Mohammed Jumha Ramadhan Alnaas
Permanent Lecturer
Qualification: Doctorate
Academic rank: Professor
Department of Computer Science - School of Basic Sciences
Publications
Comparison of 5G Networks Non-Standalone Architecture (NSA) and Standalone Architecture (SA)
Journal ArticleThe non-standalone architecture (NSA) of 5G networks builds upon existing 4G long-term evolution (LTE) infrastructure, integrating 5G new radio (NR) technology while still relying on the 4G core network. In contrast the standalone architecture (SA) of 5G networks is designed as a fully independent system, with its own 5G core network. It does not rely on the existing 4G LTE infrastructure. The NSA integrates 5G NR technology into existing 4G LTE networks, utilizing the 4G core network for control and signaling. On the other hand, the SA establishes a fully independent 5G network with its own core components, providing more advanced features and greater autonomy. The transition from NSA to SA architecture is expected as network operators deploy more comprehensive 5G networks. This paper investigated in details the major different between both architectures NSA and SA of 5G networks.
Mohammed Alnaas, (01-2024), http://www.ijcsejournal.org: International Journal of Computer Science Engineering Techniques, 8 (11), 1-11
Upgrading to 5G Networks: Existing Challenges and Potential Solutions
Journal ArticleThe introduction of the fifth generation (5G) networks indeed brings significant advancements in connectivity and has the potential to revolutionize various industries. The technologies that make 5G powerful include features such as faster speeds, reduced latency, increased capacity, and the ability to connect a wide range of devices and objects.
However, implementing 5G networks involves upgrading existing infrastructure and deploying new infrastructure, which can be both costly and time-consuming. This process requires significant investments from telecommunication companies to install new equipment and upgrade existing infrastructure to support 5G technology. Additionally, the deployment of 5G networks requires a substantial amount of radio spectrum, and regulatory frameworks need to be in place to allocate and manage the spectrum effectively. This paper provides an overview of 5G technologies, highlighting their key features and potential benefits. It also delves into the existing challenges that arise with the implementation of 5G networks and discusses some possible solutions to address these challenges.
Mohammed Alnaas, (11-2023), www.ijcseonline.org: International Journal of Computer Sciences and Engineering, 11 (11), 5-12
Effective Cloud Security Policy: Best Practices and Case Study
Journal ArticleThe main purpose of cloud cryptography is to protect sensitive data without causing any delay in data transfer, various cryptographic protocols designed to balance data security and performance to secure data through encryption. One such approach is to encrypt the data before uploading it to the cloud.
This study proposes an effective framework for protecting small and medium companies (SMEs) from cybersecurity risks and threats. The framework evaluates the system of private encryption data in a server environment using the advanced encryption standard (AES) 128 algorithm and a virtual private network (VPN) tunnel. The goal is to secure data through encryption and ensure data transfer without causing delays. The framework includes a test case where data is transferred from a storage area network (SAN) storage to the cloud. To assess the system's performance and security, a penetration test using Kali Linux is conducted. The results of this study provide insights into securing SMEs' data and mitigating cybersecurity risks effectively.
Mohammed Alnaas, (11-2023), http://www.ijsred.com: International Journal of Scientific Research and Engineering Development, 6 (6), 1-7
An Overview of the Development of Mobile Wireless Communication Technologies
Journal ArticleMobile wireless technologies have followed different evolutionary (generation) paths aimed at unified target related to the
performance and efficiency in high mobile environment, which provides access to wide range of telecommunication services
including advanced mobile services supported by mobile and fixed networks. This paper illustrate the developments of the
mobile wireless communication, focus on the specification and capability for each technology to make an idea about the future
technology what will offer.
Mohammed Alnaas, (05-2018), American Journal of Computer Science and Engineering: international journal, 5 (2), 22-29
A Cross-Layer Decision for Mobile IP Handover
Journal ArticleNetwork layer indications are not readily available upon a link change; therefore, general dependes on the network layer may introduce unnecessary delays due to network layer signaling for a simple link layer handover. If information could be gathered at link layer to determine the need for network layer signaling, then both the delay and signaling load could be really improved over the current standards of Mobile IP.
This paper presents a Cross-layer decision on two layer network and link layers to improve the performance of Enhanced Mobile IP (E-Mobile IP) handover in which reducing packet loss and latency during handover process.
Mohammed Alnaas, (08-2013), Lecture Notes on Software Engineering: international journal, 3 (1), 308-313
Performance Evaluation of Fast Handover in Mobile IPv6 Based on Link-Layer Information
Journal ArticleHandover latency is the primary cause of packet loss resulting in performance degradation of standard Mobile IPv6. Mobile IPv6 with fast Handover enables a Mobile Node (MN) to quickly detect at the IP layer that it has moved to a new subnet by receiving link-related information from the link-layer; furthermore it gathers anticipative information about the new Access Point (AP) and the associated subnet prefix when the MN is still connected to the previous Corresponding Node (CN).
This paper proposes an enhancement to Fast Mobile IPv6 handover (FMIPv6), based on link layer information, we also present performance evaluations in terms of the packet loss and handover latency using evaluation models.
Mohammed Alnaas, (06-2010), Elsevier: Elsevier, 6 (83), 1644-1650