Professional Documents
Culture Documents
Alamin Chapter Two
Alamin Chapter Two
LITERATURE REVIEW
2.1 Introduction
This chapter briefly describes the review on existing technique related with “online admission
system” that will be developed, the system offer a great and flexible approach than the manual
system. Review of related work, online admission system, distributed admission control, effect
Information system is useful in accessing student’s data from anywhere and anytime. It is one of the
userfriendly ways of accessing information. Many organizations spend a lot of cost in developing such
information systems for the reliability in their organization. This project develops student information
system which focusses on recording, storing and updating the student details. The new system uses the
Rapid Application Development model for the software development. The database will be storing all
the student records. This system provide ease to the users as well as professor for arranging the lectures
( Negandhi et al 2017).
2.2.1 Improving Admission Control Policies in Database Management Systems, Using Data
Mining Techniques
In DBMS admission control done in two tier. In the first tier, simple policy in dispatcher process
determines that the client communication can't be more than a threshold. This action avoids
resource wasting like overconsumption of network communication. Many of DBMSs don’t have
this layer, because these systems believe that this feature can be done by upper layer like
application server or web server in multi-tier system. The second layer of admission control must
build in query processor component. This control is done after receiving query, parsing an
optimizing it. This control determine that a process execution have rejected, delay, execute with
this limited resource, or execute without any problem ( Nejad et al 2008).
2.2.2 A distributed Admission Control Model for CoS Networks using QoS and SLS
Monitoring
Both in flow-based and class-based QoS architectures controlling the admission of traffic
entering the network allows to: