SlideShare a Scribd company logo
COMPUTER FORENSICS UNIT II – PART I 1
1. Data Recovery Defined
 Data recovery is the process in which highly trained engineers evaluate and extract data from
damaged media and return it in an intact format.
 Many people, even computer experts, fail to recognize data recovery as an option during a data
crisis. But it is possible to retrieve files that have been deleted and passwords that have been
forgotten or to recover entire hard drives that have been physically damaged.
2. Data Back-up and Recovery *****
2.1 Back-up Obstacles
 Back-up Window: The back-up window is the period of time when back-ups can be run. The back-up
window is generally timed to occur during nonproduction periods when network bandwidth and
CPU utilization are low.
 Network bandwidth: If a network cannot handle the impact of transporting hundreds of gigabytes
of data over a short period of time, the organization’s centralized backup strategy is not viable.
 System throughput: Three I/O bottlenecks are commonly found in traditional backup schemes.
These are
1. The ability of the system being backed up to push data to the backup server
2. The ability of the backup server to accept data from multiple systems simultaneously
3. The available throughput of the tape device(s) onto which the data is moved
 Lack-of Resources: Many companies fail to make appropriate investments in data protection until it
is too late.
2.2 The Future of Data Back-up
Successful data back-up and recovery is composed of four key elements: the backup server, the network,
the backup window, and the backup storage device.
THE BACK-UP SERVER
 The backup server is responsible for managing the policies, schedules, media catalogs, and indexes
associated with the systems it is configured to back up.
 The systems being backed up are called clients.
Data Recovery
COMPUTER FORENSICS UNIT II – PART I 2
 The overall performance of a backup or recovery was directly related to the ability of the backup
server to handle the I/O load created by the backup process.
 Tape servers allow administrators to divide the backup tasks across multiple systems while
maintaining scheduling and administrative processes on a primary or backup server. This approach
often involves attaching multiple tape servers to a shared tape library, which reduces the overall
cost of the system.
 The new backup architecture implements a serverless backup solution that allows data to be moved
directly from disk to tape, bypassing the backup server altogether. This method of data backup
removes the bottleneck of the backup server completely.
 However, the performance of serverless backup is then affected by another potential bottleneck—
bandwidth.
A backup using a shared tape library A serverless backup system
THE NETWORK DATA PATH
 Centralization of a data-management process such as backup and recovery requires a robust and
available network data path. The movement and management of hundreds or thousands of
megabytes of data can put a strain on even the best-designed networks.
 An enterprise-class backup solution can distribute backup services directly to the data source, while
at the same time centralizing the administration of these resources.
COMPUTER FORENSICS UNIT II – PART I 3
 We can install a network path dedicated to the management and movement of data. This data path
can be SCSI, Ethernet, ATM, fiber distributed data interface (FDDI), or fiber channel.
 Creating a dedicated data path is the beginning of a storage area network (SAN).
 SANs are quickly dominating the backup landscape, and applications such as serverless and LAN-less
backup will continue to push this emerging technology forward.
 Above Figure shows an example of a dedicated SAN topology.
THE BACK-UP WINDOW
 A backup window defines how much time is available to back up the network.
 Most companies are managing too much data to complete backup during these ever-shrinking
backup windows
 The backup-software community has developed a way to overcome the element of time by using
incremental backup, block-level backup, image backups, and data archiving.
Incremental Backup
Incremental backups only transfer data that has changed since the last backup. On average, no more
than 5% of data in a file server changes daily. That means an incremental backup may only require 5% of
the time it takes to back up the entire file system.
A LAN-less back-up using remote tape server A storage are network using serverless back-up
COMPUTER FORENSICS UNIT II – PART I 4
Block-Level Incremental Backup
Rather than backing up entire files that have been modified since the last backup, only the blocks that
have changed since the last backup are marked for backup.
Image Backups
This type of backup creates copies, or snapshots, of a file system at a particular point in time. Image
backups are much faster than incremental backups and provide the ability to easily perform a bare
bones recovery of a server without loading the operating systems, applications, and the like.
Data Archiving
Removing infrequently accessed data from a disk drive can reduce the size of a scheduled backup by up
to 80%. Static data that has been archived is easily recalled when needed but does not add to the daily
data backup requirements of the enterprise.
BACK-UP STORAGE DEVICES
 The most expensive item in a back-up project is the back-up storage device.
 Determining the tape format, number of tape drives, and how many slots are required is predicted
on many variables.
 For best suitable back-up storage device we have to consider Back-up windows, growth rates,
retention policies, duplicate tape copies, and network and server throughputs.
 Tape libraries are sized using two variables: the number of tape drives, the number of slots.
 Tape libraries today are available with 5 to 50,000 slots and can support anywhere from 1 to 256
tape-drives. The following table compares several different tape technologies:
Technology Capacity (Native/Compressed) Max Transmission Rate (Native/Compressed)
Mammoth-2 60GB/150GB 12 Mbps/30 Mbps
AIT-3 100GB/250GB 12 Mbps/30Mbps
Super DLT 110GB/220GB 10 Mbps/20Mbps
LTO Ultrium 340GB/680GB 20 Mbps/40 Mbps
AIT – Advanced Intelligent Tape; DLT – Digital Audio Tape; LTO – Linear Tape Open
COMPUTER FORENSICS UNIT II – PART I 5
RECOMMENDED BACK-UP FEATURES
 Data Interleaving: To back up multiple systems concurrently, the backup application must be able to
write data from multiple clients to tape in an interleaved manner.
 Remote Back-up: Many remote systems are exposed to unrecoverable data loss. A backup
application should have a method to back up systems across a WAN or over dial-up connections
 Global Monitoring: A robust backup application should be able to support reporting and
administration of any backup system, regardless of location.
 Performance: An enterprise backup application should be able to benchmark backup data rates
exceeding one terabyte per hour.
3. The Role of Back-up in Data Recovery ****
There are many factors that affect back-up. For example:
 Storage costs are decreasing: The cost per megabyte of primary (online) storage has fallen
dramatically over the past several years and continues to do so as disk drive technologies advance.
 Systems have to be on-line continuously: Because systems must be continuously online, the
dilemma becomes that you can no longer take files offline long enough to perform backup.
 The role of Back-up has changed: The role of backup now includes the responsibility for recovering
user errors and ensuring that good data has been saved and can quickly be restored.
CONVENTIONAL TAPE BACK-UP IN TODAY’S MARKET
 A typical tape management system consists of a dedicated workstation with the front-end
interfaced to the network and the back-end controlling a repository of tape devices. The media
server runs tape management software. It can administer backup devices throughout an enterprise
and can run continuous parallel backups and restores.
 An alternative to tape backup is to physically replicate or mirror all data and keep two copies online
at all times. The advantage is that the data does not have to be restored, so there are no issues with
immediate data availability.
COMPUTER FORENSICS UNIT II – PART I 6
ISSUES WITH TODAY’S BACK-UP
 NETWORK BACKUP creates network performance problems. Using the production network to carry
backup data, as well as for normal user data access, can severely overburden today’s busy network
resources.
 OFFLINE BACKUP affects data accessibility. The time that the host is offline for data backup must be
minimized. This requires extremely high-speed, continuous parallel backup of the raw image of the
data.
 LIVE BACKUPS allow data access during the backup process but affect performance. The downside to
the live backup is that it puts a tremendous burden on the host.
 MIRRORING doesn’t protect against user error and replication of bad data. Fully replicated online
data sounds great, albeit at twice the cost per megabyte of a single copy of online data.
NEW ARCHITECTURES AND TECHNIQUES ARE REQUIRED
 Backup at extremely high speed is required. Recovery must be available at file level. The time that
systems off-line for back-up must be eliminated.
 Remote hot recovery sites are needed for immediate resumption of data access. Backup of critical
data is still required to ensure against data errors and user errors.
 To achieve effective backup and recovery, the decoupling of data from its storage space is needed.
 It is necessary to develop techniques to journal modified pages, so that journaling can be invoked
within the primary storage device, without host intervention.
 Part of the primary storage area must be set aside for data to be backed up. This area must be as
large as the largest backup block. We should have fast nonrandom restoration of critical data.
4. The Data Recovery Solution *****
4.1 SHRINKING EXPERTISE, GROWING COMPLEXITY
The complex systems that have evolved over the past 30 years must be monitored, managed,
controlled, and optimized. But most of the bright young graduates this term haven’t had much exposure
to mainframe concepts.
Backups often take place while an application is running. Application changes take place on the fly. If an
outage occurs, the company stands to lose tens of thousands of dollars an hour.
COMPUTER FORENSICS UNIT II – PART I 7
FAILURES: Disk storage is more reliable than ever, but hardware failures are still possible. A simple
mistake can be made by an application programmer, system programmer, or operations person. Logic
errors in programs or application of the wrong update at the wrong time can result in a system crash or,
worse. Disasters do really occurs! Floods, tornadoes, earthquakes, tsunamis, and even terrorism can do
strike. We must be ready.
4.2 BUDGETS AND DOWNTIME
We have fewer resources (people, processing power, time, and money) to do more work than ever
before, and we must keep your expenses under control. Systems must remain available to make money
and serve customers. Downtime is much too expensive to be tolerated.
4.3 RECOVERY: THINK BEFORE YOU BACK-UP
One of the most critical data-management tasks involves recovering data in the event of a problem. You
must evaluate your preparations, make sure that all resources are available in usable condition,
automate processes as much as possible, and make sure you have the right kind of resources.
 Evaluate your preparation
If all of the resources (image copies, change accumulations, and logs) are available at recovery time,
these preparations certainly allow for a standard recovery. Finding out at recovery time that some
critical resource is missing can be disastrous!
 Don’t let your resources fall through the cracks
Identifying different types of conditions is critical to ensuring a successful recovery. Checking your
assets to make sure they’re ready should be part of your plan.
 Automated Recovery
With proper planning and automation, recovery is made possible, reliance on specific personnel is
reduced, and the human-error factor is nearly eliminated.
Data integrity and your business relay on building recovery job control language (JCL). In the event
of a disaster, the Information Management System (IMS) recovery control (RECON) data sets must
be modified in preparation for the recovery.
Cleaning your RECON data sets can take hours if done manually, and it’s an error-prone process.
COMPUTER FORENSICS UNIT II – PART I 8
 Make Recoveries Efficient
Multithreading tasks shorten the recovery process. Recovering multiple databases with one pass
through your log data certainly will save time. Taking image copies, rebuilding indexes, and
validating pointers concurrently with the recovery process further reduce downtime.
 Take Back-ups
The first step to a successful recovery is the backup of your data. Your goal in backing up data is to
do so quickly, efficiently, and usually with minimal impact to your customers. You might need only
very brief out-ages to take instant copies of your data, or you might have intelligent storage devices
that allow you to take a snapshot of your data. Both methods call for tools to assist in the
management of resources.
4.4 BACK-UP AND RECOVERY SOLUTION
BMC software has developed a model called the Back-up and Recovery Solution (BRS) for the
Information Management System (IMS) product.
4.4.1 Image Copy
 BRS contains an Image Copy component to help manage your image copy process. BRS can take
batch, on-line (fuzzy), or incremental image copies; Snapshot copies; or Instant Snapshot copies.
 The Image Copy component of BRS offers a variety of powerful features: dynamic allocation of all
input and output data sets, stacking of output data sets, high performance access methods (faster
I/O), copying by volume, compression of output image copies, and database group processing--- all
while interfacing with DBRC and processing asynchronously.
4.4.2 Change Accumulation
 The BRS Change Accumulation component takes advantage of multiple engines, large virtual storage
resources, and high-speed channels and controllers that are available in many environments.
 Use of multiple tack control block (TCB) structures enables overlapping of as much processing as
possible, reducing both elapsed and CPU time.
COMPUTER FORENSICS UNIT II – PART I 9
4.4.3 Recovery
The BRS Recovery component, which functionally replaces the IMS Database Recovery utility for null-
function (DL/I) databases and data-entry databases (DEDBs), allow recovery of multiple databases with
one pass of the log and change accumulation data sets while dynamically allocating all data sets
required for recovery.
BRS recovers multiple databases to any point in time. BRS can determine the best choice for a Point-in-
Time (PIT) recovery. Full DBRS support includes:
RECOVERY MANAGER
 Recovery Manager component lets you automate and synchronize recoveries across applications
and databases by creating meaningful groups of related databases and creating optimized JCL to
perform the recovery of these groups.
 Recovery Manager component provides a positive response for the IMS commands that are used to
deallocate and start your databases.
 Recovery Manager component fully automates the process of cleaning the RECON data sets for
restart following a disaster recovery.
 Recovery Manager component also allows you to test your recovery strategy and notifies you when
media errors have jeopardized your recovery resources.
POINTER CHECKING
 BRS offers the capability to verify the validity of database pointers through the Concurrent Pointer
Checking function for both full-function databases and Fast Path data-entry databases (DEDBs).
INDEX REBUILD
 If indexes are ever damaged or lost, the Index Rebuild function of BRS allows you rebuild them
rather than recover them.
RECOVERY ADVISOR
 The Recovery Advisor component of BRS allows you to monitor the frequency of your image copies
and change accumulations.
 It helps you to determine whether all your databases are being backed-up.
By using any number of back-up and recovery tools available, you can better manage your world and be
ready to recover!
SOURCE: COMPUTER FORENSICS: COMPUTER CRIME SCENE INVESTIGATION, JOHN VACCA Send your feedback to kranthi@kranthi.co.in
Ad

More Related Content

What's hot (20)

05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes
Kranthi
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
Kranthi
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes
Kranthi
 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
primeteacher32
 
Data recovery
Data recoveryData recovery
Data recovery
Mir Majid
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
Kathirvel Ayyaswamy
 
Data Acquisition
Data AcquisitionData Acquisition
Data Acquisition
primeteacher32
 
Digital Forensic Case Study
Digital Forensic Case StudyDigital Forensic Case Study
Digital Forensic Case Study
MyAssignmenthelp.com
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
Nicholas Davis
 
Computer Forensics ppt
Computer Forensics pptComputer Forensics ppt
Computer Forensics ppt
OECLIB Odisha Electronics Control Library
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
Somya Johri
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
Vidoushi B-Somrah
 
Windowsforensics
WindowsforensicsWindowsforensics
Windowsforensics
Santosh Khadsare
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
vishnuv43
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
Cleverence Kombe
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
Milap Oza
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
Online
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
Priya Manik
 
Network forensic
Network forensicNetwork forensic
Network forensic
Manjushree Mashal
 
Accessing Forensic Images
Accessing Forensic ImagesAccessing Forensic Images
Accessing Forensic Images
CTIN
 
05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes
Kranthi
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
Kranthi
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes
Kranthi
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
Somya Johri
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
vishnuv43
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
Milap Oza
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
Online
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
Priya Manik
 
Accessing Forensic Images
Accessing Forensic ImagesAccessing Forensic Images
Accessing Forensic Images
CTIN
 

Viewers also liked (19)

database recovery techniques
database recovery techniques database recovery techniques
database recovery techniques
Kalhan Liyanage
 
Database recovery
Database recoveryDatabase recovery
Database recovery
Vritti Malhotra
 
Database recovery techniques
Database recovery techniquesDatabase recovery techniques
Database recovery techniques
pusp220
 
Data recovery
Data recoveryData recovery
Data recovery
Suresh Hirpara
 
17. Recovery System in DBMS
17. Recovery System in DBMS17. Recovery System in DBMS
17. Recovery System in DBMS
koolkampus
 
Data recovery
Data recoveryData recovery
Data recovery
Ravi Malik
 
Presentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyyPresentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyy
Tehmina Gulfam
 
Data recovery from storage device
Data recovery from storage deviceData recovery from storage device
Data recovery from storage device
Mohit Shah
 
03 backup-and-recovery
03 backup-and-recovery03 backup-and-recovery
03 backup-and-recovery
hunny garg
 
Backup And Recovery
Backup And RecoveryBackup And Recovery
Backup And Recovery
raghu_designer
 
Data recovery
Data recoveryData recovery
Data recovery
bhaumik_c
 
Collecting and preserving digital evidence
Collecting and preserving digital evidenceCollecting and preserving digital evidence
Collecting and preserving digital evidence
Online
 
Data recovery
Data recoveryData recovery
Data recovery
gupta8741
 
Log based and Recovery with concurrent transaction
Log based and Recovery with concurrent transactionLog based and Recovery with concurrent transaction
Log based and Recovery with concurrent transaction
nikunjandy
 
Database backup and recovery
Database backup and recoveryDatabase backup and recovery
Database backup and recovery
Anne Lee
 
2.6 backup and recovery
2.6 backup and recovery2.6 backup and recovery
2.6 backup and recovery
mrmwood
 
Backup And Recovery
Backup And RecoveryBackup And Recovery
Backup And Recovery
Wynthorpe
 
Disaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesDisaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup Strategies
Spiceworks
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensics
Rahul Baghla
 
database recovery techniques
database recovery techniques database recovery techniques
database recovery techniques
Kalhan Liyanage
 
Database recovery techniques
Database recovery techniquesDatabase recovery techniques
Database recovery techniques
pusp220
 
17. Recovery System in DBMS
17. Recovery System in DBMS17. Recovery System in DBMS
17. Recovery System in DBMS
koolkampus
 
Presentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyyPresentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyy
Tehmina Gulfam
 
Data recovery from storage device
Data recovery from storage deviceData recovery from storage device
Data recovery from storage device
Mohit Shah
 
03 backup-and-recovery
03 backup-and-recovery03 backup-and-recovery
03 backup-and-recovery
hunny garg
 
Data recovery
Data recoveryData recovery
Data recovery
bhaumik_c
 
Collecting and preserving digital evidence
Collecting and preserving digital evidenceCollecting and preserving digital evidence
Collecting and preserving digital evidence
Online
 
Data recovery
Data recoveryData recovery
Data recovery
gupta8741
 
Log based and Recovery with concurrent transaction
Log based and Recovery with concurrent transactionLog based and Recovery with concurrent transaction
Log based and Recovery with concurrent transaction
nikunjandy
 
Database backup and recovery
Database backup and recoveryDatabase backup and recovery
Database backup and recovery
Anne Lee
 
2.6 backup and recovery
2.6 backup and recovery2.6 backup and recovery
2.6 backup and recovery
mrmwood
 
Backup And Recovery
Backup And RecoveryBackup And Recovery
Backup And Recovery
Wynthorpe
 
Disaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesDisaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup Strategies
Spiceworks
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensics
Rahul Baghla
 
Ad

Similar to 03 Data Recovery - Notes (20)

Streamlining Backup: Enhancing Data Protection with Backup Appliances
Streamlining Backup: Enhancing Data Protection with Backup AppliancesStreamlining Backup: Enhancing Data Protection with Backup Appliances
Streamlining Backup: Enhancing Data Protection with Backup Appliances
MaryJWilliams2
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backups
Dell World
 
Generic RLM White Paper
Generic RLM White PaperGeneric RLM White Paper
Generic RLM White Paper
Mike Mendola ([email protected])
 
Positioning IBM Flex System 16 Gb Fibre Channel Fabric for Storage-Intensive ...
Positioning IBM Flex System 16 Gb Fibre Channel Fabric for Storage-Intensive ...Positioning IBM Flex System 16 Gb Fibre Channel Fabric for Storage-Intensive ...
Positioning IBM Flex System 16 Gb Fibre Channel Fabric for Storage-Intensive ...
IBM India Smarter Computing
 
IBM PROTECTIER: FROM BACKUP TO RECOVERY
IBM PROTECTIER: FROM BACKUP TO RECOVERYIBM PROTECTIER: FROM BACKUP TO RECOVERY
IBM PROTECTIER: FROM BACKUP TO RECOVERY
IBM India Smarter Computing
 
[IC Manage] Workspace Acceleration & Network Storage Reduction
[IC Manage] Workspace Acceleration & Network Storage Reduction[IC Manage] Workspace Acceleration & Network Storage Reduction
[IC Manage] Workspace Acceleration & Network Storage Reduction
Perforce
 
Combining IBM Real-time Compression and IBM ProtecTIER Deduplication
Combining IBM Real-time Compression and IBM ProtecTIER DeduplicationCombining IBM Real-time Compression and IBM ProtecTIER Deduplication
Combining IBM Real-time Compression and IBM ProtecTIER Deduplication
IBM India Smarter Computing
 
Tape Storage Future Directions and the Data Explosion
Tape Storage Future Directions and the Data ExplosionTape Storage Future Directions and the Data Explosion
Tape Storage Future Directions and the Data Explosion
IBM India Smarter Computing
 
Storage Area Networks Unit 1 Notes
Storage Area Networks Unit 1 NotesStorage Area Networks Unit 1 Notes
Storage Area Networks Unit 1 Notes
Sudarshan Dhondaley
 
Final Ucat Ppt
Final Ucat PptFinal Ucat Ppt
Final Ucat Ppt
lionqueen1985
 
Deduplication on Encrypted Big Data in HDFS
Deduplication on Encrypted Big Data in HDFSDeduplication on Encrypted Big Data in HDFS
Deduplication on Encrypted Big Data in HDFS
IRJET Journal
 
Backup and recovery_redesign
Backup and recovery_redesignBackup and recovery_redesign
Backup and recovery_redesign
georgegaudi
 
Case Study British Red Cross 161257
Case Study British Red Cross 161257Case Study British Red Cross 161257
Case Study British Red Cross 161257
AsigraCloudBackup
 
EVALUATE DATABASE COMPRESSION PERFORMANCE AND PARALLEL BACKUP
EVALUATE DATABASE COMPRESSION PERFORMANCE AND PARALLEL BACKUPEVALUATE DATABASE COMPRESSION PERFORMANCE AND PARALLEL BACKUP
EVALUATE DATABASE COMPRESSION PERFORMANCE AND PARALLEL BACKUP
IJDMS
 
An Overview of Security in Distributed Database Management System
An Overview of Security in Distributed Database Management SystemAn Overview of Security in Distributed Database Management System
An Overview of Security in Distributed Database Management System
IJSRD
 
NetBackup Appliance Family presentation
NetBackup Appliance Family presentationNetBackup Appliance Family presentation
NetBackup Appliance Family presentation
Symantec
 
Authenticated Transfer of Files with Storage and Backup within a Cloud Enviro...
Authenticated Transfer of Files with Storage and Backup within a Cloud Enviro...Authenticated Transfer of Files with Storage and Backup within a Cloud Enviro...
Authenticated Transfer of Files with Storage and Backup within a Cloud Enviro...
IRJET Journal
 
Data De-Duplication Engine for Efficient Storage Management
Data De-Duplication Engine for Efficient Storage ManagementData De-Duplication Engine for Efficient Storage Management
Data De-Duplication Engine for Efficient Storage Management
IRJET Journal
 
A cloud enviroment for backup and data storage
A cloud enviroment for backup and data storageA cloud enviroment for backup and data storage
A cloud enviroment for backup and data storage
IGEEKS TECHNOLOGIES
 
Computer_ Forensics_ Evidence& Capturing.ppt
Computer_ Forensics_ Evidence& Capturing.pptComputer_ Forensics_ Evidence& Capturing.ppt
Computer_ Forensics_ Evidence& Capturing.ppt
ChSamson2
 
Streamlining Backup: Enhancing Data Protection with Backup Appliances
Streamlining Backup: Enhancing Data Protection with Backup AppliancesStreamlining Backup: Enhancing Data Protection with Backup Appliances
Streamlining Backup: Enhancing Data Protection with Backup Appliances
MaryJWilliams2
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backups
Dell World
 
Positioning IBM Flex System 16 Gb Fibre Channel Fabric for Storage-Intensive ...
Positioning IBM Flex System 16 Gb Fibre Channel Fabric for Storage-Intensive ...Positioning IBM Flex System 16 Gb Fibre Channel Fabric for Storage-Intensive ...
Positioning IBM Flex System 16 Gb Fibre Channel Fabric for Storage-Intensive ...
IBM India Smarter Computing
 
[IC Manage] Workspace Acceleration & Network Storage Reduction
[IC Manage] Workspace Acceleration & Network Storage Reduction[IC Manage] Workspace Acceleration & Network Storage Reduction
[IC Manage] Workspace Acceleration & Network Storage Reduction
Perforce
 
Combining IBM Real-time Compression and IBM ProtecTIER Deduplication
Combining IBM Real-time Compression and IBM ProtecTIER DeduplicationCombining IBM Real-time Compression and IBM ProtecTIER Deduplication
Combining IBM Real-time Compression and IBM ProtecTIER Deduplication
IBM India Smarter Computing
 
Tape Storage Future Directions and the Data Explosion
Tape Storage Future Directions and the Data ExplosionTape Storage Future Directions and the Data Explosion
Tape Storage Future Directions and the Data Explosion
IBM India Smarter Computing
 
Storage Area Networks Unit 1 Notes
Storage Area Networks Unit 1 NotesStorage Area Networks Unit 1 Notes
Storage Area Networks Unit 1 Notes
Sudarshan Dhondaley
 
Deduplication on Encrypted Big Data in HDFS
Deduplication on Encrypted Big Data in HDFSDeduplication on Encrypted Big Data in HDFS
Deduplication on Encrypted Big Data in HDFS
IRJET Journal
 
Backup and recovery_redesign
Backup and recovery_redesignBackup and recovery_redesign
Backup and recovery_redesign
georgegaudi
 
Case Study British Red Cross 161257
Case Study British Red Cross 161257Case Study British Red Cross 161257
Case Study British Red Cross 161257
AsigraCloudBackup
 
EVALUATE DATABASE COMPRESSION PERFORMANCE AND PARALLEL BACKUP
EVALUATE DATABASE COMPRESSION PERFORMANCE AND PARALLEL BACKUPEVALUATE DATABASE COMPRESSION PERFORMANCE AND PARALLEL BACKUP
EVALUATE DATABASE COMPRESSION PERFORMANCE AND PARALLEL BACKUP
IJDMS
 
An Overview of Security in Distributed Database Management System
An Overview of Security in Distributed Database Management SystemAn Overview of Security in Distributed Database Management System
An Overview of Security in Distributed Database Management System
IJSRD
 
NetBackup Appliance Family presentation
NetBackup Appliance Family presentationNetBackup Appliance Family presentation
NetBackup Appliance Family presentation
Symantec
 
Authenticated Transfer of Files with Storage and Backup within a Cloud Enviro...
Authenticated Transfer of Files with Storage and Backup within a Cloud Enviro...Authenticated Transfer of Files with Storage and Backup within a Cloud Enviro...
Authenticated Transfer of Files with Storage and Backup within a Cloud Enviro...
IRJET Journal
 
Data De-Duplication Engine for Efficient Storage Management
Data De-Duplication Engine for Efficient Storage ManagementData De-Duplication Engine for Efficient Storage Management
Data De-Duplication Engine for Efficient Storage Management
IRJET Journal
 
A cloud enviroment for backup and data storage
A cloud enviroment for backup and data storageA cloud enviroment for backup and data storage
A cloud enviroment for backup and data storage
IGEEKS TECHNOLOGIES
 
Computer_ Forensics_ Evidence& Capturing.ppt
Computer_ Forensics_ Evidence& Capturing.pptComputer_ Forensics_ Evidence& Capturing.ppt
Computer_ Forensics_ Evidence& Capturing.ppt
ChSamson2
 
Ad

Recently uploaded (20)

K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public SchoolsK12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
dogden2
 
To study Digestive system of insect.pptx
To study Digestive system of insect.pptxTo study Digestive system of insect.pptx
To study Digestive system of insect.pptx
Arshad Shaikh
 
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Library Association of Ireland
 
Multi-currency in odoo accounting and Update exchange rates automatically in ...
Multi-currency in odoo accounting and Update exchange rates automatically in ...Multi-currency in odoo accounting and Update exchange rates automatically in ...
Multi-currency in odoo accounting and Update exchange rates automatically in ...
Celine George
 
How to Set warnings for invoicing specific customers in odoo
How to Set warnings for invoicing specific customers in odooHow to Set warnings for invoicing specific customers in odoo
How to Set warnings for invoicing specific customers in odoo
Celine George
 
2541William_McCollough_DigitalDetox.docx
2541William_McCollough_DigitalDetox.docx2541William_McCollough_DigitalDetox.docx
2541William_McCollough_DigitalDetox.docx
contactwilliamm2546
 
Social Problem-Unemployment .pptx notes for Physiotherapy Students
Social Problem-Unemployment .pptx notes for Physiotherapy StudentsSocial Problem-Unemployment .pptx notes for Physiotherapy Students
Social Problem-Unemployment .pptx notes for Physiotherapy Students
DrNidhiAgarwal
 
Biophysics Chapter 3 Methods of Studying Macromolecules.pdf
Biophysics Chapter 3 Methods of Studying Macromolecules.pdfBiophysics Chapter 3 Methods of Studying Macromolecules.pdf
Biophysics Chapter 3 Methods of Studying Macromolecules.pdf
PKLI-Institute of Nursing and Allied Health Sciences Lahore , Pakistan.
 
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Library Association of Ireland
 
New Microsoft PowerPoint Presentation.pptx
New Microsoft PowerPoint Presentation.pptxNew Microsoft PowerPoint Presentation.pptx
New Microsoft PowerPoint Presentation.pptx
milanasargsyan5
 
Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...
Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...
Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...
Library Association of Ireland
 
Stein, Hunt, Green letter to Congress April 2025
Stein, Hunt, Green letter to Congress April 2025Stein, Hunt, Green letter to Congress April 2025
Stein, Hunt, Green letter to Congress April 2025
Mebane Rash
 
Presentation on Tourism Product Development By Md Shaifullar Rabbi
Presentation on Tourism Product Development By Md Shaifullar RabbiPresentation on Tourism Product Development By Md Shaifullar Rabbi
Presentation on Tourism Product Development By Md Shaifullar Rabbi
Md Shaifullar Rabbi
 
apa-style-referencing-visual-guide-2025.pdf
apa-style-referencing-visual-guide-2025.pdfapa-style-referencing-visual-guide-2025.pdf
apa-style-referencing-visual-guide-2025.pdf
Ishika Ghosh
 
Introduction to Vibe Coding and Vibe Engineering
Introduction to Vibe Coding and Vibe EngineeringIntroduction to Vibe Coding and Vibe Engineering
Introduction to Vibe Coding and Vibe Engineering
Damian T. Gordon
 
SPRING FESTIVITIES - UK AND USA -
SPRING FESTIVITIES - UK AND USA            -SPRING FESTIVITIES - UK AND USA            -
SPRING FESTIVITIES - UK AND USA -
Colégio Santa Teresinha
 
Ultimate VMware 2V0-11.25 Exam Dumps for Exam Success
Ultimate VMware 2V0-11.25 Exam Dumps for Exam SuccessUltimate VMware 2V0-11.25 Exam Dumps for Exam Success
Ultimate VMware 2V0-11.25 Exam Dumps for Exam Success
Mark Soia
 
P-glycoprotein pamphlet: iteration 4 of 4 final
P-glycoprotein pamphlet: iteration 4 of 4 finalP-glycoprotein pamphlet: iteration 4 of 4 final
P-glycoprotein pamphlet: iteration 4 of 4 final
bs22n2s
 
pulse ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
pulse  ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulsepulse  ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
pulse ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
sushreesangita003
 
Metamorphosis: Life's Transformative Journey
Metamorphosis: Life's Transformative JourneyMetamorphosis: Life's Transformative Journey
Metamorphosis: Life's Transformative Journey
Arshad Shaikh
 
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public SchoolsK12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
dogden2
 
To study Digestive system of insect.pptx
To study Digestive system of insect.pptxTo study Digestive system of insect.pptx
To study Digestive system of insect.pptx
Arshad Shaikh
 
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Library Association of Ireland
 
Multi-currency in odoo accounting and Update exchange rates automatically in ...
Multi-currency in odoo accounting and Update exchange rates automatically in ...Multi-currency in odoo accounting and Update exchange rates automatically in ...
Multi-currency in odoo accounting and Update exchange rates automatically in ...
Celine George
 
How to Set warnings for invoicing specific customers in odoo
How to Set warnings for invoicing specific customers in odooHow to Set warnings for invoicing specific customers in odoo
How to Set warnings for invoicing specific customers in odoo
Celine George
 
2541William_McCollough_DigitalDetox.docx
2541William_McCollough_DigitalDetox.docx2541William_McCollough_DigitalDetox.docx
2541William_McCollough_DigitalDetox.docx
contactwilliamm2546
 
Social Problem-Unemployment .pptx notes for Physiotherapy Students
Social Problem-Unemployment .pptx notes for Physiotherapy StudentsSocial Problem-Unemployment .pptx notes for Physiotherapy Students
Social Problem-Unemployment .pptx notes for Physiotherapy Students
DrNidhiAgarwal
 
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Library Association of Ireland
 
New Microsoft PowerPoint Presentation.pptx
New Microsoft PowerPoint Presentation.pptxNew Microsoft PowerPoint Presentation.pptx
New Microsoft PowerPoint Presentation.pptx
milanasargsyan5
 
Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...
Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...
Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...
Library Association of Ireland
 
Stein, Hunt, Green letter to Congress April 2025
Stein, Hunt, Green letter to Congress April 2025Stein, Hunt, Green letter to Congress April 2025
Stein, Hunt, Green letter to Congress April 2025
Mebane Rash
 
Presentation on Tourism Product Development By Md Shaifullar Rabbi
Presentation on Tourism Product Development By Md Shaifullar RabbiPresentation on Tourism Product Development By Md Shaifullar Rabbi
Presentation on Tourism Product Development By Md Shaifullar Rabbi
Md Shaifullar Rabbi
 
apa-style-referencing-visual-guide-2025.pdf
apa-style-referencing-visual-guide-2025.pdfapa-style-referencing-visual-guide-2025.pdf
apa-style-referencing-visual-guide-2025.pdf
Ishika Ghosh
 
Introduction to Vibe Coding and Vibe Engineering
Introduction to Vibe Coding and Vibe EngineeringIntroduction to Vibe Coding and Vibe Engineering
Introduction to Vibe Coding and Vibe Engineering
Damian T. Gordon
 
Ultimate VMware 2V0-11.25 Exam Dumps for Exam Success
Ultimate VMware 2V0-11.25 Exam Dumps for Exam SuccessUltimate VMware 2V0-11.25 Exam Dumps for Exam Success
Ultimate VMware 2V0-11.25 Exam Dumps for Exam Success
Mark Soia
 
P-glycoprotein pamphlet: iteration 4 of 4 final
P-glycoprotein pamphlet: iteration 4 of 4 finalP-glycoprotein pamphlet: iteration 4 of 4 final
P-glycoprotein pamphlet: iteration 4 of 4 final
bs22n2s
 
pulse ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
pulse  ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulsepulse  ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
pulse ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
sushreesangita003
 
Metamorphosis: Life's Transformative Journey
Metamorphosis: Life's Transformative JourneyMetamorphosis: Life's Transformative Journey
Metamorphosis: Life's Transformative Journey
Arshad Shaikh
 

03 Data Recovery - Notes

  • 1. COMPUTER FORENSICS UNIT II – PART I 1 1. Data Recovery Defined  Data recovery is the process in which highly trained engineers evaluate and extract data from damaged media and return it in an intact format.  Many people, even computer experts, fail to recognize data recovery as an option during a data crisis. But it is possible to retrieve files that have been deleted and passwords that have been forgotten or to recover entire hard drives that have been physically damaged. 2. Data Back-up and Recovery ***** 2.1 Back-up Obstacles  Back-up Window: The back-up window is the period of time when back-ups can be run. The back-up window is generally timed to occur during nonproduction periods when network bandwidth and CPU utilization are low.  Network bandwidth: If a network cannot handle the impact of transporting hundreds of gigabytes of data over a short period of time, the organization’s centralized backup strategy is not viable.  System throughput: Three I/O bottlenecks are commonly found in traditional backup schemes. These are 1. The ability of the system being backed up to push data to the backup server 2. The ability of the backup server to accept data from multiple systems simultaneously 3. The available throughput of the tape device(s) onto which the data is moved  Lack-of Resources: Many companies fail to make appropriate investments in data protection until it is too late. 2.2 The Future of Data Back-up Successful data back-up and recovery is composed of four key elements: the backup server, the network, the backup window, and the backup storage device. THE BACK-UP SERVER  The backup server is responsible for managing the policies, schedules, media catalogs, and indexes associated with the systems it is configured to back up.  The systems being backed up are called clients. Data Recovery
  • 2. COMPUTER FORENSICS UNIT II – PART I 2  The overall performance of a backup or recovery was directly related to the ability of the backup server to handle the I/O load created by the backup process.  Tape servers allow administrators to divide the backup tasks across multiple systems while maintaining scheduling and administrative processes on a primary or backup server. This approach often involves attaching multiple tape servers to a shared tape library, which reduces the overall cost of the system.  The new backup architecture implements a serverless backup solution that allows data to be moved directly from disk to tape, bypassing the backup server altogether. This method of data backup removes the bottleneck of the backup server completely.  However, the performance of serverless backup is then affected by another potential bottleneck— bandwidth. A backup using a shared tape library A serverless backup system THE NETWORK DATA PATH  Centralization of a data-management process such as backup and recovery requires a robust and available network data path. The movement and management of hundreds or thousands of megabytes of data can put a strain on even the best-designed networks.  An enterprise-class backup solution can distribute backup services directly to the data source, while at the same time centralizing the administration of these resources.
  • 3. COMPUTER FORENSICS UNIT II – PART I 3  We can install a network path dedicated to the management and movement of data. This data path can be SCSI, Ethernet, ATM, fiber distributed data interface (FDDI), or fiber channel.  Creating a dedicated data path is the beginning of a storage area network (SAN).  SANs are quickly dominating the backup landscape, and applications such as serverless and LAN-less backup will continue to push this emerging technology forward.  Above Figure shows an example of a dedicated SAN topology. THE BACK-UP WINDOW  A backup window defines how much time is available to back up the network.  Most companies are managing too much data to complete backup during these ever-shrinking backup windows  The backup-software community has developed a way to overcome the element of time by using incremental backup, block-level backup, image backups, and data archiving. Incremental Backup Incremental backups only transfer data that has changed since the last backup. On average, no more than 5% of data in a file server changes daily. That means an incremental backup may only require 5% of the time it takes to back up the entire file system. A LAN-less back-up using remote tape server A storage are network using serverless back-up
  • 4. COMPUTER FORENSICS UNIT II – PART I 4 Block-Level Incremental Backup Rather than backing up entire files that have been modified since the last backup, only the blocks that have changed since the last backup are marked for backup. Image Backups This type of backup creates copies, or snapshots, of a file system at a particular point in time. Image backups are much faster than incremental backups and provide the ability to easily perform a bare bones recovery of a server without loading the operating systems, applications, and the like. Data Archiving Removing infrequently accessed data from a disk drive can reduce the size of a scheduled backup by up to 80%. Static data that has been archived is easily recalled when needed but does not add to the daily data backup requirements of the enterprise. BACK-UP STORAGE DEVICES  The most expensive item in a back-up project is the back-up storage device.  Determining the tape format, number of tape drives, and how many slots are required is predicted on many variables.  For best suitable back-up storage device we have to consider Back-up windows, growth rates, retention policies, duplicate tape copies, and network and server throughputs.  Tape libraries are sized using two variables: the number of tape drives, the number of slots.  Tape libraries today are available with 5 to 50,000 slots and can support anywhere from 1 to 256 tape-drives. The following table compares several different tape technologies: Technology Capacity (Native/Compressed) Max Transmission Rate (Native/Compressed) Mammoth-2 60GB/150GB 12 Mbps/30 Mbps AIT-3 100GB/250GB 12 Mbps/30Mbps Super DLT 110GB/220GB 10 Mbps/20Mbps LTO Ultrium 340GB/680GB 20 Mbps/40 Mbps AIT – Advanced Intelligent Tape; DLT – Digital Audio Tape; LTO – Linear Tape Open
  • 5. COMPUTER FORENSICS UNIT II – PART I 5 RECOMMENDED BACK-UP FEATURES  Data Interleaving: To back up multiple systems concurrently, the backup application must be able to write data from multiple clients to tape in an interleaved manner.  Remote Back-up: Many remote systems are exposed to unrecoverable data loss. A backup application should have a method to back up systems across a WAN or over dial-up connections  Global Monitoring: A robust backup application should be able to support reporting and administration of any backup system, regardless of location.  Performance: An enterprise backup application should be able to benchmark backup data rates exceeding one terabyte per hour. 3. The Role of Back-up in Data Recovery **** There are many factors that affect back-up. For example:  Storage costs are decreasing: The cost per megabyte of primary (online) storage has fallen dramatically over the past several years and continues to do so as disk drive technologies advance.  Systems have to be on-line continuously: Because systems must be continuously online, the dilemma becomes that you can no longer take files offline long enough to perform backup.  The role of Back-up has changed: The role of backup now includes the responsibility for recovering user errors and ensuring that good data has been saved and can quickly be restored. CONVENTIONAL TAPE BACK-UP IN TODAY’S MARKET  A typical tape management system consists of a dedicated workstation with the front-end interfaced to the network and the back-end controlling a repository of tape devices. The media server runs tape management software. It can administer backup devices throughout an enterprise and can run continuous parallel backups and restores.  An alternative to tape backup is to physically replicate or mirror all data and keep two copies online at all times. The advantage is that the data does not have to be restored, so there are no issues with immediate data availability.
  • 6. COMPUTER FORENSICS UNIT II – PART I 6 ISSUES WITH TODAY’S BACK-UP  NETWORK BACKUP creates network performance problems. Using the production network to carry backup data, as well as for normal user data access, can severely overburden today’s busy network resources.  OFFLINE BACKUP affects data accessibility. The time that the host is offline for data backup must be minimized. This requires extremely high-speed, continuous parallel backup of the raw image of the data.  LIVE BACKUPS allow data access during the backup process but affect performance. The downside to the live backup is that it puts a tremendous burden on the host.  MIRRORING doesn’t protect against user error and replication of bad data. Fully replicated online data sounds great, albeit at twice the cost per megabyte of a single copy of online data. NEW ARCHITECTURES AND TECHNIQUES ARE REQUIRED  Backup at extremely high speed is required. Recovery must be available at file level. The time that systems off-line for back-up must be eliminated.  Remote hot recovery sites are needed for immediate resumption of data access. Backup of critical data is still required to ensure against data errors and user errors.  To achieve effective backup and recovery, the decoupling of data from its storage space is needed.  It is necessary to develop techniques to journal modified pages, so that journaling can be invoked within the primary storage device, without host intervention.  Part of the primary storage area must be set aside for data to be backed up. This area must be as large as the largest backup block. We should have fast nonrandom restoration of critical data. 4. The Data Recovery Solution ***** 4.1 SHRINKING EXPERTISE, GROWING COMPLEXITY The complex systems that have evolved over the past 30 years must be monitored, managed, controlled, and optimized. But most of the bright young graduates this term haven’t had much exposure to mainframe concepts. Backups often take place while an application is running. Application changes take place on the fly. If an outage occurs, the company stands to lose tens of thousands of dollars an hour.
  • 7. COMPUTER FORENSICS UNIT II – PART I 7 FAILURES: Disk storage is more reliable than ever, but hardware failures are still possible. A simple mistake can be made by an application programmer, system programmer, or operations person. Logic errors in programs or application of the wrong update at the wrong time can result in a system crash or, worse. Disasters do really occurs! Floods, tornadoes, earthquakes, tsunamis, and even terrorism can do strike. We must be ready. 4.2 BUDGETS AND DOWNTIME We have fewer resources (people, processing power, time, and money) to do more work than ever before, and we must keep your expenses under control. Systems must remain available to make money and serve customers. Downtime is much too expensive to be tolerated. 4.3 RECOVERY: THINK BEFORE YOU BACK-UP One of the most critical data-management tasks involves recovering data in the event of a problem. You must evaluate your preparations, make sure that all resources are available in usable condition, automate processes as much as possible, and make sure you have the right kind of resources.  Evaluate your preparation If all of the resources (image copies, change accumulations, and logs) are available at recovery time, these preparations certainly allow for a standard recovery. Finding out at recovery time that some critical resource is missing can be disastrous!  Don’t let your resources fall through the cracks Identifying different types of conditions is critical to ensuring a successful recovery. Checking your assets to make sure they’re ready should be part of your plan.  Automated Recovery With proper planning and automation, recovery is made possible, reliance on specific personnel is reduced, and the human-error factor is nearly eliminated. Data integrity and your business relay on building recovery job control language (JCL). In the event of a disaster, the Information Management System (IMS) recovery control (RECON) data sets must be modified in preparation for the recovery. Cleaning your RECON data sets can take hours if done manually, and it’s an error-prone process.
  • 8. COMPUTER FORENSICS UNIT II – PART I 8  Make Recoveries Efficient Multithreading tasks shorten the recovery process. Recovering multiple databases with one pass through your log data certainly will save time. Taking image copies, rebuilding indexes, and validating pointers concurrently with the recovery process further reduce downtime.  Take Back-ups The first step to a successful recovery is the backup of your data. Your goal in backing up data is to do so quickly, efficiently, and usually with minimal impact to your customers. You might need only very brief out-ages to take instant copies of your data, or you might have intelligent storage devices that allow you to take a snapshot of your data. Both methods call for tools to assist in the management of resources. 4.4 BACK-UP AND RECOVERY SOLUTION BMC software has developed a model called the Back-up and Recovery Solution (BRS) for the Information Management System (IMS) product. 4.4.1 Image Copy  BRS contains an Image Copy component to help manage your image copy process. BRS can take batch, on-line (fuzzy), or incremental image copies; Snapshot copies; or Instant Snapshot copies.  The Image Copy component of BRS offers a variety of powerful features: dynamic allocation of all input and output data sets, stacking of output data sets, high performance access methods (faster I/O), copying by volume, compression of output image copies, and database group processing--- all while interfacing with DBRC and processing asynchronously. 4.4.2 Change Accumulation  The BRS Change Accumulation component takes advantage of multiple engines, large virtual storage resources, and high-speed channels and controllers that are available in many environments.  Use of multiple tack control block (TCB) structures enables overlapping of as much processing as possible, reducing both elapsed and CPU time.
  • 9. COMPUTER FORENSICS UNIT II – PART I 9 4.4.3 Recovery The BRS Recovery component, which functionally replaces the IMS Database Recovery utility for null- function (DL/I) databases and data-entry databases (DEDBs), allow recovery of multiple databases with one pass of the log and change accumulation data sets while dynamically allocating all data sets required for recovery. BRS recovers multiple databases to any point in time. BRS can determine the best choice for a Point-in- Time (PIT) recovery. Full DBRS support includes: RECOVERY MANAGER  Recovery Manager component lets you automate and synchronize recoveries across applications and databases by creating meaningful groups of related databases and creating optimized JCL to perform the recovery of these groups.  Recovery Manager component provides a positive response for the IMS commands that are used to deallocate and start your databases.  Recovery Manager component fully automates the process of cleaning the RECON data sets for restart following a disaster recovery.  Recovery Manager component also allows you to test your recovery strategy and notifies you when media errors have jeopardized your recovery resources. POINTER CHECKING  BRS offers the capability to verify the validity of database pointers through the Concurrent Pointer Checking function for both full-function databases and Fast Path data-entry databases (DEDBs). INDEX REBUILD  If indexes are ever damaged or lost, the Index Rebuild function of BRS allows you rebuild them rather than recover them. RECOVERY ADVISOR  The Recovery Advisor component of BRS allows you to monitor the frequency of your image copies and change accumulations.  It helps you to determine whether all your databases are being backed-up. By using any number of back-up and recovery tools available, you can better manage your world and be ready to recover! SOURCE: COMPUTER FORENSICS: COMPUTER CRIME SCENE INVESTIGATION, JOHN VACCA Send your feedback to [email protected]