Department of Networking

More ...

About Department of Networking

Facts about Department of Networking

We are proud of what we offer to the world and the community

29

Publications

10

Academic Staff

172

Students

48

Graduates

Programs

Major

...

Details

Who works at the Department of Networking

Department of Networking has more than 10 academic staff members

staff photo

Prof.Dr. Mahmud Milud Ali Mansour

محمود منصور هو أحد أعضاء هيئة التدريس بقسم الشبكات بكلية تقنية المعلومات. يعمل السيد محمود بجامعة طرابلس كـأستاذ منذ 2020-02-03 وله العديد من المنشورات العلمية في مجال تخصصه

Publications

Some of publications in Department of Networking

Using sequence DNA chips data to Mining and Diagnosing Cancer Patients

Deoxyribonucleic acid (DNA) micro-arrays present a powerful means of observing thousands of gene terms levels at the same time. They consist of high dimensional datasets, which challenge conventional clustering methods. The data’s high dimensionality calls for Self Organizing Maps (SOMs) to cluster DNA micro-array data. The DNA micro-array dataset are stored in huge biological databases for several purposes . The proposed methods are based on the idea of selecting a gene subset to distinguish all classes, it will be more effective to solve a multi-class problem, and we will propose a genetic programming (GP) based approach to analyze multi-class micro-array datasets. This biological dataset will be derived from multiple biological databases. The procedure responsible for extracting datasets called DNA-Aggregator. We will design a biological aggregator, which aggregates various datasets via DNA micro-array community-developed ontology based upon the concept of semantic Web for integrating and exchanging biological data. Our aggregator is composed of modules that retrieve the data from various biological databases. It will also enable queries by other applications to recognize the genes. The genes will be categorized in groups based on a classification method, which collects similar expression patterns. Using a clustering method such as k-mean is required either to discover the groups of similar objects from the biological database to characterize the underlying data distribution. arabic 10 English 60
Mariam Abojela Msaad, Zakaria Suliman Zubi(1-2010)
Publisher's website

Multiprotocol Label Switching

Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of the OSI model; for this reason, MPLS has been referred to as operating at Layer 2.5. MPLS can overlay existing technologies such as Asynchronous Transfer Mode (ATM) or Frame Relay, or it can operate in an entirely IP native environment; this can allow users to take advantage of existing Customer Premises Equipment (CPE) while making a move towards converging all network traffic, such as data, video and voice, at a pace that users can accommodate and afford. MPLS provides. its users a number of advantageous features such as traffic engineering, network convergence, failure protection, and the ability to guarantee Quality of Service (QoS) over IP. arabic 2 English 27
Mariam Abojela Msaad, Amer R. Zerek , Wesam M. Tohamei(1-2012)
Publisher's website

Performance Evaluation of First Hop Redundancy Protocol (FHRPv6) with Routing Protocol OSPFv6

Network availability is a key consideration in disaster planning, but it also has critical impacts on everyday life and work. For organizations, network downtime or sluggishness equates to business downtime, at considerable cost to organizations through inefficiency, lost sales, lack of critical data for decisions, and other harmful effects. First hop redundancy protocols (FHRP) are an essential tool for improving the availability of IP networks. In this paper, we evaluate the three particular protocols of FHRPs, namely the Hot Standby Router Protocol (HSRPv6), Virtual Router Redundancy Protocol (VRRPv3), and Gateway Load Balancing (GLBPv6) using GNS3 tools. The First Hop Redundancy Protocols have been implemented, tested, optimized, and compared to one another in terms of CPU Utilization, Traffic flow, packet loss and convergence time. The comparison indicates which protocol is best in which scenario and which is best among the three protocols.
Mahmud Mansour, Mohamed Alamin Alqomati, Mohmed K. Al-said(3-2022)
Publisher's website