A Literature Review: Extensible Network Model Architecture

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 13

Volume 8, Issue 7, July – 2023 International Journal of Innovative Science and Research Technology

ISSN No:-2456-2165

A Literature Review: Extensible Network


Model Architecture
1 2
Anil H. Makwana Dr. Kishor H. Atkotiya
Research Scholar Professor
Lt. M. J. Kundaliya Arts and Commerce Mahila College Department of Statistics Saurashtra University
[Computer Science Department] Rajkot, Gujarat, India
Rajkot, Gujarat, India

Abstract:- In today’s modern educational institutions the requirement of educational network model, to design and
continuous aiming to enhance scalability and develop this type of model must go throughout the following
adaptability to meet the growing demands of digital study and research of current availability in market and what
education. In this research paper reviewed the I can give them new.
literatures which is for extensible network model
development, in this literature review paper focused on  What is Network? How to design and utilize?
network architecture into educational institutions. In  Understandability of IP address and packets (Hardware
research I required to learn and generate the based and Software based)
architecture or a model for the network which helps me  Security and firewall utilization
to extend the research which is required for the  Network Services and Network Monitoring and
development of network model. Here research paper Management Tools
learned for the network architecture, IP addressing, IP  Computer System Configuration and Monitoring itself
addressing lookup, IPv4 and IPv6 implementations,  Understandability of Computer Operating Systems
packet sending and receiving and packet generations  Accessibility of Operating System files and directories
which gives the idea to get or pass the information or a
signal to get accessibility of the system informations from In some of the educational institutions there is the
the centralized systems or from the particular system. large infrastructure and a wide area and they are utilizing the
computer system into currently growing Information &
Keywords:- IP Addressing, Network Model, Networking Technology, to manage and maintain all this they must
Architecture, IP Lookup, Packet, Protocols, Packet establish the powerful extensible network model for the
Switching, Security, Firewall. controlling and monitoring from the centralized or from the
particular system. To study all this must learn some basic
I. INTRODUCTION topics which I have been listed above.

In modern education system good networking For the full research I must go through the all point to
infrastructure is play major role to grow up educational create model right now here I am discussing about the
institution and to facilitate the continuous communication, network, network architecture and the IP address [1] and
collaboration, and an accessibility of resources from the packets accessibility how they are working in a network and
anywhere any department can maintain their resources and how all those things are helped me to create efficient and
get the informations. effective network architecture.
And also must understand the IP addressing and its
When the technologies are continuously growing utilization how to assign into extensible network
updatable, educational institutes must update themselves, architecture model, and also must understand the packet
there is a need for extensible network model that can adapt utilization and classification [2] how they are passing
to evolving demands and provide a robust foundation for throughout the network architecture using certain devices
various activities are held throughout the computer network over network.
system.
 What is Network? How to design and develop network
To make extensible network model for educational Architecture?
institution must learn and study some basic things which are This section provides an overview of the fundamental
helpful to make extensible network model powerful and network and network infrastructure components typically
provide the better security, utilization of proper resources found in educational institutions. It explores concepts such
and also they must build strong network management for the as local area networks (LANs), wide area networks
computer system from the specific authorization. (WANs), wireless networks, wired networks and their
respective architectures.
To study this type of research I must go through the
different division of the study which are not fixed it may
take changes during the research when it requires and as per

IJISRT23JUL985 www.ijisrt.com 636


Volume 8, Issue 7, July – 2023 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
Designing and developing network architecture implementation of the packets. Also I can use the software
involves the following key steps: to for the data packets how much data packets are available
and how to generate new packets [3] into current network
 Requirements Gathering: Understand the needs of the architecture if required otherwise which type of packets I
network, including the number of devices, expected must generate for the fast data transmission to get the system
traffic and the number of systems, types of applications information into the client systems.
to be supported, security requirements, and any specific
constraints or limitations. IP addresses, whether in IPv4 or IPv6 format, are
 Network Topology: Determine the network's physically essentially numerical identifiers assigned to devices on a
and logically layout. This will define the type of network. The understandability of an IP address [4] depends
topology, such as a star, bus, ring, or mesh, and on the following factors:
planning the placement of devices like routers,
switches, and access points. Format: IPv4 addresses are represented in a dotted-
 Addressing Scheme: Develop an IP addressing scheme decimal format, where four sets of numbers ranging from 0
to assign unique addresses to devices on the network. to 255 are separated by periods (e.g., 192.168.0.1).
This involves deciding whether to use IPv4 or IPv6,
choosing appropriate address ranges, and defining the IPv6 addresses are represented in a hexadecimal
requirement based IP addressing on a different router format, consisting of eight sets of four hexadecimal digits
settings as per the department based. separated by colons (e.g.,
 Network Protocols: The protocols that will be used for 2001:0db8:85a3:0000:0000:8a2e:0370:7334). Users may
communication within the network and with external need to be aware of the conventions used to represent the IP
networks. This includes protocols such as TCP/IP, format itself.
Ethernet, Wi-Fi, DNS, DHCP, and others based on the
specific requirements of the network into educational Understanding the context of an IP address involves
institutions. knowing whether it represents a host or a network interface
 Network Security: Plan and implement security and understanding the hierarchy of networks and subnets.
measures to protect the network from unauthorized For example, the IP address 192.168.0.1 might indicate a
access, data breaches, and other threats. This may specific device within a local network, while a network
involve setting up firewalls, implementing encryption, administrator would need to understand how it relates to
using virtual private networks (VPNs), and establishing other addresses in the network.
access control policies. Instead of using VPNs here in
research I can implement the centralized domain system Address Classes and Ranges: In IPv4, IP addresses are
network which each system can get data information categorized into different classes [1] [4] (A, B, C, etc.) based
and accessibility as per the authorization. on the size of the network they represent. Each class has a
 Network Management: By defining the strategies for specific range of addresses that can be assigned.
monitoring and managing the network. This includes Understanding the class and range of an IP address can
selecting network management tools, establishing provide insights into its potential use and scope.
monitoring processes, configuring devices, and
implementing policies for troubleshooting, performance Subnetting: Subnetting [5] involves dividing a larger
optimization, and regular maintenance. network into smaller subnetworks. Understanding subnetting
allows network administrators to allocate IP addresses
 Testing and Deployment: Before deploying the
network, conduct thorough testing to ensure its efficiently and manage network resources effectively. It
functionality and performance. Test connectivity, involves understanding subnet masks, network prefixes, and
security measures, and various network services. Once how they relate to IP addresses.
testing is successful, deploying the network and
configurations for each and every system into Packet Understandability: [6] Packets are units of data
educational institutions which considering factors like that carry information across networks. The
user impact and downtime minimization and the understandability of packets depends on the following
utilization of the systems into educational institutions. aspects:
 Ongoing Maintenance: Regularly review and update the
Packet Structure: [1] [6] [7] Packets typically consist of a
network architecture to accommodate changing
header and payload. The header contains control
requirements, technological advancements, and security
information, such as source and destination IP addresses,
updates. Perform periodic audits, monitor performance,
protocol information, sequence numbers, and error-checking
and address any issues that arise.
data.
 Understandability of IP address and packets (Hardware
The payload carries the actual data being transmitted.
based and Software based)
Understanding the structure of packets helps in interpreting
This Section provides the understandability of IP
and processing the information they contain.
address and packets how I can deploy into hardware like
routers, switches, and system NICs. And also utilizing the
some of the software to check the IP addresses and

IJISRT23JUL985 www.ijisrt.com 637


Volume 8, Issue 7, July – 2023 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
Protocols [8]: Various network protocols, such as IP,  Access Control:
TCP, UDP, and ICMP, are involved in packet transmission. Firewalls allow organizations to define access control
Each protocol has its own specific structure and purpose. policies that regulate network traffic flow. These policies
Understanding these protocols helps in interpreting the specify which types of traffic are allowed or denied based on
information encapsulated within the packets and criteria such as IP addresses, port numbers, protocols, and
determining how they should be handled. application-level information. By enforcing access control,
firewalls ensure that only authorized connections are
[9]
Hardware-Based Packet Processing permitted, reducing the attack surface and enhancing
Understandability: Hardware-based packet processing often network security.
occurs at high speeds and involves specialized networking
hardware, such as routers and switches. The  Network Segmentation:
understandability of packet processing in such systems Firewalls can be used to create network segments,
primarily lies in configuring and managing the hardware dividing a network into smaller subnets or virtual LANs
devices. Network administrators need to be familiar with the (VLANs). Network segmentation enhances security by
specific hardware platforms, their capabilities, and the isolating sensitive resources and limiting the potential
configuration options available to optimize packet routing impact of a security breach. Firewalls can control
and forwarding. communication between different network segments,
allowing organizations to enforce stricter security policies
Software-Based Packet Processing Understandability: for critical systems or confidential data.
Software-based packet processing, such as software-defined
networking (SDN) [2] [10], involves the use of software  Intrusion Detection and Prevention:
running on general-purpose servers or switches to handle Advanced firewalls often include intrusion detection
packet processing tasks. The understandability of software- and prevention system (IDPS) capabilities. IDPS
based packet processing revolves around the programming functionality enables the detection and prevention of known
languages, network protocols, and APIs used to develop and attack patterns, abnormal behaviour, and suspicious network
configure the software-defined networking infrastructure. activities. These features can help identify and moderate
Network administrators and software developers need to attacks in real-time, reducing the impact of security
understand these technologies to effectively manage and incidents.
customize the behaviour of the software-based packet
processing systems.  VPN and Remote Access: [13] [14]
Firewalls can provide secure remote access to internal
In this part, we can understand of IP addresses and networks through Virtual Private Network (VPN)
packets depends on factors such as their format, context, connectivity. By implementing VPN services, organizations
address classes, subnetting, packet structure, protocols, and can enable secure remote connections for employees,
the specific hardware or software technologies used for partners, or clients. Firewalls can authenticate and encrypt
processing. With these aspects enables network remote connections, ensuring data confidentiality and
administrators and developers to effectively interpret, integrity.
configure, and manage IP addresses and packets in
educational institutions network architecture design and But in this research not utilizing the concept of VPN
development of extensible network model for remote accessibility, instead of remote connection all the
control that providing throughout the centralized domain
 Security and firewall Utilization access only so this research can give the extensible network
Security and firewall utilization [4] [6] are the main part model for the educational institution from anywhere into the
of network and information security. Firewalls are network campus that can be possible through the proper design and
security devices [12] that monitor and control incoming and development of network architecture model.
outgoing network traffic based on prearranged security
rules. They act as a hurdle between trusted internal networks  Logging and Monitoring: [15]
and untrusted external networks, such as the internet, to Firewalls generate logs that capture information about
protect against unauthorized access, malicious attacks, and network traffic, connection attempts, and security events.
data breaches. Here are some of the main points that we Effective security practices involve regularly reviewing and
must understand for security and firewall utilization: analysing firewall logs to identify potential security
incidents, policy violations, or abnormal network activities.
 Threat Prevention: Real-time monitoring and alerts can help respond promptly
Firewalls play a vital role in preventing unauthorized to security events and improve incident response
access and protecting against various threats, including capabilities.
malware, intrusion attempts, and denial-of-service (DoS)
attacks. They can analyse network traffic, block suspicious  Regular Updates and Patch Management:
or malicious connections, and enforce security policies to Firewalls, like any other software, require regular
minimize the risk of security incidents. updates and patches to address security vulnerabilities and
maintain optimal protection. It is important to keep firewalls

IJISRT23JUL985 www.ijisrt.com 638


Volume 8, Issue 7, July – 2023 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
up to date with the latest firmware or software releases  Secure Shell (SSH):
provided by the firewall vendor. SSH provides secure remote access to network devices
or servers. It allows encrypted communication and secure
 Security Policy Enforcement: remote command execution.
Firewalls should be configured to enforce a Using all this protocols and services in research it can
comprehensive security policy aligned with an conclude the implementation and use of network model
organization's security objectives. The policy should which going to build for the educational institution not using
consider factors such as allowed and blocked traffic, the remote connection, by implementing the centralized
application-level filtering, user authentication, encryption domain system implementation that can accessible
requirements, and network usage policies. Regular review throughout the educational institution.
and adjustment of the security policy are essential to address
emerging threats and evolving business requirements.  Network Monitoring and Management Tools:
Network monitoring and management tools help
It is important to note that while firewalls are a administrators monitor, analyze, and manage network
necessary component of network security, they should be performance, security, and resources. These tools provide
complemented with other security measures, such as intuitions into network behaviour, identify issues, and assist
intrusion detection systems, antivirus software, strong access in troubleshooting and optimization.
controls, employee awareness programs, and regular
security audits.  Here are some common types of network monitoring
and management tools:
 Network Services and Network Monitoring and Network Monitoring Software: Network monitoring
Management Tools [2] [16] [17] [15] tools monitor network devices, traffic, and performance
Network services refer to the various functionalities metrics in real-time. They collect data on bandwidth usage,
and capabilities provided by computer networks to enable latency, device health, and other parameters, generating
communication, resource sharing, and application access. alerts and reports for network administrators.
These services facilitate the efficient and secure operation of
networks. Here are some commonly used network services:  Network Performance Analysis Tools:
These networking tools[4][10]analyze network
 Domain Name System (DNS): performance[13] and identify blocks or areas for
DNS [18] translates domain names (e.g., optimization. They provide detailed graphical
www.example.com) into IP addresses. It helps user’s access representations, and historical data to help to solve and
websites and other network resources by resolving human- improve network performance. Wireshark, SolarWinds
readable domain names into machine-readable IP addresses. Network Performance Monitor, Cisco Network Analysis
Module (NAM), NMAP, EhterApe, IPConfig, cURL,
 Dynamic Host Configuration Protocol (DHCP): Datadog are examples of such tools.
DHCP automates the process of assigning IP
addresses, subnet masks, gateway addresses, and other  Bandwidth Monitoring Tools: [19] [15]
network configuration parameters to devices on a network. These tools measure and monitor network bandwidth
It simplifies network administration by dynamically usage. They provide insights into bandwidth consumption,
managing IP addressing. traffic patterns, and application-level usage. They help
optimize network resources and plan for capacity upgrades.
 Network Time Protocol (NTP): Examples include NetFlow Analyzer, SolarWinds
NTP is used to synchronize the clocks of devices on a Bandwidth Analyzer Pack, and Manage Engine Op
network. It ensures accurate timekeeping across systems, Manager.
which is essential for various network operations, security
protocols, and time-sensitive applications.  Network Configuration and Change Management
Tools: [13] [20]
 File Transfer Protocol (FTP): These tools help manage network configurations, track
FTP is a standard protocol for transferring files changes, and ensure compliance with policies. They provide
between systems over a network. It allows users to upload, version control, configuration backups, and auditing
download, and manage files on remote servers. capabilities. Examples include SolarWinds Network
Configuration Manager, Cisco Prime Infrastructure, and
 Simple Mail Transfer Protocol (SMTP): InfobloxNetMRI.
SMTP is a protocol used for sending and receiving
email messages between mail servers. It enables email
communication over networks.

IJISRT23JUL985 www.ijisrt.com 639


Volume 8, Issue 7, July – 2023 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
II. REVIEWS AND FINDINGS

Table 1 Reviews and Findings


Paper Title Abstract Advantage Findings
An Evaluation of IP- This paper presents IP address- In this process of categorizing This paper presents an
Address Lookup lookup algorithms it has been packets into flows in a router, which evaluation of the major
Algorithms covered the problem of packet has an important role in firewalls, existing and newly
classification and the survey of intrusion detection, differentiate proposed schemes for
software & hardware algorithms. services and fulfilling the addressing the IP address
requirements of Voice Over IP in lookup problem in internet
next generation networks. routers.
Design and This paper mainly focused on C/S Mode System: This paper compares the
Implementation of analysis of advantages and Strong interaction, Development both the mode C/S mode
Network disadvantages in the C/S mode targeted, Personalize interface design System and B/S mode
Management and B/S mode, design and with intuitive, Simple, convenient system. How they are
System Based on implementation of network features, Customized to meet implementing for the
Mixed-Mode management system based on the customer operational requirement, specific application mode
mixed mode with C/S mode and More secure access mode, Little by using B/S mode with
B/S mode. traffic, Fast response C/S mode algorithms and
B/S Mode System: found the network
Not require on the operating system management capability.
and software platform. By installing Also they gives the basic
any generic named browser on about network management
clients, Business expansion, easy services, by using the some
upgrade and just upgrade the server basic protocol
side, Especially suitable for online implementations and also
information published, Unlimited provide the some key
number of the front users, Users can technologies which is
expand arbitrarily, No need for helpful to implement into
additional investment, Saves the cost this research.
The Control of The on board network is mainly It takes an account for the dynamics It just compares the
Onboard Computer focused on solving a narrow of network development associated network and gives
Network range of tasks with a given with the emergence of new analytical and mathematical
quality of solution. Main goal of applications, changing the findings and possibilities,
network control is meeting the composition of network equipment, so for that it is not
quality requirements for the connecting new users, changing the convenient as per research
problem solving. structure and peculiarities of area for the development of
interaction with the external this research.
environment
A protocol for In this paper we present a Using gateway notion, we can Here it describes and
Packet Network protocol design and philosophy intercommunicate with more network discussed the basic
Intercommunication that supports the sharing of to send or receive large data. fundamentals issues of
resources that exist in different Uses the full duplex for interconnection of packet
packet switching networks. It communication full length messages switching networks. They
describes the function of a and data streaming represents as try to implement the
GATEWAY as an interface sequence finite. Process level flexible and powerful
between networks and discusses communication uses the TCP which protocol implementation in
its role in the protocol. transmits data and do the packet to single network so they
switching. can give the larger data
TCP automatically recovers the transmission. By using this
packets. type of implementation or
Connection free protocols with uses in my research area if
associations it is required, then must
create or implement this
type of protocol.
Design and This paper defines the network It cannot send TCP/IP packet Basis on this article I found
implementation of a security based new packet simulation attacks. that we can generate new
user-extensible generator which uses the network packets as per our needs
network packet and network tools to overcome Also it can send scalable custom and how to make the data
generator the situation of network threats protocol packets. network and data network
and data theft over the network. security for the client server

IJISRT23JUL985 www.ijisrt.com 640


Volume 8, Issue 7, July – 2023 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
It ensures the security, stability and communication with the
protocol consistency of network new packets when this
security devices. research providing the
model for the accessibility
of the network systems into
educational institution it
can be utilize.
The Development This paper focuses on analysing In this network topology devices Basis on this paper found
and Application of the development and application process mainly to initialize the that how to make simple,
Extensible of extensible computer network network: setup event table, complete effective extensible
Computer Network design system. They define that the simulation operation work, computer network
Design System computer network technology has improve the dynamic display application design. They
three different directions. network of operation process, to covered the basic of
Visual Software function achieve application of results implementation network
accessibility performance and equipment data,
Performance analysis ability topology design, simulation
extensibility operation, project analysis
Software external interface using this type of design
extensibility and development of simple
network model utilize into
extensible network model.
Performance This paper discusses the Explores the impact of three basic This paper give the
Evaluation of VPN performance of different VPN topologies on the performance of information that using of
with different technologies. They are using the VPN. VPN we can access the
Network Topologies L2TP protocol to evaluate the different machines by
VPN performance. When the chain cascade network implementing or using
structure is adopted, as the chain certain protocols and by
VPN functions for establishing length of the network is greater than checking some tools we can
private network using tunnel or equal to 3 the performance is analyze the results of data
technology on the public network reduced. sending and receiving
for personal communication. performance and when we
When we design the VPN topologies use the internet services it
it is recommended to adopt a star changes the performance of
topology or tree topology VPN.
Study and In this paper, they study MIPv6 In the presence of real time In this paper, they study
Evaluation of Voice and evaluate the Voice over IP applications, this network change MIPv6 and evaluate the
Over IP Signaling (VOIP) performance with its two delay is not accepted. Voice over IP (VOIP)
Protocols SIP and H.323 architectures. For the mobile network lacking they performance with its two
Performances on They performed homogeneous use the Macro Mobility and Micro SIP and H.323
MIPv6 Protocol in 802.11e network in the context of Mobility implementation. architectures. They
Mobile 802.11 a horizontal handover taking into MIPv6 protocol implementations performed homogeneous
Network account the MIPv6 technology. VOIP’s signalling protocol it uses the 802.11e network in the
H.323 protocol, H.245 protocol, context of a horizontal
Q.931 protocol, RAS protocol, handover taking into
RTP/RTCP protocol, and SIP account the MIPv6
Protocol. technology. From this get
the understandability of SIP
protocol and H.323
protocol who is the better
and faster for the quality
information and data
passing.
A Minicomputer This article describes an This type of network allows a From this research I can get
Network integrated group of utilities computer to be used in each of the the information how they
Management distributed for an eleven super functional groups within the its are trying to communicate
Monitoring, and minicomputer network for the department like email, word the minicomputers into
Analysis System purpose of network wide file processing document, spreadsheets, network and how they are
Using APL backup without user interaction, graphics files, data base and database using the resources of the
centralized verification of all results and to generate reports as they computers on the remote
archive processes, centralized needed. systems, but in same
monitoring and analysis of Easy to operate for the centralized pattern I am going to apply

IJISRT23JUL985 www.ijisrt.com 641


Volume 8, Issue 7, July – 2023 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
network and individual node administrator. by using the web domain
statistics, general system by providing the centralized
housekeeping, and notification of domain and the number of
systems staff of trouble spots. nodes, nodes can directly
get the information and
they can configure as per its
requirement instead of
using remote connection
and older version APL.
A Resource sharing This article describes the facility The RSEXEC is respond to users In this RSEXEC has shown
executive for the to play important role in request if require from one or more that it is capable of
ARPANET removing the distinction between remote hosts. In each hosts in supporting significant
‘local’ and ‘remote’ by allowing RSEXEC system runs the service resource sharing among the
users of geographically separated program as a “demon” process which TENEX Hosts in the
hosts to interact with one another is prepared to provide service to any ARPANET, they don’t
as if they were members of a remote process that observes provide the resource
single user. protocol. accessibility without the its
boundaries. So for that they
are using RSEXEC to
provide access resources
within a computer network
that makes network
transparent by removing
distinction between the
local and remote.
From this get the
information to also I can
use this type of protocol
and commands to access
the resources of the system
instead of remote.
A Novel In this they added and removes Fast in performing IP lookup In this IP address lookup
reconfigurable prefixes at rate of 2 million operation by setting up 100 Gbps found the new
hardware updates per second. A route router to work rate of 100 mbps reconfigurable hardware to
architecture for IP updates fail due to physical Scalable in terms of routing tables reduce the resource usage,
address lookup resources limitations. growth by increasing number of which is the problem in
For that they discuss about rate of users. other architectures but only
architecture and properly in hash operation collisions.
reconfigure the more resources as Scalable for migrating from IPv4 to Basis on that I can get the
per its needed. IPv6. IP lookup algorithm and the
updates of the hardware and
Terms of implementation costs, what to configure or
achieving all other objectives at a reconfigure.
minimal cost.
Gain performance as possible from
limited hardware resources by tuning
configuration.
Hard wired data structures can be
used to accelerate performance.
The system cost can be reduced by
fitting multiple features and
applications on a single
reconfigurable hardware platform.
An Insight into IP In this paper Internet Protocol They implement the OSI Model for From this paper it describes
Addressing version 4 is studied to understand the addressing. the addressing mechanisms
the pros and cons. Into the and they give the good
different addressing levels such as Solve the issues by port addressing informations related to IPv4
logical, physical, port and specific where each port represents a and IPv6 addressing how
addressing is defining its own particular process or application on a they are working into the
aspects of needs. They also particular host. network and how they are
discuss about IPv4 addressing defining the IP addresses

IJISRT23JUL985 www.ijisrt.com 642


Volume 8, Issue 7, July – 2023 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
with its size and different classes, IPv4 is robust and easily with its address.
where each class differs by its implemented on network From this research paper I
network and host ID part. They architecture. can understand the network
also discuss about devices to use IP addressing process
not to be till improved IPv4 to which is helpful to setup
IPv6 addressing. the routing into the network
architecture. Also I can
establish the own network
domain architecture as
research needed.
An Overview of IP This research journal discusses This paper gives the
Addressing how this process works with the information of IP
help of different sources that are addressing how to utilize
gathered and summarized. the IP addresses into the
They also discuss the paper and current network
analysis i.e. An insight into IP architecture by using the
addressing (2017), Research on IP IPv4, IPv6, subnetting and
address Allocation of Tactical IP address classes with the
Communication Network (2019), CIDR Notation.
IP Address (2022), which all
discuss about the IP addressing
works configuration of TCP/IP
configuration, subnetting and any
process of IP addressing.
Application for This article presents a part of Author presents the possibilities of In this research I can get the
Determining project they just focused on application for data mining technique information for the IP
whether IP developing and measuring device to increase the security level of addressing by using the
Addresses belong to for gigabit-capable passive optical mobile application system. Map Coordinates and by
a Map by networks. They are using python The developed application serves the implementing the Software
Coordinates application to detect whether automatic determination of the application get the location
captured IP addresses belong to a identity of the IP addresses to the information. Here nothing
map by their coordinates. selected MAP base according to their useful for my research but
coordinates. got the information that I
can also see the concept of
the location mapping by
using IP addressing.
CMT: An Efficient In this packet classification plays When packet classification was an This paper first proposes
Algorithm for essential role in diverse network offline problem is past, rule-set the common mask free
Scalable Packet functions such as quality of updates are not frequent. structures for implementing
Classification service, firewall filtering and load Packet classification is turned into an efficient packet
balancer. online problem under the new classification, they guide
By implementing efficient packet networking paradigm i.e. SDN for constructing CMT from
classifier, it gets worse. in the (Software Base Network practical rulesets is given in
software defined network, which The OpenFlow switches can receive this paper,
frequent rule updates are thousands of rule updates per second They implemented fast and
performed, and complex flow dynamic rule-set update
tables are used. schemes.
Using this I can understand
the packet division or its
classification how to
implement into the network
architecture.
Computer Network In this paper computer network is Communication systems being In this they discuss about
Development to defined to be set of autonomous, designed to carry very redundant how to share and
Achieve Resource independent computer systems, information for direct human communicate the network
Sharing interconnected to permit consumption. and how they are sharing
interactive resource sharing the resources using some of
between any pair of system. The line errors can be easily fixed the programming software
The goal of the computer network through error detection and implementation methods.
is for each computer network is retransmission. This paper gives the
for each computer to make every information for resource

IJISRT23JUL985 www.ijisrt.com 643


Volume 8, Issue 7, July – 2023 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
local resource available to any sharing into the network by
computer in the net and also to using software application
local users can be used remotely and methods.
without degradation.
In this involves complete
reprogramming of software or
reformatting the data files. This
extremely costly and has led to
considerable pressure for both
very restrictive language
standards use of identical
hardware systems.
Dynamic Memory In this work, they propose a If forwarding performance within a In this paper, formalized
Model based dynamic memory model that router were infinitely fast, then the the IP address lookup
Framework for captures data movement between overall performance of the network. algorithm as an
Optimization of IP hierarchical memories and the optimization problem,
Address Lookup memory access cost. Modern general-purpose processors where optimality is defined
Algorithm Using the model, they formulate use hierarchical memories to enhance with respect to a machine
the design of IP address lookup performance. model and a prefix Markov
algorithms as a well-defined model. Also shown the
optimization problem that problem is NP-hard, and
minimizes an algorithm’s average presented an optimization
lookup time. framework and an
Also it first show the problem is associated approximate
NP-hard and then present an algorithm using Lagrange
optimization framework and multipliers. It shown that
associated algorithm based on proposed algorithm has
Lagrange multipliers that noticeable improvement
terminates in a bounded-error over existing algorithms in
solution and simulation shows the the literature. So using of
produced algorithm has this I can try to implement
noticeable performance gain over models for the IP lookup
existing techniques or not. address.
High Speed IP In this they explored a practical Apply hashing for IP address lookup. From this parallel IP lookup
Address Lookup IP address lookup scheme which Degermark proposed a scheme which address algorithm exploring
Architecture Using converts longest prefix matching constraints a forwarding table using a the exact matching and
Hashing problem into the exact matching small size memory. parallel hashing in prefix
problem. length.
In this article they create A lookup scheme proposed by Gupta Also in this scheme
proposed architecture it composed offers the maximum two memory forwarding table is
of multiple SRAMs and each accesses for an address lookup but it composed of multiple
SRAM represents an address uses 33 Mbytes of DRAM. SRAMs and each SRAM
lookup table in a single prefix. represents address lookup
They also applied to each address Waldvogel proposed an address table.
lookup table in order to find out lookup scheme require a worst-case
matching entries in parallel and time of log2 (address bit) hash Also I can understand the
the entry matched with the lookups and additional memory simulation process of
longest prefix among them is space to store markets remembering MAE-WEST router
selected. the last found BMP. performed the propose
Also they show data from MAE- scheme is evaluated.
WEST router that a large routing Huang and Zhau proposed a scheme
table with 37000 entries is constructing next hop array based on So basis on that IP
connected to a forwarding table of the extension of the hode- addressing architecture
189 Kbytes. compression concept used in tries. gives the idea to implement
and do the practice using
different routers.
High Speed Route In this paper they applied new IP CAMs matching scheme to shorten In this paper, found that
Lookup for into the devices with the same the extremely long New IP addresses high speed new IP route
Variable-Length IP LAN using separate IP addresses and reduce TCAM storage space lookup mechanism to
Address instead of four they are using five consumption. achieve LPM using a
segment as variable-length. hybrid configuration of

IJISRT23JUL985 www.ijisrt.com 644


Volume 8, Issue 7, July – 2023 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
They combine the hash scheme The mechanism can provide high BCAMs and TCAMs are
and CAMs matching scheme to speed route lookup with low power used to convert structured
shorten the extremely long new IP consumption. New IP addresses into flat
addresses and reduce TCAM label addresses.
storage space consumption. New IP is a new network protocol Also in this TCAMs can
suit under this architecture the perform the LPM of label
protocol uses variable-length addresses efficiently they
structured address design. combine the hash scheme
and CAMs matching
The address space can be smoothly scheme to shorten the
expanded according to the network extremely long address and
scale without modifying the old reduce TCAM storage
network address configuration. space consumption.
Basis on that particular
implementation of IP
address lookup using CAM,
BCAM, and TCAMs.
High-performance In this they implementation on the In this they implemented
IP Lookup Using Intel Xeon Phi (Intel Phi) many Longest Prefix Matching
Intel Xeon Phi: a core coprocessor and on multi- (LPM) till the development
Bloom filters based core CPUs, and also evaluate the of CIDR (Classless Inter-
approach cooperative execution using both Domain Routing). Here
computing devices with several they investigate the use of
optimizations. Intel Xeon Phi processor as
In this attain high IP lookup a platform for efficient
throughputs of up to 182.7 Mlps execution of LPM
(Million packets per second) for algorithms for IP Lookup.
IPv6 packets on a single Intel Phi. Also they implemented the
Bloom filters (BFs) and
hash tables (HTs) to find
the LPM for IPv4 and IPv6.
Basis on that again for the
IP lookup addressing I must
see the Bloom filter and
hash table algorithms for
the IPv4 and IPv6
implementation.
Implementing High This paper will discuss the Using current hardware technology it In this paper understands
Speed IP Address aspects surrounding high speed IP encouraged a steady rise in the the binary trie based
Lookups in address lookup architecture for number of proposed solution hardware implementation
Hardware hardware implementation. Also designed specifically for hardware in which uses the different
the paper will conclude with some current few years. architecture i.e. pao and
discussion on the state of the art waldvogel. This two
in the area and its future direction. architecture tested and used
Also they discuss here for routing for IP lookups up to 5
and prefixes with the CIDR memory levels they can
(Classless Inter-Domain Routing) checked the IPv4 and IPv6
lookup.
IP Address Lookup In this paper the tests and By using binary tree prefixes strings Again here in this paper
in an IP Router evaluation of the access memory of varying lengths they can naturally understand the
Based On a number of the longest prefix represents by binary tree it is simple implementation of binary
Reorganized Binary match search algorithm shows data structure. tree algorithm with the its
Prefixes Value Tree that the IP address lookup prefix implementation to a
(RBPVT) algorithm based on RBPVT tree new algorithm that is
to improve the performance of the RBPVT based algorithm
IP routers in terms of average implementation.
memory access number.
To improve the routing
information search time in the
prefixes values binary tree by
recognizing the tree according to

IJISRT23JUL985 www.ijisrt.com 645


Volume 8, Issue 7, July – 2023 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
the use of prefixes the most
recently used prefixes are stored
in the higher levels of the
reorganized binary prefixes value
tree (RBPVT) which improves
the data packets routing time.
IP Address Lookup In this paper, they proposed a TCAM gives the effect of forwarding In this paper they focused
Using GPU parallel IP address lookup is fast as 250 million packets per on CUDA based IP
architecture, which is a novel second (MPPS). forwarding engine for large
concept based on graphics G92 achieve a throughput more than number of packets and
processing unit (GPU) via 1.3 GPPS. maximizing the forwarding
Compute Unified Device capability of the engine.
Architecture (CUDA). Also they investigate
Device function in GPU only several GPU properties to
perform IP address data lookup. benefit the lookup
Host function is exploited to performance, including the
construct and update the data memory architecture of
structure of IP address lookup. dual data structures for fast
prefix updates.
Basis on that I can utilize
the hardware support basis
on the GPU and CUDA
architecture.
Network This paper discussed the VPNs In this UDP throughput for
Performance are a method employed by the IPv4 wired network
Comparison of VPN organizations to secure their data without any of the VPN
Protocols on Wired communications across un-trusted protocols showed speeds of
and Wireless networks. 95.3 MBPS, the UDP
Networks VPN also allow the flexibility for receive buffer size was
staff to be able to access network gradually increased and
resources in a secure manner from found for all protocols was
anywhere in the world. at 128KB.
Same thing all the other
protocols are measured
with its speed up to 70
MBPS to 95.3 MBPS. So
basis on this I can only
implement the concepts of
other protocols which are
helpful to make network
architecture and connect
with the server and client.
Network In this paper education of In educational system students can From this research paper
virtualization tools- networking professionals requires learn the virtualization techniques get the new optimization
analysis and not only the knowledge of theory and tools. and simulation tools that
application in higher but also acquiring practical skills. Virtualization techniques and tools can help me to utilize into
education For this purpose, specialized help to solve limitations and also add my research area, and also
networking laboratories equipped some new possibilities they implemented the
with the required diverse virtualization tools and
technology have been built for techniques for system into
years, educational institutions, so I
Here in this they are building can study them and
them is lengthy, expensive, and implement the idea but not
ultimately laboratories have virtualization.
several limitation, for example in
terms of flexibility, sustainability,
financial and energy demands,
etc.
Research on IP A tactical communication IP address allocation of existing This paper proposes a
Address Allocation network IP allocation method tactical communication is dominant, tactical communication
of Tactical based on Classless Inter-Domain randomness is easy and error is easy. network IP allocation based

IJISRT23JUL985 www.ijisrt.com 646


Volume 8, Issue 7, July – 2023 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
Communication Routing (CIDR) addressing Each unit is separately allocated and on CIDR addressing
Network technology and without network- lacks systematic distribution technology and without
wide routing configuration is strategies. whole network routing
proposed. Also they discuss Separation of communication and configuration. Which give
addressing method and allocation allegations, lacking integrated design the fast and automatic IP
process of the method are and distribution. address allocation and
analysed in details. Based on this, configuration of
the algorithm and model of IP communication devices of
address allocation in tactical tactical communication
communication network are network. Basis on that I can
given. get the idea to build the
better communication
network by assigning the IP
address to specific system
on a network.

III. LIMITATIONS Based on this research paper build the extended


network control architecture into educational institutions as
When research is going and analyzing the researches per its growing digital educational system. For that
and reviews of papers found the different types of educational institutions must upgrade its hardware and
architectures, models and implementations of the network software resources for the implementation of the extended
which are uses the hardware and software tools for the network model for the different IP structure by routing the
testing and examination. IP address and controlled by the centralized system and
monitor itself what are the needs of computer systems to
Also researches says that how to utilize the network upgrade or update the hardware or softwares.
into educational institutions for that must study the
particular educational institutions environment and its REFERENCES
campus who is working smartly and developing itself
modern into information and technology so for that must [1]. H. S. B. B. M. AunHaider, "An Evaluation of IP-
grow up with the technology research must have that type of Address Lookup Algorithms," in International
network model which manage and maintains from the Conference on Industrial and Information Systems,
centralized domain but they can manage itself as per its ICIIS 2006, Sri Lanka, 2006.
requirement where they can get all the information related [2]. S. C. a. Others, "CMT: An Efficient Algorithm for
regarding the particular systems and configurations so they Scalable Packet Classification," The Computer
can build setup itself. Journal, vol. 64, no. 6, pp. 941-959, 2021.
[3]. E. A. S. Yury L. Leokhin, "The Control of Onboard
Computer Network," in 2018 Systems of Signals
In today’s current environment of the educational Generating and Processing in the Field of On Board
institutions they are using the centralized accessibility by Communications, Moscow, 2018.
using either VPNs or Remote Desktop Connectivity. This [4]. D. M. K. P. R. L. J. D. N. M. Padole, "An Insight into
type of network model sometimes create the problems for IP Addressing," Computer Science Jornal, vol. 10, no.
the educational institutions and there is chances to theft the 1, 2017.
data from the particular systems. [5]. P. Y. Shi Guozhen, "Design and implementation of a
user-extensible network packet generator," in
IV. CONCLUSION MATEC Web of Conferences 139, 00197 (2017)
ICMITE 2017, Beijing, China, 2017.
In this research paper for the literature review in [6]. C. M. D. R. J. F. D. &. T. W. &. V. J. Ancheta John,
extended network control architecture model development, "An Overview of IP Addressing," in Republic of the
IP addressing, IP address lookup, hardware based packet Philippines, University of Makati, 1215 Metro
data sending and receiving literatures, all this are giving the Manila, Philippines, 2022.
its own algorithm, tools and techniques. From all this here in [7]. Z. W. a. M. Xiao, "Performance Evaluation of VPN
research implementing the extended network control model with different Network Topologies," in IEEE 2nd
for the education institution, which is built for the International Conference on Electronics
monitoring the system control in centralized network, Technology(ICET), Chengdu, China, 2019.
analyze the system information and store and manage that [8]. X. G. Y. T. a. J. T. W. Zhang, "High Speed Route
particular system implementation in network. How to Lookup for Variable-Length IP Address," in 2020
manage it? How to control and monitor with the tools that IEEE 28th International Conference on Network
are discussed in this research paper. Protocols (ICNP), Madird, Spain, 2020.
[9]. V. G. C. a. R. E. Kahn, "A Protocol for Packet
Network Intercommunication," IEEE Transactions on
Communication, vol. 22, no. 5, pp. 637-648, 1974.

IJISRT23JUL985 www.ijisrt.com 647


Volume 8, Issue 7, July – 2023 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
[10]. S. Z. M. S. m. Fadishei Hamid, "A Novel Telecommunications Workshop
reconfigurable hardware architecture for IP address (AICT/SAPIR/ELETE'05), Lisbon, Portugal, 2005.
lookup," in Conference: Proceedings of the 2005 [24]. M. T. M. M. R. Haouassi Hichem, "IP Address
ACM/IEEE Symposium on Architecture for Lookup in an IP Router Based On a Reorganized
Networking and Communication Systems, ANCS Binary Prefixes Value Tree (RBPVT)," International
2005, Princeton, New Jersey, USA, 2005. Journal of Computer Networks and Applications
[11]. M. M. M. K. J. P. J. U. O. Y. P. Segec, "Network (IJCNA), vol. 3, no. 1, pp. 9-15, 20169.
Virtualization tools-analysis and application in higher [25]. T. H. L. P. C. W. H. M. Chu, "IP Address Lookup
education," in 17th International Conference on Using GPU," IEEE Transancations on Emerging
Emerging eLearning Technologies and Applications Topics in Computing, vol. 4, no. 2, pp. 187-198,
(ICETA), Stary Smokovec, Slovakia, 2019. 2016.
[12]. C. J. W. D. K. H. M. W. Q. S. Narayan, "Network [26]. R. Y. W. X. Z. Huitao wang, "Research on IP
Performance Comparison of VPN Protocols on Wired Address Allocation of Tactical Communication
and Wireless Networks," in International Conference Network," Journal of Physics, 2019.
on Computer Communicatio and Informatics [27]. K. H. A. Chirag Jagani, "Optimization of An
(ICCCI), Coimbatore, India, 2015. Algorithm For The Cold Start Problem In
[13]. V. &. H. T. &. M. P. Oujezsky, "Application for Recommender Systems," in Journal of the Maharaja
Determining whether IP Addresses belong to a Map Sayajirao University, Baroda, Gujarat, India, 2022.
by Coordinates," in 2019 42nd International [28]. N. D. Dhaval Kher, "NOLEGEIN Journal of
Conference on Telecommunications and Signal Performance Management & Retention Strategies
Processing (TSP), Budapest, Hungary, 2019. Choosing Profession: A Lacking Linkage between
[14]. L. L. Wang Yi, "The Development and Application Education System and Employability," in 1st
of Extensible Computer Network Design System," in National Conference on Role of Higher Education in
2nd Workshop on Advanced Research and Sustainable Development in India, Porbandar,
Technology in Industry Applications (WARTIA Gujarat, India, 2020.
2016), Dalian, China, 2016. [29]. D. G. B. Nirav Dattani, "Internet of Things (IOT)
[15]. X. Wei, "Design and Implementation of Network Enhance by Quality of Services (QoS): A Review:,"
Management System Based on Mixed-Mode," in in International Conference on Emerging Trends and
2012 International Conference on Applied Physics Contemporary Practice, Rajkot, Gujarat, India, 2022.
and Industrial Engineering, Weifang, China, 2012. [30]. D. G. B. Nirav Dattani, "Security Of The Internet Of
[16]. M. E. K. J. B. A. B. A. Khiat, "Study and Evaluation Things: A Review:," in Shifting Paradigms in Higher
of Voice Over IP Signaling Protocols Performances Education By Multidisciplinary Study And Research,
on MIPv6 Protocol in Mobile 802.11 Network," in Mount Abu, Sunset Inn, Rajasthan, India, 2022.
2017 International Symposium on Networks, [31]. D. A. G. Sunil Bajeja, "TCP with Network Coding -
Computers and Communications (ISNCC), A Novel Scheme to Improve Performance in Wireless
Marrakech, Morocco, 2017. Mutihop Networks," International Journal of
[17]. J. C. T. Fred A. Gross, "A Minicomputer Network Computer Application, vol. 148, no. 1, pp. 16-20,
Management Monitoring, and Analysis System Using 2016.
APL," Vols. 1-8, Metadata Version 2021. [32]. D. K. Nirav Dattani, "The Next Technology (5G),"
[18]. R. H. Thomas, "A Resource Sharing executive for the NOLEGEIN Journal of Organizational Behaviour
ARPANET," in AFIPS National Computer Management, vol. 3, no. 2.
Conference, Las Vegas, Nevada, USA., 1973. [33]. D. K. A. Dhaval Kher, "Analysis of different
[19]. S. M. G. Cheung, "Dynamic Memory Model based Techniques for Botnet Detection," in Realization of
Framework for Optimization of IP Address Lookup SDGs Under Current Scenario, Rajkot, Gujarat, India,
Algorithm," in 7th International Conference on 2021.
Network Protocols, Toronto, ON, CANADA, 1999. [34]. P. N. A. K. Raichura K., "Cach-based Query
[20]. L. &. W. B. Roberts, "Computer Network Optimization in Mobile Ad-hoc Networks,"
Development to Achieve Resource Sharing," in International Journal of Technology Enhancements
AFIPS National Conference, New York, United and Emerging Engineering, vol. 3, no. 2, pp. 226-232,
States, 1970. 2014.
[21]. J.-H. S. Y.-J. J. Hyesook Lim, "High Speed IP [35]. D. K. H. A. Milan K. Vachhani, "Globus Toolkit 5
Address Lookup Architecture Using Hashing," IEEE (GT5): Introduction of a tool to develop Grid
Communications Letters, vol. 7, no. 10, pp. 502-504, Application and Middleware," International Journal
2003. of Emerging Technology and Advanced Engineering,
[22]. A. A. &. T. G. Lucchesi, "High Performance IP vol. 2, no. 7, 2012.
Lookup Using Intel Xeon Phi: a Bloom filters based [36]. K. A. Dipti Punjani, "Data Mining Techniques in
approach," Journal of Internet Services and Biological Research," International Journal of
Applications, vol. 9, no. 3, 2018. Computer Sciences and Engineering Open Access
[23]. S. S. S. K. McLaughlin, "Implementing High Speed Review Paper, vol. 7, no. 4, 2019.
IP Address Lookups in Hardware," in E-Learning on

IJISRT23JUL985 www.ijisrt.com 648

You might also like