Papers by Ali Fathi A L I Sawehli
Hi-Tech Crop is a company that provides and develops a generic software control
system for a clas... more Hi-Tech Crop is a company that provides and develops a generic software control
system for a class of digital devices which is basically e-commerce web applications. The
company is a leading company in this area where most of its clients use this product as a
primary product. This system is considered as a big and complicated system where there are
around 20 developers, and maintenance staff is working on this project. Additionally,
customers usually receive the developed product in phased releases which typically from 9 to
12 months, and it depends on the customer’s requirements. Most of the time, these releases
significantly contain chunks of new and essential functionality to accommodate the new
advanced technology. Currently, the customers have reported several defects that they have
faced once using the products such as loss of specific service, loss of the availability as well as
encounter erroneous services. These types of defects are usually discovered once there is a new
phased release, and they are expected to be traced to a specific module and fixed as soon as
possible. All of these attempts to fix defects should be released in a subsequent release. So far,
the current system of Hi-Tech Crop has been able to meet up its main objectives with various
difficulties, but with this rapid growth of the market and its high demand, the current
development and procedure do not meet the quality standards. With all of this overwhelming
number of defects that have been received by the customers, the company is finding itself in a
bad position due to these defects. Therefore, the leading product is recently marked as
unreliable and gained a bad reputation and started getting out of the track. Because of these big
issues, the management of the Hi-Tech Crop has started looking forward to getting to the
bottom of.
As a result of these issues, the management plans to concentrate on fixing all the
reported defects quickly enough. Therefore, Hi-Tech Corp wants to have a suitable testing
strategy and procedure in order to improve their product. Also, the company wants in details
documents that critically explain a software metric for evaluating the products as well as the
calculation parts. At the same time, the company wants to have in detail a software
configuration management technique to manage the software control product.
XYZ is a social media management company that offers social media services such as search
engine ... more XYZ is a social media management company that offers social media services such as search
engine services as well as web design services. It mainly creates and monitors social media
companies based on their needs. Based on that, XYZ assists their client to grow their businesses
by providing smart marketing platform through social media. In fact, social media is playing a
vital role in the business around the world, and it introduced a new type of social media which
is online marking. This type allows companies to reach and target their audience based on their
specification that they declare such as it can be based on a country, group of age or interest. In
order to determine these specifications, these companies can use other services that deal with
Artificial Intelligence and machine learning. Therefore, XYZ provides these services to their
clients to achieve these aforementioned goals and apply a suitable and smart marketing strategy
and platform.
Network Design and Performance, 2019
In this contemporary world, network computing has become one of the major requirements in
today’s... more In this contemporary world, network computing has become one of the major requirements in
today’s world. It can be seen in various places such as in home, universities, hospitals, airports,
hotels, retail shops, banks, government sectors, etc. With all of these growths, the network
computing has continuously expanded in several aspects and areas such as in term of the
infrastructure’s size, complexity as well as the number of users that can accommodate.
(Malgaonkar, Patil, Rai, & Singh, 2017)Therefore, network computing can be categorized into
two types which are wired network and wireless network. Both of them work and operate
differently as well as they have different setup and architecture.
In the simplest sense, wireless technology enables and allows devices to start communicating
without the need of physical connections such as network cabling, whereas wired network
requires the users to communicate physically through a connection cable between the user’s
device and the network device. The wireless technology uses radio frequency transmissions to
transmit the generated data by the connected devices. Besides that, wireless networks can also
be classified into several groups based on their coverage. These classifications can be like
Wireless Wide Area Network “WWAN,” Wireless Personal Area Network “WPAN” and
WLANs. WWAN is typically responsible for transmitting the data for mobile communication
which includes 2G cellular, Global System for mobile communication “GSM” and more (AbuTair & Bhatti, 2017).
For WLAN technology, it can be divided into different technologies which are wireless LANs
and Ad Hoc Networks. For wireless LANs, it allows greater portability and flexibility than the
traditional wired local area network “LAN” since it allows the users to connect remotely using
wireless card device which is usually built-in devices in laptops. For Ad hoc networks, they
are considered as a network designed to dynamically connect remote devices like cell phones
and laptop through Bluetooth technologies. This type of technology is considered as shifting
network topologies and maintain random network configuration whereas the WLANs use a
fixed network infrastructure (Lutui, Tete'Imoana, & Maeakafa, 2017).
Based on that, the wireless network provides and offers several benefits such as user mobility,
rapid installation, flexibility, and scalability. Because of these primary benefits, WLANs are
still gaining high popularity nowadays, and it becomes a compelling alternative to traditional
wired technology since it makes it easier for users to conduct their daily operations. Therefore,
wireless LAN technology offers a type of authentication services to verify the identity of the
Page 5 of 29
communicating clients that provides an access control mechanism to the network and deny any
client that cannot complete the authentication stage properly. The main aim of this research is
to study and discuss the main wireless security and IEEE 802.11 standards based on their
performance which includes throughput and delay, confidentially, integrity and availability.
2019, 2019
Nowadays with the help of e-commerce websites, the companies get a massive opportunity to
present... more Nowadays with the help of e-commerce websites, the companies get a massive opportunity to
present and deliver their products and services to customers and make it available for 24 hours.
By doing so, the companies will be able to reach out to its potential customers since most of
the people started to prefer shopping online due to several benefits such as simplicity and save
time. They are able to select and buy any desired products at any wanted time and pay using
various options such as credit cards or cash as well. Because of these benefits, most of the
companies tend to have e-commerce websites where the customers are simply required to visit
the website, view the product, add it to the shopping cart and pay. Then the purchased orders
will be delivered to the mentioned destination on time (Ferreira, N. M, 2018).
Also, the e-commerce web application allows customers to post and submit their feedback
regarding several elements such as about the product, the delivery service, and e-commerce
services. By providing this type of feedback, the company will be able to improve their services
and enhance them better, since keeping in touch with the customers is very necessary in order
to know the customer’s opinion time (Ferreira, N. M, 2018).
Uploads
Papers by Ali Fathi A L I Sawehli
system for a class of digital devices which is basically e-commerce web applications. The
company is a leading company in this area where most of its clients use this product as a
primary product. This system is considered as a big and complicated system where there are
around 20 developers, and maintenance staff is working on this project. Additionally,
customers usually receive the developed product in phased releases which typically from 9 to
12 months, and it depends on the customer’s requirements. Most of the time, these releases
significantly contain chunks of new and essential functionality to accommodate the new
advanced technology. Currently, the customers have reported several defects that they have
faced once using the products such as loss of specific service, loss of the availability as well as
encounter erroneous services. These types of defects are usually discovered once there is a new
phased release, and they are expected to be traced to a specific module and fixed as soon as
possible. All of these attempts to fix defects should be released in a subsequent release. So far,
the current system of Hi-Tech Crop has been able to meet up its main objectives with various
difficulties, but with this rapid growth of the market and its high demand, the current
development and procedure do not meet the quality standards. With all of this overwhelming
number of defects that have been received by the customers, the company is finding itself in a
bad position due to these defects. Therefore, the leading product is recently marked as
unreliable and gained a bad reputation and started getting out of the track. Because of these big
issues, the management of the Hi-Tech Crop has started looking forward to getting to the
bottom of.
As a result of these issues, the management plans to concentrate on fixing all the
reported defects quickly enough. Therefore, Hi-Tech Corp wants to have a suitable testing
strategy and procedure in order to improve their product. Also, the company wants in details
documents that critically explain a software metric for evaluating the products as well as the
calculation parts. At the same time, the company wants to have in detail a software
configuration management technique to manage the software control product.
engine services as well as web design services. It mainly creates and monitors social media
companies based on their needs. Based on that, XYZ assists their client to grow their businesses
by providing smart marketing platform through social media. In fact, social media is playing a
vital role in the business around the world, and it introduced a new type of social media which
is online marking. This type allows companies to reach and target their audience based on their
specification that they declare such as it can be based on a country, group of age or interest. In
order to determine these specifications, these companies can use other services that deal with
Artificial Intelligence and machine learning. Therefore, XYZ provides these services to their
clients to achieve these aforementioned goals and apply a suitable and smart marketing strategy
and platform.
today’s world. It can be seen in various places such as in home, universities, hospitals, airports,
hotels, retail shops, banks, government sectors, etc. With all of these growths, the network
computing has continuously expanded in several aspects and areas such as in term of the
infrastructure’s size, complexity as well as the number of users that can accommodate.
(Malgaonkar, Patil, Rai, & Singh, 2017)Therefore, network computing can be categorized into
two types which are wired network and wireless network. Both of them work and operate
differently as well as they have different setup and architecture.
In the simplest sense, wireless technology enables and allows devices to start communicating
without the need of physical connections such as network cabling, whereas wired network
requires the users to communicate physically through a connection cable between the user’s
device and the network device. The wireless technology uses radio frequency transmissions to
transmit the generated data by the connected devices. Besides that, wireless networks can also
be classified into several groups based on their coverage. These classifications can be like
Wireless Wide Area Network “WWAN,” Wireless Personal Area Network “WPAN” and
WLANs. WWAN is typically responsible for transmitting the data for mobile communication
which includes 2G cellular, Global System for mobile communication “GSM” and more (AbuTair & Bhatti, 2017).
For WLAN technology, it can be divided into different technologies which are wireless LANs
and Ad Hoc Networks. For wireless LANs, it allows greater portability and flexibility than the
traditional wired local area network “LAN” since it allows the users to connect remotely using
wireless card device which is usually built-in devices in laptops. For Ad hoc networks, they
are considered as a network designed to dynamically connect remote devices like cell phones
and laptop through Bluetooth technologies. This type of technology is considered as shifting
network topologies and maintain random network configuration whereas the WLANs use a
fixed network infrastructure (Lutui, Tete'Imoana, & Maeakafa, 2017).
Based on that, the wireless network provides and offers several benefits such as user mobility,
rapid installation, flexibility, and scalability. Because of these primary benefits, WLANs are
still gaining high popularity nowadays, and it becomes a compelling alternative to traditional
wired technology since it makes it easier for users to conduct their daily operations. Therefore,
wireless LAN technology offers a type of authentication services to verify the identity of the
Page 5 of 29
communicating clients that provides an access control mechanism to the network and deny any
client that cannot complete the authentication stage properly. The main aim of this research is
to study and discuss the main wireless security and IEEE 802.11 standards based on their
performance which includes throughput and delay, confidentially, integrity and availability.
present and deliver their products and services to customers and make it available for 24 hours.
By doing so, the companies will be able to reach out to its potential customers since most of
the people started to prefer shopping online due to several benefits such as simplicity and save
time. They are able to select and buy any desired products at any wanted time and pay using
various options such as credit cards or cash as well. Because of these benefits, most of the
companies tend to have e-commerce websites where the customers are simply required to visit
the website, view the product, add it to the shopping cart and pay. Then the purchased orders
will be delivered to the mentioned destination on time (Ferreira, N. M, 2018).
Also, the e-commerce web application allows customers to post and submit their feedback
regarding several elements such as about the product, the delivery service, and e-commerce
services. By providing this type of feedback, the company will be able to improve their services
and enhance them better, since keeping in touch with the customers is very necessary in order
to know the customer’s opinion time (Ferreira, N. M, 2018).
system for a class of digital devices which is basically e-commerce web applications. The
company is a leading company in this area where most of its clients use this product as a
primary product. This system is considered as a big and complicated system where there are
around 20 developers, and maintenance staff is working on this project. Additionally,
customers usually receive the developed product in phased releases which typically from 9 to
12 months, and it depends on the customer’s requirements. Most of the time, these releases
significantly contain chunks of new and essential functionality to accommodate the new
advanced technology. Currently, the customers have reported several defects that they have
faced once using the products such as loss of specific service, loss of the availability as well as
encounter erroneous services. These types of defects are usually discovered once there is a new
phased release, and they are expected to be traced to a specific module and fixed as soon as
possible. All of these attempts to fix defects should be released in a subsequent release. So far,
the current system of Hi-Tech Crop has been able to meet up its main objectives with various
difficulties, but with this rapid growth of the market and its high demand, the current
development and procedure do not meet the quality standards. With all of this overwhelming
number of defects that have been received by the customers, the company is finding itself in a
bad position due to these defects. Therefore, the leading product is recently marked as
unreliable and gained a bad reputation and started getting out of the track. Because of these big
issues, the management of the Hi-Tech Crop has started looking forward to getting to the
bottom of.
As a result of these issues, the management plans to concentrate on fixing all the
reported defects quickly enough. Therefore, Hi-Tech Corp wants to have a suitable testing
strategy and procedure in order to improve their product. Also, the company wants in details
documents that critically explain a software metric for evaluating the products as well as the
calculation parts. At the same time, the company wants to have in detail a software
configuration management technique to manage the software control product.
engine services as well as web design services. It mainly creates and monitors social media
companies based on their needs. Based on that, XYZ assists their client to grow their businesses
by providing smart marketing platform through social media. In fact, social media is playing a
vital role in the business around the world, and it introduced a new type of social media which
is online marking. This type allows companies to reach and target their audience based on their
specification that they declare such as it can be based on a country, group of age or interest. In
order to determine these specifications, these companies can use other services that deal with
Artificial Intelligence and machine learning. Therefore, XYZ provides these services to their
clients to achieve these aforementioned goals and apply a suitable and smart marketing strategy
and platform.
today’s world. It can be seen in various places such as in home, universities, hospitals, airports,
hotels, retail shops, banks, government sectors, etc. With all of these growths, the network
computing has continuously expanded in several aspects and areas such as in term of the
infrastructure’s size, complexity as well as the number of users that can accommodate.
(Malgaonkar, Patil, Rai, & Singh, 2017)Therefore, network computing can be categorized into
two types which are wired network and wireless network. Both of them work and operate
differently as well as they have different setup and architecture.
In the simplest sense, wireless technology enables and allows devices to start communicating
without the need of physical connections such as network cabling, whereas wired network
requires the users to communicate physically through a connection cable between the user’s
device and the network device. The wireless technology uses radio frequency transmissions to
transmit the generated data by the connected devices. Besides that, wireless networks can also
be classified into several groups based on their coverage. These classifications can be like
Wireless Wide Area Network “WWAN,” Wireless Personal Area Network “WPAN” and
WLANs. WWAN is typically responsible for transmitting the data for mobile communication
which includes 2G cellular, Global System for mobile communication “GSM” and more (AbuTair & Bhatti, 2017).
For WLAN technology, it can be divided into different technologies which are wireless LANs
and Ad Hoc Networks. For wireless LANs, it allows greater portability and flexibility than the
traditional wired local area network “LAN” since it allows the users to connect remotely using
wireless card device which is usually built-in devices in laptops. For Ad hoc networks, they
are considered as a network designed to dynamically connect remote devices like cell phones
and laptop through Bluetooth technologies. This type of technology is considered as shifting
network topologies and maintain random network configuration whereas the WLANs use a
fixed network infrastructure (Lutui, Tete'Imoana, & Maeakafa, 2017).
Based on that, the wireless network provides and offers several benefits such as user mobility,
rapid installation, flexibility, and scalability. Because of these primary benefits, WLANs are
still gaining high popularity nowadays, and it becomes a compelling alternative to traditional
wired technology since it makes it easier for users to conduct their daily operations. Therefore,
wireless LAN technology offers a type of authentication services to verify the identity of the
Page 5 of 29
communicating clients that provides an access control mechanism to the network and deny any
client that cannot complete the authentication stage properly. The main aim of this research is
to study and discuss the main wireless security and IEEE 802.11 standards based on their
performance which includes throughput and delay, confidentially, integrity and availability.
present and deliver their products and services to customers and make it available for 24 hours.
By doing so, the companies will be able to reach out to its potential customers since most of
the people started to prefer shopping online due to several benefits such as simplicity and save
time. They are able to select and buy any desired products at any wanted time and pay using
various options such as credit cards or cash as well. Because of these benefits, most of the
companies tend to have e-commerce websites where the customers are simply required to visit
the website, view the product, add it to the shopping cart and pay. Then the purchased orders
will be delivered to the mentioned destination on time (Ferreira, N. M, 2018).
Also, the e-commerce web application allows customers to post and submit their feedback
regarding several elements such as about the product, the delivery service, and e-commerce
services. By providing this type of feedback, the company will be able to improve their services
and enhance them better, since keeping in touch with the customers is very necessary in order
to know the customer’s opinion time (Ferreira, N. M, 2018).