Question

In: Computer Science

What is BGP? Explain how a network administrator of an upper-tier ISP can implement policy when...

What is BGP? Explain how a network administrator of an upper-tier ISP can implement policy when configuring BGP.

Solutions

Expert Solution

First Question:

BGP stands for Border Gateway Protocol. It can be defined as a standardized exterior gateway protocol which is developed to interchange routing information and reachability information between various autonomous systems (AS) on the Internet. It is classified as a path vector protocol as well as a distance-vector routing protocol.

Second Question:

A tier-1 ISP B may not to carry transport traffic in the middle of two other tier-1 ISPs (for example, A and C), with which B has peering agreements. To develop this policy, ISP B would not display to A paths those pass-through C, and would not show to C routes those pass-through A.
Policy Based Routing can be composed by an administrator through route maps on routers for:

(i) Modifying the following hop address.

(ii) Delivering traffic to a nearby router to revolution of the way.

(iii) By source or destination address, the directional flow of the traffic can be managed.

(iv) To modify the way traffic is delivered to a nearby router.

Please comment in case of any doubt.
Please upvote if this helps.


Related Solutions

As the network administrator for a growing ISP, you want to make efficient use of your...
As the network administrator for a growing ISP, you want to make efficient use of your network addresses. One of the networks addresses IANA assigned to you is a Class C network of 192.168.88.0. You have decided to use the addresses in this Class C network to satisfy the IP address requirements of 18 corporate customers who need between 20 and 24 addresses each. calculate a subnet mask that meets their needs. List the subnet mask and the first four...
As the network administrator for a growing ISP, you want to make efficient use of your...
As the network administrator for a growing ISP, you want to make efficient use of your network addresses. One of the networks addresses IANA assigned to you is a Class C network of 192.168.88.0. You have decided to use the addresses in this Class C network to satisfy the IP address requirements of 18 corporate customers who need between 20 and 24 addresses each. calculate a subnet mask that meets their needs. List the subnet mask and the first four...
As the network administrator for a growing ISP, you want to make efficient use of your...
As the network administrator for a growing ISP, you want to make efficient use of your network addresses. One of the networks addresses IANA assigned to you is a Class C network of 192.168.88.0. You have decided to use the addresses in this Class C network to satisfy the IP address requirements of 18 corporate customers who need between 20 and 24 addresses each. calculate a subnet mask that meets their needs. List the subnet mask and the first four...
As the network administrator for a growing ISP, you want to make efficient use of your...
As the network administrator for a growing ISP, you want to make efficient use of your network addresses. One of the networks addresses IANA assigned to you is a Class C network of 192.168.88.0. You have decided to use the addresses in this Class C network to satisfy the IP address requirements of 18 corporate customers who need between 20 and 24 addresses each. calculate a subnet mask that meets their needs. List the subnet mask and the first four...
What are some of the basic precautions a computer owner or network administrator can take to...
What are some of the basic precautions a computer owner or network administrator can take to help make the computing environment secure? What are some of the basic security threats that a user or administrator might have to face?
What is the policy mix? Explain . How can policy makers use their policy instruments to...
What is the policy mix? Explain . How can policy makers use their policy instruments to achieve their domestic policy goals? In your answer explain how macro-policy can be used to combat the problems of recession, overheating, and stagflation.
Explain how the healthcare administrator can ensure that inventory management and the material ma... explain how...
Explain how the healthcare administrator can ensure that inventory management and the material ma... explain how the healthcare administrator can ensure that inventory management and the material management cycle is effective (both for patients welfare and the organizations profit margin). Make sure to include the who, what, when, where and why for maintenance of these cycles (i.e. who is in control of these tasks, what tasks are included in these responsibilities, when will they be monitored, why are these cycles...
(PLEASE EXPLAIN ANSWER AND SHOW STEPS IF POSSIBLE) Q)An administrator is working with the 192.168.4.0 network,...
(PLEASE EXPLAIN ANSWER AND SHOW STEPS IF POSSIBLE) Q)An administrator is working with the 192.168.4.0 network, which has been subnetted with a /27 mask. Which two addresses can be assigned to hosts within the same subnet? (Choose two) 192.168.4.30 192.168.4.31 192.168.4.32 192.168.4.33 192.168.4.36 Q)The network address of 172.16.0.0/20 provides how many subnets and hosts? 7 subnets, 30 hosts each 16 subnets, 8,190 hosts each 16 subnets, 4,094 hosts each 7 subnets, 2,046 hosts each Q)Given the following IP address from...
) What are the four principal tools of monetary policy? Explain how they can be used...
) What are the four principal tools of monetary policy? Explain how they can be used to correct for different phases of the business cycle.
How does the Fed implement monetary policy?
How does the Fed implement monetary policy?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT