• Title/Summary/Keyword: 오류 복구 기법

Search Result 92, Processing Time 0.023 seconds

An Adaptive FEC Algorithm for Mobile Wireless Networks (이동 무선 네트워크의 전송 성능 향상을 위한 적응적 FEC 알고리즘)

  • Ahn, Jong-Suk;John Heidmann
    • The KIPS Transactions:PartC
    • /
    • v.9C no.4
    • /
    • pp.563-572
    • /
    • 2002
  • Wireless mobile networks tend to drop a large portion of packets due to propagation errors rather than congestion. To Improve reliability over noisy wireless channels, wireless networks can employ forward error correction (FEC) techniques. Static FEC algorithms, however, can degrade the performance by poorly matching their overhead to the degree of the underlying channel error, especially when the channel path loss rate fluctuates widely. This paper investigates the benefits of an adaptable FEC mechanism for wireless networks with severe packet loss by analytical analysis or measurements over a real wireless network called sensor network. We show that our adaptive FEC named FECA (FEC-level Adaptation) technique improves the performance by dynamically tuning FEC strength to the current amount of wireless channel loss. We quantify these benefits through a hybrid simulation integrating packet-level simulation with bit-level details and validate that FECA keeps selecting the appropriate FEC-level for a constantly changing wireless channel.

The Error-Handling Strategies of RAID for Data Availability (데이터 가용성(HA)의 효율적인 지원을 위한 RAID 에러 핸들링 정책)

  • Kang, Dong-Jae;Bak, Yu-Hyeon;Kim, Young-Ho;Kim, Chang-Soo;Shin, Bum-Joo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04a
    • /
    • pp.365-368
    • /
    • 2002
  • 본 논문에서는 SANtopiaVM의 데이터 가용성 및 성능을 고려한 에러 핸들링 정책을 제안한다. 제안하는 에러 핸들링 정책은 RAID1과 RAID5에 대한 정책으로 추분하며 에러 발생시의 복구를 위하여 RAID1에서는 FBB(Failed Block Bitmap)라는 비트맵을 추가하여 데이터의 일관성을 유지하고 디스크의 복구 시에는 저기 연산에 대한 부하 분산 및 복구 비용을 감소시키는 쓰기 연산을 제안함으로서 에러 핸들링 시에 입출력 비용을 줄인다. RAID5에서는 추가적인 여분 디스크를 사용한 Sparing Disk 기법을 제안함으로서 디스크 에러 모드에서도 정상 모드의 성능에 근접하는 입출력 성능을 보장하며 빠른 디스크 복구를 지원한다. 제안하는 에러 핸들링 정책은 SANtopiaVM RAID의 오류 발생시, 시스템 성능의 급격한 저하를 완화할 수 있으며 에러로부터 빠른 복구를 지원함으로서 데이터에 대한 효율적인 고 가용성의 특징을 제공한다.

  • PDF

A Study on an Error Sharing Agent for Multimedia CSCW (멀티미디어 컴퓨터 지원 협력 작업에서 오류 공유 에이전트에 관한 연구)

  • Ko Eung-Nam
    • Journal of Digital Contents Society
    • /
    • v.3 no.2
    • /
    • pp.235-243
    • /
    • 2002
  • This paper explains the design and implementation of the ESA(Error Sharing Agent). ESA is a system that is suitable for detecting, sharing and recovering software error based on multimedia CSCW(Computer Supportes Cooperated Work). This system consists of an ED, ES, and ER. ED detects an error by hooking techniques. ES is an agent which is an error sharing system for distributed multimedia collaboration environment With error sharing system, a group cooperating users can share error applications. From the perspective of multimedia collaborative environment, an error application becomes another interactive presentation error is shared with participants engaged in a cooperative work. We propose how an error application can be treated as 'media' in a multimedia collaborative environment.

  • PDF

Region-Based Error Concealment of Depth Map in Multiview Video (영역 구분을 통한 다시점 영상의 깊이맵 손상 복구 기법)

  • Kim, Wooyeun;Shin, Jitae;Oh, Byung Tae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.12
    • /
    • pp.2530-2538
    • /
    • 2015
  • The pixel value of depth image is depth value so that different objects which are placed on nearby position have similar pixel value. Moreover, the pixels of depth image have distinct pixel values compared to adjacent pixels while those of color image has very similar values. Accordingly distorted depth image of multiview video plus depth (MVD) needs proper error concealment methods considering the characteristics of depth image when transmission errors are happened. In this paper, classifying regions of depth image to consider edge directions and then applying adaptive error concealment methods to each region are proposed. Recovered depth images utilize with multiview video data to synthesize intermediate-view point video. The synthesized view is evaluated by objective quality metrics to demonstrate proposed method performance.

Differential Fault Attack on SSB Cipher (SSB 암호 알고리즘에 대한 차분 오류 공격)

  • Kang, HyungChul;Lee, Changhoon
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.1
    • /
    • pp.48-52
    • /
    • 2015
  • In this paper, we propose a differential fault analysis on SSB having same structure in encryption and decryption proposed in 2011. The target algorithm was designed using advanced encryption standard and has advantage about hardware implementations. The differential fault analysis is one of side channel attacks, combination of the fault injection attacks with the differential cryptanalysis. Because SSB is suitable for hardware, it must be secure for the differential fault analysis. However, using proposed differential fault attack in this paper, we can recover the 128 bit secret key of SSB through only one random byte fault injection and an exhausted search of $2^8$. This is the first cryptanalytic result on SSB having same structure in encryption and decryption.

Differential Fault Analysis of the Block Cipher LEA (블록 암호 LEA에 대한 차분 오류 공격)

  • Park, Myungseo;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1117-1127
    • /
    • 2014
  • Differential Fault Analysis(DFA) is widely known for one of the most powerful method for analyzing block cipher. it is applicable to block cipher such as DES, AES, ARIA, SEED, and lightweight block cipher such as PRESENT, HIGHT. In this paper, we introduce a differential fault analysis on the lightweight block cipher LEA for the first time. we use 300 chosen fault injection ciphertexts to recover 128-bit master key. As a result of our attack, we found a full master key within an average of 40 minutes on a standard PC environment.

An Error Control Scheme for Variable Length Traffic on Round Robin Style Real-Time Networks (라운드 로빈 실시간 네트워크에서의 가변 길이 트래픽을 위한 오류제어 기법)

  • Lee, Jung-Hoon
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.3
    • /
    • pp.277-285
    • /
    • 2002
  • This paper proposes and analyzes an error control scheme for the transmission control based real-time communication, such as FDDI, TDMA, and wireless LAN, which delivers the message according to the round robin fashion after the off-line bandwidth allocation. Taking into account the time constraint of each message, the proposed error control scheme makes the receiver transmit the error report via asynchronous traffic while the sender resend the requested message via overallocated access time which is inevitably introduced by the bandwidth allocation procedure for hard real -time guarantee. The error control procedure does not interfere other real -time message transmissions. In addition, as each frame contains the size of the message it belongs, the receiver can recognize the end of completion of message transmission. This enables earlier error report to the receiver so that the sender can cope with more network errors. The analysis results along with simulation performed via SMPL show that the proposed scheme is able to enhance the deadline meet ratio of messages by overcoming the network errors. Using the proposed error control scheme, the hard real -time network can be built at cost lower than, but performance comparable to the expensive dual link network.

Alternative LSP Allocation for Considering QoS in MPLS Networks (MPLS 망에서 QoS를 고려한 복구경로 할당)

  • 양형규;이병호
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.5
    • /
    • pp.11-18
    • /
    • 2004
  • In this paper, we propose the alternative LSP allocation for MPLS networks required more confidence. In the first place, we must classify the user traffics by the QoS parameter. We assigned altermative LSPs on realtime traffics and then allocated alternative LSPs of non-realtime traffics. The proposed algorithm can provide more confidential alternative LSP by priority method for relatively high cost realtime traffic error. And the proposed algorithm can improve the shortage of network resources what is occured by using a few links when altermative LSPs are setup. The validity of the proposed algorithm has been justified in performance by analysis through simulation results using the program tool and comparison with conventional methods. Also, that improves 9% more than existing method in the recovery ratio-one is 89%, the other is 98%, respectively.

A Checkpointing and Error Recovery Algorithm Based on 2-Phase Commit Protocol for Distributed Transaction (분산 트랜잭션 처리 시스템에서 2-단계 확인 프로토콜을 근거로 하는 검사점 설정 및 오류 복구 알고리즘)

  • Park, Yun-Yong;Jeon, Seong-Ik;Jo, Ju-Hyeon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.2
    • /
    • pp.327-338
    • /
    • 1996
  • In this paper, we present a new checkpointing algorithm to preserve the consistency of resources in distributed transaction processing systems, and the error recovery algorithms to recover form the failure. In comparison with the existed algorithms, the checkpointing algorithm proposed in this paper can minimize the interference of the distributed transaction and the stroage cost during checkpointing, and does not need the extra message to make th checkpoint. Also we show that the error recovery algorithms prevent the distributed transaction with a partial fault from spreading the fault, which calls domnio-effect and prevent them from restarting cyclically. And we describe the correctness and the performane of the proposed algorithms.

  • PDF

SOAR : Storage Reliability Analyzer (SOAR : 저장장치를 기반으로 하는 시스템의 신뢰성 분석도구 개발)

  • Kim, Young-Jin;Won, You-Jip;Kim, Ra-Kie
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.35 no.6
    • /
    • pp.248-262
    • /
    • 2008
  • As the number of large size multimedia files increases and the importance of individual's digital data grows, storage devices have been advanced to store more data into smaller spaces. In such circumstances, a physical damage in a storage device can destroy large amount of important data. Therefore, it is needed to verify the robustness of various physical faults in storage device before certain systems are used. We developed SOAR(Storage Reliability Analyzer), Storage Reliability Analyzer, to detect physical faults in diverse kinds of HDD hardware components and to recover the systems from those faults. This is a useful tool to verify robustness and reliability of a disk. SOAR uses three unique methods of creating physical damages on a disk and two unique techniques to apply the same feature on file systems. In this paper, we have performed comprehensive tests to verify the robustness and reliability of storage device with SOAR, and from the verification result we could confirm SOAR is a very efficient tool.