Mustafa A. Khan’s research while affiliated with University of Bridgeport and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (9)


Table 1. Frequency Status Table 
An Opportunistic Frequency Channels Selection Scheme for Interference Minimization
  • Conference Paper
  • Full-text available

April 2014

·

262 Reads

·

3 Citations

·

·

Mustafa Khan

This paper presents a solution to resolve the interference problems between the Wi-FiTM and BluetoothTM wireless technologies. A new channel selecting approach is being used to select the frequency channel. The signal strength in a channel is assessed, and that value is used to select the channels to send data without interference. Thus we are trying to establish true "Coexistence without Compromise" between BluetoothTM and Wi-Fi TM.

Download




Deterministic formulization of bandwidth efficiency for multicast systems

March 2009

·

44 Reads

·

2 Citations

End-system multicasting (ESM) is a promising application-layer scheme that has been recently proposed for implementing multicast routing in the application layer as a practical alternative to the IP multicasting. Moreover, ESM is an efficient application layer solution where all the multicast functionality is shifted to the end users. However, the limitation in bandwidth and the fact that the message needs to be forwarded from host-to-host using unicast connection, and consequently incrementing the end-to-end delay of the transmission process, contribute to the price to pay for this new approach. Therefore, supporting high-speed real-time applications such as live streaming multimedia, videoconferencing, distributed simulations, and multiparty games require a sound understanding of these multicasting schemes such as IP multicast and ESM and the factors that might affect the end-user requirements. In this paper, we present an analytical model that formalizes the bandwidth efficiency of both IP and ESM multicast systems. Specifically, our proposed formalization of the bandwidth efficiency is based on the end-to-end delays proposed by for both IP and ESM multicast systems.


Fig.2. PDF versus number of collision per frame with ideal channel condition for a saturated condition 
Figure 2 of 3
Figure 3 of 3
Active scanning: A better approach to reduce handover time at MAC layer for wireless networks

March 2009

·

121 Reads

·

3 Citations

Extensive studies have been carried out for reducing the handover time of wireless network at medium access layer (MAC). However, none of them depicts the impact of reduced handover time on the overall performance of wireless networks. This paper presents the methodology that can be used to effectively reduce the handover time. Our proposed model incorporates many critical performance measurements to show the impact of reduced handover time on wireless networks. Our experiments verify that the active scanning can reduce the overall handover time at MAC layer if comparatively shorter beacon intervals are utilized for packet transmission.


Figure 1 of 1
The Worst and Best Case Capacity Analysis of Mobile Ad Hoc Networks (MANET) Using a 3-Phase Algorithm

July 2008

·

89 Reads

·

1 Citation

The capacity of mobile ad hoc network (MANET) is typically determined by the size of network, routing protocol, mobility and the interactions that occur between the nodes. Moreover, these critical parameters cause the loss rate that has severed impact on the performance of the MANET. This situation even becomes worst when these critical parameters are chosen inappropriately. This paper presents an analytical model that incorporates most of the critical parameters that can influence the capacity of MANET. Based on the analytical model, an efficient 3-phase algorithm is designed to optimize the performance of MANET in terms of an increased capacity and the reduced transmission delay. The proposed 3-phase algorithm considers both delay-tolerant and delay-sensitive network traffics. In addition, the 3-phase algorithm can be used to approximate both the best and worst case capacities of MANET with the relaying and non-relaying nodes.


Figure 1 of 2
Figure 2 of 2
A New Analytical Model for Maximizing the Capacity and Minimizing the Transmission Delay for MANET

The capacity of mobile ad hoc network (MANET) is typically determined by the size of network, routing protocol, mobility and the interactions that occur between the nodes. Moreover, these critical parameters cause the loss rate that has severed impact on the performance of the MANET. This situation even becomes worst when these critical parameters are chosen inappropriately. This paper presents an analytical model that incorporates most of the critical parameters that can influence the capacity of MANET. Based on the analytical model, an efficient 3-phase algorithm is designed to optimize the performance of MANET in terms of increased capacity and reduced transmission delay. The proposed 3-pahse algorithm considers both delay-tolerant and delay-sensitive network traffics. In addition, the 3-phase algorithm can be used to approximate both the best and worst case capacities of MANET with the relaying and non-relaying nodes.


Fig. 4. System Admin Control Panel: Faculty Accounts Management 
Fig. 5. System Admin Control Panel: Student Accounts Management 
Fig. 6. System Admin Control Panel: Courses Management 
Fig. 7. Faculty Member Interface 
A Novel Encrypted Database Technique to Develop a Secure Application for an Academic Institution

January 2008

·

1,492 Reads

This paper presents the implementation of a secure application for an academic institution that offers numerous services to both students and the faculty. The primary focus of this paper is to provide a technical implementation of a new architecture for encrypting the database. The scope of this paper mainly includes but is not limited to symmetric and public-key cryptography, authentication, key management, and digital signatures. The final results of this paper demonstrate that what security features one should implement in order to achieve a highly secured application. This paper presents the implementation of a stand alone system that can be implemented on any legacy systems, and still operates effectively. In other words, it is self sufficient in terms of the data that it stores.

Citations (3)


... Overcrowding of WLAN channels results in cochannel interference and adjacent channel interference [1,2]. This may lead to deterioration in the quality of service and drop-in high data transmission rates [3,4]. To overcome the above-mentioned difficulties, a mechanism that switches a user dynamically to a less interference channel is essential. ...

Reference:

A Sensing and Tunable Two‐Element MIMO Unified Five‐Antenna via Circuit Model for WLAN Cognitive Radio
An Opportunistic Frequency Channels Selection Scheme for Interference Minimization

... This approach produced the highest message delivery percentage as seen in Message Delay and Hop count: Another evaluation criteria is the average hop count of the multicast messages. The hop count of a packet is defined as the number of routers traversed by a packet between its source and destination [17], which is in this case the number of hosts that a message passes from the source to the destination [18]. As seen in Figures 8 and 9 and Tables 2 and 3 when the number of users is small, the average hop count of LA-NICE and NICE, as well as the maximum hop count is almost the same, however as the number of users increase LA-NICE has less number of hops leading to less delay in delivering the messages. ...

Deterministic formulization of bandwidth efficiency for multicast systems

... In order to collect the information, two methods of scanning are commonly available in the literature: active scanning and passive scanning [42]. Active scanning refers to keeping on all the interfaces continuously active while passive scanning refers to the periodic activation of the interfaces for verifying the availability of new networks. ...

Active scanning: A better approach to reduce handover time at MAC layer for wireless networks