• Title/Summary/Keyword: Storage Server

Search Result 464, Processing Time 0.023 seconds

A study on the Construction of Remote Status Display Software for Soft-RAID system of Linux based Server (리눅스 기반 서버의 소프트-RAID 시스템용 원격 상태 표시 소프트웨어의 구성에 관한 연구)

  • Na, Won-Shik;Lee, Hyun-Chang
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.1
    • /
    • pp.97-102
    • /
    • 2019
  • In this paper, we propose a method to remotely intuitively identify faults found in storage devices in soft-RAID used in a server system composed of Linux. To do this, we analyze the principle and problem of fault reporting method in the soft-RAID system of Linux OS and suggest the state of storage devices in remote Internet Home-page. The proposed method consists of a method of displaying images on the Internet home-page, so that it can be arranged freely when creating a home-page, and the image data is composed of external files, so it is bery convenient to edit and replace images In order to verify the effectiveness of the proposed method, we have confirmed that the state of each storage device can be confirmed at a long distance without any major addition to the Home-page configuration.

Design of a Request Pattern based Video Proxy Server Management Technique for an Internet Streaming Service (인터넷 스트리밍 서비스를 위한 요청 기반 비디오 프록시 서버 관리 기법의 설계)

  • Lee, Jun-Pyo;Cho, Chul-Young;Lee, Jong-Soon;Kim, Tae-Yeong;Kwon, Cheol-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.6
    • /
    • pp.57-64
    • /
    • 2010
  • Due to the limited storage space in video proxy server, it is often required to replace the old video data which is not serviced for long time with the newly requested video. This replacement causes the service delay and increase of network traffic. To circumvent this problem, we propose the an efficient replacement scheme in a video proxy server. In addition, we present a video data management technique for decreasing the number of replacement in video proxy server. For this purpose, we employ a memory in video proxy server. If the video segment which is loaded in memory is requested once again by a different user, this segment is resided in memory. The video in the memory is stored in the video proxy server depending on the consuming pattern by users. The simulation results show that the proposed algorithm performs better than other algorithms in terms of packet hit rate and number of packet replacement.

A Predictive Virtual Machine Placement in Decentralized Cloud using Blockchain

  • Suresh B.Rathod
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.60-66
    • /
    • 2024
  • Host's data during transmission. Data tempering results in loss of host's sensitive information, which includes number of VM, storage availability, and other information. In the distributed cloud environment, each server (computing server (CS)) configured with Local Resource Monitors (LRMs) which runs independently and performs Virtual Machine (VM) migrations to nearby servers. Approaches like predictive VM migration [21] [22] by each server considering nearby server's CPU usage, roatative decision making capacity [21] among the servers in distributed cloud environment has been proposed. This approaches usage underlying server's computing power for predicting own server's future resource utilization and nearby server's resource usage computation. It results in running VM and its running application to remain in waiting state for computing power. In order to reduce this, a decentralized decision making hybrid model for VM migration need to be proposed where servers in decentralized cloud receives, future resource usage by analytical computing system and takes decision for migrating VM to its neighbor servers. Host's in the decentralized cloud shares, their detail with peer servers after fixed interval, this results in chance to tempering messages that would be exchanged in between HC and CH. At the same time, it reduces chance of over utilization of peer servers, caused due to compromised host. This paper discusses, an roatative decisive (RD) approach for VM migration among peer computing servers (CS) in decentralized cloud environment, preserving confidentiality and integrity of the host's data. Experimental result shows that, the proposed predictive VM migration approach reduces extra VM migration caused due over utilization of identified servers and reduces number of active servers in greater extent, and ensures confidentiality and integrity of peer host's data.

Design and Implementation of a Large-Scale Mail Server using Source IP Address Forwarding (발신지 IP 주소 포워딩을 이용한 메일 서버의 설계 및 구현)

  • 송영호;권택근
    • Journal of Korea Multimedia Society
    • /
    • v.5 no.3
    • /
    • pp.307-315
    • /
    • 2002
  • As growing the population of the Internet, e-mail should provide various types of media, and the size of e-mail including multimedia data becomes larger and larger Furthermore, the multimedia e-mail has been used through various communication terminals including mobile devices. The main objectives of this thesis is designing and Implementing efficient mail server which should provide high performance and scalability in terms of storage capacity and the number of mail users. This thesis proposes a cluster-based mail server architecture which has a load-balance node using. If address forwarding for distributing incoming mail messages into distributed mail server nodes.

  • PDF

A Lightweight Pseudonym Authentication and Key Agreement Protocol for Multi-medical Server Architecture in TMIS

  • Liu, Xiaoxue;Li, Yanping;Qu, Juan;Ding, Yong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.924-944
    • /
    • 2017
  • Telecare Medical Information System (TMIS) helps the patients to gain the health monitoring information at home and access medical services over the mobile Internet. In 2015, Das et al proposed a secure and robust user AKA scheme for hierarchical multi-medical server environment in TMIS, referred to as DAKA protocol, and claimed that their protocol is against all possible attacks. In this paper, we first analyze and show DAKA protocol is vulnerable to internal attacks, impersonation attacks and stolen smart card attack. Furthermore, DAKA protocol also cannot provide confidentiality. We then propose a lightweight pseudonym AKA protocol for multi-medical server architecture in TMIS (short for PAKA). Our PAKA protocol not only keeps good security features declared by DAKA protocol, but also truly provides patient's anonymity by using pseudonym to protect sensitive information from illegal interception. Besides, our PAKA protocol can realize authentication and key agreement with energy-saving, extremely low computation cost, communication cost and fewer storage resources in smart card, medical servers and physical servers. What's more, the PAKA protocol is proved secure against known possible attacks by using Burrows-Abadi-Needham (BAN) logic. As a result, these features make PAKA protocol is very suitable for computation-limited mobile device.

Design and Implementation of Distributed File Transfer Server (파일 공유를 위한 분산 파일 서버 설계 및 구현)

  • 박주영;고석주;강신각
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.614-618
    • /
    • 2002
  • Although there are a lot of file sharing mechanisms in the Internet such as NFS and P2P, FTP is one of the most common mechanisms used until now. In this paper, we propose a more enhanced file sharing mechanism, the Distributed File Server (DFS) method. The most remarkable feature of DFS is that it can be simply adopted in the current Internet FTP services by locating a DFS node between existing FTP servers and clients without changing any existing file transfer environment. To verify the proposed mechanism we implemented a DFS prototype on RedHat 7.2 system and we finally show that it can reduce the file storage problem caused by big-sized multimedia data.

  • PDF

Implementation and Application of PML Server for Vehicle Information Management in RFID Environment (RFID 기반의 차량 정보 관리용 PML 서버 구현 및 적용)

  • Oh, Won-Rock;Lee, Sung-Keun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.2 no.2
    • /
    • pp.83-91
    • /
    • 2007
  • The purpose of this paper is developing a PML server which is capable of saving and managing effectively the information of vehicles using RFID technology in the logistical and distributive environment. The PML server logs and manages the real-time static and dynamic information about the vehicles in EPC code format which is represented by XML schema and transmitted by the RFID reader to the server. It receives information from SAVANT the RFID middleware and transmits the data to the traffic information management application The main system we developed consists of the EPC data registry, query processor, data converter, vehicle product and instance data storage, system management tool and application API parts.

  • PDF

Resource Optimization for Mixed Service of IVOD and NVOD in a Muli-level VOD Network (IVOD와 NVOD 혼합 서비스를 위한 다계층 VOD망의 자원 최적화)

  • Cho, Myeong-Rai;Kim, Yeo-Keun;Cho, Geon
    • IE interfaces
    • /
    • v.11 no.2
    • /
    • pp.39-48
    • /
    • 1998
  • It is strongly believed that Video on Demand(VOD) will become one of the most promising services for Broadband Integrated Services Digital Network(B-ISDN). VOD service can be classified into two types of services: Near VOD(NVOD) and Interactive VOD(IVOD). Although VOD network requires many kinds of resources, we only consider video servers, programs. and storages. In the network. some video servers should be installed at some nodes(especially, at the root node for NVOD service). so that each node with video server stores video programs and distributes stored programs to customers. We take into account three kinds of costs related with the above resources: a program transmission cost, a program storage cost, and a video server installation cost. There exists a trade-off relationship among those three costs according to the locations of video servers and the kinds of programs stored at each video server. Given a multi-level VOD network and the total number of programs being served in the network. the resource. optimization problem for providing both IVOD and NVOD services is to determine where to install video servers, and which and how many programs should be stored at each video server, in order to minimize the total cost. In this paper we develop an efficient dynamic programming algorithm to solve the problem. We also implement the algorithm based on two different service policies assumed in this paper.

  • PDF

OASIS : Large-scale, wide-area storage system based on IP (OASIS : IP 기반의 대규모 광역 스토리지 시스템)

  • Kim, Hong-Yeon;Kim, Young-Chul;Jin, Ki-Sung;Kim, Young-Kyun;Lee, Mi-Young
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.11a
    • /
    • pp.275-279
    • /
    • 2004
  • In this paper, a large-scale, wide-area storage system based on IP is proposed which is under development. OASIS is a storage system enforced with very high-scalability up to hundreds and thousands of clients over IP network, and it is able to extend the service to the wide area network. For this purpose, we adopt an storage interconnection technology based on IP, the object based storage technology and a clustered server architecture which provides high-scalability and availability to our system. This system can be utilized to provide network storage service which gains more reality with the incoming FTTH and WiBro services.

  • PDF

A Role-based Storage Encryption for the Electronic Approval System of Battle Management Systems (전장관리체계 전자결재시스템을 위한 역할기반 스토리지 암호화 기법)

  • Her, Kyoung-Soon;Lee, Soo-Jin
    • Journal of the military operations research society of Korea
    • /
    • v.37 no.1
    • /
    • pp.71-85
    • /
    • 2011
  • The most important factors of Electronic approval system of battle management system are availability and reliability. Therefore, the electronic approval system uses a SAN(storage area network) to construct the reliable server and storage. In this paper, we analyze the security vulnerabilities of the SAN storage that stores the critical military information in the electronic approval system of battle management system. Based on the analysis, we verify the possibility of information leakage by the inside attackers through the scenario-based experiment. And we finally propose a new storage encryption algorithm on the basis of user's role that can prevent the leakage of information by the inside attackers.