scholarly journals Analysis of IPv6 jumbogram packages transmission using jumbo frame in mikrotik-based tunneling

Author(s):  
Yahya Hidayatullah ◽  
Arief Marwanto ◽  
Imam Much Ibnu Subroto

The validation and accuracy of internet protocol version 6 (IPv6) performance using jumbo frames is still not perfect, due to peer-to-peer connections testing within the same operating system and between operating systems. Therefore, inaccurate data test results. To mitigated, testing with a wider platform is recommended, a medium-scale network connection is proposed such as metropolitan area networks. In this works, a connection between computer devices connected by three proxy routers are made, with different IPv6 segments on each port. Then each computer device sends traffic data to each other using a traffic-generator application. The first test through three routers without tunnel connection is carried out as the first scenario to compare performance with tunnel-based testing. Three parameters have been used in this test, such as maximum transfer unit (MTU) 1500 bytes, MTU 400 bytes and MTU 9000 bytes. The results of the tests conducted show that the use of jumbo frames using a proxy is less effective, even though it produces a larger throughput when using the MTU 4000, but there is fragmentation in the packet passing through the proxy because the packet passing through the proxy is split into 1500 byte sizes.

2014 ◽  
Vol 2014 ◽  
pp. 1-10 ◽  
Author(s):  
Liang Fu Lu ◽  
Zheng-Hai Huang ◽  
Mohammed A. Ambusaidi ◽  
Kui-Xiang Gou

With the rapid growth of data communications in size and complexity, the threat of malicious activities and computer crimes has increased accordingly as well. Thus, investigating efficient data processing techniques for network operation and management over large-scale network traffic is highly required. Some mathematical approaches on flow-level traffic data have been proposed due to the importance of analyzing the structure and situation of the network. Different from the state-of-the-art studies, we first propose a new decomposition model based on accelerated proximal gradient method for packet-level traffic data. In addition, we present the iterative scheme of the algorithm for network anomaly detection problem, which is termed as NAD-APG. Based on the approach, we carry out the intrusion detection for packet-level network traffic data no matter whether it is polluted by noise or not. Finally, we design a prototype system for network anomalies detection such as Probe and R2L attacks. The experiments have shown that our approach is effective in revealing the patterns of network traffic data and detecting attacks from large-scale network traffic. Moreover, the experiments have demonstrated the robustness of the algorithm as well even when the network traffic is polluted by the large volume anomalies and noise.


Author(s):  
Zoltán Czirkos ◽  
Gábor Hosszú

The importance of the network security problems come into prominence by the growth of the Internet. The article presents a new kind of software, which uses just the network, to protect the hosts and increase their security. The hosts running this software create an Application Level Network (ALN) over the Internet. Nodes connected to this ALN check their operating systems’ log files to detect intrusion attempts. Information collected is then shared over the ALN to increase the security of all peers, which can then make the necessary protection steps by oneself. The developed software is named Komondor (Czirkos, 2006), which is a famous Hungarian guard dog. The novelty of the system Komondor is that Komondor nodes of each host create a Peer-To-Peer (P2P) overlay network. Organization is automatic; it requires no user interaction. This network model ensures stability, which is important for quick and reliable communication between nodes. By this build-up, the system remains useful over the unstable network. The use of the peer-to-peer network model for this purpose is new in principle. Test results proved its usefulness. With its aid, real intrusion attempts were blocked. This software is intended to mask the security holes of services provided by the host, not to repair them. For this it does not need to know about the security hole in detail. It can provide some protection in advance, but only if somewhere on the network an intrusion was already detected. It does not fix the security hole, but keeps the particular attacker from further activity.


2021 ◽  
Vol 2111 (1) ◽  
pp. 012005
Author(s):  
Erwan Eko Prasetiyo

Abstract A brushless motor and propeller test stand is used to test brushless motors and propellers. This testing instrument is still only available in research laboratories. Students and researchers are unable to use laboratory facilities because of the Covid-19 epidemic, thus students must be able to do tests independently from home. Purchasing this testing instrument would be too expensive for students. It is essential to construct a brushless motor and propeller testing instrument at home using simple components that are easy to get on the marketplace. The design concept reads force data using a loadcell sensor and an HX711 driver, and current and voltage data with an INA 219 sensor. The brushless motor’s rotational speed is controlled by a potentiometer. Force, current, voltage, and power are all examples of test results data. A 16×2 LCD is used to show data immediately. Data is also transmitted via a USB connection to a computer device for storage or additional analysis. This study proposes a simple brushless motor and propeller test stand that can measure forces from 0 gf to 1000 gf with an error rate of 0.72 %. The power that can be read ranges from 0 mW to 18960 mW, with a 0.59 % error rate.


2019 ◽  
Vol 4 (1) ◽  
pp. 11-22
Author(s):  
Sri Hariyani ◽  
Fitria Nur Kusti Aisyah ◽  
Riski Nur Istiqomah Dinullah

This study aims to analyze errors by students in problem-solving of mathematical story based on Watson criteria. The subjects of this study were two high-ability students, two moderate-ability students, and two low-ability students. This study at class VII-C SMP NU Sunan Giri Kepanjen. The instruments used are written tests and interviews — the validity of the data checking by the triangulation of sources that compare test results and interview data. Data analysis used is data reduction, data presentation, and conclusions. The students' errors were analyzed using the Watson error category, which consisted of 8 errors. The results showed that based on Watson's error criteria, the mistakes that occurred were inaccurate data, improper procedures, skill hierarchy problems, missing data, nothing manipulation directly, conflict level response, missing conclusions and in addition to the seven categories. The results of this study are expected to be an input for the teacher about the types of student's errors at SMP Sunan Giri Kepanjen.


2014 ◽  
Vol 8 (1) ◽  
pp. 435-444 ◽  
Author(s):  
Peng Jian-sheng

In order to reduce pesticides in agricultural production caused by direct contact with the human body injury, and improve the efficiency of agricultural spraying operations, this paper proposes the design of intelligent WiFi wireless controlled spraying pesticides robots. For monitoring the microcontroller core, a wireless router for the network connection point is employed. The camera captures video, Android phones and smart monitoring system operation. Test results show that the design realizes spraying pesticides by robot to replace staff job, and achieves good results.


Author(s):  
Riduwan Napianto ◽  
Yuri Rahmanto ◽  
Rohmat Indra Borman ◽  
Ova Lestari ◽  
Nurhasan Nugroho

<em>The word uncertainty in an expert system is related to working with wrong data, wrong information, handling identical situations, the reliability of results, etc. Sources of uncertainty can come from unreliable information. This is usually caused by unclear domain concepts or for inaccurate data. One method for overcoming uncertainty is Dhempster-Shafer's theory. Dempster-shafers come up with approaches to calculate probabilities to look for evidence based on trust functions. In general the Dempster-Shafer theory is written at an interval [Confidence, Reasonable]. Belief (Bel) is a measure of the strength of evidence in support of a series of propositions. In this study an expert system will be developed to diagnose oral cancer that can recognize oral cancer based on the symptoms felt by the user. The results showed the Dempster-shafer was able to overcome the uncertainties in the construction of the inference engine, this is because the accuracy of the test results showed an accuracy of 86.6% Dempster-shafer</em>.


Author(s):  
Jauharoh Pratami ◽  
Ahmad Subhan Yazid ◽  
Agung Fatwanto

Hijaiyah letters are letters used in the writing of the Holy Qur'an. In learning hijaiyah letters, many children still have difficulties so alternative learning methods are needed to make children more interested in recognizing hijaiyah letters. Interactive hijaiyah learning using electronic media is also still rare. Of the several hijaiyah letter recognition applications which are available, it is also limited in the use of certain operating systems. This research uses the waterfall method. The technology used to build web-based games in this study is HTML5 because HTML5 has the advantage of the flexibility to run on various platforms through a browser. In addition, this application does not require an installation process like other applications, but simply by accessing the web page, the application can be used. The results of this study are Hijaiyah Match games that can be run on various operating systems through a browser. The test results show that this application can help children learn hijaiyah letters.


Author(s):  
Rindi Wulandari

<p class="AbstractEnglish"><strong>Abstract:</strong> Maintaining health is very important for life especially in the current Covid-19 pandemic. One of the protocols imposed by the government for people who do in public spaces or open facilities is to check body temperature. In this study, arduino-based body temperature gauges were designed to have reminder alarms if the body temperature was above 37.30 and connected to a computer device via bluetooth. This body temperature gauge utilizes the DS18B20 sensor to measure temperature in celsius (0C). Body temperature data is also displayed on the 16x2 (cm) LCD found on the appliance. The test results of body temperature measuring instruments compared to thermo guns and have a deviation range of 1.16% - 2.02%. This body temperature gauge is expected to be installed in public places that need to conduct checks on the people who will be active in the room, the operator can stand at the control table so that it does not come into direct contact with the community.</p><p class="AbstrakIndonesia"><strong>Abstrak:</strong> Menjaga kesehatan merupakan hal yang sangat penting bagi kehidupan terutama di masa pandemi Covid- 19 sekarang. Salah satu protokol yang diberlakukan oleh pemerintah bagi masyarakat yang berkegiatan di ruang umum atau fasilitas terbuka adalah memeriksa suhu tubuh. Dalam penelitian ini dibuat rancang bangun alat pengukur suhu tubuh berbasis arduino yang memiliki alarm pengingat jika suhu tubuh berada diatas angka 37.30 dan terhubung ke perangkat komputer melalui bluetooth. Alat pengukur suhu tubuh ini memanfaatkan sensor DS18B20 untuk mengukur suhu dalam satuan celcius (0C). Data suhu tubuh juga ditampilkan pada LCD 16x2 (cm) yang terdapat pada alat. Hasil pengujian alat ukur suhu tubuh dibandingkan dengan thermo gun dan memiliki rentang penyimpangan 1.16% - 2.02%. Alat pengukur suhu tubuh ini diharapkan dapat dipasang di tempat-tempat umum yang membutuhkan untuk melakukan pemeriksaan terhadap masyarakat yanga akan beraktifitas diruangan tersebut, operator dapat berdiri di meja kendali sehingga tidak kontak langsung dengan masyarakat.</p>


Sign in / Sign up

Export Citation Format

Share Document