The Community for Technology Leaders
RSS Icon
Issue No.12 - December (2009 vol.58)
pp: 1615-1625
Qing Yang , University of Rhode Island, Kingston
Jin Ren , Huazhong University of Science and Technology, Wuhan
Changsheng Xie , Huazhong University of Science and Technology, Wuhan
Huaiyang Li , Huazhong University of Science and Technology, Wuhan
This paper presents a comprehensive study on implementations and performance evaluations of two snapshot techniques: copy-on-write snapshot and redirect-on-write snapshot. We develop a simple Markov process model to analyze data block behavior and its impact on application performance, while the snapshot operation is underway at the block-level storage. We have implemented the two snapshots techniques on both Windows and Linux operating systems. Based on our analytical model and our implementation, we carry out quantitative performance evaluations and comparisons of the two snapshot techniques using IoMeter, PostMark, TPC-C, and TPC-W benchmarks. Our measurements reveal many interesting observations regarding the performance characteristics of the two snapshot techniques. Depending on the applications and different I/O workloads, the two snapshot techniques perform quite differently. In general, copy-on-write performs well on read-intensive applications, while redirect-on-write performs well on writeintensive applications.
Data storage, data protection, snapshot, copy-on-write, redirect-on-write.
Qing Yang, Jin Ren, Changsheng Xie, Huaiyang Li, "Design and Analysis of Block-Level Snapshots for Data Protection and Recovery", IEEE Transactions on Computers, vol.58, no. 12, pp. 1615-1625, December 2009, doi:10.1109/TC.2009.107
[1] A.L. Chervenak, V. Vellanki, and Z. Kurmas, “Protecting File Systems: A Survey of Backup Techniques,” Proc. Joint NASA and IEEE Mass Storage Conf., Mar. 1998.
[2] M. Ji, A. Veitch, and J. Wilkes, “Seneca: Remote Mirroring Done Write,” Proc. 2003 USENIX Ann. Technical Conf., pp. 253-268, 2003.
[3] M. Zhang, Y. Liu, and Q. Yang, “Cost- Effective Remote Mirroring Using the iSCSI Protocol,” Proc. 21st IEEE Conf. Mass Storage Systems and Technologies, pp. 385-398, Apr. 2004.
[4] The 451 Group, “Total Recall: Challenges and Opportunities for the Data Protection Industry,” reportsexecutive_summary.php?id=218 , May 2006.
[5] W. Xiao and Q. Yang, “Can We Really Recover Data If Storage Subsystem Fails?” Proc. 28th Int'l Conf. Distributed Computing Systems (ICDCS '08), June 2008.
[6] Novastor Corporation, “Microsoft Shadow-Copy Service and Its Role in an Organization's Total Backup Strategy,” , 2009.
[7] G. Duzy, “Match Snaps to Apps,” Storage, special issue on managing the information that drives the enterprise, pp. 46-52, Dec. 2004.
[8] Z. Peterson and R.C. Burns, “Ext3cow: A Time-Shifting File System for Regulatory Compliance,” ACM Trans. Storage, vol. 1, no. 2, pp. 190-212, 2005.
[9] D. Hitz, J. Lau, and M. Malcolm, “File System Design for an NFS File Server Appliance,” Proc. USENIX Winter Technical Conf., pp.235-245, 1994.
[10] M.D. Flouris and A. Bilas, “Clotho: Transparent Data Versioning at the Block I/O Level,” Proc. 12th NASA/IEEE Conf. Mass Storage Systems and Technologies (MSST '04), Apr. 2004.
[11] L. Moses, “An Introductory Guide to TOPS-20,” Technical Report TM-82-22, USC/Information Sciences Inst., 1982.
[12] K. McCoy, VMS File System Internals. Digital Press, 1990.
[13] D.S. Santry, M.J. Feeley, N.C. Hutchinson, A.C. Veitch, R.W. Carton, and J. Ofir, “Deciding When to Forget in the Elephant File System,” Proc. 17th ACM Symp. Operating System Principles, pp.110-123, Dec. 1999.
[14] C.A.N. Soules, G.R. Goodson, J.D. Strunk, and G.R. Ganger, “Metadata Efficiency in Versioning File Systems,” Proc. Second USENIX Conf. File and Storage Technologies, pp. 43-58, Mar. 2003.
[15] R. Pike et al., “Plan 9 for Bell Labs,”, 2009.
[16] E.K. Lee and C.A. Thekkath, “Petal: Distributed Virtual Disks,” Proc. Seventh Int'l Conf. Architecture Support for Programming Languages an Operating Systems (ASPLOS-7), 1996.
[17] A. Sankaran, K. Guinn, and D. Nguyen, “Volume Shadow Copy Service,” http:/, Mar. 2004.
[18] R. Green, A. Baird, and C. Davies, “Designing a Fast, On-Line Backup System for a Log-Structured File System,” Digital Technical J., vol. 8, no. 2, pp. 32-45, Oct. 1996.
[19] M. Rosenblum and J. Ousterhout, “Log-Structured File System,” Proc. 13th ACM Symp. Operating Systems Principles, pp. 1-15, June 1991.
[20] EMC Corporation, “EMC TimeFinder Family,” http://www.emc. com/products/softwaretimefinder.jsp , 2009.
[21] Hitachi, Ltd., “Hitachi ShadowImage Implementation Service,” http://www.hds.comcopy_on_write_snapshot_467_02.pdf , June 2001.
[22] NetAppliance Corporation, “Snapshot Technology,” , 2009.
[23] M. Mesnier, M. Wachs, R. Sambasivan, A. Zheng, and G. Ganger, “Modeling the Relative Fitness of Storage,” ACM SIGMETRICS Performance Evaluation Rev., vol. 35, no. 1, pp. 37-48, June 2007.
[24] UNH, “iSCSI Reference Implementation,” http:/unh-iscsi., 2005.
[25] H. Xiong, R. Kanagavelu, Y. Zhu, and K.L. Yong, “An iSCSI Design and Implementation,” Proc. 12th NASA Goddard/21st IEEE Conf. Mass Storage Systems and Technologies (NASA/IEEE MSST), 2004.
[26] Intel Co., “Intel iSCSI Reference Implementation,” http:// , 2009.
[27] Cisco, “Linux-iSCSI Project,” http:/, 2008.
[28] Y. Lu, F. Noman, and D.H.C. Du, “Simulation Study of iSCSI-Based Storage System,” Proc. 12th NASA Goddard/21st IEEE Conf. Mass Storage Systems and Technologies (NASA/IEEE MSST '04), pp.399-408, 2004.
[29] P. Radkov, L. Yin, P. Goyal, P. Sarkar, and P. Shenoy, “A Performance Comparison of NFS and iSCSI for IP-Network Storage,” Proc. Third USENIX Conf. File and Storage Technologies (FAST), 2004.
[30] S. Aiken, D. Grunwald, A.R. Pleszkun, and J. Willeke, “A Performance Analysis of the iSCSI Protocol,” Proc. 20th IEEE/11th NASA Goddard Conf. Mass Storage Systems and Technologies (MSS '03), Apr. 2003.
[31] I. Dalgic, K. Ozdemir, R. Velpuri, J. Weber, U. Kukreja, Atrica, H. Chen, and U. Kukreja, “Comparative Performance Evaluation of iSCSI Protocol over Metro, Local, and Wide Area Networks,” Proc. 12th NASA Goddard/21st IEEE Conf. Mass Storage Systems and Technologies (NASA/IEEE MSST), 2004.
[32] J. Satran, K. Meth, C. Sapuntzakis, M. Chadalapaka, and E. Zeidner, “iSCSI Draft Standard,” , Jan. 2003.
[33] X. He, Q. Yang, and M. Zhang, “A Caching Strategy to Improve iSCSI Performance,” Proc. IEEE Ann. Conf. Local Computer Networks, Nov. 2002.
[34] H. Simitci, “Backups Using Snapshots,” Storage Network Performance Analysis, pp. 280-282, Wiley Publishing, Inc., 2003.
[35] B. Bloom, “Space/Time Trade-Offs in Hashing Coding with Allowable Errors,” Comm. ACM, vol. 13, no. 7, pp. 422-426, July 1970.
[36] Microsoft Corp., “Microsoft iSCSI Software Initiator Version 2.0,” storage default.mspx, 2005.
[37] Intel, “IoMeter: Performance Analysis Tool,” http:/www., 2009.
[38] J. Katcher, “PostMark: A New File System Bench-Mark,” Technical Report 3022, Network Appliance, 1997.
[39] Transaction Processing Performance Council, “TPC BenchmarkTM C Standard Specification,” http://www.tpc.orgtpcc, 2005.
[40] J. Piernas, T. Cortes, and J.M. García, “TPCC- UVA: A Free, Open-Source Implementation of the TPC-C Benchmark,” http://www. , 2005.
[41] H.W. Cain, R. Rajwar, M. Marden, and M.H. Lipasti, “An Architectural Evaluation of Java TPC-W,” Proc. Seventh Int'l Symp. High-Performance Computer Architecture (HPCA '01), Jan. 2001.
7 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool