• Title/Summary/Keyword: Replication protocol

Search Result 31, Processing Time 0.024 seconds

An Effective Replication Protocol using Virtual Tree in Distributed Storage System (분산 저장시스템에서 가상 트리를 이용한 효율적인 복제 프로토콜)

  • Choi, Sung-Chune;Youn, Hee-Yong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05a
    • /
    • pp.173-176
    • /
    • 2003
  • 최근 분산 컴퓨팅 환경에서 데이터와 서비스의 복제는 통신비용의 감소, 데이터 가용성 증가, 그리고 단일 서버의 병목현상을 피하기 위해 필수적이다. 기존의 대표적인 복제 프로토콜로 네트워크를 논리적으로 구성하는 Tree quorum 프로토콜이 있다 Tree quorum프로토콜은 최선의 경우 가장 우수한 읽기 성능을 보이는 반면 트리의 높이가 증가할수록 노드의 수가 기하급수적으로 증가한다는 단점을 가지고 있다. 따라서 본 논문에서는 Tree quorum 프로토콜의 장점을 가지며, 급격한 노드 증가에 따른 성능 저하 문제를 해결하기 위한 가상 트리 프로토콜을 제안한다. 제안된 가상 트리 프로토콜은 안정된 삼각형 구조의 노드 구성과 가상 구조를 통한 Quorum 프로토콜의 사용으로 Tree quorum 프로토콜에 비해 적은 읽기 비용을 가지며, 적은 수의 노드 구성에서도 높은 읽기 가용성을 갖는다.

  • PDF

A Distributed Real-Time Concurrency Control Scheme using Transaction the Rise of Priority (트랜잭션 우선 순위 상승을 이용한 분산 실시간 병행수행제어 기법)

  • Lee, Jong-Sul;Shin, Jae-Ryong;Cho, Ki-Hyung;Yoo, Jae-Soo
    • Journal of KIISE:Databases
    • /
    • v.28 no.3
    • /
    • pp.484-493
    • /
    • 2001
  • As real-time database systems are extended to the distributed computing environment, the need to apply the existing real-time concurrency control schemes to the distributed computing environment has been made. In this paper we propose an efficient concurrency control scheme for distributed real-time database system. Our proposed scheme guarantees a transaction to commit at its maximum, reduces the restart of a transaction that is on the prepared commit phase, and minimizes the time of the lock holding. This is because it raises the priority of the transaction that is on the prepared commit phase in the distributed real-time computing environment. In addition, it reduces the waiting time of a transaction that owns borrowed data and improves the performance of the system, as a result of lending the data that the transaction with the raised priority holds. We compare the proposed scheme with DO2PL_PA(Distributed Optimistic Two-Phase Locking) and MIRROR(Managing Isolation in Replicated Real-time Object Repositories) protocol in terms of the arrival rate of transactions, the size of transactions, the write probability of transactions, and the replication degree of data in a firm-deadline real-time database system based on two-phase commit protocol. It is shown through the performance evaluation that our scheme outperforms the existing schemes.

  • PDF

Analysis of Nursing Studies about Stroke Research in Korea (뇌졸중에 관한 국내 간호학 논문의 분석)

  • Ham, Mi-Young;Choi, Kyung-Sook;Ryu, Eun-Jung
    • The Korean Journal of Rehabilitation Nursing
    • /
    • v.3 no.2
    • /
    • pp.154-168
    • /
    • 2000
  • This study was done to analyze the trends of research on stroke in Korea, to suggest future direction, for research on stroke. This article reviewed 75 nursing research papers on stroke done since 1990 to 2000 by examining them according to the period of publication or presentation, research design, type of subjects, measurement variables, the intervention outcome of experimental research, and theme of qualitative research. The research were as follows : 1. 26 of 75 studies were composed of master thesis and dissertation of graduate school. There were 53 nonexperimental research, 15 experimental research, and 7 qualitative studies design. 2. Stroke patients subject' Characteristic were 44 and Family and Spouses of caregiver support were 28 of total studies. 3. Most measurement instruments used for research were translated and redesigned it into Korean that developed by foreigners, and development measurement instruments used Kang's ADL. 4. Family support and Social support was shown the frequently among correlational research. 5. Methodological research were development of an evaluation tool for the quality of nursing care in stroke patients, caregiver support of development of nursing intervention list, and Home care Nursing Intervention protocol, and development of client selection criteria based on the needs of services to be offered. 6. The experimental research of intervention were mostly education nursing intervention, rehabilitation program on functional recovery, support nursing intervention, and applying a home care protocol on the nursing care intervention. 7. Theme of qualitative research were family experience, home care in family experience, soobal experience, illness experience, hope of Stroke patients and so on. Phenomenologic methodology and Granded Theory was designed of Qualitative research. On the basis of the above finding the following recommendations are made: 1. It's necessary to develop a reliable and variable measurement tool for stroke patients and family care of stroke patients. 2. It's necessary to study the comparison of Nursing Studies of stroke research abroad, the replication to establish the effect of nursing intervention stroke patients and family care of stroke patients.

  • PDF

Whole-mount in situ Hybridization of Mitochondrial rRNA and RNase MRP RNA in Xenopus laevis Oocytes

  • Jeong, Sun-Joo
    • Animal cells and systems
    • /
    • v.2 no.4
    • /
    • pp.529-538
    • /
    • 1998
  • In order to analyze the intracellu1ar localization of specific RNA components of ribonucleoproteins (RNP) in Xenopus oocytes, a modified protocol of whole-mount in situ Hybridization is presented in this paper, Mitochondria specific 12S rRNA probe was used to detect the amplification and distribution of mitochondria in various stages of the oocyte life cycle, and the results were found to be consistent with previously known distribution of mitochondria. The results with other specific probes (U1 and U3 small nuclear RNAs, and 5S RNA) also indicate that this procedure is generally effective in localizing RNAs in RNP complexes even inside organelles. In addition, the RNA component of RNase MRP, the RNP with endoribo-nuclease activity, localize to the nucleus in various stages of the oocyte life cycle. Some of MRP RNA, however, were found to be localized to the special population of mitochondria near the nucleus, especially in the active stage of mitochondrial amplification. It suggests dual localization of RNase MRP in the nucleus and mitochondria, which is consistent with the proposed roles of RNase MRP in mitochondrial DNA replication and in rRNA processing in the nucleolus.

  • PDF

A Secure Authentication Protocol of Nodes between Cluster based on ECC (ECC 기반의 클러스터간 노드들의 안전한 인증 프로토콜)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Lee, Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.2
    • /
    • pp.167-175
    • /
    • 2008
  • The current pre-distribution of secret keys uses a-composite random key and it randomly allocates keys. But there exists high probability not to be public-key among nodes and it is not efficient to find public-key because of the problem for time and energy consumption. We presents key establishment scheme designed to satisfy authentication and confidentiality, without the need of a key distribution center. Proposed scheme is scalable since every node only needs to hold a small number of keys independent of the network size, and it is resilient against node capture and replication due to the fact that keys are localized. In simulation result, we estimate process time of parameter used in proposed scheme and efficiency of Proposed scheme even if increase ECC key length.

  • PDF

A Hybrid Replication Protocol for Efficient and Secure Distributed System (효율적이고 안정한 분산시스템을 위한 하이브리드 복제 프로토콜)

  • Choi, Sung-Chune;Youn, Hee-Yong;Lee, Bo-Kyoung;Choi, Joong-Sup;Lee, Hyung-Su
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11a
    • /
    • pp.197-200
    • /
    • 2002
  • 최근 분산 컴퓨팅 환경에서 데이터와 서비스의 복제는 통신 비용의 감소, 데이터 가용성 증가, 그리고 단일 서버의 병목현상을 피하기 위해 필수적이다. 기존의 대표적인 복제 프로토콜로 네트워크를 논리적으로 구성하는 Tree quorum 프로토콜과 Grid 프로토콜이 있다. Tree quorum 프로토콜은 최선의 경우 가장 우수한 읽기 성능을 보이는 반면 트리의 높이가 증가할수록 노드의 수가 기하급수적으로 증가한다는 단점을 가지고 있다. Grid 프로토콜은 읽기 동작에 있어 높은 가용성을 가지는 반면 고장이 없는 환경에서도 같은 읽기 및 쓰기 성능을 보이는 단점을 가지고 있다. 따라서 본 논문에서는 기존의 복제 프로토콜이 가지는 문제점을 해결하고, 복제 노드의 추가와 삭제가 보다 용이한 하이브리드 복제 프로토콜을 제안한다. 제안된 복제 프로토콜은 같은 수의 노드를 갖는 tree quorum 프로토콜에 비해 적은 읽기 비용을 가지며, 효율적인 노드의 구성을 통해 기존 복제 프로토콜보다 높은 데이터의 가용성을 가진다.

  • PDF

A COMPARATIVE STUDY ON BLOCKCHAIN DATA MANAGEMENT SYSTEMS: BIGCHAINDB VS FALCONDB

  • Abrar Alotaibi;Sarah Alissa;Salahadin Mohammed
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.128-134
    • /
    • 2023
  • The widespread usage of blockchain technology in cryptocurrencies has led to the adoption of the blockchain concept in data storage management systems for secure and effective data storage and management. Several innovative studies have proposed solutions that integrate blockchain with distributed databases. In this article, we review current blockchain databases, then focus on two well-known blockchain databases-BigchainDB and FalconDB-to illustrate their architecture and design aspects in more detail. BigchainDB is a distributed database that integrates blockchain properties to enhance immutability and decentralization as well as a high transaction rate, low latency, and accurate queries. Its architecture consists of three layers: the transaction layer, consensus layer, and data model layer. FalconDB, on the other hand, is a shared database that allows multiple clients to collaborate on the database securely and efficiently, even if they have limited resources. It has two layers: the authentication layer and the consensus layer, which are used with client requests and results. Finally, a comparison is made between the two blockchain databases, revealing that they share some characteristics such as immutability, low latency, permission, horizontal scalability, decentralization, and the same consensus protocol. However, they vary in terms of database type, concurrency mechanism, replication model, cost, and the usage of smart contracts.

Implementation of High Performance Overlay Multicast Packet Forwarding Engine On NetFPGA (NetFPGA를 이용한 고성능 오버레이 멀티캐스트 패킷 전송 엔진 구현)

  • Jeon, Hyuk-Jin;Lee, Hyun-Seok;Jeong, Yong-Jin
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.49 no.6
    • /
    • pp.9-17
    • /
    • 2012
  • High-quality multimedia on the Internet has attracted attention because of its wide application area. IP multicast has been proposed as a solution to use efficient network resources in these services. However, IP multicast has not been commonly used due to a number of practical issues such as security and management. As an alternative, an overlay multicast routing which is performed in upper protocol layers on legacy networks without changing hardware has been presented. Yet, the maximum data transmission capacity of the overlay multicast is not sufficient for real time transmission of multimedia data. In this paper, we have implemented an overlay multicast engine on NetFPGA which allows us to perform packet replication and tunneling which need high-speed. In addition, we have implemented extra portions which need low-speed in software. From now on, we will progress research which increase the number of terminal spots which can be replicated by improvement and amplify throughputs by optimization.

BeanFS: A Distributed File System for Large-scale E-mail Services (BeanFS: 대규모 이메일 서비스를 위한 분산 파일 시스템)

  • Jung, Wook;Lee, Dae-Woo;Park, Eun-Ji;Lee, Young-Jae;Kim, Sang-Hoon;Kim, Jin-Soo;Kim, Tae-Woong;Jun, Sung-Won
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.4
    • /
    • pp.247-258
    • /
    • 2009
  • Distributed file systems running on a cluster of inexpensive commodity hardware are being recognized as an effective solution to support the explosive growth of storage demand in large-scale Internet service companies. This paper presents the design and implementation of BeanFS, a distributed file system for large-scale e-mail services. BeanFS is adapted to e-mail services as follows. First, the volume-based replication scheme alleviates the metadata management overhead of the central metadata server in dealing with a very large number of small files. Second, BeanFS employs a light-weighted consistency maintenance protocol tailored to simple access patterns of e-mail message. Third, transient and permanent failures are treated separately and recovering from transient failures is done quickly and has less overhead.

The Security Vulnerabilities of 5G-AKA and PUF-based Security Improvement (5G 인증 및 키합의 프로토콜(5G-AKA)의 보안취약점과 PUF 기반의 보안성 향상 방안)

  • Jung, Jin Woo;Lee, Soo Jin
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.3-10
    • /
    • 2019
  • The 5G network is a next-generation converged network that combines various ICT technologies to realize the need for high speed, hyper connection and ultra low delay, and various efforts have been made to address the security vulnerabilities of the previous generation mobile networks. However, the standards released so far still have potential security vulnerabilities, such as USIM deception and replication attack, message re-transmission attack, and race-condition attack. In order to solve these security problems, this paper proposes a new 5G-AKA protocol with PUF technology, which is a physical unclonable function. The proposed PUF-based 5G-AKA improves the security vulnerabilities identified so far using the device-specific response for a specific challenge and hash function. This approach enables a strong white-list policy through the addition of inexpensive PUF circuits when utilizing 5G networks in areas where security is critical. In addition, since additional cryptographic algorithms are not applied to existing protocols, there is relatively little burden on increasing computational costs or increasing authentication parameter storage.