Open Access Open Access  Restricted Access Subscription or Fee Access

Comparison of M/M/1 and M/M(A,B)/1 Markov Models Using Matlab to Find Performance of Wired and Wireless Technologies in Client Server Applications by Applying Cryptography and Steganography

V. B. Kirubanand, Dr. S. Palaniammal


The main theme of this paper is to derive the performance of the Hub, Switch,Bluetooth,Wi-Fi and Wimax technology using the Queueing Petri-net model and the Markov model with applying of RSA and Algorithm. This paper mainly focuses on comparison of M/M/1 AND M/M(a,b)/1 using mat lab to find performance on wired and wireless technologies in terms of service rate, arrival rate, Expected waiting time and Busy period. When comparing the service rates from the Hub network, switch network, the Bluetooth, Wi-Fi and Wimax technology. Wimax technology it has been found that the arrival rate, service rate, Expected waiting time and Busy period is very efficient in M/M (a, b)/1 for implementation. The values obtained from the Wimax technology can use for calculating the performance of other wireless technologies. QPNs facilitate  the  integration  of  both  hardware  and software  aspects  of  the  system  behavior  in  the improved  model.  The purpose of Cryptography is to send the secured information from one system to another through the Wimax technology with security measures. Steganography is the art of hiding information in images, sounds or any other file format than the routine format. Queueing Petri Nets   are   very   powerful as   a   performance analysis and prediction tool. By demonstrating the power of QPNs as a modeling paradigm in further fore coming technologies we hope to motivate further research in this area. 


Client Server, Hub, Switch, Bluetooth, Wi-Fi, Queueing Petri-nets, Markov algorithm, , RSA

Full Text:



“Performance Evaluation of Bluetooth Links in the Presence of Specific Types of Interference" -Radosveta Sokullu and Engin Karatepe

Bluetooth Channel Quality Simulation, Estimation and Adaptive Packet Selection Strategy- GUO FENG, XIAO QIMIN, XIAO QILI

“Competing Next Generation Wireless Technologies"-Warren Adis

“Emerging Wireless Standards - WiFi, ZigBee and WiMAX”-Bhavneet Sidhu, Hardeep Singh, and Amit Chhabra

“The Next Generation of Wireless LAN Emerges with 802.11n”- Wilson, J

"romantic cryptrography"-frank and William

"Hide and Seek: An Introduction to Steganography"-Niels Provos and Peter Honeyman

"performance modeling of distributed e-business application using queueing petri nets"-Kounev,S.;Buchmann,A.,2003

"Queueing Networks and Markov Chains - Modeling and Performance Evaluation with Computer Science Applications"-G.Bolch, S.Greiner,H.De Meer,and K.S.Trivedi

“Queuing Petri Nets”-F.Bause.

"Queueing petrinet modeling environment"-samuel kounev, christofer dutz, alejandro buchmann.

“Hierarchically Combined Queueing Petri Nets"F.Bause, P.Buchholz, and P.Kemper

Stochastic processes. Second edition. J.Medhi. New Age International Publishers.

“The bulk service queue with a general control strategy: theoretical analysis and a new computational procedure"-Warren B. Powell,Pierre Humblet

Performance analysis of parallel client server model versus parallel mobile agent model- k.b.manwade and g.a patil.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.