In this blog post we’ll be looking at BGP errors. For that, our first question should be: is there an error, or is everything working? To determine this, we need to be familiar with BGP’s finite-state machine (FSM). An FSM is a way to model the operation of a system....
Like other very successful protocols such as HTTP and DNS, over the years BGP has been given more and more additional jobs to do. In this blog post, we’ll look at the new functionality and new use cases that have been added to BGP over the years. These include various...
The Resource Public Key Infrastructure (RPKI) system is a way to couple an IP address range to an autonomous system number through cryptographic signatures, described in RFC 6480. IP prefixes and AS numbers are the resources; the public key infrastructure is run by...
On August 8th, 2014 some ISPs experienced a phenomenon called the “512k Day”. The global BGP routing table, which consists of the global Internet routes and reflects how ISPs reach destination IPs, stretched to more than 512,000 records. Routers with the high-speed...
This blog post discusses BGP Labeled Unicast (BGP-LU) which is used in multi-regional networks to carry the label information. While the RFC3107 “Carrying Label Information in BGP-4” explains this topic in more details, we’ve tried to summarize it and highlight the...