Fault Tolerance and Disaster Recovery. Topics Using Antivirus software Fault tolerance –Power –Redundancy –Storage –Services Disaster Recovery –Backup/Restore.

Slides:



Advertisements
Similar presentations
By Rashid Khan Lesson 6-A Place for Everything: Storage Management.
Advertisements

Backup Strategy. An Exam question will ask you to describe a backup strategy. Be able to explain: Safe, secure place in different location. Why? – For.
Database Administration and Security Transparencies 1.
Enhanced Availability With RAID CC5493/7493. RAID Redundant Array of Independent Disks RAID is implemented to improve: –IO throughput (speed) and –Availability.
Fault tolerance and disaster recovery
WHAT IS RAID? Christopher J Dutra Seton Hall University.
Chapter 5: Server Hardware and Availability. Hardware Reliability and LAN The more reliable a component, the more expensive it is. Server hardware is.
Everything your business needs to know but probably doesn’t.
11 BACKING UP AND RESTORING DATA Chapter 4. Chapter 4: BACKING UP AND RESTORING DATA2 CHAPTER OVERVIEW Describe the various types of hardware used to.
REDUNDANT ARRAY OF INEXPENSIVE DISCS RAID. What is RAID ? RAID is an acronym for Redundant Array of Independent Drives (or Disks), also known as Redundant.
Monitoring and Troubleshooting Servers
Network+ Guide to Networks, Fourth Edition
Chapter 6: Configuring Server Storage, Backup, and Performance Options
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Processing Integrity and Availability Controls
Implementing Disaster Protection
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Servers Redundant Array of Inexpensive Disks (RAID) –A group of hard disks is called a disk array FIGURE Server with redundant NICs.
Module 12: Planning for and Recovering from Disasters.
1. Preventing Disasters Chapter 11 covers the processes to take to prevent a disaster. The most prudent actions include Implement redundant hardware Implement.
Processing Integrity and Availability Controls
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
November 2009 Network Disaster Recovery October 2014.
LAN / WAN Business Proposal. What is a LAN or WAN? A LAN is a Local Area Network it usually connects all computers in one building or several building.
Security+ All-In-One Edition Chapter 16 – Disaster Recovery and Business Continuity Brian E. Brzezicki.
ISA Topic 9: Operations Security ISA 562 Internet Security Theory & Practice.
Introduction to Computer Networks Introduction to Computer Networks.
SYSTEM ADMINISTRATION Chapter 15 Network Integrity.
Security Operations. 2 Domain Objectives Protection and Control of Data Processing Resources Media Management Backups and Recovery Change Control Privileged.
Chapter Sixteen Data Recovery and Fault Tolerance.
13.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 13: Implementing Data and.
Lesson 20. Fault Tolerance and Disaster Recovery.
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security.
Ensuring Integrity and Availability
Guide to Linux Installation and Administration, 2e 1 Chapter 9 Preparing for Emergencies.
Chapter Fourteen Windows XP Professional Fault Tolerance.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Chapter 8 Implementing Disaster Recovery and High Availability Hands-On Virtual Computing.
Module 12: Managing Disaster Recovery. Overview Preparing for Disaster Recovery Backing Up Data Scheduling Backup Jobs Restoring Data Configuring Shadow.
© 2001 by Prentice Hall11-1 Local Area Networks, 3rd Edition David A. Stamper Part 4: Installation and Management Chapter 11 LAN Administration: Backup.
REDUNDANCY Dr. John P. Abraham Professor UTPA. This slide series is a summary of what we discussed in class. Power Broadband Hard Drive Backup Cluster.
©2006 Merge eMed. All Rights Reserved. Energize Your Workflow 2006 User Group Meeting May 7-9, 2006 Disaster Recovery Michael Leonard.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter 11 Backup and Recovery of Exchange Server 2003.
Module 9 Planning a Disaster Recovery Solution. Module Overview Planning for Disaster Mitigation Planning Exchange Server Backup Planning Exchange Server.
15 Copyright © 2007, Oracle. All rights reserved. Performing Database Backups.
MCTS Guide to Microsoft Windows Vista Chapter 4 Managing Disks.
Mark A. Magumba Storage Management. What is storage An electronic place where computer may store data and instructions for retrieval The objective of.
Module 13 Implementing Business Continuity. Module Overview Protecting and Recovering Content Working with Backup and Restore for Disaster Recovery Implementing.
Ensuring Network Security Making Networks Secure Maintaining a Healthy Network Environment Avoiding Data Loss 1.
Windows Server 2003 硬碟管理與磁碟機陣列 林寶森
Disaster Recovery and Business Continuity Planning.
"1"1 Introduction to Managing Data " Describe problems associated with managing large numbers of disks " List requirements for easily managing large amounts.
XP Practical PC, 3e Chapter 6 1 Protecting Your Files.
BACKUP & RECOVERY Option 1: Transaction Processing Systems.
McLean HIGHER COMPUTER NETWORKING Lesson 15 (a) Disaster Avoidance Description of disaster avoidance: use of anti-virus software use of fault tolerance.
Lesson 8—Networking BASICS1 Networking BASICS Managing a Local Area Network Unit 2 Lesson 8.
Security and Backup. Introduction A back-up strategy must cover all eventualities: Accidental damage Equipment failure Deliberate damage It must consider:
Group 2 Bernard Smith Thomas Laborde Hannah Prather Fault Tolerance Environment Power Topology and Connectivity Servers Hurricane Preparedness Network.
HalFILE 2.1 Network Protection & Disaster Recovery.
1/28/2010 Network Plus Malware and Ensuring Availability.
WINDOWS SERVER 2003 Genetic Computer School Lesson 12 Fault Tolerance.
Install, configure and test ICT Networks
1 CEG 2400 Fall 2012 Network Servers. 2 Network Servers Critical Network servers – Contain redundant components Power supplies Fans Memory CPU Hard Drives.
Chapter 13 Ensuring Integrity and Availability. What Are Integrity and Availability? Integrity: soundness of network’s programs, data, services, devices,
Hands-On Microsoft Windows Server 2008 Chapter 7 Configuring and Managing Data Storage.
Security Operations Chapter 11 Part 2 Pages 1262 to 1279.
REDUNDANCY Dr. John P. Abraham Professor UTPA. This slide series is a summary of what we discussed in class. Power Broadband Hard Drive Backup Cluster.
AS ICT Module 2 Objectives: Security of Data
Managing Multi-User Databases
Introduction to Operating Systems
Presentation transcript:

Fault Tolerance and Disaster Recovery

Topics Using Antivirus software Fault tolerance –Power –Redundancy –Storage –Services Disaster Recovery –Backup/Restore –Offsite storage –Hot and Cold spares –Hot, warm, and cold sites

Assessing Fault Tolerance and Disaster Recovery Needs A proper disaster recovery plan encompasses planning and preparing for a network disaster, but also recovering from it. A disaster is anything that destroys data or attempts, either deliberately or accidentally, to impair network operation. Disaster recovery is often taken too lightly and many administrators come to regret it.

Prepared for Disaster Hot site Warm site Cold site

Hot Site In a hot site, every computer system and piece of information has a redundant copy. This level of fault tolerance is used when systems must be up 100 percent of the time. Hot sites are strictly fault-tolerant implementations, not disaster recovery.

Two Levels of Clustering Failover Clustering –Active and passive servers –Uses a heart beat to detect failure Advantages and Disadvantages True Clustering –Supports multiple devices –Provides load balancing Advantages and Disadvantages

Fault Tolerance One system fails, one takes over 100% of clients

Warm Site In a warm site, the network service and data are available most of the time. The data and services are less critical than those in a hot site. The most commonly used warm-site technology is a duplicate server. This is Disaster Recovery not fault- tolerance

Cold Site A cold site cannot guarantee server uptime. If a server fails, the IT personnel will do their best to recover and fix the problem

Power Management Surge Protectors Battery Backup Line Conditioners Power management is for fault tolerance

Surge Protectors Level of Protection –Only covers Over-voltage –Common Components Active Protection Light Site Wiring Fault Light Ground IEEE 587 Category A (ANSI/IEEE C62.41) Let-Through UL Listing Circuit Breaker Additional Ports

Battery Backup Battery backup systems protect computer systems from power failures. –Under-Voltage Brown outs Black outs –Two Main Types of Battery Backup Standby Power Supply Uninterruptible Power Supply

Standby Power Supply Power is supplied from the AC unit Battery is backup only Uses a micro-switch to change power sources in the event of a power failure –They may include: Surge protection Multiple outlets Line voltage indicator Batter power indicator System management port

Uninterruptible Power Supply Power is supplied through the battery Batteries must be replaced regularly –They may include: Multiple outlets Line voltage indicator Batter power indicator System management port

Line Conditioners Dirty power introduces noise in the system. This can cause many types of problems, including –random lockups, –random reboots, and –system crashes.

Disk System Fault Tolerance Mirroring Duplexing Data striping Redundant Array of Independent (or Inexpensive) Disks (RAID)

Partitions Primary partitions Extended partition with logical drives Physical disk CC DD E F G

RAID Data written to multiple disks Data can be restored if one disk fails

Striping (RAID 0) Data DDAATTAA

Mirroring or Duplexing (RAID 1) Disk controllers Data DATADATADATADATADATADATADATADATA Drive 0Drive 1Drive 0Drive 1 Mirroring Duplexing

Striping with Parity (RAID 5) Data DD DD DD DD ParityParity ParityParity AA DD AA AA ParityParity TT AA AA TTParityParity AA TT TT TT ParityParity AA AA AA AA

Backup Considerations Backup Media Options Small-Capacity Removable Disks Large-Capacity Removable Disks Removable Optical Disks Magnetic Tape

Backup Policies Backup policy Testing Hardware and media Administration Software

The Standard Procedure for Database Backup Procedure for backing up a database: 1.Take database offline 2.Back up the database files 3.Clear the circular logs 4.Put the database back online

Standard Procedure for Database Restoration Procedure for restoring a database: 1.Take database offline 2.Restore database from latest tape 3.Put database back online and do not allow clients to connect 4.Play back the circular logs 5.Allow users to connect

Data Backups Your company’s last line of defense Considerations: What value does the data have? How will the backup be stored? Tape Disk Cloud What procedure will be used?

Backup Media Types Tapes Hard disks CD- and DVD-ROMs Cloud services

Backup Types Full Differential Incremental Full backup Amount of data 100% 50% Amount of data % 50% 100% 50% Full

Backup Types TypeWhat is Backed up Archive Bit Cleared? Number of sets to restore FullAll DataYesFull only DifferentialSince Last Full Backup NoFull plus Last differential IncrementalSince Last Backup YesFull plus every daily incremental to the last Full backup

Monthly tapes: 12 plus 1 extra Daily tapes: 4 for Mon – Thur, plus 1 extra Weekly tapes: 4 Fridays, plus 1 extra The GFS Rotation Method

The Tower of Hanoi Rotation Method Day Media Set Used Every A2 days B4 days C8 days D & E 16 days alternating between set D and E AAAAAAAA BBBB CC D E

Maintaining a Data Backup System Backup maintenance Maintain the data integrity Test your backups Maintain your hardware Inspect tapes Clean drives

Data Backup System Maintenance Verify backups Test restoration Review logs Replace tapes on schedule Maintain tapes and tape drives Clean tape drives Replace damaged tapes

Backing Up Remote Users and Workstations 1.Must be online and powered up 2.Remote users may require a method of backup that allows them to back up from the road 3.Consider Web-based backups

Specialized Data Backups Enterprise backupsMobile users Power user workstations Open filesDatabase

Virus Protection Types of Viruses –File Viruses –Macro Viruses –Boot Sector Viruses –Hoax Virus

Updating Antivirus Components A typical antivirus program consists of two components: –The definition files –The engine

Scanning for Viruses Two types of antivirus scans: –On-demand –On-access

Software Revisions Is It Necessary? Where to Get Patches How to Apply Patches

Summary Exam Essentials Review Questions