Computer games have been used as educational media or popularly named as educational games. However, most educational computer games that have been created can be played by one player. This study ...aims to build a multiplayer ladder and snake educational game focused on the server program as a moderator that handles players, player groups, and data traffic during the game is running. The game is built on Java socket programming and local area network (LAN) as a data communication medium between players. Whereas to handle the username and socket address of the whole player, the hash map data structure is used. A vector data structure is also used to manage data package sending for each player group. The experiment shows that the system works properly where the computer server’s performance is influenced by the specifications, especially the processor and random-access memory (RAM).
In recent years, Internet of Things (IoT) as an essential infrastructure for industrial development, environmental protection and human life enhancement has attracted researchers' attention. ...Currently, there are four hot research topics in IoT fields, including sensor design, communication scheme, secure transmission, and data mining. The LoRaWAN, an unlicensed band based long range wide area network specification, is very suitable for the activities or operations in an IoT environment due to its low power and long range communication. In the LoRaWAN, star-of-stars topology, asynchronous communication, and three communication modes are used to reduce its power consumption. In order to enhance the security of network communication, the LoRaWAN adopts the 128-bit Advanced Encryption Standard (AES-128) and utilizes two session keys: network session key and application session key, for encrypting/decrypting data between end devices and network/application servers. However, according to the LoRaWAN Backend Interfaces 1.0 Specification announced by LoRa Alliance in 2017, the application layer communication securities between two arbitrary servers (including network servers, join server, and application servers) are out of the specification's scope. That is to say that the important data transmitted from one server to another may be attacked, falsified, or stolen easily. In this paper, a session key generation method is proposed to generate session keys with which two servers can securely communicate with each other, especially enhancing the application layer communication securities undefined in the LoRaWAN Specification. By integrating elliptic curve cryptography and AES-128, the session keys for different pairs of servers are created. The security discussion shows that the proposed method provides the features of mutual authentication, confidentiality and message integrity. Besides, it can also help to resist replay and eavesdropping attacks.
Penelitian ini membangun jaringan menggunakan mikrotik yang bertujuan untuk memfasilitasi guru dan siswa untuk mencari informasi, memudahkan pekerjaan menggunakan komputer, memudahkan terhubung ke ...jaringan internet dan dapat berbagi data antara satu komputer dengan yang lain. Metode dalam penelitian ini menggunakan observasi, wawancara dan studi literatur. Hasil yang dicapai dalam penelitian ini adalah memaksimalkan dalam mengakses internet dan berbagi data, sehingga lebih memudahkan guru dan siswa untuk mencari informasi di dunia maya menggunakan internet.
This paper investigated DRAM DIMM errors using field records in replacement network servers. Large DRAM samples of about 40 K were collected over a 2.5 years period from 23 different server types, ...included various DIMMs from three different DRAM manufacturers with densities between 4 and 128 GB, and speeds between 1066 and 2400 Mbps. Errors that occurred during system operation were classified as either correctable (CE) or uncorrectable (UE) errors based on error correction code (ECC) schemes built into the servers. Of the collected DIMMS, 24% had recorded errors, where CE-only, UE-only, and UE and CE together comprised 28%, 43%, and 29% of recorded errors, respectively. Since UEs can cause large-scale failures, systems are replaced upon any UE occurrence. Approximately half UE-only DIMMs had 1 UE error. In contrast, many DIMMs had billions of CE errors, where a faulty location may be repetitively accessed. Such drastic differences in UE and CE counts help explain the importance of ECC and error mitigation schemes. Comparative analyses of errors were made over the manufacturers and operating speeds. After reasonable adjustments for repetitive counts of errors, failure in time (FIT) differences were up to 38% over manufacturers. Higher speed DIMMs generally had higher FIT with 2400 Mbps DIMMs exhibiting 6.7 times FIT of 1066 Mbps DIMMs.
As healthcare information technology (HIT) advances, major stakeholders in the healthcare industry such as healthcare providers, health plan organizations, and business associates are generating and ...exchanging enormous amounts of patient data throughout the healthcare supply chain. Along with the explosive growth of electronic patient data, these stakeholders have experienced an increasing number of data breaches. Despite the significant consequences of the data breaches such as the loss of client privacy, regulatory penalty, and financial loss, there is a lack of studies on sector level trend analysis and risk profiling. This study develops a diversity index that can be used to compare the distribution of data breaches between three sectors of the healthcare industry. To enhance the understanding of the data breaches, this study utilizes a temporal aggregation of the data breaches, analyzes data breach risks, and develops a data-driven risk profile. The findings of this study can be used to improve the cybersecurity management of healthcare organizations.
LoRaWAN® Certification of devices is critical for effective and efficient mass deployment of LoRaWAN Networks, as it ensures devices will work on any network, under all conditions. Certified Devices ...significantly reduce the support costs as any product failures detected later when the device is deployed is far more expensive to repair and poor RF performance of the device increase number of gateways needed and cost of the network infostructure.
This study aims to determine the contribution of administrative competence achievement and implementation of the network server prakerin against job readiness in the enterprise ISP vocational ...students in Malang on TKJ membership packages. Type and data analysis of this study are included in the quantitative research. The samples used as many as 205 students. The data collection for the implementation prakerin and job readiness in the enterprise ISP is done with a questionnaire, while for the variable competence network server administration skills do with documentation of the value. Data analysis included descriptive and regression. The results showed: (1) the contribution of the attainment of a network server administration skills to work in the company ISP readiness of 31.1%; (2) contribution to the implementation prakerin job readiness in the enterprise ISP amounted to 45.4%; and (3) the contribution of competency achievement network server administration skills and implementation readiness prakerin simultaneously to work in the ISP company amounted to 66.2%. Penelitian ini bertujuan untuk mengetahui kontribusi pencapaian kompetensi administrasi server jaringan dan pelaksanaan prakerin terhadap kesiapan kerja di perusahaan ISP siswa SMK di Kota dan Kabupaten Malang pada paket keahlian TKJ. Jenis dan data analisis penelitian ini termasuk dalam penelitian kuantitatif. Jumlah sampel yang digunakan sebanyak 205 siswa. Pengumpulan data untuk pelaksanaan prakerin dan kesiapan kerja di perusahaan ISP dilakukan dengan angket, sedangkan untuk variabel kompetensi keterampilan administrasi server jaringanl dilakukan dengan dokumentasi nilai. Analisis data meliputi deskriptif dan regresi. Hasil penelitian menunjukkan: (1) kontribusi pencapaian kompetensi keterampilan administrasi server jaringan terhadap kesiapan kerja di perusahaan ISP sebesar 31,1%; (2) kontribusi pelaksanaan prakerin terhadap kesiapan kerja di perusahaan ISP sebesar 45,4%; dan (3) kontribusi pencapaian kompetensi keterampilan administrasi server jaringan dan pelaksanaan prakerin secara simultan terhadap kesiapan kerja di perusahaan ISP sebesar 66,2%.
Clustering network sites is a vital issue in parallel and distributed database systems DDBS. Grouping distributed database network sites into clusters is considered an efficient way to minimize the ...communication time required for query processing. However, clustering network sites is still an open research problem since its optimal solution is NP-complete. The main contribution in this field is to find a near optimal solution that groups distributed database network sites into disjoint clusters in order to minimize the communication time required for data allocation. Grouping a large number of network sites into a small number of clusters effectively increases the transaction response time, results in better data distribution, and improves the distributed database system performance. We present a novel algorithm for clustering distributed database network sites based on the communication time as database query processing is time dependent. Extensive experimental tests and simulations are conducted on this clustering algorithm. The experimental and simulation results show that a better network distribution is achieved with significant network servers load balance and network delay, a minor communication time between network sites is realized, and a higher distributed database system performance is recognized.
Characterization of Flash events and DDoS Attacks: A Survey Gupta, Shaveta; Grover, Dinesh; Singla, Jimmy
2021 7th International Conference on Advanced Computing and Communication Systems (ICACCS),
2021-March-19, Letnik:
1
Conference Proceeding
Internet applications have been used exponentially all the world. Distributed Denial of Service attack (DDoS) is prominent attack that disrupts the normal execution of web server and its resources. ...The situation even become worse with the irruption of Flash events (FE). So, it is very imperative to distinguish between Flash Events and DDoS attacks based on some packet or flow parameters. Both DDoS and FE cause congestion on the network server as a result delays in web services, that causes significant financial losses, therefore it requires proactive and quick measures. This paper provides comprehensive review about flash events as well as DDoS attacks and it repeats some of strategies that are already published. In this paper, we are providing details about different parameters to categorize flash events from DDoS. This paper helps the community to understand the problem in better way through characterization of DDoS attacks and FE.
One of the most important elements in the idea of active defense is data collection and data analysis, especially in many cases to analyze the original packets in the network by mainly using the ...packet capture technology. Therefore, this study discusses about intrusion and defense technology of computer network server with Linux, In the network security analysis system, the storage of original data has become crucial. Big data technology can collect different data for different data types, and can actively use different methods to improve the efficiency of data query. Through the novel design, Snort with good scalability, good portabiIi ty, and open source will be used as the system detection module to organize the rule base in the form of a secondary linked list. Finally, the performance is tested and simulated.