Department of Networking

More ...

About Department of Networking

Facts about Department of Networking

We are proud of what we offer to the world and the community

29

Publications

10

Academic Staff

172

Students

48

Graduates

Programs

Major

...

Details

Who works at the Department of Networking

Department of Networking has more than 10 academic staff members

staff photo

Prof.Dr. Mahmud Milud Ali Mansour

محمود منصور هو أحد أعضاء هيئة التدريس بقسم الشبكات بكلية تقنية المعلومات. يعمل السيد محمود بجامعة طرابلس كـأستاذ منذ 2020-02-03 وله العديد من المنشورات العلمية في مجال تخصصه

Publications

Some of publications in Department of Networking

Performance Comparison of VoIP over MPLS-Based Networks with RSVP Protocol Using SIP, H.323 Signaling Protocols

This paper describes the usage of OPNET simulation tool to evaluate VoIP over MPLS networks which employs RSVP protocol as QoS mechanism with SIP or H.323 as signaling protocols for setting up VoIP calls over the Internet. The results showed that the H.323 with RSVP over MPLS networks produced minimal end-to-end delay than SIP protocol; making it a good choice as a signaling protocol with VoIP over MPLS networks for places requiring minimal end-to-end delay, while SIP reported lowest delay jitter with minimal call setup time
Azeddien M. Sllame, Asra Hema, Huda Alnajem(3-2018)
Publisher's website

Enhancement of Grain-128 Using Variable Feedback Polynomials of Linear Feedback Shift Register

DLFSR is promising for enhancing the security of stream ciphers. However, good inviolability and statistical properties of the DLFSR generator are only achievable when the parameters of the switching algorithm are properly selected. This paper describes a new experimental method for choosing suitable parameters for the algorithm of switching the polynomial in DLFSR. This method was used to enhance the Grain-128 stream cipher. The randomness of the modified Grain was evaluated using the NIST suite, and the results are encouraging. The modified Grain was also compared to the original, and the results indicated that the modified algorithm outperforms the original in several tests. arabic 12 English 82
Fayrouz Aljadi, Ibrahim Almerhag, Fardous Eljadi(3-2019)
Publisher's website

Vulnerabilities of Biometric Authentication “Threats and Countermeasures”

Biometric systems have a powerful potential to provide security for a variety of applications, systems are nowadays being introduced in many applications and have already been deployed to protect personal computers, Banking machines, credit cards, electronic transactions, airports, high security institutions like nuclear facilities, Military Bases and other applications like borders control, access control, sensitive data protection and on-line tracking systems. While biometrics may improve security in different environments and serve many purposes, biometric systems, like any other security system, have vulnerabilities and are susceptible to threats. they are susceptible to external vulnerabilities of biometric systems so that their weaknesses can be found and useful countermeasures against foreseeable attacks can be developed The increasingly high profile use of biometrics for security purposes has provoked new interest in researching and exploring methods of attacking biometric systems.
Abdulmonam Omar Ahmed Alaswad, Ahlal H. Montaser, Fawzia Elhashmi Mohamad(0-2014)
Publisher's website