博碩士論文 945302015 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:13 、訪客IP:18.190.217.134
姓名 呂衿同(Ching-Tung Lu)  查詢紙本館藏   畢業系所 資訊工程學系在職專班
論文名稱 在無線網路的iSCSI備份和還原技術
(iSCSI Backup and Recovery Technology in Wireless Network)
相關論文
★ 無線行動隨建即連網路上之廣播與繞徑問題★ 熱門電影的高效能廣播演算法
★ 無線行動隨建即連網路上之媒體存取問題★ 使用功率調整來增加多節點封包無線網路
★ 在無線行動隨建即用網路下Geocast 之設計與實做經驗★ 一個適用於熱門隨選視訊服務之快速排程廣播策略
★ 應用數位浮水印技術於影像之智慧財產權保護與認證★ 在寬頻分碼多重擷取技術上分配及再分配多重正交可變展頻係數碼
★ 無線行動隨建即連網路上之廣播排程協定★ 在無線行動隨建即連網路下支援即時多媒體傳送的媒介存取協定
★ 以樹狀結構為基礎的Scatternet建構協定★ 在無線感應器網路中具有省電機制並且採用對角線路徑的方向性擴散
★ 隨意型無線網路上一個具有能量保存的GRID繞徑協定★ 在無線感應器網路中具有省電機制的傳輸協定
★ 隨意型無線網路上一個具有能量保存以及平衡的繞徑協定★ 環形藍芽網路:一個藍芽通訊網路的新拓樸及其繞徑協定
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   [檢視]  [下載]
  1. 本電子論文使用權限為同意立即開放。
  2. 已達開放權限電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
  3. 請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。

摘要(中) 將重要資料透過網際網路備份到遠端的資料中心逐漸成為一種趨勢,但是利用網路進行資料備份的過程相當漫長且需人為介入,干擾使用者正常工作的時間。連續資料保護(CDP,Continuous Data Protection)技術是以安裝在電腦系統的中介程式監督檔案動作,只將重要資料的副本自動複製到其他磁碟裝置或透過網路傳送到遠端的儲存服務,因而可免除使用者操作的困擾和大量資料的網路傳輸。現今大部分的行動式電腦均內建無線網路,並普遍利用無線網路將資料傳送到資料中心。然而在無線網路的環境,連續資料保護系統在將歷程資料傳輸到資料中心時,會因連線頻寬不足、封包延遲時間過久、或是錯誤機率太高,而需在系統底層不斷進行重新傳送,造成電腦系統長時間等待資料完成而影響運作效能,因此連續資料保護技術目前仍不適合直接在無線網路上使用。本研究提出在作業系統啟動之前備份和還原行動電腦磁碟資料的方法,以檢查歷程資料累積的資料量為參考點,當資料量超過一定的門檻值,系統自動開啟無線網路並和網路儲存服務建立連線,隨即將資料複製到網路儲存伺服器,以降低資料損毀的風險成本。我們採用幾種不同的資料傳輸技術和無線網路連接架構評估系統的效能,從結果中可看出支援多重連線和非同步傳輸功能的iSCSI通訊技術作為無線網路資料傳輸的骨幹,不僅具有較佳的傳輸效率同時也較能抵抗高延遲環境的干擾。
摘要(英) Data backup via internet has become a trend, but the process is time-consuming and laboring, which interferes users’ normal working. Continuous Data Protection (CDP) monitors the data process with an agent program embedded in computer systems. It automatically copies the critical data to other drives or transmits data to the remote data center via internet, which successfully prevents operational troubles and enormous data transmission. Nowadays most portable computers have a built-in wireless network adapter, which is widely used to backup important data to the remote data center. Nevertheless, when transmitting data over a wireless network, CDP encounters problems of losing and repeating transmission for insufficient bandwidth, packet latency or high packet error rate. The long-time delay of computer systems seriously influences the overall efficiency, so CDP is so far not suitable for wireless networking environment. This study proposes a method to backup and restore CDP or critical data in portable computers before operating systems start. Our method begins by checking the accumulated log data and when the data reaches a certain threshold value, the system automatically turns on wireless network and connects to the remote data center. By copying the data to the data center promptly, the system could lower down the risk cost of data corruption. Using the wireless network evaluation system, we compared the performance of several different data transmission techniques. The results show that iSCSI (internet Small Computer System Interface), supporting multiple connections and asynchronous IO, can be a good transmission backbone of wireless networks because of its better transmission efficiency and greater tolerance of high network latency.
關鍵字(中) ★ 連續資料保護
★ iSCSI
★ 無線網路
★ 備份還原
關鍵字(英) ★ Continuous Data Protection
★ iSCSI
★ Wireless Network
★ Backup Recovery
論文目次 第一章、簡介...............................................................................................................1
第二章、相關研究.......................................................................................................3
2.1 iSCSI通訊協定................................................................................................3
2.2 UEFI平台.........................................................................................................4
2.3 網路儲存通訊協定.........................................................................................4
2.4 無線網路的iSCSI技術...................................................................................5
2.5 連續資料保護(Continuous Data Protection)技術....................................6
2.6 WPI的無線網路CDP技術..............................................................................7
第三章、iSCSI備份復原技術.....................................................................................9
3.1 WPI架構..........................................................................................................9
3.2 WPI特性........................................................................................................11
3.3 WPI實作........................................................................................................13
3.3.1 以USB快取記憶體裝置啟動WPI平台............................................17
3.3.2 偵測CDP歷程資料的使用量............................................................17
3.3.3 還原CDP歷程資料............................................................................19
3.3.4 以MS iSCSI Initiator檢查CDP歷程資料..........................................19
第四章、實驗結果和比較.........................................................................................21
4.1 無線網路連線模型.......................................................................................21
4.3 實驗效能測試結果.......................................................................................24
第五章、結論.............................................................................................................32
參考文獻.....................................................................................................................33
參考文獻 [1] UEFI Organization, http://www.uefi.org/about/
[2] IETF RFC 3720, Internet Small Computer Systems Interface (iSCSI), http://www.ietf.org/rfc/rfc3720.txt
[3] IBM Company, IBM Tivoli Continuous Data Protection for Files, http://www-306.ibm.com/software/tivoli/products/continuous-data-protection/
[4] J. Klearman, "Selecting WAN capable replication technologies for disaster recovery planning in mid-sized organizations: a guide for IS managers," Department of Applied Information Management, University of Oregon, 2006.
[5] C. M. Gauger, M. Kohn, S. Gunreben, D. Sass and S. G. Perez, "Modeling and performance evaluation of iSCSI storage area networks over TCP/IP-based MAN and WAN networks," in Proceedings of the Second International Conference on Broadband Networks (BROADNETS 2005), pp. 915-923, Boston, 2005.
[6] Sun Microsystems, Network file system protocol specification, March 1989.
[7] G. A. Gibson and R. V. Meter, “Network attached storage architecture,” in Proceedings of Communications of the ACM, Vol. 43 No.11, pp. 37-45, November 2000.
[8] R. Dube, C. D. Rais, and S. K. Tripathi, "Improving NFS performance over wireless links," in Proceedings of IEEE Transactions on Computers, Vol. 46, No. 3, pp. 290-298, March 1997.
[9] G. Motwani and K. Gopinath, "Evaluation of advanced TCP stacks in the iSCSI environment using simulation model," in Proceedings of the 22nd IEEE / 13th NASA Goddard Conference on Mass Storage Systems and Technologies (MSST 2005), pp. 210-217, April 2005.
[10] H. Lim and S. Choi, "Design and implementation of iSCSI-based virtual storage system for mobile health care," in Proceedings of 7th International Workshop on Enterprise networking and Computing in Healthcare Industry (HEALTHCOM 2005), pp. 37-40, 2005.
[11] J.-W. Seo, H.-S. Shin and M.-S. Park, "Optimizing iSCSI parameters for improving the performance of iSCSI based mobile appliance in wireless network," in Proceedings of International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICN/ICONS/MCL 2006), pp. 126-126, 2006.
[12] M. OK, D. KIM and M. S. PARK, "UbiqStor: A remote storage service for mobile devices," Lecture Notes in Computer Science, pp. 685-688, 2004
[13] M. R. Murphy, "iSCSI-based storage area networks for disaster recovery operations," Department of Electrical and Computer Engineering, Florida State University, Florida, US, 2005.
[14] P. Radkov, L. Yin, P. Goyal, P. Sarkar and P. Shenoy, "A performance comparison of NFS and iSCSI for IP-networked storage," in Proceedings of the 3rd USENIX Conference on File and Storage Technologies, pp. 101-114, 2004.
[15] Y. Gao, Y.-L. Zhu, H. Xong, R. Kanagavelu, J. Yan and Z.-J. Liu, "An iSCSI design over wireless network," in Proceedings of 12th IEEE International Conference on Networks (ICON 2004), Vol. 1, pp. 60-65, 2004.
[16] Y. Lu, F. Noman and D. H. C. Du, "Simulation study of iSCSI based storage system," Department of Computer Science & Engineering, University of Minnesota, Minneapolis, Dutch, 2005
[17] 陳啟川, “IT集中化的下一步,企業網域網路應用加速,” RUN!PC, 第156期, pp. 234-241, 2007.
[18] Microsoft Company, Microsoft iSCSI Software Initiator Version 2.04, http://www.microsoft.com/downloads/details.aspx?familyid=12cb3c1a-15d6-4585-b385-befd1319f825&displaylang=en
指導教授 許健平(Jang-Ping Sheu) 審核日期 2007-7-22
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明