1. Presentation on
Classifier Of Computer Network
OF
BACHELOR OF ENGINEERING
IN
COMPUTER SCIENCE ENGINEERING
By
Khwaja Moinuddin Chishti Language University Lucknow
Penta Tech
2. 2
2
Table of Contents
Introduction classifier of Computer Network
Types of Classifiers of Computer Network
The functionality of the classifier of Computer Network
The benefit of classifier of Computer Network
Conclusion of Classifier of Computer Network
Application of classifier of Computer Network
Introduction
A classifier is a fundamental component of computer networks that helps in the management and optimization
of network traffic.
It is an essential tool for network administrators to ensure that data packets are prioritized, thus enhancing
network performance and reducing congestion.
3. 3
Types of Classifiers of Computer Network
There are several types of classifiers that are commonly used in computer networks:-
1. Port-based Classifier
* This classifier assigns a priority level to packets based on the port number they are using.
* It is commonly used to prioritize traffic for specific applications, such as email or web
browsing.
2. Flow-based Classifier
* This classifier assigns a priority level to packets based on the flow of traffic.
* It is commonly used to manage traffic for applications that generate a large number of connections,
such as peer-to-peer file sharing.
3. Destination-based Classifier
* This classifier assigns a priority level to packets based on their destination address.
* It is used to direct traffic to specific destinations, such as servers or storage devices.
4. Source-based Classifier
* This classifier assigns a priority level to packets based on their source address.
* It is commonly used to manage traffic from specific sources, such as remote offices or mobile
devices.
5. Quality of Service (QoS) Classifier
* This classifier assigns a priority level to packets based on the QoS requirements of the network.
* It is commonly used in service provider networks to manage traffic for different customers or
services, such as voice or video conferencing.
4. 4
Functionality
* The classifier is responsible for analyzing data packets based on certain criteria, such as their source and
destination IP addresses, ports, and protocol types.
* Based on this analysis, the classifier assigns a priority level to the packet and forwards it to the appropriate
destination.
* This prioritization ensures that time-sensitive traffic, such as VoIP and video streaming, receives priority over
non-critical traffic, such as file transfers and email.
* Additionally, the classifier can also be used for traffic shaping, which involves regulating the flow of traffic to
prevent congestion and ensure optimal network performance.
Application
* The classifier is commonly used in enterprise networks, data centers, and service provider networks.
* The classifier is used to manage network traffic and prioritize traffic for different customers and services.
* The classifier is used to manage network traffic and prioritize critical applications.
* The classifier is used to optimize the flow of traffic between servers and storage devices
5. 5
Benefits
* Firstly, it improves network performance by reducing packet loss and congestion, resulting in faster and more
reliable data transfers.
The benefits of using a classifier for computer networks are numerous.
* Thirdly, it provides network administrators with greater control over network traffic, enabling them to
manage bandwidth usage and optimize network resources.
* Secondly, it ensures that critical traffic is given priority, reducing latency and improving the user experience.
Conclusions
* The classifier is a critical component of computer networks that provides network administrators with greater
control over network traffic, improves network performance, and ensures that critical traffic is given priority.
* The importance of the classifier in network management and optimization cannot be overstated, and it is a
tool that every network administrator should have in their arsenal.
* Its applications are diverse, and it is used in various network environments, such as enterprise networks, data
centers, and service provider networks.
Thank You.
6. THANK YOU
Pe n t a Te c h K M C LU p e n t a t e c h 2 0 5 0 @ g m a i l . c o m
U tta r P ra d e s h