Myriad: Cost-Effective Disaster Tolerance
نویسندگان
چکیده
This paper proposes a new approach for achieving disaster tolerance in large, geographically-distributed storage systems. The system, called Myriad, can achieve the same level of disaster tolerance as a typical single mirrored solution, but uses considerably fewer physical resources, by employing cross-site checksums (via erasure codes) instead of direct replication. The key technical contribution of the paper is a protocol permitting cross-site checksums to be updated in such a way that data recovery is always possible. Another important contribution is the specification of a protocol for recovering from disasters, explicitly verifying the claim of disaster tolerance. Further, it is shown by direct calculation and analytical modeling that Myriad compares favorably with mirroring in terms of both total cost of ownership and reliability.
منابع مشابه
Modeling of Large-scale Disaster-tolerant Systems
Disaster tolerance in computing and communications systems refers to the ability to maintain a degree of functionality throughout the occurrence of a disaster. We accomplish the incorporation of disaster tolerance within a system by simulating various threats to the system operation and identifying areas for system redesign. However, there are two limitations that need to be addressed. First, m...
متن کاملInformation Systems Security Assurance Management at Municipal Software Solutions, Inc
Effective disaster recovery planning, execution, and testing are essential to manage the risk of business interruption that arises from a myriad of sources such as fire, natural or manmade disasters, sabotage, or technical or human operational failures. The Municipal Software Services, Inc (MSS) case describes a company that was faced with a catastrophic fire. The MSS case provides a realistic ...
متن کاملEnhanced Security Framework for Cloud Computing
Cloud computing provides large scale pool of resources, wide access, dynamicity, cost effective solution for storage. Public, Private and Hybrid deployment models exist for cloud computing along with various service models like Integration as service, Database as service, and Security as service. Though cloud computing is being adopted as the new technology in the market but there still exists ...
متن کاملPortfolio-Based Approach for Disaster Recovery Planning for IT
With the integration of IT with business operations and management, organizations are vulnerable to a myriad of threats ranging from computer viruses to natural disasters and deliberate acts of sabotage. Consequently, IT disaster recovery has emerged as a critical organizational issue. This paper proposes an application portfolio-based framework for IT disaster recovery planning based on the ro...
متن کاملIT Application Downtime, Executive Visibility and Disaster Tolerant Computing
This paper examines the relationship among disaster tolerant systems, Information Technology (IT) application operation and availability, and the executive level management visibility necessary for system operational success. The current state of disaster tolerant application systems is explored including an investigation into the reliability and survivability requirements necessary to achieve ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2002