Bgp /

Border Gateway Protocol (BGP) is the routing protocol used to exchange routing information across the Internet. It makes it possible for ISPs to connect to each other and for end-users to connect to more than one ISP. BGP is the only protocol that is designed to deal with a network of the Internet&#...

Full description

Bibliographic Details
Main Author: Beijnum, Iljitsch van (autor)
Format: Book
Language:English
Published: Sebastopol: O'Reilly, 2002.
Edition:Primera edición.
Subjects:

MARC

LEADER 00000cam a2200000 i 4500
003 Ucuenca
005 20230308182544.0
006 a||||fr|||| 001 0
007 ta
008 010121t2002 xxuddddfr|||| 001|||eng|a
999 |c 60089  |d 60089 
020 |a 0-596-00254-8 
040 |a UCuenca-cdrjbv  |b spa  |c UCuenca  |e rda 
041 0 |a eng 
082 0 |2 22  |a 004.6  |c 108443 
100 1 |a Beijnum, Iljitsch van.  |e autor  |9 100335 
245 0 |a Bgp /   |c Iljitsch van Beijnum. 
250 |a Primera edición. 
264 1 |a Sebastopol:   |b O'Reilly,   |c 2002. 
264 4 |c ©2002 
300 |a xiv, 272 páginas:   |b dia  |c 23 cm 
336 |2 rdacontent  |a texto  |b txt 
337 |2 rdamedia  |a no mediado  |b n 
338 |2 rdacarrier  |a volumen  |b nc 
504 |a incl. bibind. 
505 1 |a Requesting an AS number and IP addresses -- Route filtering by remote ISPs and how to deal with it -- Configuring the initial BGP setup -- Balancing the available incoming or outgoing traffic over the available connections -- Securing and troubleshooting BGP -- BGP in larger networks: interaction with internal routing protocols, scalability issues -- BGP in Internet Service Provider networks. 
520 3 |a Border Gateway Protocol (BGP) is the routing protocol used to exchange routing information across the Internet. It makes it possible for ISPs to connect to each other and for end-users to connect to more than one ISP. BGP is the only protocol that is designed to deal with a network of the Internet's size, and the only protocol that can deal well with having multiple connections to unrelated routing domains.This book is a guide to all aspects of BGP: the protocol, its configuration and operation in an Internet environment, and how to troubleshooting it. The book also describes how to secure BGP, and how BGP can be used as a tool in combating Distributed Denial of Service (DDoS) attacks. Although the examples throughout this book are for Cisco routers, the techniques discussed can be applied to any BGP-capable router. 
650 1 0 |a Programación informática  |9 7362 
650 1 4 |2 UCuenca-cdrjbv  |9 7361  |a Informática 
852 |a UC-CDJBV  |f Compra  |l 1  |m General  |p 20101213  |q 10,00  |r 2  |t 108443  |y 10404  |b 0  |d CDRC  |e CDRC  |g 004.62 PRIMER PISO  |z 2010-01-21 
942 |c BK  |2 ddc  |z ivan.verdugo@ucuenca.edu.ec