Font Size: a A A

The Key Technologies Of The Tracking Algorithm Based On Linear-chain Version Of The Ip-san Disaster Recovery System

Posted on:2012-03-25Degree:MasterType:Thesis
Country:ChinaCandidate:J JiangFull Text:PDF
GTID:2208330332486647Subject:Computer Information Security
Abstract/Summary:PDF Full Text Request
The rapid development of computer and network greatly pushes the informationization processing and digitalization of the entire society. The failure of information protection will cause an unpredictable loss. The important step to lower the loss caused by disaster and to ensure the computer's consistent operation is disaster backup and disaster recovery. Data backup is the fundamental condition to recover from disaster. Even though the traditional local data recovery can solve the local damage, the local data storage cannot be retrieved if the local system suffers serious damage when facing large scale natural disasters or unexpected events. Under this circumstance, remote backup and recovery is needed.Based on special demands from current business, this thesis concentrates on Linear chain Version Trace about the key technology involved in IP-SAN storage network tolerant system and completes the following tasks:At first, provide comprehensive analysis on the major disaster recovery technology on the market, including system architecture, data compress backup technology, and data backup recovery strategy. This paper also summarizes the deficiency of current technology and provides some solution based on the analysis. In terms of system architecture, this paper proposes a remote disaster recovery technology based on IP-SAN, which connects the local disk equipment with all other hosts in the network. Therefore, it makes convenient for these hosts to access the local disk equipment.Second, propose delta compression algorithm based on greedy algorithm data backup compression. Compress files by using the redundant information between files. Algorithm is byte-level granularity. If one byte is changed in one page, simply need a command operator can will change the representation of the bytes show come out. And the rest of the page or files only need to use another command operator can be kept pointing parameter file linkAt last, Offer innovative delta algorithm based on Linear chain Version Trace for data recovery strategy in order to avoid calculating large amount of intermediate files. When recover one file version that is far away from a complete one, the new method calculates the delta file between the recovered one and the complete version rather than processing the intermediate files. Through the participation of the delta file and the complete file, the one that needs to recover can be calculated without going through the intermediate documents.
Keywords/Search Tags:Remote backup, Greedy algorithm, Delta compression, Linearchain version trace
PDF Full Text Request
Related items