Comparison of 5G Networks Non-Standalone Architecture (NSA) and Standalone Architecture (SA)
Journal ArticleThe non-standalone architecture (NSA) of 5G networks builds upon existing 4G long-term evolution (LTE) infrastructure, integrating 5G new radio (NR) technology while still relying on the 4G core network. In contrast the standalone architecture (SA) of 5G networks is designed as a fully independent system, with its own 5G core network. It does not rely on the existing 4G LTE infrastructure. The NSA integrates 5G NR technology into existing 4G LTE networks, utilizing the 4G core network for control and signaling. On the other hand, the SA establishes a fully independent 5G network with its own core components, providing more advanced features and greater autonomy. The transition from NSA to SA architecture is expected as network operators deploy more comprehensive 5G networks. This paper investigated in details the major different between both architectures NSA and SA of 5G networks.
Mohammed Alnaas, (01-2024), http://www.ijcsejournal.org: International Journal of Computer Science Engineering Techniques, 8 (11), 1-11
Effective Cloud Security Policy: Best Practices and Case Study
Journal ArticleThe main purpose of cloud cryptography is to protect sensitive data without causing any delay in data transfer, various cryptographic protocols designed to balance data security and performance to secure data through encryption. One such approach is to encrypt the data before uploading it to the cloud.
This study proposes an effective framework for protecting small and medium companies (SMEs) from cybersecurity risks and threats. The framework evaluates the system of private encryption data in a server environment using the advanced encryption standard (AES) 128 algorithm and a virtual private network (VPN) tunnel. The goal is to secure data through encryption and ensure data transfer without causing delays. The framework includes a test case where data is transferred from a storage area network (SAN) storage to the cloud. To assess the system's performance and security, a penetration test using Kali Linux is conducted. The results of this study provide insights into securing SMEs' data and mitigating cybersecurity risks effectively.
Mohammed Alnaas, (11-2023), http://www.ijsred.com: International Journal of Scientific Research and Engineering Development, 6 (6), 1-7
Upgrading to 5G Networks: Existing Challenges and Potential Solutions
Journal ArticleThe introduction of the fifth generation (5G) networks indeed brings significant advancements in connectivity and has the potential to revolutionize various industries. The technologies that make 5G powerful include features such as faster speeds, reduced latency, increased capacity, and the ability to connect a wide range of devices and objects.
However, implementing 5G networks involves upgrading existing infrastructure and deploying new infrastructure, which can be both costly and time-consuming. This process requires significant investments from telecommunication companies to install new equipment and upgrade existing infrastructure to support 5G technology. Additionally, the deployment of 5G networks requires a substantial amount of radio spectrum, and regulatory frameworks need to be in place to allocate and manage the spectrum effectively. This paper provides an overview of 5G technologies, highlighting their key features and potential benefits. It also delves into the existing challenges that arise with the implementation of 5G networks and discusses some possible solutions to address these challenges.
Mohammed Alnaas, (11-2023), www.ijcseonline.org: International Journal of Computer Sciences and Engineering, 11 (11), 5-12
Measurement System and its Suitability for Examining Indoor Millimeter Wave Propagation at (28–33GHz)
Conference paperThe purpose of this study is to determine the suitability of system measurements on indoor radio wave propagation at (28–33GHz) which might be used by 5G communication.
Ahmed Ben Alabish, Abduelbaset Mustafa Alia Goweder, (05-2021), IEEEAccess: 2021 IEEE 1st International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and Computer Engineering MI-STA, 1-4
DKED modelling of Human body blockage of 5G system link at 32 GHz
Conference paperThis paper is the continuation of a research carried out by Alabish et.al, which depicts the scattering objects effects on a blocked indoor wireless 5G link by a human body using a simple approach. Some measurement were made on the scattering effects due to having an object close to the link in this case it is a human body. In this paper, more measurements were conducted at 32 GHz. The double knife-edge diffraction (DKED) model was used in order to foresee the attenuation due to human body. To test the prediction precision of the model, simulation was then compared with measurements. The obtained results indicate that the assumed simple models for the indoor links performed well.
Ahmed Hassen ELjeealy Ben Alabish, (05-2021), IEEEAccess: 2021 IEEE 1st International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and Computer Engineering MI-STA, 1-4
Characterizing the effects of human body blockage and scattering objects for 31and 33 GHz indoor 5G link
Conference paperThis paper is concerned with studying the effects of human body blockage as well as surrounding objects scattering effects for an indoor 31 and 33 GHz link utilizing the Double Knife Edge Diffraction (DKED) model for diffraction effect on received signal.
Ahmed Hassen ELjeealy Ben Alabish, (05-2021), IEEEAccess: 2021 IEEE 1st International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and Computer Engineering MI-STA, 1-4
REMOTE ACCESS TO A ROUTER SECURELY USING SSH
Journal ArticleHadya Soliman Hadya Hawedi, (01-2021), مجلة المنتدى األكاديمي: نقابة اعضاء هيئة التدريس الاسمرية, 1 (5), 174-189
COMPARATIVE STUDY OF THE IMPACT OF DOS ATTACKS ON LANS USING VLANS
Journal ArticleHadya Soliman Hadya Hawedi, (06-2020), Journal of Alasmarya University: Basic and Applied Sciences: JAUBA, 1 (5), 88-105
استخدام تقنية معالجة الصور ومقارنتها بتقنية الآردوينو-تصميم إشارة مرور ذكية انموذجا
مقال في مجلة علميةهدية سليمان هدية هويدي، (06-2020)، مجلة العلوم الاقتصادية و السياسية: الاقتصاد و التجارة الاسمرية، 16 (1)، 359-388
Innovative Shift in Smart Learning Environment
Journal ArticleHadya Soliman Hadya Hawedi, (02-2020), Asian Journal of Research in Computer Science: AJRCOS, 3 (6), 36-44