Performance Evaluation of Border Gateway Protocol Using GNS3

Amarvir Singh, Sahilpreet Singh

Abstract


Border Gateway Protocol (BGP) is the protocol of the internet. All the internet service providers in the world use BGP to connect with other ISPs. As the internet traffic is growing with the time, BGP routing table is also growing. This article explains the BGP and its performance analysis. It also describes the various faster-convergence methods for BGP like Fall over and external Fail over. Both IPv4 and IPv6 based BGP is analyzed in the article. Apart from this, security analysis is done in this article on how IPSec secures the WAN traffic or BGP based traffic. Neighbour authentication methods and TTL security mechanism has been described in the article. This article provides best practices that can be used while implementing BGP.


Keywords


BGP, TTL, WAN

Full Text:

PDF

References


Lougheed K, Rekhter Y. A Border Gateway Protocol. Request for Comments: 1105, Internet Engineering Task Force, 1989.

Lougheed K, Rekhter Y. BGP Version 2. Request for Comments: 1163, Internet Engineering Task Force, 1990.

Honig J, Katz D, Mathis M, et al. Application of the border gateway protocol in the internet. Request for Comments: 1164, Internet Engineering Task Force, 1995.

Rekhter Y, Lougheed K. A Border Gateway Protocol 3 (BGP-3). Request for Comments: 1267, Internet Engineering Task Force, 1991.

Rekhter Y, Li T. A Border Gateway Protocol 4 (BGP-4). Request for Comments: 1771, Internet Engineering Task Force, 1995.

Rekhter Y, Li T. A Border Gateway Protocol 4 (BGP-4). Request for Comments: 4271, Internet Engineering Task Force, 2006.

Meyer D, Patel K. BGP protocol analysis. Request for Comments: 4274, Internet Engineering Task Force, 2006.

Yin H, Sheng B, Wang H, et al. Securing BGP with keychain based signatures. International Workshop on Quality of Service, 2007. pp. 154-163.

Kuhn R, Sriram K, Montgomery D. Border Gateway Protocol Security. National Institute of Standards and Technology, U.S. Department of Commerce, 2007.

Gill V, Heasley J, Meyer D, et al. The Generalized TTL Security Mechanism (GTSM). Request for Comments: 5582, Internet Engineering Task Force, 2007.

Heffernan A. Protection of BGP Sessions via the TCP MD5 Signature Option. Request for Comments: 2385, Internet Engineering Task Force, 1998.

Yin H, Sheng B, Wang B, et al. Keychain-based signatures for securing BGP. Journal on Selected Areas in Communications 2010; 28(8).


Refbacks

  • There are currently no refbacks.