Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Javed Parvez is active.

Publication


Featured researches published by Javed Parvez.


international conference on control instrumentation communication and computational technologies | 2014

Performance evaluation of applications in manual 6in4 tunneling and native IPv6/IPv4 environments

Junaid Latief Shah; Javed Parvez

6in4 is the IPv4 to IPv6 migration technique that uses tunneling to encapsulate IPv6 packets over configured IPv4 communication links. This paper attempts to evaluate and compare performance parameters like Throughput, IP End-to-End Delay and Response Time of different applications running on the internet in IPv4, IPv6 and 6in4 manual tunneling environments. The applications that we are modeling are Database Application, Web Browsing, Video conferencing, Voice Communications and Remote Login. This paper aims to evaluate the performance of these internet applications in three different networks. The results of the study will be important for network administrators and various Internet Service Providers (ISP) for planning of IPv6 migration networks. OPNET Modeler ver. 14.5. has been used for simulation study. The networks that have been modeled consist of different components like client workstations, routers, servers and network backbones.


international conference on control instrumentation communication and computational technologies | 2014

An examination of next generation IP migration techniques: Constraints and evaluation

Junaid Latief Shah; Javed Parvez

IP Next Generation (IPng) or IPv6 engineered by IETF is the successor of IPv4, the contemporary version of Internet Protocol. IPv6 is designed to solve the long term performance, reliability and scalability problems of IPv4. Although IPv6 implementation is yet to attain a maturity level, its success will ultimately depend on its implementation in a broader perspective. The IPv6 network migration is seen as an intricate daunting task impeding its evolution. Nevertheless with emergence of new IPv6 migration techniques, its complete integration with current IP networks seems to be achievable in near future. This paper attempts to examine current IP transitioning techniques and outlines the key deployment issues, challenges and migration paths. The paper also makes an empirical evaluation of three most commonly used transition mechanisms namely Dual Stack, Automatic 6to4 Tunneling and Manual 6in4 Tunneling and makes a comparison of performance metrics with native IPv6 environment. The simulation results are significant and give an insight about choosing best transition technique and an idea about network migration and capacity planning. The simulation-based comparison has been carried using OPNET (ver. 14.5) simulation framework.


international conference on innovations in information embedded and communication systems | 2015

Impact of IPSec on Real Time applications in IPv6 and 6to4 Tunneled Migration Network

Junaid Latief Shah; Javed Parvez

IPSec is the amalgam of protocols dispensing security in IP networks. It has been the rudimentary security component in IPv4 and IPv6 networks providing for data authentication, integrity and confidentiality. Earlier security was not embedded at the IP level however with emergence of large scale public and corporate internets, the user data became vulnerable to malicious activities like privacy attacks and thefts. To mitigate this and secure network traffic, IETF introduced IPSec for robust network communications. IPSec is a framework that provides sublime options for encryption and authentication of data packets. IPSec architecture provides a flexible and agile approach for securing network traffic. Initially IPSec was introduced as an additional component in IPv4, but in next generation internet protocol IPv6, its an inbuilt component implemented as a part of extension header. Although IPSec is the panacea for securing IP protocol, its implementation and management is unequivocally complex in nature. The implementation involves key management and exchange through IKE, protocol negotiations and establishment of security associations which can significantly decrease performance and degrade IP communication. This fact has a significant impact on real time communication. This paper makes an empirical investigation of the parameters that are affected by implementation of IPSec in IPv6 and 6 to 4 Tunneled Migration Networks. The investigation is significant and evaluates about the performance decay that is encountered by incorporating security. The simulation approach is used and measurements are performed in OPNET Simulator ver. 14.5.


international conference on control instrumentation communication and computational technologies | 2014

Enhancing security of Android & IOS by implementing need-based security (NBS)

Muneer Ahmad Dar; Javed Parvez

The most popular Smartphone platforms i.e. Android and iOS are equipped with the built-in security features to safeguard their end users. Android, being an Open Source Mobile Operating System, has some security vulnerabilities. Such limitations are also present in iOS which is a proprietary platform with some open source components. In this paper we will compare in detail the security features of Android and iOS, with the intent to integrate the need based security (NBS) model in Android which selectively grants permission to access resources on a Smartphone at run time. This paper proposes the implementation of a reverse engineering process which restricts an apps permissions and provides a need based mechanism to access resources. The repackaged app with need based security will run on all devices that were supported by the original application.


international conference on control instrumentation communication and computational technologies | 2014

Smartphone operating systems: Evaluation & enhancements

Muneer Ahmad Dar; Javed Parvez

The increasing number of mobile operating systems that operate the small hand held devices collectively called Smartphones, have become an integral part of our lives. The openness of these new environments has lead to new domain of apps and markets and has enabled greater integration with existing online services like e-banking etc. Smartphone makers are competing in turns to outgun each other for storage, processor speed, platform compatibility and camera megapixels but its the predominantly software - the mobile OS - that makes the biggest divergence to the popularity and market share of Smartphone. This paper evaluates the popular Smartphone Operating Systems with the purpose of understanding the user friendliness, popularity, user privacy, security and accessibility with respect to the wide domain of apps. This paper focuses on the advantages and limitations of the Smartphone operating systems with the intention to determine if one of them has an edge over the other and, finally, we propose broad enhancements aimed at making them more user-friendly and secure.


International Journal of Computer Applications | 2014

A Novel Strategy to Enhance the Android Security Framework

Muneer Ahmad Dar; Javed Parvez

the widespread use of the Smartphone, the security of data stored in a Smartphone has reached to an utmost importance to all of us. Installation of every Android app asks for some critical permission to access our critical files and we have to accept the permissions in order to install that application. We propose a novel approach of enhanced security framework which can be integrated with the existing Android Security Framework to make Android more secure and to keep track of the files accessed by any of the vulnerable apps downloaded from different sources on the web. The proposed enhanced security framework enhances the security of Android File System by restricting the apps whose behavior matches with the malware. A novel approach to secure the data on Smartphones using cryptographic Algorithms is also discussed in this paper.


international conference on innovations in information embedded and communication systems | 2015

A live-tracking framework for Smartphones

Muneer Ahmad Dar; Javed Parvez

Smartphones have become an essential rather than an optional gadget. With Smartphones, we carry with us a hand held computer with details about our social life, family members, transaction details and much more. Smartphones serve as a communication tool used to send messages, place and receive calls, surf the internet and play wide range of games. In this paper, we present a framework that helps us to track and pin-point the current location of the mobile and save the call logs, sent to our Web-based application. This framework couples GPS-based information with Google maps data and accurately determines the postal address of the lost mobile. The framework makes it possible to track the mobile location after specified regular intervals.


International Journal of Computer Applications | 2014

Study on Improvisation of Response Time: Impact of Various Parameters in a Cloud-Computing Environment

Amina Rashid; Javed Parvez

Cloud computing has become a key component as well as a measure of success for various organizations today. Apart from benefits obtained, it is important to take into account the location of user-base and data-center, which is essential for performance and security reasons, since the location of datacenter and user-base can impact the overall response time. In this paper evaluation of the effect on overall response time, of relevant factors such as the location of data-center and the serviced user-base is done.


Procedia Computer Science | 2015

Optimizing Security and Address Configuration in IPv6 SLAAC

Junaid Latief Shah; Javed Parvez


advances in computing and communications | 2014

Evaluation of queuing algorithms on QoS sensitive applications in IPv6 network

Junaid Latief Shah; Javed Parvez

Collaboration


Dive into the Javed Parvez's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge