Evaluating Backup Algorithms

نویسندگان

  • Zachary Kurmas
  • Ann L. Chervenak
چکیده

We present a trace-driven simulator that evaluates the performance of backup algorithms. We use this simulator to compare the performance of the commonly-used level scheme (our name for the algorithm used by the UNIX dump utility) with that of a new algorithm called the Z scheme. We show that the Z scheme has better backup performance than the level scheme and slightly worse restore performance. We also show that the Z scheme consumes less media for backups than the level scheme.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Presenting a three-objective model in location-allocation problems using combinational interval full-ranking and maximal covering with backup model

Covering models have found many applications in a wide variety of real-world problems; nevertheless, some assumptions of covering models are not realistic enough. Accordingly, a general approach would not be able to answer the needs of encountering varied aspects of real-world considerations. Assumptions like the unavailability of servers, uncertainty, and evaluating more factors at the same ti...

متن کامل

Stock price analysis using machine learning method(Non-sensory-parametric backup regression algorithm in lin-ear and nonlinear mode)

The most common starting point for investors when buying a stock is to look at the trend of price changes. In recent years, different models have been used to predict stock prices by researchers, and since artificial intelligence techniques, including neural networks, genetic algorithms and fuzzy logic, have achieved successful re-sults in solving complex problems; in this regard, more exploita...

متن کامل

QoS protection: Formulation and experimental analysis of the MPLS case

In this paper a new QoS protection paradigm to extend and enhance current QoS routing is formalized and supported by experiments. Previous QoS routing algorithms considers protection as a secondary aspect and uses QoS routing objectives, such as minimizing resources or request rejection, to route backup paths. This work defines new QoS objectives to route backup paths. QoS protection concept is...

متن کامل

Designing a green location routing inventory problem considering transportation risks and time window: a case study

This study introduces a green location, routing and inventory problem with customer satisfaction, backup distribution centers and risk of routes in the form of a non-linear mixed integer programming model. In this regard, time window is considered to increase the customer satisfaction of the model and transportation risks is taken into account for the reliability of the system. In addition, dif...

متن کامل

An Optimized Two-Safe Approach to Maintaining Remote Backup Systems

In a remote backup system, transaction processing takes place at the primary and the log records generated at the primary are propagated to the remote backup which uses them to reconstruct a recent state of the database at the primary. In the event of a primary failure, the backup system takes over transaction processing without causing users to observe a breach in service. Existing remote back...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000