Comparison of M/M/1 and M/M(A,B)/1 Markov Models Using Matlab to Find Performance of Wired and Wireless Technologies in Client Server Applications by Applying Cryptography and Steganography
Abstract
The main theme of this paper is to derive the performance of the Hub, Switch,Bluetooth,Wi-Fi and Wimax technology using the Queueing Petri-net model and the Markov model with applying of RSA and Algorithm. This paper mainly focuses on comparison of M/M/1 AND M/M(a,b)/1 using mat lab to find performance on wired and wireless technologies in terms of service rate, arrival rate, Expected waiting time and Busy period. When comparing the service rates from the Hub network, switch network, the Bluetooth, Wi-Fi and Wimax technology. Wimax technology it has been found that the arrival rate, service rate, Expected waiting time and Busy period is very efficient in M/M (a, b)/1 for implementation. The values obtained from the Wimax technology can use for calculating the performance of other wireless technologies. QPNs facilitate the integration of both hardware and software aspects of the system behavior in the improved model. The purpose of Cryptography is to send the secured information from one system to another through the Wimax technology with security measures. Steganography is the art of hiding information in images, sounds or any other file format than the routine format. Queueing Petri Nets are very powerful as a performance analysis and prediction tool. By demonstrating the power of QPNs as a modeling paradigm in further fore coming technologies we hope to motivate further research in this area.
Keywords
Full Text:
PDFReferences
www.buzzle.com
www.compnetworking.about.com
“Performance Evaluation of Bluetooth Links in the Presence of Specific Types of Interference" -Radosveta Sokullu and Engin Karatepe
Bluetooth Channel Quality Simulation, Estimation and Adaptive Packet Selection Strategy- GUO FENG, XIAO QIMIN, XIAO QILI
“Competing Next Generation Wireless Technologies"-Warren Adis
“Emerging Wireless Standards - WiFi, ZigBee and WiMAX”-Bhavneet Sidhu, Hardeep Singh, and Amit Chhabra
“The Next Generation of Wireless LAN Emerges with 802.11n”- Wilson, J
"romantic cryptrography"-frank and William
"Hide and Seek: An Introduction to Steganography"-Niels Provos and Peter Honeyman
"performance modeling of distributed e-business application using queueing petri nets"-Kounev,S.;Buchmann,A.,2003
"Queueing Networks and Markov Chains - Modeling and Performance Evaluation with Computer Science Applications"-G.Bolch, S.Greiner,H.De Meer,and K.S.Trivedi
“Queuing Petri Nets”-F.Bause.
"Queueing petrinet modeling environment"-samuel kounev, christofer dutz, alejandro buchmann.
“Hierarchically Combined Queueing Petri Nets"F.Bause, P.Buchholz, and P.Kemper
www.knowledgerush.com
Stochastic processes. Second edition. J.Medhi. New Age International Publishers.
“The bulk service queue with a general control strategy: theoretical analysis and a new computational procedure"-Warren B. Powell,Pierre Humblet
Performance analysis of parallel client server model versus parallel mobile agent model- k.b.manwade and g.a patil.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.