The Community for Technology Leaders
RSS Icon
Issue No.06 - June (2009 vol.20)
pp: 898-911
Weijun Xiao , University of Rhode Island, Kingston
Jin Ren , University of Rhode Island, Kingston
Qing Yang , University of Rhode Island, Kingston
This paper presents a study of data storages for continuous data protection (CDP). After analyzing the existing data protection technologies, we propose a new disk array architecture that provides Timely Recovery to Any Point-in-time, referred to as TRAP. TRAP stores not only the data stripe upon a write to the array but also the time-stamped Exclusive ors (xors) of successive writes to each data block. By leveraging the xor operations that are performed upon each block write in today's RAID4/5 controllers, TRAP does not incur noticeable performance overhead. More importantly, TRAP is able to recover data very quickly to any point-in-time upon data damage by tracing back the sequence and history of xors resulting from writes. What is interesting is that the TRAP architecture is very space efficient. We have implemented a prototype of the new TRAP architecture using software at the block level and carried out extensive performance measurements using TPC-C benchmarks running on Oracle and Postgres databases, TPC-W running on a MySQL database, and file system benchmarks running on Linux and Windows systems. Our experiments demonstrated that TRAP not only is able to recover data to any point-in-time very quickly upon a failure but also uses less storage space than traditional daily incremental backup/snapshot. Compared to the state-of-the-art CDP technologies, TRAP saves disk storage space by one to two orders of magnitude with a simple and a fast encoding algorithm. In addition, TRAP can provide two-way data recovery with the availability of only one reference image in contrast to the one-way recovery of snapshot and incremental backup technologies.
Disk array, disk I/O, data storage, data protection and recovery, data backup.
Weijun Xiao, Jin Ren, Qing Yang, "A Case for Continuous Data Protection at Block Level in Disk Array Storages", IEEE Transactions on Parallel & Distributed Systems, vol.20, no. 6, pp. 898-911, June 2009, doi:10.1109/TPDS.2008.154
[1] D.A. Patterson, G. Gibson, and R.H. Katz, “A Case for Redundant Arrays of Inexpensive Disks (RAID),” Proc. ACM SIGMOD '88, pp.109-116, 1988.
[2] M. Blaum, J. Brady, J. Bruck, and J. Menon, “EVENODD: An Optimal Scheme for Tolerating Double Disk Failures in RAID Architectures,” Proc. 21st Ann. Int'l Symp. Computer Architecture (ISCA), 1994.
[3] G.A. Alvarez, W.A. Burkhard, and F. Christian, “Tolerating Multiple Failures in RAID Architectures with Optimal Storage and Uniform Declustering,” Proc. 24th Ann. Int'l Symp. Computer Architecture (ISCA), 1997.
[4] C.I. Park, “Efficient Placement of Parity and Data to Tolerate Two Disk Failures in Disk Arrays Systems,” IEEE Trans. Parallel and Distributed Systems, vol. 6, pp. 1177-1184, Nov. 1995.
[5] P. Corbett, B. English, A. Goel, T. Grcanac, S. Kleiman, J. Leong, and S. Sankar, “Row-Diagonal Parity for Double Disk Failure Correction,” Proc. Third Usenix Conf. File and Storage Technologies (FAST '04), Mar. 2004.
[6] D.M. Smith, “The Cost of Lost Data,” J. Contemporary Business Practice, vol. 6, no. 3, 2003.
[7] D. Patterson et al., “Recovery Oriented Computing (ROC): Motivation, Definition, Techniques, and Case Studies,” Computer Science Technical Report UCB/CSD-0201175, Univ. of California, Berkeley, Mar. 2002.
[8] K. Keeton, C. Santos, D. Beyer, J. Chase, and J. Wilkes, “Designing for Disasters,” Proc. Third Usenix Conf. File and Storage Technologies (FAST), 2004.
[9] D. Patterson, “A New Focus for a New Century: Availability and Maintainability $>>$ Performance,” FAST Keynote, keynote.html, Jan. 2002.
[10] M. Rock and P. Poresky, “Shorten Your Backup Window,” Storage, special issue on managing the information that drives the enterprise, pp. 28-34, Sept. 2005.
[11] G. Duzy, “Match Snaps to Apps,” Storage, special issue on managing the information that drives the enterprise, pp. 46-52, Sept. 2005.
[12] A.L. Chervenak, V. Vellanki, and Z. Kurmas, “Protecting File Systems: A Survey of Backup Techniques,” Proc. Joint NASA and IEEE Mass Storage Conf., Mar. 1998.
[13] J. Damoulakis, “Continuous Protection,” Storage, vol. 3, no. 4, pp. 33-39, June 2004.
[14] The 451 Group, Total Recall: Challenges and Opportunities for the Data Protection Industry, , May 2006.
[15] Q. Yang, W. Xiao, and J. Ren, “TRAP-Array: A Disk Array Architecture Providing Timely Recovery to Any Point-in-Time,” Proc. 33rd Int'l Symp. Computer Architecture (ISCA '06), June 2006.
[16] C.B. Morrey III and D. Grunwald, “Peabody: The Time Traveling Disk,” Proc. 11th NASA Goddard/20th IEEE Conf. Mass Storage Systems and Technologies (MSST '03), Apr. 2003.
[17] B. O'Neill, “Any-Point-in-Time Backups,” Storage, special issue on managing the information that drives the enterprise, Sept. 2005.
[18] J. Gray, Turing Lectures, http://research., 2008.
[19] H. Simitci, Storage Network Performance Analysis. Wiley, 2003.
[20] J.P. Tremblay and R. Manohar, Discrete Mathematical Structures with Applications to Computer Science. McGraw-Hill, 1975.
[21] P.M. Chen, E.K. Lee, G.A. Gibson, R.H. Katz, and D.A. Patterson, “RAID: High-Performance, Reliable Secondary Storage,” ACM Computing Surveys, June 1994.
[22] HP Corporation, Miscellaneous RAID-5 Operations, http://www. , 2001.
[23] J. Satran, K. Meth, C. Sapuntzakis, M. Chadalapaka, and E. Zeidner, iSCSI Draft Standard, , Jan. 2003.
[24] G. Roelofs and J.L. Gailly, zlib Library, http:/, 2005.
[25] B. Furht, J. Greenberg, and R. Westwater, Motion Estimation Algorithms for Video Compression. Springer, 1996.
[26] UNH, iSCSI Reference Implementation, http:/unh-iscsi.source, 2005.
[27] Microsoft Corporation, Microsoft iSCSI Software Initiator Version2.0, storagedefault.mspx, 2005.
[28] Y. Hu and Q. Yang, “DCD-Disk Caching Disk: A New Approach for Boosting I/O Performance,” Proc. 23rd Ann. Int'l Symp. Computer Architecture (ISCA '96), May 1996.
[29] Transaction Processing Performance Council, TPC BenchmarkTM C Standard Specification, http://tpc.orgtpcc, 2005.
[30] S. Shaw, Hammerora: Load Testing Oracle Databases with Open Source Tools, http:/, 2004.
[31] J. Piernas, T. Cortes, and J.M. García, TPCC-UVA: A Free, Open-Source Implementation of the TPC-C Benchmark, , 2005.
[32] H.W. Cain, R. Rajwar, M. Marden, and M.H. Lipasti, “An Architectural Evaluation of Java TPC-W,” Proc. Seventh Int'l Symp. High-Performance Computer Architecture (HPCA '01), Jan. 2001.
[33] M.H. Lipasti, Java TPC-W Implementation Distribution, , 2003.
[34] L.P. Cox, C.D. Murray, and B.D. Noble, “Pastiche: Making Backup Cheap and Easy,” Proc. Fifth Usenix Symp. Operating System Design and Implementation (OSDI '02), Dec. 2002.
[35] M.B. Zhu, K. Li, and R.H. Patterson, Efficient Data Storage System, US patent 6 928 526, 2006.
[36] E.K. Lee and C.A. Thekkath, “Petal: Distributed Virtual Disks,” Proc. ACM Seventh Int'l Conf. Architecture Support for Programming Languages an Operating Systems (ASPLOS-7), 1996.
[37] EMC Corporation, EMC TimeFinder Product Description Guide, timefinder_ pdg.pdf, 1998.
[38] Hitachi Ltd., Hitachi ShadowImage Implementation Service, http://www.hds.compdf_143_implem_shadowimage.pdf , June 2001.
[39] J.J. Kistler and M. Satyanarayanan, “Disconnected Operation in the Coda File System,” Proc. 13th ACM Symp. Operating System Principles (SOSP '91), Oct. 1991.
[40] Z. Peterson and R.C. Burns, “Ext3cow: A Time-Shifting File System for Regulatory Compliance,” ACM Trans. Storage, vol. 1, no. 2, pp. 190-212, 2005.
[41] D.K. Gifford, R.M. Needham, and M.D. Schroeder, “Cedar File System,” Comm. ACM, vol. 31, no. 3, pp. 288-298, Mar. 1988.
[42] J.H. Howard, M.L. Kazar, S.G. Menees, D.A. Nichols, M. Satyanarayanan, R.N. Sidebotham, and M.J. West, “Scale and Performance in a Distributed File System,” ACM Trans. Computer Systems, vol. 6, no. 1, pp. 51-81, Feb. 1988.
[43] N.C. Hutchinson, S. Manley, M. Federwisch, G. Harris, D. Hitz, S. Kleiman, and S. O'Malley, “Logical versus Physical File System Backup,” Proc. Third Usenix Symp. Operating System Design and Implementation (OSDI '99), pp. 239-250, Feb. 1999.
[44] S. Quinlan and S. Dorward, “Venti: A New Approach to Archival Storage,” Proc. Usenix Conf. File and Storage Technologies (FAST '02), pp. 89-101, Jan. 2002.
[45] D.S. Santry, M.J. Feeley, N.C. Hutchinson, A.C. Veitch, R.W. Carton, and J. Ofir, “Deciding When to Forget in the Elephant File System,” Proc. 17th ACM Symp. Operating System Principles (SOSP '99), pp. 110-123, Dec. 1999.
[46] A. Sankaran, K. Guinn, and D. Nguyen, Volume Shadow Copy Service, http:/, Mar. 2004.
[47] A.J. Lewis, J. Thormer, and P. Caulfield, LVM How-To,, 2006.
[48] D. Hitz, J. Lau, and M. Malcolm, “File System Design for an NFS File Server Appliance,” Proc. Usenix Winter Technical Conf., pp. 235-245, 1994.
[49] W. Xiao, Y. Liu, Q. Yang, J. Ren, and C. Xie, “Implementation and Performance Evaluation of Two Snapshot Methods on iSCSI Target Storages,” Proc. 14th NASA Goddard/23rd IEEE Conf. Mass Storage Systems and Technologies (MSST '06), May 2006.
[50] G.A. Gibson and R.V. Meter, “Network Attached Storage Architecture,” Comm. ACM, vol. 43, no. 11, pp. 37-45, Nov. 2000.
[51] D.G. Korn and E. Krell, “The 3-D File System,” Proc. Usenix Summer Conf., pp. 147-156, 1989.
[52] B. Berliner and J. Polk, Concurrent Versions System (CVS), http:/, 2001.
[53] L. Moses, “An Introductory Guide to TOPS-20,” Technical Report TM-82-22, Information Sciences Inst., Univ. of Southern California, 1982.
[54] K. McCoy, VMS File System Internals. Digital Press, 1990.
[55] C.A.N. Soules, G.R. Goodson, J.D. Strunk, and G.R. Ganger, “Metadata Efficiency in Versioning File Systems,” Proc. Second USENIX Conf. File and Storage Technologies (FAST '03), pp. 43-58, Mar. 2003.
[56] S. Rhea, P. Eaton, D. Geels, H. Weatherspoon, B. Zhao, and J. Kubiatowicz, “Pond: The OceanStore Prototype,” Proc. Second Usenix Conf. File and Storage Technologies (FAST '03), Mar. 2003.
[57] A. Muthitacharoen, B. Chen, and D. Mazières, “A Low-Bandwidth Network File System,” Proc. 18th ACM Symp. Operating Systems Principles (SOSP '01), Oct. 2001.
[58] K. Muniswamy-Reddy, C.P. Wright, A. Himmer, and E. Zadok, “A Versatile and User-Oriented Versioning File System,” Proc. Third Usenix Conf. File and Storage Technologies (FAST), 2004.
[59] J. Damoulakis, “Time to Say Goodbye to Backup,” Storage, vol. 4, no. 9, pp. 64-66, Nov. 2006.
[60] G. Laden, P. Ta-shma, E. Yaffe, and M. Factor, “Architectures for Controller Based CDP,” Proc. Fifth Usenix Conf. File and Storage Technologies (FAST '07), Feb. 2007.
[61] N. Zhu and T. Chiueh, “Portable and Efficient Continuous Data Protection for Network File Servers,” Proc. 37th Ann. IEEE/IFIP Int'l Conf. Dependable Systems and Networks (DSN '07), June 2007.
[62] M. Lu, S. Lin, and T. Chiueh, “Efficient Logging and Replication Techniques for Comprehensive Data Protection,” Proc. 24th IEEE Conf. Mass Storage Systems and Technologies (MSST '07), Sept. 2007.
[63] M.D. Flouris and A. Bilas, “Clotho: Transparent Data Versioning at the Block I/O Level,” Proc. 12th NASA Goddard/21st IEEE Conf. Mass Storage Systems and Technologies (MSST '04), Apr. 2004.
[64] B. Zhu and K. Li, “Avoiding the Disk Bottleneck in the Data Domain Deduplication File System,” Proc. Sixth Usenix Conf. File and Storage Technologies (FAST), 2008.
[65] M. Rosenblum and J. Ousterbout, “The Design and Implementation of a Log-Structured File System,” ACM Trans. Computer Systems, pp. 26-52, Feb. 1992.
[66] M. Seltzer, K. Bostic, M.K. McKusick, and C. Staelin, “An Implementation of a Log-Structured File System for UNIX,” Proc. Winter Usenix Technical Conf., pp. 307-326, Jan. 1993.
[67] K. Norvag and K. Bratbergsengen, “Log-Only Temporal Object Storage,” Proc. Eighth Int'l Conf. Database and Expert Systems Applications (DEXA '97), Sept. 1997.
18 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool