Title:
Implementing backup and recovery : the readiness guide for the enterprise
Personal Author:
Publication Information:
New York : John Wiley and Sons, 2003
ISBN:
9780471227144
Added Author:
Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000010045782 | QA76.9.B32 L57 2003 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
Offers the first comprehensive reference on the topic of backup systems for both UNIX and Windows NT Provides a complete tutorial on the general topic of data backup systems along with a detailed, step-by-step guide for planning and full implementation of backup systems Authors include personal tips and strategic and tactical advice gained from many company implementations Uses VERITAS NetBackup product to illustrate backup system functions
Author Notes
David B. Little is the Senior Product Specialist for Veritas NetBackup
David A. Chapa is the Director of Consulting Services for DataStaff, Inc. and co-founder and Vice President of Gray House Solutions, Inc.
Table of Contents
Acknowledgments | p. xiii |
About the Authors | p. xv |
Introduction | p. xvii |
Part 1 Introduction to Backup and Recovery in the Enterprise Environment | p. 1 |
Chapter 1 Backup and Recovery System Requirements Explained | p. 3 |
Backup Seems Simple... | p. 4 |
The Goals of Tape Backup | p. 5 |
The Role of Tape Backup | p. 5 |
Why Is the Data Backed Up? | p. 6 |
Hardware Failure | p. 7 |
Disaster Recovery | p. 8 |
Application Failure | p. 8 |
User Error | p. 9 |
Service Level Agreements | p. 9 |
Legal Requirements | p. 9 |
Complexity in Enterprise Backup | p. 10 |
Where Do We Start? | p. 11 |
Identify All Systems | p. 12 |
Identify All Networks Involved | p. 12 |
Locate Backup Hardware | p. 13 |
Locate Backup Hardware--SAN Alternative | p. 14 |
Identify Recovery Requirements | p. 14 |
Identify Data and Application Availability Requirements during Backup | p. 14 |
Determine the Best Way to Move the Data | p. 14 |
Summary | p. 15 |
Chapter 2 Business Requirements of Backup Systems | p. 17 |
Developing a Backup Strategy | p. 17 |
Business Requirements | p. 18 |
Legal Requirements | p. 18 |
Recovery Requirements | p. 19 |
Frequency of Backups | p. 23 |
Retention of Backups | p. 24 |
Security of Backups | p. 24 |
Off-Site Storage Requirements | p. 25 |
How Many Copies? | p. 25 |
How Long Should They Be Kept Off-Site? | p. 26 |
Differences between Business Units | p. 26 |
Summary | p. 28 |
Chapter 3 An Introduction to NetBackup | p. 31 |
NetBackup Tiered Architecture | p. 31 |
Explanation of Specific NetBackup Concepts | p. 33 |
Layout NetBackup Domain | p. 33 |
Amount of Data | p. 39 |
Location of Data | p. 40 |
Speed of Networks | p. 40 |
Backup Window | p. 40 |
Summary | p. 42 |
Part 2 Backup Product Tutorial | p. 43 |
Chapter 4 Evaluating Storage Media Requirements | p. 45 |
Backup Window and Amount of Data | p. 46 |
Drives | p. 47 |
Capacity | p. 48 |
Library? | p. 50 |
Summary | p. 51 |
Chapter 5 General Discussion on Configuration | p. 53 |
Specific NetBackup Configuration Elements | p. 53 |
Master Server | p. 54 |
Media Server | p. 55 |
Clients | p. 56 |
Devices and Storage Units | p. 56 |
Installation | p. 57 |
UNIX Master Server | p. 57 |
UNIX Media Server | p. 61 |
UNIX Client | p. 61 |
Windows Master Server | p. 61 |
Windows Media Server | p. 63 |
Windows Clients | p. 63 |
Configuring NetBackup | p. 63 |
Devices | p. 63 |
Storage Units | p. 71 |
Volumes | p. 75 |
Volume Pools | p. 77 |
Policy | p. 77 |
Catalog Backup | p. 86 |
What User Interface to Use? | p. 88 |
Summary | p. 90 |
Chapter 6 Monitoring the Backup Process | p. 91 |
Using the Activity Monitor | p. 91 |
Fields in Activity Monitor | p. 93 |
Detailed View | p. 94 |
Daemons/Services | p. 98 |
Monitoring without the GUI | p. 100 |
What Reports Are Available and What Do They Tell? | p. 102 |
Advanced Reporting | p. 110 |
Summary | p. 112 |
Chapter 7 Evaluating Other Backup-Related Features and Options | p. 115 |
Backing Up and Restoring in a SAN Environment | p. 115 |
Database Agents | p. 118 |
Block Level Database Backups Using Database Editions | p. 118 |
Frozen Image Backups | p. 119 |
Copy-on-Write Snapshot | p. 120 |
Mirror | p. 122 |
Offhost Backups | p. 123 |
Managing a Large Environment Using Global Data Manager (GDM) | p. 124 |
Vault Solutions | p. 125 |
Disk-Based Storage Units | p. 127 |
Implementing Disk-Based Storage | p. 128 |
Storage Migration Products and Backup | p. 129 |
Summary | p. 130 |
Chapter 8 General Troubleshooting Tips | p. 133 |
Functional Overview | p. 134 |
First Order of Business: What Problem Are You Troubleshooting? | p. 134 |
The Natural Progression of Troubleshooting | p. 136 |
NT/2000, 300GB, RAID5, and Home Directories | p. 139 |
Things to Check before Calling Your Dedicated Support Professional | p. 144 |
How to Gather Information | p. 146 |
Where to Find Information to Assist in Self-Diagnosis | p. 146 |
Some Tools to Become Familiar With | p. 148 |
Summary | p. 149 |
Chapter 9 The Expanding Backup System | p. 151 |
React versus Respond | p. 152 |
Capacity Planning | p. 153 |
The Great Divide | p. 159 |
Advantages and Disadvantages of the Great Divide | p. 162 |
Lone-Server Advantages | p. 162 |
Lone-Server Disadvantages | p. 163 |
Multiple-Server Advantages | p. 165 |
Multiple-Master Disadvantages | p. 168 |
Determining Your Need for Additional Resources | p. 169 |
When to Add More Device Hosts | p. 169 |
More Tapes or Tape Drives, or Both? | p. 172 |
What about Tape Technologies? | p. 175 |
Alternative Network Solutions | p. 176 |
10 Mbps, 100 Mbps, 1 GbE | p. 176 |
Dedicated Backup Network | p. 177 |
Summary | p. 179 |
Part 3 The Enterprise Impact of Backup Systems | p. 181 |
Chapter 10 The Future of Backup | p. 183 |
Virtual Backup | p. 185 |
Real-Time Backup | p. 187 |
Backup and Replication | p. 187 |
Synthetic Backups | p. 191 |
Embedded Agents | p. 192 |
Intelligent Backup Software | p. 193 |
Backup Appliances | p. 194 |
Disk and Solid-State Devices | p. 194 |
Summary | p. 195 |
Chapter 11 Major Players in the Backup Arena | p. 197 |
HP Data Protector (Formerly Omniback II) | p. 199 |
Methodology of Backup | p. 199 |
Principles of Recovery | p. 200 |
High Availability | p. 201 |
Key Differentiators | p. 201 |
IBM Tivoli Storage Manager | p. 202 |
Methodology of Backup | p. 203 |
Principles of Recovery | p. 203 |
High Availability | p. 203 |
Key Differentiators | p. 204 |
Legato NetWorker | p. 204 |
Methodology of Backup | p. 205 |
Principles of Recovery | p. 205 |
High Availability | p. 207 |
Key Differentiators | p. 207 |
VERITAS NetBackup | p. 208 |
Methodology of Backup | p. 210 |
Principles of Recovery | p. 210 |
High Availability | p. 211 |
Key Differentiators | p. 211 |
Summary | p. 212 |
Appendix A Command-Line Interface Guide | p. 215 |
Appendix B Glossary | p. 229 |
Appendix C Tuning Your Backup and Recovery Application | p. 241 |
Appendix D Disaster Recovery Planning Kit: From End to Beginning | p. 245 |
Appendix E Business Impact Analysis Planning Kit: The Storm Before the Calm | p. 269 |
Appendix F Performance Test Tech Note | p. 285 |
Appendix G NetBackup Performance Tuning on Windows | p. 291 |
Index | p. 323 |