Introduction
The Internet is a highly unstable and non-reliable network which requires a strong routing protocol. There are about 493870 routes on the Internet and the number is increasing every day (CIDR Report). Border Gateway Protocol (BGP) is the exterior gateway routing protocol used for routing over the Internet worldwide. BGP exchanges routing information between autonomous systems over the Internet. An autonomous system (AS) can be defined as network or group of routers that implement the same routing policy (Halabi, 96). Routes are announced by the AS to its connecting AS and are thus advertised further.
Even though BGP is a stable protocol, various issues such as delayed convergence, instability, inbound and outbound policy changes continuously occur in the Internet (Mahajan, Wetherall, and Anderson 1). The issues can either occur due to misconfigurations, software bugs, and faulty hardware. Misconfiguration errors such as wrong prefix advertisement, wrong attributes, incorrect policy filters occur while advertising routes to the Internet. Such errors can lead to an outage of the Internet scaling from a short time span to even days.
In this paper, the causes of misconfigurations from the origin AS are discussed. The paper further explores the probable effects of such misconfigurations on the Internet routing table and connectivity, followed by a few real life incidents that caused the Internet to shut down. The paper concludes with discussing various methods that have been proposed earlier to prevent or at least localize the effects of such misconfigurations.
Overview of BGP
BGP is a special case of distance vector protocol called the path vector protocol used for routing between autonomous systems (Halabi,...
... middle of paper ...
...res. Indianapolis: Cisco Press, 1997. Print.
Mahajan, Ratul Wetherall, David, and Tom Anderson. Understanding BGP Misconfiguration. PDF File.
Huston, Geoff. “BGP in 2013” NANOG 60, Atlanta, 10th February 2014, Conference Presentation.
Rekhter, Y., et al. "Address Allocation for Private Internets", BCP 5, RFC 1918, February 1996.
Freedman, Avi. “7007: From the Horse’s Mouth” Merit Networks Inc. North American Network Operators Group. 25th April 1997. Web. 19th March 2014.
Wikipedia. “Black Hole (networking)”. 13th January 2014. Web. 19th March 2014.
Gallagher, Sean. “Google DNS briefly hijacked to Venezuela” Ars Technica. 17th March 2014. Web. 19th March 2014.
JNCIA-JUNOS Study Guide—Part 1. Sunnyvale: Juniper Networks. 2012. PDF File.
Doyle, Jeff, and Jennifer Carroll. Routing TCP/IP. 2nd ed. Volume 1. India: Pearson/Dorling Kindersley Pvt. Ltd. 2006. Print.
COMP09022 Network Design BSc COMPUTER NETWORKING COMP09022 ICMPv6 Prepared by B00270675 13-03- 2015 WORD COUNT (0000) TABLE OF CONTENTS TITLE PAGE……………………………………………... 1 TABLE OF CONTENTS………………………………….. 2 INTRODUCTION TO THE REPORT……………………. 3 TABLE OF FEATURES.......................................................4
Blackhole attack is another type of DoS attack that generates and disseminates build routing information. As mentioned in [20], a attacker, exploiting the flooding based routing protocol, advertises itself as having a valid shortest route to the destined node. If the atacker replies to the requesting node before the actual node replies, a bogus route will be created. Hence packets are not forwarded to the certain destination node; instead, the attacker intercepts the packets, drops them and thus, attracts network traffic [21].
The Technology Opportunities Program. (n.d.). National Telecommunications and Information Administration. Retrieved November 28, 2010, from http://www.ntia.doc.gov/otiahome/top/index.html
Carr, Nicholas. "Is Google Making Us Stupid? - Magazine - The Atlantic." The Atlantic — News and Analysis on Politics, Business, Culture, Technology, National, International, and Life – TheAtlantic.com. Atlantic Monthly Group, July-Aug. 2008. Web. 14 Nov. 2011. .
Background One. Tel was launched by Jodee Rich and Brad Keeling in 1995 (Cook, 2001). At first, it looked to get the advantages from deregulation of the telecommunication industry by reselling other network’s capacity and making money through stock market speculation. Rich and Keeling tried to increase the company’s shares rather than profit the company (Cook, 2001). Initially, One.
IPv6-the next version of IP, already implemented in some of the newest Internet ready devices. IPSEC and congestion control (ECN) functionality are already put into service. Increased address space will decrease the effectiveness of attacks scanning for vulnerable machines.
Figure 1: The famous BGP hijacking case of 2008: YouTube announced only the /22; Pakistan Telecom
In using NAT, hosts on the Internet appear to be communicating directly with the NAT device rather than with the actual host inside the private network. Inbound packets are sent to the NAT device's IP address and the device changes the destination packet header from its own Internet address to the private network address of the true destination host. The result is that, in theory, a single globally unique IP address is used for hundreds, thousands, or even millions of privately addressed hosts. In practice, however, there are drawbacks. For one thing, many Internet protocols and applications depend on the network being truly end-to-end, with packets forwarded entirely unmodified from the source to the destination.
Open Shortest Path First (OSPF) is a link-state routing protocol which uses link state routing algorithm for Internet Protocol (IP) networks.Using OSPF, th convergence of a network can be done in very few seconds, loop-free paths can be guaranteed and better load-sharing on external links can be achievd. Every change in the topology of the network is identified within seconds using OSPF and it instantaneously computes the “shortest path tree” for every route using “Dijkstra's algorithm” . For that reason, OSPF requires a router which have a more powerful processor and more memory than any other routing protocols which leads to more elect...
Neville, Anne. "Working to Provide a Better National Broadband Map." NTIA Blog. National Telecommunications and Information Administration, 20 Feb 2014. Web. 25 Feb. 2014. .
Melford, RJ 1993, 'Network security ', The Internal Auditor, vol. 50, no. 1, p. 18.
4. A. Crespo and H. Garcia-Molina. Routing indices for peer-to-peer systems. In Proc. of the 28th International Conference on Distributed Computing Systems, July 2002.
The Internet has revolutionized the computer and communications world like nothing before. The Internet enables communication and transmission of data between computers at different locations. The Internet is a computer application that connects tens of thousands of interconnected computer networks that include 1.7 million host computers around the world. The basis of connecting all these computers together is by the use of ordinary telephone wires. Users are then directly joined to other computer users at there own will for a small connection fee per month. The connection conveniently includes unlimited access to over a million web sites twenty-four hours a day, seven days a week. There are many reasons why the Internet is important these reasons include: The net adapts to damage and error, data travels at 2/3 the speed of light on copper and fiber, the internet provides the same functionality to everyone, the net is the fastest growing technology ever, the net promotes freedom of speech, the net is digital, and can correct errors. Connecting to the Internet cost the taxpayer little or nothing, since each node was independent, and had to handle its own financing and its own technical requirements.
TCP/IP is a network model which enables the communication across the Internet. The most fundamental protocol on which the Internet is built. This is made up of the 2 common networking protocols, TCP, for Transmission Control Protocol, and IP, for Internet Protocol. TCP maintains and handles packet flow linking the systems and IP protocol has the ability to handle the routing of packets. However The TCP/IP stack consists of 5 layers first being application layer, the transport layer, then the network layer, the link layer and finally the physical layer. The assignment focuses on the three middle layers and is divided into five parts. Firstly explaining how the TCP and UDP the most vital protocols needed to deliver and communicate.
Due to the demand for the internet to be fast, networks are designed for maximum speed, rather than to be secure or track users (“Interpol” par. 1). The adage of the adage.... ... middle of paper ... ...