• Title/Summary/Keyword: Active-Active Duplication

Search Result 30, Processing Time 0.026 seconds

Foundation Techniques and Fault-tolerance Tests of Active-Active Duplicated Domain Name Servers (Active-Active 방식의 DNS 서버의 이중화 구축 및 결함내성 시험)

  • Choi, Jae-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.1
    • /
    • pp.90-100
    • /
    • 2013
  • Active-Standby Duplication Techniques are conventionally used for fault-tolerant systems. But in this paper we researched on the Active-Active Duplication Techniques for Fault-tolerant DNS System. Our Active-Active Duplication made the 1st DNS periodically copied to the 2nd DNS and maintained the same status by using Rsync and Crontab. Even though the 1st or the 2nd DNS stops due to some critical errors, the remaining DNS can take over and provide continuous services.

Implementation and Fault-tolerance Tests of Load Balanced and Duplicated Active-Active Web Servers (로드 밸런싱 Active-Active 방식의 웹 서버 이중화 구축 및 결함내성 시험)

  • Choi, Jae-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.1
    • /
    • pp.63-71
    • /
    • 2014
  • In this paper we researched on the Duplication Techniques for Active-Active Web Servers. Rsync and crontab utilities make copy periodically between web servers and maintain the same status. Load Balancing Server makes web servers load balanced and fast servicing by executing web servers alternatively. Even though one web server stops due to some critical errors, the remaining web server can take over and provide services continuously.

Design of Duplicate System based on Commercial OS (상용 운영체제 기반 이중화 시스템 설계)

  • 김종호;김종호;이제헌;임형택;방경은;이숙진;임순용;양승민
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.8A
    • /
    • pp.1104-1114
    • /
    • 2000
  • If the control system that works important job fails, economical loss occurred. Hence, to guarantee high reliability, it must be duplicated. In the case of traditional duplication mechanism, dedicated operating system with duplication functions were built. This required much development and maintenance cost. They can be saved, if we use commercial operating system and its development environment.This paper proposes a duplication mechanism for the system based on commercial 0S. The system that explained in this paper is BSC(Base Station Controller). The duplicated BSC system uses concurrent write memory for synchronization and VxWorks as an operating system. We propose how the task supporting duplication functions is executed without delay and preemption, how to synchronize standby's memory with active' s, and how to use concurrent-write memory easily with VxWorks' s partition. We also describe the takeover procedure when the active detects its hardware fault and when the standby recognizes the failure of the active.

  • PDF

Pre-Clinical Research with Biotechnology Products

  • Berryman, Leigh
    • Proceedings of the Korean Society of Toxicology Conference
    • /
    • 2003.10b
    • /
    • pp.84-85
    • /
    • 2003
  • The process of drug development has seen major changes over the last two decades with the movement away from standard small molecule drug discovery programs, through computer-assisted drug design methodologies towards biotechnologically derived products. The aim of duplication of endogenously active materials to be administered exogenously has enormous impact on development practices and evaluation of safety.(omitted)

  • PDF

Paper Duplication Method Supported by Task (태스크 기반 이중화 방안)

  • Lee, Jong-Chan;Park, Sang-Joon;Kang, Kwon-Il
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.1C
    • /
    • pp.103-111
    • /
    • 2002
  • In RNC of IMT-2000, main control processors such as ASP, ACP and OMP are responsible for call control function, and the high reliability and real-time property should be provided for it. So, the study of real-time fault-tolerant for it is needed. In this paper, we proposes an Task based duplication method, in which Tasks in active side operated on message unit and send the updated data to standby side after operation, log in the message to standby side for recovery during take-over. This scheme decreases the dual down and the complexity of synchronization procedure, and performs the synchronization more exactly because Tasks control the synchronization of system. This paper also proposes the fault detection and the fault handing method for effective implementation of Task based duplication. This scheme focus on increasing the fault detection rate and intercepting originally that fault data is send to standby side.

Therapeutic Duplication Criteria Development of Respiratory System Drugs (호흡기계 작용 약물의 치료군 중복처방 평가기준 개발)

  • Choi, Kyung-Eob;Sohn, Hyun-Soon;Kim, Nam-Hyo;Shin, Hyun-Taek;Lee, Young-Sook
    • YAKHAK HOEJI
    • /
    • v.56 no.2
    • /
    • pp.126-135
    • /
    • 2012
  • Purpose: To develop therapeutic duplication criteria for the drugs used for respiratory diseases. Method: Therapeutic duplication was defined as "more than 2 drug ingredient-usage in which each has the same therapeutic effect and combination therapy does not confer additional therapeutic benefit". Respiratory system drugs approved in Korea were examined for the study. The WHO's Anatomical Therapeutic Chemical Classification System was used for grouping of the corresponding drug ingredients. The principles and recommendations on combination usage or multiple drug regimens were reviewed by using the clinical practice guidelines, textbooks, product labelings, and clinical articles. Clinical expert group consultation was performed and expert opinions were incorporated into the final criteria. Results: Nine hundred sixty two drug products with Korean Food and Drug Administration classification codes of 141, 149, 222, and 229 were evaluated, of which 87 active ingredients were composed. The drug ingredients were classified into 12 groups (antihistamines, oral nasal decongestants, leukotriene receptor antagonists, inhaled anticholinergics, inhaled corticosteroids, oral ${\beta}2$-agonists, long-acting ${\beta}2$-agonists, short-acting ${\beta}2$-agonists, xanthines, antiallergics, mucolytics and cough suppressants). The use of more than 2 drug ingredients including the same group was therapeutic duplication, and thus combination should be recommended not to be used. Conclusion: Twelve drug groups were identified as therapeutic duplication criteria. Combination therapy within each group should not be used otherwise therapeutic benefits outweigh potential risks.

ISV's Patent Protection, Downstream Capability and Product Portfolio to Join Platform Ecosystem (독립 SW기업의 플랫폼 생태계 참여 결정요인 연구)

  • Lim, Geun Seok;Ji, Yong Gu
    • The Journal of Society for e-Business Studies
    • /
    • v.27 no.1
    • /
    • pp.43-62
    • /
    • 2022
  • This paper is a study to analyze when ISV(independent software company) has more active participation in the platform ecosystem. According to previous studies, companies are active in technological innovation when they can appropriate the outcome of innovation and when they have complementary assets (marketing, manufacturing capabilities, etc.) that can convert the innovation into value. The effect of these two conditions to join platform ecosystem is investigated. The duplication between the ISV's product portfolio and platform service is also included as an independent variable. The two sample groups are composed of independent SW companies that signed a partner agreement with platform companies and non-participating companies in the platform. As a result of empirical study, it is found that the patent rights do not affect participation in the platform. The ISVs might have believed that the benefits from cooperation with platform companies are greater than the risks of exposure to innovative technologies and unique Biz models. On the other hand, downstream's capability and the duplication of product portfolio affect participation in the platform. If ISVs have the downstream capability to transform cooperation into value creation, ISVs are actively participating in the platform. In addition, cooperation is active when the product portfolio is complementary to platform service rather than competition. This study is the empirical study of open innovation between Korean independent software companies and digital platform companies. There are similar prior studies abroad, but there are no similar studies in Korea. It is meaningful in that the determinants of platform ecosystem participation were investigated through empirical analysis by composing a sample group of companies participating in the platform ecosystem and companies not participating in the platform ecosystem.

Centrobin/Nip2 Expression In Vivo Suggests Its Involvement in Cell Proliferation

  • Lee, Jungmin;Kim, Sunmi;Jeong, Yeontae;Rhee, Kunsoo
    • Molecules and Cells
    • /
    • v.28 no.1
    • /
    • pp.31-36
    • /
    • 2009
  • Centrobin/Nip2 was initially identified as a centrosome protein that is critical for centrosome duplication and spindle assembly. In the present study, we determined the expression and subcellular localization of centrobin in selected mouse tissues. Immunoblot analysis revealed that the centrobin-specific band of 100 kDa was detected in all tissues tested but most abundantly in the thymus, spleen and testis. In the testis, centrobin was localized at the centrosomes of spermatocytes and early round spermatids, but no specific signal was detected in late round spermatids and elongated spermatids. Our results also revealed that the centrosome duplication occurs at interphase of the second meiotic division of the mouse male germ cells. The centrobin protein was more abundant in the mitotically active ovarian follicular cells and thymic cortex cells than in non-proliferating corpus luteal cells and thymic medullary cells. The expression pattern of centrobin suggests that the biological functions of centrobin are related to cell proliferation. Consistent with the proposal, we observed reduction of the centrobin levels when NIH3T3 became quiescent in the serum-starved culture conditions. However, a residual amount of centrobin was also detected at the centrosomes of the resting cells, suggesting its role for maintaining integrity of the centrosome, especially of the daughter centriole in the cells.

A Security Model for Duplication Resistant eSeal (복제 공격 저항성을 갖는 전자봉인 보안 모델)

  • Kim, Joo-Hae;Choi, Eun-Young;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.5
    • /
    • pp.111-116
    • /
    • 2007
  • An eSeal(Electrical Seal) is an active RFID device which installed on the door of a container. The main role of the tag is to make sure the seal is not breaking by unauthorized people. Because an eSeal uses RFID system, we need to prevent eavesdrop and impersonate. Moreover, an eSeal which uses a secure protocol must not be able to duplicate. If duplication resistant property is not provide to a eSeal, an attacker may replace a object in the sealed container and reseal the container with duplicated eseal to hide breaking of the eSeal. In this paper, we provide a protocol which resist duplicate an eSeal during prevent eavesdrop and impersonation.

Active Enterprise Security Management System for Intrusion Prevension (침입 방지를 위한 능동형 통합 보안 관리 시스템)

  • Park, Jae-Sung;Park, Jae-Pyo;Kim, Won;Jeon, Moon-Seok
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.4
    • /
    • pp.427-434
    • /
    • 2004
  • Attacks such as hacking, a virus intimidating a system and a network are increasing recently. However, the existing system security or network management system(NMS) cannot be safe on various threats. Therefore, Firewall, IDS, VPN, LAS(Log Analysis System) establishes security system and has defended a system and a network against a threat. But mutual linkage between security systems was short and cannot prepare an effective correspondence system, and inefficiency was indicated with duplication of security. Therefore, an active security and an Enterprise Security Management came to need. An effective security network was established recently by Enterprise Security Management, Intrusion Tracking, Intrustion Induction. But an internetworking is hard for an enterprise security systems, and a correspondence method cannot be systematic, and it is responded later. Therefore, we proposes the active enterprise security management module that can manage a network safely in this paper.

  • PDF