ijsab.com logo

A Comprehensive Study and Analysis of Different Routing Protocols for Enterprise LAN A F M Zainul Abadin, Sohag Sarker, Md. Sarwar Hosain, Md. Manik Ahmed & Ahmed Imtiaz

A Comprehensive Study and Analysis of Different Routing Protocols for Enterprise LAN

Author (s)

A F M Zainul Abadin, Sohag Sarker, Md. Sarwar Hosain,   Md. Manik Ahmed & Ahmed Imtiaz

Abstract

­

Due to growth of economy, government policies, available inexpensive smart devices and low cost broadband services in both developed and developing countries the numbers of Internet users are increasing drastically over the last decades. Recently, the Internet of Things (IoT) and Industry 4.0 have become global trends. Through Internet of Things (IoT) everyone will be connected his/her devices at home, at work stations, on road, at field or anywhere else. In a network topology, various protocols are used for forwarding the packets. Routes of information (packets) are established by appropriate routing protocols. A routing table is managed by the router for successful delivery of packets from the exact predefined nodes i.e. source node to destination node.  The amount of information stored by the router about the network depends on the algorithm it follows. Most of the used popular routing algorithms are RIP, OSPF, IGRP and EIGRP. In this report, we have tried to evaluate the performance of RIP, OSPF, IGRP and EIGRP for the parameters: convergence, throughput, queuing delay and end to end delay utilization through simulation which has been performed using OPNET. We have tried to find out the best protocol suits for the designed Enterprise Local Area Network (ELAN) as well as pros and cons of each protocol.

 Keywords: Enterprise LAN, Internet of Things (IoT), Network Protocols, OPNET, Routing Protocols.

 

Download PDF

Title: A Comprehensive Study and Analysis of Different Routing Protocols for Enterprise LAN
Author: A F M Zainul Abadin, Sohag Sarker, Md. Sarwar Hosain,   Md. Manik Ahmed & Ahmed Imtiaz
Journal Name: International Journal of Science and Business
Website: ijsab.com
ISSN: ISSN 2520-4750 (Online), ISSN 2521-3040 (Print)
DOI: https://doi.org/10.5281/zenodo.4736649
Media: Online & Print
Volume: 5
Issue: 8
Acceptance Date: 29/04/2021
Date of Publication: 04/05/2021
PDF URL: https://ijsab.com/wp-content/uploads/782.pdf
Free download: Available
Page: 20-28
First Page: 20
Last Page: 28
Paper Type: Research paper
Current Status: Published

 

Cite This Article:

Abadin, A. F. M. Z., Sarker, S., Hosain, M. S.,   Ahmed, M. M., & Imtiaz, A. (2021). A Comprehensive Study and Analysis of Different Routing Protocols for Enterprise LAN. International Journal of Science and Business, 5(8), 20-28. doi: https://doi.org/10.5281/zenodo.4736649

Retrieved from https://ijsab.com/wp-content/uploads/782.pdf

 

About Author (s)

A F M Zainul Abadin, Department of Information and Communication Engineering, Pabna University of Science and Technology, Pabna, Bangaldesh.

Sohag Sarker (Corresponding author), Department of Information and Communication Engineering, Pabna University of Science and Technology, Pabna, Bangladesh. Email: sohagsarker5614@gmail.com

Md. Sarwar Hosain, Department of Information and Communication Engineering, Pabna University of Science and Technology, Pabna, Bangladesh.

Md. Manik Ahmed, Assistant Programmer, Office of the examination controller, Rabindra University  Bangladesh, Shahjadpur, Sirajgang, Bangladesh.

Ahmed Imtiaz, Department of Computer Science and Engineering, Rangamati Science and Technology University, Rangamati, Bangladesh.

 

Download PDF

DOI: https://doi.org/10.5281/zenodo.4736649

ijsab.com logo

Fog Computing Analysis Based on Internet of Thing: A Review Hindreen Rashid Abdulqadir & Nawzat Sadiq Ahmed

Fog Computing Analysis Based on Internet of Thing: A Review

Author (s)

Hindreen Rashid Abdulqadir & Nawzat Sadiq Ahmed

Abstract

­Cloud machine architectures face many drawbacks due to the improved autonomous and distributed IoT configuration. The IoT is closer to the cloud infrastructure. The fog offers IoT data care and storage locally on IoT devices rather than in the cloud. The fog provides quicker responses and better performance in relation to the cloud. The best alternative for IoT to provide powerful and effective resources for many IoT customers may therefore be called Fog Computing. This paper aims at fog computing’s state-of-the-art and alignment with IoT in detailing the advantages and challenges of implementation. This study will concentrate also on the conception of cloud and fog technology and the application of the cloud and fog paradigm to improve modern IoT technologies. Finally, open issues and alternative research directions are discussed on fog estimation and IoT.

 Keywords: Internet of Things (IoT) , Big data ,  Analyses, Fog Computing , Cloud computing.

Download PDF

Title: Fog Computing Analysis Based on Internet of Thing: A Review
Author: Hindreen Rashid Abdulqadir & Nawzat Sadiq Ahmed
Journal Name: International Journal of Science and Business
Website: ijsab.com
ISSN: ISSN 2520-4750 (Online), ISSN 2521-3040 (Print)
DOI: https://doi.org/10.5281/zenodo.4534437
Media: Online
Volume: 5
Issue: 3
Acceptance Date: 06/02/2021
Date of Publication: 11/02/2021
PDF URL: https://ijsab.com/wp-content/uploads/693.pdf
Free download: Available
Page: 137-147
First Page: 137
Last Page: 147
Paper Type: Literature Review
Current Status: Published

 

Cite This Article:

Abdulqadir, H. R. & Ahmed, N. S. (2021). Fog computing Analysis Based on Internet of Thing: A Review. International Journal of Science and Business, 5(3), 137-147. doi: https://doi.org/10.5281/zenodo.4534437

 

About Author (s)

Hindreen Rashid Abdulqadir  (corresponding author),   Information Technology Department,  Akre Technical College of Informatics, Duhok Polytechnic University, Duhok Kurdistan Region, Iraq. Email: Hindreen.rashid@dpu.edu.krd

Nawzat Sadiq Ahmed, Information Technology Management Department, Technical College of Administration, Duhok Polytechnic University,Duhok, Kurdistan Region, Iraq. Email: nawzat.ahmed@dpu.edu.krd

 

 Download PDF

DOI: https://doi.org/10.5281/zenodo.4534437

ijsab.com logo

Survey on Edge Computing Security Baydaa Hassan Husain & Shavan Askar

Survey on Edge Computing Security

Author (s)

Baydaa Hassan Husain & Shavan Askar

Abstract

­

It’s possible to explain Edge computing (EC) as a distributed system of IT that decentralized the power of processing in which the mobile Internet of Things (IoT) computing would be allowed. In EC, data processed by local tools, computers, or servers, instead of being process and transmitted from the data center. However, with the wider capabilities of EC by increasing the network performance and reducing the latency, security challenges, and the risks will increase with data being stored and used on these devices on the edge or end of the network. This paper first provides a definition of EC and explain the reasons that led to the rapid spread of this type of computing with an explanation of the most important differences between EC and CC, in terms of the resources available for each type, processing, storage, as well as the privacy and security factor. Later, explaining the uses and benefits of this type of computing. However, the challenges are also taken into consideration, foremost among which is security. Through reviewing a number of previous researches, security challenges have been identified in four main sectors, including data privacy and security, access control, attack mitigation, and detection for anomalies Finally, choosing a set of solutions that were drawn from previous studies and contributed in reducing and limiting these challenges. Hopping this paper sheds light on Edge Computing security and paves the way for more future research.

 Keywords: Edge Computing (EC), Internet of Things (IoT), Cloud Computing, Security, distributed system of IT.

Download PDF

Title: Survey on Edge Computing Security
Author: Baydaa Hassan Husain & Shavan Askar
Journal Name: International Journal of Science and Business
Website: ijsab.com
ISSN: ISSN 2520-4750 (Online), ISSN 2521-3040 (Print)
DOI: https://doi.org/10.5281/zenodo.4496939
Media: Online
Volume: 5
Issue: 3
Acceptance Date: 01/02/2021
Date of Publication: 03/02/2021
PDF URL: https://ijsab.com/wp-content/uploads/685.pdf
Free download: Available
Page: 52-60
First Page: 52
Last Page: 60
Paper Type: Literature Review
Current Status: Published

 

Cite This Article:

Baydaa Hassan Husain & Shavan Askar (2021). Survey on Edge Computing Security. International Journal of Science and Business, 5(3), 52-60. doi: https://doi.org/ 10.5281/zenodo.4496939

Retrieved from https://ijsab.com/wp-content/uploads/685.pdf

 

About Author (s)

Baydaa Hassan Husain,  Information System Engineering, Erbil Polytechnic University, Erbil, Iraq. Email: baydaa.mei20@epu.edu.iq.

Shavan Askar (Corresponding Author), Assistant Professor, Erbil Polytechnic University, Erbil, Iraq. Email: shavan.askar@epu.edu.iq.

 

 Download PDF

DOI: https://doi.org/10.5281/zenodo.4496939

ijsab.com logo

Resource Allocation in Fog Computing: A Review Kosrat Dlshad Ahmed & Subhi R. M. Zeebaree

Resource Allocation in Fog Computing: A Review

Author (s)

Kosrat Dlshad Ahmed & Subhi R. M. Zeebaree

Abstract

­Coupled with resource retrained system and devices, Internet of things network requires effective utilization of Fog Computing system. With increasing demand and requirements for enhancing the performance, fog computing scenario requires increased output, less latency, greater performance etc. This review takes the concept of fog computing one step further by reviewing available literature on the components of fog computing to determine the effective outcomes for different settings and management of the network consideration. Contributing to the development appropriate settings and management of the cloud based support, necessary analysis has been carried out in this review. Systematic analysis on the development of fog computing such as system model has been analyzed. To review the prospects and development of fog computing, necessary relationships have been established such as fog computing, fog – cloud computing and fog – fog computing. Based on the learning of the research, future direction for the research has been suggested as well.

 Keywords: Fog Computing, Internet of Vehicles (IoV), Internet of Things (IoT), Mapping Study, Resource Allocation, Fog Nodes, Quality of Experience (QoE).

Download PDF

Title: Resource Allocation in Fog Computing: A Review
Author: Kosrat Dlshad Ahmed & Subhi R. M. Zeebaree
Journal Name: International Journal of Science and Business
Website: ijsab.com
ISSN: ISSN 2520-4750 (Online), ISSN 2521-3040 (Print)
DOI: https://doi.org/10.5281/zenodo.4461876
Media: Online
Volume: 5
Issue: 2
Acceptance Date: 20/01/2021
Date of Publication: 25/01/2021
PDF URL: https://ijsab.com/wp-content/uploads/670.pdf
Free download: Available
Page: 54-63
First Page: 54
Last Page: 63
Paper Type: Literature Review
Current Status: Published

 

Cite This Article:

Kosrat Dlshad Ahmed & Subhi R. M. Zeebaree (2021) Resource Allocation in Fog Computing: A Review. International Journal of Science and Business, 5(2), 54-63. doi: https://doi.org/10.5281/zenodo.4461876

Retrieved from https://ijsab.com/wp-content/uploads/670.pdf

 

About Author (s)

Kosrat Dlshad Ahmed (corresponding author), ISE Department, Erbil Polytechnic University, Erbil – Kurdistan Region – Iraq,  kosrat.ahmed@epu.edu.iq.

Subhi R. M. Zeebaree, Information Technology Department, Duhok Polytechnic University, Duhok – Kurdistan Region – Iraq, subhi.rafeeq@dpu.edu.krd.

 

 Download PDF

DOI: https://doi.org/10.5281/zenodo.4461876