SlideShare una empresa de Scribd logo
1 de 41
Presentation on Backup
    Group members
    Aneela Maqboool
      Saira Nisar
       Tehmina
         Rabia
Outline
•   What is backup
•   Backup strategy
•   Recovery procedures
•   Factors in recovery procedures
•   Backup purposes
•   Types of backup
•   Backup architecture and process
•   Backup topologies
•   Backup technology options
•   Features
•   Installation of Acronis
What is a Backup?

• Backup is an additional copy of data that
  can be used for restore and recovery
  purposes
• This Backup copy can be created by:
  – Simply coping data (there can be one or more
    copies)
  – Mirroring data (the copy is always updated
    with whatever is written to the primary
Backup Strategy

 A backup is put in place to avoid
 permanent data loss to ensure the
 integrity of stored data i.e. can get
 back to a previous version and
 build up the data correctly if current
 data found to be in error.
Recovery Procedures

• A backup strategy needs a well
 documented and tested recovery
 procedure to ensure backup data is
 restored properly
Factors in recovery
procedure:
• A well documented procedure that allocates
    roles and responsibilities to staff.
•   Availability of alternative hardware and
    accommodation if the originals have been
    destroyed.
•   Availability of original software such as the
    customised operating system and application
    programs!
•   That up-to-date backup data is readily available
Backup purposes
 – Disaster Recovery
    • Restores production data to an operational state
      after disaster
 – Operational
    • Restore data in the event of data loss or logical
      corruptions that may occur during routine
      processing
 – Archival
    • Preserve transaction records, email, and other
      business work products for regulatory compliance
Types of backups

•   Three basic types of backups:
•   Full backups
•   Differential backups
•   Incremental backups
Full backups

     – full and complete backup of entire system
Full Backup



Su            Su          Su          Su           Su
Differential backups
       – storage of all files that have changed or been
         added since last full backup




Su M   T W   T   F   S Su M   T   W T   F   S Su M   T   W T   F   S Su M   T   W T   F   S Su
Restoring from Differential Backup


  Monday        Tuesday      Wednesday     Thursday                Frida
                                                                     y


Files 1, 2, 3     File 4      Files 4, 5   Files 4, 5, 6   Files 1, 2, 3, 4, 5

 Full Backup    Cumulative   Cumulative    Cumulative


                                                                Production
Key Features of Differential
backups

  – More files to be backed up, therefore it takes
    more time to backup
    and uses more storage space
  – Much faster restore because only the last full
    and the last cumulative
    backup must be applied
Incremental backups

• only archives data that have been
   modified that day




Su M   T W   T   F   S Su M   T   W T   F   S   S   M   T   W T   F   S Su M   T   W T   F   S Su
                                                    u
Incremental backup

   Monday         Tuesda       Wednesday        Thursday              Frida
                    y                                                   y


Files 1, 2, 3      File 4      Updated File 3     File 5      Files 1, 2, 3, 4, 5

   Full Backup   Incremental    Incremental     Incremental


                                                                   Production
Key Features of Incremental
backups


 – Files that have changed since the last backup
   are backed up
 – Fewest amount of files to be backed up,
   therefore faster backup and less
Backup Architecture and
Process
• Backup client
  – Sends backup data to backup server or
    storage node
• Backup server
  – Manages backup operations and maintains
    backup catalog
• Storage node
  – Responsible for writing data to backup device
Backup Architecture and
   Process
                                             og
                                        Catal
                                  adata
                              Met
              Backup Data
                                 Ba
                                    cku
                                       pD
                                         ata




Application Server/   Backup Server/              Tape Library
Backup Client         Storage Node
Backup Operation
                     Application Server and Backup Clients




       3b
                     4




 1                                        5
                3a


 2

                6
 7




                         Storage Node         Backup Device
Backup Server
Backup Operation
• Start the scheduled backup process
• Backup data retrieves backup related information from
    backup catalog
•   Backup server instructs storage node to local backup
    media in backup device
•   Backup server instruct backup clients to send its
    metadata to the backup server and data to be backup to
    storage mode.
•   Backup clients send data to storage node
•   Storage node sends data to backup device
•   Storage node sends media information to backup
    servers
•   Backup server update and records the status
Restore Operation
                     Application Server and Backup Clients




       3b
                     4




 1                                        5
                3a


 2

                6
 7




                         Storage Node         Backup Device
Backup Server
Restore Operation

• Backup server scans backup catalog to identify
    the data to be restore and the client that will
    receive data.
•   Backup servers instructs storage node to load
    backup media in backup device.
•   Data is read and send to backup client.
•   Storage node sends restore metadata to backup
    server.
•   Backup server updates catalog.
Backup Topologies

• There are 3 basic backup topologies:
  –   Direct Attached Based Backup
  –   LAN Based Backup
  –   SAN Based Backup
Direct Attached Backups


                           Metadata

                                      Data
                     LAN




Backup Server   Application Server
                and Backup Client            Backup Device
                and Storage Node
LAN Based Backups
Application Server
and Backup Client                 Backup Server




                     LAN




                           Data



          Storage Node        Backup Device
SAN Based Backups (LAN
  Free)
                                FC SAN
         LAN

           Metadata             Data
Backup                                   Backup Device
Server
           Application Server
           and Backup Client




                                 Storage Node
Backup Technology options

• Backup to Tape
 Physical Tape library
• Backup to tape
Backup to Tape

•   Traditional destination for backup
•   Low cost option
•   Sequential / Linear Access
•   Multiple streaming
    – Backup streams from multiple clients to a
      single backup device
Backup to Tape

Data from
Stream 1    Data from
            Stream 2    Data from
                        Stream 3




                                    Tape
Tape Limitations

• Reliability
• Sequential Access
• Cannot be accessed by multiple host
  simultaneously
• Control environment for tape storage
• Wear and tear of tape
Backup to Disk

•   Ease of implementation
•   Fast access
•   More reliable
•   Random access
•   Multiple host access
•   Enhanced overall back and recovery
    performance
New Features

• File backup and restore
 Simple and automatic protection
 Complete PC™ backup and restore
 Block-level image
 Entire computer
 Server backup
 Files, folders, disks, common workloads
Backing up files and
folders (file backup)
• If you are going to create a full backup,
 type the file name in the File Name line,
 or use the file name generator (a button to
 the right of the line). If you select an
 existing archive, it will be overwritten.
Presentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyy

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Basics of storage Technology
Basics of storage TechnologyBasics of storage Technology
Basics of storage Technology
 
Data Backup (IT) Lecture Slide # 5
Data Backup (IT) Lecture Slide # 5Data Backup (IT) Lecture Slide # 5
Data Backup (IT) Lecture Slide # 5
 
Backup strategy
Backup strategyBackup strategy
Backup strategy
 
Database backup & recovery
Database backup & recoveryDatabase backup & recovery
Database backup & recovery
 
File system
File systemFile system
File system
 
What is cloud backup?
What is cloud backup?What is cloud backup?
What is cloud backup?
 
Data Backup and Recovery.pdf
Data Backup and Recovery.pdfData Backup and Recovery.pdf
Data Backup and Recovery.pdf
 
File system
File systemFile system
File system
 
03 Data Recovery - Notes
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - Notes
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Nfs
NfsNfs
Nfs
 
Disk forensics
Disk forensicsDisk forensics
Disk forensics
 
File Management in Operating Systems
File Management in Operating SystemsFile Management in Operating Systems
File Management in Operating Systems
 
File server
File serverFile server
File server
 
RAID
RAIDRAID
RAID
 
Backup Exec 21
Backup Exec 21Backup Exec 21
Backup Exec 21
 
storage device
storage device storage device
storage device
 
Protection and Security in Operating Systems
Protection and Security in Operating SystemsProtection and Security in Operating Systems
Protection and Security in Operating Systems
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Backup tools
Backup toolsBackup tools
Backup tools
 

Similar a Presentation on backup and recoveryyyyyyyyyyyyy

Presentation recovery manager (rman) configuration and performance tuning ...
Presentation    recovery manager (rman) configuration and performance tuning ...Presentation    recovery manager (rman) configuration and performance tuning ...
Presentation recovery manager (rman) configuration and performance tuning ...xKinAnx
 
Rman Presentation
Rman PresentationRman Presentation
Rman PresentationRick van Ek
 
MySQL enterprise backup overview
MySQL enterprise backup overviewMySQL enterprise backup overview
MySQL enterprise backup overview郁萍 王
 
Presentation backup and recovery best practices for very large databases (v...
Presentation   backup and recovery best practices for very large databases (v...Presentation   backup and recovery best practices for very large databases (v...
Presentation backup and recovery best practices for very large databases (v...xKinAnx
 
Backing up the virtual datacentre. Charlie Llewellyn and Andy Powell from Edu...
Backing up the virtual datacentre. Charlie Llewellyn and Andy Powell from Edu...Backing up the virtual datacentre. Charlie Llewellyn and Andy Powell from Edu...
Backing up the virtual datacentre. Charlie Llewellyn and Andy Powell from Edu...Eduserv
 
Fundamentals of storage Unit III Backup and Recovery.ppt
Fundamentals of storage Unit III Backup and Recovery.pptFundamentals of storage Unit III Backup and Recovery.ppt
Fundamentals of storage Unit III Backup and Recovery.pptRahul Borate
 
MySQL Enterprise Backup
MySQL Enterprise BackupMySQL Enterprise Backup
MySQL Enterprise BackupMario Beck
 
KoprowskiT_PASSEastMidsFEB16_2AMaDisasterJustBegan
KoprowskiT_PASSEastMidsFEB16_2AMaDisasterJustBeganKoprowskiT_PASSEastMidsFEB16_2AMaDisasterJustBegan
KoprowskiT_PASSEastMidsFEB16_2AMaDisasterJustBeganTobias Koprowski
 
Dueling duplications RMAN vs Delphix
Dueling duplications RMAN vs DelphixDueling duplications RMAN vs Delphix
Dueling duplications RMAN vs DelphixKyle Hailey
 
KoprowskiT_SPBizConf_2AMaDisasterJustBegan
KoprowskiT_SPBizConf_2AMaDisasterJustBeganKoprowskiT_SPBizConf_2AMaDisasterJustBegan
KoprowskiT_SPBizConf_2AMaDisasterJustBeganTobias Koprowski
 
KoprowskiT_SPBizConference_2AMaDisasterJustBegan
KoprowskiT_SPBizConference_2AMaDisasterJustBeganKoprowskiT_SPBizConference_2AMaDisasterJustBegan
KoprowskiT_SPBizConference_2AMaDisasterJustBeganTobias Koprowski
 
Backup_exadata_update
Backup_exadata_updateBackup_exadata_update
Backup_exadata_updateFran Navarro
 
KoprowskiT_SQLSatMoscow_2AMaDisaterJustBegan
KoprowskiT_SQLSatMoscow_2AMaDisaterJustBeganKoprowskiT_SQLSatMoscow_2AMaDisaterJustBegan
KoprowskiT_SQLSatMoscow_2AMaDisaterJustBeganTobias Koprowski
 
First Cloud based enterprise Backup & Recovery in India
First Cloud based enterprise Backup & Recovery in IndiaFirst Cloud based enterprise Backup & Recovery in India
First Cloud based enterprise Backup & Recovery in IndiaBlaze Arizanov
 
Backups And Recovery
Backups And RecoveryBackups And Recovery
Backups And Recoveryasifmalik110
 
Backup netezza-tsm-v1403c-140330170451-phpapp01
Backup netezza-tsm-v1403c-140330170451-phpapp01Backup netezza-tsm-v1403c-140330170451-phpapp01
Backup netezza-tsm-v1403c-140330170451-phpapp01Arunkumar Shanmugam
 
7-Backups of security Devices-03-06-2023.ppt
7-Backups of security Devices-03-06-2023.ppt7-Backups of security Devices-03-06-2023.ppt
7-Backups of security Devices-03-06-2023.pptabhichowdary16
 
Real liferecoverypresentation
Real liferecoverypresentationReal liferecoverypresentation
Real liferecoverypresentationoracle documents
 

Similar a Presentation on backup and recoveryyyyyyyyyyyyy (20)

Presentation recovery manager (rman) configuration and performance tuning ...
Presentation    recovery manager (rman) configuration and performance tuning ...Presentation    recovery manager (rman) configuration and performance tuning ...
Presentation recovery manager (rman) configuration and performance tuning ...
 
Rman Presentation
Rman PresentationRman Presentation
Rman Presentation
 
MySQL enterprise backup overview
MySQL enterprise backup overviewMySQL enterprise backup overview
MySQL enterprise backup overview
 
Presentation backup and recovery best practices for very large databases (v...
Presentation   backup and recovery best practices for very large databases (v...Presentation   backup and recovery best practices for very large databases (v...
Presentation backup and recovery best practices for very large databases (v...
 
Unit 3
Unit 3Unit 3
Unit 3
 
Backing up the virtual datacentre. Charlie Llewellyn and Andy Powell from Edu...
Backing up the virtual datacentre. Charlie Llewellyn and Andy Powell from Edu...Backing up the virtual datacentre. Charlie Llewellyn and Andy Powell from Edu...
Backing up the virtual datacentre. Charlie Llewellyn and Andy Powell from Edu...
 
Fundamentals of storage Unit III Backup and Recovery.ppt
Fundamentals of storage Unit III Backup and Recovery.pptFundamentals of storage Unit III Backup and Recovery.ppt
Fundamentals of storage Unit III Backup and Recovery.ppt
 
MySQL Enterprise Backup
MySQL Enterprise BackupMySQL Enterprise Backup
MySQL Enterprise Backup
 
KoprowskiT_PASSEastMidsFEB16_2AMaDisasterJustBegan
KoprowskiT_PASSEastMidsFEB16_2AMaDisasterJustBeganKoprowskiT_PASSEastMidsFEB16_2AMaDisasterJustBegan
KoprowskiT_PASSEastMidsFEB16_2AMaDisasterJustBegan
 
Dueling duplications RMAN vs Delphix
Dueling duplications RMAN vs DelphixDueling duplications RMAN vs Delphix
Dueling duplications RMAN vs Delphix
 
KoprowskiT_SPBizConf_2AMaDisasterJustBegan
KoprowskiT_SPBizConf_2AMaDisasterJustBeganKoprowskiT_SPBizConf_2AMaDisasterJustBegan
KoprowskiT_SPBizConf_2AMaDisasterJustBegan
 
KoprowskiT_SPBizConference_2AMaDisasterJustBegan
KoprowskiT_SPBizConference_2AMaDisasterJustBeganKoprowskiT_SPBizConference_2AMaDisasterJustBegan
KoprowskiT_SPBizConference_2AMaDisasterJustBegan
 
Backup_exadata_update
Backup_exadata_updateBackup_exadata_update
Backup_exadata_update
 
KoprowskiT_SQLSatMoscow_2AMaDisaterJustBegan
KoprowskiT_SQLSatMoscow_2AMaDisaterJustBeganKoprowskiT_SQLSatMoscow_2AMaDisaterJustBegan
KoprowskiT_SQLSatMoscow_2AMaDisaterJustBegan
 
First Cloud based enterprise Backup & Recovery in India
First Cloud based enterprise Backup & Recovery in IndiaFirst Cloud based enterprise Backup & Recovery in India
First Cloud based enterprise Backup & Recovery in India
 
Backups And Recovery
Backups And RecoveryBackups And Recovery
Backups And Recovery
 
Backup netezza-tsm-v1403c-140330170451-phpapp01
Backup netezza-tsm-v1403c-140330170451-phpapp01Backup netezza-tsm-v1403c-140330170451-phpapp01
Backup netezza-tsm-v1403c-140330170451-phpapp01
 
7-Backups of security Devices-03-06-2023.ppt
7-Backups of security Devices-03-06-2023.ppt7-Backups of security Devices-03-06-2023.ppt
7-Backups of security Devices-03-06-2023.ppt
 
MCSA 70-412 Chapter 12
MCSA 70-412 Chapter 12MCSA 70-412 Chapter 12
MCSA 70-412 Chapter 12
 
Real liferecoverypresentation
Real liferecoverypresentationReal liferecoverypresentation
Real liferecoverypresentation
 

Último

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 

Último (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Presentation on backup and recoveryyyyyyyyyyyyy

  • 1. Presentation on Backup Group members Aneela Maqboool Saira Nisar Tehmina Rabia
  • 2. Outline • What is backup • Backup strategy • Recovery procedures • Factors in recovery procedures • Backup purposes • Types of backup • Backup architecture and process • Backup topologies • Backup technology options • Features • Installation of Acronis
  • 3. What is a Backup? • Backup is an additional copy of data that can be used for restore and recovery purposes • This Backup copy can be created by: – Simply coping data (there can be one or more copies) – Mirroring data (the copy is always updated with whatever is written to the primary
  • 4. Backup Strategy A backup is put in place to avoid permanent data loss to ensure the integrity of stored data i.e. can get back to a previous version and build up the data correctly if current data found to be in error.
  • 5. Recovery Procedures • A backup strategy needs a well documented and tested recovery procedure to ensure backup data is restored properly
  • 6. Factors in recovery procedure: • A well documented procedure that allocates roles and responsibilities to staff. • Availability of alternative hardware and accommodation if the originals have been destroyed. • Availability of original software such as the customised operating system and application programs! • That up-to-date backup data is readily available
  • 7. Backup purposes – Disaster Recovery • Restores production data to an operational state after disaster – Operational • Restore data in the event of data loss or logical corruptions that may occur during routine processing – Archival • Preserve transaction records, email, and other business work products for regulatory compliance
  • 8. Types of backups • Three basic types of backups: • Full backups • Differential backups • Incremental backups
  • 9. Full backups – full and complete backup of entire system Full Backup Su Su Su Su Su
  • 10. Differential backups – storage of all files that have changed or been added since last full backup Su M T W T F S Su M T W T F S Su M T W T F S Su M T W T F S Su
  • 11. Restoring from Differential Backup Monday Tuesday Wednesday Thursday Frida y Files 1, 2, 3 File 4 Files 4, 5 Files 4, 5, 6 Files 1, 2, 3, 4, 5 Full Backup Cumulative Cumulative Cumulative Production
  • 12. Key Features of Differential backups – More files to be backed up, therefore it takes more time to backup and uses more storage space – Much faster restore because only the last full and the last cumulative backup must be applied
  • 13. Incremental backups • only archives data that have been modified that day Su M T W T F S Su M T W T F S S M T W T F S Su M T W T F S Su u
  • 14. Incremental backup Monday Tuesda Wednesday Thursday Frida y y Files 1, 2, 3 File 4 Updated File 3 File 5 Files 1, 2, 3, 4, 5 Full Backup Incremental Incremental Incremental Production
  • 15. Key Features of Incremental backups – Files that have changed since the last backup are backed up – Fewest amount of files to be backed up, therefore faster backup and less
  • 16. Backup Architecture and Process • Backup client – Sends backup data to backup server or storage node • Backup server – Manages backup operations and maintains backup catalog • Storage node – Responsible for writing data to backup device
  • 17. Backup Architecture and Process og Catal adata Met Backup Data Ba cku pD ata Application Server/ Backup Server/ Tape Library Backup Client Storage Node
  • 18. Backup Operation Application Server and Backup Clients 3b 4 1 5 3a 2 6 7 Storage Node Backup Device Backup Server
  • 19. Backup Operation • Start the scheduled backup process • Backup data retrieves backup related information from backup catalog • Backup server instructs storage node to local backup media in backup device • Backup server instruct backup clients to send its metadata to the backup server and data to be backup to storage mode. • Backup clients send data to storage node • Storage node sends data to backup device • Storage node sends media information to backup servers • Backup server update and records the status
  • 20. Restore Operation Application Server and Backup Clients 3b 4 1 5 3a 2 6 7 Storage Node Backup Device Backup Server
  • 21. Restore Operation • Backup server scans backup catalog to identify the data to be restore and the client that will receive data. • Backup servers instructs storage node to load backup media in backup device. • Data is read and send to backup client. • Storage node sends restore metadata to backup server. • Backup server updates catalog.
  • 22. Backup Topologies • There are 3 basic backup topologies: – Direct Attached Based Backup – LAN Based Backup – SAN Based Backup
  • 23. Direct Attached Backups Metadata Data LAN Backup Server Application Server and Backup Client Backup Device and Storage Node
  • 24. LAN Based Backups Application Server and Backup Client Backup Server LAN Data Storage Node Backup Device
  • 25. SAN Based Backups (LAN Free) FC SAN LAN Metadata Data Backup Backup Device Server Application Server and Backup Client Storage Node
  • 26. Backup Technology options • Backup to Tape  Physical Tape library • Backup to tape
  • 27. Backup to Tape • Traditional destination for backup • Low cost option • Sequential / Linear Access • Multiple streaming – Backup streams from multiple clients to a single backup device
  • 28. Backup to Tape Data from Stream 1 Data from Stream 2 Data from Stream 3 Tape
  • 29. Tape Limitations • Reliability • Sequential Access • Cannot be accessed by multiple host simultaneously • Control environment for tape storage • Wear and tear of tape
  • 30. Backup to Disk • Ease of implementation • Fast access • More reliable • Random access • Multiple host access • Enhanced overall back and recovery performance
  • 31. New Features • File backup and restore Simple and automatic protection Complete PC™ backup and restore Block-level image Entire computer Server backup Files, folders, disks, common workloads
  • 32. Backing up files and folders (file backup)
  • 33. • If you are going to create a full backup, type the file name in the File Name line, or use the file name generator (a button to the right of the line). If you select an existing archive, it will be overwritten.