BGP room origin BGP (Border Gateway Protocol) is a routing protocol used to connect to independent systems on the Internet. It is an enhanced, sophisticated, and scalable protocol developed by the Internet Engineering Task Force. BGP4 supports the CIDR addressing scheme, which increases the number of available IP addresses on the Internet. BGP was designed to replace the original external gateway protocol EGP. It is also considered a path vector protocol.
BGP is mainly used for interconnection between Internet ASs (autonomous systems). The main function of BGP is to control the propagation of routes and select the best route. China Netcom, China Telecom, China Railcom and some large private IDC operators all have AS numbers. Most of the major network operators in the country use the BGP protocol to achieve multi-line interconnection with their own AS number. To use this solution to achieve multi-line interconnection, IDC needs to be in CNNIC (China Internet Information Center) or APNIC (Asia-Pacific Network Information Center) and AS number (currently Runxun, Century Internet, NetScience), and then use BGP to The segment IP address is broadcast to the network of other network operators. After the BGP protocol is interconnected, all the backbone routers of the network operator will determine the optimal route of the IP segment of the IDC room to ensure high-speed access for users of different network operators.
The BGP solution is used to implement dual-line interconnection or multi-line interconnection. We call it the BGP room. Advantages of BGP room
1. The server only needs to set an IP address. The best access route is determined by the backbone router on the network and the BGP server room. According to the route hop count and other technical indicators, Does not consume any system resources of the server. Both the upstream route and the downstream route of the server can select the optimal path, so that high-speed single-IP high-speed access can be realized.
2, because the BGP protocol itself has the characteristics of redundant backup and elimination of loops, when the IDC service provider has multiple BGP interconnection lines, it can realize mutual backup of routes. When a line fails, the route will be routed. Automatically switch to other lines.
3, using BGP protocol can also make the network have strong scalability. It can interconnect the IDC network with other operators, and easily realize single-IP multi-line, so that all users of the interconnection operators can access quickly. . This is unmatched by the dual IP dual line.
BGP Room Line Technology
BGP is a routing protocol between autonomous systems. Its main function is to exchange network reachability information with other BGP speakers. A BGP speaker is any device configured for BGP. BGP uses TCP as its transport protocol (port 179), which provides reliable data transfer.
Two BGP routers form a connection to a transport protocol. These two routers are called neighbors or peers. Once the transport connection is formed, the two pairs of routers exchange messages to open and confirm the connection parameters. In this step, the router exchanges information such as the BGP version number, AS number, duration, BGP ID, and other optional parameters. If any of the parameters between the peers are inconsistent, an error notification will be sent and the peer connection will not be established.
If the peer router agrees to these parameters, the entire BGP routing table is exchanged through UPDATE messages. The UPDATE message contains a list of reachable destinations through each system (ie, network layer reachability information NLRI) and the path attributes of each route. The path attribute contains information such as the routing source (ORIGIN) and the priority of the priority.
The BGP table is valid for each peer during the BGP connection. If there is a change in the routing message, the neighbor router uses an incremental update (message) to pass this information. BGP does not require refresh routing information. If no route change occurs, the BGP peer exchanges only keepalive messages, and keepalive messages are sent periodically to ensure that the connection remains valid.
Since our defense is from the perspective of intruders, we first need to know the way intruders inva
With the built-in Hyper-V of Windows Server 2008, IT staff can start building virtual machines on th
Solution: Generally this situation is related to directory permissions, user passwords, after setti
In the work, we often encounter a server in order to meet the needs of business access, there are tw
Linux remote login tool: Putty simple tutorial
Let your website be opened for IIS to enable "content expiration"
Just choose the right ones and don't buy expensive ones: how to choose servers according to demand
IIS logging time is not correct
Interpretation of NEC's X86 fault-tolerant server technology
Your browser sent a request that this server could not understand
Nginx rewrite pseudo-static configuration parameters detailed description
Cloud host chooses 32-bit or 64-bit
Centos system installation and configuration FastDFS steps to share
25 optimization tips that make Apache performance significantly better
How to hide icons in Win7 system?
How to apply for win10 installation key from Microsoft official website
Windows 8 system cloud connection
Win2003 can not connect ftp after opening the firewall
Let your Win8 speed boot method summary
Win7 system can not be used after installing the IDE interface CD-ROM. How to do
What can I do if I can't open a webpage after installing Windows 10?
How to recover the computer after the failure of Win10 preview
Microsoft Threshold plans or bring back the start menu for Win8.1