• Title/Summary/Keyword: Data Backup

Search Result 170, Processing Time 0.022 seconds

Storage System Performance Enhancement Using Duplicated Data Management Scheme (중복 데이터 관리 기법을 통한 저장 시스템 성능 개선)

  • Jung, Ho-Min;Ko, Young-Woong
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.37 no.1
    • /
    • pp.8-18
    • /
    • 2010
  • Traditional storage server suffers from duplicated data blocks which cause an waste of storage space and network bandwidth. To address this problem, various de-duplication mechanisms are proposed. Especially, lots of works are limited to backup server that exploits Contents-Defined Chunking (CDC). In backup server, duplicated blocks can be easily traced by using Anchor, therefore CDC scheme is widely used for backup server. In this paper, we propose a new de-duplication mechanism for improving a storage system. We focus on efficient algorithm for supporting general purpose de-duplication server including backup server, P2P server, and FTP server. The key idea is to adapt stride scheme on traditional fixed block duplication checking mechanism. Experimental result shows that the proposed mechanism can minimize computation time for detecting duplicated region of blocks and efficiently manage storage systems.

A Clustering File Backup Server Using Multi-level De-duplication (다단계 중복 제거 기법을 이용한 클러스터 기반 파일 백업 서버)

  • Ko, Young-Woong;Jung, Ho-Min;Kim, Jin
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.7
    • /
    • pp.657-668
    • /
    • 2008
  • Traditional off-the-shelf file server has several potential drawbacks to store data blocks. A first drawback is a lack of practical de-duplication consideration for storing data blocks, which leads to worse storage capacity waste. Second drawback is the requirement for high performance computer system for processing large data blocks. To address these problems, this paper proposes a clustering backup system that exploits file fingerprinting mechanism for block-level de-duplication. Our approach differs from the traditional file server systems in two ways. First, we avoid the data redundancy by multi-level file fingerprints technology which enables us to use storage capacity efficiently. Second, we applied a cluster technology to I/O subsystem, which effectively reduces data I/O time and network bandwidth usage. Experimental results show that the requirement for storage capacity and the I/O performance is noticeably improved.

On the study of depulication method of communication and Backup device for an Electric Car using Flash Disk and Ethernet (Flash DISK와 Ethernet을 이용한 전동차의 통신 이중화 및 백업장치에 관한 연구)

  • Seo, Won-Yong;Yeon, Jun-Sang;Yang, Oh
    • Proceedings of the KIEE Conference
    • /
    • 2002.11c
    • /
    • pp.472-475
    • /
    • 2002
  • This paper presents a high speed ethernet communication and depulication method of communication to prevent decrease of reliability that was generated by high speed communication. Thus communication reliability was improved and this paper was considered that if any physical breakdown of line of communication occurred, other line of communication could operate collect. This paper used Flash memory for setting storage of backup data at Electric Car that have an humidity and a temperature and an impact. also improved reliability and besides matching data format to windows data format realized to confirm application program at PC or note book computer.

  • PDF

Effective Backup and Real-Time Replication Techniques for HSS System in All-IP Mobile Networks (All-IP 이동 통신망에서 HSS 시스템의 효과적인 백업과 실시간 이중화 기법)

  • Park, Seong-Jin;Park, Hyung-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.4
    • /
    • pp.795-804
    • /
    • 2009
  • An HSS(Home Subscriber Server) system requires a main-memory database on main-memory unit for the real-tine management of the subscriber information in the mobile communication service, in that the system controls not only basic data for handling calls of users, but also additional service data related to user authentication and operational data. Nonetheless, HSS-DBS system, requiring the reliability and stability, need more secure data store method and a back-up technique because the system have a long startup time and the big problem on the failures of main-memory. This paper proposes an efficient back-up replication technique, on the basis of enhancing the stability and performance of HSS system. The proposed shadowing back-up technique adopting the delayed recovery process, can help minimize the real-time back-up overloads by location registration, while the proposed backup replication method enables more stable system operations with replicating the data to remote server in real time.

Redundant Storage Device in Communication System (교환 시스템에서의 이중화 저장장치)

  • 노승환
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.4B
    • /
    • pp.403-410
    • /
    • 2004
  • In general communication system is composed of processor subsystems, I/O processor subsystems and data storage device subsystems those are classified as their functions. In order to improve the data reliability, all subsystems are redundant. Storage device keeps the operational information such as system related information and charging information, and such informations must be stored in non-volatile memory. Flash memory and battery backup memory are commonly used as the non-volatile storage devices. But such kind of memories are expensive per unit capacity and data can't be restored when lost while not being backed up. In this paper we develop a redundant storage device to store a lot of data safely and reliably in communication system. The device consists of micro-controller, FPGA and hard disk It provides many functions those are rebuilding, automatic remapping, host service and remote host service. Also it is designed to provide host service while rebuilding is being done in order not to interrupt the communication services. The developed device can be used instead of expensive storage device like flash memory in various communication systems.

Analysis of the Rolling Contact Fatigue for Work Roll in Finishing Mill of Hot Strip Rolling (열간 연속판재 압연기의 작업롤 전동피로해석)

  • 배원병;박해두;송길호
    • Transactions of the Korean Society of Mechanical Engineers
    • /
    • v.19 no.1
    • /
    • pp.292-300
    • /
    • 1995
  • According to the number of cold-rolled coils, the amount of roll wear and thermal expansion, and roll gap profile were calculated, by using the actual data from the finishing mill. Also, based on those data, the calculations of the deflection, the flattening, and the contact pressure of vwork rolls and backup rolls were made respectively. Specially, in the calculation of contact pressure, the numerical results were obtained not only during the normal rolling, but also during the abnormal rolling, by modeling mathematically the dynamic impact force which occurs when the head section of the strip is threading through rolls. With those results the growth of the fatigue region and the fatigue damage of rolls were predicted. Also the optimum roll-grinding depth was determined to maximize the roll life.

Sealing analysis of sealing rings with respect to rubber material properties for high pressure valve of FCEV (FCEV용 고압 밸브 실링부의 고무재질에 따른 기밀해석)

  • Park, G.Y.;Yang, K.J.;Ro, E.D.;Park, J.S.;Chon, M.S.;Lee, H.W.
    • Journal of Institute of Convergence Technology
    • /
    • v.7 no.2
    • /
    • pp.13-16
    • /
    • 2017
  • The design of sealing mechanisms of a manual pressure valve was analyzed with FE analysis for a hydrogen fuels charge and discharge system of FCEV. The damage prediction of the O-ring with respect to the material models of rubbers was calculated by the gap analysis of the backup ring and O-ring according to the internal pressure. Two kinds of the rubber material characteristic models were adopted to the O-ring. One was the linear elastic and the other was hyperelastic of Ogden $3^{rd}$ order model. The experimental data of urethane of Shore hardness 90 was utilized to the curve fitting of hyperelastic properties. It was found that the contact pattern of the backup ring was different in two models and the sealing mechanism was better in the case of the hyperelastic characteristic model.

A Study on the Private Key Backup and Restoration using Biometric Information in Blockchain Environment

  • Seungjin, Han
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.3
    • /
    • pp.59-65
    • /
    • 2023
  • As research on blockchain applications in various fields is actively increasing, management of private keys that prove users of blockchain has become important. If you lose your private key, you lose all your data. In order to solve this problem, previously, blockchain wallets, private key recovery using partial information, and private key recovery through distributed storage have been proposed. In this paper, we propose a safe private key backup and recovery method using Shamir's Secrete Sharing (SSS) scheme and biometric information, and evaluate its safety. In this paper, we propose a safe private key backup and recovery method using Shamir's Secrete Sharing (SSS) scheme and biometric information, and evaluate its safety against robustness during message exchange, replay attack, man-in-the-middle attack and forgery and tampering attack.

A Node-Disjoint Multi-Path Routing Protocol in AODV-based Mobile Ad-hoc Networks (AODV 기반 모바일 Ad-hoc 네트워크의 노드 Disjoint 다중경로 라우팅 프로토콜)

  • Kim, Tae-Hun;Chung, Shang-Hwa;Kang, Su-Young;Yoo, Young-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.12B
    • /
    • pp.1371-1379
    • /
    • 2009
  • In this paper, we propose a new multi-path routing protocol to provide reliable and stable data transmission in MANET that is composed of high-mobility nodes. The new multi-path routing establishes the main route by the mechanism based on AODV, and then finds the backup route that node-disjoint from the main route by making add nodes in the main route not participate in it. The data transmission starts immediately after finding the main route. And the backup route search process is taking place while data is transmitted to reduce the transmission delay. When either of the main route or the backup route is broken, data is transmitted continuously through the other route and the broken route is recovered to node-disjoint route by the route maintenance process. The result of the simulation based on the Qualnet simulator shows that the backup route exists 62.5% of the time when the main route is broken. And proposed routing protocol improved the packet transmission rate by 2~3% and reduced the end-to-end delay by 10% compared with AODV and AODV-Local Repair.

Protection of a Multicast Connection Request in an Elastic Optical Network Using Shared Protection

  • BODJRE, Aka Hugues Felix;ADEPO, Joel;COULIBALY, Adama;BABRI, Michel
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.119-124
    • /
    • 2021
  • Elastic Optical Networks (EONs) allow to solve the high demand for bandwidth due to the increase in the number of internet users and the explosion of multicast applications. To support multicast applications, network operator computes a tree-shaped path, which is a set of optical channels. Generally, the demand for bandwidth on an optical channel is enormous so that, if there is a single fiber failure, it could cause a serious interruption in data transmission and a huge loss of data. To avoid serious interruption in data transmission, the tree-shaped path of a multicast connection may be protected. Several works have been proposed methods to do this. But these works may cause the duplication of some resources after recovery due to a link failure. Therefore, this duplication can lead to inefficient use of network resources. Our work consists to propose a method of protection that eliminates the link that causes duplication so that, the final backup path structure after link failure is a tree. Evaluations and analyses have shown that our method uses less backup resources than methods for protection of a multicast connection.