This page has only limited features, please log in for full access.

Dr. Omar Almomani
World Islamic Sciences and Education University

Basic Info


Research Keywords & Expertise

0 Machine Learning
0 Network Security
0 Wireless Sensor Networks (WSN)
0 IoT
0 Computer Network

Honors and Awards

The user has no records in this section


Career Timeline

The user has no records in this section.


Short Biography

The user biography is not available.
Following
Followers
Co Authors
The list of users this user is following is empty.
Following: 0 users

Feed

Journal article
Published: 10 March 2021 in Sustainability
Reads 0
Downloads 0

Despite the fact that several studies have been conducted to study the adoption of smart-government services, little consideration has been paid to exploring the main factors that influence the adoption of smart-government services at the three main stages of smart-government services (the static, interaction, and transaction stages). Based on the results of this study, each of these three stages has different requirements in terms of system compatibility, security, information quality, awareness, perceived functional benefit, self-efficacy, perceived image, perceived uncertainty, availability of resources, and perceived trust. In addition, the results demonstrate that the requirements and perceptions of users towards the adoption and use of smart-government services in the three stages significantly differ. This study makes a unique contribution to the existing research by examining the perceptions and needs of consumers, in terms of adoption throughout the three stages.

ACS Style

Ahmad Althunibat; Muhammad Binsawad; Mohammed Almaiah; Omar Almomani; Adeeb Alsaaidah; Waleed Al-Rahmi; Mohamed Seliaman. Sustainable Applications of Smart-Government Services: A Model to Understand Smart-Government Adoption. Sustainability 2021, 13, 3028 .

AMA Style

Ahmad Althunibat, Muhammad Binsawad, Mohammed Almaiah, Omar Almomani, Adeeb Alsaaidah, Waleed Al-Rahmi, Mohamed Seliaman. Sustainable Applications of Smart-Government Services: A Model to Understand Smart-Government Adoption. Sustainability. 2021; 13 (6):3028.

Chicago/Turabian Style

Ahmad Althunibat; Muhammad Binsawad; Mohammed Almaiah; Omar Almomani; Adeeb Alsaaidah; Waleed Al-Rahmi; Mohamed Seliaman. 2021. "Sustainable Applications of Smart-Government Services: A Model to Understand Smart-Government Adoption." Sustainability 13, no. 6: 3028.

Journal article
Published: 01 January 2021 in Computers, Materials & Continua
Reads 0
Downloads 0
ACS Style

Omar Almomani. A Hybrid Model Using Bio-Inspired Metaheuristic Algorithms for Network Intrusion Detection System. Computers, Materials & Continua 2021, 68, 409 -429.

AMA Style

Omar Almomani. A Hybrid Model Using Bio-Inspired Metaheuristic Algorithms for Network Intrusion Detection System. Computers, Materials & Continua. 2021; 68 (1):409-429.

Chicago/Turabian Style

Omar Almomani. 2021. "A Hybrid Model Using Bio-Inspired Metaheuristic Algorithms for Network Intrusion Detection System." Computers, Materials & Continua 68, no. 1: 409-429.

Journal article
Published: 25 September 2020 in IEEE Access
Reads 0
Downloads 0

Wireless Sensor Networks (WSNs) have revolutionized the era of conventional computing into a digitized world, commonly known as “The Internet of Things”. WSN consists of tiny low-cost sensing devices, having computation, communication and sensing capabilities. These networks are always debatable for their limited resources and the most arguable and critical issue in WSNs is energy efficiency. Sensors utilize energy in broadcasting, routing, clustering, on-board calculations, localization, and maintenance, etc. However, primary domains of energy consumption at node level are three i.e. sensing by sensing-module, processing by microprocessor and communication by radio link. Extensive sensing, over-costs processing and frequent communication not only minimize the network life-time, but also affects the availability of these resources for other tasks. To increase life-time and provide an energy-efficient WSN, here we have proposed a new scheme called “A Content-based Adaptive and Dynamic Scheduling (CADS) using two ways communication model in WSNs”. CADS dynamically changes a node states during data aggregation and each node adapts a new state based on contents of the sensed data packets. Analyzer module at the Base-Station investigates contents of sensed data packets and regulates functions of a node by transmitting control messages in a backward direction. CADS minimizes energy consumption by reducing unnecessary network traffic and avoid redundant message-forwarding. Simulation results have been shown that it increases energy-efficiency in terms of network life-time by 9.65% in 100 nodes-network, 11.36% in 150 nodes-network and 0.94% in 300 nodes. The proposed scheme is also showing stability in terms of increasing cluster life by 87.5% for a network of 100 nodes, 94.73% for 150 nodes and 53.9% in 300 nodes.

ACS Style

Muhammad Nawaz Khan; Haseeb Ur Rahman; Mohammed Amin Almaiah; Ajab Khan; Mushtaq Raza; Mohammed Al-Zahrani; Omar Almomani; Rahim Khan. Improving Energy Efficiency With Content-Based Adaptive and Dynamic Scheduling in Wireless Sensor Networks. IEEE Access 2020, 8, 176495 -176520.

AMA Style

Muhammad Nawaz Khan, Haseeb Ur Rahman, Mohammed Amin Almaiah, Ajab Khan, Mushtaq Raza, Mohammed Al-Zahrani, Omar Almomani, Rahim Khan. Improving Energy Efficiency With Content-Based Adaptive and Dynamic Scheduling in Wireless Sensor Networks. IEEE Access. 2020; 8 (99):176495-176520.

Chicago/Turabian Style

Muhammad Nawaz Khan; Haseeb Ur Rahman; Mohammed Amin Almaiah; Ajab Khan; Mushtaq Raza; Mohammed Al-Zahrani; Omar Almomani; Rahim Khan. 2020. "Improving Energy Efficiency With Content-Based Adaptive and Dynamic Scheduling in Wireless Sensor Networks." IEEE Access 8, no. 99: 176495-176520.

Journal article
Published: 23 June 2020 in Symmetry
Reads 0
Downloads 0

The network intrusion detection system (NIDS) aims to identify virulent action in a network. It aims to do that through investigating the traffic network behavior. The approaches of data mining and machine learning (ML) are extensively used in the NIDS to discover anomalies. Regarding feature selection, it plays a significant role in improving the performance of NIDSs. That is because anomaly detection employs a great number of features that require much time. Therefore, the feature selection approach affects the time needed to investigate the traffic behavior and improve the accuracy level. The researcher of the present study aimed to propose a feature selection model for NIDSs. This model is based on the particle swarm optimization (PSO), grey wolf optimizer (GWO), firefly optimization (FFA) and genetic algorithm (GA). The proposed model aims at improving the performance of NIDSs. The proposed model deploys wrapper-based methods with the GA, PSO, GWO and FFA algorithms for selecting features using Anaconda Python Open Source, and deploys filtering-based methods for the mutual information (MI) of the GA, PSO, GWO and FFA algorithms that produced 13 sets of rules. The features derived from the proposed model are evaluated based on the support vector machine (SVM) and J48 ML classifiers and the UNSW-NB15 dataset. Based on the experiment, Rule 13 (R13) reduces the features into 30 features. Rule 12 (R12) reduces the features into 13 features. Rule 13 and Rule 12 offer the best results in terms of F-measure, accuracy and sensitivity. The genetic algorithm (GA) shows good results in terms of True Positive Rate (TPR) and False Negative Rate (FNR). As for Rules 11, 9 and 8, they show good results in terms of False Positive Rate (FPR), while PSO shows good results in terms of precision and True Negative Rate (TNR). It was found that the intrusion detection system with fewer features will increase accuracy. The proposed feature selection model for NIDS is rule-based pattern recognition to discover computer network attack which is in the scope of Symmetry journal.

ACS Style

Omar Almomani. A Feature Selection Model for Network Intrusion Detection System Based on PSO, GWO, FFA and GA Algorithms. Symmetry 2020, 12, 1046 .

AMA Style

Omar Almomani. A Feature Selection Model for Network Intrusion Detection System Based on PSO, GWO, FFA and GA Algorithms. Symmetry. 2020; 12 (6):1046.

Chicago/Turabian Style

Omar Almomani. 2020. "A Feature Selection Model for Network Intrusion Detection System Based on PSO, GWO, FFA and GA Algorithms." Symmetry 12, no. 6: 1046.

Journal article
Published: 08 May 2020 in TURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES
Reads 0
Downloads 0
ACS Style

Mohammed Madi; Fidaa Jarghon; Yousef Fazea; Omar Almomani; Adeeb Saaidah. Comparative analysis of classification techniques for network fault management. TURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES 2020, 28, 1442 -1457.

AMA Style

Mohammed Madi, Fidaa Jarghon, Yousef Fazea, Omar Almomani, Adeeb Saaidah. Comparative analysis of classification techniques for network fault management. TURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES. 2020; 28 (3):1442-1457.

Chicago/Turabian Style

Mohammed Madi; Fidaa Jarghon; Yousef Fazea; Omar Almomani; Adeeb Saaidah. 2020. "Comparative analysis of classification techniques for network fault management." TURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES 28, no. 3: 1442-1457.

Journal article
Published: 18 April 2020 in Sensors
Reads 0
Downloads 0

Wireless Sensor Networks (WSNs) are vulnerable to various security threats. One of the most common types of vulnerability threat is the jamming attack, where the attacker uses the same frequency signals to jam the network transmission. In this paper, an edge node scheme is proposed to address the issue of jamming attack in WSNs. Three edge nodes are used in the deployed area of WSN, which have different transmission frequencies in the same bandwidth. The different transmission frequencies and Round Trip Time (RTT) of transmitting signal makes it possible to identify the jamming attack channel in WSNs transmission media. If an attacker jams one of the transmission channels, then the other two edge nodes verify the media serviceability by means of transmitting information from the same deployed WSNs. Furthermore, the RTT of the adjacent channel is also disturbed from its defined interval of time, due to high frequency interference in the adjacent channels, which is the indication of a jamming attack in the network. The simulation result was found to be quite consistent during analysis by jamming the frequency channel of each edge node in a step-wise process. The detection rate of jamming attacks was about 94% for our proposed model, which was far better than existing schemes. Moreover, statistical analyses were undertaken for field-proven schemes, and were found to be quite convincing compared with the existing schemes, with an average of 6% improvement.

ACS Style

Muhammad Adil; Mohammed Amin Almaiah; Alhuseen Omar Alsayed; Omar Almomani. An Anonymous Channel Categorization Scheme of Edge Nodes to Detect Jamming Attacks in Wireless Sensor Networks. Sensors 2020, 20, 2311 .

AMA Style

Muhammad Adil, Mohammed Amin Almaiah, Alhuseen Omar Alsayed, Omar Almomani. An Anonymous Channel Categorization Scheme of Edge Nodes to Detect Jamming Attacks in Wireless Sensor Networks. Sensors. 2020; 20 (8):2311.

Chicago/Turabian Style

Muhammad Adil; Mohammed Amin Almaiah; Alhuseen Omar Alsayed; Omar Almomani. 2020. "An Anonymous Channel Categorization Scheme of Edge Nodes to Detect Jamming Attacks in Wireless Sensor Networks." Sensors 20, no. 8: 2311.

Review
Published: 10 December 2019 in Electronics
Reads 0
Downloads 0

Wireless sensor networks have recently been widely used in several applications and scenarios, especially because they have the ability and flexibility for establishing a scalable and reliable wireless network. Cooperative multi-robotic systems (CMRS) are one example of these applications where establishing a wireless network between robots is essential and paramount to their operation. Further, these robots can utilize their mobility to provide sensing functionality for areas that are not covered by the static sensor. This can be achieved by equipping the robots with specific sensors to sense the area of interest (AoI) and report the sensed data to a remote monitoring center for further processing and decision-making. However, the nodes that form the sensor network have limited energy, and, as such, efficient algorithms in clusters’ formation, packets’ routing, and energy and mobility management are paramount. In this paper, a literature survey is presented containing the most related works that have been proposed to solve these challenges utilizing fuzzy logic. Most of the literature work attempted to utilize a de-centralized approach, where certain input parameters such as the residual energy, communication link quality, network congestion status, the nodes’ distance to the sink node and its location with respect to the other nodes, and the data and their sampling rate are all used as inputs to the fuzzy logic controller. These input parameters are used to determine several performance vital factors such as the cluster formation and its cluster head, best route to the sink node, optimal power management policies in terms of sleep/awake times needed to maximize the network lifetime, nodes’ mobility management policies to maintain network connectivity, and best route in terms of packet loss and delay.

ACS Style

Ala Khalifeh; Kishore Rajendiran; Khalid A. Darabkh; Ahmad M. Khasawneh; Omar Almomani; Zinon Zinonos. On the Potential of Fuzzy Logic for Solving the Challenges of Cooperative Multi-Robotic Wireless Sensor Networks. Electronics 2019, 8, 1513 .

AMA Style

Ala Khalifeh, Kishore Rajendiran, Khalid A. Darabkh, Ahmad M. Khasawneh, Omar Almomani, Zinon Zinonos. On the Potential of Fuzzy Logic for Solving the Challenges of Cooperative Multi-Robotic Wireless Sensor Networks. Electronics. 2019; 8 (12):1513.

Chicago/Turabian Style

Ala Khalifeh; Kishore Rajendiran; Khalid A. Darabkh; Ahmad M. Khasawneh; Omar Almomani; Zinon Zinonos. 2019. "On the Potential of Fuzzy Logic for Solving the Challenges of Cooperative Multi-Robotic Wireless Sensor Networks." Electronics 8, no. 12: 1513.

Journal article
Published: 05 November 2019 in Modern Applied Science
Reads 0
Downloads 0

Internet of Things (IOT) system often consists of thousands of constrained connected devices. Resource-constrained devices one of critical issues in a low- power and lossy network LLNs. RPL is IPv6 routing protocol. It’s designed by IETF to be simple and inter-operable networking protocol to overcome these resource limitations. The RPL carries out Objective Functions (OFs) in the aim of finding the best path. The OFs chooses the best parent nodes aiming to build the route and optimize it. The metrics used to build the OF must be selected in an effective and accurate manner for finding the optimal path and meets all constraints. A survey about node metrics which can be utilized in OFs of RPL is presented, and node metrics calculations are explained then discussed thoroughly. The researcher displays the most relevant research efforts regarding the RPL OFs existing in literature.

ACS Style

Adeeb Saaidah; Omar Almomani; Laila Al-Qaisi.; Nesreen Alsharman; Faisal Alzyoud. A Comprehensive Survey on Node Metrics of RPL Protocol for IoT. Modern Applied Science 2019, 13, p1 .

AMA Style

Adeeb Saaidah, Omar Almomani, Laila Al-Qaisi., Nesreen Alsharman, Faisal Alzyoud. A Comprehensive Survey on Node Metrics of RPL Protocol for IoT. Modern Applied Science. 2019; 13 (12):p1.

Chicago/Turabian Style

Adeeb Saaidah; Omar Almomani; Laila Al-Qaisi.; Nesreen Alsharman; Faisal Alzyoud. 2019. "A Comprehensive Survey on Node Metrics of RPL Protocol for IoT." Modern Applied Science 13, no. 12: p1.

Preprint
Published: 12 February 2016
Reads 0
Downloads 0

The purpose of this study is to construct a near capacity Irregular Turbo Code and to evaluate its performance over Gaussian channel. The methodology used to evaluate and measure the performance of the new design is by simulating the system by developing a software platform using Matlab. The simulation carried out by implementing the system over different modulation schemes, different frame sizes, and different code rates in order to achieve a fair comparison between irregular turbo code and regular Turbo Code. The simulation results showed that the Irregular Turbo Code with 64QAM modulation is capable of achieving a coding gain of 1.29 dB over its corresponding Turbo Code for a low Bit Error Rate 10 to 5, when used in a Gaussian noisy channel. Also, the Irregular Turbo Code designed in this paper, utilizes a single recursive Convolution encoder with short frame size of 5012 bits. The new designed codec can play an important role in many commercial applications such as Third-Generation wireless phones, Digital Video Broadcasting systems, or Wireless Metropolitan Area Networks, etc.

ACS Style

Abiodun Sholiyi; Jafar A. Alzubi; Omar A. Alzubi; Omar Almomani; Tim O'farrell. Near Capacity Irregular Turbo Code. 2016, 1 .

AMA Style

Abiodun Sholiyi, Jafar A. Alzubi, Omar A. Alzubi, Omar Almomani, Tim O'farrell. Near Capacity Irregular Turbo Code. . 2016; ():1.

Chicago/Turabian Style

Abiodun Sholiyi; Jafar A. Alzubi; Omar A. Alzubi; Omar Almomani; Tim O'farrell. 2016. "Near Capacity Irregular Turbo Code." , no. : 1.

Journal article
Published: 22 September 2015 in Indian Journal of Science and Technology
Reads 0
Downloads 0
ACS Style

Abiodun Sholiyi; Jafar A. Alzubi; Omar Alzubi; Omar Almomani; Tim O'farrell. Near Capacity Irregular Turbo Code. Indian Journal of Science and Technology 2015, 8, 1 .

AMA Style

Abiodun Sholiyi, Jafar A. Alzubi, Omar Alzubi, Omar Almomani, Tim O'farrell. Near Capacity Irregular Turbo Code. Indian Journal of Science and Technology. 2015; 8 (23):1.

Chicago/Turabian Style

Abiodun Sholiyi; Jafar A. Alzubi; Omar Alzubi; Omar Almomani; Tim O'farrell. 2015. "Near Capacity Irregular Turbo Code." Indian Journal of Science and Technology 8, no. 23: 1.

Journal article
Published: 18 June 2015 in International Journal of Computer Applications
Reads 0
Downloads 0
ACS Style

Omar Almomani; Mahmoud Al-Shugran; Jafar A. Alzubi; Omar A. Alzubi. Performance Evaluation of Position-Based Routing Protocols using Different Mobility Models in MANET. International Journal of Computer Applications 2015, 119, 43 -48.

AMA Style

Omar Almomani, Mahmoud Al-Shugran, Jafar A. Alzubi, Omar A. Alzubi. Performance Evaluation of Position-Based Routing Protocols using Different Mobility Models in MANET. International Journal of Computer Applications. 2015; 119 (3):43-48.

Chicago/Turabian Style

Omar Almomani; Mahmoud Al-Shugran; Jafar A. Alzubi; Omar A. Alzubi. 2015. "Performance Evaluation of Position-Based Routing Protocols using Different Mobility Models in MANET." International Journal of Computer Applications 119, no. 3: 43-48.

Journal article
Published: 01 January 2014 in International Journal of Advanced Computer Science and Applications
Reads 0
Downloads 0
ACS Style

Omar Almomani; Mohammad Madi. A GA-Based Replica Placement Mechanism for Data Grid. International Journal of Advanced Computer Science and Applications 2014, 5, 1 .

AMA Style

Omar Almomani, Mohammad Madi. A GA-Based Replica Placement Mechanism for Data Grid. International Journal of Advanced Computer Science and Applications. 2014; 5 (10):1.

Chicago/Turabian Style

Omar Almomani; Mohammad Madi. 2014. "A GA-Based Replica Placement Mechanism for Data Grid." International Journal of Advanced Computer Science and Applications 5, no. 10: 1.

Conference paper
Published: 01 January 2011 in Communications in Computer and Information Science
Reads 0
Downloads 0

Data Grid is an infrastructure that manages huge amount of data files, and provides intensive computational resources across geographically distributed collaboration. To increase resource availability and to ease resource sharing in such environment, there is a need for replication services. Data replication is one of the methods used to improve the performance of data access in distributed systems. However, it is bounded by two factors: size of available storage and bandwidth of sites within the Data Grid. Hence, there is a need for replica replacement strategy. In this paper, we propose an exponential based replica replacement strategy (ERRS). OptorSim is used to evaluate the performance of this dynamic replication strategy. The simulation results show that ERRS successfully increases data grid performance.

ACS Style

Mohammed Madi; Yuhanis Yusof; Suhaidi Hassan; Omar Almomani. A Novel Replica Replacement Strategy for Data Grid Environment. Communications in Computer and Information Science 2011, 717 -727.

AMA Style

Mohammed Madi, Yuhanis Yusof, Suhaidi Hassan, Omar Almomani. A Novel Replica Replacement Strategy for Data Grid Environment. Communications in Computer and Information Science. 2011; ():717-727.

Chicago/Turabian Style

Mohammed Madi; Yuhanis Yusof; Suhaidi Hassan; Omar Almomani. 2011. "A Novel Replica Replacement Strategy for Data Grid Environment." Communications in Computer and Information Science , no. : 717-727.

Conference paper
Published: 01 September 2010 in 2010 Second International Conference on Network Applications, Protocols and Services
Reads 0
Downloads 0

In this paper, we report an investigation on the impact of large block Forward Error Correction (FEC) with Drop Tail (DT) and Random Early Detection (RED) queue policies on network performance and quality of video streaming. FEC is a technique that uses redundant packets to reconstruct dropped packets, while DT and RED are the most popular queue management policies used in network routers. DT mainly depends on the size of the queue buffer to decide on whether to drop a packet or not. RED monitors the average queue size and drops arriving packets probabilistically. The probability of dropping a packet increases as the estimated average queue size grows. In the investigation, we consider simulation settings with varying size of queue buffers. Results obtained from the simulation experiments show that large block FEC and queue size affect the performance the network. Consequently, the qualities of multimedia applications are also affected.

ACS Style

Omar Almomani; Osman Ghazali; Suhaidi Hassan; Shahrudin Awang Nor; Mohammad Madi. Impact of Large Block FEC with Different Queue Sizes of Drop Tail and RED Queue Policy on Video Streaming Quality over Internet. 2010 Second International Conference on Network Applications, Protocols and Services 2010, 26 -30.

AMA Style

Omar Almomani, Osman Ghazali, Suhaidi Hassan, Shahrudin Awang Nor, Mohammad Madi. Impact of Large Block FEC with Different Queue Sizes of Drop Tail and RED Queue Policy on Video Streaming Quality over Internet. 2010 Second International Conference on Network Applications, Protocols and Services. 2010; ():26-30.

Chicago/Turabian Style

Omar Almomani; Osman Ghazali; Suhaidi Hassan; Shahrudin Awang Nor; Mohammad Madi. 2010. "Impact of Large Block FEC with Different Queue Sizes of Drop Tail and RED Queue Policy on Video Streaming Quality over Internet." 2010 Second International Conference on Network Applications, Protocols and Services , no. : 26-30.

Proceedings article
Published: 01 October 2009 in 2009 IEEE Symposium on Industrial Electronics & Applications
Reads 0
Downloads 0

In this paper, we report an investigation on performance of the forward error correction (FEC) with random early detection (RED) queuing policy. FEC is a technique that uses redundant packet to reconstruct the dropped packet, while RED is an active queue management algorithm. It monitors the average queue size and drops arriving packets probabilistically, the probability of drop increases as the estimated average queue size grows. In the investigation we consider simulation settings with varies size of the queue buffer. Results obtained from the simulation experiments show that FEC and queue size affect the performance the network. Consequently, the qualities of multimedia applications are also affected.

ACS Style

Omar Almomani; Osman Ghazali; Suhaidi Hassan. Performance study of large block forward error correction with random early detection queue policy. 2009 IEEE Symposium on Industrial Electronics & Applications 2009, 1, 457 -462.

AMA Style

Omar Almomani, Osman Ghazali, Suhaidi Hassan. Performance study of large block forward error correction with random early detection queue policy. 2009 IEEE Symposium on Industrial Electronics & Applications. 2009; 1 ():457-462.

Chicago/Turabian Style

Omar Almomani; Osman Ghazali; Suhaidi Hassan. 2009. "Performance study of large block forward error correction with random early detection queue policy." 2009 IEEE Symposium on Industrial Electronics & Applications 1, no. : 457-462.

Conference paper
Published: 01 January 2009 in 2009 First International Conference on Networks & Communications
Reads 0
Downloads 0

This paper, showed an investigation on performance of the large block forward errors correction (FEC) with drop tail (DT) queuing policy. FEC is a technique that uses redundant packet to reconstruct the dropped packet, while Drop Tail is the most popular queue management policies used in network routers. Since the Drop Tail mainly depends on the size of the queue buffer to decide on whether to drop a packet or not, the investigation considered simulation settings with varies size of the queue buffer. Results obtained from the simulation experiments show that FEC and queue size affect the performance the network. Consequently, the qualities of multimedia applications are also affected.

ACS Style

Omar Almomani; Osman Ghazali; Suhaidi Hassan. Performance Study of Large Block FEC with Drop Tail for Video Streaming over the Internet. 2009 First International Conference on Networks & Communications 2009, 109 -112.

AMA Style

Omar Almomani, Osman Ghazali, Suhaidi Hassan. Performance Study of Large Block FEC with Drop Tail for Video Streaming over the Internet. 2009 First International Conference on Networks & Communications. 2009; ():109-112.

Chicago/Turabian Style

Omar Almomani; Osman Ghazali; Suhaidi Hassan. 2009. "Performance Study of Large Block FEC with Drop Tail for Video Streaming over the Internet." 2009 First International Conference on Networks & Communications , no. : 109-112.

Conference paper
Published: 01 December 2008 in 2008 International Conference on Electronic Design
Reads 0
Downloads 0

As an alternative to UDP, DCCP is gaining popularity as a new transport protocol for sending streaming multimedia contents in the Internet nowadays. DCCP is a new unreliable transport protocol which has built-in congestion control unlike UDP. With this feature, DCCP ensures that there is no bandwidth monopoly by certain transport protocol like UDP did for years. UDP has been proven that can eat up all the available bandwidth in the Internet while competing with other transport protocols such as TCP in carrying streaming audio and multimedia traffic in many situations. In this paper, we show that initial slow-start threshold (ssthresh) size has a significant effect to the performance of DCCP carrying VoIP traffic over large delay link. Slow-start threshold is used by congestion control implemented in DCCP's TCP-like congestion control (CCID2) where all TCP congestion control implementations are required to support it. From our experiments, we found out that too small initial slow-start threshold value for large delay link makes the traffic throughput sent using DCCP requires longer time to become stable. The selection of suitable value of initial slow-start threshold is then vital to the stability of the network carrying streaming audio data over DCCP.

ACS Style

Shahrudin Awang Nor; Suhaidi Hassan; Omar Almomani. The effect of initial slow-start threshold size in DCCP over large delay link networks. 2008 International Conference on Electronic Design 2008, 1 -7.

AMA Style

Shahrudin Awang Nor, Suhaidi Hassan, Omar Almomani. The effect of initial slow-start threshold size in DCCP over large delay link networks. 2008 International Conference on Electronic Design. 2008; ():1-7.

Chicago/Turabian Style

Shahrudin Awang Nor; Suhaidi Hassan; Omar Almomani. 2008. "The effect of initial slow-start threshold size in DCCP over large delay link networks." 2008 International Conference on Electronic Design , no. : 1-7.