ip block
Recently Published Documents


TOTAL DOCUMENTS

35
(FIVE YEARS 6)

H-INDEX

4
(FIVE YEARS 0)

2020 ◽  
Vol 96 (3s) ◽  
pp. 605-608
Author(s):  
М.А. Горчакова

Данная работа посвящена разработке IP-блока, выполняющего функцию умножителя частоты, для цифрового радиационно стойкого БМК серии 5540ТН014, изготовленного по технологии КНИ 180 нм. В ходе работы было получено RTL-описание данного IP-блока и спроектирована его топология. Также в работе отображены результаты поведенческого моделирования в условиях, приближенных к реальным. This work is devoted to the design of an IP-block that performs the function of a frequency multiplier for a digital radiation-resistant ULA of the 5540TN014 series manufactured using SOI 180 nm technology. During the work, RTL description of this IP block has been obtained and its topology has been designed. The paper also displays the results of behavioral modeling in conditions close to real ones.


2019 ◽  
Vol 8 (1) ◽  
pp. 56-61
Author(s):  
Januar Ariq Pratama

State Polytechnic of Malang is an educational institution based on technique where the database is needed here, the database itself is important data that must be stored and cannot be seen by others. Database security must be developed and prioritized so that no one breaks into important data on the server. This whitelist method utilizes a port that can block port access to outside networks that are vulnerable to criminal acts, this method uses ssh as a medium to manage control of an ip address. The ip address will be added a port behind it. Use IP block with Linux OS and tested via the web and laptop using a local access point. The test results show that the quality used for security is whitelist, where this method is used for the IP security used. IP block and unblock process can be done well. The process of adding and deleting ports can be done well. So that in general, the whole system is running well and easy access.


2018 ◽  
Vol 7 (2) ◽  
pp. 61-67
Author(s):  
Iga Revva Princiss Jeinever

Computer networks are basically not safe to access freely. Security gaps in the network can be seen by irresponsible people with various techniques. Opening a port for access carries a high risk of being attacked by an attacker. In this connection, network administrators are required to work more to be able to secure the computer network they manage. One form of network security that is often used by network administrators in server management is through remote login such as ports on telnet, SSH, etc. A port that is always open is a network security hole that can be used by people who are not responsible for logging into the server. Focusing on these problems, in this study, Random Port Knocking is the right way and can be used to increase network security. With Random Port Knocking, the port will be opened as needed, the port will automatically change when it fails to log in more than three times and IP will automatically be blocked and access will not continue so that attacks on the network can be avoided and network security stability can be further improved. The final result of this research shows that the method applied in this research makes server safe. Because port randomization and IP block make irresponsible parties try harder to penetrate firewall walls.


Author(s):  
Muhamad Asraf Ahmad Ibrahim ◽  
Mohamad Fahmi Muhsain ◽  
Ezni Aznida Kamal Baharin ◽  
Ya-Chieh Lai ◽  
Philippe Hurat ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document