• Title/Summary/Keyword: 시스템 가용도

Search Result 1,221, Processing Time 0.029 seconds

A Study on Diagnosis Methods for a High Available Clustering Web Server (고가용성 클러스터 웹 서버의 로드밸런스에 대한 고장진단기법 연구)

  • Lee, Sang-Moon;Ko, Soung-Jun;Kang, Sing-Jun;Kwak, Tae-Young;Kim, Hag-Bae
    • Proceedings of the KIEE Conference
    • /
    • 2000.07d
    • /
    • pp.2962-2964
    • /
    • 2000
  • 최근 웹의 사용이 일반화되면서 인터넷의 사용자가 급속히 증가하고 있어서. 기존의 단일 웹서버 방식에서는 막대한 접속 트래픽의 수용과 유연한 시스템 확장 등의 문제점이 예상되고 있다. 이와 함께 business-critical한 작업의 경우, 웹서버의 안정성 및 가용성 문제가 가장 중요한 문제로 지적되고 있어서 이러한 문제를 해결할 수 있는 웹전용 서버를 개발이 절대적으로 필요하다. 본 연구에서는 이를 위해. 급격한 트래픽 변화의 수용 및 웹서버의 확장성이 용이한 가상머신 개념과 고신뢰성의 시스템 운영을 위한 고장포용(fault-tolerant)기법을 적용하여 클러스터링 웹전용 서버를 구축하고, 특히 클러스터 웹서버의 부하를 분배해주는 로드밸런서의 고가용성 보장을 위해 heartbeat, fake, mon등의 기법을 이용하여 백업(backup)을 구현한다. 또한 구현된 시스템의 고성능 및 고가용성을 극대화하고. 시스템의 고장시 데이터 손실의 최소화와 이의 복구를 위해 고장 검출 및 진단 기법에 대한 방안을 제시한다.

  • PDF

A Survivability Model of an Intrusion Tolerance System (침입감내시스템의 생존성 모델)

  • Park, Bum-Joo;Park, Kie-Jin;Kim, Sung-Soo
    • The KIPS Transactions:PartA
    • /
    • v.12A no.5 s.95
    • /
    • pp.395-404
    • /
    • 2005
  • There have been large concerns about survivability defined as the capability of a system to perform a mission-critical role, in a timely manner, in the presence of attacks, failures. In particular, One of the most important core technologies required for the design of the ITS(Intrusion Tolerance System) that performs continuously minimal essential services even when the computer system is partially compromised because of intrusions is the survivability one of In included the dependability analysis of a reliability and availability etc. quantitative dependability analysis of the In. In this Paper, we applied self-healing mechanism utilizing two factors of self-healing mechanism (fault model and system response), the core technology of autonomic computing to secure the protection power of the ITS and consisted of a state transition diagram of the ITS composed of a primary server and a backup server. We also defined the survivability, availability, and downtime cost of the ITS, and then performed studies on simulation experiments and two cases of vulnerability attack. Simulation results show that intrusion tolerance capability at the initial state is more important than coping capability at the attack state in terms of the dependability enhancement.

NTL Analysis of Computer Systems using Hierarchical Model (계층모델을 이용한 컴퓨터 시스템 NTL 분석)

  • Yoo, Ki Yoon;Ro, Cheul Woo
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2013.05a
    • /
    • pp.261-262
    • /
    • 2013
  • 본 논문에서는, 구조 상태모델로 시스템의 고장과 복구를 나타내는 상위계층 모델과, 주어진 구조 상태애서 해당시스템의 처리과정인 도착, 큐잉, 서비스를 나타내는 하위계층모델을 갖는 다중 프로세서 컴퓨터 시스템의 계층모델을 페트리 네트의 확장형인 SRN을 이용하여 개발한다. 컴퓨터 가용도의 한 지표로써 NTL(Normalized Throughput Loss)를 구한다.

  • PDF

Table Comparison Prefetching using Available I/O Bandwidth in Parallel File System (병렬 파일 시스템에서의 가용 입출력 대역폭을 고려한 테이블 비교 선반입 정책)

  • 김재열;석성우;조종현;서대화
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.10c
    • /
    • pp.630-632
    • /
    • 2000
  • 과도한 파일 입출력이 요구되는 병렬파일 시스템의 성능을 결정하는 중요한 요소로서 캐슁과 선반입을 들 수 있다. 본 논문은 캐쉬의 크기에 비해 상대적으로 큰 파일을 요청하는 경우에 시스템 성능에 막대한 영향을 미치는 선반입에 대해서 선반입할 데이터를 결정하는 알고리즘으로 테이블 비교법을 제안하고, 이와 더불어 예측된 데이터의 선반입 여부와 선반입 시기를 결정하는 경우 현재의 가용 입출력 대역폭을 고려하는 기법을 제안한다. 제안하는 선반입 알고리즘을 시뮬레이션을 통하여 기타 선반입 알고리즘과 비교해 본 결과 파일 시스템 성능이 향상되었음을 보여준다.

  • PDF

A Vulnerability Analysis of Intrusion Tolerance System using Self-healing Mechanism (자가치유 메커니즘을 활용한 침입감내시스템의 취약성 분석)

  • Park, Bum-Joo;Park, Kie-Jin;Kim, Sung-Soo
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.7
    • /
    • pp.333-340
    • /
    • 2005
  • One of the most important core technologies required for the design of the ITS (Intrusion Tolerance System) that performs continuously minimal essential services even when the network-based computer system is partially compromised because of the external or internal intrusions is the quantitative dependability analysis of the ITS. In this paper, we applied self-healing mechanism, the core technology of autonomic computing to secure the protection power of the ITS. We analyzed a state transition diagram of the ITS composed of a Primary server and a backup server utilizing two factors of self-healing mechanism (fault model and system response) and calculated the availability of ITS through simulation experiments and also performed studies on two cases of vulnerability attack.

A Study on the Flow Assurance in Subsea Pipeline Considering System Availability of Topside in LNG-FPSO (LNG-FPSO에서 상부구조물의 시스템 가용도를 고려한 해저 배관의 유동안정성 연구)

  • Kim, Young-Min;Choi, Jun-Ho;Lee, Jeong-Hwan
    • Journal of the Korean Institute of Gas
    • /
    • v.24 no.6
    • /
    • pp.18-27
    • /
    • 2020
  • This study presents flow assurance analysis in subsea pipeline considering system availability of topside in LNG-FPSO. A hydrate management strategy was established, which consisted of PVCap experiments, system availability analysis of LNG-FPSO topside, hydrate risk analysis in the pipeline, and calculation of PVCap injection concentration. The experimental data required for the determination of PVCap injection concentration were obtained by measuring the hydrate induction time of PVCap at the subcooling temperatures of 6.1, 9.2, and 12.1℃. The availability of LNG-FPSO topside system for 20 years was 89.3%, and the longest downtime of 50 hours occurred 2.9 times per year. The subsea pipeline model for multiphase flow simulation was created using field geometry data. As a result of risk analysis of hydrate plugging using subsea pipeline model, hydrate was formed at the end of flowline in 23.2 hours under the condition of 50 hours shutdown. The injection concentration of PVCap was determined based on the PVCap experiment results. The hydrate plugging in subsea pipeline of LNG-FPSO can be completely prevented by injecting PVCap 0.25 wt% 2.9 times per year.

A Study of Basic Design Method for High Availability Clustering Framework under Distributed Computing Environment (분산컴퓨팅 환경에서의 고가용성 클러스터링 프레임워크 기본설계 연구)

  • Kim, Jeom Goo;Noh, SiChoon
    • Convergence Security Journal
    • /
    • v.13 no.3
    • /
    • pp.17-23
    • /
    • 2013
  • Clustering is required to configure clustering interdependent structural technology. Clustering handles variable workloads or impede continuity of service to continue operating in the event of a failure. Long as high-availability clustering feature focuses on server operating systems. Active-standby state of two systems when the active server fails, all services are running on the standby server, it takes the service. This function switching or switchover is called failover. Long as high-availability clustering feature focuses on server operating systems. The cluster node that is running on multiple systems and services have to duplicate each other so you can keep track of. In the event of a node failure within a few seconds the second node, the node shall perform the duties broken. Structure for high-availability clustering efficiency should be measured. System performance of infrastructure systems performance, latency, response time, CPU load factor(CPU utilization), CPU processes on the system (system process) channels are represented.

An Efficient Submesh Allocation Scheme for Mesh-Connected Multicomputer Systems (메쉬 구조 다중컴퓨터 시스템을 위한 효율적인 서브메쉬 할당방법)

  • 이원주;전창호
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.40 no.6
    • /
    • pp.9-21
    • /
    • 2003
  • In this paper, we propose a new submesh allocation scheme which improves the performance of multicomputer systems. The key idea of this allocation scheme is to reduce waiting time of task by minimizing the submesh search time and the submesh a]location delay caused by external fragmentation. This scheme reduces the submesh search time by classifying independent free submeshes according to their types (square, horizontal rectangle, vertical rectangle) and searching a best-fit submesh from the classified free submesh list. If a submesh allocation delay occurs due to external fragmentation, the proposed scheme relocates tasks, executing In allocated submeshes, to another free submeshes and compacts processor fragmentation. This results in reducing the submesh allocation delay. Through simulation, we show that it is more effective to reduce the submesh allocation delay due to external fragmentation than reducing the submesh search time with respect to the waiting time of task. We also show that the proposed strategy improves the performance compared to previous strategies.

An Autonomic Self-management Mechanism for High-available Home Service Networked System (고가용성 홈 서비스 네트워크 시스템을 위한 오토노믹 자가 관리 메커니즘)

  • Choi, Chang-Yeol;Kim, Sung-Soo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.2
    • /
    • pp.119-130
    • /
    • 2007
  • Home service networked systems require a high-availability service with a proactive and practical fault management. However, as the system complexity grows, it is not easy to meet the requirement. Moreover, user may want to pay no attention to a sequence of complex or nervous maintenance jobs for system fault managements. Therefore, the home service networked systems must have self & remote fault management capability with a minimal human intervention for meeting high-availability requirement of the integrated systems that consist of the networked appliances or devices. In this paper, we present an autonomic healing utility equipped with a remote self-managing mechanism in order to both increase the availability of home service networked systems and decrease the maintenance cost.

Indirection Model and Application of Electronic Mail Control System Considering High Availability (고가용성을 고려한 전자메일통제시스템의 우회 모델 및 응용)

  • Kim Young Soo;Suh Jung Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.2
    • /
    • pp.348-354
    • /
    • 2005
  • These days, Electronic mail is being used in everyday's life. And on the other hand, we are facing spam mails' problems. Spam mails are widely used by means of marketing in e-Commerce. To block these spam mails, we are using filtering or pricing systems. But these solutions are raising other problems such as impediment in reception or availability caused by false positive or payment resistance. To solve these problems, we propose an Indirect Model on Electronic Mail Control System(IMEMCS) which controls an unsolicited electronic mail and prevents an useful electronic mail from discarding. We design and implement the IMEMCS to enhance the usefulness and the availability. Being tested the IMEMCS to verify the usability and the efficiency, it gave us a very successful result.