Presentation is loading. Please wait.

Presentation is loading. Please wait.

Business Continuity Using NetWare ® Services Mark Gonnelly ATT Engineer Novell, Inc. Mitchell Smith Sr Technical Trainer Novell, Inc.

Similar presentations


Presentation on theme: "Business Continuity Using NetWare ® Services Mark Gonnelly ATT Engineer Novell, Inc. Mitchell Smith Sr Technical Trainer Novell, Inc."— Presentation transcript:

1 Business Continuity Using NetWare ® Services Mark Gonnelly ATT Engineer Novell, Inc. Mitchell Smith Sr Technical Trainer Novell, Inc.

2 © March 9, 2004 Novell Inc. 2 one Net: Information without boundaries…where the right people are connected with the right information at the right time to make the right decisions. The one Net vision Novell exteNd ™ Novell Nsure ™ Novell Nterprise ™ Novell Ngage SM : : : :

3 © March 9, 2004 Novell Inc. 3 The one Net vision Novell Nterprise is an innovative family of products which gives you the power to enable and manage the constant interaction of people with your business systems — regardless of who they are or where they are. Novell Nterprise ™ Novell exteNd ™ Novell Nsure ™ Novell Nterprise ™ Novell Ngage SM : : : :

4 © March 9, 2004 Novell Inc, Confidential & Proprietary 4 The Problem 40% of enterprises that experience a disaster will go out of business in five years. Only 15% of enterprises have a full-fledged business continuity plan that goes beyond core technology and infrastructure (Source: Gartner)

5 © March 9, 2004 Novell Inc, Confidential & Proprietary 5 The Implications High availability of critical business systems is no longer a luxury restricted to large businesses ― it is a competitive business requirement for everyone.

6 © March 9, 2004 Novell Inc, Confidential & Proprietary 6 How We Are Going to Help You You may feel that you don’t have the budget for proper disaster recovery solutions but… Start with what you have… iFolder ® Archive Services Snapshots Backups Clustering Go to where you need to be… Business Continuance Clustering

7 © March 9, 2004 Novell Inc, Confidential & Proprietary 7 Before we start… Don’t try to make a square peg fit into a round hole.

8 © March 9, 2004 Novell Inc, Confidential & Proprietary 8 Problems of Personal Data Availability A disk failure on one of your personal systems could be a serious disaster. Sensitive Company data is often stored on employee’s computers/laptops and not backed up regularly. You don’t dare store your sensitive data on the Internet. 1 out of 1,000 laptops are stolen; 10% are targeted for their data.

9 © March 9, 2004 Novell Inc, Confidential & Proprietary 9 What’s in iFolder 2.1? iFolder 2.1 is bundled in NetWare 6.5 and includes: Automatically and transparently synchronize files to iFolder server and your other machines through any standard Internet connection Encrypt files delivered to, and stored on, the server to protect them from unauthorized access Secure access to your files from a Web browser Scale to millions of users - Cluster multiple iFolder servers under a single DNS name PDA access to iFolder files Ability to choose location of local iFolder

10 © March 9, 2004 Novell Inc, Confidential & Proprietary 10 Novell iFolder ® Backup Synchronize Access Instant access to your files— online, offline, anytime

11 © March 9, 2004 Novell Inc, Confidential & Proprietary 11 Novell iFolder Summary Novell iFolder lets your files follow you—everywhere Automatically backs up your local data No matter where you are, your files are always with you Simplifies the way files are used across the Net Files are always safe, secure, and up-to-date Secures and protects corporate digital assets Accelerates the productivity of today’s mobile professionals

12 © March 9, 2004 Novell Inc, Confidential & Proprietary 12 Backing Up User Data When users store data on servers there are still problems Users generate a LOT of data You don’t want to backup up some of what they create – for example, MP3s Restoring individual files is time consuming and costly Your time between backups affects your ability to recover from user errors

13 © March 9, 2004 Novell Inc, Confidential & Proprietary 13 File Archiving Built on Novell’s File based Epoch Event File System Technologies in NetWare ® 6.5 Takes scheduled file level (not block) snapshots Keeps Archives on Archive volume or separate Archive server – Archive server can be any OS platform Can designate which subdirectories and/or file types to archive and when – Great flexibility for shared user folders NetStorage Interface for User self restore of previous file versions – Users can view previous versions and decide which to restore – Indicates the user who last modified the particular version

14 © March 9, 2004 Novell Inc, Confidential & Proprietary 14 How Does Archiving Work? Versioning Server MySQL Server1 Server2 VOL1: \\Server1\VOL1 Job \\Server2\VOL1 Job VERSIONING VOLUME WITH MySQL DATABASE

15 © March 9, 2004 Novell Inc, Confidential & Proprietary 15 Archiving Summary The Novell Archive / Version Services allows individual users to restore previous versions of modified, lost, or deleted files. This feature is great for workgroups working on files in shared folders or personal files on the server Provide a lower cost of management for IT departments by allowing users to self restore files. Provide a means to allow users to be more productive by allowing them to correct their own mistakes.

16 © March 9, 2004 Novell Inc, Confidential & Proprietary 16 Backing Up Databases How do you backup up applications like databases and mail systems? There is usually a requirement to stop the application to get a consistent backup. This conflicts with application availability requirements.

17 © March 9, 2004 Novell Inc, Confidential & Proprietary 17 Snapshot Technology Creates a virtual image of the pool at that moment Not a full copy of the pool Cannot be used to restore a deleted original pool Uses Copy On Write to save changes Main purpose is to allow backup of open files Can be used to restore deleted or corrupted files

18 © March 9, 2004 Novell Inc, Confidential & Proprietary 18 How snapshot works Stored-on Pool Data Pool At creation time, all the data for a Snapshot Pool comes from the original Data Pool. No data is actually stored in the Snapshot. Snapshot =+

19 © March 9, 2004 Novell Inc, Confidential & Proprietary 19 How snapshot works Stored-on Pool Data Pool Changes to the Data Pool causes the old data to be copied to the Stored-on Pool. The Snapshot Pool gets its data from both. Snapshot =+

20 © March 9, 2004 Novell Inc, Confidential & Proprietary 20 Snapshot Summary

21 © March 9, 2004 Novell Inc, Confidential & Proprietary 21 Snapshot Summary Snapshot is independent of hardware vendor, even mix of vendors. Snapshot tools integrated into console Anytime backup View & select file versions

22 © March 9, 2004 Novell Inc, Confidential & Proprietary 22 Data Vulnerability Data is usually in one location, even on one server How do you deal with the loss of that location – for example, fire or flood?

23 © March 9, 2004 Novell Inc, Confidential & Proprietary 23 RAID1 (Mirroring) Mirroring completely rewritten for NetWare 6.5 Faster Remirroring - Saves blocks mirrored on the disk. Remirrors only necessary blocks after an Abend or power down. Add mirroring at any time - No need to set up mirror objects at partition creation time. Mirrored pools can be seen by all nodes in a cluster. Fully multi-processor enabled. Scalable – Same size memory for all size partitions RAID1

24 © March 9, 2004 Novell Inc, Confidential & Proprietary 24 iSCSI Value Storage Frames (FC, SCSI, or ATA) ~$20,000 to $1,000,000 ea Gigabit Ethernet Switches ~$10,000 ea. Servers. Gigabit Ethernet Built-in 4 to 10 times less expensive than Fiber Channel SAN Deployment using iSCSI Solutions

25 © March 9, 2004 Novell Inc, Confidential & Proprietary 25 iSCSI SAN Fundamentals File System TCP/IP Hard Disks Server Standard Ethernet Adapter Standard Ethernet Switch SCSI “Initiator” SCSI “Target” or Disk Server A simple iSCSI SAN Read Block Request SCSI Block Request iSCSI Packet SCSI Block Request iSCSI Packet SCSI Disk Request SCSI Protocol

26 © March 9, 2004 Novell Inc, Confidential & Proprietary 26 Novell iSCSI Summary Target An inexpensive way to turn your existing direct attached storage (DAS) server hardware into a flexible and manageable SAN solution for your Net Services NetWare 6.5 only Integrated with LDAP for Directory based management Initiator Ensure NetWare works with open standards and standard Storage Solutions NetWare 5.1 and above Offer direct and indirect SAN benefits to customers who typically would not purchase expensive Fibre Channel SANs Makes server to server mirroring affordable

27 © March 9, 2004 Novell Inc, Confidential & Proprietary 27 The Down Time Problem How much are your network services worth? File transfers and file storage Calendaring and collaboration Web hosting Critical databases How much does down time cost?

28 © March 9, 2004 Novell Inc, Confidential & Proprietary 28 Novell Cluster Services Highly-scalable, load-balancing, directory-enabled clustering environment Up to 32 servers in an all-active cluster Fan-out failover for load balancing on failover Transparent failover Enhanced cluster resource management Integrated with NDS ® Intelligent cluster volume operations Built in cluster volume manager allows for dynamic volume changes in the SAN without rebooting any servers

29 © March 9, 2004 Novell Inc, Confidential & Proprietary 29 Novell Cluster Services ™ NetWare 6.5 Cluster Ethernet Switch Shared Storage Public Network iSCSI Network SBD Partition How it Works

30 © March 9, 2004 Novell Inc, Confidential & Proprietary 30 Novell Cluster Services ™ Public Network iSCSI Network How it Works NetWare 6.5 Cluster Ethernet Switch Shared Storage SBD Partition Cluster Resource Data Cluster Resource

31 © March 9, 2004 Novell Inc, Confidential & Proprietary 31 Novell Cluster Services ™ Public Network iSCSI Network How it Works NetWare 6.5 Cluster Ethernet Switch Shared Storage SBD Partition Cluster Resource Data Cluster Resource

32 © March 9, 2004 Novell Inc, Confidential & Proprietary 32 Clustering Summary 1. Complete SAN solution, 32 nodes of clustering, iSCSI support 2. High Availability becomes a reality- right out of the box 3. Ability to setup a SAN at low cost 4. Ability to do maintenance without impacting service availability

33 © March 9, 2004 Novell Inc, Confidential & Proprietary 33 Are You Ready for This?

34 © March 9, 2004 Novell Inc, Confidential & Proprietary 34 Business Continuance Cluster Powered by NetWare ®, Novell Cluster Services, and Novell DirXML ® Fails over network services from one cluster to another, geographically, separate cluster Provides high availability to your mission critical resources in the event of a disaster Supports up to four clusters

35 © March 9, 2004 Novell Inc, Confidential & Proprietary 35 Cluster 1 Cluster n Business Continuance Cluster replicate How it Works

36 © March 9, 2004 Novell Inc, Confidential & Proprietary 36 Business Continuance Cluster Cluster 1 Cluster n How it Works

37 © March 9, 2004 Novell Inc, Confidential & Proprietary 37 Business Continuance Cluster Cluster 1 Cluster n How it Works

38 © March 9, 2004 Novell Inc, Confidential & Proprietary 38 Replicating the Data Things to consider: Host-based vs. Disk-based replication Asynchronous vs. Synchronous Distance: 100 m, 1k, 100k, … around the world Required bandwidth for replication? Latency of the link? Latency tolerance of the application?

39 © March 9, 2004 Novell Inc, Confidential & Proprietary 39 Business Continuance Clustering Summary Novell Business Continuance Cluster Services is the premier disaster recovery solution for the Intel platform. Provides failover of mission critical services to a secondary cluster Integration with various SAN hardware devices for an automated failover process Synchronizes and transforms cluster related eDirectory objects using Novell’s DirXML technology Provides for < 5 minute failover based on administrator intervention Failover of one or all cluster resources Support for Novell’s new Virtual IP Address (VIPA) technology

40 © March 9, 2004 Novell Inc, Confidential & Proprietary 40 Final Summary Start a disaster recovery plan based on what you have right now. Plan to grow to a complete business continuity solution a step at a time. But remember… Each solution has it’s own niche; don’t try to make a square peg fit into a round hole.

41

42 © March 9, 2004 Novell Inc, Confidential & Proprietary 42 General Disclaimer This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. Novell, Inc., makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc., reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability.


Download ppt "Business Continuity Using NetWare ® Services Mark Gonnelly ATT Engineer Novell, Inc. Mitchell Smith Sr Technical Trainer Novell, Inc."

Similar presentations


Ads by Google