Queuing Network using Job Scheduling using Transposition Cipher
Citation
MLA Style: Dr.V.B.Kirubanand, Dr.R.Sivakumar "Queuing Network using Job Scheduling using Transposition Cipher" International Journal of P2P Network Trends and Technology 8.4 (2018): 1-5.
APA Style:Dr.V.B.Kirubanand, Dr.R.Sivakumar, (2018). Queuing Network using Job Scheduling using Transposition Cipher. International Journal of P2P Network Trends and Technology, 8(4), 1-5.
Abstract
Today, network carries huge volume of data across various applications and devices. Each application depends on some service which is served from a desired server. The client’s request increase in number day to day and the demands of the user are high. Computer network is broadly classified into two categories as wired and wireless with the usage of various interface devices.The technical mechanism in each of such devices varies based on the users need. The performance of each device can be analyzed and can make use of it with more efficiency. The efficiency of the network can still be improved by managing the requests in a standard framework using queuing theory and Transposition Cipher method were used for protected data transmission.
References
[1] Andrew D. Ker "Steg-analysis of Embedding in Two Least-Significant Bits" IEEE Transactions on Information Forensics and Security, Vol. 2, pp 662-672, 2007
[2] Arora K.L. “Two client server bulk service queuing processes Opns.,Vol. 12, PP 286 - 294, 1964.
[3] Chobrolu. S, A. Abraham, P. Johnson, feature detection and ensemble design of intrusion detection systems, Elsevier, Computer and Security ,Vol. 24, pp. 195 – 207, 2005.
[4] Denteneer, T.J.J., J.S.H. van Leeuwaarden, J.A.C. Resing ,“Bounds for a discrete-time multi erverueue with an application to cablenetworks”, In proceedings of ITC 18, Elsevier, Berlin pp. 601-612, 2003.
[5] Dimitris C. Psichogios and Lyle H. Ungar "A Hybrid Neural Network- First Principles Approach to Process Modeling"
[6] Gabor Imre, Agnes Bogardi-Meszoly, Hassan Charaf "Measuring and Modelling the Effect of the application tuning parameters on performance" 4th Slovakian-Hungarian Joint Symposium on Applied Machine Intelligence, 2006.
[7] Gohain, R. and Borthakur, A. “On difference equation technique applied to bulk service queue with the server”, Pure and Applied Mathematics Science: X(1-2) PP 42-461979
[8] Lee H.W., Chung, D.L., Lee, S.S and chae, K.C (1997), “client server unavailability reduces mean waiting time in some batch service queuing systems”, Computer and Ops. Res., Vol. 24, pp. 559-567.
[9] Mohammed Ali Bani Younes, Aman Jantan, A new Stegonagraphy Approach for image encryption exchange by using the LSB insertion, Integration Journal of Computer Science and Network Security, Vol 8. No.6 , pp 247-254. 2008.
[10] Ramaraj. E and S. Karthikeyan, “A New Type of Network Security Protocol Using Hybrid Encryption in Virtual Private Networking” Journal of Computer Science, 2: PP 672-675,2006.
[11] Ross. J. Anderson, Fabian A.P. Petitcolas, On the Limits of stegonography, IEEE Journal of Selected Areas in communication 16(4),pp.474-481, 1998.
[12] Samuel Kounev, Alejandro Buchman "Performance Modelling of Distrubuted E-Business Applications using Queuing Perti Nets" IEEE International, 2003
[13] Stamatelopoulos F., Roussopoulos N. and Maglaris B. "Using a DBMS for Hierarchical Network Management" 1995.
[14] V.B.Kirubanand,S.Palaniammal, Performance Modeling in cloud computing architecture network comparison of Hub,Switch and Bluetooth Technology using Markov Agorithm and Queuing petrinets with the securityof steganography .International journal of advanced networking and applications.Volume: 01,Issue:05,pages:331-336.March-April 2010.
[15] V.B.Kirubanand,S.Palaniammal, Performance Modeling in Comparison of Switch andBluetooth Technology by using Markov Algorithm and Queuing Petrinets with the security of Steganography, Far East Journal of Experimental and Theorwetical Artificial Intelligence. Volume 4, No:1, 2009, pages:33-43, March 2009.
[16] V.B.Kirubanand, S.Palaniammal, A Hybrid model in comparing the performance of wired nd Wireless Technologies by using the Markov algorithm and Queuing Petrinets, International journal of computer application, No:4 Article-1, Pub: Foundation of computer Science, 2010.
[17] V.B.Kirubanand, S.Palaniammal, Performance Modeling of Cloud computing architecture with Mobile-Fi Application Using Queuing Petri nets by Markov Algorithm with Security of Cryptography, International Journal Network and Computer Engineering ISSN 0975-6485 Volume 1 Number 1(2010) pp. 1-9, 2010.
Keywords
Queuing Networkt, job scheduling, FCFC, SJF, Priority Scheduling, Round Robin Scheduling.