CFP last date
22 April 2024
Reseach Article

Compression and Replication of Device Files using Deduplication Technique

by Bharati, Siddhant Agarwal, Abhishek Somani, Rukmi Patel, Ankita Shingvi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 45 - Number 1
Year of Publication: 2012
Authors: Bharati, Siddhant Agarwal, Abhishek Somani, Rukmi Patel, Ankita Shingvi
10.5120/6744-8847

Bharati, Siddhant Agarwal, Abhishek Somani, Rukmi Patel, Ankita Shingvi . Compression and Replication of Device Files using Deduplication Technique. International Journal of Computer Applications. 45, 1 ( May 2012), 19-24. DOI=10.5120/6744-8847

@article{ 10.5120/6744-8847,
author = { Bharati, Siddhant Agarwal, Abhishek Somani, Rukmi Patel, Ankita Shingvi },
title = { Compression and Replication of Device Files using Deduplication Technique },
journal = { International Journal of Computer Applications },
issue_date = { May 2012 },
volume = { 45 },
number = { 1 },
month = { May },
year = { 2012 },
issn = { 0975-8887 },
pages = { 19-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume45/number1/6744-8847/ },
doi = { 10.5120/6744-8847 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:36:30.545195+05:30
%A Bharati
%A Siddhant Agarwal
%A Abhishek Somani
%A Rukmi Patel
%A Ankita Shingvi
%T Compression and Replication of Device Files using Deduplication Technique
%J International Journal of Computer Applications
%@ 0975-8887
%V 45
%N 1
%P 19-24
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

One of the biggest challenges to the data storage community is how to effectively store data without taking the exact same data and storing again and again in different locations on the back end servers. In this paper, we outline the performance achievements that can be achieved by exploiting block level data deduplication in File Systems. We have achieved replication of data by storing a deduplicated copy of the original data on the backup partition, which can enable us to access or restore data in case of a system crash.

References
  1. Request-based Device-mapper multipath and Dynamic load balancing by kiyoshi Ueda, Jun'ichi Nomura and Mike Christie.
  2. A Device Mapper based Encryption Layer for TransCrypt by Sainath Vella.
  3. Edward Goggin, Linux Multipathing Proceedings of the Linux Symposium, 2005.
  4. Jens Axboe, Notes on the Generic Block Layer Rewrite in Linux 2. 5, Documentation/block/ biodoc. txt, 2007.
  5. Netlink - Communication between kernel and userspace (PF NETLINK). Manual Page Netlink.
  6. Satyam Sharma, Rajat Moona, and Dheeraj Sanghi. TransCrypt: A Secure and Transparent Encrypting File System for Enterprises.
  7. Mike Anderson, SCSI Mid-Level Multipath, Proceedings of the Linux Symposium, 2003.
  8. Daniel Pierre Bovet and Marco Cesati. Understanding the Linux Kernel. O'Reilly& Associates, Inc. , third edition, 2006.
  9. The Linux Kernel Homepage, Website http://www. kernel. org.
  10. http://www. quantum. com/Solution s/datadeduplication/ Index. aspx.
  11. Dmsetup - low level logical volume management. Manual Page. Dmsetup.
  12. Red Hat Inc. Device-mapper Resource Page. Website. http://sources. redhat. com/dm/. ??
  13. dm-crypt: a device-mapper crypto target for Linux. Website. ?http://www. saout. de/misc/dm-crypt/. ??
Index Terms

Computer Science
Information Sciences

Keywords

Deduplication Replication Data Storage Vfs (virtual File System)