• Title/Summary/Keyword: 부팅

Search Result 108, Processing Time 0.02 seconds

A Nonblocking $Multi-Log_2N$ Multiconnection Network : Theoretical Characterization and Design Example for a Photonic Switching System (넌블럭킹 $Multi-Log_2N$다중 접속망 : 이론적 특성 및 광 교환시스템을 위한 설계예)

  • Yeong Hwan TSCHA;Kyoon Ha LEE
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.16 no.7
    • /
    • pp.680-695
    • /
    • 1991
  • In this paper, the conditions on the number of required copies of a self-routing network with and without extra stages in back-to-back manner are presented respectively for a nonblocking $Multi-Log_2N$ multiconnection network. Actually the obained results hold regardless of connection patterns, i.e., whether a network deploys on-to-one connections or multiconnections. Thus open problems on the nonblocking condition for a multi $Multi-Log_2N$ multiconnection network are solved. Interestingly some of the given formulas comprise the Benes network and the Canto network as a special case repectively. A novel switching system architecture deploying a distributed calls-distribution algorithm is provided to design a nonblocking $Multi-Log_2N$ photonic switching network using a directional coupler. And a directional couplex based call holding demultiplexer is introduced to hold a call until blocking disappears in a switching network and let it enter to a network, provided that the number of switching networks is less than that of required switching networks for a nonblocking $Multi-Log_2N$ network.

  • PDF

Structural Improvement for Crack of Integrated Circuit in Single Board Computer by Structure Analysis (단일보드컴퓨터 구조해석을 통한 집적회로 균열현상의 구조적 개선)

  • Ryu, Jeong-min;Lee, Yong-jun;Sohn, Kwonil
    • Journal of Advanced Navigation Technology
    • /
    • v.23 no.5
    • /
    • pp.460-465
    • /
    • 2019
  • In this study, we aim to derive a solution from the structural analysis for electrical failure of single board computers for computing navigation information. By analyzing the characteristic factor, we identify that crack occur on the central processing unit board due to a certain structural problem, and that the physical effect by the crack make communication function be impossible to perform, which it causes booting error. In order to find the location of excessive stress causing the crack, structural analysis for the single board computer is done. From the structural analysis, the areas where stress concentration occurs are identified, and improvement methods changing the structures are developed. As a result, we shows that stresses are reduced entirely on the stress distribution for the improved structure. In addition, heat analysis shows that changing the structure to reduce stresses is not affect to the heat radiation, and the thermal resistance of the actual equipment is verified by measuring the temperature of the heat sink applied with the improved structure.

Research on Mac OS X Physical Memory Analysis (Mac OS X 물리 메모리 분석에 관한 연구)

  • Lee, Kyeong-Sik;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.89-100
    • /
    • 2011
  • Physical memory analysis has been an issue on a field of live forensic analysis in digital forensics until now. It is very useful to make the result of analysis more reliable, because record of user behavior and data can be founded on physical memory although process is hided. But most memory analysis focuses on windows based system. Because the diversity of target system to be analyzed rises up, it is very important to analyze physical memory based on other OS, not Windows. Mac OS X, has second market share in Operating System, is operated by loading kernel image to physical memory area. In this paper, We propose a methodology for physical memory analysis on Mac OS X using symbol information in kernel image, and acquire a process information, mounted device information, kernel information, kernel extensions(eg. KEXT) and system call entry for detecting system call hooking. In additional to the methodology, we prove that physical memory analysis is very useful though experimental study.

Distributed Hashing-based Fast Discovery Scheme for a Publish/Subscribe System with Densely Distributed Participants (참가자가 밀집된 환경에서의 게재/구독을 위한 분산 해쉬 기반의 고속 서비스 탐색 기법)

  • Ahn, Si-Nae;Kang, Kyungran;Cho, Young-Jong;Kim, Nowon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.12
    • /
    • pp.1134-1149
    • /
    • 2013
  • Pub/sub system enables data users to access any necessary data without knowledge of the data producer and synchronization with the data producer. It is widely used as the middleware technology for the data-centric services. DDS (Data Distribution Service) is a standard middleware supported by the OMG (Object Management Group), one of global standardization organizations. It is considered quite useful as a standard middleware for US military services. However, it is well-known that it takes considerably long time in searching the Participants and Endpoints in the system, especially when the system is booting up. In this paper, we propose a discovery scheme to reduce the latency when the participants and Endpoints are densely distributed in a small area. We propose to modify the standard DDS discovery process in three folds. First, we integrate the Endpoint discovery process with the Participant discovery process. Second, we reduce the number of connections per participant during the discovery process by adopting the concept of successors in Distributed Hashing scheme. Third, instead of UDP, the participants are connected through TCP to exploit the reliable delivery feature of TCP. We evaluated the performance of our scheme by comparing with the standard DDS discovery process. The evaluation results show that our scheme achieves quite lower discovery latency in case that the Participants and the Endpoints are densely distributed in a local network.

Implementation of Software Downloading and Installing for upgrading Digital TV Settop Box (디지털 방송 TV수신기의 기능 업그레이드를 위한 소프트웨어 다운로드와 설치 기능 구현)

  • Ryu Yll-Kwon;Jung Moon-Ryul;Kim Jung-Hwan;Choi Jin-Su;Bang Gun
    • Journal of Broadcast Engineering
    • /
    • v.11 no.1 s.30
    • /
    • pp.66-79
    • /
    • 2006
  • As constant development of digital broadcasting and data broadcasting system, new technology will be introduced to digital broadcasting and new broadcasting service will be appeared. These services need to be changed and processed to suit each services and the software of the receiver need to be upgraded. Though, generally the digital broadcasting receivers are not getting updated once it's delivered to home for long time and it need to be done by hand or collected each one of them with trouble. Therefore this paper suggests a way to overcome these difficulties via broadcasting stream. This research is to describe how three modules-namely (1) Downloader, downloads new software from data carrousel stream, (2) Update Loader, installs the software received by downloader; and (3) Recoverer, recovers the former version of the software if some serious problem has been occurred during downloading and installing the software. This paper tries to realize the accommodation of terrestrial STB based on the new technique and service following ATSC A-97 agreement.

Design and Implementation of Crash Recovery Technique with Bounded Execution Time for NAND Flash File System (낸드 플래시 파일 시스템을 위한 결함 복구 시간 제한 기법의 설계 및 구현)

  • Kang, Seung-Yup;Park, Hyun-Chan;Kim, Ki-Man;Yoo, Chuck
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.37 no.6
    • /
    • pp.330-338
    • /
    • 2010
  • Flash storage devices are very popularly used in portable devices such as cell phones, PDAs and MP3 players. As technology is improved, users want much bigger and faster storage system. Paradoxically, people have to wait more and more time proportionally to the capacity of their storage devices when these are trying to be recovered after file system crash. It is serious problem because booting time of devices is dominated by crash recovery of flash file system. In this paper, we design a crash recovery mechanism, named 'Working Area(WA hereafter)' technique, which has bounded crash recovery execution time. With WA technique, write operations to flash memory are only performed in WA. Therefore, by simply scanning the latest WA. We can recover a file system crash because every change for flash memory is occured only in latest WA. We implement the WA technique based on YAFFS2 and evaluate by comparing with traditional techniques. As a result, WA technique shows that its crash recovery execution time is 25 times faster than Log-based Method when we use 1 gig a bytes NAND flash memory in worst case. This gap will be futher and futher as storage capacity grows.

Boosting up the Mount Latency of NAND Flash File System using Byte-addressable NVRAM (바이트 접근성을 가지는 비휘발성 메모리 소자를 이용한 낸드 플래시 파일 시스템의 부팅시간 개선 기법)

  • Jeon, Byeong-Gil;Kim, Eun-Ki;Shin, Hyung-Jong;Han, Seok-Hee;Won, Yoo-Jip
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.3
    • /
    • pp.256-260
    • /
    • 2008
  • This paper describes an improvement of mount-time delay in NAND Flash file systems. To improve file system mount performance, this work configures a hierarchical storage system with byte-addressable NVRAM and NAND Flash memory, and let the meta data of a file system allocated in the NVRAM. Since the meta data are stored in NVRAM supporting data integrity some of the items, which are stored in Spare area and Object Header area of NAND Flash memory to control meta data of NAND Flash file system, could be eliminated. And also, this work eliminates the scanning operation of the Object Header area of previous work FRASH1.0. The scanning operation is definitely required to find out the empty Object Header address for storing the Object Header data and provokes a certain amount of performance loss in file generation and deletion. In this work, an implemented file system, so-called FRASH1.5, is demonstrated, featuring new data structures and new algorithms. The mount time of FRASH1.5 becomes twice as fast as that of the FRASH1.0. The performance in file generation gets improved by about $3{\sim}8%$. In particular, for most large-size files, the FRASH1.5 has 8 times faster mount time than YAFFS, without any performance loss as seen in the file generation.

A Study On Artifacts Analysis In Portable Software (무 설치 프로그램에서의 사용자 행위 아티팩트 분석)

  • Taeyeong Heo;Taeshik Shon
    • Journal of Platform Technology
    • /
    • v.11 no.2
    • /
    • pp.39-53
    • /
    • 2023
  • Non-installation program (hereinafter referred to as "portable program") is a program that can be used without an installation process, unlike general software. Since there is no separate installation process, portable programs have high mobility and are used in various ways. For example, when initial setup of multiple PCs is required, a portable program can be stored on one USB drive to perform initial setup. Alternatively, when a problem occurs with the PC and it is difficult to boot normally, Windows PE can be configured on the USB drive and portable programs can be stored for PC recovery. And the portable program does not directly affect PC settings, such as changing registry values, and does not leave a trace. This means that the portable program has high security. If a portable program is deleted after using it, it is difficult to analyze behavior in a general way. If a user used a portable program for malicious behavior, analysis in a general way has limitations in collecting evidence. Therefore, portable programs must have a new way of behavioral analysis that is different from ordinary installation software. In this paper, after installing the Windows 10 operating system on a virtual machine, we proceed with the scenario with a portable program of Opera and Notepad++. And we analyze this in various ways such as file analysis of the operating system and memory forensics, collect information such as program execution time and frequency, and conduct specific behavioral analysis of user.

  • PDF