-
Fostering of innovative usability testing to develop mobile application for mobile collaborative learning (MCL)
Authors:
Khaled Elleithy,
Abdul Razaque
Abstract:
Emergence of latest technologies has diverted the focus of people form Computer-Supported Collaborative Learning (CSCL) to mobile supported collaborative learning. MCL is highly demanded in educational organizations to substantiate the pedagogical activities. Some of the MCL supportive architectures including applications are introduced in several fields to improve the activities of those organiza…
▽ More
Emergence of latest technologies has diverted the focus of people form Computer-Supported Collaborative Learning (CSCL) to mobile supported collaborative learning. MCL is highly demanded in educational organizations to substantiate the pedagogical activities. Some of the MCL supportive architectures including applications are introduced in several fields to improve the activities of those organizations, but they need more concise paradigm to support both types of collaboration: synchronous and asynchronous. This paper introduces the new preusability testing method that provides educational support and gives complete picture for develo** new pedagogical group application for MCL. The feature of application includes asynchronous and synchronous collaboration support. To validate the features of application, we conduct the post usability testing and heuristic evaluation, which helps in collecting the empirical data to prove the effectiveness and suitability of Group application. Further, application aims to improve learning impact and educate people at anytime and anywhere.
△ Less
Submitted 13 October, 2014;
originally announced October 2014.
-
Dynamic Cluster Head Node Election (DCHNE) Model over Wireless Sensor Networks (WSNs)
Authors:
Abeer Alabass,
Khaled Elleithy,
Abdul Razaque
Abstract:
WSNs are becoming an appealing research area due to their several application domains. The performance of WSNs depends on the topology of sensors and their ability to adapt to changes in the network. Sensor nodes are often resource constrained by their limited power, less communication distance capacity, and restricted sensing capability. Therefore, they need to cooperate with each other to accomp…
▽ More
WSNs are becoming an appealing research area due to their several application domains. The performance of WSNs depends on the topology of sensors and their ability to adapt to changes in the network. Sensor nodes are often resource constrained by their limited power, less communication distance capacity, and restricted sensing capability. Therefore, they need to cooperate with each other to accomplish a specific task. Thus, clustering enables sensor nodes to communicate through the cluster head node for continuous communication process. In this paper, we introduce a dynamic cluster head election mechanism. Each node in the cluster calculates its residual energy value to determine its candidacy to become the Cluster Head Node (CHN). With this mechanism, each sensor node compares its residual energy level to other nodes in the same cluster. Depending on the residual energy level the sensor node acts as the next cluster head. Evaluation of the dynamic CHN election mechanism is conducted using network simulator-2 (ns2). The simulation results demonstrate that the proposed approach prolongs the network lifetime and balancing the energy
△ Less
Submitted 13 October, 2014;
originally announced October 2014.
-
Simulation based Study of TCP Variants in Hybrid Network
Authors:
Wafa Elmannai,
Abdul Razaque,
Khaled Elleithy
Abstract:
Transmission control protocol (TCP) was originally designed for fixed networks to provide the reliability of the data delivery. The improvement of TCP performance was also achieved with different types of networks with introduction of new TCP variants. However, there are still many factors that affect performance of TCP. Mobility is one of the major affects on TCP performance in wireless networks…
▽ More
Transmission control protocol (TCP) was originally designed for fixed networks to provide the reliability of the data delivery. The improvement of TCP performance was also achieved with different types of networks with introduction of new TCP variants. However, there are still many factors that affect performance of TCP. Mobility is one of the major affects on TCP performance in wireless networks and MANET (Mobile Ad Hoc Network). To determine the best TCP variant from mobility point of view, we simulate some TCP variants in real life scenario. This paper addresses the performance of TCP variants such as TCP-Tahoe, TCP-Reno, TCP-New Reno, TCPVegas,TCP-SACK and TCP-Westwood from mobility point of view.The scenarios presented in this paper are supported by Zone routing Protocol (ZRP) with integration of random waypoint mobility model in MANET area. The scenario shows the speed of walking person to a vehicle and suited particularly for mountainous and deserted areas. On the basis of simulation, we analyze Round trip time (RTT) fairness, End-to-End delay, control overhead, number of broken links during the delivery of data. Finally analyzed parameters help to find out the best TCP variant.
△ Less
Submitted 13 October, 2014;
originally announced October 2014.
-
Stream Control Transmission Protocol (SCTP): Robust and Efficient for Data Centre Applications
Authors:
Fatma Almajadub,
Abdul Razaque,
Eman Abdel Fattah
Abstract:
Due to rapid advancement in modern technology, as one of the major concerns is the stability of business. The organizations depend on their systems to provide robust and faster processing of information for their operations. Efficient data centers are key sources to handle these operations. If the organizational system is not fully functional, the performance of organization may be impaired or clo…
▽ More
Due to rapid advancement in modern technology, as one of the major concerns is the stability of business. The organizations depend on their systems to provide robust and faster processing of information for their operations. Efficient data centers are key sources to handle these operations. If the organizational system is not fully functional, the performance of organization may be impaired or clogged completely. With the developments of real-time applications into data centers for data communications, there is a need to use an alternative of the standard TCP protocol to provide reliable data transfer. Stream Control Transmission Protocol (SCTP) consists of several well built-in characteristics that make it capable to work efficiently with real-time applications. In this paper, we evaluate an optimized version of STCP. The optimized version of SCTP is tested against a non optimized version of STCP and TCP in a data center environment. Simulations of the protocols are carried using NS2 simulator
△ Less
Submitted 2 December, 2013;
originally announced December 2013.
-
Deployment of Stream Control Transmission Protocol (SCTP) to Maintain the Applications of Data Centers
Authors:
Fatma Almajadub,
Eman Abdelfattah,
Abdul Razaque
Abstract:
With developments of real-time applications into data centers, the need for alternatives of the standard TCP protocol has been prime demand in several applications of data centers. The several alternatives of TCP protocol has been proposed but SCTP has edge due to its several well-built characteristics that make it capable to work efficiently. In this paper, we examine the features of SCTP into da…
▽ More
With developments of real-time applications into data centers, the need for alternatives of the standard TCP protocol has been prime demand in several applications of data centers. The several alternatives of TCP protocol has been proposed but SCTP has edge due to its several well-built characteristics that make it capable to work efficiently. In this paper, we examine the features of SCTP into data centers like Multi-streaming and Multi-homing over the features of TCP protocol. In this paper, our objective is to introduce internal problems of data centers. Robust transport protocol reduces the problems with some extend. Focusing the problems of data centers, we also examine weakness of highly deployed standard TCP, and evaluate the performance of SCTP in context of faster communication for data centers. We also discover some weaknesses and shortcomings of SCTP into data centers and try to propose some ways to avoid them by maintaining SCTP native features. To validate strength and weakness of TCP and SCTP, we use ns2 for simulation in context of data center. On basis of findings, we highlight major strength of SCTP. At the end, we Implemen
△ Less
Submitted 11 November, 2013;
originally announced November 2013.
-
Efficient Search (RES) for One-Hop Destination over Wireless Sensor Network
Authors:
Abdul Razaque,
Khaled. M. Elleithy
Abstract:
The revolution of wireless sensors networks (WSNs) has highly augmented the expectations of people to get the work done efficiently, but there is little bit impediment to deal with deployed nodes in WSNs. The nature of used routing and medium access control (MAC) protocols in WSNs is completely different from wireless adhoc network protocols. Sensor nodes do not have enough capability to synchroni…
▽ More
The revolution of wireless sensors networks (WSNs) has highly augmented the expectations of people to get the work done efficiently, but there is little bit impediment to deal with deployed nodes in WSNs. The nature of used routing and medium access control (MAC) protocols in WSNs is completely different from wireless adhoc network protocols. Sensor nodes do not have enough capability to synchronize with robust way, in resulting causes of longer delay and waste of energy. In this paper, we deploy efficientenergy consuming sensors and to find one hop robust and efficient destination search in WSNs. We firstly deploy BT (Bluetooth enabled) sensors, which offer passive and active sensing capability to save energy. This work is a continuation of previous published work in [2]. The BT node is supported with efficient searchmethodss. The main objective of this contribution is to control different types of objects from remote places using cellular phone. To validate our proposed methodology,simulation is done with network simulator (ns2) to examine the behavior of WSNs. Based on simulation results, we claim that our approach saves 62% energy spent for finding best one- hop destination as compared with existing techniques.
△ Less
Submitted 3 October, 2013;
originally announced October 2013.
-
Automatic energy saving (AES) modelto boost ubiquitous wireless sensor networks (WSNs)
Authors:
Abdul Razaque,
Khaled Elleithy
Abstract:
We deploy BT node (sensor) that offers passive and active sensing capability to save energy. BT node works in passive mode for outdoor communication and active for indoor communication. The BT node is supported with novel automatic energy saving (AES) mathematical model to decide either modes. It provides robust and faster communication with less energy consumption. To validate this approach, netw…
▽ More
We deploy BT node (sensor) that offers passive and active sensing capability to save energy. BT node works in passive mode for outdoor communication and active for indoor communication. The BT node is supported with novel automatic energy saving (AES) mathematical model to decide either modes. It provides robust and faster communication with less energy consumption. To validate this approach, network simulator-2 (ns2) simulation is used to simulate the behavior of network with the supporting mathematical model. The main objective of this research is to remotely access different types of servers, laptops, desktops and other static and moving objects. This prototype is initially deployed to control MSCS [13] & [14] from remote place through mobile devices. The prototype can further be enhanced to handle several objects simultaneously consuming less energy and resources.
△ Less
Submitted 17 September, 2013;
originally announced September 2013.
-
Restoring the privacy and confidentiality of users over Mobile collaborative learning (MCL) environment
Authors:
Abdul Razaque,
Khald. M. Elleithy
Abstract:
Mobile collaborative learning (MCL) is extensively recognized field all over the world. It demonstrates the cerebral approach combining the several technology to handle the problem of learning. MCL motivates the social and educational activities for creating healthier environment. To advance and promote the baseline of MCL, different frameworks have been introduced for MCL. From other side, there…
▽ More
Mobile collaborative learning (MCL) is extensively recognized field all over the world. It demonstrates the cerebral approach combining the several technology to handle the problem of learning. MCL motivates the social and educational activities for creating healthier environment. To advance and promote the baseline of MCL, different frameworks have been introduced for MCL. From other side, there is no highly acceptable security mechanism has been implemented to protect MCL environment. This paper introduces the issue of rogue DHCP server, which highly affects the performance of users who communicate with each other through MCL. The rogue DHCP is unofficial server that gives incorrect IP address to user in order to use the legal sources of different servers by sniffing the traffic. The contribution focuses to maintain the privacy of users and enhances the confidentiality. The paper introduces multi-frame signature-cum anomaly-based intrusion detection systems (MSAIDS) supported with innovative algorithms, modification in the existing rules of IDS and use of mathematical model. The major objectives of research are to identify the malicious attacks created by rogue DHCP server. This innovative mechanism emphasizes the security for users in order to communicate freely. It also protects network from illegitimate involvement of intruders. Finally, the paper validates the mechanism using three types of simulations: testbed, discrete simulation in C++ and ns2. On the basis of findings, the efficiency of proposed mechanism has been compared with other well-known techniques.
△ Less
Submitted 17 September, 2013;
originally announced September 2013.
-
Multi-frame Signature-cum Anomaly-based Intrusion Detection Systems (MSAIDS) to Protect Privacy of Users over Mobile Collaborative Learning (MCL)
Authors:
Abdul Razaque,
Khaled Elleithy
Abstract:
The rogue DHCP is unauthorized server that releases the incorrect IP address to users and sniffs the traffic illegally. The contribution specially provides privacy to users and enhances the security aspects of mobile supported collaborative framework (MSCF) explained in [24].The paper introduces multi-frame signature-cum anomaly-based intrusion detection systems (MSAIDS) supported with novel algor…
▽ More
The rogue DHCP is unauthorized server that releases the incorrect IP address to users and sniffs the traffic illegally. The contribution specially provides privacy to users and enhances the security aspects of mobile supported collaborative framework (MSCF) explained in [24].The paper introduces multi-frame signature-cum anomaly-based intrusion detection systems (MSAIDS) supported with novel algorithms and inclusion of new rules in existing IDS. The major target of contribution is to detect the malicious attacks and blocks the illegal activities of rogue DHCP server. This innovative security mechanism reinforces the confidence of users, protects network from illicit intervention and restore the privacy of users. Finally, the paper validates the idea through simulation and compares the findings with known existing techniques.
△ Less
Submitted 7 October, 2012;
originally announced October 2012.
-
TCP-UB: A New congestion aware transmission control protocolvariant
Authors:
Wafa Elmannai,
Abdul Razaque,
Khaled Elleithy
Abstract:
Transmission control protocol (TCP) is a connection oriented protocol for several types of distributed applications. TCP is reliable particularly for traditional fixed networks. With emergence of faster wireless networks, TCP has been performing poorly in its original format. The performance of TCP is affected due to assorted factors including congestion window, maximum packet size, retry limit, r…
▽ More
Transmission control protocol (TCP) is a connection oriented protocol for several types of distributed applications. TCP is reliable particularly for traditional fixed networks. With emergence of faster wireless networks, TCP has been performing poorly in its original format. The performance of TCP is affected due to assorted factors including congestion window, maximum packet size, retry limit, recovery mechanism, backup mechanism and mobility. To overcome deficiency of original TCP, Several modifications have been introduced to improve network quality. The mobility is a major hurdle in degrading the performance of mobile wireless networks. In this paper, we introduce and implement new TCP variant University of Bridgeport (UB) that combines the features of TCP Westwood and Vegas. We examine the performance of TCP-UB, Vegas and Westwood using different realistic scenarios. NS2 simulator demonstrates the stability of TCP-UB as compared with TCP Vegas and Westwood in highly congested networks from the mobility point of view.
△ Less
Submitted 7 October, 2012;
originally announced October 2012.
-
Novel Framework for Mobile Collaborative learning (MCL)to substantiate pedagogical activities
Authors:
Abdul Razaque,
Khalid Elleithy,
Nyembo Salama
Abstract:
Latest study shows that MCL is highly focusing paradigm for research particularity in distance and online education. MCL provides some features and functionalities for all participants to obtain the knowledge. Deployment of new emerging technologies and fast growing trends toward MCL boom attract people to develop learning management system, virtual learning environment and conference system with…
▽ More
Latest study shows that MCL is highly focusing paradigm for research particularity in distance and online education. MCL provides some features and functionalities for all participants to obtain the knowledge. Deployment of new emerging technologies and fast growing trends toward MCL boom attract people to develop learning management system, virtual learning environment and conference system with support of MCL. All these environments lack the most promising supportive framework. In addition some of major challenges in open, large scale, dynamic and heterogeneous environments are not still handled in develo** MCL for education and other organizations. These issues includes such as knowledge sharing, faster delivery of contents, request for modified contents, complete access to enterprise data warehouse, delivery of large rich multimedia contents (video-on-demand), asynchronous collaboration, synchronous collaboration, support for multi model, provision for archive updating, user friendly interface, middleware support and virtual support. To overcome these issues; the paper introduces novel framework for MCL consisting of four layers with many promising functional components, which provide access to users for obtaining required contents from enterprise data warehouse (EDW). Novel framework provides information regarding the course materials, easy access to check the grades and use of labs. The applications running on this framework give substantial feedback for collaboration such as exchange for delivery of communication contents including platform for group discussion, short message service (SMS), emails, audio, video and video-on-demand to obtain on-line information to students and other persons who will be part of collaboration.
△ Less
Submitted 7 October, 2012;
originally announced October 2012.
-
Analytical Study of Pre-congestion notification (PCN) techniques
Authors:
Marwah Almasri,
Khaled Elleithy,
Abdul Razaque
Abstract:
Maintaining the quality of service (QOS) and controlling the network congestion are quite complicated tasks. They cause degrading the performance of the network, and disturbing the continuous communication process. To overcome these issues, one step towards this dilemma has been taken in form of Pre-congestion notification (PCN) technique. PCN uses a packet marking technique within a PCN domain ov…
▽ More
Maintaining the quality of service (QOS) and controlling the network congestion are quite complicated tasks. They cause degrading the performance of the network, and disturbing the continuous communication process. To overcome these issues, one step towards this dilemma has been taken in form of Pre-congestion notification (PCN) technique. PCN uses a packet marking technique within a PCN domain over IP networks. It is notified by egress node that works as guard at entry point of network. Egress node gives feedback to communicating servers whether rate on the link is exceeded than configured admissible threshold or within the limit. Based on this feedback, admission decisions are taken to determine whether to allow/block new coming flows or terminate already accepted. The actual question is about selection of right algorithm for PCN domain. In this paper, we investigate the analytical behavior of some known PCN algorithms. We make slide modifications in originality of PCN algorithms without disquieting working process in order to employ those within similar types of scenarios. Our goal is to simulate them either in highly congested or less congested realistic scenarios. On the basis of simulation done in ns2, we are able to recommend each PCN algorithm for specific conditions. Finally, we develop a benchmark that helps researchers and scientific communities to pick the right algorithm. Furthermore, the benchmark is designed to achieve specific objectives according to the users' requirements without congesting the network.
△ Less
Submitted 11 August, 2012;
originally announced August 2012.
-
Discovery of Malicious Attacks to Improve Mobile Collaborative Learning (MCL)
Authors:
Abdul Razaque,
Khaled Elleithy
Abstract:
Mobile collaborative learning (MCL) is highly acknowledged and focusing paradigm in eductional institutions and several organizations across the world. It exhibits intellectual synergy of various combined minds to handle the problem and stimulate the social activity of mutual understanding. To improve and foster the baseline of MCL, several supporting architectures, frameworks including number of…
▽ More
Mobile collaborative learning (MCL) is highly acknowledged and focusing paradigm in eductional institutions and several organizations across the world. It exhibits intellectual synergy of various combined minds to handle the problem and stimulate the social activity of mutual understanding. To improve and foster the baseline of MCL, several supporting architectures, frameworks including number of the mobile applications have been introduced. Limited research was reported that particularly focuses to enhance the security of those pardigms and provide secure MCL to users. The paper handles the issue of rogue DHCP server that affects and disrupts the network resources during the MCL. The rogue DHCP is unauthorized server that releases the incorrect IP address to users and sniffs the traffic illegally. The contribution specially provides the privacy to users and enhances the security aspects of mobile supported collaborative framework (MSCF). The paper introduces multi-frame signature-cum anomaly-based intrusion detection systems (MSAIDS) supported with novel algorithms through addition of new rules in IDS and mathematcal model. The major target of contribution is to detect the malicious attacks and blocks the illegal activities of rogue DHCP server. This innovative security mechanism reinforces the confidence of users, protects network from illicit intervention and restore the privacy of users. Finally, the paper validates the idea through simulation and compares the findings with other existing techniques.
△ Less
Submitted 9 August, 2012;
originally announced August 2012.