© 2003, Parvat Infotech Private Limited Linux Bangalore / 2003 Backing Up for Eternity Dr. Martin Atkins Parvat Infotech Private Limited.

Slides:



Advertisements
Similar presentations
Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
Advertisements

A new standard in Enterprise File Backup. Contents 1.Comparison with current backup methods 2.Introducing Snapshot EFB 3.Snapshot EFB features 4.Organization.
Archiving, Indexing, Retrieving reports - COLD storage What is an archive? What is an archive? Why should we archive reports? Why should we archive reports?
Harris LiveVault® Online Backup System. Harris LiveVault 2  What is Harris LiveVault?  Why Harris LiveVault?  How Harris LiveVault works  Harris LiveVault.
1 Deciding When to Forget in the Elephant File System University of British Columbia: Douglas. S. Santry, Michael J. Feeley, Norman C. Hutchinson, Ross.
CS 443 Advanced OS Fabián E. Bustamante, Spring 2005 Venti : A new approach to archival storage Sean Quinlan & Sean Dorward Bell Labs, Lucent Technology.
Backups Backups are essential for recovering from – mistakes deleting a file by accident making changes to a document or file that turn out to be undesirable.
11 BACKING UP AND RESTORING DATA Chapter 4. Chapter 4: BACKING UP AND RESTORING DATA2 CHAPTER OVERVIEW Describe the various types of hardware used to.
Understand Database Backups and Restore Database Administration Fundamentals LESSON 5.2.
File System Implementation
CS 333 Introduction to Operating Systems Class 18 - File System Performance Jonathan Walpole Computer Science Portland State University.
CIS 240 Introduction to UNIX Instructor: Sue Sampson.
1 Stanford Archival Repository Project Brian Cooper Arturo Crespo Hector Garcia-Molina Department of Computer Science Stanford University.
Backups George Hewitt BCS Teesside - 8 th Feb 2012.
Linux+ Guide to Linux Certification, Third Edition Chapter 11 Compression, System Backup, and Software Installation.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Security and Backup Avoid disasters – have a good backup policy Avoid disasters – have a tight security scheme in place UK law dictates the board of directors.
Servers Redundant Array of Inexpensive Disks (RAID) –A group of hard disks is called a disk array FIGURE Server with redundant NICs.
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES Windows Encryption File System (EFS) Tech Briefing July 18 th 2008
Document Backup I & II Nasouh Keilani Computer Technician.
Database Key Management CSCI 5857: Encoding and Encryption.
BACKUP/MASTER: Immediate Relief with Disk Backup Presented by W. Curtis Preston VP, Service Development GlassHouse Technologies, Inc.
NovaBACKUP 10 xSP Technical Training By: Nathan Fouarge
Backups in Linux Ning Zhu Class presentation. Introduction The dump and restore commands are the most common way to create and restore from backups in.
File Organization Techniques
Physical Storage and File Organization COMSATS INSTITUTE OF INFORMATION TECHNOLOGY, VEHARI.
BACKUP & RESTORE The purpose of backup is to protect data from loss. The purpose of restore is to recover data that is temporarily unavailable due to some.
The McGraw-Hill Companies, Inc Information Technology & Management Thompson Cats-Baril Chapter 3 Content Management.
DATA DEDUPLICATION By: Lily Contreras April 15, 2010.
1 Maintain System Integrity Maintain Equipment and Consumables ICAS2017B_ICAU2007B Using Computer Operating system ICAU2231B Caring for Technology Backup.
Hosted by Designing a Backup Architecture That Actually Works W. Curtis Preston President/CEO The Storage Group.
| nectar.org.au NECTAR TRAINING Module 9 Backing up & Packing up.
Linux+ Guide to Linux Certification Chapter Thirteen Compression, System Back-Up, and Software Installation.
Consider the short (and useless) C program off to the right. Each of the variables {a, b, c} references an integer value that occupies some memory at runtime.
Overview of Physical Storage Media
File Processing : Storage Media 2015, Spring Pusan National University Ki-Joune Li.
Backup & Restore The purpose of backup is to protect data from loss. The purpose of restore is to recover data that is temporarily unavailable due to some.
BACKUP & RECOVERY Option 1: Transaction Processing Systems.
Continuous Backup for Business CrashPlan PRO offers a paradigm of backup that includes a single solution for on-site and off-site backups that is more.
Week 7 : Chapter 7 Agenda SQL 710 Maintenance Plan:
ITEC 502 컴퓨터 시스템 및 실습 Chapter 11-2: File System Implementation Mi-Jung Choi DPNM Lab. Dept. of CSE, POSTECH.
Cosc 4750 Backups Why Backup? In case of failure In case of loss of files –User and system files Because you will regret it, if you don’t. –DUMB = Disasters.
CS333 Intro to Operating Systems Jonathan Walpole.
1 3 Computing System Fundamentals 3.6 Errors Prevention and Recovery.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
1 itec 400 Backups George Vaughan Franklin University.
1. During the standard installation of NetBackup 6.5 you will need to select a Custom install. 2. A valid License Key to install the Windows Media server.
IMS 4212: Data and Database Administration 1 Dr. Lawrence West, Management Dept., University of Central Florida Data & Database Administration.
| nectar.org.au NECTAR TRAINING Module 9 Backing up & Packing up.
Oracle Applications 11i Concepts II Brian Hitchcock OCP 11i DBA -- OCP 10g DBA Sun Microsystems Brian Hitchcock.
FILE ORGANIZATION.
COMPUTER SYSTEM TOOLS. SCANDISK MICROSOFT UTILITY PURCHASED FROM NORTON, WHICH IS NOW SYMANTEC; INCLUDED WITH MS-DOS 6.2 AND ON AS WELL AS ALL VERSIONS.
Accelerator Troubleshooting. NetBackup Accelerator 2.
ICT Unit 3 Storage Devices and Media. What is backing up of data? Backing up refers to the copying of file to a different medium It’s useful if in case.
CloudBerry Explorer for S3. CB Explorer Free to use Browse and manage files PowerShell functions Open and edit files  CloudBerry Explorer is an easy.
Whatsapp Security Ahmad Hijazi Systèmes de Télécommunications & Réseaux Informatiques (STRI) 20 April 2016.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
CommVault Architecture
CDP Technology Comparison CONFIDENTIAL DO NOT REDISTRIBUTE.
tar: The tape archive program _______________________ Amber Jain IC-2K7-05 _______________________.
Networking Objectives Understand what the following policies will contain – Disaster recovery – Backup – Archiving – Acceptable use – failover.
File-System Management
Integrating Disk into Backup for Faster Restores
Jonathan Walpole Computer Science Portland State University
Filesystem Management and Backups
System Backup Strategies
4J, K, L, M, N, O Component 2.
FILE ORGANIZATION.
Guarding against loss of data
Presentation transcript:

© 2003, Parvat Infotech Private Limited Linux Bangalore / 2003 Backing Up for Eternity Dr. Martin Atkins Parvat Infotech Private Limited

© 2003, Parvat Infotech Private Limited Linux Bangalore / 2003 Why don't people do backups? ● They don't understand how to do it – in a reasonable time, given their setup, etc. ● They don't get any added value from backups – until the system breaks! ● They don't like 'wasting' media – I only wrote this CD last week.... ● They don't think their data is so important – right up until they lose it! ● They have better things to do

© 2003, Parvat Infotech Private Limited Linux Bangalore / 2003 But I do do backups! ● Most backup systems – are designed primarily to backup to tapes ● tapes are re-cycled (losing history) ● tapes and tape drives are expensive, awkward, unreliable, etc. – can backup to write-once media, but: ● each backup supersedes much of the old backup ● old media becomes almost useless (beermats!) ● no help for finding historical copies of data

© 2003, Parvat Infotech Private Limited Linux Bangalore / 2003 Eternal - Management Overview ● Set-up and forget – as far as possible ● Not just backup - also history – What did that file look like yesterday?... Last week?... Last year?... – Eternal history filesystem mounted on /backup – e.g. cd /backup/2003/aug/21/home/martin/... ● Old archive media is never superseded – it becomes part of your history record

© 2003, Parvat Infotech Private Limited Linux Bangalore / 2003 How is this possible? ● Identical data blocks are never stored twice – uses the 'Venti' algorithm ● developed for Plan 9 (from Bell Labs) – tremendous 'compression', e.g. ● every machine in a network has the same copy of vmunix, etc ● most of my files are the same today, as they were yesterday – makes it feasible to store the total system and/or network history

© 2003, Parvat Infotech Private Limited Linux Bangalore / 2003 Techie Overview ● Client / Server architecture – both can be on the same machine ● No Full / Incremental backup decision – all backups are created equal – every backup contains the entire filesystem state ● Primary operation is 'disk-to-disk' – backups can be fully automatic – restore operations do not need access to removable media

© 2003, Parvat Infotech Private Limited Linux Bangalore / 2003 Friendly towards removable-media ● data is batched in CD (or DVD) sized units ● media can be written when it is convenient for you! ● data, once written, is never changed – 2 copies can be made for extra security ● 1 for your shelf ● 1 to go off-site (in a bank vault?) ● media is only read if backup server must be restored

© 2003, Parvat Infotech Private Limited Linux Bangalore / 2003 How does it work? ● Each block of data is indexed by its 'fingerprint' – the 160-bit SHA1 hash of the contents – identical data blocks will hash to the same value – different data blocks can also hash to the same value ● but only with a probability of 1 in (i.e. 1 in ) ● if we store 10 6 terabytes, the chance of an identical hash somewhere in the data is about 1 in ● SHA1 is 'cryptographically secure' – meaning that 'you can't calculate it backwards in a reasonable time'

© 2003, Parvat Infotech Private Limited Linux Bangalore / 2003 The Server ● Server receives request to store a block 1) calculates the block's fingerprint 2) if that finger print not in index: store block in the backup history 3) return the block's fingerprint ● Server receives request to retrieve a block 1) fingerprint given in request 2) if fingerprint is not in index return error 3) return data from backup history

© 2003, Parvat Infotech Private Limited Linux Bangalore / 2003 The Client ● E.g., backup /d1/d2/f1 /d1/d2/f2 /d1/f3 ● tar-like utility files  20 bytes f1 f2 f1: f2: d2: f3: D1: f3 f1 f2 f1: f2: d2: f3: D1: f3 f3' d2: f3: D1': Monday Tuesday fingerprint: data block: Key:

© 2003, Parvat Infotech Private Limited Linux Bangalore / 2003 Status and Information ● Eternal is currently being developed by Parvat Infotech in Bangalore ● first release intended for early 2004 ● try-before-you-buy licenses – individual and commercial prices ● For more information, please see