• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhou Yunxia, Zhao Yuelong, Yang Xi. Disaster Tolerance in Storage System of the Intelligent Network Disk(IND)[J]. Journal of Computer Research and Development, 2012, 49(7): 1587-1592.
Citation: Zhou Yunxia, Zhao Yuelong, Yang Xi. Disaster Tolerance in Storage System of the Intelligent Network Disk(IND)[J]. Journal of Computer Research and Development, 2012, 49(7): 1587-1592.

Disaster Tolerance in Storage System of the Intelligent Network Disk(IND)

More Information
  • Published Date: July 14, 2012
  • Due to the requirement of storing massive data in information age, a lot of new storage theories and technologies are presented. The storage system of the intelligent network disk (IND) will be an important technological method to solve the problem of massive data storage. There are few researches on data disaster tolerance of this kind of storage system so far. After introducing and analyzing the storage system of the intelligent network, and studying the characteristics of data distribution in this storage system and the existing technology about data disaster tolerance, we put forward a self immunity algorithm and a backup IND algorithm of data disaster tolerance in the storage system of IND. Finally, it is proved that these algorithms are correct and well performed by the experiments on high speed local area network. The theories and experiments have also proved that the backup IND algorithm of data disaster tolerance is more reliable than the self immunity algorithm of data disaster tolerance. The study in this paper will be a good reference or source of theory for the researches on disaster tolerance of the storage system of IND in the future, and perfect the theory and technology of IND.
  • Related Articles

    [1]Guo Yuhan, Zhang Yu, Shen Xueli, Yu Junyu. Multi-Strategy Solution Space Graph Search Algorithm of Real-Time Ride-Sharing Problem[J]. Journal of Computer Research and Development, 2020, 57(6): 1269-1283. DOI: 10.7544/issn1000-1239.2020.20190484
    [2]Sun Qian, Xue Leiqi, Gao Ling, Wang Hai, Wang Yuxiang. Selection of Network Defense Strategies Based on Stochastic Game and Tabu Search[J]. Journal of Computer Research and Development, 2020, 57(4): 767-777. DOI: 10.7544/issn1000-1239.2020.20190870
    [3]Shen Yijie, Zeng Dan, Xiong Jin. A Benefit Model Based Data Reuse Mechanism for Spark SQL[J]. Journal of Computer Research and Development, 2020, 57(2): 318-332. DOI: 10.7544/issn1000-1239.2020.20190563
    [4]Wang Ye, Li Qingbao, Zeng Guangyu, Chen Zhifeng. A Code Reuse Attack Protection Technique Based on Code Anti-Leakage[J]. Journal of Computer Research and Development, 2016, 53(10): 2277-2287. DOI: 10.7544/issn1000-1239.2016.20160423
    [5]Xie Heng, Wang Mei, Le Jiajin, Sun Li. Calculation Results Characteristics Extract and Reuse Strategy Based on Hive[J]. Journal of Computer Research and Development, 2015, 52(9): 2014-2024. DOI: 10.7544/issn1000-1239.2015.20140548
    [6]Jin Wenbing, Shi Feng, Zuo Qi, Zhang Yang. Study of Ahead Branch Prediction Architecture and Algorithm[J]. Journal of Computer Research and Development, 2013, 50(10): 2228-2238.
    [7]Lin Junmin, Wang Wei, Qiao Lin, and Tang Zhizhong. A Cache Replacement Policy Based on Reuse Distance Prediction and Stream Detection[J]. Journal of Computer Research and Development, 2012, 49(5): 1049-1060.
    [8]Zhang Qi, Wang Mei, Le Jiajin, Liu Guohua. Scheduling Algorithm for the Reuse Buffers in Column-Store Data Warehouse Query Execution[J]. Journal of Computer Research and Development, 2011, 48(10): 1942-1950.
    [9]Luo Shutong, Pei Zhili, Zhang Changhai, Jin Ying. A of Feature Reuse Method at Requirement Level Based on Aspect Encapsulation[J]. Journal of Computer Research and Development, 2011, 48(9): 1714-1721.
    [10]Song Shijie, Hu Huaping, Zhou Jiawei, and Jin Shiyao. A Sequential Pattern Mining Algorithm Based on Large-Itemset Reuse[J]. Journal of Computer Research and Development, 2006, 43(1): 68-74.

Catalog

    Article views (656) PDF downloads (443) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return