• Title/Summary/Keyword: iATA

Search Result 32, Processing Time 0.024 seconds

Design and Parameter Optimization of Virtual Storage Protocol (iATA) for Mobile Devices (모바일 기기를 위한 가상 스토리지 프로토콜(iATA)의 설계 및 파라메터 최적화)

  • Yeoh, Chee-Min;Lim, Hyo-Taek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.2
    • /
    • pp.267-276
    • /
    • 2009
  • Nowadays, numerous of valuable internet services are available not only for personal computer but also for mobile appliances in wireless network environment. Therefore, as the amount of contents is increased for those services, the storage limitation on mobile devices has became a significant issue. In this paper, we present a new block-level storage network protocol, iATA (Internet Advanced Technology Attachment) as a solution to the above problem. iATA is designed to transport ATA block-level data and command over the ubiquitous TCP/IP network. With iATA, a mobile appliance is able to access and control the ATA storage devices natively through network from anywhere and at anytime as if the storage devices is attached locally. We describe the concepts, design and diverse consideration of iATA protocol. Based on the benchmark experiments and application exploitation, we strongly believe that iATA as a light-weight protocol is efficient and cost-effective to be used as a storage network protocol on a resource limited device that utilizes common-off-the-shelf storage hardware and existing IP infrastructure.

A study on Partition Allocation Techniques of iATA-based Virtual Storage (iATA 기반의 가상 스토리지 파티션 할당 기법에 관한 연구)

  • Park, Sungjin;Chun, Jooyoung;Lim, Hyotaek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.68-71
    • /
    • 2009
  • iATA(Internet Advanced Technology Attachment)는 TCP/IP 네트워크를 통해 원격의 대용량의 가상 저장 공간을 자신의 로컬 디스크 처럼 활용이 가능하게 하는 기술로 이는 모바일 기기(PDA, 휴대폰 등)와 같은 저장 공간의 부족문제를 가지고 있는 장치에 적용하여 저장 공간의 부족 문제를 근본적으로 해결할 수 있는 솔루션이라 할 수 있다. iATA는 SCSI 하드디스크가 장착된 시스템에서만 서버를 구축해야만 하는 iSCSI와는 달리 일반 가정이나 사무실에서 주로 사용하는 ATA 하드 디스크에도 서버 구축이 가능한 확장성을 가지고 있으며 이는 iATA의 최대 장점 중 하나라 할 수 있다. 또한, Web 사이트를 통해 많은 사람들이 iATA 서비스를 이용하여 자신의 모바일 기기에서의 저장공간 문제를 극복할 수 있으며, 최근 사회 문제로 크게 대두되고 있는 개인 정보 유출의 폐해를 막기 위해 개인 인증시 OpenSSL과 MD5를 이용한 보안/암호화 기법을 사용하여 개인 정보 유출에 의한 불이익 및 개인 정보 악용으로 인한 범죄를 막을 수 있다. 하지만, 기존의 iATA상에서는 디스크 관리가 서버에서만 가능하다는 문제점이 있다. 즉, 사용자만의 개인공간을 가질 수가 없다. 이처럼 개인 사진이나, 다이어리같은 정보들을 관리 할 수 없는 문제점을 해결하기 위해 클라이언트에서 자신만의 디스크 공간을 가질 수 있게 파티션을 할당해주고, 그 공간을 클라이언트만의 공간으로 만들어 주는 기술을 개발하는데 그 목적이 있다.

  • PDF

Design and Implementation of iATA-based RAID5 Distributed Storage Servers (iATA 기반의 RAID5 분산 스토리지 서버의 설계 및 구현)

  • Ong, Ivy;Lim, Hyo-Taek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.2
    • /
    • pp.305-311
    • /
    • 2010
  • iATA (Internet Advanced Technology Attachment) is a block-level protocol developed to transfer ATA commands over TCP/IP network, as an alternative network storage solution to address insufficient storage problem in mobile devices. This paper employs RAID5 distributed storage servers concept into iATA, in which the idea behind is to combine several machines with relatively inexpensive disk drives into a server array that works as a single virtual storage device, thus increasing the reliability and speed of operations. In the case of one machine failed, the server array will not destroy immediately but able to function in a degradation mode. Meanwhile, information can be easily recovered by using boolean exclusive OR (XOR) logical function with the bit information on the remaining machines. We perform I/O measurement and benchmark tool result indicates that additional fault tolerance feature does not delay read/write operations with reasonable file size ranged in 4KB-2MB, yet higher data integrity objective is achieved.

An Internet Based Data Storage Protocol for ATA devices

  • Singh, Kulveer;Lim, Hyo-Taek
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.1167-1170
    • /
    • 2007
  • This paper introduces a data storage transport protocol internet Advanced Technology Attachment (iATA) for ATA storage devices that can be accessed over (TCP/IP) networks. As the access speed of Advanced Technology Attachment (ATA) type storage is increasing, the importance of sharing the ATA type storages over internet is also increasing. We are proposing a protocol in which we have implemented the basic ATA command set to access the ATA type remote storage devices over the TCP/IP networks.In this paper, we give basic details of the protocol and discuss the existing storage protocols which are mainly used for accessing block storage like internet Small Computer System Interface (iSCSI) Hyper Small Computer System Interface (HyperSCSI) and ATA over Ethernet (AoE).

Mutual Authentication and Secure Session Termination Scheme in iATA Protocol

  • Ong, Ivy;Lee, Shirly;Lee, Hoon-Jae;Lim, Hyo-Taek
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.4
    • /
    • pp.437-442
    • /
    • 2010
  • Ubiquitous mobile computing is becoming easier and more attractive in this ambient technological Internet world. However, some portable devices such as Personal Digital Assistant (PDAs) and smart phones are still encountering inherent constraints of limited storages and computing resources. To alleviate this problem, we develop a cost-effective protocol, iATA to transfer ATA commands and data over TCP/IP network between mobile appliances and stationary servers. It provides mobile users a virtual storage platform which is physically resided at remote home or office. As communications are made through insecure Internet connections, security risks of adopting this service become a concern. There are many reported cases in the history where attackers masquerade as legitimate users, illegally access to network-based applications or systems by breaking through the poor authentication gates. In this paper, we propose a mutual authentication and secure session termination scheme as the first and last defense steps to combat identity thief and fraud threat in particular for iATA services. Random validation factors, large prime numbers, current timestamps, one-way hash functions and one-time session key are deployed accordingly in the scheme. Moreover, we employ the concept of hard factorization problem (HFP) in the termination phase to against fraud termination requests. Theoretical security analysis discussed in later section indicates the scheme supports mutual authentication and is robust against several attacks such as verifiers' impersonation, replay attack, denial-of-services (DoS) attack and so on.

Selection of Oriental Melon (Cucumis melo L. var. makuwa Makino) Cultivars for Second Cropping in Summer Season (여름철 2기작 재배용 참외 품종선발)

  • Shin Yong-Seub;Yeon Il-Kweon;Seo Young-Jin;Do Han-Woo;Lee Ji-Eun;Choi Chung-Don;Park So-Deuk
    • Journal of Bio-Environment Control
    • /
    • v.15 no.3
    • /
    • pp.270-276
    • /
    • 2006
  • This experiment was conducted to selecting of oriental melon cultivars suitable for second cropping at summer season. At 20 days after transplanting, 'Supergumssaragi' and 'Gumhwangeunchun' were rapidly growing. Chlorophyll contents of 'Gumgigaeeunchun', 'Gumnodazieunchun', 'Gonggongcheelkkul' and 'Gumboddari' were higher than other cultivars. Days required from transplanting to harvesting of 'Gumboddari', 'Gumdongieunchun', 'Gonggongcheelkkul' and 'Gumgaeeunchun', 'Gumbora' and 'Supergumssaragi', 'Gumssaragieunchun', 'Gumnodazieunchun', 'Gummieunchun' and 'Gumhwangeunchun', 'Diamond' were 51, 52, 53, 55, 56 and 60 days, respectively. The fruit weigh tended to heavy in 'Supergumssaragi' and 'Gumgigaeeunchun'. The flesh thickness was thick a little in 'Gumgigaeeunchun'. The hardness tended to high in 'Gumgigaeeunchun', 'Gumnodazieunchun' and 'Gumgaeeunchun', but it was not difference between treatments. 'L', 'a', 'b' and Y.I. value of the fruit were not difference between the cultivars, but 'a' value was the highest at 'Gumgigaeeunchun', The yield per ha of 'Gumgaeeunchun' and 'Gumgigaeeunchun' increased 8%, 2% than 'Gumssaragieunchun', respectively. From above result, 'Gumgigaeeunchun', 'Gumdongieunchun', 'Gumnodazieunchun' and 'Gumgaeeunchun' cultivars are suitable in summer season.

Characteristics and Frequencies of Alternative Initiation Codon(AIC) of mtDNA ND2 in Five Pig Breeds (돼지 5품종에 있어서 mtDNA ND2 유전자의 선택적 개시코돈의 특성과 빈도)

  • Han, S.H.;Cho, I.C;Choi, Y.L.;Lee, C.E.;Ko, M,S.;Kim, J.H.;Seo, B.Y.;Lee, J.G.;Jeon, J.T.
    • Journal of Animal Science and Technology
    • /
    • v.46 no.6
    • /
    • pp.903-908
    • /
    • 2004
  • Alternative initiation codon(AlC) has been reported in the mitochondrial genes in various mammalian species. We investigated the AlC of mitochondrial NADH dehydrogenase 2 gene(rntDNA ND2) in five pig breeds. Two kinds of initiation codons(ATA/ATf) showing different frequencies among tested pig breeds were used. While all Large White pigs had ATA as an initiator methionine codon, all Landrace pigs had ATf. The other breeds(Berkshire, Duroc and Hampshire) had both initiation codons with the ATA frequencies, 91.9, 21.3 and 60.00/0, respectively. In the previous reports, all Chinese indigenous pig breeds were identified to have unique initiation codon ATA. Although the effect of Ale on the translation of mtDNA ND2 has not been studied in this study, AlC patterns in mtDNA ND2 will contribute to the maternity test using molecular markers in pig breeding.

Experimental investigation of deformation behavior of geocell retaining walls

  • Altay, Gokhan;Kayadelen, Cafer;Canakci, Hanifi;Bagriacik, Baki;Ok, Bahadir;Oguzhanoglu, Muhammed Ahmet
    • Geomechanics and Engineering
    • /
    • v.27 no.5
    • /
    • pp.419-431
    • /
    • 2021
  • Construction of retaining walls with geocell has been gaining in popularity because of its easy and fast installation compared to conventional methods. In this study, model tests were conducted by constructing the geocell retaining wall (GRW) at a constant height (i.e., 90 cm) and using aggregate as an infill material at four different configurations and two different surface angles. In these tests, a circular footing was placed behind the walls at different lateral distances from the wall surface and loaded monotonically. Subsequent to this vertical loading being applied to the footing, horizontal displacements on the GRW surface were measured at three different points. The performance of Type 4 GRW exceeded the other three types of GRW, with the highest lateral displacement occurring in Type 4 GRW at approximately 0.67 % of wall height. In addition, the results of these tests were compared with theoretical approaches widely accepted in the literature. The stress levels reached beneath the footing were found to be compatible with theoretical results.

Dynamic Load Balancing and Network Adaptive Virtual Storage Service for Mobile Appliances

  • Ong, Ivy;Lim, Hyo-Taek
    • Journal of Information Processing Systems
    • /
    • v.7 no.1
    • /
    • pp.53-62
    • /
    • 2011
  • With the steady growth of mobile technology and applications, demand for more storage in mobile devices has also increased. A lightweight block-level protocol, Internet Advanced Technology Attachment (iATA), has been developed to deliver a cost-effective storage network solution for mobile devices to obtain more storage. This paper seeks to contribute to designing and implementing Load Balancing (LB), Network Monitoring (NM) and Write Replication (WR) modules to improve the protocol's scalability and data availability. LB and NM modules are invoked to collect system resources states and current network status at each associate node (server machine). A dynamic weight factor is calculated based on the collected information and sent to a referral server. The referral server is responsible to analyze and allocate the most ideal node with the least weight to serve the client. With this approach, the client can avoid connecting to a heavily loaded node that may cause delays in subsequent in-band I/O operations. Write replication is applied to the remaining nodes through a WR module by utilizing the Unison file synchronization program. A client initially connected to node IP A for write operations will have no hindrances in executing the relevant read operations at node IP B in new connections. In the worst case scenario of a node crashing, data remain recoverable from other functioning nodes. We have conducted several benchmark tests and our results are evaluated and verified in a later section.