Simultaneous Database Backup Using TCP/IP and a Specialized Network Interface Card

Simultaneous Database Backup Using TCP/IP and a Specialized Network Interface Card

Scott J. Lloyd (University of Rhode Island, USA), Joan Peckham (University of Rhode Island, USA), Jian Li (Cornell University, USA) and Qing (Ken) Yang (University of Rhode Island, USA)
Copyright: © 2005 |Pages: 22
DOI: 10.4018/978-1-59140-471-2.ch004
OnDemand PDF Download:


Data play an essential role in business today. Most, if not all, e-business applications are database driven, and data backup is a necessary element of managing data. Backup and recovery techniques have always been critical to any database and as real-time databases are used more often, real-time online backup strategies become critical to optimize performance. In this chapter, current backup methods are discussed and evaluated for response time and cost. A prototype device driver, RORIB (Real-time Online Remote Information Backup) is presented and discussed. An experiment is conducted comparing the performance, in terms of response time, of the prototype and several current backup strategies. RORIB provides an economic and efficient solution for real-time online remote backup. Significant improvement in response time is demonstrated using this prototype device driver when compared to other types of software driven backup protocols. Another advantage of RORIB is that the cost is negligible when compared to other hardware solutions for backup, such as Storage Area Networks (SAN) and Private Backup Networks (PBN). Additionally, this multilayered device driver uses TCP/IP, (Telecommunications Protocol/Internet Protocol) which allows the driver to be a “drop in” filter between existing hardware layers and thus reduces the implementation overhead and improves portability. Linux is used as the operating system in this experiment because of its open source nature and its similarity to UNIX. This also increases the portability of this approach. The driver is transparent to both the user and the database management system. Other potential applications and future research directions for this technology are presented. The goal of this work is to show a multifaceted approach that uses software and hardware to provide a cost effective and efficient real-time backup system for databases. This chapter explores the use of a specialized network card and corresponding software to provide service that is demonstrably better than current methods, due to cost containment, ease of operation, real time backup capabilities, or combinations of all of these. Prior to this research, the only option that approached this level of service was the use of an extremely expensive Private Backup Network (PBN) that does not adequately address the issue of obtaining real-time capabilities. Therefore, this research shows a true real-time system that is hardware and software independent and that can be used by any type of system to achieve the desired features.

Complete Chapter List

Search this Book:
Table of Contents
Keng Siau
Chapter 1
Ling Liu, Calton Pu, Duncan Dubugras Ruiz
This chapter presents a framework for dynamic restructuring of long-running business processes. The framework is composed of the ActivityFlow... Sample PDF
Dynamic Workflow Restructuring Framework for Long-Running Business Processes
Chapter 2
Juan Trujillo, Sergio Lujan-Mora, Il-Yeol Song
Data warehouses (DW), multidimensional databases (MDB), and OnLine Analytical Processing (OLAP) applications are based on the Multidimensional (MD)... Sample PDF
Design and Representation of Multidimensional Models with UML and XML Technologies
Chapter 3
Rick L. Wilson, Peter A. Rosen
Data perturbation is a data security technique that adds noise in the form of random numbers to numerical database attributes with the goal of... Sample PDF
Does Protecting Databases Using Perturbation Techniques Impact Knowledge Discovery?
Chapter 4
Scott J. Lloyd, Joan Peckham, Jian Li, Qing (Ken) Yang
Data play an essential role in business today. Most, if not all, e-business applications are database driven, and data backup is a necessary element... Sample PDF
Simultaneous Database Backup Using TCP/IP and a Specialized Network Interface Card
Chapter 5
Kai Mertins, Thomas Knothe, Martin Zelm
This chapter introduces Enterprise Modeling from a user point of view as a means to support new approaches for the development of networked... Sample PDF
Towards User-Oriented Enterprise Modeling for Interoperability
Chapter 6
John Krogstie, Vibeke Dalberg, Siri Moe Jenson
As more and more modern modeling tools provide the possibility of developing specialized and new modeling languages (also called meta modeling or... Sample PDF
Using a Model Quality Framework for Requirements Specification of an Enterprise Modeling Language
Chapter 7
Adolfo Lozano-Tello, Asunción Gomez-Perez
At present, the Web offers available information to people in diverse ways. With the initiative of Semantic Web, the aim is to make the content of... Sample PDF
Population of a Method for Developing the Semantic Web Using Ontologies
Chapter 8
Yun Lin, Jennifer Sampson, Sari Hakkarainen, Hao Ding
This chapter performs a systematic evaluation of two domain models and modeling languages – UML and OWL. A semiotic quality framework is used to... Sample PDF
An Evaluation of UML and OWL Using a Semiotic Quality Framework
Chapter 9
Owen Ericksson, Pär J. Agerfalk
In traditional modeling approaches, such as entity-relationship modeling, the predominant information modeling problem is how to represent external... Sample PDF
Information Modeling Based on Semantic and Pragmatic Meaning
Chapter 10
Terry Halpin
While some information modeling approaches (e.g., the Relational Model and Object-Role Modeling) are typically formalized using first-order logic... Sample PDF
Higher-Order Types and Information Modeling
Chapter 11
Keng Siau
Information modeling methods are key to the success of IS development projects. The problem in the software engineering field is not the lack of... Sample PDF
Criteria for Comparing Information Modeling Methods: Informational and Computational Equivalence
Chapter 12
Stephen Rockwell, Akhilesh Bajaj
Conceptual models have been evaluated along the dimensions of modeling complexity (how easy is it to create schemas given requirements?) and... Sample PDF
COGEVAL: Applying Cognitive Theories to Evaluate Conceptual Models
Chapter 13
Judith Kabeli, Peretz Shoval
Functional and Object Oriented Methodology (FOOM) combines two essential software-engineering paradigms: the functional (process-oriented) approach... Sample PDF
Quality Analysis Specifications: A Comparison of FOOM and OPM Methodologies
Chapter 14
Christophe Nicolle, Kokou Yetongnon, Jean-Claude Simon
This paper presents a Web-based data integration methodology and tool framework, called X-TIME, for the development of Business-to-Business (B2B)... Sample PDF
Interoperability of B2B Applications: Methods and Tools
Chapter 15
Richard Baskerville, Victor Portougal
Possibility theory is an alternative to probability theory as a basis for security management in settings where information resources are elements... Sample PDF
Possibility Theory in Protecting National Information Infrastructure
Chapter 16
Akhilesh Bajaj, Sudha Ram
Recently, there has been increased interest in information sharing among government agencies with a view toward improving security, reducing costs... Sample PDF
Enabling Information Sharing Across Government Agencies
About the Authors