SlideShare a Scribd company logo
1 of 5
Download to read offline
International Journal of Research in Computer Science
eISSN 2249-8265 Volume 2 Issue 4 (2012) pp. 13-17
© White Globe Publications
www.ijorcs.org

   BIGP- A NEW SINGLE PROTOCOL THAT CAN WORK
    AS AN IGP (INTERIOR GATEWAY PROTOCOL) AS
    WELL AS EGP (EXTERIOR GATEWAY PROTOCOL)
                                                     Isha Gupta
                                         ASET/CSE Department, Noida, India
                                          Email: isha.gupta0701@gmail.com

Abstract: EGP and IGP are the key components of the
present internet infrastructure. Routers in a domain
forward IP packet within and between domains. Each
domain uses an intra-domain routing protocol known
as Interior Gateway Protocol (IGP) like IS-IS, OSPF,
RIP etc to populate the routing tables of its routers.
Routing information must also be exchanged between
domains to ensure that a host in one domain can reach
another host in remote domain. This role is performed
by inter-domain routing protocol called Exterior
Gateway Protocol (EGP). Basically EGP used these
days is Border Gateway Protocol (BGP). Basic
difference between the both is that BGP has smaller
convergence as compared to the IGP’s. And IGP’s on
the other hand have lesser scalability as compared to                  Figure 1: A Simple BGP topology
the BGP. So in this paper a proposal to create a new
protocol is given which can act as an IGP when we             In the above figure a simple BGP topology is
consider inter-domain transfer of traffic and acts as      shown. It consists of three autonomous systems which
BGP when we consider intra-domain transfer of              are linked together using serial cables. R1, R2 and R3
traffic.                                                   are core routers of the autonomous system AS1, AS2
                                                           and AS3 respectively. The primary function of a BGP
Keywords: Border Gateway Protocol, Interior
                                                           system is to exchange network-reachability
Gateway Protocol, routing tables, exterior gateway
                                                           information, including information about the list of
procol.
                                                           autonomous system paths, with other BGP systems.
                 I. INTRODUCTION                           Each BGP router maintains a routing table that lists all
                                                           feasible paths to a particular network. The router does
   Routing involves two basic activities: determination    not refresh the routing table, however. Instead, routing
of optimal routing paths and the transport of packets      information received from the peer routers is retained
through an internetwork. The transport of packets          until an incremental update is received [2, 15, 16].
through an internetwork is relatively straightforward.
Path determination, on the other hand, can be very             IGP (interior gateway protocol) are the protocols
complex. One protocol that addresses the task of path      which are used to route the data in an autonomous
determination in today’s networks is the Border            system [6, 8]. Three main branches of routing protocol
Gateway Protocol (BGP). BGP performs inter-domain          algorithms exist for IGP routing protocol Distance
routing in Transmission-Control Protocol/Internet          vector, Link-state and Balanced hybrid. RIP was first
Protocol (TCP/IP) networks. BGP is an exterior             popularly used IP distance vector protocol, with the
gateway protocol (EGP), which means that it performs       cisco-proprietary Interior Gateway Routing Protocol
routing between multiple autonomous systems or             (IGRP) being introduced a little later. But because of
domains and exchanges routing and reachability             their slow convergence and other problems Link-state
information with other BGP systems. BGP was                protocols-in particular, OSPF and integrated IS-IS-
developed to replace its predecessor, the now obsolete     solved the main issue with distance vector protocols
Exterior Gateway Protocol (EGP), as the standard           [3, 6]. Around same time as the introduction of OSPF,
exterior gateway-routing protocol used in the global       cisco created a proprietary routing protocol called
Internet. BGP solves seriousproblems with EGP and          Enhanced Interior Gateway Routing Protocol (IGRP).
scales to Internet growth more efficiently [1, 11].


                                                                             www.ijorcs.org
14                                                                                                        Isha Gupta

                                                           bit according to information given by its own as well
                                                           its neighbour routers table (as explained in following
                                                           topic).

                                                                     III. CONVERGENCE OF BIGP
                                                              We know that convergence is a very important
                                                           issue when we talk of BGPs i.e. convergence rate of
                                                           BGPs is slow. But, all the IGPs such as OSPF have a
                                                           faster convergence. If we make convergence faster for
                                                           inter-autonomous system this will make our system
                                                           very unstable. Each update if flooded the way it is
                                                           done in IGPs, this will crash the main backbone of our
                                                           present day internet [5, 13]. So in BIGP we have a
Figure 2: Comparing Locations used for implementing IGPs   solution to this problem. We have two sets of
                      and EGPs.
                                                           algorithms, Algorithm1 and Alogithm2. Algorithms
   In the above figure three different ISPs are shown.     basically deal with setting up path of data flow and
Different IGPs are used to communicate intra-ISP.          transfer of packets hence they play a very important
ISP1, ISP2 and ISP3 using RIP, OSPF and EIGRP              role in handling convergence of a network under
protocols respectively. Inter-ISP communication takes      consideration. Algorithm1 is used for intra-
place using BGP. Here each ISP can be treated as a         autonomous transfer of data and basically it is similar
single autonomous system.                                  to Dijkstra shortest path first (SPF). This algorithm
                                                           calculate the now-best routes and add those to the
               II.   HEADER OF BIGP                        routing TABLE A (explained in following topic) and
                                                           will provide all functionalities of an algorithm used in
   For inter and intra autonomous system interaction       various IGPs for path detection and transfer of data.
we have developed BIGP. Each packet will have a            Algorithm2 is used for inter-autonomous transfer of
header of BIGP protocol as shown in figure below.          data and it is similar to Best path algorithm. It assigns
                                                           the first valid path as the current best path and then
                                                           compares the best path with the next path in the list,
                                                           until BIGP reaches the end of the list of valid paths.
                                                           All this data is stored in routing TABLE B. The rules
                                                           that are used to determine the best path are same as
                                                           Best path algorithm used in normal BGP router.

               Figure 3: Header for BIGP

    As shown in the above example we have two fields
in the header and they are CBI (CARE BIT FOR IGP)
and CBB (CARE BIT FOR BGP). When a packet
enters a network where we have large number of
routers, the routing information with each router is
more than a limit that an IGP protocol can handle.
Then the CBB bit is set to one to turn functionality of
BGP “ON” as large amount of data can now be
handled by this routing protocol. And in case when a
packet enters a network where each router has amount              Figure 4: Intra-autonomous interaction using BIGP
of data that can be handled by an IGP protocol, then
the CBI bit is set to one to turn it ON and CBB is put        When a router receives a packet having a BIGP
to zero. In this way when CBI is one it will indicate      header it checks its care bits. If CBI is ON then as
that a packet has entered an intra-autonomous              shown in figure 4 router will enable its
communication system and thus BIGP will work as a          ALGORITHM1 mode so that the convergence
normal IGP. And on the other hand when CBB is one          becomes faster. And all the information will be stored
it will indicate that a packet has entered an inter-       in routing TABLE A of the router (explained later).
autonomous kind of communication.                          The network will converge faster [20]. Timely updates
                                                           after every 30-60 sec will be sent to the neighbours.
   This header can be put on packets by a normal or        Router when in this mode need not waste its CPU
any core router at the time of encapsulation. And          efficiency for taking care of routing TABLE B
during this time router will also ON the required care     (explained later).


                                                                            www.ijorcs.org
BIGP - A New Single Protocol that can work as an IGP as well as EGP                                                   15

                                                             which have enabled ALGORITHM1 mode of BIGP.
                                                             So basically in this we will have the complete
                                                             information of all the neighbouring routers which are
                                                             in neighbour relationship with the current router. It
                                                             will also have the information of the DR (designated
                                                             router) and BDR (backup designated router) if
    Figure 5: Inter-autonomous interaction using BIGP
                                                             elections take place in case of non- broadcasting
   When CBB bit is ON, then router switches to               medium. It also consists of data of entire network that
ALGORITHM2 mode. This makes convergence                      is in its reach. In case our network is attached to a
slower. The network now does not send updates at             network using some other protocol except BIGP then a
every regular interval. And routing TABLE B is filled        boundary router needs to be made as an ASBR, this
(explained later). In this also router need not worry        information is also present in this table. If we have
about routing TABLE A’s entries.                             configured a smaller network as a stub or a total stub
                                                             then this information should also be stored in this
           IV. SCALABILITY OF BIGP                           table. So basically all information about networks
                                                             (their packets consist of ASN number in the headers)
   One of the main problems with IGPs is that it is
                                                             having smaller ASN values are stored in this table.
difficult to scale them whenever there is an interaction
                                                             This table is similar to routing table of an IGP routing
with a larger network which means large number of
                                                             protocol [17].
routers in a network. But this problem in BGP is
corrected by the two ways, confederations and route          B. Routing Table B
reflectors [4].                                                 A router commands its processor to fill this table
   But we follow a different technique in BIGP.              whenever it receives a packet having CBB bit ON. All
Instead of having autonomous numbers for each                routers who enable ALGORITHM2 mode of BIGP fill
autonomous system, different domain numbers in case          this table. This happens in networks where we have
EIGRP and OSPF, we have a single number system               smaller convergence requirement. As discussed in
known as ASN for dividing inter and intra both areas         previous section that if in a network we have smaller
of autonomous systems [7,9].                                 convergence requirements we have larger ASNs. So
                                                             basically here we store ASN (generally ASNs here
   There would be a specific number range based on
                                                             have large values) values of all neighbouring routers.
complexity of the network. While configuring a router
                                                             All the paths to reach a particular router in such case
we must know that if our network wants faster
                                                             are calculated and stored [18, 19]. Here the
convergence those networks should be given a lower
                                                             intermediate neighbour cannot exchange the
range of ASN and if our requirement is of lower
                                                             information of its other two connected neighbours in
convergence then a larger range of ASN will be given.
                                                             between them. For this case the other two have to be
When we receive a packet in a particular network we
                                                             made the neighbours. So all the information related to
will first check its ASN number present in its BIGP
                                                             this has to be stored in this table. In short this table is
header. If ASN number is large then there is a need of
                                                             similar to routing table of a BGP routing protocol.
making BIGP more scalable [10].
   But we can still use the concepts of confederations          VI. SIMPLE EXAMPLE OF HOW THIS NEW
and route reflectors along with the use ASNs. This                       PROTOCOL WILL WORK
will make it easy to use a single protocol which can be          In figure 6 we have shown a simple network where
used universally in the internet system.                     we have both inter (between R3 and R4) and intra (say
                                                             between R2 and R3). Suppose we need to transfer data
          V. ROUTING TABLES OF BIGP
                                                             between R3 and R4. Router R3 will send its hello
   As discussed above the router will make entry to          packet to all its neighbours and from this it will come
routing TABLE A or routing TABLE B depending on              to know about the type of network. Since here inter-
whether CBB or CBI is in ON state. But what exactly          autonomous transfer of data is required R3 will set an
these routing tables contain is discussed in this section    ASN number in the BIGP header that will be selected
[12].                                                        from a larger range of ASN numbers. This ASN
                                                             number will let the routers receiving the packet from
A. Routing Table A
                                                             R3 know that the network in which data is transferred
    Whenever a router receives the packet having CBI         is large and hence larger scalability is required. This
bit ON, router shifts all its CPU processing for filling     will prepare other routers in ISP 1 and ISP 2 for inter-
this table. The basic aim is to fill entries in such a way   autonomous interactions. Also it will send data
that it makes the convergence of the network faster,         packets to R4 in which BIGP header will have CBB
neighbour relationships are made at faster rate and          field set to one, so that BGP type of data flow can take
timely hello packets are exchanged between the routers       place.

                                                                              www.ijorcs.org
16                                                                                                              Isha Gupta

    Now suppose we want to send data between R2 and           this will increase efficiency of BIGP hundred times. So
R3. R2 will send hello packets to all its neighbours and      in future we can try to make interaction between
from this it will come to know about type of network.         TABLE A and TABLE B possible. Also there is a
Since here intra-autonomous transfer of data is               need to find more ways on how to make BIGP more
required R2 will set an ASN number that is selected           scalable for actual implementation in our present day
from smaller range of ASN numbers. This ASN                   internet. Also our protocol should support both IPV4
number will let the routers receiving packets from R2         and IPV6.
know that the network in which data is transferred is
small. This will prepare other routers within ISP 2 for                         VIII. REFRENCES
intra-autonomous interactions. Also it will send               [1] Border Gateway Protocol, Internetworking technology
packets to R3 via R1 having BIGP header in which                    overview, June 1999.
CBI field is set to one, so that IGP type of data flow         [2] XU Ke, Wang An-ping, WU Jian                    ping and
can take place.                                                     WANG Bin, Research on Routing Policy and Routing
                                                                    Information, Propagation of Boarder Gateway Protocol
                                                                    Version 4 (BGP-4), Proceedings of IEEE
                                                                    TENCON’02.
                                                               [3] Selin Cerav-Erbas, Olivier Delcourt, Bernard Fortz
                                                                    and Bruno Quoitin , The Interaction of IGP Weight
                                                                    Optimization with BGP, IEEE conference 2007.
                                                               [4] Martin O. Nicholes and Biswanath Mukherjee, A
                                                                    Survey of Security Techniques for the Border Gateway
                                                                    Protocol (BGP), IEEE communications surveys &
                                                                    tutorials, vol. 11, no. 1, first quarter 2009.
                                                               [5] Masafumi Watari , Yuichiro Hei, Shigehiro Ano and
               Figure 6: A Simple Network                           Katsuyuki Yamazaki, OSPF-based Fast Reroute for
                                                                    BGP Link Failures, IEEE "GLOBECOM" 2009
     VII. CONCLUSION AND FUTURE WORK                                proceedings.
                                                               [6] Jesús Expósito, Valentina Trujillo, and Eric Gamess,
   In our present day internet across the globe we use              Easy-EIGRP: A Didactic Application for Teaching and
different routing protocols for configuring different               Learning of the Enhanced Interior Gateway Routing
networks; our IBGP protocol can solve this problem.                 Protocol, 2010 Sixth International Conference on
Using it we need to configure just a single routing                 Networking and Services.
protocol. It makes a bridge between IGP and BGP                [7] Dahai Xu, Optimal traffic engineering via newton’s
routing protocols. This can save our cost of setup and              method, 2008 IEEE conference.
can increase the efficiency [11, 14]. Time is also saved       [8] Conor Creagh and Cormac Sreenan , An Interior Path
as we need not re-distribute the packets for making                 Vector Routing Protocol, 2006 IEEE
data flow possible between two different routing               [9] Hongjun Wang, Wanping Hao and Xin Zhao, A
protocols. Now we don’t have to separately configure                Method to Eliminate BGP Divergence Based on AS
IGP and BGP. Both can be configured by configuring                  Relationships, 2010 Second Pacific-Asia Conference
a single BIGP protocol. Care of scalability and                     on Circuits, Communications and System (PACCS).
convergence will be automatically done. So we can say          [10] Steve Uhlig and Bruno Quoitin, Tweak-it: BGP-based
BIGP will lead to faster network setup.                             Interdomain Traffic Engineering for transit Ass, 2005
                                                                    IEEE.
   There are some limitations involved with using this
                                                               [11] Anja Feldmann, Lixin Gao and Timothy Griffin, Z.
kind of a protocol. It will take lots of time and effort to         Morley Mao, Inter domain Routing and the Border
completely remove the concept of using different                    Gateway           Protocol,           IEEE     Network
routing protocols for different types of network that               (November/December 2005).
are in use these days and introducing a new concept of         [12] Sharad Agarwal, Antonio Nucci and Supratik
using a single routing protocol all over the internet.              Bhattacharyya, Measuring the Shared Fate of IGP
Also for new protocol new specifications will need to               Engineering and Interdomain Traffic, Proceedings of
be formulated regarding routers, wires etc. New IOS                 the 13th IEEE International Conference on Network
supporting this protocol need to be made and uploaded               Protocols (ICNP’05).
on routers so that BIGP can work on various networks.          [13] Hongwei Zhang, Anish Arora and Zhijun Liu, A
                                                                    Stability-oriented Approach to Improving BGP
   As we have seen that we have maintained two                      Convergence, Proceedings of the 23rd IEEE
different tables TABLE A and TABLE B. Both these                    International Symposium on Reliable Distributed
tables maintain data for IGP and BGP interactions in                Systems (SRDS’04).
the network respectively. If we are able to make the
data of both these tables interact with each other, then


                                                                                www.ijorcs.org
BIGP - A New Single Protocol that can work as an IGP as well as EGP                    17

 [14] Greg Goth, Fixing BGP Might Be Difficult Or Not So
      Tough, IEEE internet computing, may - June 2003.
 [15] Andrew S. Tanenbaum , Computer networks, Prentice
      Hall PTR, 2003.
 [16] Douglas Comer, Computer Networks and Internets,
      Prentice Hall, 2009.
 [17] Jeanna Matthews, Computer Networking: Internet
      Protocols In Action, Wiley, 03-Jan-2005.
 [18] Nurul Sarkar, Tools for Teaching Computer
      Networking And Hardware Concepts, Idea Group Inc
      (IGI), 28-Feb-2006.
 [19] Wendell Odom, Computer Networking First-Step,
      Cisco Press, 01-Apr-2004.
 [20] Ed Tittel, Schaum’s Outline of Theory and Problems
      of      Computer       Networking,       McGraw-Hill
      Professional, 24-Jun-2002.




                                                                      www.ijorcs.org

More Related Content

What's hot

The benefit of BGP for every service provider
The benefit of BGP for every service providerThe benefit of BGP for every service provider
The benefit of BGP for every service providerThomas Mangin
 
Using BGP To Manage Dual Internet Connections
Using BGP To Manage Dual Internet ConnectionsUsing BGP To Manage Dual Internet Connections
Using BGP To Manage Dual Internet ConnectionsRowell Dionicio
 
Border gateway protocol
Border gateway protocolBorder gateway protocol
Border gateway protocolazlerabby
 
Border gateway protocol
Border gateway protocolBorder gateway protocol
Border gateway protocolsahilnarvekar
 
Bgp For Presentation
Bgp For PresentationBgp For Presentation
Bgp For PresentationAlp isik
 
Open Shortest Path First (OSPF) || 2020 || Ser-2
Open Shortest Path First (OSPF) || 2020 || Ser-2Open Shortest Path First (OSPF) || 2020 || Ser-2
Open Shortest Path First (OSPF) || 2020 || Ser-2Nutan Singh
 
B G P O S P F Interaction Report
B G P  O S P F  Interaction  ReportB G P  O S P F  Interaction  Report
B G P O S P F Interaction Reportgobed
 
CCNP Route 642 902 BGP
CCNP Route 642 902 BGPCCNP Route 642 902 BGP
CCNP Route 642 902 BGPIT Tech
 
BGP Techniques for Network Operators
BGP Techniques for Network OperatorsBGP Techniques for Network Operators
BGP Techniques for Network OperatorsAPNIC
 
Cisco BGP Exam 642-661 Review Notes
Cisco BGP Exam 642-661 Review NotesCisco BGP Exam 642-661 Review Notes
Cisco BGP Exam 642-661 Review NotesDuane Bodle
 

What's hot (20)

bgp protocol
 bgp protocol bgp protocol
bgp protocol
 
Bgp Toc
Bgp TocBgp Toc
Bgp Toc
 
BGP
BGPBGP
BGP
 
The benefit of BGP for every service provider
The benefit of BGP for every service providerThe benefit of BGP for every service provider
The benefit of BGP for every service provider
 
Using BGP To Manage Dual Internet Connections
Using BGP To Manage Dual Internet ConnectionsUsing BGP To Manage Dual Internet Connections
Using BGP To Manage Dual Internet Connections
 
Border gateway protocol
Border gateway protocolBorder gateway protocol
Border gateway protocol
 
BGP
BGPBGP
BGP
 
Bgp training
Bgp trainingBgp training
Bgp training
 
Part1
Part1Part1
Part1
 
Border gateway protocol
Border gateway protocolBorder gateway protocol
Border gateway protocol
 
Bgp in-large-networks
Bgp in-large-networksBgp in-large-networks
Bgp in-large-networks
 
Bgp For Presentation
Bgp For PresentationBgp For Presentation
Bgp For Presentation
 
Open Shortest Path First (OSPF) || 2020 || Ser-2
Open Shortest Path First (OSPF) || 2020 || Ser-2Open Shortest Path First (OSPF) || 2020 || Ser-2
Open Shortest Path First (OSPF) || 2020 || Ser-2
 
B G P O S P F Interaction Report
B G P  O S P F  Interaction  ReportB G P  O S P F  Interaction  Report
B G P O S P F Interaction Report
 
Bgp protocol
Bgp protocolBgp protocol
Bgp protocol
 
Bgp (1)
Bgp (1)Bgp (1)
Bgp (1)
 
CCNP Route 642 902 BGP
CCNP Route 642 902 BGPCCNP Route 642 902 BGP
CCNP Route 642 902 BGP
 
B G P Part2
B G P  Part2B G P  Part2
B G P Part2
 
BGP Techniques for Network Operators
BGP Techniques for Network OperatorsBGP Techniques for Network Operators
BGP Techniques for Network Operators
 
Cisco BGP Exam 642-661 Review Notes
Cisco BGP Exam 642-661 Review NotesCisco BGP Exam 642-661 Review Notes
Cisco BGP Exam 642-661 Review Notes
 

Similar to BIGP- A New Single Protocol that can work as an IGP (Interior Gateway Protocol) as well as EGP (Exterior Gateway Protocol)

Optimal Performance Analysis Enabling OSPF and BGP in Internal and External WAN
Optimal Performance Analysis Enabling OSPF and BGP in Internal and External WANOptimal Performance Analysis Enabling OSPF and BGP in Internal and External WAN
Optimal Performance Analysis Enabling OSPF and BGP in Internal and External WANijdpsjournal
 
BGP Protocol Makes the Internet Work
BGP Protocol Makes the Internet WorkBGP Protocol Makes the Internet Work
BGP Protocol Makes the Internet WorkIT Tech
 
A Comparative Performance Analysis of Route Redistribution among Three Differ...
A Comparative Performance Analysis of Route Redistribution among Three Differ...A Comparative Performance Analysis of Route Redistribution among Three Differ...
A Comparative Performance Analysis of Route Redistribution among Three Differ...IJCNCJournal
 
routing Protocols and Virtual private network
routing Protocols and Virtual private networkrouting Protocols and Virtual private network
routing Protocols and Virtual private networkhayenas
 
Solution against BGP vulnerabilities
Solution against BGP vulnerabilitiesSolution against BGP vulnerabilities
Solution against BGP vulnerabilitiesiosrjce
 
OSPF EIGRP & RIP comparision.pdf
OSPF EIGRP & RIP comparision.pdfOSPF EIGRP & RIP comparision.pdf
OSPF EIGRP & RIP comparision.pdfKOLOYOYO
 
How Different Cisco Routing Protocal Work
How Different Cisco  Routing Protocal WorkHow Different Cisco  Routing Protocal Work
How Different Cisco Routing Protocal Worktrendy updates
 
Network Performance Analysis of Dynamic Routing Protocols for Real Time Appl...
Network Performance Analysis of Dynamic Routing Protocols for  Real Time Appl...Network Performance Analysis of Dynamic Routing Protocols for  Real Time Appl...
Network Performance Analysis of Dynamic Routing Protocols for Real Time Appl...IJMER
 
CCNA Based routing protocols
CCNA Based routing protocolsCCNA Based routing protocols
CCNA Based routing protocolsGaurav Rawat
 
Enhanced Interior Gateway Routing Protocol - Wikipedia, the free encyclopedia
Enhanced Interior Gateway Routing Protocol - Wikipedia, the free encyclopediaEnhanced Interior Gateway Routing Protocol - Wikipedia, the free encyclopedia
Enhanced Interior Gateway Routing Protocol - Wikipedia, the free encyclopediaHoàng Hải Nguyễn
 

Similar to BIGP- A New Single Protocol that can work as an IGP (Interior Gateway Protocol) as well as EGP (Exterior Gateway Protocol) (20)

A Survey of Border Gateway Protocol
A Survey of Border Gateway ProtocolA Survey of Border Gateway Protocol
A Survey of Border Gateway Protocol
 
Optimal Performance Analysis Enabling OSPF and BGP in Internal and External WAN
Optimal Performance Analysis Enabling OSPF and BGP in Internal and External WANOptimal Performance Analysis Enabling OSPF and BGP in Internal and External WAN
Optimal Performance Analysis Enabling OSPF and BGP in Internal and External WAN
 
BGP Protocol Makes the Internet Work
BGP Protocol Makes the Internet WorkBGP Protocol Makes the Internet Work
BGP Protocol Makes the Internet Work
 
BGP
BGPBGP
BGP
 
BORDER GATEWAY PROTOCOL
BORDER GATEWAY PROTOCOLBORDER GATEWAY PROTOCOL
BORDER GATEWAY PROTOCOL
 
CCNP ROUTE V7 CH7
CCNP ROUTE V7 CH7CCNP ROUTE V7 CH7
CCNP ROUTE V7 CH7
 
BGP.pdf
BGP.pdfBGP.pdf
BGP.pdf
 
Dynamic routing
Dynamic routingDynamic routing
Dynamic routing
 
A Comparative Performance Analysis of Route Redistribution among Three Differ...
A Comparative Performance Analysis of Route Redistribution among Three Differ...A Comparative Performance Analysis of Route Redistribution among Three Differ...
A Comparative Performance Analysis of Route Redistribution among Three Differ...
 
routing Protocols and Virtual private network
routing Protocols and Virtual private networkrouting Protocols and Virtual private network
routing Protocols and Virtual private network
 
D017351725
D017351725D017351725
D017351725
 
Solution against BGP vulnerabilities
Solution against BGP vulnerabilitiesSolution against BGP vulnerabilities
Solution against BGP vulnerabilities
 
Dynamic routing
Dynamic routingDynamic routing
Dynamic routing
 
OSPF EIGRP & RIP comparision.pdf
OSPF EIGRP & RIP comparision.pdfOSPF EIGRP & RIP comparision.pdf
OSPF EIGRP & RIP comparision.pdf
 
How Different Cisco Routing Protocal Work
How Different Cisco  Routing Protocal WorkHow Different Cisco  Routing Protocal Work
How Different Cisco Routing Protocal Work
 
Different Routing protocols
Different Routing protocolsDifferent Routing protocols
Different Routing protocols
 
Network Performance Analysis of Dynamic Routing Protocols for Real Time Appl...
Network Performance Analysis of Dynamic Routing Protocols for  Real Time Appl...Network Performance Analysis of Dynamic Routing Protocols for  Real Time Appl...
Network Performance Analysis of Dynamic Routing Protocols for Real Time Appl...
 
CCNA Based routing protocols
CCNA Based routing protocolsCCNA Based routing protocols
CCNA Based routing protocols
 
Eigrp
EigrpEigrp
Eigrp
 
Enhanced Interior Gateway Routing Protocol - Wikipedia, the free encyclopedia
Enhanced Interior Gateway Routing Protocol - Wikipedia, the free encyclopediaEnhanced Interior Gateway Routing Protocol - Wikipedia, the free encyclopedia
Enhanced Interior Gateway Routing Protocol - Wikipedia, the free encyclopedia
 

More from IJORCS

Help the Genetic Algorithm to Minimize the Urban Traffic on Intersections
Help the Genetic Algorithm to Minimize the Urban Traffic on IntersectionsHelp the Genetic Algorithm to Minimize the Urban Traffic on Intersections
Help the Genetic Algorithm to Minimize the Urban Traffic on IntersectionsIJORCS
 
Call for Papers - IJORCS, Volume 4 Issue 4
Call for Papers - IJORCS, Volume 4 Issue 4Call for Papers - IJORCS, Volume 4 Issue 4
Call for Papers - IJORCS, Volume 4 Issue 4IJORCS
 
Real-Time Multiple License Plate Recognition System
Real-Time Multiple License Plate Recognition SystemReal-Time Multiple License Plate Recognition System
Real-Time Multiple License Plate Recognition SystemIJORCS
 
FPGA Implementation of FIR Filter using Various Algorithms: A Retrospective
FPGA Implementation of FIR Filter using Various Algorithms: A RetrospectiveFPGA Implementation of FIR Filter using Various Algorithms: A Retrospective
FPGA Implementation of FIR Filter using Various Algorithms: A RetrospectiveIJORCS
 
Using Virtualization Technique to Increase Security and Reduce Energy Consump...
Using Virtualization Technique to Increase Security and Reduce Energy Consump...Using Virtualization Technique to Increase Security and Reduce Energy Consump...
Using Virtualization Technique to Increase Security and Reduce Energy Consump...IJORCS
 
Algebraic Fault Attack on the SHA-256 Compression Function
Algebraic Fault Attack on the SHA-256 Compression FunctionAlgebraic Fault Attack on the SHA-256 Compression Function
Algebraic Fault Attack on the SHA-256 Compression FunctionIJORCS
 
Enhancement of DES Algorithm with Multi State Logic
Enhancement of DES Algorithm with Multi State LogicEnhancement of DES Algorithm with Multi State Logic
Enhancement of DES Algorithm with Multi State LogicIJORCS
 
Hybrid Simulated Annealing and Nelder-Mead Algorithm for Solving Large-Scale ...
Hybrid Simulated Annealing and Nelder-Mead Algorithm for Solving Large-Scale ...Hybrid Simulated Annealing and Nelder-Mead Algorithm for Solving Large-Scale ...
Hybrid Simulated Annealing and Nelder-Mead Algorithm for Solving Large-Scale ...IJORCS
 
CFP. IJORCS, Volume 4 - Issue2
CFP. IJORCS, Volume 4 - Issue2CFP. IJORCS, Volume 4 - Issue2
CFP. IJORCS, Volume 4 - Issue2IJORCS
 
Call for Papers - IJORCS - Vol 4, Issue 1
Call for Papers - IJORCS - Vol 4, Issue 1Call for Papers - IJORCS - Vol 4, Issue 1
Call for Papers - IJORCS - Vol 4, Issue 1IJORCS
 
Voice Recognition System using Template Matching
Voice Recognition System using Template MatchingVoice Recognition System using Template Matching
Voice Recognition System using Template MatchingIJORCS
 
Channel Aware Mac Protocol for Maximizing Throughput and Fairness
Channel Aware Mac Protocol for Maximizing Throughput and FairnessChannel Aware Mac Protocol for Maximizing Throughput and Fairness
Channel Aware Mac Protocol for Maximizing Throughput and FairnessIJORCS
 
A Review and Analysis on Mobile Application Development Processes using Agile...
A Review and Analysis on Mobile Application Development Processes using Agile...A Review and Analysis on Mobile Application Development Processes using Agile...
A Review and Analysis on Mobile Application Development Processes using Agile...IJORCS
 
Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...
Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...
Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...IJORCS
 
A Study of Routing Techniques in Intermittently Connected MANETs
A Study of Routing Techniques in Intermittently Connected MANETsA Study of Routing Techniques in Intermittently Connected MANETs
A Study of Routing Techniques in Intermittently Connected MANETsIJORCS
 
Improving the Efficiency of Spectral Subtraction Method by Combining it with ...
Improving the Efficiency of Spectral Subtraction Method by Combining it with ...Improving the Efficiency of Spectral Subtraction Method by Combining it with ...
Improving the Efficiency of Spectral Subtraction Method by Combining it with ...IJORCS
 
An Adaptive Load Sharing Algorithm for Heterogeneous Distributed System
An Adaptive Load Sharing Algorithm for Heterogeneous Distributed SystemAn Adaptive Load Sharing Algorithm for Heterogeneous Distributed System
An Adaptive Load Sharing Algorithm for Heterogeneous Distributed SystemIJORCS
 
The Design of Cognitive Social Simulation Framework using Statistical Methodo...
The Design of Cognitive Social Simulation Framework using Statistical Methodo...The Design of Cognitive Social Simulation Framework using Statistical Methodo...
The Design of Cognitive Social Simulation Framework using Statistical Methodo...IJORCS
 
An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...
An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...
An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...IJORCS
 
A PSO-Based Subtractive Data Clustering Algorithm
A PSO-Based Subtractive Data Clustering AlgorithmA PSO-Based Subtractive Data Clustering Algorithm
A PSO-Based Subtractive Data Clustering AlgorithmIJORCS
 

More from IJORCS (20)

Help the Genetic Algorithm to Minimize the Urban Traffic on Intersections
Help the Genetic Algorithm to Minimize the Urban Traffic on IntersectionsHelp the Genetic Algorithm to Minimize the Urban Traffic on Intersections
Help the Genetic Algorithm to Minimize the Urban Traffic on Intersections
 
Call for Papers - IJORCS, Volume 4 Issue 4
Call for Papers - IJORCS, Volume 4 Issue 4Call for Papers - IJORCS, Volume 4 Issue 4
Call for Papers - IJORCS, Volume 4 Issue 4
 
Real-Time Multiple License Plate Recognition System
Real-Time Multiple License Plate Recognition SystemReal-Time Multiple License Plate Recognition System
Real-Time Multiple License Plate Recognition System
 
FPGA Implementation of FIR Filter using Various Algorithms: A Retrospective
FPGA Implementation of FIR Filter using Various Algorithms: A RetrospectiveFPGA Implementation of FIR Filter using Various Algorithms: A Retrospective
FPGA Implementation of FIR Filter using Various Algorithms: A Retrospective
 
Using Virtualization Technique to Increase Security and Reduce Energy Consump...
Using Virtualization Technique to Increase Security and Reduce Energy Consump...Using Virtualization Technique to Increase Security and Reduce Energy Consump...
Using Virtualization Technique to Increase Security and Reduce Energy Consump...
 
Algebraic Fault Attack on the SHA-256 Compression Function
Algebraic Fault Attack on the SHA-256 Compression FunctionAlgebraic Fault Attack on the SHA-256 Compression Function
Algebraic Fault Attack on the SHA-256 Compression Function
 
Enhancement of DES Algorithm with Multi State Logic
Enhancement of DES Algorithm with Multi State LogicEnhancement of DES Algorithm with Multi State Logic
Enhancement of DES Algorithm with Multi State Logic
 
Hybrid Simulated Annealing and Nelder-Mead Algorithm for Solving Large-Scale ...
Hybrid Simulated Annealing and Nelder-Mead Algorithm for Solving Large-Scale ...Hybrid Simulated Annealing and Nelder-Mead Algorithm for Solving Large-Scale ...
Hybrid Simulated Annealing and Nelder-Mead Algorithm for Solving Large-Scale ...
 
CFP. IJORCS, Volume 4 - Issue2
CFP. IJORCS, Volume 4 - Issue2CFP. IJORCS, Volume 4 - Issue2
CFP. IJORCS, Volume 4 - Issue2
 
Call for Papers - IJORCS - Vol 4, Issue 1
Call for Papers - IJORCS - Vol 4, Issue 1Call for Papers - IJORCS - Vol 4, Issue 1
Call for Papers - IJORCS - Vol 4, Issue 1
 
Voice Recognition System using Template Matching
Voice Recognition System using Template MatchingVoice Recognition System using Template Matching
Voice Recognition System using Template Matching
 
Channel Aware Mac Protocol for Maximizing Throughput and Fairness
Channel Aware Mac Protocol for Maximizing Throughput and FairnessChannel Aware Mac Protocol for Maximizing Throughput and Fairness
Channel Aware Mac Protocol for Maximizing Throughput and Fairness
 
A Review and Analysis on Mobile Application Development Processes using Agile...
A Review and Analysis on Mobile Application Development Processes using Agile...A Review and Analysis on Mobile Application Development Processes using Agile...
A Review and Analysis on Mobile Application Development Processes using Agile...
 
Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...
Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...
Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...
 
A Study of Routing Techniques in Intermittently Connected MANETs
A Study of Routing Techniques in Intermittently Connected MANETsA Study of Routing Techniques in Intermittently Connected MANETs
A Study of Routing Techniques in Intermittently Connected MANETs
 
Improving the Efficiency of Spectral Subtraction Method by Combining it with ...
Improving the Efficiency of Spectral Subtraction Method by Combining it with ...Improving the Efficiency of Spectral Subtraction Method by Combining it with ...
Improving the Efficiency of Spectral Subtraction Method by Combining it with ...
 
An Adaptive Load Sharing Algorithm for Heterogeneous Distributed System
An Adaptive Load Sharing Algorithm for Heterogeneous Distributed SystemAn Adaptive Load Sharing Algorithm for Heterogeneous Distributed System
An Adaptive Load Sharing Algorithm for Heterogeneous Distributed System
 
The Design of Cognitive Social Simulation Framework using Statistical Methodo...
The Design of Cognitive Social Simulation Framework using Statistical Methodo...The Design of Cognitive Social Simulation Framework using Statistical Methodo...
The Design of Cognitive Social Simulation Framework using Statistical Methodo...
 
An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...
An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...
An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...
 
A PSO-Based Subtractive Data Clustering Algorithm
A PSO-Based Subtractive Data Clustering AlgorithmA PSO-Based Subtractive Data Clustering Algorithm
A PSO-Based Subtractive Data Clustering Algorithm
 

Recently uploaded

Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 

Recently uploaded (20)

Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 

BIGP- A New Single Protocol that can work as an IGP (Interior Gateway Protocol) as well as EGP (Exterior Gateway Protocol)

  • 1. International Journal of Research in Computer Science eISSN 2249-8265 Volume 2 Issue 4 (2012) pp. 13-17 © White Globe Publications www.ijorcs.org BIGP- A NEW SINGLE PROTOCOL THAT CAN WORK AS AN IGP (INTERIOR GATEWAY PROTOCOL) AS WELL AS EGP (EXTERIOR GATEWAY PROTOCOL) Isha Gupta ASET/CSE Department, Noida, India Email: isha.gupta0701@gmail.com Abstract: EGP and IGP are the key components of the present internet infrastructure. Routers in a domain forward IP packet within and between domains. Each domain uses an intra-domain routing protocol known as Interior Gateway Protocol (IGP) like IS-IS, OSPF, RIP etc to populate the routing tables of its routers. Routing information must also be exchanged between domains to ensure that a host in one domain can reach another host in remote domain. This role is performed by inter-domain routing protocol called Exterior Gateway Protocol (EGP). Basically EGP used these days is Border Gateway Protocol (BGP). Basic difference between the both is that BGP has smaller convergence as compared to the IGP’s. And IGP’s on the other hand have lesser scalability as compared to Figure 1: A Simple BGP topology the BGP. So in this paper a proposal to create a new protocol is given which can act as an IGP when we In the above figure a simple BGP topology is consider inter-domain transfer of traffic and acts as shown. It consists of three autonomous systems which BGP when we consider intra-domain transfer of are linked together using serial cables. R1, R2 and R3 traffic. are core routers of the autonomous system AS1, AS2 and AS3 respectively. The primary function of a BGP Keywords: Border Gateway Protocol, Interior system is to exchange network-reachability Gateway Protocol, routing tables, exterior gateway information, including information about the list of procol. autonomous system paths, with other BGP systems. I. INTRODUCTION Each BGP router maintains a routing table that lists all feasible paths to a particular network. The router does Routing involves two basic activities: determination not refresh the routing table, however. Instead, routing of optimal routing paths and the transport of packets information received from the peer routers is retained through an internetwork. The transport of packets until an incremental update is received [2, 15, 16]. through an internetwork is relatively straightforward. Path determination, on the other hand, can be very IGP (interior gateway protocol) are the protocols complex. One protocol that addresses the task of path which are used to route the data in an autonomous determination in today’s networks is the Border system [6, 8]. Three main branches of routing protocol Gateway Protocol (BGP). BGP performs inter-domain algorithms exist for IGP routing protocol Distance routing in Transmission-Control Protocol/Internet vector, Link-state and Balanced hybrid. RIP was first Protocol (TCP/IP) networks. BGP is an exterior popularly used IP distance vector protocol, with the gateway protocol (EGP), which means that it performs cisco-proprietary Interior Gateway Routing Protocol routing between multiple autonomous systems or (IGRP) being introduced a little later. But because of domains and exchanges routing and reachability their slow convergence and other problems Link-state information with other BGP systems. BGP was protocols-in particular, OSPF and integrated IS-IS- developed to replace its predecessor, the now obsolete solved the main issue with distance vector protocols Exterior Gateway Protocol (EGP), as the standard [3, 6]. Around same time as the introduction of OSPF, exterior gateway-routing protocol used in the global cisco created a proprietary routing protocol called Internet. BGP solves seriousproblems with EGP and Enhanced Interior Gateway Routing Protocol (IGRP). scales to Internet growth more efficiently [1, 11]. www.ijorcs.org
  • 2. 14 Isha Gupta bit according to information given by its own as well its neighbour routers table (as explained in following topic). III. CONVERGENCE OF BIGP We know that convergence is a very important issue when we talk of BGPs i.e. convergence rate of BGPs is slow. But, all the IGPs such as OSPF have a faster convergence. If we make convergence faster for inter-autonomous system this will make our system very unstable. Each update if flooded the way it is done in IGPs, this will crash the main backbone of our present day internet [5, 13]. So in BIGP we have a Figure 2: Comparing Locations used for implementing IGPs solution to this problem. We have two sets of and EGPs. algorithms, Algorithm1 and Alogithm2. Algorithms In the above figure three different ISPs are shown. basically deal with setting up path of data flow and Different IGPs are used to communicate intra-ISP. transfer of packets hence they play a very important ISP1, ISP2 and ISP3 using RIP, OSPF and EIGRP role in handling convergence of a network under protocols respectively. Inter-ISP communication takes consideration. Algorithm1 is used for intra- place using BGP. Here each ISP can be treated as a autonomous transfer of data and basically it is similar single autonomous system. to Dijkstra shortest path first (SPF). This algorithm calculate the now-best routes and add those to the II. HEADER OF BIGP routing TABLE A (explained in following topic) and will provide all functionalities of an algorithm used in For inter and intra autonomous system interaction various IGPs for path detection and transfer of data. we have developed BIGP. Each packet will have a Algorithm2 is used for inter-autonomous transfer of header of BIGP protocol as shown in figure below. data and it is similar to Best path algorithm. It assigns the first valid path as the current best path and then compares the best path with the next path in the list, until BIGP reaches the end of the list of valid paths. All this data is stored in routing TABLE B. The rules that are used to determine the best path are same as Best path algorithm used in normal BGP router. Figure 3: Header for BIGP As shown in the above example we have two fields in the header and they are CBI (CARE BIT FOR IGP) and CBB (CARE BIT FOR BGP). When a packet enters a network where we have large number of routers, the routing information with each router is more than a limit that an IGP protocol can handle. Then the CBB bit is set to one to turn functionality of BGP “ON” as large amount of data can now be handled by this routing protocol. And in case when a packet enters a network where each router has amount Figure 4: Intra-autonomous interaction using BIGP of data that can be handled by an IGP protocol, then the CBI bit is set to one to turn it ON and CBB is put When a router receives a packet having a BIGP to zero. In this way when CBI is one it will indicate header it checks its care bits. If CBI is ON then as that a packet has entered an intra-autonomous shown in figure 4 router will enable its communication system and thus BIGP will work as a ALGORITHM1 mode so that the convergence normal IGP. And on the other hand when CBB is one becomes faster. And all the information will be stored it will indicate that a packet has entered an inter- in routing TABLE A of the router (explained later). autonomous kind of communication. The network will converge faster [20]. Timely updates after every 30-60 sec will be sent to the neighbours. This header can be put on packets by a normal or Router when in this mode need not waste its CPU any core router at the time of encapsulation. And efficiency for taking care of routing TABLE B during this time router will also ON the required care (explained later). www.ijorcs.org
  • 3. BIGP - A New Single Protocol that can work as an IGP as well as EGP 15 which have enabled ALGORITHM1 mode of BIGP. So basically in this we will have the complete information of all the neighbouring routers which are in neighbour relationship with the current router. It will also have the information of the DR (designated router) and BDR (backup designated router) if Figure 5: Inter-autonomous interaction using BIGP elections take place in case of non- broadcasting When CBB bit is ON, then router switches to medium. It also consists of data of entire network that ALGORITHM2 mode. This makes convergence is in its reach. In case our network is attached to a slower. The network now does not send updates at network using some other protocol except BIGP then a every regular interval. And routing TABLE B is filled boundary router needs to be made as an ASBR, this (explained later). In this also router need not worry information is also present in this table. If we have about routing TABLE A’s entries. configured a smaller network as a stub or a total stub then this information should also be stored in this IV. SCALABILITY OF BIGP table. So basically all information about networks (their packets consist of ASN number in the headers) One of the main problems with IGPs is that it is having smaller ASN values are stored in this table. difficult to scale them whenever there is an interaction This table is similar to routing table of an IGP routing with a larger network which means large number of protocol [17]. routers in a network. But this problem in BGP is corrected by the two ways, confederations and route B. Routing Table B reflectors [4]. A router commands its processor to fill this table But we follow a different technique in BIGP. whenever it receives a packet having CBB bit ON. All Instead of having autonomous numbers for each routers who enable ALGORITHM2 mode of BIGP fill autonomous system, different domain numbers in case this table. This happens in networks where we have EIGRP and OSPF, we have a single number system smaller convergence requirement. As discussed in known as ASN for dividing inter and intra both areas previous section that if in a network we have smaller of autonomous systems [7,9]. convergence requirements we have larger ASNs. So basically here we store ASN (generally ASNs here There would be a specific number range based on have large values) values of all neighbouring routers. complexity of the network. While configuring a router All the paths to reach a particular router in such case we must know that if our network wants faster are calculated and stored [18, 19]. Here the convergence those networks should be given a lower intermediate neighbour cannot exchange the range of ASN and if our requirement is of lower information of its other two connected neighbours in convergence then a larger range of ASN will be given. between them. For this case the other two have to be When we receive a packet in a particular network we made the neighbours. So all the information related to will first check its ASN number present in its BIGP this has to be stored in this table. In short this table is header. If ASN number is large then there is a need of similar to routing table of a BGP routing protocol. making BIGP more scalable [10]. But we can still use the concepts of confederations VI. SIMPLE EXAMPLE OF HOW THIS NEW and route reflectors along with the use ASNs. This PROTOCOL WILL WORK will make it easy to use a single protocol which can be In figure 6 we have shown a simple network where used universally in the internet system. we have both inter (between R3 and R4) and intra (say between R2 and R3). Suppose we need to transfer data V. ROUTING TABLES OF BIGP between R3 and R4. Router R3 will send its hello As discussed above the router will make entry to packet to all its neighbours and from this it will come routing TABLE A or routing TABLE B depending on to know about the type of network. Since here inter- whether CBB or CBI is in ON state. But what exactly autonomous transfer of data is required R3 will set an these routing tables contain is discussed in this section ASN number in the BIGP header that will be selected [12]. from a larger range of ASN numbers. This ASN number will let the routers receiving the packet from A. Routing Table A R3 know that the network in which data is transferred Whenever a router receives the packet having CBI is large and hence larger scalability is required. This bit ON, router shifts all its CPU processing for filling will prepare other routers in ISP 1 and ISP 2 for inter- this table. The basic aim is to fill entries in such a way autonomous interactions. Also it will send data that it makes the convergence of the network faster, packets to R4 in which BIGP header will have CBB neighbour relationships are made at faster rate and field set to one, so that BGP type of data flow can take timely hello packets are exchanged between the routers place. www.ijorcs.org
  • 4. 16 Isha Gupta Now suppose we want to send data between R2 and this will increase efficiency of BIGP hundred times. So R3. R2 will send hello packets to all its neighbours and in future we can try to make interaction between from this it will come to know about type of network. TABLE A and TABLE B possible. Also there is a Since here intra-autonomous transfer of data is need to find more ways on how to make BIGP more required R2 will set an ASN number that is selected scalable for actual implementation in our present day from smaller range of ASN numbers. This ASN internet. Also our protocol should support both IPV4 number will let the routers receiving packets from R2 and IPV6. know that the network in which data is transferred is small. This will prepare other routers within ISP 2 for VIII. REFRENCES intra-autonomous interactions. Also it will send [1] Border Gateway Protocol, Internetworking technology packets to R3 via R1 having BIGP header in which overview, June 1999. CBI field is set to one, so that IGP type of data flow [2] XU Ke, Wang An-ping, WU Jian ping and can take place. WANG Bin, Research on Routing Policy and Routing Information, Propagation of Boarder Gateway Protocol Version 4 (BGP-4), Proceedings of IEEE TENCON’02. [3] Selin Cerav-Erbas, Olivier Delcourt, Bernard Fortz and Bruno Quoitin , The Interaction of IGP Weight Optimization with BGP, IEEE conference 2007. [4] Martin O. Nicholes and Biswanath Mukherjee, A Survey of Security Techniques for the Border Gateway Protocol (BGP), IEEE communications surveys & tutorials, vol. 11, no. 1, first quarter 2009. [5] Masafumi Watari , Yuichiro Hei, Shigehiro Ano and Figure 6: A Simple Network Katsuyuki Yamazaki, OSPF-based Fast Reroute for BGP Link Failures, IEEE "GLOBECOM" 2009 VII. CONCLUSION AND FUTURE WORK proceedings. [6] Jesús Expósito, Valentina Trujillo, and Eric Gamess, In our present day internet across the globe we use Easy-EIGRP: A Didactic Application for Teaching and different routing protocols for configuring different Learning of the Enhanced Interior Gateway Routing networks; our IBGP protocol can solve this problem. Protocol, 2010 Sixth International Conference on Using it we need to configure just a single routing Networking and Services. protocol. It makes a bridge between IGP and BGP [7] Dahai Xu, Optimal traffic engineering via newton’s routing protocols. This can save our cost of setup and method, 2008 IEEE conference. can increase the efficiency [11, 14]. Time is also saved [8] Conor Creagh and Cormac Sreenan , An Interior Path as we need not re-distribute the packets for making Vector Routing Protocol, 2006 IEEE data flow possible between two different routing [9] Hongjun Wang, Wanping Hao and Xin Zhao, A protocols. Now we don’t have to separately configure Method to Eliminate BGP Divergence Based on AS IGP and BGP. Both can be configured by configuring Relationships, 2010 Second Pacific-Asia Conference a single BIGP protocol. Care of scalability and on Circuits, Communications and System (PACCS). convergence will be automatically done. So we can say [10] Steve Uhlig and Bruno Quoitin, Tweak-it: BGP-based BIGP will lead to faster network setup. Interdomain Traffic Engineering for transit Ass, 2005 IEEE. There are some limitations involved with using this [11] Anja Feldmann, Lixin Gao and Timothy Griffin, Z. kind of a protocol. It will take lots of time and effort to Morley Mao, Inter domain Routing and the Border completely remove the concept of using different Gateway Protocol, IEEE Network routing protocols for different types of network that (November/December 2005). are in use these days and introducing a new concept of [12] Sharad Agarwal, Antonio Nucci and Supratik using a single routing protocol all over the internet. Bhattacharyya, Measuring the Shared Fate of IGP Also for new protocol new specifications will need to Engineering and Interdomain Traffic, Proceedings of be formulated regarding routers, wires etc. New IOS the 13th IEEE International Conference on Network supporting this protocol need to be made and uploaded Protocols (ICNP’05). on routers so that BIGP can work on various networks. [13] Hongwei Zhang, Anish Arora and Zhijun Liu, A Stability-oriented Approach to Improving BGP As we have seen that we have maintained two Convergence, Proceedings of the 23rd IEEE different tables TABLE A and TABLE B. Both these International Symposium on Reliable Distributed tables maintain data for IGP and BGP interactions in Systems (SRDS’04). the network respectively. If we are able to make the data of both these tables interact with each other, then www.ijorcs.org
  • 5. BIGP - A New Single Protocol that can work as an IGP as well as EGP 17 [14] Greg Goth, Fixing BGP Might Be Difficult Or Not So Tough, IEEE internet computing, may - June 2003. [15] Andrew S. Tanenbaum , Computer networks, Prentice Hall PTR, 2003. [16] Douglas Comer, Computer Networks and Internets, Prentice Hall, 2009. [17] Jeanna Matthews, Computer Networking: Internet Protocols In Action, Wiley, 03-Jan-2005. [18] Nurul Sarkar, Tools for Teaching Computer Networking And Hardware Concepts, Idea Group Inc (IGI), 28-Feb-2006. [19] Wendell Odom, Computer Networking First-Step, Cisco Press, 01-Apr-2004. [20] Ed Tittel, Schaum’s Outline of Theory and Problems of Computer Networking, McGraw-Hill Professional, 24-Jun-2002. www.ijorcs.org