network router
Recently Published Documents


TOTAL DOCUMENTS

58
(FIVE YEARS 12)

H-INDEX

7
(FIVE YEARS 0)

Author(s):  
Anwer Sabah Ahmed ◽  
Heyam A. Marzog ◽  
Laith Ali Abdul-Rahaim

Every day, the technologies are expanding and developed with extra things to them. A cloud computing (CC) and Internet of things (IoT) became deeply associated with technologies of the internet of future with one supply the other a way helping it for the successful. Arduino microcontroller is used to design robotic arm to pick and place the objects by the web page commands that can be used in many industrials. It can pick and place an object from source to destination and drive the screws in into its position safely. The robot arm is controlled using web page designed by (html) language which contain the dashboard that give the commands to move the servos in the desired angle to get the aimed direction accordingly. At the receiver end there are four servo motors which are made to be interfaced with the micro controller (Arduino) which is connected to the wireless network router. One of these is for the arm horizontally movement and two for arm knee, while the fourth is for catch tings or tight movement. Two ultra-sonic sensors are used for limiting the operation area of the robotic arm. Finally, Proteus program is used for the simulation the controlling of robot before the hardware installation


2021 ◽  
Vol 2021 ◽  
pp. 1-32
Author(s):  
Ali Seyfollahi ◽  
Ali Ghaffari

IPv6 routing protocol for low-power and lossy networks (RPL) has been developed as a routing agent in low-power and lossy networks (LLN), where nodes’ resource constraint nature is challenging. This protocol operates at the network layer and can create routing and optimally distribute routing information between nodes. RPL is a low-power, high-throughput IPv6 routing protocol that uses distance vectors. Each sensor-to-wire network router has a collection of fixed parents and a preferred parent on the path to the Destination-oriented directed acyclic graph (DODAG) graph’s root in steady-state. Each router part of the graph sends DODAG information object (DIO) control messages and specifies its rank within the graph, indicating its position within the network relative to the root. When a node receives a DIO message, it determines its network rank, which must be higher than all its parents’ rank, and then continues sending DIO messages using the trickle timer. As a result, DODAG begins at the root and eventually extends to encompass the whole network. This paper is the first review to study intrusion detection systems in the RPL protocol based on machine learning (ML) techniques to the best of our knowledge. The complexity of the new attack models identified for RPL and the efficiency of ML in intelligent and collaborative threats detection, and the issues of deploying ML in challenging LLN environments underscore the importance of research in this area. The analysis is done using research sources of “Google Scholar,” “Crossref,” “Scopus,” and “Web of Science” resources. The evaluations are assessed for studies from 2016 to 2021. The results are illustrated with tables and figures.


Author(s):  
Budi Jaya ◽  
Y Yuhandri ◽  
S Sumijan

Denial of Service (DoS) attacks are one of the most common attacks on website, networks, routers and servers, including on router mikrotik. A DoS attack aims to render a network router unable to service requests from authorized users. The result will disrupt the operational activities of the organization and cause material and non-material losses. In this study, a simulation and analysis of DoS attacks using the Live Forensics method were carried out and the router security enhancement from rectangular software and hardware. From the research results obtained digital evidence of DoS attacks in the form of IP addresses and attacker activity logs. In addition, the increase in router security in terms of software by using Firewall Filter and Firewall Raw has proven effective in preventing attacks. While improving router security in terms of hardware by setting a reset button on the router and firewall devices is also very necessary so that the router can avoid physical attacks by irresponsible persons


Author(s):  
Budi Jaya ◽  
Yuhandri Yunus ◽  
S Sumijan

Denial of Service (DoS) attacks are one of the most common attacks on website, networks, routers and servers, including on router mikrotik. A DoS attack aims to render a network router unable to service requests from authorized users. The result will disrupt the operational activities of the organization and cause material and non-material losses. In this study, a simulation and analysis of DoS attacks using the Live Forensics method were carried out and the router security enhancement from rectangular software and hardware. From the research results obtained digital evidence of DoS attacks in the form of IP addresses and attacker activity logs. In addition, the increase in router security in terms of software by using Firewall Filter and Firewall Raw has proven effective in preventing attacks. While improving router security in terms of hardware by setting a reset button on the router and firewall devices is also very necessary so that the router can avoid physical attacks by irresponsible persons.


Author(s):  
Tadeusz Czachorski ◽  
Erol Gelenbe ◽  
Godlove Suila Kuaban ◽  
Dariusz Marek

INOVA-TIF ◽  
2020 ◽  
Vol 2 (1) ◽  
pp. 22
Author(s):  
Heri Gunawan

<p><em>Mikrotik RouterOs ™ is an operating system and software that can be used to make a computer a reliable network router, designed to provide convenience for its users, the administration can be done through Windows application (Winbox), The server is a computer system that provides certain types of services (services) in a computer network, the server is supported by a processor that is scalable and a large ram is also equipped with a special operating system, called a (network operating system). The internet provides a lot of useful content if the user uses the internet well, besides that the<strong> </strong>internet can also have a negative impact on its users if the internet is used for negative things which will affect the young generation who will embrace this country to be the successor of this nation. outside the prevailing norms. Today the internet has many different types of social networking sites that have been used by many people, the goal or One of the solutions is that internet users do not access the negative or self-detrimental effects, using the Scientific of Inquiry method by limiting access to websites Specifically for prevention efforts in accessing negative internet sites in this case containing pornographic content is by blocking these negative sites permanently using a web proxy that serves to block some websites that cannot be accessed by clients through a browser on the Mikrotik Faculty of Engineering routers Ibn Khaldun Universit</em></p>


Sign in / Sign up

Export Citation Format

Share Document