Multi Router Traffic Monitoring System

Updated : 23-03-2018 Published : by :
Computer Science Engineering Seminars

MRTMS which monitored the vital signs of network infrastructure devices. Network engineers are responsible for maintaining the health of their networks. They ensure that the network’s resources hold the highest levels of Confidentiality

This seminar paper focuses on Multi Router Traffic Monitoring System (MRTMS) which monitored the vital signs of network infrastructure devices. Network engineers are responsible for maintaining the health of their networks. They ensure that the network’s resources hold the highest levels of Confidentiality, Integrity, and Availability (CIA triad). One way to maintain a healthy and secure network is to monitor the network interworking devices, such as the router or switch interface’s throughput. A network infrastructure can be compared to the workings of a human body.


A network infrastructure is like a human body in that it has inputs, outputs, memory, and processing power. Therefore, the network’s interfaces can be compared to an arm that links to other networks to exchange bits of information. The processor is its’heart that controls the flow of information, and the memory is its’brain that records and remembers where everything needs to go. All these vital elements are important and need to be monitored in order to have a healthy functioning network infrastructure, just like the human body needs to be monitored in order to have a healthy and long life.

TYPES OF ROUTERS

Broadband routers: Broadband routers can do different types of things. Broadband routers can be used to connect computers or to connect to the Internet. If you connect to the internet through phone and using Voice over IP technology (VOIP) then you need broadband router. These are often a special type of modem (ADSL) that will have both Ethernet and phone jacks.

Wireless router: Wireless routers create a wireless signal in your home or office. So, any PC within range of Wireless routers can connect it and use your Internet. In order to secure your Wireless routers, you simply need to come secure it with password or get your IP address. Then, you'll log on into your router with the user ID and passwords will that come with your router.

Edge Router : This type of router are placed at the edge of the ISP network, the are normally configured to external protocol like BGP (Border gateway protocol) to another BGP of other ISP or large organization.

Subscriber Edge Router: This type of router belongs to an end user (enterprise) organization. It’s configured to broadcast external BGP to it’s provider’s AS(s)

Inter-provider Border Router: This type of router is for Interconnecting ISPs, this is a BGP speaking router that maintains BGP sessions with other BGP speaking routers in other providers' ASes.

Core Router: A router that resides within the middle or backbone of the LAN network rather than at its periphery. In some instances , a core router provides a stepdown backbone , interconnecting the distribution routers from multiple building of a campus ( LAN), or Large enterprise Location (WAN). They tend to be optimized for a high brand width.

Wired and Wireless Routers: Home and small office networking is becoming popular by day by the use of IP wired and wireless router. Wired and wireless router are able to maintain routing and configuration information in their routing table. They also provide the service of filtering traffic of incoming and outgoing packets based on IP addresses. Some wireless routers combines the functions of router with those of a network switch and that of a firewall in one.

A router has two stages of operation called planes

• Control plane: A router maintains a routing table that lists which route should be used to forward a data packet, and through which physical interface connection. It does this using internal pre-configured directives, called static routes, or by learning routes using a dynamic routing protocol. Static and dynamic routes are stored in the Routing Information Base (RIB). The control-plane logic then strips non-essential directives from the RIB and builds a Forwarding Information Base (FIB) to be used by the forwarding-plane.

• Forwarding plane: The router forwards data packets between incoming and outgoing interface connections. It routes them to the correct network type using information that the packet header contains. It uses data recorded in the routing table control plane.

DOWNLOADS :


6644-cRmchM0.pdf (Size : 213 KB)

    1 reviews