Loading learning content...
Consider a remarkable fact: the Internet connects over 5 billion users, hundreds of millions of servers, and billions of IoT devices across every continent—yet no single organization controls it. No master routing table exists that knows every path to every destination. No central authority decides how packets travel from Tokyo to Toronto or from São Paulo to Sydney.
How does this work?
The answer lies in a brilliant organizational principle called the Autonomous System (AS)—the fundamental administrative and routing domain of the Internet. Understanding Autonomous Systems is essential for grasping how the Internet's global routing infrastructure operates, why routing protocols are divided into interior and exterior categories, and how networks of vastly different sizes and purposes coexist harmoniously.
By the end of this page, you will understand what Autonomous Systems are, why they exist, how they are identified globally, the different types of AS architectures, and why this concept is foundational to the Internet's routing hierarchy. This knowledge is essential for network engineers, system administrators, and anyone seeking to understand how the Internet really works.
An Autonomous System (AS) is a collection of IP networks and routers under the control of a single organization or entity that presents a common, clearly defined routing policy to the Internet. More formally, RFC 1930 defines an AS as:
"A connected group of one or more IP prefixes run by one or more network operators which has a SINGLE and CLEARLY DEFINED routing policy."
Let's break this definition into its essential components:
Think of Autonomous Systems like city-states in the ancient world. Each city-state (AS) has its own internal governance, roads, and infrastructure. Citizens within a city-state follow local rules. But when trading or communicating with other city-states, diplomats (exterior routing protocols) handle negotiations, and the internal complexity is hidden behind a unified external policy. Just as ancient trade routes connected city-states into a global economy, BGP connects ASes into the global Internet.
Why Not One Big Network?
You might wonder: why not just have one massive interconnected network? The answer involves multiple dimensions:
Administrative Reality — The Internet grew organically from thousands of independent networks. No single entity owns or can feasibly manage the entire infrastructure.
Scalability — A flat global routing table tracking every individual network would be impossibly large. Grouping networks into ASes enables route aggregation and manageable table sizes.
Policy Independence — Different organizations have different needs. An ISP prioritizes traffic differently than a bank, university, or content provider. AS boundaries enable policy autonomy.
Fault Isolation — Problems within one AS (configuration errors, hardware failures, attacks) are contained and don't cascade globally.
Business Relationships — ASes are often commercial entities. The AS abstraction enables peering agreements, transit relationships, and the economic model of the Internet.
Every Autonomous System that participates in external routing must have a globally unique identifier called an Autonomous System Number (ASN). This number is essential for inter-domain routing protocols (particularly BGP) to identify source, path, and destination networks.
ASN Structure and Allocation:
Originally, ASNs were 16-bit numbers (0–65,535). As the Internet grew and ASNs became scarce, the IETF introduced 32-bit ASNs (RFC 4893, RFC 6793), expanding the space to over 4 billion possible values.
| Range | Type | Description |
|---|---|---|
| 0 | Reserved | Not valid for use in routing |
| 1 – 64,495 | Public 16-bit | Globally unique ASNs assigned by Regional Internet Registries (RIRs) |
| 64,496 – 64,511 | Documentation | Reserved for documentation and examples (RFC 5398) |
| 64,512 – 65,534 | Private 16-bit | For private use within an organization, not routed externally |
| 65,535 | Reserved | Reserved, not valid for use |
| 65,536 – 4,199,999,999 | Public 32-bit | Extended ASN space for global assignment |
| 4,200,000,000 – 4,294,967,294 | Private 32-bit | Extended private ASN range |
| 4,294,967,295 | Reserved | Reserved, not valid for use |
Who Assigns ASNs?
Autonomous System Numbers are allocated hierarchically:
IANA (Internet Assigned Numbers Authority) — Allocates large blocks of ASNs to Regional Internet Registries.
Regional Internet Registries (RIRs) — Five RIRs serve different geographic regions:
Local/National Internet Registries (LIRs/NIRs) — In some regions, national registries handle local allocations.
Organizations requesting an ASN must demonstrate a legitimate need—typically, they need to connect to multiple upstream providers with distinct routing policies, or they need to participate in an Internet Exchange Point (IXP).
Private ASNs (64,512–65,534 for 16-bit, 4,200,000,000–4,294,967,294 for 32-bit) are used when an AS needs to run BGP internally or with a single provider but doesn't need to be globally unique. Enterprise networks often use private ASNs with their ISP, who then strips the private ASN before advertising routes to the Internet. This is similar to how RFC 1918 private IP addresses work.
Notable ASNs:
Some ASNs are well-known in the networking community:
| ASN | Organization | Significance |
|---|---|---|
| AS7922 | Comcast | One of the largest US ISPs |
| AS15169 | Major content provider and cloud services | |
| AS32934 | Facebook/Meta | Social media giant |
| AS16509 | Amazon/AWS | Dominant cloud provider |
| AS8075 | Microsoft | Azure cloud and enterprise services |
| AS13335 | Cloudflare | Major CDN and security provider |
| AS3356 | Lumen/CenturyLink | One of the largest backbone providers |
| AS174 | Cogent | Major Tier 1 backbone provider |
| AS6939 | Hurricane Electric | Large global network with extensive IPv6 |
These ASNs appear frequently in traceroutes, BGP feeds, and network analysis, making them familiar landmarks in the Internet's topology.
Autonomous Systems can be classified by their connectivity patterns and role in the Internet topology. Understanding these types is crucial for network design, troubleshooting, and understanding routing behavior.
The ISP Tier System:
Transit ASes are often categorized into tiers based on their position in the Internet hierarchy:
Tier 1 ISPs:
Tier 2 ISPs:
Tier 3 ISPs:
This hierarchical structure creates a scalable architecture where routing complexity is concentrated at higher tiers, while lower tiers can operate with simpler configurations.
The distinction between transit (paying for access) and peering (typically settlement-free exchange) drives much Internet economics. Large content providers like Google and Netflix peer aggressively to reduce transit costs, while ISPs negotiate peering agreements based on traffic ratios and mutual benefit. Understanding these relationships is essential for network architects making connectivity decisions.
While an AS presents a unified face to the outside world, internally it can be arbitrarily complex. Large ASes may span multiple continents, contain thousands of routers, and carry petabytes of traffic daily. Understanding internal AS architecture is essential for network design and operation.
Interior vs. Exterior Routing within an AS:
Inside an AS, Interior Gateway Protocols (IGPs) like OSPF, IS-IS, or EIGRP determine how traffic moves between internal routers. These protocols optimize for metrics like hop count, bandwidth, or delay.
At AS boundaries, Exterior Gateway Protocols (EGPs)—specifically BGP in the modern Internet—handle inter-domain routing. Border routers run both IGP (to communicate with internal routers) and BGP (to communicate with external ASes).
Internal BGP (iBGP):
Within a single AS, BGP is also used to distribute external routes learned from other ASes. This is called internal BGP (iBGP), and it ensures all border routers have consistent knowledge of external destinations. However, iBGP has special rules:
This separation—IGP for internal reachability, iBGP for external route distribution—is fundamental to scalable AS design.
In large ASes, a full mesh of iBGP sessions becomes impractical. With 100 routers, you'd need 4,950 sessions! Route reflectors solve this by allowing a subset of routers to reflect routes to others, dramatically reducing session count. Alternatively, AS confederation subdivides an AS into internal sub-ASes, each with its own iBGP domain. Both techniques are essential for scaling BGP in major networks.
To ground these concepts, let's examine how Autonomous Systems manifest in real Internet operations and why network engineers care deeply about AS topology.
Looking Up ASN Information:
Several tools and databases provide AS information:
12345678910111213141516171819202122
# Use 'whois' to look up an ASN$ whois -h whois.radb.net AS15169 # Sample output:aut-num: AS15169as-name: GOOGLEorg: ORG-GOOGLEdescr: Google LLCadmin-c: GOGLtech-c: GOGLimport: from AS-ANY accept ANYexport: to AS-ANY announce AS-GOOGLEremarks: Peering information: https://peering.google.com # Traceroute showing AS path$ traceroute -A google.com 1 192.168.1.1 (AS0) 1.2 ms 2 10.0.0.1 [AS7922] 5.3 ms # Comcast 3 68.85.x.x [AS7922] 8.1 ms # Comcast core 4 96.110.x.x [AS7922] 12.4 ms # Comcast edge 5 72.14.x.x [AS15169] 15.2 ms # Enter Google 6 142.251.x.x [AS15169] 16.8 ms # Google destinationBGP AS_PATH Attribute:
When BGP advertises a route, it includes the AS_PATH—a list of all ASes the route has traversed. This serves multiple purposes:
Example AS_PATH: AS174 AS3356 AS15169
| AS Number | Organization | Role in Path |
|---|---|---|
| AS15169 | Origin AS — where the prefix is advertised from | |
| AS3356 | Lumen/CenturyLink | Transit AS — received from Google, passed to Cogent |
| AS174 | Cogent | Transit AS — received from Lumen, passed to our network |
| AS64500 (ours) | Our Organization | Destination AS — where we receive the route |
Organizations like CAIDA (Center for Applied Internet Data Analysis) continuously map AS-level Internet topology using BGP data, traceroutes, and inference techniques. These maps reveal the Internet's structure, identify critical paths and potential single points of failure, and help researchers understand Internet resilience and evolution.
Autonomous Systems are not just organizational units; they're also security boundaries. Understanding AS-level security is increasingly critical as routing attacks become more sophisticated.
Securing the Routing System:
The Internet community has developed several mechanisms to improve routing security:
RPKI (Resource Public Key Infrastructure):
BGPsec:
IRR (Internet Routing Registry):
BGP Community Best Practices:
In April 2018, attackers briefly hijacked Amazon's Route 53 DNS service by announcing its IP prefixes from a different AS, redirecting cryptocurrency users to phishing sites. In 2020, large-scale BGP anomalies attributed to state actors highlighted the ongoing vulnerability of inter-domain routing. As network engineers, understanding AS security isn't optional—it's essential.
Not every organization needs its own ASN. Understanding when an ASN is necessary (vs. when simpler solutions suffice) is an important practical skill for network architects.
The Process of Obtaining an ASN:
Determine eligibility — You generally need to demonstrate that you'll be multihomed and have a legitimate routing policy need
Apply through your RIR — Contact ARIN, RIPE, APNIC, LACNIC, or AFRINIC depending on your location
Provide documentation — Existing network information, justification for the ASN, and technical contacts
Pay applicable fees — RIRs charge annual fees for ASN maintenance (and often for IP allocation)
Configure BGP — Once assigned, configure your routers to use the ASN in BGP sessions
For organizations that need BGP but not a globally unique ASN, private ASNs can be used with upstream providers who strip them before advertising routes to the Internet. This is common in enterprise environments with single or limited provider connectivity.
Obtaining and maintaining an ASN involves both direct costs (RIR fees, typically hundreds to thousands of dollars annually) and operational complexity (BGP expertise, monitoring, security). For many organizations, using provider-managed services or private ASNs with a single provider is more practical. Reserve public ASNs for situations where true multi-homing and routing control are business-critical.
We've explored the foundational concept that makes the Internet's global routing architecture possible. Let's consolidate the key insights:
What's Next:
With a solid understanding of Autonomous Systems, we're now ready to explore IGP protocols—the interior gateway protocols that govern routing within an AS. Understanding how OSPF, IS-IS, and EIGRP work internally prepares us to see why they're fundamentally different from exterior protocols like BGP, and why both categories exist.
You now understand Autonomous Systems—the Internet's fundamental organizational and routing domain. This knowledge is essential for everything that follows: IGP versus EGP distinctions, protocol selection decisions, and understanding how packets traverse the global Internet. Next, we'll delve into IGP protocols that handle routing within an AS.