7
 LIST OF SEMINAR TOPICS 1. BIG DATA: HADOOP ECOSYSTEM AND THE IMPORTANCE OF MapReduce IN BIG DATA PROCESSING. 2. FOG COMPUTING: WHAT, WHY, FROM WHERE AND ISSUES 3. CLOUD COMPUTING AND ITS SECURITY. 4. JABBER PROTOCOL. 5. MOBILE WiMAX BIBIN RAJ.B.S ROLL No: 14 S7-CS

Seminar Abstract Bibin Raj b s s7 Cse b

Embed Size (px)

DESCRIPTION

A sample seminar abstract

Citation preview

  • LIST OF SEMINAR TOPICS

    1. BIG DATA: HADOOP ECOSYSTEM AND THE IMPORTANCE OF

    MapReduce IN BIG DATA PROCESSING.

    2. FOG COMPUTING: WHAT, WHY, FROM WHERE AND ISSUES

    3. CLOUD COMPUTING AND ITS SECURITY.

    4. JABBER PROTOCOL.

    5. MOBILE WiMAX

    BIBIN RAJ.B.S

    ROLL No: 14

    S7-CS

  • BIG DATA: HADOOP ECOSYSTEM AND THE ROLE OF

    MapReduce IN BIG DATA PROCESSING

    ABSTRACT:

    Data now stream from daily life from phones and credit cards and televisions

    and computers; from the infrastructure of cities from sensor-equipped buildings, trains,

    buses, planes, bridges, and factories. The data flow so fast that the total accumulation

    of the past two years is now a zettabyte. This huge volume of data is known as big

    data. Big Data definition that includes the following parts: Big Data properties (also

    called Big Data 5V: Volume, Velocity, Variety, Value and Veracity), data models and

    structures, data analytics, infrastructure and security. MapReduce is a highly scalable

    programming paradigm capable of processing massive volumes of data by means of

    parallel execution on a large number of commodity computing nodes. Hadoop is an

    open source large-scale data processing framework that supports distributed

    processing of large chunks of data using simple programming models. The Apache

    Hadoop project consists of the HDFS and Hadoop Map Reduce in addition to other

    modules.

    Through this topic the intention is to explain the deep of the most live big data

    concepts which includes the Hadoop HDFS and the MapReduce.

    REFERENCES:

    [1]http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6493198&url=http%3A%2F

    %2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D6493198

    [2]http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6821458&queryText=big

    +data&newsearch=true&searchField=Search_All

    [3]http://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=2&cad=rja&u

    act=8&ved=0CCYQFjAB&url=http%3A%2F%2Fwww.ijarcce.com%2Fupload%2F2

    014%2Fjune%2FIJARCCE7F%2520s%2520praveen%2520vashisht%2520Efficie

    nt%2520Capabilities.pdf&ei=C_mCVdqEJYK0uATX44LoCw&usg=AFQjCNHEuT

    waS5S4ShSbozhOWdUUq_84zw&sig2=rII36szTgETHn9OO-

    X6Yww&bvm=bv.96041959,d.c2E

    [4]http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6867550&queryText=big

    +data&newsearch=true&searchField=Search_All

  • [5]http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6906718&queryText=M

    APREDUCE+IN+BIGDATA&newsearch=true&searchField=Search_All

    [6]http://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=4&cad=rja&u

    act=8&ved=0CDUQFjAD&url=http%3A%2F%2Fwww.ijcsit.com%2Fdocs%2FVolu

    me%25206%2Fvol6issue01%2Fijcsit2015060198.pdf&ei=C_mCVdqEJYK0uATX4

    4LoCw&usg=AFQjCNGJ7lCbnWNm2GRl0To7U6G8qFAnfA&sig2=szp0YhHLgaIJ

    JPhi01hlpg&bvm=bv.96041959,d.c2E

    [7]http://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=5&cad=rja&u

    act=8&ved=0CDsQFjAE&url=http%3A%2F%2Fwww.ijrdet.com%2Ffiles%2FVolu

    me2Issue6%2FIJRDET_0614_12.pdf&ei=C_mCVdqEJYK0uATX44LoCw&usg=A

    FQjCNHYLVFzBhbACZuIs_ATBHPWpqFgXw&sig2=0o0Ir0BLPeqGgZfxQVBAjw

    &bvm=bv.96041959,d.c2E

  • FOG COMPUTING: WHAT, WHY, FROM WHERE AND

    ISSUES

    ABSTRACT:

    FOG Computing is an advanced or extended version of cloud computing where

    the computing takes place at the edge of the network. There are many companies

    currently spending a lot of research on this topic like Cisco etc. It is similar to cloud

    computing, but is far denser in geographical distribution and location and its proximity

    to end users is more, which means they provide a faster end user experience than

    cloud computing and have better performance.

    The questions about its complexity, practical feasibility, cost and performance

    are arising in different research communities. There is also a major concern about its

    reliability or durability in performing all sorts of operations performed by cloud

    computing systems. FOG leverages all the advantages of cloud, but is far denser than

    it with more geographical reach and cover. It spans more than a cloud on

    heterogeneous devices, ranging from end-users, access points, routers and switches.

    The seminar targets to explain this technology.

    REFERENCES:

    [1]http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6932989&queryText=fo

    g+computing&newsearch=true&searchField=Search_All

    [2]http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7020884&queryText=F

    OG+COMPUTING&newsearch=true&searchField=Search_All

    [3]http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6623445&queryText=F

    OG+COMPUTING&newsearch=true&searchField=Search_All

  • CLOUD COMPUTING AND ITS SECURITY

    ABSTRACT:

    Cloud based services and service providers are being evolved which has

    resulted in a new business trend based on cloud technology. With the introduction of

    numerous cloud based services and geographically dispersed cloud service providers,

    sensitive information of different entities are normally stored in remote servers and

    locations with the possibilities of being exposed to unwanted parties in situations

    where the cloud servers storing those information are compromised. If security is not

    robust and consistent, the flexibility and advantages that cloud computing has to offer

    will have little credibility. This topic presents a review on the cloud computing concepts

    as well as security issues inherent within the context of cloud computing and cloud

    infrastructure.

    REFERENCES:

    [1]http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6148380&queryText=Cl

    oud+Computing&newsearch=true&searchField=Search_All

    [2] http://link.springer.com/article/10.1186%2F1869-0238-4-5

    [3]http://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=3&cad=rja&u

    act=8&ved=0CDYQFjAC&url=http%3A%2F%2Fairccse.org%2Fjournal%2Fnsa%2F6

    114nsa03.pdf&ei=lAmDVde2J9iMuATSjY2ADg&usg=AFQjCNHImn4xtu1XCvECI3d

    SnENWxI6iNQ&sig2=YHhuyQWNKkzgisRkPPymmw&bvm=bv.96041959,d.c2E

    [4]http://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=4&cad=rja&u

    act=8&ved=0CD8QFjAD&url=http%3A%2F%2Fijcsits.org%2Fpapers%2FVol1no220

    11%2F13vol1no2.pdf&ei=lAmDVde2J9iMuATSjY2ADg&usg=AFQjCNGPNgFWQah

    G_WWj9YS9dcopkzEe4A&sig2=77E0hTTjz_COrjvUnU13Tw&bvm=bv.96041959,d.c

    2E

    [5]http://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=9&cad=rja&u

    act=8&ved=0CGEQFjAI&url=http%3A%2F%2Fwww.ijarcsse.com%2Fdocs%2Fpape

    rs%2F9_September2012%2FVolume_2_issue_9%2FV2I900174.pdf&ei=lAmDVde2J

    9iMuATSjY2ADg&usg=AFQjCNGd_dt7fQVhuk6-

    eeZde3gawUcveA&sig2=F7N7qoS4BKxj2h_Scf73wg&bvm=bv.96041959,d.c2E

  • JABBER PROTOCOL

    ABSTRACT:

    Jabber is an Internet-based protocol application that allows one-to-one

    communication between users employing a variety of devices. Recently, Instant

    Messaging has already obtained the remarkable success as P2P communication tool.

    In some places, it already took the place of e-mail as the first choice for long distance

    communication. In the mobile area, the Short Message Services (SMS) and

    Multimedia Messaging Service (MMS) also attract thousands of subscribers by the

    richer and richer set of services. Jabber is the most widespread open source platform,

    using an XML encoded protocol, especially tailored to provide instant messaging and

    presence services over the Internet.

    The intention is to analyse the basic architecture, protocol, and communication

    procedure of Jabber

    REFERENCES:

    [1]http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6716634&queryText=jab

    ber&newsearch=true&searchField=Search_All

    [2]http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6188335&queryText=jab

    ber&sortType=desc_p_Publication_Year&searchField=Search_All

  • MOBILE WiMAX

    ABSTRACT:

    WiMAX enables high-speed fixed wireless communications. Mobile WiMax

    proponents hope their approach will compete with cellular, Wi-Fi, and last-mile

    Internet-access technologies such as DSL and cable Mobile WiMAX is a broadband

    wireless solution that enables convergence of mobile and fixed broadband networks

    through a common wide area broadband radio access technology and flexible network

    architecture. The aim is to briefly explain what the Mobile WiMAX is.

    REFERENCES:

    [1]http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7036716&queryText=m

    obile+wimax&newsearch=true&searchField=Search_All