SWEEPER: An Efficient Disaster Recovery Point Identification Mechanism
نویسندگان
چکیده
Data corruption is one of the key problems that is on top of the radar screen of most CIOs. Continuous Data Protection (CDP) technologies help enterprises deal with data corruption by maintaining multiple versions of data and facilitating recovery by allowing an administrator restore to an earlier clean version of data. The aim of the recovery process after data corruption is to quickly traverse through the backup copies (old versions), and retrieve a clean copy of data. Currently, data recovery is an ad-hoc, time consuming and frustrating process with sequential brute force approaches, where recovery time is proportional to the number of backup copies examined and the time to check a backup copy for data corruption. In this paper, we present the design and implementation of SWEEPER architecture and backup copy selection algorithms that specifically tackle the problem of quickly and systematically identifying a good recovery point. We monitor various system events and generate checkpoint records that help in quickly identifying a clean backup copy. The SWEEPER methodology dynamically determines the selection algorithm based on user specified recovery time and recovery point objectives, and thus, allows system administrators to perform trade-offs between recovery time and data currentness. We have implemented our solution as part of a popular Storage Resource Manager product and evaluated SWEEPER under many diverse settings. Our study clearly establishes the effectiveness of SWEEPER as a robust strategy to significantly reduce recovery time.
منابع مشابه
The Role of the Forensic Odontologist in Disaster Victim Identification: A Brief Review
Disaster Victim Identification (DVI) is a culmination of several individuals that include rescue teams, recovery teams, forensic pathologists, odontologists and anthropologists. All these personnel work collaboratively to bring together their respective fields to identifying victims in a disaster. Factors needing consideration after a disaster include the number of victims, condition of remains...
متن کاملA Fast Disaster Recovery Mechanism for Volume Replication Systems
Disaster recovery solutions have gained popularity in the past few years because of their ability to tolerate disasters and to achieve the reliability and availability. Data replication is one of the most key disaster recovery solutions. While there are a number of mechanisms to restore data after disasters, the efficiency of the recovery process is not ideal yet. Providing the efficiency guara...
متن کاملThe role of hazard vulnerability assessments in disaster preparedness and prevention in China
China is prone to disasters and escalating disaster losses. Effective disaster mitigation is the foundation for efficient disaster response and rescue and for reducing the degree of hazardous impacts on the population. Vulnerability refers to the population's capacity to anticipate, cope with, and recover from the impact of a hazardous event. A hazard vulnerability assessment (HVA) systematical...
متن کاملAn Architecture for Supporting Network Fault Recovery Management
Highly available and resilient networks play a decisive role in today’s networked world. As network faults are inevitable and networks are becoming constantly intricate, finding effective fault recovery solutions in a timely manner is becoming a challenging task for administrators. Therefore, an automated mechanism to support fault resolution is essential towards efficient fault handling proces...
متن کاملValidating Indicators of Disaster Recovery with Qualitative Research
INTRODUCTION Recovery from disasters is a critical function of federal, state, and local governments, yet measurable, validated indicators of community recovery remain unidentified. A list of potential recovery indicators was developed by the authors through a literature review, recovery plan review, and case study of two disaster impacted communities. METHODS To validate the indicators, qual...
متن کامل