Sie sind auf Seite 1von 7

LIST OF SEMINAR TOPICS

1.

BIG

DATA:

HADOOP

ECOSYSTEM

AND

THE

IMPORTANCE

OF

MapReduce IN BIG DATA PROCESSING.

2.

FOG COMPUTING: WHAT, WHY, FROM WHERE AND ISSUES

3.

CLOUD COMPUTING AND ITS SECURITY.

4.

JABBER PROTOCOL.

5.

MOBILE WiMAX

BIBIN RAJ.B.S
ROLL No: 14
S7-CS

BIG DATA: HADOOP ECOSYSTEM AND THE ROLE OF


MapReduce IN BIG DATA PROCESSING
ABSTRACT:
Data now stream from daily life from phones and credit cards and televisions
and computers; from the infrastructure of cities from sensor-equipped buildings, trains,
buses, planes, bridges, and factories. The data flow so fast that the total accumulation
of the past two years is now a zettabyte. This huge volume of data is known as big
data. Big Data definition that includes the following parts: Big Data properties (also
called Big Data 5V: Volume, Velocity, Variety, Value and Veracity), data models and
structures, data analytics, infrastructure and security. MapReduce is a highly scalable
programming paradigm capable of processing massive volumes of data by means of
parallel execution on a large number of commodity computing nodes. Hadoop is an
open source large-scale data processing framework that supports distributed
processing of large chunks of data using simple programming models. The Apache
Hadoop project consists of the HDFS and Hadoop Map Reduce in addition to other
modules.
Through this topic the intention is to explain the deep of the most live big data
concepts which includes the Hadoop HDFS and the MapReduce.

REFERENCES:
[1]http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6493198&url=http%3A%2F
%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D6493198
[2]http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6821458&queryText=big
+data&newsearch=true&searchField=Search_All
[3]http://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=2&cad=rja&u
act=8&ved=0CCYQFjAB&url=http%3A%2F%2Fwww.ijarcce.com%2Fupload%2F2
014%2Fjune%2FIJARCCE7F%2520s%2520praveen%2520vashisht%2520Efficie
nt%2520Capabilities.pdf&ei=C_mCVdqEJYK0uATX44LoCw&usg=AFQjCNHEuT
waS5S4ShSbozhOWdUUq_84zw&sig2=rII36szTgETHn9OOX6Yww&bvm=bv.96041959,d.c2E
[4]http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6867550&queryText=big
+data&newsearch=true&searchField=Search_All

[5]http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6906718&queryText=M
APREDUCE+IN+BIGDATA&newsearch=true&searchField=Search_All
[6]http://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=4&cad=rja&u
act=8&ved=0CDUQFjAD&url=http%3A%2F%2Fwww.ijcsit.com%2Fdocs%2FVolu
me%25206%2Fvol6issue01%2Fijcsit2015060198.pdf&ei=C_mCVdqEJYK0uATX4
4LoCw&usg=AFQjCNGJ7lCbnWNm2GRl0To7U6G8qFAnfA&sig2=szp0YhHLgaIJ
JPhi01hlpg&bvm=bv.96041959,d.c2E
[7]http://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=5&cad=rja&u
act=8&ved=0CDsQFjAE&url=http%3A%2F%2Fwww.ijrdet.com%2Ffiles%2FVolu
me2Issue6%2FIJRDET_0614_12.pdf&ei=C_mCVdqEJYK0uATX44LoCw&usg=A
FQjCNHYLVFzBhbACZuIs_ATBHPWpqFgXw&sig2=0o0Ir0BLPeqGgZfxQVBAjw
&bvm=bv.96041959,d.c2E

FOG COMPUTING: WHAT, WHY, FROM WHERE AND


ISSUES
ABSTRACT:
FOG Computing is an advanced or extended version of cloud computing where
the computing takes place at the edge of the network. There are many companies
currently spending a lot of research on this topic like Cisco etc. It is similar to cloud
computing, but is far denser in geographical distribution and location and its proximity
to end users is more, which means they provide a faster end user experience than
cloud computing and have better performance.

The questions about its complexity, practical feasibility, cost and performance
are arising in different research communities. There is also a major concern about its
reliability or durability in performing all sorts of operations performed by cloud
computing systems. FOG leverages all the advantages of cloud, but is far denser than
it with more geographical reach and cover. It spans more than a cloud on
heterogeneous devices, ranging from end-users, access points, routers and switches.
The seminar targets to explain this technology.

REFERENCES:
[1]http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6932989&queryText=fo
g+computing&newsearch=true&searchField=Search_All
[2]http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7020884&queryText=F
OG+COMPUTING&newsearch=true&searchField=Search_All
[3]http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6623445&queryText=F
OG+COMPUTING&newsearch=true&searchField=Search_All

CLOUD COMPUTING AND ITS SECURITY


ABSTRACT:
Cloud based services and service providers are being evolved which has
resulted in a new business trend based on cloud technology. With the introduction of
numerous cloud based services and geographically dispersed cloud service providers,
sensitive information of different entities are normally stored in remote servers and
locations with the possibilities of being exposed to unwanted parties in situations
where the cloud servers storing those information are compromised. If security is not
robust and consistent, the flexibility and advantages that cloud computing has to offer
will have little credibility. This topic presents a review on the cloud computing concepts
as well as security issues inherent within the context of cloud computing and cloud
infrastructure.

REFERENCES:
[1]http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6148380&queryText=Cl
oud+Computing&newsearch=true&searchField=Search_All
[2] http://link.springer.com/article/10.1186%2F1869-0238-4-5
[3]http://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=3&cad=rja&u
act=8&ved=0CDYQFjAC&url=http%3A%2F%2Fairccse.org%2Fjournal%2Fnsa%2F6
114nsa03.pdf&ei=lAmDVde2J9iMuATSjY2ADg&usg=AFQjCNHImn4xtu1XCvECI3d
SnENWxI6iNQ&sig2=YHhuyQWNKkzgisRkPPymmw&bvm=bv.96041959,d.c2E
[4]http://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=4&cad=rja&u
act=8&ved=0CD8QFjAD&url=http%3A%2F%2Fijcsits.org%2Fpapers%2FVol1no220
11%2F13vol1no2.pdf&ei=lAmDVde2J9iMuATSjY2ADg&usg=AFQjCNGPNgFWQah
G_WWj9YS9dcopkzEe4A&sig2=77E0hTTjz_COrjvUnU13Tw&bvm=bv.96041959,d.c
2E
[5]http://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=9&cad=rja&u
act=8&ved=0CGEQFjAI&url=http%3A%2F%2Fwww.ijarcsse.com%2Fdocs%2Fpape
rs%2F9_September2012%2FVolume_2_issue_9%2FV2I900174.pdf&ei=lAmDVde2J
9iMuATSjY2ADg&usg=AFQjCNGd_dt7fQVhuk6eeZde3gawUcveA&sig2=F7N7qoS4BKxj2h_Scf73wg&bvm=bv.96041959,d.c2E

JABBER PROTOCOL
ABSTRACT:
Jabber is an Internet-based protocol application that allows one-to-one
communication between users employing a variety of devices. Recently, Instant
Messaging has already obtained the remarkable success as P2P communication tool.
In some places, it already took the place of e-mail as the first choice for long distance
communication. In the mobile area, the Short Message Services (SMS) and
Multimedia Messaging Service (MMS) also attract thousands of subscribers by the
richer and richer set of services. Jabber is the most widespread open source platform,
using an XML encoded protocol, especially tailored to provide instant messaging and
presence services over the Internet.
The intention is to analyse the basic architecture, protocol, and communication
procedure of Jabber

REFERENCES:

[1]http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6716634&queryText=jab
ber&newsearch=true&searchField=Search_All

[2]http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6188335&queryText=jab
ber&sortType=desc_p_Publication_Year&searchField=Search_All

MOBILE WiMAX
ABSTRACT:
WiMAX enables high-speed fixed wireless communications. Mobile WiMax
proponents hope their approach will compete with cellular, Wi-Fi, and last-mile
Internet-access technologies such as DSL and cable Mobile WiMAX is a broadband
wireless solution that enables convergence of mobile and fixed broadband networks
through a common wide area broadband radio access technology and flexible network
architecture. The aim is to briefly explain what the Mobile WiMAX is.

REFERENCES:
[1]http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7036716&queryText=m
obile+wimax&newsearch=true&searchField=Search_All

Das könnte Ihnen auch gefallen