122 results on '"Zulkarnain, Zuriati"'
Search Results
2. A Discrete Event Simulation for Utility Accrual Scheduling in Uniprocessor Environment
- Author
-
Ahmad, Idawaty, Subramaniam, Shamala, Othman, Mohamad, Zulkarnain, Zuriati, Zain, Jasni Mohamad, editor, Wan Mohd, Wan Maseri bt, editor, and El-Qawasmeh, Eyas, editor
- Published
- 2011
- Full Text
- View/download PDF
3. A Discrete Event Simulation for Utility Accrual Scheduling in Uniprocessor Environment
- Author
-
Ahmad, Idawaty, primary, Subramaniam, Shamala, additional, Othman, Mohamad, additional, and Zulkarnain, Zuriati, additional
- Published
- 2011
- Full Text
- View/download PDF
4. An enhanced congestion control algorithm for LEO satellite networks
- Author
-
Ayob, Fahrul Hakim, Subramaniam, Shamala, Othman, Mohamed, Zulkarnain, Zuriati, Ayob, Fahrul Hakim, Subramaniam, Shamala, Othman, Mohamed, and Zulkarnain, Zuriati
- Abstract
Since TCP WestwoodNew is designed to be implemented in wired and wireless network environment, there are few drawbacks found when TCP WestwoodNew is implemented in the satellite network environment. For examples, the sender cannot fully utilize the available bandwidth because the rate of the congestion window increment in Slow Start phase of TCP WestwoodNew is rather slow. The other problem is, since packets losses often occur due to link errors in satellite environment, TCP WestwoodNew tends to decrease its throughput drastically without committing proper available bandwidth estimation. In this research, there is a potential for TCP WestwoodNew to be improved by increasing its throughput and implemented in satellite networks. In this research, we suggest that the congestion avoidance algorithm of TCP WestwoodNew to be modified. This modification aims to improve the performance of TCP flows by increasing its throughput while attempting to maintain packet delay and the percentage rate of packet drops from getting worse.
- Published
- 2018
5. An Efficient Framework Model for Optimizing Routing Performance in VANETs
- Author
-
Al-Kharasani, Nori M., primary, Zulkarnain, Zuriati Ahmad, additional, Subramaniam, Shamala, additional, and Hanapi, Zurina Mohd, additional
- Published
- 2018
- Full Text
- View/download PDF
6. Towards overhead mitigation in state-free geographic forwarding protocols for wireless sensor networks
- Author
-
Umar, Idris Abubakar, primary, Hanapi, Zurina Mohd, additional, Sali, A., additional, and Zulkarnain, Zuriati A., additional
- Published
- 2018
- Full Text
- View/download PDF
7. A Review on Heuristics for Addition Chain Problem: Towards Efficient Public Key Cryptosystems
- Author
-
Noma, Adamu Muhammad, primary, Muhammed, Abdullah, additional, Mohamed, Mohamad Afendee, additional, and Zulkarnain, Zuriati Ahmad, additional
- Published
- 2017
- Full Text
- View/download PDF
8. A Spawn Mobile Agent Itinerary Planning Approach for Energy-Efficient Data Gathering in Wireless Sensor Networks
- Author
-
Qadori, Huthiafa, primary, Zulkarnain, Zuriati, additional, Hanapi, Zurina, additional, and Subramaniam, Shamala, additional
- Published
- 2017
- Full Text
- View/download PDF
9. Efficient resource management for uplink scheduling in IEEE 802.16e standard
- Author
-
Abdul Rahiman, Amir Rizaan, Ramadhan, Noaman Abduljabbar, Muhammed, Abdullah, Zulkarnain, Zuriati, Abdul Rahiman, Amir Rizaan, Ramadhan, Noaman Abduljabbar, Muhammed, Abdullah, and Zulkarnain, Zuriati
- Abstract
The IEEE 802.16e standard, known as mobile Worldwide Interoperability for Microwave Access (WiMAX) becomes the most demanding broadband wireless access (BWA) technology recently. Its main advantage is rapid delivery of services in remote areas due to the cost efficiency factor. The base station (BS) supports data rate up to 70 Mbps, mobile stations with 5–15 km length of coverage, and for the fixed stations the wireless access range up to 50 km. To resolve the bandwidth contention issue and guarantee seamless packet transmission from the subscriber stations (SS) to the BS, the uplink (UL) traffic scheduling must be efficient and reliable. This paper studies the work on the UL scheduling algorithm, namely minimum rest time (MRT). The MRT goal is to strengthen the packet transferring time between the SS and the BS by refining the pre-stipulated expired time and the deadline time of the earliest expiry first (EEF) and earliest deadline first (EDF) hybrid algorithms. These legacy algorithms are inadequate to support the multi-class traffic systems due to the shortage of quality of service (QoS) parameters featuring. Moreover, the algorithms are highly static. Using the Omnet++ with the relevant performance metrics the obtained results confirmed the MRT outperforms effectively from the legacy algorithms.
- Published
- 2017
10. A review on heuristics for addition chain problem: towards efficient public key cryptosystems
- Author
-
Muhammad Noma, Adamu, Muhammed, Abdullah, Mohamed, Mohamad Afendee, Ahmad Zulkarnain, Zuriati, Muhammad Noma, Adamu, Muhammed, Abdullah, Mohamed, Mohamad Afendee, and Ahmad Zulkarnain, Zuriati
- Abstract
Field exponentiation and scalar multiplication are the pillars of and the most computationally expensive operations in the public key cryptosystems. Optimizing the operation is the key to the efficiency of the systems. Analogous to the optimization is solving addition chain problem. In this study, we survey from the onset of the addition chain problem to the state-of-the-art heuristics for optimizing it, with the view to identifying fundamental issues that when addressed renders the heuristics most optimal mean of minimizing the two operations in various public key cryptosystems. Thus, our emphasis is specifically on the heuristics: Their various constraints and implementations efficiencies. We present possible ways forwards toward the optimal solution for the addition chain problem that can be efficiently applied for optimal implementation of the public key cryptosystems.
- Published
- 2017
11. A spawn mobile agent itinerary planning approach for energy-efficient data gathering in wireless sensor networks
- Author
-
Q. Qadori, Huthiafa, Ahmad Zulkarnain, Zuriati, Mohd Hanapi, Zurina, Subramaniam, Shamala, Q. Qadori, Huthiafa, Ahmad Zulkarnain, Zuriati, Mohd Hanapi, Zurina, and Subramaniam, Shamala
- Abstract
Mobile agent (MA), a part of the mobile computing paradigm, was recently proposed for data gathering in Wireless Sensor Networks (WSNs). The MA-based approach employs two algorithms: Single-agent Itinerary Planning (SIP) and Multi-mobile agent Itinerary Planning (MIP) for energy-efficient data gathering. The MIP was proposed to outperform the weakness of SIP by introducing distributed multi MAs to perform the data gathering task. Despite the advantages of MIP, finding the optimal number of distributed MAs and their itineraries are still regarded as critical issues. The existing MIP algorithms assume that the itinerary of the MA has to start and return back to the sink node. Moreover, each distributed MA has to carry the processing code (data aggregation code) to collect the sensory data and return back to the sink with the accumulated data. However, these assumptions have resulted in an increase in the number of MA's migration hops, which subsequently leads to an increase in energy and time consumption. In this paper, a spawn multi-mobile agent itinerary planning (SMIP) approach is proposed to mitigate the substantial increase in cost of energy and time used in the data gathering processes. The proposed approach is based on the agent spawning such that the main MA is able to spawn other MAs with different tasks assigned from the main MA. Extensive simulation experiments have been conducted to test the performance of the proposed approach against some selected MIP algorithms. The results show that the proposed SMIP outperforms the counterpart algorithms in terms of energy consumption and task delay (time), and improves the integrated energy-delay performance.
- Published
- 2017
12. TruFiX: a configurable trust-based cross-layer protocol for wireless sensor networks
- Author
-
Umar, Idris Abubakar, Mohd Hanapi, Zurina, Sali, A., A. Zulkarnain, Zuriati, Umar, Idris Abubakar, Mohd Hanapi, Zurina, Sali, A., and A. Zulkarnain, Zuriati
- Abstract
The cross-layering concept has enabled flexibility in sensor communication by decreasing the level of modularity through inter-layer information exchange. This has improved adaptability, reliability, and efficiency in the communication process. This is principally so, because the inter-layer information is utilized to enable the selection of nodes that are perceived to foster efficient communication. However, despite these numerous achievements, the cross-layering concept suffers immensely as a result of security attacks, which prey on nodes utilized for data forwarding. In this paper, we propose T-XLM, a trust-based cross-layering framework to provide minimal defense against security attacks. The framework introduces a fuzzy-based trust estimation mechanism, which is used to formulate imprecise empirical knowledge that is utilized for reputation building in the nodes to ensure secure forwarding and reliable delivery of data. We further proposed trust-based fuzzy implicit cross-layer protocol (TruFiX), a T-XLM inspired protocol which utilizes multiple parameters pulled through inter-layer information exchange to mitigate the effects of security threats in a network. Using extensive simulation experiments, TruFiX was compared with resource bound security solution (RBSS)-based protocols, which also achieved minimal security by altering their routing semantics. The conducted experiments evaluated the security performance of the protocols and the results show that the proposed TruFiX significantly outperforms the RBSS-based protocols in terms of packet delivery.
- Published
- 2017
13. TruFiX: A Configurable Trust-Based Cross-Layer Protocol for Wireless Sensor Networks
- Author
-
Umar, Idris Abubakar, primary, Hanapi, Zurina Mohd, additional, Sali, A., additional, and Zulkarnain, Zuriati A., additional
- Published
- 2017
- Full Text
- View/download PDF
14. Efficient Resource Management for Uplink Scheduling in IEEE 802.16e Standard
- Author
-
Rahiman, A.R., primary, Ramadhan, Noaman Abduljabbar, additional, Muhammed, Abdullah, additional, and Zulkarnain, Zuriati, additional
- Published
- 2017
- Full Text
- View/download PDF
15. Multi-mobile agent itinerary planning algorithms for data gathering in wireless sensor networks: A review paper
- Author
-
Qadori, Huthiafa Q, primary, Zulkarnain, Zuriati A, additional, Hanapi, Zurina Mohd, additional, and Subramaniam, Shamala, additional
- Published
- 2017
- Full Text
- View/download PDF
16. FuGeF: a resource bound secure forwarding protocol for wireless sensor networks
- Author
-
Umar, Idris Abubakar, Mohd Hanapi, Zurina, Sali, A., A. Zulkarnain, Zuriati, Umar, Idris Abubakar, Mohd Hanapi, Zurina, Sali, A., and A. Zulkarnain, Zuriati
- Abstract
Resource bound security solutions have facilitated the mitigation of spatio-temporal attacks by altering protocol semantics to provide minimal security while maintaining an acceptable level of performance. The Dynamic Window Secured Implicit Geographic Forwarding (DWSIGF) routing protocol for Wireless Sensor Network (WSN) has been proposed to achieve a minimal selection of malicious nodes by introducing a dynamic collection window period to the protocol’s semantics. However, its selection scheme suffers substantial packet losses due to the utilization of a single distance based parameter for node selection. In this paper, we propose a Fuzzy-based Geographic Forwarding protocol (FuGeF) to minimize packet loss, while maintaining performance. The FuGeF utilizes a new form of dynamism and introduces three selection parameters: remaining energy, connectivity cost, and progressive distance, as well as a Fuzzy Logic System (FLS) for node selection. These introduced mechanisms ensure the appropriate selection of a non-malicious node. Extensive simulation experiments have been conducted to evaluate the performance of the proposed FuGeF protocol as compared to DWSIGF variants. The simulation results show that the proposed FuGeF outperforms the two DWSIGF variants (DWSIGF-P and DWSIGF-R) in terms of packet delivery.
- Published
- 2016
17. A firefly-inspired scheme for energy-efficient transmission scheduling using a self-organizing method in a wireless sensor network
- Author
-
Al-Mekhlafi, Zeyad Ghaleb, Mohd Hanapi, Zurina, Othman, Mohamed, Ahmad Zulkarnain, Zuriati, Al-Mekhlafi, Zeyad Ghaleb, Mohd Hanapi, Zurina, Othman, Mohamed, and Ahmad Zulkarnain, Zuriati
- Abstract
Various types of natural phenomena are regarded as primary sources of information for artificial occurrences that involve spontaneous synchronization. Among the artificial occurrences that mimic natural phenomena are Wireless Sensor Networks (WSNs) and the Pulse Coupled Oscillator (PCO), which utilizes firefly synchronization for attracting mating partners. However, the PCO model was not appropriate for wireless sensor networks because sensor nodes are typically not capable to collect sensor data packets during transmission (because of packet collision and deafness). To avert these limitations, this study proposed a self-organizing time synchronization algorithm that was adapted from the traditional PCO model of fireflies flashing synchronization. Energy consumption and transmission delay will be reduced by using this method. Using the proposed model, a simulation exercise was performed and a significant improvement in energy efficiency was observed, as reflected by an improved transmission scheduling and a coordinated duty cycling and data gathering ratio. Therefore, the energy-efficient data gathering is enhanced in the proposed model than in the original PCO-based wave-traveling model. The battery lifetime of the Sensor Nodes (SNs) was also extended by using the proposed model.
- Published
- 2016
18. A scalable neighbor-based routing protocol for mobile ad hoc networks
- Author
-
Ejmaa, Ali Mohamed E., Subramaniam, Shamala, Ahmad Zulkarnain, Zuriati, Mohd Hanapi, Zurina, Ejmaa, Ali Mohamed E., Subramaniam, Shamala, Ahmad Zulkarnain, Zuriati, and Mohd Hanapi, Zurina
- Abstract
Broadcasting is an essential and effective mechanism used to disseminate data on several types of networks such as mobile ad hoc network. Such method is adopted by a considerable number of routing protocols, in particular, in the route discovery stage since the broadcasting is easy to implement and certainly provides an ideal connectivity among nodes. However, the broadcasting increases the routing overhead, packet delay, which negativity affects the throughput due to the excessive use of the redundant Route REQuest message. In addition, the network is susceptible to so-called broadcast storm problem. Therefore, developing a new routing protocol, which is able to relieve the unnecessary Route REQuest messages while boosting the performance of the network, is required. In this article, a novel routing protocol for mobile ad hoc network, called scalable neighbor-based mobile routing, is proposed. The broadcasting in this protocol is governed by the inverse relation between the number of neighbors and the probability of the rebroadcasted Route REQuest messages. Extensive simulation experiments are carried out to evaluate the performance of the proposed protocol and to compare the state-of-the-art protocols, namely, neighbor coverage-based probabilistic rebroadcast, with the latest version of ad hoc on-demand distance vector protocol. Simulation results show that scalable neighbor-based mobile routing outperforms both protocols, the neighbor coverage-based probabilistic rebroadcast and the ad hoc on-demand distance vector, in terms of routing overhead, medium access control collision, end-to-end delay, packet delivery ratio, and energy consumption.
- Published
- 2016
19. FuGeF: A Resource Bound Secure Forwarding Protocol for Wireless Sensor Networks
- Author
-
Umar, Idris, primary, Mohd Hanapi, Zurina, additional, Sali, A., additional, and Zulkarnain, Zuriati, additional
- Published
- 2016
- Full Text
- View/download PDF
20. Cooperation stimulation mechanisms for wireless multihop networks: a survey
- Author
-
Ahmad Zulkarnain, Zuriati, Abdullah, Azizol, Mohd Hanapi, Zurina, Seah, Winston K.G., Samian, Normalia, Ahmad Zulkarnain, Zuriati, Abdullah, Azizol, Mohd Hanapi, Zurina, Seah, Winston K.G., and Samian, Normalia
- Abstract
In wireless multihop networks such as wireless sensor networks (WSNs) and mobile ad hoc networks (MANETs), nodes have to rely on their peer neighbours in transmitting packets to intended destinations. A successful rate of communication in these networks is assured if all nodes in the network fully cooperate to relay packets for each other. However, due to the existence of nodes with various motives, cooperativeness cannot be ensured and the communication goal is not achieved. Consequently, many cooperation stimulation approaches have been proposed to address node selfishness by using, broadly, incentive-based and punishment-based approaches. These schemes consist of several components including monitoring mechanisms, that need to be optimized in order to provide effective ways to detect and manage selfish nodes in the networks. This paper summarizes existing cooperation stimulation mechanisms and discusses important issues in this field such as false judgment and node collusion, whereby the root of these kinds of problems originates from the inability to obtain accurate evaluation on the behaviour of a node.
- Published
- 2015
21. Mobility and handover technique in heterogeneous wireless networks
- Author
-
Abdullah, Radhwan M., Zulkarnain, Zuriati, Masoumiyan, Farzaneh, Abdullah, Azizol, Abdullah, Radhwan M., Zulkarnain, Zuriati, Masoumiyan, Farzaneh, and Abdullah, Azizol
- Abstract
The management techniques for Mobile IPv6 between different wireless technologies are very important to complete the handover process with the least possible delay. In the fast handover, when a mobile node moves to another network, it needs to do handover operations. These operations have a severe impact on the handover latency. This paper proposes an Enhanced Advanced Duplicate Address Detection (EA-DAD) method in a heterogeneous mobile environment with the support of the MIH services. The proposed method quickly provides a unique Ipv6 address for MNs. At the same time, the binding updates to home agent and correspondent node are to be performed from old access router. We can see through results that by optimizing network layer, EA-DAD quickly presents unique Ipv6 addresses for MNs with a minimum handover latency and packet loss even at high speed movements.
- Published
- 2015
22. An efficient battery lifetime aware power saving (EBLAPS) mechanism in IEEE 802.16e networks
- Author
-
Saidu, Ibrahim, Subramaniam, Shamala, Jaafar, Azmi, Ahmad Zulkarnain, Zuriati, Saidu, Ibrahim, Subramaniam, Shamala, Jaafar, Azmi, and Ahmad Zulkarnain, Zuriati
- Abstract
The IEEE 802.16e standard is an emergent broadband wireless access technology that added the mobility feature to the original standard. This feature made battery life of an operated mobile subscribe station (MSS) a bigger challenge because an MSS is powered by a rechargeable battery. The battery lifetime mechanism has to be created in order to prolong the battery-life of an MSS. The battery lifetime-aware power saving (BLAPS) scheme has been created to prolong the battery life of an MSS by adaptively adjusting the three-sleep parameters named idle threshold, initial sleep window, and final sleep window according to the residual energy and the traffic load. However, the scheme minimized the energy consumption of the MSS at the expense of the average response delay due to the effect of the remaining energy. It also used the standard sleep mode algorithm where the MSS frequently goes to listening mode when the traffic is low which leads to the high-energy consumption. In this paper, a new energy mechanism called efficient battery life-aware power saving scheme has been proposed to enhance the parameters of BLAPS. The three-sleep parameters in BLAPS mechanism are analytically enhanced according to the downlink stochastic traffic arrival pattern of an MSS. Moreover, an improved sleep mode control algorithm has been introduced to reduce the frequent transition to listening mode in case of low traffic. The simulation has been extensively used to evaluate the proposed scheme. The results have shown that the proposed scheme outperforms the BLAPS significantly in terms of both the average response delay and the average energy consumption.
- Published
- 2015
23. A comprehensive survey of the current trends and extensions for the proxy mobile IPv6 protocol
- Author
-
Jabir, Adnan J., Subramaniam, Shamala, Zulkarnain, Zuriati, Abdul Hamid, Nor Asilah Wati, Jabir, Adnan J., Subramaniam, Shamala, Zulkarnain, Zuriati, and Abdul Hamid, Nor Asilah Wati
- Abstract
Network based mobility management has attracted significant research interest due to its salient feature of relieving mobile nodes from participating in the mobility process. This feature of relying the mobility functions on the network entities would indeed eases the deployment of mobility solutions. Proxy Mobile IPv6 (PMIPv6) is considered as a promising network-based mobility management protocol in the next-generation mobile network. However, since the emergence of basic specification of the PMIPv6 protocol, it is still being developed in different directions to enhance its performance in order to ensure the best service for mobile users. This paper presents the PMIPv6 basic specifications and surveys the different extensions that have been considered by both the standardization bodies and researchers to enhance the basic PMIPv6 protocol with interesting features needed to offer a richer mobility experience, namely, clustering, fast handoff, route optimization, network mobility support, and load sharing. The research works conducted for these extensions are analyzed to specify the main issues that should be considered during the design of such extensions. Also, an integrated solution is proposed to show the possibility of combining more than one enhancement feature into a single integrated scheme.
- Published
- 2015
24. A QoS-Aware CAC with bandwidth reservation and degradation scheme in IEEE 802.16e networks
- Author
-
Saidu, Ibrahim, Subramaniam, Shamala, Jaafar, Azmi, Ahmad Zulkarnain, Zuriati, Saidu, Ibrahim, Subramaniam, Shamala, Jaafar, Azmi, and Ahmad Zulkarnain, Zuriati
- Abstract
Call admission control (CAC) schemes play a critical role in providing quality-of-service (QoS) guarantees for various classes of traffic with diverse QoS requirements in IEEE 802.16e networks. The dynamic CAC and bandwidth reservation scheme is one of the current schemes that simultaneously provides efficient utilization of network resources and guarantees QoS for admitted connections. However, its admission criteria starved high and low service classes due to its linear adaptation policy to accommodate more users into the network under moderate-to-heavy traffic load conditions. Its adaptive threshold for handoff connections is adjusted based on the arrival of new and handoff connections, that results in a waste of resources when the new and handoff connection arrival rate occurs frequently. In this paper, a new CAC scheme for Mobile WiMAX networks is proposed to prevent starvation of service classes and enhance the efficient utilization of network resources. The scheme determines a new admission criteria based on a scheduling service class. In the admission criteria, bandwidth degradation policy is used to admit more users when there is no available bandwidth to admit a more users. The adaptive threshold has been introduced dynamically to adjust the quantity of reserved bandwidth for handoff connections based on the traffic intensity of handoff requests. In addition, an analytical model for the proposed scheme is also developed. Extensive simulation experiments have been conducted to evaluate the performance of our proposed approach. The simulation results illustrate that the proposed scheme significantly improves the network efficiency compared to other schemes in terms of accepting more connections into the network and assuring QoS for all service classes. The numerical results have shown similar performance to the simulation results.
- Published
- 2015
25. Attacks, vulnerabilities and security requirements in smart metering networks
- Author
-
Abdullah, Muhammad Daniel Hafiz, Mohd Hanapi, Zurina, Ahmad Zulkarnain, Zuriati, Mohamed, Mohamad Afendee, Abdullah, Muhammad Daniel Hafiz, Mohd Hanapi, Zurina, Ahmad Zulkarnain, Zuriati, and Mohamed, Mohamad Afendee
- Abstract
A smart meter is one of the core components in Advanced Metering Infrastructure (AMI) that is responsible for providing effective control and monitor of electrical energy consumptions. The multifunction tasks that a smart meter carries out such as facilitating two-way communication between utility providers and consumers, managing metering data, delivering anomalies reports, analyzing fault and power quality, simply show that there are huge amount of data exchange in smart metering networks (SMNs). These data are prone to security threats due to high dependability of SMNs on Internet-based communication, which is highly insecure. Therefore, there is a need to identify all possible security threats over this network and propose suitable countermeasures for securing the communication between smart meters and utility provider office. This paper studies the architecture of the smart grid communication networks, focuses on smart metering networks and discusses how such networks can be vulnerable to security attacks. This paper also presents current mechanisms that have been used to secure the smart metering networks from specific type of attacks in SMNs. Moreover, we highlight several open issues related to the security and privacy of SMNs which we anticipate could serve as baseline for future research directions.
- Published
- 2015
26. A forwarding strategy for DWSIGF routing protocol
- Author
-
Umar, Idris Abubakar, Mohd Hanapi, Zurina, Sali, Aduwati, Ahmad Zulkarnain, Zuriati, Umar, Idris Abubakar, Mohd Hanapi, Zurina, Sali, Aduwati, and Ahmad Zulkarnain, Zuriati
- Abstract
Routing protocols in Wireless Sensor Network (WSN) are responsible for propagating and coordinating of information transfer from one end of the network to the other. Dynamic Window Secured Implicit Geographic Forwarding (DWSIGF) is a robust, cross layer, security bound routing protocol that propagates information in a multi-hop network using the greedy and random forwarding strategies. These strategies are known for their poor resistivity to interference and erratic behavior in path selection. In this paper, we propose a forwarding strategy that uses an optimal distance to mitigate these problems. The optimal distance is computed based on the path loss coefficient and energy dissipated in the hardware (sensor). Extensive simulations have been conducted to evaluate the performance of the proposed approach. The results illustrate that the proposed approach performs better than the compared strategies in terms of packet delivery ratio and energy consumption.
- Published
- 2015
27. Enhanced Preemptive Global Utility Accrual Real Time Scheduling Algorithms in Multicore Environment
- Author
-
Ahmad, Idawaty, primary, Othman, Mohamed, additional, and Zulkarnain, Zuriati Ahmad, additional
- Published
- 2015
- Full Text
- View/download PDF
28. A Forwarding Strategy for DWSIGF Routing Protocol
- Author
-
Umar, Idris Abubakar, primary, Hanapi, Zurina M., additional, Sali, Aduwati, additional, and Zulkarnain, Zuriati A., additional
- Published
- 2015
- Full Text
- View/download PDF
29. Fast handoff scheme for cluster-based proxy mobile IPv6 protocol
- Author
-
Jabir, Adnan J., Subramaniam, Shamala, Ahmad Zulkarnain, Zuriati, Abdul Hamid, Nor Asilah Wati, Jabir, Adnan J., Subramaniam, Shamala, Ahmad Zulkarnain, Zuriati, and Abdul Hamid, Nor Asilah Wati
- Abstract
Proxy Mobile IPv6 (PMIPv6) was standardized to reduce the long handoff latency, packet loss and signaling overhead of MIPv6 protocol and to exempt the mobile node from any involvement in the handoff process. However, the basic PMIPv6 does not provide any buffering scheme for packets during MNs handoff. In addition, all the binding update messages are processed by a Local Mobility Anchor (LMA) which leads to increase the handoff latency. Previous works enhanced PMIPv6 performance by applying fast handoff mechanisms to reduce the packet loss during handoffs; however, the LMA is still involved during the location update operations. In this paper, we present a new fast handoff scheme based on a cluster-based architecture for the PMIPv6 named Fast handoff Clustered PMIPv6 (CFPMIPv6); it reduces both the handoff signaling and packet loss ratio. In the proposed scheme, the Mobility Access Gateways (MAGs) are grouped into clusters with a one distinguished Head MAG (HMAG) for each cluster. The main role of the HMAG is to carry out the intra-cluster handoff operations and provide fast and seamless handoff services. The proposed CFPMIPv6 is evaluated analytically and compared with the previous work including the basic PMIPv6, Fast PMIPv6 based on Multicast MAGs group (MFPMIPv6), and the Fast Handoff using Head MAG schemes (HFPMIPv6). The obtained numerical results show that the proposed CFPMIPv6 outperforms all the basic PMIPv6, MFPMIP6, and HFPMIPv6 schemes in terms of the handoff signaling cost.
- Published
- 2014
30. Enhanced tight finite key scheme for quantum key distribution (QKD) protocol to authenticate multi-party system in cloud infrastructure
- Author
-
Khalid, Roszelinda, Ahmad Zulkarnain, Zuriati, Khalid, Roszelinda, and Ahmad Zulkarnain, Zuriati
- Abstract
This research is introducing an enhanced tight finite key scheme for quantum key distribution (QKD) protocol to authenticate multi-party system in cloud infrastructure. The main attraction is to provide a secure channel between a cloud client to establish a connection among them by applying the theories from Von Neumann and Shannon entropies and also Shor's algorithm. By generalizing these theories we will produce enhanced tight finite key scheme for quantum key distribution (QKD) protocol to authenticate multi-party system in cloud infrastructure. Hence we are using quantum channel and also quantum key distribution (QKD) together with BB84 protocol replacing common channel to distribute the key. We are proposing an authentication of multi-party Quantum Key Distribution (MQKD) protocol using an enhanced tight finite key scheme because it will involve a number of parties in cloud infrastructure. Significant of this research is to reduce the possibility of losing a private key by producing a high efficient key rate and attack resilient.
- Published
- 2014
31. A low cost route optimization scheme for cluster-based proxy MIPv6 protocol
- Author
-
Jabir, Adnan J., Subramaniam, Shamala, Ahmad Zulkarnain, Zuriati, Abdul Hamid, Nor Asilah Wati, Jabir, Adnan J., Subramaniam, Shamala, Ahmad Zulkarnain, Zuriati, and Abdul Hamid, Nor Asilah Wati
- Abstract
Proxy Mobile IPv6 (PMIPv6) is a network based mobility protocol which has been designed to relieve the mobile nodes (MNs) from participating in the mobility process and to reduce the long handoff latency of the MIPv6 protocol. However, PMIPv6 incurs a long communication path due to the triangle routing problem, in which, all packets sent by MNs are obligated to pass through the local mobility anchor. Several solutions have been proposed to mitigate this issue. However, they still incur high signaling overhead to recover the Route Optimization (RO) status after handoff. In this paper, we propose a Cluster-Based RO (CBRO) scheme for the clustered architecture of the PMIPv6, in which, the Mobile Access Gateways (MAGs) are grouped into clusters with a distinguished Head MAG (HMAG) for each. In the proposed CBRO, the RO process is relied on the HMAGs to reduce the handoff latency while achieving a fast recovery of the optimized path after handoff. The proposed CBRO is evaluated analytically and compared with the basic PMIP and the current RO schemes. The obtained numerical results have shown that the proposed CBRO outperforms all other schemes in terms of signaling cost required to recover the RO status after handoff and the total cost performance metrics.
- Published
- 2014
32. Energy efficient on aspect of clock synchronization in a wireless sensor network
- Author
-
Al-Mekhlafi, Zeyad Ghaleb, Mohd Hanapi, Zurina, Othman, Mohamed, Ahmad Zulkarnain, Zuriati, Saleh, Ahmed M. Shamsan, Al-Mekhlafi, Zeyad Ghaleb, Mohd Hanapi, Zurina, Othman, Mohamed, Ahmad Zulkarnain, Zuriati, and Saleh, Ahmed M. Shamsan
- Abstract
Recent advances in the areas of Micro-electrical Mechanical Systems (MEMS) spurred the interest of researchers in Wireless Sensor Networks (WSNs). These networks are made up of sensor nodes which have the capability to sense, process and transmit gathered data of an environmental phenomenon of interest. Such synchronization is vital for the proper coordination of the power cycles for energy conservation. Here, a large presence of fireflies employ the principle of pulse coupled oscillators for the emission of light flashes for the attraction of mating partners. With respect to WSNs, the nodes are generally unable to afford packet transmission and reception simultaneously, thus preventing complete network synchronization. This study presents a literature overview concerning the energy efficient on aspect of clock synchronization in a wireless sensor network. In addition, the idea of data transmission based on synchronization can be ensured through the optimization of energy usage periodic data capturing in the wireless sensor network. This study serves as a useful source on clock synchronization to assist WSN researchers and novices to gain a better understanding of the energy efficient on aspect of clock synchronization in a wireless sensor network and to promote effective designs and systems that address this problem.
- Published
- 2014
33. Static and mobile data gathering techniques in Wireless Sensor Networks: a survey
- Author
-
M. Ghaleb, Mukhtar, Subramaniam, Shamala, Othman, Mohamed, Ahmad Zulkarnain, Zuriati, M. Ghaleb, Mukhtar, Subramaniam, Shamala, Othman, Mohamed, and Ahmad Zulkarnain, Zuriati
- Abstract
Wireless Sensor Networks (WSNs) have continued tremendous by towards the change of human civilization from different perspectives which emerged as an effective solution for many applications. WSN consists of hundreds of tiny sensors which deployed in specific area for a specific purpose, while the data is the precious value stand behind the needs for WSN that play a significant role in human life. Communication between nodes in the deployment area is a must to send data from all sensors to reach the base station and then to the end user. One fundamental factor that affects energy dissipation for each sensor is determined based on the communication techniques used to collect and deliver the data which has a direct impact on the lifetime of the whole network. In this paper, we present a taxonomy of data gathering algorithms in WSNs for the static-based and mobile-based architectures. In addition, we present an overview of each technique, and highlighted the features and drawbacks of each one. An extensive survey was provided including the variety of existed data gathering technique.
- Published
- 2014
34. Primitive structural method for high capacity text steganography
- Author
-
Roslan, Nuur Alifah, Mahmod, Ramlan, Udzir, Nur Izura, Ahmad Zulkarnain, Zuriati, Roslan, Nuur Alifah, Mahmod, Ramlan, Udzir, Nur Izura, and Ahmad Zulkarnain, Zuriati
- Abstract
High capacity for hiding secret information is typically the main concern in text steganography, as well as robustness and perceptual invisibility in a perfect steganography algorithm. The major issue in text steganography is the difficulty of using a large amount of redundant information to hide secret bits (1 and 0) in perceptible appearance. We propose a Primitive Structural algorithm for Arabic text steganography to encounter this issue. This algorithm hides the secret bits in the primitive structure (i.e. sharp edges, dots, typographical proportion) for the Arabic character. Therefore, this new algorithm presents a high data-embedding capacity since each character has more than one potential place to hide the secret information. The main processes involved are the preparation of the secret message as a binary process, identifying the Primitive Structural for each character in the cover-text process, and finally the bit hiding process. The experiments have shown that the data-embedding capacity percentage is increased up to 4% for our first experiment and for the second experiment the results show the increase in capacity up to 21% compared to the our previous method, thus resolving the capacity issue.
- Published
- 2014
35. Predetermined path of mobile data gathering in wireless sensor networks based on network layout
- Author
-
Ghaleb, Mukhtar, Subramaniam, Shamala, Othman, Mohamed, Ahmad Zulkarnain, Zuriati, Ghaleb, Mukhtar, Subramaniam, Shamala, Othman, Mohamed, and Ahmad Zulkarnain, Zuriati
- Abstract
Data gathering is among the issues constantly acquiring attention in the area of wireless sensor networks (WSNs). There is a consistent increase in the research directed on the gains of applying mobile elements (MEs) to collect data from sensors, especially those oriented to power issues. There are two prevailing strategies used to collect data in sensor networks. The first approach requires data packets to be serviced via multi-hop relay to reach the respective base station (BS). Thus, sensors will send their packets through other intermediate sensors. However, this strategy has proven to consume high and a substantial amount of energy due to the dependency on other nodes for transmission. The second approach encompasses a ME which serves as the core element for the searching of data. This ME will visit the transmission range of each sensor to upload its data before eventually returning to the BS to complete the data transmission. This approach has proven to reduce the energy consumption substantially as compared to the multi-hop strategy. However, it has a trade-off which is the increase of delay incurred and is constrained by the speed of ME. Furthermore, some sensors may lose their data due to overflow while waiting for the ME. In this paper, it is proposed that by strategically divisioning the area of data collection, the optimization of the ME can be elevated. These derived area divisions are focused on the determination of a common configuration range and the correlation with a redundant area within an identified area. Thus, within each of these divided areas, the multi-hop collection is deployed as a sub-set to the main collection. The ME will select a centroid point between two sub-polling points, subsequently selecting common turning points as the core of the basis of the tour path. Extensive discrete-event simulations have been developed to assess the performance of the proposed algorithm. The acquired results depicted through the performance metrics of t
- Published
- 2014
36. Increase throughput of CCM security mode using MKP
- Author
-
Ahmad Zulkarnain, Zuriati and Ahmad Zulkarnain, Zuriati
- Abstract
A security protocol is used to ensure the messages transferred over a network free from attack. The CCM security operation mode adopts CTR, and CBC-MAC schemes to implement message ciphering and authentication respectively. There are two limitations of CCM including the secret key which should refresh for each 264 blocks in CTR mode and the authentication operation of CBC-MAC works in sequential fashion on multi-processor system. In this paper, we have proved that the Multiple Key Protocol (MKP) can be used within CTR mode to increase the size of the transferred message. Also, we have showed that the DMAC algorithm is able to decrease the time of authentication operation on multi-processing units system.
- Published
- 2014
37. No-Go theorems and quantization
- Author
-
Zainuddin, Hishamuddin, primary, Sing Poh, Toh, additional, Mohd Shah, Nurisya, additional, Zainy, Mazlinda, additional, Zulkarnain, Zuriati, additional, Hassan, Jumiah, additional, and Hassan, Zainul Abidin, additional
- Published
- 2014
- Full Text
- View/download PDF
38. Parallelizing GF (p) montgomery elliptic curve crypto-system operations to improve security and performance.
- Author
-
Sivakumar, R., Alkhatib, Mohammad, Jaafar, Azmi, Md Said, Mohamad Rushdan, Ahmad Zulkarnain, Zuriati, Sivakumar, R., Alkhatib, Mohammad, Jaafar, Azmi, Md Said, Mohamad Rushdan, and Ahmad Zulkarnain, Zuriati
- Abstract
The elliptic curve crypto-system (ECC) performs two levels of computations, lower point operations, and upper scalar multiplication levels. The use of usual serial design and affine coordinates to apply ECC computations increases the time delay and weaken the security of the crypto-system against simple power attack (SPA). This work combines the inherited parallelism in both computation levels for GF (p) Montgomery ECC to improve performance and enhance the immunity of the ECC against SPA. Moreover, projective coordinates were used to apply ECC operations to eliminate the time-consuming inversion operation. In order to increase the speed even further, this paper proposes to use known NAF algorithm for scalar multiplication, as well as Montgomery multiplier to perform multiplication operations. Hardware implementations with target FPGA for GF (p) Montgomery ECC are also presented. The best performance level was achieved when parallelizing Montgomery ECC computations to eight parallel multipliers (PM) using homogeneous coordinates. Such strategy, although it requires extra resources, is worth considering due to its attractive security and performance conclusions.
- Published
- 2013
39. Shorter addition chain for smooth integers using decomposition method.
- Author
-
Mohamed, M. A., Md. Said, Mohamad Rushdan, Mohd Atan, Kamel Ariffin, Ahmad Zulkarnain, Zuriati, Mohamed, M. A., Md. Said, Mohamad Rushdan, Mohd Atan, Kamel Ariffin, and Ahmad Zulkarnain, Zuriati
- Abstract
An efficient computation of scalar multiplication in elliptic curve cryptography can be achieved by reducing the original problem into a chain of additions and doublings. Finding the shortest addition chain is an NP-problem. To produce the nearest possible shortest chain, various methods were introduced and most of them depends on the representation of a positive integer n into a binary form. Our method works out the given n by twice decomposition, first into its prime powers and second, for each prime into a series of 2's from which a set of rules based on addition and doubling is defined. Since prime factorization is computationally a hard problem, this method is only suitable for smooth integers. As an alternative, the need to decompose n can be avoided by choosing n of the form p1 e1p2 e2⋯r er. This shall not compromise the security of ECC since its does not depend on prime factorization problem. The result shows a significant improvement over existing methods especially when n grows very large.
- Published
- 2011
40. Efficiency and fairness of new-additive increase multiplicative decrease congestion avoidance and control algorithm
- Author
-
Jasem, Hayder Natiq, Ahmad Zulkarnain, Zuriati, Othman, Mohamed, Subramaniam, Shamala, Jasem, Hayder Natiq, Ahmad Zulkarnain, Zuriati, Othman, Mohamed, and Subramaniam, Shamala
- Abstract
When using of the Internet increased dramatically; the congestion avoidance problem became even more important. The congestion is usually caused by the multiplexing for packets when the packets are at the bottleneck links. Efficiency and fairness are the important metrics in the performance of congestion avoidance mechanisms. And also all of the researches for the congestion avoidance algorithms, interest about this parameters metrics to evaluate the performance of the algorithms. This research studied the performance of the New-Additive Increase Multiplicative Decrease (AIMD) algorithm as one of the core protocols for the TCP congestion avoidance and control mechanism. In addition, to evaluate the effect of using the AIMD algorithm after its development to measure the efficiency and fairness and find new enhancement results for our approach, which named as the New-AIMD algorithm. The NCTUns simulator is used to obtain the results after implementing the modifications to the mechanism.
- Published
- 2011
41. Applying packet generator for secure network environment
- Author
-
Abdul Wahid, Mohammed N., Ahmad Zulkarnain, Zuriati, Abdul Wahid, Mohammed N., and Ahmad Zulkarnain, Zuriati
- Abstract
Problem statement: Viruses and hacker attacks typically generate a recognizable pattern or "signature" of packets. Most of Network Traffic Analyzer can identify these packets and alert the administrator to their presence on the network via email or page. Approach: Most traffics analyzers let you set alarms to be triggered when a particular pattern is seen. Results: Some network traffic analyzers can be programmed to send an email or page when these conditions are met. Of course; this assumes that the virus and its signature have been seen before and incorporated the analyzer's list of packet filters. ((The packet filters once started the filtering process and also by using packet decode together they can determine the traffic type whether it has normal or abnormal activities. Conclusion/Recommendations: In this study we used Packet Generator to generate a traffic that supposes to act the intruder or hacker signature to prove up that Network Traffic Analysis has the ability to detect like this kind of traffics. And also we have explained in depth about network traffic analysis and its ability to monitor all the network traffics (incoming and outgoing) and view their headers and payload and all other information such as traffic source and destination)).
- Published
- 2011
42. Performance evaluation of routing with load-balancing in multi-radio wireless mesh networks
- Author
-
Al-Kharasani, Nori Mohammed, Ahmad Zulkarnain, Zuriati, Al-Kharasani, Nori Mohammed, and Ahmad Zulkarnain, Zuriati
- Abstract
Wireless mesh networks (WMNs) face several challenges such as architectural design and network protocol design issues. The capacity of WMNs is very limited, such as the result in an available single channel bandwidth system compared to a multi-channel system. Two problems affect the capacity of mesh networks; i.e. load balancing and interference. To support the mesh network infrastructure, it is necessary to balance the traffic load and reduce the interference. One important direction for improving the capacity of WMNs is to use multiple radio interfaces and multiple channels simultaneously. The proposed load balancing routing algorithm method provides the load balance for multi-radio mesh networks by using a good routing metric, which captures the differences in transmission rates, packet loss ratio, traffic load and intra/inter flow interferences. The simulation results of this study, which used the network simulation NS-2, showed the capacity improvement that helps distributing the traffic load for efficient resource utilization.
- Published
- 2011
43. An improved binary method for scalar multiplication in elliptic curve cryptography
- Author
-
Mohamed, Mohamad Afendee, Md. Said, Mohamad Rushdan, Mohd Atan, Kamel Ariffin, Ahmad Zulkarnain, Zuriati, Mohamed, Mohamad Afendee, Md. Said, Mohamad Rushdan, Mohd Atan, Kamel Ariffin, and Ahmad Zulkarnain, Zuriati
- Abstract
Problem statement: Until recently, many addition chain techniques constructed to support scalar multiplication operation have been proposed tailored to limited computational resources. In securing the efficiency of ECC point operation, the combinations of the two basic operations, point addition and doubling are mostly implemented. Using binary method, the operation of doubling depends solely on the length of binary representation itself, so the most probable way to reduce the total number of the whole operation is by reducing the number of addition operation. This limitation is quite problematic. Approach: In this study we proposed an improved binary method which reads input block by block basis. Instead of having to add one to current chain every time non zero digit appears, this method requires one addition for every non zero block. A mapping table is used to store all possible binary string and its decimal version. For every block, its decimal value is extracted from the table and this value will be added to the current chain. In return, it requires precomputations for all possible combination of input blocks. Results: The new method showed a significant reduction in the number of required additions and the magnitude of improvement varies according to the key size. Conclusion: The algorithm is suitable to be adapted into cryptographic system especially as the need for bigger key size is growing rapidly.
- Published
- 2010
44. On the delay and link utilization with the new-additive increase multiplicative decrease congestion avoidance and control algorithm
- Author
-
Jasem, Hayder Natiq, Ahmad Zulkarnain, Zuriati, Othman, Mohamed, Subramaniam, Shamala, Jasem, Hayder Natiq, Ahmad Zulkarnain, Zuriati, Othman, Mohamed, and Subramaniam, Shamala
- Abstract
Additive increase multiplicative decrease (AIMD) algorithm is the prevailing algorithm for congestion avoidance and control in the Internet. Reducing the end-to-end delays and enhancement of the link utilization are the important goals of this algorithm. In this work, we continue to study the performance of the New-AIMD (additive increase multiplicative decrease) mechanism as one of the core protocols for TCP, to avoid and control the congestion. We want to evaluate the effect of using the AIMD algorithm after developing it, which we called the New-AIMD algorithm, to find a new approach to measure the end-to-end delay and bottleneck link utilization and use the NCTUns simulator to obtain the results after making the modification for the mechanism. We will use the DropTail mechanism as the active queue management mechanism (AQM) in the bottleneck router. After the implementation of our new approach with a different number of flows, we expect the end-to-end delay to be less when we measure the delay dependent on the throughput for the entire system. In addition, we will measure the bottleneck link utilization using this mechanism and expect to get high utilization for bottleneck link and avoid the collisions in the link.
- Published
- 2010
45. UPEM : user-centered privacy evaluation model in pervasive computing systems.
- Author
-
Dehghantanha, Ali, Mahmod, Ramlan, Udzir, Nur Izura, Ahmad Zulkarnain, Zuriati, Dehghantanha, Ali, Mahmod, Ramlan, Udzir, Nur Izura, and Ahmad Zulkarnain, Zuriati
- Abstract
The fact that pervasive systems are typically embedded and invisible, making it difficult for users to know when these devices are collecting data. Consequently privacy appears as a major issue for pervasive computer applications and several privacy models proposed for pervasive environments. The rapid growth of privacy models in pervasive environments gives rise to the need for some standard benchmarks and evaluation models to evaluate and compare these privacy models. In this paper we review privacy evaluation models in pervasive environments and present their evaluation results. Then we propose an evaluation model that evaluates privacy models based on user control over private information, expressiveness pf privacy policies, and unobtrusiveness of privacy mechanisms and represents the model privacy level in a matrix. Finally we evaluate several privacy models using the proposed privacy evaluation model.
- Published
- 2009
46. Performance analysis of random-based mobility models in MANET routing protocol.
- Author
-
Mohd Saad, Mohd Izuan, Ahmad Zulkarnain, Zuriati, Mohd Saad, Mohd Izuan, and Ahmad Zulkarnain, Zuriati
- Abstract
With current advances in technology, wireless networks are increasing in popularity. Wireless networks allow users the freedom to travel from one location to another without interruption of their computing services. Ad hoc networks is one of the subset of wireless network that dynamically forming a temporary network without using any existing network infrastructure or centralized administration. Therefore, it is required a good routing protocol in order to established the connection between the nodes since the mobile node can change their topology frequently. In the routing protocol, the movement of the mobile node is one of the important characteristics because it can effects the performance of the ad hoc network protocol. In this research, we have studied the effect of the different mobile node movement pattern in random-based mobility model group (Random Waypoint Mobility Model, Random Walk Mobility Model and Random Direction Mobility Model) on the performance of Ad hoc On-demand Distance Vector (AODV). The performance analysis was conducted by using the discrete-event simulator, OMNeT++. The simulator was used to simulate the mobility environment and the Open System Interconnections (OSI) layers utilized in wireless simulation. The simulation results illustrate the performance of the routing protocol varies across different performance metrics.
- Published
- 2009
47. Implemetation of BB84 quantum key distribution protocol’s with attacks.
- Author
-
Muhammad, Nur Atiqah, Ahmad Zulkarnain, Zuriati, Muhammad, Nur Atiqah, and Ahmad Zulkarnain, Zuriati
- Abstract
Quantum cryptography is basically based on a trusted channel in communication between two parties compared to classical channel. Recently, Quantum Key Distribution (QKD has become more secure transmission method used to transmit secret key between two legitimate parties. This paper discusses the implementation of QKD protocol (BB84 protocol), which is widely used today. The implementation simulates the communication of two parties who wish to share a secret key with the existing of eavesdropper. The existing of eavesdropper is simulated with two kinds of attacks, which is use as parameter to measure the length of final key agreed by both authenticated parties at the end of the communication. This paper also discuss about future works to fully implement the shared secret key.
- Published
- 2009
48. Experimental evaluation of bottleneck link utilization with new-additive increase multiplicative decrease congestion avoidance and control algorithm.
- Author
-
Jasem , Hayder Natiq, Ahmad Zulkarnain, Zuriati, Othman, Mohamed, Subramaniam, Shamala, Jasem , Hayder Natiq, Ahmad Zulkarnain, Zuriati, Othman, Mohamed, and Subramaniam, Shamala
- Abstract
Problem statement: As the Internet becomes increasingly heterogeneous, the issue of congestion control becomes ever more important. And the link utilization is one of the important things in term of congestion avoidance and control mechanisms. And we can define the utilization as simply the throughput divided by the access rate. And also all the developments for the congestion control and avoidance algorithms interest about the using of network resources and use the links capacity (utilization). Approach: In this research we continued to study the performances of the New-Additive Increase Multiplicative Decrease (AIMD) algorithm as one of the core protocols for TCP congestion avoidance and control mechanism, we want now to evaluate the effect of using the AIMD algorithm after developing it to find a new approach, as we called it the New-AIMD algorithm to measure the bottleneck link utilization and use the NCTUns simulator to get the results after make the modification of the mechanism. And we will use the Droptail mechanism as Active Queue Management (AQM) in the bottleneck router. Results: After implementation of our new approach with different number of flows, we will measure the bottleneck link utilization and we will get high utilization (more than 94%)for bottleneck link with using this mechanism and avoid the collisions in the link. Conclusion: Now and after got this results as high utilization for bottleneck link, we know the New-AIMD mechanism work as well under the giving network condition in the experiments.
- Published
- 2009
49. Fairness Of the TCP-based new AIMD congestion control algorithm.
- Author
-
Jasem, Hayder Natiq, Ahmad Zulkarnain, Zuriati, Othman, Mohamed, K. Subramaniam, Shamala, Jasem, Hayder Natiq, Ahmad Zulkarnain, Zuriati, Othman, Mohamed, and K. Subramaniam, Shamala
- Abstract
Congestion control is one of the fundamental issues in computer networks. Without proper congestion control mechanisms there is the possibility of in efficient utilization of resources, ultimately leading to network collapse. Hence congestion control is an effort to adapt the performance of a network to change in the traffic load without adversely affecting users perceived utilities. AIMD (Additive Increase Multiplicative Decrease) is the best algorithm among the set of linear algorithms because it reflects good efficiency as well as good fairness. Our control model is based on the assumption of the original AIMD algorithm; we show that both efficiency and fairness of AIMD can be improved. We call our approach is New AIMD. We present experimental results with TCP that match the expectation of our theoretical analysis.
- Published
- 2009
50. Comparison study of transmission control protocol and user datagram protocol behavior over multi-protocol label switching networks in case of failures.
- Author
-
Al-Radaei, Taha Ahmed, Ahmad Zulkarnain, Zuriati, Al-Radaei, Taha Ahmed, and Ahmad Zulkarnain, Zuriati
- Abstract
Problem statement: In only a few years, Multi-Protocol Label Switching (MPLS) has evolved from an exotic technology to a mainstream tool used by service providers to create revenue-generating services. MPLS provides a high reliable Label Switched Path (LSP). MPLS failures may degrade the reliability of the MPLS networks. Approach: For that reason, many studies have been conducted to keep the high reliability and survivability of the MPLS networks. Unlike User Datagram Protocol (UDP), Transmission Control Protocol does not perform well in case of like-failure of MPLS networks because of its inability to distinguish packet loss due to link-failure. After the recovery time, TCP takes longer time than UDP to continue as it was before the failure. Results: In terms of packet loss, TCP performs better than UDP. However, the receiving rate of the TCP traffic is much worse than UDP traffic. A need for a mechanism to improve the behavior of TCP after a link failure is needed. This study focused on comparing the behavior of different types TCP as well as UDP traffic over MPLS networks in case of link, node or congestion failures. Conclusion: Although extensions of RSVP-TE protocol support fast recovery mechanism of MPLS networks, the behavior of TCP will be affected during recovery time much more than with UDP.
- Published
- 2009
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.