Statements (51)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:XMPP_Extension_Protocol
|
gptkbp:bfsLayer |
3
|
gptkbp:bfsParent |
gptkb:XMPP_Extension_Protocol
gptkb:CEO |
gptkbp:communication |
Inter-domain routing protocol
|
gptkbp:defines |
gptkb:RFC_4271
|
gptkbp:developed_by |
gptkb:IETF
|
gptkbp:first_released |
gptkb:1994
|
gptkbp:has_feature |
policy-based routing
route aggregation multi-protocol support confederations route reflection |
https://www.w3.org/2000/01/rdf-schema#label |
BGP-4
|
gptkbp:is_characterized_by |
incremental updates
notification messages keepalive messages route selection process open session negotiation policy-based decision making update messages |
gptkbp:is_critical_for |
Internet routing
|
gptkbp:is_documented_in |
networking textbooks
|
gptkbp:is_implemented_in |
network routers
|
gptkbp:is_monitored_by |
network operators
|
gptkbp:is_part_of |
TCP/ IP suite
|
gptkbp:is_related_to |
gptkb:television_channel
network performance network security SDN (Software-Defined Networking) cloud networking traffic engineering routing protocols data center networking service provider networks |
gptkbp:is_supported_by |
BGP speakers
|
gptkbp:is_tested_for |
network engineers
|
gptkbp:is_used_by |
Internet Service Providers
|
gptkbp:is_used_for |
path vector protocol
|
gptkbp:is_vulnerable_to |
route hijacking
D Do S attacks prefix hijacking |
gptkbp:operates |
Layer 4 of the OSI model
|
gptkbp:provides |
loop prevention
|
gptkbp:setting |
network administrators
|
gptkbp:successor |
gptkb:BGP-3
|
gptkbp:supports |
CIDR
I Pv6 I Pv4 |
gptkbp:uses |
gptkb:TCP
AS path |