Fire disaster recovery system scheme and data back

2022-08-08
  • Detail

Disaster recovery system scheme and data backup technology

with the continuous acceleration of social informatization, people can put forward higher requirements for disaster recovery and backup of information systems. Therefore, disaster recovery technology is also changing with each passing day. Studying disaster recovery technology, establishing the architecture of disaster recovery system and improving the performance of disaster recovery system are all important research directions

in recent years, a large number of data disasters, such as the 9/11 incident and hacker server attacks, have made the problem of data security more urgent. Disaster recovery has become a hot topic in the construction of information data centers, and many disaster recovery technologies have also developed rapidly. In the disaster recovery industry, there is a common sense that once a disaster occurs, how to minimize the negative impact of the disaster on enterprises is a problem that needs to be paid great attention to. Similarly, when enterprises suffer from "disasters" from the Internet, the first thing they need to do is to quickly establish an accident response mechanism and restore daily information services as soon as possible. However, this requires enterprises to prepare for disaster recovery and backup in the process of informatization, so that they can calmly deal with things when they happen

in disaster recovery technology, the requirements of safe and stable operation of the system can be well solved through disaster recovery backup. Disaster tolerant backup is an information system that can still provide normal application services to the greatest extent after various disaster damages occur through a specific disaster tolerant mechanism. Disaster recovery backup can be divided into data backup and application backup. Data backup needs to ensure the integrity, reliability and consistency of user data. For the information system that provides real-time services, when the user's service request is interrupted in a disaster, application backup can provide uninterrupted application services, so that the customer's service request can continue to run, and ensure the integrity, reliability and consistency of the services provided by the information system. Data backup is the basis of disaster recovery system, and it is also sufficient to ensure that the disaster recovery system can work normally; Application backup is the construction goal of disaster recovery system. It must be based on reliable data backup and realized through good coordination between application system, network system and other resources

according to the SHARE78 standard of IBM, disaster recovery technology can be divided into seven levels, from no disaster recovery and backup measures, to storing the backup tapes in different places, and then building a remote disaster recovery and backup center for real-time switching of application systems. The recovery time of data and applications ranges from days to hours or even seconds. A complete disaster recovery backup system includes local data backup, remote data replication and remote backup center. Of course, not all enterprises need such a system. It is necessary to establish a disaster recovery backup center only for non interruptible key businesses. The standard system of small enterprises is very clear. By establishing offline data backup and artificial data transfer of NAS or San, a good disaster recovery backup effect can be achieved

1. Classification of disaster recovery schemes

at present, there are many kinds of disaster recovery technologies, and the classification is also relatively complex. But in general, it can be divided into two types: offline disaster recovery (cold disaster recovery) and disaster recovery (heat disaster recovery)

the so-called offline disaster recovery mainly depends on backup technology. The important step is to back up the data to the tape through the backup system, and then transport the tape to a different place for storage and management. In this way, backup software is mainly used to realize the management of backup and tape. In addition to the transportation and storage of tape, other steps can realize automatic management. The deployment and management of the whole scheme is relatively simple, and the corresponding investment is also less. But the disadvantages are also obvious: due to the use of tape to store data, the data recovery is slow, and the data in the backup window will be lost, and the real-time performance is poor. Users with limited funds and low requirements for RTO and RPO of data recovery can choose this method

disaster recovery requires that the production center and the disaster recovery center work at the same time, and there is a transmission link connection between the production center and the disaster recovery center. The data is copied in real time from the production center to the disaster recovery center. On this basis, cluster management can be carried out at the application layer. When the production center suffers a disaster and fails, the disaster recovery center can automatically take over and continue to provide services. The management of application layer is generally realized by special software, which can replace the administrator to realize automatic management. It can be seen from the above analysis that the key to disaster recovery is data replication. There are many ways to realize data replication, each with its own advantages and disadvantages. Since disaster recovery can realize the real-time replication of data, the RTO and RPO Department of data recovery can meet the high requirements of users. Therefore, users with high data importance should choose this method, such as users in the financial industry. However, to achieve disaster recovery in this way, we must have a high investment

2. Architecture of disaster recovery system

from the perspective of different implementation levels of disaster recovery and destruction resistant system technology, the architecture of a practical disaster recovery and destruction resistant system is an important aspect that affects the working efficiency of the system. The architecture of a typical disaster recovery system is shown in the figure

2.1 local disaster recovery technology

local data protection can ensure that in the event of some local disasters, business data can be recovered as soon as possible to ensure the normal operation of the business. Local disaster recovery technology is divided into data disaster recovery and service disaster recovery

local data disaster recovery can be technically divided into disk protection technology, snapshot data protection technology, tape/disk data backup technology. In terms of implementation technology, local service disaster recovery can be mainly divided into dual machine hot standby and local cluster technology. Local data disaster recovery can restore the backup data in case of system failure and human error by means of regular backup of local data, so as to ensure the safety of local data. Of course, the temporary suspension of system services is inevitable. Pure data disaster recovery can no longer meet people's demand for continuous service provision for key businesses. Therefore, service disaster recovery has become a hot spot of application at present. Local service disaster recovery can improve the high availability of information system and resist single point of failure by configuring multi machine environment. In case of local failure and human error in the system, such as operating system failure, network failure, power failure, etc., the local service disaster recovery system can quickly replace the failed system in the shortest time that the user is not aware of, so that the system application can continue to operate and ensure the continuity of system services. The typical implementation method of local service disaster recovery is to adopt dual machine hot standby technology. This means that two servers are used for redundancy and error tolerance, and the two servers are divided into master and slave servers. Under normal circumstances, the master server provides services, and the slave server is consistent with the master server. When the master server fails, the slave server immediately takes over the work of the master server, so that the failure of a server will not lead to the collapse of the whole system that keeps in touch with us. In practical application, two servers can also be used as hot standby for each other. The latest development of this technology is to adopt the local cluster technology, that is, to complete the mutual mirroring of multiple machines, load balancing, application switching function, and ensure the high availability of key services. Limitations of local disaster recovery local disaster recovery can avoid the impact of a single point of failure of the server on the information system and improve the high availability of the system. However, in the event of regional and devastating disasters, such as fire, explosion, earthquake, flood, war, lightning, etc., local disaster recovery alone cannot guarantee the high availability of the system, resulting in the failure of normal business, the loss and destruction of important data, and the resulting losses will be incalculable. Therefore, a comprehensive remote disaster recovery protection solution came into being. Remote system disaster recovery absolutely separates the production center from the disaster recovery center through physical distance, which can prevent regional and devastating disasters

2.2 remote disaster recovery technology

local data backup is the premise and foundation of disaster recovery system construction. Through remote remote disaster recovery technology for important businesses, we can enhance the regional anti Strike ability of the data center, ensure data security and business system continuity, and truly realize a safe key business information system. Remote disaster recovery technology is divided into three levels according to the above architecture. Data disaster recovery technology is used on different models, network disaster recovery technology and service disaster recovery technology respectively

2.2.1 remote data disaster recovery technology

remote data disaster recovery refers to the backup of local data to a remote data system far away from the local. When a disaster occurs, data reconstruction can be used to resist regional and devastating disasters and protect business data. However, the temporary suspension of Fu key business services is inevitable. Remote data disaster recovery technology can be divided into the following categories: (1) remote tape data disaster recovery technology; (2) Data disaster tolerance technology based on intelligent storage system, (3) data disaster tolerance technology based on server volume; (4) Data disaster recovery technology based on file system; (5) Data disaster tolerance technology based on database

2.2.2 network disaster recovery technology

with the rapid development of network, more and more users take this network as a convenient way to provide collaborative work, e-commerce, education, leisure and entertainment. How to prevent business interruption or minimize the loss of business when interruption is inevitable has become a key issue. Therefore, network survivability has become an aspect that must be considered in network design. Network survivability refers to the ability of a network to maintain acceptable service quality when it suffers from various failures, such as communication human failures and communication accidents caused by objective factors. According to the definition of the network survivability performance working group, network survivability includes two aspects: (1) in case of network failure, various recovery technologies are used to maintain or recover network services to achieve acceptable performance. (2) Network can reduce or prevent service failure from failure by applying prevention technology. Related schemes to improve network survivability include technologies based on the underlying optical network, technologies based on the IP layer and the integration of these technologies. Common network disaster recovery technologies include all-optical network survivable technology, SDH network survivable technology, and IP layer network survivable technology

2.2.3 service disaster recovery technology

a comprehensive disaster recovery and destruction resistant system provides data level and network level protection. One of its important functions is to ensure the continuous operation of the information system, that is, to ensure the high availability of business, and to provide users with uninterrupted and reliable services. In order to realize this function, when a disaster occurs, the business of the production center needs to be transferred to the disaster recovery center for operation, which is the problem to be solved by the service disaster recovery technology. Another purpose of service disaster recovery is to ensure the automatic and seamless migration of services, so that users do not feel that the main body providing services has changed

under normal circumstances, various applications of the system run on the information system of the production center. The data of the production center is copied to the disaster recovery center in real time in stride or asynchronously, and the data is stored in the storage system of the production center and the disaster recovery center at the same time. When the production center cannot work normally due to power failure, fire or even earthquake, the business processing and network communication lines will be switched to the disaster recovery center to ensure the continuous operation of the business. Therefore, application level disaster recovery requires the establishment of a production center backup system consistent with the production system. In the case of no disaster, the production center provides external services, and the disaster recovery center tracks the processing of the production center in real time, while backing up the relevant information of the production center

Copyright © 2011 JIN SHI