IEEE INFOCOM 2014 - IEEE Conference on Computer Communications 2014
DOI: 10.1109/infocom.2014.6848101
|View full text |Cite
|
Sign up to set email alerts
|

Distributed backup scheduling: Modeling and optimization

Abstract: Abstract-Recent years have seen rapid growth in data storage, magnifying the importance of ensuring data safety by performing regular backups. However, traffic created by such backups can be a significant burden on the underlying communication network. In the present paper we address the tradeoff between frequent backups (increased safety) and reducing the network peak load. We address the problem of shifting backup traffic from peak hours to off-peak hours within the constraints imposed by user connectivity. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…This paper is one of the first to address the data backup challenge from a queueing-theoretic point of view. To the best of our knowledge, only van de Ven et al also consider this point of view [4]. Whereas we study a threshold-based policy, van de Ven et al examine a probabilistic backup policy, that is at each time slot the user decides with some probability whether to initiate a backup, regardless of the backlog size.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…This paper is one of the first to address the data backup challenge from a queueing-theoretic point of view. To the best of our knowledge, only van de Ven et al also consider this point of view [4]. Whereas we study a threshold-based policy, van de Ven et al examine a probabilistic backup policy, that is at each time slot the user decides with some probability whether to initiate a backup, regardless of the backlog size.…”
Section: Discussionmentioning
confidence: 99%
“…There are several directions for future research. The assumption of iid sequence {A k } may be relaxed, because in practice it is likely that the arrival process exhibits some cyclic pattern, as described by van de Ven et al [4]. Our approach will then have to be slightly adapted by using partial or vector generating functions instead of probability generating functions, in order to keep track of the position within the cycle.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…RPO compliance has also been studied in non-containerized environments. For instance, leveraging historic information [11], or accounting for existing traffic patterns [16] or criticality of data being backed up [18] help in complying with RPO. However, the backup environment may still experience unexpected failures or resource overload, which is more typical in containerized environments due to high job churn.…”
Section: Related Workmentioning
confidence: 99%
“…rate of change, IO burst patterns, and in a cluster undergoing various bandwidth patterns over a long period of simulated time. Use of simulators [10,16] is common to evaluate schedulers at a large scale. Evaluation with 2500 volumes with varying RPOs shows that our system can quickly react to resource fluctuations and reduce RPO violations and required snapshots.…”
Section: Introductionmentioning
confidence: 99%