Department of Networking

More ...

About Department of Networking

Facts about Department of Networking

We are proud of what we offer to the world and the community

29

Publications

10

Academic Staff

172

Students

48

Graduates

Programs

Major

...

Details

Who works at the Department of Networking

Department of Networking has more than 10 academic staff members

staff photo

Prof.Dr. Mahmud Milud Ali Mansour

محمود منصور هو أحد أعضاء هيئة التدريس بقسم الشبكات بكلية تقنية المعلومات. يعمل السيد محمود بجامعة طرابلس كـأستاذ منذ 2020-02-03 وله العديد من المنشورات العلمية في مجال تخصصه

Publications

Some of publications in Department of Networking

Effect of Channel Multipath Fading and Node Trajectory on VoIP QoS in WiMAX Networks.

Abstract: In WiMAX networks, the biggest challenge is to overcome the effects of fading especially when nodes are mobile. The multipath nature of channel leads to ISI (Inter Symbol Interference) and the severity of ISI effects increases with bandwidth increase and this might get worse when nodes are moving . The radio link between the Base Station and Service Station/Mobile Station can be a LOS or it can be a NLOS. The environmental objects and features like buildings, weather conditions can severely obstruct NLOS signal. In this paper the effect of pedestrian multipath and node mobility in WiMAX network is studied under different codecs schemes in order to evaluate the effect of multipath channel fading when nodes are moving on the QoS parameters end to end delay, jitter, mean opinion score and throughput of a VoIP application. The obtained results showed that multipath fading with mobile nodes has sever effect on throughput and MOS value for all studied codecs and on the other parameters the effect varies depending on the implemented codecs. arabic 14 English 71
N. Aboalgasm, I. Almerhag , A. Daeri(3-2018)
Publisher's website

Vulnerabilities of Biometric Authentication “Threats and Countermeasures”

Biometric systems have a powerful potential to provide security for a variety of applications, systems are nowadays being introduced in many applications and have already been deployed to protect personal computers, Banking machines, credit cards, electronic transactions, airports, high security institutions like nuclear facilities, Military Bases and other applications like borders control, access control, sensitive data protection and on-line tracking systems. While biometrics may improve security in different environments and serve many purposes, biometric systems, like any other security system, have vulnerabilities and are susceptible to threats. they are susceptible to external vulnerabilities of biometric systems so that their weaknesses can be found and useful countermeasures against foreseeable attacks can be developed The increasingly high profile use of biometrics for security purposes has provoked new interest in researching and exploring methods of attacking biometric systems.
Abdulmonam Omar Ahmed Alaswad, Ahlal H. Montaser, Fawzia Elhashmi Mohamad(0-2014)
Publisher's website

Multiprotocol Label Switching

Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of the OSI model; for this reason, MPLS has been referred to as operating at Layer 2.5. MPLS can overlay existing technologies such as Asynchronous Transfer Mode (ATM) or Frame Relay, or it can operate in an entirely IP native environment; this can allow users to take advantage of existing Customer Premises Equipment (CPE) while making a move towards converging all network traffic, such as data, video and voice, at a pace that users can accommodate and afford. MPLS provides. its users a number of advantageous features such as traffic engineering, network convergence, failure protection, and the ability to guarantee Quality of Service (QoS) over IP. arabic 2 English 27
Mariam Abojela Msaad, Amer R. Zerek , Wesam M. Tohamei(1-2012)
Publisher's website