• Title/Summary/Keyword: 결함허용성

Search Result 152, Processing Time 0.025 seconds

Design and Implementation of Linux-based Clustering VOD Server with Fault-Tolerance (결함 허용성을 가진 리눅스 기반 클러스터링 VOD 서버 설계 및 구현)

  • 유찬곤;최현호;권오영;유관종
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.04a
    • /
    • pp.277-279
    • /
    • 2001
  • VOD 서비스를 원활히 제공하기 위해서는, 대용량의 멀티미디어 데이터를 전송할 수 있는 고속의 네트워크의 구축과 더불어, 날로 증가하는 사용자들의 요구를 수용할 수 있는 서버가 요구된다. 그러나 단일서버의 VOD 시스템은 고장 발생 시, 서비스를 중단해야 할 뿐만 아니라, 늘어나는 서비스 요청에 효과적으로 대응할 수 있는 확장성 또한 유연하지 않아서, 클러스터링 기술을 적용한 VOD 서버가 그 대안으로 인식되고 있다. 본 논문에서는 리눅스를 이용한 클러스터링 VOD 서버와 관련하여, 미디어 스트라이핑 방법과 서버 설계 및 구현 과정에 대하여 기술한다.

Towards Developing Formal Verification Tools for Cryptographic Protocols (암호프로토콜 논리성 검증도구 개발에 관한 연구)

  • 권태경;김승주;송보연
    • Review of KIISC
    • /
    • v.12 no.2
    • /
    • pp.62-76
    • /
    • 2002
  • Incautiously designed and informally verified cryptographic protocols are error-prone and can allow an adversary to have the ideal starting point for various kinds of attacks. The flaws resulting from these protocols can be subtle and hard to find. Accordingly we need formal methods for systematic design and verification of cryptographic protocols. This paper surveys the state-of-the-art and proposes a practical developing method that will be implemented in the future study.

A Study on Validation Testing for Input Files of MS Word-Processor (MS 워드프로세서의 입력 파일에 대한 유효성 테스팅 방법에 관한 연구)

  • Yun, Young-Min;Choi, Jong-Cheon;Yoo, Hae-Young;Cho, Seong-Je
    • The KIPS Transactions:PartC
    • /
    • v.14C no.4
    • /
    • pp.313-320
    • /
    • 2007
  • In this paper, we propose a method to analyze security vulnerabilities of MS word-processor by checking the validation of its input files. That is, this study is to detect some vulnerabilities in the input file of the word processor by analyzing the header information of its input file. This validation test can not be conducted by the existing software fault injection tools including Holodeck and CANVAS. The proposed method can be also applied to identify the input file vulnerabilities of Hangul and Microsoft Excel which handle a data file with a header as an input. Moreover, our method can provide a means for assessing the fault tolerance and trustworthiness of the target software.

Design of Fault-tolerant MA Migration Scheme based on Encrypted Checkpoints (암호화된 체크포인트를 이용한 결함 허용성을 가지는 이동 에이전트의 이주 기법 설계)

  • 김구수;엄영익
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.77-84
    • /
    • 2003
  • A mobile agent is a program which represents a user in a network and is capable of migrating from one node to another node, performing computations on behalf of the user. In this paper, we suggest a scheme that can safely recover mobile agent using the checkpoint that is saved at the platform that it visited previously and restart its execution from the abnormal termination point of the mobile agent. For security, mobile agent uses its public key to encrypt the checkpoint and the home platform uses the private key of the mobile agent to decrypt the encrypted checkpoints at the recovery stage. When home platform receives the checkpoint of the mobile agent, home platform verifies the checkpoint using message digest. Home platform verifies the correctness of the checkpoint by comparing the message digest generated at checkpoint mention time with the message digest generated at mobile agent recovery time.

A Study on Reliability Evaluation Using Dynamic Fault Tree Algorithm (시스템 신뢰도 평가를 위한 동적 결함 트리(Dynamic Fault Tree) 알고리듬 연구)

  • 김진수;양성현;이기서
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.10A
    • /
    • pp.1546-1554
    • /
    • 1999
  • In this paper, Dynamic Fault Tree algorithm(DFT algorithm) is presented. This algorithm provides a concise representation of dynamic fault tolerance system including fault recovery techniques with fault detection, mask and switching function. And this algorithm define FDEP, CSP, SEQ, PAG gate which captures the dynamic characteristics of system. It show that this algorithm solved the constraints to satisfy the dynamic characteristics of system which there are in Markov and also this is able to satisfy the dynamic characteristics of system which there are in Markov and also this is able to covered the disadvantage of Fault tree methods. To show the key advantage of this algorithm, a traditional method, that is, Markov and Fault Tree, applies to TMR and Dual-Duplex systems with the dynamic characteristic and a presented method applies to those. He results proved that the DFT algorithm for solving the problems of the system is more effective than the Markov and Fault tree analysis model..

  • PDF

Development of the Automated Ultrasonic Flaw Detection System for HWR Nuclear Fuel Cladding Tubes (중수로형 핵연료 피복관의 자동초음파탐상장치 개발)

  • Choi, M.S.;Yang, M.S.;Suh, K.S.
    • Nuclear Engineering and Technology
    • /
    • v.20 no.3
    • /
    • pp.170-178
    • /
    • 1988
  • An automated ultrasonic flaw detection system was developed for thin-walled and short tubes such as Zircaloy-4 tubes used for cladding heavy-water reactor fuel. The system was based on the two channels immersion pulse-echo technique using 14 MHz shear wave and the specially developed helical scanning technique, in which the tube to be tested is only rotated and the small water tank with spherical focus ultrasonic transducers is translated along the tube length. The optimum angle of incidence of ultrasonic beam was 26 degrees, at which the inside and outside surface defects with the same size and direction could be detected with the same sensitivity. The maximum permissible defects in the Zircaloy-4 tubes, i.e., the longitudinal and circumferential v notches with the length of 0.76mm and 0.38mm, respectively and the depth of 0.04 mm on the inside and outside surface, could be easily detected by the system with the inspection speed of about 1 m/min and the very excellent reproducibility. The ratio of signal to noise was greater than 20 dB for the longitudinal defects and 12 dB for the circumferential defects.

  • PDF

High Cycle Fatigue Life Evaluation of Damaged Composite Rotor Blades (손상된 복합재 로터 블레이드의 고주기 피로수명 평가)

  • Kee, Young-Jung;Kim, Seung-Ho;Han, Jeong-Ho;Jung, Jae-Kwon;Heo, Jang-Wook
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.36 no.10
    • /
    • pp.1275-1282
    • /
    • 2012
  • Helicopter rotor systems are dynamically loaded structures with many composite components such as the main and the tail rotor blades. The fatigue properties of composite materials are extremely important to design durable and reliable helicopter rotor blades. The safe-life methodology has generally been used in the helicopter industry to substantiate dynamically loaded composite components. However, it cannot be used to evaluate the strength reducing effects of flaws and defects that may occur during manufacturing and operational usage. The damage tolerance methodology provides a proper means to overcome this shortcoming; however, it is difficult to economically apply it to every composite component. The flaw tolerant methodology is an equivalent option to the damage tolerance methodology for civil and military rotorcraft. In this study, the flaw tolerant safe-life evaluation is described and illustrated by means of successful application to substantiate the retirement time of composite rotor blades.

A Study on Method a New Approach for The Analsis of NVP Reliablity (NVP 신뢰도 분석을 위한 새로운 접근방법에 관한 연구)

  • 신경애
    • KSCI Review
    • /
    • v.8 no.2
    • /
    • pp.43-50
    • /
    • 2001
  • 소프트웨어 신뢰성을 향상시키는 방법에는 소프트웨어 결함 허용기법 중에서 가장 객관적이고 정량적으로 평가받는 것이 NVP(N-Version Programming)기법이다. 이 기법에서 신뢰도를 추정하는 모델로 이항분포를 사용하는데 이 모델은 각 컴포넌트 신뢰도의 값들이 동일하다는 한계점이 있었다. 본 연구에서는 기존 모델의 한계점을 해결하기 위하여 NVP 신뢰도 분석을 위한 새로운 접근 방법으로 유전자 알고리즘(Genetic Algorithms)을 적용하였고. 또한 적용 모델과 기존 모델을 서로 비교 검토하였다. 그 결과 전체시스템 신뢰도를 일정 수준이상 유지하면서 각 컴포넌트 신뢰도의 값들을 최적화 할 수 있었고. 또한 비용을 최소로 하는 최적의 수를 추정할 수 있었다. 그리고 적용 모델과 기존 모델을 비교 및 평가하여 타당성을 증명하였다.

  • PDF

Compound Backup Technique using Hot-Cold Data Classification in the Distributed Memory System (분산메모리시스템에서의 핫콜드 데이터 분류를 이용한 복합 백업 기법)

  • Kim, Woo Chur;Min, Dong Hee;Hong, Ji Man
    • Smart Media Journal
    • /
    • v.4 no.3
    • /
    • pp.16-23
    • /
    • 2015
  • As the IT technology advances, data processing system is required to handle and process large amounts of data. However, the existing On-Disk system has limit to process data which increase rapidly. For that reason, the In-Memory system is being used which saves and manages data on the fast memory not saving data into hard disk. Although it has fast processing capability, it is necessary to use the fault tolerance techniques in the In-Memory system because it has a risk of data loss due to volatility which is one of the memory characteristics. These fault tolerance techniques lead to performance degradation of In-Memory system. In this paper, we classify the data into Hot and Cold data in consideration of the data usage characteristics in the In-Memory system and propose compound backup technique to ensure data persistence. The proposed technique increases the persistence and improves performance degradation.

An Adaptive Checkpointing Scheme for Fault Tolerance of Real-Time Control Systems with Concurrent Fault Detection (동시 결함 검출 기능이 있는 실시간 제어 시스템의 결함 허용성을 위한 적응형 체크포인팅 기법)

  • Ryu, Sang-Moon
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.17 no.1
    • /
    • pp.72-77
    • /
    • 2011
  • The checkpointing scheme is a well-known technique to cope with transient faults in digital systems. This paper proposes an adaptive checkpointing scheme for the reliability improvement of real-time control systems with concurrent fault detection capability. With concurrent fault detection capability the effect of transient faults are assumed to be detected with no latency. The proposed adaptive checkpointing scheme is based on the reliability analysis of an equidistant checkpointing scheme. Numerical data show the proposed adaptive scheme outperforms the equidistant scheme from a reliability point of view.