z-logo
open-access-imgOpen Access
ANALYSIS OF BORDER GATEWAY PROTOCOL, ITS TYPES AND MEASURES TO AVOID RISK
Author(s) -
Prof Dr Aftab Malik,
Haroon Ur-Rashid Rashid,
Waqar Azeem
Publication year - 2019
Publication title -
lahore garrison university research journal of computer science and information technology
Language(s) - English
Resource type - Journals
eISSN - 2521-0122
pISSN - 2519-7991
DOI - 10.54692/lgurjcsit.2019.030379
Subject(s) - border gateway protocol , computer network , computer science , default free zone , interior gateway protocol , the internet , routing protocol , gateway (web page) , computer security , autonomous system (mathematics) , internet protocol , routing (electronic design automation) , world wide web , routing table , link state routing protocol , artificial intelligence
This is the age of digital communication. The process involves sending messages from one end of the network to other end using the internet, extranets and the Internet of Things (IOT) Technologies. Initially, the internet is a small community. But today internet becomes a global community as thousands of different administrative entities own and operate the internet. The process of transferring data across the network is known as routing. The process of routing is performed by using routers. Routers use certain protocols to achieve this task. The Broader Gateway Protocol (BGP) is an interdomain routing protocol that is used to connect two different autonomous systems. The autonomous system is collection of network that runs under a single administrative entity. This paper includes analysis and important techniques of border gateway protocol, types of BGP, its attributes, security threats and measures to avoid risks.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here