Cover image for Digital data integrity : the evolution from passive protection to active management
Title:
Digital data integrity : the evolution from passive protection to active management
Personal Author:
Publication Information:
West Sussex : John Wiley & Sons, 2007
ISBN:
9780470018279

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010123756 QA76.9.A25 L57 2007 Open Access Book Book
Searching...
Searching...
30000010156287 QA76.9.A25 L57 2007 Open Access Book Book
Searching...
Searching...
30000010156288 QA76.9.A25 L57 2007 Open Access Book Book
Searching...

On Order

Summary

Summary

How to plan your future strategy for efficient, cost-saving data management

Businesses have historically treated data protection as an afterthought, as simply making an occasional copy of data that could be used in the future. Today, this attitude is changing rapidly. The ever-increasing amount of data, along with the emphasis on continuous availability, necessitates changes in the approach to data integrity, which results in management and protection becoming much more closely aligned. Digital Data Integrity throws light on the data integrity landscape of the future. It provides the reader with a brief overview of the historical methods and subsequent evolution of data protection. The text shows how the whole subject of data integrity is changing and describes and positions many of the new, enhanced, more intelligent protection technologies and methods.

Digital Data Integrity:

Takes a unique, forward look at data protection and management, highlighting the paradigm shift from simple backup and recovery to total data management. Details recent developments in compliance regulations in an accessible manner. Covers enhanced protection technologies such as advanced intelligent synthetic backups, data reduction methods, and data growth - online protection using continuous data protection. Explains data life cycle management and data storage, using management, quality of service products and tools to achieve better data management, intelligent allocation of storage, and compliance with regulations. Contains information on quality control, looking at SLA (Service Level Agreements), protection by business unit and billing/charge back. Unique insight into hot topics such as next generation bare metal recovery and true system provisioning.

This invaluable text will provide system administrators, and database administrators, as well as senior IT managers and decision makers with a thorough understanding of data management and protection.

With contributions from Ray Schafer and Paul Mayer.


Author Notes

David Little is Data Protection specialist for VERITAS Software. He has worked in the IT industry for 37 years, nine of which were spent working with data protection applications. David is co-author of Implementing Backup and Recovery: The Readiness Guide for the Enterprise.

Skip Farmer is Senior Staff Systems Engineer and a member of the VERITAS Government Specialist Organization, focusing on Data Protection for VERITAS Software in the Government space. He has worked with data protection products for six years, and has 12 years in industry.

Oussama El-Hilali is Director, Product Management Team, NetBackup at VERITAS Software. During his tenure he has helped enhance the Data Management products through product definition based on customer and partner interaction and technology acquisitions. Oussama has been in the software development industry for 15 years.


Table of Contents

Acknowledgementsp. xi
Introductionp. xiii
1 An Introduction to Data Protection Todayp. 1
1.1 Introductionp. 1
1.2 Traditional Backup and Recoveryp. 1
1.3 Hierarchical Storage Migration (HSM)p. 5
1.4 Disaster Recoveryp. 6
1.5 Vaultingp. 7
1.5.1 Offsiting Original Backupp. 10
1.5.2 Create Multiple Copies of the Backupp. 10
1.5.3 Duplicate the Original Backupp. 10
1.6 Encryptionp. 11
1.6.1 Client Side Encryptionp. 11
1.6.2 Media Server Encryptionp. 12
1.6.3 Encryption Appliancep. 12
1.7 Management and Reportingp. 12
1.7.1 Service Level Managementp. 13
1.8 Summaryp. 14
2 The Evolutionp. 15
2.1 Introductionp. 15
2.2 Storage Virtualizationp. 15
2.2.1 Why Storage Virtualization?p. 16
2.3 RAIDp. 17
2.3.1 So What Does This Really Mean?p. 18
2.4 RAID Levelsp. 19
2.5 What Mirroring and RAID Do Not Dop. 22
2.5.1 Which RAID Should I Use When?p. 23
2.6 Replicationp. 24
2.6.1 Host-Based Replicationp. 27
2.6.2 RAID System Replicationp. 27
2.7 Standby or DR Sitep. 28
2.8 Summaryp. 29
3 Backup Integrationp. 31
3.1 Introductionp. 31
3.2 Snapshotsp. 31
3.2.1 Mirrorp. 32
3.2.1.1 Mirror as an instant recovery mechanismp. 32
3.2.1.2 Mirror as a backup object, either by the application server or by a backup serverp. 32
3.2.1.3 Mirror resynchronizationp. 33
3.2.2 COW Snapshotp. 35
3.2.3 Replicationp. 37
3.2.4 Applicationsp. 38
3.2.5 Summaryp. 39
4 Bare Metal Restorep. 41
4.1 Introductionp. 41
4.2 Backgroundp. 41
4.2.1 Why BMR?p. 42
4.2.2 Why Has This Taken So Long?p. 43
4.3 The Evolution of BMR Capabilitiesp. 44
4.3.1 The Manual Reinstall-and-Restore Methodp. 45
4.3.1.1 Limitations of the manual reinstall-and-restore methodp. 45
4.3.2 Operating System Provided Recovery Solutionsp. 48
4.3.2.1 Limitations of operating system provided recovery solutionsp. 49
4.3.3 Hybrid or Home-Grown Recovery Solutionsp. 50
4.4 Filling the Gap - Integrated BMRp. 53
4.4.1 The Bar Risesp. 54
4.5 The Problem of Dissimilar Disk Recoveryp. 55
4.5.1 Approach 1: Changing the Disk and Volume Configuration Informationp. 55
4.5.2 Approach 2: Adjusting the Volumes and File Systems During Recoveryp. 56
4.6 The Problem of Automating Disk Mappingp. 56
4.7 The Problem of Dissimilar System Recoveryp. 58
4.7.1 Windows Dissimilar System Restore Issuesp. 59
4.7.2 UNIX Dissimilar System Restore Issuesp. 60
4.8 The Current State of Integrated BMRp. 61
4.9 The Future of BMRp. 62
4.9.1 Enterprise Data Protection Server Self-Restorep. 62
4.9.2 Automated Dissimilar Disk Restorep. 63
4.9.3 Automated Dissimilar System Recoveryp. 63
4.9.4 Network Integrationp. 64
4.10 New Capabilities and Challenges in Data Protection and the Effect on Bare Metal Recoveryp. 64
4.10.1 Continuous Data Protection (CDP)p. 64
4.10.2 Single Instance Store (SIS)p. 64
4.10.3 Storage Area Network (SAN)p. 65
4.11 Large-Scale Automated Bare Metal Recoveryp. 65
4.12 Summaryp. 66
5 Managementp. 67
5.1 Introductionp. 67
5.2 Protecting Data Throughout Its Life Cyclep. 69
5.3 Architecting for Efficient Managementp. 71
5.4 Reportingp. 78
5.4.1 Backup Operations Reportingp. 79
5.4.2 Alerting and Notificationp. 81
5.4.3 Backup Reporting to Business Unitsp. 83
5.5 Business Unit Chargebackp. 86
5.5.1 Backup Service Providersp. 86
5.6 Conclusionp. 87
6 Securityp. 89
6.1 Introductionp. 89
6.2 Encryption and Data Protectionp. 90
6.2.1 Encryption Overviewp. 90
6.2.2 Encryption and Key Managementp. 91
6.2.3 Encryption Use in Data Protectionp. 92
6.3 Data Protection Application Securityp. 94
6.3.1 Terminologyp. 95
6.3.1.1 Authenticationp. 95
6.3.1.2 Authorizationp. 95
6.3.1.3 Access controlp. 96
6.3.2 Role-Based Securityp. 96
6.3.3 Audit Trailsp. 97
6.3.4 Firewallsp. 97
6.4 Security Vulnerabilities in Data Protection Applicationsp. 98
6.4.1 Vulnerability Detection and Fix Processp. 99
6.4.2 Types of Vulnerabilitiesp. 100
6.5 Conclusionp. 101
7 New Features in Data Protectionp. 103
7.1 Introductionp. 103
7.2 Synthetic Backupsp. 104
7.3 Evolution of Synthetic Backupsp. 106
7.4 Benefits of Synthetic Backupsp. 106
7.5 Building a Synthetic Backupp. 108
7.6 Technical Considerations and Limitationsp. 109
7.6.1 File-Based Versus Block-Based Syntheticsp. 109
7.6.2 File Types and File Change Frequencyp. 109
7.6.3 Media Considerationsp. 110
7.7 Disk-Based Solutionsp. 110
7.8 Disk to Diskp. 111
7.9 Disk Stagingp. 112
7.9.1 Early Implementationsp. 113
7.9.2 Later Implementationsp. 114
7.9.3 Commercial Implementationsp. 116
7.10 Virtual Tapep. 116
7.10.1 Advantages of Virtual Tapep. 117
7.10.2 Technical Considerations and Limitationsp. 118
7.11 Disk-Based Data Protection Implementation Issuesp. 118
7.12 Conclusionp. 119
8 Disk-Based Protection Technologiesp. 121
8.1 Introductionp. 121
8.2 Disk Synthetic Backupp. 122
8.3 Online Protection: CDPp. 123
8.3.1 A CDP Definitionp. 124
8.3.2 CDP Using Byte Level Replicationp. 125
8.3.3 CDP or 'Near' CDP Using Snapshot Technologyp. 126
8.3.4 Benefits and Technical Considerations of CDPp. 127
8.4 Data Reduction: SISp. 128
8.4.1 Primary Data Growth and Secondary Data Explosionp. 129
8.4.2 Issues With Today's Secondary Data Storagep. 130
8.4.3 Growth of the Geographically Dispersed Business Modelp. 131
8.4.4 Issues with Remote Office Backups in the Traditional Data Protection Modelp. 131
8.4.5 SIS as a Solution to Remote Office and Data Redundancyp. 132
8.4.6 Data Redundancy Elimination Using SISp. 133
8.4.7 Benefits and Technical Considerations of SISp. 134
8.5 New Pricing Paradigms for Disk-Based Protectionp. 137
8.5.1 Source Versus Targetp. 138
8.5.2 Tiered Versus Nontieredp. 139
8.5.3 Size of the Incrementsp. 140
8.6 Conclusionp. 141
9 Managing Data Life Cycle and Storagep. 143
9.1 Introductionp. 143
9.2 Issues Surrounding Data Life Cyclep. 143
9.3 Data Life Cycle Managementp. 145
9.3.1 Hierarchical Storage Management (HSM) as a Space Management Toolp. 146
9.3.1.1 Space management examplep. 147
9.3.2 Archive Managementp. 148
9.3.3 Archive and Space Management Togetherp. 151
9.4 Application Considerationsp. 152
9.4.1 Email as a Driving Forcep. 152
9.4.2 Instant Messagingp. 153
9.4.3 Business Portalsp. 154
9.4.4 Applying an Application Strategyp. 155
9.4.5 Content Indexingp. 156
9.5 Additional Considerationsp. 157
9.5.1 File System Intelligencep. 157
9.5.2 File Blockingp. 157
9.5.3 Backup Integrationp. 159
9.6 Securityp. 160
9.6.1 Public Disclosurep. 161
9.6.2 Archive as a Secondary Targetp. 161
9.7 Compliancep. 162
9.7.1 Record Deletionp. 163
9.8 Conclusionp. 165
10 Quality Controlp. 167
10.1 Introductionp. 167
10.2 Quality Control as a Frameworkp. 168
10.3 Managing the Service Level Agreements (SLAs)p. 172
10.4 Protection by Business Unitp. 173
10.4.1 Storage Resource Management (SRM)p. 174
10.5 Application Considerationsp. 175
10.5.1 Corrective Actionp. 176
10.5.2 Patchingp. 177
10.6 Policy and Compliancep. 178
10.7 Cost Modellingp. 179
10.8 Securityp. 181
10.9 Conclusionp. 182
11 Tools for the Systemp. 185
11.1 Introductionp. 185
11.2 HAp. 185
11.2.1 Protecting Data that is Part of a Clusterp. 186
11.2.2 Clustering a Data Protection Application so that It can be Highly Availablep. 187
11.3 Provisioningp. 188
11.3.1 Growing Environmentsp. 189
11.3.2 From Test to Productionp. 190
11.4 Virtualizationp. 190
11.5 Summaryp. 191
Conclusionp. 193
Glossaryp. 199
Appendix A

p. 207

Appendix B

p. 219

Indexp. 239