SlideShare a Scribd company logo
Presentation on Backup
    Group members
    Aneela Maqboool
      Saira Nisar
       Tehmina
         Rabia
Outline
•   What is backup
•   Backup strategy
•   Recovery procedures
•   Factors in recovery procedures
•   Backup purposes
•   Types of backup
•   Backup architecture and process
•   Backup topologies
•   Backup technology options
•   Features
•   Installation of Acronis
What is a Backup?

• Backup is an additional copy of data that
  can be used for restore and recovery
  purposes
• This Backup copy can be created by:
  – Simply coping data (there can be one or more
    copies)
  – Mirroring data (the copy is always updated
    with whatever is written to the primary
Backup Strategy

 A backup is put in place to avoid
 permanent data loss to ensure the
 integrity of stored data i.e. can get
 back to a previous version and
 build up the data correctly if current
 data found to be in error.
Recovery Procedures

• A backup strategy needs a well
 documented and tested recovery
 procedure to ensure backup data is
 restored properly
Factors in recovery
procedure:
• A well documented procedure that allocates
    roles and responsibilities to staff.
•   Availability of alternative hardware and
    accommodation if the originals have been
    destroyed.
•   Availability of original software such as the
    customised operating system and application
    programs!
•   That up-to-date backup data is readily available
Backup purposes
 – Disaster Recovery
    • Restores production data to an operational state
      after disaster
 – Operational
    • Restore data in the event of data loss or logical
      corruptions that may occur during routine
      processing
 – Archival
    • Preserve transaction records, email, and other
      business work products for regulatory compliance
Types of backups

•   Three basic types of backups:
•   Full backups
•   Differential backups
•   Incremental backups
Full backups

     – full and complete backup of entire system
Full Backup



Su            Su          Su          Su           Su
Differential backups
       – storage of all files that have changed or been
         added since last full backup




Su M   T W   T   F   S Su M   T   W T   F   S Su M   T   W T   F   S Su M   T   W T   F   S Su
Restoring from Differential Backup


  Monday        Tuesday      Wednesday     Thursday                Frida
                                                                     y


Files 1, 2, 3     File 4      Files 4, 5   Files 4, 5, 6   Files 1, 2, 3, 4, 5

 Full Backup    Cumulative   Cumulative    Cumulative


                                                                Production
Key Features of Differential
backups

  – More files to be backed up, therefore it takes
    more time to backup
    and uses more storage space
  – Much faster restore because only the last full
    and the last cumulative
    backup must be applied
Incremental backups

• only archives data that have been
   modified that day




Su M   T W   T   F   S Su M   T   W T   F   S   S   M   T   W T   F   S Su M   T   W T   F   S Su
                                                    u
Incremental backup

   Monday         Tuesda       Wednesday        Thursday              Frida
                    y                                                   y


Files 1, 2, 3      File 4      Updated File 3     File 5      Files 1, 2, 3, 4, 5

   Full Backup   Incremental    Incremental     Incremental


                                                                   Production
Key Features of Incremental
backups


 – Files that have changed since the last backup
   are backed up
 – Fewest amount of files to be backed up,
   therefore faster backup and less
Backup Architecture and
Process
• Backup client
  – Sends backup data to backup server or
    storage node
• Backup server
  – Manages backup operations and maintains
    backup catalog
• Storage node
  – Responsible for writing data to backup device
Backup Architecture and
   Process
                                             og
                                        Catal
                                  adata
                              Met
              Backup Data
                                 Ba
                                    cku
                                       pD
                                         ata




Application Server/   Backup Server/              Tape Library
Backup Client         Storage Node
Backup Operation
                     Application Server and Backup Clients




       3b
                     4




 1                                        5
                3a


 2

                6
 7




                         Storage Node         Backup Device
Backup Server
Backup Operation
• Start the scheduled backup process
• Backup data retrieves backup related information from
    backup catalog
•   Backup server instructs storage node to local backup
    media in backup device
•   Backup server instruct backup clients to send its
    metadata to the backup server and data to be backup to
    storage mode.
•   Backup clients send data to storage node
•   Storage node sends data to backup device
•   Storage node sends media information to backup
    servers
•   Backup server update and records the status
Restore Operation
                     Application Server and Backup Clients




       3b
                     4




 1                                        5
                3a


 2

                6
 7




                         Storage Node         Backup Device
Backup Server
Restore Operation

• Backup server scans backup catalog to identify
    the data to be restore and the client that will
    receive data.
•   Backup servers instructs storage node to load
    backup media in backup device.
•   Data is read and send to backup client.
•   Storage node sends restore metadata to backup
    server.
•   Backup server updates catalog.
Backup Topologies

• There are 3 basic backup topologies:
  –   Direct Attached Based Backup
  –   LAN Based Backup
  –   SAN Based Backup
Direct Attached Backups


                           Metadata

                                      Data
                     LAN




Backup Server   Application Server
                and Backup Client            Backup Device
                and Storage Node
LAN Based Backups
Application Server
and Backup Client                 Backup Server




                     LAN




                           Data



          Storage Node        Backup Device
SAN Based Backups (LAN
  Free)
                                FC SAN
         LAN

           Metadata             Data
Backup                                   Backup Device
Server
           Application Server
           and Backup Client




                                 Storage Node
Backup Technology options

• Backup to Tape
 Physical Tape library
• Backup to tape
Backup to Tape

•   Traditional destination for backup
•   Low cost option
•   Sequential / Linear Access
•   Multiple streaming
    – Backup streams from multiple clients to a
      single backup device
Backup to Tape

Data from
Stream 1    Data from
            Stream 2    Data from
                        Stream 3




                                    Tape
Tape Limitations

• Reliability
• Sequential Access
• Cannot be accessed by multiple host
  simultaneously
• Control environment for tape storage
• Wear and tear of tape
Backup to Disk

•   Ease of implementation
•   Fast access
•   More reliable
•   Random access
•   Multiple host access
•   Enhanced overall back and recovery
    performance
New Features

• File backup and restore
 Simple and automatic protection
 Complete PC™ backup and restore
 Block-level image
 Entire computer
 Server backup
 Files, folders, disks, common workloads
Backing up files and
folders (file backup)
• If you are going to create a full backup,
 type the file name in the File Name line,
 or use the file name generator (a button to
 the right of the line). If you select an
 existing archive, it will be overwritten.
Presentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyy

More Related Content

What's hot

File management
File managementFile management
File managementMohd Arif
 
Backup
BackupBackup
Backing Up and Recovery
Backing Up and RecoveryBacking Up and Recovery
Backing Up and Recovery
Maham Huda
 
Backups And Recovery
Backups And RecoveryBackups And Recovery
Backups And Recovery
asifmalik110
 
Operating Systems - File Management
Operating Systems -  File ManagementOperating Systems -  File Management
Operating Systems - File Management
Damian T. Gordon
 
CNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic DuplicationCNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic Duplication
Sam Bowne
 
Backup Solution
Backup SolutionBackup Solution
Backup Solution
Jed Concepcion
 
NETWORK FILE SYSTEM
NETWORK FILE SYSTEMNETWORK FILE SYSTEM
NETWORK FILE SYSTEMRoshan Kumar
 
Backup tools
Backup toolsBackup tools
Course 102: Lecture 14: Users and Permissions
Course 102: Lecture 14: Users and PermissionsCourse 102: Lecture 14: Users and Permissions
Course 102: Lecture 14: Users and Permissions
Ahmed El-Arabawy
 
Backup & recovery with rman
Backup & recovery with rmanBackup & recovery with rman
Backup & recovery with rman
itsabidhussain
 
Rman Presentation
Rman PresentationRman Presentation
Rman Presentation
Rick van Ek
 
Network File System in Distributed Computing
Network File System in Distributed ComputingNetwork File System in Distributed Computing
Network File System in Distributed Computing
Chandan Padalkar
 
Nfs
NfsNfs
Windows File Systems
Windows File SystemsWindows File Systems
Windows File Systems
primeteacher32
 
Data Backup and Recovery.pdf
Data Backup and Recovery.pdfData Backup and Recovery.pdf
Data Backup and Recovery.pdf
Ashraf Hossain
 
Active directory
Active directory Active directory
Active directory deshvikas
 
Workgroup vs domain
Workgroup vs domainWorkgroup vs domain
Workgroup vs domaintameemyousaf
 

What's hot (20)

File management
File managementFile management
File management
 
Backup
BackupBackup
Backup
 
Backing Up and Recovery
Backing Up and RecoveryBacking Up and Recovery
Backing Up and Recovery
 
Backups And Recovery
Backups And RecoveryBackups And Recovery
Backups And Recovery
 
Operating Systems - File Management
Operating Systems -  File ManagementOperating Systems -  File Management
Operating Systems - File Management
 
Windows file system
Windows file systemWindows file system
Windows file system
 
CNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic DuplicationCNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic Duplication
 
Nfs
NfsNfs
Nfs
 
Backup Solution
Backup SolutionBackup Solution
Backup Solution
 
NETWORK FILE SYSTEM
NETWORK FILE SYSTEMNETWORK FILE SYSTEM
NETWORK FILE SYSTEM
 
Backup tools
Backup toolsBackup tools
Backup tools
 
Course 102: Lecture 14: Users and Permissions
Course 102: Lecture 14: Users and PermissionsCourse 102: Lecture 14: Users and Permissions
Course 102: Lecture 14: Users and Permissions
 
Backup & recovery with rman
Backup & recovery with rmanBackup & recovery with rman
Backup & recovery with rman
 
Rman Presentation
Rman PresentationRman Presentation
Rman Presentation
 
Network File System in Distributed Computing
Network File System in Distributed ComputingNetwork File System in Distributed Computing
Network File System in Distributed Computing
 
Nfs
NfsNfs
Nfs
 
Windows File Systems
Windows File SystemsWindows File Systems
Windows File Systems
 
Data Backup and Recovery.pdf
Data Backup and Recovery.pdfData Backup and Recovery.pdf
Data Backup and Recovery.pdf
 
Active directory
Active directory Active directory
Active directory
 
Workgroup vs domain
Workgroup vs domainWorkgroup vs domain
Workgroup vs domain
 

Similar to Presentation on backup and recoveryyyyyyyyyyyyy

Presentation recovery manager (rman) configuration and performance tuning ...
Presentation    recovery manager (rman) configuration and performance tuning ...Presentation    recovery manager (rman) configuration and performance tuning ...
Presentation recovery manager (rman) configuration and performance tuning ...
xKinAnx
 
MySQL enterprise backup overview
MySQL enterprise backup overviewMySQL enterprise backup overview
MySQL enterprise backup overview郁萍 王
 
Presentation backup and recovery best practices for very large databases (v...
Presentation   backup and recovery best practices for very large databases (v...Presentation   backup and recovery best practices for very large databases (v...
Presentation backup and recovery best practices for very large databases (v...
xKinAnx
 
Unit 3
Unit 3Unit 3
Unit 3
PRABU M
 
Backing up the virtual datacentre. Charlie Llewellyn and Andy Powell from Edu...
Backing up the virtual datacentre. Charlie Llewellyn and Andy Powell from Edu...Backing up the virtual datacentre. Charlie Llewellyn and Andy Powell from Edu...
Backing up the virtual datacentre. Charlie Llewellyn and Andy Powell from Edu...
Eduserv
 
Fundamentals of storage Unit III Backup and Recovery.ppt
Fundamentals of storage Unit III Backup and Recovery.pptFundamentals of storage Unit III Backup and Recovery.ppt
Fundamentals of storage Unit III Backup and Recovery.ppt
Rahul Borate
 
MySQL Enterprise Backup
MySQL Enterprise BackupMySQL Enterprise Backup
MySQL Enterprise Backup
Mario Beck
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
Ali Broumandnia
 
KoprowskiT_PASSEastMidsFEB16_2AMaDisasterJustBegan
KoprowskiT_PASSEastMidsFEB16_2AMaDisasterJustBeganKoprowskiT_PASSEastMidsFEB16_2AMaDisasterJustBegan
KoprowskiT_PASSEastMidsFEB16_2AMaDisasterJustBegan
Tobias Koprowski
 
Dueling duplications RMAN vs Delphix
Dueling duplications RMAN vs DelphixDueling duplications RMAN vs Delphix
Dueling duplications RMAN vs DelphixKyle Hailey
 
KoprowskiT_SPBizConf_2AMaDisasterJustBegan
KoprowskiT_SPBizConf_2AMaDisasterJustBeganKoprowskiT_SPBizConf_2AMaDisasterJustBegan
KoprowskiT_SPBizConf_2AMaDisasterJustBegan
Tobias Koprowski
 
KoprowskiT_SPBizConference_2AMaDisasterJustBegan
KoprowskiT_SPBizConference_2AMaDisasterJustBeganKoprowskiT_SPBizConference_2AMaDisasterJustBegan
KoprowskiT_SPBizConference_2AMaDisasterJustBegan
Tobias Koprowski
 
Backup_exadata_update
Backup_exadata_updateBackup_exadata_update
Backup_exadata_update
Fran Navarro
 
KoprowskiT_SQLSatMoscow_2AMaDisaterJustBegan
KoprowskiT_SQLSatMoscow_2AMaDisaterJustBeganKoprowskiT_SQLSatMoscow_2AMaDisaterJustBegan
KoprowskiT_SQLSatMoscow_2AMaDisaterJustBegan
Tobias Koprowski
 
First Cloud based enterprise Backup & Recovery in India
First Cloud based enterprise Backup & Recovery in IndiaFirst Cloud based enterprise Backup & Recovery in India
First Cloud based enterprise Backup & Recovery in India
Blaze Arizanov
 
Backup netezza-tsm-v1403c-140330170451-phpapp01
Backup netezza-tsm-v1403c-140330170451-phpapp01Backup netezza-tsm-v1403c-140330170451-phpapp01
Backup netezza-tsm-v1403c-140330170451-phpapp01Arunkumar Shanmugam
 
7-Backups of security Devices-03-06-2023.ppt
7-Backups of security Devices-03-06-2023.ppt7-Backups of security Devices-03-06-2023.ppt
7-Backups of security Devices-03-06-2023.ppt
abhichowdary16
 
MCSA 70-412 Chapter 12
MCSA 70-412 Chapter 12MCSA 70-412 Chapter 12
MCSA 70-412 Chapter 12
Computer Networking
 
Real liferecoverypresentation
Real liferecoverypresentationReal liferecoverypresentation
Real liferecoverypresentation
oracle documents
 
Veeam backup Oracle DB in a VM is easy and reliable way to protect data
Veeam backup Oracle DB in a VM is easy and reliable way to protect dataVeeam backup Oracle DB in a VM is easy and reliable way to protect data
Veeam backup Oracle DB in a VM is easy and reliable way to protect data
Aleks Y
 

Similar to Presentation on backup and recoveryyyyyyyyyyyyy (20)

Presentation recovery manager (rman) configuration and performance tuning ...
Presentation    recovery manager (rman) configuration and performance tuning ...Presentation    recovery manager (rman) configuration and performance tuning ...
Presentation recovery manager (rman) configuration and performance tuning ...
 
MySQL enterprise backup overview
MySQL enterprise backup overviewMySQL enterprise backup overview
MySQL enterprise backup overview
 
Presentation backup and recovery best practices for very large databases (v...
Presentation   backup and recovery best practices for very large databases (v...Presentation   backup and recovery best practices for very large databases (v...
Presentation backup and recovery best practices for very large databases (v...
 
Unit 3
Unit 3Unit 3
Unit 3
 
Backing up the virtual datacentre. Charlie Llewellyn and Andy Powell from Edu...
Backing up the virtual datacentre. Charlie Llewellyn and Andy Powell from Edu...Backing up the virtual datacentre. Charlie Llewellyn and Andy Powell from Edu...
Backing up the virtual datacentre. Charlie Llewellyn and Andy Powell from Edu...
 
Fundamentals of storage Unit III Backup and Recovery.ppt
Fundamentals of storage Unit III Backup and Recovery.pptFundamentals of storage Unit III Backup and Recovery.ppt
Fundamentals of storage Unit III Backup and Recovery.ppt
 
MySQL Enterprise Backup
MySQL Enterprise BackupMySQL Enterprise Backup
MySQL Enterprise Backup
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
KoprowskiT_PASSEastMidsFEB16_2AMaDisasterJustBegan
KoprowskiT_PASSEastMidsFEB16_2AMaDisasterJustBeganKoprowskiT_PASSEastMidsFEB16_2AMaDisasterJustBegan
KoprowskiT_PASSEastMidsFEB16_2AMaDisasterJustBegan
 
Dueling duplications RMAN vs Delphix
Dueling duplications RMAN vs DelphixDueling duplications RMAN vs Delphix
Dueling duplications RMAN vs Delphix
 
KoprowskiT_SPBizConf_2AMaDisasterJustBegan
KoprowskiT_SPBizConf_2AMaDisasterJustBeganKoprowskiT_SPBizConf_2AMaDisasterJustBegan
KoprowskiT_SPBizConf_2AMaDisasterJustBegan
 
KoprowskiT_SPBizConference_2AMaDisasterJustBegan
KoprowskiT_SPBizConference_2AMaDisasterJustBeganKoprowskiT_SPBizConference_2AMaDisasterJustBegan
KoprowskiT_SPBizConference_2AMaDisasterJustBegan
 
Backup_exadata_update
Backup_exadata_updateBackup_exadata_update
Backup_exadata_update
 
KoprowskiT_SQLSatMoscow_2AMaDisaterJustBegan
KoprowskiT_SQLSatMoscow_2AMaDisaterJustBeganKoprowskiT_SQLSatMoscow_2AMaDisaterJustBegan
KoprowskiT_SQLSatMoscow_2AMaDisaterJustBegan
 
First Cloud based enterprise Backup & Recovery in India
First Cloud based enterprise Backup & Recovery in IndiaFirst Cloud based enterprise Backup & Recovery in India
First Cloud based enterprise Backup & Recovery in India
 
Backup netezza-tsm-v1403c-140330170451-phpapp01
Backup netezza-tsm-v1403c-140330170451-phpapp01Backup netezza-tsm-v1403c-140330170451-phpapp01
Backup netezza-tsm-v1403c-140330170451-phpapp01
 
7-Backups of security Devices-03-06-2023.ppt
7-Backups of security Devices-03-06-2023.ppt7-Backups of security Devices-03-06-2023.ppt
7-Backups of security Devices-03-06-2023.ppt
 
MCSA 70-412 Chapter 12
MCSA 70-412 Chapter 12MCSA 70-412 Chapter 12
MCSA 70-412 Chapter 12
 
Real liferecoverypresentation
Real liferecoverypresentationReal liferecoverypresentation
Real liferecoverypresentation
 
Veeam backup Oracle DB in a VM is easy and reliable way to protect data
Veeam backup Oracle DB in a VM is easy and reliable way to protect dataVeeam backup Oracle DB in a VM is easy and reliable way to protect data
Veeam backup Oracle DB in a VM is easy and reliable way to protect data
 

Recently uploaded

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 

Recently uploaded (20)

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 

Presentation on backup and recoveryyyyyyyyyyyyy

  • 1. Presentation on Backup Group members Aneela Maqboool Saira Nisar Tehmina Rabia
  • 2. Outline • What is backup • Backup strategy • Recovery procedures • Factors in recovery procedures • Backup purposes • Types of backup • Backup architecture and process • Backup topologies • Backup technology options • Features • Installation of Acronis
  • 3. What is a Backup? • Backup is an additional copy of data that can be used for restore and recovery purposes • This Backup copy can be created by: – Simply coping data (there can be one or more copies) – Mirroring data (the copy is always updated with whatever is written to the primary
  • 4. Backup Strategy A backup is put in place to avoid permanent data loss to ensure the integrity of stored data i.e. can get back to a previous version and build up the data correctly if current data found to be in error.
  • 5. Recovery Procedures • A backup strategy needs a well documented and tested recovery procedure to ensure backup data is restored properly
  • 6. Factors in recovery procedure: • A well documented procedure that allocates roles and responsibilities to staff. • Availability of alternative hardware and accommodation if the originals have been destroyed. • Availability of original software such as the customised operating system and application programs! • That up-to-date backup data is readily available
  • 7. Backup purposes – Disaster Recovery • Restores production data to an operational state after disaster – Operational • Restore data in the event of data loss or logical corruptions that may occur during routine processing – Archival • Preserve transaction records, email, and other business work products for regulatory compliance
  • 8. Types of backups • Three basic types of backups: • Full backups • Differential backups • Incremental backups
  • 9. Full backups – full and complete backup of entire system Full Backup Su Su Su Su Su
  • 10. Differential backups – storage of all files that have changed or been added since last full backup Su M T W T F S Su M T W T F S Su M T W T F S Su M T W T F S Su
  • 11. Restoring from Differential Backup Monday Tuesday Wednesday Thursday Frida y Files 1, 2, 3 File 4 Files 4, 5 Files 4, 5, 6 Files 1, 2, 3, 4, 5 Full Backup Cumulative Cumulative Cumulative Production
  • 12. Key Features of Differential backups – More files to be backed up, therefore it takes more time to backup and uses more storage space – Much faster restore because only the last full and the last cumulative backup must be applied
  • 13. Incremental backups • only archives data that have been modified that day Su M T W T F S Su M T W T F S S M T W T F S Su M T W T F S Su u
  • 14. Incremental backup Monday Tuesda Wednesday Thursday Frida y y Files 1, 2, 3 File 4 Updated File 3 File 5 Files 1, 2, 3, 4, 5 Full Backup Incremental Incremental Incremental Production
  • 15. Key Features of Incremental backups – Files that have changed since the last backup are backed up – Fewest amount of files to be backed up, therefore faster backup and less
  • 16. Backup Architecture and Process • Backup client – Sends backup data to backup server or storage node • Backup server – Manages backup operations and maintains backup catalog • Storage node – Responsible for writing data to backup device
  • 17. Backup Architecture and Process og Catal adata Met Backup Data Ba cku pD ata Application Server/ Backup Server/ Tape Library Backup Client Storage Node
  • 18. Backup Operation Application Server and Backup Clients 3b 4 1 5 3a 2 6 7 Storage Node Backup Device Backup Server
  • 19. Backup Operation • Start the scheduled backup process • Backup data retrieves backup related information from backup catalog • Backup server instructs storage node to local backup media in backup device • Backup server instruct backup clients to send its metadata to the backup server and data to be backup to storage mode. • Backup clients send data to storage node • Storage node sends data to backup device • Storage node sends media information to backup servers • Backup server update and records the status
  • 20. Restore Operation Application Server and Backup Clients 3b 4 1 5 3a 2 6 7 Storage Node Backup Device Backup Server
  • 21. Restore Operation • Backup server scans backup catalog to identify the data to be restore and the client that will receive data. • Backup servers instructs storage node to load backup media in backup device. • Data is read and send to backup client. • Storage node sends restore metadata to backup server. • Backup server updates catalog.
  • 22. Backup Topologies • There are 3 basic backup topologies: – Direct Attached Based Backup – LAN Based Backup – SAN Based Backup
  • 23. Direct Attached Backups Metadata Data LAN Backup Server Application Server and Backup Client Backup Device and Storage Node
  • 24. LAN Based Backups Application Server and Backup Client Backup Server LAN Data Storage Node Backup Device
  • 25. SAN Based Backups (LAN Free) FC SAN LAN Metadata Data Backup Backup Device Server Application Server and Backup Client Storage Node
  • 26. Backup Technology options • Backup to Tape  Physical Tape library • Backup to tape
  • 27. Backup to Tape • Traditional destination for backup • Low cost option • Sequential / Linear Access • Multiple streaming – Backup streams from multiple clients to a single backup device
  • 28. Backup to Tape Data from Stream 1 Data from Stream 2 Data from Stream 3 Tape
  • 29. Tape Limitations • Reliability • Sequential Access • Cannot be accessed by multiple host simultaneously • Control environment for tape storage • Wear and tear of tape
  • 30. Backup to Disk • Ease of implementation • Fast access • More reliable • Random access • Multiple host access • Enhanced overall back and recovery performance
  • 31. New Features • File backup and restore Simple and automatic protection Complete PC™ backup and restore Block-level image Entire computer Server backup Files, folders, disks, common workloads
  • 32. Backing up files and folders (file backup)
  • 33. • If you are going to create a full backup, type the file name in the File Name line, or use the file name generator (a button to the right of the line). If you select an existing archive, it will be overwritten.