Keywords : energy consumption


Worldwide energy consumption of hyperscale data centers: A Survey

Aasheesh Raizada; Kishan Pal Singh; Mohammad Sajid

International Research Journal on Advanced Science Hub, 2020, Volume 2, Issue Special Issue ICAET 11S, Pages 8-15
DOI: 10.47392/irjash.2020.226

At present, in the whole world from developed countries to third-world, digitization has taken place in society and economy with great intensity and also being adapted by a common person as his/her normal daily routine. Due to this huge amount of data is being processed and stored in data centers. Based on earlier studies, it has been observed that, Due to the overload of data & traffic, data centers are consuming more energy than any other setup. Energy consumption of hyperscale & mid level data centers increasing continuously from the very beginning of their setup. As the demand of energy is growing, so the need of production and expense on energy is also growing in energy demand in future (at-least one decade). In this paper one of the topics specially related to the improvement of energy efficiency through IT software has been taken. And a method has to be established whereby all the data centers with different geographical locations can have fewer loads on power sources and they can take advantage of low cost energy and hence will be able to operate even less.

Identification of DOS Attack by implementing SYN Flood Attack and considering CPU Load Analysis

Sona D Solanki; Asha D Solanki

International Research Journal on Advanced Science Hub, 2020, Volume 2, Issue 8, Pages 68-74
DOI: 10.47392/irjash.2020.96

The stupendous utilization of the web and its entrepreneurial inclination is growing the prevalence to enhance cyber threats occurrence. The absolute identification of virtual-harassment plays a critical role in safeguarding computer systems. Assessment of safety concerns when recognizing a convergence between internet-security and network equipment is vital. To construct a robust infrastructure, the requisite of a cyber-safety methodology is integral. For example, if efficacious cyber-threat takes place then it significantly enhances the power usage of the database and solely impacts its hardware elements. This article provides a glimpse into a DOS intrusion and its stronger links between CPU utilization and absorbed resources, which is one of the most critical admonitions and intimidate features of the machine. DOS threat loads the network with congestion by implementing perilous data that will disrupt the machine by incorporating an estimated excessive energy usage imbibed by a Processor. According to the elevated mechanism, the identification of the SYN flood intrusion is addressed, which is the utmost prevalent DOS attack. In this methodology, this prominent attack is identified by incorporating Wireshark tools. The surveilling and sorting online flood vulnerabilities like SYN by extending a precise intrusion detection model for the safeguarding of data as well as cybersecurity to make the structure sustainable is implemented