Font Size: a A A

The Research And Implentation Of A Mirror Disaster System Based On Continuous Data Protection

Posted on:2011-02-07Degree:MasterType:Thesis
Country:ChinaCandidate:L LiFull Text:PDF
GTID:2178330338990034Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Nowadays, increasingly factors are posing a threat to data security of computer system. Due to the importance of data, individuals and enterprises suffer from the loss of data corruption. Although numerous data recovery technologies have been developed, they cannot meet people's demands for data security. In addition, considering the limitation of recovery technologies themselves, some research relative to them is widely launched in these years to accelerate the development of data recovery technology.Mirror, one of solutions to the data disaster, has been widely used. Individuals are paying close attention to Continuous Data Protection (CDP) which has been forgotten for a long time as an effective way to improve data recoverability.However, the role of a single data recovery technology is limited. In this paper, we present TH-CDPS which is a data protection method integrating with Mirror technology through analyzing several problems of CDP deeply. Eventually, a precise prototype is designed and implemented.TH-CDPS is built on Mirror and CDP and it is suitable for enterprises or individuals who may have special need of RTO (Recovery Time Objective) and RPO (Recovery Point Objective). Based on a special structure of metadata, the solution is to solve problems how to select data when recovering data and deleting data and to enhance the system performance in many aspects including three recovery modes (Recovery when Reading, Ergodic Recovery and Recovery to Select Backward), Improved Binary Search and Self-adaption I/O Request Algorithm. Besides TH-CDPS expands its functions by proposing a new concept called Multi-Time-Axis (groups of data with same original status will show different data status after running for the same long time under different conditions).Finally, we make a test for TH-CDPS to prove the solution feasible and show those technologies available.
Keywords/Search Tags:Continuous Data Protection, Mirror, Redirect-on-Write, virtual device
PDF Full Text Request
Related items