نتایج جستجو برای: backup strategy
تعداد نتایج: 348085 فیلتر نتایج به سال:
Network survivability gauges the ability of a network to support the committed Quality of Services (QoS) continuously in the presence of various failure scenarios. MPLS Mesh-Based network can be used to provide network survivability in case of link and node failure through predesign path protection techniques. In the Preplanned self-healing networks, we have to provision adequate spare capacity...
There are two basic approaches to allocate protection resources for fast restoration. The first allocates resources upon the arrival of each connection request; yet, it incurs significant set-up time and is often capacity-inefficient. The second approach allocates protection resources during the network configuration phase; therefore, it needs to accommodate any possible arrival pattern of conn...
There are two basic approaches to allocate protection resources for fast restoration. The first allocates resources upon the arrival of each connection request; yet, it incurs significant set-up time and is often capacity-inefficient. The second approach allocates protection resources during the network configuration phase; therefore, it needs to accommodate any possible arrival pattern of conn...
This paper considers the problem of dynamically establishing dependable connections (D-connections) with specified failure restoration guarantees in wavelength-routed wavelength-division multiplexed (WDM) networks. We call a connection with fault tolerant requirements as a D-connection. We recommend using a pro-active approach to fault tolerance wherein a D-connection is identified with the est...
In distributed data base systems (DDBSs), a transaction blocks during two-phase commit (2PC) processing if the coordinator site fails and at the same time some participant site has declared itself ready to commit the transaction. The blocking phenomena reduces availability of the system since the blocked transactions keep all the resources until they receive the final command from the coordinat...
as some definitions show, idioms are expressions whose meanings cannot be obtained from individual words. in every society, people use their own conceptions and feelings through different idioms and expressions. so every culture and society has their own idioms. some scholars proposed methods for translating idioms but baker’s strategies are very important and constructive. this research tried ...
Storage capacity, like computing power, follows its Moore’s law and grows dramatically. Consequently, the need for data backup services increases. The domain of data backup was recently hit by the peer-to-peer wave: several projects propose to use a cooperative approach to the backup problem. In this paper we survey these projects, the various problems they face and the techniques they propose ...
This paper provides the system administrator with a fundamental understanding of database architecture internals so that he can better configure relational database systems. The topics of discussion include buffer management, access methods, and lock management. To both illustrate concepts in practice, and to contrast the two architectures of market leaders, Oracle and Sybase implementations ar...
We present a trace-driven simulator that evaluates the performance of backup algorithms. We use this simulator to compare the performance of the commonly-used level scheme (our name for the algorithm used by the UNIX dump utility) with that of a new algorithm called the Z scheme. We show that the Z scheme has better backup performance than the level scheme and slightly worse restore performance...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید