how
does the network will evolve
4. So a question emerge: How can we track how does
the network evolves?
– Globul OMC used a notepad to write down each
and every event that happens in the network
– Traffic/Performance monitoring systems might
give us such information but in really it is quite
difficult to abstract it (too much details)
– Well we don’t care so much of the tiny networking
details we care for evolution on a architecture
level!
5. Views and perspectives
• Many stakeholders result in many perspectives and thus many
views of the network are required!
The cardiologist needs a
cardiogram
.. But the orthopedist
needs an X-ray scan
Stakeholders needs views of the network that will allow them
to reason about it!
6. In more common languadge
• Core network engineers needs a view of the
core network, they don’t care much about the
access…
• BGP peering needs a view of the BGP they
don’t care much neither about the core nor
about the access!
• Support guys from Plovdiv field maintenance
team needs a view of the network from their
region, they don’t care about Sofia network
7. netTransformer
• Software for tracking and pushing the network
evolution process
• Network transformation – a process in which we
push the network evolution in direction that suits
our stakeholder interest
• It is able to discover networks, to fill in different
network models, to diff between any two
discovered network states
• It is able also to “talk” with network devices and
to executes the steps of the strategies for
network from state to state transformation.
8. netTransformer
• Written in java, xslt, glue with maven, groovy, Spring, JUNG
and a lot of swing ;)
• https://github.com/iTransformers/netTransformer
• GPL!
• Architecture is based on the following key
Interfaces/components
– Discoverers (anybody can implement his own, we have a couple raging
from SNMP, Openflow floodlight, BGP peering and some others).
– Node or Network Listeners
– Viewer, resourceFactories, activationFactories
– postDiscoverers (asses networks after the discovery has finished!)
10. SHORT SURVEY ON HOW DOES THE INTERNET IN
BULGARIA EVOLVED FROM 2001 TILL NOW!
11. The approach
• We will generate Global IPv4/IPv6 Internet maps from MRT (RFC 6396) files.
• The raw data from the repository of the route views project
ftp://archive.routeviews.org/
• Each MRT file will contain full Internet routing table.
• We will extract BGP AS PATH attributes and will generate a map based on
Internet Autonomous System numbers.
• As part of the map generation process each BGP AS has been enriched by
whois info from http://www.potaroo.net/bgp/iana/asn.txt)
• The maps itself are generate d with javaMrt2Graphml
https://github.com/iTransformers/javaMrt2Graphml
• We will generate one map per year (lazy and statistically incorrect from the
last day of December
• Each map will contain the “whole” Internet
• Each Internet map will be filtered by netTransformer Filter into a smaller graph
that covers only the Bulgarian & Bulgarian interconnect to external Internet
12. Node Metadata
Autonomous system ID
IPv6 advertised prefix
count
AS name & description (whois)
Advertised IPv4/IPv6 prefixes
(comma separated)
IPv4/IPv6 address count
Country of affiliation
IPv4 advertised prefix
count
13. Survey outcome
• How does the number of BG AS evolve
through the years (totals and node
births/deaths)
• What is the number of Internet BGP peering's
• What is the number of total advertised
addresses
• All that for IPv4 & IPv6
24. Advertised IPv6 Address Space
300000 M
250000 M
200000 M
150000 M
100000 M
50000 M
M
2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014
25. BG IPv6 AS birth /dead
Achieved by diffing per year
12
10
8
6
4
2
0
2001-2002 2002-2003 2003-2004 2004-2005 2005-2006 2006-2007 2007-2008 2008-2009 2009-2010 2010-2011 2011-2012 2012-2013 2013-2014
26. A few words about OpenSource and motivation
• The surprising truth about what motivates us
https://www.youtube.com/watch?v=u6XAPnuFjJc
27. Tracking network evolution process with
netTransformer
Bulgarian Internet BGP Peering evolution from 2001 till now
Nikolay Milovanov
Vasil Yordanov
https://github.com/iTransformers/
QUESTIONS!