Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30576
NSBS: Design of a Network Storage Backup System

Authors: Xinyan Zhang, Zhipeng Tan, Shan Fan

Abstract:

The first layer of defense against data loss is the backup data. This paper implements an agent-based network backup system used the backup, server-storage and server-backup agent these tripartite construction, and the snapshot and hierarchical index are used in the NSBS. It realizes the control command and data flow separation, balances the system load, thereby improving efficiency of the system backup and recovery. The test results show the agent-based network backup system can effectively improve the task-based concurrency, reasonably allocate network bandwidth, the system backup performance loss costs smaller and improves data recovery efficiency by 20%.

Keywords: Agent, network backup system, NSBS, three architecture model

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1109513

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1759

References:


[1] Weng zongcheng, Li zhanhuai, Zhu Liping. Research on Key Technologies of remote disaster tolerant system. Computer processing, 2009, (1)147-150.
[2] G. Gonnet. Expected length of the longest probe sequence in hash code searching. Journal of the ACM, 28(2):289, 304, April 1981.
[3] C. Mohan, Kent Treiber. Algorithms for the Management of Remote Backup Data Bases for Disaster Recovery. in: Proc. Ninth International Conference on Data Engineering. Vienna, 1993.511~518.
[4] Richard P. King, Nagui Halim. Management of a Remote Backup Copy for Disaster Recovery. ACM Transactions on Database Systems, 1991,16(2):38~368.
[5] Jim Gray. What Next? A Dozen Information-Technology Research Goals. Journal of the ACM, 2003,50(1):41~57.
[6] Karl Larson. Improving Availability in VERITAS Environments. in: the 14th USENIX System Administration Conference, New Orleans: USENIX Association,2000.59~66.
[7] W. Curtis Preston. De-dupe and Disk Backups-What you need to know before taking the plunge. SearchStorage.com,2008.
[8] Hector Garcia-Molina, Christos A. Polyzois. Issues in disaster recovery. in: Proc. IEEE Compcon Sprint ’90. Thirty-Fifth IEEE Computer Society International Conference. San Francisco,CA,1990.573~577.
[9] Data Domain. Disk-Based Backup and Recovery with Unprecedented Reliablity and High Performance at the Cost of Tape. LEGATO Networker DiskBackup Option & Data Domain DD200 Restore, 2004.1~16.
[10] Jon William Toigo. Disaster Recovery Planning: Strategies for Protecting Critical Information Assets. Second Edition. USA: Prentice Hall, 1999.12~14.
[11] Roselinda R. Schulman. Disaster Recovery Issues and Solutions. Hitachi Data Systems white paper WHP-2, 2004.2~6.
[12] Zhiwei Qu, Yan Chen, Zhenhua Zhang etc. Efficient Data Restoration for A Disk-based Network Backup System. in: Proc. Of the IEEE International Conference on Mechatronics, 2004:584~590.
[13] K.Keeton, C.Santos, D.Beyer, J.Chase, J.Wilkes. Designing for disasters. in: Proc. of 3rd Conference on File and Storage Technologies, San Francisco,CA,2004:59~62.
[14] L. Shrira, H. Xu. Thresher. An efficient storage manager for copy-on-write snapshots. in: Procedings of USENIX Annual Technical Conference. Boston, MA, USA, 2006.57~70.
[15] Kwangho Cha, Jin-Soo Kim and Seungryoul Maeng. snapPVFS: Snapshot-able Parallel Virtual File System. in: the 14th IEEE International Conference on Parallel and Distributed Systems. Victoria, Australia, 2008.221~228.
[16] Cunhua Qian, Syouji Nakamura and Toshio Nakagawa. Optimal Backup Policies for a Database System with Incremental Backup. Electronics and Communications in Japan, 2002, 85(4):1~9.
[17] Hugo Patterson, Stephen Manley, Mike Federwisch et al. SnapMirror: File System Based Asynchronous Mirroring for Disaster Recovery. in: Proceedings of the FAST 2002 Conference on File and Storage Technologies. Monterey, California: USENIX Association, 2002.81~91.
[18] Qing Yang, Weijun Xiao, Jin Ren. TRAP-Array: A Disk Array Architecture Providing Timely Recovery to Any Point-in-time. In Proceedings of ISCA: The 33rd Annual International Symposium on Computer Architecture, Boston, USA, 2006: 289~301.
[19] Jingning Liu, Tianming Yang, Zuoheng Li, Ke Zhou. TSPSCDP: A Time-Stamp Continuous Data Protection Approach Based on Pipeline Strategy. Frontier of Computer Science and Technology (FCST), Japan-China joint, 2008: 96~102.
[20] Barry Kadleck, Nigel Bentley, Michael Dann etc. IBM Tivoli Storage Manager Version 5.1: Technical Guide. International Business Machines Corporation, April 2002.
[21] Keiper C. NetApp SnapMirror Block Level Incremental Backup to Tape with NetVault Backup (J). Quest Software, 2012.Microsoft. Introduction to Microsoft System Center Data Protection Manager 2006 White Paper.
[22] Buchannan S, Hedblom R, Gomaa I. Microsoft System Center Data Protection Manager 2012 Sp1(M). Packt Publishing Ltd, 2013.
[23] Viega J, Messier M, Chandra P. Network Security with OpenSSL: Cryptography for Secure Communications (M). "O'Reilly Media, Inc.", 2002.