Disaster Proofing Information Systems: A Complete Methodology for Eliminating Single Points of Failure / Edition 1

Disaster Proofing Information Systems: A Complete Methodology for Eliminating Single Points of Failure / Edition 1

by Robert Buchanan
     
 

ISBN-10: 007140922X

ISBN-13: 9780071409223

Pub. Date: 10/01/2002

Publisher: McGraw-Hill Professional Publishing

Nobody wants to shell out a lot of money for something they'll use once or, with any luck, never. But that's where most corporations find themselves today. Network managers see disaster recovery as outside their jurisdiction, and therefore as a competitor for system resources. External incentives to deploy disaster recovery from customers and partners may be

Overview

Nobody wants to shell out a lot of money for something they'll use once or, with any luck, never. But that's where most corporations find themselves today. Network managers see disaster recovery as outside their jurisdiction, and therefore as a competitor for system resources. External incentives to deploy disaster recovery from customers and partners may be pressing, but internal incentives are working against them.

This book provides a methodology responsive to those problems. With careful planning, it can actually improve system performance instead of encumbering it. Even if your organization isn't budgeted for disaster recovery planning, you can implement this methodology now, at minimum cost, and reap immediate returns. For companies already invested in system protection software, Buchanan shows network managers how to get started on impact and risk assessment, protection planning, policymaking, and more.

Product Details

ISBN-13:
9780071409223
Publisher:
McGraw-Hill Professional Publishing
Publication date:
10/01/2002
Series:
Professional Telecom Series
Edition description:
First Edition
Pages:
268
Product dimensions:
7.20(w) x 9.00(h) x 0.78(d)

Table of Contents

Forewordxi
Introductionxiii
Part IA SHARED Methodology for Disaster Avoidance across Enterprise, B2B, and B2C Systems1
Chapter 1Avoidance Versus Recovery3
What Is Disaster Recovery?7
What Is Business Continuity?12
What Is Disaster Avoidance?13
How Daily Business Operations Benefit from Disaster Avoidance17
Example 1Web Site Co-location18
Example 2Intranet or Enterprise Workgroup Servers19
Example 3Home Office22
Example 4Mobile Wireless Access23
Business Benefits24
B2B and Business-to-Customer (B2C) Disaster Avoidance24
Small Business Disaster Avoidance25
Chapter 2Business Continuity Requirements27
The SHARED Objective of Analyzing Business and System Needs28
The Process of Analyzing Business-User-Customer Needs33
Step 1Business Overview34
Step 2Data Flow Dependencies39
Step 3Technology Dependencies44
Step 4Prioritizing Existing Operational Problems48
Step 5Future Operational Requirements48
Steps 6 and 7Personnel and Facilities49
Financial Considerations55
B2B Requirements59
Small Business Requirements60
Chapter 3Developing a Disaster Avoidance Strategy61
Disaster Avoidance Alternatives for Critical Systems62
Hardware Platforms64
Co-location64
Hot/Warm Standby or Failover69
Hot or Cold Restoration72
Applications74
Data Store75
System Access77
Infrastructure78
Access Devices81
Shared Information (Intranet and E-business)85
Small Businesses86
Disaster Avoidance Best Practices86
Performance Improvements Through SHARED Disaster Avoidance88
Availability as a Function of Disaster Avoidance92
Capacity/Scalability Enhancements93
Maintenance and Deployment Enhancements93
Chapter 4Integrating Business Continuity and Disaster Avoidance Needs95
Mating Business Requirements to Disaster Avoidance Alternatives96
Step 1Prioritize Order98
Step 2Map Requirements100
Step 3Define Exact Requirements101
Step 4End User and Facility Requirements104
Step 5B2B Requirements107
Step 6Financial Analysis107
Example 2 - B2B Supply Chain Management112
Analyzing Business-User-Customer Needs from Chapter 2114
Mating Business Requirements to Disaster Avoidance Alternatives118
Business Continuity and Disaster Avoidance--Added Cost123
Deployment and Validation Is Critical to Success124
Part IIImplementing the SHARED Architecture127
Chapter 5Access Devices129
Best Practices130
Asset and Configuration Management131
Data Synchronization and Recovery134
Products and Procedures136
Handhelds136
Palm Handhelds136
Windows CE Handhelds139
Research in Motion (RIM) Blackberry--Integrated Wireless Products140
XcelleNet Afaria Products141
Desktops and Laptops141
Chapter 6Platforms143
Best Practices for Availability and Reliability144
Platform Simplicity144
Uninterrupted Power Supply (UPS)146
Clustering146
Co-location148
Reduce Planned Downtime152
Reduce Unplanned Downtime153
Use Network Load Balancing (NLB)153
Use Data Store Redundancy153
Best Practices for Performance and Scalability154
Best Practices for Management and Security155
Products and Procedures156
Microsoft Windows157
Sun Solaris161
IBM162
Veritas162
Chapter 7Applications165
Best Practices166
For Disaster Avoidance167
For Operations and Development169
Products and Procedures174
Chapter 8Data Store177
Critical Business Applications' Shared Data Store181
Critical Remote Data Store Synchronization182
Local Productivity Data Files184
Data Sharing185
File Replication187
Best Practices188
Databases188
File Replication190
Physical Data Storage192
Products and Procedures194
File Replication194
Database Transaction Replication196
SANs and Network Storage198
Chapter 9Infrastructure203
Infrastructure Requirements204
Best Practices207
Avoid Chatty Communication209
Network Load Balancing (NLB)209
High-Speed Data Links213
ISPs for User Access215
CO or Wire Centers216
Products and Services216
Chapter 10B2B, B2C, B2G, and Small Business Needs219
Best Practices222
Use Standards225
Integrate the B2X Environment with Existing Back-End Systems226
Isolate the B2B Environment from the Rest of the Systems for Security Purposes227
Coordinate Disaster Avoidance and Recovery228
Products and Procedures229
Small Businesses231
Chapter 11Validation and Testing235
Life Cycle236
Test Objectives237
Testing and Systems Management239
Methodology240
System Versus Component Tests243
Validating the Components243
Validating the System243
Validating B2X E-commerce244
Test Preparation245
Test Bed Setup246
Tools248
Load Models249
Testing251
Instrumentation252
Loading253
Measuring254
Analyzing256
Evolution259
Index261

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >