• Title/Summary/Keyword: Recovery Scheme

Search Result 477, Processing Time 0.027 seconds

A Heuristic Buffer Management and Retransmission Control Scheme for Tree-Based Reliable Multicast

  • Baek, Jin-Suk;Paris, Jehan-Francois
    • ETRI Journal
    • /
    • v.27 no.1
    • /
    • pp.1-12
    • /
    • 2005
  • We propose a heuristic buffer management scheme that uses both positive and negative acknowledgments to provide scalability and reliability. Under our scheme, most receiver nodes only send negative acknowledgments to their repair nodes to request packet retransmissions while some representative nodes also send positive acknowledgments to indicate which packets can be discarded from the repair node's buffer. Our scheme provides scalability because it significantly reduces the number of feedbacks sent by the receiver nodes. In addition, it provides fast recovery of transmission errors since the packets requested from the receiver nodes are almost always available in their buffers. Our scheme also reduces the number of additional retransmissions from the original sender node or upstream repair nodes. These features satisfy the original goal of treebased protocols since most packet retransmissions are performed within a local group.

  • PDF

Flash Memory Shadow Paging Scheme Using Deferred Cleaning List for Portable Databases (휴대용 데이터베이스를 위한 지연된 소거 리스트를 이용하는 플래시 메모리 쉐도우 페이징 기법)

  • Byun Si-Woo
    • Journal of Information Technology Applications and Management
    • /
    • v.13 no.2
    • /
    • pp.115-126
    • /
    • 2006
  • Recently, flash memories are one of best media to support portable computer's storages in mobile computing environment. We propose a new transaction recovery scheme for a flash memory database environment which is based on a flash media file system. We improved traditional shadow paging schemes by reusing old data pages which are supposed to be invalidated in the course of writing a new data page in the flash file system environment. In order to reuse these data pages, we exploit deferred cleaning list structure in our flash memory shadow paging (FMSP) scheme. FMSP scheme removes the additional storage overhead for keeping shadow pages and minimizes the I/O performance degradation caused by data page distribution phenomena of traditional shadow paging schemes. We also propose a simulation model to show the performance of FMSP. Based on the results of the performance evaluation, we conclude that FMSP outperforms the traditional scheme.

  • PDF

A Simple Carrier Frequency Recovery Scheme for DVB-S2 Systems (DVB-S2 시스템을 위한 간단한 반송파 주파수 복구부 설계에 관한 연구)

  • Oh, Jong-Kyu;Yoon, Eun-Chul;Kim, Joon-Tae
    • Journal of Broadcast Engineering
    • /
    • v.15 no.2
    • /
    • pp.182-191
    • /
    • 2010
  • In this paper, a simple Carrier Frequency Recovery(CFR) scheme is introduced. In relating the use of consumer-grade equipment and satellite transmission environments, carrier frequency recovery have to recovery a large initial Carrier Frequency Offset(CFO), which is 20% normalized CFO, for DVB-S2 receivers. For these reasons, conventional CFR schemes for DVB-S2 systems need significant hardware complexity. Introduced CFR scheme employs Fitz algorithm for coarse CFR and recovers a coarse CFO accurately, and a simple pilot block correlation algorithm is employed for fine CFR. Introduced scheme reduce the number of multiplication operations by 80% and does not need any additional memory without degrading the achievable performance.

Replicated Chaeckpointing Failure Recovery Schemes for Mobile Hosts and Mobile Support Station in Cellular Networks (셀룰라 네트워크 환경에서의 이중화 체크포인팅을 이용한 이동 호스트 및 기지국 결함 복구 기법)

  • Byun, Kyue-Sub;Kim, Jai-Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.1B
    • /
    • pp.13-23
    • /
    • 2002
  • A mobile host is prone to failure due to lack of stable storage, low bandwidth of wireless channel, high mobility, and limited battery life on the wireless network. Many researchers have studied to overcome these problems. For high level Availability in the cellular networks, it is necessary to consider recovery from the failures of mobile support stations as well as mobile as mobile hosts. In this paper, we present modified trickle scheme for recovery from failures of Mobile Support Station based on checkpointing scheme and analyze and compare the performance. We propose and analyze the performance of two schemes : one is waiting recovery scheme for the mobile support station having the last checkpoint and the other is searching the new path to the another mobile support station having the checkpoint.

An Efficient Authentication Scheme for Multicast Packet using Recovery Layer (복구 계층을 이용한 멀티캐스트 패킷 인증)

  • 홍기훈;정수환
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.3
    • /
    • pp.63-73
    • /
    • 2004
  • This paper proposes an efficient authentication scheme for multicast packet using recovery layer to provide source authentication. The problems of the existing schemes are as follows : TESLA requires time synchronization between the sender and the receiver, md hash-based schemes have high communication overheads due to additional hash values and require many buffers and delay for verification on receivers. Our main focus is reducing the buffer size, communication and computation burden of the receiver. The proposed scheme in this paper is highly robust to packet loss using the recovery layer based on XOR operation. It also provides low communication overhead, low verification cost, non-repudiation of the origin, immediate verification and robustness against DoS attack on the receiver.

Fuzzy Technique based Chopper Control for Slip Energy Recovery System with Twelve-Pulse Converter

  • Tunyasrirut, S.;Ngamwiwit, J.;Furuya, T.;Yamamoto, Y.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.509-514
    • /
    • 2004
  • This paper introduces the modified slip energy recovery system in order to improve its power factor and to reduce harmonics of line current waveforms. Twelve pulse line commutated converter with the chopper type IGBT is applied where the chopper is applied across the DC terminal and the chopped DC is fed to the converter operating as an inverter and then passed through the wye-wye and delta-wye transformer circuit. This scheme leads to be able to adjust the speed of the motor by the duty cycle of the chopper operating in PWM mode. The fuzzy logic controller is also introduced to the modified slip energy recovery system for keeping the motor speed to be constant when the load varies. The experimental results in testing the 0.22 kW wound rotor induction motor from no-load condition to rated condition show the effectiveness of the proposed control scheme.

  • PDF

Design and Performance Evaluation of Permanent Disk Error Recovery Schemes during Disk Mirroring (디스크 미러링 시 영구적 고장 복구 기법의 설계 및 성능평가)

  • 피준일;홍현택;송석일;유재수
    • Journal of Internet Computing and Services
    • /
    • v.3 no.5
    • /
    • pp.95-106
    • /
    • 2002
  • In current storage system environment, we use disk mirroring or Chained-declustering scheme to improve data availability and reliability. If disk error is occurred when these schemes are used. we need efficient recovery schemes for these situations. In this paper, it is proposed that a recovery method of disk mirroring that guarantees I/O performance similar to normal state during disk failure, Also, we execute performance evaluation for our recovery scheme and existing schemes in various environments. We show through the simulation that our algorithm outperforms the classic schemes in terms of I/O response time.

  • PDF

Effective Fragile Watermarking for Image Authentication with High-quality Recovery Capability

  • Qin, Chuan;Chang, Chin-Chen;Hsu, Tai-Jung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.11
    • /
    • pp.2941-2956
    • /
    • 2013
  • In this paper, we propose an effective fragile image watermarking scheme for tampering detection and content recovery. Cover image is divided into a series of non-overlapping blocks and a block mapping relationship is constructed by the secret key. Several DCT coefficients with direct current and lower frequencies of the MSBs for each block are used to generate the reference bits, and different coefficients are assigned with different bit numbers for representation according to their importance. To enhance recovery performance, authentication bits are generated by the MSBs and the reference bits, respectively. After LSB substitution hiding, the embedded watermark bits in each block consist of the information of itself and its mapping blocks. On the receiver side, all blocks with tampered MSBs can be detected and recovered using the valid extracted reference bits. Experimental results demonstrate the effectiveness of the proposed scheme.

Hybrid Data Recovery Technique of RAID Level 5 Architecture (RAID 레벨 5 구조의 혼합형 데이타 복구 기법)

  • Jeon, Sang-Hoon;Ahn, Byung-Chul
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.27 no.7
    • /
    • pp.675-683
    • /
    • 2000
  • For real time services of multimedia applications, storage systems should provide data without degrading their performance. Since it is very important to recover data immediately at a disk failure, the disk recovery system is required. This paper presents a hybrid recovery scheme which prevents degraded the performance on a single disk failure at RAID level 5 architecture until the failed disk is replaced with a new disk. The proposed scheme is very economical compared to previous spare disk schemes because it does not use extra disks. The performance of the proposed scheme is evaluated and analyzed with that of the RAID level 5 for various requested sizes through the simulation. The results show that the performance of the proposed scheme is improved up to 20 percents at the failure mode and 80 percents at the reconfigured mode. After a multimedia server system has been built with a RAID controller and hard disks, the data recovery performance of the propose scheme are compared with the results of simulation.

  • PDF

Fault-Management Scheme for Recovery Time and Resource Efficiency in OBS Networks (OBS 망에서 복구 시간과 자원의 효율성을 고려한 장애 복구 기법)

  • 이해정;정태근;소원호;김영천
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.9B
    • /
    • pp.793-805
    • /
    • 2003
  • In OBS (Optical Burst Switching) networks which decouple the burst from its header, the fault of a fiber link can lead to the failure of all the light-path that traverses the fiber. Because each light-path is expected to operate at a rate of a few Gbps by using WDM (Wavelength Division Multiplexing) technology, any failure may lead to large data loss. Therefore, an efficient recovery scheme must be provided. In this paper, we analyze network utilization and BCP (Burst Control Packet) loss rate according to each link failure by applying the conventional restoration schemes in OBS networks. And through these simulation results, an ASPR scheme is proposed improve the fault management scheme in terms of recovery time and throughput. Finally, We compare the performance of our proposed scheme with that of the conventional one with respect to burst loss rate, resource utilization and throughput by OPNET simulations.