• Title/Summary/Keyword: 데이터 분산 서비스

Search Result 777, Processing Time 0.027 seconds

Time-based DHT Peer Searching Scheme for P2P VOD Service (P2P VOD 서비스를 위한 시간 기반 DHT 피어 탐색 기법)

  • Suh, Chedu;Ko, Choonghyo;Choi, Changyeol;Choi, Hwangkyu
    • Journal of Digital Contents Society
    • /
    • v.15 no.2
    • /
    • pp.251-261
    • /
    • 2014
  • In the typical P2P VOD system, it is very important to develop the fast and efficient peer searching scheme since the peers frequently join and leave to/from P2P system. This paper proposes a new peer searching scheme for P2P VOD system based on DHT network environment. The proposed scheme constructs DHT network by managing the peers having close playback starting times and close network locations into a peer all together. The peer information is mapped onto DHT nodes by hashing the key values each of which consists of the starting time and network location of the peer. From the simulation results, the number of messages required to search the partner peers are decreased, and the number of buffer maps exchanging among the peers are also decreased. The proposed scheme can reduce the average network distances among the partner peers. As a result, the proposed scheme makes routing more efficient and it saves the network resources by decreasing communication traffic overhead.

Design and Implementation of Cable Data Subscriber Network Management System using Object-oriented Modeling (객체지향 모델링을 이용한 케이블 데이터 가입자 망관리 시스템의 설계 및 구현)

  • Yun, Byeong-Soo;Ha, Eun-Ju;Kim, Che-Young
    • The KIPS Transactions:PartC
    • /
    • v.11C no.2
    • /
    • pp.269-276
    • /
    • 2004
  • There exist several types of distributed subscriber networks using Asymmetric Digital Subscriber Line(ADSL), Very high -bit rate Digital subscriber Line(VDSL), and Data Oner Cable Service Interface Specifications(DOCSIS). The efficient and concentrated network management of those several distributed subscribers networks and resources requires the general management information model of network, which has abstract and conceptual managed objects of the heterogeneous networks and its equipment to manage the integrated subscriber network. This paper presents the general Internet subscribers network modeling framework using RM-ODP to manage that network in the form of integrated hierarchy. This paper adopts the object-oriented development methodology with UML and designs and implements the HFC network of DOCSIS as an example of the subscriber network.

Garbage Collection Synchronization Technique for Improving Tail Latency of Cloud Databases (클라우드 데이터베이스에서의 꼬리응답시간 감소를 위한 가비지 컬렉션 동기화 기법)

  • Han, Seungwook;Hahn, Sangwook Shane;Kim, Jihong
    • Journal of KIISE
    • /
    • v.44 no.8
    • /
    • pp.767-773
    • /
    • 2017
  • In a distributed system environment, such as a cloud database, the tail latency needs to be kept short to ensure uniform quality of service. In this paper, through experiments on a Cassandra database, we show that long tail latency is caused by a lack of memory space because the database cannot receive any request until free space is reclaimed by writing the buffered data to the storage device. We observed that, since the performance of the storage device determines the amount of time required for writing the buffered data, the performance degradation of Solid State Drive (SSD) due to garbage collection results in a longer tail latency. We propose a garbage collection synchronization technique, called SyncGC, that simultaneously performs garbage collection in the java virtual machine and in the garbage collection in SSD concurrently, thus hiding garbage collection overheads in the SSD. Our evaluations on real SSDs show that SyncGC reduces the tail latency of $99.9^{th}$ and, $99.9^{th}-percentile$ by 31% and 36%, respectively.

Analysis of Network-RTK(VRS) Positioning Accuracy for Surveying Public Control Point (공공기준점 측량에 적용을 위한 VRS(가상기준점) 방식의 Network-RTK 정확도 분석)

  • Han, Joong-Hee;Kwon, Jay-Hyoun;Hong, Chang-Ki
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.18 no.2
    • /
    • pp.13-20
    • /
    • 2010
  • Currently, NGII(National Geographic Information Institute) provides VRS(Virtual Reference System) service using 44 CORS(Continuously Operating Reference Stations). Since the VRS provides high-precision coordinate in a short time, the users and applications are expected to be rapidly increasing. The accuracy analysis on the VRS service, however, was not sufficiently performed yet. Therefore, in this study, the VRS data is acquired from various circumstances and its accuracy is analyzed. According to analysis, it was concluded that the VRS could be applied to public control point survey. Furthermore, it was found that the PQ(Position Quality) which represents variance of estimated coordinates rather than GDOP(Geometric Dilution of Precision) is more relevant as a factor to determine the accuracy of coordinates. Based on the analysis of data from four manufacturers (TRIMBLE, MAGELLAN, LECIA, TOPCON), it was confirmed that the standard deviations better than 3cm. Therefore, VRS Survey apply to public control point survey.

Analyzing of connected car vulnerability and Design of Security System (커네티트 카의 취약점 분석 및 보안 시스템 설계)

  • Kim, Tae-Hyoung;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.241-243
    • /
    • 2016
  • In the Past, Trend of car security was Physical Something like doorlock system, and The Generation did not have skills connecting External devices. Through Car Development is up, that trend of car security Changed Physical Security to Intelligence Security. This Changes give a chance to hackers to attack this system. This System use CAN(Controller Area Network) Protocol which have three vulnerabilities. First, ID Spoofing, Twice, D - Dos Attack, Third, Android Application Injected Modern cars have many ECU(Electronic Control Unit) to control devices like Engine ON/OFF, Door Lock Handling, and Controlling Handle. Because CAN Protocol spread signal using broadcast, Hackers can get the signal very easily, and Those often use Mobile devices like Android or IOS to attack this system. if bluetooth signal is spread wide, hackers get the signal, and analysis the bluetooth data, so then They makes certain data to attack ECU, they send the data to ECU, and control ECU installed car. so I suggest that I will prevent this attack to make Auth system and prevent this attack in end of Android.

  • PDF

The Design of Blog Network Analysis System using Map/Reduce Programming Model (Map/Reduce를 이용한 블로그 연결망 분석 시스템 설계)

  • Joe, In-Whee;Park, Jae-Kyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.9B
    • /
    • pp.1259-1265
    • /
    • 2010
  • Recently, on-line social network has been increasing according to development of internet. The most representative service is blog. A Blog is a type of personal web site, usually maintained by an individual with regular entries of commentary. These blogs are related to each other, and it is called Blog Network in this paper. In a blog network, posts in a blog can be diffused to other blogs. Analyzing information diffusion in a blog world is a very useful research issue, which can be used for predicting information diffusion, abnormally detection, marketing, and revitalizing the blog world. Existing studies on network analysis have no consideration for the passage of time and these approaches can only measure network activity for a node by the number of direct connections that a given node has. As one solution, this paper suggests the new method of measuring the blog network activity using logistic curve model and Cosine-similarity in key words by the Map/Reduce programming model.

Application of blockchain in the food industry (식품 산업에서의 블록체인의 응용)

  • Kim, Sangoh
    • Food Science and Industry
    • /
    • v.54 no.3
    • /
    • pp.132-144
    • /
    • 2021
  • Along with the rise in the value of cryptocurrency, the interest of the blockchain is very high. However, most people do not understand cryptocurrency and blockchain very well. In addition, due to this lack of understanding of the technology, ideas about how blockchain technology can be applied in the food industry may not come up. Therefore, this content describes the advantages of blockchain technology in terms of security, starting with the understanding and operation method of cryptocurrency and blockchain technology, and briefly describes the development of a blockchain system. And simple examples of how this blockchain technology can be applied to other industries are summarized, and examples used in the food industry are summarized. Finally, it was insisted that using such a blockchain technology can provide safe food to consumers.

SPDX Document Generation Visual Studio Plug-in development for Invigorating Blockchain based Software Distribution Platform (블록체인 기반의 소프트웨어 유통 플랫폼의 활성화를 위한 SPDX 문서 생성 Visual Studio용 플러그인 개발)

  • Yun, Ho-Yeong;Joe, Yong-Joon;Shin, Dong-Myung
    • Journal of Software Assessment and Valuation
    • /
    • v.13 no.2
    • /
    • pp.9-17
    • /
    • 2017
  • Software compliance is an essential process when Open Source Software is included in software development to avoid such as license violation issue. However, analyzing quite big software which involves many developers requires enormous time and hard difficulty. To resolve these kinds of problem, SPDX formalizes and standardize the metadata about the software package. When the use of SPDX is activated, software package analysis would be simple and could contribute fair Open Source Software distribution. In this paper, we develop blockchain based SPDX distribution platform which fulfills the requirement of SPDX lifecycle to provide SPDX database which does not depend on particular centralized service but serve as distributed ledger and control by user's certification and their purpose. Moreover, to contribute invigoration of blockchain based SPDX distribution platform, we develop SPDX document generation plug-in for integrated development environment such as Visual Studio.

Attention Based Collaborative Source-Side DDoS Attack Detection (어텐션 기반 협업형 소스측 분산 서비스 거부 공격 탐지)

  • Hwisoo Kim;Songheon Jeong;Kyungbaek Kim
    • The Transactions of the Korea Information Processing Society
    • /
    • v.13 no.4
    • /
    • pp.157-165
    • /
    • 2024
  • The evolution of the Distributed Denial of Service Attack(DDoS Attack) method has increased the difficulty in the detection process. One of the solutions to overcome the problems caused by the limitations of the existing victim-side detection method was the source-side detection technique. However, there was a problem of performance degradation due to network traffic irregularities. In order to solve this problem, research has been conducted to detect attacks using a collaborative network between several nodes based on artificial intelligence. Existing methods have shown limitations, especially in nonlinear traffic environments with high Burstness and jitter. To overcome this problem, this paper presents a collaborative source-side DDoS attack detection technique introduced with an attention mechanism. The proposed method aggregates detection results from multiple sources and assigns weights to each region, and through this, it is possible to effectively detect overall attacks and attacks in specific few areas. In particular, it shows a high detection rate with a low false positive of about 6% and a high detection rate of up to 4.3% in a nonlinear traffic dataset, and it can also confirm improvement in attack detection problems in a small number of regions compared to methods that showed limitations in the existing nonlinear traffic environment.

An Adaptive Chord for Minimizing Network Traffic in a Mobile P2P Environment (비정기적 데이터 수집 모드에 기반한 효율적인 홈 네트워크 서비스 제어 시스템의 설계)

  • Woo, Hyun-Je;Lee, Mee-Jeong
    • The KIPS Transactions:PartC
    • /
    • v.16C no.6
    • /
    • pp.773-782
    • /
    • 2009
  • A DHT(Distributed Hash Table) based P2P is a method to overcome disadvantages of the existing unstructured P2P method. If a DHT algorithm is used, it can do a fast data search and maintain search efficiency independent of the number of peer. The peers in the DHT method send messages periodically to keep the routing table updated. In a mobile environment, the peers in the DHT method should send messages more frequently to keep the routing table updated and reduce the failure of a request. Therefore, this results in increase of network traffic. In our previous research, we proposed a method to reduce the update load of the routing table in the existing Chord by updating it in a reactive way, but the reactive method had a disadvantage to generate more traffic than the existing Chord if the number of requests per second becomes large. In this paper, we propose an adaptive method of routing table update to reduce the network traffic. In the proposed method, we apply different routing table update method according to the number of request message per second. If the number of request message per second is smaller than some threshold, we apply the reactive method. Otherwsie, we apply the existing Chord method. We perform experiments using Chord simulator (I3) made by UC Berkeley. The experimental results show the performance improvement of the proposed method compared to the existing methods.