ND_Assignment3_Roshan Kumar Thapa

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

Master of Information Technology (MIT)

September Intake 2023


Second Semester

Assignment 3
Network Design (CSC 5620)

Submitted By: Submitted To:


Roshan Kumar Thapa Dr. Pradip Paudyal

Submitted for the partial fulfillment of the assignment Network Design (MIT)

Date: 20th May 2024


Large-Scale IP Networks with BGP
The Border Gateway Protocol (BGP) is an intracutaneous system routing protocol. The
primary function of a BGP-speaking system is to exchange network reachability
information with other BGP systems. This network reachability information includes
the list of autonomous systems (ASs) that reachability information traverses. BGP4
provides a set of mechanisms for supporting classless interdomain routing. These
mechanisms include support for advertising an IP prefix and eliminate the concept of
network class within BGP. BGP4 also introduces mechanisms that allow aggregation
of routes, including aggregation of AS paths.

Large-scale IP networks with BGP (Border Gateway Protocol) are a fundamental


component of the internet's architecture. These networks are designed to ensure
efficient and reliable routing of data packets across vast and complex interconnected
systems. Here's an overview of the key concepts and components involved in large-
scale IP networks using BGP:

1. IP Networks and BGP Basics

IP Networks:

• IP Addressing: Every device on an IP network is assigned a unique IP address,


which is used for routing data packets to their correct destination.

• Subnetting: Dividing a larger network into smaller sub-networks to improve


performance and security.

• Routing: The process of determining the best path for data packets to travel
across the network.

BGP (Border Gateway Protocol):

• Purpose: BGP is the protocol used to exchange routing information between


different autonomous systems (ASes) on the internet.

• Autonomous Systems (AS): Large networks or group of networks managed by


a single organization or entity, each identified by a unique AS number.
• Path Vector Protocol: BGP uses a path vector mechanism to maintain the path
information that gets updated dynamically as the network topology changes.

2. Key Components of BGP

BGP Peers/Neighbors:

• Internal BGP (iBGP): Peers within the same AS that share routing
information.

• External BGP (eBGP): Peers between different ASes that exchange routing
information across the internet.

BGP Attributes:

• AS Path: A list of ASes that a route has traversed.

• Next Hop: The next immediate router to forward the packet to reach the
destination.

• Local Preference: Used to prefer an exit point from the AS.

• Multi-Exit Discriminator (MED): Suggests a preferred path into an AS for


incoming traffic.

BGP Route Selection Process:

1. Highest Weight (Cisco-specific): Local to the router.

2. Highest Local Preference: Configured within an AS.

3. Shortest AS Path: Fewer ASes to traverse.

4. Lowest Origin Type: IGP < EGP < Incomplete.

5. Lowest MED: Path with the lowest metric.

6. eBGP over iBGP: Prefer routes learned from external peers.

7. Lowest IGP Metric to BGP Next Hop: Shortest path within an AS.

8. Oldest Route: Stability preference.


9. Lowest Router ID: Tiebreaker.

3. Scalability and Redundancy

Scalability Techniques:

• Route Aggregation: Combining multiple routes into a single advertisement to


reduce the number of entries in the routing table.

• Route Reflectors: Help in reducing the number of iBGP connections by


reflecting routes to clients.

• BGP Confederations: Splitting an AS into multiple sub-ASes to manage the


iBGP mesh.

Redundancy and Reliability:

• Multiple BGP Sessions: Establishing multiple BGP connections to different


ISPs or ASes.

• Failover Mechanisms: Automatic rerouting in case of a link or router failure.

• Load Balancing: Distributing traffic evenly across multiple paths.

4. Security Considerations

BGP Security Issues:

• Prefix Hijacking: Incorrect advertisement of IP prefixes.

• Route Leaks: Unintended announcement of routing information.

• DDoS Attacks: Targeting BGP sessions or infrastructure.

Mitigation Techniques:

• Prefix Filtering: Ensuring only valid prefixes are advertised and accepted.

• Route Validation: Using RPKI (Resource Public Key Infrastructure) to verify


route announcements.

• BGP Monitoring Tools: Tools like BGPMon and MRTG to monitor and
analyze BGP activity.
5. Operational Practices

Best Practices for BGP Operations:

• Regular Audits: Frequent checks on routing policies and configurations.

• Monitoring and Alerts: Using network monitoring tools to detect anomalies.

• Coordination with Peers: Collaborating with other ASes for smoother


operation and troubleshooting.

Conclusion

BGP is crucial for the functioning of large-scale IP networks, providing the necessary
infrastructure for routing data across diverse and distributed networks. Effective
management, scalability, redundancy, and security measures are essential for
maintaining robust and efficient BGP operations.

You might also like