And Redundancy -By Brandon Fuller & Christopher Gossett.

Slides:



Advertisements
Similar presentations
RAID Oh yes Whats RAID? Redundant Array (of) Independent Disks. A scheme involving multiple disks which replicates data across multiple drives. Methods.
Advertisements

Regression Methodology Einat Ravid. Regression Testing - Definition  The selective retesting of a hardware system that has been modified to ensure that.
Peak LAN Project Kirk Baringer Meagan Beeman Allison Benton
Recovery Planning A Holistic View Adam Backman, President White Star Software
WHAT IS RAID? Christopher J Dutra Seton Hall University.
LANs and WANs Network size, vary from –simple office system (few PCs) to –complex global system(thousands PCs) Distinguish by the distances that the network.
IT Technical Support Policies and Procedures South Nottingham College.
Maintaining and Troubleshooting Computer Systems Computer Technology.
1 CSSE 377 – Intro to Availability & Reliability Part 2 Steve Chenoweth Tuesday, 9/13/11 Week 2, Day 2 Right – Pictorial view of how to achieve high availability.
Chapter Extension 20 Outsourcing © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Electrical and Computer Systems Engineering Postgraduate Student Research Forum 2001 Design and Development of a Distributed Avionics System for use in.
Disaster Prevention and Recovery Kristen Emch Christine Jennings-Garant.
Hints and Tips for New Systems Administrators or What to panic about…… Catherine Jones Systems Librarian.
Introduction to Databases Transparencies
Concepts of Database Management Seventh Edition
WHAT’S A TECHNOLOGY SYSTEM? A technology system is a machine that processes digital data. A computer is a technology system. A computer installation is.
Security and Backup Avoid disasters – have a good backup policy Avoid disasters – have a tight security scheme in place UK law dictates the board of directors.
Electronic Health Records
H-1 Network Management Network management is the process of controlling a complex data network to maximize its efficiency and productivity The overall.
Buying vs. Leasing and Outsourcing Technology January 19, 2007 Downers Grove, IL.
Chapter 13 Organizing Information System Resources MIS Department Centralization and Decentralization Outsourcing Computer Facilities and Services.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
Will you need your umbrella?.  Objective: Explain the Cloud In business terms, so you can see if it will benefit you.  Agenda: 12:00 – Welcome and Introductions.
MAINTAINING AND TROUBLESHOOTING COMPUTER SYSTEMS UNIT 6.
Data Deduplication in Virtualized Environments Marc Crespi, ExaGrid Systems
Server Types Different servers do different jobs. Proxy Servers Mail Servers Web Servers Applications Servers FTP Servers Telnet Servers List Servers Video/Image.
VAP What is a Virtual Application ? A virtual application is an application that has been optimized to run on virtual infrastructure. The application software.
Presented By: MICHAEL HOFFMAN President & CEO - Bolt Data Systems June 16, 2010 Data Backup for the Shared Platform.
LAN / WAN Business Proposal. What is a LAN or WAN? A LAN is a Local Area Network it usually connects all computers in one building or several building.
Day 10 Hardware Fault Tolerance RAID. High availability All servers should be on UPSs –2 Types Smart UPS –Serial cable connects from UPS to computer.
Concepts of Database Management Sixth Edition
1 Formation Flying Project Proposal 2/5/07 Rachel Winters (Team Lead) Aziatun Burhan Tsutomu Hasegawa Shunsuke Hirayama Matt Mueller Masao Shimada Shelby.
Anderson School of Management University of New Mexico.
An automated diagnostic system to streamline DSM project maintenance Johan du Plessis 15 August 2012.
1 Maintain System Integrity Maintain Equipment and Consumables ICAS2017B_ICAU2007B Using Computer Operating system ICAU2231B Caring for Technology Backup.
Continuous Backup for Business CrashPlan PRO offers a paradigm of backup that includes a single solution for on-site and off-site backups that is more.
Service Level Agreements Service Level Statements NO YES The process of negotiating and defining the levels of user service (service levels) required.
CprE 458/558: Real-Time Systems
RELIABILITY ENGINEERING 28 March 2013 William W. McMillan.
Company small business cloud solution Client UNIVERSITY OF BEDFORDSHIRE.
The Ultimate Backup Solution.
HalFILE 2.1 Network Protection & Disaster Recovery.
What is virtualization? virtualization is a broad term that refers to the abstraction of computer resources in order to work with the computer’s complexity.
Fault Tolerance and Disaster Recovery. Topics Using Antivirus software Fault tolerance –Power –Redundancy –Storage –Services Disaster Recovery –Backup/Restore.
March 2010 Gig Zero Delay Tap. TP-CU3-ZD The Gig Zero Delay Tap is TP-CU3 enhanced with the industry’s first TRUE Zero Delay technology for 10/100/1000.
Sensors and Control Applications 7 Rivers Robotics Coalition December, 2015 D. Foye.
Protecting Your Data With Just Get Backup, LLC. Agenda How important is your data – Acknowledging worst-case scenarios. Understanding that data backup.
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
“Building Journaling Databases with PostgreSQL” Cybertec Geschwinde & Schoenig Hans-Juergen Schoenig
A Survey of Fault Tolerance in Distributed Systems By Szeying Tan Fall 2002 CS 633.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Organizing and leading the IT function Two set of tensions guide policies for developing, deploying and managing IT systems. 1.Innovation and control a.How.
Information Security Crisis Management Daryl Goodwin.
Network-Attached Storage. Network-attached storage devices Attached to a local area network, generally an Ethernet-based network environment.
An Overview to System Management WorldVistA Community Meeting June 14-17, 2007 Seattle, WA.
Server Upgrade HA/DR Integration
Managing Multi-User Databases
System Backup IB Computer Science.
Redundancy Control For PostgreSQL
UNIT 19 Data Security 2.
Fault Tolerance Distributed Web-based Systems
The Ultimate Backup Solution.
Backup and restoration of data, redundancy
Partition Starter Find out what disk partitioning is, state key features, find a diagram and give an example.
Knowing When to Stop: An Examination of Methods to Minimize the False Negative Risk of Automated Abort Triggers RAM XI Training Summit October 2018 Patrick.
DBMS Module III DBMS
 Payroll Liabilities in QuickBooks  Setup Manual Payroll in QuickBooks  QuickBooks Federal Tax Withholding  QuickBooks For Multiple Users  Setup Payroll.
Demystifying the Cloud
Seminar on Enterprise Software
Presentation transcript:

And Redundancy -By Brandon Fuller & Christopher Gossett

Agenda Basics Pros and Cons Redundancy in terms of Hardware Software Personnel Finer points Conclusion

Basics Redundancy: The inclusion of duplicate systems that function in case of failure. Ultimately any part or system or machine will fail in some way. The Goal of Redundancy is to maintain Uptime despite failing machines.

Benefits of Redundancy Decreases the chance that a system will fail when any one redundant part fails. Increases Uptime Better allows a system to endure disaster, especially with remote redundancies.

Drawbacks of Redundancy Increased cost. Increased complexity Increased Storage space

Redundancy in Hardware Most familiar among most people. Additional hardware to function when main part fails. Extends beyond the direct computer, also includes the cooling systems, power supply, and storage. Cost of redundant systems outside of computer can outweigh cost of computer.

Redundancy in Software N-version programming Functionally equivalent programs are created by different groups with the same specs. In theory very low chance of all versions failing at the same time. Redundancy in software can be used as a cost alternative to certain hardware redundancies (often at a cost of speed)

Redundancy in Personnel In order to ensure that, if you are on a team of sysadmins, that you are not on call at all hours. Have other employees who also know how to fix and respond to certain issues. Can be problematic if they become too redundant. Job security might suggest you being a sole point of dependence.

Redundancy vs. Backup Not the same thing. Backups don’t maintain uptime. Backups are also often periodic and may mean data loss. Backups can fix mistakes. Backups can keep a record.

Points of Failure A point of failure is any place in the system that can break and cause failure. Points can range from as small as a wire or chip, to as large as the entire building. Consider redundancy for multiple points. Remember: A thousand redundancies of point A do nothing if point B breaks with no redundancies. Consider remote locations if data is important enough. 100 miles for large scale insurance reasons.

Passive vs Active Redundancy Passive: Use extra parts to reduce impact of part failures. Failures normally cause performance decline however. Example: Humans Active: Removes performance decline by monitoring performance of each part. When a faulty part is detected activity is rerouted to other parts without performance drop. Example: Power Wires

Conclusion Redundancy helps to ensure uptime. Redundancy can be expensive. Important consideration when planning a system. Keeping up redundant parts prevents system failure. Be careful of single points of failure. Redundancy helps to ensure uptime.