Disaster Proofing Information Systems: A Complete Methodology for Eliminating Single Points of Failure / Edition 1

Disaster Proofing Information Systems: A Complete Methodology for Eliminating Single Points of Failure / Edition 1

ISBN-10:
007140922X
ISBN-13:
9780071409223
Pub. Date:
10/01/2002
Publisher:
McGraw Hill LLC
ISBN-10:
007140922X
ISBN-13:
9780071409223
Pub. Date:
10/01/2002
Publisher:
McGraw Hill LLC
Disaster Proofing Information Systems: A Complete Methodology for Eliminating Single Points of Failure / Edition 1

Disaster Proofing Information Systems: A Complete Methodology for Eliminating Single Points of Failure / Edition 1

Paperback

$70.0
Current price is , Original price is $70.0. You
$70.00 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores

Overview

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.




Does Your Business Continuity Plan Rely on Prevention or Cure?


Nobody wants to shell out a lot of money for something they'll use once or, with any luck, never. But that's where most corporations find themselves today. Network managers see disaster recovery as outside their jurisdiction, and therefore as a competitor for system resources. External incentives to deploy disaster recovery from customers and partners may be pressing, but internal incentives are working against them.This book provides a methodology responsive to those problems. With careful planning, it can actually improve system performance instead of encumbering it. Even if your organization isn't budgeted for disaster recovery planning, you can implement this methodology now, at minimum cost, and reap immediate returns. For companies already invested in system protection software, Buchanan shows network managers how to get started on impact and risk assessment, protection planning, policymaking, and more.

Product Details

ISBN-13: 9780071409223
Publisher: McGraw Hill LLC
Publication date: 10/01/2002
Series: Professional Telecom Series
Edition description: First Edition
Pages: 268
Product dimensions: 7.20(w) x 9.00(h) x 0.78(d)

About the Author

Robert W. Buchanan, Jr. is president and CEO of Shiloh Network Solutions (SNS), a start-up software company developing a new generation of proactive network analysis tools for clustered systems within the enterprise and Internet market. Prior to SNS, Mr. Buchanan was the managing partner in Shiloh Consulting, an independent network consulting company that provides network and e-business planning, management, and testing services to product manufacturers and Fortune 500 companies. He also served 4 years as Sr. Vice President, General manager, and COO at LANQuest Labs, a network consulting company and independent test lab. During his tenure there, he was responsible for the development of new network testing procedures and several QA and performance testing products under contract with companies such as Intel, Cisco Systems and 3Com Corporation. Before LANQuest, Mr. Buchanan spent 7 years in software product management and marketing at 3Com Corporation where he was responsible for the EtherSeries and 3X network operating systems. Mr. Buchanan also has experience managing technical organizations: at ROLM he managed software development and computer operations, and at Lockheed Corporation he managed advanced development groups of engineers in a large IT organization.

In February 1997 Mr. Buchanan second book, Measuring the Impact of Your Web Site, was released. This book was well received and has been translated into both Kanji and Dutch. His first book, The Art of Testing Network Systems, was published in 1996, and remains popular today. He is currently working on a fourth book for 2003 on performance tuning clustered server configurations. Mr. Buchanan has written many articles for networking journals including LAN Magazine, Network World, CNEPA Journal, and Network Expo. He has spoken and taught at Interop, Networld, Network and PC Expos, and Comdex. He also teaches IT courses at the University of Phoenix.

Table of Contents

Forewordxi
Introductionxiii
Part IA SHARED Methodology for Disaster Avoidance across Enterprise, B2B, and B2C Systems1
Chapter 1Avoidance Versus Recovery3
What Is Disaster Recovery?7
What Is Business Continuity?12
What Is Disaster Avoidance?13
How Daily Business Operations Benefit from Disaster Avoidance17
Example 1Web Site Co-location18
Example 2Intranet or Enterprise Workgroup Servers19
Example 3Home Office22
Example 4Mobile Wireless Access23
Business Benefits24
B2B and Business-to-Customer (B2C) Disaster Avoidance24
Small Business Disaster Avoidance25
Chapter 2Business Continuity Requirements27
The SHARED Objective of Analyzing Business and System Needs28
The Process of Analyzing Business-User-Customer Needs33
Step 1Business Overview34
Step 2Data Flow Dependencies39
Step 3Technology Dependencies44
Step 4Prioritizing Existing Operational Problems48
Step 5Future Operational Requirements48
Steps 6 and 7Personnel and Facilities49
Financial Considerations55
B2B Requirements59
Small Business Requirements60
Chapter 3Developing a Disaster Avoidance Strategy61
Disaster Avoidance Alternatives for Critical Systems62
Hardware Platforms64
Co-location64
Hot/Warm Standby or Failover69
Hot or Cold Restoration72
Applications74
Data Store75
System Access77
Infrastructure78
Access Devices81
Shared Information (Intranet and E-business)85
Small Businesses86
Disaster Avoidance Best Practices86
Performance Improvements Through SHARED Disaster Avoidance88
Availability as a Function of Disaster Avoidance92
Capacity/Scalability Enhancements93
Maintenance and Deployment Enhancements93
Chapter 4Integrating Business Continuity and Disaster Avoidance Needs95
Mating Business Requirements to Disaster Avoidance Alternatives96
Step 1Prioritize Order98
Step 2Map Requirements100
Step 3Define Exact Requirements101
Step 4End User and Facility Requirements104
Step 5B2B Requirements107
Step 6Financial Analysis107
Example 2 - B2B Supply Chain Management112
Analyzing Business-User-Customer Needs from Chapter 2114
Mating Business Requirements to Disaster Avoidance Alternatives118
Business Continuity and Disaster Avoidance--Added Cost123
Deployment and Validation Is Critical to Success124
Part IIImplementing the SHARED Architecture127
Chapter 5Access Devices129
Best Practices130
Asset and Configuration Management131
Data Synchronization and Recovery134
Products and Procedures136
Handhelds136
Palm Handhelds136
Windows CE Handhelds139
Research in Motion (RIM) Blackberry--Integrated Wireless Products140
XcelleNet Afaria Products141
Desktops and Laptops141
Chapter 6Platforms143
Best Practices for Availability and Reliability144
Platform Simplicity144
Uninterrupted Power Supply (UPS)146
Clustering146
Co-location148
Reduce Planned Downtime152
Reduce Unplanned Downtime153
Use Network Load Balancing (NLB)153
Use Data Store Redundancy153
Best Practices for Performance and Scalability154
Best Practices for Management and Security155
Products and Procedures156
Microsoft Windows157
Sun Solaris161
IBM162
Veritas162
Chapter 7Applications165
Best Practices166
For Disaster Avoidance167
For Operations and Development169
Products and Procedures174
Chapter 8Data Store177
Critical Business Applications' Shared Data Store181
Critical Remote Data Store Synchronization182
Local Productivity Data Files184
Data Sharing185
File Replication187
Best Practices188
Databases188
File Replication190
Physical Data Storage192
Products and Procedures194
File Replication194
Database Transaction Replication196
SANs and Network Storage198
Chapter 9Infrastructure203
Infrastructure Requirements204
Best Practices207
Avoid Chatty Communication209
Network Load Balancing (NLB)209
High-Speed Data Links213
ISPs for User Access215
CO or Wire Centers216
Products and Services216
Chapter 10B2B, B2C, B2G, and Small Business Needs219
Best Practices222
Use Standards225
Integrate the B2X Environment with Existing Back-End Systems226
Isolate the B2B Environment from the Rest of the Systems for Security Purposes227
Coordinate Disaster Avoidance and Recovery228
Products and Procedures229
Small Businesses231
Chapter 11Validation and Testing235
Life Cycle236
Test Objectives237
Testing and Systems Management239
Methodology240
System Versus Component Tests243
Validating the Components243
Validating the System243
Validating B2X E-commerce244
Test Preparation245
Test Bed Setup246
Tools248
Load Models249
Testing251
Instrumentation252
Loading253
Measuring254
Analyzing256
Evolution259
Index261
From the B&N Reads Blog

Customer Reviews