Open Access Open Access  Restricted Access Subscription or Fee Access

Novel Security in Client Server using Job Scheduling with Queuing Petri Net and Bulk Service Model

V.B. Kirubanand, Dr.S. Palaniammal

Abstract


Communication across a network is increasingly
important in the work environment. Similar to processors or disks of the system, the behavior of the network has an impact on the operation of the computer. Network devices have become a ubiquitous fixture in the modern home and corporate networks as well as in the global communication infrastructure. Devices like Hub, Switch, Bluetooth, Wifi and Wimax reside on the same networks as
the personal computers and enterprise servers and together form the world-wide communication infrastructure. To fully appreciate the scope and scale of such devices it is required to move beyond analysis of individual devices and their vulnerabilities. The analysis of such devices and the performance impact of a network are taken as
the research work. This has been done using the queuing network, Job scheduling, petri nets and Markov model.


Keywords


Client Server, Wired and Wireless Devices, Queuing Petri Net, Job Scheduling, Markov Model.

Full Text:

PDF

References


Andrew D. Ker "Steg-analysis of Embedding in Two Least-Significant Bits" IEEE Transactions on Information Forensics and Security, Vol. 2, pp 662-672, 2007

Arora K.L. “Two server bulk service queuing processes Opns.,Vol. 12, PP 286 - 294, 1964.

Bailey. N.T.J. , “On queuing process with bulk services”, J.Roy. Statist. Soc. B, Vol. 16, pp. 80-87,1954.

Chobrolu. S, A. Abraham, P. Johnson, feature detection and ensemble design of intrusion detection systems, Elsevier, Computer and Security

Ross. J. Anderson, Fabian A.P. Petitcolas, On the Limits of

stegonography, IEEE Journal of Selected Areas in communication 16(4),pp. 474-481, 1998.

Samuel Kounev, Alejandro Buchman "Performance Modelling of Distrubuted E-Business Applications using Queuing Perti Nets" IEEE International, 2003

Stamatelopoulos F., Roussopoulos N. and Maglaris B. "Using a DBMS for Hierarchical Network Management" 1995.

Tartakovsky. A, et al. “Detection intrusion in information system by sequential change-point method” Elsevier, Statistical methodology Vol.3 PP 252-293, 2006.

,Vol. 24, pp. 195 – 207, 2005.

Denteneer, T.J.J., J.S.H. van Leeuwaarden, J.A.C. Resing ,“Bounds for a discrete-time multi server queue with an application to cablenetworks”, In proceedings of ITC 18, Elsevier, Berlin pp. 601-612, 2003.

Dimitris C. Psichogios and Lyle H. Ungar "A Hybrid Neural Network- First Principles Approach to Process Modeling"

Gabor Imre, Agnes Bogardi-Meszoly, Hassan Charaf "Measuring and Modelling the Effect of the application server tuning parameters on performance" 4th Slovakian-Hungarian Joint Symposium on Applied Machine Intelligence, 2006.

Gohain, R. and Borthakur, A. “On difference equation technique applied to bulk service queue with the server”, Pure and Applied Mathematics Science: X(1-2) PP 42-461979

Joseph J. Martinka "Requirement for Client Server Performance Modelling" Hewlett-Packard Laboratories, 1995.

Lee H.W., Chung, D.L., Lee, S.S and chae, K.C (1997), “Server unavailability reduces mean waiting time in some batch service queuing systems”, Computer and Ops. Res., Vol. 24, pp. 559-567.

Medhi, J and Borthakur, A. (1972), “On a two server Markovian queue with a general bulk service rule”, Cahiers du centre d‟ctudes derecherché operationelle, Vol. 14, pp.151-158.

Medhi. J , “Further results on waiting time distribution in a poisson queue under a general bulk service rule”,Cahiers due centre d‟ Etudes de Recherche operationnelle, Vol. 21, 183 – 189.

Mohammed Ali Bani Younes, Aman Jantan, A new StegonagraphyApproach for image encryption exchange by using the LSB insertion, Integration Journal of Computer Science and Network Security, Vol 8. No.6 , pp 247-254. 2008.

Muhalim Mohamed Amin, Subariah Ibrahim, Mazleena Salleh, Mohd Rozi Katmin "Information Hiding Using Steganography" 2003.

Neuts, M.F. A general class of bulk queues with poisson input. Ann.Math.Statist. Vol. 38, pp. 759-770.1967.

Ramaraj. E and S. Karthikeyan, “A New Type of Network Security Protocol Using Hybrid Encryption in Virtual Private Networking” Journal of Computer Science, 2: PP 672-675, 2006.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.