The BGP line is more common in the host products of some well -known providers. This line is of great significance to the transfer of data resources of the host, and it is also a major factor for users to measure the quality of host products. Below the US host provider JTTI will introduce the significance, role and advantages of the BGP line or protocol.
BGP definition
BGP is a border gateway protocol and the underlying protocol of the Internet global routing system. It manages how the data packet is managed from one network routing to another through the routing and accessible information exchange between the edge router. The protocol guides the data packet between the autonomous system. The autonomous system is a network managed by a single enterprise or service provider. BGP creates network stability by ensuring that the router can adapt to the routing failure: When a path fails, a new path will soon be found. The protocol makes corresponding routing decisions based on the path, and the path is defined by the rules or network strategies set by the network administrator.
The BGP line generally refers to the three -line server of telecommunications, Unicom, and mobile. A big advantage using the BGP line is that you can access the same IP at the same time. And because the protocol itself has the characteristics of redundant backup and eliminating the ring road, when the service provider has multiple BGP interconnecting lines, it can achieve the mutual backup of the routing. When a line fails, other lines can be connected.
BGP workflow
Each router maintains a routing table to control the directional method of the packet. Route information is generated by the BGP process on the router based on the transmission information from other routers and the information in the BGP routing information library. The information library is a data table on the server stored on the BGP router. Equipment and internal -to -peer information information, and based on what routing should be used and what information it should be published, continuously update the route table when changes.
What is the use of the BGP line
BGP provides network stability to ensure that the router can quickly adapt to sending data packets by reconnecting again when a network path failure. The protocol makes routine decisions based on the path, rules or network strategies configured by the network administrator. Each BGP router maintains a standard routing table to guide the data packet in the transmission. BGP uses client-server topology to pass routing information. The client-server starts BGP session by sending requests to the server.
BGP routing basics
BGP only sends the updated router table information when changes, and only the affected information is sent. It does not automatically discover the mechanism, which means that the connection between the peering body must be manually established and the peer address is programmed at both ends. In addition, it makes the best path decision based on the current path characteristics. In the case of multiple paths available (for example, in the main custody facilities), the BGP strategy conveys the organization's preference for the flow of the entry and exit road. The BGP community label can control the launch of routing between peering. The BGP in the network is based on TCP/IP. It runs on the OSI transmission layer to control the network layer.
Common BGP problems
Common problems with BGP include information exchange failure. Information exchange is not always successful, because the information may be incorrect or containing incorrect data. The router may exhaust memory or storage space, or the response update is too slow. The router sends error code and sub -code to convey the problem, including requests and processing issues that go over time and format errors.
BGP is also susceptible to error -based attacks. For example, malicious actors can use bad packets to submerge the router in the refusal service attack. They can also claim to be the source of routing information of the autonomous system, and (temporarily) control where the flow flow from the system is controlled. This approach is called BGP hijacking.