• Title/Summary/Keyword: docker

Search Result 73, Processing Time 0.022 seconds

Implementation and Analysis of Dynamic Resource Allocation for Docker in Cloud Environment (클라우드 환경에서 도커의 동적 자원 할당 구현 및 효과 분석)

  • Choi, Sungmin;Song, Sungjin;Yu, Heonchang;Chung, KwangSik;Park, JiSu
    • Annual Conference of KIPS
    • /
    • 2015.10a
    • /
    • pp.140-143
    • /
    • 2015
  • 클라우드 컴퓨팅에서 가상화 기술은 단일 물리 자원을 논리적인 자원으로 분할해 다수의 시스템이 병행적으로 운용될 수 있는 환경을 구축하여 준다. 이에 컨테이너 기술 또한 프로세스의 격리를 이용해서 가상화와 같은 병행 수행 환경을 제공한다. 게다가 컨테이너 기술은 하드웨어를 추상화하는 절차가 없기 때문에 기존의 가상화 기술에 비해 오버헤드가 현저히 작다. 따라서 기존의 하이퍼바이저 자리를 대체하기 위한 수단으로 컨테이너 기술의 가능성이 점쳐지고 있다. 본 논문에서는 상용화 된 컨테이너 기술인 도커를 기존의 클라우드-가상화 환경에 도입하였을 때 발생되는 문제를 분석하여 해결 방안을 제안하고 실험을 통해 그 효과를 비교하였다. 기존의 도커는 정적 자원 할당만을 지원하며 이는 클라우드 환경에서 급격한 변화에 유연하게 대처하지 못한다는 단점을 가지고 있다. 따라서 도커에 동적 자원 할당 기술을 적용하여 기존의 단점을 보완하고 클라우드 환경에서 컨테이너 기술의 운영 효율성을 제고한다.

Implementation of AIoT Edge Cluster System via Distributed Deep Learning Pipeline

  • Jeon, Sung-Ho;Lee, Cheol-Gyu;Lee, Jae-Deok;Kim, Bo-Seok;Kim, Joo-Man
    • International journal of advanced smart convergence
    • /
    • v.10 no.4
    • /
    • pp.278-288
    • /
    • 2021
  • Recently, IoT systems are cloud-based, so that continuous and large amounts of data collected from sensor nodes are processed in the data server through the cloud. However, in the centralized configuration of large-scale cloud computing, computational processing must be performed at a physical location where data collection and processing take place, and the need for edge computers to reduce the network load of the cloud system is gradually expanding. In this paper, a cluster system consisting of 6 inexpensive Raspberry Pi boards was constructed to perform fast data processing. And we propose "Kubernetes cluster system(KCS)" for processing large data collection and analysis by model distribution and data pipeline method. To compare the performance of this study, an ensemble model of deep learning was built, and the accuracy, processing performance, and processing time through the proposed KCS system and model distribution were compared and analyzed. As a result, the ensemble model was excellent in accuracy, but the KCS implemented as a data pipeline proved to be superior in processing speed..

Para-virtualized Multi-OS Management Technology for Stable Operation of Smart Navigational Aid Integrated Platform (스마트 항로표지 통합 플랫폼의 안정 운영을 위한 반가상화 다중 OS 관리 기술)

  • In-Pyo Cho;Jae-Kyu Lee;Sang-Yub Lee;Ki-Won Kwon
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2021.11a
    • /
    • pp.23-24
    • /
    • 2021
  • Among the failure cases of the existing navigation aids, the SW and operating system errors of the RTU, the embedded computer for navigation aids, account for about 10%. The causes of SW errors have an infinite number of cases, and it is impossible to correct them all. In this paper, we proposed a paravirtualized multi-OS Docker container utilization technique as a stable operation technique for smart navigational aids, which have recently increased the amount of computation and complexity of SW services that need to be managed. It is proposed to divide containers according to service type, expected load, and error frequency and load the service.

  • PDF

Security Assessment Technique of a Container Runtime Using System Call Weights

  • Yang, Jihyeok;Tak, Byungchul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.9
    • /
    • pp.21-29
    • /
    • 2020
  • In this paper, we propose quantitative evaluation method that enable security comparison between Security Container Runtimes. security container runtime technologies have been developed to address security issues such as Container escape caused by containers sharing the host kernel. However, most literature provides only a analysis of the security of container technologies using rough metrics such as the number of available system calls, making it difficult to compare the secureness of container runtimes quantitatively. While the proposed model uses a new method of combining the degree of exposure of host system calls with various external vulnerability metrics. With the proposed technique, we measure and compare the security of runC (Docker default Runtime) and two representative Security Container Runtimes, gVisor, and Kata container.

A Study on A Web-Based DevOps Platform Using Linux Container (리눅스 컨테이너를 이용한 웹기반의 DevOps 플랫폼 연구)

  • Chung, Geunhoon;Park, Junseok;Lee, Geuk
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.12
    • /
    • pp.71-80
    • /
    • 2019
  • DevOps is a combining which means giving a diverse environments for software development and operations through whole software lifecycle. The key value of the proposed DevOps platform is the fast and stable service capability for a software development and operation environment. To do this, the DevOps gives pre-embedded 7 programming languages-Java, C/C++, Python, PHP, Ruby, Node.js, goLang and 7 service frameworks - Korea eGov Framework, Spring, Struts, Django, Laravel, Rails, Express. With the DevOps platform, it is possible to develop a software and also to build and distribute operation packages directly with the Linux containers. In this paper, the performance evaluation for a compile time, a distribution time and a processing capability is will be also proved. Though the performance evaluation, this paper shows capabilities of the proposed DevOps for Cloud services with commercial service level, prospectively.

Cloud-based malware QR Code detection system (클라우드 기반 악성 QR Code 탐지 시스템)

  • Kim, Dae-Woon;Jo, Young-Tae;Kim, Jong-Min
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.9
    • /
    • pp.1227-1233
    • /
    • 2021
  • QR Code has been used in various forms such as simple business cards and URLs. Recently, the influence of Corona 19 Fundemik has led to the use of QR Codes to track travel routes through visits and entry / exit records, and QR Code usage has skyrocketed. In this way, most people have come to use it in the masses and are constantly under threat. In the case of QR Code, you do not know what you are doing until you execute it. Therefore, if you undoubtedly execute a QR Code with a malicious URL inserted, you will be directly exposed to security threats. Therefore, this paper provides a cloud-based malware QR Code detection system that can make a normal connection only when there is no abnormality after determining whether it is a malicious QR Code when scanning the QR Code.

Implementation of Cloud-Based Artificial Intelligence Education Platform (클라우드 기반 인공지능 교육 플랫폼 구현)

  • Wi, Woo-Jin;Moon, Hyung-Jin;Ryu, Gab-Sang
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.6
    • /
    • pp.85-92
    • /
    • 2022
  • Demand for big data analysis and AI developers is increasing, but there is a lack of an education base to supply them. In this paper, by developing a cloud-based artificial intelligence education platform, the goal was to establish an environment in which practical practical training can be efficiently learned at low cost at educational institutions and IT companies. The development of the education platform was carried out by planning scenarios for each user, architecture design, screen design, implementation of development functions, and hardware construction. This training platform consists of a containerized workload, service management platform, lecture and development platform for instructors and students, and secured cloud stability through real-time alarm system and age test, CI/CD development environment, and reliability through docker image distribution. The development of this education platform is expected to expand opportunities to enter new businesses in the education field and contribute to fostering working-level human resources in the AI and big data fields.

Design of Lab Framework for Effective Blockchain Education (효율적인 블록체인 교육을 위한 실습프레임워크 설계)

  • Kim, Do-Kyu
    • Journal of Industrial Convergence
    • /
    • v.18 no.6
    • /
    • pp.147-154
    • /
    • 2020
  • It is difficult to educate the overall operation of public and private blockchains with different characteristics. Recently, most education for blockchain is targeted at public blockchains such as Bitcoin and Ethereum. However, in an actual business environment, a private blockchain such as HyperLedger Fabric is used because access to corporate data is controlled through user authentication. In the case of HLF-based education, it is necessary to understand various components that are not in the public blockchain, such as peers, orderers, and channels. In this paper, a lab framework for HLF is designed for an efficient and systematic understanding of the functions and operations. The framework consists of HLF network, chaincode, and decentralized software control functions. Through the framework, the network configuration, distribution and activation of chaincode, and dApp execution process were checked step by step, and it was very easy to understand the overall flow for blockchain services. In addition, it is expected that a systematic understanding of the overall flow will be possible even in future network expansion.

Design and Implementation of a Stereoscopic Image Control System based on User Hand Gesture Recognition (사용자 손 제스처 인식 기반 입체 영상 제어 시스템 설계 및 구현)

  • Song, Bok Deuk;Lee, Seung-Hwan;Choi, HongKyw;Kim, Sung-Hoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.3
    • /
    • pp.396-402
    • /
    • 2022
  • User interactions are being developed in various forms, and in particular, interactions using human gestures are being actively studied. Among them, hand gesture recognition is used as a human interface in the field of realistic media based on the 3D Hand Model. The use of interfaces based on hand gesture recognition helps users access media media more easily and conveniently. User interaction using hand gesture recognition should be able to view images by applying fast and accurate hand gesture recognition technology without restrictions on the computer environment. This paper developed a fast and accurate user hand gesture recognition algorithm using the open source media pipe framework and machine learning's k-NN (K-Nearest Neighbor). In addition, in order to minimize the restriction of the computer environment, a stereoscopic image control system based on user hand gesture recognition was designed and implemented using a web service environment capable of Internet service and a docker container, a virtual environment.

Implementation of Efficient Distributed Crawler through Stepwise Crawling Node Allocation

  • Kim, Hyuntae;Byun, Junhyung;Na, Yoseph;Jung, Yuchul
    • Journal of Advanced Information Technology and Convergence
    • /
    • v.10 no.2
    • /
    • pp.15-31
    • /
    • 2020
  • Various websites have been created due to the increased use of the Internet, and the number of documents distributed through these websites has increased proportionally. However, it is not easy to collect newly updated documents rapidly. Web crawling methods have been used to continuously collect and manage new documents, whereas existing crawling systems applying a single node demonstrate limited performances. Furthermore, crawlers applying distribution methods exhibit a problem related to effective node management for crawling. This study proposes an efficient distributed crawler through stepwise crawling node allocation, which identifies websites' properties and establishes crawling policies based on the properties identified to collect a large number of documents from multiple websites. The proposed crawler can calculate the number of documents included in a website, compare data collection time and the amount of data collected based on the number of nodes allocated to a specific website by repeatedly visiting the website, and automatically allocate the optimal number of nodes to each website for crawling. An experiment is conducted where the proposed and single-node methods are applied to 12 different websites; the experimental result indicates that the proposed crawler's data collection time decreased significantly compared with that of a single node crawler. This result is obtained because the proposed crawler applied data collection policies according to websites. Besides, it is confirmed that the work rate of the proposed model increased.