• Title/Summary/Keyword: 네트워크 저장 장치

Search Result 248, Processing Time 0.031 seconds

A Peer to Peer Prefix Patching Scheme for VoD Servers (VoD 서버를 위한 P2P 기반의 프리픽스 패칭 기법)

  • Lee, Chi-Hun;Lee, Keun-Jeong;Choi, Chang-Yeol;Choi, Hwang-Kyu
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.11a
    • /
    • pp.217-220
    • /
    • 2005
  • VoD 시스템의 병목현상의 주요원인은 저장장치 또는 네트워크 입출력으로 인한 대역폭 요구량과 디지털 비디오의 장시간 서비스로 인한 높은 대역폭 요구량 때문이다. 패칭은 멀티캐스트 사용하여 VoD 시스템의 병목 현상을 극복한 가장 효과적인 기술 중 하나이다. 본 논문에서는 클라이언트를 이용한 프리픽스 패칭 사용과 함께 서버로부터 정규 멀티캐스트 스트림을 사용하여 기존의 패칭 기법을 개선하기 위한 P2Prefix 패칭 기법을 제안한다. 제안된 기법에서 각 클라이언트는 동일한 비디오 스트림을 요청하는 다른 클라이언트에게 프리픽스 스트림을 제공하기 위한 패칭 서버로서의 역할을 한다. 그 결과, 서버 대역폭 요구량은 서버로부터 패칭 채널을 제거하는 것으로 줄일 수 있다. 성능 평가에서 본 논문에서 제안한 패칭 기법이 기존의 패칭 기법과 비교해 볼 때 서버 대역폭 요구를 줄일 수 있음을 보인다.

  • PDF

Arduino-based Courier Storage System Development for One-person Households (1인 가구를 위한 아두이노 기반의 개인 택배 보관 시스템 개발)

  • Pyo, Sangwoo;Park, Taemin;Shin, Haechan;Jang, Myungho;Kim, Heeju;Lee, Jaehyeok;Yu, Heonchang
    • Proceedings of The KACE
    • /
    • 2018.01a
    • /
    • pp.125-128
    • /
    • 2018
  • 오늘날 스마트폰, 태블릿과 같은 모바일 디바이스가 등장하고, 무선 네트워크의 기술이 향상되면서 모바일 쇼핑 이용률이 높아지고 있다. 이에 따라 택배의 사용률도 증가하고 있는데, 택배를 수령하는 일반적인 방법으로 직접 수령하는 것과 공동 택배 보관 장소를 통해 수령하는 것이 있다. 그러나 이러한 방법들은 택배기사와 시간을 정해야 하는 번거로움, 택배기사를 위장한 범죄, 그리고 공동 택배 보관 장소에서의 택배 분실 등과 같은 문제점이 존재한다. 따라서 본 연구에서는 1인 가구와 택배 수령에 어려움을 겪는 가구를 위한 개인 택배 보관 시스템을 개발하였다. 이 시스템은 안드로이드 어플리케이션에서 택배에 부착된 바코드를 스캔하여 그 정보를 아두이노와 블루투스 통신을 통해 전달한다. 이때, 아두이노는 미리 저장된 운송장 번호와 수신한 운송장 번호를 비교하여 택배 보관 시스템의 잠금 장치를 열고 닫는다.

  • PDF

Detection and Recovery of Failure Node in SAN-based Cluster Shared File System $SANique^{TM}$ (SAN 기반 클러스터 공유 파일 시스템 $SANique^{TM}$의 오류 노드 탐지 및 회복 기법)

  • Lee, Kyu-Woong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.12
    • /
    • pp.2609-2617
    • /
    • 2009
  • This paper describes the design overview of shared file system $SANique^{TM}$ and proposes the method for detection of failure node and recovery management algorithm. We also illustrate the characteristics and system architecture of shared file system based on SAN. In order to provide uninterrupted service, the detection and recovery methods are proposed under the all possible system failures and natural disasters. The various kinds of system failures and disasters are characterized and then the detection and recovery method are proposed in each disconnected computing node group.

PMS: Probability-based Multi Successor Prefetch Algorithm for Software Streaming Services of Mobile Embedded Devices (PMS: 모바일 임베디드 시스템의 소프트웨어 스트리밍 서비스를 위한 확률 기반 다중 접근 블록 선인출 알고리즘)

  • Lee, Young-Jae;Park, Seon-Yeong;Pak, Eun-Jj;Lee, Dae-Woo;Jung, Wook;Kim, Jin-Soo
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.5_6
    • /
    • pp.238-248
    • /
    • 2007
  • As the demand of employing various PC software on mobile embedded devices which have limited storages has been increased, software streaming services are needed. However it takes too much time to launch software on them because it is transferred through wireless networks. To address this problem, prefetch algorithms are needed. We examined 'Last successor (LS)' algorithm and PPM-based prefetch algorithm as prefetch algorithms for software streaming services. We present 'Probability-base Multi Successor (PMS)' algorithm which is contrived through analyzing evaluations of previous algorithms and characteristics of software streaming services. While LS has one successor per each block, PMS has N successors based on probability which is calculated by PPM-based prefetch algorithm. The hit rate of PMS is similar to that of PPM-base prefetch algorithm and the space overhead is similar to that of LS. We can get good efficiency at the point of memory usage when PMS is applied to software streaming services.

Performance Evaluation of SSD Cache Based on DM-Cache (DM-Cache를 이용해 구현한 SSD 캐시의 성능 평가)

  • Lee, Jaemyoun;Kang, Kyungtae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.11
    • /
    • pp.409-418
    • /
    • 2014
  • The amount of data located in storage servers has dramatically increased with the growth in cloud and social networking services. Storage systems with very large capacities may suffer from poor reliability and long latency, problems which can be addressed by the use of a hybrid disk, in which mechanical and flash memory storage are combined. The Linux-based SSD(solid-state disk) uses a caching technique based on the DM-cache utility. We assess the limitations of DM-cache by evaluating its performance in diverse environments, and identify problems with the caching policy that it operates in response to various commands. This policy is effective in reducing latency when Linux is running in native mode; but when Linux is installed as a guest operating systems on a virtual machine, the overhead incurred by caching actually reduces performance.

Monitoring System for Optimized Power Management with Indoor Sensor (실내 전력관리 시스템을 위한 환경데이터 인터페이스 설계)

  • Kim, Do-Hyeun;Lee, Kyu-Tae
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.127-133
    • /
    • 2020
  • As the usages of artificial intelligence is increased, the demand to algorithms for small portable devices increases. Also as the embedded system becomes high-performance, it is possible to implement algorithms for high-speed computation and machine learning as well as operating systems. As the machine learning algorithms process repetitive calculations, it depend on the cloud environment by network connection. For an stand alone system, low power consumption and fast execution by optimized algorithm are required. In this study, for the purpose of smart control, an energy measurement sensor is connected to an embedded system, and a real-time monitoring system is implemented to store measurement information as a database. Continuously measured and stored data is applied to a learning algorithm, which can be utilized for optimal power control, and a system interfacing various sensors required for energy measurement was constructed.

The Issues of Digital Copying and Application of Fair Use in the Network Environment (네트워크 환경에서의 디지털복제와 공정사용 법리 적용의 문제점)

  • Hong Jae-Hyun
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.31 no.4
    • /
    • pp.139-164
    • /
    • 1997
  • The digital copying and digital transmission are rapidily Increasing with the innovation of information technology and the development of networking technology. But It Is Inevitable to limit copyright for the public benefit and cultural development In the digital environment in like manner with the analog environment. First, this study examinated the international trends and legulations relating to the copyright limitations In the U.S. and Japan for the fair use. Second, it dealed with the problems of the digital copying relating to the temporary storage In RAM and screen display that are recently becoming international issues. Third, it concretely explored and analyzed the problems according to the application of the fall use of the private copying, the library copying, and the copying for the purpose of school education in the network environment. In conclusion, to solve these problems that Is occurred from legulations In the analog environment Is needed the revision of the existing copyright law in Korea. Finally, this study suggested 'the copyright collecive management system' and 'the private copying levy system' as the systemic devices to control the digital private copying.

  • PDF

Service Management Scheme using Security Identification Information adopt to Big Data Environment (빅데이터 환경에 적합한 보안 인식 정보를 이용한 서비스 관리 기법)

  • Jeong, Yoon-Su;Han, Kun-Hee
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.393-399
    • /
    • 2013
  • Recently, the quantity and type of data that is being processed in cloud environment are varied. A method for easy access in different network in a heterogeneous environment of big data stored in the device is required. This paper propose security management method for smoothly access to big data in other network environment conjunction with attribute information between big data and user. The proposed method has a high level of safety even if user-generated random bit signal is modulated. The proposed method is sufficient to deliver any number of bits the user to share information used to secure recognition. Also, the security awareness information bit sequence generated by a third party to avoid unnecessary exposure value by passing a hash chain of the user anonymity is to be guaranteed to receive.

Implementation of a Black-Box Program Monitoring Abnormal Body Reactions (부정기적 발생 신체이상 모니터링 블랙박스 프로그램 구현)

  • Kim, Won-Jin;Yoon, Kwang-Yeol
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.3
    • /
    • pp.671-677
    • /
    • 2012
  • A black-box program was implemented in order to monitor abnormal symptoms of human body irregularly occurring during sleep. The system consists of sensor probing body signals, auxiliary devices such as the alarm, lamp, network camera, and signal monitoring computer. Various types of sensors, PPG, ECG, EEG, temperature, respiration sensor, G-sensor, and microphone were used to more exactly identify the causes of abnormal symptoms. If a symptom occurs, the system records the patient's condition to provide information being utilized in the treatment. The sensors are attached on some locations of body being proper to check a specific type of abnormal reaction. Based on the normal range and type of measurement data, criteria of signal levels were set to distinguish abnormal reaction. An abnormal signal being probed, the program starts to operate the lamp, alarm, and network camera at the same time and stores the signal and video data.

Technical analysis of Cloud storage for Cloud Computing (클라우드 컴퓨팅을 위한 클라우드 스토리지 기술 분석)

  • Park, Jeong-Su;Jung, Sung-Jae;Bae, Yu-Mi;Kyung, Ji-Hun;Sung, Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.757-760
    • /
    • 2012
  • Cloud storage system that cloud computing providers provides large amounts of data storage and processing of cloud computing is a key component. Large vendors (such as Facebook, YouTube, Google) in the mass sending of data through the network quickly and easily share photos, videos, documents, etc. from heterogeneous devices, such as tablets, smartphones, and the data that is stored in the cloud storage using was approached. At time, growth and development of the globally data, the cloud storage business model emerging is getting. Analysis new network storage cloud storage services concepts and technologies, including data manipulation, storage virtualization, data replication and duplication, security, cloud computing core.

  • PDF