The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.06 - June (2012 vol.61)
pp: 753-766
Jing Yang , Huazhong University of Science and Technology, Wuhan
Qiang Cao , Huazhong University of Science and Technology, Wuhan
Xu Li , Huazhong University of Science and Technology, Wuhan
Changsheng Xie , Huazhong University of Science and Technology, Wuhan
Qing Yang , University of Rhode Island, Kingston
ABSTRACT
Continuous Data Protection (CDP) has become increasingly important as digitization continues. This paper presents a new architecture and an implementation of CDP in Linux kernel. The new architecture takes advantages of both traditional snapshot technology and recent Timely Recovery to Any Point-in-time (TRAP) architecture [CHECK END OF SENTENCE]. The idea is to periodically insert snapshots within the parity logs of changed data blocks in order to ensure fast and reliable data recovery in case of failures. A mathematical model is developed as a guide to designers to determine when and how to insert snapshots to optimize performance in terms of space usage and recovery time. Based on the mathematical model, we have designed and implemented a CDP module in the Linux system. Our implementation is at block level as a device driver that is capable of recovering data to any point-in-time in case of various failures. Extensive experiments have been carried out to show that the implementation is fairly robust and numerical results demonstrate that the implementation is efficient.
INDEX TERMS
Data storage, data protection and recovery, data backup, continuous data protection.
CITATION
Jing Yang, Qiang Cao, Xu Li, Changsheng Xie, Qing Yang, "ST-CDP: Snapshots in TRAP for Continuous Data Protection", IEEE Transactions on Computers, vol.61, no. 6, pp. 753-766, June 2012, doi:10.1109/TC.2011.150
REFERENCES
[1] B. Berliner and J. Polk, “Concurrent Versions System (CVS),” http:/www.cvshome.org, 2001.
[2] A. Chervenak, V. Vellanki, and Z. Kurmas, “Protecting File Systems: A Survey of Backup Techniques,” Proc. Joint NASA and IEEE Mass Storage Conf., 1998.
[3] T.P.P. Council, “TPC BenchmarkTM C Standard Specification,” http://www.tpc.orgtpcc, 2005.
[4] L.P. Cox, C.D. Murray, and B.D. Noble, “Pastiche: Making Backup Cheap and Easy,” Proc. the Fifth USENIX Symp. Operating System Design and Implementation, 2002.
[5] J. Damoulakis, “Time to Say Goodbye to Backup?,” Storage, vol. 4, no. 9, pp. 64-66, Nov. 2006.
[6] M. Flouris and A. Bilas, “Clotho: Transparent Data Versioning at the Block I/O Level,” Proc. the 12th NASA Goddard, 21st IEEE Conf. Mass Storage Systems and Technologies (MSST '04), pp. 315-328, 2004.
[7] D.K. Gifford, R.M. Needham, and M.D. Schroeder, “Cedar File System,” Comm. the ACM, vol. 31, no. 3, pp. 288-298, Mar. 1988.
[8] Y. Hu and Q. Yang, “DCD—Disk Caching Disk: A New Approach for Boosting I/O Performance,” Proc. the 23rd Ann. Int'l Symp. Computer Architecture (ISCA), 1996.
[9] Intel, “IoMeter: Performance Analysis Tool,” http:/www. iometer.org, 2011.
[10] J. Katcher, “PostMark: A New File System Benchmark,” Technical Report 3022, Network Appliance, 1997.
[11] K. Keeton, C. Santos, D. Beyer, J. Chase, and J. Wilkes, “Designing for Disasters,” Proc. the Third USENIX Conf. File and Storage Technologies, 2004.
[12] D. Korn and E. Krell, “The 3-D File System,” Proc. the USENIX Summer Conf., pp. 147-156, 1989.
[13] G. Laden, P. Ta-Shma, E. Yaffe, M. Factor, and S. Fienblit, “Architectures for Controller Based CDP,” Proc. the Fifth USENIX Conf. File and Storage Technologies, pp. 107-121, 2007.
[14] X. Li, C. Xie, and Q. Yang, “Optimal Implementation of Continuous Data Protection (CDP) in Linux Kernel,” Proc. the Int'l Conf. Networking, Architecture, and Storage (NAS '08), pp. 28-35, 2008.
[15] “Linux Kernel Drivers,” http:/sourceforge.net, 2011.
[16] M. Lu, S. Lin, and T. Chiueh, “Efficient Logging and Replication Techniques for Comprehensive Data Protection,” Proc. the 24th IEEE Conf. Mass Storage Systems and Technologies (MSST '07), pp. 171-184, 2007.
[17] K. McCoy, VMS File System Internals. Digital Press, 1990.
[18] C. MorreyIII and D. Grunwald, “Peabody: The Time Travelling Disk,” Proc. IEEE Mass Storage Conf., 2003.
[19] C. MorreyIII and D. Grunwald, “Content-Based Block Caching,” Proc. the 14th NASA Goddard, 23rd IEEE Conf. Mass Storage Systems and Technologies (MSST '06), 2006.
[20] L. Moses, “An Introductory Guide to TOPS-20,” Technical Report TM-82-22, USC/Information Sciences Inst., 1982.
[21] K. Muniswamy-Reddy, C. Wright, A. Himmer, and E. Zadok, “A Versatile and User-Oriented Versioning File System,” Proc. the Third USENIX Conf. File and Storage Technologies, 2004.
[22] A. Muthitacharoen, B. Chen, and D. Mazières, “A Low-Bandwidth Network File System,” Proc. the Eighth ACM Symp. Operating Systems Principles, 2001.
[23] K. Norvag and K. Bratbergsengen, “Log-Only Temporal Object Storage,” Proc. Eighth Int'l Workshop Database and Expert Systems Applications (DEXA '97), 1997.
[24] B. O'Neill, “Any-Point-in-Time Backups,” Storage, special issue on managing the information that drives the enterprise, Sept. 2005.
[25] D. Patterson, A. Brown, P. Broadwell, G. Candea, M. Chen, J. Cutler, P. Enriquez, A. Fox, E. Kiciman, and M. Merzbacher, “Recovery-Oriented Computing (ROC): Motivation, Definition, Techniques, and Case Studies,” Technical Report UCB/CSD-0201175, U.C. Berkeley, 2002.
[26] Z. Peterson and R. Burns, “Ext3cow: A Time-Shifting File System For Regulatory Compliance,” ACM Trans. Storage, vol. 1, no. 2, pp. 190-212, 2005.
[27] J. Piernas, T. Cortes, and J. García, “TPCC- UVA: A Free, Open-Source Implementation of the TPC-C Benchmark,” http://www.infor.uva.es/~diegotpcc-uva.html , 2005.
[28] S. Rhea, P. Eaton, D. Geels, H. Weatherspoon, B. Zhao, and J. Kubiatowicz, “Pond: The OceanStore Prototype,” Proc. the Second USENIX Conf. File and Storage Technologies (FAST), pp. 1-14, 2003.
[29] M. Rosenblum and J.K. Ousterhout, “The Design and Implementation of a Log-Structured File System,” ACM Trans. Compute System, vol. 10, no. 1, pp. 26-52, Feb. 1992.
[30] A. Sankaran, K. Guinn, and D. Nguyen, “Volume Shadow Copy Service,” POWER, vol. 14, Mar. 2004.
[31] D.S. Santry, M.J. Feeley, N.C. Hutchinson, A.C. Veitch, R.W. Carton, and J. Ofir, “Deciding when to Forget in the Elephant File System,” Proc. the Seventh ACM Symp. Operating Systems Principles, pp. 110-123, 1999.
[32] M. Seltzer, K. Bostic, M. McKusick, and C. Staelin, “An Implementation of a Log-Structured File System for UNIX,” Proc. Winter 1993 USENIX Tech. Conf., pp. 307-326, 1993.
[33] D. Smith, “The Cost of Lost Data,” J. Contemporary Business Practice, vol. 6, no. 3, 2003.
[34] C.A.N. Soules, G.R. Goodson, J.D. Strunk, and G.R. Ganger, “Metadata Efficiency in Versioning File Systems,” Proc. the Second USENIX Conf. File and Storage Technologies (FAST), pp. 43-58, 2003.
[35] “Storage Performance Council SPC-1 Specification,” http://www.storageperformance.orgspces, 2011.
[36] “Storage Performance Council, SPC-1 Benchmark Results,” http://www.storageperformance.orgresults , 2011.
[37] P. Ta-Shma, G. Laden, M. Ben-Yehuda, and M. Factor, “Virtual Machine Time Travel Using Continuous Data Protection and Checkpointing,” ACM SIGOPS Operating Systems Rev., vol. 42, no. 1, pp. 127-134, 2008.
[38] “University of Massachusetts SPC Traces,” http://www.ssrc. ucsc.edu/wikis/ssrc/SoftwareTraces SpcTraces, 2011.
[39] J. Wires and M.J. Feeley, “Secure File System Versioning at the Block Level,” ACM SIGOPS Operating Systems Rev., vol. 41, no. 3, pp. 203-215, June 2007.
[40] W. Xiao, Y. Liu, Q. Yang, J. Ren, and C. Xie, “Implementation and Performance Evaluation of Two Snapshot Methods on iSCSI Target Storages,” Proc. the 14th NASA Goddard, 23rd IEEE Conf. Mass Storage Systems and Technologies (MSST '06), 2006.
[41] Q. Yang, W. Xiao, and J. Ren, “TRAP-Array: A Disk Array Architecture Providing Timely Recovery to Any Point-in-Time,” Proc. the 33rd Ann. Int'l Symp. Computer Architecture, pp. 289-301, 2006.
[42] B. Zhu, K. Li, and H. Patterson, “Avoiding the Disk Bottleneck in the Data Domain Deduplication File System,” Proc. the Sixth USENIX Conf. File and Storage Technologies (FAST), pp. 269-282, 2008.
[43] N. Zhu and T. Chiueh, “Portable and Efficient Continuous Data Protection for Network File Servers,” Proc. the 37th Ann. IEEE/IFIP Int'l Conf. Dependable Systems and Networks (DSN '07), pp. 687-697, 2007.
582 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool