Riasat Aasia’s research while affiliated with University of Bridgeport and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (5)


Figure 1. Logical Processes architecture
Performance Model for a Conservative Distributed Simulation Environment Using Null Messages to Avoid Deadlock
  • Article
  • Full-text available

April 2010

·

83 Reads

·

1 Citation

International Journal of Computer Science and Information Technology

Patel Hemen

·

·

·

Riasat Aasia

A conservative distributed simulation requires all logical processes (LPs) to follow the causality constraint requirement. This implies that all event-messages are processed in strictly timestamp order. Apart from the timestamp of each event generated by LPs, synchronization between all LPs is the second most important requirements. Finally, there must not be a deadlock in the distributed environment. A deadlock may occur when there is no events present in the queue of LP. In such case, to avoid deadlock, Chandy-Misra-Bryant presented an algorithm called Null Message Algorithm (NMA) [3]. These null messages are passed as an event-message to other LPs and it stored in one of queues of LPs. This null message indicates that till the time stamp of that null message, all other events in the queue which have lesser time stamp than null message’s time stamp are safe to process. It means that there won’t be anyarrival of any events from that logical process until current simulation time is equal to the time stamp of the null message. With the time stamp of the null message, a Lookahead value is added to the time stamp of that null message. This Lookahead value can be measure on certain kind of parameters such as delay to transmit a message, propagation delay, etc. therefore, calculating value of Lookahead is the most important part as Lookahead value affects the performance of the conservative distributed event simulation. Proper value of Lookahead can reduce the number of null messages which decreases thetraffic of the network. In this paper, we demonstrate some calculation on the Lookahead which shows the performance of the distributed event simulation

Download

Figure 1. Example of multiple unicast 
Figure 2. Example of IP multicast 
Figure 3. Example of ESM, solid lines represent 2 way packet transmission, dotted lines represent one way packet transmission 
Figure 4. OPNET model for multiple unicast, IP multicast and End-System Multicast videoconferencing transmissions. 
Figure 5 of 5
DETERMINISTIC FORMULIZATION OF END-TO-END DELAY FOR MULTICAST SYSTEMS

January 2010

·

329 Reads

·

2 Citations

International Journal of Computer Networks and Communications

End-System multicasting (ESM) is a promising application-layer scheme that has been recently proposedfor implementing multicast routing in the application layer as a practical alternative to the IPmulticasting. Moreover, ESM is an efficient application layer solution where all the multicastfunctionality is shifted to the end users. However, the limitation in bandwidth and the fact that themessage needs to be forwarded from host-to-host using unicast connection, and consequentlyincrementing the end-to-end delay of the transmission process, contribute to the price to pay for this newapproach. Therefore, supporting high-speed real-time applications such as live streaming multimedia,videoconferencing, distributed simulations, and multiparty games require a sound understanding of thesemulticasting schemes such as IP multicast and ESM and the factors that might affect the end-userrequirements. In this paper, we present both the analytical and the mathematical models for formalizingthe end-to-end delay efficiency of both IP and ESM multicast systems. For the sake of the experimentalverifications of the proposed models, simulation results are presented in this paper. Finally, the proposedformulization can be used to design and implement a more robust and efficient multicast systems for thefuture networks.


COMBINING PRIVATE AND PUBLIC KEY ENCRYPTION TECHNIQUES FOR PROVIDING EXTREME SECURE ENVIRONMENT FOR AN ACADEMIC INSTITUTION APPLICATION

January 2010

·

124 Reads

·

6 Citations

International Journal of Network Security & Its Applications

This paper presents the implementation of a secure application for an academic institution that offers numerous services to both students and the faculty. The primary focus of this paper is to provide atechnical implementation of a new architecture for encrypting the database. The scope of this paper mainly includes but is not limited to symmetric and public-key cryptography, authentication, keymanagement, and digital signatures. The final results of this paper demonstrate that what security features one should implement in order to achieve a highly secured application. This paper presents theimplementation of a stand alone system that can be implemented on any legacy systems, and still operates effectively. In other words, it is self sufficient in terms of the data that it stores.


FIGURE 1: Example of Multiple Unicast  
FIGURE 2: Example of IP Multicast  
FIGURE 3: Example of ESM, Solid Lines Represent 2 Way Packet Transmission, Dotted Lines Represent One Way Packet Transmission.
Figure 4: OPNET Model for Multiple Unicast, IP Multicast and End-System Multicast Video Conferencing Transmissions.  
Figure 5: Average end-to-end packet delays for multiple unicast, IP multicast and ESM simulations.  
Deterministic Formulization of End-to-End Delay and Bandwidth Efficiency for Multicast Systems

January 2010

·

819 Reads

·

4 Citations

End-System multicasting (ESM) is a promising application-layer scheme that has been recently proposed for implementing multicast routing in the application layer as a practical alternative to the IP multicasting. Moreover, ESM is an efficient application layer solution where all the multicast functionality is shifted to the end users. However, the limitation in bandwidth and the fact that the message needs to be forwarded from host-to-host using unicast connection, and consequently incrementing the end-to-end delay of the transmission process, contribute to the price to pay for this new approach. Therefore, supporting high-speed real-time applications such as live streaming multimedia, videoconferencing, distributed simulations, and multiparty games require a sound understanding of these multicasting schemes such as IP multicast and ESM and the factors that might affect the end-user requirements. In this paper, we present both the analytical and the mathematical models for formalizing the end-to-end delay and the bandwidth efficiency of both IP and ESM multicast system. For the sake of the experimental verifications of the proposed models, numerical and simulation results are presented in this paper. Finally, the proposed formulization can be used to design and implement a more robust and efficient multicast systems for the future networks


Figure 2. PDF versus number of collision per frame with ideal channel condition for a saturated condition  
Figure 3. Network load with different values of beacon interval versus time  
A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NETWORKS

November 2009

·

281 Reads

·

4 Citations

International Journal of Wireless & Mobile Networks

Extensive studies have been carried out for reducing the handover time of wireless mobile network at medium access control (MAC) layer. However, none of them show the impact of reduced handover timeon the overall performance of wireless mobile networks. This paper presents a quantitative analysis to show the impact of reduced handover time on the performance of wireless mobile networks. The proposed quantitative model incorporates many critical performance parameters involve in reducing the handover time for wireless mobile networks. In addition, we analyze the use of active scanning technique with comparatively shorter beacon interval time in a handoff process. Our experiments verify that the activescanning can reduce the overall handover time at MAC layer if comparatively shorter beacon intervals are utilized for packet transmission. The performance measures adopted in this paper for experimental verifications are network throughput under different network loads.

Citations (4)


... Conservative protocols fundamentally maintain causality in event execution by strictly disallowing the processing of events out of time-stamp order [4]. Some recent research on conservative algorithms in DES can be found in [11][12][13][14]. An effort to combine conservative and optimistic synchronization algorithms on a common layered architecture framework is proposed in [15]. ...

Reference:

A Logical Process Simulation Model for Conservative Distributed Simulation Systems
Performance Model for a Conservative Distributed Simulation Environment Using Null Messages to Avoid Deadlock

International Journal of Computer Science and Information Technology

... There is an emerging class of Internet and Intranet multicast applications that are designed to facilitate the simultaneous delivery of information from a single or multiple senders to multiple receivers. Different approaches of multicasting have been suggested to improve the overall performance of networks especially the Internet [1,2,3,4]. These approaches are: multiple unicast, IP multicast, and end-system multicast. ...

DETERMINISTIC FORMULIZATION OF END-TO-END DELAY FOR MULTICAST SYSTEMS

International Journal of Computer Networks and Communications

... By generating the initial ciphertext from plaintext using Hill cipher; considering a session key using circulant matrix and converting it into matrix match the diversion of quandary vector; generating basins by multiplying quandary vector with circulant matrix and considering mod n; mapping basins on the output of Hill cipher to generate multiple ciphertext for one plaintext. Rizvi et al. (2010), in their study combined private and public encryption techniques that offers numerous secured services to both students and faculty. Ajit et al. (2012), in their work combined two techniques of cryptosystem i.e. ...

COMBINING PRIVATE AND PUBLIC KEY ENCRYPTION TECHNIQUES FOR PROVIDING EXTREME SECURE ENVIRONMENT FOR AN ACADEMIC INSTITUTION APPLICATION

International Journal of Network Security & Its Applications

... Cell selection and handover schemes influence the network performance [20], [21] and thus current section will examine the conditions that are imposed in our calculations by the aforementioned schemes. If cell 1 is the camping cell and assuming a best BS selection condition, then the transmission of cell-1 will be the best among the candidate cells i (=2, 3,…, 19), i.e. ...

A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NETWORKS

International Journal of Wireless & Mobile Networks