Database high availability
|
|
- Bethany Fletcher
- 8 years ago
- Views:
Transcription
1 Database high availability Seminar in Data and Knowledge Engineering Viktorija Šukvietytė December 27, Introduction The contemporary world is overflowed with data. In 2010, Eric Schmidt one of the Google executive chairman described this information flow as follows: these days all information that people have developed until 2003 can be created in just two days. Imagine what would happen if all this information flow stops. We usually use databases to collect knowledge and it is very important that these sources of knowledge would be accessible all the time, i.e. database high availability is very important for us. Using various technologies, database developers in all possible ways try to protect their databases from failures. In such occasions, they try to make them work again as soon as possible with the lowest possible loss of data. Developers require quite a lot of additional resources and knowledge in the specific database technologies to maintain the high availability (HA). We will show other checkpoint-based replication method for DB HA assurance on live migration (the ability to migrate virtual machines from one physical host to another while they are running). We will discuss advantages and disadvantages of this approach and compare it with database itself methods used to ensure high availability. This paper describes the DB high availability assurance ways in such a way in order to clearly show the evolution of ideas. In Sections 2.1 and 2.2, we present Active Data Guard [1] and Real Application Cluster [2]. These solutions applied to ensure the HA DB by DB developers. Sections intended to describe the assurance of DB HA by using VM technologies. These would be ReVirt system [3], Remus DB [4] and SecondSite [5] approaches. In principle, this is totally different manner to ensure the DB HA. However, the idea is borrowed from DBMS methods, but in other environment. 2. High availability assurance by applying DBMS technologies These capabilities take care of most scenarios that might impact the availability of a database. Many reasons may cause that we will not be able to access the resources of database. It can be administrator, human mistakes, data corruption caused by system, software faults, complete site failure, system maintenance operations and the data maintenance operations. It can be also malicious activity into database by hackers. Developers of databases are interested in the protection of these or similar scenarios. So, they use a variety of technologies to ensure the DB high availability. We will examine some used solutions (methods) that ensure DB high availability, such as Active Data Guard and Real Application Cluster. These methods use many DB technologies that help to solve encountered problems. Also, we will provide an overall assessment according to the HA assurance. 2.1 Active Data guard (DB technology) Active Data Guard is the most compact high-level solution to ensure the DB high availability if DB crashes. This solution prevents from the loss of data, ensures the minimal downtime and the minimal DB unavailability for the user. 1
2 The principal schema of Active Data Guard is shown in the Figure 1. It consists of primary database and one or more standby databases. The primary database generates the log files. The latter are transferred over the network to the standby database, which is always in recovery mode, i.e. the standby database adapts these transferred files. Active Data Guard is responsible for: Both primary and standby DB performance monitoring. Log files transferring from the primary DB to the standby DB. Standby DB conversation to the primary DB if this crashes. Also, it provides as fast as possible access to the database. Fig. 1 Principal schema of Active Data Guard. Intensive working with DB (especially executing operations like insert, delete and update), it generates a lot of changes in the log files of DB. Created DBMS technologies are applied to reduce this amount of information because all of this need to transfer over a network to standby DB. As an example reduction of amount of data, which need to be transferred to standby DB, we can provide Oracle DB applied methods: In the DB or session level can be set LOGGING/NOLOGGING option. This allows turn off/on of some operation logging. This is usually applied to temporary, easily rebuilt or generated data. Log files contains not the changed records of tables, but only those records changed blocks. Log files are archived and only then are transferred to standby DB. 2.2 Real application cluster (DB technology) Real application cluster (RAC) is premier shared disk database clustering technology. RAC provides customers with the highest database availability by removing the single database server as a single point of failure. In a clustered server environment, the database itself is shared across a pool of servers, which means that if any server in the server pool fails, the database continues to run on surviving servers. RAC principal schema is shown in Figure 2. RAC consists of several or more DB servers connected to one cluster. These servers are serving the same shared disk database. Among the DB servers participating in the cluster must be good bandwidth and fast interconnect, because all of these servers use the shared cache. Users transparent connect to the cluster and thus gain access to the DB. If any DB server fails, the client-server communication can survive. All connections automatically are taken over by other less loaded DB server from the cluster. Users can continue their work with no breaks. It is worth to note that technology used in RAC lets to use the shared cache. This technology allows taking over ones server running work to other server, when the first one fails. 2
3 Fig. 2 Principal schema of RAC. To use the shared cache, developers have to solve a problem related with changing large memory bandwidth and its transmission. For this purpose, they use various data compressions, filtrations, etc. As a requirement is fast and high-bandwidth interconnect between cluster servers. 2.3 Evaluation of HA assurance by applying the DBMS technologies Pros: Database developers use the DBMS technologies in order to ensure the high availability. Therefore, it is effective, flexible and helps to save resources. As an example of flexibility, we can mention the Active Data Guard possibility to have not only physical but also the logical standby DB. Both of them have the same log shipping technology. The difference between physical and logical standby DB is that in case of physical, the changes made in the primary DB will be replicated in the block level of standby DB, and in case of logical, the changes will be replicated in DDL (Data Definition Language), DML (Data Manipulation Language), DCL (Data Control Language) and TCL (Transaction Control) statements level. In RAC case, the effective system load distribution/imbalance is ensured through the DB instances. However, developers try to reduce overhead of resources in Data Active Guard by deploying standby DB (allows to open DB in read-only (RO) mode, generate reports, etc.). Also, users practically do not even notice if DB instance crashes in RAC case. Meanwhile, Active Data Guard terminates user sessions until users will be able to connect to the DB. It takes not so long, but it is necessary time period. During that time, while users cannot to connect, standby DB takes over the failed DB work Cons: Need to have the good specialists, who have good knowledge in the specific DBMS technologies, which we need to ensure high availability. This is costly. Tools, which usually ensure DB high availability, are licensed separately and their price is similar to the productive DB license price. 3. DB HA assurance, using the VM technologies There is another approach demonstrated by developers of ReVirt, Remus DB and SecondSite systems. Their solutions were based on virtual-machine technologies. We will examine the principles of these systems below and will discuss their advantages and disadvantages. 3
4 3.1 ReVirt: enabling intrusion analysis through virtual- machine logging and replay Revirt system was intended not only to support the DB high availability, but also to analyse an intrusion to the operations system actions. VM utilization and their action logging allows to move away from the target OS, lets the replication its status at any time and its action replay. Developers of ReVirt system use VM technologies (Live Migration of Virtual Machines, Virtual-Machine Logging and Replay) that are very similar as technology used in the Data Guard, called log shipping with time shipping, i.e. log files are applied not immediately upon receipt, but with a certain time lag. 3.2 Remus DB transparent high availability for database system (VM technology) Developers of Remus DB were one of the first, who took a look at the DB HA assurance from a different angle. They were eager to raise discussions, what is better: the HA is best implemented within the DBMS, or as a service by the infrastructure below it. The first ideas for Remus DB came from the predecessor ReVirt and VM life migration technology was chosen for DB HA assurance. The principal schema of Remus DB is shown in Figure 3. The basis of Remus DB system is consisted of two servers, which used to provide HA for a DBMS. One server hosts the active VM, which handle the DB and all client requests. The second one hosts the standby VM in the active mode. While active VM runs, the entire its state including memory, disk, and active network connections are continuously check-pointed to a standby VM on a second physical server. If the Active VM failure occurs, client connections on primary DB are connected to the DB in the standby VM. In such a way, clients can continue work with DB with a minimum delay and a minimum loss of data. Fig. 3 Principal schema of Remus DB. Here developers face to the challenges such as very large amount of data passing from Active VM to standby VM. This flow is due to the necessary transfer of entire Active VM state to standby VM. Developers of Remus DB set their sights on the DBMS technologies ensuring HA such as RAC and Active Data Guard that were mentioned above in order to cope with these problems. The idea to reduce the amount of required memory to pass on standby VM was borrowed from RAC. Transmitted data compression from Active Data Guard. Developers of RemusDB system mention, that their decision requires not so much additional system resources, i.e. overhead of system resources is 10-15%. 4
5 3.3 SecondSite disaster tolerance as a service (VM technologies) SecondSite, a high-availability and disaster tolerance service for virtual machines running in cloud environments. This service runs based on Remus DB system. All VM containing DBs are replicated to a backup image at an alternate geographic location. SecondSite service tracks the entire process and in the event of any VM failure, takes care of all the work that has been done on the failed VM would be transferred to the standby VM. Further, ensures that standby VM clone is made and Live Migration of Virtual Machines is restored. In such a way, SecondSite allows completely transparent process to ensure the HA of DBs located in cloud. Fig. 4 Principal scheme of SecondSite. In Figure 4, we can see a principal scheme of SecondSite service and Network Failover without Service Interruption. SecondSite has the ability to regulate the amount of data transferred from the primary site to Backup site. This is a compromise to a possible small data loss, but it is very important, because data are transferred to the geographically remote servers over the WAN. 3.4 Evaluation of HA assurance by using VM technologies Pros: DB HA assurance by using VM technologies allows moving away from DB itself. We do not need to care what kind of DB do we have and what tools to ensure the HA has it. Time taken to access DB after failure is relatively short. Using VM technologies to ensure DB HA requires only about 10-15% performance overhead. Cons: Using VM technologies for DB HA does not ensure such as diversity and flexibility as using DBMS technologies. There is no any logical standby DB. It is not possible to deploy standby DB in any other way than for its direct purpose. There are strict restrictions for a virtualization layer. It should meet the captured changes in the state of the whole VM at the active host. There is always performance overhead, although a small. It cannot distribute overhead through the several instances like in RAC. 5
6 4. Conclusion Step by step, we have looked at ways to ensure the DB HA. One of these ways is provided by DBMS. Supporters of VM technologies can offer alternatives. It was common that only DBMS can offer how to ensure the HA of databases. However, it can be stated that methods offered by supporters of VM technologies do not give in to first ones. DBMS methods can be more flexible, more optimal, but they are more expensive and require specific and good knowledge in databases. Meanwhile, another ones are versatile (it does not matter what kind of DB we have), can be relatively cheaper, but also have a greater variety of restrictions. These VM technologies ensuring DB HA has strong future perspective and this is the best proof of SecondSite system applied for DB in clouds. REFERENCES 1. Technical Comparison of Oracle Database 12c vs. Microsoft SQL Server 2012 Focus on High Availability, An Oracle White Paper, November 2013, 2. Oracle Real Application Clusters (RAC), An Oracle White Paper, June 2013, pdf?ssSourceSiteId=ocomen. 3. George W. Dunlap, Samuel T. King, Sukru Cinar, Murtaza A. Basrai, Peter M. Chen, ReVirt: Enabling intrusion analysis through virtual-machine logging and replay, in Proceedings of the 5th Symposium on Operating Systems Design and Implementation, December 09 11, 2002, Boston, Massachusetts, ACM New York, pp , 4. Umar Farooq Minhas, Shriram Rajagopalan, Brendan Cully, Ashraf Aboulnaga, Kenneth Salem, Andrew Warfield, RemusDB: transparent high availability for database systems, The VLDB Journal, 2(1):29 45, Shriram Rajagopalan, Brendan Cully, Ryan O'Connor, Andrew Warfield, SecondSite: disaster tolerance as a service, ACM SIGPLAN Notices, 47(7):97 107,
High Availability for Database Systems in Cloud Computing Environments. Ashraf Aboulnaga University of Waterloo
High Availability for Database Systems in Cloud Computing Environments Ashraf Aboulnaga University of Waterloo Acknowledgments University of Waterloo Prof. Kenneth Salem Umar Farooq Minhas Rui Liu (post-doctoral
More informationA SURVEY OF POPULAR CLUSTERING TECHNOLOGIES
A SURVEY OF POPULAR CLUSTERING TECHNOLOGIES By: Edward Whalen Performance Tuning Corporation INTRODUCTION There are a number of clustering products available on the market today, and clustering has become
More informationModule 14: Scalability and High Availability
Module 14: Scalability and High Availability Overview Key high availability features available in Oracle and SQL Server Key scalability features available in Oracle and SQL Server High Availability High
More informationContents. SnapComms Data Protection Recommendations
Contents Abstract... 2 SnapComms Solution Environment... 2 Concepts... 3 What to Protect... 3 Database Failure Scenarios... 3 Physical Infrastructure Failures... 3 Logical Data Failures... 3 Service Recovery
More informationScalable and Highly Available Database Systems in the Cloud
Scalable and Highly Available Database Systems in the Cloud by Umar Farooq Minhas A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree of Doctor of Philosophy
More informationDisaster Recovery for Oracle Database
Disaster Recovery for Oracle Database Zero Data Loss Recovery Appliance, Active Data Guard and Oracle GoldenGate ORACLE WHITE PAPER APRIL 2015 Overview Oracle Database provides three different approaches
More informationDesigning, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008
Course 50400A: Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008 Length: 5 Days Language(s): English Audience(s): IT Professionals Level: 300 Technology:
More informationThe Future of PostgreSQL High Availability Robert Hodges - Continuent, Inc. Simon Riggs - 2ndQuadrant
The Future of PostgreSQL High Availability Robert Hodges - Continuent, Inc. Simon Riggs - 2ndQuadrant Agenda / Introductions / Framing the High Availability (HA) Problem / Hot Standby + Log Streaming /
More informationDisaster Recovery Solutions for Oracle Database Standard Edition RAC. A Dbvisit White Paper
Disaster Recovery Solutions for Oracle Database Standard Edition RAC A Dbvisit White Paper Copyright 2011-2012 Dbvisit Software Limited. All Rights Reserved v2, Mar 2012 Contents Executive Summary... 1
More informationDISASTER RECOVERY STRATEGIES FOR ORACLE ON EMC STORAGE CUSTOMERS Oracle Data Guard and EMC RecoverPoint Comparison
DISASTER RECOVERY STRATEGIES FOR ORACLE ON EMC STORAGE CUSTOMERS Oracle Data Guard and EMC RecoverPoint Comparison Document Control Change Record 3 Date Author Version Change Reference 15-Aug-2007 Ravi
More informationWindows Small Business Server Backup and Recovery Software Replay for Small Business Server Developed by AppAssure Software an industry-leading manufacturer of application backup and recovery solutions
More informationMicrosoft SharePoint 2010 on VMware Availability and Recovery Options. Microsoft SharePoint 2010 on VMware Availability and Recovery Options
This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more patents listed at http://www.vmware.com/download/patents.html. VMware
More informationMS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008
MS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008 Table of Contents Introduction Audience At Completion Prerequisites Microsoft Certified Professional Exams Student Materials
More informationHigh Availability Databases based on Oracle 10g RAC on Linux
High Availability Databases based on Oracle 10g RAC on Linux WLCG Tier2 Tutorials, CERN, June 2006 Luca Canali, CERN IT Outline Goals Architecture of an HA DB Service Deployment at the CERN Physics Database
More information<Insert Picture Here> Oracle Database Directions Fred Louis Principal Sales Consultant Ohio Valley Region
Oracle Database Directions Fred Louis Principal Sales Consultant Ohio Valley Region 1977 Oracle Database 30 Years of Sustained Innovation Database Vault Transparent Data Encryption
More informationYiwo Tech Development Co., Ltd. EaseUS Todo Backup. Reliable Backup & Recovery Solution. EaseUS Todo Backup Solution Guide. All Rights Reserved Page 1
EaseUS Todo Backup Reliable Backup & Recovery Solution EaseUS Todo Backup Solution Guide. All Rights Reserved Page 1 Part 1 Overview EaseUS Todo Backup Solution Guide. All Rights Reserved Page 2 Introduction
More informationVirtual Infrastructure Security
Virtual Infrastructure Security 2 The virtual server is a perfect alternative to using multiple physical servers: several virtual servers are hosted on one physical server and each of them functions both
More informationChapter 13 File and Database Systems
Chapter 13 File and Database Systems Outline 13.1 Introduction 13.2 Data Hierarchy 13.3 Files 13.4 File Systems 13.4.1 Directories 13.4. Metadata 13.4. Mounting 13.5 File Organization 13.6 File Allocation
More informationChapter 13 File and Database Systems
Chapter 13 File and Database Systems Outline 13.1 Introduction 13.2 Data Hierarchy 13.3 Files 13.4 File Systems 13.4.1 Directories 13.4. Metadata 13.4. Mounting 13.5 File Organization 13.6 File Allocation
More informationTOP FIVE REASONS WHY CUSTOMERS USE EMC AND VMWARE TO VIRTUALIZE ORACLE ENVIRONMENTS
TOP FIVE REASONS WHY CUSTOMERS USE EMC AND VMWARE TO VIRTUALIZE ORACLE ENVIRONMENTS Leverage EMC and VMware To Improve The Return On Your Oracle Investment ESSENTIALS Better Performance At Lower Cost Run
More informationIntroduction to Enterprise Data Recovery. Rick Weaver Product Manager Recovery & Storage Management BMC Software
Introduction to Enterprise Data Recovery Rick Weaver Product Manager Recovery & Storage Management BMC Software Contents Introduction...1 The Value of Data...2 Risks to Data Assets...2 Physical Loss...2
More informationSQL Server on Azure An e2e Overview. Nosheen Syed Principal Group Program Manager Microsoft
SQL Server on Azure An e2e Overview Nosheen Syed Principal Group Program Manager Microsoft Dedicated Higher cost Shared Lower cost SQL Server Cloud Continuum Hybrid SQL Server in Azure VM Virtualized Machines
More informationORACLE DATABASE HIGH AVAILABILITY STRATEGY, ARCHITECTURE AND SOLUTIONS
ORACLE DATABASE HIGH AVAILABILITY STRATEGY, ARCHITECTURE AND SOLUTIONS DOAG Nuremberg - 17/09/2013 Kirill Loifman Oracle Certified Professional DBA www: dadbm.com Twitter: @loifmkir ELEMENTS OF HIGH AVAILABILITY
More informationNon-Native Options for High Availability
The Essentials Series: Configuring High Availability for Windows Server 2008 Environments Non-Native Options for High Availability by Non-Native Options for High Availability... 1 Suitability and Cost...
More informationVeritas Cluster Server from Symantec
Delivers high availability and disaster recovery for your critical applications Data Sheet: High Availability Overview protects your most important applications from planned and unplanned downtime. Cluster
More informationHigh Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach
High Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach Introduction Email is becoming ubiquitous and has become the standard tool for communication in many
More informationEliminate SQL Server Downtime Even for maintenance
Eliminate SQL Server Downtime Even for maintenance Eliminate Outages Enable Continuous Availability of Data (zero downtime) Enable Geographic Disaster Recovery - NO crash recovery 2009 xkoto, Inc. All
More informationDesigning Database Solutions for Microsoft SQL Server 2012 MOC 20465
Designing Database Solutions for Microsoft SQL Server 2012 MOC 20465 Course Outline Module 1: Designing a Database Server Infrastructure This module explains how to design an appropriate database server
More informationORACLE DATABASE 10G ENTERPRISE EDITION
ORACLE DATABASE 10G ENTERPRISE EDITION OVERVIEW Oracle Database 10g Enterprise Edition is ideal for enterprises that ENTERPRISE EDITION For enterprises of any size For databases up to 8 Exabytes in size.
More informationRemus: : High Availability via Asynchronous Virtual Machine Replication
Remus: : High Availability via Asynchronous Virtual Machine Replication Brendan Cully, Geoffrey Lefebvre, Dutch Meyer, Mike Feeley,, Norm Hutchinson, and Andrew Warfield Department of Computer Science
More informationBeginning SQL Server. 2012 Administration. Apress. Rob Walters Grant Fritchey
Beginning SQL Server 2012 Administration Rob Walters Grant Fritchey Apress Contents at a Glance About the Authors About the Technical Reviewer Acknowledgments Introduction xv xvi xvii xviii Chapter 1:
More informationNeverfail for Windows Applications June 2010
Neverfail for Windows Applications June 2010 Neverfail, from Neverfail Ltd. (www.neverfailgroup.com), ensures continuity of user services provided by Microsoft Windows applications via data replication
More informationPublication Date: April 2007
white paper Boost Block-level Replication with GoldenGate s TDM Technology for 100% Business Continuity Publication Date: April 2007 Abstract: Recent natural disasters and government regulations have created
More informationBackup and Recovery Solutions for Exadata. Cor Beumer Storage Sales Specialist Oracle Nederland
Backup and Recovery Solutions for Exadata Cor Beumer Storage Sales Specialist Oracle Nederland Recovery Point and Recovery Time Wks Days Hrs Mins Secs Secs Mins Hrs Days Wks Data Loss (Recovery Point Objective)
More informationOur Cloud Backup Solution Provides Comprehensive Virtual Machine Data Protection Including Replication
Datasheet Our Cloud Backup Solution Provides Comprehensive Virtual Machine Data Protection Including Replication Virtual Machines (VMs) have become a staple of the modern enterprise data center, but as
More informationEvaluation of disaster recovery in cloud computing
Volume: 2, Issue: 6, 300-304 June 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 S. Suganya M.phil Full Time Research Scholar, Department of Computer Science, S.
More informationDatabase Resilience at ISPs. High-Availability. White Paper
Database Resilience at ISPs High-Availability White Paper Internet Service Providers (ISPs) generally do their job very well. The commercial hosting market is segmented in a number of different ways but
More informationNear-Instant Oracle Cloning with Syncsort AdvancedClient Technologies White Paper
Near-Instant Oracle Cloning with Syncsort AdvancedClient Technologies White Paper bex30102507wpor Near-Instant Oracle Cloning with Syncsort AdvancedClient Technologies Introduction Are you a database administrator
More informationAdministering a Microsoft SQL Server 2000 Database
Aug/12/2002 Page 1 of 5 Administering a Microsoft SQL Server 2000 Database Catalog No: RS-MOC2072 MOC Course Number: 2072 5 days Tuition: $2,070 Introduction This course provides students with the knowledge
More informationVeritas InfoScale Availability
Veritas InfoScale Availability Delivers high availability and disaster recovery for your critical applications Overview protects your most important applications from planned and unplanned downtime. InfoScale
More informationVirtual Machines and Security Paola Stone Martinez East Carolina University November, 2013.
Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013. Keywords: virtualization, virtual machine, security. 1. Virtualization The rapid growth of technologies, nowadays,
More informationbe architected pool of servers reliability and
TECHNICAL WHITE PAPER GRIDSCALE DATABASE VIRTUALIZATION SOFTWARE FOR MICROSOFT SQL SERVER Typical enterprise applications are heavily reliant on the availability of data. Standard architectures of enterprise
More information<Insert Picture Here> Considerations for Enterprise Cloud Computing
Considerations for Enterprise Cloud Computing Kew Yoke Ling Cloud Computing and Oracle EC2 Cloud Computing today: Developers are the primary users Infrastructure not enterprise ready
More informationBackup and Recovery Solutions for Exadata. Ľubomír Vaňo Principal Sales Consultant
Backup and Recovery Solutions for Exadata Ľubomír Vaňo Principal Sales Consultant Fundamental Backup and Recovery Data doesn t exist in most organizations until the rule of 3 is complete: Different Media
More informationSQL Server for Database Administrators Course Syllabus
SQL Server for Database Administrators Course Syllabus 1. Description This course teaches the administration and maintenance aspects of Microsoft SQL Server. It covers all the roles performed by administrative
More informationPROTECTING MICROSOFT SQL SERVER TM
WHITE PAPER PROTECTING MICROSOFT SQL SERVER TM Your company relies on its databases. How are you protecting them? Published: February 2006 Executive Summary Database Management Systems (DBMS) are the hidden
More informationSymantec Cluster Server powered by Veritas
Delivers high availability and disaster recovery for your critical applications Data Sheet: High Availability Overview protects your most important applications from planned and unplanned downtime. Cluster
More informationTechniques for implementing & running robust and reliable DB-centric Grid Applications
Techniques for implementing & running robust and reliable DB-centric Grid Applications International Symposium on Grid Computing 2008 11 April 2008 Miguel Anjo, CERN - Physics Databases Outline Robust
More informationScalability and BMC Remedy Action Request System TECHNICAL WHITE PAPER
Scalability and BMC Remedy Action Request System TECHNICAL WHITE PAPER Table of contents INTRODUCTION...1 BMC REMEDY AR SYSTEM ARCHITECTURE...2 BMC REMEDY AR SYSTEM TIER DEFINITIONS...2 > Client Tier...
More informationSERVER VIRTUALIZATION IN MANUFACTURING
SERVER VIRTUALIZATION IN MANUFACTURING White Paper 2 Do s and Don ts for Your Most Critical Manufacturing Systems Abstract While the benefits of server virtualization at the corporate data center are receiving
More informationAsigra Cloud Backup V13.0 Provides Comprehensive Virtual Machine Data Protection Including Replication
Datasheet Asigra Cloud Backup V.0 Provides Comprehensive Virtual Machine Data Protection Including Replication Virtual Machines (VMs) have become a staple of the modern enterprise data center, but as the
More informationWould-be system and database administrators. PREREQUISITES: At least 6 months experience with a Windows operating system.
DBA Fundamentals COURSE CODE: COURSE TITLE: AUDIENCE: SQSDBA SQL Server 2008/2008 R2 DBA Fundamentals Would-be system and database administrators. PREREQUISITES: At least 6 months experience with a Windows
More informationSQL Server 2012/2014 AlwaysOn Availability Group
SQL Server 2012/2014 AlwaysOn Availability Group Part 1 - Introduction v1.0-2014 - G.MONVILLE Summary SQL Server 2012 AlwaysOn - Introduction... 2 AlwaysOn Features... 2 AlwaysOn FCI (Failover Cluster
More informationPervasive PSQL Meets Critical Business Requirements
Pervasive PSQL Meets Critical Business Requirements Pervasive PSQL White Paper May 2012 Table of Contents Introduction... 3 Data Backup... 3 Pervasive Backup Agent... 3 Pervasive PSQL VSS Writer... 5 Pervasive
More informationMicrosoft SQL Database Administrator Certification
Microsoft SQL Database Administrator Certification Training for Exam 70-432 Course Modules and Objectives www.sqlsteps.com 2009 ViSteps Pty Ltd, SQLSteps Division 2 Table of Contents Module #1 Prerequisites
More informationIP Storage On-The-Road Seminar Series
On-The-Road Seminar Series Disaster Recovery and Data Protection Page 1 Agenda! The Role of IP in Backup!Traditional use of IP networks for backup! backup capabilities! Contemporary data protection solutions
More informationAlways On: Unitrends Disaster Recovery Services (DRaaS)
Solution Brief Always On: Unitrends Disaster Recovery Services (DRaaS) What keeps you up at night? Are you thinking about about what would happen to your business in the event of a disaster? Are you worrying
More informationLibrary Recovery Center
Library Recovery Center Ever since libraries began storing bibliographic information on magnetic disks back in the 70 s, the challenge of creating useful back-ups and preparing for a disaster recovery
More informationBackups and Maintenance
Backups and Maintenance Backups and Maintenance Objectives Learn how to create a backup strategy to suit your needs. Learn how to back up a database. Learn how to restore from a backup. Use the Database
More informationCloud Based Application Architectures using Smart Computing
Cloud Based Application Architectures using Smart Computing How to Use this Guide Joyent Smart Technology represents a sophisticated evolution in cloud computing infrastructure. Most cloud computing products
More informationNutanix Tech Note. Data Protection and Disaster Recovery
Nutanix Tech Note Data Protection and Disaster Recovery Nutanix Virtual Computing Platform is engineered from the ground-up to provide enterprise-grade availability for critical virtual machines and data.
More informationMicrosoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010
Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010 Better Together Writer: Bill Baer, Technical Product Manager, SharePoint Product Group Technical Reviewers: Steve Peschka,
More informationConnectivity. Alliance Access 7.0. Database Recovery. Information Paper
Connectivity Alliance 7.0 Recovery Information Paper Table of Contents Preface... 3 1 Overview... 4 2 Resiliency Concepts... 6 2.1 Loss Business Impact... 6 2.2 Recovery Tools... 8 3 Manual Recovery Method...
More informationIngres Replicated High Availability Cluster
Ingres High Availability Cluster The HA Challenge True HA means zero total outages Businesses require flexibility, scalability and manageability in their database architecture & often a Single Point of
More informationAdministering a Microsoft SQL Server 2000 Database
Administering a Microsoft SQL Server 2000 Database Course 2072 - Five days - Instructor-led - Hands-On Introduction This course provides students with the knowledge and skills required to install, configure,
More informationOracle Active Data Guard Far Sync Zero Data Loss at Any Distance
Oracle Active Data Guard Far Sync Zero Data Loss at Any Distance Oracle Maximum Availability Architecture Best Practices O R A C L E W H I T E P A P E R A U G U S T 2 0 1 4 Table of Contents Introduction
More informationHRG Assessment: Stratus everrun Enterprise
HRG Assessment: Stratus everrun Enterprise Today IT executive decision makers and their technology recommenders are faced with escalating demands for more effective technology based solutions while at
More informationProtecting your SQL database with Hybrid Cloud Backup and Recovery. Session Code CL02
Protecting your SQL database with Hybrid Cloud Backup and Recovery Session Code CL02 ARCserve True Hybrid Data Protection ARCserve Backup Data protection for complex environments Disk to Disk to-tape Disk
More informationHigh Availability with Postgres Plus Advanced Server. An EnterpriseDB White Paper
High Availability with Postgres Plus Advanced Server An EnterpriseDB White Paper For DBAs, Database Architects & IT Directors December 2013 Table of Contents Introduction 3 Active/Passive Clustering 4
More informationHow To Write A Server On A Flash Memory On A Perforce Server
Simplified HA/DR Using Storage Solutions Tom Tyler, Perforce Software Agnes Jacob, NetApp 1 Introduction Major League Requirements Review: Perforce Server Storage Profile HA vs. DR Fault Tree Analysis,
More informationNETAPP SYNCSORT INTEGRATED BACKUP. Technical Overview. Peter Eicher Syncsort Product Management
NETAPP SYNCSORT INTEGRATED BACKUP Technical Overview Peter Eicher Syncsort Product Management Current State of Data Protection Production Data Protection Storage Physical & VM App Servers Backup Servers
More informationCyber Security: Guidelines for Backing Up Information. A Non-Technical Guide
Cyber Security: Guidelines for Backing Up Information A Non-Technical Guide Essential for Executives, Business Managers Administrative & Operations Managers This appendix is a supplement to the Cyber Security:
More informationComparing TCO for Mission Critical Linux and NonStop
Comparing TCO for Mission Critical Linux and NonStop Iain Liston-Brown EMEA NonStop PreSales BITUG, 2nd December 2014 1 Agenda What do we mean by Mission Critical? Mission Critical Infrastructure principles
More informationExperimental Investigation Decentralized IaaS Cloud Architecture Open Stack with CDT
Experimental Investigation Decentralized IaaS Cloud Architecture Open Stack with CDT S. Gobinath, S. Saravanan PG Scholar, CSE Dept, M.Kumarasamy College of Engineering, Karur, India 1 Assistant Professor,
More informationReal World Enterprise SQL Server Replication Implementations. Presented by Kun Lee sa@ilovesql.com
Real World Enterprise SQL Server Replication Implementations Presented by Kun Lee sa@ilovesql.com About Me DBA Manager @ CoStar Group, Inc. MSSQLTip.com Author (http://www.mssqltips.com/sqlserverauthor/15/kunlee/)
More informationInformix Dynamic Server May 2007. Availability Solutions with Informix Dynamic Server 11
Informix Dynamic Server May 2007 Availability Solutions with Informix Dynamic Server 11 1 Availability Solutions with IBM Informix Dynamic Server 11.10 Madison Pruet Ajay Gupta The addition of Multi-node
More informationIntroduction to Virtualization. Paul A. Strassmann George Mason University October 29, 2008, 7:20 to 10:00 PM
Introduction to Virtualization Paul A. Strassmann George Mason University October 29, 2008, 7:20 to 10:00 PM 1 Data Center Transformation 2 Scope of Virtualization Services 3 Virtualization Evolution 4
More informationBusiness Continuity with the. Concerto 7000 All Flash Array. Layers of Protection for Here, Near and Anywhere Data Availability
Business Continuity with the Concerto 7000 All Flash Array Layers of Protection for Here, Near and Anywhere Data Availability Version 1.0 Abstract Concerto 7000 All Flash Array s Continuous Data Protection
More informationCloud-dew architecture: realizing the potential of distributed database systems in unreliable networks
Int'l Conf. Par. and Dist. Proc. Tech. and Appl. PDPTA'15 85 Cloud-dew architecture: realizing the potential of distributed database systems in unreliable networks Yingwei Wang 1 and Yi Pan 2 1 Department
More informationOLTP Meets Bigdata, Challenges, Options, and Future Saibabu Devabhaktuni
OLTP Meets Bigdata, Challenges, Options, and Future Saibabu Devabhaktuni Agenda Database trends for the past 10 years Era of Big Data and Cloud Challenges and Options Upcoming database trends Q&A Scope
More informationOne Solution for Real-Time Data protection, Disaster Recovery & Migration
One Solution for Real-Time Data protection, Disaster Recovery & Migration Built-in standby virtualisation server Backs up every 15 minutes up to 12 servers On and Off-site Backup User initialed file, folder
More informationMANAGED DATABASE SOLUTIONS
Page 0 2015 SOLUTION BRIEF MANAGED DATABASE SOLUTIONS NET ACCESS LLC 9 Wing Drive Cedar Knolls, NJ 07927 www.nac.net Page 1 Table of Contents 1. Introduction... 2 2. Net Access Managed Services Solution
More informationServer Virtualization with Windows Server Hyper-V and System Center
Course 20409B: Server Virtualization with Windows Server Hyper-V and System Center Course Details Course Outline Module 1: Evaluating the Environment for Virtualization This module provides an overview
More informationServer Virtualization in Manufacturing
W H I T E P A P E R Server Virtualization in Manufacturing Do s and Don ts for Business- and Mission-critical Manufacturing Systems Uptime. All the time. 1 Abstract While the benefits of server virtualization
More informationHigh Availability for Citrix XenApp
WHITE PAPER Citrix XenApp High Availability for Citrix XenApp Enhancing XenApp Availability with NetScaler Reference Architecture www.citrix.com Contents Contents... 2 Introduction... 3 Desktop Availability...
More informationDB2 9 for LUW Advanced Database Recovery CL492; 4 days, Instructor-led
DB2 9 for LUW Advanced Database Recovery CL492; 4 days, Instructor-led Course Description Gain a deeper understanding of the advanced features of DB2 9 for Linux, UNIX, and Windows database environments
More informationRelational Databases in the Cloud
Contact Information: February 2011 zimory scale White Paper Relational Databases in the Cloud Target audience CIO/CTOs/Architects with medium to large IT installations looking to reduce IT costs by creating
More informationTrends in Data Protection and Restoration Technologies. Mike Fishman, EMC 2 Corporation (Author and Presenter)
Trends in Data Protection and Restoration Technologies Mike Fishman, EMC 2 Corporation (Author and Presenter) SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless
More informationEMC VPLEX FAMILY. Continuous Availability and data Mobility Within and Across Data Centers
EMC VPLEX FAMILY Continuous Availability and data Mobility Within and Across Data Centers DELIVERING CONTINUOUS AVAILABILITY AND DATA MOBILITY FOR MISSION CRITICAL APPLICATIONS Storage infrastructure is
More informationKey Considerations and Major Pitfalls
: Key Considerations and Major Pitfalls The CloudBerry Lab Whitepaper Things to consider before offloading backups to the cloud Cloud backup services are gaining mass adoption. Thanks to ever-increasing
More informationDatabase as a Service (DaaS) Version 1.02
Database as a Service (DaaS) Version 1.02 Table of Contents Database as a Service (DaaS) Overview... 4 Database as a Service (DaaS) Benefit... 4 Feature Description... 4 Database Types / Supported Versions...
More informationStorage and Disaster Recovery
Storage and Disaster Recovery Matt Tavis Principal Solutions Architect The Business Continuity Continuum High Data Backup Disaster Recovery High, Storage Backup and Disaster Recovery form a continuum of
More informationDesigning a Data Solution with Microsoft SQL Server 2014
20465C - Version: 1 22 June 2016 Designing a Data Solution with Microsoft SQL Server 2014 Designing a Data Solution with Microsoft SQL Server 2014 20465C - Version: 1 5 days Course Description: The focus
More informationHigh Availability Solutions for the MariaDB and MySQL Database
High Availability Solutions for the MariaDB and MySQL Database 1 Introduction This paper introduces recommendations and some of the solutions used to create an availability or high availability environment
More informationCase Study: Oracle E-Business Suite with Data Guard Across a Wide Area Network
Case Study: Oracle E-Business Suite with Data Guard Across a Wide Area Network Data Guard is a complete, reliable, DR solution for the mission critical 5.5TB database that supports Oracle s global business
More informationRestoration Technologies. Mike Fishman / EMC Corp.
Trends PRESENTATION in Data TITLE Protection GOES HERE and Restoration Technologies Mike Fishman / EMC Corp. SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless
More informationMicrosoft s Advantages and Goals for Hyper-V for Server 2016
Virtualization is a bedrock of modern cloud environments. Hypervisors manage the virtual machines in a cloud environments, providing six fundamental features, as shown in the table below. 1 Hypervisors
More informationConnectivity. Alliance Access 7.0. Database Recovery. Information Paper
Connectivity Alliance Access 7.0 Database Recovery Information Paper Table of Contents Preface... 3 1 Overview... 4 2 Resiliency Concepts... 6 2.1 Database Loss Business Impact... 6 2.2 Database Recovery
More informationCA ARCserve Replication and High Availability Deployment Options for Hyper-V
Solution Brief: CA ARCserve R16.5 Complexity ate my budget CA ARCserve Replication and High Availability Deployment Options for Hyper-V Adding value to your Hyper-V environment Overview Server virtualization
More information