International Journal of Computer Networks and Communications Security

Volume 2, Issue 3, March 2014




Performance Analysis of Multimedia Traffic over MPLS Communication Networks with Traffic Engineering

Pages: 93-101 (9) | [Full Text] PDF (687 KB)
Dr. Abdul-Bary R. Sulaiman and Omar Kh. Salih Alhafidh
College of Electronic Engineering, Computer and Information Dep. University of Mosul, Iraq
College of Computer Science and Mathematics, Computer Science Dept. University of Mosul, Iraq

Abstract —
The recent evolutions of IP networks are seeing IP applications becoming more complex and requiring higher bandwidth consumption. More recently, IP networks are employing MPLS which is a technique can be used to improve the performance of IP networks. By use of MPLS, data packets can be switched on the basis of labels rather than routed on the basis of destination address. MPLS supports different features like traffic engineering (TE), QoS and VPNs etc. The key feature of MPLS is its TE, which plays a vital role for minimizing the congestion by efficient load balancing and management of the network resources. Due to lower network delay, efficient forwarding mechanism, enhancing the speed of packet transfer, scalability and predictable performance of the services provided by MPLS technology makes it more suitable for implementing real-time applications such as VoIP and video Conferencing. This paper evaluated the performance measures such as delay variation, delay, page response time, throughput, and packet drop for different types of traffic (voice, video, data) in their movement in a congested network for both MPLS-TE and conventional IP network. OPNET modeler is used to simulate the both networks, the simulation study is conducted in this paper; It is a means to illustrate the benefits of using MPLS-TE for multimedia applications.
Index Terms — Multiprotocol Label Switching (MPLS), Traffic Engineering (TE), Voice Over IP (VoIP), Internet Protocol (IP), Multiprotocol Label Switching Traffic Engineering (MPLS-TE), OPNET.



Adaptive E-Learning System Based On Learning Interactivity

Pages: 102-108 (7) | [Full Text] PDF (501 KB)
Mohammed Yaqub, A. M. Raid, Haitham A. EL-Ghareeb
Information Systems Department, Faculty of Computers and Information Sciences, Mansoura University, Egypt
Faculty of Computers and Information Sciences, Mansoura University, Egypt

Abstract —
In this paper we propose an improved E-Learning Social Network Exploiting Approach based on clustering algorithm and graph model, which can automatically group distributed e-learners with similar interests and make proper recommendations, which can finally enhance the collaborative learning among similar e-learners. Through similarity discovery, trust weights update and potential friends adjustment, the algorithm implements an automatic adapted trust relationship with gradually enhanced satisfactions. 
Index Terms — Social Network, E-learning, Collaborative Learning, Relations, Clustering and Adpative E-learning



Entrepreneurship Education Program (EEP) Activities to Improve the Entrepreneurship Attitudes and Business Attitudes of the Entrepreneurs and Batik Artisans in Surakarta and Sragen

Pages: 109-112 (4) | [Full Text] PDF (167 KB)
Magister of Management Program, Faculty of Economy UNS Surakarta, Jl. Ir. Sutami 36A Kentingan Surakarta 57126 & PPkwu-LPPM-UNS

Abstract —
EEP (Entrepreneurship Education Program) is an entrepreneurship education program that intended to influence the future individual entrepreneurship behavior and improve business success. The purpose of this activity is to increase motivation for entrepreneurial learning, gain an understanding of the importance of creativity and innovation, and production management in doing business in its field in order to improve its performance. This activity is carried on industry partners, entrepreneurs, and batik artisans in the region of Surakarta and Sragen. Production management training is done in batik industries in Laweyan village, whereas motivational training (outbound training) performed on batik industries in Kauman village, while the production creativity training is done on entrepreneurs and batik artisans in the village of Pilang, Sragen. Training results indicate a positive response to the training program given.  
Index Terms — EEP, production management training, outbound training, training creativity production



Design and Implementation an Online Location Based Services Using Google Maps for Android Mobile

Pages: 113-118 (6) | [Full Text] PDF (642 KB)
Computer Science Dept. College of Computer Science and mathematics Iraq, Mosul, Mosul University

Abstract —
People are travelling to many different places and they are unknown the directions and the route to be followed. Without knowing the directions, this may Cause to get the wrong way. To avoid this situation, many mobile applications are developed to help people to get the right directions. Unfortunately, most of this application doesn’t support many important features like add or delete some locations (hospitals, schools, restaurants, etc...) on map. This paper introduces an application for android mobile, which is implemented to provide the android mobile user to add, remove and review specific locations on the online map. The proposed applications also presents the basics navigation operations like showing directions with the optimal path between source and destination and calculating the distance and expected driving time. Google Maps APIs, Google Direction APIs, PHP, JSON and MySQL have been integrated and used in this application to obtain solutions. This application is a representation for client/server architecture, the android mobile serve as a client and the combination of PHP and MySQL database serve as a server.  
Index Terms — Online Mapping, Google Maps API, MySQL, PHP, Google Directions API



eLoBa Chaotic Keystream Cipher: Implementation, Analysis and Performance

Pages: 119-124 (6) | [Full Text] PDF (378 KB)
Polytechnic Institute of Beja (IPBeja)/Lab UbiNET/INESC-ID, Department of Engineering, Beja, Portugal
Technical University of Lisbon (UTL)/INESC-ID, Department of Electrical and Computer Engineering, Lisbon, Portugal

Abstract —
Many computer-based security services are required by modern society, such as cipher/decipher, authentication and integrity. Security services are implemented by cryptographic systems, such as symmetric (block and keystream) and asymmetric. We focus our attention to a special sort of keystream cryptographic systems, based on chaotic systems. In our paper, we describe eLoBa architecture, based on Lorenz chaotic system. We also analyze one important security issue of keystream cryptographic systems, the cycle length. Finally, we compare eLoBa against several cryptographic systems, for its performance on a authentication service implementation on a resource constraint smart-card.  
Index Terms — Chaotic Cipher, Smart-Card Authentication, Keystream Cipher, Security and Privacy, Cryptography.