• Title/Summary/Keyword: File Storage

Search Result 453, Processing Time 0.029 seconds

Design of General-Purpose Resource Management System with Tree Structure (트리 구조를 가진 범용 자원관리시스템의 설계)

  • Sin, Hyun-Kyu;Lee, Choong-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.10
    • /
    • pp.1420-1426
    • /
    • 2008
  • The most recent programs tend to use picture or audio files which need mass storage resources. For these mass storages, the performance of automatic management decreases as the sizes of these resources increases. Moreover, the more the number of resources increases, the more the management of resources gets difficult. This paper suggests a resource management system to which the interface of tree-structure file system is applied in order to increase convenience and efficiency. The system uses the access technique based on character string path to have more compatibility, and supports tree structure which is more systematic. Further, it supports virtual nodes to show high performance. The system can be used to control resources from outside as well as inside of processes.

  • PDF

Recording and Retrieving a Color Image Using Binary Image Precessing in Holographic Optical Memory (홀로그래픽 광메모리에서 이진 영상 처리를 이용한 컬러 영상 기록 및 복원)

  • Kim, Jung-Hoi;An, Jun-Won;Kim, Nam;Lee, Kwon-Yeon
    • Journal of the Korean Institute of Telematics and Electronics D
    • /
    • v.36D no.11
    • /
    • pp.71-81
    • /
    • 1999
  • In this paper, digital holographic data storage system is implemented to record and retrieve the color images using new direct access method and binary image processing. As a result of applying image processing via a proposed direct access method, we can reduce the number of data page than binary image processing using raw file and replay color image of resolution of $128{\times}80{\times}256$ (6.6KB). Also it is showed that the input data can be transformed into digital holograms regardless of any kinds of file such as character data, moving picture. etc.

  • PDF

Designing of On-line Backup System using Snapshot Algorithm and SCSI-Protocol (Snapshot 알고리즘을 이용한 On-line 백업시스템 설계)

  • 김정기;이춘구;박순철
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2002.06a
    • /
    • pp.177-184
    • /
    • 2002
  • In these day, the storage capacity has been growing and the informations increase in geometrically progression in a modem information age. At present the situation is required that the exchanges and access of the informations is available without regard to time and space. In this paper we present a effective backup systems to backup the information of server that continuously has to be accessible in 365's days. There are two backup cases. one is a file-base backup and the other is a block-based backup. In general, a block-based backup has a good performance than a file-based backup but it is difficult to implement a block-based systems. First, we introduce the technique of backup and methods, on-line backup. Next, we present our backup systems based on client-server model and have a snapshot facility. Finally we introduce SCSI-Protocol in order to increase the data transfer rate.

  • PDF

Cloud implementation within the company using FTP (FTP를 이용한 회사내 클라우드 구현)

  • Seo, Dong-hyeon;Kim, Mi-Seong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.472-474
    • /
    • 2017
  • Storage of files is important in the information age. In particular, files in the company should be managed more efficiently. In this paper, we connect to FTP Server through Client program to manage files efficiently. The FTP Server builds a database to manage employee information in the company and folder paths for each employee. The Client program can be used after login with the assigned employee number and password. You can check the list of files stored in the FTP server when login is successful and upload, download and delete after selecting specific files. Folders can also be created and deleted for more systematic management of files. For the efficient operation of the company, it is implemented so that it can be divided into a personal drive and a public drive.

  • PDF

Performance Compression of RAID5 Read/write to File and Stripe Size (파일과 스트라이프 크기에 대한 RAID5의 읽기/쓰기 성능 비교)

  • Choi, Gwi-Yoel;Park, Kye-Won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.763-767
    • /
    • 2005
  • RAID were proposed to stored double data or used to parity logging methode for error recovery. We describe a technique for automating the execution of redundant disk array operation, including recovery from errors, independent of array architecture. RAID5 provide highly reliable cost effective secondary storage with high performance for read access and large write accessed. It discusses the two architectural techniques used in disk arrays, striping across multiple disks to improve performance and redundancy to improve reliability. In this paper we compare with performance and reliability in RAID5 real/write to file and stripe size. than suggest to algorithm.

  • PDF

Composition and Analysis of Linear Component Counting based Multiple Indexing (직선성분 계수 기반 다중 인덱싱 구성 및 분석)

  • Park, Je-Ho;Lim, Sang-Min
    • Journal of the Semiconductor & Display Technology
    • /
    • v.9 no.3
    • /
    • pp.17-21
    • /
    • 2010
  • As the compact and easily accessible handheld devices, such as cellular phones and MP3 players equipped with image acquisition functionality, are becoming widely available among common users, various applications of images are rapidly increasing. Image related services and software such as web-based image presentation and image manipulation for personal or commercial purpose enable users to view contents of remote image archive and to manipulate enormous amount of images in local or network based storage as well. It is necessary for users to identify the images efficiently so that the same images are perceived as one physical entity instead of recognizing them as different images as the trends are getting stronger. In order to support this environment, we propose a method that generates image identifiers or indexing for images within a solid and efficient manner. The proposed image identifier utilizes multiple index values. The integration of component index values creates a unique composite value that can be used as a file name, file system identifier, or database index. Our experimental results on generation of constituent index values have shown favorable results.

Dynamic Cluster Management of Hadoop Distributed Filesystem (하둡 분산 파일시스템의 동적 클러스터 관리 기법)

  • Ryu, Wooseok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.435-437
    • /
    • 2016
  • Hadoop Distributed File System(HDFS) is a file system for distributed processing of big data by replicating data to distributed data nodes. HDFS cluster shows a great scalability up to thousands of nodes, but it assumes a exclusive node cluster with numerous nodes for the big data processing. Various operational-purpose worker systems used by office are hardly considered as a part of cluster. This paper discusses this problem and proposes a dynamic cluster management technique to increase storage capability and analytic performance of hadoop cluster. The propsed technique can add legacy systems to the cluster and can remove them from the cluster dynamically depending on their availability.

  • PDF

Design and Implementation of a Peer-to-Peer Data Sharing Scheme for Closed User Group with Security and Flexibility (보안성과 유연성을 갖춘 Peer-to-Peer 데이터 공유 기법의 설계 및 구현)

  • Lee Goo-Yeon;Lee Yong;Kim Hwa-Jong;Jeong Choong-Kyo;Lee Dong-Eun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.4
    • /
    • pp.61-70
    • /
    • 2005
  • We propose and implement a flexible secure peer-to-peer(P2P) file sharing scheme which can be used for data sharing among closed user group (CUG) members. When a member wants to share data, notification messages are sent to the members with whom the member wants to share data. Each notification message includes one-time password encrypted with the receiver's public key. A member who received the notification message can download the data by using the one-time password. The proposed scheme provides selective sharing, download confirmation and efficient storage management. In terms of security, the proposed scheme supports authentication, entity privacy, replay attack protection and disguise prevention. We also implement the proposed system and find that the system is very useful among P2P service of closed user groups.

Access efficiency of small sized files in Big Data using various Techniques on Hadoop Distributed File System platform

  • Alange, Neeta;Mathur, Anjali
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.359-364
    • /
    • 2021
  • In recent years Hadoop usage has been increasing day by day. The need of development of the technology and its specified outcomes are eagerly waiting across globe to adopt speedy access of data. Need of computers and its dependency is increasing day by day. Big data is exponentially growing as the entire world is working in online mode. Large amount of data has been produced which is very difficult to handle and process within a short time. In present situation industries are widely using the Hadoop framework to store, process and produce at the specified time with huge amount of data that has been put on the server. Processing of this huge amount of data having small files & its storage optimization is a big problem. HDFS, Sequence files, HAR, NHAR various techniques have been already proposed. In this paper we have discussed about various existing techniques which are developed for accessing and storing small files efficiently. Out of the various techniques we have specifically tried to implement the HDFS- HAR, NHAR techniques.

RSPM : Storage Reliability Scheme for Network Video Recorder System (RSPM : NVR 시스템 기반의 저장장치 신뢰성 향상 기법)

  • Lee, Geun-Hyung;Song, Jae-Seok;Kim, Deok-Hwan
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.2
    • /
    • pp.29-38
    • /
    • 2010
  • Network Video Recorder becomes popular as a next generation surveillance system connecting all cameras and video server in network environment because it can provide ease of installation and efficient management and maintenance. But in case of data damage, the storage device in traditional NVR has no recovery scheme and it is disabled in processing real-time requests. In this paper, we propose an Reliable Storage using Parity and Mirroring scheme for improving reliability on storage device and maintaining system on realtime. RSPM uses a Liberation coding to recover damaged multimedia data and dynamic mirroring to repair corrupted system data and to maintain real-time operation. RSPM using the Liberation code is 11.29% lesser than traditional file system and 5.21% less than RSPM using parity code in terms of loss rate of damaged multimedia data.