Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Rafidah Md. Noor
  • Department of Computer System and Technology, Faculty of Computer Science & Information Technology Building, University of Malaya, 50603 Kuala Lumpur, MALAYSIA
One of the main criteria in Vehicular Ad hoc Networks (VANETs) that has attracted the researchers' consideration is congestion control. Accordingly, many algorithms have been proposed to alleviate the congestion problem, although it is... more
One of the main criteria in Vehicular Ad hoc Networks (VANETs) that has attracted the researchers' consideration is congestion control. Accordingly, many algorithms have been proposed to alleviate the congestion problem, although it is hard to find an appropriate algorithm for applications and safety messages among them. Safety messages encompass beacons and event-driven messages. Delay and reliability are essential requirements for event-driven messages. In crowded networks where beacon messages are broadcasted at a high number of frequencies by many vehicles, the Control Channel (CCH), which used for beacons sending, will be easily congested. On the other hand, to guarantee the reliability and timely delivery of event-driven messages, having a congestion free control channel is a necessity. Thus, consideration of this study is given to find a solution for the congestion problem in VANETs by taking a comprehensive look at the existent congestion control algorithms. In addition, the taxonomy for congestion control algorithms in VANETs is presented based on three classes, namely, proactive, reactive and hybrid. Finally, we have found the criteria in which fulfill prerequisite of a good congestion control algorithm.
This paper presents a new framework of Quality of Experience (QoE) in mobile network. The user acceptance of a mobile application depends on the application’s perceived QoE. Currently, there is no comprehensive framework which integrates... more
This paper presents a new framework of Quality of Experience (QoE) in mobile network. The user acceptance of a mobile application depends on the application’s perceived QoE. Currently, there is no comprehensive framework which integrates QoE and Quality of Service (QoS). The components of framework consist of the network mobility users, traffic classification matrixes and QoE key metric. The performance evaluation of this framework for assessing QoE in service class and user class model is presented. The simulation results demonstrate the user satisfaction evaluated by the achieved QoE at different service classes and user classes. The new QoE score model can give deeper understanding of the mobile user interaction within the mobile environment; quantify the user’s QoE and their relationship with QoS.
This paper described the first experience in implementing PBL for a course in Network Design and Management (WRES3308) at the Faculty of Computer Science and Information Technology (FCSIT), University of Malaya in November 2002. A total... more
This paper described the first experience in implementing PBL for a course in Network Design and Management (WRES3308) at the Faculty of Computer Science and Information Technology (FCSIT), University of Malaya in November 2002. A total of 83 students were
involved, which was divided into smaller groups of 4 to 5 students. Each group were given
issues or problems that they had to understand, discuss and find solutions. The students were
prompted to identify skills and knowledge that were related to the subje ct given. The
evaluation methods used throughout the course were based on student’s presentation,
student’s learning journal, participation in group discussion, final group problem report, and
group’s discussion, communication, and contributions. The PBL approach was found to
direct student’s learning experiences in a challenging way.
Mobility management in heterogeneous networks is an important area since the mobile network may be moving between multiple types of access networks which involve several service providers such as 802.11b WLAN, 802.16 WiMAX and UMTS... more
Mobility management in heterogeneous networks is an important area since the mobile network may be moving between multiple types of access networks which involve several service providers such as 802.11b WLAN, 802.16 WiMAX and UMTS Networks. In crowded environments, the bottleneck is often between the access link and the mobile network. Being able to prioritize the traffic and allocate a minimum bandwidth guarantee for each user is crucial in this environment. This study presents a novel dynamic QoS provisioning mechanism for network mobility in heterogeneous networks integrated with IEEE 802.21 Media Independent Handover (MIH) protocol. Network Mobility (NEMO) Basic Support protocol has three important nodes Mobile Network Nodes (MNNs), Mobile Router (MR) and Home Agent (HA). The dynamic QoS provisioning mechanism which consists of traffic marking, prioritizing and scheduling are implemented at the mobile network node domain. While the admission control module is implemented at a mobile router domain. Several experiments are conducted to evaluate the mechanism. The results have shown the importance of less packet loss and delay and higher packet forwarding rate.
This paper highlights the importance of the Quality of Service in mobile network by introducing a user class approach for traffic management between a mobile router and the mobile network nodes. The approach scheme encompasses the... more
This paper highlights the importance of the Quality of Service in mobile network by introducing a user class approach for traffic management between a mobile router and the mobile network nodes. The approach scheme encompasses the application of mobile user (e.g. public transport user) while they are moving to optimize the network resource utilization. Experiments are conducted using a Network Simulator 2 to measure the performance of user class in different scenarios; off peak hours and peak hours. Based on this information, traffic from mobile network nodes has significant improvement where it provides high throughput, low end-to-end delay and low packet loss rate.
Network mobility basic support (NEMO BS) protocol was introduced by the IETF and allows a mobile network to move and maintain internet sessions. NEMO BS is an extension of mobile IPv6 where the network keeps its home address whilst it... more
Network mobility basic support (NEMO BS) protocol was introduced by the IETF and allows a mobile
network to move and maintain internet sessions. NEMO BS is an extension of mobile IPv6 where the
network keeps its home address whilst it is moving. In crowded environments such as trains, the
bottleneck is often between the access link and the mobile network. Prioritizing the traffic and allocating
a minimum bandwidth guarantee for each user is crucial in this environment. Due to the limited and
variable wireless link bandwidth the resource management in mobile network is a challenging problem.
A dynamic QoS provisioning framework is designed to provide traffic differentiation according to a user
class. Network Simulator, Ns-2 is used to validate the framework and to understand how the mobile
network behaves on varies types of applications.
This paper proposes a dynamic QoS provisioning model for network mobility. The basic idea of network mobility (NEMO) is to keep connectivity whilst the network changes its point of attachment. To achieve this, sufficient resources need... more
This paper proposes a dynamic QoS provisioning
model for network mobility. The basic idea of network mobility
(NEMO) is to keep connectivity whilst the network changes its
point of attachment. To achieve this, sufficient resources need to
be provisioned for the entire mobile network. In our model, the
packets are prioritized and classified according to the services
they are subscribed to i.e. premium services or user services.
Packets that are marked according to the traffic classes are then
aggregated as a single request in a QoS Object in the packet
header which is then sent along with the NEMO binding update
message for resource reservation. QoS agents in the mobile router
and access router determine whether to either send the QoS
Object as a destination option or hop-by-hop option.
In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP). SIP is a strong... more
In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP). SIP is a strong enough signaling protocol on the internet for establishing, maintaining, and terminating session. In this paper the areas of security and attacks in SIP are discussed. We consider attacks from diverse related perspectives. The authentication schemes are compared, the representative existing solutions are highlighted, and several remaining research challenges are identified. Finally, the taxonomy of SIP threat will be presented.
The development of the Web technologies and services increases the level of threats to data security in companies and enterprises day by day. As criminals are turn into professional network intruders, new laws and legislations are... more
The development of the Web technologies and services increases the level of threats to data security in companies and enterprises day by day. As criminals are turn into professional network intruders, new laws and legislations are introduced to cover information security. Even though on-line businesses provide the productivity and efficiency advantages, without the comprehensive network security plan an online retail company which operates with information systems about its daily businesses, increases its risk to become vulnerable to security breaches. The purpose of this article is to introduce a comprehensive network security approach for an online retail company which suffers from security breaches. This article begins with the brief introduction about the problem statement and the proposed method to complete the security enhancement. Next, an ideal network architecture suggested, using both basic network diagram and security enhancement network diagram. The recent task will be continued by implementing the security and password policies to the network. Finally the whole procedure will be simulated and examined using Cisco Packet Tracer Experiment. The simulation results show that the approach was successful in designing a comprehensive network security, and to defend the company against security breaches.
Voice over internet protocol (VoIP) is being widely used, while the integration of voice and data provide several opportunities. Lower cost and more flexibility are the main advantages of the VoIP which derived the attention of the... more
Voice over internet protocol (VoIP) is being widely used, while the integration of voice and data provide
several opportunities. Lower cost and more flexibility are the main advantages of the VoIP which
derived the attention of the enterprises to it. Unfortunately in the other extreme, some security issues
may come across with the extensive use of VoIP. The purpose of this review paper is to encourage the
VoIP industry to consider the importance of the security matters of their application and to find the
gaps by discussing the pros and cons of each application and performing the fair comparison. This
article begins by discussing the motivation of security measures in VoIP applications and a list of
possible threats such as denial-of-service (DoS), Call Hijacking and Interception. These security issues
are the most well known attacks that can be carried out in current VoIP deployment. Next, we discuss
about two VoIP applications, which are Skype and GTalk, and their security levels have been measured
briefly by highlighting some of the security issues in them. These security measurements are used to
perform the comparison between the studied VoIP applications. Finally some methods have been
proposed to improve the security in the VoIP applications in future state.
The use of short message service (SMS) has grown tremendously in the past few years. Billions of users use this service to send text messages. Various applications have been introduced by service providers, e.g., mobile banking, summons... more
The use of short message service (SMS) has grown tremendously in the past few years. Billions of users use this service to send text messages. Various applications have been introduced by service providers, e.g., mobile banking, summons checkpoint, SMS chat, etc., all of which have become a huge success. This chapter gives an overview of how this service is provided and discusses various SMS applications offered to the user. We explore the reasons behind its success and the issues that must be addressed to provide these applications. We also examine future trends and the challenges that must be overcome in order to enhance this service. We hope that this chapter gives a better understanding of how SMS applications are provided and what may be expected in future applications given the enhancement on the current SMS and technology advancement.
In the autonomous environment of Vehicular Ad hoc NETwork (VANET), vehicles randomly move with high speed and rely on each other for successful data transmission process. The routing can be difficult or impossible to predict in such... more
In the autonomous environment of Vehicular Ad hoc NETwork (VANET), vehicles randomly move with high speed
and rely on each other for successful data transmission process. The routing can be difficult or impossible to
predict in such intermittent vehicles connectivity and highly dynamic topology. The existing routing solutions do not consider the knowledge that behaviour patterns exist in real-time urban vehicular networks. In this article, we propose a fuzzy-assisted social-based routing (FAST) protocol that takes the advantage of social behaviour of
humans on the road to make optimal and secure routing decisions. FAST uses prior global knowledge of real-time
vehicular traffic for packet routing from the source to the destination. In FAST, fuzzy inference system leverages
friendship mechanism to make critical decisions at intersections which is based on prior global knowledge of realtime
vehicular traffic information. The simulation results in urban vehicular environment for with and without
obstacles scenario show that the FAST performs best in terms of packet delivery ratio with upto 32% increase,
average delay 80% decrease, and hops count 50% decrease compared to the state of the art VANET routing
solutions.
In the past, communication among people was limited and very difficult. Nowadays, the Internet makes our life veryeasy. Through the Internet you can easily communicate with people in different corners of the world in a few seconds. These... more
In the past, communication among people was limited and very difficult. Nowadays, the Internet makes our life veryeasy. Through the Internet you can easily communicate with people in different corners of the world in a few seconds. These days,the world has been converted into a small village by the Internet. The chat room is one of the effective communication tools. In thispaper, a new protocol is presented for the chat room using the socket programming concept. This protocol has been implemented using Java.
Network Intrusion Detection (NID) is the process of identifying network activity that can lead to the compromise of a security policy. In this paper, we will look at four intrusion detection approaches, which include ANN or Artificial... more
Network Intrusion Detection (NID) is the process of identifying network activity that can lead to the compromise of a security policy. In this paper, we will look at four intrusion detection approaches, which include ANN or Artificial Neural Network, SOM, Fuzzy Logic and SVM. ANN is one of the oldest systems that have been used for Intrusion Detection System (IDS), which presents supervised learning methods. However, in this research, we also came across SOM or Self Organizing Map, which is an ANN-based system, but applies unsupervised methods. Another approach is Fuzzy Logic (IDS-based), which also applies unsupervised learning methods. Lastly, we will look at the SVM system or Support Vector Machine for IDS. The goal of this paper is to draw an image for hybrid approaches using these supervised and unsupervised methods