scholarly journals APLIKASI MONITORING DAN CONTROLLING SERVER MENGGUNAKAN PROTOCOL ICMP (INTERNET CONTROL MESSAGE PROTOCOL) DAN SSH (SECURE SHELL) BERBASIS WEBSITE

2020 ◽  
Vol 4 (1) ◽  
pp. 397-403
Author(s):  
Redo Pratama ◽  
Mira Orisa ◽  
FX Ariwibisono

Sistem monitoring server sangat dibutuhkan bagi seorang administrator. Sebab memastika setiap server dalam kondisi yang baik merupakan tugas utama dari administrator, karena sifat server yang harus dalam kondisi online atau hidup setiap Sistem monitoring yang saat ini digunakan ialah dengan cara mengecek setiap server yang dikelolanya. Dengan cara tersebut maka administrator dapat mengetahui kondisi fisik serta keadaan server dalam keadaan up atau down.                 Dengan menggunakan protocoi ICMP (Internet Control Message Protocol) untuk menjalankan fitur monitoring server secara real time, serta menggunakan protocol SSH (Secure Shell) untuk melakukan kontrol server dan juga melakukan transfer file ke server. Dalam Aplikasi monitoring dan kontrol server yang diterapkan dan diuji cobakan dalam sebuah jaringan lokal di Laboratorium Jaringan Komputer Tektnik Informatika S-1 ITN Malang.                 Kegiatan monitoring dapat dilakukan melalui aplikasi ini adalah memantau kondisi real time dari server yang dikelola dalam kondisi up atau down serta, apabila server dalam keadaan down maka administrator akan memperoleh sebuah notifikasi. Fitur kontrol server yang dapat dilakukan dalam aplikasi ini ialah mematikan atau menjalankan ulang server, mengolah service yang bejalan diserver, serta fitur untuk melakukan pengiriman file kesebuah server.

2022 ◽  
Vol 71 (2) ◽  
pp. 2315-2331
Author(s):  
Tengfei Tu ◽  
Wei Yin ◽  
Hua Zhang ◽  
Xingyu Zeng ◽  
Xiaoxiang Deng ◽  
...  

Author(s):  
Ali Gezer

Delay related metrics are significant quality of service criteria for the performance evaluation of networks. Almost all delay related measurement and analysis studies take into consideration the reachable sources of Internet. However, unreachable sources might also shed light upon some problems such as worm propagation. In this study, we carry out a delay measurement study of unreachable destinations and analyse the delay dynamics of unreachable nodes. 2. Internet Control Message Protocol (ICMP) destination unreachable Internet Control Message Protocol-Destination Unreachable (ICMP T3) packets are considered for the delay measurement according to their code types which shows network un reach ability, host un reach ability, port un reach ability, etc. Measurement results show that unreachable sources exhibit totally different delay behaviour compared to reachable IP hosts. A significant part of the unreachable hosts experiences extra 3 seconds Round Trip Time (RTT) delay compared to accessible hosts mostly due to host un reach ability. It is also seen that, approximately 79% of destination un reach ability causes from host un reach ability. Obtained Hurst parameter estimation results reveal that unreachable host RTTs show lower Hurst degree compared to reachable hosts which is approximately a random behaviour. Unreachable sources exhibit totally different distributional characteristic compared to accessible ones which is best fitted with Phased Bi-Exponential distribution.


Author(s):  
Qing Li ◽  
Tatuya Jinmei ◽  
Keiichi Shima

Author(s):  
Zhengrong Tao ◽  
Zhenxing Yin

In this paper, the authors present a method of measuring the switching time of a dual redundant NIC. The accuracy of the authors’ method of measuring switching time can reach milliseconds. The authors’ method uses Internet Control Message Protocol (ICMP) packets to test, is easy to operate, has high precision, and can be applied to all types of dual redundant device switching time measurement.


Author(s):  
Abidah Hj Mat Taib ◽  
Wan Nor Ashiqin Wan Ali ◽  
Nurul Sharidah Shaari

Handling Internet Control Message Protocol version 6 (ICMPv6) vulnerabilities is among the challenges in securing the IPv6 deployment. Since ICMPv6 messages are crucial in IPv6 communications, this paper discusses the discovery of ICMPv6 vulnerabilities by producing a threat model of ICMPv6 vulnerabilities and proposing the use of Selective Filtering ICMPv6 Messages (SF-ICMP6) to handle some of the vulnerabilities. An experiment was conducted to verify the threat model by observing and discussing the usage of ICMPv6 threat model together with SF-ICMP6. The findings showed that the attack derived in the threat model is possible and the countermeasure associated with it is appropriate. As for SF-ICMP6, selectively filtering messages should be enforced because different messages require filtering of different type and code. It is expected that with the use of threat model and SF-ICMP6, maintaining and securing ICMPv6 messages in IPv6 deployment is attainable.


Sign in / Sign up

Export Citation Format

Share Document