期刊文献+

一种基于存储虚拟化的异步远程镜像系统 被引量:5

An Asynchronous Remote Mirror System Based on Storage Virtualization
下载PDF
导出
摘要 信息数据在当今社会中的重要性日益提高.远程镜像系统通过配置冗余的硬件和相应的高可靠软件,能够保证信息系统的数据安全.但是,已有的远程镜像系统都部分存在着依赖于专用设备或底层驱动、性能差等不足.该文提出一种应用于存储区域网络环境的、基于存储虚拟化的异步远程镜像系统.首先,设计了异步镜像逻辑卷,作为虚拟化的数据容器,该卷能够自动追踪并异步传输数据更新,节省网络带宽,同时不依赖于任何的底层设备和驱动.其次,提出了一种不间断服务的异步镜像协议,支持服务在镜像主节点和从节点间的无缝迁移,支持灾难发生和灾后恢复时主从节点的自动切换和不间断服务,同时,协议完全在镜像节点内执行,不影响客户主机的性能.最后,针对镜像卷的读写特点,设计了基于锁的镜像卷访问控制机制,既保证数据一致性,又能在此前提下尽可能提高读写并发性.FTPtrace(文件传输服务跟踪记录)的重放实验证明,在人为引入主节点失效的情况下,服务能够无缝迁移;在主节点灾后数据恢复进行的同时,能够保证服务不间断;最后,FTPTrace的重放流程在"主节点失效-服务迁移-灾后恢复"场景下仅比无故障时多花费14%的时间. Computerized data becomes more and more critical in today's digital life. Remote mirror can keep information systems alive with redundant hardware and software, even encountering site corruptions. Unfortunately, existing mirror systems have some limitations such as relying on specific storage devices, poor performance, and so on. This paper presents a storage virtualiza- tion based asynchronous remote mirror system. First, in this system, all data are protected by a logical container, that is, an asynchronous mirror logical volume, which can trace and transfer data updating automatically. This way, there is no device and driver dependency at all. Secondly, this paper presents an advanced non-stop mirror protocol to support seamless service switching when site corruption happens and automatic data recovery at rebuilding process after disaster. In addition, all the protocol can be executed on mirror IO nodes in SAN, introducing little overhead to the protected servers. Finally, it gives design on lock based concurrent access control meeha-. nism for the asynchronous mirror logical volume. With the help of the lock, not only data consis- tency can be maintained, but also good concurrent read/write performance can be achieved. Ex- periments and evaluation results demonstrate that the prototype system has the ability to provide high reliability while only introduce little overhead: tolerated a site corruption while kept provi- ding service, costing only 14% more time.
出处 《计算机学报》 EI CSCD 北大核心 2009年第10期1905-1914,共10页 Chinese Journal of Computers
基金 国家"九七三"重点基础研究发展规划项目基金(2007CB311100)资助
关键词 异步镜像逻辑卷 增量卷 主/从节点 asynchronous mirror logical volume increment logical volume primary/secondary sites
  • 相关文献

参考文献7

  • 1Veritas Volume Replicator Option by Symantec--A Guide to Understanding Volume Replicator, Engineering White Paper, Symantec, 2006.
  • 2Michail F, Angelos B. Clotho: Transparent data versioning at the block I/O level//Proceedings of the 21st IEEE Conference on Mass Storage Systems and Technologies (MSST 04). Greenbelt, Maryland, USA. IEEE Computer Society, 2004: 315-328.
  • 3Akshat V, Kaladhar V, Ramani R, Rohit J. SWEEPER: An efficient disaster recovery point identification mechanism// Proceedings of the USENIX File and Storage Technologies (FAST 08). San Jose, California, USA. USENIX Association, 2008:297-312.
  • 4EMC SRDF: Zero data loss solutions for extended distance replication. EMC Corporation: Technical Report P/N 300- 006-714, REV A03, 2009.
  • 5Hugo P, Stephen M, Mike F, Dave H, Steve K, Shane O. SnapMirror: File system based asynchronous mirroring for disaster recovery//Proceedings of the USENIX File and Storage Technologies (FAST 02). Monterey, California, USA. USENIX Association, 2002:117-129.
  • 6Hitz D, Lau D, Malcolm M. File system design for an NFS file server appliance//Proceedings of the 1994 Winter USENIX Technical Conference. San Francisco, California, USA. USENIX Association, 1994: 235-245.
  • 7Minwen J, Alistair V, John W. Seneca: Remote mirroring done write//Proceedings of the USENIX Annual Technical Conference (USENIX 03). San Antonio, Texas, USA. USENIX Association, 2003:253-268.

同被引文献42

  • 1王敏,李静,范中磊,许鲁.一种虚拟化资源管理服务模型及其实现[J].计算机学报,2005,28(5):856-863. 被引量:29
  • 2张尧学.透明计算:概念、结构和示例[J].电子学报,2004,32(F12):169-174. 被引量:48
  • 3张建华,李涛,张楠.Web页面防篡改及防重放机制[J].计算机应用,2006,26(2):327-328. 被引量:13
  • 4符广全,王海峰,陆建德.基于文件过滤驱动的内核病毒防火墙技术[J].计算机应用与软件,2006,23(7):121-123. 被引量:10
  • 5Michail F, Angelos B. Clotho: Transparent Data Versioning at the Block I/O Level[C]//Proc. of MSST’04. College Park, USA: IEEE Computer Society, 2004.
  • 6Xiao Weijun, Liu Yinan, Yang Qing, et al. Implementation and Performance Evaluation of Two Snapshot Methods on iSCSI Target Stores[C]//Proc. of MSST’06. College Park, USA: IEEE Computer Society, 2006.
  • 7Xiao Weijun, Ren Jin, Yang Qing. A Case for Continuous Data Protection at Block Level in Disk Array Storages[J]. IEEE Trans. on Parallel and Distributed System, 2009, 20(6): 898-911.
  • 8Yang Qing, Xiao Weijun, Ren Jin. TRAP-array: A Disk Array Architecture Providing Timely Recovery to Any Point-in- time[C]//Proc. of ISCA’06. Boston, USA: IEEE Computer Society, 2006.
  • 9Ji Minwen, Alistair V, John W. Seneca: Remote Mirroring Done Write[C]//Proc. of USENIX’03. San Antonio, USA: [s. n.], 2003.
  • 10Chen P M, Lee E K, Gibson G A, et al. RAID: High- performance, Reliable Secondary Storage[J]. ACM Computing Surveys, 1994, 26(2): 145-185.

引证文献5

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部