Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Suhaidi Hassan is active.

Publication


Featured researches published by Suhaidi Hassan.


Journal of Network and Computer Applications | 2015

Survey on caching approaches in Information Centric Networking

Ibrahim Abdullahi; A. Suki M. Arif; Suhaidi Hassan

Information Centric Network (ICN) is increasingly becoming the alternative paradigm to the traditional Internet through improving information (content) dissemination on the Internet with names. The need to reduce redundancy and frequent access to a host (provider of information) has raised an alternative of a man-in-middle concept of ICN. This has necessitated the introduction of some ICN popular architectures (such as Named Data Network (NDN), Content Centric Network (CCN), to name a few) to manage the salient advantages incorporated in ICN. Despite all efforts and issues in naming, security, routing and mobility, power consumption; caching has become the leading variable to fully actualize the future Internet dream by carefully solving the problems in frequency and recency (in objects). Determining what part of the content is to be cached? When is the most appropriate time for caching? How would the object be cached (placed and replaced) and also what path would the object be cached? Thus, this paper span through some selected ICN architectures and projects to investigate and suggest forms of caching in minimizing the total bandwidth consumption, enhanced Delivery of Service (DoS), reduced upwards and downward streaming. In conclusion, pointing out some of the future probable ways to improve caching in ICN. This survey also highlighted the top sensitive issues that influence the active deployment of caches in ICN through recency, frequency, content size, cost of retrieval and coordination, update in caches and replacements. Several cache characteristics were further presented in ways that would improve cache techniques, deployments as research suggestions for content placement, replacement and quick scan on nodes on and off-path of the network. HighlightsLiterature survey on Information-Centric Network caching approaches were presented.General research issues related to ICN are important to researchers to get into and contribute.Huge data traffic and dissemination are basis for the need to shift from host-to-host Internet to the Content-Centric paradigm.A description of several ICN cache approaches is of essence in standardization.


international conference on industrial and information systems | 2011

A trust computing mechanism for cloud computing with multilevel thresholding

Mohamed Firdhous; Osman Ghazali; Suhaidi Hassan

Cloud computing has been considered the new computing paradigm that would make the computing a utility. With the widespread acceptance of cloud computing, computing resources including computational power, storage, development platform and applications will be available as services. Hitherto computing resources were considered capital items and customers used to pay for these resources as for any other product. Cloud computing changes all these and consumers will pay only for what is consumed similar to other services or utilities. When cloud computing becomes more popular, different vendors would provide different services at different levels of qualities and prices. Hence customers will have to identify the differences in quality offered by different service providers and need to select the right service provider based on their requirements. A trust management system will match the service providers and the customers based on the requirements customers and the capabilities of service providers. In this paper, the authors propose a trust management system along with a trust evolution mechanism that can be used to measure the performance of services based on the response time of systems. The proposed mechanism formulates trust scores for different service level requirements based on assurance (confidence) levels. Hence this mechanism is suitable for managing multiple service levels against single trust score for all the service levels. Also the proposed mechanism is adaptive as it continuously modifies the scores based on the performance of the system. The proposed mechanism has been tested in a simulated environment and the results are found to be satisfactory.


Journal of Network and Computer Applications | 2013

Review: A comprehensive survey on scheduler for VoIP over WLAN

Kashif Nisar; Angela Amphawan; Suhaidi Hassan; Nurul I. Sarkar

Voice over Internet Protocol (VoIP) technology has observed rapid growth in the world of telecommunications. VoIP offers high-rate voice services at low cost with good flexibility, typically in a Wireless Local Area Network (WLAN). In a voice conversation, each client works either as a sender or a receiver depending on the direction of traffic flow over the network. A VoIP technologically requires high throughput, less packet loss and a high fairness index over the network. The packets of VoIP streaming may experience drops because of competition among the different kinds of traffic flow over the network. A VoIP application is also sensitive to delays and requires voice packets to arrive on time from the sender to the receiver without any delay over a WLAN. To date, scheduling of VoIP traffic is still an unresolved problem. The objectives of this survey paper are to discuss fundamental principles of VoIP-related schedulers and identify current scheduler issues. This survey paper also identifies the importance of the scheduling techniques over WLANs. Related research work for real-time applications specifically for VoIP will also be highlighted.


INNS-CIIS | 2015

Ubiquitous Shift with Information Centric Network Caching Using Fog Computing

Ibrahim Abdullahi; A. Suki M. Arif; Suhaidi Hassan

With the immense growth of information gathering, sharing and processing in the world through sophisticated smart gadgets, it is therefore paramount that the Cloud would be better managed through other paradigms such as Fog computing and Information Centric Network (ICN). These would drive the need for the shift to the Internet of Everything (IoE). Jacobson et al., Cisco and Gantz et al., in different studies forecasted the engrossment of IP addresses and as such these along other vital reports have necessitated the need of replacing IP addresses with names through the Content Centric Networking. Ciscos’ report submitted the forecast of smart gadgets out numbering the world population soon. This paper therefore presents a conceptual framework of introducing Information Centric Networking (ICN) as API to Ubiquitous computing. Taking ICN cache at the edge nodes through Fog computing technique (as off-network cache) by referring object with names in lieu of IP addresses. This practice will make access to information residing on the Cloud in the Internet of Everything closer to the user. Fog in this paper is used as edge processing node in the content store to depict the caching that makes the ICN achievable off-path. Fog concept proposed the computing, processing and storage at the edges (devices) with the added advantage of heterogeneity for Internet of Things (IoT).


2010 Second International Conference on Network Applications, Protocols and Services | 2010

Divert Failure Route Protocol Based on AODV

Sayid Mohamed Abdule; Suhaidi Hassan

This paper prototypes a new model for resolving link failure problem in Ad hoc network based on AODV protocol. Link failure is the major issue of the current Ad hoc network due to the nodes mobility, which can be avoided if the routing protocol responses quickly to the network topology change. In this research, we studied the Ad hoc on demand Distance Vector (AODV) routing protocol, especially link failure features with profound analysis. We have proposed a Divert Failure Route Protocol scheme (DFRP) as a solution to link failure. DFRP tries to avoid a link failure in advance. DFRP monitors the link to next hop and predict the link status through the signal strength. DFRP consists of two models; “DETECTION–MODEL and NEW-PATH CONSTRUCTOR-MODEL”. Main functions of these Models are to predict the signal strength, and to find a new route to divert the data to the new path, respectively. The main benefit of this new protocol is reducing the delay resulting from sending link failure information back to the sender.


international symposium on information technology | 2008

Fast Congestion Notification mechanism for ECN-capable routers

Mohammed M. Kadhum; Suhaidi Hassan

While computer networks go towards dealing with varied traffic types with different service requirements, there is a necessity for modern network control mechanisms that can control the network traffic to meet the users’ service requirements. Optimizing the network utilization by improving the network performance can help to accommodate more users and thus increase operators’ profits. Controlling the congestion at the gateway leads to better performance of the network. Sending congestion signal sooner can be of great benefit to the TCP connection. In this paper, we propose Fast Congestion Notification (FN) mechanism which is a new method for managing the gateway queues and fast sending of congestion signal to the sender. We tested our mechanism on Explicit Congestion Notification (ECN) packets which have higher priority; we achieved good results in terms of faster congestion signal propagation and better network utilization. Our analysis and simulations results show that the use of FN over TCP connections sharing one bottleneck can improve the throughput, having less loss, less delay time, and better network utilization.


asia-pacific conference on communications | 2011

Modeling of cloud system using Erlang formulas

Mohamed Firdhous; Osman Ghazali; Suhaidi Hassan

Cloud computing has been considered as the 5th utility after electricity, water, gas and telephony. When the cloud computing matures, there will be multiple vendors offering different services at different Quality of Services and at different prices. This would necessitate new tools and mechanisms for analyzing the performance of the system for matching the offerings with requirements. In this paper the authors have modeled the cloud system using queuing theory, specifically Erlang formulas. Four different cloud utility models of various complexities have been presented and analyzed using simulations. The simulations results have also been presented along with an in depth discussion.


2010 Second International Conference on Network Applications, Protocols and Services | 2010

Loss Detection and Recovery Techniques for TCP in Mobile Ad Hoc Network

Adib Habbal; Suhaidi Hassan

Currently, Transmission Control Protocol (TCP) is the dominant protocol used in the Internet. It is the transport protocol that is responsible for the transmission of around 90% of the Internet traffic. TCP was originally designed for wired network where packet loss due to congestion dominates. Mobile Ad Hoc Network (MANET), one of the wireless networks, has special characteristics which cause several types of losses that are not related to congestion; leading to violate some design concepts of TCP because TCP handles any loss as a sign of congestion. In this paper, we provide an overview on MANET characteristics that cause packet loss. Afterwards, a survey on the recent solutions that propose loss detection and recovery techniques is conducted, placing special emphasis on proposals that preserve end-to-end semantic.


Journal of Network and Computer Applications | 2013

A qualitative comparison evaluation of the greedy forwarding strategies in Mobile Ad Hoc Network

Mahmoud Al-Shugran; Osman Ghazali; Suhaidi Hassan; Kashif Nisar; A. Suki M. Arif

The Mobile Ad Hoc Network (MANET) is wireless network which provides communication among wireless mobile hosts without the need of any standing network infrastructure. In such networks, and to facilitate communication between participating nodes, every node has to offer routing services. Routing in MANET is responsible for selecting and forwarding packets along optimal paths. Finding an optimal route is a crucial task in MANET where routes tend to be multi-hop. Many routing protocols have been proposed in literature. However, few of them are efficient when the network is sparse and highly dynamic. Position-based routing and forwarding provides the opportunity for improving the efficiency and performance of the existing MANET routing strategies. This research work presents an extensive overview of geographic forwarding techniques in MANET. In particular, it focuses on the presentation of the basic operation mode of geographic forwarding, which is greedy forwarding. Meanwhile, this research work presents a qualitative evaluation of the most current and popular greedy forwarding strategies used with position based routing protocols. Furthermore, the findings have been used to conclude the most appropriate unicast forwarding policy for future research efforts.


2010 Second International Conference on Network Applications, Protocols and Services | 2010

Feasibility Study of Using IEEE 802.22 Wireless Regional Area Network (WRAN) in Malaysia

Mohd Hasbullah Omar; Suhaidi Hassan; Ahmad Hanis Mohd Shabli

This paper introduces the implementation of IEEE 802.22 Wireless Regional Area Network (WRAN) for broadband internet access in rural areas. It highlights the advantage of implementing such technology and feasibility to co-exist with Digital Video Broadcasting – Terrestrial (DVB-T) in Malaysia. It adopts a model to determine the maximum number of WRAN base stations (BSs) by analyzing its co-channel interference between the BSs. The analysis shown that maximum WRAN BSs that could co-exist is 8 to 19 BSs outside the protection contour of the DVB-T BS. Coverage areas of 30 – 100 km will also feasible to co-exist. By implementing the IEEE 802.22 WRAN, the digital divide can be narrowed and broadband penetration would be increased.

Collaboration


Dive into the Suhaidi Hassan's collaboration.

Top Co-Authors

Avatar

Osman Ghazali

Universiti Utara Malaysia

View shared research outputs
Top Co-Authors

Avatar

Adib Habbal

Universiti Utara Malaysia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Mohamed Firdhous

Information Technology University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yaser Miaji

Universiti Utara Malaysia

View shared research outputs
Top Co-Authors

Avatar

A. Suki M. Arif

Universiti Utara Malaysia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Suki Arif

Universiti Utara Malaysia

View shared research outputs
Researchain Logo
Decentralizing Knowledge