SlideShare a Scribd company logo
1 of 6
Presentation on
Classifier Of Computer Network
OF
BACHELOR OF ENGINEERING
IN
COMPUTER SCIENCE ENGINEERING
By
Khwaja Moinuddin Chishti Language University Lucknow
Penta Tech
2
2
Table of Contents
Introduction classifier of Computer Network
Types of Classifiers of Computer Network
The functionality of the classifier of Computer Network
The benefit of classifier of Computer Network
Conclusion of Classifier of Computer Network
Application of classifier of Computer Network
Introduction
A classifier is a fundamental component of computer networks that helps in the management and optimization
of network traffic.
It is an essential tool for network administrators to ensure that data packets are prioritized, thus enhancing
network performance and reducing congestion.
3
Types of Classifiers of Computer Network
There are several types of classifiers that are commonly used in computer networks:-
1. Port-based Classifier
* This classifier assigns a priority level to packets based on the port number they are using.
* It is commonly used to prioritize traffic for specific applications, such as email or web
browsing.
2. Flow-based Classifier
* This classifier assigns a priority level to packets based on the flow of traffic.
* It is commonly used to manage traffic for applications that generate a large number of connections,
such as peer-to-peer file sharing.
3. Destination-based Classifier
* This classifier assigns a priority level to packets based on their destination address.
* It is used to direct traffic to specific destinations, such as servers or storage devices.
4. Source-based Classifier
* This classifier assigns a priority level to packets based on their source address.
* It is commonly used to manage traffic from specific sources, such as remote offices or mobile
devices.
5. Quality of Service (QoS) Classifier
* This classifier assigns a priority level to packets based on the QoS requirements of the network.
* It is commonly used in service provider networks to manage traffic for different customers or
services, such as voice or video conferencing.
4
Functionality
* The classifier is responsible for analyzing data packets based on certain criteria, such as their source and
destination IP addresses, ports, and protocol types.
* Based on this analysis, the classifier assigns a priority level to the packet and forwards it to the appropriate
destination.
* This prioritization ensures that time-sensitive traffic, such as VoIP and video streaming, receives priority over
non-critical traffic, such as file transfers and email.
* Additionally, the classifier can also be used for traffic shaping, which involves regulating the flow of traffic to
prevent congestion and ensure optimal network performance.
Application
* The classifier is commonly used in enterprise networks, data centers, and service provider networks.
* The classifier is used to manage network traffic and prioritize traffic for different customers and services.
* The classifier is used to manage network traffic and prioritize critical applications.
* The classifier is used to optimize the flow of traffic between servers and storage devices
5
Benefits
* Firstly, it improves network performance by reducing packet loss and congestion, resulting in faster and more
reliable data transfers.
The benefits of using a classifier for computer networks are numerous.
* Thirdly, it provides network administrators with greater control over network traffic, enabling them to
manage bandwidth usage and optimize network resources.
* Secondly, it ensures that critical traffic is given priority, reducing latency and improving the user experience.
Conclusions
* The classifier is a critical component of computer networks that provides network administrators with greater
control over network traffic, improves network performance, and ensures that critical traffic is given priority.
* The importance of the classifier in network management and optimization cannot be overstated, and it is a
tool that every network administrator should have in their arsenal.
* Its applications are diverse, and it is used in various network environments, such as enterprise networks, data
centers, and service provider networks.
Thank You.
THANK YOU
Pe n t a Te c h K M C LU p e n t a t e c h 2 0 5 0 @ g m a i l . c o m
U tta r P ra d e s h

More Related Content

Similar to Computer Network ppt.pptx

Packet Filter Firewall and Application Level Gateway.pptx
Packet Filter Firewall and Application Level Gateway.pptxPacket Filter Firewall and Application Level Gateway.pptx
Packet Filter Firewall and Application Level Gateway.pptx
ssuserec53e73
 
M1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxM1-C17-Armando una red.pptx
M1-C17-Armando una red.pptx
Angel Garcia
 
Baker Charlie
Baker CharlieBaker Charlie
Baker Charlie
Carl Ford
 

Similar to Computer Network ppt.pptx (20)

Enabling Active Flow Manipulation in Silicon-based Network Forwarding Engine
Enabling Active Flow Manipulation in Silicon-based Network Forwarding EngineEnabling Active Flow Manipulation in Silicon-based Network Forwarding Engine
Enabling Active Flow Manipulation in Silicon-based Network Forwarding Engine
 
Packet Filter Firewall and Application Level Gateway.pptx
Packet Filter Firewall and Application Level Gateway.pptxPacket Filter Firewall and Application Level Gateway.pptx
Packet Filter Firewall and Application Level Gateway.pptx
 
A Comparative Analysis of the Performance of VoIP Traffic with Different Type...
A Comparative Analysis of the Performance of VoIP Traffic with Different Type...A Comparative Analysis of the Performance of VoIP Traffic with Different Type...
A Comparative Analysis of the Performance of VoIP Traffic with Different Type...
 
Synapseindia revirews about networking
Synapseindia revirews about networkingSynapseindia revirews about networking
Synapseindia revirews about networking
 
J1087181
J1087181J1087181
J1087181
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
M1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxM1-C17-Armando una red.pptx
M1-C17-Armando una red.pptx
 
17 - Building small network.pdf
17 - Building small network.pdf17 - Building small network.pdf
17 - Building small network.pdf
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
Baker Charlie
Baker CharlieBaker Charlie
Baker Charlie
 
Linux Based Advanced Routing with Firewall and Traffic Control
Linux Based Advanced Routing with Firewall and Traffic ControlLinux Based Advanced Routing with Firewall and Traffic Control
Linux Based Advanced Routing with Firewall and Traffic Control
 
Firewalls
FirewallsFirewalls
Firewalls
 
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over NetworkingCrypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud
 
section1.1.pptx
section1.1.pptxsection1.1.pptx
section1.1.pptx
 
Increasing Energy Productivity in Multiple Access Channel by Utilizing Packet...
Increasing Energy Productivity in Multiple Access Channel by Utilizing Packet...Increasing Energy Productivity in Multiple Access Channel by Utilizing Packet...
Increasing Energy Productivity in Multiple Access Channel by Utilizing Packet...
 
IRJET - Designing a High Level Corporate Network Infrastructure with MPLS Cloud
IRJET - Designing a High Level Corporate Network Infrastructure with MPLS CloudIRJET - Designing a High Level Corporate Network Infrastructure with MPLS Cloud
IRJET - Designing a High Level Corporate Network Infrastructure with MPLS Cloud
 
The Utility based AHP& TOPSIS Methods for Smooth Handover in Wireless Networks
The Utility based AHP& TOPSIS Methods for Smooth Handover in Wireless NetworksThe Utility based AHP& TOPSIS Methods for Smooth Handover in Wireless Networks
The Utility based AHP& TOPSIS Methods for Smooth Handover in Wireless Networks
 
The Utility based AHP& TOPSIS Methods for Smooth Handover in Wireless Networks
The Utility based AHP& TOPSIS Methods for Smooth Handover in Wireless NetworksThe Utility based AHP& TOPSIS Methods for Smooth Handover in Wireless Networks
The Utility based AHP& TOPSIS Methods for Smooth Handover in Wireless Networks
 

Recently uploaded

Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..
MaherOthman7
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
IJECEIAES
 

Recently uploaded (20)

15-Minute City: A Completely New Horizon
15-Minute City: A Completely New Horizon15-Minute City: A Completely New Horizon
15-Minute City: A Completely New Horizon
 
Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..
 
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and ToolsMaximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
 
Autodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxAutodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptx
 
Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...
 
Insurance management system project report.pdf
Insurance management system project report.pdfInsurance management system project report.pdf
Insurance management system project report.pdf
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
Interfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdfInterfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdf
 
engineering chemistry power point presentation
engineering chemistry  power point presentationengineering chemistry  power point presentation
engineering chemistry power point presentation
 
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
 
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
 
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
 
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...
 
21scheme vtu syllabus of visveraya technological university
21scheme vtu syllabus of visveraya technological university21scheme vtu syllabus of visveraya technological university
21scheme vtu syllabus of visveraya technological university
 
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfInstruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
 
Artificial Intelligence in due diligence
Artificial Intelligence in due diligenceArtificial Intelligence in due diligence
Artificial Intelligence in due diligence
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
 
Raashid final report on Embedded Systems
Raashid final report on Embedded SystemsRaashid final report on Embedded Systems
Raashid final report on Embedded Systems
 
Basics of Relay for Engineering Students
Basics of Relay for Engineering StudentsBasics of Relay for Engineering Students
Basics of Relay for Engineering Students
 

Computer Network ppt.pptx

  • 1. Presentation on Classifier Of Computer Network OF BACHELOR OF ENGINEERING IN COMPUTER SCIENCE ENGINEERING By Khwaja Moinuddin Chishti Language University Lucknow Penta Tech
  • 2. 2 2 Table of Contents Introduction classifier of Computer Network Types of Classifiers of Computer Network The functionality of the classifier of Computer Network The benefit of classifier of Computer Network Conclusion of Classifier of Computer Network Application of classifier of Computer Network Introduction A classifier is a fundamental component of computer networks that helps in the management and optimization of network traffic. It is an essential tool for network administrators to ensure that data packets are prioritized, thus enhancing network performance and reducing congestion.
  • 3. 3 Types of Classifiers of Computer Network There are several types of classifiers that are commonly used in computer networks:- 1. Port-based Classifier * This classifier assigns a priority level to packets based on the port number they are using. * It is commonly used to prioritize traffic for specific applications, such as email or web browsing. 2. Flow-based Classifier * This classifier assigns a priority level to packets based on the flow of traffic. * It is commonly used to manage traffic for applications that generate a large number of connections, such as peer-to-peer file sharing. 3. Destination-based Classifier * This classifier assigns a priority level to packets based on their destination address. * It is used to direct traffic to specific destinations, such as servers or storage devices. 4. Source-based Classifier * This classifier assigns a priority level to packets based on their source address. * It is commonly used to manage traffic from specific sources, such as remote offices or mobile devices. 5. Quality of Service (QoS) Classifier * This classifier assigns a priority level to packets based on the QoS requirements of the network. * It is commonly used in service provider networks to manage traffic for different customers or services, such as voice or video conferencing.
  • 4. 4 Functionality * The classifier is responsible for analyzing data packets based on certain criteria, such as their source and destination IP addresses, ports, and protocol types. * Based on this analysis, the classifier assigns a priority level to the packet and forwards it to the appropriate destination. * This prioritization ensures that time-sensitive traffic, such as VoIP and video streaming, receives priority over non-critical traffic, such as file transfers and email. * Additionally, the classifier can also be used for traffic shaping, which involves regulating the flow of traffic to prevent congestion and ensure optimal network performance. Application * The classifier is commonly used in enterprise networks, data centers, and service provider networks. * The classifier is used to manage network traffic and prioritize traffic for different customers and services. * The classifier is used to manage network traffic and prioritize critical applications. * The classifier is used to optimize the flow of traffic between servers and storage devices
  • 5. 5 Benefits * Firstly, it improves network performance by reducing packet loss and congestion, resulting in faster and more reliable data transfers. The benefits of using a classifier for computer networks are numerous. * Thirdly, it provides network administrators with greater control over network traffic, enabling them to manage bandwidth usage and optimize network resources. * Secondly, it ensures that critical traffic is given priority, reducing latency and improving the user experience. Conclusions * The classifier is a critical component of computer networks that provides network administrators with greater control over network traffic, improves network performance, and ensures that critical traffic is given priority. * The importance of the classifier in network management and optimization cannot be overstated, and it is a tool that every network administrator should have in their arsenal. * Its applications are diverse, and it is used in various network environments, such as enterprise networks, data centers, and service provider networks. Thank You.
  • 6. THANK YOU Pe n t a Te c h K M C LU p e n t a t e c h 2 0 5 0 @ g m a i l . c o m U tta r P ra d e s h