{"title":"Queuing Network using Job Scheduling using Transposition Cipher","authors":"Vera B. Anand, Christ, R.Siva kumar","doi":"10.14445/22492615/IJPTT-V8I4P402","DOIUrl":null,"url":null,"abstract":"Today, network carries huge volume of data across various applications and devices. Each application depends on some service which is served from a desired server. The client’s request increase in number day to day and the demands of the user are high. Computer network is broadly classified into two categories as wired and wireless with the usage of various interface devices.The technical mechanism in each of such devices varies based on the users need. The performance of each device can be analyzed and can make use of it with more efficiency. The efficiency of the network can still be improved by managing the requests in a standard framework using queuing theory and Transposition Cipher method were used for protected data transmission.","PeriodicalId":231377,"journal":{"name":"International Journal of P2P Network Trends and Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of P2P Network Trends and Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14445/22492615/IJPTT-V8I4P402","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Today, network carries huge volume of data across various applications and devices. Each application depends on some service which is served from a desired server. The client’s request increase in number day to day and the demands of the user are high. Computer network is broadly classified into two categories as wired and wireless with the usage of various interface devices.The technical mechanism in each of such devices varies based on the users need. The performance of each device can be analyzed and can make use of it with more efficiency. The efficiency of the network can still be improved by managing the requests in a standard framework using queuing theory and Transposition Cipher method were used for protected data transmission.