Flylib.com
List of Tables
Previous page
Table of content
Next page
< Day Day Up >
Chapter 2: Business Requirements of Backup Systems
Figure 2.1: Recovery point and recovery time.
Figure 2.2: Cumulative incremental backup.
Figure 2.3: Differential incremental.
Chapter 3: An Introduction to NetBackup
Figure 3.1: NetBackup tiered architecture.
Figure 3.2: LAN-based backup.
Figure 3.3: Library sharing.
Chapter 5: General Discussion on Configuration
Figure 5.1: NetBackup Windows install shield.
Figure 5.2: NetBackup License Key screen.
Figure 5.3: Initial screen.
Figure 5.4: Getting Started Wizard welcome screen.
Figure 5.5: Getting Started Wizard: Step 1.
Figure 5.6: Device Configuration Wizard welcome screen.
Figure 5.7: Device Configuration Wizard: Device Hosts.
Figure 5.8: Device Configuration Wizard: Scanning Hosts.
Figure 5.9: Device Configuration Wizard: Backup Devices.
Figure 5.10: Device Configuration Wizard: Drag and Drop Configuration #1.
Figure 5.11: Device Configuration Wizard with full serialization Drag and Drop Configuration.
Figure 5.12: Device Configuration Wizard.
Figure 5.13: Device Configuration Wizard: Updating Device Configuration.
Figure 5.14: Device Configuration Wizard: Configure Storage Units.
Figure 5.15: Select storage unit type.
Figure 5.16: Storage unit configuration: Media Manager.
Figure 5.17: Storage unit configuration: Disk.
Figure 5.18: Newest storage unit configuration screen for NetBackup 4.5 FP3.
Figure 5.19: Volume Configuration Wizard.
Figure 5.20: Volume Configuration Wizard: Updated volume database.
Figure 5.21: Volume Configuration Wizard: Identify Cleaning Media.
Figure 5.22: Backup Policy Configuration Wizard-Windows.
Figure 5.23: Policy Configuration Wizard-UNIX.
Figure 5.24: Backup Policy Configuration Wizard: Backup Type.
Figure 5.25: Backup Policy Configuration Wizard: Rotation.
Figure 5.26: Backup Policy Configuration Wizard-Windows.
Figure 5.27: Backup Policy Configuration Wizard-UNIX.
Figure 5.28: Backup Policy Configuration Wizard: Attributes.
Figure 5.29: Windows Policy Configuration Wizard: Schedules.
Figure 5.30: UNIX Policy Configuration Wizard: Schedules.
Figure 5.31: UNIX Policy Configuration Wizard: Adding a schedule.
Figure 5.32: NetBackup Catalog Backup Wizard.
Chapter 6: Monitoring the Backup Process
Figure 6.1: Administration Console.
Figure 6.2: Activity Monitor.
Figure 6.3: Job Details: Overview tab.
Figure 6.4: Job Details: Details Status tab.
Figure 6.5: Job Details: Non-zero job details.
Figure 6.6: Troubleshooter: Problem description.
Figure 6.7: Troubleshooter: Recommended actions.
Figure 6.8: Troubleshooter from the command line.
Figure 6.9: Activity Monitor: Services.
Figure 6.10: Activity Monitor: Daemons.
Figure 6.11: Monitoring jobs from the command-line interface on a Windows system.
Figure 6.12: Display UNIX daemons from command-line interface.
Figure 6.13: Drive status output from the command-line interface.
Figure 6.14: Reports from Windows Administration Console.
Figure 6.15: Character-based interface bpadm.
Figure 6.16: Media Manager reports.
Figure 6.17: Media list report.
Figure 6.18: Media summary report.
Figure 6.19: Images on the media report.
Figure 6.20: Media log entries report.
Figure 6.21: Media written report.
Figure 6.22: Media contents report.
Chapter 7: Evaluating Other Backup-Related Features and Options
Figure 7.1: Library sharing.
Figure 7.2: NetBackup Shared Storage Option (SSO).
Figure 7.3: Offhost backup.
Figure 7.4: Global Data Manager.
Figure 7.5: GDM dashboard.
Chapter 9: The Expanding Backup System
Figure 9.1: Full Backup Model.
Figure 9.2: Differential Incremental Backup Model.
Figure 9.3: Cumulative Incremental Backup Model.
Figure 9.4: Proof of Differential Archive Size.
Figure 9.5: Active-passive master server solution.
Figure 9.6: Two-master server configuration.
Figure 9.7: 100-Mbps network bottleneck.
Figure 9.8: GbE network enhancement.
Figure 9.9: Multiple network bottleneck.
Figure 9.10: Network enhancement.
Figure 9.11: Dual networked master.
Figure 9.12: SAN attached master server.
Chapter 10: The Future of Backup
Figure 10.1: Virtual backups.
Figure 10.2: Real-time backup-High level.
Figure 10.3: Future real-time backup-Block-level replication.
Figure 10.4: Double-Take replication.
Figure 10.5: Consistent snapshots.
Appendix D: Disaster Recovery Planning Kit-From End to Beginning
Figure D.1: Disaster recovery plan model.
Appendix E: Business Impact Analysis Planning Kit-The Storm Before the Calm
Figure E.1: Discovery meeting invitation.
Figure E.2: Appointment confirmation email.
Figure E.3: Agenda email.
Figure E.4: Review email.
< Day Day Up >
Previous page
Table of content
Next page
Implementing Backup and Recovery: The Readiness Guide for the Enterprise
ISBN: 0471227145
EAN: 2147483647
Year: 2005
Pages: 176
Authors:
David B Little
,
David A. Chapa
BUY ON AMAZON
Cisco IP Communications Express: CallManager Express with Cisco Unity Express
Paging
Summary
Configuring and Monitoring Via Network Management Systems Using the Cisco CME AXL/SOAP Interface
Cisco IPC Express System Configuration Example
Troubleshooting Transcoding
Cisco IOS Cookbook (Cookbooks (OReilly))
Defining Per Port Privileges
Simulating a Frame Relay Cloud
AutoQoS
Setting Payload Scrambling on an ATM Circuit
HSRP SNMP Support
Logistics and Retail Management: Emerging Issues and New Challenges in the Retail Supply Chain
Relationships in the Supply Chain
The Internationalization of the Retail Supply Chain
Market Orientation and Supply Chain Management in the Fashion Industry
Rethinking Efficient Replenishment in the Grocery Sector
Enterprise Resource Planning (ERP) Systems: Issues in Implementation
Microsoft VBScript Professional Projects
Scheduling Disk Maintenance
Developing Script Log Analyzers
Scheduling Script Execution
Developing a Setup Script
Designing the Web Site
What is Lean Six Sigma
Key #3: Work Together for Maximum Gain
Key #4: Base Decisions on Data and Facts
Beyond the Basics: The Five Laws of Lean Six Sigma
When Companies Start Using Lean Six Sigma
Six Things Managers Must Do: How to Support Lean Six Sigma
The Oracle Hackers Handbook: Hacking and Defending Oracle
Overview of the Oracle RDBMS
The Oracle Network Architecture
Triggers
Indirect Privilege Escalation
Running Operating System Commands
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies