DocumentCode :
2188296
Title :
TSPSCDP: A Time-Stamp Continuous Data Protection Approach Based on Pipeline Strategy
Author :
Liu, Jingning ; Yang, Tianming ; Li, Zuoheng ; Zhou, Ke
Author_Institution :
Sch. of Comput. Sci. & Technol., Huazhong Univ. of Sci. & Technol., Wuhan
fYear :
2008
fDate :
27-28 Dec. 2008
Firstpage :
96
Lastpage :
102
Abstract :
Traditional cold backup technology can not fight against data loss between two consecutive backups which usually has a time span of 24 hours. Hot backup technology, such as snapshot decreases the amount of potential data loss, but still cannot completely prevent data loss. More recently, a new technology called continuous data protection (CDP) is emerging to provide more powerful data protection. CDP captures every change to the data volume hence can provide any point-in-time data views and enable timely recovery to any point-in-time of user data. However, existing implementations of CDP usually suffer from poor write performance and cannot meet the data protection demand of some high performance application environments. How to improve the CDP performance in terms of write throughput and response time is one of the most important considerations in implementing CDP. This paper presents a time-stamp pipeline strategy continuous data protection approach called TSPSCDP which uses pipeline strategy in write operation of CDP to improve data processing capability. Our experiments demonstrated that TSPSCDP can not only recover data to any point-in-time upon a failure but also improve the CDP performance in terms of write throughput and respond time upon the ordinary CDP by a factor of 2 and about 25% respectively.
Keywords :
back-up procedures; security of data; system recovery; TSPSCDP; backup technology; data loss; data processing capability; data recovery; point-in-time data views; time-stamp pipeline strategy continuous data protection; write operation; write throughput; Availability; Computer science; Computer science education; Data storage systems; Delay; Educational technology; File systems; Pipelines; Protection; Throughput; Continuous Data Protection; Data Protection; Pipeline Strategy; Time-Stamp;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Frontier of Computer Science and Technology, 2008. FCST '08. Japan-China Joint Workshop on
Conference_Location :
Nagasahi
Print_ISBN :
978-1-4244-3418-3
Type :
conf
DOI :
10.1109/FCST.2008.27
Filename :
4736515
Link To Document :
بازگشت