blank.gif (43 bytes)

Church Of The
Swimming Elephant

Search:
7.3.2.1 Introduction Connected: An Internet Encyclopedia
7.3.2.1 Introduction

Up: Connected: An Internet Encyclopedia
Up: Requests For Comments
Up: RFC 1812
Up: 7. APPLICATION LAYER - ROUTING PROTOCOLS
Up: 7.3 EXTERIOR GATEWAY PROTOCOLS
Up: 7.3.2 BORDER GATEWAY PROTOCOL - BGP
Prev: 7.3.2 BORDER GATEWAY PROTOCOL - BGP
Next: 7.3.2.2 Protocol Walk-through

7.3.2.1 Introduction

7.3.2.1 Introduction

The Border Gateway Protocol (BGP-4) is an inter-AS routing protocol that exchanges network reachability information with other BGP speakers. The information for a network includes the complete list of ASs that traffic must transit to reach that network. This information can then be used to insure loop-free paths. This information is sufficient to construct a graph of AS connectivity from which routing loops may be pruned and some policy decisions at the AS level may be enforced.

BGP is defined by [ROUTE:4]. [ROUTE:5] specifies the proper usage of BGP in the Internet, and provides some useful implementation hints and guidelines. [ROUTE:12] and [ROUTE:13] provide additional useful information.

To comply with Section [8.3] of this memo, a router that implements BGP is required to implement the BGP MIB [MGT:15].

To characterize the set of policy decisions that can be enforced using BGP, one must focus on the rule that an AS advertises to its neighbor ASs only those routes that it itself uses. This rule reflects the hop-by-hop routing paradigm generally used throughout the current Internet. Note that some policies cannot be supported by the hop-by-hop routing paradigm and thus require techniques such as source routing to enforce. For example, BGP does not enable one AS to send traffic to a neighbor AS intending that traffic take a different route from that taken by traffic originating in the neighbor AS. On the other hand, BGP can support any policy conforming to the hop-by-hop routing paradigm.

Implementors of BGP are strongly encouraged to follow the recommendations outlined in Section 6 of [ROUTE:5].


Next: 7.3.2.2 Protocol Walk-through

Connected: An Internet Encyclopedia
7.3.2.1 Introduction

Cotse.Net

Protect yourself from cyberstalkers, identity thieves, and those who would snoop on you.
Stop spam from invading your inbox without losing the mail you want. We give you more control over your e-mail than any other service.
Block popups, ads, and malicious scripts while you surf the net through our anonymous proxies.
Participate in Usenet, host your web files, easily send anonymous messages, and more, much more.
All private, all encrypted, all secure, all in an easy to use service, and all for only $5.95 a month!

Service Details

 
.
www.cotse.com
Have you gone to church today?
.
All pages ©1999, 2000, 2001, 2002, 2003 Church of the Swimming Elephant unless otherwise stated
Church of the Swimming Elephant©1999, 2000, 2001, 2002, 2003 Cotse.com.
Cotse.com is a wholly owned subsidiary of Packetderm, LLC.

Packetderm, LLC
210 Park Ave #308
Worcester, MA 01609