2022
DOI: 10.15837/ijccc.2022.5.4815
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Approach towards Network Routing using Genetic Algorithm

Abstract: The network field has been very popular in recent times and has aroused much of the attention of researchers. The network must keep working with the varying infrastructure and must adapt to rapid topology changes. Graphical representation of the networks with a series of edges varying over time can help in analysis and study. This paper presents a novel adaptive and dynamic network routing algorithm based on a Regenerate Genetic Algorithm (RGA) with the analysis of network delays. With the help of RGA at least… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 19 publications
0
5
0
Order By: Relevance
“…Another issue we take into consideration is the packet size; the normal packet size for a TCP connection may difer from one session to another for the same IP address or from one IP address to another, but if the same IP address has the same packet size in the TCP connections established at a diferent time, this means that the IP address could be an attacker, and the fag in the database must be checked, and urgent action must be taken. Equation (2) shows how the average packet size is computed and compared.…”
Section: Experiments Andmentioning
confidence: 99%
See 1 more Smart Citation
“…Another issue we take into consideration is the packet size; the normal packet size for a TCP connection may difer from one session to another for the same IP address or from one IP address to another, but if the same IP address has the same packet size in the TCP connections established at a diferent time, this means that the IP address could be an attacker, and the fag in the database must be checked, and urgent action must be taken. Equation (2) shows how the average packet size is computed and compared.…”
Section: Experiments Andmentioning
confidence: 99%
“…Te attacker controls a command and control server that is used to operate the bots remotely. Te control and command server (one of the bots in the botnet) is used by the attacker to direct and teach the other bots individually and collectively at the same time [2]. By infecting the network server, the botnet's size can grow.…”
Section: Introductionmentioning
confidence: 99%
“…Berberler, Z. N. et al [15] conducted a node importance analysis in wheel-related networks by using a method of evaluating node importance through node contraction based on network agglomeration in communication networks. Obeidat, A. et al [16] presented a novel adaptive and dynamic network routing algorithm based on a regenerating genetic algorithm (RGA) with the analysis of network delays, the deletion of links or nodes from the network, and the assessment of the network volume (with numerous routes). Choi, W. Y.…”
Section: Introductionmentioning
confidence: 99%
“…Distance learning is form of E-learning teaching method which is now adopted to overcome challenges faced by traditional methods of teaching. Remotely, this is accomplished by implementing a formal educational program that consists of a variety of courses designed to meet predetermined goals [4]. In distance learning, the organization itself, as well as media and technological interactions like email emphasize on using interactive platforms of communication between learners and instructors [5].…”
Section: Introductionmentioning
confidence: 99%