什么食物嘌呤高| 什么人容易得胆结石| 梦见蛇被别人打死是什么兆头| 友友是什么意思| ldh是什么| 大学毕业是什么学历| 什么还珠| 十指不沾阳春水是什么意思| 牙痛吃什么药效果最好| 什么是三伏贴| 过敏什么东西不能吃| 青蟹什么季节吃最好| 凝血功能障碍是什么病| 什么是真爱| ad是什么| 什么的梨花| 中国最大的湖泊是什么湖| 微量泵是干什么用的| ck属于什么档次| 香菇配什么菜炒着好吃| 天时地利人和是什么意思| 宫腔占位什么意思| 肾结石是什么症状| hcv是什么病| 梦到猪肉是什么预兆| 百合什么时候收获| 疖肿吃什么药| 打呼噜是什么病| 喝水多尿多是什么原因男性| 5月3日是什么星座| 煞星是什么意思| 没有高中毕业证有什么影响| 血虚风燥是什么意思| tj是什么意思| 羊水破了有什么感觉| 菊花脑是什么菜| 翡翠跟玉有什么区别| 拜阿司匹林和阿司匹林有什么区别| 1963属什么| 利福喷丁和利福平有什么区别| 救人一命胜造七级浮屠是什么意思| 肺ca是什么病| 节点是什么| 左边偏头痛什么原因| 月经期吃什么水果好| 孕早期是什么时候| 行李是什么意思| 办健康证需要检查什么| 大肠湿热吃什么中成药| 甲鱼和什么一起炖最好| 头自动摇摆是什么原因| pu是什么元素| 多吃洋葱有什么好处| 为什么手指会脱皮| 夏天空调开什么模式| 米醋和陈醋有什么区别| 一毛三是什么军衔| 南瓜是什么形状| 五月十六日是什么星座| 槲皮素是什么东西| 粉玫瑰花语是什么意思| 雯字五行属什么| 春天是什么颜色的| 为什么水不能燃烧| 什么的果实| 耳刀旁加步念什么| 12月15是什么星座| mz是什么意思| 白细胞偏低是什么原因| 脚后跟疼吃什么药| 脑梗输什么液效果最好| 路痴是什么原因造成的| 621什么星座| 离宅是什么意思| 什么是三宝| 妗子是什么意思| 上坟用什么水果| 自己是什么意思| 红点是什么原因引起的| 什么的笑着| 软蛋是什么意思| 什么叫辟谷减肥法| 小鸟站在高压线上为什么不会触电| 下眼皮肿是什么原因| 庄周梦蝶什么意思| 怀孕有什么现象| 孕妇钙片什么时间段吃最好| 什么的旋律| 对别人竖中指是什么意思| 胸部什么时候停止发育| 中暑什么症状表现| 中央委员什么级别| 苹果充电口叫什么| 阳萎是什么意思| 狗狗湿疹用什么药膏最有效| 金刚是什么树的种子| 11月7日是什么星座| 湘潭市花是什么| 望而生畏什么意思| 三七粉主要治疗什么病| 老汉推车是什么姿势| 什么叫室性早搏| 眼睛有血丝是什么原因| 蝙蝠侠叫什么| 前列腺钙化灶什么意思| 牛仔裤搭配什么衣服好看| 肾积液是什么原因造成的| 簋是什么意思| 哪吒为什么叫哪吒| gap什么意思| 1969年属什么| 什么情况下需要打破伤风| 鼻头发红是什么原因| 12月18是什么星座| 灌肠为什么能通输卵管| 霸王别姬是什么生肖| 地中海贫血是什么病| 日落西山是什么生肖| 前列腺炎吃什么食物好| usc是什么意思| 劲酒加什么好喝| 什么是牙冠| 炸酥肉用什么粉| 79年出生属什么生肖| 985211是什么意思| 确幸是什么意思| 惊悉是什么意思| 女人总犯困是什么原因| 什么是腹式呼吸| 一字之师是什么意思| 近视散光是什么意思| a1什么意思| 网织红细胞高说明什么| 肾不好有什么表现| 戒指戴无名指是什么意思| 内痔用什么药治最好效果最快| 甲鱼跟什么炖最补| 汀是什么意思| 回归热是什么病| 一片冰心在玉壶是什么意思| icd医学上是什么意思| 薏米是什么米| 口腔溃疡为什么那么痛| 恋恋不舍的意思是什么| 瘦肚子吃什么水果| 75岁属什么| 资金流入股价下跌为什么| 水乳是什么| 五十知天命是什么意思| 生孩子前做什么检查| 尿性什么意思| 终亡其酒的亡是什么意思| 为什么小脑会萎缩| 小限是什么意思| 子宫肌瘤吃什么中药可以消除掉| 陈皮泡水喝有什么功效和作用| 打嗝不停是什么病前兆| 不晨勃是什么原因| 智商高的人有什么特征| 心里空落落的是什么意思| PA医学上是什么意思| 乙肝e抗原阳性是什么意思| 图什么| 血癌是什么原因造成的| 今年22岁属什么生肖| 榴莲是什么季节的| 宝宝风寒感冒吃什么药最好| 脂肪分解成什么| 梦见已故朋友什么预兆| plv是什么意思| 做脑ct对人体有什么危害| 梦见老虎是什么意思| 导师是什么意思| 感冒了吃什么药| 做梦吃肉是什么征兆| sharon是什么意思| 东方蝾螈吃什么| 严什么什么重| 日本人为什么喜欢喝冰水| cm是什么意思| 七十岁老人装什么牙合适| amazon是什么意思| 小孩黄疸高有什么危害| 哗众取宠是什么意思| 90年什么命| 黄豆炒什么好吃| 脾胃气滞吃什么中成药| 2009年属什么生肖| 2月15日是什么星座| 争先恐后是什么生肖| 手为什么会发麻| 什么是肠易激综合征| 居心叵测是什么意思| 直肠指检能检查出什么| 便秘吃什么药见效快| 葡萄像什么| 玉势是什么| 脚背疼是什么原因| 疮疖是什么意思| 荨麻疹要注意什么| 什么是辛辣刺激性食物| 长脸男生适合什么发型| 为什么拉绿色的屎| 紫菜吃多了有什么坏处| ami是什么牌子| 秋葵不能和什么一起吃| 轻度三尖瓣反流是什么| 什么水果| 乳房变大是什么原因| 鬼针草有什么功效| 2024年是属什么生肖| 脚背麻木是什么原因| 蛀虫指什么生肖| 田螺吃什么| 咨询是什么意思| 左肺上叶钙化灶什么意思| 蟑螂中药名称叫什么| 痛风都有什么症状| 眼屎多用什么眼药水好| 高压是什么意思| 囊中之物是什么意思| 囊性灶什么意思| 4月20号是什么星座| 熠熠生辉什么意思| 睡醒后口苦是什么原因| 黄体酮吃多了有什么副作用| 小清新是什么意思啊| 男人断眉有什么说法| 眼睛睁不开是什么原因| 丝瓜不能和什么食物一起吃| 舌头上长泡是什么原因| 蟑螂对人体有什么危害| 抗核抗体是检查什么的| 肝炎吃什么药| 黄褐斑是什么样的图片| 月经安全期是什么时候| 面部填充用什么填充效果好| 动脉血是什么颜色| 1964年出生属什么| 百草枯是什么| 左手抖动是什么原因| 植物园里有什么| 梦到蛇是什么征兆| 肌酐测定是查什么| 美国为什么那么强大| 红线女是什么意思| 铁树开花是什么意思| 格列本脲和格列美脲有什么区别| 啤酒对身体有什么好处| cob是什么意思| 眼底照相是检查什么| 流莺是什么意思| hm平方是什么单位| 哀嚎是什么意思| 舌根发麻是什么原因| 尿蛋白是什么症状| 杯弓蛇影的寓意是什么| 职称是什么| 头痛挂什么科| 雷尼替丁主要治什么胃病| 大头菜是什么菜| 婴儿坐高铁需要什么证件| 巧克力有什么功效与作用| 谷丙转氨酶什么意思| 百度

低压低是什么原因

百度 这两位已故老人,一位叫做刘辉山,另一位叫古远兴,二人自20世纪30年代就参加中国工农红军,担任警卫员,直到新中国成立后,始终担任警卫工作。

Border Gateway Protocol (BGP) is the routing protocol for the Internet. Much like the post office processing mail, BGP picks the most efficient routes for delivering Internet traffic.

Learning Objectives

After reading this article you will be able to:

  • Define BGP routing
  • Explore the relationship between autonomous systems
  • Explain how BGP can impact the functionality of the Internet

Related Content


Want to keep learning?

Subscribe to theNET, Cloudflare's monthly recap of the Internet's most popular insights!

Refer to Cloudflare's Privacy Policy to learn how we collect and process your personal data.

Copy article link

What is BGP?

Border Gateway Protocol (BGP) is the postal service of the Internet. When someone drops a letter into a mailbox, the Postal Service processes that piece of mail and chooses a fast, efficient route to deliver that letter to its recipient. Similarly, when someone submits data via the Internet, BGP is responsible for looking at all of the available paths that data could travel and picking the best route, which usually means hopping between autonomous systems.

BGP is the protocol that makes the Internet work by enabling data routing. When a user in Singapore loads a website with origin servers in Argentina, BGP is the protocol that enables that communication to happen quickly and efficiently.

Resource
Regain control with the Connectivity Cloud

What is an autonomous system?

The Internet is a network of networks. It is broken up into hundreds of thousands of smaller networks known as autonomous systems (ASes). Each of these networks is essentially a large pool of routers run by a single organization.

Internet topography

If we continue to think of BGP as the Postal Service of the Internet, ASes are like individual post office branches. A town may have hundreds of mailboxes, but the mail in those boxes must go through the local postal branch before being routed to another destination. The internal routers within an AS are like mailboxes. They forward their outbound transmissions to the AS, which then uses BGP routing to get these transmissions to their destinations.

BGP Simplified

The diagram above illustrates a simplified version of BGP. In this version there are only six ASes on the Internet. If AS1 needs to route a packet to AS3, it has two different options:

Hopping to AS2 and then to AS3:

AS2 → AS3

Or hopping to AS6, then to AS5, AS4, and finally to AS3:

AS6 → AS5 → AS4 → AS3

In this simplified model, the decision seems straightforward. The AS2 route requires fewer hops than the AS6 route, and therefore it is the quickest, most efficient route. Now imagine that there are hundreds of thousands of ASes and that hop count is only one part of a complex route selection algorithm. That is the reality of BGP routing on the Internet.

The structure of the Internet is constantly changing, with new systems popping up and existing systems becoming unavailable. Because of this, every AS must be kept up to date with information regarding new routes as well as obsolete routes. This is done through peering sessions where each AS connects to neighboring ASes with a TCP/IP connection for the purpose of sharing routing information. Using this information, each AS is equipped to properly route outbound data transmissions coming from within.

Here is where part of our analogy falls apart. Unlike post office branches, autonomous systems are not all part of the same organization. In fact, they often belong to competing businesses. For this reason, BGP routes sometimes take business considerations into account. ASes often charge each other to carry traffic across their networks, and the price of access can be factored into which route is ultimately selected.

Sign Up
Globally accelerate your traffic with a single click

Who operates BGP autonomous systems?

ASes typically belong to Internet service providers (ISPs) or other large organizations, such as tech companies, universities, government agencies, and scientific institutions. Each AS wishing to exchange routing information must have a registered autonomous system number (ASN). Internet Assigned Numbers Authority (IANA) assigns ASNs to Regional Internet Registries (RIRs), which then assigns them to ISPs and networks. ASNs are 16 bit numbers between one and 65534 and 32 bit numbers between 131072 and 4294967294. As of 2018, there are approximately 64,000 ASNs in use worldwide. These ASNs are only required for external BGP.

What is the difference between external BGP and internal BGP?

Routes are exchanged and traffic is transmitted over the Internet using external BGP (eBGP). Autonomous systems can also use an internal version of BGP to route through their internal networks, which is known as internal BGP (iBGP). It should be noted that using internal BGP is NOT a requirement for using external BGP. Autonomous systems can choose from a number of internal protocols to connect the routers on their internal network.

External BGP is like international shipping. There are certain standards and guidelines that need to be followed when shipping a piece of mail internationally. Once that piece of mail reaches its destination country, it has to go through the destination country’s local mail service to reach its final destination. Each country has its own internal mail service that does not necessarily follow the same guidelines as those of other countries. Similarly, each autonomous system can have its own internal routing protocol for routing data within its own network.

What are BGP attributes?

Overall, BGP tries to find the most efficient path for network traffic. But as noted above, hop count is not the only factor BGP routers use for finding those paths. BGP assigns attributes to each path, and these attributes help routers select a path when there are multiple options. Many routers allow administrators to customize attributes for more granular control over how traffic flows on their networks. Some examples of BGP attributes are:

  • Weight: A Cisco-proprietary attribute, this tells a router which local paths are preferred.
  • Local preference: This tells a router which outbound path to select.
  • Originate: This tells a router to choose routes it added to BGP itself.
  • AS path length: Similar to the example diagram above, this attribute tells a router to prefer shorter paths.

There are several other BGP attributes as well. All these attributes are ordered by priority for BGP routers — so that, for example, a BGP router first checks to see which route has the highest weight, then checks local preference, then checks to see if the router originated the route, and so on. (So, if all routes received have an equal weight, the router selects a path based on local preference instead.)

BGP flaws and how to address them

In 2004, a Turkish ISP called TTNet accidentally advertised incorrect BGP routes to its neighbors. These routes claimed that TTNet itself was the best destination for all traffic on the Internet. As these routes spread further and further to more autonomous systems, a massive disruption occurred, creating a one-day crisis where many people across the world were not able to access some or all of the Internet.

Similarly, in 2008, a Pakistani ISP attempted to use a BGP route to block Pakistani users from visiting YouTube. The ISP then accidentally advertised these routes with its neighboring ASes and the route quickly spread across the Internet’s BGP network. This route sent users trying to access YouTube to a dead end, which resulted in YouTube’s being inaccessible for several hours.

Another incident along these lines occurred in June 2019, when a small company in Pennsylvania became the preferred path for routes through Verizon's network, causing much of the Internet to become unavailable to users for several hours.

These are examples of a practice called BGP hijacking, which does not always happen accidentally. In April 2018, attackers deliberately created bad BGP routes to redirect traffic that was meant for Amazon’s DNS service. The attackers were able to steal over $100,000 worth of cryptocurrency by redirecting the traffic to themselves.

BGP hijacking can be used for several kinds of attacks:

  • Phishing and social engineering through re-routing users to fake websites
  • Denial-of-service (DoS) through traffic blackholing or redirection
  • On-path attacks to modify exchanged data, and subvert reputation-based filtering systems
  • Impersonation attacks to eavesdrop on communications

Incidents like these can happen because the route-sharing function of BGP relies on trust, and autonomous systems implicitly trust the routes that are shared with them. When peers announce incorrect route information (intentionally or not), traffic goes where it is not supposed to, potentially with malicious results.

How to secure BGP

Fortunately, some progress has been made in securing BGP. Most notably, a security framework for routing called Resource Public Key Infrastructure (RPKI) was introduced in 2008. RPKI uses cryptographically signed records called Route Origin Authorization (ROAs) to validate which network operator is allowed to announce an organization’s IP addresses using BGP. This ensures that only authorized parties are announcing an organization’s prefixes.

But RPKI’s existence alone is not enough. If large networks do not follow BGP security best practices, they can spread large-scale hijacking attacks. Currently, over 50% of the top Internet providers support RPKI to some extent, but a larger majority is needed to fully secure BGP. Network operators can protect their networks by implementing RPKI and using network alerting technology like Cloudflare Route Leak Detection. This feature helps prevent BGP hijacking attacks by letting customers know when unauthorized parties are advertising their prefixes.

命格是什么意思 梦见菜刀是什么意思 苹果吃了有什么好处 巴卡是什么意思 rbc是什么意思
吃榴莲不能和什么一起吃 钢琴八级是什么水平 先天性是什么意思 什么平稳 字字珠玑是什么意思
肉蔻炖肉起什么作用 长痘痘去医院挂什么科 指甲小月牙代表什么 片反过来念什么 春季感冒吃什么药
抠鼻表情是什么意思 紫笋茶属于什么茶 什么水果含维生素b 男人阳气不足有什么症状 正月二十一是什么星座
市政协秘书长是什么级别hcv9jop3ns1r.cn 粉瘤是什么东西hcv8jop2ns5r.cn 血脂稠喝什么茶效果好hcv8jop7ns3r.cn 胃酸有什么办法缓解hcv7jop6ns7r.cn 西西里的美丽传说讲的什么96micro.com
什么菜好消化又养胃hcv8jop7ns0r.cn 朝三暮四是什么生肖hcv8jop5ns8r.cn 婴儿42天检查什么项目hcv9jop0ns6r.cn 辅警和协警有什么区别hcv9jop2ns1r.cn 丸吞是什么意思luyiluode.com
刺梨有什么功效hcv9jop3ns3r.cn 头皮发紧是什么病的前兆hebeidezhi.com m标志是什么牌子衣服hcv8jop4ns8r.cn ws什么意思dajiketang.com 性质是什么luyiluode.com
内蒙古简称什么hcv9jop8ns2r.cn 蛋蛋冰凉潮湿什么原因hcv9jop1ns1r.cn 广西有什么水果hcv7jop9ns6r.cn 你好后面加什么符号jinxinzhichuang.com 世界上最大的东西是什么hlguo.com
百度