Framework Architecture on High Data Availability Server Virtualization for Disaster Recovery
Keywords:
Disaster Recovery, High Data Availability, Network Framework Architecture, Security, Virtual Machine (Wms), Virtualization,Abstract
This paper presents a design and tested framework architecture on High Data Availability Server Virtualization for Disaster Recovery at one campus network centre. Today’s data information and knowledge are becoming most valuable commodity in business exchange and transactions where data need to be secured from cyber attackers and information security is a crucial needed. A propose architecture using server virtualization to provide high availability of data, through fast and high data through fast and high data recovery on virtual infrastructure for disaster recovery is done. The architecture uses multi side network RAID to achieve return of time objectives (RTO) and return of point objectives (RPO) of the application in the organization. Method presents servers consolidation and multiple physical server applications are deployed onto the virtual machines (VM), which then run on a single (many real server apps usually are started on top of this exclusive products (VM), which then function using one) or fewer real high-end servers to achieve better performances compared to utilizing several or even hundreds of traditional servers. Security perimeters are used in the proposed architecture to maximize the data protection in the organization. The setup experiments of virtualization technologies using VMWare, Ranger Pro for backup and Trend Micro Deep Security tools. Three architecture framework are tested which presents automated data replication simulations from production site to disaster recovery site that creates an active-active environment. Results presented that Recovery Point Objective (RPO), Recovery Time Objective (RTO), data loss and data availability at 99.91 % of data are recovered during recovery process using multi side network RAID. Thus this technique protects a larger share of disaster recovery workloads in terms of high availability and data protection.References
H. Smith, Data center storage: cost-effective strategies, implementation, and management: CRC Press, 2016.
T. Lumpp, J. Schneider, J. Holtz, M. Mueller, N. Lenz, A. Biazetti, and D. Petersen, "From high availability and disaster recovery to business continuity solutions," IBM Systems Journal, vol. 47, pp. 605-619, 2008.
A. Singh and K. Chatterjee, "Cloud security issues and challenges: A survey," Journal of Network and Computer Applications, vol. 79, pp. 88-115, 2017.
V. Catrinescu and T. Seward, "Implementing High Availability and Disaster Recovery," in Deploying SharePoint 2016, ed: Springer, 2016, pp. 349-363.
Z. Gao, H. Min, X. Li, J. Huang, Y. Jin, A. Lei, S. Bourbonnais, M. Zheng, and G. Fuh, "Optimizing Inter-data-center Large-Scale Database Parallel Replication with Workload-Driven Partitioning," in Transactions on Large-Scale Data-and Knowledge-Centered Systems XXIV, ed: Springer, 2016, pp. 169-192.
N. A. Sulaiman, M. Kassim, and S. Saaidin, "Systematic test and evaluation process (STEP) approach on shared banking services (SBS) system identification," in Education Technology and Computer (ICETC), 2010 2nd International Conference on, 2010, pp. V5-219- V5-223.
S. Gaonkar, K. Keeton, A. Merchant, and W. H. Sanders, "Designing Dependable Storage Solutions for Shared Application Environments," IEEE Transactions on Dependable and Secure Computing, vol. 7, pp. 366-380, 2010.
N. A. Sulaiman and M. Kassim, "Developing a customized software engineering testing for Shared Banking Services (SBS) System," in System Engineering and Technology (ICSET), 2011 IEEE International Conference on, 2011, pp. 132-137.
K. Padmaja and R. Seshadri, "A Review on Cloud Computing Technologies and Security Issues," Indian Journal of Science and Technology, vol. 9, 2016.
M. E. Whitman and H. J. Mattord, Principles of information security: Cengage Learning, 2011.
R. Sindoori, V. P. Pallavi, and P. Abinaya, "An overview of disaster recovery in virtualization technology," Journal of Artificial Intelligence, vol. 6, p. 60, 2013.
K. Schmidt, High availability and disaster recovery: concepts, design, implementation vol. 22: Springer Science & Business Media, 2006.
J. McDermott, "Replication does survive information," Database Security XI: Status and Prospects, p. 219, 2016.
M. Poess and R. O. Nambiar, "Large scale data warehouses on grid: Oracle database 10 g and HP proliant servers," in Proceedings of the 31st international conference on Very large data bases, 2005, pp. 1055-1066.
P. S. Weygant, Clusters for High Availability: A Primer of HP Solutions: Prentice Hall Professional, 2001.
N. C. Brazelton and A. M. Lyons, "Downtime and Disaster Recovery for Health Information Systems," Health Informatics: An Interprofessional Approach, p. 337, 2017.
N. I. Uzir, M. Salam, and M. Sahalan, "Analysis for Scalable Performance with Server clustering."
D. Mishchenko, VMware ESXi: Planning, implementation, and security: Cengage Learning, 2010.
K. Keeton, C. A. Santos, D. Beyer, J. S. Chase, and J. Wilkes, "Designing for Disasters," in FAST, 2004, pp. 59-62.
Downloads
Published
How to Cite
Issue
Section
License
TRANSFER OF COPYRIGHT AGREEMENT
The manuscript is herewith submitted for publication in the Journal of Telecommunication, Electronic and Computer Engineering (JTEC). It has not been published before, and it is not under consideration for publication in any other journals. It contains no material that is scandalous, obscene, libelous or otherwise contrary to law. When the manuscript is accepted for publication, I, as the author, hereby agree to transfer to JTEC, all rights including those pertaining to electronic forms and transmissions, under existing copyright laws, except for the following, which the author(s) specifically retain(s):
- All proprietary right other than copyright, such as patent rights
- The right to make further copies of all or part of the published article for my use in classroom teaching
- The right to reuse all or part of this manuscript in a compilation of my own works or in a textbook of which I am the author; and
- The right to make copies of the published work for internal distribution within the institution that employs me
I agree that copies made under these circumstances will continue to carry the copyright notice that appears in the original published work. I agree to inform my co-authors, if any, of the above terms. I certify that I have obtained written permission for the use of text, tables, and/or illustrations from any copyrighted source(s), and I agree to supply such written permission(s) to JTEC upon request.