did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780471430261

Blueprints for High Availability

by ;
  • ISBN13:

    9780471430261

  • ISBN10:

    0471430269

  • Edition: 2nd
  • Format: Paperback
  • Copyright: 2003-09-19
  • Publisher: Wiley
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $60.00 Save up to $1.80
  • Buy New
    $58.20
    Add to Cart Free Shipping Icon Free Shipping

    PRINT ON DEMAND: 2-4 WEEKS. THIS ITEM CANNOT BE CANCELLED OR RETURNED.

Supplemental Materials

What is included with this book?

Summary

Uses the same witty style with practical tips, lists, and Tales from the Field as the first edition Since the first edition, there has been a huge increase in the complexity and design requirements needed to make networks reliable and always available 24/7 Stresses the importance of data being instantly and reliably available, especially in these critical times when a network must be up round the clock Examines how companies look at all possible threats and risks to their enterprise data, from damage caused by a virus to loss of business-critical services

Author Biography

EVAN MARCUS is a Principal Engineer for VERITAS Software. With more than twelve years of experience in the field of high availability, he is a frequent speaker at industry technical conferences.

Table of Contents

Contentsp. vii
Prefacep. xix
For the Second Editionp. xix
Preface from the First Editionp. xxiv
About the Authorsp. xxxi
Introductionp. 1
Why an Availability Book?p. 2
Our Approach to the Problemp. 3
What's Not Herep. 4
Our Missionp. 4
The Availability Indexp. 5
Summaryp. 6
Organization of the Bookp. 6
Key Pointsp. 8
What to Measurep. 9
Measuring Availabilityp. 10
Failure Modesp. 20
Confidence in Your Measurementsp. 28
Key Pointsp. 30
The Value of Availabilityp. 31
What Is High Availability?p. 31
The Costs of Downtimep. 34
The Value of Availabilityp. 37
The Availability Continuump. 47
The Availability Indexp. 51
The Lifecycle of an Outagep. 52
Key Pointsp. 60
The Politics of Availabilityp. 61
Beginning the Persuasion Processp. 61
Your Audiencep. 69
Delivering the Messagep. 70
After the Message Is Deliveredp. 73
Key Pointsp. 73
20 Key High Availability Design Principlesp. 75
Don't Be Cheapp. 76
Assume Nothingp. 77
Remove Single Points of Failure (SPOFs)p. 78
Enforce Securityp. 79
Consolidate Your Serversp. 81
Watch Your Speedp. 82
Enforce Change Controlp. 83
Document Everythingp. 84
Employ Service Level Agreementsp. 87
Plan Aheadp. 88
Test Everythingp. 89
Separate Your Environmentsp. 90
Learn from Historyp. 92
Design for Growthp. 93
Choose Mature Softwarep. 94
Choose Mature, Reliable Hardwarep. 95
Reuse Configurationsp. 97
Exploit External Resourcesp. 98
One Problem, One Solutionp. 99
K.I.S.S. (Keep It Simple...)p. 101
Key Pointsp. 104
Backups and Restoresp. 105
The Basic Rules for Backupsp. 106
Do Backups Really Offer High Availability?p. 108
What Should Get Backed Up?p. 109
Backup Softwarep. 111
Backup Performancep. 115
Backup Stylesp. 125
Handling Backup Tapes and Datap. 141
Restoresp. 145
Summaryp. 147
Key Pointsp. 148
Highly Available Data Managementp. 149
Four Fundamental Truthsp. 150
Six Independent Layers of Data Storage and Managementp. 152
Disk Hardware and Connectivity Terminologyp. 153
RAID Technologyp. 161
Disk Space and Filesystemsp. 176
Key Pointsp. 182
SAN, NAS, and Virtualizationp. 183
Storage Area Networks (SANs)p. 184
Network-Attached Storage (NAS)p. 190
SAN or NAS: Which Is Better?p. 191
Storage Virtualizationp. 196
Key Pointsp. 202
Networkingp. 203
Network Failure Taxonomyp. 204
Building Redundant Networksp. 214
Load Balancing and Network Redirectionp. 228
Dynamic IP Addressesp. 232
Network Service Reliabilityp. 232
Key Pointsp. 240
Data Centers and the Local Environmentp. 241
Data Centersp. 242
Electricityp. 252
Cablingp. 255
Cooling and Environmental Issuesp. 257
System Naming Conventionsp. 259
Key Pointsp. 261
People and Processesp. 263
System Management and Modificationsp. 264
Vendor Managementp. 271
Securityp. 277
Documentationp. 280
System Administratorsp. 284
Internal Escalationp. 287
Key Pointsp. 290
Clients and Consumersp. 291
Hardening Enterprise Clientsp. 292
Tolerating Data Service Failuresp. 296
Key Pointsp. 302
Application Designp. 303
Application Recovery Overviewp. 304
Application Recovery from System Failuresp. 309
Internal Application Failuresp. 316
Developer Hygienep. 319
Process Replicationp. 326
Assume Nothing, Manage Everythingp. 330
Key Pointsp. 331
Data and Web Servicesp. 333
Network File System Servicesp. 334
Database Serversp. 342
Redundancy and Availabilityp. 349
Web-Based Services Reliabilityp. 351
Key Pointsp. 359
Local Clustering and Failoverp. 361
A Brief and Incomplete History of Clusteringp. 362
Server Failures and Failoverp. 365
Logical, Application-centric Thinkingp. 367
Failover Requirementsp. 369
Larger Clustersp. 385
Key Pointsp. 386
Failover Management and Issuesp. 387
Failover Management Software (FMS)p. 388
Component Monitoringp. 389
Time to Manual Failoverp. 393
Homemade Failover Software or Commercial Software?p. 395
Commercial Failover Management Softwarep. 397
When Good Failovers Go Badp. 398
Verification and Testingp. 404
Managing Failoversp. 408
Other Clustering Topicsp. 411
Key Pointsp. 414
Failover Configurationsp. 415
Two-Node Failover Configurationsp. 416
Service Group Failoverp. 425
Larger Cluster Configurationsp. 426
How Large Should Clusters Be?p. 430
Key Pointsp. 431
Data Replicationp. 433
What Is Replication?p. 434
Why Replicate?p. 435
Two Categories of Replication Typesp. 435
Other Thoughts on Replicationp. 458
Key Pointsp. 463
Virtual Machines and Resource Managementp. 465
Partitions and Domains: System-Level VMsp. 466
Containers and Jails: OS Level VMsp. 468
Resource Managementp. 469
Key Pointsp. 471
The Disaster Recovery Planp. 473
Should You Worry about DR?p. 474
Three Primary Goals of a DR Planp. 475
What Goes into a Good DR Planp. 476
Preparing to Build the DR Planp. 477
Choosing a DR Sitep. 484
Distributing the DR Planp. 488
The Plan's Audiencep. 490
Timelinesp. 492
Team Assignmentsp. 493
How Many Different Plans?p. 495
Shared DR Sitesp. 496
Equipping the DR Sitep. 498
Is Your Plan Any Good?p. 500
Three Types of Exercisesp. 507
The Effects of a Disaster on Peoplep. 509
Key Pointsp. 512
A Resilient Enterprise*p. 513
The New York Board of Tradep. 514
Summaryp. 539
A Brief Look Aheadp. 541
iSCSIp. 541
InfiniBandp. 542
Global Filesystem Undop. 543
Grid Computingp. 545
Blade Computingp. 547
Global Storage Repositoryp. 548
Autonomic and Policy-Based Computingp. 549
Intermediationp. 551
Software Quality and Byzantine Reliabilityp. 552
Business Continuityp. 553
Key Pointsp. 554
Parting Shotsp. 555
How We Got Herep. 555
Indexp. 559
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program