Free

Networking - Essay Example

Comments (0) Cite this document
Summary
This comes into existence as the address provision in the Internet is not in comparison as hierarchical to telephone dialing strategy, a number of the routers contained in the…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER98.9% of users find it useful
Networking
Read TextPreview

Extract of sample "Networking"

Introduction Border Gateway Protocol (BGP) is the routing protocol that necessitates the Internet to operate. This comes into existence as the address provision in the Internet is not in comparison as hierarchical to telephone dialing strategy, a number of the routers contained in the service provider main networks partake in exchanging of information around a number of IP prefixes. BGP is a procedure for exchanging routing information amid gateways hosts (Beijnum, 2002). The hosts should have its peculiar router in a network of automatic functioning systems. BGP is frequently the protocol but into consideration between gateway hosts contained in the Internet. The routing board comprises of a list of known routers with the addresses each router can reach, and a cost metric allied with the path of independent router resulting into the best available route to be selected (Randy, 2003).
Hosts that has BGP link by the use of Transmission Control Protocol (TCP) which sends updated router board information only when one host has spotted a change. Here only the affected part of such a routing board are sent. BGP links to automatic functioning local networks be the use of Internal BGP as it is not compatible with IGP. The routers contained the automatic network thus upholding two routing boards: an interior gateway protocol and an IBGP. This results into easy to use Unrestricted Inter-Domain Routing (UIDR). This is a way to have a more addresses in the network than using current IP address assignment system (Clark, 2003).
Egypt was able to efficiently detach itself from the internet system by pulling its usual visible routes contained in BGP routing board. The IP addresses identifying computers linked to the internet through Egypt’s ISPs were fundamentally detached to the world connection system. This resulted into computers in Egypt to be compared to houses that has no mailboxes not on any map. Hence the other connection to the downstream countries was unaffected (Tim, 1999).
This was facilitated as a BGP ‘advertise’ the native address prefixes to adjoining networks. This made routers to identify where to send packets data with a specified endpoint address. Almost 3,500 Egyptian prefixes at this time were not advertised this made it possible to make them appear missing from the routing board of BGP routers around the global but not necessary affecting the other countries connection. That meant that routers in this case longer knew where to direct packets addressed to IP addresses contained in the detached prefixes—even though all their cables are in a good working condition (Beijnum, 2002).
Conclusion
Since the disconnection of the internet in Egypt involved the removal of more than 3,500 Border Gateway Protocol (BGP) routes, this could not have disconnected the downstream countries as the BGP only cuts the connection between the computer in mention and the connection to the outside world not necessarily cutting the entire connection. This was the reason that made other countries connected this is because the cables connecting the downstream countries and Egypt to the world passed through Egypt with only a diversion to Egypt servers.
This meant that the countries downstream did not have a direct connection with Egypt hence after Egypt shutting down its system there was no effect on them as the BGP only allows the disconnection of the system with the server.
References
Beijnum, I. v. (2002). BGP: Building Reliable Networks with the Border Gateway Protocol. OReilly Media, Inc.
Clark, M. P. (2003). Data Networks, IP and the Internet: Protocols, Design and Operation. New York City: John Wiley & Sons.
Randy Zhang, M. B. (2003). BGP Design and Implementation. Cisco Press.
Tim King, D. N. (1999). Data Network Engineering. Springer Science & Business Media. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Networking Essay Example | Topics and Well Written Essays - 500 words - 2”, n.d.)
Networking Essay Example | Topics and Well Written Essays - 500 words - 2. Retrieved from https://studentshare.org/information-technology/1681378-networking
(Networking Essay Example | Topics and Well Written Essays - 500 Words - 2)
Networking Essay Example | Topics and Well Written Essays - 500 Words - 2. https://studentshare.org/information-technology/1681378-networking.
“Networking Essay Example | Topics and Well Written Essays - 500 Words - 2”, n.d. https://studentshare.org/information-technology/1681378-networking.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Networking

Networking

...? of Institute] of Discipline] ‘Networking’ INTRODUCTION The growing technological advancements have transformed the planet Earth into a fast pace planet I which tasks are getting executed at very rapid rates. The increasing usability of the technologically advanced devices has been the main reason for their popularity and excessive use. Communication was never easier and more timely than today. The current research mentions one of the technologies that have assisted in the ease of communication. The concept is narrated with respect to a specific small scale business environment that would get benefitted by introduction and implementation of the technology. The co-owner of the small scale photography business, Sally, is a...
13 Pages(3250 words)Assignment

Networking

...Network’s Tolerance Fault Introduction In the world of today, networking or linking of different computing devices in order for them to share data has become the convenient way to people who want to share their files or send their e-mails from different parts of the country. Most networks are built hand in hand with both the computer hardware and computer software (Cook, 2003, p103). This paper tries to analyze the network’s fault tolerance, the cabling and how to configure the basic router commands and the basic router configuration in a networking environment. Portfolio 2 Activity 1 - Addressing Scheme (The packet tracer) No Subnet First host Last host...
4 Pages(1000 words)Essay

Networking

...any need to wait for responses. The use of HTTP pipelining allows the reduction of lag time since the client can send multiple requests at the same time and can then wait for their corresponding responses (W3, 2004 b). The use of this technique allows drastic improvements in the internet connection speed since HTML pages and other content tends to load faster. The typical TCP packet is constructed such that it houses multiple HTTP requests due to HTTP pipelining. Consequently, HTTP pipelining aids in sending a lower number of TCP packets on the network to perform the same tasks which allows a reduction in the overall network load and congestion. What is meant by a cache? Web cache? What is the relevance...
4 Pages(1000 words)Assignment

Networking

...? Full Paper Network LAN Topologies Network topologies are essential before implementing a network as per requirements of an organization. Topology is a framework defining the arrangements of every object on the network. This includes workstations, network components, servers, WAN devices and many more. There are total five topologies to design a computer network. However, all of these five topologies share certain factors. Each topology demonstrates disadvantages as well as advantages that will be discussed further. The five different topologies are illustrated below: 1.1 Star Topology Star topology is recommended for the wired local...
11 Pages(2750 words)Statistics Project

Networking

...are presently using DNSSSEC. Despite there being several DNSSEC-related tools for network administration, only a few options are available for regular users on a computer. Opportunities The deployment of the DNSSEC technology offers a great opportunity for those operating their own DNS servers. This is because there are plenty of documentation regarding how configure DNSSEC for any DNS server being used. Additionally, sites like the DNSSEC-Tools project (16) are also in existence that provides tools that help in the process and software like OpenDNSSEC (17) capable of automating a significant portion of the process (Daley, 2011). The other significant opportunity in the deployment of DNSSEC is that the market demand for...
11 Pages(2750 words)Term Paper

Networking

...?NETWORKING Networking Affiliation Describe the features of telecommunications networks, including key networking technologies. Cover the Open Systems Interconnection (OSI) model, including each logical layer. Telecommunication networks provide the mechanism to support the electronic transmission of data over geographically dispersed locations. Additionally, these networks can be used to transfer any kind of data such as voice telephone calls, text, videos or images. A telecommunication network consists of a variety of components and features that collectively work to support this communication process. Some of the major...
3 Pages(750 words)Essay

Networking

...NETW-204 Assignment #3 Week 5 Refering to figure below: You are the network administrator for the network depicted in the diagram. You have beenassigned the address space 10.1.16.0/21 to create the LANs you need, and the 172.16.1.0/28 space for your WAN links. LAN: 10.1.16.0/21 WAN: 172.16.1.0/28 Assign addresses LAN Subnets Begin by creating and assigning the LAN subnets you will use. In order to make the most efficient use of your address space you should start by creating the subnet needed for the LAN with the most hosts and then work you down to the smallest LAN. Using the address space 10.1.16.0/21, create subnets for the LANs shown in the diagram and fill in the table 1 below. Notice that the...
2 Pages(500 words)Assignment

Networking

...Networking To the field of computers, networking refers to the activity of connecting two or several computing devices together with the reason of sharing information. Networks are developed with a combination of computer hardware as well as system software. However, networks may be classified in different ways. One mechanism states the form of network as per the geographic part it spans. Local area networks (LANs), for instance, classically move across a unit home, while wide area networks (WANs), moves through cities, countries, or even worldwide (Wendell, Rus, Denise 69). Items Specifications Reason(s) 1. Serial...
2 Pages(500 words)Assignment

Networking

...The internet connection speed in South Korea is considered as the fastest in the world (Smith According to a recent research, Korea has an intention of connecting every home in the country to an internet speed of one gigabit per second. Some of the other countries that are ranked in the top list in internet speeds include Bulgaria, Latvia, Japan, Romania and Lithuania. In this study, the United States is ranked 26th in the list. This paper will analyze the internet speed between South Korea and the United States. This study was conducted based on 27 million downloads using 20 million in 2011 from January till June. This study also encompassed the fastest net providers in every country. In the United States, Verizon and the FiOS...
1 Pages(250 words)Essay

Networking

...Networking Table of Contents Introduction 3 Discussion 3 In computer networking, there are two important protocols that include Internet Protocol (IP) and Transmission Control Protocol (TCP). Contextually, computer networking is also recognized as TCP/IP. The layered communication protocols of networking are discussed hereunder. 3 Protocol Stack 3 Layers and Related Concepts 4 Application layer 5 Presentation Layer 6 Session Layer 6 Transport Layer 8 Network Layer 8 Data Link Layer 9 Physical Layer 10 Ethernet Concept 10 Domain Naming System (DNS) 11 Address Resolution Protocol (ARP) and Media Access Control (MAC) 12 Conclusion 12 Introduction The concept of networking is a significant achievement in the field of information... and...
9 Pages(2250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Networking for FREE!

Contact Us