Department of Networking

More ...

About Department of Networking

Facts about Department of Networking

We are proud of what we offer to the world and the community

29

Publications

10

Academic Staff

172

Students

48

Graduates

Programs

Major

...

Details

Who works at the Department of Networking

Department of Networking has more than 10 academic staff members

staff photo

Prof.Dr. Azeddien M S Sllame

عزالدين السلامي هو احد اعضاء هيئة التدريس بقسم الشبكات بكلية تقنية المعلومات. يعمل السيد عزالدين السلامي بجامعة طرابلس كـاستاذ دكتورمنذ 2022-02-05 وله العديد من المنشورات العلمية في مجال تخصصه في العديد من المجلات العلمية والمؤتمرات دولية من مثل مؤتمرات IEEE و ACM

Publications

Some of publications in Department of Networking

Performance Evaluation of First Hop Redundancy Protocol (FHRPv6) with Routing Protocol OSPFv6

Network availability is a key consideration in disaster planning, but it also has critical impacts on everyday life and work. For organizations, network downtime or sluggishness equates to business downtime, at considerable cost to organizations through inefficiency, lost sales, lack of critical data for decisions, and other harmful effects. First hop redundancy protocols (FHRP) are an essential tool for improving the availability of IP networks. In this paper, we evaluate the three particular protocols of FHRPs, namely the Hot Standby Router Protocol (HSRPv6), Virtual Router Redundancy Protocol (VRRPv3), and Gateway Load Balancing (GLBPv6) using GNS3 tools. The First Hop Redundancy Protocols have been implemented, tested, optimized, and compared to one another in terms of CPU Utilization, Traffic flow, packet loss and convergence time. The comparison indicates which protocol is best in which scenario and which is best among the three protocols.
Mahmud Mansour, Mohamed Alamin Alqomati, Mohmed K. Al-said(3-2022)
Publisher's website

Studying and Investigation of Virtual Private Networking

Virtual Private Network (VPN) technology provides a way of protecting information being transmitted over the Internet, by allowing users to establish a virtual private “tunnel” to securely enter an internal network, accessing resources, data and communications via an insecure network such as the Internet. A VPN is a communications environment in which access is controlled to permit peer connections only within a defined community of interest, and is constructed though some form of partitioning of a common underlying communications medium, where this underlying communications medium provides services to the network on a nonexclusive basis. arabic 6 English 50
Mariam Abojela Msaad, Amer R. Zerek, Hana H. saleh(1-2012)
Publisher's website

A Comparative Study of VoIP over IEEE 802.11(b, g) and WiMax (UGS, ertPS) Wireless Network Technologies

This paper describes a comparative study of the performance of VoIP over wireless networks using OPNET tool. The simulation study is completed by running VoIP application in different network scenarios with IEEE 802.16 (UGS, ertPS) and IEEE 802.11 (b, g) with best effort service and interactive service The result clearly illustrated that the WiMax type ertPS has the best performance among all tested cases
Azeddien M. Sllame, Hana Soso, Mona Aown, Lamya Abdelmajeed(9-2016)
Publisher's website