Kalim Sattar
Network Resiliency and big data applications
Sattar, Kalim; Salman, Muhammad; Malik, Mazhar Hussain; Khan, Hazaar
Authors
Muhammad Salman
Dr Mazhar Malik Mazhar.Malik@uwe.ac.uk
Associate Director Intelligent Systems
Hazaar Khan
Abstract
Today we are living in the digital world. There is a vast amount of data everywhere and it is increasing every day. Big data is simply large amount of data. The network is used to transfer data from one place to another. But when we are talking about big data there must be some more challenges that we will face as compared to simple data. As we are relying heavily on the network so we must consider the network or hardware failure it can cause serious problem. Network resiliency is a technique to deal with the network failure and how to overcome it. Network resiliency became more important when considering big data application. Restoration and protection are two main techniques that can be used for the implementing resiliency in any big data applications.
Citation
Sattar, K., Salman, M., Malik, M. H., & Khan, H. (2016). Network Resiliency and big data applications. Communications and Network, 14(11), 222-225
Journal Article Type | Article |
---|---|
Publication Date | Nov 7, 2016 |
Deposit Date | Mar 16, 2023 |
Publicly Available Date | Mar 28, 2024 |
Journal | Communications and Network |
Print ISSN | 1949-2421 |
Electronic ISSN | 1947-3826 |
Publisher | Scientific Research Publishing |
Peer Reviewed | Peer Reviewed |
Volume | 14 |
Issue | 11 |
Pages | 222-225 |
Keywords | Big data; Resiliency; Restoration; Protection |
Public URL | https://uwe-repository.worktribe.com/output/10555663 |
Publisher URL | https://d1wqtxts1xzle7.cloudfront.net/51340344/22_Paper_31101660_IJCSIS_Camera_Ready_pp._222-225-libre.pdf?1484332149=&response-content-disposition=inline%3B+filename%3DNetwork_Resiliency_and_big_data_applicat.pdf&Expires=1678969033&Signature=VRqGkk5Hpx8e |
You might also like
A novel fuzzy trust-based secure routing scheme in flying ad hoc networks
(2023)
Journal Article
Task scheduling mechanisms for fog computing: A systematic survey
(2023)
Journal Article
Self-adapting security monitoring in Eucalyptus cloud environment
(2023)
Journal Article
Toward designing a secure authentication protocol for IoT environments
(2023)
Journal Article
Downloadable Citations
About UWE Bristol Research Repository
Administrator e-mail: repository@uwe.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search