A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Kirubanand, V. B.
- Novel Security in Client Server Using Job Scheduling with Queuing Petri Net and Bulk Service Model
Authors
1 Department of Computer Applications, Sri Krishna College of Engineering and Technology, Coimbatore-641008, IN
2 Department of Science and Humanities, Sri Krishna College of Technology, Coimbatore-641042, IN
Source
Wireless Communication, Vol 4, No 6 (2012), Pagination: 323-327Abstract
Communication across a network is increasingly important in the work environment. Similar to processors or disks of the system, the behavior of the network has an impact on the operation of the computer. Network devices have become a ubiquitous fixture in the modern home and corporate networks as well as in the global communication infrastructure. Devices like Hub, Switch, Bluetooth, Wifi and Wimax reside on the same networks as the personal computers and enterprise servers and together form the world-wide communication infrastructure. To fully appreciate the scope and scale of such devices it is required to move beyond analysis of individual devices and their vulnerabilities. The analysis of such devices and the performance impact of a network are taken as the research work. This has been done using the queuing network, Job scheduling, petri nets and Markov model.Keywords
Client Server, Wired and Wireless Devices, Queuing Petri Net, Job Scheduling, Markov Model.- Application of Client Server Networking in Wireless Technologies by Using Markov Algorithm and Queueing Petri Nets with the Security of Steganography
Authors
1 Department of MCA, V.L.B. Janakiammal College of Arts and Science, IN
2 Department of Science and Humanities, VLB Janakiammal College of Engineering and Technology, IN
Source
Wireless Communication, Vol 1, No 1 (2009), Pagination: 52-56Abstract
This paper focuses on how the wireless technologies such as wibree, wimax, wifi and mobile-fi can be used for application of client server modeling using Queueing Petri net models and markov algorithm with the security of Steganography. Using M/M(1,b)/1 bulk service queueing model, performance of client-server model is been studied and the results obtained are very efficient for implementation. Also waiting time is reduced in this model when compare to other models like M/M/1 and M/M/C. QPNs facilitate the integration of both hardware and software aspects of the system behavior in the improved model. This lends itself very well to modeling distributed component-based systems, such as modern e-business applications(New order, Change order, Order status, Customer status). Simultaneous resource possession, synchronization, blocking and contentions for software resources can be easily modelled by adding the wireless technologies in the systems and by using QPNs. The purpose of stegonagraphy is hiding information; QPNs are very powerful as a performance analysis and prediction tool. By demonstrating the power of QPNs as a modeling paradigm in further fore coming technologies we hope to motivate further research in this area.Keywords
Wibree, Wimax, Wifi, Mobile-Fi, Queueing Network, Petri-Nets, Queueing Petri-Nets, Markov Algorithm, Bulk Service, Steganography.- Comparison of M/M/1 and M/M(A,B)/1 Markov Models Using Matlab to Find Performance of Wired and Wireless Technologies in Client Server Applications by Applying Cryptography and Steganography
Authors
1 Department of MCA, Sri Krishna College of Engineering and Technology,Coimbatore-641008, IN
2 Department of Science and Humanities, VLB Janakiammal College of Eng and Tech, Coimbatore-641042, IN
Source
Networking and Communication Engineering, Vol 2, No 9 (2010), Pagination: 319-322Abstract
The main theme of this paper is to derive the performance of the Hub, Switch,Bluetooth,Wi-Fi and Wimax technology using the Queueing Petri-net model and the Markov model with applying of RSA and Algorithm. This paper mainly focuses on comparison of M/M/1 AND M/M(a,b)/1 using mat lab to find performance on wired and wireless technologies in terms of service rate, arrival rate, Expected waiting time and Busy period. When comparing the service rates from the Hub network, switch network, the Bluetooth, Wi-Fi and Wimax technology. Wimax technology it has been found that the arrival rate, service rate, Expected waiting time and Busy period is very efficient in M/M (a, b)/1 for implementation. The values obtained from the Wimax technology can use for calculating the performance of other wireless technologies. QPNs facilitate the integration of both hardware and software aspects of the system behavior in the improved model. The purpose of Cryptography is to send the secured information from one system to another through the Wimax technology with security measures. Steganography is the art of hiding information in images, sounds or any other file format than the routine format. Queueing Petri Nets are very powerful as a performance analysis and prediction tool. By demonstrating the power of QPNs as a modeling paradigm in further fore coming technologies we hope to motivate further research in this area.
Keywords
Client Server, Hub, Switch, Bluetooth, Wi-Fi, Queueing Petri-Nets, Markov Algorithm, RSA.- Cloud Computing with Mobile-Fi Technology Using Transposition and Substitution Cipher in Job Scheduling
Authors
1 Department of Computer Science, Christ University, Bengaluru-560029, IN
Source
Data Mining and Knowledge Engineering, Vol 9, No 4 (2017), Pagination: 79-83Abstract
A network that distributes the information among computer systems contains a blend up of both wired and wireless interface devices. These devices play a vital part in routing and switching the data packets in the system. The use of MOBILE-FI Wireless tool technology holds the properties of allocating the activities of computer systems. Such allocated data storage technique was soon after enhanced with a procedure of centralized database storage called Cloud Computing Architecture System. Thus all the client demands are aptly responded from the server.
The standard Cloud Computing Architecture has been scrutinized with various network devices. This part of the research work is an implementation of multi mechanism hybrid model for successful and using Transposition and Substitutions Cipher method which will be protected data transmission.
Keywords
Cloud Computing Architecture, Mobile-Fi Wireless Device, Job Scheduling, Markov Model, Transposition, Substitutions.- Performance Modeling in Client Server Network Comparison of Hub, Switch and Bluetooth Technology Using Markov Algorithm and Queuing Petri Nets with the Security of Steganography
Authors
1 Department of MCA, Sri Krishna College of Engineering and Technology, Coimbatore, IN
2 Department of Science and Humanities, VLB Janakiammal College of Eng and Tech, Coimbatore, IN