BIG DATA - EFFICIENT PACKET TRANSMISSION TO MITIGATE THE FATIGUE NETWORK

Alagappa Institute of Skill Development & Computer Centre,Alagappa University, Karaikudi, India.15 -16 February 2017. IT Skills Show & International Conference on Advancements In Computing Resources (SSICACR-2017)

Format: Volume 5, Issue 1, No 18, 2017

Copyright: All Rights Reserved ©2017

Year of Publication: 2017

Author: Dr. V. Sai Shanmuga Raja,B. Devikiruba

Reference:IJCS-245

View PDF Format

Abstract

A cell phone is a sort of hand-held PC advanced everywhere throughout the world. Each unit will be exploited over the frequent range that varies from one cell to the next, to avoid collision in each node. There are massive amount of information and difficult handling way incorporates the new set of arrangement. The nature of transmission service will be upgraded in self mitigation by combining massive information with flow control techniques. Then again, rather than assessing system having information as a fatigue, we introduce techniques with stake, and also to better improve administration quality. This article audits the grouping of huge information as packets and their classification are taken as input to the processing system, the arrangement are viewed over time for different info.

References

[1]Z. O. Wilcox, “Convergent encryption reconsidered,”2011.[Online].Available:http://www.mailarchive.com/cryptography@metzdowd.com/msg08949.html [2]S. Chow, P. A. Eisen, and H. Johnson, White-Box Cryptography and an AES Implementation, Cloak wares Corporation, Ottawa, Canada, Scientific report, 2003. [3] Advanced Encryption Standard, FIPS PUB 197, 2001. [4] Computer Networks and Internets, Douglas E. Comer. Published by Prentice Hall. ISBN 0- 13-239070-1. This book gives an excellent high-level description of networks and their interfaces. [5] TCP/IP Illustrated, Volume 1, Stevens. [6] CSCI-4220: Network Programming, Dave Hollinger, Rensselaer Polytechnic Institute. [7] J. Daemen and V. Rijmen, AES Proposal: Rijndael, AES Algorithm Submission, September 3, 1999.. [8] J. Nechvatal, et. al., Report on the Development of the Advanced Encryption Standard (AES), National Institute of Standards and Technology. [9] Pitla, Santosh K., Joe D. Luck, Jared Werner, Nannan Lin, and Scott A. Shearer. “In-field Fuel Use and Load States of Agricultural Field Machinery.” Computers and Electronics in Agriculture 121 (2016): 290-300. Web. [10] L. Popa, M. Budiu, et al. DryadInc: Reusing Work in Large-scale Computations. [11] Marx, Samuel E., Joe D. Luck, Roger M. Hoy, Santosh K. Pitla, Erin E. Blankenship, and Matthew J. Darr. “Validation of Machine CAN Bus J1939 Fuel Rate Accuracy Using Nebraska Tractor Test Laboratory Fuel Rate Data.” Computers and Electronics in Agriculture 118 (2015): 179-85. Web [12] N. Polyzotis, S. Skiadopoulos, et al. Supporting Streaming Updates in an Active Data Warehouse. In ICDE, 2007 [13] M. Zaharia, A. Konwinski, et al. Improving MapReduce Performance in Heterogeneous Environments. In OSDI, 2008. [14] Villalpando, Bautista, April, and Abran. „Performance analysis model for Big Data applications in cloud computing.‟ Journal of Cloud Computing 3.1 (2014): 1–20. [15] Apache Kafka http://kafka.apache.org/ [16] J. Kreps. Questioning the lambda architecture. http://radar.oreilly.com/2014/07/questioning-the-lambdaarchitecture.html, 7 2014.

Keywords

Lambda architecture, Strom system, AES key and TCP process

This work is licensed under a Creative Commons Attribution 3.0 Unported License.   

TOP
Facebook IconYouTube IconTwitter IconVisit Our Blog