scholarly journals Intelligent Packet Delivery in Router Using Structure Optimized Neural Network

Author(s):  
R. Deebalakshmi ◽  
V. L. Jyothi

The Internet itself is a worldwide network connecting millions of computers and less significant networks. Computers communicated by routers. Crucial the role of a router is to our technique of communicating and computing. Routers are situated at gateways, the spaces where two or more networks connect, and are the decisive device that keeps data flow between networks and keeps the networks connected to the Internet. When data is sent between places on one network or from one network to a second network the data is always seen and intended for to the proper place by the router. The router carries out this by using headers and routing tables to establish the best path for routing the data packets. This trim down the effectiveness of edge router only when the path engaged, it will enhanced by classification method, predictable classification methods like port based ,deep packet inspection and  statistical classification are give less precision. In this system structured optimized neural network is used for more precise organization. Classification output forwarded to router dynamically for intellectual packet delivery. The method will improve router competence by greater than before throughput and decreased latency.<span style="font-size: 9.0pt; line-height: 115%; font-family: 'Times New Roman','serif'; mso-fareast-font-family: 'Times New Roman'; letter-spacing: .05pt; mso-ansi-language: EN-IN; mso-fareast-language: EN-US; mso-bidi-language: AR-SA; mso-bidi-font-weight: bold; mso-bidi-font-style: italic;" lang="EN-IN">The Internet itself is a worldwide <a href="https://www.webopedia.com/TERM/I/network.htm"><span style="color: windowtext; text-decoration-line: none;">network</span></a> connecting millions of <a href="https://www.webopedia.com/TERM/I/computer.htm"><span style="color: windowtext; text-decoration-line: none;">computers</span></a> and less significant networks. Computers communicated by routers. Crucial the role of a router is to our technique of communicating and computing. Routers are situated at <a href="https://www.webopedia.com/TERM/G/gateway.html"><span style="color: windowtext; text-decoration-line: none;">gateways</span></a>, the spaces where two or more networks connect, and are the decisive device that keeps data flow between networks and keeps the networks connected to the Internet. When data is sent between places on one network or from one network to a second network the data is always seen and intended for to the proper place by the router. The router carries out this by using <a href="https://www.webopedia.com/TERM/R/header.htm"><span style="color: windowtext; text-decoration-line: none;">headers</span></a> and routing tables to establish the best path for routing the data packets. This trim down the effectiveness of edge router only when the path engaged, it will enhanced by classification method, predictable classification methods like port based ,deep packet inspection and  statistical classification are give less precision. In this system structured optimized neural network is used for more precise organization. Classification output forwarded to router dynamically for intellectual packet delivery. The method will improve router competence by greater than before throughput and decreased latency.</span>

2018 ◽  
Vol 1 (2) ◽  
pp. 79-85
Author(s):  
I Putu Agus Eka Pratama ◽  
Putu Adhika Dharmesta

Deep Packet Inspection (DPI) is a technique commonly used by network administrator to be able to monitor in detail the flow of data in the form of data packets that occur at that moment. This data stream will produce an information that can be used for network management purposes. One example of a case study that can be done with this technique is the intranet that is available in Information Technology major Udayana University’s. Deep Packet Inspection Technique is done with purpose to identifying the initial slowing down of network speed on Information Technology major Udayana University’s.


2011 ◽  
Vol 13 (7) ◽  
pp. 1142-1160 ◽  
Author(s):  
Ralf Bendrath ◽  
Milton Mueller

Advances in network equipment now allow internet service providers to monitor the content of data packets in real-time and make decisions about how to handle them. If deployed widely this technology, known as deep packet inspection (DPI), has the potential to alter basic assumptions that have underpinned internet governance to date. The article explores the way internet governance is responding to deep packet inspection and the political struggles around it. Avoiding the extremes of technological determinism and social constructivism, it integrates theoretical approaches from the sociology of technology and actor-centered institutionalism into a new framework for technology-aware policy analysis.


2021 ◽  
Author(s):  
J.V. BibalBenifa ◽  
Saravanan Krishnann ◽  
Hoang Long ◽  
Raghvendra Kumar ◽  
David Taniar

Abstract Malware is essentially one of the major security issues that have the potential to break the computer operations instantly. Majority of the internet attacks are caused by malwares that are being distributed through HTTP over the Internet. A Firewall is essential to prevent such internet attacks for enhancing the security measures. The most efficient method to prevent Intrusion in the network is Deep Packet Inspection (DPI), which is presently implemented in advanced firewalls. This research work intends to detect and prevent the intrusion in the network using a hybrid method with DPI, Pattern Matching (PM), and Machine Learning (ML) techniques. In this present work, a hybrid method which involves the functionalities of both DPI and ML is used for classification and identification of attacks. Here, DPI is done by Boyer-Moore-Horspool (BMHP) pattern matching algorithm and ten ML algorithms such as Support Vector Machines (SVM), Linear-SVM (L-SVM), K-Nearest Neighbors (KNN), Multi-Layer Perceptron (MLP), Decision Tree (DT), Random Forest (RF), AdaBoost (Ada), Gaussian Naive Bayes (GaNB) and Bernouli Naive Bayes (BeNB) are employed for classification. Subsequently, the proposed work is evaluated in a sequential and parallel manner and it is customized for identifying the fuzzy, impersonation and Denial of Service (DoS)-based attacks. The proposed system is analyzed in different dimensions such as performance of ML methods and role of DPI in attack identification including the pattern matching efficiency. From the investigation, it is identified that BMHP algorithm has the least time and memory consumed values about 0.0028 sec and 125.4 Mib respectively. Similarly, SVM has the accuracy of 99.91% with the least time and memory consumed values about 18.185 sec and 303.5 MiB respectively.


2021 ◽  
Vol 51 (3) ◽  
pp. 22-28
Author(s):  
Brian Carpenter ◽  
Jon Crowcroft ◽  
Dirk Trossen

Limited domains were defined conceptually in RFC 8799 to cater to requirements and behaviours that extend the dominant view of IP packet delivery in the Internet. This paper argues not only that limited domains have been with us from the very beginning of the Internet but also that they have been shaping innovation of Internet technologies ever since, and will continue to do so. In order to build limited domains that successfully interoperate with the existing Internet, we propose an architectural framework as a blueprint. We discuss the role of the IETF in ensuring continued innovation in Internet technologies by embracing the wider research community's work on limited domain technology, leading to our key insight that Limited Domains are not only considered useful but a must to sustain innovation.


Author(s):  
Petar Halachev ◽  
Victoria Radeva ◽  
Albena Nikiforova ◽  
Miglena Veneva

This report is dedicated to the role of the web site as an important tool for presenting business on the Internet. Classification of site types has been made in terms of their application in the business and the types of structures in their construction. The Models of the Life Cycle for designing business websites are analyzed and are outlined their strengths and weaknesses. The stages in the design, construction, commissioning, and maintenance of a business website are distinguished and the activities and requirements of each stage are specified.


2019 ◽  
Vol 2 (1) ◽  
Author(s):  
Bambang Widagdo ◽  
Mochamad Rofik

The economic diversification concept gives hope for a country with rich natural resources to strengthen its economic basis. Thus industrial revolution era of 4.0 provides great opportunity to fasten the process. A study by McKensey in 2011 proved that the internet in the developing country contributes around 3.4% towards its GDP which means that the internet has become a new hope for the economy in the future. Indonesia is one of the countries that is attempting to maximize the role of the Internet of Things (IoT) for its economic growth.� The attempt has made the retail and tourism industries as the two main sectors to experience the significant effect of IoT. In the process of optimizing the IoT to support the economic growth, Indonesia faces several issues especially in the term of the internet network quality and its distribution, the inclusive access of financial access and the infrastructure


Sign in / Sign up

Export Citation Format

Share Document