server machine
Recently Published Documents


TOTAL DOCUMENTS

27
(FIVE YEARS 6)

H-INDEX

5
(FIVE YEARS 0)

2021 ◽  
Vol 14 (4) ◽  
pp. 45-57
Author(s):  
Priti Narwal ◽  
Deepak Kumar ◽  
Shailendra Narayan Singh ◽  
Peeyush Tewari

DoS (denial of service) assault is the most prevalent assault these days. It imposes a major risk to cybersecurity. At the point when this assault is propelled by numerous conveyed machines on a solitary server machine, it is called as a DDoS (distributed denial of service) assault. Additionally, DoS bypass on DHCP (dynamic host configuration protocol) server assault is a rising and famous assault in a system. The authors have proposed a stochastic intrusion detection game-based arrangement utilizing controlled Markov chain that figures the transition probabilities starting with one state then onto the next in a state transition diagram. At first, the authors have conjectured these assaults, and after that, they proposed a methodology that uses the idea of master and slave IPS (intrusion prevention system). This approach works well when mapped to these estimated assaults and accordingly helps in the recognition and counteractive action of these assaults in a cloud domain.


2021 ◽  
Author(s):  
Shivani Dhok ◽  
Prasanna Raut ◽  
Prabhat Kumar Sharma ◽  
Keshav Singh ◽  
Chih-Peng Li

A reconfigurable intelligent surface (RIS)-assisted wireless communication system with non-linear energy harvesting (EH) and ultra-reliable low-latency constraints is considered for its possible applications in industrial automation. A distant data-center (DC) communicates with the multiple destination machines with the help of a full-duplex (FD) server machine (SM) and RIS. Assuming the deficiency of enough transmission power at the FD-SM, the SM is considered in the near vicinity of the destinations in the industry to forward the data received from the distant DC. The reception at SM is assisted by the RIS and a non-linear hybrid power-time splitting (PTS) based EH receiver architecture is adopted to extend the lifespan of SM, thus increasing network lifetime. The scheduling of multiple destinations is done by SM based on the considered selection criteria namely, random (RND) scheduling, absolute (ABS) channel-power-based (CPB) scheduling and normalized (NRM) CPB scheduling. The end-to-end performance of the considered FD RIS-assisted network is analyzed, and the expressions for the block error rate (BLER) for all scheduling schemes are derived. Moreover, the effects of number of RIS elements, packet size, channel uses on the system performance are analyzed for the considered ultra-reliable and low-latency communication (URLLC) network. The scheduling fairness of all the scheduling schemes is also analyzed to study the performance-fairness trade-off. The derived analytical results are verified through Monte-Carlo simulations.


2021 ◽  
Author(s):  
Shivani Dhok ◽  
Prasanna Raut ◽  
Prabhat Kumar Sharma ◽  
Keshav Singh ◽  
Chih-Peng Li

A reconfigurable intelligent surface (RIS)-assisted wireless communication system with non-linear energy harvesting (EH) and ultra-reliable low-latency constraints is considered for its possible applications in industrial automation. A distant data-center (DC) communicates with the multiple destination machines with the help of a full-duplex (FD) server machine (SM) and RIS. Assuming the deficiency of enough transmission power at the FD-SM, the SM is considered in the near vicinity of the destinations in the industry to forward the data received from the distant DC. The reception at SM is assisted by the RIS and a non-linear hybrid power-time splitting (PTS) based EH receiver architecture is adopted to extend the lifespan of SM, thus increasing network lifetime. The scheduling of multiple destinations is done by SM based on the considered selection criteria namely, random (RND) scheduling, absolute (ABS) channel-power-based (CPB) scheduling and normalized (NRM) CPB scheduling. The end-to-end performance of the considered FD RIS-assisted network is analyzed, and the expressions for the block error rate (BLER) for all scheduling schemes are derived. Moreover, the effects of number of RIS elements, packet size, channel uses on the system performance are analyzed for the considered ultra-reliable and low-latency communication (URLLC) network. The scheduling fairness of all the scheduling schemes is also analyzed to study the performance-fairness trade-off. The derived analytical results are verified through Monte-Carlo simulations.


Author(s):  
Anthony Anggrawan ◽  
Raisul Azhar ◽  
Bambang Krismono Triwijoyo ◽  
Mayadi Mayadi

The use of server computer machines in companies is primarily a web hosting server that is very easy to experience threats, especially external security threats such as attempts to infiltrate, hacking, viruses, and other malicious attacks. Having a secure server is indispensable for working online and especially if involved in business-related network transactions. The Server's realization to be safe from threats is to protect the server machine's security on the hardware and software side and pay attention to network security that goes to the server machine. Generally, firewall applications on router devices have configuration limitations in securing the network, namely non-integrated applications. In other words, it is necessary to manage the perfect firewall configuration to anticipate Distributed Daniel attacks of Service (DDoS) attacks. Therefore, this study aims to integrate existing firewall applications for router devices into an integrated program to secure the network. The methodology used is the Network Development Life Cycle (NDLC). The research results on this developed application program can overcome DDoS attacks without setting up a firewall on the router device and can automatically monitor DDoS attack activities from outside the Server. Securing servers from DDoS attacks without setting up a firewall on the router device and automating the monitoring of DDoS attack activity from outside the Server are the novelties of this study that have not been available in previous studies.


2020 ◽  
Author(s):  
D. Kucuk ◽  
L. L Apriliana ◽  
N.N Diana

Cloud Computing technology Service and data stored on machine, the server this makes important factor engine server as a supporting service availability. More and more users are accessing the service will result in engine performance server load becomes heavier and less than optimal, because the service must work continuously to provide data that can be accessed anytime by the user via the network connected. Server hardware has a performance period. Likewise with software that may crash. With functionality server which provides services to the client, the server is required to have level of availability. A high this enables the engine server to experience downtime. Server machine must also be turned off for maintenance purposes. The purpose of this study is build Clustering Server to work together as a single system which over the virtual environment. This is a solution to overcome these problems. In this study researcher use a server virtualization proxmox, FreeNAS is a NAS server and DRBD to support high availability of services in the sphere of HA, data synchronization in a High Availability to perform mirroring another system machine. With the implementation of the method of HA and synchronization DRBD and NFS (Network File System) on a system cluster obtained results average migration time on node1 towards node2 reach 9.7(s), 3.7(s) for node2 towards node3, and 3(s) on node3 towards node1. Also obtained downtime less amounting 0.58 ms on node1, on node2 0.02 ms, and 0.02 ms on node3.


2016 ◽  
Vol 2 (8) ◽  
Author(s):  
PANKAJ ,

A wireless sensor network (WSN) is a spatially distributed autonomous sensor to monitor and cooperatively report information about physical or environmental conditions, such as temperature, sound, pressure, etc. through the network to a server machine. WSNs are typically enforced for assembling data from insecure surroundings. Nearly all security protocols for WSN believe that the unwelcome person is able to do entirely management over a detector node by manner of direct physical access. The looks of detector networks together of the most technology within the future has display numerous challenges to researchers. The challenges thrown by WSNs are distinctive given their delicate design and scant resources. Even supposing security for wireless networks has been a wide researched space for several decades, security for WSNs continues to be a serious roadblock for his or her potency and performance.


2016 ◽  
Vol 12 (08) ◽  
pp. 51 ◽  
Author(s):  
Arun Kumar N. P. ◽  
Jagadeesh Chandra A.P

Remote instrumentation and collaborative learning methods have enhanced the experimental learning aspects of engineering education. Automation is changing the nature of these laboratories and remote access techniques are providing access to server machine from anywhere in the world through internet. This provides an opportunity to develop the remote instrumentation laboratories using which students can perform their lab experiments remotely all over the day and thereby increasing the productivity of the lab setups and measuring instruments. This paper presents the detailed architecture and the implementation details of remote DSP lab instrumentation. LabVIEW user interface is developed to control all the test instruments and their related hardware interfaces. Radmin tool is used as remote access tool to integrate multiple clients to server machine through wired/wireless internet access. Hardware interface is designed and developed to route data and control signals from data acquisition card to the respective hardware and to control the test instruments.


Sign in / Sign up

Export Citation Format

Share Document