Client Server Modelling in Job Scheduling with Queuing Petri Net and Bulk Service Model Using Novel Security

V.B Kirubanand, S Palaniamma

Abstract


Communication across a network is increasingly important in the work environment. Similar to processors or disks of the system, the behavior of the network has an impact on the operation of the computer. Network devices have become a ubiquitous fixture in the modern home and corporate networks as well as in the global communication infrastructure. Devices like Hub, Switch, Bluetooth, Wifi and Wimax reside on the same networks as the personal computers and enterprise servers and together form the world-wide communication infrastructure.

To fully appreciate the scope and scale of such devices it is required to move beyond analysis of individual devices and their vulnerabilities. The analysis of such devices and the performance impact of a network are taken as the research work. This has been done using the   queuing network, Job scheduling, petri nets and Markov model.


Keywords


Client Server, Wired and wireless devices, Queuing petri net, job scheduling, Markov model.

References


Andrew D. Ker "Steg-analysis of Embedding in Two Least-Significant Bits" IEEE Transactions on Information Forensics and Security, Vol. 2, pp 662-672, 2007

Arora K.L. “Two server bulk service queuing processes Opns.,Vol. 12, PP 286 - 294, 1964.

Bailey. N.T.J. , “On queuing process with bulk services”, J.Roy. Statist. Soc. B, Vol. 16, pp. 80-87,1954.

Chobrolu. S, A. Abraham, P. Johnson, feature detection and ensemble design of intrusion detection systems, Elsevier, Computer and Security ,Vol. 24, pp. 195 – 207, 2005.

Denteneer, T.J.J., J.S.H. van Leeuwaarden, J.A.C. Resing ,“Bounds for a discrete-time multi server queue with an application to cablenetworks”, In proceedings of ITC 18, Elsevier, Berlin pp. 601- 612, 2003.

Dimitris C. Psichogios and Lyle H. Ungar "A Hybrid Neural Network- First Principles Approach to Process Modeling"

Gabor Imre, Agnes Bogardi-Meszoly, Hassan Charaf "Measuring and Modelling the Effect of the application server tuning

parameters on performance" 4th Slovakian-Hungarian Joint Symposium on Applied Machine Intelligence, 2006.

Gohain, R. and Borthakur, A. “On difference equation technique applied to bulk service queue with the server”, Pure and Applied Mathematics Science: X(1-2) PP 42-46 1979

Joseph J. Martinka "Requirement for Client Server Performance Modelling" Hewlett-Packard Laboratories, 1995.

Lee H.W., Chung, D.L., Lee, S.S and chae, K.C (1997), “Server unavailability reduces mean waiting time in some batch service queuing systems”, Computer and Ops. Res., Vol. 24, pp. 559-567.

Medhi, J and Borthakur, A. (1972), “On a two server Markovian queue with a general bulk service rule”, Cahiers du centre d’ctudes de recherché operationelle, Vol. 14, pp.151-158.

Medhi. J , “Further results on waiting time distribution in a poisson queue under a general bulk service rule”,Cahiers due centre d’ Etudes de Recherche operationnelle, Vol. 21, 183 – 189.

Mohammed Ali Bani Younes, Aman Jantan, A new Stegonagraphy Approach for image encryption exchange by using the LSB insertion, Integration Journal of Computer Science and Network Security, Vol 8. No.6 , pp 247-254. 2008.

Muhalim Mohamed Amin, Subariah Ibrahim, Mazleena Salleh, Mohd Rozi Katmin "Information Hiding Using Steganography" 2003.

Neuts, M.F. A general class of bulk queues with poisson input. Ann.Math.Statist. Vol. 38, pp. 759-770.1967.

Ramaraj. E and S. Karthikeyan, “A New Type of Network Security Protocol Using Hybrid Encryption in Virtual Private Networking” Journal of Computer Science, 2: PP 672-675, 2006.

Ross. J. Anderson, Fabian A.P. Petitcolas, On the Limits of stegonography, IEEE Journal of Selected Areas in communication 16(4),pp. 474-481, 1998.

Samuel Kounev, Alejandro Buchman "Performance Modelling of Distrubuted E-Business Applications using Queuing Perti Nets" IEEE International, 2003

Stamatelopoulos F., Roussopoulos N. and Maglaris B. "Using a DBMS for Hierarchical Network Management" 1995.

Tartakovsky. A, et al. “Detection intrusion in information system by sequential change-point method” Elsevier, Statistical methodology Vol.3 PP 252-293, 2006.


Full Text: PDF

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.

.......................................................................................................................................................................................................................

ISSN  2279 – 0381 |  IST HOMEJOURNAL HOME | Copyright IST 2012-13

.......................................................................................................................................................................................................................