Abstract

In this paper, the neural network (NN) is used to control the remote IP address that related to user device. When the IP address assigned carefully and controlled by a novel tool, the work performance and service quality will be better. The input for the NN determined depending on the repeated problem in recent networks and the available parameters which are in the main server node. The training process done by determining the required training function and activation function for all neurons in the NN. The performance of the proposed method was (1*10-20) or less in more cases and the error of the learning process is nearly (1*10-6). In addition to IP address control, the proposed method is a good manner to optimize the security issue by specializing an IP address for a given user that can't be used by other device. Finally, the NN subject the produced IP address for the given users for test and validation which reached to the goal at smallest time (~0.0001s) and little number of iteration (9 - 20) epoch.

Highlights

  • In a communication network information is transferred from one node to another as data packets [1]

  • An address conflict scenario might go like this device A starts up and uses IP address 10.88.80.10 Other devices establish and carry on communications with Device A

  • New communications initiated by other devices could go to Device A or Device B.In such situations, it can be difficult to determine that there even is an address conflict situation, and where the offending device is located

Read more

Summary

Introduction

In a communication network information is transferred from one node to another as data packets [1]. It is necessary to obtain Internet access for all types of network devices (fixed and mobile wireless devices), in any possible way and at any place This is extremely important if we bear in mind that the use of wireless devices, like smart phones, mobile phones, PDAs, laptops etc. Some services have a higher priority than others, in particular services in real time [5] Another important point of development is, for example, the increasing routing tables according to which the routers determine the path for each link [6]. The packets, which are the remote end (user device) repeatedly, send and receive them to the main server for handshaking process. The proposed system contains different types of inputs, such as: the device name, signal strength and sector number). Sector No Type of Service Mean Packets Tx/Rx Signal Strength Receiver Type DHCP IP address

Training Procedure
Results
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.