Published September 2, 2015 | Version 10002702
Journal article Open

NSBS: Design of a Network Storage Backup System

Description

The first layer of defense against data loss is the backup
data. This paper implements an agent-based network backup system
used the backup, server-storage and server-backup agent these
tripartite construction, and the snapshot and hierarchical index are
used in the NSBS. It realizes the control command and data flow
separation, balances the system load, thereby improving efficiency of
the system backup and recovery. The test results show the agent-based
network backup system can effectively improve the task-based
concurrency, reasonably allocate network bandwidth, the system
backup performance loss costs smaller and improves data recovery
efficiency by 20%.

Files

10002702.pdf

Files (1.1 MB)

Name Size Download all
md5:30eef13c996aab1ba6f78c2447b151d9
1.1 MB Preview Download

Additional details

References

  • Weng zongcheng, Li zhanhuai, Zhu Liping. Research on Key Technologies of remote disaster tolerant system. Computer processing, 2009, (1)147-150.
  • G. Gonnet. Expected length of the longest probe sequence in hash code searching. Journal of the ACM, 28(2):289, 304, April 1981.
  • C. Mohan, Kent Treiber. Algorithms for the Management of Remote Backup Data Bases for Disaster Recovery. in: Proc. Ninth International Conference on Data Engineering. Vienna, 1993.511~518.
  • Richard P. King, Nagui Halim. Management of a Remote Backup Copy for Disaster Recovery. ACM Transactions on Database Systems, 1991,16(2):38~368.
  • Jim Gray. What Next? A Dozen Information-Technology Research Goals. Journal of the ACM, 2003,50(1):41~57.
  • Karl Larson. Improving Availability in VERITAS Environments. in: the 14th USENIX System Administration Conference, New Orleans: USENIX Association,2000.59~66.
  • W. Curtis Preston. De-dupe and Disk Backups-What you need to know before taking the plunge. SearchStorage.com,2008.
  • Hector Garcia-Molina, Christos A. Polyzois. Issues in disaster recovery. in: Proc. IEEE Compcon Sprint '90. Thirty-Fifth IEEE Computer Society International Conference. San Francisco,CA,1990.573~577.
  • Data Domain. Disk-Based Backup and Recovery with Unprecedented Reliablity and High Performance at the Cost of Tape. LEGATO Networker DiskBackup Option & Data Domain DD200 Restore, 2004.1~16. [10] Jon William Toigo. Disaster Recovery Planning: Strategies for Protecting Critical Information Assets. Second Edition. USA: Prentice Hall, 1999.12~14. [11] Roselinda R. Schulman. Disaster Recovery Issues and Solutions. Hitachi Data Systems white paper WHP-2, 2004.2~6. [12] Zhiwei Qu, Yan Chen, Zhenhua Zhang etc. Efficient Data Restoration for A Disk-based Network Backup System. in: Proc. Of the IEEE International Conference on Mechatronics, 2004:584~590. [13] K.Keeton, C.Santos, D.Beyer, J.Chase, J.Wilkes. Designing for disasters. in: Proc. of 3rd Conference on File and Storage Technologies, San Francisco,CA,2004:59~62. [14] L. Shrira, H. Xu. Thresher. An efficient storage manager for copy-on-write snapshots. in: Procedings of USENIX Annual Technical Conference. Boston, MA, USA, 2006.57~70. [15] Kwangho Cha, Jin-Soo Kim and Seungryoul Maeng. snapPVFS: Snapshot-able Parallel Virtual File System. in: the 14th IEEE International Conference on Parallel and Distributed Systems. Victoria, Australia, 2008.221~228. [16] Cunhua Qian, Syouji Nakamura and Toshio Nakagawa. Optimal Backup Policies for a Database System with Incremental Backup. Electronics and Communications in Japan, 2002, 85(4):1~9. [17] Hugo Patterson, Stephen Manley, Mike Federwisch et al. SnapMirror: File System Based Asynchronous Mirroring for Disaster Recovery. in: Proceedings of the FAST 2002 Conference on File and Storage Technologies. Monterey, California: USENIX Association, 2002.81~91. [18] Qing Yang, Weijun Xiao, Jin Ren. TRAP-Array: A Disk Array Architecture Providing Timely Recovery to Any Point-in-time. In Proceedings of ISCA: The 33rd Annual International Symposium on Computer Architecture, Boston, USA, 2006: 289~301. [19] Jingning Liu, Tianming Yang, Zuoheng Li, Ke Zhou. TSPSCDP: A Time-Stamp Continuous Data Protection Approach Based on Pipeline Strategy. Frontier of Computer Science and Technology (FCST), Japan-China joint, 2008: 96~102. [20] Barry Kadleck, Nigel Bentley, Michael Dann etc. IBM Tivoli Storage Manager Version 5.1: Technical Guide. International Business Machines Corporation, April 2002. [21] Keiper C. NetApp SnapMirror Block Level Incremental Backup to Tape with NetVault Backup (J). Quest Software, 2012.Microsoft. Introduction to Microsoft System Center Data Protection Manager 2006 White Paper. [22] Buchannan S, Hedblom R, Gomaa I. Microsoft System Center Data Protection Manager 2012 Sp1(M). Packt Publishing Ltd, 2013. [23] Viega J, Messier M, Chandra P. Network Security with OpenSSL: Cryptography for Secure Communications (M). "O'Reilly Media, Inc.", 2002.