• Title/Summary/Keyword: RAID

Search Result 155, Processing Time 0.03 seconds

A Study on Data Storage and Recovery in Hadoop Environment (하둡 환경에 적합한 데이터 저장 및 복원 기법에 관한 연구)

  • Kim, Su-Hyun;Lee, Im-Yeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.12
    • /
    • pp.569-576
    • /
    • 2013
  • Cloud computing has been receiving increasing attention recently. Despite this attention, security is the main problem that still needs to be addressed for cloud computing. In general, a cloud computing environment protects data by using distributed servers for data storage. When the amount of data is too high, however, different pieces of a secret key (if used) may be divided among hundreds of distributed servers. Thus, the management of a distributed server may be very difficult simply in terms of its authentication, encryption, and decryption processes, which incur vast overheads. In this paper, we proposed a efficiently data storage and recovery scheme using XOR and RAID in Hadoop environment.

A Study on the Design Analysis and Test of a Ballute Type Parachute of the Smart Submunition (지능형 자탄의 벌루트형 낙하산 설계 해석 및 시험에 관한 연구)

  • Lee, Sang-Kil;Lee, Sang-Seung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.2
    • /
    • pp.23-31
    • /
    • 2008
  • The configuration model of a ballute type RAID(Ram Air Inflated Decelerator) for reducing the high speed and high revolution of smart submuntion is designed and tested. Three dimensional incompressible turbulent flow computational fluid dynamic analysis for the assembly of ballute and submunition is performed and pressure distribution, velocity, and drag around the assembly is calculated. Aerodynamic characteristics of the ballute assembly such as air flow inside and outside of the ballute and pressure distribution is clearly shown and it's drag coefficient is computed. Trajectory analysis of the submunition is performed and is in good agreement with the descending trajectory data of experimental model tested.

The method for adding disk with supporting dynamic number of disks in striping system (스트라이핑 시스템에서 동적 디스크 수를 지원하는 계산에 의한 매핑 방법)

  • Bak, Yu-Hyeon;Kim, Chang-Soo;Kim, Young-Ho;Kang, Dong-Jae;Shin, Bum-Joo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04a
    • /
    • pp.353-356
    • /
    • 2002
  • RAID 레벨 중에서 스트라이핑을 하는 시스템에서는 운영중에 디스크를 추가하려면, 기존의 디스크에 저장되어 있는 데이터들은 새로 추가된 디스크를 고려하여 스트라이핑 하기 위해 재구성하는 과정이 필요하다. 이러한 동적디스크 수의 변화에 유연하게 적응할 수 있도록 매핑 테이블을 사용하는 방법들이 제안되고 있으나 관리해야 할 데이터의 양이 디스크 용량에 비례하여 증가하고 메인 메모리에서 모두 관리할 수 없기 때문에 성능이 떨어지는 문제가 발생한다. 이 논문에서는 스트라이핑을 하는 RAID 시스템에서 적은 양의 메타데이터(SZIT)를 관리함으로써 동적 디스크 수를 지원하는 계산에 의한 매핑 방법을 제안한다.

  • PDF

The performance comparison of Erasure Code to recover from chip units based on SSD (SSD 기반의 칩 단위 복구를 위한 Erasure 코드 성능 비교)

  • Yang, Yu-Seok;Huh, Joon-Moo;Song, Jae-Seok;Kim, Deok-Hwan
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2010.06b
    • /
    • pp.347-351
    • /
    • 2010
  • SSD의 칩을 구성하는 셀의 집적도가 높아지고 시스템 오류가 높아짐에 따라, 저장장치의 고신뢰성을 보장해야 하는 필요성은 점점 증가하고 있다. 현재 SSD 의 오류를 복구하기 위한 방법으로 ECC 가 사용되고 있으나 비트단위의 오류복구만 가능하여 복구 성능의 한계를 가지고 있다. 본 논문에서는 SSD 계층구조인 하나의 칩을 디스크로 설정하고 내부에 RAID 시스템을 구성하여 칩 단위의 오류 복구 기법을 제안한다. 제안된 칩 단위의 오류 복구 기법은 기존 하드디스크 기반 RAID 시스템에 적용 되었던 세 가지 Erasure 코드들을 SSD 에 적용한 방법이다. 또한 실험을 통해 각각의 Erasure 코드 성능을 비교하였다.

  • PDF

Implementation and Performance Analysis of Single I/O Space Service for Cluster Computers (클러스터 컴퓨터를 위한 단일 I/O 공간 서비스의 구현 및 성능분석)

  • Kim, Tae-Kyu;Kim, Bang-Hyun;Kim, Jong-Hyun
    • The KIPS Transactions:PartA
    • /
    • v.13A no.6 s.103
    • /
    • pp.517-524
    • /
    • 2006
  • In cluster computers, it is essential to Implement the single I/O space(SIOS) supporting integrated I/O substructure to efficiently process I/O intensive applications. SIOS service provides with global I/O address space to directly access peripherals and hard disks in its own or remote nodes from any node in the cluster computer In this thesis, we propose the implementation method of SIOS in Linux clusters by using only freewares. This method is implemented at device driver level that uses Enhanced Network Block Device(ENBD) and file system level that uses S/W RAID and NFS. The major strengths of this method are easiness of implementation and almost no cost due to using freewares. In addition, since freewares used are open sources, it is possible to apply this method to other platforms with only slight modification. Moreover, experiments show that I/O throughputs are up to 5.5 times higher in write operations and approximately 2.3 times higher in read operations than those of CDD method that uses the device driver developed at kernel level.

Space-Efficient Compressed-Column Management for IoT Collection Servers (IoT 수집 서버를 위한 공간효율적 압축-칼럼 관리)

  • Byun, Siwoo
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.9 no.1
    • /
    • pp.179-187
    • /
    • 2019
  • With the recent development of small computing devices, IoT sensor network can be widely deployed and is now readily available with sensing, calculation and communi-cation functions at low cost. Sensor data management is a major component of the Internet of Things environment. The huge volume of data produced and transmitted from sensing devices can provide a lot of useful information but is often considered the next big data for businesses. New column-wise compression technology is mounted to the large data server because of its superior space efficiency. Since sensor nodes have narrow bandwidth and fault-prone wireless channels, sensor-based storage systems are subject to incomplete data services. In this study, we will bring forth a short overview through providing an analysis on IoT sensor networks, and will propose a new storage management scheme for IoT data. Our management scheme is based on RAID storage model using column-wise segmentation and compression to improve space efficiency without sacrificing I/O performance. We conclude that proposed storage control scheme outperforms the previous RAID control by computer performance simulation.

K-means clustering analysis and differential protection policy according to 3D NAND flash memory error rate to improve SSD reliability

  • Son, Seung-Woo;Kim, Jae-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.11
    • /
    • pp.1-9
    • /
    • 2021
  • 3D-NAND flash memory provides high capacity per unit area by stacking 2D-NAND cells having a planar structure. However, due to the nature of the lamination process, there is a problem that the frequency of error occurrence may vary depending on each layer or physical cell location. This phenomenon becomes more pronounced as the number of write/erase(P/E) operations of the flash memory increases. Most flash-based storage devices such as SSDs use ECC for error correction. Since this method provides a fixed strength of data protection for all flash memory pages, it has limitations in 3D NAND flash memory, where the error rate varies depending on the physical location. Therefore, in this paper, pages and layers with different error rates are classified into clusters through the K-means machine learning algorithm, and differentiated data protection strength is applied to each cluster. We classify pages and layers based on the number of errors measured after endurance test, where the error rate varies significantly for each page and layer, and add parity data to stripes for areas vulnerable to errors to provides differentiate data protection strength. We show the possibility that this differentiated data protection policy can contribute to the improvement of reliability and lifespan of 3D NAND flash memory compared to the protection techniques using RAID-like or ECC alone.

A Raid-Type War-Game Model Based on a Discrete Multi-Weapon Lanchester's Law

  • Baik, Seung-Won
    • Management Science and Financial Engineering
    • /
    • v.19 no.2
    • /
    • pp.31-36
    • /
    • 2013
  • We propose a war-game model that is appropriate for a raid-type warfare in which, a priori, the maneuver of the attacker is relatively certain. The model is based on a multi-weapon extention of the Lanchester's law. Instead of a continuous time dynamic game with the differential equations from the Lanchester's law, however, we adopt a multi-period model relying on a time-discretization of the Lanchester's law. Despite the obvious limitation that two players make a move only on the discrete time epochs, the pragmatic model has a manifold justification. The existence of an equilibrium is readily established by its equivalence to a finite zero-sum game, the existence of whose equilibrium is, in turn, well-known to be no other than the LP-duality. It implies then that the war-game model dictates optimal strategies for both players under the assumption that any strategy choice of each player will be responded by a best strategy of her opponent. The model, therefore, provides a sound ground for finding an efficient reinforcement of a defense system that guarantees peaceful equilibria.

Design on Smart Security Disk System with Wireless Interface of High Definition Image (고해상도 영상의 무선 인터페이스를 갖는 스마트 보안 디스크 시스템의 설계)

  • Kim, Won
    • Journal of Digital Convergence
    • /
    • v.11 no.9
    • /
    • pp.195-200
    • /
    • 2013
  • In visual surveillance system abandoned objects in public places are the deliberately left things, which should be automatically detected by intelligent systems in the environment where the number of cameras is increasing. This research deals with the design scheme of a smart security disk system which can detect these abandoned objects automatically and save the relevant image information with the wireless interface of high definition images. By implementing the proposed system in this research it is confirmed that the transmission performance shows 60 frames per second without compression of high definition images and the capability of the disk system shows the relevant images can be saved in a RAID configuration. Also, the proposed visual surveillance software shows a good detection rate of 80% in PAT performance.