Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

IP Recovery Using Multiple Routing Configurations Requirements: Software Require

ID: 3771307 • Letter: I

Question

IP Recovery Using Multiple Routing Configurations

Requirements:

Software Requirements:

FRONT END                 :    User Based

TOOLS USED               :    User Based

OPERATING SYSTEM:    WINDOWS

Hardware Requirements:

PROCESSOR        :    2.6 GHz

RAM                      :    2 GB

MONITOR            :    13”

HARD DISK           : 20 GB

CDDRIVE             :    52X

KEYBOARD           : STANDARD 102 KEYS

MOUSE                    : 3 BUTTONS

Functional Requirements:

Server

Client

Routers

Server:

It will receive the data send by the client which came from the active router.

It can have any number of clients.

Client:

This module is used to send the data to server through routers

It will provide user friendly interface to send the data to the required destination

Routers:

These are placed in between server and client to transfer the data.

Whenever client send the data to the server it will pass through any one router.

If the router is failed the data will be transferred through another router to reduce the system failure.

Functional Requirements should include:

Descriptions of data to be entered into the system

Descriptions of operations performed by each screen

Descriptions of work-flows performed by the system

Descriptions of system reports or other outputs

Who can enter the data into the system?

How the system meets applicable regulatory requirements

The functional specification is designed to be read by a general audience. Readers should understand the system, but no particular technical knowledge should be required to understand the document.

Introduction to IP Recovery Using Multiple Routing Configurations Networking Project:

With the invention of internet the communication system is being developed to a great extent. Presently slow junction of routing protocols for a network infrastructure is a great problem faced by numerous people, so to recuperate the failures of IP networks the MRC system is being developed.

Multiple routing configurations can be applied with little change. In this article the performance of the MRC system will be measured in terms of few technical prospects after the network failure. While using MRC how the increased traffic is performing the network distribution it also can be exhibited. The aim of this system is to facilitate the functional and non-functional needs.

SYSTEM DESIGN CONCEPTS

Presently internet has become an important part of communication infrastructure and the ease of use and consistency make it really useful. The facility of get back to normal from the failure is the chief objective of network developers. Though IP networks are truly strong with the use of IGP routing protocols and others, these protocols are designed in such a way so that it can be able to inform immediately after failure and the protocols are based on tailored topology. The functionality is evaluated in different parameters like load distribution and backup lengths.

There are some technical requirements that should be included in multiple routing configurations. There should be details of data to be accessed into the system, the functions operated by every screen, the detailed work flow on the system.

There should be system reports and one individual who would enter the details of data into the system and check out how the system matches with the necessary requirements. For ordinary public the technical specifications are being publicized. Those who are interested to know all about MRC but lacking technical knowledge can easily understand the entire system.

Explanation / Answer

Functional Specification of the router in Multiple Routing Configurations:

MRC overview: Multiple Routing Configurations (MRC) is a scheme for handling failures of associate links and nodes in IP networks allowing recovery in the range of milliseconds. It uses the network graph and the associated link weights to define a small set of backup network configurations. In case of a link or node failure, link weights in backup configurations are manipulated so that the node detecting the failure can safely forward the incoming packets towards the destination. It is assumed that the network uses shortest path routing and destination based hop-by-hop forwarding.

1. Descriptions of data to be entered into the system

    In an MRC system, router has associated links and nodes. Hence, following data needs to be accessed in the system:

   a) Adresses of associated links and nodes.

   b) Network graph i.e. details of network topology

   c) Weights assigned to associated links.

2. Descriptions of operations performed by each screen

Details of operations performed are following:   

a) In MRC scheme, first a small set of backup configurations is defined with respect to each network component (link or node). A backup configuration is defined as a set of associated link weights. These configurations are defined in such a way that each network component is isolated in one configuration. A component (link or node) is said to be isolated when no traffic routed according to a given configuration is routed through that component. To make a component isolated, link weights are assigned in such a way that traffic routed as per that configuration is never routed through that component. Due to this arrangement, that configuration becomes resistant to the failure of that component as failure of the component then only affects traffic being sent from or destined to that component.

b) For each configuration, a well-defined algorithm for routing is used to calculate shortest path trees and create forwarding tables based on the configurations. It is to be noted that shortest path trees are configuration specific, while forwaring tables are router specific.

c) In case of a component failure, forwarding process is performed to provide fast recovery. In this process, link weights in backup configurations are manipulated so that the component detecting the failure can safely forward the incoming packets towards the destination.

3. Descriptions of work-flows performed by the system

In MRC, node failures are handled through blocking the affected node from transiting traffic. Node-blocking also protects the attached links. However, a link failure in the last hop of a path under consideration can not be recovered by blocking the concerned node. To handle this, there exists a valid path to the last hop node in one of the backup configurations without using the failed link. To isolate a given link, its weight is set to infinity. Due to this, anyother path is selected before that including the link. In a configuration, all non-isolated nodes are internally connected by a sub-graph contain no isolated or restricted links. This sub-graph is referred to as the backbone of the configuration. It is to be noted that all links attached to an isolated node are either isolated or restricted, but an isolated node is always directly connected to the backbone with at least one restricted link.

Using a standard shortest path calculation, each router creates a set of configuration-specific forwarding tables. A packet in a configuration is forwarded using the forwarding table calculated based on that configuration. If a router detects a neighbour is no longer available through one of its interfaces, it does not immediately inform the rest of the network about the connectivity failure. Instead, It marks the packets destined to a failed interface as belonging to a backup configuration, and forwards them on an alternative interface towards its destination.

4. Descriptions of system reports or other outputs

Perform analysis based on different parameters linke load distribution, backup lengths etc.

5. Who can enter the data into the system?

Network Administrator

6. How the system meets applicable regulatory requirements

a) By using routing algorrithms as per industry standard.

b) By using network protocols as per industry standards

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote