• DocumentCode
    2188296
  • Title

    TSPSCDP: A Time-Stamp Continuous Data Protection Approach Based on Pipeline Strategy

  • Author

    Liu, Jingning ; Yang, Tianming ; Li, Zuoheng ; Zhou, Ke

  • Author_Institution
    Sch. of Comput. Sci. & Technol., Huazhong Univ. of Sci. & Technol., Wuhan
  • fYear
    2008
  • fDate
    27-28 Dec. 2008
  • Firstpage
    96
  • Lastpage
    102
  • Abstract
    Traditional cold backup technology can not fight against data loss between two consecutive backups which usually has a time span of 24 hours. Hot backup technology, such as snapshot decreases the amount of potential data loss, but still cannot completely prevent data loss. More recently, a new technology called continuous data protection (CDP) is emerging to provide more powerful data protection. CDP captures every change to the data volume hence can provide any point-in-time data views and enable timely recovery to any point-in-time of user data. However, existing implementations of CDP usually suffer from poor write performance and cannot meet the data protection demand of some high performance application environments. How to improve the CDP performance in terms of write throughput and response time is one of the most important considerations in implementing CDP. This paper presents a time-stamp pipeline strategy continuous data protection approach called TSPSCDP which uses pipeline strategy in write operation of CDP to improve data processing capability. Our experiments demonstrated that TSPSCDP can not only recover data to any point-in-time upon a failure but also improve the CDP performance in terms of write throughput and respond time upon the ordinary CDP by a factor of 2 and about 25% respectively.
  • Keywords
    back-up procedures; security of data; system recovery; TSPSCDP; backup technology; data loss; data processing capability; data recovery; point-in-time data views; time-stamp pipeline strategy continuous data protection; write operation; write throughput; Availability; Computer science; Computer science education; Data storage systems; Delay; Educational technology; File systems; Pipelines; Protection; Throughput; Continuous Data Protection; Data Protection; Pipeline Strategy; Time-Stamp;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Frontier of Computer Science and Technology, 2008. FCST '08. Japan-China Joint Workshop on
  • Conference_Location
    Nagasahi
  • Print_ISBN
    978-1-4244-3418-3
  • Type

    conf

  • DOI
    10.1109/FCST.2008.27
  • Filename
    4736515