03 - Data Recovery
03 - Data Recovery
03 - Data Recovery
COMPUTER FORENSICS
UNIT II PART I
The overall performance of a backup or recovery was directly related to the ability of the backup server to handle the I/O load created by the backup process. Tape servers allow administrators to divide the backup tasks across multiple systems while maintaining scheduling and administrative processes on a primary or backup server. This approach often involves attaching multiple tape servers to a shared tape library, which reduces the overall cost of the system. The new backup architecture implements a serverless backup solution that allows data to be moved directly from disk to tape, bypassing the backup server altogether. This method of data backup removes the bottleneck of the backup server completely. However, the performance of serverless backup is then affected by another potential bottleneck bandwidth.
We can install a network path dedicated to the management and movement of data. This data path can be SCSI, Ethernet, ATM, fiber distributed data interface (FDDI), or fiber channel. Creating a dedicated data path is the beginning of a storage area network (SAN). SANs are quickly dominating the backup landscape, and applications such as serverless and LAN-less backup will continue to push this emerging technology forward. Above Figure shows an example of a dedicated SAN topology.
Block-Level Incremental Backup Rather than backing up entire files that have been modified since the last backup, only the blocks that have changed since the last backup are marked for backup. Image Backups This type of backup creates copies, or snapshots, of a file system at a particular point in time. Image backups are much faster than incremental backups and provide the ability to easily perform a bare bones recovery of a server without loading the operating systems, applications, and the like. Data Archiving Removing infrequently accessed data from a disk drive can reduce the size of a scheduled backup by up to 80%. Static data that has been archived is easily recalled when needed but does not add to the daily data backup requirements of the enterprise.
AIT Advanced Intelligent Tape; DLT Digital Audio Tape; LTO Linear Tape Open
COMPUTER FORENSICS
UNIT II PART I
application should have a method to back up systems across a WAN or over dial-up connections Global Monitoring: A robust backup application should be able to support reporting and administration of any backup system, regardless of location. Performance: An enterprise backup application should be able to benchmark backup data rates exceeding one terabyte per hour.
An alternative to tape backup is to physically replicate or mirror all data and keep two copies online at all times. The advantage is that the data does not have to be restored, so there are no issues with immediate data availability.
COMPUTER FORENSICS
UNIT II PART I
NETWORK
BACKUP creates network performance problems. Using the production network to carry
backup data, as well as for normal user data access, can severely overburden todays busy network resources.
OFFLINE BACKUP affects data accessibility. The time that the host is offline for data backup must be
minimized. This requires extremely high-speed, continuous parallel backup of the raw image of the data.
LIVE BACKUPS allow data access during the backup process but affect performance. The downside to
the live backup is that it puts a tremendous burden on the host.
MIRRORING doesnt protect against user error and replication of bad data. Fully replicated online
data sounds great, albeit at twice the cost per megabyte of a single copy of online data.
COMPUTER FORENSICS
UNIT II PART I
mistake can be made by an application programmer, system programmer, or operations person. Logic errors in programs or application of the wrong update at the wrong time can result in a system crash or, worse. Disasters do really occurs! Floods, tornadoes, earthquakes, tsunamis, and even terrorism can do strike. We must be ready.
COMPUTER FORENSICS
UNIT II PART I
Make Recoveries Efficient Multithreading tasks shorten the recovery process. Recovering multiple databases with one pass through your log data certainly will save time. Taking image copies, rebuilding indexes, and validating pointers concurrently with the recovery process further reduce downtime.
Take Back-ups The first step to a successful recovery is the backup of your data. Your goal in backing up data is to do so quickly, efficiently, and usually with minimal impact to your customers. You might need only very brief out-ages to take instant copies of your data, or you might have intelligent storage devices that allow you to take a snapshot of your data. Both methods call for tools to assist in the management of resources.
COMPUTER FORENSICS
UNIT II PART I
4.4.3 Recovery
The BRS Recovery component, which functionally replaces the IMS Database Recovery utility for nullfunction (DL/I) databases and data-entry databases (DEDBs), allow recovery of multiple databases with one pass of the log and change accumulation data sets while dynamically allocating all data sets required for recovery. BRS recovers multiple databases to any point in time. BRS can determine the best choice for a Point-inTime (PIT) recovery. Full DBRS support includes:
RECOVERY MANAGER
Recovery Manager component lets you automate and synchronize recoveries across applications and databases by creating meaningful groups of related databases and creating optimized JCL to perform the recovery of these groups. Recovery Manager component provides a positive response for the IMS commands that are used to deallocate and start your databases. Recovery Manager component fully automates the process of cleaning the RECON data sets for restart following a disaster recovery. Recovery Manager component also allows you to test your recovery strategy and notifies you when media errors have jeopardized your recovery resources.
POINTER CHECKING
BRS offers the capability to verify the validity of database pointers through the Concurrent Pointer Checking function for both full-function databases and Fast Path data-entry databases (DEDBs).
INDEX REBUILD
If indexes are ever damaged or lost, the Index Rebuild function of BRS allows you rebuild them rather than recover them.
RECOVERY ADVISOR
The Recovery Advisor component of BRS allows you to monitor the frequency of your image copies and change accumulations. It helps you to determine whether all your databases are being backed-up. By using any number of back-up and recovery tools available, you can better manage your world and be ready to recover!
COMPUTER FORENSICS
UNIT II PART I SOURCE: C OMPUTER FORENSICS: C OMPUTER C RIME SCENE INVESTIGATION , J OHN VACCA
9
Send your feedback to kranthi@kranthi.co.in