• Title/Summary/Keyword: 블록 중심 처리

Search Result 63, Processing Time 0.032 seconds

iSCSI Performance Analysis Using NS2 (NS2 를 이용한 iSCSI 성능분석)

  • Song, Jeom-Ki;Choi, Sae-Bom;Lim, Hyo-Taek
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11b
    • /
    • pp.923-926
    • /
    • 2003
  • iSCSI(Internet Small Computer Systems Interface)프로토콜은 TCP/IP 네트워크를 통해 블록 중심형 스토리지 데이터에 접근을 가능하게 하는 SCSI 전송프로토콜이다. iSCSI는 서버에서 스토리지장치로의 데이터 전송을 위해 표준 이더넷 스위치와 라우터를 사용하며, 또한 기존의 IP 네트워크를 사용하여 SAN 의 확장이 가능하다. 본 논문에서는 이러한 iSCSI 를 사용하여 여러가지 다른 환경에서 iSCSI 프로토콜의 성능을 분석한다. 첫째는 스토리지 장치에 따른 iSCSI 의 성능변화와 둘째는 현재의 네트웍 망에서의 변화이다. 이더넷에서 스토리지 데이터를 액세스하는데 있어서 시급했던 문제중에 하나는 충분한 대역폭과 낮은 지연율을 제공하는 것이었다. 최근의 이더넷 기술의 발전은 IP 네트워크를 통해 스토리지 장치를 액세스하는 것이 가능해졌으며 백본망을 비롯한 기가비트 이더넷이 활성화된 오늘날의 네트워크 망에서 iSCSI를 이용한 스토리지 서비스가 활성화 될 것이다. 본 논문에서는 iSCSI의 기반이 되는 IP네트워크에서의 iSCSI의 성능을 분석한 내용을 기술한다.

  • PDF

DID based V2V Communication for Verifying Vehicle (자율주행 자동차 V2V 통신을 위한 DID 활용 메시지 전송 및 검증)

  • Jeong, Ki-Yeon;Jung, Seung Wook
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.11a
    • /
    • pp.322-325
    • /
    • 2021
  • 자율주행 자동차는 최근 들어 비약적인 발전을 거듭하고 있지만, 동시에 V2V, V2I 등 차량의 네트워킹에 따른 보안 문제에 대한 중요도 또한 함께 올라가고 있다. 이에 대비책으로 SCMS 를 중심으로 보안 기술이 발전하고 있지만, 중앙 데이터베이스에 대한 의존도는 여전히 높아 한 번의 보안 사고에도 심각한 피해가 우려되는 상황이다. 본 논문은 이러한 상황을 방지하기 위해 블록체인의 DID(Decentralized Identify, 탈중앙화 신원증명) 기술을 적용하는 방안을 설명하고, 그 예시로 긴급 차량에서의 DID 활용 방안을 제안한다.

A Study on the Trends of User Authentication Technology and its Future Application in Metaverse (사용자 인증 기술 동향과 메타버스에서의 적용 방향 연구)

  • Lee, Chan Hee;Azzaoui, Abir EL;Gang, Jeong-Ho;Park, Ji-Su;Park, Jong Hyuk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.11a
    • /
    • pp.216-218
    • /
    • 2022
  • 최근 공인인증서가 폐지되고 보다 발급이 간편하고 유효기간이 긴 사설인증서가 부상했다. 더불어 탈중앙화를 핵심 개념으로 하는 블록체인 기반 분산 신원 증명(Decentralized Identity, DID)기술이 대두되고 있다. 서비스 환경의 변화에 따라 사용자 인증 기술도 변화가 요구된다. 더욱이 메타버스라는 새로운 인터넷 환경이 조성되고 있는 바 현재 사용자 인증 기술의 동향을 살펴보고 미래에 사용자 인증이 나아갈 방향성을 제시하는 것은 의미가 있어 보인다. 본 논문에서는 사용자 인증 기술의 개요와 사용자 인증 기술의 변천과정을 시작으로 공개키 기반 구조(Public Key Infrastructure, PKI)와 분산 신원 증명을 중심으로 시장에서의 사용자 인증 기술의 동향을 살펴본다. 나아가 메타버스가 상용화되었을 시기에 사용자 인증 기술이 나아가야할 세가지 방향성(분산화, 플랫폼 초월, 생체 기반 인증 중심)을 제시한다.

The study of security management for application of blockchain technology in the Internet of Things environment (Focusing on security cases in autonomous vehicles including driving environment sensing data and occupant data) (사물인터넷 환경에서 블록체인 기술을 이용한 보안 관리에 관한 소고(주행 환경 센싱 데이터 및 탑승자 데이터를 포함한 자율주행차량에서의 보안 사례를 중심으로))

  • Jang Mook KANG
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.161-168
    • /
    • 2022
  • After the corona virus, as non-face-to-face services are activated, domain services that guarantee integrity by embedding sensing information of the Internet of Things (IoT) with block chain technology are expanding. For example, in areas such as safety and security using CCTV, a process is required to safely update firmware in real time and to confirm that there is no malicious intrusion. In the existing safe security processing procedures, in many cases, the person in charge performing official duties carried a USB device and directly updated the firmware. However, when private blockchain technology such as Hyperledger is used, the convenience and work efficiency of the Internet of Things environment can be expected to increase. This article describes scenarios in how to prevent vulnerabilities in the operating environment of various customers such as firmware updates and device changes in a non-face-to-face environment. In particular, we introduced the optimal blockchain technique for the Internet of Things (IoT), which is easily exposed to malicious security risks such as hacking and information leakage. In this article, we tried to present the necessity and implications of security management that guarantees integrity through operation applying block chain technology in the increasingly expanding Internet of Things environment. If this is used, it is expected to gain insight into how to apply the blockchain technique to guidelines for strengthening the security of the IoT environment in the future.

Thread Block Scheduling for GPGPU based on Fine-Grained Resource Utilization (상세 자원 이용률에 기반한 병렬 가속기용 스레드 블록 스케줄링)

  • Bahn, Hyokyung;Cho, Kyungwoon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.5
    • /
    • pp.49-54
    • /
    • 2022
  • With the recent widespread adoption of general-purpose GPUs (GPGPUs) in cloud systems, maximizing the resource utilization through multitasking in GPGPU has become an important issue. In this article, we show that resource allocation based on the workload classification of computing-bound and memory-bound is not sufficient with respect to resource utilization, and present a new thread block scheduling policy for GPGPU that makes use of fine-grained resource utilizations of each workload. Unlike previous approaches, the proposed policy reduces scheduling overhead by separating profiling and scheduling, and maximizes resource utilizations by co-locating workloads with different bottleneck resources. Through simulations under various virtual machine scenarios, we show that the proposed policy improves the GPGPU throughput by 130.6% on average and up to 161.4%.

Performance Evaluation of Disk Scheduling Schemes in a VOD System (VOD 시스템에서의 디스크 스케줄링 기법의 성능 평가)

  • Jeon, Yong-Hee;Lee, Sang-Hag
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.11
    • /
    • pp.3519-3533
    • /
    • 2000
  • In a VOD(Video-On-Demand) system, I/O performance and storage requirements are generally more important than computing capability, Due to the development of CPU tecnology, the gap between the performance of processors and desk speed are widening. Therefore, the disk system typically becomes the bohleneck ina VOD system. In order to allevte those effects from physical constramts, disk array system is used. The I/O performance of disk arrays can be improved by the capability of processors, I/O schefuling polcy, the number of member disks in the array, disk block size, block placemet method etc. In this paper, we considered the disk scheduling schemes including EDF( Earliest Deadine First), SCAN, SGAN-EDF, Round-robm. GSS(Grouped Sweeping scheme), and C-SCAN, LOOK, C-LOOK which are variations of SCAN Mamly focusing on those disk scheduling schemes, we performed the simulation in order to compare and eview the perionmance of disk arrays considening seveial related parameters under diverse environments and analyzed the effects of those parameters to the performance.

  • PDF

A Study on the PBL-based AI Education for Computational Thinking (컴퓨팅 사고력 향상을 위한 문제 중심학습 기반 인공지능 교육 방안)

  • Choi, Min-Seong;Choi, Bong-Jun
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.22 no.3
    • /
    • pp.110-115
    • /
    • 2021
  • With the era of the 4th Industrial Revolution, education on artificial intelligence is one of the important topics. However, since existing education is aimed at knowledge, it is not suitable for developing the active problem-solving ability and AI utilization ability required by artificial intelligence education. To solve this problem, we proposes PBL-based education method in which learners learn in the process of solving the presented problem. The problem presented to the learner is a completed project. This project consists of three types: a classification model, the training data of the classification model, and the block code to be executed according to the classified result. The project works, but each component is designed to perform a low level of operation. In order to solve this problem, the learners can expect to improve their computational thinking skills by finding problems in the project through testing, finding solutions through discussion, and improving to a higher level of operation.

The Analysis Methods Based on Patent Citation Networks for the Convergence Technologies Development Planning : A Case of Smart Factory's ICT Technologies (융합기술 개발전략 기획을 위한 특허 인용 네트워크 기반의 분석 방법론 : 스마트공장 ICT 기술을 중심으로)

  • Lee, Hyun-Min;Kim, Sun-Jae;Kim, Hong-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.1
    • /
    • pp.34-47
    • /
    • 2018
  • As interest in advanced countries regarding the convergence technology development increases, a methodology for identifying the core convergence technology that has a large spill-over effect on the technology and industry is required for the nation's competitiveness enhancement in the convergence technology field. Based on patent citation network analysis using 1,124 USPTO patents in the ICT convergence technology field of the smart factory, this study examined the proposed heterogeneous technology convergence index as a tool for measuring the convergence characteristics of the spillovers compared to other indexes (i.e. other sector ratio index and homogeneous technology convergence index). The proposed heterogeneous technology convergence index was used to investigate core technology sectors among ICT technology sectors of smart factory identified by government ministries. Results found 6 core ICT convergence technology sectors including the manufacturing execution analysis application sector. Also, this study conducted blockmodeling analysis using the IPC codes of patents in the manufacturing execution analysis application sector, and identified that the blocks representing the electronic communication and electric digital data processing technology sectors (Block 3 & 4) are related technology sectors which can be converged with core technology. Based on the findings, the implications for the convergence technology development planning of the smart factory field are discussed.

HFN-Based Right Management for IoT Health Data Sharing (IoT 헬스 데이터 공유를 위한 HFN 기반 권한 관리)

  • Kim, Mi-sun;Park, Yongsuk;Seo, Jae-Hyun
    • Smart Media Journal
    • /
    • v.10 no.1
    • /
    • pp.88-98
    • /
    • 2021
  • As blockchain technology has emerged as a security issue for IoT, technology which integrates block chain into IoT is being studied. In this paper is a research concerning token-based IoT service access control technology for data sharing, which propose a possessor focused data sharing technic by using the permissioned blockchain. To share IoT health data, a Hyperledger Fabric Network consisting of three organizations was designed to provide a way to share data by applying different access control policies centered on device owners for different services. In the proposed system, the device owner issues access control tokens with different security levels applied to the participants in the organization, and the token issue information is shared through the distributed ledger of the HFN. In IoT, it is possible to lightweight the access control processing of IoT devices by granting tokens to service requesters who request access to data. Furthmore, by sharing token issuance information among network participants using HFN, the integrity of the token is guaranteed and all network participants can trust the token. The device owners can trust that their data is being used within their authorized rights, and control the collection and use of data.

Global Technical Knowledge Flow Analysis in Intelligent Information Technology : Focusing on South Korea (지능정보기술 분야에서의 글로벌 기술 지식 경쟁력 분석 : 한국을 중심으로)

  • Kwak, Gihyun;Yoon, Jungsub
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.1
    • /
    • pp.24-38
    • /
    • 2021
  • This study aims to measure Korea's global competitiveness in intelligent information technology, which is the core technology of the 4th industrial revolution. For analysis, we collect patents of each field and prior patents cited by them, which are applied at the U.S. Patent Office (USPTO) between 2010 and 2018 from PATSTAT Online. A global knowledge transfer network was established by grouping citing- and cited-relationships at a national level. The in-degree centrality is used to evaluate technology acceptance, which indicates the process of absorbing existing technological knowledge to create new knowledge in each field. Second, to evaluate the impact of existing technological knowledge on the creation of new one, the out-degree centrality is investigated. Third, we apply the PageRank algorithm to qualitatively and quantitatively investigate the importance of the relationships between countries. As a result, it is confirmed through all the indicators that the AI sector is currently the least competitive.