International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 112

Research Paper | Information Technology | India | Volume 4 Issue 3, March 2015


Analysis and Data Retrieval by Filtering Packets in High Speed Routers

Indumathi, K. Kumar


Abstract: In this paper, we are going to decompose the operation of multimatch packet classification from the complicated multidimensional search to several single-dimensional searches, and present an asynchronous pipeline architecture based on a signature tree structure to combine the intermediate results returned from single-dimensional searches. By spreading edges of the signature tree across multiple hash tables at different stages, the pipeline can achieve a high throughput via the interstate parallel access to hash tables. Two edge-grouping algorithms are designed to evenly divide the edges associated with each stage into multiple work-conserving hash tables. The proposed pipeline architecture outperforms Hyper Cuts and B2PC schemes in classification speed by at least one order of magnitude, while having a similar storage requirement. Particularly, with different types of classifiers of 4K rules, the proposed pipeline architecture is able to achieve a throughput between 26.8 and 93.1 GB/s using perfect hash tables. Multiple string match is an important problem in many application areas of computer for instance there is an increasing demand for fast analysis and data retrieval although there are various kinds of comparison tools that provide aligning and approximate matching most of them are based on exact matching in order to speed up the process. Multiple string match is an important problem in many application areas of computer for instance there is an increasing demand for fast analysis and data retrieval although there are various kinds of comparison tools that provide aligning and approximate matching most of them are based on exact matching in order to speed up the process. Another important usage of multiple string matching algorithms appears in NIDS [network intrusion detection systems]. Snort is a light weight open source NIDS which can filter packets based on predefined rules. Another important usage of multiple string matching algorithms appears in NIDS [network intrusion detection systems]. Snort is a light weight open source NIDS which can filter packets based on predefined rules.


Keywords: Multimatch packet, High-speed routers, Data retrieval, NIDS, TCOM


Edition: Volume 4 Issue 3, March 2015,


Pages: 1127 - 1130


How to Cite this Article?

Indumathi, K. Kumar, "Analysis and Data Retrieval by Filtering Packets in High Speed Routers", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=SUB152286, Volume 4 Issue 3, March 2015, 1127 - 1130

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Data retrieval'

Downloads: 108

Survey Paper, Information Technology, India, Volume 3 Issue 12, December 2014

Pages: 2037 - 2040

A Survey on Privacy Protection in Personalized Web Search

Khwaja Aamer, Dr. A.S Hiwale

Share this Article

Downloads: 136

Case Studies, Information Technology, India, Volume 3 Issue 6, June 2014

Pages: 69 - 74

Profile Impostoring: A Use Case on the Rising Social Engineering Attack on Facebook Users

Cephas Mawere, Thabiso Peter Mpofu

Share this Article

Similar Articles with Keyword 'TCOM'

Downloads: 179

Research Paper, Information Technology, Afghanistan, Volume 8 Issue 9, September 2019

Pages: 235 - 240

IT Based Land Suitability Modeling for Urban Development Using GIS: A Case Study of Kabul City, Afghanistan

Hazrat Mohammad Wahdaty

Share this Article

Downloads: 100

Survey Paper, Information Technology, India, Volume 3 Issue 6, June 2014

Pages: 1064 - 1066

A Survey on Anti-Poaching Strategies

Addlight Mukwazvure, Tirivangani BHT Magadza

Share this Article

Similar Articles with Keyword 'packet'

Downloads: 105

Research Paper, Information Technology, Indonesia, Volume 4 Issue 4, April 2015

Pages: 3058 - 3063

The Designing of Measurement Instrument for Information Technology Risk Assessment as a Risk Management Strategy Recommendation at SBUPE Bandung

Yudi Priyadi, Suhardi

Share this Article

Downloads: 110

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 3 Issue 6, June 2014

Pages: 825 - 828

An Efficient Rushing Attack Prevention Algorithm for MANET Using Random Route Selection

Aakanksha Jain, Samidha Dwivedi Sharma

Share this Article

Similar Articles with Keyword 'routers'

Downloads: 97

Survey Paper, Information Technology, India, Volume 4 Issue 5, May 2015

Pages: 2568 - 2570

Survey on NMS Supporting Network Elements implementing Heterogeneous Protocols

Sheik Nousheen Taj, Dr. Sagar B M

Share this Article

Downloads: 122

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 969 - 973

Test Usability of Routing Protocol for QoS Parameters in Cloud

Murtuza Petladwala

Share this Article

Similar Articles with Keyword 'Data'

Downloads: 322 | Weekly Hits: ⮙1 | Monthly Hits: ⮙6

Survey Paper, Information Technology, Ghana, Volume 8 Issue 6, June 2019

Pages: 64 - 69

The Use of Information and Communication Technology (ICT) in Teaching and Learning of Mathematics in Al-Faruq College of Education, Wenchi-Ghana

Abu Sulemana, Yahuza Abdul-Kadir

Share this Article

Downloads: 1

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 174 - 178

Android Notes using Finger Print Authentication

Vaibhav Garg, Siddharth Yadav, Rishabh Kamal

Share this Article

Similar Articles with Keyword 'retrieval'

Downloads: 103

Research Paper, Information Technology, India, Volume 1 Issue 1, December 2012

Pages: 171 - 173

Automatic Vehicles Number Plate Identification using Image Segmentation and Comparison Techniques

Gurjinder Pal Singh, Chhailadeep Kaur

Share this Article

Downloads: 104

Research Paper, Information Technology, India, Volume 3 Issue 4, April 2014

Pages: 503 - 507

Information Extraction Using RDBMS and Stemming Algorithm

Venkata Sudhakara Reddy.Ch, Hemavathi.D

Share this Article
Top