Welcome toMY Presentation About
Border Gateway Protocol
Submitted by
Totan Banik
Outline….# Introduction# History# Current Version# Uses# Operation# BGP infrastructure # Problems# Success
Introduction
The Border Gateway Protocol (BGP) is the protocol used throughout the Internet to exchange routing information between networks.
History Date Text
1994-08-15 Concluded group
1992-05-30 Changed milestone "Post the specfication of BGP 4 as an Internet-Draft.", resolved as "Done"
1991-08-30 Changed milestone "Post an Internet-Draft specifying multicast extensions to BGP.", resolved as "Done"
1990-05-01 Changed milestone "Develop a MIB for BGP Version 3.", resolved as "Done"
1990-05-01 Changed milestone "Complete development of Version 2 of the Border Gateway Protocol (BGP).", resolved as "Done"
1989-01-01 Started group
Current VersionThe current version of BGP is version 4
(BGP4) codified in RFC 4271 since 2006. Early versions of the protocol are widely considered obsolete and are rarely supported.
Version 4 of BGP has been in use on the Internet since 1994.
Uses
Most Internet service providers must use BGP to establish routing between one another (especially if they are multi-homed), Compare this with Signaling System 7(SS7).
Very large private IP networks use BGP internally .
Operation
When BGP runs between two peers in the same autonomous system (AS), it is referred to as Internal BGP (iBGP or Interior Border Gateway Protocol). When it runs between different autonomous systems, it is called External BGP (EBGP or Exterior Border Gateway Protocol).
Finite-state machines
BGP Infrastructure
The complexity and dynamics of Border Gateway Protocol (BGP), the only inter-domain routing protocol available for the Internet, is driving the need for efficient, scalable, realistic and meaningful network simulations.
Infrastructure
ProblemsBGP Problems With a lots of benefits and importance of BGP in network, it also have some problem on it’s maintenance. The main problems are follow:• 1. Internal BGP scalability• 2. Instability• 3. Routing table growth• 4. Load-balancing problem• 5. IP Hijacking
Success• Investment protection: - Well know protocol - Rich set of tools
• Robustness: Run over TCP, Years of improvements
• Low Overhead: Sends an update once and then remains silent
• Scalability: Path Vector Protocol, Route-Reflector, Controller,…
• High Availability: NSR, PIC, GSHUT…
• Simplicity: BGP is simple (even if knobs make BGP BIG and sometimes less trivial to read)
• Multi-protocol: IPv4, IPv6, L2VPN, L3VPN, Multicast, SDN
• Incremental: Easy to extend: NLRI, Path Attribute, Community
• Flexible: Policy 7