network+ 6th edition chapter 14
DESCRIPTION
The presentations cover the objectives found in the opening of each chapter. All chapter objectives are listed in the beginning of each presentation. You may customize the presentations to fit your class needs. Some figures from the chapters are included. A complete set of images from the book can be found on the Instructor Resources Website. Course Technology - CENGAGE LearningTRANSCRIPT
![Page 1: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/1.jpg)
Network+ Guide to Networks6th Edition
Chapter 14Ensuring Integrity and Availability
![Page 2: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/2.jpg)
Objectives
• Identify the characteristics of a network that keep data safe from loss or damage
• Protect an enterprise-wide network from malware• Explain fault-tolerance techniques for storage,
network design, connectivity devices, naming and addressing services, and servers
• Discuss best practices for network backup and recovery
• Describe the components of a useful disaster recovery plan and the options for disaster contingencies
Network+ Guide to Networks, 6th Edition 2
![Page 3: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/3.jpg)
What Are Integrity and Availability?
• Integrity– Soundness of network’s programs, data, services,
devices, connections• Availability
– How consistently and reliably a file or system can be accessed
• Uptime– Measure of time functioning normally between failures– Often expressed as percent uptime
Network+ Guide to Networks, 6th Edition 3
![Page 4: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/4.jpg)
Network+ Guide to Networks, 6th Edition 4
Table 14-1 Availability and downtime equivalents
Courtesy Course Technology/Cengage Learning
![Page 5: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/5.jpg)
What Are Integrity and Availability? (cont’d.)
• Integrity and availability compromised by:– Security breaches– Natural disasters– Malicious intruders– Power flaws– Human error
• Follow guidelines to keep network highly available– See Pages 646-647 of text
Network+ Guide to Networks, 6th Edition 5
![Page 6: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/6.jpg)
Malware
• Malicious software• Program designed to intrude upon or harm system,
resources– Examples: viruses, Trojan horses, worms, bots
• Virus– Replicating program intent to infect more computers– Copied to system without user knowledge– Replicates through network connections or exchange
of external storage devices
Network+ Guide to Networks, 6th Edition 6
![Page 7: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/7.jpg)
Malware (cont’d.)
• Trojan horse (Trojan)– Program that disguises itself as something useful
• Actually harms your system
Network+ Guide to Networks, 6th Edition 7
![Page 8: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/8.jpg)
Malware Types and Characteristics
• Malware categorized by location and propagation method– Boot sector viruses– Macro viruses– File-infector viruses– Worms– Trojan horses– Network viruses– Bots
Network+ Guide to Networks, 6th Edition 8
![Page 9: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/9.jpg)
Malware Types and Characteristics (cont’d.)
• Malware characteristics– Encryption
• Some viruses, worms, Trojan horses– Stealth
• Hidden to prevent detection• Disguised as legitimate programs
– Polymorphism• Change characteristics every time they transfer to new
system• Use complicated algorithms; incorporate nonsensical
commands
Network+ Guide to Networks, 6th Edition 9
![Page 10: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/10.jpg)
Malware Types and Characteristics (cont’d.)
• Malware characteristics (cont’d.)– Time dependence
• Programmed to activate on particular date• Can remain dormant and harmless until date arrives• Logic bombs: programs designed to start when certain
conditions met
• Malware can exhibit more than one characteristic
Network+ Guide to Networks, 6th Edition 10
![Page 11: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/11.jpg)
Malware Protection
• Effective malware protection requires:– Choosing appropriate anti-malware program– Monitoring network– Continually updating anti-malware program– Educating users
Network+ Guide to Networks, 6th Edition 11
![Page 12: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/12.jpg)
Malware Protection (cont’d.)
• Malware leaves evidence– Some detectable only by anti-malware software– User symptoms
• Unexplained file size increases• Significant, unexplained system performance decline• Unusual error messages• Significant, unexpected system memory loss• Periodic, unexpected rebooting• Display quality fluctuations
• Malware often discovered after damage done
Network+ Guide to Networks, 6th Edition 12
![Page 13: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/13.jpg)
Malware Protection (cont’d.)
• Anti-malware key software functions– Signature scanning
• Compares file’s content with known malware signatures– Integrity checking
• Compares current file characteristics against archived version
– Monitoring unexpected file changes– Receive regular updates from central network console– Consistently report valid instances of malware
Network+ Guide to Networks, 6th Edition 13
![Page 14: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/14.jpg)
Malware Protection (cont’d.)
• Anti-malware software implementation– Dependent upon environment’s needs
• Key: deciding where to install software– Desktop machines– Server
• Balance protection with performance impact
Network+ Guide to Networks, 6th Edition 14
![Page 15: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/15.jpg)
Malware Protection (cont’d.)
• Anti-malware policies– Rules for using anti-malware software– Rules for installing programs, sharing files, using
external disks• Management should authorize and support policy• Anti-malware policy guidelines
– See Pages 651-652 of text• Measures designed to protect network from
damage, downtime
Network+ Guide to Networks, 6th Edition 15
![Page 16: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/16.jpg)
Fault Tolerance
• Capacity for system to continue performing– Despite unexpected hardware, software malfunction
• Failure– Deviation from specified system performance level
• Given time period
• Fault– Malfunction of one system component– Can result in failure
• Fault-tolerant system goal– Prevent faults from progressing to failures
Network+ Guide to Networks, 6th Edition 16
![Page 17: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/17.jpg)
Fault Tolerance (cont’d.)
• Degrees of fault tolerance– Optimal level depends on file or service criticality– Highest level
• System remains unaffected by most drastic problem
Network+ Guide to Networks, 6th Edition 17
![Page 18: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/18.jpg)
Environment
• Consider network device environment• Protect devices from:
– Excessive heat, moisture• Use temperature, humidity monitors
– Break-ins– Natural disasters
Network+ Guide to Networks, 6th Edition 18
![Page 19: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/19.jpg)
Power
• Blackout– Complete power loss
• Brownout– Temporary dimming of lights
• Causes– Forces of nature– Utility company maintenance, construction
• Solution– Alternate power sources
Network+ Guide to Networks, 6th Edition 19
![Page 20: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/20.jpg)
Power (cont’d.)
• Power flaws not tolerated by networks• Types of power flaws that create damage
– Surge• Momentary increase in voltage
– Noise• Fluctuation in voltage levels
– Brownout• Momentary voltage decrease
– Blackout• Complete power loss
Network+ Guide to Networks, 6th Edition 20
![Page 21: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/21.jpg)
Power (cont’d.)
• Uninterruptible power supplies (UPSs)– Battery-operated power source– Directly attached to one or more devices– Attached to a power supply– Prevents harm to device, service interruption
• UPS categories– Standby – Online
Network+ Guide to Networks, 6th Edition 21
![Page 22: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/22.jpg)
Power (cont’d.)
• Standby UPS (offline UPS)– Provides continuous voltage– Switches instantaneously to battery upon power loss– Restores power– Problems
• Time to detect power loss• Device may have shut down or restarted
Network+ Guide to Networks, 6th Edition 22
![Page 23: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/23.jpg)
Power (cont’d.)
• Online UPS– A/C power continuously charges battery– No momentary service loss risk– Handles noise, surges, sags
• Before power reaches attached device– More expensive than standby UPSs
• Factors to consider when choosing UPS– Amount of power needed– Period of time to keep device running– Line conditioning– Cost
Network+ Guide to Networks, 6th Edition 23
![Page 24: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/24.jpg)
Network+ Guide to Networks, 6th Edition 24
Figure 14-1 Standby and online UPSs
Courtesy of Schneider Electric
![Page 25: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/25.jpg)
Power (cont’d.)
• Generators– Powered by diesel, liquid propane, gas, natural gas,
or steam– Do not provide surge protection– Provide electricity free from noise– Used in highly available environments
• Generator choice– Calculate organization’s crucial electrical demands– Determine generator’s optimal size
Network+ Guide to Networks, 6th Edition 25
![Page 26: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/26.jpg)
Network+ Guide to Networks, 6th Edition 26
Figure 14-2 UPSs and a generator in a network design
Courtesy Course Technology/Cengage Learning
![Page 27: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/27.jpg)
Network Design
• Supply multiple paths for data travel• Topology
– LAN: star topology and parallel backbone provide greatest fault tolerance
– WAN: full-mesh topology– SONET technology
• Uses two fiber rings for every connection• Can easily recover from fault in one of its links
Network+ Guide to Networks, 6th Edition 27
![Page 28: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/28.jpg)
Network+ Guide to Networks, 6th Edition 28
Figure 14-3 Full-mesh WAN
Courtesy Course Technology/Cengage Learning
![Page 29: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/29.jpg)
Network Design (cont’d.)
• Review PayNTime example on Pages 657-658• Possible solutions: supply duplicate connection
– Use different service carriers– Use two different routes
• Critical data transactions follow more than one path
• Network redundancy advantages– Reduces network fault risk
• Lost functionality, profits
• Disadvantage: cost
Network+ Guide to Networks, 6th Edition 29
![Page 30: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/30.jpg)
Network Design (cont’d.)
• Scenario: two critical links– Capacity, scalability concerns– Solution
• Partner with ISP• Establish secure VPNs
– See Figure 14-4
Network+ Guide to Networks, 6th Edition 30
![Page 31: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/31.jpg)
Network+ Guide to Networks, 6th Edition 31
Figure 14-4 VPNs linking multiple customers
Courtesy Course Technology/Cengage Learning
![Page 32: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/32.jpg)
Network Design (cont’d.)
• Scenario– Devices connect one LAN, WAN segment to another
• Experience a fault– VPN agreement with national ISP
• Single T1 link supports five customers
Network+ Guide to Networks, 6th Edition 32
Figure 14-5 Single T1 connectivityCourtesy Course Technology/Cengage Learning
![Page 33: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/33.jpg)
Network Design (cont’d.)
• Problem with arrangement of Figure 14-5– Many single points of failure
• T1 link failure• Firewall, router, CSU/DSU, multiplexer, or switch
• Solution– Redundant devices with automatic failover– Hot swappable devices
• Immediately assume identical component duties
• Cold spare– Duplicate device on hand, not installed
Network+ Guide to Networks, 6th Edition 33
![Page 34: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/34.jpg)
Network+ Guide to Networks, 6th Edition 34
Figure 14-6 Fully redundant T1 connectivity
Courtesy Course Technology/Cengage Learning
![Page 35: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/35.jpg)
Network Design (cont’d.)
• Failover capable or hot swappable components– Desired for switches or routers supporting critical links– Adds to device cost
• Link aggregation (bonding)– Combination of multiple network interfaces to act as
one logical interface– Example: NIC teaming
• Load balancing– Automatic traffic distribution over multiple components
or links
Network+ Guide to Networks, 6th Edition 35
![Page 36: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/36.jpg)
Network+ Guide to Networks, 6th Edition 36
Figure 14-7 Link aggregation between a switch and server
Courtesy Course Technology/Cengage Learning
![Page 37: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/37.jpg)
Network Design (cont’d.)
• Naming and addressing services– Failure causes nearly all traffic to come to a halt
• Solution: maintain redundant name servers• DNS caching servers
– Allows local name resolution– Faster performance– Reduces burden on master name server
Network+ Guide to Networks, 6th Edition 37
![Page 38: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/38.jpg)
Network+ Guide to Networks, 6th Edition 38
Figure 14-8 Redundant name servers
Courtesy Course Technology/Cengage Learning
![Page 39: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/39.jpg)
Network Design (cont’d.)
• DNS can point to redundant locations for each host name– Use different IP addresses that all point to identical
Web servers• Round-robin DNS
– Use each IP address sequentially• Load balancer
– Dedicated device for intelligent traffic distribution– Considers traffic levels when forwarding requests
Network+ Guide to Networks, 6th Edition 39
![Page 40: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/40.jpg)
Network+ Guide to Networks, 6th Edition 40
Figure 14-9 Redundant entries in a DNS zone file
Courtesy Course Technology/Cengage Learning
![Page 41: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/41.jpg)
Network Design (cont’d.)
• CARP (Common Address Redundancy Protocol)– Allows pool of computers to share IP addresses– Master computer receives request
• Parcels out request to one of several group computers
Network+ Guide to Networks, 6th Edition 41
![Page 42: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/42.jpg)
Network+ Guide to Networks, 6th Edition 42
Figure 14-10 Round-robin DNS with CARP
Courtesy Course Technology/Cengage Learning
![Page 43: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/43.jpg)
Servers
• Critical servers– Contain redundant components
• Provide fault tolerance, load balancing
• Server mirroring– Fault-tolerance technique– One device, component duplicates another's activities– Uses identical servers, components– High-speed link between servers– Synchronization software– Form of replication
• Dynamic copying of data from one location to anotherNetwork+ Guide to Networks, 6th Edition 43
![Page 44: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/44.jpg)
Servers (cont’d.)
• Server mirroring advantage– Flexibility in server location
• Disadvantages– Time delay for mirrored server to assume functionality– Toll on network as data copied between sites
• Hardware and software costs– May be justifiable
Network+ Guide to Networks, 6th Edition 44
![Page 45: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/45.jpg)
Servers (cont’d.)
• Clustering– Links multiple servers together
• Act as single server
• Clustered servers share processing duties– Appear as single server to users
• Failure of one server– Others take over
• More cost-effective than mirroring– For large networks
Network+ Guide to Networks, 6th Edition 45
![Page 46: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/46.jpg)
Servers (cont’d.)
• Clustering advantages over mirroring– Each clustered server
• Performs data processing• Always ready to take over
– Reduces ownership costs– Improves performance
Network+ Guide to Networks, 6th Edition 46
![Page 47: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/47.jpg)
Storage
• Data storage– Issues of availability and fault tolerance apply
• Various methods available– Ensure shared data and applications never lost or
irretrievable• RAID (Redundant Array of Independent [or
Inexpensive] Disks)– Collection of disks– Provide shared data, application fault tolerance
Network+ Guide to Networks, 6th Edition 47
![Page 48: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/48.jpg)
Storage (cont’d.)
• Disk array (drive)– Group of hard disks
• RAID drive (RAID array)– Collection of disks working in a RAID configuration– Single logical drive
Network+ Guide to Networks, 6th Edition 48
![Page 49: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/49.jpg)
Storage (cont’d.)
• Hardware RAID– Set of disks, separate disk controller– RAID array managed exclusively by RAID disk
controller• Attached to server through server’s controller interface
• Software RAID– Software implements and controls RAID techniques– Any hard disk type– Less expensive (no controller, disk array)– Performance rivals hardware RAID
• Several different types of RAID available
Network+ Guide to Networks, 6th Edition 49
![Page 50: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/50.jpg)
Storage (cont’d.)
• NAS (Network Attached Storage)– Specialized storage device, storage device group– Provides centralized fault-tolerant data storage
• Difference from RAID– Maintains own interface to LAN
• Advantages– NAS device contains own file system
• Optimized for saving, serving files– Easily expandable– No service interruption
Network+ Guide to Networks, 6th Edition 50
![Page 51: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/51.jpg)
Network+ Guide to Networks, 6th Edition 51
Figure 14-11 Network attached storage on a LAN
Courtesy Course Technology/Cengage Learning
![Page 52: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/52.jpg)
Storage (cont’d.)
• Disadvantage– No direct communication with network clients
• NAS use– Enterprises requiring fault tolerance, fast data access
• SANs (Storage Area Networks)– Distinct networks of storage devices– Communicate directly with each other, other networks
• Typical SAN contains multiple storage devices– Connected to multiple, identical servers
Network+ Guide to Networks, 6th Edition 52
![Page 53: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/53.jpg)
Storage (cont’d.)
• SAN advantages– Fault tolerant– Extremely fast
• Special transmission method• Fiber-optic media, proprietary protocols• Example: Fibre Channel
– Install in location separate from LAN served• Provides added fault tolerance
– Highly scalable– Faster, more efficient method of writing data
Network+ Guide to Networks, 6th Edition 53
![Page 54: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/54.jpg)
Storage (cont’d.)
• SAN disadvantages– High cost
• Small SAN: $100,000• Large SAN: several million dollars
– More complex than NAS, RAID• Training, administration efforts required
• Use– Environments with huge data quantities requiring
quick availability
Network+ Guide to Networks, 6th Edition 54
![Page 55: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/55.jpg)
Network+ Guide to Networks, 6th Edition 55
Figure 14-12 A storage area network
Courtesy Course Technology/Cengage Learning
![Page 56: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/56.jpg)
Data Backup
• Backup– Copies of data or program files– Created for archiving, safekeeping– Store off site
• Without backup: risk losing everything• Many backup options available
– Performed by different software and hardware– Use different storage media types
• Can be controlled by NOS utilities, third-party software
Network+ Guide to Networks, 6th Edition 56
![Page 57: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/57.jpg)
Backup Media and Methods
• Approach to selecting backup media, methods– Ask questions to select appropriate solution
• Optical media– Media storing digitized data– Uses laser to write data, read data– Examples: CDs, DVDs
• Backup requirements– Recordable CD or DVD drive, software utility
• Blu-ray– Optical storage format
Network+ Guide to Networks, 6th Edition 57
![Page 58: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/58.jpg)
Backup Media and Methods (cont’d.)
• DVD and Blu-ray DVD disadvantages– Writing data takes longer than other media– Requires more human intervention than other backup
methods• Tape backups
– Copying data to magnetic tape• Requirements
– Tape drive connected to network– Management software– Backup media
Network+ Guide to Networks, 6th Edition 58
![Page 59: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/59.jpg)
Backup Media and Methods (cont’d.)
• Small network tape backups– Stand-alone tape drives attached to each server
• Large network tape backups– One large, centralized tape backup device
• Manages all subsystems’ backups
• Extremely large environments– Robots retrieve, circulate tapes from tape storage
library
Network+ Guide to Networks, 6th Edition 59
![Page 60: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/60.jpg)
Backup Media and Methods (cont’d.)
• External disk drives (removable disk drives)– Storage device attached temporarily to computer
• USB, PCMCIA, FireWire, CompactFlash port– Simple to use, save, share data– Temporary drive appears like any other drive
• Large data amount requirements– Backup control features, higher storage capacity,
faster read-write access
Network+ Guide to Networks, 6th Edition 60
![Page 61: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/61.jpg)
Backup Media and Methods (cont’d.)
• Network backups– Save data to another place on network– Different server, another WAN location– SAN, NAS storage device
• Online backup (cloud backup)– Saves data to another company’s storage array using
Internet– Implement strict security measures– Automated backup, restoration processes
• Evaluate online back up provider– Test speed, accuracy, security, recovery
Network+ Guide to Networks, 6th Edition 61
![Page 62: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/62.jpg)
Backup Strategy
• Devise a strategy to perform reliable backups• Document in accessible area• Address various questions• Archive bit
– File attribute• Set to on or off• On indicates file must be archived
– Used by various backup methods
Network+ Guide to Networks, 6th Edition 62
![Page 63: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/63.jpg)
Backup Strategy (cont’d.)
• Full backup– All data copied– Uncheck archive bits
• Incremental backup– Copy data changed since last full, incremental backup– Uncheck archive bits
• Differential backup– Copy only data changed since last backup– All data marked for subsequent backup– Does not uncheck archive bits
Network+ Guide to Networks, 6th Edition 63
![Page 64: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/64.jpg)
Backup Strategy (cont’d.)
• Determine best backup rotation scheme– Plan specifies when and how often backups occur– Goal
• Provide excellent data reliability without overtaxing network, requiring intervention
• Grandfather-Father-Son strategy– Uses backup sets
• Daily (son)• Weekly (father)• Monthly (grandfather)
Network+ Guide to Networks, 6th Edition 64
![Page 65: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/65.jpg)
Network+ Guide to Networks, 6th Edition 65
Figure 14-13 The Grandfather-Father-Son backup rotation scheme
Courtesy Course Technology/Cengage Learning
![Page 66: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/66.jpg)
Backup Strategy (cont’d.)
• Ensure backup activity recorded in backup log– Backup date– Media identification– Type of data backed up– Type of backup– Files backed up– Backup location
• Establish regular verification schedule– Attempt to recover files periodically
Network+ Guide to Networks, 6th Edition 66
![Page 67: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/67.jpg)
Disaster Recovery
• Disaster recovery– Restoring critical functionality, data
• After enterprise-wide outage• Affecting more than single system, limited group
• Consider possible extremes– Not relatively minor outages, failures, security
breaches, data corruption
Network+ Guide to Networks, 6th Edition 67
![Page 68: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/68.jpg)
Disaster Recovery Planning
• Account for worst-case scenarios• Identify disaster recovery team• Provide contingency plans
– Restore and replace:• Computer systems• Power• Telephony systems• Paper-based files
• Plan contains various sections• Lessen critical data loss risk
Network+ Guide to Networks, 6th Edition 68
![Page 69: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/69.jpg)
Disaster Recovery Contingencies
• Cold site– Components necessary to rebuild network exist– Not appropriately configured, updated, or connected
• Warm site– Components necessary to rebuild network exist– Some appropriately configured, updated, and
connected• Hot site
– Components exist and match network’s current state– All appropriately configured, updated, and connected
Network+ Guide to Networks, 6th Edition 69
![Page 70: Network+ 6th edition chapter 14](https://reader031.vdocuments.mx/reader031/viewer/2022013121/5481c9b4b4af9f663c8b46b5/html5/thumbnails/70.jpg)
Summary
• Integrity and availability: important concepts• Malware aims to intrude upon or harm system• Anti-malware software part of network protection• Fault tolerance allows system to continue
performing despite unexpected malfunction• Various types of backup power supplies exist• Network design can provide different levels of fault
tolerance• Mirroring, clustering, RAID, NAS, and SAN can
provide fault tolerance
Network+ Guide to Networks, 6th Edition 70