• Title/Summary/Keyword: 리눅스 커널

Search Result 318, Processing Time 0.023 seconds

Design and Implementation of a Protocol for Solving Priority Inversion Problems in Real-time OS (실시간 운영체제의 우선순위 역전현상 해결을 위한 프로토콜 설계 및 구현)

  • Kang, Seong-Goo;Gyeong, Gye-Hyeon;Ko, Kwang-Sun;Eom, Young-Ik
    • The KIPS Transactions:PartA
    • /
    • v.13A no.5 s.102
    • /
    • pp.405-412
    • /
    • 2006
  • Real-time operating systems have been used in various computing environments, where a job must be completed in its deadline, with various conditions, such as effective scheduling policies, the minimum of an interrupt delay, and the solutions of priority inversion problems, that should be perfectly satisfied to design and develop optimal real-time operating systems. Up to now, in order to solve priority inversion problems among several those conditions. There have been two representative protocols: basic priority inheritance protocol and priority ceiling emulation protocol. However, these protocols cannot solve complicated priority inversion problems. In this paper, we design a protocol, called recursive priority inheritance (RPI), protocol that effectively solves the complicated priority inversion problems. Our proposed protocol is also implemented in the Linux kernel and is compared with other existing protocols in the aspect of qualitative analysis.

Efficient CPU Resource Utilization Mechanism on Android Platforms for Conserving Energy (안드로이드 환경에서의 에너지 절약을 위한 효율적인 CPU 자원 활용 기법)

  • Ryu, Jun-han;Kwon, Young-ho;Rhee, Byung-ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.526-529
    • /
    • 2015
  • as the smartphone industry developed, the smartphone's internal hardware devices have become high-end devices and it requires more power consumption than the previous one. therefore a battery of high capacity needed, but there is a limit in order to equip a large battery on account of smartphone minimization. The Linux Kernel provides the DVFS Mechanism to compensate for these limitations by software techniques. DVFS is dynamically adjust the frequency of the CPU to reduce the power consumption of the CPU. ondemand governor, the default policy in DVFS, apply the maximum frequency of the CPU whenever exceeding the up_threshold. so it result in a waste of CPU resources. by paying attention to this point, this paper propose the mechanism that maintain a high CPU utilization in proportion to the current frequency of the cpu to prevent the waste of CPU resources and conserve energy.

  • PDF

Performance Improvement of TCP Vegas Using Estimation of End-to-End Forward/Backward Delay Variation (종단간 순방향/역방향 전송지연 측정을 이용한 TCP Vegas의 성능 향상)

  • Shin Young-Suk;Kim Eun-Gi
    • The KIPS Transactions:PartC
    • /
    • v.13C no.3 s.106
    • /
    • pp.353-358
    • /
    • 2006
  • Unlike TCP Reno, TCP Vegas recognizes network congestion through the measuring of RTT (Round Trip Time) and decides the main congestion control parameters, such as Windows size. But, congestion avoidance scheme of Vegas poorly reflects asymmetric characteristics of packet path because TCP Vegas uses the measuring of RTT that reflects forward/backward packet transmission delay as a forward delay. The RTT can't infer the forward/backward transmission delay variation because it only measures the packet's turn around time. In this paper, We have designed and implemented a new Vegas congestion control algorithm that can distinguish forward/backward network congestion. We have modified the source codes of TCP Vegas in Linux 2.6 kernel and verified their performance.

Design of Bandwidth Measurement based Scheduler for Improving MPTCP Performance in Bufferbloat Environment (Bufferbloat 환경에서 MPTCP 성능 개선을 위한 대역폭 측정 기반 스케줄러 설계)

  • Kim, Min Sub;Han, Ki Moon;Lee, Jae Yong;Kim, Byung Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.8
    • /
    • pp.1508-1516
    • /
    • 2017
  • Multipath TCP (MPTCP) is a transport layer protocol that supports multipath transmission. If a bufferbloat occurs in one of the subflows of MPTCP, HoL blocking occurs at the receiver due to the difference in packet arrival time among paths. In MPTCP, HoL blocking degrades not only the performance of the path where bufferbloat occurs, but also the performance of other paths. In this paper, we propose a bandwidth measurement based scheduler to solve this problem. Bandwidth measurement based scheduler is designed to measure the bandwidth of each subflow and to perform packet scheduling based on it. In order to verify the proposed scheduler, we implemented the proposed scheduler in the Linux kernel and constructed a testbed in which bufferbloat occurs. Experimental results show that the proposed scheduler has better performance than the legacy MPTCP in bufferbloat environment.

A study of a System Call Interface for Supporting File Partial Encryption (파일 부분 암호화 지원을 위한 시스템 호출에 관한 연구)

  • Seo, Hye-in;Seong, Jeong-gi;Kim, Eun-gi
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.549-551
    • /
    • 2017
  • There are currently various file encryption systems and applications for encryption and storage of file on disk. However, the existing file encryption solutions handle encryption and decryption all at once by file or directory. In this study, we propose a system call supporting partial encryption function of the file. The user sets the partial encryption of the file by using system call interface, and writes the contents. And then the data is encrypted and stored on the disk. Also if the user sets the decryption and reads the data, the necessary part of data is decrypted by applying the user setting. According to the user setting, only the necessary part is encrypted and stored on a storage medium. As a result, the information in a secret level can be saved efficiently and securely.

  • PDF

DCCP based Congestion Control Scheme to support Mobility of Devices on Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경에서 단말의 이동성을 지원하기 위한 DCCP 기반의 혼잡 제어 정책)

  • Park Si-Yong;Kim Sung-Min;Lee Tae-Hoon;Chung Ki-Dong
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.1
    • /
    • pp.59-75
    • /
    • 2006
  • In this paper, we propose a congestion control scheme to control the congestion due to the mobility of ubiquitous devices on ubiquitous computing environment. Especially, this congestion control scheme provides a reverse congestion avoidance state which can classify between packet error by features of wireless network and packet dropping by congestion. Also, it provides a slow stop state which can minimize bandwidth waste due to congestion control. The proposed congestion control scheme controls more adaptive than existing congestion control schemes. The proposed congestion control scheme is designed based on DCCP(Datagram Congestion Control Protocol) being proposed by IETF(Internet Engineering Task Force) and implemented on the Linux kernel. In simulation results, the proposed congestion control scheme provides good bandwidth throughput in wireless network as well as in wired network.

RaspberryPi board control with GPIO (GPIO를 사용한 RaspberryPi 보드 제어)

  • Lee, Sung-jin;Choi, Chul-kil;Choi, Byeong-yoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.429-431
    • /
    • 2014
  • Raspberry Pi is in the UK (Paspberry Pi) Foundation created a compact / Cheap PC and was developed as part of the educational project. RCA connection jack and has been released in March 2012 was also sold out in one hour. Raspberry Pi Linux kernel based operating system called Raspberry Pi using optimized Raspbian Debian-based operating systems are often used to be free. Raspberry Pi is currently in the field of IoT with the board quite Cubie limelight and Cubie board holds more data. Arduino is quite easy to reach and access to the avr but impossible to include any custom code associated to a library and customize drawbacks must be solved only. Raspberry Pi using the Raj Caribbean and limitations of low cost, but there is a small output. So, for a combination of the two, with GPOI was reminiscent of hardware control. In this paper, using GPIO Cooking Hacks RaspberryPi board for controlling input and output by using the shield is insufficient expansion raspberry pie was confirmed that the good operation was verified.

  • PDF

An Improved Index Structure for the Flash Memory Based F2FS File System

  • Kim, Yong-Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.12
    • /
    • pp.1-8
    • /
    • 2022
  • As an efficient file system for SSD(Solid State Drive), F2FS is employed in the kernel of Linux operating system. F2FS applies various methods to improve performance by reflecting the characteristics of flash memory. One of them is improvement of the index structure that contains addresses of data blocks for each file. This paper presents a method for further improving performance by modifying the index structure of F2FS. F2FS manages all index blocks as logical numbers, and an address mapping table is used to find the physical block addresses of index blocks on flash memory. This paper shows performance improvement by applying logical numbers to the last level index blocks only. The count of mapping table search for a data block access is reduced to 1~2 from 1~4.

Booting Process Profiling Tool for Baseboard Management Controllers (베이스보드 매니지먼트 컨트롤러를 위한 부팅 과정 프로파일링 도구)

  • Jaeseop Kim;Minho Park;Jiman Hong
    • Smart Media Journal
    • /
    • v.11 no.11
    • /
    • pp.84-91
    • /
    • 2022
  • Baseboard Management Controller(BMC) supports server monitoring, maintenance, and control functions using various communication interfaces. However, if an unexpected problem occurs during the device driver initialization process, the BMC may not operate normally. Therefore, a boot process profiling tool that accurately analyzes the device driver initialization process and provides a function to check the analysis result is essential. Existing boot process profiling tools do not specifically provide the device driver initialization process and results required for BMC boot process analysis, forcing developers to use a combination of tools to analyze the boot process in detail. In this paper, we propose an integrated profiling tool for BMC's booting process. The proposed tool provides device driver initialization process analysis, CPU and memory usage analysis, and kernel version management functions. Users can easily analyze the booting process using the proposed tool, and the analysis result can be used to shorten the booting time. Also, the proposed tool is implemented in Linux-based BMC, and it is shown that the proposed tool is more efficient than the existing profiling tool.

The Design and Implementation of High Performance Intrusion Prevention Algorithm based on Signature Hashing (시그너처 해싱 기반 고성능 침입방지 알고리즘 설계 및 구현)

  • Wang, Jeong-Seok;Jung, Yun-Jae;Kwon, H-Uing;Chung, Kyu-Sik;Kwak, Hu-Keun
    • The KIPS Transactions:PartC
    • /
    • v.14C no.3 s.113
    • /
    • pp.209-220
    • /
    • 2007
  • IPS(Intrusion Prevention Systems), which is installed in inline mode in a network, protects network from outside attacks by inspecting the incoming/outgoing packets and sessions, and dropping the packet or closing the sessions if an attack is detected in the packet. In the signature based filtering, the payload of a packet passing through IPS is matched with some attack patterns called signatures and dropped if matched. As the number of signatures increases, the time required for the pattern matching for a packet increases accordingly so that it becomes difficult to develop a high performance US working without packet delay. In this paper, we propose a high performance IPS based on signature hashing to make the pattern matching time independent of the number of signatures. We implemented the proposed scheme in a Linux kernel module in a PC and tested it using worm generator, packet generator and network performance measure instrument called smart bit. Experimental results show that the performance of existing method is degraded as the number of signatures increases whereas the performance of the proposed scheme is not degraded.