Cover image for Disaster proofing information systems : a complete methodology for eliminating single points of failure
Title:
Disaster proofing information systems : a complete methodology for eliminating single points of failure
Personal Author:
Series:
McGraw-Hill networking professional
Publication Information:
New York, NY : McGraw-Hill Professional, 2003
Physical Description:
ix, 268 p. : ill. ; 24 cm.
ISBN:
9780071409223

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010185545 QA76.9.D348 B82 2003 Open Access Book Book
Searching...

On Order

Summary

Summary

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.






Does Your Business Continuity Plan Rely on Prevention or Cure?




Nobody wants to shell out a lot of money for something they'll use once or, with any luck, never. But that's where most corporations find themselves today. Network managers see disaster recovery as outside their jurisdiction, and therefore as a competitor for system resources. External incentives to deploy disaster recovery from customers and partners may be pressing, but internal incentives are working against them.This book provides a methodology responsive to those problems. With careful planning, it can actually improve system performance instead of encumbering it. Even if your organization isn't budgeted for disaster recovery planning, you can implement this methodology now, at minimum cost, and reap immediate returns. For companies already invested in system protection software, Buchanan shows network managers how to get started on impact and risk assessment, protection planning, policymaking, and more.


Author Notes

Robert W. Buchanan, Jr. is president and CEO of Shiloh Network Solutions (SNS), a start-up software company developing a new generation of proactive network analysis tools for clustered systems within the enterprise and Internet market. Prior to SNS, Mr. Buchanan was the managing partner in Shiloh Consulting, an independent network consulting company that provides network and e-business planning, management, and testing services to product manufacturers and Fortune 500 companies. He also served 4 years as Sr. Vice President, General manager, and COO at LANQuest Labs, a network consulting company and independent test lab. During his tenure there, he was responsible for the development of new network testing procedures and several QA and performance testing products under contract with companies such as Intel, Cisco Systems and 3Com Corporation. Before LANQuest, Mr. Buchanan spent 7 years in software product management and marketing at 3Com Corporation where he was responsible for the EtherSeries and 3X network operating systems. Mr. Buchanan also has experience managing technical organizations: at ROLM he managed software development and computer operations, and at Lockheed Corporation he managed advanced development groups of engineers in a large IT organization.

In February 1997 Mr. Buchanan second book, Measuring the Impact of Your Web Site, was released. This book was well received and has been translated into both Kanji and Dutch. His first book, The Art of Testing Network Systems, was published in 1996, and remains popular today. He is currently working on a fourth book for 2003 on performance tuning clustered server configurations. Mr. Buchanan has written many articles for networking journals including LAN Magazine, Network World, CNEPA Journal, and Network Expo. He has spoken and taught at Interop, Networld, Network and PC Expos, and Comdex. He also teaches IT courses at the University of Phoenix.


Table of Contents

Forewordp. xi
Introductionp. xiii
Part I A SHARED Methodology for Disaster Avoidance across Enterprise, B2B, and B2C Systemsp. 1
Chapter 1 Avoidance Versus Recoveryp. 3
What Is Disaster Recovery?p. 7
What Is Business Continuity?p. 12
What Is Disaster Avoidance?p. 13
How Daily Business Operations Benefit from Disaster Avoidancep. 17
Example 1 Web Site Co-locationp. 18
Example 2 Intranet or Enterprise Workgroup Serversp. 19
Example 3 Home Officep. 22
Example 4 Mobile Wireless Accessp. 23
Business Benefitsp. 24
B2B and Business-to-Customer (B2C) Disaster Avoidancep. 24
Small Business Disaster Avoidancep. 25
Chapter 2 Business Continuity Requirementsp. 27
The SHARED Objective of Analyzing Business and System Needsp. 28
The Process of Analyzing Business-User-Customer Needsp. 33
Step 1 Business Overviewp. 34
Step 2 Data Flow Dependenciesp. 39
Step 3 Technology Dependenciesp. 44
Step 4 Prioritizing Existing Operational Problemsp. 48
Step 5 Future Operational Requirementsp. 48
Steps 6 and 7 Personnel and Facilitiesp. 49
Financial Considerationsp. 55
B2B Requirementsp. 59
Small Business Requirementsp. 60
Chapter 3 Developing a Disaster Avoidance Strategyp. 61
Disaster Avoidance Alternatives for Critical Systemsp. 62
Hardware Platformsp. 64
Co-locationp. 64
Hot/Warm Standby or Failoverp. 69
Hot or Cold Restorationp. 72
Applicationsp. 74
Data Storep. 75
System Accessp. 77
Infrastructurep. 78
Access Devicesp. 81
Shared Information (Intranet and E-business)p. 85
Small Businessesp. 86
Disaster Avoidance Best Practicesp. 86
Performance Improvements Through SHARED Disaster Avoidancep. 88
Availability as a Function of Disaster Avoidancep. 92
Capacity/Scalability Enhancementsp. 93
Maintenance and Deployment Enhancementsp. 93
Chapter 4 Integrating Business Continuity and Disaster Avoidance Needsp. 95
Mating Business Requirements to Disaster Avoidance Alternativesp. 96
Step 1 Prioritize Orderp. 98
Step 2 Map Requirementsp. 100
Step 3 Define Exact Requirementsp. 101
Step 4 End User and Facility Requirementsp. 104
Step 5 B2B Requirementsp. 107
Step 6 Financial Analysisp. 107
Example 2 - B2B Supply Chain Managementp. 112
Analyzing Business-User-Customer Needs from Chapter 2p. 114
Mating Business Requirements to Disaster Avoidance Alternativesp. 118
Business Continuity and Disaster Avoidance--Added Costp. 123
Deployment and Validation Is Critical to Successp. 124
Part II Implementing the SHARED Architecturep. 127
Chapter 5 Access Devicesp. 129
Best Practicesp. 130
Asset and Configuration Managementp. 131
Data Synchronization and Recoveryp. 134
Products and Proceduresp. 136
Handheldsp. 136
Palm Handheldsp. 136
Windows CE Handheldsp. 139
Research in Motion (RIM) Blackberry--Integrated Wireless Productsp. 140
XcelleNet Afaria Productsp. 141
Desktops and Laptopsp. 141
Chapter 6 Platformsp. 143
Best Practices for Availability and Reliabilityp. 144
Platform Simplicityp. 144
Uninterrupted Power Supply (UPS)p. 146
Clusteringp. 146
Co-locationp. 148
Reduce Planned Downtimep. 152
Reduce Unplanned Downtimep. 153
Use Network Load Balancing (NLB)p. 153
Use Data Store Redundancyp. 153
Best Practices for Performance and Scalabilityp. 154
Best Practices for Management and Securityp. 155
Products and Proceduresp. 156
Microsoft Windowsp. 157
Sun Solarisp. 161
IBMp. 162
Veritasp. 162
Chapter 7 Applicationsp. 165
Best Practicesp. 166
For Disaster Avoidancep. 167
For Operations and Developmentp. 169
Products and Proceduresp. 174
Chapter 8 Data Storep. 177
Critical Business Applications' Shared Data Storep. 181
Critical Remote Data Store Synchronizationp. 182
Local Productivity Data Filesp. 184
Data Sharingp. 185
File Replicationp. 187
Best Practicesp. 188
Databasesp. 188
File Replicationp. 190
Physical Data Storagep. 192
Products and Proceduresp. 194
File Replicationp. 194
Database Transaction Replicationp. 196
SANs and Network Storagep. 198
Chapter 9 Infrastructurep. 203
Infrastructure Requirementsp. 204
Best Practicesp. 207
Avoid Chatty Communicationp. 209
Network Load Balancing (NLB)p. 209
High-Speed Data Linksp. 213
ISPs for User Accessp. 215
CO or Wire Centersp. 216
Products and Servicesp. 216
Chapter 10 B2B, B2C, B2G, and Small Business Needsp. 219
Best Practicesp. 222
Use Standardsp. 225
Integrate the B2X Environment with Existing Back-End Systemsp. 226
Isolate the B2B Environment from the Rest of the Systems for Security Purposesp. 227
Coordinate Disaster Avoidance and Recoveryp. 228
Products and Proceduresp. 229
Small Businessesp. 231
Chapter 11 Validation and Testingp. 235
Life Cyclep. 236
Test Objectivesp. 237
Testing and Systems Managementp. 239
Methodologyp. 240
System Versus Component Testsp. 243
Validating the Componentsp. 243
Validating the Systemp. 243
Validating B2X E-commercep. 244
Test Preparationp. 245
Test Bed Setupp. 246
Toolsp. 248
Load Modelsp. 249
Testingp. 251
Instrumentationp. 252
Loadingp. 253
Measuringp. 254
Analyzingp. 256
Evolutionp. 259
Indexp. 261