• Title/Summary/Keyword: Backup

Search Result 530, Processing Time 0.028 seconds

A Coevolutionary Algorithm for Working and Backup Virtual Path Routing (운용가상경로와 대체가상경로의 동시 설정을 위한 공진화 알고리듬)

  • 김여근;곽재승
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.23 no.4
    • /
    • pp.187-201
    • /
    • 1998
  • In ATM networks with high capacity, the effect of failures on transmission links or nodes can be catastrophic, so that the issue of survivability is of great importance. In this paper. we consider the routing problem for working and backup virtual paths(VPs). To accomplish a higher survivability. routing the two kinds of VPs should be taken into account at the same time because backup VP routing depends on the working VP routing. A coevolutionary algorithm is employed to solve the problem for simultaneously routing of working and backup VPs. To develop an efficient coevolutionary algorithm for the problem. structure of populations, encoding method, neighborhood, and genetic operators are studied in this paper. The results of extensive experiments are reported. The performance comparison of the proposed algorithm with a conventional genetic algorithm and existing heuristics shows that our approach is promising.

  • PDF

Full-scale experimental evaluation of a panelized brick veneer wall system under simulated wind loading

  • Liang, Jianhai;Memari, Ali M.
    • Structural Engineering and Mechanics
    • /
    • v.38 no.1
    • /
    • pp.99-123
    • /
    • 2011
  • Brick veneer over steel stud backup wall is lighter and easier to construct compared to brick veneer over concrete masonry backup wall. However, due to the relatively low stiffness of the steel stud backup, the brick veneer tends to crack under wind load. This paper briefly introduces a new panelized brick veneer with steel frame backup wall system that is developed to potentially address this problem. The experimental study of the performance of this system under simulated wind loading is discussed in detail. The test setup details and the test specimens are introduced, results of major interests are presented, and performance of the new system is evaluated based on the test results.

An Improved Shared-Path Protection Algorithm for Double-Link Failures in Meshed WDM Optical Networks

  • Wang, Xingwei;Guo, Lei;Li, Lemin;Wei, Xuetao
    • Journal of Communications and Networks
    • /
    • v.10 no.3
    • /
    • pp.331-337
    • /
    • 2008
  • In this paper, we investigate survivability in wavelength division multiplexing (WDM) mesh networks and propose a new algorithm called improved shared-path protection (ISPP) to completely tolerate the double-link failures. Compared with previous algorithms for protecting double-link failures, i.e., shared-path protection (SPP) and shared-link protection (SLP), the advantage of ISPP is to allow primary paths and backup paths to share the mixed wavelength-links based on the proposed new rules in which some primary wavelength-links can be changed to mixed wavelength-links, which can be shared by primary paths and backup paths. In addition, some mixed wavelength-links also can be shared by different backup paths for saving resources. Simulation results show that ISPP algorithm performs better in resource utilization ratio and blocking probability than conventional SPP and SLP algorithms.

Study of Alternative Navigation Systems for GNSS in South Korea

  • Yu, Dong-Hui
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.5
    • /
    • pp.524-527
    • /
    • 2010
  • As the GPS(Global Positioning System) vulnerabilities were introduced, alternative systems to GPS backup have been studied for several years. Enhanced Loran(eLoran) as the worldwide ground-based supplementary radio navigation system was recommended as the cost effective alternative to GPS backup. Many efforts on adoption of eLoran as GPS backup have been presented. The US has been the leading role and announced that 70% enhancement for eLoran was established last year. However, the Obama administration cut off the eLoran budget on the fiscal year 2010 budget proposal while GAO's reports submitted that GPS service gap would be possible just some years later. Besides the US's condition, there are still many positive opinions on eLoran to GPS backup. This paper introduces the historical and technical aspects of eLoran and Korea's research topics.

Hierarchical Identity-based Broadcast Encryption Scheme from LWE

  • Yang, Chunli;Zheng, Shihui;Wang, Licheng;Lu, Xiuhua;Yang, Yixian
    • Journal of Communications and Networks
    • /
    • v.16 no.3
    • /
    • pp.258-263
    • /
    • 2014
  • A hierarchical identity-based broadcast encryption (H-IBBE) scheme is an identity-based broadcast encryption (IBBE) scheme in a hierarchical environment. In order to obtain secure H-IBBE schemes in the quantum era, we propose an H-IBBE scheme based on the learning with errors problemassumption.Our scheme achieves indistinguishability from random under adaptive chosen-plaintext and chosen-identity attacks in the random oracle model.

Optimal policies for batch control operations in Information Systems (정보시스템 관리에 있어서 최적 배치 조정 정책)

  • 김기수
    • Korean Management Science Review
    • /
    • v.11 no.1
    • /
    • pp.145-163
    • /
    • 1994
  • For an Information System to be successful the continual control of the database system(DBS) is very important. In general, such control operations are performed periodically in batches, even in real time systems. We explain DBS related such control operations and describe the decision problem in each of them. Specifically, backup, checkpointing, reorganization, and batch update operations are considered. Then we develop a general model of the batch backup situation to determine the optimal backup timing. Other operations are considered as special cases of the general batch backup operation are derived and compared. We show that, in general, the control limit policy is superior to the fixed time interval policy in terms of the long-run average cost per unit time. Some practical considerations about the implementation of optimal policies are also mentioned.

  • PDF

A Three-Tier BGP Backup Routing (3단 BGP 백업 라우팅)

  • Suh, Chang-Jin
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.6
    • /
    • pp.745-752
    • /
    • 2005
  • BGP is a unique routing protocol in broadband internet. It chooses routing paths considering internet hierarchy and local policies. As BGP routers selectively bypass routing information to a subset of neighboring BGP routers, connectivity by way of a series of links between source and destination nodes does not mean reachability of routing information of the two. In emergency when BGP routers or links over wide range are not available, BGP routers have to use links that are not normally used to keep reachability. This paper listed out the requirements for BGP backup routing and proposed a routing solution that hides most demerits in currently published ones. The proposed backup operates in three tiers according to network damage. Under this rule, BGP routers use tier-0 routing paths at normal. If networks are impaired, they choose tier-1 paths. If networks are seriously damaged, tier-2 paths are allowed to use. Also this paper proves that the proposed backup guarantees stability and safeness. As results, the proposed backup is very adaptive to light network damages as well as serious ones and provides strong routing reachability at all times.

A Study on Mobile Forensic Data Acquisition Method Based on Manufacturer's Backup Mobile App (모바일 포렌식 증거 수집방안 연구: 제조사 백업 앱 기반 데이터 획득 기법)

  • Choi, Jaewon;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.95-110
    • /
    • 2018
  • With the widespread use of smartphones, various personal information of users is being recorded on a smartphone in real time. For the purpose of preventing the loss of important personal information of users, manufacturer provides a smartphone backup applications. Recently, not only backup programs for PC but also backup mobile apps for smart phones have been provided. From the point of view acquiring forensic data, it is important not to compromise the acquisition possibilities and the integrity of the original data. Especially, in the case of Android smartphones, various studies are being carried out to acquire the data without damaging the integrity of the original data. However, there are limitations to apply the existing research methods. In this paper, we describe the process of acquiring data using the backup mobile app provided by the manufacturer without compromising the integrity of the latest smartphone.

Design and Implementation of Selective Data Management System (선택적 자료 관리 시스템 설계 및 구현)

  • Kweon, Dae-Gon;Choi, Shin-Hyeong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.3
    • /
    • pp.67-72
    • /
    • 2006
  • Because computer system is complex gradually from fast growth of the Internet and sudden increase of Internet user and scale is growing, and dependence for computer system is rising gradually, data damage by mistake or disaster is big enough to can not imagine. Usually is continuous if wish to inform through internet and must update data stably, we should manage so that precious data is not erased from sudden problem through periodic backup. Plan to protect data safely for this should be readied. This paper proposes system that can make effective backup environment because consider environment and achievement method in these data management side. That is, implements system that achieve data backup and restore selectively in internet. Backup and restore about data had stored through browser even if disconnect directly to server because it is possible connect in internet by advantage of proposing system are available. Also, This system can manage data stored to server more efficiently by using selectively both backup and restore two methods.

  • PDF

A Stability Verification of Backup System for Disaster Recovery (재해 복구를 위한 백업 시스템의 안정성 검증)

  • Lee, Moon-Goo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.9
    • /
    • pp.205-214
    • /
    • 2012
  • The main thing that IT operation managers consider is protecting assets of corporation from system failure and disaster. Therefore, this research proposed a backup system for a disaster recovery. Previous backup method is that if database update occurs, this record is saved in redo log, and if the size of record file is over than expected, this file is saved in archive log in order. Thus, it is possible to occur errors of data loss from the process of data backup which change in real time while changes of database occur. Suggested backup system is back redo log up to database of transaction log in real time, and back a record that can be omitted from previous backup method up to archive log. When recover the data, it is possible to recover redo log in real time online, and it minimizes data loss. Also, throughout multi thread processing method data recovery is performed and it is designed that system performance is improved. To verify stability of backup system CPN(Coloured Petri Net) is introduced, and each step of backup system is displayed in diagram form, and th e stability is verified based on the definition and theorem of CPN.