Research and Implementation of a Snapshot Facility Suitable for Soft-Failure Recovery
نویسندگان
چکیده
Human error and incorrect software (a.k.a. soft-failure) are key impediments to dependability of Internet services. To address the challenge, storage providers need to provide rapid recovery techniques to retrieve data from a time-based recovery point. Motivated by it, a snapshot facility at the block level called SnapChain is introduced. Compared with former implementations, when managing different versions of snapshots, SnapChain minimizes disk space requirement and write penalty of master volume. In this paper, the metadata and the algorithms used in SnapChain will be explained.
منابع مشابه
Low-Cost Checkpointing and Failure Recovery in Mobile Computing Systems
A mobile computing system consists of mobile and stationary nodes, connected to each other by a communication network. The presence of mobile nodes in the system places constraints on the permissible energy consumption and available communication bandwidth. To minimize the lost computation during recovery from node failures, periodic collection of a consistent snapshot of the system (checkpoint...
متن کاملImplementation of child safety and health management system by means of FMEA method
Every year, many accidents leading to physical injuries in kindergartens, indicates that a very large percentage of them are related to the safety concerns and lack of hygiene in these places. Families, due to their busy life style and working hours and also children needs of preschool education, are searching to find most suitable kindergartens for their children. Selecting a kindergarten with...
متن کاملStrategy Formulation for Service Failure Recovery, Using Mixed Research Method
The purpose of this study is to explain the strategies affecting the failure recovery in significant services which researches had previously disregarded. Since more than half of the total global wealth comes from the service sector, this study gains importance. Service failures and failed recoveries are among the leading causes of customer switching behavior from service organizations. The exi...
متن کاملApplication-transparent checkpointing in Mach 3.O/UX
Checkpointing is perhaps the most explored of software based recovery techniques yet it has typically been developed only for special purpose or research oriented operating systems. This paper presents virtual memory checkpointing algorithms that have been designed ,for concurrent Unix applications using a hard disk as the stable storage medium. These algorithms can serve as the checkpointing s...
متن کاملEffect of Alkyl Substituents on the Hydrogen Bonding and Molecular Structure of Benzophenylhydroxamic Acids Crystal structure of UO2 Complex of p-Isopropylbenzophenylhydroxamic Acid
The effect of alkyl substituents on the C-phenyl and/or the N-Phenyl ring of benzophenylhydroxamic acid on their molecular structure and hydrogen bonding has been investigated. The predominant configuration in CHCl3 is determined by steric and electronic effects. Substituents on the C-phenyl ring favor the cis configuration, while substituents in the N-phenyl ring favor a trans c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004