• Title/Summary/Keyword: Striping

Search Result 69, Processing Time 0.027 seconds

Design of a Vido Storage Server that Maximizes Concurrent Streams and Minimizes Initial Latency (사용자 수 증대와 초기 대기시간 감소를 위한 비디오 저장 서버의 설계)

  • Ma, Pyeong-Su;Jo, Chang-Sik;Jin, Yun-Suk;Sin, Gyu-Sang
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.10
    • /
    • pp.2608-2617
    • /
    • 1999
  • One of the most important functionality that commercial video storage servers should provide is to maximize the number of concurrent streams and to minimize the initial latency of new requests. In this paper, we propose a data placement scheme whose disk read unit size can be twice large than that of conventional striping methods. The proposed scheme can significantly increase the number of concurrent streams, since the ratio of rotational latency time is decreased and the disks are effectively utilized. The disk scheduling scheme we propose guarantees constant initial latency time. We also propose a procedural design method for a storage server by introducing the concept of allowed initial latency. The comparison with previous research shows that the proposed scheme provides better performance.

  • PDF

The cascading reorganization method by write operation in striping system (스트라이핑 시스템에서 쓰기 연산에 의한 연쇄적 재구성 방법)

  • Bak, Yu-Hyeon;Kim, Chang-Soo;Kim, Young-Ho;Kang, Dong-Jae;Kim, Hag-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11a
    • /
    • pp.213-216
    • /
    • 2002
  • 데이터의 병행 읽기 성능을 높이기 위해서 데이터를 스트라이핑 방법으로 저장하는 시스템은 흔하게 볼 수 있다. 하지만, 시스템을 운영하다 저장장치를 확장해야 할 경우가 종종 발생하게 되는데 이때 기존의 데이터에 대해서 재구성을 수행한 후에만 시스템을 정상적으로 사용할 수 있다. 하지만 데이터의 양이 급속하게 증가하고 있는 상황에서 재구성 연산을 수행할 때 그 오버헤드로 인하여 서비스를 중단해야 하는 상황이 발생한다. 이 논문에서는 스트라이핑으로 데이터를 저장하는 시스템에서 저장장치가 확장되었을 때 모든 데이터를 대상으로 재구성을 수행하는 것이 아니라, 갱신 연산이 요청된 블록에 대해서만 재구성을 수행하는 연쇄적 재구성 기법을 제안한다. 사용자로부터 갱신이 요청된 블록이나 새로 저장될 블록은 추가된 디스크를 포함한 모든 디스크 수에 의해서 저장될 위치가 결정되고, 만일 이 위치가 새로운 디스크에 존재하면 연산이 종료된다. 하지만. 결정된 위치가 기존의 디스크라면 이미 이 위치에 존재하는 블록 또한 이동하게 된다. 이러한 현상으로 제안하는 방법은 연쇄적 재구성 방법이라 한다. 연쇄적 재구성 방법은 재구성 오버헤드를 분산시키는 효과를 가지면서 서비스 중단 시간을 줄일 수 있다. 하지만. 추가되는 디스크의 수가 기존 디스크의 수보다 적을 경우에는 사용자의 응답대기 시간이 길어지는 단점을 가진다.

  • PDF

A study on Check Pattern of Nail Art (네일 아트에 나타난 체크 패턴에 관한 연구)

  • Jeong, Seung-Eun;Kim, Jeong-Mee
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.17 no.1
    • /
    • pp.53-68
    • /
    • 2015
  • The purpose of this study is to analyze check pattern of nail art from 2011 to 2013. The results of this study are as follows; 1) Check pattern of nail art is total 257 patterns, and there are 84 argyle, 29 tartan, 24 harlequin, 24 over, 23 window-pane, 15 stitcheds, 13 hound tooth, 10 block, 10 madras, 8 gingham, 8 gradation, 7 shepherd, and 2 tattersall check patterns. Through this result, in nail art, the relatively simple patterns such as a vertical pattern, a horizontal pattern, and cross or overlap diagonal line are used more than elaborate and complex check patterns of a fibrous tissue from a weaving process. 2) In check pattern of nail art, N-affiliated color and R-affiliated color are remarkably well-used, because of the effects of argyle, tartan, window-pane, harlequin, stitched, over, and hound tooth check patterns used the most during the past three years. Especially, most tartan, harlequin, over, and hound tooth check patterns use their own special colors such as R-affiliated colors and N-affiliated colors as it is, and argyle, window-pane, stitched, and over check patterns use well by arranging N-affiliated colors and R-affiliated colors. 3) The most used expressive technique is hand painting to express check pattern in nail art, because new products related to UV gel are well launched. These materials can draw fine line that is hard to express by existing polish easily and simply, and not only have set quickly hard, so procedure time is very short, so it is compatible to draw check pattern personally, but also it is well covered, so check pattern is more clearly expressed.

  • PDF

The Incidence of Muscle Abnormalities in Broiler Breast Meat - A Review

  • Huang, Xi;Ahn, Dong Uk
    • Food Science of Animal Resources
    • /
    • v.38 no.5
    • /
    • pp.835-850
    • /
    • 2018
  • The dramatic improvements in the growth rate and breast muscle size and yield in broilers through the intensive genetic selection, and the improvement in nutrition and management over the past 50 years have introduced serious abnormalities that influenced the quality of breast meat. The abnormalities include pale-soft-exudative (PSE) conditions, deep pectoral muscle (DPM) myopathy, spaghetti meat (SM), white striping (WS), and woody breast (WB) that have serious negative implications to the broiler meat industry. The incidences of PSE and DPM have been known for several decades, and their prevalence, etiology and economic impact have been well discussed. However, other abnormalities such as SM, WS and WB conditions have been reported just for few years although these conditions have been known for some time. The newly emerging quality issues in broilers are mainly associated with the Pectoralis major muscles, and the incidences have been increased dramatically in some regions of the world in recent years. As high as 90% of the broilers are affected by the abnormalities, which are expected to cause from $200 million to $1 billion economic losses to the U.S. poultry industry per year. So, this review mainly discusses the histopathological characteristics and biochemical changes in the breast muscles with the emphasis on the newly emerging abnormalities (SM, WS, and WB) although other abnormalities are also discussed. The impacts of the anomalies on the nutritional, functional, mechanical and sensory quality of the meat and their implications to the poultry industry are discussed.

A Load-Sharing Scheme using SCTP Multi-homing (SCTP 멀티호밍 특성을 활용한 부하 분산 기법)

  • Song Jeonghwa;Lee Meejeong
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.6
    • /
    • pp.595-607
    • /
    • 2004
  • Networks often evolve to provide a host with multiple access points to the Internet. In this paper, we propose a transport layer load distribution mechanism utilizing the multiple network interfaces simultaneously. We specifically propose an extension of Stream Control Transmission Protoco1 (SCTP) to have load sharing over multiple network interfaces. We named the particular service provided by the Proposed load sharing mechanism to be LS (Load Sharing) mode service. LS mode service is based on the following four key elements: (i) the separation of flow control and congestion control, (ii) congestion window based striping, (iii) redundant packet retransmission for fast packet loss recovery, (iv) a novel mechanism to keep track of the receiver window size with the SACKS even if they arrive out-of-order. Through simulations, it is shown that the proposed LS mode service can aggregate the bandwidth of multiple paths almost ideally despite of the disparity in their bandwidth. When a path with a delay of 100% greater is utilized as the second path, the throughput is enhanced about 20%.

Adsorption Striping Voltammetric Analysis of Corticosteroid Hormones (흡착벗김 전압-전류법을 이용한 부신피질 호르몬의 분석)

  • Kim, Il Kwang;Chun, Hyun Ja;Jeong, Seung Il;Park, Jung Hwan
    • Analytical Science and Technology
    • /
    • v.7 no.2
    • /
    • pp.141-147
    • /
    • 1994
  • The adsorptive stripping voltammetry of corticosterone was studied in $1.0{\times}10^{-2}M$ sodium hydroxide as supporting electrolyte. The analytical conditions were as follow : 360 sec. for deposition time, -8.0 volts deposition potential, medium size mercury drop, and 20mV/sec scan rate. Calibration curve has shown a linearlity in the range of $5.0{\times}10^{-9}M$ to $8.0{\times}10^{-7}M$ and the detection limits have been $9.5{\times}10^{-10}M$ for corticoterones. This method has shown such a high sensitivity even in dilute solution that has been useful for analyzing sex hormones in medical supplies without interference of additives.

  • PDF

Experimental Analysis of RAID Architecture for Real-Time Multimedia Data (실시간 멀티미디어 데이터를 위한 RAID 구조의 실측 분석)

  • Jeon, Sang-Hoon;Ahn, Byoung-Chul
    • The KIPS Transactions:PartB
    • /
    • v.9B no.2
    • /
    • pp.191-198
    • /
    • 2002
  • Recently, Usage of multimedia server is rapidly increased with expansion of internet that real-time displaying service for multimedia data, MPEG and etc. For these multimedia real-time applications, it is necessary to use a disk array as a storage system. For providing requested service to much more clients at the same time in a multimedia data storage server, considerable varied strategies in a several parts. But especially it is important feature to various parameters for disk array such as relation of striping block size as a system environment and characteristics of video data. In this paper, we implemented real environment of multimedia server which provides MPEG-1 files and evaluated the suitable storage system architectures by applying synthetically generated workloads in the various parameters for disk array.

An Effective Video Block Placement Strategy on VOD Storage Server with MZR Disks (MZR 디스크를 채택한 VOD 저장서버의 효율적인 비디오 블록 배치방법)

  • Lim, Hyoung-Roung;Kim, Jeong-Won;Kim, Young-Ju;Chung, Ki-Dong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.12
    • /
    • pp.2971-2984
    • /
    • 1997
  • In this paper, we propose an efficient video block Placement scheme that utilize the current disk product that has MZR disk characteristic and users' skewed access pattern on VOD. Also, we evaluate its performance through simulation and modeling of VOD server. The basic placement rule is to place on MZR disks by LP, SHP methods according to the Zipf distribution of popularity. To verify the proposed scheme, we examined its performance on workstation with 2 MZR disks under varied skewed factors. The proposed placement scheme showed better response time than the random method. To extend proposed placement scheme to disk group, we analyzed the theoretical maximum numbers of concurrent users and the required buffer size per user. For performance parameters for the proposed scheme, we considered the disk head scheduling methods, the placement methods and the striping unit. The result of experiments showed that the proposed scheme was effective.

  • PDF

Energy Conservation of RAID by Exploiting SSD Cache (SSD 캐시를 이용한 RAID의 에너지 절감 기법)

  • Lee, Hyo-J.;Kim, Eun-Sam;Noh, Sam-H.
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.2
    • /
    • pp.237-241
    • /
    • 2010
  • Energy conservation of server systems has become important. Though storage subsystem is one of the biggest power consumers, development of energy conservation techniques is challenging problem due to striping techniques like RAID and physical characteristics of hard disks. According to our observation, the size of footprint for a day or for hours is much smaller compared to the size of whole data set. In this paper, we describe a design of a novel architecture for RAID that uses an SSD as a large cache to conserve energy by holding such a footprint. We incorporate these approaches into a real implementation of a RAID 5 system that consists of four hard disks and an SSD in a Linux environment. Our preliminary results in actual performance measurements using the cello99 and SPC traces show that energy consumption is reduced by a maximum of 14%.

Addressing Mobile Agent Security through Agent Collaboration

  • Jean, Evens;Jiao, Yu;Hurson, Ali-R.
    • Journal of Information Processing Systems
    • /
    • v.3 no.2
    • /
    • pp.43-53
    • /
    • 2007
  • The use of agent paradigm in today's applications is hampered by the security concerns of agents and hosts alike. The agents require the presence of a secure and trusted execution environment; while hosts aim at preventing the execution of potentially malicious code. In general, hosts support the migration of agents through the provision of an agent server and managing the activities of arriving agents on the host. Numerous studies have been conducted to address the security concerns present in the mobile agent paradigm with a strong focus on the theoretical aspect of the problem. Various proposals in Intrusion Detection Systems aim at securing hosts in traditional client-server execution environments. The use of such proposals to address the security of agent hosts is not desirable since migrating agents typically execute on hosts as a separate thread of the agent server process. Agent servers are open to the execution of virtually any migrating agent; thus the intent or tasks of such agents cannot be known a priori. It is also conceivable that migrating agents may wish to hide their intentions from agent servers. In light of these observations, this work attempts to bridge the gap from theory to practice by analyzing the security mechanisms available in Aglet. We lay the foundation for implementation of application specific protocols dotted with access control, secured communication and ability to detect tampering of agent data. As agents exists in a distributed environment, our proposal also introduces a novel security framework to address the security concerns of hosts through collaboration and pattern matching even in the presence of differing views of the system. The introduced framework has been implemented on the Aglet platform and evaluated in terms of accuracy, false positive, and false negative rates along with its performance strain on the system.