期刊文献+

网络备份系统中的海量缓存方法 被引量:2

Mass buffer in network backup system
下载PDF
导出
摘要 提出一种在网络备份系统(network backup system,NBS)中的海量缓存方法。给出海量缓存的定义、使用目的和与备份代价密切相关的大小评估,并描述了一种基于MS Windows海量缓存设计与实现的方法,并对其性能进行了实验分析。由于网络传输与备份中心处理的延迟,使得本地I/O系统处理速度远远大于数据备份的速度,从而造成本地内存缓冲队列的大小越来越大。海量缓存方法就是通过借助大量的辅存来解决这个问题,当本地数据中心监控到数据变化后,会先把数据变化放入辅存中,然后再发送到远程备份中心。 This paper designed mass buffer in network backup system (NBS), provided the definition, purpose, size assessment related to the backup cost, the design and implementation of mass buffer. Because of the delay caused by network transmission and process in remote backup center, the I/O rate in the local host is much faster than that of data backup, which caused the memory buffer queue will be more and more large. This problem was solved by the method of mass buffer, which was supported by secondary storage. The changes of data would be first put into mass buffer, from which the data then would be send to remote backup center.
出处 《计算机应用研究》 CSCD 北大核心 2009年第1期9-10,29,共3页 Application Research of Computers
基金 国家"863"计划资助项目(2006AA01Z435) 国家自然科学基金资助项目(60573130 60502011) 国家教育部博士点基金资助项目(20070610032)
关键词 海量缓存 容灾 内核 mass buffer disaster tolerant kernel
  • 相关文献

参考文献9

  • 1QU Zhi-wei, CHEN Yan, ZHANG Zhen-hua,et al. Efficient data restoration for a disk-based network backup system [ C ]//Proc of IEEE International Conference on Mechatronics. 2004:452-458.
  • 2GARCIA-MOLINA H, POLYZOIS C A. Issues in disaster recovery [ C ]//Proc of the 35th IEEE Computer Society International Conferenceon. San Fransisco, CA: [s. n. ], 1990:573-577.
  • 3LAWLER C M, SZYGEN DA S A, THORNTON M A. Techniques for disaster tolerant information technology systems [ C ]//Proc of the 1 st Annual IEEE Systems Conference. 2007:1-6.
  • 4BROOKS C, McFARLANE P, POTT N, et al. IBM tivoli storage manager implementation guide [ M ]. 4th ed. [ S. l ] : International Business Machines, 2006.
  • 5CHEN Yan,QU Zhi-wei, ZHANG Zhen-hua,et al. Data redundancy and compress methods for a disk-based network backup system[ C ]//Proc of International Conference on Information Technology: Coding and Computing volume 2. Washington DC : IEEE Computer Society, 2004.
  • 6CEGIELA R. Selecting technology for disaster recovery [ C ]//Proc of International Conference on Dependability of Computer Systems. Washington DC : IEEE Computer Society, 2006 : 160-167.
  • 7余以胜.网络数据备份的代价评估模型[J].计算机技术与发展,2006,16(12):67-69. 被引量:3
  • 8SOLOMON D, RUSSINOVICH M. Microsoft Windows internals[ M ]. 4th ed. Washington : Microsoft Press, 2005.
  • 9DAMASCHKE P. On-line strategies for backups [ C ]//Proc of the 4th Italian Conference on Algorithms and Complexity. Berlin: Springer, 2002.

二级参考文献13

  • 1Farley M.SAN存储区域网络[M].第2版.孙功星,蒋文保,范勇等译.北京:机械工业出版社,2002:147-151.
  • 2Chervenak A L,Vellanki V,Kurmas Z,et al.Protecting File Systems:A Survey of Backup Techniques[C/OL]//Joint NASA and IEEE Mass Storage Conference.[s.l.]:[s.n.],1998.http://citeseer.ist.psu.edu/chervenak98protecting.html.
  • 3Wilder D.Review:Arkeia 5.2 network backup[EB/OL].2004-08.http://www.linuxjournal.com/artide/7303.
  • 4Cox L P,Murray C D,Noble B D.Peer-to-peer infrastructure:Pastiche:making backup cheap and easy[J].ACM SIGOPS Operating Systems Review,2002,36 (SI).285 -298.
  • 5O' Brien M.A Linux-Based Automatic Backup System[C/OL].2004-08.http://www2.linuxjoumal.com/article/4360.
  • 6Lomet D B.High speed on-line backup when using logical log operations[C]//ACM SIGMOD Record,Proceedings of the 2000 ACM SIGMOD international conference on Management of data.[s.l.]:[s.n.],2000:34-45.
  • 7Kurmas Z,Chervenak A L.Evaluating Backup Algorithms[EB/OL].http://citeseer.ist.psu.edu/430933.html.
  • 8VERITAS Software Corporation.VERITAS NetBackup(tm)DataCenter 4.5 System Administrator's Guide for Windows[EB/OL].2002-03.http://ftp.support.veritas.com/pub/support/products/NetBackup-DataCenter/246843.pdf.30 -000483-011.
  • 9Computer Associates Inrernational,Inc.Best Practices For Using BrightStor ARCserve Backup r11.1 and Microsoft Server VSS Hardware Snapshot[EB/OL].2204.http://www3.ca.com/Solutions/Collateral.asp? CID=64138&ID= 115.
  • 10IBM.Getting Started with Tivoli Storage Manager:Implementation Guide.IBM Redbooks SG24-5416-01[EB/OL].2005.http://www-900.ibm.com/cn/support/library/sw/Tivoli-Storage-Management.shtml.

共引文献2

同被引文献14

  • 1韩德志,谢长生,李怀阳.存储备份技术探析[J].计算机应用研究,2004,21(6):1-4. 被引量:49
  • 2柏银,李志蜀,朱兴东.MD5算法及其在远程身份认证中的应用[J].四川大学学报(自然科学版),2006,43(2):305-309. 被引量:19
  • 3郭向勇.SAN存储区域网络系统的构建策略与应用研究[J].计算机工程与设计,2006,27(10):1793-1796. 被引量:11
  • 4熊琦,王丽娜,王德军,赵大为.基于磁盘和SAN的网络数据备份模型[J].计算机工程,2007,33(4):233-235. 被引量:11
  • 5He X,Beedangari P, Zhou D.Performance evaluation of distribu- ted ISCSI RAID[C].Proceedings of the International Workshop on Storage Network Arichitecture and Parallel I/Os,2003.
  • 6Oney W.Programming the microsoft Windows driver-mode[M]. Washington:Microsoft Press,2007.
  • 7Ji M,Veitch A,Wilkes J.Seneca:remote mirroring done write[C]. San Antonio, TX, USA:Proceedings of the USENIX Technical Conference,2003:254-258.
  • 8LIU Lanjuan.SCM security solution based on SSL protocol,ser- vice operations and logistics, and Informatics[C].IEEE Interna- tional Conference on SOLI'06,2006:814-817.
  • 9Lawler C M,Szygenda S A,Thornton M A.Techniques for disas- ter tolerant information technology systems [C]. Honolulu, HI, United States:Proceedings of the 1st Annual IEEE Systems Con- ference,2007:333-338.
  • 10Wang Y L,Li Z H,Lin W.A fast disaster recovery mechanism for volume replication systems[C].Houston, TX, United States:The 3rd International Conference on High Performance Computing and Communications,2007:732-743.

引证文献2

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部