期刊文献+

军事信息系统容灾备份策略仿真研究 被引量:5

Simulation and Researching of Disaster Backup Strategy of Military Information System
下载PDF
导出
摘要 研究军事信息系统容灾备份的数据部署分配策略,针对现有民用容灾备份机制不能满足军事信息系统多点易损和强动态性的问题,根据灾备需求,构建数学模型,并利用MATLAB对策略中的各种参数设置进行仿真研究,采用备份节点选择的优化算法。首先,仿真研究了备份节点数量与抗毁恢复效果之间的关系,给出备份节点合理设置点;其次,仿真研究了文件粒度与恢复效果稳定性以及文件恢复完整性的关系,给出粒度设置的相关原则;最后提出了基于D-S证据合成规则的数据流向概率算法,解决了强动态性下备份节点选择的难点问题,并经仿真证明,用提出的策略,系统抗毁恢复效果显著提高。 Strategy of data deployment and distribution in military information system disaster backup was studied. Military information system has the characteristics of multiple-point vulnerability and dynamic, to which the current civilian disaster backup mechanism cannot resolve well. By analyzing demands of disaster backup, mathematic analy- sis model was built up, and by using MATLAB, the way of setting up the parameters in the strategy and algorithm of backup points choosing was simulated and researched. Firstly, we studied the relation between backup points and re- cover effects, and gave out the optimized setting. Secondly, we studied the relation between piece size and the stabili- ty of recovering effect, and gave out the relative setting principle of the piece size. At last, based on D-S evidence theory, a probability algorithm of data directing was proposed and proved by simulating experiment, which can resolve the problem of backup points choosing. It turns out very effective.
出处 《计算机仿真》 CSCD 北大核心 2013年第1期23-27,共5页 Computer Simulation
关键词 军事信息系统 容灾备份 策略 证据理论 Military information system Disaster backup Strategy D-S evidence theory
  • 相关文献

参考文献11

二级参考文献46

共引文献382

同被引文献46

  • 1赵宗昌.浅谈钢铁企业信息系统的容灾[J].冶金自动化,2023,47(S01):473-477. 被引量:1
  • 2卢正添,李涛,赵奎,胡晓勤,彭凌西,刘才铭.多点多跳的数据库异地容灾备份方法[J].四川大学学报(工程科学版),2008,40(5):125-129. 被引量:4
  • 3曲法义,王小刚,崔乃刚,王常虹.基于惯导/GPS/视觉的无人机容错相对导航方法[J].中国惯性技术学报,2013,21(6):781-785. 被引量:10
  • 4曹毅,苗德成,路建伟,胥少卿.联合防空侦察预警系统探测能力浅析[J].系统工程与电子技术,2006,28(2):253-256. 被引量:11
  • 5Jeong H, Albert R, Barabasi A L. Error and attack tolerance of complex networks[J]. Nature, 2000,406 (6) :1378-382.
  • 6Suto K, Nishiyama H, Kato N, et al. A method to construct an attack and fault tolerant scalable distribu- ted network[C] // Proceedings of the 4th International Conference on Communications, Mobility, and Com puting (CMC 2012). Guilin: IEEE,2012:128-139.
  • 7Yazdani N,Herrmann H, Daolio F, et al. EA optimi- zation of networks against malicious attaeks[C] /// Pro- ceedings of Evolution Artificielle (EA 2011). Abgers: Gteseer: 306-317.
  • 8Alexander F V. Modeling and optimization approaches for ensuring robustness in networked and financial sys- tems[D]. Florida: University of Florida, 2012.
  • 9Yu Hongliang,Xiang Xiajia,Zhao Ying,et al.BIRDS:a bare-metal recovery system for instant restoration of dataservices[J].IEEE Trans on Computers,2014,63(6):1392-1407.
  • 10Zhang Liangping,Wang Weixing.Constructions on disas-ter tolerant backup system of management information sys-tem[C]//ICCSE 2011.Singapore:IEEE Press,2011:425-427.

引证文献5

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部