Academia.eduAcademia.edu

File Replication

description9 papers
group0 followers
lightbulbAbout this topic
File replication is the process of storing copies of files in multiple locations to ensure data availability, consistency, and reliability. It involves synchronizing data across different systems or servers, enabling fault tolerance and improved access speed for users.
lightbulbAbout this topic
File replication is the process of storing copies of files in multiple locations to ensure data availability, consistency, and reliability. It involves synchronizing data across different systems or servers, enabling fault tolerance and improved access speed for users.

Key research themes

1. How do consistency protocols impact the availability and performance of replicated files in distributed systems?

This area focuses on the design, evaluation, and comparison of consistency protocols that maintain data consistency in replicated file systems under site failures and network conditions. It matters because the choice of protocol directly affects data availability, reliability, fault tolerance, and system overhead in distributed environments.

Key finding: Using Markov models, this study demonstrates that available copy protocols, including naive and optimistic variants that do not require instantaneous failure detection, achieve nearly the same high availability and... Read more
Key finding: Simulation analysis comparing Static Majority Consensus Voting, Dynamic Voting (DV), and Lexicographic Dynamic Voting (LDV) under realistic network parameters finds that both DV and LDV improve data availability over majority... Read more
Key finding: This research develops a method for detecting the last site to fail in available copy protocols to enhance recovery performance after total failure. By tracking which sites received the most recent updates without requiring... Read more
Key finding: By analyzing replica control (RC) protocols, this paper highlights a shift from focusing on failure unavailability to conflict unavailability (unavailability caused by conflicting operations) in replica control. It... Read more

2. What strategies and algorithms optimize data replication and placement for performance and resource efficiency in distributed and cloud file systems?

This theme explores techniques and models that predict, select, or dynamically adjust replication factors, replica placement, and replication policies to improve access performance, improve data locality, lower network overhead, and balance storage costs in distributed and cloud storage systems. This is essential given large-scale data volumes and the importance of efficient data access under resource constraints.

Key finding: This paper introduces an algorithm using a binary tree structure to estimate file demand potential by tracking temporal locality and demand trends over time intervals. By considering file popularity dynamics, scope, and type,... Read more
Key finding: Proposes a hybrid data replication strategy based on voting structures that balances trade-offs between read and write availability, operation costs, and scalability. The approach recognizes that existing methods cannot... Read more
Key finding: Introduces hybrid replication which partitions storage volumes into extents assigned to either continuous or snapshot replication based on overwrite frequency. This technique achieves bandwidth efficiency close to snapshot... Read more
Key finding: Experimental study on a 20-node Hadoop cluster demonstrates that increasing the replication factor for 'hot' (frequently accessed) data significantly improves data availability and locality, reducing job execution times. This... Read more
Key finding: Develops a dynamic replication policy for HDFS by clustering files using unsupervised machine learning to classify them based on usage importance. Different replication strategies are applied per cluster, optimizing storage... Read more

3. How can emerging technologies like blockchain and advanced security mechanisms improve file synchronization and security in distributed and cloud file replication systems?

This research theme investigates novel applications of blockchain technology and fragmentation-replication combined security schemes aiming to enhance immutability, auditability, and integrity for file synchronization and distributed storage, addressing challenges in trust, data provenance, multiuser access, and resilience against data attacks in cloud systems.

Key finding: Proposes a resilient cloud storage solution using blockchain to store differential file updates as linked blocks, embedding version and user signature information to enable immutable, verifiable file versions in a hybrid... Read more
Key finding: Introduces a security mechanism where files are fragmented and hashed, with each fragment stored and replicated in separate cloud locations. The approach mitigates risks from attacks by ensuring no single fragment reveals... Read more

All papers in File Replication

Cloud Computing makes immense use of internet to store a huge amount of data. Cloud computing provides high quality service with low cost and scalability with less requirement of hardware and software management. Security plays a vital... more
Cloud Computing makes immense use of internet to store a huge amount of data. Cloud computing provides high quality service with low cost and scalability with less requirement of hardware and software management. Security plays a vital... more
A distributed system is collection of computer nodes or devices that area unit geographically distributed and connected through a communication link. Security can be defined as "A state of phenomenon which gives guarantee of... more
MOBILE ad hoc networks (MANETs) have attracted a lot of attention due to the popularity of mobile devices and the advances in wireless communication technologies. A MANET is a peer-to-peer multi hop mobile wireless network that has... more
We review several existing text analysis methodologies and explain their formal application processes using the open-source software R and relevant packages. Several text mining applications to analyze central bank texts are presented.
MOBILE ad hoc networks (MANETs) have attracted a lot of attention due to the popularity of mobile devices and the advances in wireless communication technologies. A MANET is a peer-to-peer multi hop mobile wireless network that has... more
MOBILE ad hoc networks (MANETs) have attracted a lot of attention due to the popularity of mobile devices and the advances in wireless communication technologies. A MANET is a peer-to-peer multi hop mobile wireless network that has... more
Cloud computing makes immense use of internet to store a huge amount of data. Cloud computing provides high quality service with low cost and scalability with less requirement of hardware and software management. Security plays a vital... more
MOBILE ad hoc networks (MANETs) have attracted a lot of attention due to the popularity of mobile devices and the advances in wireless communication technologies. A MANET is a peer-to-peer multi hop mobile wireless network that has... more
We recently showed for peer-to-peer networks, that having the number of replicas of each object proportional to the request rate for these objects has many per-node advantages. In this paper we complement those results to show that this... more
We recently showed for peer-to-peer networks, that having the number of replicas of each object proportional to the request rate for these objects has many per-node advantages. In this paper we complement those results to show that this... more
In a Mobile Ad hoc Network (MANET), due to mobility, limited battery power and poor features of nodes, network partitioning and nodes disconnecting occur frequently. To improve data availability, database systems create multiple copies of... more
File sharing applications in mobile ad hoc networks (MANETs) have attracted more and more attention in recent years. The efficiency of file querying suffers from the distinctive properties of such networks including node mobility and... more
In MANETs some of the nodes do not take part in forwarding packets to other nodes to conserve their resources such as energy, bandwidth and power. The nodes which act selfishly to conserve their resources are called selfish nodes. The... more
ABSTARCT The nodes in Mobile Ad Hoc Network are resource constrained. This drawback and mobility nature of nodes can cause network partitioning and degradation of performance. Traditionally replica allocation techniques were used to... more
This paper presents an intelligent mechanism for a vehicular micro cloud (i.e., a cluster of connected vehicles) to form a regional distributed data storage over V2V networks. Each member vehicle keeps a subset of data contents in their... more
Wireless networks can be infrastructure based or infrastructureless. An infrastructureless network having large number of mobile nodes, which can fulfill a wireless interconnection, can be called as a MANET. The MANET nodes should be... more
We introduce a novel file replication model is optimizations reacting to changes in the patterns of access to the file system by dynamically creating or deleting replicas. Replication is used to improve data availability in the presence... more
In a Mobile Ad hoc Network (MANET), due to mobility, limited battery power and poor features of nodes, network partitioning and nodes disconnecting occur frequently. To improve data availability, database systems create multiple copies of... more
In a mobile ad hoc network, the mobility and resource constraints of mobile nodes may lead to network partitioning or performance degradation. Several data replication techniques have been proposed to minimize performance degradation.... more
MOBILE ad hoc networks (MANETs) have attracted a lot of attention due to the popularity of mobile devices and the advances in wireless communication technologies. A MANET is a peer-to-peer multihop mobile wireless network that has neither... more
MOBILE ad hoc networks (MANETs) have attracted a lot of attention due to the popularity of mobile devices and the advances in wireless communication technologies. A MANET is a peer-to-peer multihop mobile wireless network that has neither... more
in wireless ad hoc networks, all nodes cooperate to provide network services. Due to the limited radio transmission range, data packets are usually forwarded through multiple relay nodes before they reach the destinations. If a node... more
In this document we explain the various configurations and topologies supported by EnduraData Wide Area Data Distribution Software.
Download research papers for free!