全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

信息系统灾备技术综论

DOI: 10.13190/jbupt.201002.1.yangyx, PP. 1-6

Keywords: 灾备,海量存储,虚拟化,重复数据删除

Full-Text   Cite this paper   Add to My Lib

Abstract:

介绍了衡量灾备系统的系统指标,总结了数据容灾、系统容灾和应用容灾的关键技术和实现方法.提出了灾备技术将按照服务模型从数据存储为中心向应用服务为中心转变、体系架构从集中式结构向分布式和虚拟化相结合的共享并发模式转变、应用模式从孤立专用系统向综合服务系统转变这3个方向发展的思路.

References

[1]  Wheatman Vic, Scott Donna, Witty Roberta. Aftermath: business continuity planning . 2001.
[2]  国务院信息化工作办公室. 重要信息系统灾难恢复指南[Z]. 北京: 国务院信息化办公室, 2005.
[3]  GB/T 20988—2007. 信息安全技术——信息系统灾难恢复规范[S]. 北京: 中国标准出版社, 2007.
[4]  H Garcia-Molina, CA Polyzois. Issues in disaster recovery // Thirty-Fifth IEEE Computer Society International Conference. San Francisco: IEEE Press, 1990:573-577.
[5]  中国人民银行总行. 中国人民银行关于加强银行数据集中安全工作的指导意见[Z]. 北京: 中国人民银行总行, 2002.
[6]  Wiboonrat M, Kosavisutte K. Optimization strategy for disaster recovery //Fourth IEEE International Conference on Management of Innovation and Technology. Bangkok:IEEE Press, 2008: 675-680.
[7]  Wiboonrat M. An empirical IT contingency planning model for disaster recovery strategy selection // IEEE International Engineering Management Conference. Estoril:IEEE Press, 2008: 1-5.
[8]  袁晓铭, 林安. 几种主流快照技术的分析比较[J]. 微处理机, 2008(1): 127-130. Yuan Xiaoming, Lin An. Research on the snapshot technology in storage systems[J]. Micro Processors, 2008(1): 127-130.
[9]  Minwen Ji, Alistair Veitch, John Wilkes. Seneca: remote mirroring done write //Proceedings of USENIX Technical Conference. Berkeley: USENIX, 2003: 253-268.
[10]  EMC Corporation. Using EMC snapview and mirrorview for remote backup [Z]. Hopkinton:EMC Corporation, 2002.
[11]  IBM中国信息支持中心. 容灾白皮书[Z]. 北京:IBM中国信息支持中心, 2006.
[12]  郭天杰, 曹强, 谢长生. 远程镜像技术和方法研究[J]. 计算机工程与科学, 2006(10):38-41, 49. Guo Tianjie, Cao Qiang, Xie Changsheng. Research on the techniques and methods of remote mirroring [J]. Computer Engineering and Science, 2006(10): 38-41, 49.
[13]  Hewlett-Packard Company. HP disk array xp1024 [Z]. USA: Hewlett-Packard Company, 2002.
[14]  IBM Corporation. DFSMS/MVS version 1 remote copy administrator’s guide and reference [M]. New York: IBM Corporation, 1997.
[15]  Veritas Software Corp. VERITAS volume replicator 3.5: administrator’s guide (solaris) [M]. USA: Veritas Software Corp , 2002.
[16]  Greg Schuweiler. Building a SAN backup solution[M]. San Francisco: Miller Freeman, Inc, 2000:8-14.
[17]  Hewlett-Packard Company. HP open view continuous access storage appliance[Z]. USA: Hewlett-Packard Company, 2002.
[18]  Minwen Ji, Alistair Veitch, John Wilkes. Seneca: remote mirroring done write //Proceedings of USENIX Technical Conference. Berkeley: USENIX, 2003:253-268.
[19]  Oracle. Oracle data guard: ensuring disaster recovery for the enterprise[Z]. Oracle: Oracle Corporation, 2002.
[20]  Quinlan, Dorward. Venti: a new approach to archival storage//Proceedings of the USENIX Conference on File and Storage Technologies (FAST). California: USENIX, 2002.
[21]  Athicha Muthitacharoen, Benjie Chen, David Mazières. A low-bandwidth network file system//Proceedings of the ACM 18th Symposium on Operating Systems Principles. Banff:, 2001.
[22]  Kulkarni, Douglis, LaVoie, Tracey. Redundancy elimination within large collections of files // Proceedings of USENIX Annual Technical Conference. : USENIX, 2004:59-72.
[23]  Data Domain. Data domain appliance series: high-speed inline deduplication storage . 2005.
[24]  Jain, Dahlin, Tewari. TAPER: tiered approach for eliminating redundancy in replica synchronization //Proceedings of USENIX File And Storage Systems (FAST). :USENIX, 2005.
[25]  Clark Elizabeth. Storage virtualization . 2003.
[26]  Mark Blunden, Mik Berx-Debeys, Deaseop Sim. Storage networking virtualization: what’s it all about [M]. New York: IBM Corporation, 2000:154-192.
[27]  Banikazemi M, Poff D, Abali B. Storage-based intrusion detection for storage area networks (SANs) // 22nd IEEE / 13th NASA Goddard Conference on Mass Storage Systems and Technologies.: IEEE Press, 2005: 118-127.
[28]  Roselinda R Schulman. Disaster recovery issues and solutions [M]. USA: HITACHI Corporation, 2004.
[29]  Kubiatowicz J, Bindel D, Chen Y. OceanStore: an architecture for global-scale persistent storage [J]. ACM SIGOPS Operationg Systems Review, 2000, 34(5):190-201.
[30]  Druschel P, Rowstron A. PAST: a large-scale persistent peer-to-peer storage utility // Proceedings of the 8th Workshop on Hot Topics in Operating Systems. :IEEE Press, 2001:65-70.
[31]  Cox L P, Murray C D, Noble B D. Pastiche: making backup cheap and easy //Proceedings of 5th USENIX Symposium on Operating Systems Design and Implementation. : USENIX, 2002: 285-298
[32]  Dabek F, Kaashoek M F, Karger D. Wide-area cooperative storage with CFS [J]. Proceedings of 18th ACM Symposium on Operating Systems Principles, 2001: 202-215.
[33]  Kamvar Sepandar D, Schlosser Mario T, Hector Garcia-Molina. The eigentrust algorithm for reputation management in P2P networks // Proceedings of 12th International Conference on World Wide Web. Hungary: ACM Press, 2003: 640-651.
[34]  冯国富, 张金城, 姜玉泉, 等. 无结构P2P覆盖网络的拓扑优化[J]. 软件学报, 2007, 18(11): 2819-2829. Feng Guofu, Zhang Jincheng, Jiang Yuquan, et al. Optimization of overlay topology for unstructured peer-to-peer [J]. Journal of Software, 2007, 18(11): 2819-2829.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133