SlideShare a Scribd company logo
Presentation on File Backup
By-
Muskan soni.
To-
Mr. Devarshi Mehta sir.
Outline
• What is backup
• Backup strategy
• Recovery procedures
• Factors in recovery procedures
• Backup purposes
• Types of backup
• Backup architecture and process
• Backup topologies
• Backup technology options
• Features
• Installation of Acronis
What is a Backup?
• Backup is an additional copy of data that
can be used for restore and recovery
purposes
• This Backup copy can be created by:
– Simply coping data (there can be one or more
copies)
– Mirroring data (the copy is always updated
with whatever is written to the primary
Backup Strategy
A backup is put in place to avoid
permanent data loss to ensure the
integrity of stored data i.e. can get
back to a previous version and build
up the data correctly if current data
found to be in error.
Recovery Procedures
• A backup strategy needs a well
documented and tested recovery
procedure to ensure backup data is
restored properly
Factors in recovery procedure:
• A well documented procedure that allocates
roles and responsibilities to staff.
• Availability of alternative hardware and
accommodation if the originals have been
destroyed.
• Availability of original software such as the
customised operating system and application
programs!
• That up-to-date backup data is readily available
Backup purposes
– Disaster Recovery
• Restores production data to an operational state
after disaster
– Operational
• Restore data in the event of data loss or logical
corruptions that may occur during routine
processing
– Archival
• Preserve transaction records, email, and other
business work products for regulatory compliance
Types of backups
• Three basic types of backups:
• Full backups
• Differential backups
• Incremental backups
Full backups
– full and complete backup of entire system
Full Backup
Su Su Su Su Su
Differential backups
– storage of all files that have changed or been
added since last full backup
Su Su Su Su SuM T TW F S M T TW F S M T TW F S M T TW F S
Restoring from Differential Backup
Files 1, 2, 3
Monday
Full Backup Cumulative
Tuesday
File 4
Cumulative
Wednesday
Files 4, 5
Cumulative
Thursday
Files 4, 5, 6 Files 1, 2, 3, 4, 5
Production
Frida
y
Key Features of Differential
backups
– More files to be backed up, therefore it takes
more time to backup
and uses more storage space
– Much faster restore because only the last full
and the last cumulative
backup must be applied
Incremental backups
• only archives data that have been
modified that day
Su Su Su Su SuM T TW F S M T TW F S M T TW F S M T TW F S
Incremental backup
Files 1, 2, 3
Monday
Full Backup Incremental
Tuesday
File 4
Incremental
Wednesday
Updated File 3
Incremental
Thursday
File 5 Files 1, 2, 3, 4, 5
Production
Frida
y
Key Features of Incremental
backups
– Files that have changed since the last backup
are backed up
– Fewest amount of files to be backed up,
therefore faster backup and less
• Backup client
– Sends backup data to backup server or
storage node
• Backup server
– Manages backup operations and maintains
backup catalog
• Storage node
– Responsible for writing data to backup device
Backup Architecture and Process
Backup Architecture and Process
Application Server/
Backup Client
Backup Data
Backup Server/
Storage Node
Tape Library
Backup Operation
Application Server and Backup Clients
1
2
7
3b
4
3a
6
5
Backup Server
Storage Node Backup Device
Backup Operation
• Start the scheduled backup process
• Backup data retrieves backup related information from
backup catalog
• Backup server instructs storage node to local backup
media in backup device
• Backup server instruct backup clients to send its
metadata to the backup server and data to be backup to
storage mode.
• Backup clients send data to storage node
• Storage node sends data to backup device
• Storage node sends media information to backup servers
• Backup server update and records the status
Restore Operation
Application Server and Backup Clients
1
2
7
3b
4
3a
6
5
Backup Server
Storage Node Backup Device
Restore Operation
• Backup server scans backup catalog to identify
the data to be restore and the client that will
receive data.
• Backup servers instructs storage node to load
backup media in backup device.
• Data is read and send to backup client.
• Storage node sends restore metadata to backup
server.
• Backup server updates catalog.
Backup Topologies
• There are 3 basic backup topologies:
– Direct Attached Based Backup
– LAN Based Backup
– SAN Based Backup
Direct Attached Backups
Backup Server
Metadata
LAN
Application Server
and Backup Client
and Storage Node
Data
Backup Device
LAN Based Backups
Application Server
and Backup Client
LAN
Data
Backup Server
Backup DeviceStorage Node
SAN Based Backups (LAN Free)
Metadata
LAN
FC SAN
Data
Backup
Server
Application Server
and Backup Client
Storage Node
Backup Device
Backup Technology options
• Backup to Tape
 Physical Tape library
• Backup to tape
Backup to Tape
• Traditional destination for backup
• Low cost option
• Sequential / Linear Access
• Multiple streaming
– Backup streams from multiple clients to a
single backup device
Backup to Tape
Tape
Data from
Stream 1 Data from
Stream 2 Data from
Stream 3
Tape Limitations
• Reliability
• Sequential Access
• Cannot be accessed by multiple host
simultaneously
• Control environment for tape storage
• Wear and tear of tape
Backup to Disk
• Ease of implementation
• Fast access
• More reliable
• Random access
• Multiple host access
• Enhanced overall back and recovery
performance
New Features
• File backup and restore
Simple and automatic protection
Complete PC™ backup and restore
Block-level image
Entire computer
Server backup
Files, folders, disks, common workloads
Backing up files and folders
(file backup)
• If you are going to create a full backup,
type the file name in the File Name line,
or use the file name generator (a button
to the right of the line). If you select an
existing archive, it will be overwritten.
Thank you …

More Related Content

What's hot

03 backup-and-recovery
03 backup-and-recovery03 backup-and-recovery
03 backup-and-recovery
hunny garg
 
File system Os
File system OsFile system Os
File system Os
Nehal Naik
 
System Administration: Introduction to system administration
System Administration: Introduction to system administrationSystem Administration: Introduction to system administration
System Administration: Introduction to system administration
Khang-Ling Loh
 
NFS(Network File System)
NFS(Network File System)NFS(Network File System)
NFS(Network File System)
udamale
 
Data security and Integrity
Data security and IntegrityData security and Integrity
Data security and Integrity
Zaid Shabbir
 
Disk management
Disk managementDisk management
Disk management
Agnas Jasmine
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - NotesKranthi
 
Backup Exec 21
Backup Exec 21Backup Exec 21
Backup Exec 21
Ayman Seyam
 
Virtual machine
Virtual machineVirtual machine
Virtual machine
Nikunj Dhameliya
 
Information Security
Information SecurityInformation Security
Information Security
Dhilsath Fathima
 
Client server architecture
Client server architectureClient server architecture
Client server architecture
Bhargav Amin
 
Storage basics
Storage basicsStorage basics
Storage basics
Luis Juan Koffler
 
Data recovery
Data recoveryData recovery
Data recovery
Abhinav Parihar
 
File system
File systemFile system
File system
Harleen Johal
 
Cia security model
Cia security modelCia security model
Cia security model
Imran Ahmed
 
Active directory
Active directory Active directory
Active directory deshvikas
 

What's hot (20)

Backup strategy
Backup strategyBackup strategy
Backup strategy
 
03 backup-and-recovery
03 backup-and-recovery03 backup-and-recovery
03 backup-and-recovery
 
File system Os
File system OsFile system Os
File system Os
 
System Administration: Introduction to system administration
System Administration: Introduction to system administrationSystem Administration: Introduction to system administration
System Administration: Introduction to system administration
 
Data security
Data securityData security
Data security
 
NFS(Network File System)
NFS(Network File System)NFS(Network File System)
NFS(Network File System)
 
Distributed database
Distributed databaseDistributed database
Distributed database
 
Data security and Integrity
Data security and IntegrityData security and Integrity
Data security and Integrity
 
Disk management
Disk managementDisk management
Disk management
 
Dmz
Dmz Dmz
Dmz
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes
 
Backup Exec 21
Backup Exec 21Backup Exec 21
Backup Exec 21
 
Virtual machine
Virtual machineVirtual machine
Virtual machine
 
Information Security
Information SecurityInformation Security
Information Security
 
Client server architecture
Client server architectureClient server architecture
Client server architecture
 
Storage basics
Storage basicsStorage basics
Storage basics
 
Data recovery
Data recoveryData recovery
Data recovery
 
File system
File systemFile system
File system
 
Cia security model
Cia security modelCia security model
Cia security model
 
Active directory
Active directory Active directory
Active directory
 

Similar to Backup and recovery

Presentation on backup and recoveryyyyyyyyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyyyyyyyyPresentation on backup and recoveryyyyyyyyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyyyyyyyyTehmina Gulfam
 
MySQL enterprise backup overview
MySQL enterprise backup overviewMySQL enterprise backup overview
MySQL enterprise backup overview郁萍 王
 
Backing up the virtual datacentre. Charlie Llewellyn and Andy Powell from Edu...
Backing up the virtual datacentre. Charlie Llewellyn and Andy Powell from Edu...Backing up the virtual datacentre. Charlie Llewellyn and Andy Powell from Edu...
Backing up the virtual datacentre. Charlie Llewellyn and Andy Powell from Edu...
Eduserv
 
MySQL Enterprise Backup
MySQL Enterprise BackupMySQL Enterprise Backup
MySQL Enterprise Backup
Mario Beck
 
Unit 3
Unit 3Unit 3
Unit 3
PRABU M
 
KoprowskiT_PASSEastMidsFEB16_2AMaDisasterJustBegan
KoprowskiT_PASSEastMidsFEB16_2AMaDisasterJustBeganKoprowskiT_PASSEastMidsFEB16_2AMaDisasterJustBegan
KoprowskiT_PASSEastMidsFEB16_2AMaDisasterJustBegan
Tobias Koprowski
 
KoprowskiT_SQLSatMoscow_2AMaDisaterJustBegan
KoprowskiT_SQLSatMoscow_2AMaDisaterJustBeganKoprowskiT_SQLSatMoscow_2AMaDisaterJustBegan
KoprowskiT_SQLSatMoscow_2AMaDisaterJustBegan
Tobias Koprowski
 
KoprowskiT_SQLDay2016_2AMaDisasterJustBegan
KoprowskiT_SQLDay2016_2AMaDisasterJustBeganKoprowskiT_SQLDay2016_2AMaDisasterJustBegan
KoprowskiT_SQLDay2016_2AMaDisasterJustBegan
Tobias Koprowski
 
Presentation backup and recovery best practices for very large databases (v...
Presentation   backup and recovery best practices for very large databases (v...Presentation   backup and recovery best practices for very large databases (v...
Presentation backup and recovery best practices for very large databases (v...
xKinAnx
 
Presentation recovery manager (rman) configuration and performance tuning ...
Presentation    recovery manager (rman) configuration and performance tuning ...Presentation    recovery manager (rman) configuration and performance tuning ...
Presentation recovery manager (rman) configuration and performance tuning ...
xKinAnx
 
MCSA 70-412 Chapter 12
MCSA 70-412 Chapter 12MCSA 70-412 Chapter 12
MCSA 70-412 Chapter 12
Computer Networking
 
7-Backups of security Devices-03-06-2023.ppt
7-Backups of security Devices-03-06-2023.ppt7-Backups of security Devices-03-06-2023.ppt
7-Backups of security Devices-03-06-2023.ppt
abhichowdary16
 
KoprowskiT_SPBizConf_2AMaDisasterJustBegan
KoprowskiT_SPBizConf_2AMaDisasterJustBeganKoprowskiT_SPBizConf_2AMaDisasterJustBegan
KoprowskiT_SPBizConf_2AMaDisasterJustBegan
Tobias Koprowski
 
KoprowskiT_SPBizConference_2AMaDisasterJustBegan
KoprowskiT_SPBizConference_2AMaDisasterJustBeganKoprowskiT_SPBizConference_2AMaDisasterJustBegan
KoprowskiT_SPBizConference_2AMaDisasterJustBegan
Tobias Koprowski
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
Ali Broumandnia
 
dbms.ppt
dbms.pptdbms.ppt
dbms.ppt
RomyA2
 
dbms.ppt
dbms.pptdbms.ppt
dbms.ppt
KRISHNARAJ207
 
What is Database Management System
What is Database Management SystemWhat is Database Management System
What is Database Management System
AbhiPatel171
 
DBMS_UNIT 5 Notes.pptx
DBMS_UNIT 5 Notes.pptxDBMS_UNIT 5 Notes.pptx
DBMS_UNIT 5 Notes.pptx
Jayendranath3
 

Similar to Backup and recovery (20)

Presentation on backup and recoveryyyyyyyyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyyyyyyyyPresentation on backup and recoveryyyyyyyyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyyyyyyyy
 
MySQL enterprise backup overview
MySQL enterprise backup overviewMySQL enterprise backup overview
MySQL enterprise backup overview
 
Backing up the virtual datacentre. Charlie Llewellyn and Andy Powell from Edu...
Backing up the virtual datacentre. Charlie Llewellyn and Andy Powell from Edu...Backing up the virtual datacentre. Charlie Llewellyn and Andy Powell from Edu...
Backing up the virtual datacentre. Charlie Llewellyn and Andy Powell from Edu...
 
MySQL Enterprise Backup
MySQL Enterprise BackupMySQL Enterprise Backup
MySQL Enterprise Backup
 
Unit 3
Unit 3Unit 3
Unit 3
 
KoprowskiT_PASSEastMidsFEB16_2AMaDisasterJustBegan
KoprowskiT_PASSEastMidsFEB16_2AMaDisasterJustBeganKoprowskiT_PASSEastMidsFEB16_2AMaDisasterJustBegan
KoprowskiT_PASSEastMidsFEB16_2AMaDisasterJustBegan
 
KoprowskiT_SQLSatMoscow_2AMaDisaterJustBegan
KoprowskiT_SQLSatMoscow_2AMaDisaterJustBeganKoprowskiT_SQLSatMoscow_2AMaDisaterJustBegan
KoprowskiT_SQLSatMoscow_2AMaDisaterJustBegan
 
KoprowskiT_SQLDay2016_2AMaDisasterJustBegan
KoprowskiT_SQLDay2016_2AMaDisasterJustBeganKoprowskiT_SQLDay2016_2AMaDisasterJustBegan
KoprowskiT_SQLDay2016_2AMaDisasterJustBegan
 
Presentation backup and recovery best practices for very large databases (v...
Presentation   backup and recovery best practices for very large databases (v...Presentation   backup and recovery best practices for very large databases (v...
Presentation backup and recovery best practices for very large databases (v...
 
Presentation recovery manager (rman) configuration and performance tuning ...
Presentation    recovery manager (rman) configuration and performance tuning ...Presentation    recovery manager (rman) configuration and performance tuning ...
Presentation recovery manager (rman) configuration and performance tuning ...
 
MCSA 70-412 Chapter 12
MCSA 70-412 Chapter 12MCSA 70-412 Chapter 12
MCSA 70-412 Chapter 12
 
7-Backups of security Devices-03-06-2023.ppt
7-Backups of security Devices-03-06-2023.ppt7-Backups of security Devices-03-06-2023.ppt
7-Backups of security Devices-03-06-2023.ppt
 
KoprowskiT_SPBizConf_2AMaDisasterJustBegan
KoprowskiT_SPBizConf_2AMaDisasterJustBeganKoprowskiT_SPBizConf_2AMaDisasterJustBegan
KoprowskiT_SPBizConf_2AMaDisasterJustBegan
 
KoprowskiT_SPBizConference_2AMaDisasterJustBegan
KoprowskiT_SPBizConference_2AMaDisasterJustBeganKoprowskiT_SPBizConference_2AMaDisasterJustBegan
KoprowskiT_SPBizConference_2AMaDisasterJustBegan
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
dbms.ppt
dbms.pptdbms.ppt
dbms.ppt
 
dbms.ppt
dbms.pptdbms.ppt
dbms.ppt
 
dbms.ppt
dbms.pptdbms.ppt
dbms.ppt
 
What is Database Management System
What is Database Management SystemWhat is Database Management System
What is Database Management System
 
DBMS_UNIT 5 Notes.pptx
DBMS_UNIT 5 Notes.pptxDBMS_UNIT 5 Notes.pptx
DBMS_UNIT 5 Notes.pptx
 

More from dhawal mehta

Cyber laws
Cyber lawsCyber laws
Cyber laws
dhawal mehta
 
Multivibrators
MultivibratorsMultivibrators
Multivibrators
dhawal mehta
 
Osi model
Osi modelOsi model
Osi model
dhawal mehta
 
Internet service
Internet serviceInternet service
Internet service
dhawal mehta
 
Logic family
Logic familyLogic family
Logic family
dhawal mehta
 
Integrated circuits
Integrated circuitsIntegrated circuits
Integrated circuits
dhawal mehta
 
Excel presentation (short)
Excel presentation (short)Excel presentation (short)
Excel presentation (short)
dhawal mehta
 

More from dhawal mehta (7)

Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Multivibrators
MultivibratorsMultivibrators
Multivibrators
 
Osi model
Osi modelOsi model
Osi model
 
Internet service
Internet serviceInternet service
Internet service
 
Logic family
Logic familyLogic family
Logic family
 
Integrated circuits
Integrated circuitsIntegrated circuits
Integrated circuits
 
Excel presentation (short)
Excel presentation (short)Excel presentation (short)
Excel presentation (short)
 

Recently uploaded

Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 

Recently uploaded (20)

Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 

Backup and recovery

  • 1. Presentation on File Backup By- Muskan soni. To- Mr. Devarshi Mehta sir.
  • 2. Outline • What is backup • Backup strategy • Recovery procedures • Factors in recovery procedures • Backup purposes • Types of backup • Backup architecture and process • Backup topologies • Backup technology options • Features • Installation of Acronis
  • 3. What is a Backup? • Backup is an additional copy of data that can be used for restore and recovery purposes • This Backup copy can be created by: – Simply coping data (there can be one or more copies) – Mirroring data (the copy is always updated with whatever is written to the primary
  • 4. Backup Strategy A backup is put in place to avoid permanent data loss to ensure the integrity of stored data i.e. can get back to a previous version and build up the data correctly if current data found to be in error.
  • 5. Recovery Procedures • A backup strategy needs a well documented and tested recovery procedure to ensure backup data is restored properly
  • 6. Factors in recovery procedure: • A well documented procedure that allocates roles and responsibilities to staff. • Availability of alternative hardware and accommodation if the originals have been destroyed. • Availability of original software such as the customised operating system and application programs! • That up-to-date backup data is readily available
  • 7. Backup purposes – Disaster Recovery • Restores production data to an operational state after disaster – Operational • Restore data in the event of data loss or logical corruptions that may occur during routine processing – Archival • Preserve transaction records, email, and other business work products for regulatory compliance
  • 8. Types of backups • Three basic types of backups: • Full backups • Differential backups • Incremental backups
  • 9. Full backups – full and complete backup of entire system Full Backup Su Su Su Su Su
  • 10. Differential backups – storage of all files that have changed or been added since last full backup Su Su Su Su SuM T TW F S M T TW F S M T TW F S M T TW F S
  • 11. Restoring from Differential Backup Files 1, 2, 3 Monday Full Backup Cumulative Tuesday File 4 Cumulative Wednesday Files 4, 5 Cumulative Thursday Files 4, 5, 6 Files 1, 2, 3, 4, 5 Production Frida y
  • 12. Key Features of Differential backups – More files to be backed up, therefore it takes more time to backup and uses more storage space – Much faster restore because only the last full and the last cumulative backup must be applied
  • 13. Incremental backups • only archives data that have been modified that day Su Su Su Su SuM T TW F S M T TW F S M T TW F S M T TW F S
  • 14. Incremental backup Files 1, 2, 3 Monday Full Backup Incremental Tuesday File 4 Incremental Wednesday Updated File 3 Incremental Thursday File 5 Files 1, 2, 3, 4, 5 Production Frida y
  • 15. Key Features of Incremental backups – Files that have changed since the last backup are backed up – Fewest amount of files to be backed up, therefore faster backup and less
  • 16. • Backup client – Sends backup data to backup server or storage node • Backup server – Manages backup operations and maintains backup catalog • Storage node – Responsible for writing data to backup device Backup Architecture and Process
  • 17. Backup Architecture and Process Application Server/ Backup Client Backup Data Backup Server/ Storage Node Tape Library
  • 18. Backup Operation Application Server and Backup Clients 1 2 7 3b 4 3a 6 5 Backup Server Storage Node Backup Device
  • 19. Backup Operation • Start the scheduled backup process • Backup data retrieves backup related information from backup catalog • Backup server instructs storage node to local backup media in backup device • Backup server instruct backup clients to send its metadata to the backup server and data to be backup to storage mode. • Backup clients send data to storage node • Storage node sends data to backup device • Storage node sends media information to backup servers • Backup server update and records the status
  • 20. Restore Operation Application Server and Backup Clients 1 2 7 3b 4 3a 6 5 Backup Server Storage Node Backup Device
  • 21. Restore Operation • Backup server scans backup catalog to identify the data to be restore and the client that will receive data. • Backup servers instructs storage node to load backup media in backup device. • Data is read and send to backup client. • Storage node sends restore metadata to backup server. • Backup server updates catalog.
  • 22. Backup Topologies • There are 3 basic backup topologies: – Direct Attached Based Backup – LAN Based Backup – SAN Based Backup
  • 23. Direct Attached Backups Backup Server Metadata LAN Application Server and Backup Client and Storage Node Data Backup Device
  • 24. LAN Based Backups Application Server and Backup Client LAN Data Backup Server Backup DeviceStorage Node
  • 25. SAN Based Backups (LAN Free) Metadata LAN FC SAN Data Backup Server Application Server and Backup Client Storage Node Backup Device
  • 26. Backup Technology options • Backup to Tape  Physical Tape library • Backup to tape
  • 27. Backup to Tape • Traditional destination for backup • Low cost option • Sequential / Linear Access • Multiple streaming – Backup streams from multiple clients to a single backup device
  • 28. Backup to Tape Tape Data from Stream 1 Data from Stream 2 Data from Stream 3
  • 29. Tape Limitations • Reliability • Sequential Access • Cannot be accessed by multiple host simultaneously • Control environment for tape storage • Wear and tear of tape
  • 30. Backup to Disk • Ease of implementation • Fast access • More reliable • Random access • Multiple host access • Enhanced overall back and recovery performance
  • 31. New Features • File backup and restore Simple and automatic protection Complete PC™ backup and restore Block-level image Entire computer Server backup Files, folders, disks, common workloads
  • 32. Backing up files and folders (file backup)
  • 33. • If you are going to create a full backup, type the file name in the File Name line, or use the file name generator (a button to the right of the line). If you select an existing archive, it will be overwritten.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.