6.5 Chapter Summary


Business Continuity for Mission-Critical Applications

  • Data protection and availability tools enable business continuity for mission-critical applications.

  • A range of solutions grows in cost and complexity as availability requirements increase.

  • Protection and availability options range from basic backup to wide area replication with failover.

6.1 Assessing Business Continuity Objectives

  • Some of the steps to be taken in the assessment process include the following:

    • List all applications.

    • Identify dependencies between applications.

    • Create application groups based on dependencies.

    • Prioritize application groups based on importance.

    • Associate availability metrics for application groups and applications within groups.

  • Recovery time objective (RTO) is a measure of the acceptable time allowed for recovery. RTO poses the question, How long can the application be down?

  • Recovery point objective (RPO) measures the earliest point in time to which the application and data can be recovered. Simply put, how much data can be lost?

  • Data protection and availability solutions can be mapped out by RTO and RPO and matched to appropriate application requirements.

  • Factors affecting the choice of solution include

    • Appropriate level of availability

    • Total cost of ownership (TCO)

    • Complexity

    • Vendor viability in the long run

    • Performance impact

    • Security

    • Scalability

6.2 Availability within the Data Center

  • Backup : Backing up the data on a regular schedule to a tape device provides a fundamental level of availability.

  • Disk Redundancy ”RAID : Since storage disks have some of the lowest mean time between failures (MTBF) in a computer system, mirroring the boot disk and using RAID storage provides resilience in case of disk failure.

  • Quick Recovery File Systems : In the event of a system crash and reboot, using a quick recovery file system will speed up the reboot process, which in turn minimizes the amount of time the application remains unavailable.

  • Point-in-Time Copies : RAID storage and high-availability software do not protect applications from logical data corruption. Online point-in-time copies of data ensure a more timely recovery.

  • High Availability and Clustering : Deploying high-availability and clustering software with redundant server hardware enables automated detection of server failure and provides transparent failover of the application to a second server with minimal disruption to end users.

6.3 Availability Across Geographies: Disaster Tolerance and Recovery

  • Offsite Media Vaulting and Recovery : Offsite tape backups provide regular archived copies for disaster recovery. Tape backup can take up to a week or more for full recovery.

  • Remote Mirroring and Failover : In the event of a data center outage, replicating data over a WAN to a remote site server ensures application availability in a relatively short time period. Most methods of remote data replication provide a passive secondary standby system. In the event of a primary data center outage , the use of wide-area failover software, which provides failure notification and automated application recovery at the secondary site, ensures a relatively quick and error-free resumption of application service at the secondary site.

  • Data Replication : Replication modes may be synchronous, asynchronous, or periodic.

  • Methods of Replication : Redundancy layers exist across applications, databases, file systems, logical volumes , and storage devices or LUNs.

  • Secondary sites require special consideration and may be used for protection and optimized deployments, such as failover and facilitating easier systems maintenance.

6.4 Corporate Systems

  • Corporate systems span load balancers, Web servers, application servers, database servers, storage area networks, and storage subsystems.

  • Applications include external Web sites, internal Web sites, e-commerce, email, enterprise applications (ERP, CRM, supply chain, etc.), and call centers.

  • Each application has specific requirements that need to be mapped across redundancy layers to determine the optimal availability and protection measures.



IP Storage Networking Straight to the Core
IP Storage Networking: Straight to the Core
ISBN: 0321159608
EAN: 2147483647
Year: 2003
Pages: 108

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net