Al-Nahrain Journal for Engineering Sciences
Login
NJES
  • Home
  • Articles & Issues
    • Latest Issue
    • All Issues
  • Authors
    • Submit Manuscript
    • Guide for Authors
    • Submission Resources
    • Authorship
    • Article Processing Charges (APC)
  • Reviewers
    • Guide for Reviewers
    • Become a Reviewer
  • Policies
    • Publication Ethics
    • Plagiarism
    • Allegations of Misconduct
    • Appeals and Complaints
    • Corrections and Withdrawals
    • Open Access
    • Archiving Policy
    • Copyright Policy
  • About
    • About Journal
    • Aims and Scope
    • Editorial Team
    • Journal Insights
    • Peer Review Process
    • Abstracting and Indexing
    • Announcements
    • Contact

Search Results for delay

Article
An Improved Algorithm for Congestion Management in Network Based on Jitter and Time to Live Mechanisms

Samar Taha Yousif, Zaid Abass A. Al-Haboobi

Pages: 352-356

PDF Full Text
Abstract

As internet network developed rapidly in the past ten years, and its operating environment is constantly changing along with the development of computer and communication technology, the congestion problem has become more and more serious. Since TCP is the primary protocol for transport layers on the internet, the data transmitted via the transport protocol utilizes Vegas Transmission Control Protocol (TCP) as the congestion control algorithm, where it uses increasing in delay round trip time (RTT) as a signal of network congestion. However, this congestion control algorithm will attempt to fill network buffer, which causes an increase in (RTT) determined by Vegas, thereby reducing the congestion window, and making the transmission slower, Therefore Vegas has not been widely adopted on the Internet. In this paper, an improved algorithm called TCP Vegas-A is proposed consist of two parts: the first part is sending the congestion window used by the algorithm for congestion avoidance along with the TTL (Time To Live) mechanism that limits the lifetime of a packet in the network. While the second part of the algorithm is the priority-based packet sending strategy, and jitter is used as a congestion signal indication. The combination of the two is expected to improve the efficiency of congestion detection. A mathematical model is established, and the analysis of the model shows that the algorithm has better effects on controlling congestion and improving the network throughput, decreasing packet loss rate and increasing network utilization, the simulation is done using NS-2 network simulation platform environment and the results support the theoretical analysis.

Article
Performance Enhancement of Oil pipeline Monitoring for a Simulated Underwater Wireless Sensor Network

Waseem M. Jassim, Ammar E. Abdelkareem

Pages: 260-266

PDF Full Text
Abstract

In the last two decades, underwater acoustic sensor networks have begun to be used for commercial and non-commercial purposes. In this paper, the focus will be on improving the monitoring performance system of oil pipelines. Linear wireless sensor networks are a model of underwater applications for which many solutions have been developed through several research studies in previous years for data collection research. In underwater environments, there are certain inherent limitations, like large propagation delays, high error rate, limited bandwidth capacity, and communication with short-range. Many deployment algorithms and routing algorithms have been used in this field. In this work a new hierarchical network model proposed with improvement to Smart Redirect or Jump algorithm (SRJ). This improved algorithm is used in an underwater linear wireless sensor network for data transfer to reduce the complexity in routing algorithm for relay nodes which boost delay in communication.  This work is implemented using OMNeT++ and MATLAB based on their integration. The results obtained based on throughput, energy consumption, and end to the end delay.

Article
Performance Analysis of Volume Loads of (Services and Transmission) Traffic in VPN Networks: A Comparative Study

Subhi Aswad Mohammed

Pages: 283-293

PDF Full Text
Abstract

This paper proposes a design for a network connected over public networks using Virtual Private Network (VPN) technique. The network consists of five sites; center server and four customer service sites, each site consists of a number of LANs depending on the user services requirements. This work aims to measure the effect of VPN on the performance of a network. Four approaches are implements: Network design without using VPN, network design using VPN with centralized servers, network design using VPN with distributed servers, and network design using server load balance.The OPNET and BOSON   simulation results show higher response time for packet transmission due to effect of VPN tunneling. The concurrent activation of application execution is used as a solution to the delay problem of the initial timing period while the application proceeds. The results dealing with QoS are E-mail, FTP, voice services traffic and IP traffic dropped. The VPN Tunnels is in the range of (0.01 to 0.02) sec.; along with this simulator there are four VPN tunnels in the network. Also, a special server’s load balance is used to manage distribution of the server processing load across all other network servers to achieve the best response

1 - 3 of 3 items

Search Parameters

×

The submission system is temporarily under maintenance. Please send your manuscripts to

Go to Editorial Manager
Journal Logo
Al-Nahrain Journal for Engineering Sciences (NJES)

College of Engineering, Al-Nahrain University

  • Copyright Policy
  • Terms & Conditions
  • Privacy Policy
  • Accessibility
  • Cookie Settings
Licensing & Open Access

CC BY NC 4.0 Logo Licensed under CC-BY-NC-4.0

This journal provides immediate open access to its content.

Editorial Manager Logo Elsevier Logo

Peer-review powered by Elsevier’s Editorial Manager®

Copyright © 2026 College of Engineering, Al-Nahrain University, its licensors, and contributors. All rights reserved, including those for text and data mining, AI training, and similar technologies. For all open access content, the relevant licensing terms apply.