Article

Business Continuity for mission critical applications

Gary Orenstein

IP Storage Networking


Chapter 6: Business Continuity for mission critical applications

This book excerpt is from Chapter 6 of IP Storage Networking by Gary Orenstein, ISBN 0-321-15960-8, copyright 2003. All rights reserved. This chapter, titled "Business Continuity for mission critical applications," is posted with permission from

Requires Free Membership to View

Addison-Wesley Professional.

Business continuance encompasses several areas of an organization. Some of the factors taken into account when planning for business continuance include risk assessment, location specifics, personnel deployment, network infrastructure, operational procedures, and application/data availability. This chapter's main focus will be in the areas related to applications and data availability.

Varying degrees, or levels, of availability can be achieved for applications based on the tools and technologies employed. The levels of availability range from simple disk failure resilience to quick business resumption after a complete data center outage. The tools and technologies range from disk mirroring to sophisticated automated wide area fail-over clusters. Of course, cost and complexity increase in proportion to increasing levels of availability.

To better understand the levels of availability and the associated array of tools and technologies, we start with the simple case of an application residing on a single server with data on non-redundant direct attached storage, and walk through the process of progressively building higher levels of availability for this application.

This chapter includes sections on the following topics:

  • Assessing Business Continuity Objectives
  • Recovery Time Objective (RTO)
  • Recovery Point Objective (RPO)
  • Factors Affecting the Choice of Solution
  • Availability Within the Data Center
  • Backup and Restore
  • Disk Redundancy-RAID
  • Quick Recovery File Systems
  • Point-In-Time-Copies
  • High Availability and Clustering Availability Across Geographies-Disaster Tolerance and Recovery
  • Off-Site Media Vaulting and Recovery
  • Remote Mirroring and Fail-Over
  • Data Replication
  • Modes of Replication
  • Methods of Replication
  • Secondary Site-Recovery and Other Considerations
  • Corporate Systems
  • Email
  • Internal Websites
  • External Websites
  • E-Commerce
  • Enterprise Applications-ERP,CRM,Supply Chain, etc.
  • Making Use of Storage Redundancy Layers

This chapter excerpt is posted as a Word document. To continue reading, click here.


There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: