• Title/Summary/Keyword: 장애복구시스템

Search Result 102, Processing Time 0.023 seconds

Reconstruction and Change Analysis for Temporal Series of Remotely-sensed Data (연속 원격탐사 영상자료의 재구축과 변화 탐지)

  • 이상훈
    • Korean Journal of Remote Sensing
    • /
    • v.18 no.2
    • /
    • pp.117-125
    • /
    • 2002
  • Multitemporal analysis with remotely sensed data is complicated by numerous intervening factors, including atmospheric attenuation and occurrence of clouds that obscure the relationship between ground and satellite observed spectral measurements. Using an adaptive reconstruction system, dynamic compositing approach was developed to recover missing/bad observations. The reconstruction method incorporates temporal variation in physical properties of targets and anisotropic spatial optical properties into image processing. The adaptive system performs the dynamic compositing by obtaining a composite image as a weighted sum of the observed value and the value predicted according to local temporal trend. The proposed system was applied to the sequence of NDVI images of AVHRR observed on the Korean Peninsula from 1999 year to 2000 year. The experiment shows that the reconstructed series can be used as an estimated series with complete data for the observations including bad/missing values. Additionally, the gradient image, which represents the amount of temporal change at the corresponding time, was generated by the proposed system. It shows more clearly temporal variation than the data image series.

A Design of SSD Dedicated RAID System for Efficient Resource Management (효율적인 자원관리를 위한 SSD 전용 RAID 시스템 설계)

  • Hyun-Seob Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.2
    • /
    • pp.109-114
    • /
    • 2024
  • Enterprise storage systems that require high data reliability are applying RAID (Redundant Array of Independent Disks) systems to recover from data loss and failure. In particular, RAID 5 ensures space efficiency and reliability by distributing parity across multiple storage devices. However, when storage devices have different capacities, RAID is built based on the smallest capacity storage device, resulting in wasted storage space. Therefore, research is needed to solve this resource management problem. In this paper, we propose a method for RAID grouping of each independent NAND flash memory block in a RAID consisting of SSD (Solid State Disk) with external SSDs as well as internal SSDs. This method is divided into a policy for delivering block information inside SSDs to the RAID system and a policy for RAID grouping of physical addresses delivered from the RAID system. This method allows us to maintain a RAID that does not waste resources when SSDs of different capacities are grouped into RAID5. Finally, we demonstrate the effectiveness of the proposed method through experiments.

Performance Compression of RAID5 Read/write to File and Stripe Size (파일과 스트라이프 크기에 대한 RAID5의 읽기/쓰기 성능 비교)

  • Choi, Gwi-Yoel;Park, Kye-Won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.763-767
    • /
    • 2005
  • RAID were proposed to stored double data or used to parity logging methode for error recovery. We describe a technique for automating the execution of redundant disk array operation, including recovery from errors, independent of array architecture. RAID5 provide highly reliable cost effective secondary storage with high performance for read access and large write accessed. It discusses the two architectural techniques used in disk arrays, striping across multiple disks to improve performance and redundancy to improve reliability. In this paper we compare with performance and reliability in RAID5 real/write to file and stripe size. than suggest to algorithm.

  • PDF

Context-Aware System for Status Monitoring of Industrial Automation Equipment (산업 자동화 장비의 상태감시를 위한 상황인지 시스템)

  • Kim, Kyung-Nam;Jeon, Min-Ho;Kang, Chul-Gyu;Oh, Chang-Heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.552-555
    • /
    • 2010
  • In this paper, we propose a context-aware system using wireless multi sensor module to monitor the state for industrial factory environment. Wireless multi sensor module combines sensing values which are collected from each acceleration, pressure, temperature and gas sensors. Moreover, it delivers this data to server after being encoded by RS code. Thereafter, RS decoder decodes the values that are received from wireless multi sensor module and fixes errors which occur in wireless communication. Based on decoded data, context-aware algorithm sets critical range and compares it to the sensing values, if the sensing values are out of the range, an event occurs by the algorithm. At the same time, if there is another sensing value which is out of the range for standby time T seconds, the algorithm orders 3 steps-alarm to occur depending on each situation. Through this system, it becomes eventually possible to monitor machines' condition effectively. From the simulation, we confirm that this system is efficient to status monitoring of industrial automation equipment.

  • PDF

A Study on the Development of One-way Bypass TAP Device for Strengthening the Security of Flood and Environment Surveillance Network (홍수 및 환경 감시망의 보안성 강화를 위한 단방향 Bypass TAP 장치 개발에 관한 연구)

  • Lee, Jin-Young;Kong, Heon-Tag
    • Journal of Digital Convergence
    • /
    • v.13 no.8
    • /
    • pp.473-481
    • /
    • 2015
  • The flood and environment surveillance network on riverside is a network requiring a way to efficiently manage the information from all kinds of sensors, along with an optical communication device that can deliver high-quality video information at high speed. Since on-site prompt recovery is very important especially for communication problems that occurred due to cut-off or aged network, various researches have been carried out on this. However, because the security against outside hacking or outside intrusion with illegal purposes is very important for environment surveillance network, such as the national backbone network, an efficient network maintenance and repair should be enabled while satisfying security and reliability at the same time. A characteristic of requirement is that when security is improved, the efficiency of maintenance and repair drops as they are conflicting to each other. Therefore, this research proposed a system in order to satisfy the conflicting requirement and improve security, by developing a one-way Bypass TAP and an android-based smartphone app that can enable efficient network maintenance and repair.

Satellite Imagery and AI-based Disaster Monitoring and Establishing a Feasible Integrated Near Real-Time Disaster Monitoring System (위성영상-AI 기반 재난모니터링과 실현 가능한 준실시간 통합 재난모니터링 시스템)

  • KIM, Junwoo;KIM, Duk-jin
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.23 no.3
    • /
    • pp.236-251
    • /
    • 2020
  • As remote sensing technologies are evolving, and more satellites are orbited, the demand for using satellite data for disaster monitoring is rapidly increasing. Although natural and social disasters have been monitored using satellite data, constraints on establishing an integrated satellite-based near real-time disaster monitoring system have not been identified yet, and thus a novel framework for establishing such system remains to be presented. This research identifies constraints on establishing satellite data-based near real-time disaster monitoring systems by devising and testing a new conceptual framework of disaster monitoring, and then presents a feasible disaster monitoring system that relies mainly on acquirable satellite data. Implementing near real-time disaster monitoring by satellite remote sensing is constrained by technological and economic factors, and more significantly, it is also limited by interactions between organisations and policy that hamper timely acquiring appropriate satellite data for the purpose, and institutional factors that are related to satellite data analyses. Such constraints could be eased by employing an integrated computing platform, such as Amazon Web Services(AWS), which enables obtaining, storing and analysing satellite data, and by developing a toolkit by which appropriate satellites'sensors that are required for monitoring specific types of disaster, and their orbits, can be analysed. It is anticipated that the findings of this research could be used as meaningful reference when trying to establishing a satellite-based near real-time disaster monitoring system in any country.

Advance Reservation Framework with Protection Management for Virtual Circuit Services (가상회선 서비스를 위해 보호 관리 기능을 갖는 사전 예약 프레임워크)

  • Lim, Huhnkuk;Lee, Kyungmin;Cha, Youngwook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.11
    • /
    • pp.902-910
    • /
    • 2013
  • The most representative research network in Korea, KREONET, has developed DynamicKL, an advance reservation based Network Service Agent (NSA) for user driven virtual circuit services. DynamicKL provides reservation, provisioning, release, termination, and inquiry web services for network resources by using an open standard network service interface (NSI), as well as web services for network resources by using a GUI interface. In addition, it has the RICE interface to support a protection management function per VC for virtual circuits and reservations. In this article, a protection management per VC for provisioned VCs and reservations is addressed in the DynamicKL framework, as a contribution to the VC protection management issue, which results in more manageable and reliable VC services compared to other advance reservation frameworks. An administrator can detect successful or unsuccessful VC protections in the event of a primary link failure and successful or unsuccessful VC retrievals after a primary link repair, by using RICE.

A study on Cloud Security based on Network Virtualization (네트워크 가상화 기반 클라우드 보안 구성에 관한 연구)

  • Sang-Beom Hong;Sung-Cheol Kim;Mi-Hwa Lee
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.21-27
    • /
    • 2023
  • In the cloud computing environment, servers and applications can be set up within minutes, and recovery in case of fail ures has also become easier. Particularly, using virtual servers in the cloud is not only convenient but also cost-effective compared to the traditional approach of setting up physical servers just for temporary services. However, most of the und erlying networks and security systems that serve as the foundation for such servers and applications are primarily hardwa re-based, posing challenges when it comes to implementing cloud virtualization. Even within the cloud, there is a growing need for virtualization-based security and protection measures for elements like networks and security infrastructure. This paper discusses research on enhancing the security of cloud networks using network virtualization technology. I configured a secure network by leveraging virtualization technology, creating virtual servers and networks to provide various security benefits. Link virtualization and router virtualization were implemented to enhance security, utilizing the capabilities of virt ualization technology. The application of virtual firewall functionality to the configured network allowed for the isolation of the network. It is expected that based on these results, there will be a contribution towards overcoming security vulnerabil ities in the virtualized environment and proposing a management strategy for establishing a secure network.

A Study on Computation of the Reduction Rate in the Total Cost of Ownership of the Open Source Software in Comparison to the Commercial Software (상용소프트웨어대비 공개소프트웨어 총소유비용 절감비율 산정에 관한 연구)

  • Kim, Shin-Pyo;Kim, Tae-Yeol;Park, Keun-Ha
    • Journal of Digital Convergence
    • /
    • v.11 no.3
    • /
    • pp.115-126
    • /
    • 2013
  • The purpose of this study was to confirm the extent of the reduction in the total cost of ownership of the open source software in comparison to the commercial software installed for information system, PC and cloud computing. Accordingly, the actual reduction rates in the total cost of ownership, when open source software is installed in the information system, PC and cloud computing, were computed and analyzed for 51 companies in the area of information system, 18 companies in the area of PC and 6 companies in the area of cloud computing, which included government institution, educational institution and private enterprises. The results of expert survey illustrated that the reduction rates are (1)63.3% on the average for the 4areas of information system, namely, DBMS, WAS, Web and OS, (2) 59.4% on the average for the 6 areas of PC, namely, OS, Documentation Program, Back-up and Restoration, Screen Capture, Vaccine and Others and (3) 61.2% on the average for the 6 areas of cloud computing, namely, Virtualization, OS, WEM/WAS, DBMS, DFS and Cloud Management.

An Optimization Model and Heuristic Algorithms for Multi-Ring Design in Fiber-Optic Networks (광전송망에서의 다중링 설계를 위한 최적화 모형 및 휴리스틱 알고리즘)

  • 이인행;이영옥;정순기
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.1B
    • /
    • pp.15-30
    • /
    • 2000
  • The important considerations in the design of fiber-optic networks are reliability and survivability preparing against a failure. The SDH(Synchronous Digital Hierarchy), the international standard of optical transmission, offers several network reconfiguration methods that enable network to be automatically restored from failure. One of the methods is the SHR(Self Healing Ring), which is a ring topology system. Most network providers have constructed their backbone networks with SHR architecture since it can provide survivability economically. The network architecture has eventually evolved into a multi-ring network comprised of interconnected rings. This paper addresses multi-ring network design problems is to minimize ring-construction cost. This problem can be formulated with MIP(mixed integer programming) model. However, it is difficult to solve the model within reasonable computing time on a large scale network because the model is NP-complete. Furthermore, in practice we should consider the problem of routing demands on rings to minimize total cost. This routing problem involves multiplex bundling at the intermediate nodes. A family of heuristic algorithms is presented for this problem. These algorithms include gateway selection and routing of inter-ring demands as well as load balancing on single rings. The developed heuristic algorithms are applied to some network provider's regional and long-distance transmission networks. We show an example of ring design and compare it with another ring topology design. Finally, we analysis the effect bundling.

  • PDF