Font Size: a A A

The Research And Implementation Of Disaster Recovery System And Management Tool Based On Internet

Posted on:2005-07-04Degree:MasterType:Thesis
Country:ChinaCandidate:K ZhaoFull Text:PDF
GTID:2168360152955178Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the development of information technology,data is very important to enterprises. However, without a special disaster recovery plan, the data is very likely to be lost or damaged by the nature disasters or human mistakes and the losses are huge. Data backup is currently the most important technology to protect data from losing. Although traditional data backup technologies are effective to protect data in common conditions, it is not enough when large-scale disaster occurs such as earth earthquakes, wars, terrors and so on. The reason is that these technologies can not save data and its copies on different sites seperatly, in other words, these technologies are not incapable of recovering disaster in different places. Disaster recovery systems are mostly based on SAN or NAS currently. SAN covers the maximum distance, ranging from 10km to 100km, but it's too expensive for average users while NAS is only suitable for local storage.This paper studies how to construct an inexpensive, effective, safe and distance-free disaster recovery system. Based on the systematic summarization of the relevant work on data storage, network transfer and data security, this paper carries a research on the structure, configuration, management of disaster recovery system and the transfer of data through Internet. As a result of these studies, a disaster recovery system named Disaster Rescue Center (DRC) based on Internet is realized.The achievements of this paper are as follows:Realizes a cross-platform, distance-free, high-performance, and inexpensive disaster recovery system based on Internet. The requirement of remote backup server is by far lower than local server, and one remote backup server can serve for several local servers. Remote backup center can be delegated to qualified ISP to save costs.Transfers data over VPN, which ensures the secrecy in data transmission over Internet.The system can automatically switch when errors happen and restore when the errors are eliminated. When there's something wrong with the local server, the remote server provides services automatically. When the local server recovers, the data in remote server is synchronized to the local server. Then the local server provides services again. Realizes digital watermark log. All operations of administrator are recorded in system log, and digital watermark technology is used to ensure accountability and integrity, which makes the log an authorative way for computer forensic.Realizes a convenient configuration tool, with which the administrator can easily configure network interfaces, system parameters, directories and files to be mirrored and so on.Realizes an intuitionist monitor interface by which the administrator can judge to which extent the data in local and remote data center are consistent. And the administrator can monitor the status of servers, gateways in local and remote data centers and find any abnormal case in time.Realizes a simple and friendly management interface. The mirroring services can be started or stopped by a few simple operations. And the content to be mirrored can be easily changed by a few simple operations also.Presents a model to mirror large files on Internet, it can run both in synchronous mode and asynchronous mode and adapt to the various network conditions. moreover, it has excellent, controllable, configurable fault tolerance. Moreover, it is a real time model when the network is in good condition.In April 2003, the system was authenticated by the experts organized by Sichuan Science & Technology Department. The experts appraised that the archivement is the first offsite and cross-platform disaster recovery system based on Internet domestically and lead the field of technology in china.
Keywords/Search Tags:Internet, Data backup, Disaster recovery, Fault-tolerance, Authentication, Digital watermark
PDF Full Text Request
Related items