Introduction to Computer Networks Introduction to Computer Networks.

Slides:



Advertisements
Similar presentations
Redundant Array of Independent Disks (RAID) Striping of data across multiple media for expansion, performance and reliability.
Advertisements

By Rashid Khan Lesson 6-A Place for Everything: Storage Management.
RAID (Redundant Arrays of Independent Disks). Disk organization technique that manages a large number of disks, providing a view of a single disk of High.
RAID Oh yes Whats RAID? Redundant Array (of) Independent Disks. A scheme involving multiple disks which replicates data across multiple drives. Methods.
RAID Redundant Array of Independent Disks
 RAID stands for Redundant Array of Independent Disks  A system of arranging multiple disks for redundancy (or performance)  Term first coined in 1987.
RAID- Redundant Array of Inexpensive Drives. Purpose Provide faster data access and larger storage Provide data redundancy.
R.A.I.D. Copyright © 2005 by James Hug Redundant Array of Independent (or Inexpensive) Disks.
WHAT IS RAID? Christopher J Dutra Seton Hall University.
Chapter 5: Server Hardware and Availability. Hardware Reliability and LAN The more reliable a component, the more expensive it is. Server hardware is.
Everything your business needs to know but probably doesn’t.
REDUNDANT ARRAY OF INEXPENSIVE DISCS RAID. What is RAID ? RAID is an acronym for Redundant Array of Independent Drives (or Disks), also known as Redundant.
Other Disk Details. 2 Disk Formatting After manufacturing disk has no information –Is stack of platters coated with magnetizable metal oxide Before use,
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Implementing Disaster Protection
I/O Systems and Storage Systems May 22, 2000 Instructor: Gary Kimura.
®® Microsoft Windows 7 for Power Users Tutorial 10 Backing Up and Restoring Files.
RAID Systems CS Introduction to Operating Systems.
Guide to Linux Installation and Administration, 2e1 Chapter 13 Backing Up System Data.
Servers Redundant Array of Inexpensive Disks (RAID) –A group of hard disks is called a disk array FIGURE Server with redundant NICs.
Session 3 Windows Platform Dina Alkhoudari. Learning Objectives Understanding Server Storage Technologies Direct Attached Storage DAS Network-Attached.
By : Nabeel Ahmed Superior University Grw Campus.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
ICOM 6005 – Database Management Systems Design Dr. Manuel Rodríguez-Martínez Electrical and Computer Engineering Department Lecture 6 – RAID ©Manuel Rodriguez.
Configuring File Services Lesson 6. Skills Matrix Technology SkillObjective DomainObjective # Configuring a File ServerConfigure a file server4.1 Using.
Windows Server MIS 424 Professor Sandvig. Overview Role of servers Performance Requirements Server Hardware Software Windows Server IIS.
RAID Shuli Han COSC 573 Presentation.
LAN / WAN Business Proposal. What is a LAN or WAN? A LAN is a Local Area Network it usually connects all computers in one building or several building.
CS 352 : Computer Organization and Design University of Wisconsin-Eau Claire Dan Ernst Storage Systems.
Redundant Array of Independent Disks
Chapter Sixteen Data Recovery and Fault Tolerance.
Lecture 9 of Advanced Databases Storage and File Structure (Part II) Instructor: Mr.Ahmed Al Astal.
Redundant Array of Inexpensive Disks aka Redundant Array of Independent Disks (RAID) Modified from CCT slides.
CSI-09 COMMUNICATION TECHNOLOGY FAULT TOLERANCE AUTHOR: V.V. SUBRAHMANYAM.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Guide to Linux Installation and Administration, 2e 1 Chapter 9 Preparing for Emergencies.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Module 12: Managing Disaster Recovery. Overview Preparing for Disaster Recovery Backing Up Data Scheduling Backup Jobs Restoring Data Configuring Shadow.
1 Maintain System Integrity Maintain Equipment and Consumables ICAS2017B_ICAU2007B Using Computer Operating system ICAU2231B Caring for Technology Backup.
Module 9 Planning a Disaster Recovery Solution. Module Overview Planning for Disaster Mitigation Planning Exchange Server Backup Planning Exchange Server.
Mark A. Magumba Storage Management. What is storage An electronic place where computer may store data and instructions for retrieval The objective of.
Ensuring Network Security Making Networks Secure Maintaining a Healthy Network Environment Avoiding Data Loss 1.
Windows Server 2003 硬碟管理與磁碟機陣列 林寶森
Redundant Array of Independent Disks.  Many systems today need to store many terabytes of data.  Don’t want to use single, large disk  too expensive.
XP Practical PC, 3e Chapter 6 1 Protecting Your Files.
McLean HIGHER COMPUTER NETWORKING Lesson 15 (a) Disaster Avoidance Description of disaster avoidance: use of anti-virus software use of fault tolerance.
The concept of RAID in Databases By Junaid Ali Siddiqui.
Fault Tolerance and Disaster Recovery. Topics Using Antivirus software Fault tolerance –Power –Redundancy –Storage –Services Disaster Recovery –Backup/Restore.
20/12/20151 Data Structures Backing up and Archiving Data.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
Chapter 6 Protecting Your Files. Protecting Your Files FAQs: – What should I know about losing data? – How can I protect my files from viruses? – How.
WINDOWS SERVER 2003 Genetic Computer School Lesson 12 Fault Tolerance.
Install, configure and test ICT Networks
1 CEG 2400 Fall 2012 Network Servers. 2 Network Servers Critical Network servers – Contain redundant components Power supplies Fans Memory CPU Hard Drives.
Hands-On Microsoft Windows Server 2008 Chapter 7 Configuring and Managing Data Storage.
Network-Attached Storage. Network-attached storage devices Attached to a local area network, generally an Ethernet-based network environment.
WHAT ARE BACKUPS? Backups are the last line of defense against hardware failure, floods or fires the damage caused by a security breach or just accidental.
CS Introduction to Operating Systems
RAID.
Configuring File Services
Managing Multi-User Databases
RAID RAID Mukesh N Tekwani
SpiraTest/Plan/Team Deployment Considerations
Backing Up 01/12/2018.
Overview Continuation from Monday (File system implementation)
Backup and restoration of data, redundancy
TECHNICAL SEMINAR PRESENTATION
Prepared by Jaroslav makovski
RAID RAID Mukesh N Tekwani April 23, 2019
Seminar on Enterprise Software
Presentation transcript:

Introduction to Computer Networks Introduction to Computer Networks

Avoiding Data Loss This lesson presents an overview of the possible causes of data loss and how to protect the network against them.

Data Protection The causes of a network disaster inlude:The causes of a network disaster inlude: Component failure.Component failure. Computer viruses.Computer viruses. Data deletion and corruption.Data deletion and corruption. Fire caused by arson or electrical mishaps. Fire caused by arson or electrical mishaps. Natural disasters, such as lightning, floods earthquakes. Natural disasters, such as lightning, floods earthquakes. Power-supply failure and power surges. Power-supply failure and power surges. Theft and vandalism.Theft and vandalism.

Data Protection & Recovery There are several ways to prevent or recover from data loss, including:There are several ways to prevent or recover from data loss, including: Tape backup systems.Tape backup systems. An uninterruptible power supply (UPS).An uninterruptible power supply (UPS). Optical drives and disks. Optical drives and disks. Fault-tolerant systems.Fault-tolerant systems.

Tape Backup The simplest, most inexpensive way to avoid disastrous loss of data is to implement a schedule of periodic backups with storage offsite.The simplest, most inexpensive way to avoid disastrous loss of data is to implement a schedule of periodic backups with storage offsite. Using a tape backup is still one of the few simple and economical ways to ensure that data remains safe and usable.Using a tape backup is still one of the few simple and economical ways to ensure that data remains safe and usable. A secure backup strategy minimizes the risk of losing data by maintaining a current backup— copies of existing files—so that files can be recovered if harm comes to the original data.A secure backup strategy minimizes the risk of losing data by maintaining a current backup— copies of existing files—so that files can be recovered if harm comes to the original data.

Implementing a Backup System Complete backups make restoring disk configurations much easier, but can require multiple tapes if there are large amounts of data.Complete backups make restoring disk configurations much easier, but can require multiple tapes if there are large amounts of data. Backing up individual files and directories might require fewer tapes, but could require the administrator to manually restore disk configurations.Backing up individual files and directories might require fewer tapes, but could require the administrator to manually restore disk configurations. Critical data should be backed up according to daily, weekly, or monthly schedules, depending on how critical the data is and how frequently it is updated.Critical data should be backed up according to daily, weekly, or monthly schedules, depending on how critical the data is and how frequently it is updated.

Testing and Storage Experienced administrators test the backup system before committing to it.Experienced administrators test the backup system before committing to it. They perform a backup, delete the information, restore the data, and attempt to use the data. They perform a backup, delete the information, restore the data, and attempt to use the data. The administrator should test the backup procedures regularly to verify that what is expected to be backed up is actually being backed up.The administrator should test the backup procedures regularly to verify that what is expected to be backed up is actually being backed up.

Maintaining a Backup Log Maintaining a log of all backups is critical for later file recovery.Maintaining a log of all backups is critical for later file recovery. A copy of the log should be kept with the backup tapes, as well as at the computer site.A copy of the log should be kept with the backup tapes, as well as at the computer site. The log should record the following information:The log should record the following information: Date of backup, Tape-set number Type of backup performed Which computer was backed up Which files were backed up Who performed the backup, etc. Date of backup, Tape-set number Type of backup performed Which computer was backed up Which files were backed up Who performed the backup, etc.

Installing the Backup System Backing up across the network is the most efficient way to back up multiple systems.Backing up across the network is the most efficient way to back up multiple systems. Network traffic is reduced by backing up to a separate segment.Network traffic is reduced by backing up to a separate segment.

Uninterruptible Power Supply (UPS) An UPS is an automated external power supply designed to keep a server or other device running in the event of a power failure.An UPS is an automated external power supply designed to keep a server or other device running in the event of a power failure. The standard UPS provides a network with two crucial components:The standard UPS provides a network with two crucial components: A power source to run the server for a short timeA power source to run the server for a short time A safe shutdown management serviceA safe shutdown management service

Fault-Tolerant Systems (1) Fault-tolerant systems protect data by duplicating data or placing data in different physical sources, such as different partitions or different disks.Fault-tolerant systems protect data by duplicating data or placing data in different physical sources, such as different partitions or different disks. Data redundancy allows access to data even if part of the data system fails.Data redundancy allows access to data even if part of the data system fails. Fault-tolerant systems should never be used as replacements for regular backup of servers and local hard disks.Fault-tolerant systems should never be used as replacements for regular backup of servers and local hard disks.

Fault-Tolerant Systems (2) Fault-tolerant systems offer these alternatives for data redundancy:Fault-tolerant systems offer these alternatives for data redundancy: Disk stripingDisk striping Disk mirroringDisk mirroring Sector sparingSector sparing Mirrored drive arraysMirrored drive arrays ClusteringClustering

Redundant Array of Independent Disks (RAID) (1) Fault-tolerance options are standardized and categorized into levels. These levels are known as redundant array of independent disks (RAID):Fault-tolerance options are standardized and categorized into levels. These levels are known as redundant array of independent disks (RAID): Level 0—Disk StripingLevel 0—Disk Striping

Redundant Array of Independent Disks (RAID) (2) Level 1—Disk MirroringLevel 1—Disk Mirroring

Redundant Array of Independent Disks (RAID) (3) Level 2 — Disk Striping with ECCLevel 2 — Disk Striping with ECC When a block of data is written, the block is broken up and distributed (interleaved) across all data drives.When a block of data is written, the block is broken up and distributed (interleaved) across all data drives. Error-correction code (ECC) requires a larger amount of disk space than parity-checking methods, discussed under Level 3.Error-correction code (ECC) requires a larger amount of disk space than parity-checking methods, discussed under Level 3.

Redundant Array of Independent Disks (RAID) (3) Level 3—ECC Stored As ParityLevel 3—ECC Stored As Parity Disk striping with ECC stored as parity is similar to level 2.Disk striping with ECC stored as parity is similar to level 2. The term parity refers to an error-checking procedure in which the number of 1s must always be the same—either odd or even—for each group of bits transmitted without error.The term parity refers to an error-checking procedure in which the number of 1s must always be the same—either odd or even—for each group of bits transmitted without error. In this strategy, the ECC method is replaced with a parity-checking scheme that requires only one disk to store parity data.In this strategy, the ECC method is replaced with a parity-checking scheme that requires only one disk to store parity data.

Level 3—ECC Stored As Parity

Redundant Array of Independent Disks (RAID) (4) Level 4—Disk Striping with Large BlocksLevel 4—Disk Striping with Large Blocks This strategy moves away from data interleaving by writing complete blocks of data to each disk in the array.This strategy moves away from data interleaving by writing complete blocks of data to each disk in the array. The process is still known as disk striping, but is done with large blocks. A separate check disk is used to store parity information. The process is still known as disk striping, but is done with large blocks. A separate check disk is used to store parity information. Each time a write operation occurs, the associated parity information must be read from the check disk and modified.Each time a write operation occurs, the associated parity information must be read from the check disk and modified.

Level 4—Disk Striping with Large Blocks

Redundant Array of Independent Disks (RAID) (5) Level 5—Striping with ParityLevel 5—Striping with Parity The data and parity information are arranged so that the two are always on different disks.The data and parity information are arranged so that the two are always on different disks. A parity stripe block exists for each stripe (row) across the disk. A parity stripe block exists for each stripe (row) across the disk. The parity stripe block is used to reconstruct data for a failed physical disk.The parity stripe block is used to reconstruct data for a failed physical disk. Striping with parity is currently the most popular approach to fault-tolerant design.Striping with parity is currently the most popular approach to fault-tolerant design.

Redundant Array of Independent Disks (RAID) (6) Level 10—Mirrored Drive ArraysLevel 10—Mirrored Drive Arrays RAID level 10 mirrors data across two identical RAID 0 drive arrays.RAID level 10 mirrors data across two identical RAID 0 drive arrays.

Redundant Array of Independent Disks (RAID) (7) Sector SparingSector Sparing This feature automatically adds sector-recovery capabilities to the file system while the computer is running.This feature automatically adds sector-recovery capabilities to the file system while the computer is running.

Microsoft Clustering Microsoft Clustering is Microsoft's implementation of server clustering.Microsoft Clustering is Microsoft's implementation of server clustering. The term "clustering" refers to a group of independent systems that work together as a single system.The term "clustering" refers to a group of independent systems that work together as a single system. Should a system within the cluster fail, the cluster software will disperse the work from the failed system to the remaining systems in the cluster.Should a system within the cluster fail, the cluster software will disperse the work from the failed system to the remaining systems in the cluster.

Optical Drives and Disks In optical technology, data is stored on a rigid disk by altering the disk's surface with a laser beam.In optical technology, data is stored on a rigid disk by altering the disk's surface with a laser beam. As the technology evolves from the original read- only and read-write CD-ROMs to the new DVD technologies, these devices are being used more and more to store large amounts of retrievable data.As the technology evolves from the original read- only and read-write CD-ROMs to the new DVD technologies, these devices are being used more and more to store large amounts of retrievable data. Optical-drive manufacturers provide a large array of storage configurations that are either network- ready or can be used with a network server.Optical-drive manufacturers provide a large array of storage configurations that are either network- ready or can be used with a network server.

Disaster Recovery The best way to recover from a disaster is to prevent it from happening in the first place.The best way to recover from a disaster is to prevent it from happening in the first place. Not all disasters can be prevented.Not all disasters can be prevented. When considering disaster protection, you will need a plan for hardware, software, and data.When considering disaster protection, you will need a plan for hardware, software, and data. Physical components of a network can be easily replaced and are usually covered by some form of insurance, but data is highly vulnerable to disaster.Physical components of a network can be easily replaced and are usually covered by some form of insurance, but data is highly vulnerable to disaster.