unisys ClearPath OS 2200 Integrated Recovery Conceptual Overview imagine it. done. ClearPath OS 2200 Release 12.1 June
|
|
- Emmeline Parks
- 7 years ago
- Views:
Transcription
1 unisys imagine it. done. ClearPath OS 2200 Integrated Recovery Conceptual Overview ClearPath OS 2200 Release 12.1 June
2 NO WARRANTIES OF ANY NATURE ARE EXTENDED BY THIS DOCUMENT. Any product or related information described herein is only furnished pursuant and subject to the terms and conditions of a duly executed agreement to purchase or lease equipment or to license software. The only warranties made by Unisys, if any, with respect to the products described in this document are set forth in such agreement. Unisys cannot accept any financial or other responsibility that may be the result of your use of the information in this document or software material, including direct, special, or consequential damages. You should be very careful to ensure that the use of this information and/or software material complies with the laws, rules, and regulations of the jurisdictions with respect to which it is used. The information contained herein is subject to change without notice. Revisions may be issued to advise of such changes and/or additions. Notice to U.S. Government End Users: This is commercial computer software or hardware documentation developed at private expense. Use, reproduction, or disclosure by the Government is subject to the terms of Unisys standard commercial license for the products, and where applicable, the restricted/limited rights provisions of the contract data rights clauses. Unisys and ClearPath are registered trademarks of Unisys Corporation in the United States and other countries. All other brands and products referenced in this document are acknowledged to be the trademarks or registered trademarks of their respective holders.
3 Contents Section 1. Introduction Description Components Benefits Implementing Integrated Recovery Component and System Recovery Database Recovery Message Recovery Distributed Transactions Integrated Recovery Example Section 2. Attributes and Application Groups Attributes for Integrated Recovery Application Groups Local Application Group Switchable Application Group Concurrent Application Group Section 3. Components Logical Components of Integrated Recovery Products in Integrated Recovery Universal Data System (UDS) Exec Components Step Control Audit Control TIP File Control TIP Scheduling TIP Session Control (TSC) TIP File Security (TFS) Message Control Bank (MCB) Integrated Recovery Utility (IRU) Database Environment Examples Section 4. Implementing Integrated Recovery Developing a Recovery Strategy Site Environment Characteristics Recovery and Availability Requirements iii
4 Contents Capacity or Processing Requirements Configuring Integrated Recovery Components Section 5. How Integrated Recovery Works Integrated Recovery Process Steps and Step-IDs Database Recovery Message Recovery Two-Phase Commit Process Integrated Recovery Options Short Recovery Medium Recovery Long Recovery iv
5 Figures Integrated Recovery in the Business Environment Local Application Groups Switchable Application Group Concurrent Application Group The Integrated Recovery Environment Integrated Recovery Components and Files v
6 Figures vi
7 Section 1 Introduction Integrated Recovery is a combination of OS 2200 software products, features, and concepts that support database processing while providing protection from possible hardware and software failures. Integrated Recovery enables you to expedite the recovery process, thereby avoiding unnecessary downtime, ensuring data integrity, and maintaining system stability. Documentation Updates This document contains all the information that was available at the time of publication. Changes identified after release of this document are included in problem list entry (PLE) To obtain a copy of the PLE, contact your Unisys representative or access the current PLE from the Unisys Product Support Web site: Note: If you are not logged into the Product Support site, you will be asked to do so. About the Integrated Recovery Library This document provides an overview of how Integrated Recovery works and describes its components, attributes, and processing considerations. For details of implementing Integrated Recovery, refer to the Integrated Recovery Reference and Administration Guide. This guide contains information that pertains to all environments. For additional details of implementing Integrated Recovery in multihost environments, refer to the following documents: Integrated Recovery Reference and Administration Guide for Multihost Environments Partitioned Applications Conceptual Overview Partitioned Applications Planning, Installation, and Operations Guide
8 Introduction Description Integrated Recovery is a set of system supplied capabilities that coordinate database updates, transaction scheduling, and messages in user applications. The purpose of Integrated Recovery components and concepts is to safeguard the data that is used by applications to support the unique business needs of your organization, as shown in Figure Integrated Recovery Guarantees a consistent state within databases Ensures that updates to data are coordinated and consistent with received and generated message traffic Figure Integrated Recovery in the Business Environment Integrated Recovery includes methods that support the following system activities: Recovery from system or hardware failures Maintenance of the database and messages Monitoring of transaction processing and scheduling Integrated Recovery is available only for transactions and other batch and demand programs that are associated with an application group, a concept that provides the basis for Integrated Recovery. An application group is a software partition that includes its own database, audit trail, system files, and other support components. Refer to Section 2, Attributes and Application Groups, for more information about application groups. These concepts are discussed throughout this document in relation to the components of Integrated Recovery
9 Introduction Components Benefits The following components are central to Integrated Recovery: Transaction processing Transactions are requests for data access or update that emphasize speed, integrity, all-or-nothing execution, and independence of one transaction from others. Database management A database is a collection of data and a mechanism for organizing, relating, and accessing specific data items. Database management is a method for defining and administering a database. Message handling Messages are input requests for processing and responses that contain the results. A response can be an output message to the caller or an input message to another transaction for additional processing. Scheduling Scheduling is the response to a request for a transaction execution or other processing in which program execution is initiated or delayed according to timing limitations, system operating rules, and other limitations. Logging (auditing) Logs are written records of activity and other information for tracking, history, and recovery purposes. Logging is the process of writing specific information to logs. In Integrated Recovery, this process is known as auditing and logs are audit trails. Integrated Recovery offers the following benefits for your environment: Enables and coordinates the use of multiple database formats with a single transaction or program Ensures consistency between database updates and message processing Synchronizes database recovery with message recovery Provides protection from possible hardware and software failures Preserves OS 2200 processing attributes (refer to Section 2, Attributes and Application Groups, for descriptions of these attributes): Recoverability Scalability ACID database properties Resiliency Data isolation
10 Introduction Security Ease of administration Implementing Integrated Recovery The concept of application groups is the coordinating factor in configuring and implementing Integrated Recovery across all possible components. When implementing Integrated Recovery for your site, you need to coordinate Configuration of Integrated Recovery components Application programs System administration procedures Component and System Recovery System software components, like the OS 2200 Exec, Transaction Processing (TIP), Universal Data System (UDS), and Message Control Bank (MCB), have their own procedures that can handle most failures. If these local procedures cannot recover from a failure, you can use the Integrated Recovery Utility (IRU) to perform other recovery procedures. If a system failure occurs, the Exec reboots the system. The standard procedures recover any lost data automatically without requesting user input. If you want to control the recovery procedure, you can configure the Integrated Recovery components so that user input controls the recovery. Component and system recovery activities always include the appropriate database and message recovery concepts that are described in the following topics. Database Recovery Database recovery refers to restoring data to a consistent state and ensuring database file integrity, particularly when system or program failures occur. Depending on the environment that your site establishes and the failure that occurs, recovering data can mean one of the following: Permanently applying all pending updates to the database Reversing the effects of all unfinished database updates, rolling back programs to a stable and consistent point, and, optionally, restarting the programs Restoring a database by reloading data from a known point and possibly reapplying updates Database recovery protects data against the following possible problems: Mass storage failures that could cause permanent loss of part or all of the database
11 Introduction Host system failures or unplanned system stops that could cause database inconsistencies Database software aborts Abnormal failures in the user program that could result in inconsistent data Message Recovery Message recovery is the process of recovering input messages, output messages, and program-to-program pass-off messages that were not completely processed by the communications network or user programs. When a transaction program specifies that the messages associated with the program should be recoverable and the transaction program terminates normally, the system forwards the output message to a workstation and discards the corresponding input message. If the transaction program does not terminate normally, the system retains the input message to reschedule the program. Integrated Recovery components enable sites to synchronize database updates and recovery with message updates and recovery. Distributed Transactions Distributed transactions, also known as global transactions, require multiple applications to accomplish a task. Application processing is distributed among multiple program modules, which can execute on different hardware platforms and update different databases. When multiple applications work together in a distributed transaction, the resulting updates to the databases must be either all committed or all rolled back. This process is known as two-phase commit. Refer to Section 5, How Integrated Recovery Works, for more information. The ACID database properties, particularly atomicity, are crucial to distributed transactions. Refer to Section 2, Attributes and Application Groups, for descriptions of these properties. Integrated Recovery Example The following scenario from the banking industry is an example of the importance of synchronizing database recovery with message recovery. Assume that a customer uses an online interface to transfer $100 from a savings account to a checking account. The database system successfully subtracts $100 from the savings account, adds $100 to the checking account, and queues a notification message to the customer. However, a system failure occurs before the customer receives the message that the accounts were updated. After the system failure is resolved, Integrated Recovery ensures that the system recovers the queued message and delivers it to the customer, so that the customer knows that the transfer is complete
12 Introduction If the database system does not use Integrated Recovery, the customer does not receive the message stating that the transfer occurred and, therefore, might re-enter the transfer request. If the customer re-enters the request, $200 is transferred instead of $100, but the customer receives a notification message about the second transfer only. Therefore, a system that is configured and programmed to use Integrated Recovery ensures consistency between database and message update processing and protects users against the effects of hardware and software failures
13 Section 2 Attributes and Application Groups Integrated Recovery provides many options to tailor systems to the needs of different applications. When configuring Integrated Recovery for your environment, you have to make choices like the following: Must the system be always available or are there periods of little activity, such as overnight? Does the processing load consist of tens, hundreds, or thousands of updates or accesses per second? Is your data public, private, or secret? Is minor data loss acceptable when system problems occur (that is, you choose not to recover all the data), or must you retain absolute integrity with no data loss? Every environment is different, but you can configure Integrated Recovery to support a wide range of needs and balance the competing choices to suit your business. Attributes for Integrated Recovery Integrated Recovery provides the following attributes. You need to consider the benefits of these attributes and decide which best suit your needs. Recoverability Recovers from any single failure (software or hardware). Recovery can be to a certain time (such as program logic corruption) or event (such as a system crash or disk failure). Recoverability can be defined at various levels, including Scalability Application group Entire database or selected database files Messages or selected messages Concerns transaction rates, transaction volume, and database size, including Very large databases, potentially scaling to ever larger sizes Large number of concurrent database users Applications with specific response time needs Multihost configurations that access a single database simultaneously for load sharing and capacity
14 Attributes and Application Groups ACID database properties Coordinate threads using a step-id to ensure the following properties: Atomicity All changes that a transaction makes to a database are made permanent, or all are nullified. Consistency A successful transaction transforms a database from a previous valid state to a new valid state. Isolation Changes that a transaction makes to a database are not visible to other operations until the transaction completes its work. Durability Resiliency Changes that a transaction makes to a database survive future system or media failures. Supports methods, such as the following, that provide multiple hosts, multiple file copies, and remote backup support: Extended Transaction Capacity (XTC) and concurrent application groups Partitioned Applications and switchable application groups Duplexed files Includes database, system files, audit files Duplexing methods Includes audit trail duplexing, TIP file duplexing, unit duplexing (host based mirroring) Disaster recovery Data isolation Uses application groups to isolate databases and processing (refer to the following discussion in this section) Security Supports techniques, such as the following, that ensure data security: Data access control File security User-ids Ease of administration Provides a variety of configurations and techniques for maintenance and monitoring that enable recovery, as follows:
15 Attributes and Application Groups Recovery Coordinates components so that recovery from most failures can be done quickly with minimal intervention. A single IRU command coordinates recovery of all application group database files and messages and all Integrated Recovery system components, usually requiring only a minute or two. Maintenance Provides file backup, audit file backup, and file maintenance. Monitoring Provides transaction monitoring, scheduling monitoring and throttling, file status monitoring, program monitoring, and load balancing. Configuration specification Provides considerable flexibility in configuration. Application Groups An application group is a software partition that usually includes its own Application programs and data Database files Message retention files System files Audit trails Repository or other source for file and record descriptions Other support components An application group provides a recoverable environment for logically related components, files, and user programs that is isolated from unrelated applications, processing, and data. User programs can access the database only of a particular application group. Integrated Recovery is provided only for user sessions, transactions, or programs that are affiliated with an application group. A site performs recovery on an application group basis. Recovering an application group means restoring its components, files, messages, and programs to a consistent state. An application group can be one of the following types: Local Switchable Concurrent
16 Attributes and Application Groups Local Application Group A local application group is defined on only one system, called a host, as shown in Figure A local application group can run on only one host and uses local recovery, which implies that the application group must be recovered by the host on which it is running. The database for a local application group typically resides on the local mass storage of the host. Figure Local Application Groups Generally, you can configure an application group as local if it does not need to share files with other hosts. Even in a multihost environment, a local application group is defined on only one host and is known only to that host. Local application group files cannot be recovered or accessed by the other hosts in a multihost configuration. Switchable Application Group A switchable application group is a pair of identical application groups on two hosts in the Partitioned Applications environment, as shown in Figure Both hosts can access the database for the application group, but they cannot access the database simultaneously. The switchable application group must be active on a host before that host can access the database for the application group. Database files and other system files associated with switchable application groups reside on shared mass storage. A switchable application group has only one set of database files, one set of system files, and one set of Exec step control and audit control files. Figure Switchable Application Group The Partitioned Applications environment extends the availability of OS 2200 hardware and software. With redundant hardware and software components, multiple hosts
17 Attributes and Application Groups operate as one uninterruptible system. From the end user s viewpoint, the system never goes down. If a critical component fails, the Partitioned Applications system automatically recovers the component on the same host and continues processing. If one host fails, the backup host in the Partitioned Applications system automatically 1. Takes over the switchable workload from the failed host 2. Initiates IRU recovery on the backup host 3. Continues processing on the backup host An application group whose database requires continuous availability to users is a candidate for being configured as a switchable application group. Refer to the Partitioned Applications Conceptual Overview and the Partitioned Applications Planning, Installation, and Operations Guide for more information on using switchable application groups. Concurrent Application Group A concurrent application group exists on multiple hosts, as shown in Figure The application group can be active simultaneously on all hosts. The database resides on shared mass storage for concurrent access by all users of that application group. Figure Concurrent Application Group Integrated Recovery coordinates data access among user applications. Requests are queued and managed to avoid conflicting updates. While one request is processed, the data is locked. The next request for the same data waits until the first request finishes. Concurrent application groups are supported only on systems where the Extended Transaction Capacity (XTC) feature is installed. In an XTC configuration, all locks are requested through hardware and software components that control access to the shared
18 Attributes and Application Groups database by coordinating and retaining database locks. These components are known as the Extended Processing Complex-Locking (XPC-L). In contrast, for local and switchable application groups, locking occurs in internal local software memory. Candidates for being configured as concurrent application groups include the following: An application group that requires the capacity of more than a one-host system. An application group that requires continuous access to the database. If a host fails, the application group is still accessible on the other hosts in the multihost system. Refer to the XTC Planning, Migration, and Operations Guide for details on using concurrent application groups
19 Section 3 Components User applications, transactions, and other programs access TIP or UDS to request data access or updates, as shown in Figure System software coordinates all other components and actions. Integrated Recovery ensures that processing is complete and secure. The Integrated Recovery Utility (IRU) can restore the database, if necessary. Figure The Integrated Recovery Environment Integrated Recovery encompasses the database recovery needs for the Exec, Transaction Processing (TIP) file control, and the Universal Data System (UDS), as well as the message recovery needs for Message Control Bank (MCB). Integrated Recovery also controls transaction scheduling and the storage and maintenance of transaction programs. The main Exec components of Integrated Recovery are step control, audit control, TIP scheduling, and TIP file control. Integrated Recovery components that are not part of the Exec are the Integrated Recovery Utility (IRU), MCB, and UDS. This section identifies the logical and product components in Integrated Recovery
20 Components Logical Components of Integrated Recovery Integrated Recovery involves numerous components in the following logical areas: Database management Direct access, fixed record size File control superstructure (FCSS), Shared File System (SFS 2200) Indirect access, variable record size database Freespace Network database Network Database Server (DMS) Relational database Relational Database Server (RDMS) The same application program can access combinations of these database types. Application programs, which access the database for updates and data retrieval Batch and demand programs Transactions Distributed transactions System software Communication software MCB, message handling Scheduling TIP scheduling Logging Audit control Commitment control Step control Recovery, maintenance, and monitoring IRU, UDS Monitor (UDSMON), TIP Performance Monitor (TPM) Security TIP Session Control (TSC), TIP File Security (TFS)
21 Components Products in Integrated Recovery Figure shows the relationships of the main components in the Integrated Recovery environment. Figure Integrated Recovery Components and Files where: Universal Data System (UDS) Enterprise Network Database Server (DMS) Enterprise Relational Database Server (RDMS) Shared File System (SFS 2200) Universal Data System Control (UDS Control), also known as UDSC Repository for ClearPath OS 2200 (UREP) Exec Step control Audit control Transaction Processing (TIP) file control Freespace TIP scheduling TIP Session Control (TSC)
22 Components TIP File Security (TFS) Message Control Bank (MCB) Integrated Recovery Utility (IRU) Refer to the documentation for individual software products for more information. Minimum Components The following minimum components are required for using Integrated Recovery: Either a TIP or UDS environment Exec step control Exec audit control Integrated Recovery Utility (IRU) Universal Data System (UDS) The Unisys expandable, modular suite of software products for data management, data processing, and database application development. The UDS suite provides an integrated environment for control, maintenance, and recovery of user databases in several database models. Network Database Server (DMS) The Unisys data management software product that conforms to the CODASYL (network) data model. DMS software enables data definition, manipulation, and maintenance in mass storage database files. Relational Database Server (RDMS) The Unisys data management software product that is based on the relational data model. RDMS software supports fourth-generation Structured Query Language (SQL) statements and native RDMS interfaces to create relational database structures and retrieve and manipulate relational data. Shared File System (SFS 2200) The Unisys data management software product that enables shared access to direct system data format (DSDF) and multi-indexed sequential access method (MSAM) data files (flat files). Universal Data System Control (UDS Control) The UDS online data manager that provides a common architecture and environment for the UDS product family. UDS Control software (also known as UDSC) is required for Integrated Recovery in a UDS environment. UDS Control software Supports three data models (RDMS, DMS, and SFS 2200) and manages all their files through locking and queuing, database I/O control, and diagnostics Enables users to share files, controls access to those files, and automatically and uniformly resolves conflicts over access to the files
23 Components Enables users to designate recoverable files, regardless of the data management method used, and provides consistent file recovery Supports multiple application groups, which provides for independent database environments, but also can run without interfering with other database management software on the system Handles main storage through its own cache manager banks, which improves overall system performance and increases data security Repository for ClearPath OS 2200 (UREP) The Unisys data management software that provides data dictionary functions by creating, maintaining, and reporting on data objects in a repository. UREP software Maintains all data definitions for UDS products Provides commands for defining and reporting on RDMS, DMS, and SFS 2200 databases, as well as your corporate information resources Enables dynamic system configuration Exec Components Step Control The Exec Integrated Recovery components (step control, audit control, and Transaction Processing (TIP) components) work together during normal production and recovery to ensure data consistency. Controls and tracks program execution. User steps mark the beginning and end of each recoverable unit during program execution. Step control enables recovery to occur on a step-by-step basis. Step control maintains the state of each step and, optionally, can record information on the audit trail, making it possible to recover database updates and transaction messages if a system fails. Audit Control Focuses on data integrity at the application group level (as opposed to the run unit level) by recording events for the application group. Audit control maintains several types of audit trails, but step control audit trails that are associated with application groups are the only type that is pertinent to Integrated Recovery. Step control audit trails contain Step control step changes Message and database updates
24 Components TIP File Control The database management component that is supplied by the Exec. TIP file control provides the following types of database management: TIP file control superstructure (FCSS) A direct access, fixed record size database, also known as a flat file database Freespace An indirect (key) access, variable record size database TIP file control provides recovery, locking, queuing, database I/O, and diagnostics for FCSS and Freespace databases. The FREIPS processor provides maintenance, file and record definition, and reporting capabilities for these databases. TIP Scheduling A modular extension of the OS 2200 Exec that provides a high-performance transaction monitor and scheduling system. Precompiled and prelinked user transaction programs are stored in program libraries maintained by the SUPUR and TPUR processors. These programs can be written in a variety of languages and can access one or several types of databases. TIP scheduling uses user-provided scheduling information to schedule executions of the transaction programs. You can configure the priority, number of copies, and other variables of transaction programs. Various interfaces are supplied for monitoring and dynamically controlling the TIP scheduling. TIP Session Control (TSC) An optional security feature that controls access to the system on a caller or application basis. TIP File Security (TFS) An optional security feature that controls access to the database files based on the security privileges of the caller
25 Components Message Control Bank (MCB) Provides transaction message handling. MCB is a common bank that handles staging, auditing, queuing, recovery, and recall of input, output, pass-off, and checkpoint messages. MCB is the primary communications software product for Integrated Recovery. MCB consists of a background run (batch program) and various common banks that Interface with communication programs, transaction programs, and IRU to provide transaction scheduling and message recovery Interface with Exec step control to coordinate message recovery and transaction scheduling information Maintain a separate MCB database for recoverable transaction message text Note: Other communications software products that support Integrated Recovery include Communications Interface for Transaction Applications (CITA) Communications Platform (CPComm) Open Distributed Transaction Processing (Open DTP) System Interface for Legacy Applications (SILAS) Refer to the documentation for these products for more information. Integrated Recovery Utility (IRU) Provides both preventive maintenance and recovery capabilities. The Integrated Recovery Utility (IRU) is a stand-alone, command-driven processor that Restores UDS files Restores TIP FCSS and Freespace files Helps recover Exec step control files Helps recover MCB message retention files Backs up database files and audit trails Enables you to monitor the condition of database and audit files Performs file maintenance tasks, such as allocation and copying
26 Components Database Environment Examples The database environment can include any combination of data models, scheduling options, and language types. The environment can be a simple FCSS file that is accessed by a COBOL program or a multihost system with several file types and programs using different languages to access the database, as in the following examples: Example 1 An airline has a reservations database in FCSS and Freespace files with transaction programs accessing it using C and COBOL. The airline also has a cargo database in UDS DMS files with transaction programs accessing it using COBOL Data Manipulation Language (CDML). Example 2 A bank uses UDS RDMS files with transaction programs accessing it using CDML. This system uses MCB for message recovery. Example 3 An emergency support system (911) uses UDS DMS files with transaction programs accessing it using COBOL. This system uses a multihost Extended Transaction Capacity (XTC) system to provide access to the database in case of a host failure. Example 4 A catalog order business uses UDS RDMS files with transaction programs accessing it using C. This system uses a multihost Extended Transaction Capacity (XTC) system to provide additional capacity to access the database
27 Section 4 Implementing Integrated Recovery Integrated Recovery is implemented through system configuration, application programs, and system administration procedures. Developing a Recovery Strategy You need to determine an overall recovery strategy for your environment that supports your business needs. All components in Integrated Recovery have default values and behaviors, but you should review these defaults and decide if they provide the best strategy for your environment. To determine the values and behaviors that you need, consider the following factors: Characteristics of your site s environment Recovery and availability requirements Capacity or processing requirements The following paragraphs explore the types of questions you need to ask about each factor when designing your recovery strategy. Site Environment Characteristics To evaluate your site s characteristics, you need to consider your processing environment, types of databases, and types of interfaces, as posed by the following questions: What environment is your site running? Online transaction processing environment Batch/demand environment A combination of these processing environments What database are you using? File control superstructure (FCSS) or a Freespace database UDS DMS, RDMS, or SFS 2200 database Any combination of these databases What interface are you using to access the database? One of the UCS languages (such as UCS C or UCS COBOL)
28 Implementing Integrated Recovery ASCII COBOL (ACOB), FORTRAN (FTN), or another supported language Java transactions or one of the Java resource adapters (such as DMS RA or RDMS JDBC) Any combination of these interfaces Is your system running in a distributed transaction processing (Open DTP) environment? If so, do you need network access to different types of machines? Recovery and Availability Requirements To evaluate your processing availability and recovery requirements, you need to consider your tolerance for loss of data and system downtime, as posed by the following questions. Compare your answers to the configuration of Integrated Recovery components to ensure that behavior during processing and recovery suits your needs. Is the integrity of input and output messages important? Does your site need transaction message recovery? MCB supports various levels of message recovery. Is the database used for read access only? Or is the database both read and updated? You can configure application groups as non-recoverable for read-only databases. Is reducing the vulnerability to mass storage failures important? Duplexing helps reduce vulnerability to mass storage failures. Duplexing means that all write operations write data twice: to two file copies or two disks. Read operations can occur from either copy. Both TIP file duplexing and unit duplexing are available for files. Audit trail duplexing is available for audit trails. TIP file duplexing Two mass storage file copies (legs) exist of the same TIP or UDS/TIP file data. You can configure either all TIP files or only selected TIP files to be duplexed. Unit duplexing An associated backup disk exists for each disk. Unit duplexing is a separately packaged OS 2200 Exec feature. Audit trail duplexing Two mass storage file copies or two tape file copies (legs) exist of the audit trail data. You can individually configure each application group s audit trail to be duplexed
29 Implementing Integrated Recovery Does your system meet your availability (uptime) requirements? If not, you can install either of the following separately packaged features. These features use redundant hardware and software components in multihost systems to extend the availability of OS 2200 systems. OS 2200 Partitioned Applications feature, for automatic recovery of switchable application groups Extended Transaction Capacity (XTC) feature, for availability of concurrent application groups Does your system need disaster recovery procedures? IRU provides a variety of commands and capabilities to support different styles of disaster recovery. Capacity or Processing Requirements To evaluate your capacity or processing requirements, you need to know your current and projected processing load. Does a single host provide sufficient processing power for accessing your database? If not, you can install the Extended Transaction Capacity (XTC) feature and define concurrent application groups across multiple hosts. This feature enables all the hosts in a multihost system to be active in the application group simultaneously and process transactions concurrently. Concurrent processing increases the number of transactions that can be active simultaneously and, therefore, increases capacity
30 Implementing Integrated Recovery Configuring Integrated Recovery Components All Integrated Recovery components have configurable portions. Most components also have default values. You should configure all components to suit your applications, transactions, processing requirements, data, and system operating requirements. The default configuration values might not match your environment. You should evaluate your requirements and adjust the Integrated Recovery configuration to suit your environment. The following table shows some of the main parameters you can configure for each Integrated Recovery component: Component Audit control Step control TIP file control TIP scheduling UDS MCB IRU Parameters to Configure Number of audit trails Type of audit trail (step control, log, TPM, COD) Audit trail number and name Audit trail media (mass storage, tape) If mass storage, audit trail placement (fixed, removable) Audit trail duplexing Audit file size Number of application groups Application group name and number Number of concurrent users Recoverable or non-recoverable application group Scheduling tree Number of TIP files Number of TIP/Exec files Use of Freespace Scheduling priority hierarchy Number of transaction copies that can be used at one time Application/transaction relationship Application name and number Number of concurrent threads User message size Number of unique file names that can appear on a command Number of dump history entries to retain Refer to the documents for each product to learn about the attributes and their possible settings
31 Section 5 How Integrated Recovery Works With Integrated Recovery software in place, the system Ensures consistency between database update processing and message processing Synchronizes database recovery with message recovery Protects users against the effects of hardware and software failures Integrated Recovery Process The general process for Integrated Recovery involves the following steps: 1. The application program starts a step. The step state of active is audited. 2. The application program reads or writes the database files, as needed. Database write operations are audited; but the files themselves are not yet updated, in most cases. 3. The application program requests that the database updates, if any, be applied or discarded. The step state of commit-in-progress (CIP) or rollback is audited 4. The database is updated, or the database updates are discarded. 5. The application program completes. The step state of terminate is audited. Note: These steps do not show messages. Refer to the Exec System Software Administration Reference Manual for the entire Integrated Recovery process, including recoverable messages. Steps and Step-IDs Integrated Recovery processes are based on the concept of a step. When a transaction or application program request starts, it is given a unique identifier (called a step-id) that is maintained throughout the execution of the transaction or application program request. A variety of information is associated with each step and step-id, the most important of which is the step state
32 How Integrated Recovery Works All Integrated Recovery components use the step-id and step state to determine the appropriate actions for the step. Auditing step states ensures that identical actions are done for system and component recovery and in the case of reloading a previous copy of a database file and reapplying the database updates to it. Database Recovery For example, if UDS or TPC recovery determines that the step state is active (that is, the transaction or application program request was not complete when the failure occurred), the recovery process discards any database updates. If the step state is commit-in-progress (that is, database updates were being written to the database), the recovery process completes all database updates. Message Recovery Message recovery ensures, among other actions, that Input messages that are not yet scheduled are retained. Input messages for transactions that have not completed are retained. Output messages that are not yet sent are retained. Output messages for incomplete transactions are discarded. Two-Phase Commit Process The two-phase commit process is a procedure that ensures the atomicity (an ACID database property) of distributed (global) transactions. Two-phase commit is an integral part of the Integrated Recovery environment. When the application program issues an instruction that the transaction is finished, the distributed transaction monitor makes sure that all updates are ready to be applied to the databases and then issues instructions to commit the updates. If any database update cannot be applied for some reason, the distributed transaction monitor issues instructions to roll back the changes to their previous state. The result of the two-phase commit protocol is that updates are either all committed or all rolled back. The two-phase commit process contains an additional step state: ready to commit the updates but waiting for the results of the other portions of the distributed transaction before continuing. Refer to the Open Distributed Transaction Processing TX Application Program Interface Programming Guide for more information
33 How Integrated Recovery Works Integrated Recovery Options In the event of a failure, the Integrated Recovery components work together to recover databases and messages and to restore processing capabilities to the application group. Integrated Recovery has the following recovery options: Short recovery Medium recovery Long recovery The option you choose depends on the type of failure from which you are recovering. Short Recovery Short recovery enables recovery after a system, application group, or component failure. The user initiates a short recovery through a simple IRU request. Exec short recovery automatically restores the audit trail, step-id queues, and, sometimes, TIP database files. After Exec short recovery restores the audit trail, an IRU short recovery request uses information from the audit trail to Reconcile database updates for steps that were in progress at the time of the failure Request recovery actions for UDS, TIP, MCB, and step control No user input is required beyond requesting the recovery to start. At the end of a successful short recovery Steps that were in the process of committing at the time of failure are rolled forward (completed). Steps that had not yet reached the commit point are rolled back. Messages and step queues are reconciled. The application group is restarted. This process usually takes very little time, hence the name short recovery. Medium Recovery Medium recovery is useful especially for concurrent application groups because a lengthy host failure of one of the XTC hosts could retain locks and prevent the remaining XTC hosts from accessing portions of the database. If a host failure occurs, another host can execute medium recovery on behalf of the failed host to release the locks and roll steps forward or back, as appropriate. Medium recovery is useful also when short recovery fails due to a system file problem
34 How Integrated Recovery Works IRU medium recovery uses data from the audit trail and system files to Restore database updates for steps that were in progress at the time of the failure to a consistent state (rolling forward or back, as appropriate) Request recovery actions for UDS and TIP (releasing locks and rebuilding system files) Long Recovery Long recovery restores an inconsistent or lost database to a consistent state by recovering database updates, messages, and step queues. You can use IRU commands to specify what needs to be recovered, such as portions of a file or the entire database, including the start and end points. Long recovery uses information from the audit trail and system files to Reapply database updates to reloaded files Rebuild message information in MCB system files Send step information to step control to rebuild step states Perform a combination of these actions Long recovery usually requires in-depth knowledge of the database and the failure. Long recovery often takes much longer to execute because it requires more audit processing than the other recovery types
35 .
36 2010 Unisys Corporation. All rights reserved. * *
unisys ClearPath Enterprise Servers Universal Data System Administration and Support Reference Manual Level 18R1 February 2013 7831 0737 021
unisys ClearPath Enterprise Servers Universal Data System Administration and Support Reference Manual Level 18R1 February 2013 7831 0737 021 NO WARRANTIES OF ANY NATURE ARE EXTENDED BY THIS DOCUMENT. Any
More informationunisys ClearPath Enterprise Servers Remote Database Backup Planning and Operations Guide ClearPath MCP 14.0 April 2012 8600 2052 309
unisys ClearPath Enterprise Servers Remote Database Backup Planning and Operations Guide ClearPath MCP 14.0 April 2012 8600 2052 309 NO WARRANTIES OF ANY NATURE ARE EXTENDED BY THIS DOCUMENT. Any product
More informationSAN Conceptual and Design Basics
TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer
More informationUNISYS. Server Management 2.0. Software Release Announcement. imagine it. done. Server Management 2.0 and Higher. May 2008 8216 3445 000
UNISYS imagine it. done. Server Management 2.0 Software Release Announcement Server Management 2.0 and Higher May 2008 8216 3445 000 NO WARRANTIES OF ANY NATURE ARE EXTENDED BY THIS DOCUMENT. Any product
More informationEnterprise Server. Application Sentinel for SQL Server Installation and Configuration Guide. Application Sentinel 2.0 and Higher
Enterprise Server Application Sentinel for SQL Server Installation and Configuration Guide Application Sentinel 2.0 and Higher August 2004 Printed in USA 3832 1097 000 . Enterprise Server Application Sentinel
More informationTransactions and Recovery. Database Systems Lecture 15 Natasha Alechina
Database Systems Lecture 15 Natasha Alechina In This Lecture Transactions Recovery System and Media Failures Concurrency Concurrency problems For more information Connolly and Begg chapter 20 Ullmanand
More informationMicrosoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010
Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010 Better Together Writer: Bill Baer, Technical Product Manager, SharePoint Product Group Technical Reviewers: Steve Peschka,
More informationClearPath Enterprise Servers
ClearPath Enterprise Servers Open Distributed Transaction Processing Technical Overview MCP 12.0 April 2008 . unisys imagine it. done. ClearPath Enterprise Servers Open Distributed Transaction Processing
More informationDatabase Management. Chapter Objectives
3 Database Management Chapter Objectives When actually using a database, administrative processes maintaining data integrity and security, recovery from failures, etc. are required. A database management
More informationunisys OS 2200 Relational Data Management System (RDMS 2200) and IPF SQL Interface End Use Guide imagine it. done. ClearPath OS 2200 12.
unisys imagine it. done. OS 2200 Relational Data Management System (RDMS 2200) and IPF SQL Interface End Use Guide ClearPath OS 2200 12.1 Release June 2010 7831 0778 003 NO WARRANTIES OF ANY NATURE ARE
More informationDistributed Data Management
Introduction Distributed Data Management Involves the distribution of data and work among more than one machine in the network. Distributed computing is more broad than canonical client/server, in that
More informationConfiguring Apache Derby for Performance and Durability Olav Sandstå
Configuring Apache Derby for Performance and Durability Olav Sandstå Database Technology Group Sun Microsystems Trondheim, Norway Overview Background > Transactions, Failure Classes, Derby Architecture
More informationunisys OS 2200 Shared File System (SFS 2200) Administration and Support Reference Manual imagine it. done. Release Level 4R1 June 2010 7831 0786 003
unisys imagine it. done. OS 2200 Shared File System (SFS 2200) Administration and Support Reference Manual Release Level 4R1 June 2010 7831 0786 003 NO WARRANTIES OF ANY NATURE ARE EXTENDED BY THIS DOCUMENT.
More informationInformix Dynamic Server May 2007. Availability Solutions with Informix Dynamic Server 11
Informix Dynamic Server May 2007 Availability Solutions with Informix Dynamic Server 11 1 Availability Solutions with IBM Informix Dynamic Server 11.10 Madison Pruet Ajay Gupta The addition of Multi-node
More informationOutline. Failure Types
Outline Database Management and Tuning Johann Gamper Free University of Bozen-Bolzano Faculty of Computer Science IDSE Unit 11 1 2 Conclusion Acknowledgements: The slides are provided by Nikolaus Augsten
More informationMicrosoft SQL Server for Oracle DBAs Course 40045; 4 Days, Instructor-led
Microsoft SQL Server for Oracle DBAs Course 40045; 4 Days, Instructor-led Course Description This four-day instructor-led course provides students with the knowledge and skills to capitalize on their skills
More informationDatabase Backup and Recovery Guide
Scout Diagnostics Database Backup and Recovery Guide P H 803. 358. 3600 F A X 803. 358. 3636 WWW.AVTECINC.COM 100 I N N O VAT I O N P L ACE, L E X I N G T O N SC 29072 Copyright 2013 by Avtec, Inc. All
More informationDistributed Data Processing (DDP-PPC) TCP/IP Interface COBOL
!()+ OS 2200 Distributed Data Processing (DDP-PPC) TCP/IP Interface COBOL Programming Guide Copyright ( 1997 Unisys Corporation. All rights reserved. Unisys is a registered trademark of Unisys Corporation.
More informationwww.dotnetsparkles.wordpress.com
Database Design Considerations Designing a database requires an understanding of both the business functions you want to model and the database concepts and features used to represent those business functions.
More informationChapter 14: Recovery System
Chapter 14: Recovery System Chapter 14: Recovery System Failure Classification Storage Structure Recovery and Atomicity Log-Based Recovery Remote Backup Systems Failure Classification Transaction failure
More informationMS-40074: Microsoft SQL Server 2014 for Oracle DBAs
MS-40074: Microsoft SQL Server 2014 for Oracle DBAs Description This four-day instructor-led course provides students with the knowledge and skills to capitalize on their skills and experience as an Oracle
More informationMicrosoft SQL Server Always On Technologies
Microsoft SQL Server Always On Technologies Hitachi Data Systems Contributes Always On Storage Solutions A Partner Solutions White Paper By Rick Andersen and Simon Pengelly December 2006 Executive Summary
More informationCaché High Availability Guide
Caché High Availability Guide Version 2015.1 11 February 2015 InterSystems Corporation 1 Memorial Drive Cambridge MA 02142 www.intersystems.com Caché High Availability Guide Caché Version 2015.1 11 February
More informationHigh Availability Essentials
High Availability Essentials Introduction Ascent Capture s High Availability Support feature consists of a number of independent components that, when deployed in a highly available computer system, result
More informationServer Consolidation with SQL Server 2008
Server Consolidation with SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 supports multiple options for server consolidation, providing organizations
More informationI. General Database Server Performance Information. Knowledge Base Article. Database Server Performance Best Practices Guide
Knowledge Base Article Database Server Performance Best Practices Guide Article ID: NA-0500-0025 Publish Date: 23 Mar 2015 Article Status: Article Type: Required Action: Approved General Product Technical
More informationBest Practices for Installing and Configuring the Hyper-V Role on the LSI CTS2600 Storage System for Windows 2008
Best Practices Best Practices for Installing and Configuring the Hyper-V Role on the LSI CTS2600 Storage System for Windows 2008 Installation and Configuration Guide 2010 LSI Corporation August 13, 2010
More informationAccess to easy-to-use tools that reduce management time with Arcserve Backup
Access to easy-to-use tools that reduce management time with Arcserve Backup In business, evolution is constant. Staff grows. New offices spring up. New applications are being implemented, and typically,
More informationCHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL
CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL This chapter is to introduce the client-server model and its role in the development of distributed network systems. The chapter
More informationMySQL and Virtualization Guide
MySQL and Virtualization Guide Abstract This is the MySQL and Virtualization extract from the MySQL Reference Manual. For legal information, see the Legal Notices. For help with using MySQL, please visit
More informationConnectivity. Alliance Access 7.0. Database Recovery. Information Paper
Connectivity Alliance Access 7.0 Database Recovery Information Paper Table of Contents Preface... 3 1 Overview... 4 2 Resiliency Concepts... 6 2.1 Database Loss Business Impact... 6 2.2 Database Recovery
More informationAvailability Digest. www.availabilitydigest.com. Raima s High-Availability Embedded Database December 2011
the Availability Digest Raima s High-Availability Embedded Database December 2011 Embedded processing systems are everywhere. You probably cannot go a day without interacting with dozens of these powerful
More informationServer Sentinel Monitored Server
Server Sentinel Monitored Server Installation and Reinstallation Guide for Systems Monitoring Third-Party Products Server Sentinel 4.4.3 and Higher April 2007 . unisys imagine it. done. Server Sentinel
More informationSiebel Application Deployment Manager Guide. Siebel Innovation Pack 2013 Version 8.1/8.2 September 2013
Siebel Application Deployment Manager Guide Siebel Innovation Pack 2013 Version 8.1/8.2 September 2013 Copyright 2005, 2013 Oracle and/or its affiliates. All rights reserved. This software and related
More informationThe ConTract Model. Helmut Wächter, Andreas Reuter. November 9, 1999
The ConTract Model Helmut Wächter, Andreas Reuter November 9, 1999 Overview In Ahmed K. Elmagarmid: Database Transaction Models for Advanced Applications First in Andreas Reuter: ConTracts: A Means for
More informationSolution Brief Availability and Recovery Options: Microsoft Exchange Solutions on VMware
Introduction By leveraging the inherent benefits of a virtualization based platform, a Microsoft Exchange Server 2007 deployment on VMware Infrastructure 3 offers a variety of availability and recovery
More informationProtecting Microsoft SQL Server with an Integrated Dell / CommVault Solution. Database Solutions Engineering
Protecting Microsoft SQL Server with an Integrated Dell / CommVault Solution Database Solutions Engineering By Subhashini Prem and Leena Kushwaha Dell Product Group March 2009 THIS WHITE PAPER IS FOR INFORMATIONAL
More informationThe Benefits of Virtualizing
T E C H N I C A L B R I E F The Benefits of Virtualizing Aciduisismodo Microsoft SQL Dolore Server Eolore in Dionseq Hitachi Storage Uatummy Environments Odolorem Vel Leveraging Microsoft Hyper-V By Heidi
More informationDatabase System Architecture & System Catalog Instructor: Mourad Benchikh Text Books: Elmasri & Navathe Chap. 17 Silberschatz & Korth Chap.
Database System Architecture & System Catalog Instructor: Mourad Benchikh Text Books: Elmasri & Navathe Chap. 17 Silberschatz & Korth Chap. 1 Oracle9i Documentation First-Semester 1427-1428 Definitions
More informationThe EMSX Platform. A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks. A White Paper.
The EMSX Platform A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks A White Paper November 2002 Abstract: The EMSX Platform is a set of components that together provide
More informationUnit 12 Database Recovery
Unit 12 Database Recovery 12-1 Contents 12.1 Introduction 12.2 Transactions 12.3 Transaction Failures and Recovery 12.4 System Failures and Recovery 12.5 Media Failures and Recovery Wei-Pang Yang, Information
More informationE-Series. NetApp E-Series Storage Systems Mirroring Feature Guide. NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S.
E-Series NetApp E-Series Storage Systems Mirroring Feature Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone: +1 (888)
More informationSymantec and VMware: Virtualizing Business Critical Applications with Confidence WHITE PAPER
Symantec and VMware: Virtualizing Business Critical Applications with Confidence WHITE PAPER Challenges of Using Traditional High-Availability Solutions Business-critical applications and the systems they
More informationCaché Data Integrity Guide
Caché Data Integrity Guide Version 2012.2 31 August 2012 InterSystems Corporation 1 Memorial Drive Cambridge MA 02142 www.intersystems.com Caché Data Integrity Guide Caché Version 2012.2 31 August 2012
More informationCaché Data Integrity Guide
Caché Data Integrity Guide Version 2014.1 25 March 2014 InterSystems Corporation 1 Memorial Drive Cambridge MA 02142 www.intersystems.com Caché Data Integrity Guide Caché Version 2014.1 25 March 2014 Copyright
More informationPARALLELS CLOUD STORAGE
PARALLELS CLOUD STORAGE Performance Benchmark Results 1 Table of Contents Executive Summary... Error! Bookmark not defined. Architecture Overview... 3 Key Features... 5 No Special Hardware Requirements...
More informationLoad Testing and Monitoring Web Applications in a Windows Environment
OpenDemand Systems, Inc. Load Testing and Monitoring Web Applications in a Windows Environment Introduction An often overlooked step in the development and deployment of Web applications on the Windows
More informationCA Workload Automation Agents for Mainframe-Hosted Implementations
PRODUCT SHEET CA Workload Automation Agents CA Workload Automation Agents for Mainframe-Hosted Operating Systems, ERP, Database, Application Services and Web Services CA Workload Automation Agents are
More informationOnline Transaction Processing in SQL Server 2008
Online Transaction Processing in SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 provides a database platform that is optimized for today s applications,
More informationDeltaV Virtualization High Availability and Disaster Recovery
DeltaV Distributed Control System Whitepaper October 2014 DeltaV Virtualization High Availability and Disaster Recovery This document describes High Availiability and Disaster Recovery features supported
More informationHighly Available Mobile Services Infrastructure Using Oracle Berkeley DB
Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB Executive Summary Oracle Berkeley DB is used in a wide variety of carrier-grade mobile infrastructure systems. Berkeley DB provides
More informationChapter 13 File and Database Systems
Chapter 13 File and Database Systems Outline 13.1 Introduction 13.2 Data Hierarchy 13.3 Files 13.4 File Systems 13.4.1 Directories 13.4. Metadata 13.4. Mounting 13.5 File Organization 13.6 File Allocation
More informationChapter 13 File and Database Systems
Chapter 13 File and Database Systems Outline 13.1 Introduction 13.2 Data Hierarchy 13.3 Files 13.4 File Systems 13.4.1 Directories 13.4. Metadata 13.4. Mounting 13.5 File Organization 13.6 File Allocation
More informationHow To Manage The Sas Metadata Server With Ibm Director Multiplatform
Manage SAS Metadata Server Availability with IBM Technology A SAS White Paper Table of Contents The SAS and IBM Relationship... 1 Introduction...1 Fault Tolerance of the SAS Metadata Server... 1 Monitoring
More informationOracle 11g Database Administration
Oracle 11g Database Administration Part 1: Oracle 11g Administration Workshop I A. Exploring the Oracle Database Architecture 1. Oracle Database Architecture Overview 2. Interacting with an Oracle Database
More informationConnectivity. Alliance Access 7.0. Database Recovery. Information Paper
Connectivity Alliance 7.0 Recovery Information Paper Table of Contents Preface... 3 1 Overview... 4 2 Resiliency Concepts... 6 2.1 Loss Business Impact... 6 2.2 Recovery Tools... 8 3 Manual Recovery Method...
More informationHigh Availability Solutions for the MariaDB and MySQL Database
High Availability Solutions for the MariaDB and MySQL Database 1 Introduction This paper introduces recommendations and some of the solutions used to create an availability or high availability environment
More informationORACLE INSTANCE ARCHITECTURE
ORACLE INSTANCE ARCHITECTURE ORACLE ARCHITECTURE Oracle Database Instance Memory Architecture Process Architecture Application and Networking Architecture 2 INTRODUCTION TO THE ORACLE DATABASE INSTANCE
More informationRecovery and the ACID properties CMPUT 391: Implementing Durability Recovery Manager Atomicity Durability
Database Management Systems Winter 2004 CMPUT 391: Implementing Durability Dr. Osmar R. Zaïane University of Alberta Lecture 9 Chapter 25 of Textbook Based on slides by Lewis, Bernstein and Kifer. University
More informationClearPath MCP Developer Studio
ClearPath MCP Developer Studio ClearPath MCP Releases 16.0 and 17.0 ClearPath Software Series The ClearPath Software Series is a new innovative collection of software-only solutions without a traditional
More informationEMC MID-RANGE STORAGE AND THE MICROSOFT SQL SERVER I/O RELIABILITY PROGRAM
White Paper EMC MID-RANGE STORAGE AND THE MICROSOFT SQL SERVER I/O RELIABILITY PROGRAM Abstract This white paper explains the integration of EMC Mid-range Storage arrays with the Microsoft SQL Server I/O
More informationChapter 10. Backup and Recovery
Chapter 10. Backup and Recovery Table of Contents Objectives... 1 Relationship to Other Units... 2 Introduction... 2 Context... 2 A Typical Recovery Problem... 3 Transaction Loggoing... 4 System Log...
More informationBlackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security
Overview Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Blackboard Collaborate web conferencing is available in a hosted environment and this document
More informationOverview. Business value
PRODUCT SHEET CA VM:Backup for z/vm CA VM:Backup for z/vm CA VM:Backup for z/vm (CA VM:Backup) provides an efficient and reliable means of backing up CMS and non-cms data in z/vm and mainframe Linux systems.
More informationBackup Solutions for the Celerra File Server
White Paper Backup Solutions for the Celerra File Server EMC Corporation 171 South Street, Hopkinton, MA 01748-9103 Corporate Headquarters: 508) 435-1000, (800) 424-EMC2 Fax: (508) 435-5374, Service: (800)
More informationMain Reference : Hall, James A. 2011. Information Technology Auditing and Assurance, 3 rd Edition, Florida, USA : Auerbach Publications
Main Reference : Hall, James A. 2011. Information Technology Auditing and Assurance, 3 rd Edition, Florida, USA : Auerbach Publications Suggested Reference : Senft, Sandra; Gallegos, Frederick., 2009.
More informationIBM Global Technology Services March 2008. Virtualization for disaster recovery: areas of focus and consideration.
IBM Global Technology Services March 2008 Virtualization for disaster recovery: Page 2 Contents 2 Introduction 3 Understanding the virtualization approach 4 A properly constructed virtualization strategy
More informationCA Workload Automation Agents Operating System, ERP, Database, Application Services and Web Services
PRODUCT SHEET CA Workload Automation Agents CA Workload Automation Agents Operating System, ERP, Database, Application Services and Web Services CA Workload Automation Agents extend the automation capabilities
More informationServer Sentinel Client Workstation
Server Sentinel Client Workstation Installation and Reinstallation Guide Server Sentinel 4.4.3 and Higher April 2008 . unisys imagine it. done. Server Sentinel Client Workstation Installation and Reinstallation
More informationReal-time Protection for Hyper-V
1-888-674-9495 www.doubletake.com Real-time Protection for Hyper-V Real-Time Protection for Hyper-V Computer virtualization has come a long way in a very short time, triggered primarily by the rapid rate
More informationOracle Database 10g: Backup and Recovery 1-2
Oracle Database 10g: Backup and Recovery 1-2 Oracle Database 10g: Backup and Recovery 1-3 What Is Backup and Recovery? The phrase backup and recovery refers to the strategies and techniques that are employed
More informationTier Architectures. Kathleen Durant CS 3200
Tier Architectures Kathleen Durant CS 3200 1 Supporting Architectures for DBMS Over the years there have been many different hardware configurations to support database systems Some are outdated others
More informationVMware and VSS: Application Backup and Recovery
Best Tools : VMware ESX Virtualization Management VMware and VSS: Application Backup and Recovery Written by: Anton Gostev Product Manager Veeam Software CONTENTS EXECUTIVE SUMMARY... 3 VSS AWARE BACKUP
More informationUNISYS. ClearPath Enterprise Servers. Authentication Sentinel for OS 2200 User Guide. ClearPath OS 2200 Release 8.2
ClearPath Enterprise Servers Authentication Sentinel for OS 2200 User Guide UNISYS 2004 Unisys Corporation. All rights reserved. ClearPath OS 2200 Release 8.2 Printed in USA September 2004 4729 2016 000
More informationAchieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006
Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006 All trademark names are the property of their respective companies. This publication contains opinions of
More informationHP and Mimosa Systems A system for email archiving, recovery, and storage optimization white paper
HP and Mimosa Systems A system for email archiving, recovery, and storage optimization white paper Mimosa NearPoint for Microsoft Exchange Server and HP StorageWorks 1510i Modular Smart Array Executive
More informationTk20 Backup Procedure
Tk20 Backup Procedure 1 TK20 BACKUP PROCEDURE OVERVIEW 3 FEATURES AND ADVANTAGES: 3 TK20 BACKUP PROCEDURE 4 DAILY BACKUP CREATION 4 TRANSFER OF BACKUPS 5 AUDITING PROCESS 5 BACKUP REPOSITORY 5 WRITE TO
More informationHow do you test to determine which backup and restore technology best suits your business needs?
KEY CRITERIA WHEN SELECTING BACKUP AND RESTORE TECHNOLOGY FOR WINDOWS SYSTEMS How do you test to determine which backup and restore technology best suits your business needs? Real-Time Recovery delivers
More informationAttunity RepliWeb Event Driven Jobs
Attunity RepliWeb Event Driven Jobs Software Version 5.2 June 25, 2012 RepliWeb, Inc., 6441 Lyons Road, Coconut Creek, FL 33073 Tel: (954) 946-2274, Fax: (954) 337-6424 E-mail: info@repliweb.com, Support:
More informationIBM Tivoli Monitoring V6.2.3, how to debug issues with Windows performance objects issues - overview and tools.
IBM Tivoli Monitoring V6.2.3, how to debug issues with Windows performance objects issues - overview and tools. Page 1 of 13 The module developer assumes that you understand basic IBM Tivoli Monitoring
More informationMAS 200. MAS 200 for SQL Server Introduction and Overview
MAS 200 MAS 200 for SQL Server Introduction and Overview March 2005 1 TABLE OF CONTENTS Introduction... 3 Business Applications and Appropriate Technology... 3 Industry Standard...3 Rapid Deployment...4
More informationNeverfail for Windows Applications June 2010
Neverfail for Windows Applications June 2010 Neverfail, from Neverfail Ltd. (www.neverfailgroup.com), ensures continuity of user services provided by Microsoft Windows applications via data replication
More informationTransactions and the Internet
Transactions and the Internet Week 12-13 Week 12-13 MIE253-Consens 1 Schedule Week Date Lecture Topic 1 Jan 9 Introduction to Data Management 2 Jan 16 The Relational Model 3 Jan. 23 Constraints and SQL
More informationIBM TotalStorage IBM TotalStorage Virtual Tape Server
IBM TotalStorage IBM TotalStorage Virtual Tape Server A powerful tape storage system that helps address the demanding storage requirements of e-business storag Storage for Improved How can you strategically
More informationMaximum Availability Architecture. Oracle Best Practices For High Availability. Backup and Recovery Scenarios for Oracle WebLogic Server: 10.
Backup and Recovery Scenarios for Oracle WebLogic Server: 10.3 An Oracle White Paper January, 2009 Maximum Availability Architecture Oracle Best Practices For High Availability Backup and Recovery Scenarios
More informationDr.Backup Release Notes - Version 11.2.4
Dr.Backup Release Notes - Version 11.2.4 This version introduces several new capabilities into the Dr.Backup remote backup client software (rbclient). The notes below provide the details about the new
More informationBackup and Redundancy
Backup and Redundancy White Paper NEC s UC for Business Backup and Redundancy allow businesses to operate with confidence, providing security for themselves and their customers. When a server goes down
More informationMailMarshal SMTP in a Load Balanced Array of Servers Technical White Paper September 29, 2003
Contents Introduction... 1 Network Load Balancing... 2 Example Environment... 5 Microsoft Network Load Balancing (Configuration)... 6 Validating your NLB configuration... 13 MailMarshal Specific Configuration...
More informationSATA RAID SIL 3112 CONTROLLER USER S MANUAL
SATA RAID SIL 3112 CONTROLLER USER S MANUAL 120410056E1N Copyright Copyright 2003. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system
More informationNetwork Registrar Data Backup and Recovery Strategies
White Paper Network Registrar Data Backup and Recovery Strategies White Paper 2011 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 7 Introduction...
More informationDatabase Concurrency Control and Recovery. Simple database model
Database Concurrency Control and Recovery Pessimistic concurrency control Two-phase locking (2PL) and Strict 2PL Timestamp ordering (TSO) and Strict TSO Optimistic concurrency control (OCC) definition
More informationVirtualCenter Database Maintenance VirtualCenter 2.0.x and Microsoft SQL Server
Technical Note VirtualCenter Database Maintenance VirtualCenter 2.0.x and Microsoft SQL Server This document discusses ways to maintain the VirtualCenter database for increased performance and manageability.
More informationPerforce Backup Strategy & Disaster Recovery at National Instruments
Perforce Backup Strategy & Disaster Recovery at National Instruments Steven Lysohir National Instruments Perforce User Conference April 2005-1 - Contents 1. Introduction 2. Development Environment 3. Architecture
More informationMonitoring DoubleTake Availability
Monitoring DoubleTake Availability eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may
More informationComparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications
Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications White Paper Table of Contents Overview...3 Replication Types Supported...3 Set-up &
More informationUpgrading Your SQL Server 2000 Database Administration (DBA) Skills to SQL Server 2008 DBA Skills Course 6317A: Three days; Instructor-Led
Upgrading Your SQL Server 2000 Database Administration (DBA) Skills to SQL Server 2008 DBA Skills Course 6317A: Three days; Instructor-Led About this Course This three-day instructor-led course provides
More informationCloud Based Application Architectures using Smart Computing
Cloud Based Application Architectures using Smart Computing How to Use this Guide Joyent Smart Technology represents a sophisticated evolution in cloud computing infrastructure. Most cloud computing products
More informationBackup and Recovery. What Backup, Recovery, and Disaster Recovery Mean to Your SQL Anywhere Databases
Backup and Recovery What Backup, Recovery, and Disaster Recovery Mean to Your SQL Anywhere Databases CONTENTS Introduction 3 Terminology and concepts 3 Database files that make up a database 3 Client-side
More informationPervasive PSQL Meets Critical Business Requirements
Pervasive PSQL Meets Critical Business Requirements Pervasive PSQL White Paper May 2012 Table of Contents Introduction... 3 Data Backup... 3 Pervasive Backup Agent... 3 Pervasive PSQL VSS Writer... 5 Pervasive
More informationCA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft SQL Server
CA RECOVERY MANAGEMENT R12.5 BEST PRACTICE CA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft SQL Server Overview Benefits The CA Advantage The CA ARCserve Backup Support and Engineering
More information